Description

Here we are again with another installment of Patch Tuesday. When compared to the past few months this one feels a bit light both in severity and number of vulnerabilities addressed. Microsoft has only released patches for 55 CVEs this month, less than half of the usual volume, with only 4 of them being scored as critical. Let's dive into the details.
## HTTP Protocol Stack Remote Code Execution Vulnerability - [[[CVE-2021-31166](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31207>)](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31166>)](<https://blog.rapid7.com/p/a0284057-0a58-48f2-89f5-a9b1d04661c3/CVE-2021-31166>)
The hottest vulnerability this month is in the HTTP.sys library. If an attacker has network access to a webserver running on an unpatched asset they may be able to send a specially crafted packet which could result in RCE. This was found internally by Microsoft and has not yet been observed in the wild. However, it is only a matter of time before someone figures out how to craft that special packet and we start to see widespread use against Windows 10 and Windows Server machines. Rated at 9.8, this potentially wormable vulnerability should be a high priority for remediation.
## Hyper-V Remote Code Execution - [CVE-2021-28476](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-28476>)
There is some debate whether this vulnerability deserves its assigned 9.9 severity score. The limited details indicate that the most likely use of this bug is to cause a DoS on the Hyper-V host. This can cause a good amount of trouble for anyone running virtual machines but is not as damaging as the theoretical RCE this vulnerability could provide. In either case this is a good patch to put at the top of the todo-list.
## Exchange Server Security Feature Bypass - [CVE-2021-31207](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31207>)
Not to be outdone, Exchange Server is back again with yet another patch. This one is not nearly as high profile as the recent vulnerability which saw widespread use, but still an important patch to apply given that Exchange Servers are almost always exposed to the internet. There are a few other less severe vulnerabilities this month for Exchange which were disclosed at Pwn2Own in April. We expect to see a continued focus on Exchange Server in the months to come.
## Summary Tables
## Azure Vulnerabilities
CVE | Title | Exploited | Disclosed | CVSS3 | FAQ
---|---|---|---|---|---
[CVE-2021-31936](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31936>) | Microsoft Accessibility Insights for Web Information Disclosure Vulnerability | No | No | 7.4 | Yes
## Browser ESU Vulnerabilities
CVE | Title | Exploited | Disclosed | CVSS3 | FAQ
---|---|---|---|---|---
[CVE-2021-26419](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26419>) | Scripting Engine Memory Corruption Vulnerability | No | No | 7.5 | Yes
## Developer Tools Vulnerabilities
CVE | Title | Exploited | Disclosed | CVSS3 | FAQ
---|---|---|---|---|---
[CVE-2021-27068](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27068>) | Visual Studio Remote Code Execution Vulnerability | No | No | 8.8 | No
[CVE-2021-31213](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31213>) | Visual Studio Code Remote Containers Extension Remote Code Execution Vulnerability | No | No | 7.8 | Yes
[CVE-2021-31211](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31211>) | Visual Studio Code Remote Code Execution Vulnerability | No | No | 7.8 | Yes
[CVE-2021-31214](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31214>) | Visual Studio Code Remote Code Execution Vulnerability | No | No | 7.8 | Yes
[CVE-2021-31204](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31204>) | .NET and Visual Studio Elevation of Privilege Vulnerability | No | Yes | 7.3 | No
## Exchange Server Vulnerabilities
CVE | Title | Exploited | Disclosed | CVSS3 | FAQ
---|---|---|---|---|---
[CVE-2021-31209](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31209>) | Microsoft Exchange Server Spoofing Vulnerability | No | No | 6.5 | Yes
[CVE-2021-31207](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31207>) | Microsoft Exchange Server Security Feature Bypass Vulnerability | No | Yes | 6.6 | Yes
[CVE-2021-31198](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31198>) | Microsoft Exchange Server Remote Code Execution Vulnerability | No | No | 7.8 | No
[CVE-2021-31195](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31195>) | Microsoft Exchange Server Remote Code Execution Vulnerability | No | No | 6.5 | No
## Microsoft Dynamics Vulnerabilities
CVE | Title | Exploited | Disclosed | CVSS3 | FAQ
---|---|---|---|---|---
[CVE-2021-28461](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28461>) | Dynamics Finance and Operations Cross-site Scripting Vulnerability | No | No | 6.1 | No
## Microsoft Office Vulnerabilities
CVE | Title | Exploited | Disclosed | CVSS3 | FAQ
---|---|---|---|---|---
[CVE-2021-26421](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26421>) | Skype for Business and Lync Spoofing Vulnerability | No | No | 6.5 | No
[CVE-2021-26422](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26422>) | Skype for Business and Lync Remote Code Execution Vulnerability | No | No | 7.2 | No
[CVE-2021-28478](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28478>) | Microsoft SharePoint Spoofing Vulnerability | No | No | 7.6 | No
[CVE-2021-31172](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31172>) | Microsoft SharePoint Spoofing Vulnerability | No | No | 7.1 | No
[CVE-2021-26418](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26418>) | Microsoft SharePoint Spoofing Vulnerability | No | No | 4.6 | No
[CVE-2021-28474](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28474>) | Microsoft SharePoint Server Remote Code Execution Vulnerability | No | No | 8.8 | Yes
[CVE-2021-31173](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31173>) | Microsoft SharePoint Server Information Disclosure Vulnerability | No | No | 5.3 | Yes
[CVE-2021-31181](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31181>) | Microsoft SharePoint Remote Code Execution Vulnerability | No | No | 8.8 | No
[CVE-2021-31171](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31171>) | Microsoft SharePoint Information Disclosure Vulnerability | No | No | 4.1 | Yes
[CVE-2021-31175](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31175>) | Microsoft Office Remote Code Execution Vulnerability | No | No | 7.8 | Yes
[CVE-2021-31176](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31176>) | Microsoft Office Remote Code Execution Vulnerability | No | No | 7.8 | Yes
[CVE-2021-31177](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31177>) | Microsoft Office Remote Code Execution Vulnerability | No | No | 7.8 | Yes
[CVE-2021-31179](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31179>) | Microsoft Office Remote Code Execution Vulnerability | No | No | 7.8 | Yes
[CVE-2021-31178](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31178>) | Microsoft Office Information Disclosure Vulnerability | No | No | 5.5 | Yes
[CVE-2021-31180](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31180>) | Microsoft Office Graphics Remote Code Execution Vulnerability | No | No | 7.8 | Yes
[CVE-2021-31174](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31174>) | Microsoft Excel Information Disclosure Vulnerability | No | No | 5.5 | Yes
## Open Source Software Vulnerabilities
CVE | Title | Exploited | Disclosed | CVSS3 | FAQ
---|---|---|---|---|---
[CVE-2021-31200](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31200>) | Common Utilities Remote Code Execution Vulnerability | No | Yes | 7.2 | Yes
## Windows Vulnerabilities
CVE | Title | Exploited | Disclosed | CVSS3 | FAQ
---|---|---|---|---|---
[CVE-2021-31187](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31187>) | Windows WalletService Elevation of Privilege Vulnerability | No | No | 7.8 | No
[CVE-2021-31205](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31205>) | Windows SMB Client Security Feature Bypass Vulnerability | No | No | 4.3 | Yes
[CVE-2021-31191](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31191>) | Windows Projected File System FS Filter Driver Information Disclosure Vulnerability | No | No | 5.5 | Yes
[CVE-2021-31192](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31192>) | Windows Media Foundation Core Remote Code Execution Vulnerability | No | No | 7.3 | No
[CVE-2021-31170](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31170>) | Windows Graphics Component Elevation of Privilege Vulnerability | No | No | 7.8 | No
[CVE-2021-31185](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31185>) | Windows Desktop Bridge Denial of Service Vulnerability | No | No | 5.5 | No
[CVE-2021-31165](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31165>) | Windows Container Manager Service Elevation of Privilege Vulnerability | No | No | 7.8 | No
[CVE-2021-31167](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31167>) | Windows Container Manager Service Elevation of Privilege Vulnerability | No | No | 7.8 | No
[CVE-2021-31168](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31168>) | Windows Container Manager Service Elevation of Privilege Vulnerability | No | No | 7.8 | No
[CVE-2021-31169](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31169>) | Windows Container Manager Service Elevation of Privilege Vulnerability | No | No | 7.8 | No
[CVE-2021-31208](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31208>) | Windows Container Manager Service Elevation of Privilege Vulnerability | No | No | 7.8 | No
[CVE-2021-31190](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31190>) | Windows Container Isolation FS Filter Driver Elevation of Privilege Vulnerability | No | No | 7.8 | No
[CVE-2021-28479](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28479>) | Windows CSC Service Information Disclosure Vulnerability | No | No | 5.5 | Yes
[CVE-2021-28465](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28465>) | Web Media Extensions Remote Code Execution Vulnerability | No | No | 7.8 | Yes
[CVE-2021-31166](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31166>) | HTTP Protocol Stack Remote Code Execution Vulnerability | No | No | 9.8 | Yes
## Windows ESU Vulnerabilities
CVE | Title | Exploited | Disclosed | CVSS3 | FAQ
---|---|---|---|---|---
[CVE-2020-24588](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-24588>) | Windows Wireless Networking Spoofing Vulnerability | No | No | 6.5 | No
[CVE-2020-26144](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-26144>) | Windows Wireless Networking Spoofing Vulnerability | No | No | 6.5 | No
[CVE-2020-24587](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-24587>) | Windows Wireless Networking Information Disclosure Vulnerability | No | No | 6.5 | Yes
[CVE-2021-31193](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31193>) | Windows SSDP Service Elevation of Privilege Vulnerability | No | No | 7.8 | No
[CVE-2021-31186](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31186>) | Windows Remote Desktop Protocol (RDP) Information Disclosure Vulnerability | No | No | 7.4 | Yes
[CVE-2021-31188](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31188>) | Windows Graphics Component Elevation of Privilege Vulnerability | No | No | 7.8 | No
[CVE-2021-31194](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31194>) | OLE Automation Remote Code Execution Vulnerability | No | No | 8.8 | No
[CVE-2021-31184](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31184>) | Microsoft Windows Infrared Data Association (IrDA) Information Disclosure Vulnerability | No | No | 5.5 | Yes
[CVE-2021-31182](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31182>) | Microsoft Bluetooth Driver Spoofing Vulnerability | No | No | 7.1 | No
[CVE-2021-28476](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28476>) | Hyper-V Remote Code Execution Vulnerability | No | No | 9.9 | Yes
## Windows Microsoft Office ESU Vulnerabilities
CVE | Title | Exploited | Disclosed | CVSS3 | FAQ
---|---|---|---|---|---
[CVE-2021-28455](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28455>) | Microsoft Jet Red Database Engine and Access Connectivity Engine Remote Code Execution Vulnerability | No | No | 8.8 | Yes
## Summary Graphs

Related
{"id": "RAPID7BLOG:05A653A5E863B78EDD56FD74F059E02E", "type": "rapid7blog", "bulletinFamily": "info", "title": "Patch Tuesday - May 2021", "description": "\n\nHere we are again with another installment of Patch Tuesday. When compared to the past few months this one feels a bit light both in severity and number of vulnerabilities addressed. Microsoft has only released patches for 55 CVEs this month, less than half of the usual volume, with only 4 of them being scored as critical. Let's dive into the details.\n\n## HTTP Protocol Stack Remote Code Execution Vulnerability - [[[CVE-2021-31166](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31207>)](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31166>)](<https://blog.rapid7.com/p/a0284057-0a58-48f2-89f5-a9b1d04661c3/CVE-2021-31166>)\n\nThe hottest vulnerability this month is in the HTTP.sys library. If an attacker has network access to a webserver running on an unpatched asset they may be able to send a specially crafted packet which could result in RCE. This was found internally by Microsoft and has not yet been observed in the wild. However, it is only a matter of time before someone figures out how to craft that special packet and we start to see widespread use against Windows 10 and Windows Server machines. Rated at 9.8, this potentially wormable vulnerability should be a high priority for remediation.\n\n## Hyper-V Remote Code Execution - [CVE-2021-28476](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-28476>)\n\nThere is some debate whether this vulnerability deserves its assigned 9.9 severity score. The limited details indicate that the most likely use of this bug is to cause a DoS on the Hyper-V host. This can cause a good amount of trouble for anyone running virtual machines but is not as damaging as the theoretical RCE this vulnerability could provide. In either case this is a good patch to put at the top of the todo-list.\n\n## Exchange Server Security Feature Bypass - [CVE-2021-31207](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31207>)\n\nNot to be outdone, Exchange Server is back again with yet another patch. This one is not nearly as high profile as the recent vulnerability which saw widespread use, but still an important patch to apply given that Exchange Servers are almost always exposed to the internet. There are a few other less severe vulnerabilities this month for Exchange which were disclosed at Pwn2Own in April. We expect to see a continued focus on Exchange Server in the months to come.\n\n## Summary Tables\n\n## Azure Vulnerabilities\n\nCVE | Title | Exploited | Disclosed | CVSS3 | FAQ \n---|---|---|---|---|--- \n[CVE-2021-31936](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31936>) | Microsoft Accessibility Insights for Web Information Disclosure Vulnerability | No | No | 7.4 | Yes \n \n## Browser ESU Vulnerabilities\n\nCVE | Title | Exploited | Disclosed | CVSS3 | FAQ \n---|---|---|---|---|--- \n[CVE-2021-26419](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26419>) | Scripting Engine Memory Corruption Vulnerability | No | No | 7.5 | Yes \n \n## Developer Tools Vulnerabilities\n\nCVE | Title | Exploited | Disclosed | CVSS3 | FAQ \n---|---|---|---|---|--- \n[CVE-2021-27068](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27068>) | Visual Studio Remote Code Execution Vulnerability | No | No | 8.8 | No \n[CVE-2021-31213](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31213>) | Visual Studio Code Remote Containers Extension Remote Code Execution Vulnerability | No | No | 7.8 | Yes \n[CVE-2021-31211](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31211>) | Visual Studio Code Remote Code Execution Vulnerability | No | No | 7.8 | Yes \n[CVE-2021-31214](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31214>) | Visual Studio Code Remote Code Execution Vulnerability | No | No | 7.8 | Yes \n[CVE-2021-31204](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31204>) | .NET and Visual Studio Elevation of Privilege Vulnerability | No | Yes | 7.3 | No \n \n## Exchange Server Vulnerabilities\n\nCVE | Title | Exploited | Disclosed | CVSS3 | FAQ \n---|---|---|---|---|--- \n[CVE-2021-31209](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31209>) | Microsoft Exchange Server Spoofing Vulnerability | No | No | 6.5 | Yes \n[CVE-2021-31207](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31207>) | Microsoft Exchange Server Security Feature Bypass Vulnerability | No | Yes | 6.6 | Yes \n[CVE-2021-31198](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31198>) | Microsoft Exchange Server Remote Code Execution Vulnerability | No | No | 7.8 | No \n[CVE-2021-31195](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31195>) | Microsoft Exchange Server Remote Code Execution Vulnerability | No | No | 6.5 | No \n \n## Microsoft Dynamics Vulnerabilities\n\nCVE | Title | Exploited | Disclosed | CVSS3 | FAQ \n---|---|---|---|---|--- \n[CVE-2021-28461](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28461>) | Dynamics Finance and Operations Cross-site Scripting Vulnerability | No | No | 6.1 | No \n \n## Microsoft Office Vulnerabilities\n\nCVE | Title | Exploited | Disclosed | CVSS3 | FAQ \n---|---|---|---|---|--- \n[CVE-2021-26421](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26421>) | Skype for Business and Lync Spoofing Vulnerability | No | No | 6.5 | No \n[CVE-2021-26422](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26422>) | Skype for Business and Lync Remote Code Execution Vulnerability | No | No | 7.2 | No \n[CVE-2021-28478](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28478>) | Microsoft SharePoint Spoofing Vulnerability | No | No | 7.6 | No \n[CVE-2021-31172](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31172>) | Microsoft SharePoint Spoofing Vulnerability | No | No | 7.1 | No \n[CVE-2021-26418](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26418>) | Microsoft SharePoint Spoofing Vulnerability | No | No | 4.6 | No \n[CVE-2021-28474](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28474>) | Microsoft SharePoint Server Remote Code Execution Vulnerability | No | No | 8.8 | Yes \n[CVE-2021-31173](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31173>) | Microsoft SharePoint Server Information Disclosure Vulnerability | No | No | 5.3 | Yes \n[CVE-2021-31181](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31181>) | Microsoft SharePoint Remote Code Execution Vulnerability | No | No | 8.8 | No \n[CVE-2021-31171](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31171>) | Microsoft SharePoint Information Disclosure Vulnerability | No | No | 4.1 | Yes \n[CVE-2021-31175](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31175>) | Microsoft Office Remote Code Execution Vulnerability | No | No | 7.8 | Yes \n[CVE-2021-31176](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31176>) | Microsoft Office Remote Code Execution Vulnerability | No | No | 7.8 | Yes \n[CVE-2021-31177](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31177>) | Microsoft Office Remote Code Execution Vulnerability | No | No | 7.8 | Yes \n[CVE-2021-31179](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31179>) | Microsoft Office Remote Code Execution Vulnerability | No | No | 7.8 | Yes \n[CVE-2021-31178](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31178>) | Microsoft Office Information Disclosure Vulnerability | No | No | 5.5 | Yes \n[CVE-2021-31180](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31180>) | Microsoft Office Graphics Remote Code Execution Vulnerability | No | No | 7.8 | Yes \n[CVE-2021-31174](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31174>) | Microsoft Excel Information Disclosure Vulnerability | No | No | 5.5 | Yes \n \n## Open Source Software Vulnerabilities\n\nCVE | Title | Exploited | Disclosed | CVSS3 | FAQ \n---|---|---|---|---|--- \n[CVE-2021-31200](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31200>) | Common Utilities Remote Code Execution Vulnerability | No | Yes | 7.2 | Yes \n \n## Windows Vulnerabilities\n\nCVE | Title | Exploited | Disclosed | CVSS3 | FAQ \n---|---|---|---|---|--- \n[CVE-2021-31187](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31187>) | Windows WalletService Elevation of Privilege Vulnerability | No | No | 7.8 | No \n[CVE-2021-31205](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31205>) | Windows SMB Client Security Feature Bypass Vulnerability | No | No | 4.3 | Yes \n[CVE-2021-31191](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31191>) | Windows Projected File System FS Filter Driver Information Disclosure Vulnerability | No | No | 5.5 | Yes \n[CVE-2021-31192](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31192>) | Windows Media Foundation Core Remote Code Execution Vulnerability | No | No | 7.3 | No \n[CVE-2021-31170](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31170>) | Windows Graphics Component Elevation of Privilege Vulnerability | No | No | 7.8 | No \n[CVE-2021-31185](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31185>) | Windows Desktop Bridge Denial of Service Vulnerability | No | No | 5.5 | No \n[CVE-2021-31165](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31165>) | Windows Container Manager Service Elevation of Privilege Vulnerability | No | No | 7.8 | No \n[CVE-2021-31167](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31167>) | Windows Container Manager Service Elevation of Privilege Vulnerability | No | No | 7.8 | No \n[CVE-2021-31168](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31168>) | Windows Container Manager Service Elevation of Privilege Vulnerability | No | No | 7.8 | No \n[CVE-2021-31169](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31169>) | Windows Container Manager Service Elevation of Privilege Vulnerability | No | No | 7.8 | No \n[CVE-2021-31208](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31208>) | Windows Container Manager Service Elevation of Privilege Vulnerability | No | No | 7.8 | No \n[CVE-2021-31190](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31190>) | Windows Container Isolation FS Filter Driver Elevation of Privilege Vulnerability | No | No | 7.8 | No \n[CVE-2021-28479](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28479>) | Windows CSC Service Information Disclosure Vulnerability | No | No | 5.5 | Yes \n[CVE-2021-28465](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28465>) | Web Media Extensions Remote Code Execution Vulnerability | No | No | 7.8 | Yes \n[CVE-2021-31166](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31166>) | HTTP Protocol Stack Remote Code Execution Vulnerability | No | No | 9.8 | Yes \n \n## Windows ESU Vulnerabilities\n\nCVE | Title | Exploited | Disclosed | CVSS3 | FAQ \n---|---|---|---|---|--- \n[CVE-2020-24588](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-24588>) | Windows Wireless Networking Spoofing Vulnerability | No | No | 6.5 | No \n[CVE-2020-26144](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-26144>) | Windows Wireless Networking Spoofing Vulnerability | No | No | 6.5 | No \n[CVE-2020-24587](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-24587>) | Windows Wireless Networking Information Disclosure Vulnerability | No | No | 6.5 | Yes \n[CVE-2021-31193](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31193>) | Windows SSDP Service Elevation of Privilege Vulnerability | No | No | 7.8 | No \n[CVE-2021-31186](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31186>) | Windows Remote Desktop Protocol (RDP) Information Disclosure Vulnerability | No | No | 7.4 | Yes \n[CVE-2021-31188](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31188>) | Windows Graphics Component Elevation of Privilege Vulnerability | No | No | 7.8 | No \n[CVE-2021-31194](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31194>) | OLE Automation Remote Code Execution Vulnerability | No | No | 8.8 | No \n[CVE-2021-31184](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31184>) | Microsoft Windows Infrared Data Association (IrDA) Information Disclosure Vulnerability | No | No | 5.5 | Yes \n[CVE-2021-31182](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31182>) | Microsoft Bluetooth Driver Spoofing Vulnerability | No | No | 7.1 | No \n[CVE-2021-28476](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28476>) | Hyper-V Remote Code Execution Vulnerability | No | No | 9.9 | Yes \n \n## Windows Microsoft Office ESU Vulnerabilities\n\nCVE | Title | Exploited | Disclosed | CVSS3 | FAQ \n---|---|---|---|---|--- \n[CVE-2021-28455](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28455>) | Microsoft Jet Red Database Engine and Access Connectivity Engine Remote Code Execution Vulnerability | No | No | 8.8 | Yes \n \n## Summary Graphs\n\n", "published": "2021-05-11T23:44:00", "modified": "2021-05-11T23:44:00", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}, "href": "https://blog.rapid7.com/2021/05/11/patch-tuesday-may-2021/", "reporter": "Adam Bunn", "references": [], "cvelist": ["CVE-2020-24587", "CVE-2020-24588", "CVE-2020-26144", "CVE-2021-26418", "CVE-2021-26419", "CVE-2021-26421", "CVE-2021-26422", "CVE-2021-27068", "CVE-2021-28455", "CVE-2021-28461", "CVE-2021-28465", "CVE-2021-28474", "CVE-2021-28476", "CVE-2021-28478", "CVE-2021-28479", "CVE-2021-31165", "CVE-2021-31166", "CVE-2021-31167", "CVE-2021-31168", "CVE-2021-31169", "CVE-2021-31170", "CVE-2021-31171", "CVE-2021-31172", "CVE-2021-31173", "CVE-2021-31174", "CVE-2021-31175", "CVE-2021-31176", "CVE-2021-31177", "CVE-2021-31178", "CVE-2021-31179", "CVE-2021-31180", "CVE-2021-31181", "CVE-2021-31182", "CVE-2021-31184", "CVE-2021-31185", "CVE-2021-31186", "CVE-2021-31187", "CVE-2021-31188", "CVE-2021-31190", "CVE-2021-31191", "CVE-2021-31192", "CVE-2021-31193", "CVE-2021-31194", "CVE-2021-31195", "CVE-2021-31198", "CVE-2021-31200", "CVE-2021-31204", "CVE-2021-31205", "CVE-2021-31207", "CVE-2021-31208", "CVE-2021-31209", "CVE-2021-31211", "CVE-2021-31213", "CVE-2021-31214", "CVE-2021-31936"], "immutableFields": [], "lastseen": "2021-05-22T09:01:54", "viewCount": 131, "enchantments": {"dependencies": {"references": [{"type": "almalinux", "idList": ["ALSA-2021:2036", "ALSA-2021:2037", "ALSA-2021:4356"]}, {"type": "androidsecurity", "idList": ["ANDROID:2021-10-01"]}, {"type": "archlinux", "idList": ["ASA-202105-20", "ASA-202105-21", "ASA-202105-22", "ASA-202105-23", "ASA-202107-34"]}, {"type": "attackerkb", "idList": ["AKB:06AF540E-3C8A-44E7-9CB1-65398AA456D2", "AKB:116FDAE6-8C6E-473E-8D39-247560D01C09", "AKB:223AC3BF-AD6E-4AEA-960A-DE258EE301A0", "AKB:2F48FB8A-EF4C-468F-9F4F-8BB9BB5FEC97", "AKB:5E706DDA-98EC-49CA-AB21-4814DAF26444", "AKB:72CB57AD-D32C-43D3-86B8-F8B617707C5B", "AKB:BAAFFD25-660E-40C6-8978-DD33365E66B6", "AKB:E5053BCC-1FA9-431D-9668-D386D6CA18EB"]}, {"type": "avleonov", "idList": ["AVLEONOV:9D3D76F4CC74C7ABB8000BC6AFB2A2CE", "AVLEONOV:B0F649A99B171AC3032AF71B1DCCFE34"]}, {"type": "checkpoint_advisories", "idList": ["CPAI-2021-0259", "CPAI-2021-0260", "CPAI-2021-0261", "CPAI-2021-0262", "CPAI-2021-0292", "CPAI-2021-0900"]}, {"type": "checkpoint_security", "idList": ["CPS:SK173718"]}, {"type": "cisa", "idList": ["CISA:8C51810D4AACDCCDBF9D526B4C21660C"]}, {"type": "cisco", "idList": ["CISCO-SA-WIFI-FAF-22EPCEWU"]}, {"type": "cloudfoundry", "idList": ["CFOUNDRY:58E18367C5A247865E715DF802E7BD7E"]}, {"type": "cve", "idList": ["CVE-2020-24587", "CVE-2020-24588", "CVE-2020-26144", "CVE-2021-26418", "CVE-2021-26419", "CVE-2021-26421", "CVE-2021-26422", "CVE-2021-27068", "CVE-2021-28455", "CVE-2021-28461", "CVE-2021-28465", "CVE-2021-28474", "CVE-2021-28476", "CVE-2021-28478", "CVE-2021-28479", "CVE-2021-31165", "CVE-2021-31166", "CVE-2021-31167", "CVE-2021-31168", "CVE-2021-31169", "CVE-2021-31170", "CVE-2021-31171", "CVE-2021-31172", "CVE-2021-31173", "CVE-2021-31174", "CVE-2021-31175", "CVE-2021-31176", "CVE-2021-31177", "CVE-2021-31178", "CVE-2021-31179", "CVE-2021-31180", "CVE-2021-31181", "CVE-2021-31182", "CVE-2021-31184", "CVE-2021-31185", "CVE-2021-31186", "CVE-2021-31187", "CVE-2021-31188", "CVE-2021-31190", "CVE-2021-31191", "CVE-2021-31192", "CVE-2021-31193", "CVE-2021-31194", "CVE-2021-31195", "CVE-2021-31198", "CVE-2021-31200", "CVE-2021-31204", "CVE-2021-31205", "CVE-2021-31207", "CVE-2021-31208", "CVE-2021-31209", "CVE-2021-31211", "CVE-2021-31213", "CVE-2021-31214", "CVE-2021-31936"]}, {"type": "debian", "idList": ["DEBIAN:DLA-2689-1:31A23", "DEBIAN:DLA-2690-1:EA198"]}, {"type": "debiancve", "idList": ["DEBIANCVE:CVE-2020-24587", "DEBIANCVE:CVE-2020-24588"]}, {"type": "fedora", "idList": ["FEDORA:004B430A6E02", "FEDORA:8B35130B73F7", "FEDORA:971FF30B86D6", "FEDORA:A44F930A5958", "FEDORA:C53B3304C267", "FEDORA:D3BC1304C267"]}, {"type": "fireeye", "idList": ["FIREEYE:FC60CAB5C936FF70E94A7C9307805695"]}, {"type": "freebsd", "idList": ["8D20BD48-A4F3-11EC-90DE-1C697AA5A594"]}, {"type": "githubexploit", "idList": ["0749209C-E3ED-5482-966B-DB35E546B4E5", "16151C06-C052-5C5E-B50B-5B202C40307C", "18D1D069-9D98-5B5F-9E5B-A5CA5559E4CB", "247E32F5-B5A0-5A30-A422-8A0959F210DD", "2D0AC1C7-F656-5D6B-9FC2-79525014BE1E", "37A7F912-7A7F-50EA-BE80-8CDA0CE05B74", "390843FD-A5C7-51F1-A64D-24276740A4A6", "4F6243AC-FA60-570C-B6BB-D6612F9A0D92", "5A6190EE-8872-5D1B-B2E3-06AE49CBE93C", "706706C2-DB81-5EEA-AF28-6C5376B4E752", "7F0937CB-B94F-52F5-ADE5-6399C85C5EAC", "8279F799-BC4C-5125-BCB1-401A95424586", "8D82AE30-2266-5373-9043-5C953D16A98E", "A30CCA66-2F05-5D40-824F-80B389B32AE9", "A4D0164D-F0CA-51A5-B04B-2B8EE628E329", "B05281EC-9A0B-5C9A-BDC9-83FBF67FA348", "B3DDE0DD-F0B0-542D-8154-F61DCD2E49D9", "CA94B7F0-0AED-5C64-8BBB-D2A90BBCD553", "DE509642-15E1-5430-9B59-A6C3540D0721", "E458F533-4B97-51A1-897B-1AF58218F2BF", "F1BF4059-3C3E-5A65-BD42-BC991FB503F0", "F6326682-0713-5826-ACCC-D065B9E8AE42", "FCE0B03C-A225-5F8F-84EF-B22F29700B8D"]}, {"type": "googleprojectzero", "idList": ["GOOGLEPROJECTZERO:C8077AF60F0E22ECAD33F23194C38BB6"]}, {"type": "hackerone", "idList": ["H1:1238470"]}, {"type": "hivepro", "idList": ["HIVEPRO:09525E3475AC1C5F429611A90182E82F", "HIVEPRO:10B372979ED5F121D7A84FB66487023E", "HIVEPRO:92FF0246065B21E79C7D8C800F2DED76", "HIVEPRO:C0B03D521C5882F1BE07ECF1550A5F74", "HIVEPRO:DB06BB609FE1B4E7C95CDC5CB2A38B28", "HIVEPRO:E7F36EC1E4DCF018F94ECD22747B7093", "HIVEPRO:F2305684A25C735549865536AA4254BF"]}, {"type": "hp", "idList": ["HPSBHF03725", "HPSBHF03743"]}, {"type": "huntr", "idList": ["1-PYPI-NNI"]}, {"type": "ics", "idList": ["ICSA-21-236-01", "ICSA-22-102-04", "ICSA-22-104-04"]}, {"type": "intel", "idList": ["INTEL:INTEL-SA-00473"]}, {"type": "kaspersky", "idList": ["KLA12167", "KLA12168", "KLA12169", "KLA12170", "KLA12171", "KLA12172", "KLA12173", "KLA12174", "KLA12175"]}, {"type": "krebs", "idList": ["KREBS:4E22686F3C4E2536C402F6568B8E659A"]}, {"type": "lenovo", "idList": ["LENOVO:PS500405-INTEL-PROSET-AND-WIRELESS-WIFI-INTEL-VPRO-CSME-WIFI-AND-INTEL-KILLER-WIFI-ADVISORY-NOSID", "LENOVO:PS500411-AGGREGATION-AND-FRAGMENTATION-ATTACKS-AGAINST-WI-FI-FRAGATTACKS-VULNERABILITIES-NOSID"]}, {"type": "mageia", "idList": ["MGASA-2021-0257", "MGASA-2021-0258"]}, {"type": "malwarebytes", "idList": ["MALWAREBYTES:28CA5946147FC0561948BA2EF52A8329", "MALWAREBYTES:6A4862332586F98DA4761BE2B684752F", "MALWAREBYTES:8B41C7471B07595F7246D3DCB8794894", "MALWAREBYTES:B0F2474F776241731FE08EA7972E6239", "MALWAREBYTES:B830332817B5D5BEE99EF296E8EC7E2A", "MALWAREBYTES:B8C767042833344389F6158273089954"]}, {"type": "metasploit", "idList": ["MSF:AUXILIARY-DOS-WINDOWS-HTTP-HTTP_SYS_ACCEPT_ENCODING_DOS_CVE_2021_31166-", "MSF:EXPLOIT-WINDOWS-HTTP-EXCHANGE_PROXYSHELL_RCE-", "MSF:EXPLOIT-WINDOWS-HTTP-SHAREPOINT_UNSAFE_CONTROL-"]}, {"type": "mmpc", "idList": ["MMPC:27EEFD67E5E7E712750B1472E15C5A0B"]}, {"type": "mscve", "idList": ["MS:CVE-2020-24587", "MS:CVE-2020-24588", "MS:CVE-2020-26144", "MS:CVE-2021-26418", "MS:CVE-2021-26419", "MS:CVE-2021-26421", "MS:CVE-2021-26422", "MS:CVE-2021-27068", "MS:CVE-2021-28455", "MS:CVE-2021-28461", "MS:CVE-2021-28465", "MS:CVE-2021-28474", "MS:CVE-2021-28476", "MS:CVE-2021-28478", "MS:CVE-2021-28479", "MS:CVE-2021-31165", "MS:CVE-2021-31166", "MS:CVE-2021-31167", "MS:CVE-2021-31168", "MS:CVE-2021-31169", "MS:CVE-2021-31170", "MS:CVE-2021-31171", "MS:CVE-2021-31172", "MS:CVE-2021-31173", "MS:CVE-2021-31174", "MS:CVE-2021-31175", "MS:CVE-2021-31176", "MS:CVE-2021-31177", "MS:CVE-2021-31178", "MS:CVE-2021-31179", "MS:CVE-2021-31180", "MS:CVE-2021-31181", "MS:CVE-2021-31182", "MS:CVE-2021-31184", "MS:CVE-2021-31185", "MS:CVE-2021-31186", "MS:CVE-2021-31187", "MS:CVE-2021-31188", "MS:CVE-2021-31190", "MS:CVE-2021-31191", "MS:CVE-2021-31192", "MS:CVE-2021-31193", "MS:CVE-2021-31194", "MS:CVE-2021-31195", "MS:CVE-2021-31198", "MS:CVE-2021-31200", "MS:CVE-2021-31204", "MS:CVE-2021-31205", "MS:CVE-2021-31207", "MS:CVE-2021-31208", "MS:CVE-2021-31209", "MS:CVE-2021-31211", "MS:CVE-2021-31213", "MS:CVE-2021-31214", "MS:CVE-2021-31936"]}, {"type": "mskb", "idList": ["KB4464542", "KB4484527", "KB4493197", "KB4493206", "KB4504711", "KB5001914", "KB5001916", "KB5001917", "KB5001918", "KB5001919", "KB5001920", "KB5001923", "KB5001925", "KB5001927", "KB5001928", "KB5001931", "KB5001935", "KB5001936", "KB5003165", "KB5003169", "KB5003171", "KB5003172", "KB5003173", "KB5003174", "KB5003197", "KB5003203", "KB5003208", "KB5003209", "KB5003210", "KB5003220", "KB5003225", "KB5003228", "KB5003233", "KB5003435", "KB5003729"]}, {"type": "mssecure", "idList": ["MSSECURE:27EEFD67E5E7E712750B1472E15C5A0B"]}, {"type": "nessus", "idList": ["AL2_ALASKERNEL-5_10-2022-002.NASL", "AL2_ALASKERNEL-5_4-2022-004.NASL", "ALMA_LINUX_ALSA-2021-4356.NASL", "CENTOS8_RHSA-2021-2036.NASL", "CENTOS8_RHSA-2021-2037.NASL", "CENTOS8_RHSA-2021-4140.NASL", "CENTOS8_RHSA-2021-4356.NASL", "DEBIAN_DLA-2689.NASL", "DEBIAN_DLA-2690.NASL", "EULEROS_SA-2021-2530.NASL", "EULEROS_SA-2021-2663.NASL", "EULEROS_SA-2022-1366.NASL", "EULEROS_SA-2022-1681.NASL", "EULEROS_SA-2022-1735.NASL", "FREEBSD_PKG_8D20BD48A4F311EC90DE1C697AA5A594.NASL", "MACOS_MS21_MAY_DOTNET_CORE.NASL", "MACOS_MS21_MAY_OFFICE.NASL", "MICROSOFT_VISUAL_STUDIO_CODE_REMOTE_CONTAINERS_MS21_MAY.NASL", "OPENSUSE-2021-1975.NASL", "OPENSUSE-2021-1977.NASL", "OPENSUSE-2021-2427.NASL", "OPENSUSE-2021-843.NASL", "OPENSUSE-2021-947.NASL", "ORACLELINUX_ELSA-2021-2036.NASL", "ORACLELINUX_ELSA-2021-2037.NASL", "ORACLELINUX_ELSA-2021-4356.NASL", "ORACLELINUX_ELSA-2021-9404.NASL", "ORACLELINUX_ELSA-2021-9406.NASL", "ORACLELINUX_ELSA-2021-9459.NASL", "ORACLEVM_OVMSA-2021-0031.NASL", "ORACLEVM_OVMSA-2021-0035.NASL", "REDHAT-RHSA-2021-1546.NASL", "REDHAT-RHSA-2021-1547.NASL", "REDHAT-RHSA-2021-2036.NASL", "REDHAT-RHSA-2021-2037.NASL", "REDHAT-RHSA-2021-4140.NASL", "REDHAT-RHSA-2021-4356.NASL", "SLACKWARE_SSA_2021-202-01.NASL", "SMB_NT_MS21_MAY_5003169.NASL", "SMB_NT_MS21_MAY_5003171.NASL", "SMB_NT_MS21_MAY_5003172.NASL", "SMB_NT_MS21_MAY_5003173.NASL", "SMB_NT_MS21_MAY_5003174.NASL", "SMB_NT_MS21_MAY_5003197.NASL", "SMB_NT_MS21_MAY_5003208.NASL", "SMB_NT_MS21_MAY_5003209.NASL", "SMB_NT_MS21_MAY_5003210.NASL", "SMB_NT_MS21_MAY_5003233.NASL", "SMB_NT_MS21_MAY_DOTNET_CORE.NASL", "SMB_NT_MS21_MAY_EXCEL.NASL", "SMB_NT_MS21_MAY_EXCEL_C2R.NASL", "SMB_NT_MS21_MAY_EXCHANGE.NASL", "SMB_NT_MS21_MAY_INTERNET_EXPLORER.NASL", "SMB_NT_MS21_MAY_OFFICE.NASL", "SMB_NT_MS21_MAY_OFFICE_C2R.NASL", "SMB_NT_MS21_MAY_OFFICE_SHAREPOINT_2013.NASL", "SMB_NT_MS21_MAY_OFFICE_SHAREPOINT_2016.NASL", "SMB_NT_MS21_MAY_OFFICE_SHAREPOINT_2019.NASL", "SMB_NT_MS21_MAY_OFFICE_WEB.NASL", "SMB_NT_MS21_MAY_SKYPE.NASL", "SMB_NT_MS21_MAY_VISUAL_STUDIO.NASL", "SMB_NT_MS21_MAY_VISUAL_STUDIO_CODE.NASL", "SMB_NT_MS21_MAY_WEB_MEDIA.NASL", "SMB_NT_MS21_MAY_WORD.NASL", "SMB_NT_MS21_MAY_WORD_C2R.NASL", "SUSE_SU-2021-14764-1.NASL", "SUSE_SU-2021-1887-1.NASL", "SUSE_SU-2021-1888-1.NASL", "SUSE_SU-2021-1889-1.NASL", "SUSE_SU-2021-1890-1.NASL", "SUSE_SU-2021-1891-1.NASL", "SUSE_SU-2021-1899-1.NASL", "SUSE_SU-2021-1912-1.NASL", "SUSE_SU-2021-1913-1.NASL", "SUSE_SU-2021-1975-1.NASL", "SUSE_SU-2021-1977-1.NASL", "SUSE_SU-2021-2208-1.NASL", "SUSE_SU-2021-2321-1.NASL", "SUSE_SU-2021-2324-1.NASL", "SUSE_SU-2021-2349-1.NASL", "SUSE_SU-2021-2406-1.NASL", "SUSE_SU-2021-2421-1.NASL", "SUSE_SU-2021-2422-1.NASL", "SUSE_SU-2021-2427-1.NASL", "SUSE_SU-2021-2451-1.NASL", "UBUNTU_USN-4997-1.NASL", "UBUNTU_USN-4997-2.NASL", "UBUNTU_USN-4999-1.NASL", "UBUNTU_USN-5000-1.NASL", "UBUNTU_USN-5000-2.NASL", "UBUNTU_USN-5001-1.NASL", "UBUNTU_USN-5018-1.NASL", "WEB_APPLICATION_SCANNING_112932", "WEB_APPLICATION_SCANNING_112933"]}, {"type": "oraclelinux", "idList": ["ELSA-2021-2036", "ELSA-2021-2037", "ELSA-2021-4356", "ELSA-2021-9404", "ELSA-2021-9406", "ELSA-2021-9452", "ELSA-2021-9453", "ELSA-2021-9459"]}, {"type": "osv", "idList": ["OSV:DLA-2689-1", "OSV:DLA-2690-1"]}, {"type": "packetstorm", "idList": ["PACKETSTORM:162570", "PACKETSTORM:163208", "PACKETSTORM:163895"]}, {"type": "qualysblog", "idList": ["QUALYSBLOG:0082A77BD8EFFF48B406D107FEFD0DD3", "QUALYSBLOG:A8EE36FB3E891C73934CB1C60E3B3D41", "QUALYSBLOG:BC22CE22A3E70823D5F0E944CBD5CE4A", "QUALYSBLOG:CAF5B766E6B0E6C1A5ADF56D442E7BB2", "QUALYSBLOG:DC0F3E59C4DA6EB885E6BCAB292BCA7D"]}, {"type": "rapid7blog", "idList": ["RAPID7BLOG:03B1EB65D8A7CFE486943E2472225BA1", "RAPID7BLOG:20364300767E58631FFE0D21622E63A3", "RAPID7BLOG:24E0BE5176F6D3963E1824AD4A55019E", "RAPID7BLOG:44DA27D91BE223465957FC7CDF7A31A6", "RAPID7BLOG:5CDF95FB2AC31414FD390E0E0A47E057", "RAPID7BLOG:6C7EC9C9D6FC18A2D4965916E84077B9", "RAPID7BLOG:7B1DD656DC72802EE7230867267A5A16", "RAPID7BLOG:D47FB88807F2041B8820156ECFB85720"]}, {"type": "redhat", "idList": ["RHSA-2021:1546", "RHSA-2021:1547", "RHSA-2021:2036", "RHSA-2021:2037", "RHSA-2021:4140", "RHSA-2021:4356", "RHSA-2021:4627", "RHSA-2021:5137"]}, {"type": "redhatcve", "idList": ["RH:CVE-2020-24587", "RH:CVE-2020-24588", "RH:CVE-2020-26144", "RH:CVE-2021-31204"]}, {"type": "securelist", "idList": ["SECURELIST:BB0230F9CE86B3F1994060AA0A809C08", "SECURELIST:C540EBB7FD8B7FB9E54E119E88DB5C48"]}, {"type": "seebug", "idList": ["SSV:99245", "SSV:99263", "SSV:99265", "SSV:99294", "SSV:99334"]}, {"type": "slackware", "idList": ["SSA-2021-202-01"]}, {"type": "srcincite", "idList": ["SRC-2021-0018"]}, {"type": "suse", "idList": ["OPENSUSE-SU-2021:0843-1", "OPENSUSE-SU-2021:0947-1", "OPENSUSE-SU-2021:1975-1", "OPENSUSE-SU-2021:1977-1", "OPENSUSE-SU-2021:2427-1"]}, {"type": "thn", "idList": ["THN:25143CA85A0297381CEBBBD35F24F85B", "THN:5BE77895D84D1FB816C73BB1661CE8EB", "THN:76EF51D1EBDAA5B92DD55E9E74F5B542", "THN:84E53E1CA489F43A3D68EC1B18D6C2E2", "THN:C210D3FA71F1ED44D3BA1BF0CA368767", "THN:E95B6A75073DA71CEC73B2E4F0B13622", "THN:FA40708E1565483D14F9A31FC019FCE1"]}, {"type": "threatpost", "idList": ["THREATPOST:2DBC4E237FAA8188A19D53BBB3356C62", "THREATPOST:35511A26A276E34B781D66037866F771", "THREATPOST:4B2E19CAF27A3EFBCB2F777C6E528317", "THREATPOST:52923238811C7BFD39E0529C85317249", "THREATPOST:604B67FD6EFB0E72DDD87DF07C8F456D", "THREATPOST:83C349A256695022C2417F465CEB3BB2", "THREATPOST:90D2E9044C556AC1A56C89A7F86742BE", "THREATPOST:960DA04864E083F2EAA36F3764D13603", "THREATPOST:A2FE619CD27EBEC2F6B0C62ED026F02C", "THREATPOST:A7148BBF3E2EDF9B0EA2E2C67C7CAC4E", "THREATPOST:A78361BA1DB99FF96F9399B2AE9F1EA4", "THREATPOST:DD8030D774C6B1FBB3DEDAFC836B8B80", "THREATPOST:EDFBDF12942A6080DE3FAE980A53F496"]}, {"type": "ubuntu", "idList": ["USN-4997-1", "USN-4997-2", "USN-4999-1", "USN-5000-1", "USN-5000-2", "USN-5001-1", "USN-5018-1"]}, {"type": "ubuntucve", "idList": ["UB:CVE-2020-24587", "UB:CVE-2020-24588", "UB:CVE-2020-26144"]}, {"type": "veracode", "idList": ["VERACODE:33005", "VERACODE:33006", "VERACODE:33011"]}, {"type": "zdi", "idList": ["ZDI-21-571", "ZDI-21-572", "ZDI-21-573", "ZDI-21-574", "ZDI-21-575", "ZDI-21-576", "ZDI-21-577", "ZDI-21-578", "ZDI-21-579", "ZDI-21-580", "ZDI-21-615", "ZDI-21-819", "ZDI-21-894"]}, {"type": "zdt", "idList": ["1337DAY-ID-36242", "1337DAY-ID-36442", "1337DAY-ID-36667"]}]}, "score": {"value": 0.5, "vector": "NONE"}, "backreferences": {"references": [{"type": "almalinux", "idList": ["ALSA-2021:2036", "ALSA-2021:2037"]}, {"type": "androidsecurity", "idList": ["ANDROID:2021-10-01"]}, {"type": "archlinux", "idList": ["ASA-202105-20", "ASA-202105-21", "ASA-202105-22", "ASA-202105-23", "ASA-202107-34"]}, {"type": "attackerkb", "idList": ["AKB:06AF540E-3C8A-44E7-9CB1-65398AA456D2", "AKB:116FDAE6-8C6E-473E-8D39-247560D01C09", "AKB:2F48FB8A-EF4C-468F-9F4F-8BB9BB5FEC97", "AKB:72CB57AD-D32C-43D3-86B8-F8B617707C5B", "AKB:BAAFFD25-660E-40C6-8978-DD33365E66B6", "AKB:E5053BCC-1FA9-431D-9668-D386D6CA18EB"]}, {"type": "avleonov", "idList": ["AVLEONOV:9D3D76F4CC74C7ABB8000BC6AFB2A2CE", "AVLEONOV:B0F649A99B171AC3032AF71B1DCCFE34"]}, {"type": "checkpoint_advisories", "idList": ["CPAI-2021-0259", "CPAI-2021-0260", "CPAI-2021-0261", "CPAI-2021-0262", "CPAI-2021-0292"]}, {"type": "checkpoint_security", "idList": ["CPS:SK173718"]}, {"type": "cisa", "idList": ["CISA:8C51810D4AACDCCDBF9D526B4C21660C"]}, {"type": "cisco", "idList": ["CISCO-SA-WIFI-FAF-22EPCEWU"]}, {"type": "cloudfoundry", "idList": ["CFOUNDRY:58E18367C5A247865E715DF802E7BD7E"]}, {"type": "cve", "idList": ["CVE-2020-24587", "CVE-2020-24588", "CVE-2020-26144", "CVE-2021-26418", "CVE-2021-26419", "CVE-2021-26421", "CVE-2021-26422", "CVE-2021-27068", "CVE-2021-28455", "CVE-2021-28461", "CVE-2021-28465", "CVE-2021-28474", "CVE-2021-28476", "CVE-2021-28478", "CVE-2021-28479", "CVE-2021-31165", "CVE-2021-31166", "CVE-2021-31167", "CVE-2021-31168", "CVE-2021-31169", "CVE-2021-31170", "CVE-2021-31171", "CVE-2021-31172", "CVE-2021-31173", "CVE-2021-31174", "CVE-2021-31175", "CVE-2021-31176", "CVE-2021-31177", "CVE-2021-31178", "CVE-2021-31179", "CVE-2021-31180", "CVE-2021-31181", "CVE-2021-31182", "CVE-2021-31184", "CVE-2021-31185", "CVE-2021-31186", "CVE-2021-31187", "CVE-2021-31188", "CVE-2021-31190", "CVE-2021-31191", "CVE-2021-31192", "CVE-2021-31193", "CVE-2021-31194", "CVE-2021-31195", "CVE-2021-31198", "CVE-2021-31200", "CVE-2021-31204", "CVE-2021-31205", "CVE-2021-31207", "CVE-2021-31208", "CVE-2021-31209", "CVE-2021-31211", "CVE-2021-31213", "CVE-2021-31214", "CVE-2021-31936"]}, {"type": "debian", "idList": ["DEBIAN:DLA-2689-1:31A23", "DEBIAN:DLA-2690-1:EA198"]}, {"type": "debiancve", "idList": ["DEBIANCVE:CVE-2020-24587", "DEBIANCVE:CVE-2020-24588"]}, {"type": "fedora", "idList": ["FEDORA:004B430A6E02", "FEDORA:8B35130B73F7", "FEDORA:971FF30B86D6", "FEDORA:A44F930A5958", "FEDORA:C53B3304C267", "FEDORA:D3BC1304C267"]}, {"type": "fireeye", "idList": ["FIREEYE:FC60CAB5C936FF70E94A7C9307805695"]}, {"type": "freebsd", "idList": ["8D20BD48-A4F3-11EC-90DE-1C697AA5A594"]}, {"type": "githubexploit", "idList": ["18D1D069-9D98-5B5F-9E5B-A5CA5559E4CB", "247E32F5-B5A0-5A30-A422-8A0959F210DD", "2D0AC1C7-F656-5D6B-9FC2-79525014BE1E", "390843FD-A5C7-51F1-A64D-24276740A4A6", "5A6190EE-8872-5D1B-B2E3-06AE49CBE93C", "706706C2-DB81-5EEA-AF28-6C5376B4E752", "7F0937CB-B94F-52F5-ADE5-6399C85C5EAC", "8D82AE30-2266-5373-9043-5C953D16A98E", "A4D0164D-F0CA-51A5-B04B-2B8EE628E329", "B05281EC-9A0B-5C9A-BDC9-83FBF67FA348", "B3DDE0DD-F0B0-542D-8154-F61DCD2E49D9", "CA94B7F0-0AED-5C64-8BBB-D2A90BBCD553", "E458F533-4B97-51A1-897B-1AF58218F2BF", "F1BF4059-3C3E-5A65-BD42-BC991FB503F0", "F6326682-0713-5826-ACCC-D065B9E8AE42", "FC78B69A-549A-5869-8897-E30AA6CEA990", "FCE0B03C-A225-5F8F-84EF-B22F29700B8D"]}, {"type": "googleprojectzero", "idList": ["GOOGLEPROJECTZERO:C8077AF60F0E22ECAD33F23194C38BB6"]}, {"type": "hackerone", "idList": ["H1:1238470"]}, {"type": "hivepro", "idList": ["HIVEPRO:C0B03D521C5882F1BE07ECF1550A5F74"]}, {"type": "hp", "idList": ["HPSBHF03725", "HPSBHF03743"]}, {"type": "kaspersky", "idList": ["KLA12167", "KLA12168", "KLA12169", "KLA12170", "KLA12171", "KLA12172", "KLA12173", "KLA12174", "KLA12175"]}, {"type": "krebs", "idList": ["KREBS:4E22686F3C4E2536C402F6568B8E659A"]}, {"type": "lenovo", "idList": ["LENOVO:PS500405-INTEL-PROSET-AND-WIRELESS-WIFI-INTEL-VPRO-CSME-WIFI-AND-INTEL-KILLER-WIFI-ADVISORY-NOSID", "LENOVO:PS500411-AGGREGATION-AND-FRAGMENTATION-ATTACKS-AGAINST-WI-FI-FRAGATTACKS-VULNERABILITIES-NOSID"]}, {"type": "malwarebytes", "idList": ["MALWAREBYTES:28CA5946147FC0561948BA2EF52A8329", "MALWAREBYTES:6A4862332586F98DA4761BE2B684752F", "MALWAREBYTES:8B41C7471B07595F7246D3DCB8794894"]}, {"type": "metasploit", "idList": ["MSF:EXPLOIT/WINDOWS/HTTP/EXCHANGE_PROXYSHELL_RCE/", "MSF:ILITIES/MICROSOFT-OFFICE-CVE-2021-28455/", "MSF:ILITIES/MICROSOFT-OFFICE-CVE-2021-31174/", "MSF:ILITIES/MICROSOFT-OFFICE-CVE-2021-31177/", "MSF:ILITIES/MICROSOFT-OFFICE-CVE-2021-31178/", "MSF:ILITIES/MICROSOFT-OFFICE-CVE-2021-31179/", "MSF:ILITIES/MICROSOFT-OFFICE-CVE-2021-31180/", "MSF:ILITIES/MSFT-CVE-2020-24588/", "MSF:ILITIES/MSFT-CVE-2020-26144/", "MSF:ILITIES/MSFT-CVE-2021-26418/", "MSF:ILITIES/MSFT-CVE-2021-26419/", "MSF:ILITIES/MSFT-CVE-2021-28474/", "MSF:ILITIES/MSFT-CVE-2021-28478/", "MSF:ILITIES/MSFT-CVE-2021-31165/", "MSF:ILITIES/MSFT-CVE-2021-31166/", "MSF:ILITIES/MSFT-CVE-2021-31167/", "MSF:ILITIES/MSFT-CVE-2021-31168/", "MSF:ILITIES/MSFT-CVE-2021-31169/", "MSF:ILITIES/MSFT-CVE-2021-31172/", "MSF:ILITIES/MSFT-CVE-2021-31175/", "MSF:ILITIES/MSFT-CVE-2021-31176/", "MSF:ILITIES/MSFT-CVE-2021-31179/", "MSF:ILITIES/MSFT-CVE-2021-31181/", "MSF:ILITIES/MSFT-CVE-2021-31184/", "MSF:ILITIES/MSFT-CVE-2021-31185/", "MSF:ILITIES/MSFT-CVE-2021-31186/", "MSF:ILITIES/MSFT-CVE-2021-31187/", "MSF:ILITIES/MSFT-CVE-2021-31190/", "MSF:ILITIES/MSFT-CVE-2021-31192/", "MSF:ILITIES/MSFT-CVE-2021-31193/", "MSF:ILITIES/MSFT-CVE-2021-31195/", "MSF:ILITIES/MSFT-CVE-2021-31198/"]}, {"type": "mscve", "idList": ["MS:CVE-2020-24587", "MS:CVE-2020-24588", "MS:CVE-2020-26144", "MS:CVE-2021-26418", "MS:CVE-2021-26419", "MS:CVE-2021-26421", "MS:CVE-2021-26422", "MS:CVE-2021-27068", "MS:CVE-2021-28455", "MS:CVE-2021-28461", "MS:CVE-2021-28465", "MS:CVE-2021-28474", "MS:CVE-2021-28476", "MS:CVE-2021-28478", "MS:CVE-2021-28479", "MS:CVE-2021-31165", "MS:CVE-2021-31166", "MS:CVE-2021-31167", "MS:CVE-2021-31168", "MS:CVE-2021-31169", "MS:CVE-2021-31170", "MS:CVE-2021-31171", "MS:CVE-2021-31172", "MS:CVE-2021-31173", "MS:CVE-2021-31174", "MS:CVE-2021-31175", "MS:CVE-2021-31176", "MS:CVE-2021-31177", "MS:CVE-2021-31178", "MS:CVE-2021-31179", "MS:CVE-2021-31180", "MS:CVE-2021-31181", "MS:CVE-2021-31182", "MS:CVE-2021-31184", "MS:CVE-2021-31185", "MS:CVE-2021-31186", "MS:CVE-2021-31187", "MS:CVE-2021-31188", "MS:CVE-2021-31190", "MS:CVE-2021-31191", "MS:CVE-2021-31192", "MS:CVE-2021-31193", "MS:CVE-2021-31194", "MS:CVE-2021-31195", "MS:CVE-2021-31198", "MS:CVE-2021-31200", "MS:CVE-2021-31204", "MS:CVE-2021-31205", "MS:CVE-2021-31207", "MS:CVE-2021-31208", "MS:CVE-2021-31209", "MS:CVE-2021-31211", "MS:CVE-2021-31213", "MS:CVE-2021-31214", "MS:CVE-2021-31936"]}, {"type": "mskb", "idList": ["KB4464542", "KB4484527", "KB4504711", "KB5001931", "KB5003165", "KB5003203", "KB5003209", "KB5003225", "KB5003729"]}, {"type": "nessus", "idList": ["CENTOS8_RHSA-2021-2036.NASL", "CENTOS8_RHSA-2021-2037.NASL", "DEBIAN_DLA-2689.NASL", "DEBIAN_DLA-2690.NASL", "MACOS_MS21_MAY_DOTNET_CORE.NASL", "MACOS_MS21_MAY_OFFICE.NASL", "MICROSOFT_VISUAL_STUDIO_CODE_REMOTE_CONTAINERS_MS21_MAY.NASL", "OPENSUSE-2021-1975.NASL", "OPENSUSE-2021-1977.NASL", "OPENSUSE-2021-2427.NASL", "OPENSUSE-2021-843.NASL", "ORACLELINUX_ELSA-2021-2036.NASL", "ORACLELINUX_ELSA-2021-2037.NASL", "ORACLELINUX_ELSA-2021-9459.NASL", "ORACLEVM_OVMSA-2021-0031.NASL", "REDHAT-RHSA-2021-1546.NASL", "REDHAT-RHSA-2021-1547.NASL", "REDHAT-RHSA-2021-2036.NASL", "REDHAT-RHSA-2021-2037.NASL", "SLACKWARE_SSA_2021-202-01.NASL", "SMB_NT_MS21_MAY_5003173.NASL", "SMB_NT_MS21_MAY_DOTNET_CORE.NASL", "SMB_NT_MS21_MAY_EXCHANGE.NASL", "SMB_NT_MS21_MAY_OFFICE_WEB.NASL", "SMB_NT_MS21_MAY_VISUAL_STUDIO.NASL", "SMB_NT_MS21_MAY_VISUAL_STUDIO_CODE.NASL", "SMB_NT_MS21_MAY_WEB_MEDIA.NASL", "SUSE_SU-2021-14764-1.NASL", "SUSE_SU-2021-1887-1.NASL", "SUSE_SU-2021-1888-1.NASL", "SUSE_SU-2021-1889-1.NASL", "SUSE_SU-2021-1890-1.NASL", "SUSE_SU-2021-1891-1.NASL", "SUSE_SU-2021-1899-1.NASL", "SUSE_SU-2021-1912-1.NASL", "SUSE_SU-2021-1913-1.NASL", "SUSE_SU-2021-1975-1.NASL", "SUSE_SU-2021-1977-1.NASL", "SUSE_SU-2021-2321-1.NASL", "SUSE_SU-2021-2324-1.NASL", "SUSE_SU-2021-2349-1.NASL", "SUSE_SU-2021-2406-1.NASL", "SUSE_SU-2021-2421-1.NASL", "SUSE_SU-2021-2422-1.NASL", "SUSE_SU-2021-2427-1.NASL", "SUSE_SU-2021-2451-1.NASL", "UBUNTU_USN-4997-1.NASL", "UBUNTU_USN-4997-2.NASL", "UBUNTU_USN-4999-1.NASL", "UBUNTU_USN-5000-1.NASL", "UBUNTU_USN-5000-2.NASL", "UBUNTU_USN-5001-1.NASL", "UBUNTU_USN-5018-1.NASL", "WEB_APPLICATION_SCANNING_112932", "WEB_APPLICATION_SCANNING_112933"]}, {"type": "oraclelinux", "idList": ["ELSA-2021-2036", "ELSA-2021-2037", "ELSA-2021-9459"]}, {"type": "packetstorm", "idList": ["PACKETSTORM:162570", "PACKETSTORM:163208", "PACKETSTORM:163895"]}, {"type": "qualysblog", "idList": ["QUALYSBLOG:A8EE36FB3E891C73934CB1C60E3B3D41"]}, {"type": "rapid7blog", "idList": ["RAPID7BLOG:03B1EB65D8A7CFE486943E2472225BA1", "RAPID7BLOG:5CDF95FB2AC31414FD390E0E0A47E057", "RAPID7BLOG:6C7EC9C9D6FC18A2D4965916E84077B9", "RAPID7BLOG:7B1DD656DC72802EE7230867267A5A16"]}, {"type": "redhat", "idList": ["RHSA-2021:4140"]}, {"type": "redhatcve", "idList": ["RH:CVE-2020-24587", "RH:CVE-2020-24588", "RH:CVE-2020-26144", "RH:CVE-2021-31204"]}, {"type": "securelist", "idList": ["SECURELIST:BB0230F9CE86B3F1994060AA0A809C08"]}, {"type": "seebug", "idList": ["SSV:99245", "SSV:99263", "SSV:99265", "SSV:99294", "SSV:99334"]}, {"type": "slackware", "idList": ["SSA-2021-202-01"]}, {"type": "srcincite", "idList": ["SRC-2021-0018"]}, {"type": "suse", "idList": ["OPENSUSE-SU-2021:0843-1", "OPENSUSE-SU-2021:0947-1", "OPENSUSE-SU-2021:1975-1", "OPENSUSE-SU-2021:1977-1", "OPENSUSE-SU-2021:2427-1"]}, {"type": "thn", "idList": ["THN:25143CA85A0297381CEBBBD35F24F85B", "THN:5BE77895D84D1FB816C73BB1661CE8EB", "THN:76EF51D1EBDAA5B92DD55E9E74F5B542", "THN:C210D3FA71F1ED44D3BA1BF0CA368767", "THN:E95B6A75073DA71CEC73B2E4F0B13622", "THN:FA40708E1565483D14F9A31FC019FCE1"]}, {"type": "threatpost", "idList": ["THREATPOST:2DBC4E237FAA8188A19D53BBB3356C62", "THREATPOST:35511A26A276E34B781D66037866F771", "THREATPOST:4B2E19CAF27A3EFBCB2F777C6E528317", "THREATPOST:52923238811C7BFD39E0529C85317249", "THREATPOST:83C349A256695022C2417F465CEB3BB2", "THREATPOST:90D2E9044C556AC1A56C89A7F86742BE", "THREATPOST:960DA04864E083F2EAA36F3764D13603", "THREATPOST:A2FE619CD27EBEC2F6B0C62ED026F02C", "THREATPOST:A7148BBF3E2EDF9B0EA2E2C67C7CAC4E", "THREATPOST:A78361BA1DB99FF96F9399B2AE9F1EA4", "THREATPOST:EDFBDF12942A6080DE3FAE980A53F496"]}, {"type": "ubuntu", "idList": ["USN-4997-1", "USN-4997-2", "USN-4999-1", "USN-5000-1", "USN-5000-2", "USN-5001-1", "USN-5018-1"]}, {"type": "ubuntucve", "idList": ["UB:CVE-2020-24587", "UB:CVE-2020-24588", "UB:CVE-2020-26144"]}, {"type": "zdi", "idList": ["ZDI-21-571", "ZDI-21-572", "ZDI-21-573", "ZDI-21-574", "ZDI-21-575", "ZDI-21-576", "ZDI-21-577", "ZDI-21-578", "ZDI-21-579", "ZDI-21-580", "ZDI-21-615", "ZDI-21-819", "ZDI-21-894"]}, {"type": "zdt", "idList": ["1337DAY-ID-36242", "1337DAY-ID-36442", "1337DAY-ID-36667"]}]}, "exploitation": null, "epss": [{"cve": "CVE-2020-24587", "epss": "0.000950000", "percentile": "0.384290000", "modified": "2023-03-17"}, {"cve": "CVE-2020-24588", "epss": "0.001510000", "percentile": "0.495280000", "modified": "2023-03-17"}, {"cve": "CVE-2020-26144", "epss": "0.000720000", "percentile": "0.293400000", "modified": "2023-03-17"}, {"cve": "CVE-2021-26418", "epss": "0.001560000", "percentile": "0.502820000", "modified": "2023-03-17"}, {"cve": "CVE-2021-26419", "epss": "0.937310000", "percentile": "0.985630000", "modified": "2023-03-17"}, {"cve": "CVE-2021-26421", "epss": "0.001560000", "percentile": "0.502820000", "modified": "2023-03-17"}, {"cve": "CVE-2021-26422", "epss": "0.019960000", "percentile": "0.870330000", "modified": "2023-03-17"}, {"cve": "CVE-2021-27068", "epss": "0.019960000", "percentile": "0.870330000", "modified": "2023-03-17"}, {"cve": "CVE-2021-28455", "epss": "0.019960000", "percentile": "0.870330000", "modified": "2023-03-17"}, {"cve": "CVE-2021-28461", "epss": "0.000520000", "percentile": "0.180990000", "modified": "2023-03-17"}, {"cve": "CVE-2021-28465", "epss": "0.008750000", "percentile": "0.799600000", "modified": "2023-03-17"}, {"cve": "CVE-2021-28474", "epss": "0.013890000", "percentile": "0.843070000", "modified": "2023-03-17"}, {"cve": "CVE-2021-28476", "epss": "0.091390000", "percentile": "0.936400000", "modified": "2023-03-17"}, {"cve": "CVE-2021-28478", "epss": "0.001560000", "percentile": "0.502820000", "modified": "2023-03-17"}, {"cve": "CVE-2021-28479", "epss": "0.000440000", "percentile": "0.082360000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31165", "epss": "0.000460000", "percentile": "0.127700000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31166", "epss": "0.973700000", "percentile": "0.998030000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31167", "epss": "0.000460000", "percentile": "0.127700000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31168", "epss": "0.000460000", "percentile": "0.128440000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31169", "epss": "0.000460000", "percentile": "0.128440000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31170", "epss": "0.000760000", "percentile": "0.305530000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31171", "epss": "0.000440000", "percentile": "0.082360000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31172", "epss": "0.001560000", "percentile": "0.502820000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31173", "epss": "0.104210000", "percentile": "0.940500000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31174", "epss": "0.000440000", "percentile": "0.082360000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31175", "epss": "0.002530000", "percentile": "0.613720000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31176", "epss": "0.003390000", "percentile": "0.668360000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31177", "epss": "0.003390000", "percentile": "0.668360000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31178", "epss": "0.007670000", "percentile": "0.784460000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31179", "epss": "0.004370000", "percentile": "0.707540000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31180", "epss": "0.004370000", "percentile": "0.707540000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31181", "epss": "0.214010000", "percentile": "0.956490000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31182", "epss": "0.001270000", "percentile": "0.456590000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31184", "epss": "0.000440000", "percentile": "0.082360000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31185", "epss": "0.000430000", "percentile": "0.073630000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31186", "epss": "0.004800000", "percentile": "0.720970000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31187", "epss": "0.000460000", "percentile": "0.139440000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31188", "epss": "0.000640000", "percentile": "0.260250000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31190", "epss": "0.000430000", "percentile": "0.073630000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31191", "epss": "0.000440000", "percentile": "0.082360000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31192", "epss": "0.004370000", "percentile": "0.707540000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31193", "epss": "0.000430000", "percentile": "0.073630000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31194", "epss": "0.019960000", "percentile": "0.870330000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31195", "epss": "0.965910000", "percentile": "0.993170000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31198", "epss": "0.002200000", "percentile": "0.581560000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31200", "epss": "0.019960000", "percentile": "0.870330000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31204", "epss": "0.000500000", "percentile": "0.170910000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31205", "epss": "0.001640000", "percentile": "0.513610000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31207", "epss": "0.971850000", "percentile": "0.996460000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31208", "epss": "0.000430000", "percentile": "0.073630000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31209", "epss": "0.005650000", "percentile": "0.743690000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31211", "epss": "0.004370000", "percentile": "0.707540000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31213", "epss": "0.004370000", "percentile": "0.707540000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31214", "epss": "0.004370000", "percentile": "0.707540000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31936", "epss": "0.001460000", "percentile": "0.488710000", "modified": "2023-03-17"}], "vulnersScore": 0.5}, "cvss2": {}, "cvss3": {}, "_state": {"dependencies": 1660004461, "score": 1684007986, "epss": 1679073339}, "_internal": {"score_hash": "a5f6674f0630a00ea4ae5f0fae744692"}}
{"kaspersky": [{"lastseen": "2023-08-06T23:22:35", "description": "### *Detect date*:\n05/11/2021\n\n### *Severity*:\nCritical\n\n### *Description*:\nMultiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges, spoof user interface, obtain sensitive information, bypass security restrictions, cause denial of service.\n\n### *Exploitation*:\nMalware exists for this vulnerability. Usually such malware is classified as Exploit. [More details](<https://threats.kaspersky.com/en/class/Exploit/>).\n\n### *Affected products*:\nWindows Server, version 1909 (Server Core installation) \nWindows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) \nWindows 10 Version 1803 for x64-based Systems \nWindows 10 for x64-based Systems \nWindows 10 Version 1809 for x64-based Systems \nWindows 8.1 for 32-bit systems \nWindows 10 Version 1809 for ARM64-based Systems \nWindows 10 Version 20H2 for ARM64-based Systems \nWindows 10 Version 1909 for ARM64-based Systems \nWindows Server, version 2004 (Server Core installation) \nWindows 10 Version 1607 for x64-based Systems \nWindows 10 Version 20H2 for 32-bit Systems \nWindows 10 Version 1909 for 32-bit Systems \nWindows 10 Version 2004 for x64-based Systems \nWindows Server 2019 (Server Core installation) \nWindows Server 2012 R2 (Server Core installation) \nWindows Server 2008 for x64-based Systems Service Pack 2 \nWindows 10 Version 1909 for x64-based Systems \nWindows Server 2012 \nWindows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) \nWindows Server 2012 (Server Core installation) \nWindows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) \nWindows RT 8.1 \nWindows 7 for 32-bit Systems Service Pack 1 \nWindows 10 for 32-bit Systems \nWindows Server 2019 \nWindows 10 Version 1607 for 32-bit Systems \nWindows Server 2016 \nWindows Server 2008 for 32-bit Systems Service Pack 2 \nWindows 10 Version 1809 for 32-bit Systems \nWindows 10 Version 1803 for ARM64-based Systems \nWindows 10 Version 20H2 for x64-based Systems \nWindows 10 Version 2004 for ARM64-based Systems \nWindows 10 Version 2004 for 32-bit Systems \nWindows Server 2012 R2 \nWindows Server 2016 (Server Core installation) \nWindows Server 2008 R2 for x64-based Systems Service Pack 1 \nWindows 7 for x64-based Systems Service Pack 1 \nWindows 10 Version 1803 for 32-bit Systems \nWindows Server, version 20H2 (Server Core Installation) \nWindows 8.1 for x64-based systems\n\n### *Solution*:\nInstall necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)\n\n### *Original advisories*:\n[CVE-2021-28476](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-28476>) \n[CVE-2021-31188](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31188>) \n[CVE-2020-24588](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2020-24588>) \n[CVE-2021-31166](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31166>) \n[CVE-2021-31192](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31192>) \n[CVE-2021-31184](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31184>) \n[CVE-2021-28465](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-28465>) \n[CVE-2021-31167](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31167>) \n[CVE-2021-31191](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31191>) \n[CVE-2021-31205](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31205>) \n[CVE-2021-31208](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31208>) \n[CVE-2021-31187](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31187>) \n[CVE-2020-26144](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2020-26144>) \n[CVE-2021-31193](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31193>) \n[CVE-2021-28455](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-28455>) \n[CVE-2021-31186](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31186>) \n[CVE-2021-31165](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31165>) \n[CVE-2021-31190](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31190>) \n[CVE-2021-31182](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31182>) \n[CVE-2021-31185](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31185>) \n[CVE-2021-28479](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-28479>) \n[CVE-2021-31168](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31168>) \n[CVE-2021-31169](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31169>) \n[CVE-2021-31194](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31194>) \n[CVE-2021-31170](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31170>) \n[CVE-2020-24587](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2020-24587>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[Microsoft Windows](<https://threats.kaspersky.com/en/product/Microsoft-Windows/>)\n\n### *CVE-IDS*:\n[CVE-2021-28476](<https://vulners.com/cve/CVE-2021-28476>)5.0Critical \n[CVE-2021-31188](<https://vulners.com/cve/CVE-2021-31188>)5.0Critical \n[CVE-2021-31186](<https://vulners.com/cve/CVE-2021-31186>)5.0Critical \n[CVE-2020-24588](<https://vulners.com/cve/CVE-2020-24588>)2.9Warning \n[CVE-2021-31184](<https://vulners.com/cve/CVE-2021-31184>)5.0Critical \n[CVE-2021-31182](<https://vulners.com/cve/CVE-2021-31182>)5.0Critical \n[CVE-2020-26144](<https://vulners.com/cve/CVE-2020-26144>)5.0Critical \n[CVE-2021-31193](<https://vulners.com/cve/CVE-2021-31193>)5.0Critical \n[CVE-2021-28455](<https://vulners.com/cve/CVE-2021-28455>)5.0Critical \n[CVE-2021-31194](<https://vulners.com/cve/CVE-2021-31194>)5.0Critical \n[CVE-2020-24587](<https://vulners.com/cve/CVE-2020-24587>)1.8Warning \n[CVE-2021-31166](<https://vulners.com/cve/CVE-2021-31166>)5.0Critical \n[CVE-2021-31192](<https://vulners.com/cve/CVE-2021-31192>)5.0Critical \n[CVE-2021-28465](<https://vulners.com/cve/CVE-2021-28465>)5.0Critical \n[CVE-2021-31167](<https://vulners.com/cve/CVE-2021-31167>)5.0Critical \n[CVE-2021-31191](<https://vulners.com/cve/CVE-2021-31191>)5.0Critical \n[CVE-2021-31205](<https://vulners.com/cve/CVE-2021-31205>)5.0Critical \n[CVE-2021-31208](<https://vulners.com/cve/CVE-2021-31208>)5.0Critical \n[CVE-2021-31187](<https://vulners.com/cve/CVE-2021-31187>)5.0Critical \n[CVE-2021-31165](<https://vulners.com/cve/CVE-2021-31165>)5.0Critical \n[CVE-2021-31190](<https://vulners.com/cve/CVE-2021-31190>)5.0Critical \n[CVE-2021-31185](<https://vulners.com/cve/CVE-2021-31185>)5.0Critical \n[CVE-2021-28479](<https://vulners.com/cve/CVE-2021-28479>)5.0Critical \n[CVE-2021-31168](<https://vulners.com/cve/CVE-2021-31168>)5.0Critical \n[CVE-2021-31169](<https://vulners.com/cve/CVE-2021-31169>)5.0Critical \n[CVE-2021-31170](<https://vulners.com/cve/CVE-2021-31170>)5.0Critical\n\n### *Microsoft official advisories*:\n\n\n### *KB list*:\n[5003209](<http://support.microsoft.com/kb/5003209>) \n[5003197](<http://support.microsoft.com/kb/5003197>) \n[5003174](<http://support.microsoft.com/kb/5003174>) \n[5003208](<http://support.microsoft.com/kb/5003208>) \n[5003171](<http://support.microsoft.com/kb/5003171>) \n[5003172](<http://support.microsoft.com/kb/5003172>) \n[5003169](<http://support.microsoft.com/kb/5003169>) \n[5003173](<http://support.microsoft.com/kb/5003173>) \n[5003203](<http://support.microsoft.com/kb/5003203>) \n[5003220](<http://support.microsoft.com/kb/5003220>)", "cvss3": {"exploitabilityScore": 3.1, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 9.9, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 6.0}, "published": "2021-05-11T00:00:00", "type": "kaspersky", "title": "KLA12174 Multiple vulnerabilities in Microsoft Windows", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-24587", "CVE-2020-24588", "CVE-2020-26144", "CVE-2021-28455", "CVE-2021-28465", "CVE-2021-28476", "CVE-2021-28479", "CVE-2021-31165", "CVE-2021-31166", "CVE-2021-31167", "CVE-2021-31168", "CVE-2021-31169", "CVE-2021-31170", "CVE-2021-31182", "CVE-2021-31184", "CVE-2021-31185", "CVE-2021-31186", "CVE-2021-31187", "CVE-2021-31188", "CVE-2021-31190", "CVE-2021-31191", "CVE-2021-31192", "CVE-2021-31193", "CVE-2021-31194", "CVE-2021-31205", "CVE-2021-31208"], "modified": "2021-05-27T00:00:00", "id": "KLA12174", "href": "https://threats.kaspersky.com/en/vulnerability/KLA12174/", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-08-06T23:22:30", "description": "### *Detect date*:\n05/11/2021\n\n### *Severity*:\nHigh\n\n### *Description*:\nMultiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to execute arbitrary code, spoof user interface, obtain sensitive information.\n\n### *Affected products*:\nMicrosoft Office Online Server \nMicrosoft SharePoint Enterprise Server 2016 \nMicrosoft Office Web Apps Server 2013 Service Pack 1 \nMicrosoft Office 2013 Service Pack 1 (32-bit editions) \nMicrosoft Excel 2013 Service Pack 1 (32-bit editions) \nMicrosoft Office 2016 (64-bit edition) \nMicrosoft Office 2016 (32-bit edition) \nMicrosoft Office 2013 RT Service Pack 1 \nMicrosoft Word 2016 (64-bit edition) \nMicrosoft Excel 2013 Service Pack 1 (64-bit editions) \nMicrosoft Word 2013 RT Service Pack 1 \nSkype for Business Server 2015 CU11 \nMicrosoft Office 2019 for 32-bit editions \nMicrosoft Excel 2016 (64-bit edition) \nMicrosoft Word 2013 Service Pack 1 (64-bit editions) \nMicrosoft SharePoint Foundation 2013 Service Pack 1 \nSkype for Business Server 2019 CU5 \nMicrosoft Office 2019 for Mac \nMicrosoft Excel 2013 RT Service Pack 1 \nMicrosoft Word 2016 (32-bit edition) \nMicrosoft Office 2019 for 64-bit editions \nMicrosoft 365 Apps for Enterprise for 32-bit Systems \nMicrosoft Lync Server 2013 CU10 \nMicrosoft Excel 2016 (32-bit edition) \nMicrosoft SharePoint Server 2019 \nMicrosoft Office 2013 Service Pack 1 (64-bit editions) \nMicrosoft 365 Apps for Enterprise for 64-bit Systems \nMicrosoft Word 2013 Service Pack 1 (32-bit editions)\n\n### *Solution*:\nInstall necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)\n\n### *Original advisories*:\n[CVE-2021-31181](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31181>) \n[CVE-2021-26421](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-26421>) \n[CVE-2021-26422](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-26422>) \n[CVE-2021-31178](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31178>) \n[CVE-2021-28455](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-28455>) \n[CVE-2021-26418](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-26418>) \n[CVE-2021-31179](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31179>) \n[CVE-2021-31180](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31180>) \n[CVE-2021-28478](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-28478>) \n[CVE-2021-28474](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-28474>) \n[CVE-2021-31172](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31172>) \n[CVE-2021-31177](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31177>) \n[CVE-2021-31173](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31173>) \n[CVE-2021-31176](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31176>) \n[CVE-2021-31174](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31174>) \n[CVE-2021-31175](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31175>) \n[CVE-2021-31171](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31171>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[Microsoft Lync](<https://threats.kaspersky.com/en/product/Microsoft-Lync/>)\n\n### *CVE-IDS*:\n[CVE-2021-28455](<https://vulners.com/cve/CVE-2021-28455>)5.0Critical \n[CVE-2021-31181](<https://vulners.com/cve/CVE-2021-31181>)6.5High \n[CVE-2021-26421](<https://vulners.com/cve/CVE-2021-26421>)5.0Critical \n[CVE-2021-26422](<https://vulners.com/cve/CVE-2021-26422>)5.0Critical \n[CVE-2021-31178](<https://vulners.com/cve/CVE-2021-31178>)5.0Critical \n[CVE-2021-26418](<https://vulners.com/cve/CVE-2021-26418>)5.0Critical \n[CVE-2021-31179](<https://vulners.com/cve/CVE-2021-31179>)5.0Critical \n[CVE-2021-31180](<https://vulners.com/cve/CVE-2021-31180>)5.0Critical \n[CVE-2021-28478](<https://vulners.com/cve/CVE-2021-28478>)5.0Critical \n[CVE-2021-28474](<https://vulners.com/cve/CVE-2021-28474>)5.0Critical \n[CVE-2021-31172](<https://vulners.com/cve/CVE-2021-31172>)5.0Critical \n[CVE-2021-31177](<https://vulners.com/cve/CVE-2021-31177>)5.0Critical \n[CVE-2021-31173](<https://vulners.com/cve/CVE-2021-31173>)5.0Critical \n[CVE-2021-31176](<https://vulners.com/cve/CVE-2021-31176>)5.0Critical \n[CVE-2021-31174](<https://vulners.com/cve/CVE-2021-31174>)5.0Critical \n[CVE-2021-31175](<https://vulners.com/cve/CVE-2021-31175>)5.0Critical \n[CVE-2021-31171](<https://vulners.com/cve/CVE-2021-31171>)5.0Critical\n\n### *Microsoft official advisories*:\n\n\n### *KB list*:\n[5001914](<http://support.microsoft.com/kb/5001914>) \n[5001931](<http://support.microsoft.com/kb/5001931>) \n[5001919](<http://support.microsoft.com/kb/5001919>) \n[5001917](<http://support.microsoft.com/kb/5001917>) \n[4493197](<http://support.microsoft.com/kb/4493197>) \n[5003729](<http://support.microsoft.com/kb/5003729>) \n[4464542](<http://support.microsoft.com/kb/4464542>) \n[5001920](<http://support.microsoft.com/kb/5001920>) \n[5001927](<http://support.microsoft.com/kb/5001927>) \n[5001923](<http://support.microsoft.com/kb/5001923>) \n[4493206](<http://support.microsoft.com/kb/4493206>) \n[5001918](<http://support.microsoft.com/kb/5001918>) \n[5001916](<http://support.microsoft.com/kb/5001916>) \n[5001928](<http://support.microsoft.com/kb/5001928>) \n[5001936](<http://support.microsoft.com/kb/5001936>) \n[5001925](<http://support.microsoft.com/kb/5001925>) \n[5001935](<http://support.microsoft.com/kb/5001935>) \n[4504711](<http://support.microsoft.com/kb/4504711>) \n[4484527](<http://support.microsoft.com/kb/4484527>)", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-05-11T00:00:00", "type": "kaspersky", "title": "KLA12175 Multiple vulnerabilities in Microsoft Office", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-26418", "CVE-2021-26421", "CVE-2021-26422", "CVE-2021-28455", "CVE-2021-28474", "CVE-2021-28478", "CVE-2021-31171", "CVE-2021-31172", "CVE-2021-31173", "CVE-2021-31174", "CVE-2021-31175", "CVE-2021-31176", "CVE-2021-31177", "CVE-2021-31178", "CVE-2021-31179", "CVE-2021-31180", "CVE-2021-31181"], "modified": "2021-06-22T00:00:00", "id": "KLA12175", "href": "https://threats.kaspersky.com/en/vulnerability/KLA12175/", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-08-06T23:23:25", "description": "### *Detect date*:\n05/11/2021\n\n### *Severity*:\nCritical\n\n### *Description*:\nMultiple vulnerabilities were found in Microsoft Products (Extended Support Update). Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges, obtain sensitive information, spoof user interface.\n\n### *Exploitation*:\nMalware exists for this vulnerability. Usually such malware is classified as Exploit. [More details](<https://threats.kaspersky.com/en/class/Exploit/>).\n\n### *Affected products*:\nWindows Server, version 1909 (Server Core installation) \nWindows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) \nMicrosoft Office 2013 Service Pack 1 (32-bit editions) \nWindows 10 Version 1803 for x64-based Systems \nInternet Explorer 11 \nWindows 10 for x64-based Systems \nWindows 10 Version 1809 for x64-based Systems \nWindows 8.1 for 32-bit systems \nInternet Explorer 9 \nWindows 10 Version 1809 for ARM64-based Systems \nWindows 10 Version 20H2 for ARM64-based Systems \nMicrosoft Office 2016 (64-bit edition) \nMicrosoft Office 2016 (32-bit edition) \nWindows 10 Version 1909 for ARM64-based Systems \nWindows Server, version 2004 (Server Core installation) \nWindows 10 Version 1607 for x64-based Systems \nWindows 10 Version 20H2 for 32-bit Systems \nWindows 10 Version 1909 for 32-bit Systems \nMicrosoft Office 2013 RT Service Pack 1 \nWindows 10 Version 2004 for x64-based Systems \nWindows Server 2019 (Server Core installation) \nMicrosoft Office 2019 for 32-bit editions \nWindows Server 2012 R2 (Server Core installation) \nWindows Server 2008 for x64-based Systems Service Pack 2 \nWindows 10 Version 1909 for x64-based Systems \nWindows Server 2012 \nWindows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) \nWindows Server 2012 (Server Core installation) \nWindows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) \nWindows RT 8.1 \nWindows 7 for 32-bit Systems Service Pack 1 \nWindows 10 for 32-bit Systems \nMicrosoft 365 Apps for Enterprise for 32-bit Systems \nWindows Server 2019 \nMicrosoft Office 2019 for 64-bit editions \nWindows 10 Version 1607 for 32-bit Systems \nWindows Server 2016 \nWindows Server 2008 for 32-bit Systems Service Pack 2 \nWindows 10 Version 1809 for 32-bit Systems \nWindows 10 Version 1803 for ARM64-based Systems \nWindows 10 Version 20H2 for x64-based Systems \nWindows 10 Version 2004 for ARM64-based Systems \nMicrosoft Office 2013 Service Pack 1 (64-bit editions) \nWindows 10 Version 2004 for 32-bit Systems \nMicrosoft 365 Apps for Enterprise for 64-bit Systems \nWindows Server 2012 R2 \nWindows Server 2016 (Server Core installation) \nWindows Server 2008 R2 for x64-based Systems Service Pack 1 \nWindows 7 for x64-based Systems Service Pack 1 \nWindows 10 Version 1803 for 32-bit Systems \nWindows Server, version 20H2 (Server Core Installation) \nWindows 8.1 for x64-based systems\n\n### *Solution*:\nInstall necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)\n\n### *Original advisories*:\n[CVE-2021-28476](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-28476>) \n[CVE-2021-31188](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31188>) \n[CVE-2021-31186](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31186>) \n[CVE-2020-24588](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2020-24588>) \n[CVE-2021-31184](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31184>) \n[CVE-2021-31182](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31182>) \n[CVE-2020-26144](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2020-26144>) \n[CVE-2021-31193](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31193>) \n[CVE-2021-28455](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-28455>) \n[CVE-2021-31194](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31194>) \n[CVE-2020-24587](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2020-24587>) \n[CVE-2021-26419](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-26419>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[Microsoft Internet Explorer](<https://threats.kaspersky.com/en/product/Microsoft-Internet-Explorer/>)\n\n### *CVE-IDS*:\n[CVE-2021-28476](<https://vulners.com/cve/CVE-2021-28476>)5.0Critical \n[CVE-2021-31188](<https://vulners.com/cve/CVE-2021-31188>)5.0Critical \n[CVE-2021-31186](<https://vulners.com/cve/CVE-2021-31186>)5.0Critical \n[CVE-2020-24588](<https://vulners.com/cve/CVE-2020-24588>)2.9Warning \n[CVE-2021-31184](<https://vulners.com/cve/CVE-2021-31184>)5.0Critical \n[CVE-2021-31182](<https://vulners.com/cve/CVE-2021-31182>)5.0Critical \n[CVE-2020-26144](<https://vulners.com/cve/CVE-2020-26144>)5.0Critical \n[CVE-2021-31193](<https://vulners.com/cve/CVE-2021-31193>)5.0Critical \n[CVE-2021-28455](<https://vulners.com/cve/CVE-2021-28455>)5.0Critical \n[CVE-2021-31194](<https://vulners.com/cve/CVE-2021-31194>)5.0Critical \n[CVE-2020-24587](<https://vulners.com/cve/CVE-2020-24587>)1.8Warning \n[CVE-2021-26419](<https://vulners.com/cve/CVE-2021-26419>)5.0Critical\n\n### *Microsoft official advisories*:\n\n\n### *KB list*:\n[5003228](<http://support.microsoft.com/kb/5003228>) \n[5003233](<http://support.microsoft.com/kb/5003233>) \n[5003210](<http://support.microsoft.com/kb/5003210>) \n[5003165](<http://support.microsoft.com/kb/5003165>) \n[5003225](<http://support.microsoft.com/kb/5003225>)", "cvss3": {"exploitabilityScore": 3.1, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 9.9, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 6.0}, "published": "2021-05-11T00:00:00", "type": "kaspersky", "title": "KLA12167 Multiple vulnerabilities in Microsoft Products (ESU)", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 4.9, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "HIGH", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.6, "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-24587", "CVE-2020-24588", "CVE-2020-26144", "CVE-2021-26419", "CVE-2021-28455", "CVE-2021-28476", "CVE-2021-31182", "CVE-2021-31184", "CVE-2021-31186", "CVE-2021-31188", "CVE-2021-31193", "CVE-2021-31194"], "modified": "2021-05-27T00:00:00", "id": "KLA12167", "href": "https://threats.kaspersky.com/en/vulnerability/KLA12167/", "cvss": {"score": 7.6, "vector": "AV:N/AC:H/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-08-06T23:22:44", "description": "### *Detect date*:\n05/11/2021\n\n### *Severity*:\nHigh\n\n### *Description*:\nMultiple vulnerabilities were found in Microsoft Developer Tools. Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges.\n\n### *Exploitation*:\nMalware exists for this vulnerability. Usually such malware is classified as Exploit. [More details](<https://threats.kaspersky.com/en/class/Exploit/>).\n\n### *Affected products*:\nVisual Studio Code \nMicrosoft Visual Studio 2019 version 16.9 (includes 16.0 - 16.8) \nMicrosoft Visual Studio 2019 version 16.4 (includes 16.0 - 16.3) \nVisual Studio 2019 for Mac version 8.9 \n.NET 5.0 \n.NET Core 3.1 \nMicrosoft Visual Studio 2019 version 16.7 (includes 16.0 \u2013 16.6) \nVisual Studio Code Remote - Containers Extension\n\n### *Solution*:\nInstall necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)\n\n### *Original advisories*:\n[CVE-2021-31214](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31214>) \n[CVE-2021-31204](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31204>) \n[CVE-2021-31213](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31213>) \n[CVE-2021-31211](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31211>) \n[CVE-2021-27068](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-27068>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[Microsoft Visual Studio](<https://threats.kaspersky.com/en/product/Microsoft-Visual-Studio/>)\n\n### *CVE-IDS*:\n[CVE-2021-31214](<https://vulners.com/cve/CVE-2021-31214>)9.3Critical \n[CVE-2021-31204](<https://vulners.com/cve/CVE-2021-31204>)4.6Warning \n[CVE-2021-31213](<https://vulners.com/cve/CVE-2021-31213>)6.8High \n[CVE-2021-31211](<https://vulners.com/cve/CVE-2021-31211>)6.8High \n[CVE-2021-27068](<https://vulners.com/cve/CVE-2021-27068>)6.5High\n\n### *Microsoft official advisories*:", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-05-11T00:00:00", "type": "kaspersky", "title": "KLA12173 Multiple vulnerabilities in Microsoft Developer Tools", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-27068", "CVE-2021-31204", "CVE-2021-31211", "CVE-2021-31213", "CVE-2021-31214"], "modified": "2023-07-13T00:00:00", "id": "KLA12173", "href": "https://threats.kaspersky.com/en/vulnerability/KLA12173/", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-08-06T23:23:11", "description": "### *Detect date*:\n05/11/2021\n\n### *Severity*:\nHigh\n\n### *Description*:\nMultiple vulnerabilities were found in Microsoft Exchange Server. Malicious users can exploit these vulnerabilities to execute arbitrary code, spoof user interface, bypass security restrictions.\n\n### *Affected products*:\nMicrosoft Exchange Server 2016 Cumulative Update 20 \nMicrosoft Exchange Server 2019 Cumulative Update 8 \nMicrosoft Exchange Server 2019 Cumulative Update 9 \nMicrosoft Exchange Server 2013 Cumulative Update 23 \nMicrosoft Exchange Server 2016 Cumulative Update 19\n\n### *Solution*:\nInstall necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)\n\n### *Original advisories*:\n[CVE-2021-31198](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31198>) \n[CVE-2021-31209](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31209>) \n[CVE-2021-31207](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31207>) \n[CVE-2021-31195](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31195>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[Microsoft Exchange Server](<https://threats.kaspersky.com/en/product/Microsoft-Exchange-Server/>)\n\n### *CVE-IDS*:\n[CVE-2021-31198](<https://vulners.com/cve/CVE-2021-31198>)6.8High \n[CVE-2021-31209](<https://vulners.com/cve/CVE-2021-31209>)5.0Critical \n[CVE-2021-31207](<https://vulners.com/cve/CVE-2021-31207>)6.5High \n[CVE-2021-31195](<https://vulners.com/cve/CVE-2021-31195>)5.0Critical\n\n### *KB list*:\n[5003435](<http://support.microsoft.com/kb/5003435>)", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2021-05-11T00:00:00", "type": "kaspersky", "title": "KLA12169 Multiple vulnerabilities in Microsoft Exchange Server", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-31195", "CVE-2021-31198", "CVE-2021-31207", "CVE-2021-31209"], "modified": "2021-05-12T00:00:00", "id": "KLA12169", "href": "https://threats.kaspersky.com/en/vulnerability/KLA12169/", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-08-06T23:23:03", "description": "### *Detect date*:\n05/11/2021\n\n### *Severity*:\nHigh\n\n### *Description*:\nA remote code execution vulnerability was found in Microsoft Open Source Software. Malicious users can exploit this vulnerability to execute arbitrary code.\n\n### *Affected products*:\ncommon_utils.py\n\n### *Solution*:\nInstall necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)\n\n### *Original advisories*:\n[CVE-2021-31200](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31200>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[Yammer Desktop App](<https://threats.kaspersky.com/en/product/Yammer-Desktop-App/>)\n\n### *CVE-IDS*:\n[CVE-2021-31200](<https://vulners.com/cve/CVE-2021-31200>)5.0Critical", "cvss3": {"exploitabilityScore": 1.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "baseScore": 7.2, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-05-11T00:00:00", "type": "kaspersky", "title": "KLA12170 RCE vulnerability in Microsoft Open Source Software", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-31200"], "modified": "2021-05-12T00:00:00", "id": "KLA12170", "href": "https://threats.kaspersky.com/en/vulnerability/KLA12170/", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2023-08-06T23:23:17", "description": "### *Detect date*:\n05/11/2021\n\n### *Severity*:\nHigh\n\n### *Description*:\nA cross-site-scripting (XSS) vulnerability was found in Microsoft Dynamics. Malicious users can exploit this vulnerability to spoof user interface.\n\n### *Affected products*:\nDynamics 365 for Finance and Operations\n\n### *Solution*:\nInstall necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)\n\n### *Original advisories*:\n[CVE-2021-28461](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-28461>) \n\n\n### *Impacts*:\nSUI \n\n### *Related products*:\n[Microsoft Dynamics 365](<https://threats.kaspersky.com/en/product/Microsoft-Dynamics-365/>)\n\n### *CVE-IDS*:\n[CVE-2021-28461](<https://vulners.com/cve/CVE-2021-28461>)5.0Critical", "cvss3": {"exploitabilityScore": 1.7, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "baseScore": 6.1, "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 4.0}, "published": "2021-05-11T00:00:00", "type": "kaspersky", "title": "KLA12168 XSS vulnerability in Microsoft Dynamics", "bulletinFamily": "info", "cvss2": {"severity": "LOW", "exploitabilityScore": 6.8, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 3.5, "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-28461"], "modified": "2021-05-12T00:00:00", "id": "KLA12168", "href": "https://threats.kaspersky.com/en/vulnerability/KLA12168/", "cvss": {"score": 3.5, "vector": "AV:N/AC:M/Au:S/C:N/I:P/A:N"}}, {"lastseen": "2023-08-06T23:22:51", "description": "### *Detect date*:\n05/11/2021\n\n### *Severity*:\nHigh\n\n### *Description*:\nAn information disclosure vulnerability was found in Microsoft Azure. Malicious users can exploit this vulnerability to obtain sensitive information.\n\n### *Affected products*:\nMicrosoft Accessibility Insights for Web\n\n### *Solution*:\nInstall necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)\n\n### *Original advisories*:\n[CVE-2021-31936](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31936>) \n\n\n### *Impacts*:\nOSI \n\n### *Related products*:\n[Microsoft Access](<https://threats.kaspersky.com/en/product/Microsoft-Access/>)\n\n### *CVE-IDS*:\n[CVE-2021-31936](<https://vulners.com/cve/CVE-2021-31936>)5.0Critical", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.4, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 4.0}, "published": "2021-05-11T00:00:00", "type": "kaspersky", "title": "KLA12172 OSI vulnerability in Microsoft Azure", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-31936"], "modified": "2021-05-12T00:00:00", "id": "KLA12172", "href": "https://threats.kaspersky.com/en/vulnerability/KLA12172/", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N"}}], "nessus": [{"lastseen": "2023-05-18T15:28:25", "description": "The remote Windows host is missing security updates. It is, therefore, affected by multiple vulnerabilities: Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2021-05-11T00:00:00", "type": "nessus", "title": "KB5003173: Windows 10 version 2004 / Windows 10 version 20H2 Security Update (May 2021)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-24587", "CVE-2020-24588", "CVE-2020-26144", "CVE-2021-28455", "CVE-2021-28476", "CVE-2021-28479", "CVE-2021-31165", "CVE-2021-31166", "CVE-2021-31167", "CVE-2021-31168", "CVE-2021-31169", "CVE-2021-31170", "CVE-2021-31182", "CVE-2021-31184", "CVE-2021-31185", "CVE-2021-31186", "CVE-2021-31187", "CVE-2021-31188", "CVE-2021-31191", "CVE-2021-31192", "CVE-2021-31193", "CVE-2021-31194", "CVE-2021-31205", "CVE-2021-31208"], "modified": "2023-01-23T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS21_MAY_5003173.NASL", "href": "https://www.tenable.com/plugins/nessus/149398", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(149398);\n script_version(\"1.13\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/01/23\");\n\n script_cve_id(\n \"CVE-2020-24587\",\n \"CVE-2020-24588\",\n \"CVE-2020-26144\",\n \"CVE-2021-28455\",\n \"CVE-2021-28476\",\n \"CVE-2021-28479\",\n \"CVE-2021-31165\",\n \"CVE-2021-31166\",\n \"CVE-2021-31167\",\n \"CVE-2021-31168\",\n \"CVE-2021-31169\",\n \"CVE-2021-31170\",\n \"CVE-2021-31182\",\n \"CVE-2021-31184\",\n \"CVE-2021-31185\",\n \"CVE-2021-31186\",\n \"CVE-2021-31187\",\n \"CVE-2021-31188\",\n \"CVE-2021-31191\",\n \"CVE-2021-31192\",\n \"CVE-2021-31193\",\n \"CVE-2021-31194\",\n \"CVE-2021-31205\",\n \"CVE-2021-31208\"\n );\n script_xref(name:\"MSKB\", value:\"5003173\");\n script_xref(name:\"MSFT\", value:\"MS21-5003173\");\n script_xref(name:\"IAVA\", value:\"2021-A-0223-S\");\n script_xref(name:\"IAVA\", value:\"2021-A-0222-S\");\n script_xref(name:\"CISA-KNOWN-EXPLOITED\", value:\"2022/04/27\");\n\n script_name(english:\"KB5003173: Windows 10 version 2004 / Windows 10 version 20H2 Security Update (May 2021)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is missing security updates. It is, therefore, affected by multiple vulnerabilities: Note that\nNessus has not tested for this issue but has instead relied only on the application's self-reported version number.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/5003173\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released KB5003173 to address this issue.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-31166\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2021-28476\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/05/11\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude('smb_func.inc');\ninclude('smb_hotfixes.inc');\ninclude('smb_hotfixes_fcheck.inc');\ninclude('smb_reg_query.inc');\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nbulletin = 'MS21-05';\nkbs = make_list(\n '5003173'\n);\n\nif (get_kb_item('Host/patch_management_checks')) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated');\nget_kb_item_or_exit('SMB/WindowsVersion', exit_code:1);\n\nif (hotfix_check_sp_range(win10:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:'10',\n sp:0,\n os_build:'19041',\n rollup_date:'05_2021',\n bulletin:bulletin,\n rollup_kb_list:[5003173])\n|| \n smb_check_rollup(os:'10',\n sp:0,\n os_build:'19042',\n rollup_date:'05_2021',\n bulletin:bulletin,\n rollup_kb_list:[5003173])\n)\n {\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:28:24", "description": "The remote Windows host is missing security updates. It is, therefore, affected by multiple vulnerabilities: Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2021-05-11T00:00:00", "type": "nessus", "title": "KB5003169: Windows 10 version 1909 Security Update (May 2021)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-24587", "CVE-2020-24588", "CVE-2020-26144", "CVE-2021-26419", "CVE-2021-28455", "CVE-2021-28476", "CVE-2021-28479", "CVE-2021-31167", "CVE-2021-31170", "CVE-2021-31182", "CVE-2021-31184", "CVE-2021-31186", "CVE-2021-31187", "CVE-2021-31188", "CVE-2021-31191", "CVE-2021-31193", "CVE-2021-31194"], "modified": "2022-05-10T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS21_MAY_5003169.NASL", "href": "https://www.tenable.com/plugins/nessus/149383", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(149383);\n script_version(\"1.11\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/05/10\");\n\n script_cve_id(\n \"CVE-2020-24587\",\n \"CVE-2020-24588\",\n \"CVE-2020-26144\",\n \"CVE-2021-26419\",\n \"CVE-2021-28455\",\n \"CVE-2021-28476\",\n \"CVE-2021-28479\",\n \"CVE-2021-31167\",\n \"CVE-2021-31170\",\n \"CVE-2021-31182\",\n \"CVE-2021-31184\",\n \"CVE-2021-31186\",\n \"CVE-2021-31187\",\n \"CVE-2021-31188\",\n \"CVE-2021-31191\",\n \"CVE-2021-31193\",\n \"CVE-2021-31194\"\n );\n script_xref(name:\"MSKB\", value:\"5003169\");\n script_xref(name:\"MSFT\", value:\"MS21-5003169\");\n script_xref(name:\"IAVA\", value:\"2021-A-0223-S\");\n script_xref(name:\"IAVA\", value:\"2021-A-0222-S\");\n\n script_name(english:\"KB5003169: Windows 10 version 1909 Security Update (May 2021)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is missing security updates. It is, therefore, affected by multiple vulnerabilities: Note that\nNessus has not tested for this issue but has instead relied only on the application's self-reported version number.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/5003169\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released KB5003169 to address this issue.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-26419\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2021-28476\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/05/11\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude('smb_func.inc');\ninclude('smb_hotfixes.inc');\ninclude('smb_hotfixes_fcheck.inc');\ninclude('smb_reg_query.inc');\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nbulletin = 'MS21-05';\nkbs = make_list(\n '5003169'\n);\n\nif (get_kb_item('Host/patch_management_checks')) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated');\nget_kb_item_or_exit('SMB/WindowsVersion', exit_code:1);\n\nif (hotfix_check_sp_range(win10:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:'10',\n sp:0,\n os_build:'18363',\n rollup_date:'05_2021',\n bulletin:bulletin,\n rollup_kb_list:[5003169])\n)\n {\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-20T14:55:23", "description": "The remote Windows host is missing security updates. It is, therefore, affected by multiple vulnerabilities: Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2021-05-11T00:00:00", "type": "nessus", "title": "KB5003171: Windows 10 version 1809 / Windows Server 2019 Security Update (May 2021)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-24587", "CVE-2020-24588", "CVE-2020-26144", "CVE-2021-26419", "CVE-2021-28455", "CVE-2021-28476", "CVE-2021-28479", "CVE-2021-31167", "CVE-2021-31170", "CVE-2021-31182", "CVE-2021-31184", "CVE-2021-31186", "CVE-2021-31187", "CVE-2021-31188", "CVE-2021-31190", "CVE-2021-31191", "CVE-2021-31193", "CVE-2021-31194"], "modified": "2022-05-10T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS21_MAY_5003171.NASL", "href": "https://www.tenable.com/plugins/nessus/149382", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(149382);\n script_version(\"1.12\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/05/10\");\n\n script_cve_id(\n \"CVE-2020-24587\",\n \"CVE-2020-24588\",\n \"CVE-2020-26144\",\n \"CVE-2021-26419\",\n \"CVE-2021-28455\",\n \"CVE-2021-28476\",\n \"CVE-2021-28479\",\n \"CVE-2021-31167\",\n \"CVE-2021-31170\",\n \"CVE-2021-31182\",\n \"CVE-2021-31184\",\n \"CVE-2021-31186\",\n \"CVE-2021-31187\",\n \"CVE-2021-31188\",\n \"CVE-2021-31190\",\n \"CVE-2021-31191\",\n \"CVE-2021-31193\",\n \"CVE-2021-31194\"\n );\n script_xref(name:\"MSKB\", value:\"5003171\");\n script_xref(name:\"MSFT\", value:\"MS21-5003171\");\n script_xref(name:\"IAVA\", value:\"2021-A-0223-S\");\n script_xref(name:\"IAVA\", value:\"2021-A-0222-S\");\n\n script_name(english:\"KB5003171: Windows 10 version 1809 / Windows Server 2019 Security Update (May 2021)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is missing security updates. It is, therefore, affected by multiple vulnerabilities: Note that\nNessus has not tested for this issue but has instead relied only on the application's self-reported version number.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/5003171\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released KB5003171 to address this issue.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-26419\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2021-28476\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/05/11\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude('smb_func.inc');\ninclude('smb_hotfixes.inc');\ninclude('smb_hotfixes_fcheck.inc');\ninclude('smb_reg_query.inc');\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nbulletin = 'MS21-05';\nkbs = make_list(\n '5003171'\n);\n\nif (get_kb_item('Host/patch_management_checks')) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated');\nget_kb_item_or_exit('SMB/WindowsVersion', exit_code:1);\n\nif (hotfix_check_sp_range(win10:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:'10',\n sp:0,\n os_build:'17763',\n rollup_date:'05_2021',\n bulletin:bulletin,\n rollup_kb_list:[5003171])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:29:09", "description": "The remote Windows host is missing security updates. It is, therefore, affected by multiple vulnerabilities: Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2021-05-11T00:00:00", "type": "nessus", "title": "KB5003174: Windows 10 version 1803 Security Update (May 2021)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-24587", "CVE-2020-24588", "CVE-2020-26144", "CVE-2021-26419", "CVE-2021-28455", "CVE-2021-28476", "CVE-2021-28479", "CVE-2021-31170", "CVE-2021-31182", "CVE-2021-31184", "CVE-2021-31186", "CVE-2021-31187", "CVE-2021-31188", "CVE-2021-31191", "CVE-2021-31193", "CVE-2021-31194"], "modified": "2022-05-10T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS21_MAY_5003174.NASL", "href": "https://www.tenable.com/plugins/nessus/149391", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(149391);\n script_version(\"1.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/05/10\");\n\n script_cve_id(\n \"CVE-2020-24587\",\n \"CVE-2020-24588\",\n \"CVE-2020-26144\",\n \"CVE-2021-26419\",\n \"CVE-2021-28455\",\n \"CVE-2021-28476\",\n \"CVE-2021-28479\",\n \"CVE-2021-31170\",\n \"CVE-2021-31182\",\n \"CVE-2021-31184\",\n \"CVE-2021-31186\",\n \"CVE-2021-31187\",\n \"CVE-2021-31188\",\n \"CVE-2021-31191\",\n \"CVE-2021-31193\",\n \"CVE-2021-31194\"\n );\n script_xref(name:\"MSKB\", value:\"5003174\");\n script_xref(name:\"MSFT\", value:\"MS21-5003174\");\n script_xref(name:\"IAVA\", value:\"2021-A-0223-S\");\n script_xref(name:\"IAVA\", value:\"2021-A-0222-S\");\n\n script_name(english:\"KB5003174: Windows 10 version 1803 Security Update (May 2021)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is missing security updates. It is, therefore, affected by multiple vulnerabilities: Note that\nNessus has not tested for this issue but has instead relied only on the application's self-reported version number.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/5003174\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released KB5003174 to address this issue.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-26419\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2021-28476\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/05/11\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude('smb_func.inc');\ninclude('smb_hotfixes.inc');\ninclude('smb_hotfixes_fcheck.inc');\ninclude('smb_reg_query.inc');\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nbulletin = 'MS21-05';\nkbs = make_list(\n '5003174'\n);\n\nif (get_kb_item('Host/patch_management_checks')) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated');\nget_kb_item_or_exit('SMB/WindowsVersion', exit_code:1);\n\nif (hotfix_check_sp_range(win10:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:'10',\n sp:0,\n os_build:'17134',\n rollup_date:'05_2021',\n bulletin:bulletin,\n rollup_kb_list:[5003174])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:28:25", "description": "The remote Windows host is missing security updates. It is, therefore, affected by multiple vulnerabilities: Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2021-05-11T00:00:00", "type": "nessus", "title": "KB5003197: Windows 10 1607 / Windows Server 2016 Security Update (May 2021)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-24587", "CVE-2020-24588", "CVE-2020-26144", "CVE-2021-26419", "CVE-2021-28455", "CVE-2021-28476", "CVE-2021-28479", "CVE-2021-31182", "CVE-2021-31184", "CVE-2021-31186", "CVE-2021-31187", "CVE-2021-31188", "CVE-2021-31193", "CVE-2021-31194"], "modified": "2022-05-10T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS21_MAY_5003197.NASL", "href": "https://www.tenable.com/plugins/nessus/149390", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(149390);\n script_version(\"1.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/05/10\");\n\n script_cve_id(\n \"CVE-2020-24587\",\n \"CVE-2020-24588\",\n \"CVE-2020-26144\",\n \"CVE-2021-26419\",\n \"CVE-2021-28455\",\n \"CVE-2021-28476\",\n \"CVE-2021-28479\",\n \"CVE-2021-31182\",\n \"CVE-2021-31184\",\n \"CVE-2021-31186\",\n \"CVE-2021-31187\",\n \"CVE-2021-31188\",\n \"CVE-2021-31193\",\n \"CVE-2021-31194\"\n );\n script_xref(name:\"MSKB\", value:\"5003197\");\n script_xref(name:\"MSFT\", value:\"MS21-5003197\");\n script_xref(name:\"IAVA\", value:\"2021-A-0223-S\");\n script_xref(name:\"IAVA\", value:\"2021-A-0222-S\");\n\n script_name(english:\"KB5003197: Windows 10 1607 / Windows Server 2016 Security Update (May 2021)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is missing security updates. It is, therefore, affected by multiple vulnerabilities: Note that\nNessus has not tested for this issue but has instead relied only on the application's self-reported version number.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/5003197\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released KB5003197 to address this issue.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-26419\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2021-28476\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/05/11\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude('smb_func.inc');\ninclude('smb_hotfixes.inc');\ninclude('smb_hotfixes_fcheck.inc');\ninclude('smb_reg_query.inc');\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nbulletin = 'MS21-05';\nkbs = make_list(\n '5003197'\n);\n\nif (get_kb_item('Host/patch_management_checks')) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated');\nget_kb_item_or_exit('SMB/WindowsVersion', exit_code:1);\n\nif (hotfix_check_sp_range(win10:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:'10',\n sp:0,\n os_build:'14393',\n rollup_date:'05_2021',\n bulletin:bulletin,\n rollup_kb_list:[5003197])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-20T14:55:24", "description": "The remote Windows host is missing security updates. It is, therefore, affected by multiple vulnerabilities: Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2021-05-11T00:00:00", "type": "nessus", "title": "KB5003172: Windows 10 version 1507 LTS Security Update (May 2021)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-24587", "CVE-2020-24588", "CVE-2020-26144", "CVE-2021-26419", "CVE-2021-28455", "CVE-2021-28476", "CVE-2021-28479", "CVE-2021-31182", "CVE-2021-31184", "CVE-2021-31186", "CVE-2021-31187", "CVE-2021-31188", "CVE-2021-31193", "CVE-2021-31194"], "modified": "2022-05-10T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS21_MAY_5003172.NASL", "href": "https://www.tenable.com/plugins/nessus/149396", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(149396);\n script_version(\"1.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/05/10\");\n\n script_cve_id(\n \"CVE-2020-24587\",\n \"CVE-2020-24588\",\n \"CVE-2020-26144\",\n \"CVE-2021-26419\",\n \"CVE-2021-28455\",\n \"CVE-2021-28476\",\n \"CVE-2021-28479\",\n \"CVE-2021-31182\",\n \"CVE-2021-31184\",\n \"CVE-2021-31186\",\n \"CVE-2021-31187\",\n \"CVE-2021-31188\",\n \"CVE-2021-31193\",\n \"CVE-2021-31194\"\n );\n script_xref(name:\"MSKB\", value:\"5003172\");\n script_xref(name:\"MSFT\", value:\"MS21-5003172\");\n script_xref(name:\"IAVA\", value:\"2021-A-0223-S\");\n script_xref(name:\"IAVA\", value:\"2021-A-0222-S\");\n\n script_name(english:\"KB5003172: Windows 10 version 1507 LTS Security Update (May 2021)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is missing security updates. It is, therefore, affected by multiple vulnerabilities: Note that\nNessus has not tested for this issue but has instead relied only on the application's self-reported version number.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/5003172\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released KB5003172 to address this issue.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-26419\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2021-28476\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/05/11\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude('smb_func.inc');\ninclude('smb_hotfixes.inc');\ninclude('smb_hotfixes_fcheck.inc');\ninclude('smb_reg_query.inc');\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nbulletin = 'MS21-05';\nkbs = make_list(\n '5003172'\n);\n\nif (get_kb_item('Host/patch_management_checks')) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated');\nget_kb_item_or_exit('SMB/WindowsVersion', exit_code:1);\n\nif (hotfix_check_sp_range(win10:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:'10',\n sp:0,\n os_build:'10240',\n rollup_date:'05_2021',\n bulletin:bulletin,\n rollup_kb_list:[5003172])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-09-17T15:07:24", "description": "The remote Windows host is missing security updates. It is, therefore, affected by multiple vulnerabilities: Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2021-05-12T00:00:00", "type": "nessus", "title": "KB5003208: Windows Server 2012 Security Update (May 2021)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-24587", "CVE-2020-24588", "CVE-2020-26144", "CVE-2021-28455", "CVE-2021-28476", "CVE-2021-28479", "CVE-2021-31184", "CVE-2021-31186", "CVE-2021-31188", "CVE-2021-31193", "CVE-2021-31194"], "modified": "2022-05-10T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS21_MAY_5003208.NASL", "href": "https://www.tenable.com/plugins/nessus/149440", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(149440);\n script_version(\"1.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/05/10\");\n\n script_cve_id(\n \"CVE-2020-24587\",\n \"CVE-2020-24588\",\n \"CVE-2020-26144\",\n \"CVE-2021-28455\",\n \"CVE-2021-28476\",\n \"CVE-2021-28479\",\n \"CVE-2021-31184\",\n \"CVE-2021-31186\",\n \"CVE-2021-31188\",\n \"CVE-2021-31193\",\n \"CVE-2021-31194\"\n );\n script_xref(name:\"MSKB\", value:\"5003208\");\n script_xref(name:\"MSKB\", value:\"5003203\");\n script_xref(name:\"MSFT\", value:\"MS21-5003208\");\n script_xref(name:\"MSFT\", value:\"MS21-5003203\");\n script_xref(name:\"IAVA\", value:\"2021-A-0223-S\");\n script_xref(name:\"IAVA\", value:\"2021-A-0222-S\");\n\n script_name(english:\"KB5003208: Windows Server 2012 Security Update (May 2021)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is missing security updates. It is, therefore, affected by multiple vulnerabilities: Note that\nNessus has not tested for this issue but has instead relied only on the application's self-reported version number.\");\n # https://support.microsoft.com/en-us/topic/may-11-2021-kb5003208-monthly-rollup-4dae4cbb-5d56-4cc1-9240-ee8a6bc2cc61\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?be5cd6ec\");\n # https://support.microsoft.com/en-us/topic/may-11-2021-kb5003203-security-only-update-b68b5258-e926-41c7-bfdb-bfbc921f3a27\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?6d51f72f\");\n script_set_attribute(attribute:\"solution\", value:\n\"Apply Cumulative Update KB5003208.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-31194\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2021-28476\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/05/12\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/05/12\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/05/12\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude('smb_hotfixes_fcheck.inc');\ninclude('smb_hotfixes.inc');\ninclude('smb_func.inc');\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nbulletin = \"MS21-05\";\nkbs = make_list('5003208', '5003203');\n\nif (get_kb_item('Host/patch_management_checks')) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_WARNING);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated');\nget_kb_item_or_exit('SMB/WindowsVersion', exit_code:1);\n\nif (hotfix_check_sp_range(win8:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\n# Windows 8 EOL\nproductname = get_kb_item_or_exit('SMB/ProductName', exit_code:1);\nif (\"Windows 8\" >< productname) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:\"6.2\",\n sp:0,\n rollup_date:'05_2021',\n bulletin:bulletin,\n rollup_kb_list:[5003208, 5003203])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_warning();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:29:10", "description": "The remote Windows host is missing security updates. It is, therefore, affected by multiple vulnerabilities: Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2021-05-11T00:00:00", "type": "nessus", "title": "KB5003233: Windows 7 and Windows Server 2008 R2 Security Update (May 2021)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-24587", "CVE-2020-24588", "CVE-2020-26144", "CVE-2021-26419", "CVE-2021-28455", "CVE-2021-28476", "CVE-2021-31182", "CVE-2021-31184", "CVE-2021-31186", "CVE-2021-31188", "CVE-2021-31193", "CVE-2021-31194"], "modified": "2022-08-30T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS21_MAY_5003233.NASL", "href": "https://www.tenable.com/plugins/nessus/149392", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(149392);\n script_version(\"1.11\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/08/30\");\n\n script_cve_id(\n \"CVE-2020-24587\",\n \"CVE-2020-24588\",\n \"CVE-2020-26144\",\n \"CVE-2021-26419\",\n \"CVE-2021-28455\",\n \"CVE-2021-28476\",\n \"CVE-2021-31182\",\n \"CVE-2021-31184\",\n \"CVE-2021-31186\",\n \"CVE-2021-31188\",\n \"CVE-2021-31193\",\n \"CVE-2021-31194\"\n );\n script_xref(name:\"MSKB\", value:\"5003228\");\n script_xref(name:\"MSKB\", value:\"5003233\");\n script_xref(name:\"MSFT\", value:\"MS21-5003228\");\n script_xref(name:\"MSFT\", value:\"MS21-5003233\");\n script_xref(name:\"IAVA\", value:\"2021-A-0223-S\");\n script_xref(name:\"IAVA\", value:\"2021-A-0222-S\");\n\n script_name(english:\"KB5003233: Windows 7 and Windows Server 2008 R2 Security Update (May 2021)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is missing security updates. It is, therefore, affected by multiple vulnerabilities: Note that\nNessus has not tested for this issue but has instead relied only on the application's self-reported version number.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/5003228\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/5003233\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released the following security updates to address this issue:\n- KB5003228\n- KB5003233\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-26419\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2021-28476\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/05/11\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude('smb_func.inc');\ninclude('smb_hotfixes.inc');\ninclude('smb_hotfixes_fcheck.inc');\ninclude('smb_reg_query.inc');\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nbulletin = 'MS21-05';\nkbs = make_list(\n '5003233',\n '5003228'\n);\n\nif (get_kb_item('Host/patch_management_checks')) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated');\nget_kb_item_or_exit('SMB/WindowsVersion', exit_code:1);\n\nif (hotfix_check_sp_range(win7:'1') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:'6.1', \n sp:1,\n rollup_date:'05_2021',\n bulletin:bulletin,\n rollup_kb_list:[5003233, 5003228])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:29:09", "description": "The remote Windows host is missing security updates. It is, therefore, affected by multiple vulnerabilities: Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2021-05-11T00:00:00", "type": "nessus", "title": "KB5003210: Windows Server 2008 Security Update (May 2021)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-24587", "CVE-2020-24588", "CVE-2020-26144", "CVE-2021-26419", "CVE-2021-28455", "CVE-2021-28476", "CVE-2021-31184", "CVE-2021-31186", "CVE-2021-31188", "CVE-2021-31193", "CVE-2021-31194"], "modified": "2022-05-10T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS21_MAY_5003210.NASL", "href": "https://www.tenable.com/plugins/nessus/149389", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(149389);\n script_version(\"1.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/05/10\");\n\n script_cve_id(\n \"CVE-2020-24587\",\n \"CVE-2020-24588\",\n \"CVE-2020-26144\",\n \"CVE-2021-26419\",\n \"CVE-2021-28455\",\n \"CVE-2021-28476\",\n \"CVE-2021-31184\",\n \"CVE-2021-31186\",\n \"CVE-2021-31188\",\n \"CVE-2021-31193\",\n \"CVE-2021-31194\"\n );\n script_xref(name:\"MSKB\", value:\"5003210\");\n script_xref(name:\"MSKB\", value:\"5003225\");\n script_xref(name:\"MSFT\", value:\"MS21-5003210\");\n script_xref(name:\"MSFT\", value:\"MS21-5003225\");\n script_xref(name:\"IAVA\", value:\"2021-A-0223-S\");\n script_xref(name:\"IAVA\", value:\"2021-A-0222-S\");\n\n script_name(english:\"KB5003210: Windows Server 2008 Security Update (May 2021)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is missing security updates. It is, therefore, affected by multiple vulnerabilities: Note that\nNessus has not tested for this issue but has instead relied only on the application's self-reported version number.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/5003210\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/5003225\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released the following security updates to address this issue:\n- KB5003210\n- KB5003225\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-26419\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2021-28476\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/05/11\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude('smb_func.inc');\ninclude('smb_hotfixes.inc');\ninclude('smb_hotfixes_fcheck.inc');\ninclude('smb_reg_query.inc');\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nbulletin = 'MS21-05';\nkbs = make_list(\n '5003210',\n '5003225'\n);\n\nif (get_kb_item('Host/patch_management_checks')) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated');\nget_kb_item_or_exit('SMB/WindowsVersion', exit_code:1);\n\nif (hotfix_check_sp_range(vista:'2') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:'6.0', \n sp:2,\n rollup_date:'05_2021',\n bulletin:bulletin,\n rollup_kb_list:[5003210, 5003225])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-17T16:30:28", "description": "The Microsoft Office Products are missing security updates. It is, therefore, affected by multiple vulnerabilities:\n\n - A remote code execution vulnerability. An attacker can exploit this to bypass authentication and execute unauthorized arbitrary commands. (CVE-2021-28455, CVE-2021-31175, CVE-2021-31176, CVE-2021-31177, CVE-2021-31179, CVE-2021-31180)\n\n - An information disclosure vulnerability. An attacker can exploit this to disclose potentially sensitive information. (CVE-2021-31174, CVE-2021-31178)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2022-06-10T00:00:00", "type": "nessus", "title": "Security Updates for Microsoft Office Products C2R (May 2021)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-28455", "CVE-2021-31174", "CVE-2021-31175", "CVE-2021-31176", "CVE-2021-31177", "CVE-2021-31178", "CVE-2021-31179", "CVE-2021-31180"], "modified": "2022-12-14T00:00:00", "cpe": ["cpe:/a:microsoft:office"], "id": "SMB_NT_MS21_MAY_OFFICE_C2R.NASL", "href": "https://www.tenable.com/plugins/nessus/162095", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(162095);\n script_version(\"1.9\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/12/14\");\n\n script_cve_id(\n \"CVE-2021-28455\",\n \"CVE-2021-31174\",\n \"CVE-2021-31175\",\n \"CVE-2021-31176\",\n \"CVE-2021-31178\",\n \"CVE-2021-31179\",\n \"CVE-2021-31180\"\n );\n script_xref(name:\"IAVA\", value:\"2021-A-0225-S\");\n\n script_name(english:\"Security Updates for Microsoft Office Products C2R (May 2021)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The Microsoft Office Products are affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The Microsoft Office Products are missing security updates. It is, therefore, affected by multiple vulnerabilities:\n\n - A remote code execution vulnerability. An attacker can exploit this to bypass authentication and execute\n unauthorized arbitrary commands. (CVE-2021-28455, CVE-2021-31175, CVE-2021-31176, CVE-2021-31177,\n CVE-2021-31179, CVE-2021-31180)\n\n - An information disclosure vulnerability. An attacker can exploit this to disclose potentially sensitive\n information. (CVE-2021-31174, CVE-2021-31178)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?fd4508ff\");\n script_set_attribute(attribute:\"solution\", value:\n\"For Office 365, Office 2016 C2R, or Office 2019, ensure automatic\nupdates are enabled or open any office app and manually perform an\nupdate.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-31180\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2021-28455\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2022/06/10\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:office\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_dependencies(\"office_installed.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude('vcf_extras_office.inc');\n\nvar bulletin = 'MS21-05';\n\nvar app_info = vcf::microsoft::office::get_app_info(app:'Microsoft Office');\n\nvar constraints = [\n \n {'product':'Microsoft Office 2016','file':'graph.exe','fixed_version':'16.0.13127.21624','channel': 'Deferred','channel_version': '2008'},\n {'product':'Microsoft Office 2016','file':'graph.exe','fixed_version':'16.0.12527.21912','channel': 'Microsoft 365 Apps on Windows 7'},\n {'product':'Microsoft Office 2016','file':'graph.exe','fixed_version':'16.0.12527.21912','channel': 'Deferred'},\n {'product':'Microsoft Office 2016','file':'graph.exe','fixed_version':'16.0.13901.20516','channel': 'Enterprise Deferred','channel_version': '2103'},\n {'product':'Microsoft Office 2016','file':'graph.exe','fixed_version':'16.0.13801.20638','channel': 'Enterprise Deferred'},\n {'product':'Microsoft Office 2016','file':'graph.exe','fixed_version':'16.0.13801.20638','channel': 'First Release for Deferred'},\n {'product':'Microsoft Office 2016','file':'graph.exe','fixed_version':'16.0.13929.20372','channel': '2016 Retail'},\n {'product':'Microsoft Office 2016','file':'graph.exe','fixed_version':'16.0.13929.20372','channel': 'Current'},\n {'product':'Microsoft Office 2019','file':'graph.exe','fixed_version':'16.0.13929.20372','channel': '2019 Retail'},\n {'product':'Microsoft Office 2019','file':'graph.exe','fixed_version':'16.0.10374.20040','channel': '2019 Volume'}\n];\n\nvcf::microsoft::office::check_version_and_report(\n app_info:app_info,\n constraints:constraints,\n severity:SECURITY_WARNING,\n bulletin:bulletin,\n subproduct:'Office'\n);", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:28:42", "description": "The Microsoft Office Products are missing security updates. It is, therefore, affected by multiple vulnerabilities:\n\n - A remote code execution vulnerability. An attacker can exploit this to bypass authentication and execute unauthorized arbitrary commands. (CVE-2021-28455, CVE-2021-31175, CVE-2021-31176, CVE-2021-31177, CVE-2021-31179, CVE-2021-31180)\n\n - An information disclosure vulnerability. An attacker can exploit this to disclose potentially sensitive information. (CVE-2021-31174, CVE-2021-31178)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2021-05-11T00:00:00", "type": "nessus", "title": "Security Updates for Microsoft Office Products (May 2021)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-28455", "CVE-2021-31174", "CVE-2021-31175", "CVE-2021-31176", "CVE-2021-31177", "CVE-2021-31178", "CVE-2021-31179", "CVE-2021-31180"], "modified": "2022-06-10T00:00:00", "cpe": ["cpe:/a:microsoft:office"], "id": "SMB_NT_MS21_MAY_OFFICE.NASL", "href": "https://www.tenable.com/plugins/nessus/149401", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(149401);\n script_version(\"1.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/06/10\");\n\n script_cve_id(\n \"CVE-2021-28455\",\n \"CVE-2021-31174\",\n \"CVE-2021-31175\",\n \"CVE-2021-31176\",\n \"CVE-2021-31178\",\n \"CVE-2021-31179\",\n \"CVE-2021-31180\"\n );\n script_xref(name:\"MSKB\", value:\"4464542\");\n script_xref(name:\"MSKB\", value:\"4493197\");\n script_xref(name:\"MSKB\", value:\"4493206\");\n script_xref(name:\"MSKB\", value:\"5001920\");\n script_xref(name:\"MSKB\", value:\"5001923\");\n script_xref(name:\"MSKB\", value:\"5001925\");\n script_xref(name:\"MSKB\", value:\"5001927\");\n script_xref(name:\"MSFT\", value:\"MS21-4464542\");\n script_xref(name:\"MSFT\", value:\"MS21-4493206\");\n script_xref(name:\"MSFT\", value:\"MS21-4493197\");\n script_xref(name:\"MSFT\", value:\"MS21-5001920\");\n script_xref(name:\"MSFT\", value:\"MS21-5001923\");\n script_xref(name:\"MSFT\", value:\"MS21-5001925\");\n script_xref(name:\"MSFT\", value:\"MS21-5001927\");\n script_xref(name:\"IAVA\", value:\"2021-A-0225-S\");\n\n script_name(english:\"Security Updates for Microsoft Office Products (May 2021)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The Microsoft Office Products are affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The Microsoft Office Products are missing security updates. It is, therefore, affected by multiple vulnerabilities:\n\n - A remote code execution vulnerability. An attacker can exploit this to bypass authentication and execute\n unauthorized arbitrary commands. (CVE-2021-28455, CVE-2021-31175, CVE-2021-31176, CVE-2021-31177,\n CVE-2021-31179, CVE-2021-31180)\n\n - An information disclosure vulnerability. An attacker can exploit this to disclose potentially sensitive\n information. (CVE-2021-31174, CVE-2021-31178)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/4464542\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/4493197\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/4493206\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/5001920\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/5001923\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/5001925\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/5001927\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released the following security updates to address these issues: \n -KB4464542\n -KB4493206\n -KB4493197\n -KB5001920\n -KB5001923\n -KB5001925\n -KB5001927\n \nFor Office 365, Office 2016 C2R, or Office 2019, ensure automatic updates are enabled or open any office app and\nmanually perform an update.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-31180\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2021-28455\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/05/11\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:office\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"office_installed.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude('smb_func.inc');\ninclude('smb_hotfixes.inc');\ninclude('smb_hotfixes_fcheck.inc');\ninclude('smb_reg_query.inc');\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nvar bulletin = 'MS21-05';\nvar kbs = make_list(\n '4464542',\n '4493197',\n '4493206',\n '5001920',\n '5001923',\n '5001925',\n '5001927'\n);\n\nif (get_kb_item('Host/patch_management_checks'))\n hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_WARNING);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated', exit_code:1);\n\nvar vuln = FALSE;\nvar port = kb_smb_transport();\n\nvar office_vers = hotfix_check_office_version();\nvar office_sp, prod, path, kb, file, version;\n\n# Office 2013 SP1\nif (office_vers['15.0'])\n{\n office_sp = get_kb_item('SMB/Office/2013/SP');\n if (!isnull(office_sp) && office_sp == 1)\n {\n prod = 'Microsoft Office 2013 SP1';\n\n path = hotfix_get_officecommonfilesdir(officever:'15.0');\n path = hotfix_append_path(path:path, value:'Microsoft Shared\\\\Office15');\n kb = '5001925';\n file = 'mso.dll';\n version = '15.0.5345.1002';\n if (hotfix_check_fversion(file:file, version:version, path:path, kb:kb, bulletin:bulletin, product:prod) == HCF_OLDER )\n vuln = TRUE;\n\n path = hotfix_get_officeprogramfilesdir(officever:'15.0');\n path = hotfix_append_path(path:path, value:'Microsoft Office\\\\Office15');\n kb = '5001927';\n file = 'graph.exe';\n version = '15.0.5345.1000';\n if (hotfix_check_fversion(file:file, version:version, path:path, kb:kb, bulletin:bulletin, product:prod) == HCF_OLDER )\n vuln = TRUE;\n\n path = hotfix_get_officecommonfilesdir(officever:'15.0');\n path = hotfix_append_path(path:path, value:'Microsoft Shared\\\\Office15');\n kb = '4493206';\n file = 'acecore.dll';\n version = '15.0.5345.1001';\n if (hotfix_check_fversion(file:file, version:version, path:path, kb:kb, bulletin:bulletin, product:prod) == HCF_OLDER )\n vuln = TRUE;\n\n path = hotfix_get_officeprogramfilesdir(officever:'15.0');\n path = hotfix_append_path(path:path, value:'Microsoft Office\\\\Office15');\n kb = '4464542';\n file = 'oart.dll';\n version = '15.0.5345.1000';\n if (hotfix_check_fversion(file:file, version:version, path:path, kb:kb, bulletin:bulletin, product:prod) == HCF_OLDER )\n vuln = TRUE;\n }\n}\n\n# Office 2016\nif (office_vers['16.0'])\n{\n office_sp = get_kb_item('SMB/Office/2016/SP');\n if (!isnull(office_sp) && office_sp == 0)\n {\n prod = 'Microsoft Office 2016';\n \n # MSI graph.exe\n path = hotfix_get_officeprogramfilesdir(officever:'16.0');\n path = hotfix_append_path(path:path, value:'Microsoft Office\\\\Office16');\n if (hotfix_check_fversion(file:'graph.exe', version:'16.0.5161.1000', channel:'MSI', channel_product:'Office', path:path, kb:'5001923', bulletin:bulletin, product:prod) == HCF_OLDER)\n vuln = TRUE;\n \n # MSI mso.dll\n path = hotfix_get_officecommonfilesdir(officever:'16.0');\n path = hotfix_append_path(path:path, value:'Microsoft Shared\\\\Office16');\n if (hotfix_check_fversion(file:'mso.dll', version:'16.0.5161.1002', channel:'MSI', channel_product:'Office', path:path, kb:'5001920', bulletin:bulletin, product:prod) == HCF_OLDER)\n vuln = TRUE;\n \n # MSI acecore.dll\n path = hotfix_get_officecommonfilesdir(officever:'16.0');\n path = hotfix_append_path(path:path, value:'Microsoft Shared\\\\Office16');\n if (hotfix_check_fversion(file:'acecore.dll', version:'16.0.5161.1001', channel:'MSI', channel_product:'Office', path:path, kb:'4493197', bulletin:bulletin, product:prod) == HCF_OLDER)\n vuln = TRUE;\n }\n}\n\nif (vuln)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_warning();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, 'affected');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-09-09T14:32:23", "description": "The Microsoft SharePoint Server 2019 installation on the remote host is missing security updates. It is, therefore, affected by multiple vulnerabilities:\n\n - Microsoft SharePoint Server Remote Code Execution Vulnerability (CVE-2021-28474, CVE-2021-31181)\n - Microsoft SharePoint Information Disclosure Vulnerability (CVE-2021-31171, CVE-2021-31173)\n - Microsoft SharePoint Spoofing Vulnerability (CVE-2021-26418, CVE-2021-28478, CVE-2021-31172)", "cvss3": {}, "published": "2021-05-11T00:00:00", "type": "nessus", "title": "Security Updates for Microsoft SharePoint Server 2019 (May 2021)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-26418", "CVE-2021-28474", "CVE-2021-28478", "CVE-2021-31171", "CVE-2021-31172", "CVE-2021-31173", "CVE-2021-31181"], "modified": "2021-06-17T00:00:00", "cpe": ["cpe:/a:microsoft:sharepoint_server"], "id": "SMB_NT_MS21_MAY_OFFICE_SHAREPOINT_2019.NASL", "href": "https://www.tenable.com/plugins/nessus/149400", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n##\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n##\n\ninclude('deprecated_nasl_level.inc');\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(149400);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/06/17\");\n\n script_cve_id(\n \"CVE-2021-26418\",\n \"CVE-2021-28474\",\n \"CVE-2021-28478\",\n \"CVE-2021-31171\",\n \"CVE-2021-31172\",\n \"CVE-2021-31173\",\n \"CVE-2021-31181\"\n );\n script_xref(name:\"MSKB\", value:\"5001916\");\n script_xref(name:\"IAVA\", value:\"2021-A-0227-S\");\n script_xref(name:\"MSFT\", value:\"MS21-5001916\");\n\n script_name(english:\"Security Updates for Microsoft SharePoint Server 2019 (May 2021)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The Microsoft SharePoint Server 2019 installation on the remote host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The Microsoft SharePoint Server 2019 installation on the remote host is missing security updates. It is, therefore,\naffected by multiple vulnerabilities:\n\n - Microsoft SharePoint Server Remote Code Execution Vulnerability (CVE-2021-28474, CVE-2021-31181)\n - Microsoft SharePoint Information Disclosure Vulnerability (CVE-2021-31171, CVE-2021-31173)\n - Microsoft SharePoint Spoofing Vulnerability (CVE-2021-26418, CVE-2021-28478, CVE-2021-31172)\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/5001916\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released the following security updates to address this issue: \n -KB5001916\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:F/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-28474\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Microsoft SharePoint Unsafe Control and ViewState RCE');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/05/11\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:sharepoint_server\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"microsoft_sharepoint_installed.nbin\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude('smb_func.inc');\ninclude('smb_hotfixes.inc');\ninclude('smb_hotfixes_fcheck.inc');\ninclude('smb_reg_query.inc');\ninclude('install_func.inc');\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nbulletin = 'MS21-05';\napp_name = 'Microsoft SharePoint Server';\n\nkbs = make_list(\n '5001916'\n);\n\nif (get_kb_item('Host/patch_management_checks'))\n hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_WARNING);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated', exit_code:1);\n\n# Get path information for Windows.\nwindir = hotfix_get_systemroot();\nif (isnull(windir)) exit(1, 'Failed to determine the location of %windir%.');\n\nregistry_init();\ninstall = get_single_install(app_name:app_name);\nkb_checks =\n{\n '2019':\n { '0':\n {'Server':\n [\n {\n 'kb' : '5001916',\n 'path' : install['path'],\n 'append' : 'bin',\n 'file' : 'ascalc.dll',\n 'version' : '16.0.10374.20000',\n 'product_name' : 'Microsoft SharePoint Server 2019 Core'\n }\n ]\n }\n }\n};\n\n# Get the specific product / path\nparam_list = kb_checks[install['Product']][install['SP']][install['Edition']];\n# audit if not affected\nif(isnull(param_list)) audit(AUDIT_HOST_NOT, 'affected');\nport = kb_smb_transport();\n# grab the path otherwise\nforeach check (param_list)\n{\n if (!isnull(check['version']))\n {\n path = check['path'];\n if (!empty_or_null(check['append']))\n path = hotfix_append_path(path:check['path'], value:check['append']);\n are_we_vuln = hotfix_check_fversion(\n file:check['file'],\n version:check['version'],\n path:path,\n kb:check['kb'],\n product:check['product_name']\n );\n }\n else\n {\n report = '\\n';\n if (check['product_name'])\n report += ' Product : ' + check['product_name'] + '\\n';\n if (check['kb'])\n report += ' KB : ' + check['kb'] + '\\n';\n hotfix_add_report(report, kb:check['kb']);\n }\n\n if(are_we_vuln == HCF_OLDER) vuln = TRUE;\n\n}\nif (vuln)\n{\n port = kb_smb_transport();\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_warning();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_INST_VER_NOT_VULN, app_name);\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-09-09T14:31:36", "description": "The Microsoft SharePoint Server 2013 installation on the remote host is missing security updates. It is, therefore, affected by multiple vulnerabilities:\n\n - Microsoft SharePoint Server Remote Code Execution Vulnerability (CVE-2021-28474, CVE-2021-31181)\n - Microsoft SharePoint Information Disclosure Vulnerability (CVE-2021-31171, CVE-2021-31173)\n - Microsoft SharePoint Spoofing Vulnerability (CVE-2021-26418, CVE-2021-28478, CVE-2021-31172)", "cvss3": {}, "published": "2021-05-11T00:00:00", "type": "nessus", "title": "Security Updates for Microsoft SharePoint Foundation Server 2013 (May 2021)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-26418", "CVE-2021-28474", "CVE-2021-28478", "CVE-2021-31171", "CVE-2021-31172", "CVE-2021-31173", "CVE-2021-31181"], "modified": "2021-06-17T00:00:00", "cpe": ["cpe:/a:microsoft:sharepoint_server"], "id": "SMB_NT_MS21_MAY_OFFICE_SHAREPOINT_2013.NASL", "href": "https://www.tenable.com/plugins/nessus/149395", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n##\n\ninclude('deprecated_nasl_level.inc');\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(149395);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/06/17\");\n\n script_cve_id(\n \"CVE-2021-26418\",\n \"CVE-2021-28474\",\n \"CVE-2021-28478\",\n \"CVE-2021-31171\",\n \"CVE-2021-31172\",\n \"CVE-2021-31173\",\n \"CVE-2021-31181\"\n );\n script_xref(name:\"MSKB\", value:\"5001935\");\n script_xref(name:\"IAVA\", value:\"2021-A-0227-S\");\n script_xref(name:\"MSFT\", value:\"MS21-5001935\");\n\n script_name(english:\"Security Updates for Microsoft SharePoint Foundation Server 2013 (May 2021)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The Microsoft SharePoint Server 2013 installation on the remote host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The Microsoft SharePoint Server 2013 installation on the remote host is missing security updates. It is, therefore, \naffected by multiple vulnerabilities:\n\n - Microsoft SharePoint Server Remote Code Execution Vulnerability (CVE-2021-28474, CVE-2021-31181)\n - Microsoft SharePoint Information Disclosure Vulnerability (CVE-2021-31171, CVE-2021-31173)\n - Microsoft SharePoint Spoofing Vulnerability (CVE-2021-26418, CVE-2021-28478, CVE-2021-31172)\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/5001935\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released the following security updates to address this issue: \n -KB5001935\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:F/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-28474\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Microsoft SharePoint Unsafe Control and ViewState RCE');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/05/11\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:sharepoint_server\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"microsoft_sharepoint_installed.nbin\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude('smb_func.inc');\ninclude('smb_hotfixes.inc');\ninclude('smb_hotfixes_fcheck.inc');\ninclude('smb_reg_query.inc');\ninclude('install_func.inc');\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nbulletin = 'MS21-05';\napp_name = 'Microsoft SharePoint Server';\n\nkbs = make_list(\n '5001935'\n);\n\nif (get_kb_item('Host/patch_management_checks'))\n hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_WARNING);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated', exit_code:1);\n\n# Get path information for Windows.\nwindir = hotfix_get_systemroot();\nif (isnull(windir)) exit(1, 'Failed to determine the location of %windir%.');\n\nregistry_init();\ninstall = get_single_install(app_name:app_name);\nkb_checks =\n{\n '2013':\n { '1':\n {'Foundation':\n [{\n 'kb' : '5001935',\n 'path' : hotfix_get_commonfilesdir(),\n 'append' : 'microsoft shared\\\\web server extensions\\\\15\\\\bin',\n 'file' : 'onetutil.dll',\n 'version' : '15.0.5345.1000',\n 'product_name' : 'Microsoft SharePoint Server 2013 SP1'\n }]\n }\n }\n};\n\n# Get the specific product / path\nparam_list = kb_checks[install['Product']][install['SP']][install['Edition']];\n# audit if not affected\nif(isnull(param_list)) audit(AUDIT_HOST_NOT, 'affected');\nport = kb_smb_transport();\n# grab the path otherwise\nforeach check (param_list)\n{\n if (!isnull(check['version']))\n {\n path = check['path'];\n if (!empty_or_null(check['append']))\n path = hotfix_append_path(path:check['path'], value:check['append']);\n are_we_vuln = hotfix_check_fversion(\n file:check['file'],\n version:check['version'],\n path:path,\n kb:check['kb'],\n product:check['product_name']\n );\n }\n else\n {\n report = '\\n';\n if (check['product_name'])\n report += ' Product : ' + check['product_name'] + '\\n';\n if (check['kb'])\n report += ' KB : ' + check['kb'] + '\\n';\n hotfix_add_report(report, kb:check['kb']);\n }\n\n if(are_we_vuln == HCF_OLDER) vuln = TRUE;\n\n}\nif (vuln)\n{\n port = kb_smb_transport();\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_warning();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_INST_VER_NOT_VULN, app_name);\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-09-09T14:32:37", "description": "The Microsoft SharePoint Server 2016 installation on the remote host is missing security updates. It is, therefore, affected by multiple vulnerabilities:\n\n - Microsoft SharePoint Server Remote Code Execution Vulnerability (CVE-2021-28474, CVE-2021-31181)\n - Microsoft SharePoint Information Disclosure Vulnerability (CVE-2021-31171, CVE-2021-31173)\n - Microsoft SharePoint Spoofing Vulnerability (CVE-2021-26418, CVE-2021-28478, CVE-2021-31172)", "cvss3": {}, "published": "2021-05-11T00:00:00", "type": "nessus", "title": "Security Updates for Microsoft Sharepoint 2016 (May 2021)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-26418", "CVE-2021-28474", "CVE-2021-28478", "CVE-2021-31171", "CVE-2021-31172", "CVE-2021-31173", "CVE-2021-31181"], "modified": "2021-06-17T00:00:00", "cpe": ["cpe:/a:microsoft:sharepoint_server"], "id": "SMB_NT_MS21_MAY_OFFICE_SHAREPOINT_2016.NASL", "href": "https://www.tenable.com/plugins/nessus/149385", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\n\ninclude('deprecated_nasl_level.inc');\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(149385);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/06/17\");\n\n script_cve_id(\n \"CVE-2021-26418\",\n \"CVE-2021-28474\",\n \"CVE-2021-28478\",\n \"CVE-2021-31171\",\n \"CVE-2021-31172\",\n \"CVE-2021-31173\",\n \"CVE-2021-31181\"\n );\n script_xref(name:\"MSKB\", value:\"5001917\");\n script_xref(name:\"IAVA\", value:\"2021-A-0227-S\");\n script_xref(name:\"MSFT\", value:\"MS21-5001917\");\n\n script_name(english:\"Security Updates for Microsoft Sharepoint 2016 (May 2021)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The Microsoft SharePoint Server 2016 installation on the remote host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The Microsoft SharePoint Server 2016 installation on the remote host is missing security updates. It is, therefore,\naffected by multiple vulnerabilities:\n\n - Microsoft SharePoint Server Remote Code Execution Vulnerability (CVE-2021-28474, CVE-2021-31181)\n - Microsoft SharePoint Information Disclosure Vulnerability (CVE-2021-31171, CVE-2021-31173)\n - Microsoft SharePoint Spoofing Vulnerability (CVE-2021-26418, CVE-2021-28478, CVE-2021-31172)\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/5001917\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released the following security updates to address this issue: \n -KB5001917\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:F/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-28474\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Microsoft SharePoint Unsafe Control and ViewState RCE');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/05/11\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:sharepoint_server\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"microsoft_sharepoint_installed.nbin\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude('smb_func.inc');\ninclude('smb_hotfixes.inc');\ninclude('smb_hotfixes_fcheck.inc');\ninclude('smb_reg_query.inc');\ninclude('install_func.inc');\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nbulletin = 'MS21-05';\napp_name = 'Microsoft SharePoint Server';\nkbs = make_list(\n '5001917'\n);\n\nif (get_kb_item('Host/patch_management_checks'))\n hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_WARNING);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated', exit_code:1);\n\n# Get path information for Windows.\nwindir = hotfix_get_systemroot();\nif (isnull(windir)) exit(1, 'Failed to determine the location of %windir%.');\n\nparanoid_audit = FALSE;\nregistry_init();\ninstall = get_single_install(app_name:app_name);\nkb_checks =\n{\n '2016':\n { '0':\n {'Server':\n [\n {\n 'kb' : '5001917',\n 'path' : hotfix_get_commonfilesdir(),\n 'append' : 'microsoft shared\\\\web server extensions\\\\16\\\\bin',\n 'file' : 'onetutil.dll',\n 'version' : '16.0.5161.1000',\n 'product_name' : 'Microsoft SharePoint Enterprise Server 2016'\n }\n ]\n }\n }\n};\n\n# Get the specific product / path\nparam_list = kb_checks[install['Product']][install['SP']][install['Edition']];\n# audit if not affected\nif(isnull(param_list)) audit(AUDIT_HOST_NOT, 'affected');\nport = kb_smb_transport();\n# grab the path otherwise\nforeach check (param_list)\n{\n if (!isnull(check['version']))\n {\n path = check['path'];\n if (!empty_or_null(check['append']))\n path = hotfix_append_path(path:check['path'], value:check['append']);\n are_we_vuln = hotfix_check_fversion(\n file:check['file'],\n version:check['version'],\n path:path,\n kb:check['kb'],\n product:check['product_name']\n );\n }\n else\n {\n report = '\\n';\n if (check['product_name'])\n report += ' Product : ' + check['product_name'] + '\\n';\n if (check['kb'])\n report += ' KB : ' + check['kb'] + '\\n';\n hotfix_add_report(report, kb:check['kb']);\n }\n\n if(are_we_vuln == HCF_OLDER) vuln = TRUE;\n\n}\nif (vuln)\n{\n port = kb_smb_transport();\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_warning();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_INST_VER_NOT_VULN, app_name);\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:28:42", "description": "The Microsoft Office Web Apps installation on the remote host is missing security updates. It is, therefore, affected by multiple vulnerabilities:\n\n - A remote code execution vulnerability. An attacker can exploit this to bypass authentication and execute unauthorized arbitrary commands. (CVE-2021-31175, CVE-2021-31177, CVE-2021-31179)\n\n - An information disclosure vulnerability. An attacker can exploit this to disclose potentially sensitive information. (CVE-2021-31174, CVE-2021-31178)", "cvss3": {}, "published": "2021-05-11T00:00:00", "type": "nessus", "title": "Security Updates for Microsoft Office Web Apps (May 2021)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-31174", "CVE-2021-31175", "CVE-2021-31177", "CVE-2021-31178", "CVE-2021-31179"], "modified": "2021-06-11T00:00:00", "cpe": ["cpe:/a:microsoft:office_web_apps"], "id": "SMB_NT_MS21_MAY_OFFICE_WEB.NASL", "href": "https://www.tenable.com/plugins/nessus/149387", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\n\ninclude('deprecated_nasl_level.inc');\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(149387);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/06/11\");\n\n script_cve_id(\n \"CVE-2021-31174\",\n \"CVE-2021-31175\",\n \"CVE-2021-31177\",\n \"CVE-2021-31178\",\n \"CVE-2021-31179\"\n );\n script_xref(name:\"MSKB\", value:\"5001914\");\n script_xref(name:\"MSKB\", value:\"5001928\");\n script_xref(name:\"MSFT\", value:\"MS21-5001914\");\n script_xref(name:\"IAVA\", value:\"2021-A-0225-S\");\n script_xref(name:\"MSFT\", value:\"MS21-5001928\");\n\n script_name(english:\"Security Updates for Microsoft Office Web Apps (May 2021)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The Microsoft Office Web Apps installation on the remote host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The Microsoft Office Web Apps installation on the remote\nhost is missing security updates. It is, therefore, affected\nby multiple vulnerabilities:\n\n - A remote code execution vulnerability. An attacker can\n exploit this to bypass authentication and execute\n unauthorized arbitrary commands. (CVE-2021-31175,\n CVE-2021-31177, CVE-2021-31179)\n\n - An information disclosure vulnerability. An attacker can\n exploit this to disclose potentially sensitive\n information. (CVE-2021-31174, CVE-2021-31178)\");\n # https://support.microsoft.com/en-us/topic/description-of-the-security-update-for-office-online-server-may-11-2021-kb5001914-a30f14fa-fc07-47d0-93e0-5beec98dd2a6\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?3ef32b8b\");\n # https://support.microsoft.com/en-us/topic/description-of-the-security-update-for-office-web-apps-server-2013-may-11-2021-kb5001928-353b9fdc-3732-4900-a73e-6e82dc6183d2\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?97b40ee7\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released the following security updates to address this issue: \n -KB5001914\n -KB5001928\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-31175\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/05/11\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:office_web_apps\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"office_installed.nasl\", \"microsoft_owa_installed.nbin\", \"microsoft_office_compatibility_pack_installed.nbin\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude('smb_func.inc');\ninclude('smb_hotfixes.inc');\ninclude('smb_hotfixes_fcheck.inc');\ninclude('install_func.inc');\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nvar path, vuln;\n\nvar bulletin = 'MS21-05';\nvar kbs = make_list('5001928', '5001914');\n\nif (get_kb_item('Host/patch_management_checks')) \n hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_WARNING);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated', exit_code:1);\n\nvar port = kb_smb_transport();\n\n# Get installs of Office Web Apps\nvar owa_installs = get_installs(app_name:'Microsoft Office Web Apps');\n\nif (!empty_or_null(owa_installs))\n{\n var owa_install;\n foreach owa_install (owa_installs[1])\n {\n if (owa_install['Product'] == '2013')\n {\n var owa_2013_path = owa_install['path'];\n var owa_2013_sp = owa_install['SP'];\n }\n else if (owa_install['Product'] == '2016')\n {\n var oos_path = owa_install['path'];\n var oos_sp = owa_install['SP'];\n }\n }\n}\nvuln = FALSE;\n\n####################################################################\n# Office Web Apps 2013 SP1\n####################################################################\nif (owa_2013_path && (!isnull(owa_2013_sp) && owa_2013_sp == '1'))\n{\n path = hotfix_append_path(path:owa_2013_path, value:'WordConversionService\\\\bin\\\\Converter');\n if (hotfix_check_fversion(file:'sword.dll', version:'15.0.5345.1000', min_version:'15.0.0.0', path:path, kb:'5001928', product:'Office Web Apps 2013') == HCF_OLDER)\n vuln = TRUE;\n}\n\n####################################################################\n# Office Online Server\n####################################################################\nif (oos_path && (!isnull(oos_sp) && oos_sp == '0'))\n{\n path = hotfix_append_path(path:oos_path, value:'WordConversionService\\\\bin\\\\Converter');\n if (hotfix_check_fversion(file:'sword.dll', version:'16.0.10374.20000', min_version:'16.0.0.0', path:path, kb:'5001914', product:'Office Online Server') == HCF_OLDER)\n vuln = TRUE;\n}\n\nif (vuln)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_warning();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, 'affected');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-17T16:30:49", "description": "The Microsoft Excel Products are missing security updates.\nIt is, therefore, affected by multiple vulnerabilities:\n\n - A remote code execution vulnerability. An attacker can exploit this to bypass authentication and execute unauthorized arbitrary commands. (CVE-2021-31175, CVE-2021-31177, CVE-2021-31179)\n\n - An information disclosure vulnerability. An attacker can exploit this to disclose potentially sensitive information. (CVE-2021-31174, CVE-2021-31178)", "cvss3": {}, "published": "2022-06-10T00:00:00", "type": "nessus", "title": "Security Updates for Microsoft Excel Products C2R (May 2021)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-31174", "CVE-2021-31175", "CVE-2021-31177", "CVE-2021-31178", "CVE-2021-31179"], "modified": "2022-12-14T00:00:00", "cpe": ["cpe:/a:microsoft:excel"], "id": "SMB_NT_MS21_MAY_EXCEL_C2R.NASL", "href": "https://www.tenable.com/plugins/nessus/162042", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\n\ninclude('deprecated_nasl_level.inc');\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(162042);\n script_version(\"1.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/12/14\");\n\n script_cve_id(\n \"CVE-2021-31174\",\n \"CVE-2021-31175\",\n \"CVE-2021-31177\",\n \"CVE-2021-31178\",\n \"CVE-2021-31179\"\n );\n script_xref(name:\"IAVA\", value:\"2021-A-0228-S\");\n\n script_name(english:\"Security Updates for Microsoft Excel Products C2R (May 2021)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The Microsoft Excel Products are affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The Microsoft Excel Products are missing security updates.\nIt is, therefore, affected by multiple vulnerabilities:\n\n - A remote code execution vulnerability. An attacker can\n exploit this to bypass authentication and execute\n unauthorized arbitrary commands. (CVE-2021-31175,\n CVE-2021-31177, CVE-2021-31179)\n\n - An information disclosure vulnerability. An attacker can\n exploit this to disclose potentially sensitive\n information. (CVE-2021-31174, CVE-2021-31178)\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?fd4508ff\");\n script_set_attribute(attribute:\"solution\", value:\n\"For Office 365, Office 2016 C2R, or Office 2019, ensure automatic\nupdates are enabled or open any office app and manually perform an\nupdate.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-31175\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2022/06/10\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:excel\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_dependencies(\"office_installed.nasl\", \"microsoft_office_compatibility_pack_installed.nbin\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude('vcf_extras_office.inc');\n\nvar bulletin = 'MS21-05';\n\nvar constraints = [\n {'fixed_version':'16.0.13127.21624','channel': 'Deferred','channel_version': '2008'},\n {'fixed_version':'16.0.12527.21912','channel': 'Microsoft 365 Apps on Windows 7'},\n {'fixed_version':'16.0.12527.21912','channel': 'Deferred'},\n {'fixed_version':'16.0.13901.20516','channel': 'Enterprise Deferred','channel_version': '2103'},\n {'fixed_version':'16.0.13801.20638','channel': 'Enterprise Deferred'},\n {'fixed_version':'16.0.13801.20638','channel': 'First Release for Deferred'},\n {'fixed_version':'16.0.13929.20372','channel': '2016 Retail'},\n {'fixed_version':'16.0.13929.20372','channel': 'Current'},\n {'fixed_version':'16.0.10374.20040','channel': '2019 Volume'},\n {'fixed_version':'16.0.13929.20372','channel': '2019 Retail'}\n];\n\nvcf::microsoft::office_product::check_version_and_report(\n constraints:constraints,\n severity:SECURITY_WARNING,\n bulletin:bulletin,\n subproduct:'Excel'\n);", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-20T14:55:24", "description": "The Microsoft Excel Products are missing security updates.\nIt is, therefore, affected by multiple vulnerabilities:\n\n - A remote code execution vulnerability. An attacker can exploit this to bypass authentication and execute unauthorized arbitrary commands. (CVE-2021-31175, CVE-2021-31177, CVE-2021-31179)\n\n - An information disclosure vulnerability. An attacker can exploit this to disclose potentially sensitive information. (CVE-2021-31174, CVE-2021-31178)", "cvss3": {}, "published": "2021-05-11T00:00:00", "type": "nessus", "title": "Security Updates for Microsoft Excel Products (May 2021)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-31174", "CVE-2021-31175", "CVE-2021-31177", "CVE-2021-31178", "CVE-2021-31179"], "modified": "2022-06-10T00:00:00", "cpe": ["cpe:/a:microsoft:excel"], "id": "SMB_NT_MS21_MAY_EXCEL.NASL", "href": "https://www.tenable.com/plugins/nessus/149397", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\n\ninclude('deprecated_nasl_level.inc');\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(149397);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/06/10\");\n\n script_cve_id(\n \"CVE-2021-31174\",\n \"CVE-2021-31175\",\n \"CVE-2021-31177\",\n \"CVE-2021-31178\",\n \"CVE-2021-31179\"\n );\n script_xref(name:\"MSKB\", value:\"5001918\");\n script_xref(name:\"MSKB\", value:\"5001936\");\n script_xref(name:\"MSFT\", value:\"MS21-5001918\");\n script_xref(name:\"IAVA\", value:\"2021-A-0228-S\");\n script_xref(name:\"MSFT\", value:\"MS21-5001936\");\n\n script_name(english:\"Security Updates for Microsoft Excel Products (May 2021)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The Microsoft Excel Products are affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The Microsoft Excel Products are missing security updates.\nIt is, therefore, affected by multiple vulnerabilities:\n\n - A remote code execution vulnerability. An attacker can\n exploit this to bypass authentication and execute\n unauthorized arbitrary commands. (CVE-2021-31175,\n CVE-2021-31177, CVE-2021-31179)\n\n - An information disclosure vulnerability. An attacker can\n exploit this to disclose potentially sensitive\n information. (CVE-2021-31174, CVE-2021-31178)\");\n # https://support.microsoft.com/en-us/topic/description-of-the-security-update-for-excel-2016-may-11-2021-kb5001918-ded10733-528c-4f28-8ad1-65e2956fb2e3\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?354a1fb3\");\n # https://support.microsoft.com/en-us/topic/description-of-the-security-update-for-excel-2013-may-11-2021-kb5001936-7ce6a5c0-9d60-4278-92f4-6538801e5c2b\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?1df6f8ba\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released the following security updates to address this issue: \n -KB5001918\n -KB5001936\n\nFor Office 365, Office 2016 C2R, or Office 2019, ensure automatic\nupdates are enabled or open any office app and manually perform an\nupdate.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-31175\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/05/11\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:excel\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"office_installed.nasl\", \"microsoft_office_compatibility_pack_installed.nbin\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude('smb_func.inc');\ninclude('smb_hotfixes.inc');\ninclude('smb_hotfixes_fcheck.inc');\ninclude('smb_reg_query.inc');\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nvar bulletin = 'MS21-05';\nvar kbs = make_list(\n '5001918',\n '5001936'\n);\n\nif (get_kb_item('Host/patch_management_checks'))\n hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_WARNING);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated', exit_code:1);\n\nvar port = kb_smb_transport();\n\nvar checks = make_array(\n '15.0', make_array('sp', 1, 'version', '15.0.5345.1000', 'kb', '5001936'),\n '16.0', make_nested_list(\n make_array('sp', 0, 'version', '16.0.5161.1000', 'channel', 'MSI', 'kb', '5001918')\n )\n);\n\nif (hotfix_check_office_product(product:'Excel', checks:checks, bulletin:bulletin))\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_warning();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, 'affected');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-08-03T14:37:32", "description": "The Microsoft Exchange Server installed on the remote host is missing security updates. It is, therefore, affected by multiple vulnerabilities:\n - A security feature bypass vulnerability exists. An attacker can exploit this and bypass the security feature and perform unauthorized actions compromising the integrity of the system/application.\n (CVE-2021-31207)\n - A remote code execution vulnerability. An attacker can exploit this to bypass authentication and execute unauthorized arbitrary commands. (CVE-2021-31195, CVE-2021-31198)\n - A session spoofing vulnerability exists. An attacker can exploit this to perform actions with the privileges of another user. (CVE-2021-31209)", "cvss3": {}, "published": "2021-05-11T00:00:00", "type": "nessus", "title": "Security Updates for Exchange (May 2021)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-31195", "CVE-2021-31198", "CVE-2021-31207", "CVE-2021-31209"], "modified": "2023-03-08T00:00:00", "cpe": ["cpe:/a:microsoft:exchange_server"], "id": "SMB_NT_MS21_MAY_EXCHANGE.NASL", "href": "https://www.tenable.com/plugins/nessus/149393", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(149393);\n script_version(\"1.14\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/03/08\");\n\n script_cve_id(\n \"CVE-2021-31195\",\n \"CVE-2021-31198\",\n \"CVE-2021-31207\",\n \"CVE-2021-31209\"\n );\n script_xref(name:\"MSKB\", value:\"5003435\");\n script_xref(name:\"MSFT\", value:\"MS21-5003435\");\n script_xref(name:\"IAVA\", value:\"2021-A-0221-S\");\n script_xref(name:\"CISA-KNOWN-EXPLOITED\", value:\"2021/11/17\");\n script_xref(name:\"CEA-ID\", value:\"CEA-2021-0040\");\n\n script_name(english:\"Security Updates for Exchange (May 2021)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The Microsoft Exchange Server installed on the remote host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The Microsoft Exchange Server installed on the remote host\nis missing security updates. It is, therefore, affected by\nmultiple vulnerabilities:\n - A security feature bypass vulnerability exists. An\n attacker can exploit this and bypass the security\n feature and perform unauthorized actions compromising\n the integrity of the system/application.\n (CVE-2021-31207)\n - A remote code execution vulnerability. An attacker can\n exploit this to bypass authentication and execute\n unauthorized arbitrary commands. (CVE-2021-31195,\n CVE-2021-31198)\n - A session spoofing vulnerability exists. An attacker can\n exploit this to perform actions with the privileges of\n another user. (CVE-2021-31209)\");\n # https://support.microsoft.com/en-us/topic/description-of-the-security-update-for-microsoft-exchange-server-2019-2016-and-2013-may-11-2021-kb5003435-028bd051-b2f1-4310-8f35-c41c9ce5a2f1\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?812d3faa\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released KB5003435 to address this issue.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-31198\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2021-31195\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Microsoft Exchange ProxyShell RCE');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/05/11\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:exchange_server\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ms_bulletin_checks_possible.nasl\", \"microsoft_exchange_installed.nbin\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude('vcf_extras_microsoft.inc');\n\nvar app_info = vcf::microsoft::exchange::get_app_info();\n\nvar constraints =\n[\n {\n 'product' : '2013',\n 'unsupported_cu' : 22,\n 'cu' : 23,\n 'min_version': '15.00.1497.0',\n 'fixed_version': '15.00.1497.18',\n 'kb': '5003435'\n },\n {\n 'product' : '2016',\n 'unsupported_cu' : 18,\n 'cu' : 19,\n 'min_version': '15.01.2176.0',\n 'fixed_version': '15.01.2176.14',\n 'kb': '5003435'\n },\n {\n 'product': '2016',\n 'unsupported_cu': 18,\n 'cu' : 20,\n 'min_version': '15.01.2242.0',\n 'fixed_version': '15.01.2242.10',\n 'kb': '5003435'\n },\n {\n 'product' : '2019',\n 'unsupported_cu' : 7,\n 'cu' : 8,\n 'min_version': '15.02.792.0',\n 'fixed_version': '15.02.792.15',\n 'kb': '5003435'\n },\n {\n 'product' : '2019',\n 'unsupported_cu' : 7,\n 'cu' : 9,\n 'min_version': '15.02.858.0',\n 'fixed_version': '15.02.858.12',\n 'kb': '5003435'\n }\n];\n\nvcf::microsoft::exchange::check_version_and_report\n(\n app_info:app_info,\n bulletin:'MS21-05',\n constraints:constraints,\n severity:SECURITY_WARNING\n);\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:28:53", "description": "The version of Microsoft Visual Studio Code installed on the remote Windows host is prior to 1.56.1. It is, therefore, affected by multiple remote code execution vulnerabilities.", "cvss3": {}, "published": "2021-05-11T00:00:00", "type": "nessus", "title": "Security Update for Microsoft Visual Studio Code (May 2021)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-31211", "CVE-2021-31214"], "modified": "2022-04-11T00:00:00", "cpe": ["cpe:/a:microsoft:visual_studio_code"], "id": "SMB_NT_MS21_MAY_VISUAL_STUDIO_CODE.NASL", "href": "https://www.tenable.com/plugins/nessus/149402", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\n# The descriptive text and package checks in this plugin were\n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(149402);\n script_version(\"1.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/04/11\");\n\n script_cve_id(\"CVE-2021-31211\", \"CVE-2021-31214\");\n script_xref(name:\"IAVA\", value:\"2021-A-0219-S\");\n\n script_name(english:\"Security Update for Microsoft Visual Studio Code (May 2021)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote host has an application installed that is missing a security update.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Microsoft Visual Studio Code installed on the remote Windows host is prior to 1.56.1. It is, therefore,\naffected by multiple remote code execution vulnerabilities.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://code.visualstudio.com/updates/v1_56\");\n script_set_attribute(attribute:\"see_also\", value:\"https://github.com/microsoft/vscode/milestone/155?closed=1\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Microsoft Visual Studio Code 1.56.1 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-31214\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/05/11\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:visual_studio_code\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_set_attribute(attribute:\"thorough_tests\", value:\"true\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"microsoft_visual_studio_code_installed.nbin\", \"microsoft_visual_studio_code_win_user_installed.nbin\");\n script_require_keys(\"installed_sw/Microsoft Visual Studio Code\", \"SMB/Registry/Enumerated\");\n\n exit(0);\n}\n\ninclude('vcf.inc');\n\nget_kb_item_or_exit('SMB/Registry/Enumerated');\n\napp_info = vcf::get_app_info(app:'Microsoft Visual Studio Code', win_local:TRUE);\n\nvcf::check_granularity(app_info:app_info, sig_segments:3);\n\nconstraints = [\n { 'fixed_version' : '1.56.1' }\n];\n\nvcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_HOLE);\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:28:54", "description": "The Microsoft Visual Studio Products are missing a security update. It is, therefore, affected by the multiple vulnerabilities, including the following:\n\n - A remote code execution vulnerability exists in Visual Studio. An unauthenticated, remote attacker can exploit this to bypass authentication and execute arbitrary commands (CVE-2021-27068). \n\n - A privilege escalation vulnerability exists in Visual Studio. An authenticated, local attacker can exploit this to escalate their privileges of an affected system (CVE-2021-31204)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2021-05-12T00:00:00", "type": "nessus", "title": "Security Updates for Microsoft Visual Studio Products (May 2021)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-27068", "CVE-2021-31204"], "modified": "2022-06-27T00:00:00", "cpe": ["cpe:/a:microsoft:visual_studio"], "id": "SMB_NT_MS21_MAY_VISUAL_STUDIO.NASL", "href": "https://www.tenable.com/plugins/nessus/149436", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n##\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\n\ninclude('deprecated_nasl_level.inc');\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(149436);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/06/27\");\n\n script_cve_id(\"CVE-2021-27068\", \"CVE-2021-31204\");\n script_xref(name:\"IAVA\", value:\"2021-A-0220-S\");\n\n script_name(english:\"Security Updates for Microsoft Visual Studio Products (May 2021)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The Microsoft Visual Studio Products are missing a security update.\");\n script_set_attribute(attribute:\"description\", value:\n\"The Microsoft Visual Studio Products are missing a security update. It is, therefore, affected by the multiple\nvulnerabilities, including the following:\n\n - A remote code execution vulnerability exists in Visual Studio. An unauthenticated, remote attacker can\n exploit this to bypass authentication and execute arbitrary commands (CVE-2021-27068). \n\n - A privilege escalation vulnerability exists in Visual Studio. An authenticated, local attacker can \n exploit this to escalate their privileges of an affected system (CVE-2021-31204)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version \nnumber.\");\n # https://docs.microsoft.com/en-us/visualstudio/releasenotes/vs2017-relnotes#15.9.36\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?5e238a3e\");\n # https://docs.microsoft.com/en-us/visualstudio/releases/2019/release-notes-v16.4#16.4.22\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?8f7f7927\");\n # https://docs.microsoft.com/en-us/visualstudio/releases/2019/release-notes-v16.7#16.7.15\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?6da57842\");\n # https://docs.microsoft.com/en-us/visualstudio/releases/2019/release-notes#16.9.5\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?4b804329\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released the following security updates to address this issue:\n - Update 15.9.36 for Visual Studio 2017\n - Update 16.4.22 for Visual Studio 2019\n - Update 16.7.15 for Visual Studio 2019\n - Update 16.9.5 for Visual Studio 2019\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-27068\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/05/12\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:visual_studio\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ms_bulletin_checks_possible.nasl\", \"microsoft_visual_studio_installed.nbin\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\", \"installed_sw/Microsoft Visual Studio\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude('install_func.inc');\ninclude('smb_func.inc');\ninclude('smb_hotfixes.inc');\ninclude('smb_hotfixes_fcheck.inc');\n\nget_kb_item_or_exit('installed_sw/Microsoft Visual Studio');\n\nvar port = kb_smb_transport();\nvar appname = 'Microsoft Visual Studio';\nvar installs = get_installs(app_name:appname, exit_if_not_found:TRUE);\nvar report = '';\n\nforeach var install (installs[1])\n{\n var version = install['version'];\n var path = install['path'];\n var prod = install['product_version'];\n var fix = '';\n\n # https://docs.microsoft.com/en-us/visualstudio/install/visual-studio-build-numbers-and-release-dates?view=vs-2017\n # VS 2017\n if (prod == '2017')\n {\n fix = '15.9.28307.1525';\n\n if (ver_compare(ver: version, fix: fix, strict:FALSE) < 0)\n {\n report +=\n '\\n Path : ' + path +\n '\\n Installed version : ' + version +\n '\\n Fixed version : ' + fix +\n '\\n';\n }\n }\n # https://docs.microsoft.com/en-us/visualstudio/install/visual-studio-build-numbers-and-release-dates?view=vs-2019\n #\n # VS 2019 Version 16.0-4\n else if (prod == '2019' && version =~ \"^16\\.[0-4]\\.\")\n {\n fix = '16.4.31229.387';\n if (ver_compare(ver: version, fix: fix, strict:FALSE) < 0)\n {\n report +=\n '\\n Path : ' + path +\n '\\n Installed version : ' + version +\n '\\n Fixed version : ' + fix +\n '\\n';\n }\n }\n # VS 2019 Version 16.5-7\n else if (prod == '2019' && version =~ \"^16\\.[5-7]\\.\")\n {\n fix = '16.7.31229.181';\n if (ver_compare(ver: version, fix: fix, strict:FALSE) < 0)\n {\n report +=\n '\\n Path : ' + path +\n '\\n Installed version : ' + version +\n '\\n Fixed version : ' + fix +\n '\\n';\n }\n }\n # VS 2019 Version 16.8-9\n else if (prod == '2019' && version =~ \"^16\\.[89]\\.\")\n {\n fix = '16.9.31229.75';\n if (ver_compare(ver: version, fix: fix, strict:FALSE) < 0)\n {\n report +=\n '\\n Path : ' + path +\n '\\n Installed version : ' + version +\n '\\n Fixed version : ' + fix +\n '\\n';\n }\n }\n}\n\nhotfix_check_fversion_end();\n\nif (empty(report))\n audit(AUDIT_INST_VER_NOT_VULN, appname);\n\nsecurity_report_v4(port:port, severity:SECURITY_WARNING, extra:report);\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:28:20", "description": "The Microsoft Skype for Business installation on the remote host is missing security updates. It is, therefore, affected by multiple vulnerabilities:\n\n - A session spoofing vulnerability exists. An attacker can exploit this to perform actions with the privileges of another user. (CVE-2021-26421)\n\n - A remote code execution vulnerability. An attacker can exploit this to bypass authentication and execute unauthorized arbitrary commands. (CVE-2021-26422)", "cvss3": {}, "published": "2021-05-14T00:00:00", "type": "nessus", "title": "Security Updates for Microsoft Skype for Business (May 2021)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-26421", "CVE-2021-26422"], "modified": "2022-04-27T00:00:00", "cpe": ["cpe:/a:microsoft:skype_for_business"], "id": "SMB_NT_MS21_MAY_SKYPE.NASL", "href": "https://www.tenable.com/plugins/nessus/149479", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\ninclude('deprecated_nasl_level.inc');\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(149479);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/04/27\");\n\n script_cve_id(\"CVE-2021-26421\", \"CVE-2021-26422\");\n script_xref(name:\"MSKB\", value:\"5003729\");\n script_xref(name:\"MSFT\", value:\"MS21-5003729\");\n script_xref(name:\"IAVA\", value:\"2021-A-0217-S\");\n\n script_name(english:\"Security Updates for Microsoft Skype for Business (May 2021)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The Microsoft Skype for Business installation on the remote host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The Microsoft Skype for Business installation on the remote\nhost is missing security updates. It is, therefore, affected\nby multiple vulnerabilities:\n\n - A session spoofing vulnerability exists. An attacker can\n exploit this to perform actions with the privileges of\n another user. (CVE-2021-26421)\n\n - A remote code execution vulnerability. An attacker can\n exploit this to bypass authentication and execute\n unauthorized arbitrary commands. (CVE-2021-26422)\");\n # https://support.microsoft.com/en-us/topic/description-of-the-security-update-for-skype-for-business-server-and-lync-server-may-11-2021-kb5003729-3a6def2e-4b74-480e-bf24-fbec151f10a0\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?5d97ea49\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released KB5003729 to address this issue.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-26422\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/05/13\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/05/13\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/05/14\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:skype_for_business\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"office_installed.nasl\", \"microsoft_lync_server_installed.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\n\ninclude('smb_func.inc');\ninclude('smb_hotfixes.inc');\ninclude('smb_hotfixes_fcheck.inc');\ninclude('install_func.inc');\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nvar bulletin = 'MS21-05';\nvar kbs = make_list(\n '5003729'\n);\n\nif (get_kb_item('Host/patch_management_checks')) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_WARNING);\n\nget_kb_item_or_exit('installed_sw/Microsoft Lync');\n\nget_kb_item_or_exit('SMB/Registry/Uninstall/Enumerated', exit_code:1);\n\nvar uninstall_list = get_kb_list('SMB/Registry/HKLM/SOFTWARE/Microsoft/Windows/CurrentVersion/Uninstall/*/DisplayName');\n\nif (isnull(uninstall_list)) exit(1, 'Missing uninstall enumeration list.');\n\nvar vuln = FALSE;\n\nvar name_kb, prod, version_kb, kb, version, info;\n\nforeach name_kb (keys(uninstall_list))\n{\n prod = uninstall_list[name_kb];\n version_kb = name_kb - '/DisplayName' + '/DisplayVersion';\n\n if (\n 'Server' >< prod &&\n (\n 'Core Components' >< prod ||\n 'Macp Web Components' >< prod\n )\n )\n {\n if ('Skype for Business' >< prod)\n {\n if ('2019' >< prod)\n {\n version = get_kb_item(version_kb);\n if (!isnull(version) && (ver_compare(ver:version, minver:'7.0.2046.0', fix:'7.0.2046.369') < 0))\n {\n vuln = TRUE;\n kb = '5003729'; # This is one of the KBs. MS needs to clean up some linking stuff.\n info = '\\n Product : ' + prod +\n '\\n Installed Version : ' + version +\n '\\n Fixed Version : 7.0.2046.369\\n';\n hotfix_add_report(info, bulletin:bulletin, kb:kb);\n }\n }\n else if ('2015' >< prod && 'Macp' >!< prod)\n {\n version = get_kb_item(version_kb);\n if (!isnull(version) && (ver_compare(ver:version, minver:'6.0.9319.0', fix:'6.0.9319.606') < 0))\n {\n vuln = TRUE;\n kb = '5003729'; # This is one of the KBs. MS needs to clean up some linking stuff.\n # The other relevant KB is KB5000688 but only applies to 2015 and 2013\n info = '\\n Product : ' + prod +\n '\\n Installed Version : ' + version +\n '\\n Fixed Version : 6.0.9319.606\\n';\n hotfix_add_report(info, bulletin:bulletin, kb:kb);\n }\n }\n }\n else if ('Lync' >< prod && '2013' >< prod && 'Macp' >!< prod)\n {\n version = get_kb_item(version_kb);\n if (!isnull(version) && (ver_compare(ver:version, minver:'5.0.8308.0', fix:'5.0.8308.1144') < 0))\n {\n vuln = TRUE;\n kb = '5003729'; # This is one of the KBs. MS needs to clean up some linking stuff.\n # The other relevant KB is KB5000688 but only applies to 2015 and 2013\n info = '\\n Product : ' + prod +\n '\\n Installed Version : ' + version +\n '\\n Fixed Version : 5.0.8308.1144\\n';\n hotfix_add_report(info, bulletin:bulletin, kb:kb);\n }\n }\n }\n}\n\nif (vuln)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_warning();\n exit(0);\n}\nelse\n{\n audit(AUDIT_HOST_NOT, 'affected');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T14:42:55", "description": "The version of FreeBSD installed on the remote host is prior to tested version. It is, therefore, affected by multiple vulnerabilities as referenced in the 8d20bd48-a4f3-11ec-90de-1c697aa5a594 advisory.\n\n - The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated.\n Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets. (CVE-2020-24588)\n\n - An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept plaintext A-MSDU frames as long as the first 8 bytes correspond to a valid RFC1042 (i.e., LLC/SNAP) header for EAPOL. An adversary can abuse this to inject arbitrary network packets independent of the network configuration. (CVE-2020-26144)\n\n - An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used. (CVE-2020-26147)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2022-03-16T00:00:00", "type": "nessus", "title": "FreeBSD : FreeBSD-kernel -- Multiple WiFi issues (8d20bd48-a4f3-11ec-90de-1c697aa5a594)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-24588", "CVE-2020-26144", "CVE-2020-26147"], "modified": "2022-03-16T00:00:00", "cpe": ["p-cpe:/a:freebsd:freebsd:freebsd-kernel", "cpe:/o:freebsd:freebsd"], "id": "FREEBSD_PKG_8D20BD48A4F311EC90DE1C697AA5A594.NASL", "href": "https://www.tenable.com/plugins/nessus/158985", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# @NOAGENT@\n#\n# The descriptive text and package checks in this plugin were\n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2021 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n#\n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(158985);\n script_version(\"1.2\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/03/16\");\n\n script_cve_id(\"CVE-2020-24588\", \"CVE-2020-26144\", \"CVE-2020-26147\");\n script_xref(name:\"IAVA\", value:\"2021-A-0223-S\");\n script_xref(name:\"IAVA\", value:\"2021-A-0222-S\");\n\n script_name(english:\"FreeBSD : FreeBSD-kernel -- Multiple WiFi issues (8d20bd48-a4f3-11ec-90de-1c697aa5a594)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote FreeBSD host is missing one or more security-related updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of FreeBSD installed on the remote host is prior to tested version. It is, therefore, affected by multiple\nvulnerabilities as referenced in the 8d20bd48-a4f3-11ec-90de-1c697aa5a594 advisory.\n\n - The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent\n Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated.\n Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an\n adversary can abuse this to inject arbitrary network packets. (CVE-2020-24588)\n\n - An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3\n implementations accept plaintext A-MSDU frames as long as the first 8 bytes correspond to a valid RFC1042\n (i.e., LLC/SNAP) header for EAPOL. An adversary can abuse this to inject arbitrary network packets\n independent of the network configuration. (CVE-2020-26144)\n\n - An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble\n fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject\n packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP,\n CCMP, or GCMP data-confidentiality protocol is used. (CVE-2020-26147)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\");\n # https://vuxml.freebsd.org/freebsd/8d20bd48-a4f3-11ec-90de-1c697aa5a594.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?315ff327\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:A/AC:L/Au:N/C:N/I:P/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-26144\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2022/03/16\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2022/03/16\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:FreeBSD-kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nif (report_paranoia < 2) audit(AUDIT_PARANOID);\n\nvar flag = 0;\n\nvar packages = [\n 'FreeBSD>=12.2<12.2_14',\n 'FreeBSD>=12.3<12.3_3',\n 'FreeBSD>=13.0<13.0_8'\n];\n\nforeach var package( packages ) {\n if (pkg_test(save_report:TRUE, pkg: package)) flag++;\n}\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_NOTE,\n extra : pkg_report_get()\n );\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:28:24", "description": "The Windows 'Web Media Extensions' app installed on the remote host is affected by a remote code execution vulnerability. An attacker who successfully exploited the vulnerability could execute arbitrary code. Exploitation of the vulnerability requires that a program process a specially crafted file. (CVE-2021-28465)", "cvss3": {}, "published": "2021-05-11T00:00:00", "type": "nessus", "title": "Microsoft Windows Web Media Extensions Library RCE (May 2021)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-28465"], "modified": "2021-05-12T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS21_MAY_WEB_MEDIA.NASL", "href": "https://www.tenable.com/plugins/nessus/149388", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(149388);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/05/12\");\n\n script_cve_id(\"CVE-2021-28465\");\n\n script_name(english:\"Microsoft Windows Web Media Extensions Library RCE (May 2021)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The Windows app installed on the remote host is affected by a remote code execution vulnerability.\");\n script_set_attribute(attribute:\"description\", value:\n\"The Windows 'Web Media Extensions' app installed on the remote host is affected by a remote code execution\nvulnerability. An attacker who successfully exploited the vulnerability could execute arbitrary code. Exploitation of\nthe vulnerability requires that a program process a specially crafted file. (CVE-2021-28465)\");\n script_set_attribute(attribute:\"see_also\", value:\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-28465\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to app version 1.0.40831.0, or later via the Microsoft Store.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-28465\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/05/11\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_hotfixes.nasl\", \"wmi_enum_windows_app_store.nbin\");\n script_require_keys(\"SMB/Registry/Enumerated\", \"WMI/Windows App Store/Enumerated\");\n script_require_ports(139, 445);\n\n exit(0);\n}\n\ninclude('vcf.inc');\ninclude('vcf_extras.inc');\n\napps = ['Microsoft.WebMediaExtensions'];\n\napp_info = vcf::microsoft_appstore::get_app_info(app_list:apps);\n\nvcf::check_granularity(app_info:app_info, sig_segments:3);\n\nconstraints = [\n { 'fixed_version' : '1.0.40831.0'}\n];\n\nvcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_WARNING);\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-17T16:31:25", "description": "The Microsoft Word Products are missing a security update.\nIt is, therefore, affected by the following vulnerability:\n\n - A remote code execution vulnerability. An attacker can exploit this to bypass authentication and execute unauthorized arbitrary commands. (CVE-2021-31180)", "cvss3": {}, "published": "2022-06-10T00:00:00", "type": "nessus", "title": "Security Updates for Microsoft Word Products C2R (May 2021)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-31180"], "modified": "2022-12-14T00:00:00", "cpe": ["cpe:/a:microsoft:word"], "id": "SMB_NT_MS21_MAY_WORD_C2R.NASL", "href": "https://www.tenable.com/plugins/nessus/162122", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\n\ninclude('deprecated_nasl_level.inc');\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(162122);\n script_version(\"1.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/12/14\");\n\n script_cve_id(\"CVE-2021-31180\");\n script_xref(name:\"IAVA\", value:\"2021-A-0226-S\");\n\n script_name(english:\"Security Updates for Microsoft Word Products C2R (May 2021)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The Microsoft Word Products are missing a security update.\");\n script_set_attribute(attribute:\"description\", value:\n\"The Microsoft Word Products are missing a security update.\nIt is, therefore, affected by the following vulnerability:\n\n - A remote code execution vulnerability. An attacker can\n exploit this to bypass authentication and execute\n unauthorized arbitrary commands. (CVE-2021-31180)\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?fd4508ff\");\n script_set_attribute(attribute:\"solution\", value:\n\"For Office 365, Office 2016 C2R, or Office 2019, ensure automatic\nupdates are enabled or open any office app and manually perform an\nupdate.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-31180\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2022/06/10\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:word\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_dependencies(\"office_installed.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude('vcf_extras_office.inc');\n\nvar bulletin = 'MS21-05';\n\nvar constraints = [\n {'fixed_version':'16.0.13127.21624','channel': 'Deferred','channel_version': '2008'},\n {'fixed_version':'16.0.12527.21912','channel': 'Microsoft 365 Apps on Windows 7'},\n {'fixed_version':'16.0.12527.21912','channel': 'Deferred'},\n {'fixed_version':'16.0.13901.20516','channel': 'Enterprise Deferred','channel_version': '2103'},\n {'fixed_version':'16.0.13801.20638','channel': 'Enterprise Deferred'},\n {'fixed_version':'16.0.13801.20638','channel': 'First Release for Deferred'},\n {'fixed_version':'16.0.13929.20372','channel': '2016 Retail'},\n {'fixed_version':'16.0.13929.20372','channel': 'Current'},\n {'fixed_version':'16.0.10374.20040','channel': '2019 Volume'},\n {'fixed_version':'16.0.13929.20372','channel': '2019 Retail'}\n];\n\nvcf::microsoft::office_product::check_version_and_report(\n constraints:constraints,\n severity:SECURITY_WARNING,\n bulletin:bulletin,\n subproduct:'Word'\n);", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:28:43", "description": "The Microsoft Word Products are missing a security update.\nIt is, therefore, affected by the following vulnerability:\n\n - A remote code execution vulnerability. An attacker can exploit this to bypass authentication and execute unauthorized arbitrary commands. (CVE-2021-31180)", "cvss3": {}, "published": "2021-05-11T00:00:00", "type": "nessus", "title": "Security Updates for Microsoft Word Products (May 2021)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-31180"], "modified": "2022-06-10T00:00:00", "cpe": ["cpe:/a:microsoft:word"], "id": "SMB_NT_MS21_MAY_WORD.NASL", "href": "https://www.tenable.com/plugins/nessus/149399", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\n\ninclude('deprecated_nasl_level.inc');\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(149399);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/06/10\");\n\n script_cve_id(\"CVE-2021-31180\");\n script_xref(name:\"MSKB\", value:\"5001919\");\n script_xref(name:\"MSKB\", value:\"5001931\");\n script_xref(name:\"MSFT\", value:\"MS21-5001919\");\n script_xref(name:\"IAVA\", value:\"2021-A-0226-S\");\n script_xref(name:\"MSFT\", value:\"MS21-5001931\");\n\n script_name(english:\"Security Updates for Microsoft Word Products (May 2021)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The Microsoft Word Products are missing a security update.\");\n script_set_attribute(attribute:\"description\", value:\n\"The Microsoft Word Products are missing a security update.\nIt is, therefore, affected by the following vulnerability:\n\n - A remote code execution vulnerability. An attacker can\n exploit this to bypass authentication and execute\n unauthorized arbitrary commands. (CVE-2021-31180)\");\n # https://support.microsoft.com/en-us/topic/description-of-the-security-update-for-word-2013-may-11-2021-kb5001931-b57d12c6-8413-44a7-8474-11c6c3265340\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?7dbdb2a7\");\n # https://support.microsoft.com/en-us/topic/description-of-the-security-update-for-word-2016-may-11-2021-kb5001919-273a8567-13cc-47ad-8346-3f077b73a2de\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?6c507177\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released the following security updates to address this issue: \n -KB5001919\n -KB5001931\n\nFor Office 365, Office 2016 C2R, or Office 2019, ensure automatic\nupdates are enabled or open any office app and manually perform an\nupdate.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-31180\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/05/11\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:word\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"office_installed.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude('smb_func.inc');\ninclude('smb_hotfixes.inc');\ninclude('smb_hotfixes_fcheck.inc');\ninclude('smb_reg_query.inc');\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nvar bulletin = 'MS21-05';\nvar kbs = make_list(\n '5001919',\n '5001931'\n);\n\nif (get_kb_item('Host/patch_management_checks'))\n hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_WARNING);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated', exit_code:1);\n\nvar port = kb_smb_transport();\n\nvar checks = make_array(\n '15.0', make_array('sp', 1, 'version', '15.0.5345.1000', 'kb', '5001931'),\n '16.0', make_nested_list(\n make_array('sp', 0, 'version', '16.0.5161.1000', 'channel', 'MSI', 'kb', '5001919')\n )\n);\n\nif (hotfix_check_office_product(product:'Word', checks:checks, bulletin:bulletin))\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_warning();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, 'affected');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:29:12", "description": "The Microsoft .NET Core installation on the remote host is version 3.1.x prior to 3.1.15 or 5.x prior to 5.0.6. It is, therefore, affected by a privilege elevation vulnerability. An authenticated, local attacker can exploit this to elevate their privileges.\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2021-05-13T00:00:00", "type": "nessus", "title": "Security Update for .NET Core (May 2021) (macOS)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-31204"], "modified": "2021-06-11T00:00:00", "cpe": ["cpe:/a:microsoft:.net_core"], "id": "MACOS_MS21_MAY_DOTNET_CORE.NASL", "href": "https://www.tenable.com/plugins/nessus/149472", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n##\n\ninclude('deprecated_nasl_level.inc');\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(149472);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/06/11\");\n\n script_cve_id(\"CVE-2021-31204\");\n script_xref(name:\"IAVA\", value:\"2021-A-0218-S\");\n\n script_name(english:\"Security Update for .NET Core (May 2021) (macOS)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote macOS host is affected by a .NET Core privilege elevation vulnerability.\");\n script_set_attribute(attribute:\"description\", value:\n\"The Microsoft .NET Core installation on the remote host is version 3.1.x prior to 3.1.15 or 5.x prior to 5.0.6. It is,\ntherefore, affected by a privilege elevation vulnerability. An authenticated, local attacker can exploit this to elevate\ntheir privileges.\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://dotnet.microsoft.com/download/dotnet-core/3.1\");\n script_set_attribute(attribute:\"see_also\", value:\"https://dotnet.microsoft.com/download/dotnet/5.0\");\n script_set_attribute(attribute:\"see_also\", value:\"https://devblogs.microsoft.com/dotnet/net-may-2021/\");\n # https://github.com/dotnet/core/blob/main/release-notes/3.1/3.1.15/3.1.15.md\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?cf5a364b\");\n # https://github.com/dotnet/core/blob/main/release-notes/5.0/5.0.6/5.0.6.md\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?9f5cbba7\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update .NET Core, remove vulnerable packages and refer to vendor advisory.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-31204\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/05/13\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:.net_core\");\n script_set_attribute(attribute:\"stig_severity\", value:\"II\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"MacOS X Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"macosx_dotnet_core_installed.nbin\");\n script_require_keys(\"installed_sw/.NET Core MacOS\");\n\n exit(0);\n}\n\ninclude('vcf.inc');\n\nvar app = '.NET Core MacOS';\nvar app_info = vcf::get_app_info(app:app);\n\nvar constraints = [\n { 'min_version' : '3.1', 'fixed_version' : '3.1.15' },\n { 'min_version' : '5.0', 'fixed_version' : '5.0.6' }\n];\n\nvcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_WARNING);\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:28:51", "description": "The remote Oracle Linux 8 host has packages installed that are affected by a vulnerability as referenced in the ELSA-2021-2036 advisory.\n\n - .NET and Visual Studio Elevation of Privilege Vulnerability (CVE-2021-31204)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2021-05-29T00:00:00", "type": "nessus", "title": "Oracle Linux 8 : dotnet5.0 (ELSA-2021-2036)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-31204"], "modified": "2021-05-29T00:00:00", "cpe": ["cpe:/o:oracle:linux:8", "p-cpe:/a:oracle:linux:aspnetcore-runtime-5.0", "p-cpe:/a:oracle:linux:aspnetcore-targeting-pack-5.0", "p-cpe:/a:oracle:linux:dotnet", "p-cpe:/a:oracle:linux:dotnet-apphost-pack-5.0", "p-cpe:/a:oracle:linux:dotnet-host", "p-cpe:/a:oracle:linux:dotnet-hostfxr-5.0", "p-cpe:/a:oracle:linux:dotnet-runtime-5.0", "p-cpe:/a:oracle:linux:dotnet-sdk-5.0", "p-cpe:/a:oracle:linux:dotnet-targeting-pack-5.0", "p-cpe:/a:oracle:linux:dotnet-templates-5.0", "p-cpe:/a:oracle:linux:netstandard-targeting-pack-2.1"], "id": "ORACLELINUX_ELSA-2021-2036.NASL", "href": "https://www.tenable.com/plugins/nessus/150063", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Oracle Linux Security Advisory ELSA-2021-2036.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(150063);\n script_version(\"1.2\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/05/29\");\n\n script_cve_id(\"CVE-2021-31204\");\n\n script_name(english:\"Oracle Linux 8 : dotnet5.0 (ELSA-2021-2036)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Oracle Linux host is missing a security update.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Oracle Linux 8 host has packages installed that are affected by a vulnerability as referenced in the\nELSA-2021-2036 advisory.\n\n - .NET and Visual Studio Elevation of Privilege Vulnerability (CVE-2021-31204)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://linux.oracle.com/errata/ELSA-2021-2036.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-31204\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/05/29\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/05/29\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:8\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:aspnetcore-runtime-5.0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:aspnetcore-targeting-pack-5.0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:dotnet\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:dotnet-apphost-pack-5.0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:dotnet-host\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:dotnet-hostfxr-5.0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:dotnet-runtime-5.0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:dotnet-sdk-5.0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:dotnet-targeting-pack-5.0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:dotnet-templates-5.0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:netstandard-targeting-pack-2.1\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/local_checks_enabled\");\n\n exit(0);\n}\n\n\ninclude('audit.inc');\ninclude('global_settings.inc');\ninclude('rpm.inc');\n\nif (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item('Host/OracleLinux')) audit(AUDIT_OS_NOT, 'Oracle Linux');\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, 'Oracle Linux');\nos_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'Oracle Linux');\nos_ver = os_ver[1];\nif (! preg(pattern:\"^8([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, 'Oracle Linux 8', 'Oracle Linux ' + os_ver);\n\nif (!get_kb_item('Host/RedHat/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Oracle Linux', cpu);\nif ('x86_64' >!< cpu) audit(AUDIT_ARCH_NOT, 'x86_64', cpu);\n\npkgs = [\n {'reference':'aspnetcore-runtime-5.0-5.0.6-1.0.1.el8_4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'aspnetcore-targeting-pack-5.0-5.0.6-1.0.1.el8_4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'dotnet-5.0.203-1.0.1.el8_4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'dotnet-apphost-pack-5.0-5.0.6-1.0.1.el8_4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'dotnet-host-5.0.6-1.0.1.el8_4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'dotnet-hostfxr-5.0-5.0.6-1.0.1.el8_4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'dotnet-runtime-5.0-5.0.6-1.0.1.el8_4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'dotnet-sdk-5.0-5.0.203-1.0.1.el8_4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'dotnet-targeting-pack-5.0-5.0.6-1.0.1.el8_4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'dotnet-templates-5.0-5.0.203-1.0.1.el8_4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'netstandard-targeting-pack-2.1-5.0.203-1.0.1.el8_4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE}\n];\n\nflag = 0;\nforeach package_array ( pkgs ) {\n reference = NULL;\n release = NULL;\n sp = NULL;\n cpu = NULL;\n el_string = NULL;\n rpm_spec_vers_cmp = NULL;\n epoch = NULL;\n allowmaj = NULL;\n rpm_prefix = NULL;\n if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];\n if (!empty_or_null(package_array['release'])) release = 'EL' + package_array['release'];\n if (!empty_or_null(package_array['sp'])) sp = package_array['sp'];\n if (!empty_or_null(package_array['cpu'])) cpu = package_array['cpu'];\n if (!empty_or_null(package_array['el_string'])) el_string = package_array['el_string'];\n if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];\n if (!empty_or_null(package_array['epoch'])) epoch = package_array['epoch'];\n if (!empty_or_null(package_array['allowmaj'])) allowmaj = package_array['allowmaj'];\n if (!empty_or_null(package_array['rpm_prefix'])) rpm_prefix = package_array['rpm_prefix'];\n if (reference && release) {\n if (rpm_prefix) {\n if (rpm_exists(release:release, rpm:rpm_prefix) && rpm_check(release:release, sp:sp, cpu:cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n } else {\n if (rpm_check(release:release, sp:sp, cpu:cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n }\n }\n}\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'aspnetcore-runtime-5.0 / aspnetcore-targeting-pack-5.0 / dotnet / etc');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:28:48", "description": "The remote Redhat Enterprise Linux 8 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2021:2036 advisory.\n\n - dotnet: .NET Core single-file application privilege escalation (CVE-2021-31204)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2021-05-19T00:00:00", "type": "nessus", "title": "RHEL 8 : dotnet5.0 (RHSA-2021:2036)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-31204"], "modified": "2023-01-23T00:00:00", "cpe": ["cpe:/o:redhat:enterprise_linux:8", "cpe:/o:redhat:rhel_aus:8.4", "cpe:/o:redhat:rhel_aus:8.6", "cpe:/o:redhat:rhel_e4s:8.4", "cpe:/o:redhat:rhel_e4s:8.6", "cpe:/o:redhat:rhel_eus:8.4", "cpe:/o:redhat:rhel_eus:8.6", "cpe:/o:redhat:rhel_tus:8.4", "cpe:/o:redhat:rhel_tus:8.6", "p-cpe:/a:redhat:enterprise_linux:aspnetcore-runtime-5.0", "p-cpe:/a:redhat:enterprise_linux:aspnetcore-targeting-pack-5.0", "p-cpe:/a:redhat:enterprise_linux:dotnet", "p-cpe:/a:redhat:enterprise_linux:dotnet-apphost-pack-5.0", "p-cpe:/a:redhat:enterprise_linux:dotnet-host", "p-cpe:/a:redhat:enterprise_linux:dotnet-hostfxr-5.0", "p-cpe:/a:redhat:enterprise_linux:dotnet-runtime-5.0", "p-cpe:/a:redhat:enterprise_linux:dotnet-sdk-5.0", "p-cpe:/a:redhat:enterprise_linux:dotnet-targeting-pack-5.0", "p-cpe:/a:redhat:enterprise_linux:dotnet-templates-5.0", "p-cpe:/a:redhat:enterprise_linux:netstandard-targeting-pack-2.1"], "id": "REDHAT-RHSA-2021-2036.NASL", "href": "https://www.tenable.com/plugins/nessus/149723", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2021:2036. The text\n# itself is copyright (C) Red Hat, Inc.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(149723);\n script_version(\"1.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/01/23\");\n\n script_cve_id(\"CVE-2021-31204\");\n script_xref(name:\"RHSA\", value:\"2021:2036\");\n script_xref(name:\"IAVA\", value:\"2021-A-0220-S\");\n script_xref(name:\"IAVA\", value:\"2021-A-0218-S\");\n\n script_name(english:\"RHEL 8 : dotnet5.0 (RHSA-2021:2036)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Red Hat host is missing a security update.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Redhat Enterprise Linux 8 host has packages installed that are affected by a vulnerability as referenced in\nthe RHSA-2021:2036 advisory.\n\n - dotnet: .NET Core single-file application privilege escalation (CVE-2021-31204)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2021-31204\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/errata/RHSA-2021:2036\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1956815\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-31204\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(273);\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/05/19\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/05/19\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:8\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_aus:8.4\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_aus:8.6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_e4s:8.4\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_e4s:8.6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_eus:8.4\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_eus:8.6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_tus:8.4\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_tus:8.6\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:aspnetcore-runtime-5.0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:aspnetcore-targeting-pack-5.0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:dotnet\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:dotnet-apphost-pack-5.0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:dotnet-host\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:dotnet-hostfxr-5.0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:dotnet-runtime-5.0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:dotnet-sdk-5.0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:dotnet-targeting-pack-5.0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:dotnet-templates-5.0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:netstandard-targeting-pack-2.1\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"redhat_repos.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude('rpm.inc');\ninclude('rhel.inc');\n\nif (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nvar os_release = get_kb_item('Host/RedHat/release');\nif (isnull(os_release) || 'Red Hat' >!< os_release) audit(AUDIT_OS_NOT, 'Red Hat');\nvar os_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:os_release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'Red Hat');\nos_ver = os_ver[1];\nif (!rhel_check_release(operator: 'ge', os_version: os_ver, rhel_version: '8')) audit(AUDIT_OS_NOT, 'Red Hat 8.x', 'Red Hat ' + os_ver);\n\nif (!get_kb_item('Host/RedHat/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Red Hat', cpu);\n\nvar constraints = [\n {\n 'repo_relative_urls': [\n 'content/aus/rhel8/8.4/x86_64/appstream/debug',\n 'content/aus/rhel8/8.4/x86_64/appstream/os',\n 'content/aus/rhel8/8.4/x86_64/appstream/source/SRPMS',\n 'content/aus/rhel8/8.4/x86_64/baseos/debug',\n 'content/aus/rhel8/8.4/x86_64/baseos/os',\n 'content/aus/rhel8/8.4/x86_64/baseos/source/SRPMS',\n 'content/e4s/rhel8/8.4/x86_64/appstream/debug',\n 'content/e4s/rhel8/8.4/x86_64/appstream/os',\n 'content/e4s/rhel8/8.4/x86_64/appstream/source/SRPMS',\n 'content/e4s/rhel8/8.4/x86_64/baseos/debug',\n 'content/e4s/rhel8/8.4/x86_64/baseos/os',\n 'content/e4s/rhel8/8.4/x86_64/baseos/source/SRPMS',\n 'content/e4s/rhel8/8.4/x86_64/highavailability/debug',\n 'content/e4s/rhel8/8.4/x86_64/highavailability/os',\n 'content/e4s/rhel8/8.4/x86_64/highavailability/source/SRPMS',\n 'content/e4s/rhel8/8.4/x86_64/sap-solutions/debug',\n 'content/e4s/rhel8/8.4/x86_64/sap-solutions/os',\n 'content/e4s/rhel8/8.4/x86_64/sap-solutions/source/SRPMS',\n 'content/e4s/rhel8/8.4/x86_64/sap/debug',\n 'content/e4s/rhel8/8.4/x86_64/sap/os',\n 'content/e4s/rhel8/8.4/x86_64/sap/source/SRPMS',\n 'content/eus/rhel8/8.4/x86_64/appstream/debug',\n 'content/eus/rhel8/8.4/x86_64/appstream/os',\n 'content/eus/rhel8/8.4/x86_64/appstream/source/SRPMS',\n 'content/eus/rhel8/8.4/x86_64/baseos/debug',\n 'content/eus/rhel8/8.4/x86_64/baseos/os',\n 'content/eus/rhel8/8.4/x86_64/baseos/source/SRPMS',\n 'content/eus/rhel8/8.4/x86_64/codeready-builder/debug',\n 'content/eus/rhel8/8.4/x86_64/codeready-builder/os',\n 'content/eus/rhel8/8.4/x86_64/codeready-builder/source/SRPMS',\n 'content/eus/rhel8/8.4/x86_64/highavailability/debug',\n 'content/eus/rhel8/8.4/x86_64/highavailability/os',\n 'content/eus/rhel8/8.4/x86_64/highavailability/source/SRPMS',\n 'content/eus/rhel8/8.4/x86_64/resilientstorage/debug',\n 'content/eus/rhel8/8.4/x86_64/resilientstorage/os',\n 'content/eus/rhel8/8.4/x86_64/resilientstorage/source/SRPMS',\n 'content/eus/rhel8/8.4/x86_64/sap-solutions/debug',\n 'content/eus/rhel8/8.4/x86_64/sap-solutions/os',\n 'content/eus/rhel8/8.4/x86_64/sap-solutions/source/SRPMS',\n 'content/eus/rhel8/8.4/x86_64/sap/debug',\n 'content/eus/rhel8/8.4/x86_64/sap/os',\n 'content/eus/rhel8/8.4/x86_64/sap/source/SRPMS',\n 'content/eus/rhel8/8.4/x86_64/supplementary/debug',\n 'content/eus/rhel8/8.4/x86_64/supplementary/os',\n 'content/eus/rhel8/8.4/x86_64/supplementary/source/SRPMS',\n 'content/tus/rhel8/8.4/x86_64/appstream/debug',\n 'content/tus/rhel8/8.4/x86_64/appstream/os',\n 'content/tus/rhel8/8.4/x86_64/appstream/source/SRPMS',\n 'content/tus/rhel8/8.4/x86_64/baseos/debug',\n 'content/tus/rhel8/8.4/x86_64/baseos/os',\n 'content/tus/rhel8/8.4/x86_64/baseos/source/SRPMS',\n 'content/tus/rhel8/8.4/x86_64/highavailability/debug',\n 'content/tus/rhel8/8.4/x86_64/highavailability/os',\n 'content/tus/rhel8/8.4/x86_64/highavailability/source/SRPMS',\n 'content/tus/rhel8/8.4/x86_64/nfv/debug',\n 'content/tus/rhel8/8.4/x86_64/nfv/os',\n 'content/tus/rhel8/8.4/x86_64/nfv/source/SRPMS',\n 'content/tus/rhel8/8.4/x86_64/rt/debug',\n 'content/tus/rhel8/8.4/x86_64/rt/os',\n 'content/tus/rhel8/8.4/x86_64/rt/source/SRPMS'\n ],\n 'pkgs': [\n {'reference':'aspnetcore-runtime-5.0-5.0.6-1.el8_4', 'sp':'4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'aspnetcore-targeting-pack-5.0-5.0.6-1.el8_4', 'sp':'4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'dotnet-5.0.203-1.el8_4', 'sp':'4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'dotnet-apphost-pack-5.0-5.0.6-1.el8_4', 'sp':'4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'dotnet-host-5.0.6-1.el8_4', 'sp':'4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'dotnet-hostfxr-5.0-5.0.6-1.el8_4', 'sp':'4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'dotnet-runtime-5.0-5.0.6-1.el8_4', 'sp':'4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'dotnet-sdk-5.0-5.0.203-1.el8_4', 'sp':'4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'dotnet-targeting-pack-5.0-5.0.6-1.el8_4', 'sp':'4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'dotnet-templates-5.0-5.0.203-1.el8_4', 'sp':'4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'netstandard-targeting-pack-2.1-5.0.203-1.el8_4', 'sp':'4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE}\n ]\n },\n {\n 'repo_relative_urls': [\n 'content/aus/rhel8/8.6/x86_64/appstream/debug',\n 'content/aus/rhel8/8.6/x86_64/appstream/os',\n 'content/aus/rhel8/8.6/x86_64/appstream/source/SRPMS',\n 'content/aus/rhel8/8.6/x86_64/baseos/debug',\n 'content/aus/rhel8/8.6/x86_64/baseos/os',\n 'content/aus/rhel8/8.6/x86_64/baseos/source/SRPMS',\n 'content/e4s/rhel8/8.6/x86_64/appstream/debug',\n 'content/e4s/rhel8/8.6/x86_64/appstream/os',\n 'content/e4s/rhel8/8.6/x86_64/appstream/source/SRPMS',\n 'content/e4s/rhel8/8.6/x86_64/baseos/debug',\n 'content/e4s/rhel8/8.6/x86_64/baseos/os',\n 'content/e4s/rhel8/8.6/x86_64/baseos/source/SRPMS',\n 'content/e4s/rhel8/8.6/x86_64/highavailability/debug',\n 'content/e4s/rhel8/8.6/x86_64/highavailability/os',\n 'content/e4s/rhel8/8.6/x86_64/highavailability/source/SRPMS',\n 'content/e4s/rhel8/8.6/x86_64/sap-solutions/debug',\n 'content/e4s/rhel8/8.6/x86_64/sap-solutions/os',\n 'content/e4s/rhel8/8.6/x86_64/sap-solutions/source/SRPMS',\n 'content/e4s/rhel8/8.6/x86_64/sap/debug',\n 'content/e4s/rhel8/8.6/x86_64/sap/os',\n 'content/e4s/rhel8/8.6/x86_64/sap/source/SRPMS',\n 'content/eus/rhel8/8.6/x86_64/appstream/debug',\n 'content/eus/rhel8/8.6/x86_64/appstream/os',\n 'content/eus/rhel8/8.6/x86_64/appstream/source/SRPMS',\n 'content/eus/rhel8/8.6/x86_64/baseos/debug',\n 'content/eus/rhel8/8.6/x86_64/baseos/os',\n 'content/eus/rhel8/8.6/x86_64/baseos/source/SRPMS',\n 'content/eus/rhel8/8.6/x86_64/codeready-builder/debug',\n 'content/eus/rhel8/8.6/x86_64/codeready-builder/os',\n 'content/eus/rhel8/8.6/x86_64/codeready-builder/source/SRPMS',\n 'content/eus/rhel8/8.6/x86_64/highavailability/debug',\n 'content/eus/rhel8/8.6/x86_64/highavailability/os',\n 'content/eus/rhel8/8.6/x86_64/highavailability/source/SRPMS',\n 'content/eus/rhel8/8.6/x86_64/resilientstorage/debug',\n 'content/eus/rhel8/8.6/x86_64/resilientstorage/os',\n 'content/eus/rhel8/8.6/x86_64/resilientstorage/source/SRPMS',\n 'content/eus/rhel8/8.6/x86_64/sap-solutions/debug',\n 'content/eus/rhel8/8.6/x86_64/sap-solutions/os',\n 'content/eus/rhel8/8.6/x86_64/sap-solutions/source/SRPMS',\n 'content/eus/rhel8/8.6/x86_64/sap/debug',\n 'content/eus/rhel8/8.6/x86_64/sap/os',\n 'content/eus/rhel8/8.6/x86_64/sap/source/SRPMS',\n 'content/eus/rhel8/8.6/x86_64/supplementary/debug',\n 'content/eus/rhel8/8.6/x86_64/supplementary/os',\n 'content/eus/rhel8/8.6/x86_64/supplementary/source/SRPMS',\n 'content/tus/rhel8/8.6/x86_64/appstream/debug',\n 'content/tus/rhel8/8.6/x86_64/appstream/os',\n 'content/tus/rhel8/8.6/x86_64/appstream/source/SRPMS',\n 'content/tus/rhel8/8.6/x86_64/baseos/debug',\n 'content/tus/rhel8/8.6/x86_64/baseos/os',\n 'content/tus/rhel8/8.6/x86_64/baseos/source/SRPMS',\n 'content/tus/rhel8/8.6/x86_64/highavailability/debug',\n 'content/tus/rhel8/8.6/x86_64/highavailability/os',\n 'content/tus/rhel8/8.6/x86_64/highavailability/source/SRPMS',\n 'content/tus/rhel8/8.6/x86_64/rt/os',\n 'content/tus/rhel8/8.6/x86_64/rt/source/SRPMS'\n ],\n 'pkgs': [\n {'reference':'aspnetcore-runtime-5.0-5.0.6-1.el8_4', 'sp':'6', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'aspnetcore-targeting-pack-5.0-5.0.6-1.el8_4', 'sp':'6', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'dotnet-5.0.203-1.el8_4', 'sp':'6', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'dotnet-apphost-pack-5.0-5.0.6-1.el8_4', 'sp':'6', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'dotnet-host-5.0.6-1.el8_4', 'sp':'6', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'dotnet-hostfxr-5.0-5.0.6-1.el8_4', 'sp':'6', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'dotnet-runtime-5.0-5.0.6-1.el8_4', 'sp':'6', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'dotnet-sdk-5.0-5.0.203-1.el8_4', 'sp':'6', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'dotnet-targeting-pack-5.0-5.0.6-1.el8_4', 'sp':'6', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'dotnet-templates-5.0-5.0.203-1.el8_4', 'sp':'6', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'netstandard-targeting-pack-2.1-5.0.203-1.el8_4', 'sp':'6', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE}\n ]\n },\n {\n 'repo_relative_urls': [\n 'content/dist/rhel8/8/x86_64/appstream/debug',\n 'content/dist/rhel8/8/x86_64/appstream/os',\n 'content/dist/rhel8/8/x86_64/appstream/source/SRPMS',\n 'content/dist/rhel8/8/x86_64/baseos/debug',\n 'content/dist/rhel8/8/x86_64/baseos/os',\n 'content/dist/rhel8/8/x86_64/baseos/source/SRPMS',\n 'content/dist/rhel8/8/x86_64/codeready-builder/debug',\n 'content/dist/rhel8/8/x86_64/codeready-builder/os',\n 'content/dist/rhel8/8/x86_64/codeready-builder/source/SRPMS',\n 'content/dist/rhel8/8/x86_64/highavailability/debug',\n 'content/dist/rhel8/8/x86_64/highavailability/os',\n 'content/dist/rhel8/8/x86_64/highavailability/source/SRPMS',\n 'content/dist/rhel8/8/x86_64/nfv/debug',\n 'content/dist/rhel8/8/x86_64/nfv/os',\n 'content/dist/rhel8/8/x86_64/nfv/source/SRPMS',\n 'content/dist/rhel8/8/x86_64/resilientstorage/debug',\n 'content/dist/rhel8/8/x86_64/resilientstorage/os',\n 'content/dist/rhel8/8/x86_64/resilientstorage/source/SRPMS',\n 'content/dist/rhel8/8/x86_64/rt/debug',\n 'content/dist/rhel8/8/x86_64/rt/os',\n 'content/dist/rhel8/8/x86_64/rt/source/SRPMS',\n 'content/dist/rhel8/8/x86_64/sap-solutions/debug',\n 'content/dist/rhel8/8/x86_64/sap-solutions/os',\n 'content/dist/rhel8/8/x86_64/sap-solutions/source/SRPMS',\n 'content/dist/rhel8/8/x86_64/sap/debug',\n 'content/dist/rhel8/8/x86_64/sap/os',\n 'content/dist/rhel8/8/x86_64/sap/source/SRPMS',\n 'content/dist/rhel8/8/x86_64/supplementary/debug',\n 'content/dist/rhel8/8/x86_64/supplementary/os',\n 'content/dist/rhel8/8/x86_64/supplementary/source/SRPMS'\n ],\n 'pkgs': [\n {'reference':'aspnetcore-runtime-5.0-5.0.6-1.el8_4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'aspnetcore-targeting-pack-5.0-5.0.6-1.el8_4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'dotnet-5.0.203-1.el8_4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'dotnet-apphost-pack-5.0-5.0.6-1.el8_4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'dotnet-host-5.0.6-1.el8_4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'dotnet-hostfxr-5.0-5.0.6-1.el8_4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'dotnet-runtime-5.0-5.0.6-1.el8_4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'dotnet-sdk-5.0-5.0.203-1.el8_4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'dotnet-targeting-pack-5.0-5.0.6-1.el8_4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'dotnet-templates-5.0-5.0.203-1.el8_4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'netstandard-targeting-pack-2.1-5.0.203-1.el8_4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE}\n ]\n }\n];\n\nvar applicable_repo_urls = rhel_determine_applicable_repository_urls(constraints:constraints);\nif(applicable_repo_urls == RHEL_REPOS_NO_OVERLAP_MESSAGE) exit(0, RHEL_REPO_NOT_ENABLED);\n\nvar flag = 0;\nforeach var constraint_array ( constraints ) {\n var repo_relative_urls = NULL;\n if (!empty_or_null(constraint_array['repo_relative_urls'])) repo_relative_urls = constraint_array['repo_relative_urls'];\n var enterprise_linux_flag = rhel_repo_urls_has_content_dist_rhel(repo_urls:repo_relative_urls);\n foreach var pkg ( constraint_array['pkgs'] ) {\n var reference = NULL;\n var _release = NULL;\n var sp = NULL;\n var _cpu = NULL;\n var el_string = NULL;\n var rpm_spec_vers_cmp = NULL;\n var epoch = NULL;\n var allowmaj = NULL;\n var exists_check = NULL;\n if (!empty_or_null(pkg['reference'])) reference = pkg['reference'];\n if (!empty_or_null(pkg['release'])) _release = 'RHEL' + pkg['release'];\n if (!empty_or_null(pkg['sp']) && !enterprise_linux_flag) sp = pkg['sp'];\n if (!empty_or_null(pkg['cpu'])) _cpu = pkg['cpu'];\n if (!empty_or_null(pkg['el_string'])) el_string = pkg['el_string'];\n if (!empty_or_null(pkg['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = pkg['rpm_spec_vers_cmp'];\n if (!empty_or_null(pkg['epoch'])) epoch = pkg['epoch'];\n if (!empty_or_null(pkg['allowmaj'])) allowmaj = pkg['allowmaj'];\n if (!empty_or_null(pkg['exists_check'])) exists_check = pkg['exists_check'];\n if (reference &&\n _release &&\n rhel_decide_repo_relative_url_check(required_repo_url_list:repo_relative_urls) &&\n (applicable_repo_urls || (!exists_check || rpm_exists(release:_release, rpm:exists_check))) &&\n rpm_check(release:_release, sp:sp, cpu:_cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n }\n}\n\nif (flag)\n{\n var extra = NULL;\n if (empty_or_null(applicable_repo_urls)) extra = rpm_report_get() + redhat_report_repo_caveat();\n else extra = rpm_report_get() + redhat_report_package_caveat();\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : extra\n );\n exit(0);\n}\nelse\n{\n var tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'aspnetcore-runtime-5.0 / aspnetcore-targeting-pack-5.0 / dotnet / etc');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:28:19", "description": "The Microsoft Office product installed on the remote host is missing security updates. It is, therefore, affected by a remote code execution vulnerability in Excel.\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2021-05-12T00:00:00", "type": "nessus", "title": "Security Updates for Microsoft Office (May 2021) (macOS)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-31177"], "modified": "2021-06-11T00:00:00", "cpe": ["cpe:/a:microsoft:office", "cpe:/a:microsoft:excel"], "id": "MACOS_MS21_MAY_OFFICE.NASL", "href": "https://www.tenable.com/plugins/nessus/149433", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n##\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\n\ninclude('deprecated_nasl_level.inc');\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(149433);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/06/11\");\n\n script_cve_id(\"CVE-2021-31177\");\n script_xref(name:\"IAVA\", value:\"2021-A-0225-S\");\n\n script_name(english:\"Security Updates for Microsoft Office (May 2021) (macOS)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The Microsoft Office product installed on the remote host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The Microsoft Office product installed on the remote host is missing security updates. It is, therefore, affected by\na remote code execution vulnerability in Excel.\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version \nnumber.\");\n # https://docs.microsoft.com/en-us/officeupdates/release-notes-office-for-mac#may-11-2021\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?9d295e80\");\n # https://docs.microsoft.com/en-us/officeupdates/update-history-office-for-mac\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?43ed1b90\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released a set of patches for Microsoft Office for Mac.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-31177\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/05/12\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:office\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:excel\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"MacOS X Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"macosx_office_installed.nbin\");\n script_require_keys(\"Host/MacOSX/Version\");\n script_require_ports(\"installed_sw/Microsoft Excel\");\n\n exit(0);\n}\n\ninclude('vcf.inc');\n\nvar os = get_kb_item_or_exit('Host/MacOSX/Version');\nvar apps = make_list('Microsoft Excel');\nvar report = '';\n\n#2019\nvar min_ver_19 = '16.17.0';\nvar fix_ver_19 = '16.49';\nvar fix_disp_19 = '16.49 (21050901)';\n\nforeach var app (apps)\n{\n var installs = get_installs(app_name:app);\n if (isnull(installs[1]))\n continue;\n\n foreach var install (installs[1])\n {\n var version = install['version'];\n\n if (ver_compare(ver:version, minver:min_ver_19, fix:fix_ver_19, strict:FALSE) < 0)\n {\n var app_label = app + ' for Mac 2019';\n report +=\n '\\n\\n Product : ' + app_label +\n '\\n Installed version : ' + version +\n '\\n Fixed version : ' + fix_disp_19;\n }\n }\n}\nif (empty(report))\n audit(AUDIT_HOST_NOT, 'affected');\n\nif (os =~ \"^Mac OS X 10\\.([0-9]([^0-9]|$)|1[0-3])\")\n report += '\\n Note : Update will require Mac OS X 10.14.0 or later.\\n';\n\nsecurity_report_v4(severity:SECURITY_WARNING, port:0, extra:report);\n", "cvss": {"score": 0.0, "vector": "NONE"}}], "threatpost": [{"lastseen": "2021-05-11T23:10:25", "description": "Microsoft\u2019s May Patch Tuesday release addressed a modest 55 cybersecurity vulnerabilities, including just four critical bugs. It\u2019s the smallest monthly update from the computing giant since 2020, but it does contain a patch for a concerning wormable vulnerability found in the Windows OS.\n\nThe good news is that none of the vulnerabilities are being actively exploited in the wild, according to Microsoft, though three are listed as publicly known.\n\n[The fixes](<https://msrc.microsoft.com/update-guide/en-us>) address security flaws across Microsoft Windows, .NET Core and Visual Studio, Internet Explorer (IE), Microsoft Office, SharePoint Server, Open-Source Software, Hyper-V, Skype for Business and Microsoft Lync, and Exchange Server. Besides the four critical bugs, 50 are rated \u201cimportant\u201d and one is moderate in severity.\n\n## **Critical Microsoft Security Patches for May 2021**\n\nThe critical bugs in this month\u2019s Patch Tuesday release are:\n\n * [CVE-2021-31166](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31166>): A wormable HTTP protocol-stack issue in Windows 10 and some versions of Windows Server allowing remote code-execution (RCE)\n * [CVE-2021-26419](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-26419>): A scripting-engine memory corruption vulnerability in Internet Explorer 11 and 9 allowing RCE\n * [CVE-2021-31194](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31194>): An RCE bug in the Microsoft Windows Object Linking and Embedding (OLE) Automation\n * [CVE-2021-28476](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-28476>): An RCE vulnerability in Microsoft Windows Hyper-V\n\n### **CVE-2021-31166 \u2013 Wormable**\n\nThis most concerning critical bug for researchers is an HTTP protocol-stack issue that would allow RCE with kernel privileges or a denial-of-service (DoS) attack. The HTTP protocol stack enables Windows and applications to communicate with other devices; it can be run standalone or in conjunction with Internet Information Services (IIS).\n\n\u201cIf exploited, this vulnerability could enable an unauthenticated attacker to send a specially crafted packet to a targeted server utilizing the HTTP protocol stack (http.sys) to process packets and ultimately, execute arbitrary code, and take control of the affected system,\u201d Eric Feldman, cybersecurity researcher with Automox, wrote in [an analysis](<https://blog.automox.com/automox-experts-weigh-in-may-patch-tuesday-2021>).\n\nWorse, Microsoft noted that the bug is wormable, so that it could be used to self-replicate across the internal network and affect internal services that may not have been exposed.\n\n\u201cThe vulnerability announced has the potential to be both directly impactful and is also exceptionally simple to exploit, leading to a remote and unauthenticated DoS (Blue Screen of Death) for affected products,\u201d Steve Povolny, head of advanced threat research and principle engineer at McAfee, said via email. \u201cWhile this vulnerability has the potential to lead to code execution in the Windows kernel, this type of weaponization is a much higher bar for exploitation. However, if RCE can be achieved, cybercriminals would likely have the capability to create a worm, leading to self-propagation of the vulnerability across networks and the internet.\u201d\n\n\u201cFor ransomware operators, this kind of vulnerability is a prime target for exploitation,\u201d Kevin Breen, director of cyber-threat research at Immersive Labs, told Threatpost. \u201cWormable exploits should always be a high priority, especially if they are for services that are designed to be public facing. As this specific exploit would not require any form of authentication, it\u2019s even more appealing for attackers, and any organization using HTTP.sys protocol stack should prioritize this patch.\u201d\n\nDustin Childs, researcher with Trend Micro\u2019s Zero Day Initiative (ZDI), noted [in a blog](<https://www.zerodayinitiative.com/blog/2021/5/11/the-may-2021-security-update-review>), \u201cBefore you pass this aside, Windows 10 can also be configured as a web server, so it is impacted as well. Definitely put this on the top of your test-and-deploy list.\u201d\n\n### **CVE-2021-26419**\n\nThis second critical bug affecting Microsoft\u2019s legacy browser allows RCE, and offers several avenues of attack, according to researchers.\n\n\u201cIn a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability through Internet Explorer and then convince a user to view the website,\u201d explained Feldman. \u201cAn attacker could also embed an ActiveX control marked \u2018safe for initialization\u2019 in an application or Microsoft Office document that hosts the IE rendering engine. The attacker could also take advantage of compromised websites and websites that accept or host user-provided content or advertisements. These websites could contain specially crafted content that could exploit the vulnerability.\u201d\n\nThe best way to counteract this bug is ditching IE, noted Breen.\n\n\u201cInternet Explorer needs to die \u2013 and I\u2019m not the only one that thinks so,\u201d he told Threatpost. \u201cIf you are an organization that has to provide IE11 to support legacy applications, consider enforcing a policy on the users that restricts the domains that can be accessed by IE11 to only those legacy applications. All other web browsing should be performed with a supported browser.\u201d\n\n### **CVE-2021-31194**\n\nThe third critical bug exists in the Microsoft Windows OLE Automation, which in and of itself should place it on the priority-patch list, according to researchers.\n\n\u201cTo exploit the vulnerability, an attacker could host a specially crafted website designed to invoke OLE automation through a web browser,\u201d explained Justin Knapp, Automox researcher. \u201cHowever, this approach requires that the attacker bait a user into visiting the maliciously crafted website.\u201d\n\nHe pointed out that OLE technology has frequently been used to mask malicious code within documents and for linking to external files that infect systems with malware.\n\n\u201cIn 2020, the CISA released an alert detailing the top 10 routinely exploited vulnerabilities, which identified Microsoft\u2019s OLE as the most commonly exploited technology by state-sponsored cyber-actors,\u201d he said. \u201cConsidering the prevalent exploitation of OLE vulnerabilities, including those that had been flagged years ago, organizations should immediately prioritize patching all outstanding OLE vulnerabilities.\u201d\n\n### **CVE-2021-28476**\n\nThe last critical bug is found in Windows Hyper-V, which is a native hypervisor that can create and run virtual machines on x86-64 systems running Windows. It can allow an attacker to execute arbitrary code, Knapp said: \u201cTo exploit this vulnerability, an attacker could run a specially crafted application on a Hyper-V guest that could cause the Hyper-V host operating system to execute arbitrary code when it fails to properly validate vSMB packet data. Successful exploitation could enable an attacker to run malicious binaries on Hyper-V virtual machines or execute arbitrary code on the host system itself.\u201d\n\nThat said, Microsoft noted that an attacker is more likely to abuse the bug for DoS attacks in the form of a system crash rather than RCE, Childs pointed out, which mitigates the vulnerability\u2019s CVSS score of 9.9.\n\n\u201cBecause of this, it could be argued that the attack complexity would be high, which changes the CVSS rating to 8.5,\u201d he said. \u201cThat still rates as high-severity, but not critical. Still, the bug check [system crash] alone is worth making sure your Hyper-V systems get this update.\u201d\n\n## **Publicly Disclosed Vulnerabilities**\n\nChris Goettl, senior director of product management at Ivanti, told Threatpost that the biggest patching priority should be the publicly disclosed bugs \u2013 even though there is as yet no known malicious exploitation.\n\n\u201cThe top concern from the Microsoft updates this month is the update for Microsoft Exchange that includes the fix for [CVE-2021-31207](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-31207>), which made its debut in the [2021 Pwn2Own competition](<https://www.zerodayinitiative.com/blog/2021/4/2/pwn2own-2021-schedule-and-live-results>),\u201d he said.\n\nThe bug tracked as CVE-2021-31207 is only rated as \u201cmoderate,\u201d but the \u201csecurity feature-bypass exploit was showcased prominently in the Pwn2Own contest and at some point details of the exploit will be published,\u201d Goettl explained. \u201cAt that point threat actors will be able to take advantage of the vulnerability if they have not already begun attempting to reverse engineer an exploit.\u201d\n\nThere two other publicly disclosed vulnerabilities resolved by Microsoft this month that exist in Common Utilities, found in the NNI open-source toolkit ([CVE-2021-31200](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-31200>)), and in .NET and Visual Studio ([CVE-2021-31204](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-31204>)).\n\n\u201cCommon Utilities and .NET and Visual Studio are less likely to be targeted, but due to the public disclosures they should not be ignored for long,\u201d Goettl added.\n\n## **Other Notable Microsoft Security Patches for May 2021**\n\nAs for the other patches in the update that stood out to the research community, ZDI\u2019s Childs highlighted a Windows wireless networking information-disclosure bug, tracked as [CVE-2020-24587](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-24587>).\n\n\u201cThe ZDI doesn\u2019t normally highlight info disclosure bugs, but this one has the potential to be pretty damaging,\u201d Childs said. \u201cThis patch fixes a vulnerability that could allow an attacker to disclose the contents of encrypted wireless packets on an affected system. It\u2019s not clear what the range on such an attack would be, but you should assume some proximity is needed. You\u2019ll also note this CVE is from 2020, which could indicate Microsoft has been working on this fix for some time.\u201d\n\n### **Windows Graphics, SharePoint Server Patches**\n\nA trio of local privilege escalation flaws \u2013 two in the Windows Graphics Component ([CVE-2021-31188](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31188>), [CVE-2021-31170](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31170>)) and one in SharePoint Server ([CVE-2021-28474](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-28474>)) \u2013 caught Breen\u2019s eye.\n\nAs for the first two, he noted they could be chained with another bug, such as the wormable bug listed above, to become highly dangerous and allow for [WannaCry-style attacks](<https://threatpost.com/one-year-after-wannacry-a-fundamentally-changed-threat-landscape/132047/>).\n\n\u201cThis kind of vulnerability is often used by attackers after they have already gained a foothold through an initial infection vector, like phishing or via another exploit like the RCE in HTTP.sys (CVE-2021-31166),\u201d Breen noted via email. \u201cThe attackers are looking to increase their privileges so they can move laterally across a network or gain access to other accounts that may have access to more sensitive information.\u201d\n\nMeanwhile, the SharePoint bug allows an authenticated attacker to run code on remote SharePoint Servers.\n\n\u201cAs this is post-authentication, it\u2019s likely to be used as part of post-exploitation and lateral movement phases of an attack, rather than the initial-infection vector,\u201d Breen said. \u201cAttackers could gain access to sensitive documents or even replace real documents with weaponized versions, enabling the compromise of more user devices across the organization\u2019s network.\u201d\n\n### **Microsoft Exchange Server Patches**\n\nMicrosoft also patched four vulnerabilities in Microsoft Exchange Server. The flaws ([CVE-2021-31198](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31198>), RCE; [CVE-2021-31207](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31207>), spoofing; [CVE-2021-31209](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31209>), security bypass; and [CVE-2021-31195](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31195>), RCE), are all rated important or moderate.\n\n\u201cCVE-2021-31195 is attributed to Orange Tsai of the DEVCORE research team, who was responsible for disclosing the [ProxyLogon Exchange Server](<https://threatpost.com/fbi-proxylogon-web-shells/165400/>) vulnerabilities that [were] patched in an out-of-band release back in March,\u201d Satnam Narang, staff research engineer with Tenable, told Threatpost. \u201cWhile none of these flaws are deemed critical in nature, it is a reminder that researchers and attackers are still looking closely at Exchange Server for additional vulnerabilities, so organizations that have yet to update their systems should do so as soon as possible.\u201d\n\nAnd finally, Ivanti\u2019s Goettl noted that several Microsoft products have reached end-of-life and won\u2019t be getting support going forward.\n\n\u201cThis month marks the final update for several Windows 10 and Server editions, so make sure you have updated any systems to newer branches to avoid a disruption in security update coverage come June,\u201d he said. \u201cWindows 10 1803 and 1809 and Server 1909 all received their final update on May Patch Tuesday 2021.\u201d\n\n**Join Threatpost for \u201c**[**Fortifying Your Business Against Ransomware, DDoS & Cryptojacking Attacks**](<https://threatpost.com/webinars/fortifying-your-business-against-attacks/?utm_source=ART&utm_medium=ART&utm_campaign=May_Zoho_Webinar>)**\u201d \u2013 a LIVE roundtable event on**[** Wed, May 12 at 2:00 PM EDT**](<https://threatpost.com/webinars/fortifying-your-business-against-attacks/?utm_source=ART&utm_medium=ART&utm_campaign=May_Zoho_Webinarhttps://threatpost.com/webinars/fortifying-your-business-against-attacks/?utm_source=ART&utm_medium=ART&utm_campaign=May_Zoho_Webinar>)**. Sponsored by Zoho ManageEngine, Threatpost host Becky Bracken moderates an expert panel discussing best defense strategies for these 2021 threats. Questions and LIVE audience participation encouraged. Join the lively discussion and **[**Register HERE**](<https://threatpost.com/webinars/fortifying-your-business-against-attacks/?utm_source=ART&utm_medium=ART&utm_campaign=May_Zoho_Webinar>)** for free. **\n", "cvss3": {}, "published": "2021-05-11T20:05:44", "type": "threatpost", "title": "Wormable Windows Bug Opens Door to DoS, RCE", "bulletinFamily": "info", "cvss2": {}, "cvelist": ["CVE-2020-24587", "CVE-2021-26419", "CVE-2021-28474", "CVE-2021-28476", "CVE-2021-31166", "CVE-2021-31170", "CVE-2021-31188", "CVE-2021-31194", "CVE-2021-31195", "CVE-2021-31198", "CVE-2021-31200", "CVE-2021-31204", "CVE-2021-31207", "CVE-2021-31209"], "modified": "2021-05-11T20:05:44", "id": "THREATPOST:A2FE619CD27EBEC2F6B0C62ED026F02C", "href": "https://threatpost.com/wormable-windows-bug-dos-rce/166057/", "cvss": {"score": 0.0, "vector": "NONE"}}], "mskb": [{"lastseen": "2023-06-23T19:31:48", "description": "None\n## Summary\n\nThis security update resolves a Microsoft SharePoint Server remote code execution vulnerability, information disclosure vulnerability, and spoofing vulnerability, and Microsoft SharePoint remote code execution vulnerability and information disclosure vulnerability. To learn more about these vulnerabilities, see:\n\n * [Microsoft Common Vulnerabilities and Exposures CVE-2021-26418](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-26418>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2021-28474](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-28474>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2021-28478](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-28478>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2021-31171](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31171>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2021-31172](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31172>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2021-31173](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31173>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2021-31181](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31181>)\n\n**Note: **To apply this security update, you must have the release version of [Service Pack 1 for Microsoft SharePoint Foundation 2013 ](<http://support.microsoft.com/kb/2880551>)installed on the computer.\n\n## Improvements and fixes\n\nThis security update contains fixes for the following nonsecurity issues:\n\n * Fixes the incompatible issue that's caused by the deprecation of the showModalDialog API in modern browsers.\n * Fixes an issue in which SharePoint Designer doesn't work well for the site that disables the wiki home page feature.\n\n## How to get and install the update\n\n### Method 1: Microsoft Update\n\nThis update is available from Microsoft Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see [Windows Update: FAQ](<https://support.microsoft.com/help/12373/windows-update-faq>).\n\n### Method 2: Microsoft Update Catalog\n\nTo get the standalone package for this update, go to the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/Search.aspx?q=KB5001935>) website.\n\n### Method 3: Microsoft Download Center\n\nYou can get the standalone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.\n\n * [Download security update 5001935 for the 64-bit version of SharePoint Foundation 2013](<http://www.microsoft.com/download/details.aspx?familyid=6830da9c-09be-44a0-a565-03638b030d89>)\n\n## More information\n\n### Security update deployment information\n\nFor deployment information about this update, see Security update deployment information: May 11, 2021 (KB5001871).\n\n### Security update replacement information\n\nThis security update replaces previously released security update [4493238](<https://support.microsoft.com/kb/4493238>).\n\n### File hash information\n\nFile name| | SHA256 hash \n---|---|--- \nsts2013-kb5001935-fullfile-x64-glb.exe| | C75DE561D55437E6951B7AFD08B1C29411721D6A3E3176D9E3044F9EB478ADC2 \n \n### File information\n\nThe English (United States) version of this software update installs files that have the attributes that are listed in the following table. The dates and times for these files are listed in Coordinated Universal Time (UTC). The dates and times for these files on your local computer are displayed in your local time together with your current daylight saving time (DST) bias. Additionally, the dates and times may change when you perform certain operations on the files.\n\n#### \n\n__\n\nFor all supported x64-based versions of SharePoint Foundation 2013\n\nFile identifier| File name| File version| File size| Date| Time \n---|---|---|---|---|--- \nmicrosoft.cobaltcore.dll| microsoft.cobaltcore.dll| 15.0.4991.1000| 1211112| 15-Apr-21| 08:18 \ncsisrv.dll| csisrv.dll| 15.0.5233.1000| 1410656| 15-Apr-21| 08:19 \ncsisrvexe.exe| csisrvexe.exe| 15.0.5233.1000| 203664| 15-Apr-21| 08:19 \nonfda.dll| onfda.dll| 15.0.5233.1000| 2151312| 15-Apr-21| 08:19 \njsapiextensibilitymanager.debug.js| jsapiextensibilitymanager.debug.js| | 20163| 15-Apr-21| 08:19 \nganttsharepointapishim.generated.debug.js| ganttapishim.generated.debug.js| | 6812| 15-Apr-21| 08:19 \nganttsharedapi.generated.debug.js| ganttsharedapi.generated.debug.js| | 4617| 15-Apr-21| 08:19 \ntimelinesharepointapishim.generated.debug.js| timelineapishim.generated.debug.js| | 1842| 15-Apr-21| 08:19 \ntimelinesharedapi.generated.debug.js| timelinesharedapi.generated.debug.js| | 3420| 15-Apr-21| 08:19 \nmsoidclil.dll| msoidclil.dll| 7.250.4556.0| 1446248| 15-Apr-21| 08:18 \nmsoidclil.dll.x64| msoidclil.dll| 7.250.4556.0| 1446248| 15-Apr-21| 08:18 \nmsoidres.dll| msoidres.dll| 7.250.4556.0| 830864| 15-Apr-21| 08:18 \nmsoidres.dll.x64| msoidres.dll| 7.250.4556.0| 830864| 15-Apr-21| 08:18 \nmsoidclil.dll| msoidclil.dll| 7.250.4556.0| 1220456| 15-Apr-21| 08:18 \nmsoidclil.dll.x86| msoidclil.dll| 7.250.4556.0| 1220456| 15-Apr-21| 08:18 \nmsoidres.dll| msoidres.dll| 7.250.4556.0| 830864| 15-Apr-21| 08:18 \nmsoidres.dll.x86| msoidres.dll| 7.250.4556.0| 830864| 15-Apr-21| 08:18 \ncompat.bro| compat.browser| | 14781| 15-Apr-21| 08:19 \nmicrosoft.naturallanguage.keywordextraction.resources.en.dll| microsoft.naturallanguage.keywordextraction.resources.dll| 15.0.5259.1000| 2745752| 15-Apr-21| 08:18 \ndevdash15.png| devdash15.png| | 699| 16-Apr-21| 10:13 \ndevsitegettingstarted.png| devsitegettingstarted.png| | 4798| 16-Apr-21| 10:13 \ngettingstarted.png| gettingstarted.png| | 4260| 16-Apr-21| 10:13 \ngettingstartedwithappcatalogsite.png| gettingstartedwithappcatalogsite.png| | 1518| 16-Apr-21| 10:13 \nspcommon.png| spcommon.png| | 19434| 16-Apr-21| 10:13 \nspimn.png| spimn.png| | 4248| 16-Apr-21| 10:13 \nspnav.png| spnav.png| | 651| 16-Apr-21| 10:13 \nsproaming.png| sproaming.png| | 8717| 16-Apr-21| 10:13 \nspstorefront.png| spstorefront.png| | 4785| 16-Apr-21| 10:13 \nspstorefrontbkg.png| spstorefrontbkg.png| | 239| 16-Apr-21| 10:13 \nacatrb16.png| stsappcatalogribbon16x16.png| | 475| 16-Apr-21| 10:13 \nacatrb32.png| stsappcatalogribbon32x32.png| | 790| 16-Apr-21| 10:13 \nattach16.png| attach16.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1025| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1026| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1027| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1028| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1029| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1030| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1031| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1032| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1033| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1035| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1036| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1037| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1038| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1040| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1041| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1042| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1043| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1044| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1045| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1046| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1048| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1049| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1050| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1051| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1053| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1054| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1055| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1057| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1058| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1060| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1061| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1062| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1063| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1066| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1069| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1071| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1081| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1086| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1087| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1106| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1110| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_2052| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_2070| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_2074| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_2108| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_3082| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_3098| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nmb_taskhome.png| mb_taskhome.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1025| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1026| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1027| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1028| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1029| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1030| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1031| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1032| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1033| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1035| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1036| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1037| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1038| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1040| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1041| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1042| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1043| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1044| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1045| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1046| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1048| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1049| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1050| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1051| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1053| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1054| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1055| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1057| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1058| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1060| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1061| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1062| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1063| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1066| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1069| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1071| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1081| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1086| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1087| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1106| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1110| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_2052| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_2070| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_2074| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_2108| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_3082| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_3098| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nsz256_icaccdb.png| 256_icaccdb.png| | 3163| 16-Apr-21| 10:13 \nsz256_icdocm.png| 256_icdocm.png| | 4691| 16-Apr-21| 10:13 \nsz256_icdocx.png| 256_icdocx.png| | 3496| 16-Apr-21| 10:13 \nsz256_icdotm.png| 256_icdotm.png| | 4571| 16-Apr-21| 10:13 \nsz256_icdotx.png| 256_icdotx.png| | 3286| 16-Apr-21| 10:13 \nsz256_icmpd.png| 256_icmpd.png| | 2843| 16-Apr-21| 10:13 \nsz256_icmpp.png| 256_icmpp.png| | 2920| 16-Apr-21| 10:13 \nsz256_icmpt.png| 256_icmpt.png| | 2840| 16-Apr-21| 10:13 \nsz256_icnotebk.png| 256_icnotebk.png| | 2801| 16-Apr-21| 10:13 \nsz256_icodp.png| 256_icodp.png| | 4326| 16-Apr-21| 10:13 \nsz256_icods.png| 256_icods.png| | 4778| 16-Apr-21| 10:13 \nsz256_icodt.png| 256_icodt.png| | 4894| 16-Apr-21| 10:13 \nsz256_icone.png| 256_icone.png| | 2553| 16-Apr-21| 10:13 \nsz256_iconp.png| 256_iconp.png| | 2601| 16-Apr-21| 10:13 \nsz256_icont.png| 256_icont.png| | 2801| 16-Apr-21| 10:13 \nsz256_icpotm.png| 256_icpotm.png| | 4812| 16-Apr-21| 10:13 \nsz256_icpotx.png| 256_icpotx.png| | 3571| 16-Apr-21| 10:13 \nsz256_icpps.png| 256_icpps.png| | 4436| 16-Apr-21| 10:13 \nsz256_icppsm.png| 256_icppsm.png| | 5074| 16-Apr-21| 10:13 \nsz256_icppsx.png| 256_icppsx.png| | 3888| 16-Apr-21| 10:13 \nsz256_icpptm.png| 256_icpptm.png| | 4916| 16-Apr-21| 10:13 \nsz256_icpptx.png| 256_icpptx.png| | 3721| 16-Apr-21| 10:13 \nsz256_icpub.png| 256_icpub.png| | 2844| 16-Apr-21| 10:13 \nsz256_icvdx.png| 256_icvdx.png| | 4317| 16-Apr-21| 10:13 \nsz256_icvsx.png| 256_icvsx.png| | 2932| 16-Apr-21| 10:13 \nsz256_icvtx.png| 256_icvtx.png| | 4256| 16-Apr-21| 10:13 \nsz256_icxlsb.png| 256_icxlsb.png| | 3236| 16-Apr-21| 10:13 \nsz256_icxlsm.png| 256_icxlsm.png| | 4694| 16-Apr-21| 10:13 \nsz256_icxltm.png| 256_icxltm.png| | 4561| 16-Apr-21| 10:13 \nsz256_icxltx.png| 256_icxltx.png| | 3227| 16-Apr-21| 10:13 \nsz256_icxsn.png| 256_icxsn.png| | 2466| 16-Apr-21| 10:13 \naddhero.20x20x32.png| addhero.20x20x32.png| | 437| 16-Apr-21| 10:13 \naddimagecamera.11x11x32.png| addimagecamera.11x11x32.png| | 236| 16-Apr-21| 10:13 \naddimagecamera.16x16x32.png| addimagecamera.16x16x32.png| | 289| 16-Apr-21| 10:13 \naddlink.11x11x32.png| addlink.11x11x32.png| | 210| 16-Apr-21| 10:13 \naddlink.16x16x32.png| addlink.16x16x32.png| | 267| 16-Apr-21| 10:13 \naddr_getmap.16x16x32.png| addr_getmap.16x16x32.png| | 603| 16-Apr-21| 10:13 \naddrbook.png| addressbook.png| | 235| 16-Apr-21| 10:13 \naddtasktotimeline.png| addtasktotimeline.png| | 236| 16-Apr-21| 10:13 \npwa.images.addtasktotimeline.png| addtasktotimeline.png| | 236| 16-Apr-21| 10:13 \nannouncements.11x11x32.png| announcements.11x11x32.png| | 320| 16-Apr-21| 10:13 \naskmeaboutupdated.11x11x32.png| askmeaboutupdated.11x11x32.png| | 199| 16-Apr-21| 10:13 \nattractmodefollowstar.128x128x32.png| attractmodefollowstar.128x128x32.png| | 1398| 16-Apr-21| 10:13 \naudiopreview.png| audiopreview.png| | 13196| 16-Apr-21| 10:13 \nbirthday.11x11x32.png| birthday.11x11x32.png| | 156| 16-Apr-21| 10:13 \nblogabout96.png| blogabout96.png| | 1390| 16-Apr-21| 10:13 \ncancelglyph.16x16x32.png| cancelglyph.16x16x32.png| | 183| 16-Apr-21| 10:13 \ncentraladmin_apps.48x48x32.png| centraladmin_apps.48x48x32.png| | 585| 16-Apr-21| 10:13 \ncentraladmin_apps_appmanagement.32x32x32.png| centraladmin_apps_appmanagement.32x32x32.png| | 721| 16-Apr-21| 10:13 \ncentraladmin_apps_marketplace.32x32x32.png| centraladmin_apps_marketplace.32x32x32.png| | 515| 16-Apr-21| 10:13 \ncentraladmin_office365.32x32x24.png| centraladmin_office365.32x32x24.png| | 395| 16-Apr-21| 10:13 \ncentraladmin_office365.48x48x24.png| centraladmin_office365.48x48x24.png| | 546| 16-Apr-21| 10:13 \nchecknames.png| checknames.png| | 379| 16-Apr-21| 10:13 \ncoauth_placeholderneedrefresh.16x16x32.png| coauth_placeholderneedrefresh.16x16x32.png| | 283| 16-Apr-21| 10:13 \ncoauth_placeholderneedrefresh.24x24x32.png| coauth_placeholderneedrefresh.24x24x32.png| | 378| 16-Apr-21| 10:13 \ncommentcollapse12.png| commentcollapse12.png| | 164| 16-Apr-21| 10:13 \ncommentcollapse12rtl.png| commentcollapse12rtl.png| | 166| 16-Apr-21| 10:13 \ncommentexpand12.png| commentexpand12.png| | 238| 16-Apr-21| 10:13 \ncommentexpand12rtl.png| commentexpand12rtl.png| | 222| 16-Apr-21| 10:13 \ndeletefilterglyph.png| deletefilterglyph.png| | 352| 16-Apr-21| 10:13 \ndisableddeletefilterglyph.png| disableddeletefilterglyph.png| | 352| 16-Apr-21| 10:13 \ndwnarsml.png| downarrowsmall.11x7x32.png| | 272| 16-Apr-21| 10:13 \necbtn.png| ecbbutton.png| | 132| 16-Apr-21| 10:13 \necbtnr.png| ecbbuttonrtl.png| | 118| 16-Apr-21| 10:13 \nellipsis.11x11x32.png| ellipsis.11x11x32.png| | 140| 16-Apr-21| 10:13 \nellipsis.16x16x32.png| ellipsis.16x16x32.png| | 161| 16-Apr-21| 10:13 \nerrorbck.png| errorbck.png| | 318| 16-Apr-21| 10:13 \nexit.png| exit.png| | 249| 16-Apr-21| 10:13 \nexit.png_14| exit.png| | 249| 16-Apr-21| 10:13 \nfirstrundocmove48.png| firstrundocmove48.png| | 834| 16-Apr-21| 10:13 \nfirstrunfoldersync48.png| firstrunfoldersync48.png| | 816| 16-Apr-21| 10:13 \nfirstrunfollow48.png| firstrunfollow48.png| | 1262| 16-Apr-21| 10:13 \nfirstrunmobile48.png| firstrunmobile48.png| | 530| 16-Apr-21| 10:13 \nfirstrunprivacyemail48.png| firstrunprivacyemail48.png| | 1070| 16-Apr-21| 10:13 \nfirstrunprivacysettings48.png| firstrunprivacysettings48.png| | 1117| 16-Apr-21| 10:13 \nfirstrunupdateprofile48.png| firstrunupdateprofile48.png| | 617| 16-Apr-21| 10:13 \nmb_folder.png| mb_folder.png| | 323| 16-Apr-21| 10:13 \nfolder.gif_0001| folder.gif| | 73| 16-Apr-21| 10:13 \nhelpbullet.5x15x32.png| helpbullet.5x15x32.png| | 99| 16-Apr-21| 10:13 \nhelpscrolldown.15x15x32.png| helpscrolldown.15x15x32.png| | 109| 16-Apr-21| 10:13 \nhelpscrollleft.15x15x32.png| helpscrollleft.15x15x32.png| | 107| 16-Apr-21| 10:13 \nhelpscrollright.15x15x32.png| helpscrollright.15x15x32.png| | 108| 16-Apr-21| 10:13 \nhelpscrollup.15x15x32.png| helpscrollup.15x15x32.png| | 108| 16-Apr-21| 10:13 \nicaccdb.png| icaccdb.png| | 1376| 16-Apr-21| 10:13 \nicaccde.png| icaccde.png| | 1376| 16-Apr-21| 10:13 \nicdoc.png| icdoc.png| | 1375| 16-Apr-21| 10:13 \nicdocm.png| icdocm.png| | 1474| 16-Apr-21| 10:13 \nicdocx.png| icdocx.png| | 1398| 16-Apr-21| 10:13 \nicdot.png| icdot.png| | 1329| 16-Apr-21| 10:13 \nicdotm.png| icdotm.png| | 1414| 16-Apr-21| 10:13 \nicdotx.png| icdotx.png| | 1360| 16-Apr-21| 10:13 \nicgen.gif| icgen.gif| | 90| 16-Apr-21| 10:13 \nicmpd.png| icmpd.png| | 1394| 16-Apr-21| 10:13 \nicmpp.png| icmpp.png| | 1387| 16-Apr-21| 10:13 \nicmpt.png| icmpt.png| | 1356| 16-Apr-21| 10:13 \nicnotebk.png| icnotebk.png| | 1332| 16-Apr-21| 10:13 \nicodp.png| icodp.png| | 1535| 16-Apr-21| 10:13 \nicods.png| icods.png| | 1603| 16-Apr-21| 10:13 \nicodt.png| icodt.png| | 1545| 16-Apr-21| 10:13 \nicone.png| icone.png| | 1339| 16-Apr-21| 10:13 \niconp.png| iconp.png| | 1382| 16-Apr-21| 10:13 \nicont.png| icont.png| | 1332| 16-Apr-21| 10:13 \nicpdf.png| icpdf.png| | 236| 16-Apr-21| 10:13 \nicpot.png| icpot.png| | 1343| 16-Apr-21| 10:13 \nicpotm.png| icpotm.png| | 1441| 16-Apr-21| 10:13 \nicpotx.png| icpotx.png| | 1373| 16-Apr-21| 10:13 \nicppa.png| icppa.png| | 1278| 16-Apr-21| 10:13 \nicppam.png| icppam.png| | 1309| 16-Apr-21| 10:13 \nicpps.png| icpps.png| | 1394| 16-Apr-21| 10:13 \nicppsm.png| icppsm.png| | 1425| 16-Apr-21| 10:13 \nicppsx.png| icppsx.png| | 1335| 16-Apr-21| 10:13 \nicppt.png| icppt.png| | 1395| 16-Apr-21| 10:13 \nicpptm.png| icpptm.png| | 1464| 16-Apr-21| 10:13 \nicpptx.png| icpptx.png| | 1413| 16-Apr-21| 10:13 \nicpub.png| icpub.png| | 1395| 16-Apr-21| 10:13 \nicspdgeneric.png| icspdgeneric.png| | 1430| 16-Apr-21| 10:13 \nicvdx.png| icvdx.png| | 1407| 16-Apr-21| 10:13 \nicvisiogeneric.png| icvisiogeneric.png| | 1407| 16-Apr-21| 10:13 \nicvsx.png| icvsx.png| | 1321| 16-Apr-21| 10:13 \nicvtx.png| icvtx.png| | 1376| 16-Apr-21| 10:13 \nicxla.png| icxla.png| | 1362| 16-Apr-21| 10:13 \nicxlam.png| icxlam.png| | 1373| 16-Apr-21| 10:13 \nicxls.png| icxls.png| | 1460| 16-Apr-21| 10:13 \nicxlsb.png| icxlsb.png| | 1430| 16-Apr-21| 10:13 \nicxlsm.png| icxlsm.png| | 1535| 16-Apr-21| 10:13 \nicxlsx.png| icxlsx.png| | 1474| 16-Apr-21| 10:13 \nicxlt.png| icxlt.png| | 1428| 16-Apr-21| 10:13 \nicxltm.png| icxltm.png| | 1470| 16-Apr-21| 10:13 \nicxltx.png| icxltx.png| | 1409| 16-Apr-21| 10:13 \nicxsn.png| icxsn.png| | 1326| 16-Apr-21| 10:13 \nmb_picture.png| mb_picture.png| | 469| 16-Apr-21| 10:13 \nitagnda.png| itagnda.png| | 220| 16-Apr-21| 10:13 \nitann.png| itann.png| | 392| 16-Apr-21| 10:13 \nitappcat.png| itappcatalog.png| | 265| 16-Apr-21| 10:13 \nitappreq.png| itapprequests.png| | 294| 16-Apr-21| 10:13 \nitcat.gif| itcat.gif| | 115| 16-Apr-21| 10:13 \nitcommcat.png| itcommcat.png| | 271| 16-Apr-21| 10:13 \nitcommem.png| itcommem.png| | 280| 16-Apr-21| 10:13 \nitcommnt.gif| itcommnt.gif| | 189| 16-Apr-21| 10:13 \nitcontct.gif| itcontct.gif| | 208| 16-Apr-21| 10:13 \nitcontct.png| itcontct.png| | 280| 16-Apr-21| 10:13 \nitdatash.png| itdatash.png| | 165| 16-Apr-21| 10:13 \nitdecis.png| itdecis.png| | 300| 16-Apr-21| 10:13 \nitdisc.png| itdisc.png| | 298| 16-Apr-21| 10:13 \nitdl.png| itdl.png| | 277| 16-Apr-21| 10:13 \nitebl.png| itebl.png| | 224| 16-Apr-21| 10:13 \nitevent.png| itevent.png| | 223| 16-Apr-21| 10:13 \nitfl.png| itfl.png| | 177| 16-Apr-21| 10:13 \nitgbcall.gif| itgbcall.gif| | 308| 16-Apr-21| 10:13 \nitgbfaci.gif| itgbfaci.gif| | 127| 16-Apr-21| 10:13 \nitgbwher.gif| itgbwher.gif| | 222| 16-Apr-21| 10:13 \nitgen.png| itgen.png| | 165| 16-Apr-21| 10:13 \nitil.png| itil.png| | 292| 16-Apr-21| 10:13 \nitime.png| itime.png| | 177| 16-Apr-21| 10:13 \nitiss.png| itiss.png| | 345| 16-Apr-21| 10:13 \nitissue.png| itissue.png| | 343| 16-Apr-21| 10:13 \nitlink.png| itlink.png| | 482| 16-Apr-21| 10:13 \nitobject.png| itobject.png| | 307| 16-Apr-21| 10:13 \nitposts.gif| itposts.gif| | 81| 16-Apr-21| 10:13 \nittask.png| ittask.png| | 343| 16-Apr-21| 10:13 \nitthgbrg.png| itthgbrg.png| | 323| 16-Apr-21| 10:13 \nitwp.png| itwp.png| | 590| 16-Apr-21| 10:13 \nmb_gear.png| mb_gear.png| | 455| 16-Apr-21| 10:13 \nmb_audio.png| mb_audio.png| | 671| 16-Apr-21| 10:13 \nlg_icdoc.png| lg_icdoc.png| | 1542| 16-Apr-21| 10:13 \nlg_icdocm.png| lg_icdocm.png| | 1874| 16-Apr-21| 10:13 \nlg_icdocx.png| lg_icdocx.png| | 1656| 16-Apr-21| 10:13 \nlg_icdot.png| lg_icdot.png| | 1492| 16-Apr-21| 10:13 \nlg_icdotm.png| lg_icdotm.png| | 1779| 16-Apr-21| 10:13 \nlg_icdotx.png| lg_icdotx.png| | 1573| 16-Apr-21| 10:13 \nlg_gen.gif| lg_icgen.gif| | 171| 16-Apr-21| 10:13 \nlg_mpd.png| lg_icmpd.png| | 1587| 16-Apr-21| 10:13 \nlg_mpp.png| lg_icmpp.png| | 1583| 16-Apr-21| 10:13 \nlg_mpt.png| lg_icmpt.png| | 1552| 16-Apr-21| 10:13 \nlg_icodp.png| lg_icodp.png| | 1786| 16-Apr-21| 10:13 \nlg_icods.png| lg_icods.png| | 1845| 16-Apr-21| 10:13 \nlg_icodt.png| lg_icodt.png| | 1861| 16-Apr-21| 10:13 \nlg_icone.png| lg_icone.png| | 1484| 16-Apr-21| 10:13 \nlg_iconp.png| lg_iconp.png| | 1558| 16-Apr-21| 10:13 \nlg_icont.png| lg_icont.png| | 1544| 16-Apr-21| 10:13 \nlg_icpdf.png| lg_icpdf.png| | 451| 16-Apr-21| 10:13 \nlg_icpot.png| lg_icpot.png| | 1495| 16-Apr-21| 10:13 \nlg_icpotm.png| lg_icpotm.png| | 1785| 16-Apr-21| 10:13 \nlg_icpotx.png| lg_icpotx.png| | 1593| 16-Apr-21| 10:13 \nlg_icppa.png| lg_icppa.png| | 1397| 16-Apr-21| 10:13 \nlg_icppam.png| lg_icppam.png| | 1506| 16-Apr-21| 10:13 \nlg_icpps.png| lg_icpps.png| | 1696| 16-Apr-21| 10:13 \nlg_icppsm.png| lg_icppsm.png| | 1823| 16-Apr-21| 10:13 \nlg_icppsx.png| lg_icppsx.png| | 1603| 16-Apr-21| 10:13 \nlg_icppt.png| lg_icppt.png| | 1607| 16-Apr-21| 10:13 \nlg_icpptm.png| lg_icpptm.png| | 1894| 16-Apr-21| 10:13 \nlg_icpptx.png| lg_icpptx.png| | 1709| 16-Apr-21| 10:13 \nlg_pub.png| lg_icpub.png| | 1587| 16-Apr-21| 10:13 \nlgvdw.gif| lg_icvdw.gif| | 464| 16-Apr-21| 10:13 \nlg_vdx.png| lg_icvdx.png| | 1839| 16-Apr-21| 10:13 \nlg_vsdm.gif| lg_icvsdm.gif| | 577| 16-Apr-21| 10:13 \nlg_vsdx.gif| lg_icvsdx.gif| | 540| 16-Apr-21| 10:13 \nlg_vssm.gif| lg_icvssm.gif| | 468| 16-Apr-21| 10:13 \nlg_vssx.gif| lg_icvssx.gif| | 468| 16-Apr-21| 10:13 \nlg_vstm.gif| lg_icvstm.gif| | 502| 16-Apr-21| 10:13 \nlg_vsx.png| lg_icvsx.png| | 1549| 16-Apr-21| 10:13 \nlg_vtx.png| lg_icvtx.png| | 1686| 16-Apr-21| 10:13 \nlg_icxla.png| lg_icxla.png| | 1553| 16-Apr-21| 10:13 \nlg_icxlam.png| lg_icxlam.png| | 1579| 16-Apr-21| 10:13 \nlg_icxls.png| lg_icxls.png| | 1558| 16-Apr-21| 10:13 \nlg_icxlsb.png| lg_icxlsb.png| | 1598| 16-Apr-21| 10:13 \nlg_icxlsm.png| lg_icxlsm.png| | 1856| 16-Apr-21| 10:13 \nlg_icxlsx.png| lg_icxlsx.png| | 1635| 16-Apr-21| 10:13 \nlg_icxlt.png| lg_icxlt.png| | 1498| 16-Apr-21| 10:13 \nlg_icxltm.png| lg_icxltm.png| | 1783| 16-Apr-21| 10:13 \nlg_xltx.gif| lg_icxltx.gif| | 377| 16-Apr-21| 10:13 \nlg_icxltx.png| lg_icxltx.png| | 1570| 16-Apr-21| 10:13 \nlg_xsn.png| lg_icxsn.png| | 1418| 16-Apr-21| 10:13 \nlink.gif| link.gif| | 359| 16-Apr-21| 10:13 \nltagnda.png| ltagnda.png| | 594| 16-Apr-21| 10:13 \nltann.png| ltann.png| | 905| 16-Apr-21| 10:13 \nltappcat.png| ltappcatalog.png| | 1167| 16-Apr-21| 10:13 \nltappreq.png| ltapprequests.png| | 1504| 16-Apr-21| 10:13 \nltcat.gif| ltcat.gif| | 402| 16-Apr-21| 10:13 \nltcommcat.png| ltcommcat.png| | 492| 16-Apr-21| 10:13 \nltcommem.png| ltcommem.png| | 589| 16-Apr-21| 10:13 \nltcommnt.gif| ltcommnt.gif| | 375| 16-Apr-21| 10:13 \nltcontct.gif| ltcontct.gif| | 409| 16-Apr-21| 10:13 \nltcontct.png| ltcontct.png| | 579| 16-Apr-21| 10:13 \nltdatash.png| ltdatash.png| | 195| 16-Apr-21| 10:13 \nltdecis.png| ltdecis.png| | 785| 16-Apr-21| 10:13 \nltdisc.png| ltdisc.png| | 472| 16-Apr-21| 10:13 \nltdl.png| ltdl.png| | 417| 16-Apr-21| 10:13 \nltebl.png| ltebl.png| | 459| 16-Apr-21| 10:13 \nltevent.png| ltevent.png| | 209| 16-Apr-21| 10:13 \nltfl.png| ltfl.png| | 409| 16-Apr-21| 10:13 \nltgbcall.gif| ltgbcall.gif| | 396| 16-Apr-21| 10:13 \nltgbfaci.gif| ltgbfaci.gif| | 390| 16-Apr-21| 10:13 \nltgbwher.gif| ltgbwher.gif| | 422| 16-Apr-21| 10:13 \nltgen.png| ltgen.png| | 195| 16-Apr-21| 10:13 \nltil.png| ltil.png| | 543| 16-Apr-21| 10:13 \nltime.png| ltime.png| | 346| 16-Apr-21| 10:13 \nltiss.png| ltiss.png| | 1426| 16-Apr-21| 10:13 \nltissue.png| ltissue.png| | 681| 16-Apr-21| 10:13 \nltlink.png| ltlink.png| | 2074| 16-Apr-21| 10:13 \nltobject.png| ltobject.png| | 821| 16-Apr-21| 10:13 \nltposts.gif| ltposts.gif| | 385| 16-Apr-21| 10:13 \nltsurvey.png| ltsurvey.png| | 225| 16-Apr-21| 10:13 \nlttask.png| lttask.png| | 1176| 16-Apr-21| 10:13 \nltthgbrg.png| ltthgbrg.png| | 754| 16-Apr-21| 10:13 \nltwp.png| ltwp.png| | 706| 16-Apr-21| 10:13 \nmb_video.png| mb_video.png| | 209| 16-Apr-21| 10:13 \nmappushpin.25x39x32.png| mappushpin.25x39x32.png| | 1070| 16-Apr-21| 10:13 \nmappushpindisabled.25x39x32.png| mappushpindisabled.25x39x32.png| | 1026| 16-Apr-21| 10:13 \nmappushpinhover.25x39x32.png| mappushpinhover.25x39x32.png| | 1037| 16-Apr-21| 10:13 \nmapview.31x22x32.png| mapview.31x22x32.png| | 672| 16-Apr-21| 10:13 \nmb_button_bg.png| mb_button_bg.png| | 194| 16-Apr-21| 10:13 \nmention.11x11x32.png| mention.11x11x32.png| | 274| 16-Apr-21| 10:13 \nmtagnda.png| mtagnda.png| | 413| 16-Apr-21| 10:13 \nmtann.png| mtann.png| | 520| 16-Apr-21| 10:13 \nmtappcat.png| mtappcatalog.png| | 414| 16-Apr-21| 10:13 \nmtappreq.png| mtapprequests.png| | 548| 16-Apr-21| 10:13 \nmtcat.gif| mtcat.gif| | 197| 16-Apr-21| 10:13 \nmtcommcat.png| mtcommcat.png| | 330| 16-Apr-21| 10:13 \nmtcommem.png| mtcommem.png| | 388| 16-Apr-21| 10:13 \nmtcommnt.gif| mtcommnt.gif| | 193| 16-Apr-21| 10:13 \nmtcontct.gif| mtcontct.gif| | 137| 16-Apr-21| 10:13 \nmtcontct.png| mtcontct.png| | 293| 16-Apr-21| 10:13 \nmtdatash.png| mtdatash.png| | 129| 16-Apr-21| 10:13 \nmtdecis.png| mtdecis.png| | 516| 16-Apr-21| 10:13 \nmtdisc.png| mtdisc.png| | 307| 16-Apr-21| 10:13 \nmtdl.png| mtdl.png| | 252| 16-Apr-21| 10:13 \nmtebl.png| mtebl.png| | 245| 16-Apr-21| 10:13 \nmtevent.png| mtevent.png| | 135| 16-Apr-21| 10:13 \nmtfl.png| mtfl.png| | 227| 16-Apr-21| 10:13 \nmtgbcall.gif| mtgbcall.gif| | 396| 16-Apr-21| 10:13 \nmtgbfaci.gif| mtgbfaci.gif| | 377| 16-Apr-21| 10:13 \nmtgbwher.gif| mtgbwher.gif| | 390| 16-Apr-21| 10:13 \nmtgen.png| mtgen.png| | 129| 16-Apr-21| 10:13 \nmtil.png| mtil.png| | 280| 16-Apr-21| 10:13 \nmtime.png| mtime.png| | 188| 16-Apr-21| 10:13 \nmtiss.png| mtiss.png| | 534| 16-Apr-21| 10:13 \nmtissue.png| mtissue.png| | 447| 16-Apr-21| 10:13 \nmtlink.png| mtlink.png| | 565| 16-Apr-21| 10:13 \nmtobject.png| mtobject.png| | 460| 16-Apr-21| 10:13 \nmtposts.gif| mtposts.gif| | 197| 16-Apr-21| 10:13 \nmtsurvey.png| mtsurvey.png| | 141| 16-Apr-21| 10:13 \nmttask.png| mttask.png| | 405| 16-Apr-21| 10:13 \nmtthgbrg.png| mtthgbrg.png| | 526| 16-Apr-21| 10:13 \nmtwp.png| mtwp.png| | 391| 16-Apr-21| 10:13 \nmb_file.png| mb_file.png| | 215| 16-Apr-21| 10:13 \nnowfollowing.11x11x32.png| nowfollowing.11x11x32.png| | 257| 16-Apr-21| 10:13 \no365brandsuite.png| o365brandsuite.png| | 2122| 16-Apr-21| 10:13 \npersonplaceholder200.png| personplaceholder.200x150x32.png| | 2438| 16-Apr-21| 10:13 \npersonplaceholder32.png| personplaceholder.32x32x32.png| | 737| 16-Apr-21| 10:13 \npersonplaceholder42.png| personplaceholder.42x42x32.png| | 728| 16-Apr-21| 10:13 \npersonplaceholder96.png| personplaceholder.96x96x32.png| | 1500| 16-Apr-21| 10:13 \nprojectmanagedeliverables.16x16x32.png| projectmanagedeliverables.16x16x32.png| | 219| 16-Apr-21| 10:13 \npromotedsitetile.150x150x32.png| promotedsitetile.150x150x32.png| | 2530| 16-Apr-21| 10:13 \nrepliedto.11x11x32.png| repliedto.11x11x32.png| | 257| 16-Apr-21| 10:13 \nmb_excel.png| mb_excel.png| | 572| 16-Apr-21| 10:13 \nmb_onenote.png| mb_onenote.png| | 456| 16-Apr-21| 10:13 \nmb_text.png| mb_text.png| | 268| 16-Apr-21| 10:13 \nmb_ppt.png| mb_ppt.png| | 577| 16-Apr-21| 10:13 \nmb_word.png| mb_word.png| | 535| 16-Apr-21| 10:13 \nmb_site.png| mb_siteworkspace.png| | 822| 16-Apr-21| 10:13 \nselectioncheckmarkcolumn.10x10x32.png| selectioncheckmarkcolumn.10x10x32.png| | 229| 16-Apr-21| 10:13 \nsharepointfoundation16.png| sharepointfoundation16.png| | 560| 16-Apr-21| 10:13 \nfavicon.ico| favicon.ico| | 7886| 16-Apr-21| 10:13 \nsharepointdesigner32.png| sharepointdesigner32.png| | 1613| 16-Apr-21| 10:13 \nsharepointmetroapptile.png| sharepointmetroapptile.png| | 3992| 16-Apr-21| 10:13 \nsiteicon.png| siteicon.png| | 2345| 16-Apr-21| 10:13 \naccsrv.images.progcircle16.gif| hig_progcircle_loading16.gif| | 420| 16-Apr-21| 10:13 \nloadingcirclests16.gif| loadingcirclests16.gif| | 420| 16-Apr-21| 10:13 \naccsrv.images.progcircle24.gif| hig_progcircle_loading24.gif| | 878| 16-Apr-21| 10:13 \ngears_anv4.gif_0001| gears_anv4.gif| | 878| 16-Apr-21| 10:13 \nloadin24.gif| hig_progcircle_loading24.gif| | 878| 16-Apr-21| 10:13 \nloadin24.png| hig_progcircle_loading24.gif| | 878| 16-Apr-21| 10:13 \nprogress_circle_24.gif| progress-circle-24.gif| | 878| 16-Apr-21| 10:13 \nmb_navigation.png| mb_navigation.png| | 255| 16-Apr-21| 10:13 \nspstorefrontappdefault.16x16x32.png| spstorefrontappdefault.16x16x32.png| | 296| 16-Apr-21| 10:13 \nspstorefrontappdefault.96x96x32.png| spstorefrontappdefault.96x96x32.png| | 1036| 16-Apr-21| 10:13 \ntag.11x11x32.png| tag.11x11x32.png| | 228| 16-Apr-21| 10:13 \nupdatelink.16x16x32.png| updatelink.16x16x32.png| | 320| 16-Apr-21| 10:13 \nusquig.png| usersquiggle.png| | 150| 16-Apr-21| 10:13 \nvideopreview.png| videopreview.png| | 7110| 16-Apr-21| 10:13 \nmb_page.png| mb_page.png| | 710| 16-Apr-21| 10:13 \nmb_xml.png| mb_xml.png| | 464| 16-Apr-21| 10:13 \nbusdata.dll| microsoft.businessdata.dll| 15.0.5345.1000| 128920| 15-Apr-21| 08:18 \nbusdatar.dll| microsoft.businessdata.dll| 15.0.5345.1000| 128920| 15-Apr-21| 08:18 \nmicrosoft_web_design_server.dll| microsoft.web.design.server.dll| 15.0.5345.1000| 395160| 15-Apr-21| 08:19 \nmicrosoft_web_design_server_intl.dll| microsoft.web.design.server.intl.dll| 15.0.4420.1017| 21640| 15-Apr-21| 08:19 \nbdcmdsch.xsd| bdcmetadata.xsd| | 26300| | \nbdcmeta.xsd| bdcmetadata.xsd| | 26300| 15-Apr-21| 08:18 \nbdcmdsc2.xsd| bdcmetadataresource.xsd| | 13089| | \nbdcmetar.xsd| bdcmetadataresource.xsd| | 13089| 15-Apr-21| 08:18 \nonetnative.dll| onetnative.dll| 15.0.5223.1000| 517008| 15-Apr-21| 08:18 \nxlsrv.onetnative.dll| onetnative.dll| 15.0.5223.1000| 517008| 15-Apr-21| 08:18 \nonetutil.dll| onetutil.dll| 15.0.5345.1000| 2617752| 15-Apr-21| 08:19 \noffice_extension_manager_js| sp.officeextensionmanager.js| | 35154| 15-Apr-21| 08:19 \nosfserver_client_dll| microsoft.sharepoint.client.workflowservices.dll| 15.0.4599.1000| 39128| 15-Apr-21| 08:19 \nosfserver_silverlight_dll| microsoft.sharepoint.client.workflowservices.silverlight.dll| 15.0.4599.1000| 39152| 15-Apr-21| 08:19 \nosfserver_serverproxy_dll| microsoft.sharepoint.workflowservices.serverproxy.dll| 15.0.4599.1000| 110280| 15-Apr-21| 08:19 \nosfserver_shared_dll| microsoft.sharepoint.workflowservicesbase.dll| 15.0.4877.1000| 88360| 15-Apr-21| 08:19 \nosfserver_shared_dll_intl| microsoft.sharepoint.workflowservicesbase.intl.dll| 15.0.4420.1017| 12464| 15-Apr-21| 08:19 \nproxylibrary.osfserver.xml| proxylibrary.osfserver.xml| | 164| 15-Apr-21| 08:19 \nosfserver_clientdbg_js| sp.workflowservices.debug.js| | 58451| 15-Apr-21| 08:19 \nosfserver_clientdbg_js.x64| sp.workflowservices.debug.js| | 58451| 15-Apr-21| 08:19 \nosfserver_client_js| sp.workflowservices.js| | 34083| 15-Apr-21| 08:19 \nosfserver_client_js.x64| sp.workflowservices.js| | 34083| 15-Apr-21| 08:19 \naddwrkfl.aspx| addwrkfl.aspx| | 61362| 15-Apr-21| 08:19 \nassocwrkfl.aspx| assocwrkfl.aspx| | 4655| 15-Apr-21| 08:19 \navailableworkflow.aspx| availableworkflow.aspx| | 7966| 15-Apr-21| 08:19 \nmytasks.aspx| mytasks.aspx| | 6818| 15-Apr-21| 08:19 \noextnmgr.aspx| officeextensionmanager.aspx| | 2196| 15-Apr-21| 08:19 \nremwrkfl.aspx| remwrkfl.aspx| | 16619| 15-Apr-21| 08:19 \nosfserver.resx| osfserver.resx| | 45025| 15-Apr-21| 08:19 \nrunningworkflows.aspx| runningworkflows.aspx| | 8570| 15-Apr-21| 08:19 \nvalidapp.osfsrv.xml| validappendpoints.osfserver.xml| | 1245| 15-Apr-21| 08:19 \nwfstart.asx| wfstart.aspx| | 202| 15-Apr-21| 08:19 \nworkflow.asx| workflow.aspx| | 25914| 15-Apr-21| 08:19 \nworkflowtaskpane.aspx| workflowtaskpane.aspx| | 1180| 15-Apr-21| 08:19 \nwrksetng.aspx| wrksetng.aspx| | 15843| 15-Apr-21| 08:19 \nwrkstat.aspx| wrkstat.aspx| | 27940| 15-Apr-21| 08:19 \nosfextap.dll| microsoft.sharepoint.officeextension.applicationpages.dll| 15.0.5207.1000| 16480| 15-Apr-21| 08:19 \nwfform.js| wfformtemplates.js| | 5024| 15-Apr-21| 08:19 \nosfap.dll| microsoft.sharepoint.workflowservices.applicationpages.dll| 15.0.4755.1000| 96880| 15-Apr-21| 08:19 \nwebconfig.osfserver.xml| webconfig.osfserver.xml| | 504| 15-Apr-21| 08:19 \naddgallery.xap_silverlight| addgallery.xap| | 368387| 15-Apr-21| 08:19 \nmicrosoft.sharepoint.client.xap| microsoft.sharepoint.client.xap| | 223749| 15-Apr-21| 08:19 \nosscadmn.dll| microsoft.search.server.comadmin.dll| | 36232| 15-Apr-21| 08:19 \nwsstlb.net| microsoft.sharepoint.search.administration.mssitlb.dll| | 90792| 15-Apr-21| 08:19 \nsearchom.dll_0003| microsoft.sharepoint.search.dll| 15.0.5129.1000| 3601488| 15-Apr-21| 08:19 \nsearchom.dll_0005| microsoft.sharepoint.search.dll| 15.0.5129.1000| 3601488| 15-Apr-21| 08:19 \nsrchomnt.dll_1| microsoft.sharepoint.search.native.dll| 15.0.5337.1000| 472472| 15-Apr-21| 08:19 \nwsrchps.dll| microsoft.sharepoint.search.powershell.dll| 15.0.4937.1000| 31520| 15-Apr-21| 08:19 \ncontrol_defaultresult.js| control_searchresults.js| | 32312| 15-Apr-21| 08:19 \nfilter_refinement.js| filter_default.js| | 21014| 15-Apr-21| 08:19 \nfilter_multirefinement.js| filter_multivalue.js| | 6263| 15-Apr-21| 08:19 \ngroup_content.js| group_content.js| | 2159| 15-Apr-21| 08:19 \ngroup_defaultgroup.js| group_default.js| | 6616| 15-Apr-21| 08:19 \nhoverpanel_commonactions.js| item_commonhoverpanel_actions.js| | 12766| 15-Apr-21| 08:19 \nhoverpanel_commonbody.js| item_commonhoverpanel_body.js| | 7771| 15-Apr-21| 08:19 \nhoverpanel_community.js| item_community_hoverpanel.js| | 11080| 15-Apr-21| 08:19 \nhoverpanel_default.js| item_default_hoverpanel.js| | 4222| 15-Apr-21| 08:19 \nhoverpanel_microblog.js| item_microblog_hoverpanel.js| | 17457| 15-Apr-21| 08:19 \nhoverpanel_site.js| item_site_hoverpanel.js| | 7582| 15-Apr-21| 08:19 \nhoverpanel_webpage.js| item_webpage_hoverpanel.js| | 6608| 15-Apr-21| 08:19 \nitem_commonbody.js| item_commonitem_body.js| | 8742| 15-Apr-21| 08:19 \nitem_communityportal.js| item_communityportal.js| | 9225| 15-Apr-21| 08:19 \nitem_microblog.js| item_microblog.js| | 17108| 15-Apr-21| 08:19 \nitem_pdf.js| item_pdf.js| | 4102| 15-Apr-21| 08:19 \nitem_people.js| item_person.js| | 24413| 15-Apr-21| 08:19 \nitem_peopleintent.js| item_person_compacthorizontal.js| | 27705| 15-Apr-21| 08:19 \nitem_site.js| item_site.js| | 4544| 15-Apr-21| 08:19 \nitem_webpage.js| item_webpage.js| | 3827| 15-Apr-21| 08:19 \nitem_word.js| item_word.js| | 4157| 15-Apr-21| 08:19 \nsearch.web.parts.feature.xml| feature.xml| | 5405| 15-Apr-21| 08:19 \nsearch.web.parts.dwpfiles.xml| webpartdwpfiles.xml| | 68278| 15-Apr-21| 08:19 \nwss.searchpowershell.types.ps1xml| wsssearchpowershell.types.ps1xml| | 10901| 15-Apr-21| 08:19 \nwss.intl.dll| microsoft.sharepoint.search.intl.dll| 15.0.5197.1000| 563296| 15-Apr-21| 08:19 \nsetup.exe| setup.exe| 15.0.5337.1000| 1080216| 15-Apr-21| 08:18 \nsvrsetup.exe| setup.exe| 15.0.5337.1000| 1080216| 15-Apr-21| 08:18 \nwsssetup.dll| wsssetup.dll| 15.0.5345.1000| 10405256| 15-Apr-21| 08:19 \ndevftr.xml| feature.xml| | 1225| 15-Apr-21| 08:19 \nappdev.dll| microsoft.sharepoint.appdevelopment.dll| 15.0.5027.1000| 71384| 15-Apr-21| 08:19 \nstsapa.dll| microsoft.sharepoint.applicationpages.administration.dll| 15.0.5163.1000| 662120| 15-Apr-21| 08:19 \nwssadmop.dll_0001| microsoft.sharepoint.administrationoperation.dll| 15.0.5297.1000| 1039768| 15-Apr-21| 08:19 \nwssadmin.exe_0001| wssadmin.exe| 15.0.4420.1017| 17088| 15-Apr-21| 08:19 \nappmng.svc| appmng.svc| | 375| 15-Apr-21| 08:19 \nappmngclient.config| client.config| | 2159| 15-Apr-21| 08:19 \nappmngweb.config| web.config| | 2641| 15-Apr-21| 08:19 \nbgximg.png| bgximg.png| | 1770| 15-Apr-21| 08:19 \nbgyimg.png| bgyimg.png| | 68| 15-Apr-21| 08:19 \nclient.svc| client.svc| | 402| 15-Apr-21| 08:19 \nadmwcfg.xml| adminwebconfig.sts.xml| | 3530| 15-Apr-21| 08:19 \napppermissionprovider.bdcconnection.xml| apppermissionprovider.bdcconnection.xml| | 232| 15-Apr-21| 08:19 \napppermissionprovider.content.xml| apppermissionprovider.content.xml| | 706| 15-Apr-21| 08:19 \ncapabilitycheckers.sts.xml| capabilitycheckers.sts.xml| | 2789| 15-Apr-21| 08:19 \ndocexflt.xml| docextflt.xml| | 4439| 15-Apr-21| 08:19 \ndocparse.xml| docparse.xml| | 2293| 15-Apr-21| 08:19 \ngbwupgrade.xml| gbwupgrade.xml| | 4055| 15-Apr-21| 08:19 \ngbwupgradeb2b.xml| gbwupgradeb2b.xml| | 311| 15-Apr-21| 08:19 \nmdocview.xml| mdocview.xml| | 6975| 15-Apr-21| 08:19 \nmpsupgrade.xml| mpsupgrade.xml| | 15459| 15-Apr-21| 08:19 \nmpsupgradeb2b.xml| mpsupgradeb2b.xml| | 102| 15-Apr-21| 08:19 \nmredirection.xml| mredirection.xml| | 4660| 15-Apr-21| 08:19 \nproxylibrary.stsom.xml| proxylibrary.stsom.xml| | 217| 15-Apr-21| 08:19 \nrgnldflt.xml| rgnldflt.xml| | 81253| 15-Apr-21| 08:19 \ntaupgrade.xml| tenantadminupgrade.xml| | 437| 15-Apr-21| 08:19 \ntimezone.xml| timezone.xml| | 99866| 15-Apr-21| 08:19 \nwebconfig_identitymodel_add| webconfig.identitymodel.add.xml| | 7529| 15-Apr-21| 08:19 \nwebconfig_identitymodel_remove| webconfig.identitymodel.remove.xml| | 3122| 15-Apr-21| 08:19 \nwssupgrade.xml| wssupgrade.xml| | 9043| 15-Apr-21| 08:19 \nwssupgradeb2b.xml| wssupgradeb2b.xml| | 4719| 15-Apr-21| 08:19 \noleprsx.dll| oleparser.dll| 15.0.4454.1000| 31880| 15-Apr-21| 08:19 \nmicrosoft.sharepoint.dotnetinterceptor.dll| microsoft.sharepoint.dotnetinterceptor.dll| 15.0.5271.1000| 15768| 15-Apr-21| 08:19 \nmicrosoft.sharepoint.dotnetinterceptor.dll_001| microsoft.sharepoint.dotnetinterceptor.dll| 15.0.5271.1000| 15768| 15-Apr-21| 08:19 \nmicrosoft_sharepoint_dsp.dll| microsoft.sharepoint.dsp.dll| 15.0.4420.1017| 48248| 15-Apr-21| 08:19 \nmicrosoft_sharepoint_dsp_oledb.dll| microsoft.sharepoint.dsp.oledb.dll| 15.0.4420.1017| 112768| 15-Apr-21| 08:19 \nmicrosoft_sharepoint_dsp_soappt.dll| microsoft.sharepoint.dsp.soappt.dll| 15.0.4420.1017| 75912| 15-Apr-21| 08:19 \nmicrosoft_sharepoint_dsp_sts.dll| microsoft.sharepoint.dsp.sts.dll| 15.0.4420.1017| 93312| 15-Apr-21| 08:19 \nmicrosoft_sharepoint_dsp_xmlurl.dll| microsoft.sharepoint.dsp.xmlurl.dll| 15.0.4420.1017| 75912| 15-Apr-21| 08:19 \nschema.xml_accreq| schema.xml| | 21500| 15-Apr-21| 08:19 \naccreq.xml| accessrequests.xml| | 681| 15-Apr-21| 08:19 \nfeature.xml_accreq| feature.xml| | 497| 15-Apr-21| 08:19 \napplications.xml| applications.xml| | 8249| 15-Apr-21| 08:19 \napps.xml| apps.xml| | 3078| 15-Apr-21| 08:19 \nbackups.xml| backups.xml| | 4398| 15-Apr-21| 08:19 \nconfigurationwizards.xml| configurationwizards.xml| | 912| 15-Apr-21| 08:19 \ndefault.xml| default.xml| | 12609| 15-Apr-21| 08:19 \nfeature.xml_sts| feature.xml| | 1712| 15-Apr-21| 08:19 \ngenappsettings.xml| generalapplicationsettings.xml| | 1989| 15-Apr-21| 08:19 \nmonitoring.xml| monitoring.xml| | 3736| 15-Apr-21| 08:19 \no365configuration.xml| office365configuration.xml| | 405| 15-Apr-21| 08:19 \nquicklaunch.xml| quicklaunch.xml| | 555| 15-Apr-21| 08:19 \nsecurity.xml| security.xml| | 5954| 15-Apr-21| 08:19 \nsystemsettings.xml| systemsettings.xml| | 5280| 15-Apr-21| 08:19 \nupgradeandmigration.xml| upgradeandmigration.xml| | 1630| 15-Apr-21| 08:19 \nschema.xml_announce| schema.xml| | 26227| 15-Apr-21| 08:19 \nannounce.xml| announcements.xml| | 456| 15-Apr-21| 08:19 \nfeature.xml_announce| feature.xml| | 500| 15-Apr-21| 08:19 \napplockdown.xml| applockdown.xml| | 2321| 15-Apr-21| 08:19 \nfeature.xml_apploc| feature.xml| | 400| 15-Apr-21| 08:19 \nappreglinks.xml| appregistrationlinks.xml| | 793| 15-Apr-21| 08:19 \nfeature.xml_appreg| feature.xml| | 554| 15-Apr-21| 08:19 \nschema.xml_apprequestslist| schema.xml| | 10229| 15-Apr-21| 08:19 \napprequestscontenttypes.xml_apprequestslist| apprequestscontenttypes.xml| | 1748| 15-Apr-21| 08:19 \napprequestsfields.xml_apprequestslist| apprequestsfields.xml| | 5336| 15-Apr-21| 08:19 \napprequestslistinstance.xml_apprequestslist| apprequestslistinstance.xml| | 403| 15-Apr-21| 08:19 \napprequestslisttemplate.xml_apprequestslist| apprequestslisttemplate.xml| | 627| 15-Apr-21| 08:19 \nfeature.xml_apprequestslist| feature.xml| | 1516| 15-Apr-21| 08:19 \nautohostedlicensing_fields.xml_autohostedapplicensing| autohostedapplicensingfields.xml| | 771| 15-Apr-21| 08:19 \nfeature.xml_autohostedapplicensing| feature.xml| | 744| 15-Apr-21| 08:19 \nautohostedlicensing_controls.xml_autohostedapplicensing| resourcebar.xml| | 412| 15-Apr-21| 08:19 \nfeature.xml_autohostedapplicensingstapling| feature.xml| | 487| 15-Apr-21| 08:19 \nelements.xml_autohostedapplicensingstapling| staplingelements.xml| | 223| 15-Apr-21| 08:19 \nblog.dwp_admintools| blogadmin.dwp| | 468| 15-Apr-21| 08:19 \nblog.dwp_archives| blogarchives.dwp| | 462| 15-Apr-21| 08:19 \nblog.webpart_notifications| blognotifications.webpart| | 883| 15-Apr-21| 08:19 \nelements.xml_basicwebparts| elements.xml| | 1652| 15-Apr-21| 08:19 \nelements14.xml_basicwebparts| elements14.xml| | 629| 15-Apr-21| 08:19 \nelements15.xml_basicwebparts| elements15.xml| | 1407| 15-Apr-21| 08:19 \nfeature.xml_basicwebparts| feature.xml| | 3149| 15-Apr-21| 08:19 \ngettingstarted.webpart_basicwebparts| gettingstarted.webpart| | 834| 15-Apr-21| 08:19 \nmscontenteditor.dwp_basicwebparts| mscontenteditor.dwp| | 506| 15-Apr-21| 08:19 \nmsimage.dwp_basicwebparts| msimage.dwp| | 483| 15-Apr-21| 08:19 \nmsmembers.dwp_basicwebparts| msmembers.dwp| | 487| 15-Apr-21| 08:19 \nmspageviewer.dwp_basicwebparts| mspageviewer.dwp| | 498| 15-Apr-21| 08:19 \nmspiclibslideshow.webpart_basicwebparts| mspicturelibraryslideshow.webpart| | 733| 15-Apr-21| 08:19 \nmsscripteditor.webpart_basicwebparts| msscripteditor.webpart| | 739| 15-Apr-21| 08:19 \nmssimpleform.dwp_basicwebparts| mssimpleform.dwp| | 799| 15-Apr-21| 08:19 \nmsuserdocs.dwp_basicwebparts| msuserdocs.dwp| | 492| 15-Apr-21| 08:19 \nmsusertasks.dwp_basicwebparts| msusertasks.dwp| | 495| 15-Apr-21| 08:19 \nmsxml.dwp_basicwebparts| msxml.dwp| | 475| 15-Apr-21| 08:19 \nsilverlight.webpart_basicwebparts| silverlight.webpart| | 669| 15-Apr-21| 08:19 \ntimeline.webpart_basicwebparts| timeline.webpart| | 831| 15-Apr-21| 08:19 \nextsubsh_feature.xml| feature.xml| | 570| 15-Apr-21| 08:19 \nallcategories.asp_blog_categories| allcategories.aspx| | 2718| 15-Apr-21| 08:19 \neditcategory.asp_blog_categories| editcategory.aspx| | 4167| 15-Apr-21| 08:19 \nmycategories.asp_blog_categories| mycategories.aspx| | 2718| 15-Apr-21| 08:19 \nnewcategory.asp_blog_categories| newcategory.aspx| | 4197| 15-Apr-21| 08:19 \nschema.xml_blog_categories| schema.xml| | 18153| 15-Apr-21| 08:19 \nviewcategory.asp_blog_categories| viewcategory.aspx| | 4190| 15-Apr-21| 08:19 \nallcomments.asp_blog_comments| allcomments.aspx| | 2718| 15-Apr-21| 08:19 \nbyauthor.asp_blog_comments| byauthor.aspx| | 2718| 15-Apr-21| 08:19 \neditcomment.asp_blog_comments| editcomment.aspx| | 4167| 15-Apr-21| 08:19 \nmycomments.asp_blog_comments| mycomments.aspx| | 2718| 15-Apr-21| 08:19 \nnewcomment.asp_blog_comments| newcomment.aspx| | 4197| 15-Apr-21| 08:19 \nschema.xml_blog_comments| schema.xml| | 35968| 15-Apr-21| 08:19 \nviewcomment.asp_blog_comments| viewcomment.aspx| | 4190| 15-Apr-21| 08:19 \nallposts.asp_blog_posts| allposts.aspx| | 2718| 15-Apr-21| 08:19 \narchive.asp_blog_posts| archive.aspx| | 2718| 15-Apr-21| 08:19 \nbyauthor.asp_blog_posts| byauthor.aspx| | 2718| 15-Apr-21| 08:19 \nbycategory.asp_blog_posts| bycategory.aspx| | 2718| 15-Apr-21| 08:19 \ncalendar.asp_blog_posts| calendar.aspx| | 2718| 15-Apr-21| 08:19 \neditpost.asp_blog_posts| editpost.aspx| | 4167| 15-Apr-21| 08:19 \nmyposts.asp_blog_posts| myposts.aspx| | 2718| 15-Apr-21| 08:19 \nnewpost.asp_blog_posts| newpost.aspx| | 4197| 15-Apr-21| 08:19 \nschema.xml_blog_posts| schema.xml| | 81082| 15-Apr-21| 08:19 \nviewpost.asp_blog_posts| viewpost.aspx| | 4190| 15-Apr-21| 08:19 \nelements.xml_blog| elements.xml| | 1207| 15-Apr-21| 08:19 \nfeature.xml_blog| feature.xml| | 1326| 15-Apr-21| 08:19 \ncategory.asp_blogcon| category.aspx| | 2649| 15-Apr-21| 08:19 \ndate.asp_blog_blogcon| date.aspx| | 2643| 15-Apr-21| 08:19 \nelements.xml_blogcon| elements.xml| | 29090| 15-Apr-21| 08:19 \nfeature.xml_blogcon| feature.xml| | 517| 15-Apr-21| 08:19 \nmonthlyarchive.asp_blogcon| monthlyarchive.aspx| | 2737| 15-Apr-21| 08:19 \npost.asp_blogcon| post.aspx| | 3153| 15-Apr-21| 08:19 \nsummary.asp_blog_blogcon| summary.aspx| | 3200| 15-Apr-21| 08:19 \ndefault.asp_blog_bloghp| default.aspx| | 2682| 15-Apr-21| 08:19 \nelements.xml_bloghp| elements.xml| | 8483| 15-Apr-21| 08:19 \nfeature.xml_bloghp| feature.xml| | 501| 15-Apr-21| 08:19 \nschema.xml_calltrack| schema.xml| | 314515| 15-Apr-21| 08:19 \ncalltrack.xml| calltracklist.xml| | 5563| 15-Apr-21| 08:19 \nfeature.xml_calltrack| feature.xml| | 1178| 15-Apr-21| 08:19 \nschema.xml_circulation| schema.xml| | 313711| 15-Apr-21| 08:19 \ncirculation.xml| circulationlist.xml| | 6489| 15-Apr-21| 08:19 \nfeature.xml_circulation| feature.xml| | 1196| 15-Apr-21| 08:19 \nschema.xml_contacts| schema.xml| | 8715| 15-Apr-21| 08:19 \ncontacts.xml| contacts.xml| | 451| 15-Apr-21| 08:19 \nfeature.xml_contacts| feature.xml| | 480| 15-Apr-21| 08:19 \nsrcharea.xml| searcharea.xml| | 1279| 15-Apr-21| 08:19 \nfeature.xml_0004| feature.xml| | 527| 15-Apr-21| 08:19 \ncontenttypesettings.xml| contenttypesettings.xml| | 4678| 15-Apr-21| 08:19 \nfeature.xml_0010| feature.xml| | 537| 15-Apr-21| 08:19 \nschema.xml_corpcatalog| schema.xml| | 32074| 15-Apr-21| 08:19 \ncorporatecatalogcustomactions.xml_corpcatalog| corporatecatalogcustomactions.xml| | 8553| 15-Apr-21| 08:19 \ncorporatecatalogfields.xml_corpcatalog| corporatecatalogfields.xml| | 11303| 15-Apr-21| 08:19 \ncorporatecataloginstance.xml_corpcatalog| corporatecataloginstance.xml| | 422| 15-Apr-21| 08:19 \ncorporatecatalogtemplate.xml_corpcatalog| corporatecatalogtemplate.xml| | 665| 15-Apr-21| 08:19 \nfeature.xml_corpcatalog| feature.xml| | 2174| 15-Apr-21| 08:19 \nwebeventreceiver.xml_corpcatalog| webeventreceiver.xml| | 578| 15-Apr-21| 08:19 \nfeature.xml_corpgallerysettings| feature.xml| | 408| 15-Apr-21| 08:19 \nctypswss.xml| ctypeswss.xml| | 48192| 15-Apr-21| 08:19 \nctpswss2.xml| ctypeswss2.xml| | 26052| 15-Apr-21| 08:19 \nctpswss3.xml| ctypeswss3.xml| | 2093| 15-Apr-21| 08:19 \nfeature_0004.xml| feature.xml| | 3974| 15-Apr-21| 08:19 \nschema.xml_custom| schema.xml| | 3427| 15-Apr-21| 08:19 \ncustlist.xml| customlist.xml| | 442| 15-Apr-21| 08:19 \nfeature.xml_custom| feature.xml| | 479| 15-Apr-21| 08:19 \nschema.xml_dsl| schema.xml| | 4343| 15-Apr-21| 08:19 \ndsl.xml| datasourcelibrary.xml| | 512| 15-Apr-21| 08:19 \nfeature.xml_dsl| feature.xml| | 477| 15-Apr-21| 08:19 \nribbon.xml| ribbon.xml| | 4984| 15-Apr-21| 08:19 \nschema.xml_discuss| schema.xml| | 266868| 15-Apr-21| 08:19 \ndiscuss.xml| discussions.xml| | 1715| 15-Apr-21| 08:19 \nfeature.xml_discuss| feature.xml| | 1750| 15-Apr-21| 08:19 \neditdlg.htm_doclib| editdlg.htm| | 4892| 15-Apr-21| 08:19 \neditdlg.htm_ldoclib| editdlg.htm| | 4892| 15-Apr-21| 08:19 \neditdlg.htm_pubfeap| editdlg.htm| | 4892| 15-Apr-21| 08:19 \neditdlg.htm_pubresfeat| editdlg.htm| | 4892| 15-Apr-21| 08:19 \nreportcenterdoclibeditdlg_htm| editdlg.htm| | 4892| 15-Apr-21| 08:19 \nrleditdlg.htm| editdlg.htm| | 4892| 15-Apr-21| 08:19 \nfiledlg.htm_doclib| filedlg.htm| | 4754| 15-Apr-21| 08:19 \nfiledlg.htm_ldoclib| filedlg.htm| | 4754| 15-Apr-21| 08:19 \nfiledlg.htm_pubfeap| filedlg.htm| | 4754| 15-Apr-21| 08:19 \nfiledlg.htm_pubresfeat| filedlg.htm| | 4754| 15-Apr-21| 08:19 \nreportcenterdoclibfiledlg_htm| filedlg.htm| | 4754| 15-Apr-21| 08:19 \nrlfiledlg.htm_ldoclib| filedlg.htm| | 4754| 15-Apr-21| 08:19 \nrepair.aspx_doclib| repair.aspx| | 3259| 15-Apr-21| 08:19 \nrepair.aspx_ldoclib| repair.aspx| | 3259| 15-Apr-21| 08:19 \nrepair.aspx_pubfeap| repair.aspx| | 3259| 15-Apr-21| 08:19 \nrepair.aspx_pubresfeat| repair.aspx| | 3259| 15-Apr-21| 08:19 \nreportcenterdoclibrepair_aspx| repair.aspx| | 3259| 15-Apr-21| 08:19 \nreportcenterdoclibschema_xml| schema.xml| | 31199| 15-Apr-21| 08:19 \nschema.xml_doclib| schema.xml| | 31199| 15-Apr-21| 08:19 \nschema.xml_pubfeap| schema.xml| | 31199| 15-Apr-21| 08:19 \nreportcenterdoclibupload_aspx| upload.aspx| | 5911| 15-Apr-21| 08:19 \nrlupload.aspx| upload.aspx| | 5911| 15-Apr-21| 08:19 \nupload.aspx_doclib| upload.aspx| | 5911| 15-Apr-21| 08:19 \nupload.aspx_ldoclib| upload.aspx| | 5911| 15-Apr-21| 08:19 \nupload.aspx_pubfeap| upload.aspx| | 5911| 15-Apr-21| 08:19 \nupload.aspx_pubresfeat| upload.aspx| | 5911| 15-Apr-21| 08:19 \ndoclib.xml| documentlibrary.xml| | 476| 15-Apr-21| 08:19 \nfeature.xml_doclib| feature.xml| | 499| 15-Apr-21| 08:19 \nelements.xml_downloadfromofficedotcom| elements.xml| | 114| 15-Apr-21| 08:19 \nfeature.xml_downloadfromofficedotcom| feature.xml| | 521| 15-Apr-21| 08:19 \nemltemplates.xml| emailtemplates.xml| | 2233| 15-Apr-21| 08:19 \nemltemplates.xml_14| emailtemplates.xml| | 2233| 15-Apr-21| 08:19 \nevalnoupg.xml| evalsitecreatewithnoupgrade.xml| | 1443| 15-Apr-21| 08:19 \nevalnoupg.xml_14| evalsitecreatewithnoupgrade.xml| | 1443| 15-Apr-21| 08:19 \nevalupg.xml| evalsitecreationwithupgrade.xml| | 1184| 15-Apr-21| 08:19 \nevalupg.xml_14| evalsitecreationwithupgrade.xml| | 1184| 15-Apr-21| 08:19 \nevaldelete.xml| evalsitedeleted.xml| | 440| 15-Apr-21| 08:19 \nevaldelete.xml_14| evalsitedeleted.xml| | 440| 15-Apr-21| 08:19 \nevalexp.xml| evalsitenearingexpiry.xml| | 1030| 15-Apr-21| 08:19 \nevalexp.xml_14| evalsitenearingexpiry.xml| | 1030| 15-Apr-21| 08:19 \nevalrequest.xml| evalsiterequested.xml| | 363| 15-Apr-21| 08:19 \nevalrequest.xml_14| evalsiterequested.xml| | 363| 15-Apr-21| 08:19 \nemltemplatefeat.xml| feature.xml| | 518| 15-Apr-21| 08:19 \nemltemplatefeat.xml_14| feature.xml| | 518| 15-Apr-21| 08:19 \nsiteupg.xml| siteupgraded.xml| | 922| 15-Apr-21| 08:19 \nsiteupg.xml_14| siteupgraded.xml| | 922| 15-Apr-21| 08:19 \nsiteupgfailed.xml| siteupgradefailed.xml| | 807| 15-Apr-21| 08:19 \nsiteupgfailed.xml_14| siteupgradefailed.xml| | 807| 15-Apr-21| 08:19 \nupgavail.xml| upgradeavailable.xml| | 1129| 15-Apr-21| 08:19 \nupgavail.xml_14| upgradeavailable.xml| | 1129| 15-Apr-21| 08:19 \nschema.xml_events| schema.xml| | 27131| 15-Apr-21| 08:19 \nevents.xml| events.xml| | 481| 15-Apr-21| 08:19 \nfeature.xml_events| feature.xml| | 975| 15-Apr-21| 08:19 \nschema.xml_external| schema.xml| | 3389| 15-Apr-21| 08:19 \nextlist.xml| externallist.xml| | 437| 15-Apr-21| 08:19 \nfeature.xml_external| feature.xml| | 485| 15-Apr-21| 08:19 \nextsubs_schema.xml| schema.xml| | 2775| 15-Apr-21| 08:19 \nextsubs.xml| extsubs.xml| | 470| 15-Apr-21| 08:19 \nextsubs_feature.xml| feature.xml| | 1216| 15-Apr-21| 08:19 \nextsubs_listinstance.xml| listinstance.xml| | 446| 15-Apr-21| 08:19 \nschema.xml_facility| schema.xml| | 5279| 15-Apr-21| 08:19 \nfacility.xml| facilitylist.xml| | 552| 15-Apr-21| 08:19 \nfeature.xml_facility| feature.xml| | 1064| 15-Apr-21| 08:19 \nschema.xml_fcgroups| schema.xml| | 5266| 15-Apr-21| 08:19 \nfcgroups.xml| fcgroupslist.xml| | 518| 15-Apr-21| 08:19 \nfeature.xml_fcgroups| feature.xml| | 546| 15-Apr-21| 08:19 \nfeature_0003.xml| feature.xml| | 1346| 15-Apr-21| 08:19 \nfldswss.xml| fieldswss.xml| | 222599| 15-Apr-21| 08:19 \nfldswss2.xml| fieldswss2.xml| | 469| 15-Apr-21| 08:19 \nfldswss3.xml| fieldswss3.xml| | 50780| 15-Apr-21| 08:19 \nfldswss4.xml| fieldswss4.xml| | 11512| 15-Apr-21| 08:19 \nschema.xml_gantt| schema.xml| | 15783| 15-Apr-21| 08:19 \ngantttl.xml| gantttaskslist.xml| | 496| 15-Apr-21| 08:19 \nfeature.xml_gantt| feature.xml| | 475| 15-Apr-21| 08:19 \nfeature_gbwprovision.xml| feature.xml| | 710| 15-Apr-21| 08:19 \nlistinstance_gbwprovision.xml| listinstance.xml| | 816| 15-Apr-21| 08:19 \nelements.xml_gbwwebparts| elements.xml| | 596| 15-Apr-21| 08:19 \nfeature.xml_gbwwebparts| feature.xml| | 346| 15-Apr-21| 08:19 \ntimecard.dwp_gbwwebparts| timecard.dwp| | 442| 15-Apr-21| 08:19 \nwhatsnew.dwp_gbwwebparts| whatsnew.dwp| | 448| 15-Apr-21| 08:19 \nwhereabouts.dwp_gbwwebparts| whereabouts.dwp| | 445| 15-Apr-21| 08:19 \nelements.xml| elements.xml| | 1584| 15-Apr-21| 08:19 \nfeature_gettingstarted.xml| feature.xml| | 957| 15-Apr-21| 08:19 \ngettingstarted.asx| gettingstarted.aspx| | 2904| 15-Apr-21| 08:19 \nelements.xml_gsappcatsite| elements.xml| | 483| 15-Apr-21| 08:19 \nfeature.xml_gsappcatsite| feature.xml| | 769| 15-Apr-21| 08:19 \ngettingstartedwithappcatalogsite.webpart_gsappcatsite| gettingstartedwithappcatalogsite.webpart| | 915| 15-Apr-21| 08:19 \nschema.xml_gridlist| schema.xml| | 2824| 15-Apr-21| 08:19 \ngridlist.xml| gridlist.xml| | 454| 15-Apr-21| 08:19 \nfeature.xml_gridlist| feature.xml| | 477| 15-Apr-21| 08:19 \nfeature_groupwork.xml| feature.xml| | 728| 15-Apr-21| 08:19 \nlistinstance_groupwork.xml| listinstance.xml| | 962| 15-Apr-21| 08:19 \nschema.xml_helplibrary| schema.xml| | 18584| 15-Apr-21| 08:19 \nhelplibrary.xml| helplibrary.xml| | 587| 15-Apr-21| 08:19 \nfeature.xml_helplibrary| feature.xml| | 566| 15-Apr-21| 08:19 \nhelpcontenttypes| helpcontenttypes.xml| | 3976| 15-Apr-21| 08:19 \nhelpsitecolumns| helpsitecolumns.xml| | 7052| 15-Apr-21| 08:19 \nschema.xml_hierarchy| schema.xml| | 20345| 15-Apr-21| 08:19 \nhierarchyl.xml| hierarchytaskslist.xml| | 1459| 15-Apr-21| 08:19 \nfeature.xml_hierarchy| feature.xml| | 3460| 15-Apr-21| 08:19 \nschema.xml_holiday| schema.xml| | 7813| 15-Apr-21| 08:19 \nholiday.xml| holidayslist.xml| | 541| 15-Apr-21| 08:19 \nfeature.xml_holiday| feature.xml| | 1048| 15-Apr-21| 08:19 \nfeature.xml_ifedependentapps| feature.xml| | 412| 15-Apr-21| 08:19 \nschema.xml_imedic| schema.xml| | 5726| 15-Apr-21| 08:19 \nimedic.xml| imediclist.xml| | 1655| 15-Apr-21| 08:19 \nfeature.xml_imedic| feature.xml| | 894| 15-Apr-21| 08:19 \nschema.xml_issues| schema.xml| | 9760| 15-Apr-21| 08:19 \nissues.xml| issues.xml| | 446| 15-Apr-21| 08:19 \nfeature.xml_issues| feature.xml| | 466| 15-Apr-21| 08:19 \nschema.xml_links| schema.xml| | 41072| 15-Apr-21| 08:19 \nlinks.xml| links.xml| | 441| 15-Apr-21| 08:19 \nfeature.xml_links| feature.xml| | 476| 15-Apr-21| 08:19 \nschema.xml_mainlo| schema.xml| | 2006| 15-Apr-21| 08:19 \nschema.xml_mainlo_v14| schema.xml| | 2006| 15-Apr-21| 08:19 \nfeature.xml_mainlo| feature.xml| | 706| 15-Apr-21| 08:19 \nfeature.xml_mainlo_v14| feature.xml| | 706| 15-Apr-21| 08:19 \nmaintenancelogsinstance.xml_mainlo| maintenancelogsinstance.xml| | 412| 15-Apr-21| 08:19 \nmaintenancelogsinstance.xml_mainlo_v14| maintenancelogsinstance.xml| | 412| 15-Apr-21| 08:19 \nmaintenancelogstemplate.xml_mainlo| maintenancelogstemplate.xml| | 728| 15-Apr-21| 08:19 \nmaintenancelogstemplate.xml_mainlo_v14| maintenancelogstemplate.xml| | 728| 15-Apr-21| 08:19 \nfeature.xml_mbrowserredirect| feature.xml| | 418| 15-Apr-21| 08:19 \nfeature.xml_mbrowserredirectstapling| feature.xml| | 437| 15-Apr-21| 08:19 \nfeature.xml_mbrowserredirectfeaturestp| featurestapling.xml| | 637| 15-Apr-21| 08:19 \nfeature.xml_mds| feature.xml| | 520| 15-Apr-21| 08:19 \nmriddflt.xml| default.aspx| | 1270| 15-Apr-21| 08:19 \nmridelms.xml| elements.xml| | 210| 15-Apr-21| 08:19 \nmridfeat.xml| feature.xml| | 461| 15-Apr-21| 08:19 \nelements.xml_mpswebparts| elements.xml| | 583| 15-Apr-21| 08:19 \nfeature.xml_mpswebparts| feature.xml| | 469| 15-Apr-21| 08:19 \nncwfl.xml| nocodeworkflowlibrary.xml| | 1118| 15-Apr-21| 08:19 \nschema.xml_nocodepublicwf| schema.xml| | 4515| 15-Apr-21| 08:19 \nschema.xml_nocodewf| schema.xml| | 4455| 15-Apr-21| 08:19 \nfeature.xml_nocodewf| feature.xml| | 493| 15-Apr-21| 08:19 \nschema.xml_oecatalog| schema.xml| | 24259| 15-Apr-21| 08:19 \nfeature.xml_oecatalog| feature.xml| | 1840| 15-Apr-21| 08:19 \noecatalogfields.xml_oecatalog| oecatalogfields.xml| | 7204| 15-Apr-21| 08:19 \noecataloginstance.xml_oecatalog| oecataloginstance.xml| | 436| 15-Apr-21| 08:19 \noecatalogtemplate.xml_oecatalog| oecatalogtemplate.xml| | 718| 15-Apr-21| 08:19 \nfeature.xml_openinclient| feature.xml| | 435| 15-Apr-21| 08:19 \npnsubr.xml| pnsubscriberreceivers.xml| | 516| 15-Apr-21| 08:19 \npnsubs.xml| pnsubscribers.xml| | 425| 15-Apr-21| 08:19 \nschema.xml_pnsubs| schema.xml| | 1204| 15-Apr-21| 08:19 \nfeature.xml_pnsubs| feature.xml| | 883| 15-Apr-21| 08:19 \nlistinstance.xml_pnsubs| listinstance.xml| | 446| 15-Apr-21| 08:19 \npiclib.xml| picturelibrary.xml| | 473| 15-Apr-21| 08:19 \nallitems.aspx_piclib| allitems.aspx| | 3916| 15-Apr-21| 08:19 \ndispform.aspx_piclib| dispform.aspx| | 4735| 15-Apr-21| 08:19 \neditform.aspx_piclib| editform.aspx| | 4393| 15-Apr-21| 08:19 \nschema.xml| schema.xml| | 43005| 15-Apr-21| 08:19 \nselected.aspx_piclib| selected.aspx| | 3916| 15-Apr-21| 08:19 \nslidshow.aspx_piclib| slidshow.aspx| | 4133| 15-Apr-21| 08:19 \nupload.aspx_piclib| upload.aspx| | 6294| 15-Apr-21| 08:19 \nwebfldr.aspx_piclib| webfldr.aspx| | 2521| 15-Apr-21| 08:19 \nfeature.xml_piclib| feature.xml| | 864| 15-Apr-21| 08:19 \npromotedlinks.xml| promotedlinks.xml| | 495| 15-Apr-21| 08:19 \nschema.xml_promotedlinks| schema.xml| | 8219| 15-Apr-21| 08:19 \nfeature.xml_promotedlinks| feature.xml| | 497| 15-Apr-21| 08:19 \nschedule.xml| schedulelist.xml| | 526| 15-Apr-21| 08:19 \nfeature.xml_schedule| feature.xml| | 546| 15-Apr-21| 08:19 \nschema.xml_schedule| schema.xml| | 23502| 15-Apr-21| 08:19 \nfeature.xml_sharewitheveryone| feature.xml| | 622| 15-Apr-21| 08:19 \nfeature.xml_sharewitheveryonestapling| feature.xml| | 449| 15-Apr-21| 08:19 \nfeature.xml_sharewitheveryonefeaturestp| featurestapling.xml| | 215| 15-Apr-21| 08:19 \nfeature.xml_siteassets| feature.xml| | 526| 15-Apr-21| 08:19 \nfeature.xml_sitehelp| feature.xml| | 804| 15-Apr-21| 08:19 \nfeature.xml_sitenotebook| feature.xml| | 703| 15-Apr-21| 08:19 \nfeature.xml_0002| feature.xml| | 516| 15-Apr-21| 08:19 \nsitesettings.xml| sitesettings.xml| | 21358| 15-Apr-21| 08:19 \nelements.xml_sitestat| elements.xml| | 334| 15-Apr-21| 08:19 \nelements14.xml_sitestat| elements.xml| | 334| 15-Apr-21| 08:19 \nfeature.xml_sitestat| feature.xml| | 397| 15-Apr-21| 08:19 \nfeature14.xml_sitestat| feature.xml| | 397| 15-Apr-21| 08:19 \nupgfeature.xml| feature.xml| | 528| 15-Apr-21| 08:19 \nupgfeature.xml_14| feature.xml| | 528| 15-Apr-21| 08:19 \nsiteupgrade.xml| siteupgradelinks.xml| | 970| 15-Apr-21| 08:19 \nsiteupgrade.xml_14| siteupgradelinks.xml| | 970| 15-Apr-21| 08:19 \nelements.xml_suitenav| elements.xml| | 478| 15-Apr-21| 08:19 \nfeature.xml_suitenav| feature.xml| | 366| 15-Apr-21| 08:19 \nsurveys.xml| surveys.xml| | 477| 15-Apr-21| 08:19 \nfeature.xml_surveys| feature.xml| | 478| 15-Apr-21| 08:19 \nschema.xml_surveys| schema.xml| | 40244| 15-Apr-21| 08:19 \ntasks.xml| tasks.xml| | 468| 15-Apr-21| 08:19 \nfeature.xml_tasks| feature.xml| | 476| 15-Apr-21| 08:19 \nschema.xml_tasks| schema.xml| | 17465| 15-Apr-21| 08:19 \nfeature_teamcollab.xml| feature.xml| | 3223| 15-Apr-21| 08:19 \ndefault.xml_tenantadminbdc| default.xml| | 347| 15-Apr-21| 08:19 \nfeature.xml_tenantadminbdc| feature.xml| | 514| 15-Apr-21| 08:19 \nfeature.xml_tenantadminbdcstapling| feature.xml| | 443| 15-Apr-21| 08:19 \nfeature.xml_tenantadminbdcfeaturestp| featurestapling.xml| | 222| 15-Apr-21| 08:19 \ndefault.xml_tenantadminlinks| default.xml| | 3573| 15-Apr-21| 08:19 \nfeature.xml_tenantadminlinks| feature.xml| | 517| 15-Apr-21| 08:19 \ntimecard.xml| timecardlist.xml| | 8045| 15-Apr-21| 08:19 \nfeature.xml_timecard| feature.xml| | 916| 15-Apr-21| 08:19 \nschema.xml_timecard| schema.xml| | 8517| 15-Apr-21| 08:19 \nfeature.xml_excelserveredit| feature.xml| | 749| 15-Apr-21| 08:19 \nfeature.xml_excelserveredit_14| feature.xml| | 749| 15-Apr-21| 08:19 \nfeature.xml_officewebapps| feature.xml| | 752| 15-Apr-21| 08:19 \nfeature.xml_officewebapps_14| feature.xml| | 752| 15-Apr-21| 08:19 \nfeature.xml_onenoteserverviewing| feature.xml| | 752| 15-Apr-21| 08:19 \nfeature.xml_onenoteserverviewing_14| feature.xml| | 752| 15-Apr-21| 08:19 \nfeature.xml_wordserverviewing| feature.xml| | 752| 15-Apr-21| 08:19 \nfeature.xml_wordserverviewing_14| feature.xml| | 752| 15-Apr-21| 08:19 \nwbpglib.xml| webpagelibrary.xml| | 496| 15-Apr-21| 08:19 \nfeature.xml_webpagelib| feature.xml| | 478| 15-Apr-21| 08:19 \nschema.xml_webpagelib| schema.xml| | 16443| 15-Apr-21| 08:19 \nupload.aspx_webpagelib| upload.aspx| | 5911| 15-Apr-21| 08:19 \nwhatsnew.xml| whatsnewlist.xml| | 518| 15-Apr-21| 08:19 \nfeature.xml_whatsnew| feature.xml| | 521| 15-Apr-21| 08:19 \nschema.xml_whatsnew| schema.xml| | 21487| 15-Apr-21| 08:19 \nwhereabouts.xml| whereaboutslist.xml| | 1704| 15-Apr-21| 08:19 \nfeature.xml_whereabouts| feature.xml| | 1067| 15-Apr-21| 08:19 \nschema.xml_whereabouts| schema.xml| | 149506| 15-Apr-21| 08:19 \nfeature.xml_wikipagehomepage| feature.xml| | 902| 15-Apr-21| 08:19 \nfeature.xml_wikiwelcome| feature.xml| | 594| 15-Apr-21| 08:19 \nworkflowhistory.xml| workflowhistory.xml| | 489| 15-Apr-21| 08:19 \nfeature.xml_wrkflhis| feature.xml| | 482| 15-Apr-21| 08:19 \nschema.xml_wrkflhis| schema.xml| | 8019| 15-Apr-21| 08:19 \nworkflowprocess.xml| workflowprocess.xml| | 496| 15-Apr-21| 08:19 \nfeature.xml_wrkflproc| feature.xml| | 531| 15-Apr-21| 08:19 \nschema.xml_wrkflprc| schema.xml| | 629| 15-Apr-21| 08:19 \nformlib.xml| xmlformlibrary.xml| | 477| 15-Apr-21| 08:19 \nfeature.xml_xmlform| feature.xml| | 472| 15-Apr-21| 08:19 \neditdlg.htm_xmlform| editdlg.htm| | 4892| 15-Apr-21| 08:19 \nfiledlg.htm_xmlform| filedlg.htm| | 4754| 15-Apr-21| 08:19 \nrepair.aspx_xmlform| repair.aspx| | 3272| 15-Apr-21| 08:19 \nschema.xml_xmlform| schema.xml| | 20593| 15-Apr-21| 08:19 \nupload.aspx_xmlform| upload.aspx| | 5911| 15-Apr-21| 08:19 \nfgimg.png| fgimg.png| | 11776| 15-Apr-21| 08:19 \nmicrosoft.sharepoint.health.dll| microsoft.sharepoint.health.dll| 15.0.4989.1000| 109896| 15-Apr-21| 08:19 \nmicrosoft.sharepoint.identitymodel.dll| microsoft.sharepoint.identitymodel.dll| 15.0.5249.1000| 263048| 15-Apr-21| 08:19 \nadmin.dll_0001| admin.dll| 15.0.4454.1000| 18528| 15-Apr-21| 08:19 \nauthor.dll_0001| author.dll| 15.0.4454.1000| 18528| 15-Apr-21| 08:19 \nshtml.dll_0001| shtml.dll| 15.0.4454.1000| 18544| 15-Apr-21| 08:19 \njsgridcluster.png| jsgridcluster.png| | 2003| 15-Apr-21| 08:19 \nmicrosoft.online.sharepoint.dedicated.tenantadmin.dll| microsoft.online.sharepoint.dedicated.tenantadmin.dll| 15.0.4605.1000| 48832| 15-Apr-21| 08:19 \nmicrosoft.online.sharepoint.dedicated.tenantadmin.serverstub.dll| microsoft.online.sharepoint.dedicated.tenantadmin.serverstub.dll| 15.0.4535.1000| 79608| 15-Apr-21| 08:19 \nmicrosoft.sharepoint.client.dll| microsoft.sharepoint.client.dll| 15.0.5337.1000| 499096| 15-Apr-21| 07:28 \nmicrosoft.sharepoint.client.dll_0001| microsoft.sharepoint.client.dll| 15.0.5337.1000| 499096| 15-Apr-21| 07:28 \ntaps_client.dll| microsoft.sharepoint.client.dll| 15.0.5337.1000| 499096| | \nmicrosoft.sharepoint.client.phone.dll| microsoft.sharepoint.client.phone.dll| 15.0.5337.1000| 434072| 15-Apr-21| 08:18 \nmicrosoft.sharepoint.client.phone.runtime.dll| microsoft.sharepoint.client.phone.runtime.dll| 15.0.4859.1000| 206616| 15-Apr-21| 08:18 \nmicrosoft.sharepoint.client.runtime.dll| microsoft.sharepoint.client.runtime.dll| 15.0.4859.1000| 298240| 15-Apr-21| 07:28 \nmicrosoft.sharepoint.client.runtime.dll_0001| microsoft.sharepoint.client.runtime.dll| 15.0.4859.1000| 298240| 15-Apr-21| 07:28 \ntaps_client.runtime.dll| microsoft.sharepoint.client.runtime.dll| 15.0.4859.1000| 298240| | \nmicrosoft.sharepoint.client.serverruntime.dll| microsoft.sharepoint.client.serverruntime.dll| 15.0.4905.1000| 630608| 15-Apr-21| 08:19 \nmicrosoft.sharepoint.client.serverruntime.dll_0001| microsoft.sharepoint.client.serverruntime.dll| 15.0.4905.1000| 630608| 15-Apr-21| 08:19 \nmicrosoft.sharepoint.client.silverlight.dll| microsoft.sharepoint.client.silverlight.dll| 15.0.5337.1000| 433544| 15-Apr-21| 07:28 \nmicrosoft.sharepoint.client.silverlight.runtime.dll| microsoft.sharepoint.client.silverlight.runtime.dll| 15.0.4859.1000| 197424| 15-Apr-21| 07:28 \nspmintl.dll| microsoft.sharepoint.linq.codegeneration.intl.dll| 15.0.4420.1017| 17032| 15-Apr-21| 08:19 \nspldtsvc.dll| microsoft.sharepoint.linq.dataservice.dll| 15.0.4633.1000| 42720| 15-Apr-21| 08:19 \nsplinq.dll| microsoft.sharepoint.linq.dll| 15.0.4843.1000| 376032| 15-Apr-21| 08:19 \nsplinqvs.dll| microsoft.sharepoint.linq.dll| 15.0.4843.1000| 376032| 15-Apr-21| 08:19 \nsplintl.dll| microsoft.sharepoint.linq.intl.dll| 15.0.4420.1017| 26784| 15-Apr-21| 08:19 \nmicrosoft.sharepoint.serverstub.dll| microsoft.sharepoint.serverstub.dll| 15.0.5337.1000| 1420696| 15-Apr-21| 08:19 \nspnativerequestmoduledll_0001| spnativerequestmodule.dll| | 42064| 15-Apr-21| 08:19 \noffprsx.dll| offparser.dll| 15.0.5337.1000| 1489304| 15-Apr-21| 08:19 \noisimg.dll| oisimg.dll| 15.0.5085.1000| 96848| 15-Apr-21| 08:19 \nstslib.dll_0001| microsoft.sharepoint.library.dll| 15.0.4971.1000| 184576| 15-Apr-21| 08:19 \nowssvr.dll_0001| owssvr.dll| 15.0.5345.1000| 6378888| 15-Apr-21| 08:19 \nsts11plc.config| policy.11.0.microsoft.sharepoint.config| | 590| 15-Apr-21| 08:19 \nsts11plc.dll| policy.11.0.microsoft.sharepoint.dll| 15.0.4420.1017| 12456| 15-Apr-21| 08:19 \nspsec11.config| policy.11.0.microsoft.sharepoint.security.config| | 599| 15-Apr-21| 08:19 \nspsec11.dll| policy.11.0.microsoft.sharepoint.security.dll| 15.0.4420.1017| 12496| 15-Apr-21| 08:19 \nsts12plc.config| policy.12.0.microsoft.sharepoint.config| | 590| 15-Apr-21| 08:19 \nsts12plc.dll| policy.12.0.microsoft.sharepoint.dll| 15.0.4420.1017| 12456| 15-Apr-21| 08:19 \nspsec12.config| policy.12.0.microsoft.sharepoint.security.config| | 599| 15-Apr-21| 08:19 \nspsec12.dll| policy.12.0.microsoft.sharepoint.security.dll| 15.0.4420.1017| 12456| 15-Apr-21| 08:19 \nwfa12plc.config| policy.12.0.microsoft.sharepoint.workflowactions.config| | 606| 15-Apr-21| 08:19 \nwfa12plc.dll| policy.12.0.microsoft.sharepoint.workflowactions.dll| 15.0.4420.1017| 12488| 15-Apr-21| 08:19 \nwfs12plc.config| policy.12.0.microsoft.sharepoint.workflows.config| | 600| 15-Apr-21| 08:19 \nwfs12plc.dll| policy.12.0.microsoft.sharepoint.workflows.dll| 15.0.4420.1017| 12496| 15-Apr-21| 08:19 \nbusinessdata14.config| policy.14.0.microsoft.businessdata.config| | 592| 15-Apr-21| 08:19 \nbusinessdata14.dll| policy.14.0.microsoft.businessdata.dll| 15.0.4420.1017| 12464| 15-Apr-21| 08:19 \nclt14plc.config| policy.14.0.microsoft.sharepoint.client.config| | 597| 15-Apr-21| 08:19 \nclt14plc.dll| policy.14.0.microsoft.sharepoint.client.dll| 15.0.4420.1017| 12472| 15-Apr-21| 08:19 \ncltrtm14.config| policy.14.0.microsoft.sharepoint.client.runtime.config| | 605| 15-Apr-21| 08:19 \ncltrtm14.dll| policy.14.0.microsoft.sharepoint.client.runtime.dll| 15.0.4420.1017| 12488| 15-Apr-21| 08:19 \ncltsvr14.config| policy.14.0.microsoft.sharepoint.client.serverruntime.config| | 611| 15-Apr-21| 08:19 \ncltsvr14.dll| policy.14.0.microsoft.sharepoint.client.serverruntime.dll| 15.0.4420.1017| 12496| 15-Apr-21| 08:19 \nsts14plc.config| policy.14.0.microsoft.sharepoint.config| | 590| 15-Apr-21| 08:19 \nsts14plc.dll| policy.14.0.microsoft.sharepoint.dll| 15.0.4420.1017| 12472| 15-Apr-21| 08:19 \nlinq14.config| policy.14.0.microsoft.sharepoint.linq.config| | 595| 15-Apr-21| 08:19 \nlinq14.dll| policy.14.0.microsoft.sharepoint.linq.dll| 15.0.4420.1017| 12464| 15-Apr-21| 08:19 \npowshl14.config| policy.14.0.microsoft.sharepoint.powershell.config| | 601| 15-Apr-21| 08:19 \npowshl14.dll| policy.14.0.microsoft.sharepoint.powershell.dll| 15.0.4420.1017| 12480| 15-Apr-21| 08:19 \nspsec14.config| policy.14.0.microsoft.sharepoint.security.config| | 599| 15-Apr-21| 08:19 \nspsec14.dll| policy.14.0.microsoft.sharepoint.security.dll| 15.0.4420.1017| 12456| 15-Apr-21| 08:19 \nwfa14plc.config| policy.14.0.microsoft.sharepoint.workflowactions.config| | 606| 15-Apr-21| 08:19 \nwfa14plc.dll| policy.14.0.microsoft.sharepoint.workflowactions.dll| 15.0.4420.1017| 12488| 15-Apr-21| 08:19 \nwfs14plc.config| policy.14.0.microsoft.sharepoint.workflows.config| | 600| 15-Apr-21| 08:19 \nwfs14plc.dll| policy.14.0.microsoft.sharepoint.workflows.dll| 15.0.4420.1017| 12496| 15-Apr-21| 08:19 \ncmdui14.config| policy.14.0.microsoft.web.commandui.config| | 593| 15-Apr-21| 08:19 \ncmdui14.dll| policy.14.0.microsoft.web.commandui.dll| 15.0.4420.1017| 12464| 15-Apr-21| 08:19 \nformat.ps1xml| sharepointpowershell.format.ps1xml| | 61362| 15-Apr-21| 08:19 \nmicrosoft.sharepoint.powershell.dll_0001| microsoft.sharepoint.powershell.dll| 15.0.4949.1000| 993024| 15-Apr-21| 08:19 \nmicrosoft.sharepoint.powershell.intl.dll| microsoft.sharepoint.powershell.intl.dll| 15.0.4863.1000| 95488| 15-Apr-21| 08:19 \npsconsole.psc1| psconsole.psc1| | 181| 15-Apr-21| 08:19 \nsharepoint.ps1| sharepoint.ps1| | 9838| 15-Apr-21| 08:19 \nspcmdletschema.xsd| spcmdletschema.xsd| | 1114| 15-Apr-21| 08:19 \nwsscmdlet.xml| wsscmdlet.xml| | 113235| 15-Apr-21| 08:19 \ntypes.ps1xml| sharepointpowershell.types.ps1xml| | 18000| 15-Apr-21| 08:19 \npscintl.dll| microsoft.sharepoint.setupconfiguration.intl.dll| 15.0.5197.1000| 2087008| 15-Apr-21| 08:19 \npsconfig.exe| psconfig.exe| 15.0.4939.1000| 564544| 15-Apr-21| 08:19 \npsconfig.exe.config| psconfig.exe.config| | 273| 15-Apr-21| 08:19 \npsconfigui.exe| psconfigui.exe| 15.0.4939.1000| 825664| 15-Apr-21| 08:19 \npsconfigui.exe.config| psconfigui.exe.config| | 273| 15-Apr-21| 08:19 \ncore_0.rsx| core.resx| | 490005| 15-Apr-21| 08:19 \nadmincfg.xml| adminconfig.xml| | 1288| 15-Apr-21| 08:19 \nbdcservice.xml| bdcservice.xml| | 632| 15-Apr-21| 08:19 \njoinfarm.xml| joinfarm.xml| | 648| 15-Apr-21| 08:19 \nsilverlight.js_script| silverlight.js| | 7950| 15-Apr-21| 08:19 \nsts_addgallery_ooprovider| addgallery.officeonlineprovider.dll| 15.0.4420.1017| 43144| 15-Apr-21| 08:19 \naddgallery.aspx_silverlight| addgallery.aspx| | 11755| 15-Apr-21| 08:19 \ndldsln16.png| dldsln16.png| | 912| 15-Apr-21| 08:19 \ndldsln32.png| dldsln32.png| | 2612| 15-Apr-21| 08:19 \nsts_addgallery_server| microsoft.sharepoint.addgallery.server.dll| 15.0.5345.1000| 118168| 15-Apr-21| 08:19 \nsp.datetimeutil.res_0.resx| sp.datetimeutil.res.resx| | 5825| 15-Apr-21| 08:19 \nsp.datetimeutil.res_0.resx_0.scriptx| sp.datetimeutil.res.resx.scriptx| | 255| 15-Apr-21| 08:19 \nsp.jsgrid.res_0.resx| sp.jsgrid.res.resx| | 16415| 15-Apr-21| 08:19 \nsp.jsgrid.res_0.resx_0.scriptx| sp.jsgrid.res.resx.scriptx| | 249| 15-Apr-21| 08:19 \nsp.res_0.resx| sp.res.resx| | 74046| 15-Apr-21| 08:19 \nspmetal.exe| spmetal.exe| 15.0.4420.1017| 140488| 15-Apr-21| 08:19 \nsts.spuchostservice.exe| spuchostservice.exe| 15.0.4525.1000| 118040| 15-Apr-21| 08:19 \nsts.spuchostservice.exe.config| spuchostservice.exe.config| | 644| 15-Apr-21| 08:19 \nsts.spucworkerprocess.exe| spucworkerprocess.exe| 15.0.4510.1000| 46856| 15-Apr-21| 08:19 \nsts.spucworkerprocess.exe.config| spucworkerprocess.exe.config| | 654| 15-Apr-21| 08:19 \nsts.spucworkerprocessproxy.exe| spucworkerprocessproxy.exe| 15.0.4420.1017| 115440| 15-Apr-21| 08:19 \nsts.spucworkerprocessproxy.exe.config| spucworkerprocessproxy.exe.config| | 644| 15-Apr-21| 08:19 \nspusercode.dll_0001| microsoft.sharepoint.usercode.dll| 15.0.4525.1000| 26816| 15-Apr-21| 08:19 \nadmsoap.dll| admsoap.dll| 15.0.4420.1017| 15496| 15-Apr-21| 08:19 \nadmin.amx| admin.asmx| | 86| 15-Apr-21| 08:19 \nadmdisco.asx| admindisco.aspx| | 1283| 15-Apr-21| 08:19 \nadmwsdl.asx| adminwsdl.aspx| | 9474| 15-Apr-21| 08:19 \nweb.cfg_0001| web.config| | 445| 15-Apr-21| 08:19 \nstsadm.exe| stsadm.exe| 15.0.4420.1017| 350392| 15-Apr-21| 08:19 \nstsadm.exe.config| stsadm.exe.config| | 272| 15-Apr-21| 08:19 \nstscfg.exe| stscfg.exe| 15.0.4420.1017| 14944| 15-Apr-21| 08:19 \nbecwebserviceclientconfig| client.config| | 1437| 15-Apr-21| 08:19 \nsecuritytokenappsvc| appsts.svc| | 452| 15-Apr-21| 08:19 \nappwrweb.cfg| appwpresweb.config| | 1210| 15-Apr-21| 08:19 \ncloudweb.cfg| cloudweb.config| | 67174| 15-Apr-21| 08:19 \nstsomdia.dll| microsoft.sharepoint.diagnostics.dll| 15.0.4420.1017| 18080| 15-Apr-21| 08:19 \nstsom.dll| microsoft.sharepoint.dll| 15.0.5345.1000| 26888584| 16-Apr-21| 10:13 \nstsom.dll_0001| microsoft.sharepoint.dll| 15.0.5345.1000| 26888584| 16-Apr-21| 10:13 \nxlsrv.ecs.stsom.dll| microsoft.sharepoint.dll| 15.0.5345.1000| 26888584| 16-Apr-21| 10:13 \nxlsrv.ecswatchdog.stsom.dll| microsoft.sharepoint.dll| 15.0.5345.1000| 26888584| 16-Apr-21| 10:13 \nxlsrv.stsom.dll| microsoft.sharepoint.dll| 15.0.5345.1000| 26888584| 16-Apr-21| 10:13 \nstsomdr.dll| microsoft.sharepoint.intl.dll| 15.0.5297.1000| 1260440| 15-Apr-21| 08:19 \nbdcservice.svc| bdcservice.svc| | 383| 15-Apr-21| 08:19 \nbdcwebclient.config| client.config| | 2125| 15-Apr-21| 08:19 \nbdcserviceweb.config| web.config| | 3156| 15-Apr-21| 08:19 \nsecuritytokenclientconfig| client.config| | 3448| 15-Apr-21| 08:19 \nsecuritytokenconfig| web.config| | 6235| 15-Apr-21| 08:19 \nsecuritytokensvc| securitytoken.svc| | 443| 15-Apr-21| 08:19 \nwintokcachesvc| windowstokencache.svc| | 395| 15-Apr-21| 08:19 \nsubscriptionsettingsclientconfig| client.config| | 2369| 15-Apr-21| 08:19 \nsubscriptionsettingsservicesvc| subscriptionsettings.svc| | 367| 15-Apr-21| 08:19 \nsubscriptionsettingsserviceconfig| web.config| | 2647| 15-Apr-21| 08:19 \ntopologyclientconfig| client.config| | 982| 15-Apr-21| 08:19 \ntopologyservicesvc| topology.svc| | 347| 15-Apr-21| 08:19 \ntopologyserviceconfig| web.config| | 1604| 15-Apr-21| 08:19 \nusercodeweb.cfg| web.config| | 1002| 15-Apr-21| 08:19 \nweb.cfg| web.config| | 67174| 15-Apr-21| 08:19 \nweb.cfg_0003| web.config| | 258| 15-Apr-21| 08:19 \nstsap.dll| microsoft.sharepoint.applicationpages.dll| 15.0.5345.1000| 1483688| 15-Apr-21| 08:19 \nstsomsec.dll| microsoft.sharepoint.security.dll| 15.0.4420.1017| 16512| 15-Apr-21| 07:28 \nstsomsec.dll_0001| microsoft.sharepoint.security.dll| 15.0.4420.1017| 16512| 15-Apr-21| 07:28 \nxlsrv.spsec.dll| microsoft.sharepoint.security.dll| 15.0.4420.1017| 16512| 15-Apr-21| 07:28 \nsppimps.xml| sharepointpermission.impersonate.xml| | 207| 15-Apr-21| 08:19 \nsppom.xml| sharepointpermission.objectmodel.xml| | 207| 15-Apr-21| 08:19 \nsppusog.xml| sharepointpermission.unsafesaveonget.xml| | 211| 15-Apr-21| 08:19 \nwssmedtr.cfg| wss_mediumtrust.config| | 13782| 15-Apr-21| 08:19 \nwssmintr.cfg| wss_minimaltrust.config| | 9149| 15-Apr-21| 08:19 \nusercode.cfg| wss_usercode.config| | 5855| 15-Apr-21| 08:19 \nsub.amx| alerts.asmx| | 88| 15-Apr-21| 08:19 \nsubdisco.asx| alertsdisco.aspx| | 1313| 15-Apr-21| 08:19 \nsubwsdl.asx| alertswsdl.aspx| | 8824| 15-Apr-21| 08:19 \nauth.amx| authentication.asmx| | 96| 15-Apr-21| 08:19 \nautdisco.asx| authenticationdisco.aspx| | 1301| 15-Apr-21| 08:19 \nautwsdl.asx| authenticationwsdl.aspx| | 5968| 15-Apr-21| 08:19 \nbdcadminservice.svc| bdcadminservice.svc| | 332| 15-Apr-21| 08:19 \nbdcexecutionservice.svc| bdcremoteexecutionservice.svc| | 197| 15-Apr-21| 08:19 \nbdcresolverpickerservice.svc| bdcresolverpickerservice.svc| | 402| 15-Apr-21| 08:19 \ncellstorage.https.svc| cellstorage.https.svc| | 205| 15-Apr-21| 08:19 \ncellstorage.svc| cellstorage.svc| | 200| 15-Apr-21| 08:19 \ncopy.amx| copy.asmx| | 86| 15-Apr-21| 08:19 \ncopdisco.asx| copydisco.aspx| | 1281| 15-Apr-21| 08:19 \ncopwsdl.asx| copywsdl.aspx| | 11267| 15-Apr-21| 08:19 \ndiagnostics.amx| diagnostics.asmx| | 103| 15-Apr-21| 08:19 \ndiagdata.svc| diagnosticsdata.svc| | 391| 15-Apr-21| 08:19 \ndiagnosticsdisco.asx| diagnosticsdisco.aspx| | 1329| 15-Apr-21| 08:19 \ndiagnosticswsdl.asx| diagnosticswsdl.aspx| | 4677| 15-Apr-21| 08:19 \ndocumentsharing.svc| documentsharing.svc| | 331| 15-Apr-21| 08:19 \ndspsts.amx| dspsts.asmx| | 179| 15-Apr-21| 08:19 \ndspstsdi.asx_0001| dspstsdisco.aspx| | 1289| 15-Apr-21| 08:19 \ndspstsws.asx_0001| dspstswsdl.aspx| | 10966| 15-Apr-21| 08:19 \ndws.amx| dws.asmx| | 85| 15-Apr-21| 08:19 \ndwsdisco.asx| dwsdisco.aspx| | 1287| 15-Apr-21| 08:19 \ndwswsdl.asx| dwswsdl.aspx| | 20223| 15-Apr-21| 08:19 \nexcelrest.asx| excelrest.aspx| | 202| 15-Apr-21| 08:19 \nexportwp.asx| exportwp.aspx| | 498| 15-Apr-21| 08:19 \nexpurlwp.asx| expurlwp.aspx| | 243| 15-Apr-21| 08:19 \nforms.amx| forms.asmx| | 87| 15-Apr-21| 08:19 \nfordisco.asx| formsdisco.aspx| | 1283| 15-Apr-21| 08:19 \nforwsdl.asx| formswsdl.aspx| | 5644| 15-Apr-21| 08:19 \nimaging.amx| imaging.asmx| | 89| 15-Apr-21| 08:19 \nimadisco.asx| imagingdisco.aspx| | 1295| 15-Apr-21| 08:19 \nimawsdl.asx| imagingwsdl.aspx| | 24227| 15-Apr-21| 08:19 \nlistdata.svc| listdata.svc| | 392| 15-Apr-21| 08:19 \nlists.amx| lists.asmx| | 87| 15-Apr-21| 08:19 \nlisdisco.asx| listsdisco.aspx| | 1283| 15-Apr-21| 08:19 \nliswsdl.asx| listswsdl.aspx| | 73094| 15-Apr-21| 08:19 \nmeetings.amx| meetings.asmx| | 90| 15-Apr-21| 08:19 \nmeedisco.asx| meetingsdisco.aspx| | 1307| 15-Apr-21| 08:19 \nmeewsdl.asx| meetingswsdl.aspx| | 26921| 15-Apr-21| 08:19 \nonenote.ashx| onenote.ashx| | 89| 15-Apr-21| 08:19 \npeople.amx| people.asmx| | 88| 15-Apr-21| 08:19 \nppldisco.asx| peopledisco.aspx| | 1285| 15-Apr-21| 08:19 \npplwsdl.asx| peoplewsdl.aspx| | 9093| 15-Apr-21| 08:19 \nperms.amx| permissions.asmx| | 94| 15-Apr-21| 08:19 \nperdisco.asx| permissionsdisco.aspx| | 1315| 15-Apr-21| 08:19 \nperwsdl.asx| permissionswsdl.aspx| | 13698| 15-Apr-21| 08:19 \nsharedaccess.amx| sharedaccess.asmx| | 94| 15-Apr-21| 08:19 \nsharedaccessdisco.asx| sharedaccessdisco.aspx| | 1297| 15-Apr-21| 08:19 \nsharedaccesswsdl.asx| sharedaccesswsdl.aspx| | 4036| 15-Apr-21| 08:19 \nsharepointemailws.amx| sharepointemailws.asmx| | 98| 15-Apr-21| 08:19 \nsharepointemailwsdisco.asx| sharepointemailwsdisco.aspx| | 1349| 15-Apr-21| 08:19 \nsharepointemailwswsdl.asx| sharepointemailwswsdl.aspx| | 25799| 15-Apr-21| 08:19 \nsitedata.amx| sitedata.asmx| | 90| 15-Apr-21| 08:19 \nsdadisco.asx| sitedatadisco.aspx| | 1289| 15-Apr-21| 08:19 \nsdawsdl.asx| sitedatawsdl.aspx| | 36711| 15-Apr-21| 08:19 \nsites.amx| sites.asmx| | 87| 15-Apr-21| 08:19 \nsitdisco.asx| sitesdisco.aspx| | 1283| 15-Apr-21| 08:19 \nsitwsdl.asx| siteswsdl.aspx| | 22976| 15-Apr-21| 08:19 \nspclaimproviderwebservice.https.svc| spclaimproviderwebservice.https.svc| | 115| 15-Apr-21| 08:19 \nspclaimproviderwebservice.svc| spclaimproviderwebservice.svc| | 110| 15-Apr-21| 08:19 \nspdisco.asx| spdisco.aspx| | 11428| 15-Apr-21| 08:19 \nspsearchdisco.asx| spsearchdisco.aspx| | 1319| 15-Apr-21| 08:19 \nspsearchwsdl.asx| spsearchwsdl.aspx| | 8629| 15-Apr-21| 08:19 \nspsecuritytokenservice.svc| spsecuritytokenservice.svc| | 476| 15-Apr-21| 08:19 \nweb.config_sts| web.config| | 4845| 15-Apr-21| 08:19 \nusergrp.amx| usergroup.asmx| | 92| 15-Apr-21| 08:19 \nusedisco.asx| usergroupdisco.aspx| | 1311| 15-Apr-21| 08:19 \nusewsdl.asx| usergroupwsdl.aspx| | 82880| 15-Apr-21| 08:19 \nversions.amx| versions.asmx| | 90| 15-Apr-21| 08:19 \nverdisco.asx| versionsdisco.aspx| | 1289| 15-Apr-21| 08:19 \nverwsdl.asx| versionswsdl.aspx| | 9474| 15-Apr-21| 08:19 \nviews.amx| views.asmx| | 87| 15-Apr-21| 08:19 \nviedisco.asx| viewsdisco.aspx| | 1283| 15-Apr-21| 08:19 \nviewsdl.asx| viewswsdl.aspx| | 25520| 15-Apr-21| 08:19 \nweb.cfg_0010| web.config| | 13944| 15-Apr-21| 08:19 \nwppages.amx| webpartpages.asmx| | 186| 15-Apr-21| 08:19 \nwppdisco.asx| webpartpagesdisco.aspx| | 1315| 15-Apr-21| 08:19 \nwppwsdl.asx| webpartpageswsdl.aspx| | 56408| 15-Apr-21| 08:19 \nwebs.amx| webs.asmx| | 86| 15-Apr-21| 08:19 \nwebdisco.asx| websdisco.aspx| | 1281| 15-Apr-21| 08:19 \nwebwsdl.asx| webswsdl.aspx| | 41302| 15-Apr-21| 08:19 \nwopi.ashx| wopi.ashx| | 86| 15-Apr-21| 08:19 \nwsdisco.asx| wsdisco.aspx| | 1806| 15-Apr-21| 08:19 \nwswsdl.asx| wswsdl.aspx| | 1904| 15-Apr-21| 08:19 \nstssoap.dll| stssoap.dll| 15.0.5172.1000| 554088| 15-Apr-21| 08:19 \nsubsetproxy.dll_0001| microsoft.sharepoint.subsetproxy.dll| 15.0.5313.1000| 841624| 15-Apr-21| 08:19 \nsubsetshim.dll_0001| microsoft.sharepoint.dll| 15.900.5345.1000| 2134432| 15-Apr-21| 08:19 \nalerttmp.xml| alerttemplates.xml| | 458234| 15-Apr-21| 08:19 \nalerttms.xml| alerttemplates_sms.xml| | 51863| 15-Apr-21| 08:19 \ndefault.aspx_app| default.aspx| | 1168| 15-Apr-21| 08:19 \nonet.xml_app| onet.xml| | 4911| 15-Apr-21| 08:19 \ndefault.aspx_appcatalog| default.aspx| | 4026| 15-Apr-21| 08:19 \nonet.xml_appcatalog| onet.xml| | 6262| 15-Apr-21| 08:19 \napphostwebfeatures.xsd| apphostwebfeatures.xsd| | 17579| 15-Apr-21| 08:19 \nappmanifest.xsd| appmanifest.xsd| | 20392| 15-Apr-21| 08:19 \napppartconfig.xsd| apppartconfig.xsd| | 2826| 15-Apr-21| 08:19 \nappsolution.xsd| appsolution.xsd| | 101258| 15-Apr-21| 08:19 \nblog.xsl| blog.xsl| | 37383| 15-Apr-21| 08:19 \nonet.xml_blog| onet.xml| | 6549| 15-Apr-21| 08:19 \ncamlqry.xsd| camlquery.xsd| | 10890| 15-Apr-21| 08:19 \ncamlview.xsd| camlview.xsd| | 19014| 15-Apr-21| 08:19 \ncpchkers.xsd| capabilitycheckers.xsd| | 1924| 15-Apr-21| 08:19 \nschema.xml_0010| schema.xml| | 16975| 15-Apr-21| 08:19 \ndmslstallitems_aspx| allitems.aspx| | 2731| 15-Apr-21| 08:19 \ndmslstcreatedls_aspx| createdls.aspx| | 2731| 15-Apr-21| 08:19 \ndmslstdeletedls_aspx| deletedls.aspx| | 2731| 15-Apr-21| 08:19 \ndmslstdispform_aspx| dispform.aspx| | 4190| 15-Apr-21| 08:19 \ndmslsteditform_aspx| editform.aspx| | 4167| 15-Apr-21| 08:19 \ndmslstmodifydls_aspx| modifydls.aspx| | 2731| 15-Apr-21| 08:19 \ndmslstnewform_aspx| newform.aspx| | 4197| 15-Apr-21| 08:19 \ndmslstschema_xml| schema.xml| | 22840| 15-Apr-21| 08:19 \ntopology.dwp| topologyview.dwp| | 495| 15-Apr-21| 08:19 \nschema.xml_1221| schema.xml| | 9478| 15-Apr-21| 08:19 \nschema.xml_1220| schema.xml| | 7583| 15-Apr-21| 08:19 \napplications.asx_0014| applications.aspx| | 3724| 15-Apr-21| 08:19 \napps.asx_0014| apps.aspx| | 3708| 15-Apr-21| 08:19 \nbackups.asx_0014| backups.aspx| | 3714| 15-Apr-21| 08:19 \nconfigurationwizards.asx_0014| configurationwizards.aspx| | 3740| 15-Apr-21| 08:19 \ndefault.asx_0014| default.aspx| | 5454| 15-Apr-21| 08:19 \ngenappsettings.asx_0014| generalapplicationsettings.aspx| | 3753| 15-Apr-21| 08:19 \nmonitoring.asx_0014| monitoring.aspx| | 3720| 15-Apr-21| 08:19 \no365config.asx_0015| office365configuration.aspx| | 3838| 15-Apr-21| 08:19 \nsecurity.asx_0014| security.aspx| | 3716| 15-Apr-21| 08:19 \nsysset.asx_0014| systemsettings.aspx| | 3728| 15-Apr-21| 08:19 \nupgandmig.asx_0014| upgradeandmigration.aspx| | 3738| 15-Apr-21| 08:19 \nonet.xml_0006| onet.xml| | 10552| 15-Apr-21| 08:19 \ncoredefs.xsd| coredefinitions.xsd| | 3308| 15-Apr-21| 08:19 \ndeplset.xsd| deploymentexportsettings.xsd| | 4494| 15-Apr-21| 08:19 \ndepllook.xsd| deploymentlookuplistmap.xsd| | 1632| 15-Apr-21| 08:19 \ndepl.xsd| deploymentmanifest.xsd| | 79362| 15-Apr-21| 08:19 \ndeplreq.xsd| deploymentrequirements.xsd| | 1262| 15-Apr-21| 08:19 \ndeplroot.xsd| deploymentrootobjectmap.xsd| | 1642| 15-Apr-21| 08:19 \ndeplsys.xsd| deploymentsystemdata.xsd| | 3065| 15-Apr-21| 08:19 \ndepluser.xsd| deploymentusergroupmap.xsd| | 3386| 15-Apr-21| 08:19 \ndeplform.xsd| deploymentviewformslist.xsd| | 877| 15-Apr-21| 08:19 \ndip.css| dip.css| | 1781| 15-Apr-21| 08:19 \ndip.css_14| dip.css| | 1781| 15-Apr-21| 08:19 \ndip.html| dip.html| | 4328| 15-Apr-21| 08:19 \ndip.html_14| dip.html| | 4328| 15-Apr-21| 08:19 \ndip.js| dip.js| | 63039| 15-Apr-21| 08:19 \ndip.js_14| dip.js| | 63039| 15-Apr-21| 08:19 \nmessagebanner.js| messagebanner.js| | 4968| 15-Apr-21| 08:19 \nmessagebanner.js_14| messagebanner.js| | 4968| 15-Apr-21| 08:19 \ndocicon.xml| docicon.xml| | 16363| 15-Apr-21| 08:19 \nwkpstd.asx_wiki| wkpstd.aspx| | 3356| 15-Apr-21| 08:19 \nfldtypes.xml| fldtypes.xml| | 256018| 15-Apr-21| 08:19 \nfldtypes.xsl| fldtypes.xsl| | 133256| 15-Apr-21| 08:19 \nftacpl.xml| fldtypes_accessrequestspermissionlevel.xml| | 753| 15-Apr-21| 08:19 \nfluidapp.xsd| fluidapplicationsettings.xsd| | 2721| 15-Apr-21| 08:19 \nformxml.xsl| formxml.xsl| | 20914| 15-Apr-21| 08:19 \ngbwdef.asc| gbwdefaulttemplates.ascx| | 57071| 15-Apr-21| 08:19 \ngbwmdef.asc| gbwmobiledefaulttemplates.ascx| | 13722| 15-Apr-21| 08:19 \ndispsr.asx_mobile| dispsr.aspx| | 2702| 15-Apr-21| 08:19 \neditsr.asx_mobile| editsr.aspx| | 2574| 15-Apr-21| 08:19 \nnewsr.asx_mobile| newsr.aspx| | 2570| 15-Apr-21| 08:19 \nviewdaily.asx_mobile| viewdaily.aspx| | 4994| 15-Apr-21| 08:19 \nwaview.asx_mobile| waview.aspx| | 2986| 15-Apr-21| 08:19 \ndefault.aspx_gbw| default.aspx| | 3458| 15-Apr-21| 08:19 \nonet.xml_gbw| onet.xml| | 10911| 15-Apr-21| 08:19 \nschema.xml_appdatalib| schema.xml| | 314| 15-Apr-21| 08:19 \ndefault.spc| default.spcolor| | 5243| 15-Apr-21| 08:19 \npalette001.spcolor| palette001.spcolor| | 5243| 15-Apr-21| 08:19 \npalette002.spcolor| palette002.spcolor| | 5251| 15-Apr-21| 08:19 \npalette003.spcolor| palette003.spcolor| | 5247| 15-Apr-21| 08:19 \npalette004.spcolor| palette004.spcolor| | 5246| 15-Apr-21| 08:19 \npalette005.spcolor| palette005.spcolor| | 5247| 15-Apr-21| 08:19 \npalette006.spcolor| palette006.spcolor| | 5249| 15-Apr-21| 08:19 \npalette007.spcolor| palette007.spcolor| | 5251| 15-Apr-21| 08:19 \npalette008.spcolor| palette008.spcolor| | 5251| 15-Apr-21| 08:19 \npalette009.spcolor| palette009.spcolor| | 5248| 15-Apr-21| 08:19 \npalette010.spcolor| palette010.spcolor| | 5250| 15-Apr-21| 08:19 \npalette011.spcolor| palette011.spcolor| | 5248| 15-Apr-21| 08:19 \npalette012.spcolor| palette012.spcolor| | 5243| 15-Apr-21| 08:19 \npalette013.spcolor| palette013.spcolor| | 5243| 15-Apr-21| 08:19 \npalette014.spcolor| palette014.spcolor| | 5243| 15-Apr-21| 08:19 \npalette015.spcolor| palette015.spcolor| | 5243| 15-Apr-21| 08:19 \npalette016.spcolor| palette016.spcolor| | 5243| 15-Apr-21| 08:19 \npalette017.spcolor| palette017.spcolor| | 5243| 15-Apr-21| 08:19 \npalette018.spcolor| palette018.spcolor| | 5243| 15-Apr-21| 08:19 \npalette019.spcolor| palette019.spcolor| | 5243| 15-Apr-21| 08:19 \npalette020.spcolor| palette020.spcolor| | 5243| 15-Apr-21| 08:19 \npalette021.spcolor| palette021.spcolor| | 5243| 15-Apr-21| 08:19 \npalette022.spcolor| palette022.spcolor| | 5246| 15-Apr-21| 08:19 \npalette023.spcolor| palette023.spcolor| | 5246| 15-Apr-21| 08:19 \npalette024.spcolor| palette024.spcolor| | 5246| 15-Apr-21| 08:19 \npalette025.spcolor| palette025.spcolor| | 5246| 15-Apr-21| 08:19 \npalette026.spcolor| palette026.spcolor| | 5246| 15-Apr-21| 08:19 \npalette027.spcolor| palette027.spcolor| | 5246| 15-Apr-21| 08:19 \npalette028.spcolor| palette028.spcolor| | 5246| 15-Apr-21| 08:19 \npalette029.spcolor| palette029.spcolor| | 5246| 15-Apr-21| 08:19 \npalette030.spcolor| palette030.spcolor| | 5246| 15-Apr-21| 08:19 \npalette031.spcolor| palette031.spcolor| | 5246| 15-Apr-21| 08:19 \npalette032.spcolor| palette032.spcolor| | 5245| 15-Apr-21| 08:19 \npalette1.spcolor| palette1.spcolor| | 3110| 15-Apr-21| 08:19 \npalette2.spcolor| palette2.spcolor| | 3121| 15-Apr-21| 08:19 \npalette3.spcolor| palette3.spcolor| | 3122| 15-Apr-21| 08:19 \npalette4.spcolor| palette4.spcolor| | 3121| 15-Apr-21| 08:19 \npalette5.spcolor| palette5.spcolor| | 3116| 15-Apr-21| 08:19 \npalette6.spcolor| palette6.spcolor| | 3118| 15-Apr-21| 08:19 \nschema.xml_designlib| schema.xml| | 4033| 15-Apr-21| 08:19 \nfnt001.spfont| fontscheme001.spfont| | 15354| 15-Apr-21| 08:19 \nfnt002.spfont| fontscheme002.spfont| | 13545| 15-Apr-21| 08:19 \nfnt003.spfont| fontscheme003.spfont| | 15461| 15-Apr-21| 08:19 \nfnt004.spfont| fontscheme004.spfont| | 15884| 15-Apr-21| 08:19 \nfnt005.spfont| fontscheme005.spfont| | 16065| 15-Apr-21| 08:19 \nfnt006.spfont| fontscheme006.spfont| | 14209| 15-Apr-21| 08:19 \nfnt007.spfont| fontscheme007.spfont| | 15880| 15-Apr-21| 08:19 \ndefault.spf| default.spfont| | 13976| 15-Apr-21| 08:19 \nsharepoint.spfont| sharepointpersonality.spfont| | 13976| 15-Apr-21| 08:19 \nschema.xml_listtemp| schema.xml| | 80036| 15-Apr-21| 08:19 \nupload.asx_listtemp| upload.aspx| | 6141| 15-Apr-21| 08:19 \napp.mas_mplib| app.master| | 19062| 15-Apr-21| 08:19 \ndefault.mas| default.master| | 26292| 15-Apr-21| 08:19 \ndefault.mas_mplib| default.master| | 26292| 15-Apr-21| 08:19 \nlv3.mas| layoutsv3.master| | 13587| 15-Apr-21| 08:19 \nminimal.mas| minimal.master| | 8825| 15-Apr-21| 08:19 \nminimal.mas_mplib| minimal.master| | 8825| 15-Apr-21| 08:19 \nmwsdef.mas_mplib| mwsdefault.master| | 26950| 15-Apr-21| 08:19 \nmwsv15.mas_mplib| mwsdefaultv15.master| | 30580| 15-Apr-21| 08:19 \nmwsv4.mas_mplib| mwsdefaultv4.master| | 27509| 15-Apr-21| 08:19 \noslo.mas_mplib| oslo.master| | 29416| 15-Apr-21| 08:19 \noslo.prev| oslo.preview| | 10159| 15-Apr-21| 08:19 \nschema.xml_mplib| schema.xml| | 84417| 15-Apr-21| 08:19 \nseattle.mas| seattle.master| | 29925| 15-Apr-21| 08:19 \nseattle.mas_mplib| seattle.master| | 29925| 15-Apr-21| 08:19 \nseattle.prev| seattle.preview| | 10725| 15-Apr-21| 08:19 \nupload.asp_mplib| upload.aspx| | 5911| 15-Apr-21| 08:19 \nv4.mas| v4.master| | 26916| 15-Apr-21| 08:19 \nv4.mas_mplib| v4.master| | 26916| 15-Apr-21| 08:19 \nactivate.asx_solutionslib| activate.aspx| | 3861| 15-Apr-21| 08:19 \nschema.xml_solutionslib| schema.xml| | 83463| 15-Apr-21| 08:19 \nupload.asx_solutionslib| upload.aspx| | 5914| 15-Apr-21| 08:19 \nviewpage.asx_solutionslib| viewpage.aspx| | 2718| 15-Apr-21| 08:19 \nschema.xml_themeslib| schema.xml| | 1849| 15-Apr-21| 08:19 \nschema.xml_users| schema.xml| | 392079| 15-Apr-21| 08:19 \neditdlg.htm_webtemp| editdlg.htm| | 4892| 15-Apr-21| 08:19 \nschema.xml_webtemp| schema.xml| | 166908| 15-Apr-21| 08:19 \nupload.asx_webtemp| upload.aspx| | 6141| 15-Apr-21| 08:19 \nschema.xml_wplib| schema.xml| | 92345| 15-Apr-21| 08:19 \nupload.asx_wplib| upload.aspx| | 5914| 15-Apr-21| 08:19 \ncmdui.xml_global| cmdui.xml| | 631119| 15-Apr-21| 08:19 \nonet.xml_global| onet.xml| | 313439| 15-Apr-21| 08:19 \nstdview.xml_global| stdview.xml| | 54852| 15-Apr-21| 08:19 \nvwstyles.xml_global| vwstyles.xml| | 422824| 15-Apr-21| 08:19 \ngroupbd.xsl| groupboard.xsl| | 14233| 15-Apr-21| 08:19 \nhtrinfo.xml_0001| htmltransinfo.xml| | 5136| 15-Apr-21| 08:19 \ndefault.asx_forms| default.aspx| | 2788| 15-Apr-21| 08:19 \nweb.cfg_forms| web.config| | 216| 15-Apr-21| 08:19 \ndefault.asx_multilogin| default.aspx| | 2284| 15-Apr-21| 08:19 \nweb.cfg_multilogin| web.config| | 216| 15-Apr-21| 08:19 \ndefault.asx_trust| default.aspx| | 530| 15-Apr-21| 08:19 \nweb.cfg_trust| web.config| | 2190| 15-Apr-21| 08:19 \ndefault.asx_windows| default.aspx| | 522| 15-Apr-21| 08:19 \nweb.cfg_windows| web.config| | 214| 15-Apr-21| 08:19 \ninternal.xsl| internal.xsl| | 11158| 15-Apr-21| 08:19 \naccreqctl.debug.js| accessrequestscontrol.debug.js| | 18870| 15-Apr-21| 08:19 \naccreqctl.js| accessrequestscontrol.js| | 10674| 15-Apr-21| 08:19 \naccreqctl.xml| accessrequestscontrol.xml| | 103| 15-Apr-21| 08:19 \naccreqviewtmpl.debug.js| accessrequestsviewtemplate.debug.js| | 28650| 15-Apr-21| 08:19 \naccreqviewtmpl.js| accessrequestsviewtemplate.js| | 11376| 15-Apr-21| 08:19 \naccreqviewtmpl.xml| accessrequestsviewtemplate.xml| | 108| 15-Apr-21| 08:19 \nappcatalogfieldtemplate.debug.js| appcatalogfieldtemplate.debug.js| | 9040| 15-Apr-21| 08:19 \nappcatalogfieldtemplate.js| appcatalogfieldtemplate.js| | 3342| 15-Apr-21| 08:19 \nappdeveloperdash.debug.js| appdeveloperdash.debug.js| | 22542| 15-Apr-21| 08:19 \nappdeveloperdash.js| appdeveloperdash.js| | 11197| 15-Apr-21| 08:19 \naddb.xml| appdeveloperdash.xml| | 158| 15-Apr-21| 08:19 \nautofill.debug.js| autofill.debug.js| | 18404| 15-Apr-21| 08:19 \nautofill.js| autofill.js| | 10322| 15-Apr-21| 08:19 \nautohostedlicensingtemplates.debug.js| autohostedlicensingtemplates.debug.js| | 20576| 15-Apr-21| 08:19 \nautohostedlicensingtemplates.js| autohostedlicensingtemplates.js| | 8623| 15-Apr-21| 08:19 \nautohostedlicensingtemplates.xml| autohostedlicensingtemplates.xml| | 110| 15-Apr-21| 08:19 \nbform.debug.js| bform.debug.js| | 459758| 15-Apr-21| 08:19 \nbform.js| bform.js| | 258656| 15-Apr-21| 08:19 \nbform.xml| bform.xml| | 87| 15-Apr-21| 08:19 \nblank.debug.js| blank.debug.js| | 164| 15-Apr-21| 08:19 \nblank.js| blank.js| | 119| 15-Apr-21| 08:19 \ncallout.debug.js| callout.debug.js| | 84762| 15-Apr-21| 08:19 \ncallout.js| callout.js| | 26526| 15-Apr-21| 08:19 \ncallout.xml| callout.xml| | 155| 15-Apr-21| 08:19 \nchoicebuttonfieldtemplate.debug.js| choicebuttonfieldtemplate.debug.js| | 5782| 15-Apr-21| 08:19 \nchoicebuttonfieldtemplate.js| choicebuttonfieldtemplate.js| | 2388| 15-Apr-21| 08:19 \ncbft.xml| choicebuttonfieldtemplate.xml| | 97| 15-Apr-21| 08:19 \nclientforms.debug.js| clientforms.debug.js| | 153736| 15-Apr-21| 08:19 \nclientforms.js| clientforms.js| | 77613| 15-Apr-21| 08:19 \nclientforms.xml| clientforms.xml| | 145| 15-Apr-21| 08:19 \nclientpeoplepicker.debug.js| clientpeoplepicker.debug.js| | 77565| 15-Apr-21| 08:19 \nclientpeoplepicker.js| clientpeoplepicker.js| | 41210| 15-Apr-21| 08:19 \nclientrenderer.debug.js| clientrenderer.debug.js| | 23510| 15-Apr-21| 08:19 \nclientrenderer.js| clientrenderer.js| | 9805| 15-Apr-21| 08:19 \nclienttemplates.debug.js| clienttemplates.debug.js| | 294399| 15-Apr-21| 08:19 \nclienttemplates.js| clienttemplates.js| | 150440| 15-Apr-21| 08:19 \nclienttemplates.xml| clienttemplates.xml| | 101| 15-Apr-21| 08:19 \ncommonvalidation.debug.js| commonvalidation.debug.js| | 5376| 15-Apr-21| 08:19 \ncomval.js| commonvalidation.js| | 3369| 15-Apr-21| 08:19 \ncommonvalidation.xml| commonvalidation.xml| | 98| 15-Apr-21| 08:19 \ncore.debug.js| core.debug.js| | 636512| 15-Apr-21| 08:19 \ncore.js_0001| core.js| | 331719| 15-Apr-21| 08:19 \ncore.xml| core.xml| | 86| 15-Apr-21| 08:19 \ndatepicker.debug.js| datepicker.debug.js| | 48715| 15-Apr-21| 08:19 \ndatepick.js| datepicker.js| | 27099| 15-Apr-21| 08:19 \ndatepicker.xml| datepicker.xml| | 92| 15-Apr-21| 08:19 \ndesigngallery.debug.js| designgallery.debug.js| | 46223| 15-Apr-21| 08:19 \ndesigngallery.js| designgallery.js| | 28550| 15-Apr-21| 08:19 \ndesigngallery.xml| designgallery.xml| | 95| 15-Apr-21| 08:19 \ndevdash.debug.js| devdash.debug.js| | 86004| 15-Apr-21| 08:19 \ndevdash.js| devdash.js| | 36366| 15-Apr-21| 08:19 \ndragdrop.debug.js| dragdrop.debug.js| | 160299| 15-Apr-21| 08:19 \ndragdrop.js| dragdrop.js| | 85346| 15-Apr-21| 08:19 \ndragdrop.xml| dragdrop.xml| | 90| 15-Apr-21| 08:19 \nentityeditor.debug.js| entityeditor.debug.js| | 73212| 15-Apr-21| 08:19 \nentityeditor.js| entityeditor.js| | 38537| 15-Apr-21| 08:19 \nfilepreview.debug.js| filepreview.debug.js| | 18731| 15-Apr-21| 08:19 \nfilepreview.js| filepreview.js| | 10123| 15-Apr-21| 08:19 \nfilepreview.xml| filepreview.xml| | 91| 15-Apr-21| 08:19 \nfoldhyperlink.debug.js| foldhyperlink.debug.js| | 3360| 15-Apr-21| 08:19 \nfoldhyperlink.js| foldhyperlink.js| | 1544| 15-Apr-21| 08:19 \nform.debug.js| form.debug.js| | 240967| 15-Apr-21| 08:19 \nform.js| form.js| | 128992| 15-Apr-21| 08:19 \nform.xml| form.xml| | 86| 15-Apr-21| 08:19 \nganttscript.debug.js| ganttscript.debug.js| | 8826| 15-Apr-21| 08:19 \nganttscr.js| ganttscript.js| | 4787| 15-Apr-21| 08:19 \ngeolocationfieldtemplate.debug.js| geolocationfieldtemplate.debug.js| | 40200| 15-Apr-21| 08:19 \ngeolocationfieldtemplate.js| geolocationfieldtemplate.js| | 14901| 15-Apr-21| 08:19 \nglft.xml| geolocationfieldtemplate.xml| | 88| 15-Apr-21| 08:19 \ngroupboard.debug.js| groupboard.debug.js| | 15630| 15-Apr-21| 08:19 \ngroupboard.js| groupboard.js| | 9088| 15-Apr-21| 08:19 \ngroupboard.xml| groupboard.xml| | 92| 15-Apr-21| 08:19 \ngroupeditempicker.debug.js| groupeditempicker.debug.js| | 20302| 15-Apr-21| 08:19 \ngip.js| groupeditempicker.js| | 11630| 15-Apr-21| 08:19 \nhierarchytaskslist.debug.js| hierarchytaskslist.debug.js| | 59315| 15-Apr-21| 08:19 \nhierarchytaskslist.js| hierarchytaskslist.js| | 19494| 15-Apr-21| 08:19 \nhierarchytaskslist.xml| hierarchytaskslist.xml| | 57| 15-Apr-21| 08:19 \nimglib.debug.js| imglib.debug.js| | 85024| 15-Apr-21| 08:19 \nimglib.js| imglib.js| | 50445| 15-Apr-21| 08:19 \nimglib.xml| imglib.xml| | 88| 15-Apr-21| 08:19 \ninit.debug.js| init.debug.js| | 304096| 15-Apr-21| 08:19 \ninit.js_0001| init.js| | 161957| 15-Apr-21| 08:19 \ninplview.debug.js| inplview.debug.js| | 136957| 15-Apr-21| 08:19 \ninplview.js| inplview.js| | 69236| 15-Apr-21| 08:19 \ninplview.xml| inplview.xml| | 158| 15-Apr-21| 08:19 \njsgrid.debug.js| jsgrid.debug.js| | 1164592| 15-Apr-21| 08:19 \njsgrid.gantt.debug.js| jsgrid.gantt.debug.js| | 109470| 15-Apr-21| 08:19 \njsgrid.gantt.js| jsgrid.gantt.js| | 41962| 15-Apr-21| 08:19 \njsgrid.gantt.xml| jsgrid.gantt.xml| | 84| 15-Apr-21| 08:19 \njsgrid.js| jsgrid.js| | 436852| 15-Apr-21| 08:19 \njsgrid.xml| jsgrid.xml| | 60| 15-Apr-21| 08:19 \nlanguagepickercontrol.js| languagepickercontrol.js| | 11175| 15-Apr-21| 08:19 \nmapviewtemplate.debug.js| mapviewtemplate.debug.js| | 37816| 15-Apr-21| 08:19 \nmapviewtemplate.js| mapviewtemplate.js| | 15210| 15-Apr-21| 08:19 \nmapvt.xml| mapviewtemplate.xml| | 106| 15-Apr-21| 08:19 \nmenu.debug.js| menu.debug.js| | 101574| 15-Apr-21| 08:19 \nmenu.htc| menu.htc| | 21872| 15-Apr-21| 08:19 \nmenu.js_0001| menu.js| | 51332| 15-Apr-21| 08:19 \nmenubar.htc| menubar.htc| | 13961| 15-Apr-21| 08:19 \nmquery.debug.js| mquery.debug.js| | 59856| 15-Apr-21| 08:19 \nmquery.js| mquery.js| | 22239| 15-Apr-21| 08:19 \nmquery.xml| mquery.xml| | 89| 15-Apr-21| 08:19 \noffline.debug.js| offline.debug.js| | 7585| 15-Apr-21| 08:19 \noffline.js| offline.js| | 3595| 15-Apr-21| 08:19 \nows.debug.js| ows.debug.js| | 511037| 15-Apr-21| 08:19 \nows.js| ows.js| | 265328| 15-Apr-21| 08:19 \nows.xml| ows.xml| | 85| 15-Apr-21| 08:19 \nowsbrows.debug.js| owsbrows.debug.js| | 9579| 15-Apr-21| 08:19 \nowsbrows.js| owsbrows.js| | 6113| 15-Apr-21| 08:19 \npickerhierarchycontrol.js| pickerhierarchycontrol.js| | 85910| 15-Apr-21| 08:19 \npivotcontrol.debug.js| pivotcontrol.debug.js| | 16089| 15-Apr-21| 08:19 \npivotcontrol.js| pivotcontrol.js| | 8700| 15-Apr-21| 08:19 \nquicklaunch.debug.js| quicklaunch.debug.js| | 130124| 15-Apr-21| 08:19 \nquicklaunch.js| quicklaunch.js| | 69543| 15-Apr-21| 08:19 \nquicklaunch.js.xml| quicklaunch.xml| | 120| 15-Apr-21| 08:19 \nradiobuttonwithchildren.js| radiobuttonwithchildren.js| | 3208| 15-Apr-21| 08:19 \nroamingapps.debug.js| roamingapps.debug.js| | 46291| 15-Apr-21| 08:19 \nroamingapps.js| roamingapps.js| | 19190| 15-Apr-21| 08:19 \nroamingapp.xml| roamingapps.xml| | 93| 15-Apr-21| 08:19 \nsharing.debug.js| sharing.debug.js| | 71639| 15-Apr-21| 08:19 \nsharing.js| sharing.js| | 27124| 15-Apr-21| 08:19 \nsharing.xml| sharing.xml| | 171| 15-Apr-21| 08:19 \nsiteupgrade.debug.js| siteupgrade.debug.js| | 1135| 15-Apr-21| 08:19 \nsiteupgrade.debug.js_14| siteupgrade.debug.js| | 1135| 15-Apr-21| 08:19 \nsiteupgrade.js| siteupgrade.js| | 808| 15-Apr-21| 08:19 \nsiteupgrade.js_14| siteupgrade.js| | 808| 15-Apr-21| 08:19 \nsp.core.debug.js| sp.core.debug.js| | 73924| 15-Apr-21| 08:19 \nsp.core.js| sp.core.js| | 40446| 15-Apr-21| 08:19 \nsp.core.xml| sp.core.xml| | 150| 15-Apr-21| 08:19 \nsp.datetimeutil.debug.js| sp.datetimeutil.debug.js| | 115909| 15-Apr-21| 08:19 \nsp.datetimeutil.debug.js.x64| sp.datetimeutil.debug.js| | 115909| 15-Apr-21| 08:19 \nsp.datetimeutil.js| sp.datetimeutil.js| | 69042| 15-Apr-21| 08:19 \nsp.datetimeutil.js.x64| sp.datetimeutil.js| | 69042| 15-Apr-21| 08:19 \nsp.datetimeutil.xml| sp.datetimeutil.xml| | 69| 15-Apr-21| 08:19 \nsp.debug.js| sp.debug.js| | 1003685| 15-Apr-21| 08:19 \nsp.debug.js.x64| sp.debug.js| | 1003685| 15-Apr-21| 08:19 \nsp.exp.debug.js| sp.exp.debug.js| | 40770| 15-Apr-21| 08:19 \nsp.exp.js| sp.exp.js| | 24528| 15-Apr-21| 08:19 \nsp.exp.xml| sp.exp.xml| | 48| 15-Apr-21| 08:19 \nsp.init.debug.js| sp.init.debug.js| | 55563| 15-Apr-21| 08:19 \nsp.init.js| sp.init.js| | 32205| 15-Apr-21| 08:19 \nsp.js| sp.js| | 625954| 15-Apr-21| 08:19 \nsp.js.x64| sp.js| | 625954| 15-Apr-21| 08:19 \nspmap.debug.js| sp.map.debug.js| | 15227| 15-Apr-21| 08:19 \nspmap.js| sp.map.js| | 8235| 15-Apr-21| 08:19 \nspmap.xml| sp.map.xml| | 65| 15-Apr-21| 08:19 \nsp.requestexecutor.debug.js| sp.requestexecutor.debug.js| | 81201| 15-Apr-21| 08:19 \nsp.requestexecutor.debug.js.x64| sp.requestexecutor.debug.js| | 81201| 15-Apr-21| 08:19 \nsp.requestexecutor.js| sp.requestexecutor.js| | 51540| 15-Apr-21| 08:19 \nsp.requestexecutor.js.x64| sp.requestexecutor.js| | 51540| 15-Apr-21| 08:19 \nsp.requestexecutor.xml| sp.requestexecutor.xml| | 46| 15-Apr-21| 08:19 \nsp.ribbon.debug.js| sp.ribbon.debug.js| | 363159| 15-Apr-21| 08:19 \nsp.ribbon.js| sp.ribbon.js| | 224039| 15-Apr-21| 08:19 \nsp.ribbon.xml| sp.ribbon.xml| | 321| 15-Apr-21| 08:19 \nsp.runtime.debug.js| sp.runtime.debug.js| | 185617| 15-Apr-21| 08:19 \nsp.runtime.debug.js.x64| sp.runtime.debug.js| | 185617| 15-Apr-21| 08:19 \nsp.runtime.js| sp.runtime.js| | 111493| 15-Apr-21| 08:19 \nsp.runtime.js.x64| sp.runtime.js| | 111493| 15-Apr-21| 08:19 \nsp.runtime.xml| sp.runtime.xml| | 46| 15-Apr-21| 08:19 \nsp.storefront.debug.js| sp.storefront.debug.js| | 425498| 15-Apr-21| 08:19 \nsp.storefront.js| sp.storefront.js| | 296609| 15-Apr-21| 08:19 \nsp.storefront.xml| sp.storefront.xml| | 346| 15-Apr-21| 08:19 \nsp.ui.admin.debug.js| sp.ui.admin.debug.js| | 18342| 15-Apr-21| 08:19 \nsp.ui.admin.js| sp.ui.admin.js| | 11378| 15-Apr-21| 08:19 \nsp.ui.allapps.debug.js| sp.ui.allapps.debug.js| | 42395| 15-Apr-21| 08:19 \nsp.ui.allapps.js| sp.ui.allapps.js| | 26257| 15-Apr-21| 08:19 \nsp.ui.applicationpages.calendar.debug.js| sp.ui.applicationpages.calendar.debug.js| | 277454| 15-Apr-21| 08:19 \nsp.ui.applicationpages.calendar.js| sp.ui.applicationpages.calendar.js| | 144914| 15-Apr-21| 08:19 \nsp.ui.applicationpages.calendar.xml| sp.ui.applicationpages.calendar.xml| | 225| 15-Apr-21| 08:19 \nsp.ui.applicationpages.debug.js| sp.ui.applicationpages.debug.js| | 10163| 15-Apr-21| 08:19 \nsp.ui.applicationpages.js| sp.ui.applicationpages.js| | 6953| 15-Apr-21| 08:19 \nsp.ui.applicationpages.xml| sp.ui.applicationpages.xml| | 213| 15-Apr-21| 08:19 \nsp.ui.bdcadminpages.debug.js| sp.ui.bdcadminpages.debug.js| | 16063| 15-Apr-21| 08:19 \nsp.ui.bdcadminpages.js| sp.ui.bdcadminpages.js| | 11315| 15-Apr-21| 08:19 \nspblogd.js| sp.ui.blogs.debug.js| | 50644| 15-Apr-21| 08:19 \nspblog.js| sp.ui.blogs.js| | 31017| 15-Apr-21| 08:19 \nsp.ui.blogs.xml| sp.ui.blogs.xml| | 94| 15-Apr-21| 08:19 \nsp.ui.combobox.debug.js| sp.ui.combobox.debug.js| | 99428| 15-Apr-21| 08:19 \nsp.ui.combobox.js| sp.ui.combobox.js| | 52107| 15-Apr-21| 08:19 \nsp.ui.combobox.xml| sp.ui.combobox.xml| | 54| 15-Apr-21| 08:19 \nsp.ui.controls.debug.js| sp.ui.controls.debug.js| | 55987| 15-Apr-21| 08:19 \nsp.ui.controls.js| sp.ui.controls.js| | 38359| 15-Apr-21| 08:19 \nsp.ui.dialog.debug.js| sp.ui.dialog.debug.js| | 69292| 15-Apr-21| 08:19 \nsp.ui.dialog.js| sp.ui.dialog.js| | 40375| 15-Apr-21| 08:19 \nsp.ui.dialog.xml| sp.ui.dialog.xml| | 90| 15-Apr-21| 08:19 \nspdiscd.js| sp.ui.discussions.debug.js| | 136506| 15-Apr-21| 08:19 \nspdisc.js| sp.ui.discussions.js| | 82216| 15-Apr-21| 08:19 \nsp.ui.discussions.xml| sp.ui.discussions.xml| | 94| 15-Apr-21| 08:19 \nspimgcd.js| sp.ui.imagecrop.debug.js| | 27973| 15-Apr-21| 08:19 \nspimgc.js| sp.ui.imagecrop.js| | 27973| 15-Apr-21| 08:19 \nspui_rid.js| sp.ui.relateditems.debug.js| | 28006| 15-Apr-21| 08:19 \nspui_ri.js| sp.ui.relateditems.js| | 17626| 15-Apr-21| 08:19 \nsp.ui.ri.xml| sp.ui.relateditems.xml| | 114| 15-Apr-21| 08:19 \nsp.ui.rte.debug.js| sp.ui.rte.debug.js| | 1012976| 15-Apr-21| 08:19 \nsp.ui.rte.js| sp.ui.rte.js| | 584834| 15-Apr-21| 08:19 \nsp.ui.rte.xml| sp.ui.rte.xml| | 74| 15-Apr-21| 08:19 \nsp.ui.tileview.debug.js| sp.ui.tileview.debug.js| | 65203| 15-Apr-21| 08:19 \nsp.ui.tileview.js| sp.ui.tileview.js| | 40240| 15-Apr-21| 08:19 \nsp.ui.tileview.xml| sp.ui.tileview.xml| | 129| 15-Apr-21| 08:19 \nspui_tld.js| sp.ui.timeline.debug.js| | 434522| 15-Apr-21| 08:19 \nspui_tl.js| sp.ui.timeline.js| | 240067| 15-Apr-21| 08:19 \nspstl.xml| sp.ui.timeline.xml| | 111| 15-Apr-21| 08:19 \nsp.xml| sp.xml| | 106| 15-Apr-21| 08:19 \nspgantt.debug.js| spgantt.debug.js| | 183484| 15-Apr-21| 08:19 \nspgantt.js| spgantt.js| | 66168| 15-Apr-21| 08:19 \nspgantt.xml| spgantt.xml| | 159| 15-Apr-21| 08:19 \nspgridview.debug.js| spgridview.debug.js| | 7321| 15-Apr-21| 08:19 \nspgridvw.js| spgridview.js| | 4593| 15-Apr-21| 08:19 \nspgridview.xml| spgridview.xml| | 92| 15-Apr-21| 08:19 \nstart.debug.js| start.debug.js| | 174744| 15-Apr-21| 08:19 \nstart.js| start.js| | 95780| 15-Apr-21| 08:19 \nstrings.xml| strings.xml| | 140| 15-Apr-21| 08:19 \nsuitelinks.debug.js| suitelinks.debug.js| | 32558| 15-Apr-21| 08:19 \nsuitelnk.js| suitelinks.js| | 13795| 15-Apr-21| 08:19 \nsuitelinks.xml| suitelinks.xml| | 134| 15-Apr-21| 08:19 \nsuitenav.js| suitenav.js| | 34319| 15-Apr-21| 08:19 \ntimecard.debug.js| timecard.debug.js| | 36906| 15-Apr-21| 08:19 \ntimecard.js| timecard.js| | 20888| 15-Apr-21| 08:19 \nwpadder.debug.js| wpadder.debug.js| | 49561| 15-Apr-21| 08:19 \nwpadder.js| wpadder.js| | 31016| 15-Apr-21| 08:19 \nwpcm.debug.js| wpcm.debug.js| | 6894| 15-Apr-21| 08:19 \nwpcm.js| wpcm.js| | 3509| 15-Apr-21| 08:19 \nmain.xsl| main.xsl| | 5791| 15-Apr-21| 08:19 \nallitems.asx_0086| allitems.aspx| | 2463| 15-Apr-21| 08:19 \ndispform.asx_0071| dispform.aspx| | 4190| 15-Apr-21| 08:19 \neditform.asx_0071| editform.aspx| | 4167| 15-Apr-21| 08:19 \nmyitems.asx_0008| myitems.aspx| | 2718| 15-Apr-21| 08:19 \nnewform.asx_0055| newform.aspx| | 4197| 15-Apr-21| 08:19 \nschema.xml_0012| schema.xml| | 253482| 15-Apr-21| 08:19 \nallitems.asx_0089| allitems.aspx| | 2463| 15-Apr-21| 08:19 \ndispform.asx_0083| dispform.aspx| | 4190| 15-Apr-21| 08:19 \neditform.asx_0083| editform.aspx| | 4167| 15-Apr-21| 08:19 \nmyitems.asx_0009| myitems.aspx| | 2718| 15-Apr-21| 08:19 \nnewform.asx_0062| newform.aspx| | 4197| 15-Apr-21| 08:19 \nschema.xml_0027| schema.xml| | 245825| 15-Apr-21| 08:19 \nmtgredir.asx_0001| mtgredir.aspx| | 1436| 15-Apr-21| 08:19 \nnewmws.asx| newmws.aspx| | 18858| 15-Apr-21| 08:19 \nmovetodt.asx| movetodt.aspx| | 3075| 15-Apr-21| 08:19 \nschema.xml_0079| schema.xml| | 79705| 15-Apr-21| 08:19 \nallitems.asx_0088| allitems.aspx| | 2463| 15-Apr-21| 08:19 \ndispform.asx_0082| dispform.aspx| | 4190| 15-Apr-21| 08:19 \neditform.asx_0082| editform.aspx| | 4167| 15-Apr-21| 08:19 \nnewform.asx_0061| newform.aspx| | 4197| 15-Apr-21| 08:19 \nschema.xml_0026| schema.xml| | 127795| 15-Apr-21| 08:19 \nallitems.asx_0087| allitems.aspx| | 2463| 15-Apr-21| 08:19 \ndispform.asx_0072| dispform.aspx| | 4190| 15-Apr-21| 08:19 \neditform.asx_0072| editform.aspx| | 4167| 15-Apr-21| 08:19 \nmanagea.asx| managea.aspx| | 2718| 15-Apr-21| 08:19 \nnewform.asx_0056| newform.aspx| | 5954| 15-Apr-21| 08:19 \nschema.xml_0021| schema.xml| | 255145| 15-Apr-21| 08:19 \ndefault.aspx_mps| default.aspx| | 4102| 15-Apr-21| 08:19 \nspstd1.asx_0004| spstd1.aspx| | 4134| 15-Apr-21| 08:19 \nallitems.asx_0032| allitems.aspx| | 2463| 15-Apr-21| 08:19 \ndispform.asx_0038| dispform.aspx| | 4190| 15-Apr-21| 08:19 \neditform.asx_0040| editform.aspx| | 4167| 15-Apr-21| 08:19 \nnewform.asx_0021| newform.aspx| | 4197| 15-Apr-21| 08:19 \nschema.xml_0039| schema.xml| | 42852| 15-Apr-21| 08:19 \nallitems.asx_0090| allitems.aspx| | 2463| 15-Apr-21| 08:19 \ndispform.asx_0084| dispform.aspx| | 4190| 15-Apr-21| 08:19 \neditform.asx_0084| editform.aspx| | 4167| 15-Apr-21| 08:19 \nmyitems.asx_0001| myitems.aspx| | 2718| 15-Apr-21| 08:19 \nnewform.asx_0063| newform.aspx| | 4197| 15-Apr-21| 08:19 \nschema.xml_0028| schema.xml| | 245557| 15-Apr-21| 08:19 \nschema.xml_0033| schema.xml| | 51432| 15-Apr-21| 08:19 \nonet.xml_mps| onet.xml| | 20985| 15-Apr-21| 08:19 \nnotif.clbk.typ.xml| notificationcallbacktypes.xml| | 1267| 15-Apr-21| 08:19 \nform.asp_pages_form| form.aspx| | 4065| 15-Apr-21| 08:19 \nview.asp_pages_viewpage| viewpage.aspx| | 2718| 15-Apr-21| 08:19 \nview.asp_pages_webfldr| webfldr.aspx| | 2521| 15-Apr-21| 08:19 \nresxscriptx.xsd| resxscriptx.xsd| | 1229| 15-Apr-21| 08:19 \nsvrfiles.xml| serverfiles.xml| | 213| 15-Apr-21| 08:19 \nshrulee.xsd| sitehealthruleregistrationerror.xsd| | 1909| 15-Apr-21| 08:19 \nshrulew.xsd| sitehealthruleregistrationwarning.xsd| | 1911| 15-Apr-21| 08:19 \nsitehcwss.xml| sitehealthwssrules.xml| | 1010| 15-Apr-21| 08:19 \nsitehcwss.xml_14| sitehealthwssrules.xml| | 1010| 15-Apr-21| 08:19 \nspkvp.xsd| spkeyvaluepairs.xsd| | 1727| 15-Apr-21| 08:19 \nspmtlprm.xsd| spmetalparameters.xsd| | 3857| 15-Apr-21| 08:19 \nappmng.sql| appmng.sql| | 289219| 15-Apr-21| 08:19 \nappmngup.sql| appmngup.sql| | 282966| 15-Apr-21| 08:19 \nbdc.sql| bdc.sql| | 558446| 15-Apr-21| 08:19 \nconfigdb.sql| configdb.sql| | 189484| 15-Apr-21| 08:19 \nconfigup.sql| configup.sql| | 48486| 15-Apr-21| 08:19 \ncfgupddl.sql| configupddl.sql| | 131| 15-Apr-21| 08:19 \nusgdiag.sql| diagnostics.sql| | 19977| 15-Apr-21| 08:19 \nsigcfg.cer| sigconfigdb.cer| | 689| 15-Apr-21| 08:19 \nsigcfg.dll| sigconfigdb.dll| | 8832| 15-Apr-21| 08:19 \nsigstore.cer| sigstore.cer| | 689| 15-Apr-21| 08:19 \nsigstore.dll| sigstore.dll| | 8816| 15-Apr-21| 08:19 \nstore.sql| store.sql| | 6504340| 15-Apr-21| 08:19 \nstoreup.sql| storeup.sql| | 512275| 15-Apr-21| 08:19 \nstoupddl.sql| storeupddl.sql| | 131| 15-Apr-21| 08:19 \nsubscr.sql| subscriptionsettings.sql| | 33788| 15-Apr-21| 08:19 \nusagedb.sql| usagedb.sql| | 81583| 15-Apr-21| 08:19 \nusgdbup.sql| usgdbup.sql| | 81392| 15-Apr-21| 08:19 \naddbact.asx| addbdcaction.aspx| | 13019| 15-Apr-21| 08:19 \naddbapp.asx| addbdcapplication.aspx| | 9266| 15-Apr-21| 08:19 \naddiurl.asx| addincomingurl.aspx| | 4473| 15-Apr-21| 08:19 \nadmin.smp| admin.sitemap| | 15577| 15-Apr-21| 08:19 \nadmcfgc.asx| adminconfigceip.aspx| | 7764| 15-Apr-21| 08:19 \nadmcfgi.asx| adminconfigintro.aspx| | 8689| 15-Apr-21| 08:19 \nadmcfgr.asx| adminconfigresults.aspx| | 5038| 15-Apr-21| 08:19 \nadmcfgs.asx| adminconfigservices.aspx| | 9937| 15-Apr-21| 08:19 \nadmcfgsr.asx| adminconfigservicesresults.aspx| | 4998| 15-Apr-21| 08:19 \nadminweb.cfg| adminweb.config| | 899| 15-Apr-21| 08:19 \nallappprincipals.asx| allappprincipals.aspx| | 6808| 15-Apr-21| 08:19 \nalturls.asx| alternateurlcollections.aspx| | 7122| 15-Apr-21| 08:19 \nappassoc.asx| applicationassociations.aspx| | 5259| 15-Apr-21| 08:19 \nappasdlg.asx| applicationassociationsdialog.aspx| | 3519| 15-Apr-21| 08:19 \nappcreat.asx| applicationcreated.aspx| | 4106| 15-Apr-21| 08:19 \nauthen.asx| authentication.aspx| | 13828| 15-Apr-21| 08:19 \nauthprov.asx| authenticationproviders.aspx| | 4939| 15-Apr-21| 08:19 \navadmin.asx| avadmin.aspx| | 9653| 15-Apr-21| 08:19 \nbackup.asx| backup.aspx| | 15389| 15-Apr-21| 08:19 \nbackhis.asx| backuphistory.aspx| | 20577| 15-Apr-21| 08:19 \nbackset.asx| backupsettings.aspx| | 8689| 15-Apr-21| 08:19 \nbackupst.asx| backupstatus.aspx| | 10643| 15-Apr-21| 08:19 \nbdcapps.asx| bdcapplications.aspx| | 14415| 15-Apr-21| 08:19 \nbdclobs.asx| bdclobsettings.aspx| | 7037| 15-Apr-21| 08:19 \nblkftyp.asx| blockedfiletype.aspx| | 4045| 15-Apr-21| 08:19 \ncaaapplm.asx| ca_allapplicensesmanagement.aspx| | 8267| 15-Apr-21| 08:19 \ncasapplm.asx| ca_specificapplicensemanagement.aspx| | 29344| 15-Apr-21| 08:19 \ncntdbadm.asx| cntdbadm.aspx| | 6042| 15-Apr-21| 08:19 \nconfgssc.asx| configssc.aspx| | 22074| 15-Apr-21| 08:19 \nconfgapp.asx| configureappsettings.aspx| | 7246| 15-Apr-21| 08:19 \ncreatecorpcatalog.asx| createcorporatecatalog.aspx| | 18174| 15-Apr-21| 08:19 \ncreatexu.asx| createexternalurl.aspx| | 4182| 15-Apr-21| 08:19 \ncreatsit.asx| createsite.aspx| | 17064| 15-Apr-21| 08:19 \ndbstats.asx| databasestatus.aspx| | 5023| 15-Apr-21| 08:19 \ndeacfadm.asx| deactivatefeature.aspx| | 3184| 15-Apr-21| 08:19 \ndftcntdb.asx| defaultcontentdb.aspx| | 6455| 15-Apr-21| 08:19 \ndelstcfg.asx| deletesiteconfig.aspx| | 12279| 15-Apr-21| 08:19 \ndelapp.asx| deletewebapplication.aspx| | 6619| 15-Apr-21| 08:19 \ndelsite.asx| delsite.aspx| | 7267| 15-Apr-21| 08:19 \ndplysoln.asx| deploysolution.aspx| | 10122| 15-Apr-21| 08:19 \ndmscmd.aspx| dmscmd.aspx| | 5593| 15-Apr-21| 08:19 \ndtcusta.asx| doctrancustomizeadmin.aspx| | 7789| 15-Apr-21| 08:19 \ndoctrana.asx| doctransadmin.aspx| | 7797| 15-Apr-21| 08:19 \ndspset.asx| dspsettings.aspx| | 14863| 15-Apr-21| 08:19 \neditacct.asx| editaccount.aspx| | 18305| 15-Apr-21| 08:19 \neditbact.asx| editbdcaction.aspx| | 12661| 15-Apr-21| 08:19 \neditiurl.asx| editincomingurl.aspx| | 4683| 15-Apr-21| 08:19 \neditourl.asx| editoutboundurls.aspx| | 7201| 15-Apr-21| 08:19 \nexpbapp.asx| exportbdcapplication.aspx| | 8043| 15-Apr-21| 08:19 \nextendvs.asx| extendvs.aspx| | 7113| 15-Apr-21| 08:19 \nextvsopt.asx| extendvsoption.aspx| | 5077| 15-Apr-21| 08:19 \nextwebfm.asx| extendwebfarm.aspx| | 5418| 15-Apr-21| 08:19 \nfarmjoin.asx| farmconfigjoinintro.aspx| | 8354| 15-Apr-21| 08:19 \nfarmcred.asx| farmcredentialmanagement.aspx| | 7541| 15-Apr-21| 08:19 \nfarmsvrs.asx| farmservers.aspx| | 4910| 15-Apr-21| 08:19 \ngemlcnfg.asx| globalemailconfig.aspx| | 8560| 15-Apr-21| 08:19 \ngmobcnfg.asx| globalxmsconfig.aspx| | 8407| 15-Apr-21| 08:19 \nhealrepo.asx| healthreport.aspx| | 6265| 15-Apr-21| 08:19 \nhtadmin.asx| htmltransadmin.aspx| | 10141| 15-Apr-21| 08:19 \nincemail.asx| incomingemail.aspx| | 22300| 15-Apr-21| 08:19 \nirmadmin.asx| irmadmin.aspx| | 8837| 15-Apr-21| 08:19 \njobedit.asx| jobedit.aspx| | 8303| 15-Apr-21| 08:19 \nlogusage.asx| logusage.aspx| | 14424| 15-Apr-21| 08:19 \nlropsta.asx| lroperationstatus.aspx| | 4915| 15-Apr-21| 08:19 \nmgbdcper.asx| managebdcpermissions.aspx| | 5485| 15-Apr-21| 08:19 \nmgbdcapp.asx| managebdcserviceapp.aspx| | 6684| 15-Apr-21| 08:19 \nmgappinf.asx| managebdcserviceappstateinfo.aspx| | 4613| 15-Apr-21| 08:19 \nmngcorpcatalog.asx| managecorporatecatalog.aspx| | 9289| 15-Apr-21| 08:19 \nmngaccts.asx| managedaccounts.aspx| | 5952| 15-Apr-21| 08:19 \nmngffeat.asx| managefarmfeatures.aspx| | 3273| 15-Apr-21| 08:19 \nmktplset.asx| managemarketplacesettings.aspx| | 7972| 15-Apr-21| 08:19 \nmngqtmpl.asx| managequotatemplate.aspx| | 18002| 15-Apr-21| 08:19 \nmngsftru.asx| manageservicefarmtrust.aspx| | 4743| 15-Apr-21| 08:19 \nmngtrust.asx| managetrust.aspx| | 6911| 15-Apr-21| 08:19 \nmngwfeat.asx| managewebappfeatures.aspx| | 4334| 15-Apr-21| 08:19 \nmetrics.asx| metrics.aspx| | 15273| 15-Apr-21| 08:19 \nadmin.mas| admin.master| | 29828| 15-Apr-21| 08:19 \nappascvw.asc| applicationassociationsview.ascx| | 4379| 15-Apr-21| 08:19 \napppool.asc| applicationpoolsection.ascx| | 8668| 15-Apr-21| 08:19 \nbsqmopt.asc| browserceipsection.ascx| | 2776| 15-Apr-21| 08:19 \ncerstsec.asc| certificatesettingsection.ascx| | 10758| 15-Apr-21| 08:19 \ncntdbsec.asc| contentdatabasesection.ascx| | 7964| 15-Apr-21| 08:19 \nidprosec.asc| identityprovidersettingsection.ascx| | 16007| 15-Apr-21| 08:19 \niiswsapp.asc| iiswebserviceapplicationpoolsection.ascx| | 8772| 15-Apr-21| 08:19 \niiswbste.asc| iiswebsitesection.ascx| | 14964| 15-Apr-21| 08:19 \npopup.mas| popup.master| | 3088| 15-Apr-21| 08:19 \nproxysel.asx| proxyselectionsection.ascx| | 5393| 15-Apr-21| 08:19 \nregacctl.asc| registeraccountcontrol.ascx| | 10073| 15-Apr-21| 08:19 \nrunjobs.asc| runningtimerjobs.ascx| | 4696| 15-Apr-21| 08:19 \nschedjob.asc| scheduledtimerjobs.ascx| | 3583| 15-Apr-21| 08:19 \ntjobhist.asc| timerjobhistory.ascx| | 5114| 15-Apr-21| 08:19 \ntopology.asc| topologyview.ascx| | 4091| 15-Apr-21| 08:19 \ntstgesec.asc| trustgeneralsettingsection.ascx| | 3656| 15-Apr-21| 08:19 \nnewappmngsvcapp.asx| newappmngserviceapp.aspx| | 6664| 15-Apr-21| 08:19 \nnewcntdb.asx| newcntdb.aspx| | 7208| 15-Apr-21| 08:19 \nofadmin.asx| officialfileadmin.aspx| | 13569| 15-Apr-21| 08:19 \noldcntdb.asx| oldcntdb.aspx| | 13658| 15-Apr-21| 08:19 \nowners.asx| owners.aspx| | 5602| 15-Apr-21| 08:19 \npwdset.asx| passwordsettings.aspx| | 8443| 15-Apr-21| 08:19 \npatchstt.asx| patchstatus.aspx| | 7284| 15-Apr-21| 08:19 \npolc.asx| policy.aspx| | 14387| 15-Apr-21| 08:19 \npolcanon.asx| policyanon.aspx| | 7109| 15-Apr-21| 08:19 \npolcrl.asx| policyrole.aspx| | 116092| 15-Apr-21| 08:19 \npolcrle.asx| policyroleedit.aspx| | 116100| 15-Apr-21| 08:19 \npolcrls.asx| policyroles.aspx| | 10688| 15-Apr-21| 08:19 \npolcusr.asx| policyuser.aspx| | 10142| 15-Apr-21| 08:19 \npolcusre.asx| policyuseredit.aspx| | 12411| 15-Apr-21| 08:19 \nprivacy.asx| privacy.aspx| | 8269| 15-Apr-21| 08:19 \nregacct.asx| registeraccount.aspx| | 4058| 15-Apr-21| 08:19 \nremacct.asx| removeaccount.aspx| | 8676| 15-Apr-21| 08:19 \nreqfeata.asx| reqfeatures.aspx| | 2625| 15-Apr-21| 08:19 \nrestore.asx| restore.aspx| | 16105| 15-Apr-21| 08:19 \nrestore3.asx| restorestep3.aspx| | 22878| 15-Apr-21| 08:19 \nrtctsoln.asx| retractsolution.aspx| | 7381| 15-Apr-21| 08:19 \nschedjob.asx| scheduledtimerjobs.aspx| | 7063| 15-Apr-21| 08:19 \nscprefix.asx_0001| scprefix.aspx| | 11391| 15-Apr-21| 08:19 \nslctauc.asx| selectalternateurlcollection.aspx| | 5141| 15-Apr-21| 08:19 \nslctapp.asx| selectapplication.aspx| | 6801| 15-Apr-21| 08:19 \nslctcfaz.asx| selectcrossfirewallaccesszone.aspx| | 5398| 15-Apr-21| 08:19 \nslctjob.asx| selectjobdefinition.aspx| | 5358| 15-Apr-21| 08:19 \nslctlist.asx| selectlist.aspx| | 8606| 15-Apr-21| 08:19 \nslctserv.asx| selectserver.aspx| | 4908| 15-Apr-21| 08:19 \nslctsvc.asx| selectservice.aspx| | 4982| 15-Apr-21| 08:19 \nslctsite.asx| selectsite.aspx| | 9385| 15-Apr-21| 08:19 \nslctweb.asx| selectweb.aspx| | 8459| 15-Apr-21| 08:19 \nslctwapp.asx| selectwebapplication.aspx| | 5356| 15-Apr-21| 08:19 \nserver.asx| server.aspx| | 9131| 15-Apr-21| 08:19 \nsvcappcn.asx| serviceapplicationconnect.aspx| | 4890| 15-Apr-21| 08:19 \nsvcappcd.asx| serviceapplicationconnectiondetails.aspx| | 4334| 15-Apr-21| 08:19 \nsvcappcp.asx| serviceapplicationconnectpopup.aspx| | 2991| 15-Apr-21| 08:19 \nsvcappdl.asx| serviceapplicationdelete.aspx| | 4443| 15-Apr-21| 08:19 \nsvcapppe.asx| serviceapplicationpermissions.aspx| | 4034| 15-Apr-21| 08:19 \nsvcapppb.asx| serviceapplicationpublish.aspx| | 10169| 15-Apr-21| 08:19 \nsvcapp.asx| serviceapplications.aspx| | 4101| 15-Apr-21| 08:19 \nsvcjdefs.asx| servicejobdefinitions.aspx| | 8692| 15-Apr-21| 08:19 \nsvcrjobs.asx| servicerunningjobs.aspx| | 7059| 15-Apr-21| 08:19 \nspdadmin.asx| sharepointdesigneradmin.aspx| | 6974| 15-Apr-21| 08:19 \nsiteex.asx| siteandlistexport.aspx| | 12299| 15-Apr-21| 08:19 \nsitebaks.asx| sitebackuporexportstatus.aspx| | 10242| 15-Apr-21| 08:19 \nsitecbac.asx| sitecollectionbackup.aspx| | 10522| 15-Apr-21| 08:19 \nsitecoll.asx| sitecollections.aspx| | 9189| 15-Apr-21| 08:19 \nsitcrted.asx| sitecreated.aspx| | 3632| 15-Apr-21| 08:19 \nsitequot.asx| sitequota.aspx| | 24323| 15-Apr-21| 08:19 \nsolns.asx| solutions.aspx| | 4786| 15-Apr-21| 08:19 \nsolnsts.asx| solutionstatus.aspx| | 10835| 15-Apr-21| 08:19 \nsolvmgr.asx| solutionvalidatormanager.aspx| | 10912| 15-Apr-21| 08:19 \nspadmin.rsx| spadmin.resx| | 359899| 15-Apr-21| 08:19 \nspscrstg.asx_0002| spsecuritysettings.aspx| | 7491| 15-Apr-21| 08:19 \nstbackup.asx| startbackup.aspx| | 14510| 15-Apr-21| 08:19 \nsuccessp.asx| successpopup.aspx| | 3735| 15-Apr-21| 08:19 \ntimer.asx| timer.aspx| | 8984| 15-Apr-21| 08:19 \ntjobhist.asx| timerjobhistory.aspx| | 8860| 15-Apr-21| 08:19 \nunatcdbb.asx| unattacheddbbrowse.aspx| | 6276| 15-Apr-21| 08:19 \nunatcdb.asx| unattacheddbselect.aspx| | 6082| 15-Apr-21| 08:19 \nunxtndvs.asx| unextendvs.aspx| | 5541| 15-Apr-21| 08:19 \nupgrstat.asx| upgradestatus.aspx| | 11239| 15-Apr-21| 08:19 \nuser_solution.asx| usersolutions.aspx| | 9435| 15-Apr-21| 08:19 \nviewbapp.asx| viewbdcapplication.aspx| | 17212| 15-Apr-21| 08:19 \nviewbent.asx| viewbdcentity.aspx| | 17275| 15-Apr-21| 08:19 \nvwblobi.asx| viewbdclobsysteminstances.aspx| | 10960| 15-Apr-21| 08:19 \nvwblobs.asx| viewbdclobsystems.aspx| | 14303| 15-Apr-21| 08:19 \nvsemail.asx| vsemail.aspx| | 8991| 15-Apr-21| 08:19 \nvsgenset.asx| vsgeneralsettings.aspx| | 52139| 15-Apr-21| 08:19 \nvsmask.asx| vsmask.aspx| | 65273| 15-Apr-21| 08:19 \nvsxms.asx| vsxms.aspx| | 8803| 15-Apr-21| 08:19 \nweblist.asx| webapplicationlist.aspx| | 5468| 15-Apr-21| 08:19 \nwebapps.asx| webapplications.aspx| | 5350| 15-Apr-21| 08:19 \nwfadmin.asx| workflowadmin.aspx| | 6741| 15-Apr-21| 08:19 \nwftimer.asx| workflowtimer.aspx| | 5101| 15-Apr-21| 08:19 \nacrqdlg.asc| accessrequestsdialog.ascx| | 3059| 15-Apr-21| 08:19 \narplfc.asc| accessrequestspermissionlevelfieldcontrol.ascx| | 1145| 15-Apr-21| 08:19 \nacctpick.asc| accountpickerandlink.ascx| | 2347| 15-Apr-21| 08:19 \nacledito.asc| acleditor.ascx| | 9596| 15-Apr-21| 08:19 \nactnbar.asc_0002| actionbar.ascx| | 2464| 15-Apr-21| 08:19 \nbdcfindc.asc| bdcfinderconfigurator.ascx| | 3309| 15-Apr-21| 08:19 \nbdflded.asc| businessdatafieldeditor.ascx| | 4216| 15-Apr-21| 08:19 \ndefformt.asc| defaulttemplates.ascx| | 178739| 15-Apr-21| 08:19 \ndemocon.asc| designmodeconsole.ascx| | 2329| 15-Apr-21| 08:19 \ndispprev.asc| displaypreview.ascx| | 5491| 15-Apr-21| 08:19 \neditprev.asc| editpreview.ascx| | 6219| 15-Apr-21| 08:19 \nfeatact.asc| featureactivator.ascx| | 2403| 15-Apr-21| 08:19 \nfeatacti.asc| featureactivatoritem.ascx| | 2209| 15-Apr-21| 08:19 \nfeatdep.asc| featuredependees.ascx| | 2172| 15-Apr-21| 08:19 \nflhylk.asc| foldhyperlink.ascx| | 1034| 15-Apr-21| 08:19 \nhptnb.asc| helppagetopnavbar.ascx| | 12286| 15-Apr-21| 08:19 \nlanguagepicker.ascx| languagepicker.ascx| | 5536| 15-Apr-21| 08:19 \nleftnav.asc| leftnavigation.ascx| | 895| 15-Apr-21| 08:19 \nlinksect.asc_0002| linksection.ascx| | 2737| 15-Apr-21| 08:19 \nlkseclv1.asc_0002| linksectionlevel1.ascx| | 1429| 15-Apr-21| 08:19 \nlkseclv2.asc_0002| linksectionlevel2.ascx| | 1317| 15-Apr-21| 08:19 \nlinktabl.asc_0002| linkstable.ascx| | 1282| 15-Apr-21| 08:19 \nmodeftst.asc| mobiledefaultstylesheets.ascx| | 1315| 15-Apr-21| 08:19 \nmodeftmp.asc| mobiledefaulttemplates.ascx| | 67472| 15-Apr-21| 08:19 \nmorecolorspicker.ascx| morecolorspicker.ascx| | 2163| 15-Apr-21| 08:19 \nmuiselec.asc| muiselector.ascx| | 1050| 15-Apr-21| 08:19 \nmuisetng.asc| muisettings.ascx| | 4724| 15-Apr-21| 08:19 \nnavitem.asc| navitem.ascx| | 99| 15-Apr-21| 08:19 \nnewprev.asc| newpreview.ascx| | 5243| 15-Apr-21| 08:19 \nschdpckr.asc| schedulepicker.ascx| | 28102| 15-Apr-21| 08:19 \ntoolbar.asc_0002| toolbar.ascx| | 1588| 15-Apr-21| 08:19 \ntbbutton.asc_0002| toolbarbutton.ascx| | 1301| 15-Apr-21| 08:19 \nviewhdr.asc_0002| viewheader.ascx| | 1527| 15-Apr-21| 08:19 \nwelcome.asc_0002| welcome.ascx| | 3508| 15-Apr-21| 08:19 \naccdny.asx| accessdenied.aspx| | 2154| 15-Apr-21| 08:19 \naccreq.asx| accessrequests.aspx| | 1078| 15-Apr-21| 08:19 \naclinv.asx| aclinv.aspx| | 26945| 15-Apr-21| 08:19 \nactredir.asx| actionredirect.aspx| | 896| 15-Apr-21| 08:19 \naddanapp.asx| addanapp.aspx| | 3652| 15-Apr-21| 08:19 \naddcttl.asx| addcontenttypetolist.aspx| | 7512| 15-Apr-21| 08:19 \naddfft.asx| addfieldfromtemplate.aspx| | 9800| 15-Apr-21| 08:19 \naddrole.asx| addrole.aspx| | 68566| 15-Apr-21| 08:19 \narecycle.asx| adminrecyclebin.aspx| | 21099| 15-Apr-21| 08:19 \nadvsetng.asx_0001| advsetng.aspx| | 31465| 15-Apr-21| 08:19 \naggcustze.asx| aggregationcustomize.aspx| | 13046| 15-Apr-21| 08:19 \naggsetngs.asx| aggregationsettings.aspx| | 8162| 15-Apr-21| 08:19 \nappliaap.asx| allapplicensesmanagement.aspx| | 8143| 15-Apr-21| 08:19 \nalphaimage.htc| alphaimage.htc| | 253| 15-Apr-21| 08:19 \nappcatalogimage.asx| appcatalogimage.ashx| | 213| 15-Apr-21| 08:19 \nappicon.asx| appicons.ashx| | 205| 15-Apr-21| 08:19 \nappinv.asx| appinv.aspx| | 11660| 15-Apr-21| 08:19 \nappprincipals.asx| appprincipals.aspx| | 5678| 15-Apr-21| 08:19 \nappredirect.asx| appredirect.aspx| | 5250| 15-Apr-21| 08:19 \nappregnew.asx| appregnew.aspx| | 11198| 15-Apr-21| 08:19 \napprequest.aspx| apprequest.aspx| | 6876| 15-Apr-21| 08:19 \napprove.asx| approve.aspx| | 8991| 15-Apr-21| 08:19 \nappsrcrd.asx| appsourceredirect.aspx| | 3061| 15-Apr-21| 08:19 \nappwebproxy.asx| appwebproxy.aspx| | 2059| 15-Apr-21| 08:19 \naspxform.asx| aspxform.aspx| | 5396| 15-Apr-21| 08:19 \nassogrps.asx| associatedgroups.aspx| | 4795| 15-Apr-21| 08:19 \natchfile.asx| attachfile.aspx| | 6541| 15-Apr-21| 08:19 \nauthentc.asx| authenticate.aspx| | 1068| 15-Apr-21| 08:19 \navreport.asx| avreport.aspx| | 11898| 15-Apr-21| 08:19 \nblank.htm| blank.htm| | 229| 15-Apr-21| 08:18 \nbpcf.asx| bpcf.aspx| | 14883| 15-Apr-21| 08:19 \nbdsync.asx| businessdatasynchronizer.aspx| | 3836| 15-Apr-21| 08:19 \ncalsvc.asx| calendarservice.ashx| | 205| 15-Apr-21| 08:19 \nctmark.asx| calltrackmark.aspx| | 211| 15-Apr-21| 08:19 \nchgctos.asx| changecontenttypeoptionalsettings.aspx| | 8550| 15-Apr-21| 08:19 \nchgcto.asx| changecontenttypeorder.aspx| | 7816| 15-Apr-21| 08:19 \nchgford.asx| changefieldorder.aspx| | 7536| 15-Apr-21| 08:19 \ncheckin.asx| checkin.aspx| | 16116| 15-Apr-21| 08:19 \nchkperm.asx| chkperm.aspx| | 10498| 15-Apr-21| 08:19 \nclcnfm.asx| circulationconfirm.aspx| | 216| 15-Apr-21| 08:19 \nclose.asx| closeconnection.aspx| | 1866| 15-Apr-21| 08:19 \ncmdui.asx| commandui.ashx| | 203| 15-Apr-21| 08:19 \nconfirm.asx| confirmation.aspx| | 1211| 15-Apr-21| 08:19 \ncfmupg.asx| confirmsiteupgrade.aspx| | 3715| 15-Apr-21| 08:19 \ncfmupg.asx_14| confirmsiteupgrade.aspx| | 3712| 15-Apr-21| 08:19 \nconngps.asx| conngps.aspx| | 8490| 15-Apr-21| 08:19 \ncontpick.asx| containerpicker.aspx| | 443| 15-Apr-21| 08:19 \ncopy.asx| copy.aspx| | 15509| 15-Apr-21| 08:19 \ncopyres.asx| copyresults.aspx| | 10337| 15-Apr-21| 08:19 \ncopyrole.asx| copyrole.aspx| | 68509| 15-Apr-21| 08:19 \ncopyutil.asx| copyutil.aspx| | 2333| 15-Apr-21| 08:19 \ncreate.asx| create.aspx| | 33731| 15-Apr-21| 08:19 \ncrtadact.asx| createadaccount.aspx| | 7233| 15-Apr-21| 08:19 \ncrlstpkr.asx| createlistpickerpage.aspx| | 4809| 15-Apr-21| 08:19 \ncreatenewdoc.asx| createnewdocument.aspx| | 5021| 15-Apr-21| 08:19 \ncreatenewdoc.asx_14| createnewdocument.aspx| | 5021| 15-Apr-21| 08:19 \ncreatews.asx| createws.aspx| | 5078| 15-Apr-21| 08:19 \nctypedit.asx| ctypedit.aspx| | 10808| 15-Apr-21| 08:19 \nctypenew.asx| ctypenew.aspx| | 11913| 15-Apr-21| 08:19 \ndeacfeat.asx| deactivatefeature.aspx| | 4424| 15-Apr-21| 08:19 \ndefcss.asx| defaultcss.ashx| | 193| 15-Apr-21| 08:19 \ndefloc.asx| definelocation.aspx| | 4002| 15-Apr-21| 08:19 \ndeletemu.asx| deletemu.aspx| | 188| 15-Apr-21| 08:19 \ndelweb.asx| deleteweb.aspx| | 8062| 15-Apr-21| 08:19 \ndeptsapp.asx| deploytsapp.aspx| | 15800| 15-Apr-21| 08:19 \ndesnbld.asx| designbuilder.aspx| | 6683| 15-Apr-21| 08:19 \ndesndat.asx| designdata.ashx| | 208| 15-Apr-21| 08:19 \ndesngal.asx| designgallery.aspx| | 3475| 15-Apr-21| 08:19 \ndesnprv.asx| designpreview.aspx| | 5615| 15-Apr-21| 08:19 \ndevdash.asx| devdash.aspx| | 2357| 15-Apr-21| 08:19 \ndiscbar.asx| discbar.aspx| | 2448| 15-Apr-21| 08:19 \ndladvopt.asx| dladvopt.aspx| | 19446| 15-Apr-21| 08:19 \ndoctran.asx| doctrans.aspx| | 11465| 15-Apr-21| 08:19 \ndownload.asx| download.aspx| | 155| 15-Apr-21| 08:19 \ndextdata.asx| downloadexternaldata.aspx| | 870| 15-Apr-21| 08:19 \ndws.asx| dws.aspx| | 4368| 15-Apr-21| 08:19 \neditcopy.asx| editcopyinformation.aspx| | 12731| 15-Apr-21| 08:19 \neditgrp.asx| editgrp.aspx| | 19005| 15-Apr-21| 08:19 \neditidx.asx| editindex.aspx| | 7133| 15-Apr-21| 08:19 \neditnav.asx| editnav.aspx| | 6298| 15-Apr-21| 08:19 \neditprms.asx| editprms.aspx| | 5371| 15-Apr-21| 08:19 \neditrole.asx| editrole.aspx| | 69296| 15-Apr-21| 08:19 \nemaildet.asx| emaildetails.aspx| | 5368| 15-Apr-21| 08:19 \nemailset.asx| emailsettings.aspx| | 25980| 15-Apr-21| 08:19 \nerror.asx| error.aspx| | 5011| 15-Apr-21| 08:19 \nevalupg.asx| evaluatesiteupgrade.aspx| | 5395| 15-Apr-21| 08:19 \nevalupg.asx_14| evaluatesiteupgrade.aspx| | 5386| 15-Apr-21| 08:19 \nexporttr.asx| exporttranslations.aspx| | 7907| 15-Apr-21| 08:19 \nfilesred.xml| filestoredirect.sts.xml| | 3378| 15-Apr-21| 08:19 \nfilter.asx| filter.aspx| | 1679| 15-Apr-21| 08:19 \nfldedit.asx| fldedit.aspx| | 208271| 15-Apr-21| 08:19 \nfldedtex.asx| fldeditex.aspx| | 24858| 15-Apr-21| 08:19 \nfldnew.asx| fldnew.aspx| | 203182| 15-Apr-21| 08:19 \nfldnewex.asx| fldnewex.aspx| | 25047| 15-Apr-21| 08:19 \nfldpick.asx| fldpick.aspx| | 9869| 15-Apr-21| 08:19 \nformedt.asx| formedt.aspx| | 21543| 15-Apr-21| 08:19 \ngear.asx| gear.aspx| | 3255| 15-Apr-21| 08:19 \ngbredir.asx| groupboardredirect.aspx| | 216| 15-Apr-21| 08:19 \ngroups.asx| groups.aspx| | 9600| 15-Apr-21| 08:19 \nguestaccess.asx| guestaccess.aspx| | 158| 15-Apr-21| 08:19 \nhelp.asx| help.aspx| | 6803| 15-Apr-21| 08:19 \nhelpcont.asx| helpcontent.aspx| | 690| 15-Apr-21| 08:19 \nhelpsrch.asx| helpsearch.aspx| | 1473| 15-Apr-21| 08:19 \nhelpstg.asx| helpsettings.aspx| | 6298| 15-Apr-21| 08:19 \ntsksvc.asx| hierarchytasksservice.ashx| | 211| 15-Apr-21| 08:19 \nhtmledit.asx| htmledit.aspx| | 13128| 15-Apr-21| 08:19 \nhtmlfieldsecurity.asx| htmlfieldsecurity.aspx| | 12545| 15-Apr-21| 08:19 \nhtmltran.asx| htmltranslate.aspx| | 862| 15-Apr-21| 08:19 \nhtredir.asx| htmltrredir.aspx| | 6388| 15-Apr-21| 08:19 \nhtverify.asx| htmltrverify.aspx| | 6674| 15-Apr-21| 08:19 \niframe.asx| iframe.aspx| | 2029| 15-Apr-21| 08:19 \nimporttr.asx| importtranslations.aspx| | 5800| 15-Apr-21| 08:19 \nindxcol2.asx| indexedcolumns.aspx| | 5424| 15-Apr-21| 08:19 \nindxcol.asx| indxcol.aspx| | 10385| 15-Apr-21| 08:19 \ninfopage.asx| infopage.aspx| | 3782| 15-Apr-21| 08:19 \ninplview.asx| inplview.aspx| | 2378| 15-Apr-21| 08:19 \ninstpapp.asx| installprojapp.aspx| | 5946| 15-Apr-21| 08:19 \nirm.asx| irm.aspx| | 23151| 15-Apr-21| 08:19 \nirmrept.asx| irmrept.aspx| | 8437| 15-Apr-21| 08:19 \nitemrwfassoc.aspx| itemrwfassoc.aspx| | 52428| 15-Apr-21| 08:19 \njsonmetadata.asx| jsonmetadata.ashx| | 203| 15-Apr-21| 08:19 \nlayouts.smp| layouts.sitemap| | 24335| 15-Apr-21| 08:19 \nlropst.asx| layoutslroperationstatus.aspx| | 5004| 15-Apr-21| 08:19 \nlayotweb.cfg| layoutsweb.config| | 2064| 15-Apr-21| 08:19 \nlistedit.asx| listedit.aspx| | 47609| 15-Apr-21| 08:19 \nlistfeed.asx| listfeed.aspx| | 155| 15-Apr-21| 08:19 \nlistform.asx| listform.aspx| | 871| 15-Apr-21| 08:19 \nlstgenst.asx| listgeneralsettings.aspx| | 11979| 15-Apr-21| 08:19 \nlistsynd.asx| listsyndication.aspx| | 25282| 15-Apr-21| 08:19 \nlogin.asx| login.aspx| | 2598| 15-Apr-21| 08:19 \nlstsetng.asx| lstsetng.aspx| | 62369| 15-Apr-21| 08:19 \nmngcof.asx| managecheckedoutfiles.aspx| | 11768| 15-Apr-21| 08:19 \nmngct.asx| managecontenttype.aspx| | 9523| 15-Apr-21| 08:19 \nmngf.asx| managecontenttypefield.aspx| | 9277| 15-Apr-21| 08:19 \nmngcops.asx| managecopies.aspx| | 13582| 15-Apr-21| 08:19 \nmngfeat.asx| managefeatures.aspx| | 4571| 15-Apr-21| 08:19 \nmcontent.asx| mcontent.aspx| | 4742| 15-Apr-21| 08:19 \nmetablog.asx| metaweblog.aspx| | 172| 15-Apr-21| 08:19 \nmngctype.asx| mngctype.aspx| | 5738| 15-Apr-21| 08:19 \nmngfield.asx| mngfield.aspx| | 5836| 15-Apr-21| 08:19 \nmngstadm.asx| mngsiteadmin.aspx| | 5456| 15-Apr-21| 08:19 \nmngsubwb.asx| mngsubwebs.aspx| | 11725| 15-Apr-21| 08:19 \nbloghome.asx_mobile| bloghome.aspx| | 3210| 15-Apr-21| 08:19 \ndefault.asx_mobile| default.aspx| | 1513| 15-Apr-21| 08:19 \ndelete.asx_mobile| delete.aspx| | 2298| 15-Apr-21| 08:19 \ndispform.asx_mobile| dispform.aspx| | 2428| 15-Apr-21| 08:19 \ndisppost.asx_mobile| disppost.aspx| | 3234| 15-Apr-21| 08:19 \neditform.asx_mobile| editform.aspx| | 4798| 15-Apr-21| 08:19 \ndenied.asx_mobile| mbldenied.aspx| | 1619| 15-Apr-21| 08:19 \nerror.asx_mobile| mblerror.aspx| | 2172| 15-Apr-21| 08:19 \nmbllists.asx_mobile| mbllists.aspx| | 2645| 15-Apr-21| 08:19 \nmbllogin.asx_mobile| mbllogin.aspx| | 5361| 15-Apr-21| 08:19 \nmblogout.asx_mobile| mbllogout.aspx| | 5003| 15-Apr-21| 08:19 \nmltlogin.asx_mobile| mblmultilogin.aspx| | 4957| 15-Apr-21| 08:19 \nmblwiki.asx_mobile| mblwiki.aspx| | 3598| 15-Apr-21| 08:19 \nmblwp.asx_mobile| mblwp.aspx| | 3603| 15-Apr-21| 08:19 \nmblwpdtl.asx_mobile| mblwpdetail.aspx| | 2567| 15-Apr-21| 08:19 \nnewcmt.asx_mobile| newcomment.aspx| | 2762| 15-Apr-21| 08:19 \nnewform.asx_mobile| newform.aspx| | 4796| 15-Apr-21| 08:19 \nnewpost.asx_mobile| newpost.aspx| | 2777| 15-Apr-21| 08:19 \nupload.asx_mobile| upload.aspx| | 3491| 15-Apr-21| 08:19 \nview.asx_mobile| view.aspx| | 2424| 15-Apr-21| 08:19 \nviewcmt.asx_mobile| viewcomment.aspx| | 3223| 15-Apr-21| 08:19 \nviewfilter.asx_mobile| viewfilter.aspx| | 3747| 15-Apr-21| 08:19 \nweb.cfg_mobile| web.config| | 10909| 15-Apr-21| 08:19 \nmorecols.asx| morecolors.aspx| | 4163| 15-Apr-21| 08:19 \napp.mas| application.master| | 13756| 15-Apr-21| 08:19 \nappv4.mas| applicationv4.master| | 20553| 15-Apr-21| 08:19 \nbutsec.asc_0001| buttonsection.ascx| | 3836| 15-Apr-21| 08:19 \ndialog.mas| dialog.master| | 12646| 15-Apr-21| 08:19 \nerrv15.mas| errorv15.master| | 3482| 15-Apr-21| 08:19 \nifcont.asc_0001| inputformcontrol.ascx| | 2568| 15-Apr-21| 08:19 \nifsect.asc_0001| inputformsection.ascx| | 5204| 15-Apr-21| 08:19 \nlayouts.mas| layouts.master| | 13244| 15-Apr-21| 08:19 \nlkfldedt.asc_0001| lookupfieldeditor.ascx| | 10383| 15-Apr-21| 08:19 \nlkreledt.asc_0001| lookuprelationshipseditor.ascx| | 7752| 15-Apr-21| 08:19 \npickerdialog.mas| pickerdialog.master| | 8912| 15-Apr-21| 08:19 \nrtedlg.mas| rtedialog.master| | 3199| 15-Apr-21| 08:19 \nsimple.mas| simple.master| | 10243| 15-Apr-21| 08:19 \nsimpv4.mas| simplev4.master| | 6530| 15-Apr-21| 08:19 \ntmpctl.asc_0001| templatepickercontrol.ascx| | 3264| 15-Apr-21| 08:19 \ntopnavbr.asc_0001| topnavbar.ascx| | 6462| 15-Apr-21| 08:19 \nurfldedt.asc_0001| userfieldeditor.ascx| | 6555| 15-Apr-21| 08:19 \nmuisetng.asx| muisetng.aspx| | 3521| 15-Apr-21| 08:19 \nmwpstg.asx| mwpsettings.aspx| | 14042| 15-Apr-21| 08:19 \nmyprmns.asx| mypermissions.aspx| | 5239| 15-Apr-21| 08:19 \nmysubs.asx| mysubs.aspx| | 13142| 15-Apr-21| 08:19 \nnavopt.asx| navoptions.aspx| | 7337| 15-Apr-21| 08:19 \nnew.asx| new.aspx| | 61372| 15-Apr-21| 08:19 \nnewdwp.asx| newdwp.aspx| | 6557| 15-Apr-21| 08:19 \nnewgrp.asx| newgrp.aspx| | 19741| 15-Apr-21| 08:19 \nnewlink.asx| newlink.aspx| | 9284| 15-Apr-21| 08:19 \nnewnav.asx| newnav.aspx| | 6130| 15-Apr-21| 08:19 \nnewsbweb.asx| newsbweb.aspx| | 18686| 15-Apr-21| 08:19 \nnewslwp.asx| newslwp.aspx| | 10513| 15-Apr-21| 08:19 \noauthauthorize.asx| oauthauthorize.aspx| | 11676| 15-Apr-21| 08:19 \npassword.asx| password.aspx| | 8483| 15-Apr-21| 08:19 \npeople.asx| people.aspx| | 22688| 15-Apr-21| 08:19 \npermstup.asx| permsetup.aspx| | 18411| 15-Apr-21| 08:19 \npicker.asx| picker.aspx| | 7885| 15-Apr-21| 08:19 \nportal.asx| portal.aspx| | 9896| 15-Apr-21| 08:19 \nportalvw.asx_0001| portalview.aspx| | 2248| 15-Apr-21| 08:19 \nprjsetng.asx| prjsetng.aspx| | 16270| 15-Apr-21| 08:19 \nprfredir.asx| profileredirect.aspx| | 1605| 15-Apr-21| 08:19 \npubback.asx| publishback.aspx| | 4934| 15-Apr-21| 08:19 \nqlreord.asx| qlreord.aspx| | 10886| 15-Apr-21| 08:19 \nqstedit.asx| qstedit.aspx| | 217711| 15-Apr-21| 08:19 \nqstnew.asx| qstnew.aspx| | 199982| 15-Apr-21| 08:19 \nquiklnch.asx| quiklnch.aspx| | 8030| 15-Apr-21| 08:19 \nrcxform.asx| rcxform.aspx| | 6023| 15-Apr-21| 08:19 \nrecycle.asx| recyclebin.aspx| | 16593| 15-Apr-21| 08:19 \nredirect.asx_0001| redirect.aspx| | 1394| 15-Apr-21| 08:19 \nreghost.asx| reghost.aspx| | 7879| 15-Apr-21| 08:19 \nrgnlstng.asx| regionalsetng.aspx| | 21661| 15-Apr-21| 08:19 \nrndlstd.asx| reindexlistdialog.aspx| | 1762| 15-Apr-21| 08:19 \nrixsite.asx| reindexsitedialog.aspx| | 1771| 15-Apr-21| 08:19 \nrenamepg.asx| renamepagedialog.aspx| | 3946| 15-Apr-21| 08:19 \nreorder.asx| reorder.aspx| | 11743| 15-Apr-21| 08:19 \nreqacc.asx| reqacc.aspx| | 4357| 15-Apr-21| 08:19 \nreqfeat.asx| reqfeatures.aspx| | 3860| 15-Apr-21| 08:19 \nreqgroup.asx| reqgroup.aspx| | 6562| 15-Apr-21| 08:19 \nreqgrpcf.asx| reqgroupconfirm.aspx| | 6425| 15-Apr-21| 08:19 \nrqstapp.asx| requestanapp.aspx| | 7673| 15-Apr-21| 08:19 \nrfcxform.asx| rfcxform.aspx| | 6160| 15-Apr-21| 08:19 \nrfpxform.asx| rfpxform.aspx| | 6497| 15-Apr-21| 08:19 \nroamapp.asx| roamingapps.aspx| | 4614| 15-Apr-21| 08:19 \nrole.asx| role.aspx| | 11001| 15-Apr-21| 08:19 \nrssxslt.asx| rssxslt.aspx| | 3480| 15-Apr-21| 08:19 \nrtedlg.asx| rtedialog.aspx| | 10212| 15-Apr-21| 08:19 \nrteuplod.asx| rteuploaddialog.aspx| | 8044| 15-Apr-21| 08:19 \nsaveconflict.asx| saveconflict.aspx| | 5198| 15-Apr-21| 08:19 \nsavetmpl.asx| savetmpl.aspx| | 17496| 15-Apr-21| 08:19 \nscriptresx.asx| scriptresx.ashx| | 200| 15-Apr-21| 08:19 \nscsignup.asx| scsignup.aspx| | 11428| 15-Apr-21| 08:19 \nsrchrslt.asx| searchresults.aspx| | 5674| 15-Apr-21| 08:19 \nselfservicecreate.asx| selfservicecreate.aspx| | 12745| 15-Apr-21| 08:19 \nsetanon.asx| setanon.aspx| | 12399| 15-Apr-21| 08:19 \nsetrqacc.asx| setrqacc.aspx| | 7631| 15-Apr-21| 08:19 \nsettings.asx| settings.aspx| | 3673| 15-Apr-21| 08:19 \nsetwa.asx| setwhereabouts.aspx| | 212| 15-Apr-21| 08:19 \nsharedwf.asx| sharedwfform.aspx| | 5297| 15-Apr-21| 08:19 \nspdstngs.asx| sharepointdesignersettings.aspx| | 6769| 15-Apr-21| 08:19 \nsignout.asx| signout.aspx| | 1509| 15-Apr-21| 08:19 \nsitehc.asx| sitehealthcheck.aspx| | 3918| 15-Apr-21| 08:19 \nsitehcr.asx| sitehealthcheckresults.aspx| | 4054| 15-Apr-21| 08:19 \nsitehcr.asx_14| sitehealthcheckresults.aspx| | 4054| 15-Apr-21| 08:19 \nsitehc.asx_14| sitehealthcheck.aspx| | 3915| 15-Apr-21| 08:19 \nsiterss.asx| siterss.aspx| | 10595| 15-Apr-21| 08:19 \nsitesubs.asx| sitesubs.aspx| | 13639| 15-Apr-21| 08:19 \nstupgrad.asx| siteupgrade.aspx| | 5373| 15-Apr-21| 08:19 \nstupgsts.asx| siteupgradestatus.aspx| | 8418| 15-Apr-21| 08:19 \nstupgsts.asx_14| siteupgradestatus.aspx| | 8418| 15-Apr-21| 08:19 \nstupgrad.asx_14| siteupgrade.aspx| | 5416| 15-Apr-21| 08:19 \nspcf.asx| spcf.aspx| | 19428| 15-Apr-21| 08:19 \nspcontnt.asx| spcontnt.aspx| | 12854| 15-Apr-21| 08:19 \napplisap.asx| specificapplicensemanagement.aspx| | 29238| 15-Apr-21| 08:19 \nsrchvis.asx| srchvis.aspx| | 10067| 15-Apr-21| 08:19 \nstart.asx| start.aspx| | 1048| 15-Apr-21| 08:19 \nstorefront.asx| storefront.aspx| | 4349| 15-Apr-21| 08:19 \nstorman.asx| storman.aspx| | 10595| 15-Apr-21| 08:19 \ncorefxup.css| corefixup.css| | 469| 15-Apr-21| 08:19 \ndlgframe.css| dlgframe.css| | 2528| 15-Apr-21| 08:19 \njsgrid.css| jsgrid.css| | 27207| 15-Apr-21| 08:19 \njsgrid.csst| jsgrid.css| | 27207| 15-Apr-21| 08:19 \nsubchoos.asx| subchoos.aspx| | 10435| 15-Apr-21| 08:19 \nsubedit.asx| subedit.aspx| | 14784| 15-Apr-21| 08:19 \nsrepair.asx| submitrepair.aspx| | 156| 15-Apr-21| 08:19 \nsubnew.asx| subnew.aspx| | 15223| 15-Apr-21| 08:19 \nsuccess.asx| success.aspx| | 3172| 15-Apr-21| 08:19 \nsurvedit.asx| survedit.aspx| | 37673| 15-Apr-21| 08:19 \ntmptpick.asx| templatepick.aspx| | 5272| 15-Apr-21| 08:19 \ntenappin.asx| tenantappinfo.ashx| | 207| 15-Apr-21| 08:19 \nthemeweb.asx| themeweb.aspx| | 1339| 15-Apr-21| 08:19 \ntcsetng.asx| timecardsettings.aspx| | 15814| 15-Apr-21| 08:19 \ntnreord.asx| tnreord.aspx| | 8361| 15-Apr-21| 08:19 \ntoolpane.asx| toolpane.aspx| | 2370| 15-Apr-21| 08:19 \ntopnav.asx| topnav.aspx| | 7717| 15-Apr-21| 08:19 \nuniqperm.asx| uniqperm.aspx| | 9818| 15-Apr-21| 08:19 \nupdcops.asx| updatecopies.aspx| | 12032| 15-Apr-21| 08:19 \nupload.asx| upload.aspx| | 13234| 15-Apr-21| 08:19 \nusage.asx| usage.aspx| | 7871| 15-Apr-21| 08:19 \nusagedtl.asx| usagedetails.aspx| | 6089| 15-Apr-21| 08:19 \nuseconf.asx| useconfirmation.aspx| | 3520| 15-Apr-21| 08:19 \nuser.asx| user.aspx| | 27691| 15-Apr-21| 08:19 \nuserdisp.asx| userdisp.aspx| | 4299| 15-Apr-21| 08:19 \nuseredit.asx| useredit.aspx| | 4175| 15-Apr-21| 08:19 \nuserserr.asx| usersettingserror.aspx| | 1848| 15-Apr-21| 08:19 \nversions.asx| versions.aspx| | 35361| 15-Apr-21| 08:19 \nviewedit.asx| viewedit.aspx| | 220325| 15-Apr-21| 08:19 \nvwgrpprm.asx| viewgrouppermissions.aspx| | 5199| 15-Apr-21| 08:19 \nviewlsts.asx| viewlsts.aspx| | 33824| 15-Apr-21| 08:19 \nviewnew.asx| viewnew.aspx| | 218013| 15-Apr-21| 08:19 \nviewtype.asx| viewtype.aspx| | 26314| 15-Apr-21| 08:19 \nvldsetng.asx| vldsetng.aspx| | 8912| 15-Apr-21| 08:19 \nvsmenu.asx| vsmenu.aspx| | 2059| 15-Apr-21| 08:19 \nvsubwebs.asx| vsubwebs.aspx| | 6028| 15-Apr-21| 08:19 \nwebdeltd.asx| webdeleted.aspx| | 1500| 15-Apr-21| 08:19 \nwppicker.asx| webpartgallerypickerpage.aspx| | 7202| 15-Apr-21| 08:19 \nwopiframe.asx| wopiframe.aspx| | 1968| 15-Apr-21| 08:19 \nwopiframe.asx_14| wopiframe.aspx| | 1968| 15-Apr-21| 08:19 \nwopiframe2.asx| wopiframe2.aspx| | 1957| 15-Apr-21| 08:19 \nwopiframe2.asx_14| wopiframe2.aspx| | 1957| 15-Apr-21| 08:19 \nworkspce.asx| workspce.aspx| | 8290| 15-Apr-21| 08:19 \nwpeula.asx| wpeula.aspx| | 5740| 15-Apr-21| 08:19 \nwpprevw.asx| wpprevw.aspx| | 4943| 15-Apr-21| 08:19 \nwpribbon.asx| wpribbon.aspx| | 761| 15-Apr-21| 08:19 \nwsauplod.asx| wsaupload.ashx| | 198| 15-Apr-21| 08:19 \nwss.rsx| wss.resx| | 723698| 15-Apr-21| 08:19 \nproxy.asx| wssproxy.aspx| | 1448| 15-Apr-21| 08:19 \nzoombldr.asx| zoombldr.aspx| | 12990| 15-Apr-21| 08:19 \nbdrdflt.aspx| default.aspx| | 4026| 15-Apr-21| 08:18 \ndefault.aspx_sts| default.aspx| | 4026| 15-Apr-21| 08:18 \ndefault.aspx_dws| defaultdws.aspx| | 4376| 15-Apr-21| 08:19 \nonet.xml_wss| onet.xml| | 12257| 15-Apr-21| 08:19 \nthemedforegroundimages.css| themedforegroundimages.css| | 28675| 15-Apr-21| 08:19 \ntaddconn.aspx_tenantadmin| ta_addappconnection.aspx| | 11735| 15-Apr-21| 08:19 \ntbdcadac.aspx_tenantadmin| ta_addbdcaction.aspx| | 12621| 15-Apr-21| 08:19 \ntbdcadap.aspx_tenantadmin| ta_addbdcapplication.aspx| | 8942| 15-Apr-21| 08:19 \nappliaap.aspx_tenantadmin| ta_allapplicensesmanagement.aspx| | 8178| 15-Apr-21| 08:19 \nappprincipals.aspx_tenantadmin| ta_allappprincipals.aspx| | 6769| 15-Apr-21| 08:19 \ntbcshome.aspx_tenantadmin| ta_bcshome.aspx| | 4633| 15-Apr-21| 08:19 \ntbdcapps.aspx_tenantadmin| ta_bdcapplications.aspx| | 13499| 15-Apr-21| 08:19 \ntbdclobsettings.aspx_tenantadmin| ta_bdclobsettings.aspx| | 6798| 15-Apr-21| 08:19 \ncreatecc.aspx_tenantadmin| ta_createcorporatecatalog.aspx| | 12183| 15-Apr-21| 08:19 \nnewsitec.aspx_tenantadmin| ta_createsitecollection.aspx| | 11081| 15-Apr-21| 08:19 \nnewconfi.aspx_tenantadmin| ta_createsitecollectionconfirmation.aspx| | 3028| 15-Apr-21| 08:19 \ndelsitec.aspx_tenantadmin| ta_deletesitecollectiondialog.aspx| | 3562| 15-Apr-21| 08:19 \ntbdcedac.aspx_tenantadmin| ta_editbdcaction.aspx| | 12268| 15-Apr-21| 08:19 \ntbdcexap.aspx_tenantadmin| ta_exportbdcapplication.aspx| | 7749| 15-Apr-21| 08:19 \ntlropsta.aspx_tenantadmin| ta_lroperationstatus.aspx| | 3645| 15-Apr-21| 08:19 \ntconmeta.aspx_tenantadmin| ta_manageappconnectionmetadata.aspx| | 8491| 15-Apr-21| 08:19 \ntconnsec.aspx_tenantadmin| ta_manageappconnectionsecurity.aspx| | 4495| 15-Apr-21| 08:19 \ntbdcperm.aspx_tenantadmin| ta_managebdcpermissions.aspx| | 4069| 15-Apr-21| 08:19 \ncorpcat.aspx_tenantadmin| ta_managecorporatecatalog.aspx| | 6403| 15-Apr-21| 08:19 \nmktplset.aspx_tenantadmin| ta_managemarketplacesettings.aspx| | 6296| 15-Apr-21| 08:19 \nofadmin.aspx_tenantadmin| ta_officialfileadmin.aspx| | 11323| 15-Apr-21| 08:19 \nsitecdq.aspx_tenantadmin| ta_sitecollectiondiskquotadialog.aspx| | 10735| 15-Apr-21| 08:19 \nsitecown.aspx_tenantadmin| ta_sitecollectionownersdialog.aspx| | 5705| 15-Apr-21| 08:19 \nsitecper.aspx_tenantadmin| ta_sitecollectionpermissionsdialog.aspx| | 2637| 15-Apr-21| 08:19 \nsitecrep.aspx_tenantadmin| ta_sitecollectionreportsdialog.aspx| | 2637| 15-Apr-21| 08:19 \nsitecoll.aspx_tenantadmin| ta_sitecollections.aspx| | 9478| 15-Apr-21| 08:19 \napplisap.aspx_tenantadmin| ta_specificapplicensemanagement.aspx| | 27508| 15-Apr-21| 08:19 \ntviewcon.aspx_tenantadmin| ta_viewappconnections.aspx| | 8814| 15-Apr-21| 08:19 \ntbdcvwap.aspx_tenantadmin| ta_viewbdcapplication.aspx| | 16234| 15-Apr-21| 08:19 \ntbdcvwen.aspx_tenantadmin| ta_viewbdcentity.aspx| | 16454| 15-Apr-21| 08:19 \ntbdcvwli.aspx_tenantadmin| ta_viewbdclobsysteminstances.aspx| | 10289| 15-Apr-21| 08:19 \ntbdcvwlb.aspx_tenantadmin| ta_viewbdclobsystems.aspx| | 13386| 15-Apr-21| 08:19 \nvsitecp.aspx_tenantadmin| ta_viewsitecollectionpropertiesdialog.aspx| | 6189| 15-Apr-21| 08:19 \ndefault.aspx_tenantadmin| default.aspx| | 3882| 15-Apr-21| 08:19 \nonet.xml_tenantadmin| onet.xml| | 5726| 15-Apr-21| 08:19 \nthread.xsl| thread.xsl| | 34542| 15-Apr-21| 08:19 \nusercode.xsd| usercode.xsd| | 4293| 15-Apr-21| 08:19 \nvalidapp.xml| validappendpoints.xml| | 15837| 15-Apr-21| 08:19 \nvwstyles.xsl| vwstyles.xsl| | 130790| 15-Apr-21| 08:19 \nwefman.xsd| wefextensionmanifestschema.xsd| | 51975| 15-Apr-21| 08:19 \nwefma1_1.xsd| wefextensionmanifestschema1_1.xsd| | 57288| 15-Apr-21| 08:19 \nbacklink.aspx_webpagelib| backlinks.aspx| | 4069| 15-Apr-21| 08:19 \ncrtv4pgs.asx| createv4pageslib.aspx| | 3584| 15-Apr-21| 08:19 \ncreatweb.asx| createwebpage.aspx| | 10792| 15-Apr-21| 08:19 \nrecentwp.asx| recentwikipages.aspx| | 3790| 15-Apr-21| 08:19 \nversdiff.aspx_webpagelib| versiondiff.aspx| | 5692| 15-Apr-21| 08:19 \nwikiredr.aspx| wikiredirect.aspx| | 1123| 15-Apr-21| 08:19 \nonet.xml_wiki| onet.xml| | 8372| 15-Apr-21| 08:19 \nwfaction.xsd| workflowactions.xsd| | 14033| 15-Apr-21| 08:19 \nwss.xsd| wss.xsd| | 112463| 15-Apr-21| 08:19 \nbase.xml| base.xml| | 21747| 15-Apr-21| 08:19 \nsts.xml| sts.xml| | 14413| 15-Apr-21| 08:19 \nwssadmin.xml| wssadmin.xml| | 9317| 15-Apr-21| 08:19 \nresqmax.xml_0001| resourcequotamaximum.xml| | 565| 15-Apr-21| 08:19 \nresqwarn.xml_0001| resourcequotawarning.xml| | 563| 15-Apr-21| 08:19 \nowstimer.exe_0001| owstimer.exe| 15.0.4971.1000| 80608| 15-Apr-21| 08:19 \nowstimer.exe.config| owstimer.exe.config| | 481| 15-Apr-21| 08:19 \ntraceman.exe| wsstracing.exe| 15.0.4569.1501| 115904| 15-Apr-21| 08:18 \nspwriter.exe_0001| spwriter.exe| 15.0.4971.1000| 50944| 15-Apr-21| 08:19 \nstswel.dll| stswel.dll| 15.0.5345.1000| 3912584| 15-Apr-21| 08:19 \nstswfacb.dll| microsoft.sharepoint.workflowactions.dll| 15.0.4857.1000| 318728| 15-Apr-21| 08:19 \nstswfact.dll| microsoft.sharepoint.workflowactions.dll| 15.0.4857.1000| 318728| 15-Apr-21| 08:19 \nstswfaci.dll| microsoft.sharepoint.workflowactions.intl.dll| 15.0.4420.1017| 23200| 15-Apr-21| 08:19 \nisswfresources.resx| resources.resx| | 2072| 15-Apr-21| 08:19 \nisswffeature.xml| feature.xml| | 465| 15-Apr-21| 08:19 \nissuetracking.xml| issuetracking.xml| | 749| 15-Apr-21| 08:19 \nsts.workflows.dll| microsoft.sharepoint.workflows.dll| 15.0.4507.1000| 63168| 15-Apr-21| 08:19 \nworkflows_intl.dll| microsoft.sharepoint.workflows.intl.dll| 15.0.5267.1000| 15752| 15-Apr-21| 08:19 \nie50up.debug.js| ie50up.debug.js| | 152685| 15-Apr-21| 08:19 \nie50up.js| ie50up.js| | 80787| 15-Apr-21| 08:19 \nie50up.xml| ie50up.xml| | 65| 15-Apr-21| 08:19 \nie55up.debug.js| ie55up.debug.js| | 151879| 15-Apr-21| 08:19 \nie55up.js| ie55up.js| | 80248| 15-Apr-21| 08:19 \nie55up.xml| ie55up.xml| | 65| 15-Apr-21| 08:19 \nnon_ie.debug.js| non_ie.debug.js| | 101963| 15-Apr-21| 08:19 \nnon_ie.js| non_ie.js| | 59859| 15-Apr-21| 08:19 \nnon_ie.xml| non_ie.xml| | 65| 15-Apr-21| 08:19 \nbpstd.debug.js| bpstd.debug.js| | 7637| 15-Apr-21| 08:19 \nbpstd.js| bpstd.js| | 4356| 15-Apr-21| 08:19 \nbpstd.xml| bpstd.xml| | 65| 15-Apr-21| 08:19 \nctp.debug.js| ctp.debug.js| | 7406| 15-Apr-21| 08:19 \nctp.js| ctp.js| | 3934| 15-Apr-21| 08:19 \nctp.xml| ctp.xml| | 65| 15-Apr-21| 08:19 \ncvtp.debug.js| cvtp.debug.js| | 4529| 15-Apr-21| 08:19 \ncvtp.js| cvtp.js| | 2412| 15-Apr-21| 08:19 \ncvtp.xml| cvtp.xml| | 65| 15-Apr-21| 08:19 \nitp.debug.js| itp.debug.js| | 12586| 15-Apr-21| 08:19 \nitp.js| itp.js| | 9525| 15-Apr-21| 08:19 \nitp.xml| itp.xml| | 65| 15-Apr-21| 08:19 \nxtp.debug.js| xtp.debug.js| | 3071| 15-Apr-21| 08:19 \nxtp.js| xtp.js| | 1512| 15-Apr-21| 08:19 \nsts_sandbox.dll| microsoft.sharepoint.sandbox.dll| 15.0.5345.1000| 180120| 15-Apr-21| 08:19 \naddrbook.gif| addressbook.gif| | 908| 13-Apr-21| 04:57 \ncalview.gif| calview.gif| | 1615| 13-Apr-21| 04:57 \nchecknames.gif| checknames.gif| | 908| 13-Apr-21| 04:57 \nganttvw.gif| ganttview.gif| | 1625| 13-Apr-21| 04:57 \ngrid.gif| grid.gif| | 1610| 13-Apr-21| 04:57 \nicaccdb.gif| icaccdb.gif| | 231| 13-Apr-21| 04:56 \nicaccde.gif| icaccde.gif| | 222| 13-Apr-21| 04:57 \nicbmp.gif| icbmp.gif| | 355| 13-Apr-21| 04:56 \nicdoc.gif| icdoc.gif| | 231| 13-Apr-21| 04:56 \nicdocm.gif| icdocm.gif| | 236| 13-Apr-21| 04:57 \nicdocset.gif| icdocset.gif| | 221| 13-Apr-21| 04:56 \nicdocx.gif| icdocx.gif| | 224| 13-Apr-21| 04:57 \nicdot.gif| icdot.gif| | 223| 13-Apr-21| 04:56 \nicdotm.gif| icdotm.gif| | 235| 13-Apr-21| 04:57 \nicdotx.gif| icdotx.gif| | 221| 13-Apr-21| 04:57 \nicgif.gif| icgif.gif| | 220| 13-Apr-21| 04:56 \nichtmdoc.gif| ichtmdoc.gif| | 229| 13-Apr-21| 04:56 \nichtmppt.gif| ichtmppt.gif| | 227| 13-Apr-21| 04:56 \nichtmpub.gif| ichtmpub.gif| | 227| 13-Apr-21| 04:56 \nichtmxls.gif| ichtmxls.gif| | 239| 13-Apr-21| 04:56 \nicinfopathgeneric.gif| icinfopathgeneric.gif| | 216| 13-Apr-21| 04:57 \nicjfif.gif| icjfif.gif| | 214| 13-Apr-21| 04:56 \nicjpe.gif| icjpe.gif| | 214| 13-Apr-21| 04:56 \nicjpeg.gif| icjpeg.gif| | 214| 13-Apr-21| 04:56 \nicjpg.gif| icjpg.gif| | 214| 13-Apr-21| 04:56 \nicmhtpub.gif| icmhtpub.gif| | 225| 13-Apr-21| 04:57 \nicmpd.gif| icmpd.gif| | 218| 13-Apr-21| 04:56 \nicmpp.gif| icmpp.gif| | 222| 13-Apr-21| 04:56 \nicmpt.gif| icmpt.gif| | 221| 13-Apr-21| 04:56 \nicodp.gif| icodp.gif| | 354| 13-Apr-21| 04:57 \nicods.gif| icods.gif| | 369| 13-Apr-21| 04:57 \nicodt.gif| icodt.gif| | 358| 13-Apr-21| 04:57 \nicone.gif| icone.gif| | 215| 13-Apr-21| 04:56 \niconp.gif| iconp.gif| | 223| 13-Apr-21| 04:57 \nicont.gif| icont.gif| | 216| 13-Apr-21| 04:57 \nicpng.gif| icpng.gif| | 349| 13-Apr-21| 04:56 \nicpot.gif| icpot.gif| | 164| 13-Apr-21| 04:56 \nicpotm.gif| icpotm.gif| | 233| 13-Apr-21| 04:57 \nicpotx.gif| icpotx.gif| | 220| 13-Apr-21| 04:57 \nicppt.gif| icppt.gif| | 168| 13-Apr-21| 04:56 \nicpptm.gif| icpptm.gif| | 236| 13-Apr-21| 04:57 \nicpptx.gif| icpptx.gif| | 222| 13-Apr-21| 04:57 \nicpub.gif| icpub.gif| | 221| 13-Apr-21| 04:56 \nictif.gif| ictif.gif| | 355| 13-Apr-21| 04:56 \nictiff.gif| ictiff.gif| | 355| 13-Apr-21| 04:56 \nicvdw.gif| icvdw.gif| | 219| 13-Apr-21| 04:56 \nicvdx.gif| icvdx.gif| | 231| 13-Apr-21| 04:56 \nicvidset.gif| icvidset.gif| | 92| 13-Apr-21| 04:56 \nicvisiogeneric.gif| icvisiogeneric.gif| | 231| 13-Apr-21| 04:57 \nicvsd.gif| icvsd.gif| | 231| 13-Apr-21| 04:56 \nicvsdm.gif| icvsdm.gif| | 231| 13-Apr-21| 04:56 \nicvsdx.gif| icvsdx.gif| | 231| 13-Apr-21| 04:56 \nicvsl.gif| icvsl.gif| | 211| 13-Apr-21| 04:56 \nicvss.gif| icvss.gif| | 163| 13-Apr-21| 04:56 \nicvssm.gif| icvssm.gif| | 163| 13-Apr-21| 04:56 \nicvssx.gif| icvssx.gif| | 163| 13-Apr-21| 04:56 \nicvst.gif| icvst.gif| | 228| 13-Apr-21| 04:56 \nicvstm.gif| icvstm.gif| | 228| 13-Apr-21| 04:56 \nicvstx.gif| icvstx.gif| | 228| 13-Apr-21| 04:56 \nicvsx.gif| icvsx.gif| | 163| 13-Apr-21| 04:56 \nicvtx.gif| icvtx.gif| | 228| 13-Apr-21| 04:56 \nicxddoc.gif| icxddoc.gif| | 220| 13-Apr-21| 04:56 \nicxls.gif| icxls.gif| | 236| 13-Apr-21| 04:56 \nicxlsb.gif| icxlsb.gif| | 237| 13-Apr-21| 04:57 \nicxlsm.gif| icxlsm.gif| | 352| 13-Apr-21| 04:57 \nicxlsx.gif| icxlsx.gif| | 236| 13-Apr-21| 04:57 \nicxlt.gif| icxlt.gif| | 229| 13-Apr-21| 04:56 \nicxltm.gif| icxltm.gif| | 352| 13-Apr-21| 04:57 \nicxltx.gif| icxltx.gif| | 231| 13-Apr-21| 04:57 \nicxsn.gif| icxsn.gif| | 214| 13-Apr-21| 04:57 \nlg_accdb.gif| lg_icaccdb.gif| | 471| 13-Apr-21| 04:57 \nlg_accdb.png| lg_icaccdb.png| | 1634| 13-Apr-21| 04:57 \nlg_accde.gif| lg_icaccde.gif| | 479| 13-Apr-21| 04:57 \nlg_bmp.gif| lg_icbmp.gif| | 604| 13-Apr-21| 04:57 \nlg_gif.gif| lg_icgif.gif| | 501| 13-Apr-21| 04:57 \nlg_htdoc.gif| lg_ichtmdoc.gif| | 510| 13-Apr-21| 04:57 \nlg_htppt.gif| lg_ichtmppt.gif| | 484| 13-Apr-21| 04:57 \nlg_htpub.gif| lg_ichtmpub.gif| | 482| 13-Apr-21| 04:57 \nlg_htxls.gif| lg_ichtmxls.gif| | 504| 13-Apr-21| 04:57 \nlg_jfif.gif| lg_icjfif.gif| | 433| 13-Apr-21| 04:57 \nlg_jpe.gif| lg_icjpe.gif| | 433| 13-Apr-21| 04:57 \nlg_jpeg.gif| lg_icjpeg.gif| | 433| 13-Apr-21| 04:57 \nlg_jpg.gif| lg_icjpg.gif| | 433| 13-Apr-21| 04:57 \nlg_mpd.gif| lg_icmpd.gif| | 355| 13-Apr-21| 04:57 \nlg_mpp.gif| lg_icmpp.gif| | 363| 13-Apr-21| 04:57 \nlg_mpt.gif| lg_icmpt.gif| | 356| 13-Apr-21| 04:57 \nlg_png.gif| lg_icpng.gif| | 600| 13-Apr-21| 04:57 \nlg_pub.gif| lg_icpub.gif| | 462| 13-Apr-21| 04:57 \nlg_rtf.gif| lg_icrtf.gif| | 481| 13-Apr-21| 04:57 \nlg_tif.gif| lg_ictif.gif| | 604| 13-Apr-21| 04:57 \nlg_tiff.gif| lg_ictiff.gif| | 604| 13-Apr-21| 04:57 \nlg_vdx.gif| lg_icvdx.gif| | 540| 13-Apr-21| 04:57 \nlg_vsd.gif| lg_icvsd.gif| | 540| 13-Apr-21| 04:57 \nlg_vsl.gif| lg_icvsl.gif| | 482| 13-Apr-21| 04:57 \nlg_vss.gif| lg_icvss.gif| | 468| 13-Apr-21| 04:57 \nlg_vst.gif| lg_icvst.gif| | 502| 13-Apr-21| 04:57 \nlg_vstx.gif| lg_icvstx.gif| | 502| 13-Apr-21| 04:57 \nlg_vsx.gif| lg_icvsx.gif| | 468| 13-Apr-21| 04:57 \nlg_vtx.gif| lg_icvtx.gif| | 502| 13-Apr-21| 04:57 \nlg_xddo.gif| lg_icxddoc.gif| | 337| 13-Apr-21| 04:57 \nlg_xsn.gif| lg_icxsn.gif| | 323| 13-Apr-21| 04:57 \nopenfold.gif| openfold.gif| | 142| 13-Apr-21| 04:57 \nituser.gif| ituser.gif| | 1595| 15-Apr-21| 08:19 \nblueprintmtpro.eot| blueprintmtpro.eot| | 24734| 13-Apr-21| 04:57 \nblueprintmtpro.svg| blueprintmtpro.svg| | 105256| 13-Apr-21| 04:57 \nblueprintmtpro.ttf| blueprintmtpro.ttf| | 49468| 13-Apr-21| 04:57 \nblueprintmtpro.woff| blueprintmtpro.woff| | 31724| 13-Apr-21| 04:57 \nblueprintmtprolarge.png| blueprintmtprolarge.png| | 1563| 13-Apr-21| 04:57 \nblueprintmtprosmall.png| blueprintmtprosmall.png| | 1326| 13-Apr-21| 04:57 \ncalibri.eot| calibri.eot| | 167788| 13-Apr-21| 04:57 \ncalibri.svg| calibri.svg| | 365292| 13-Apr-21| 04:57 \ncalibri.ttf| calibri.ttf| | 350124| 13-Apr-21| 04:57 \ncalibri.woff| calibri.woff| | 184156| 13-Apr-21| 04:57 \ncalibrilarge.png| calibrilarge.png| | 1318| 13-Apr-21| 04:57 \ncalibrismall.png| calibrismall.png| | 1170| 13-Apr-21| 04:57 \ncenturygothic.eot| centurygothic.eot| | 60600| 13-Apr-21| 04:57 \ncenturygothic.svg| centurygothic.svg| | 165961| 13-Apr-21| 04:57 \ncenturygothic.ttf| centurygothic.ttf| | 124584| 13-Apr-21| 04:57 \ncenturygothic.woff| centurygothic.woff| | 79732| 13-Apr-21| 04:57 \ncenturygothiclarge.png| centurygothiclarge.png| | 1589| 13-Apr-21| 04:57 \ncenturygothicsmall.png| centurygothicsmall.png| | 1351| 13-Apr-21| 04:57 \ncorbel.eot| corbel.eot| | 96453| 13-Apr-21| 04:57 \ncorbel.svg| corbel.svg| | 185947| 13-Apr-21| 04:57 \ncorbel.ttf| corbel.ttf| | 200316| 13-Apr-21| 04:57 \ncorbel.woff| corbel.woff| | 106184| 13-Apr-21| 04:57 \ncorbellarge.png| corbellarge.png| | 1351| 13-Apr-21| 04:57 \ncorbelsmall.png| corbelsmall.png| | 1171| 13-Apr-21| 04:57 \nimpact.eot| impact.eot| | 56550| 13-Apr-21| 04:57 \nimpact.svg| impact.svg| | 162607| 13-Apr-21| 04:57 \nimpact.ttf| impact.ttf| | 129012| 13-Apr-21| 04:57 \nimpact.woff| impact.woff| | 76992| 13-Apr-21| 04:57 \nimpactlarge.png| impactlarge.png| | 1304| 13-Apr-21| 04:57 \nimpactsmall.png| impactsmall.png| | 1150| 13-Apr-21| 04:57 \nshellicons.eot| shellicons.eot| | 47960| 15-Apr-21| 08:19 \nshellicons.svg| shellicons.svg| | 57730| 15-Apr-21| 08:19 \nshellicons.ttf| shellicons.ttf| | 47768| 15-Apr-21| 08:19 \nshellicons.woff| shellicons.woff| | 26452| 15-Apr-21| 08:19 \ntypewriterelite.eot| typewriterelite.eot| | 27328| 13-Apr-21| 04:57 \ntypewriterelite.svg| typewriterelite.svg| | 77944| 13-Apr-21| 04:57 \ntypewriterelite.ttf| typewriterelite.ttf| | 51708| 13-Apr-21| 04:57 \ntypewriterelite.woff| typewriterelite.woff| | 30976| 13-Apr-21| 04:57 \ntypewriterelitelarge.png| typewriterelitelarge.png| | 1548| 13-Apr-21| 04:57 \ntypewriterelitesmall.png| typewriterelitesmall.png| | 1296| 13-Apr-21| 04:57 \nhelp.xml| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-21| 08:19 \nwsshelp.xml_1025| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-21| 08:19 \nwsshelp.xml_1026| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-21| 08:19 \nwsshelp.xml_1029| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-21| 08:19 \nwsshelp.xml_1030| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-21| 08:19 \nwsshelp.xml_1032| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-21| 08:19 \nwsshelp.xml_1033| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-21| 08:19 \nwsshelp.xml_1035| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-21| 08:19 \nwsshelp.xml_1037| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-21| 08:19 \nwsshelp.xml_1038| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-21| 08:19 \nwsshelp.xml_1043| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-21| 08:19 \nwsshelp.xml_1044| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-21| 08:19 \nwsshelp.xml_1045| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-21| 08:19 \nwsshelp.xml_1048| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-21| 08:19 \nwsshelp.xml_1050| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-21| 08:19 \nwsshelp.xml_1051| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-21| 08:19 \nwsshelp.xml_1053| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-21| 08:19 \nwsshelp.xml_1054| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-21| 08:19 \nwsshelp.xml_1055| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-21| 08:19 \nwsshelp.xml_1057| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-21| 08:19 \nwsshelp.xml_1058| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-21| 08:19 \nwsshelp.xml_1060| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-21| 08:19 \nwsshelp.xml_1061| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-21| 08:19 \nwsshelp.xml_1062| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-21| 08:19 \nwsshelp.xml_1063| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-21| 08:19 \nwsshelp.xml_1066| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-21| 08:19 \nwsshelp.xml_1081| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-21| 08:19 \nwsshelp.xml_1086| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-21| 08:19 \nwsshelp.xml_1087| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-21| 08:19 \nwsshelp.xml_2070| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-21| 08:19 \nwsshelp.xml_2074| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-21| 08:19 \nicvsdm.gif_14| icvsdm.gif| | 1290| 15-Apr-21| 08:19 \nicvsdx.gif_14| icvsdx.gif| | 1288| 15-Apr-21| 08:19 \nlg_icvsdm.gif_14| lg_icvsdm.gif| | 577| 15-Apr-21| 08:19 \nlg_icvsdx.gif_14| lg_icvsdx.gif| | 540| 15-Apr-21| 08:19 \npickerhierarchycontrol.js_14| pickerhierarchycontrol.js| | 126114| 15-Apr-21| 08:19 \nfldswss3.xml_14| fieldswss3.xml| | 50728| 15-Apr-21| 08:19 \ndispform.aspx_piclib_14| dispform.aspx| | 14311| 15-Apr-21| 08:19 \nmicrosoft.sharepoint.client.silverlight.dll_14| microsoft.sharepoint.client.silverlight.dll| 14.0.7006.1000| 273016| 15-Apr-21| 08:19 \nmicrosoft.sharepoint.client.silverlight.runtime.dll_14| microsoft.sharepoint.client.silverlight.runtime.dll| 14.0.7007.1000| 146040| 15-Apr-21| 08:19 \nblog.xsl_14| blog.xsl| | 40342| 15-Apr-21| 08:19 \nviewcategory.asp_blog_categories_14| viewcategory.aspx| | 13786| 15-Apr-21| 08:19 \nschema.xml_blog_comments_14| schema.xml| | 39634| 15-Apr-21| 08:19 \nviewcomment.asp_blog_comments_14| viewcomment.aspx| | 13786| 15-Apr-21| 08:19 \nviewpost.asp_blog_posts_14| viewpost.aspx| | 13786| 15-Apr-21| 08:19 \ndmslstdispform_aspx_14| dispform.aspx| | 13786| 15-Apr-21| 08:19 \ndepl.xsd_14| deploymentmanifest.xsd| | 74297| 15-Apr-21| 08:19 \ndocicon.xml_14| docicon.xml| | 14475| 15-Apr-21| 08:19 \nfldtypes.xsl_14| fldtypes.xsl| | 128231| 15-Apr-21| 08:19 \ndatepicker.debug.js_14| datepicker.debug.js| | 30848| 15-Apr-21| 08:19 \ndatepick.js_14| datepicker.js| | 20413| 15-Apr-21| 08:19 \nentityeditor.debug.js_14| entityeditor.debug.js| | 59260| 15-Apr-21| 08:19 \nentityeditor.js_14| entityeditor.js| | 38002| 15-Apr-21| 08:19 \ninplview.debug.js_14| inplview.debug.js| | 57512| 15-Apr-21| 08:19 \ninplview.js_14| inplview.js| | 39415| 15-Apr-21| 08:19 \njsgrid.debug.js_14| jsgrid.debug.js| | 785068| 15-Apr-21| 08:19 \njsgrid.js_14| jsgrid.js| | 400019| 15-Apr-21| 08:19 \nsp.debug.js_14| sp.debug.js| | 575930| 15-Apr-21| 08:19 \nsp.js_14| sp.js| | 390757| 15-Apr-21| 08:19 \nsp.ribbon.debug.js_14| sp.ribbon.debug.js| | 325227| 15-Apr-21| 08:19 \nsp.runtime.debug.js_14| sp.runtime.debug.js| | 110347| 15-Apr-21| 08:19 \nsp.runtime.js_14| sp.runtime.js| | 68791| 15-Apr-21| 08:19 \nsp.ui.rte.debug.js_14| sp.ui.rte.debug.js| | 594574| 15-Apr-21| 08:19 \nsp.ui.rte.js_14| sp.ui.rte.js| | 365926| 15-Apr-21| 08:19 \nspgantt.debug.js_14| spgantt.debug.js| | 39173| 15-Apr-21| 08:19 \nspgantt.js_14| spgantt.js| | 19338| 15-Apr-21| 08:19 \ndispform.asx_0071_14| dispform.aspx| | 13786| 15-Apr-21| 08:19 \ndispform.asx_0083_14| dispform.aspx| | 13786| 15-Apr-21| 08:19 \ndispform.asx_0082_14| dispform.aspx| | 13786| 15-Apr-21| 08:19 \ndispform.asx_0072_14| dispform.aspx| | 13786| 15-Apr-21| 08:19 \ndispform.asx_0038_14| dispform.aspx| | 13786| 15-Apr-21| 08:19 \ndispform.asx_0084_14| dispform.aspx| | 13786| 15-Apr-21| 08:19 \ndefformt.asc_14| defaulttemplates.ascx| | 170271| 15-Apr-21| 08:19 \nactredir.asx_14| actionredirect.aspx| | 896| 15-Apr-21| 08:19 \naggsetngs.asx_14| aggregationsettings.aspx| | 8163| 15-Apr-21| 08:19 \nctmark.asx_14| calltrackmark.aspx| | 211| 15-Apr-21| 08:19 \nclcnfm.asx_14| circulationconfirm.aspx| | 216| 15-Apr-21| 08:19 \ncreate.asx_14| create.aspx| | 33257| 15-Apr-21| 08:19 \ndeacfeat.asx_14| deactivatefeature.aspx| | 4240| 15-Apr-21| 08:19 \ndeletemu.asx_14| deletemu.aspx| | 188| 15-Apr-21| 08:19 \nfilter.asx_14| filter.aspx| | 1793| 15-Apr-21| 08:19 \ngbredir.asx_14| groupboardredirect.aspx| | 216| 15-Apr-21| 08:19 \niframe.asx_14| iframe.aspx| | 1494| 15-Apr-21| 08:19 \nlistedit.asx_14| listedit.aspx| | 46078| 15-Apr-21| 08:19 \nmngct.asx_14| managecontenttype.aspx| | 10409| 15-Apr-21| 08:19 \nmngfeat.asx_14| managefeatures.aspx| | 4911| 15-Apr-21| 08:19 \nmngsubwb.asx_14| mngsubwebs.aspx| | 12291| 15-Apr-21| 08:19 \ndefault.asx_mobile_14| default.aspx| | 1513| 15-Apr-21| 08:19 \nmbllogin.asx_mobile_14| mbllogin.aspx| | 5337| 15-Apr-21| 08:19 \nmblwiki.asx_mobile_14| mblwiki.aspx| | 3598| 15-Apr-21| 08:19 \nmblwp.asx_mobile_14| mblwp.aspx| | 3603| 15-Apr-21| 08:19 \npickerdialog.mas_14| pickerdialog.master| | 8739| 15-Apr-21| 08:19 \nrtedlg.mas_14| rtedialog.master| | 3153| 15-Apr-21| 08:19 \npicker.asx_14| picker.aspx| | 8613| 15-Apr-21| 08:19 \npckrrst.asx_14| pickerresult.aspx| | 3| 15-Apr-21| 08:19 \nprjsetng.asx_14| prjsetng.aspx| | 16037| 15-Apr-21| 08:19 \nreqfeat.asx_14| reqfeatures.aspx| | 3750| 15-Apr-21| 08:19 \nsrchrslt.asx_14| searchresults.aspx| | 6013| 15-Apr-21| 08:19 \nsettings.asx_14| settings.aspx| | 9565| 15-Apr-21| 08:19 \nsetwa.asx_14| setwhereabouts.aspx| | 212| 15-Apr-21| 08:19 \nsurvedit.asx_14| survedit.aspx| | 36103| 15-Apr-21| 08:19 \nvwgrpprm.asx_14| viewgrouppermissions.aspx| | 5046| 15-Apr-21| 08:19 \nviewlsts.asx_14| viewlsts.aspx| | 16520| 15-Apr-21| 08:19 \nvwstyles.xsl_14| vwstyles.xsl| | 121144| 15-Apr-21| 08:19 \ncui.debug.js| cui.debug.js| | 646903| 15-Apr-21| 08:19 \ncui.js| cui.js| | 362624| 15-Apr-21| 08:19 \nmicrosoft.web.commandui.dll| microsoft.web.commandui.dll| 15.0.5085.1000| 134976| 16-Apr-21| 10:13 \nmicrosoft.web.commandui.dll_0001| microsoft.web.commandui.dll| 15.0.5085.1000| 134976| 16-Apr-21| 10:13 \nxlsrv.commandui.dll| microsoft.web.commandui.dll| 15.0.5085.1000| 134976| 16-Apr-21| 10:13 \n \n## Information about protection and security\n\nProtect yourself online: [Windows Security support](<https://support.microsoft.com/hub/4099151>)Learn how we guard against cyber threats: [Microsoft Security](<https://www.microsoft.com/security>)\n", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-05-11T07:00:00", "type": "mskb", "title": "Description of the security update for SharePoint Foundation 2013: May 11, 2021 (KB5001935)", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-26418", "CVE-2021-28474", "CVE-2021-28478", "CVE-2021-31171", "CVE-2021-31172", "CVE-2021-31173", "CVE-2021-31181"], "modified": "2021-05-11T07:00:00", "id": "KB5001935", "href": "https://support.microsoft.com/en-us/help/5001935", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2023-06-23T19:31:41", "description": "None\n## Summary\n\nThis security update resolves a Microsoft Word remote code execution vulnerability and SharePoint Denial of Service Update. To learn more about the vulnerabilities, see the following security advisories:\n\n * [Microsoft Common Vulnerabilities and Exposures CVE-2021-26418](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-26418>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2021-28474](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-28474>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2021-28478](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-28478>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2021-31171](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31171>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2021-31172](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31172>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2021-31173](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31173>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2021-31181](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31181>)\n\n**Note: **To apply this security update, you must have the release version of Microsoft SharePoint Enterprise Server 2016 installed on the computer.\n\nThis public update delivers Feature Pack 2 for SharePoint Server 2016. Feature Pack 2 contains the following feature:\n\n * SharePoint Framework (SPFx)\nThis public update also delivers all the features that were included in Feature Pack 1 for SharePoint Server 2016, including:\n * Administrative Actions Logging\n * MinRole enhancements\n * SharePoint Custom Tiles\n * Hybrid Taxonomy\n * OneDrive API for SharePoint on-premises\n * OneDrive for Business modern user experience (available to Software Assurance customers)\nThe OneDrive for Business modern user experience requires an active Software Assurance contract at the time that the experience is enabled, either by installation of the public update or by manual enablement. If you don't have an active Software Assurance contract at the time of enablement, you must turn off the OneDrive for Business modern user experience.For more information, see the following Microsoft Docs articles:\n * [New features included in the November 2016 Public Update for SharePoint Server 2016 (Feature Pack 1)](<https://go.microsoft.com/fwlink/?linkid=832679>)\n * [New features included in the September 2017 Public Update for SharePoint Server 2016 (Feature Pack 2)](<https://go.microsoft.com/fwlink/?linkid=856819>)\n\n## Improvements and fixes\n\nThis update contains a fix for the following nonsecurity issue in SharePoint Server 2016:\n\n * Fixes an issue in which SharePoint Designer doesn't work well on the site that disables the Wiki Home Page feature.\nThis update also contains a fix for the following nonsecurity issue in Project Server 2016:\n * The **Export to Excel** function doesn't work for the **Capacity and Engagements Heatmap** view on the Capacity Planning page.\n\n## How to get and install the update\n\n### Method 1: Microsoft Update\n\nThis update is available from Microsoft Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see [Windows Update: FAQ](<https://support.microsoft.com/help/12373/windows-update-faq>).\n\n### Method 2: Microsoft Update Catalog\n\nTo get the standalone package for this update, go to the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/Search.aspx?q=KB5001917>) website.\n\n### Method 3: Microsoft Download Center\n\nYou can get the standalone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.\n\n * [Download security update 5001917 for the 64-bit version of SharePoint Enterprise Server 2016](<http://www.microsoft.com/download/details.aspx?familyid=650bb002-b472-4d9b-b36e-d960150b2ab7>)\n\n## More information\n\n### Security update deployment information\n\nFor deployment information about this update, see Security update deployment information: May 11, 2021.\n\n### Security update replacement information\n\nThis security update replaces previously released security update [4504719](<https://support.microsoft.com/kb/4504719>).\n\n### File hash information\n\nFile name| | SHA256 hash \n---|---|--- \nsts2016-kb5001917-fullfile-x64-glb.exe| | 0E3C0BC8BC8614C86DAB613B6FF4BCD415F6D5195750CFE2BED27239C1CD2FD7 \n \n### File information\n\nDownload [the list of files that are included in security update 5001917](<https://download.microsoft.com/download/7/9/b/79b19775-9b49-463f-b6d3-dee969985e4b/5001917.csv>).\n\n## Information about protection and security\n\nProtect yourself online: [Windows Security support](<https://support.microsoft.com/hub/4099151>)Learn how we guard against cyber threats: [Microsoft Security](<https://www.microsoft.com/security>)\n", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-05-11T07:00:00", "type": "mskb", "title": "Description of the security update for SharePoint Enterprise Server 2016: May 11, 2021 (KB5001917)", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-26418", "CVE-2021-28474", "CVE-2021-28478", "CVE-2021-31171", "CVE-2021-31172", "CVE-2021-31173", "CVE-2021-31181"], "modified": "2021-05-11T07:00:00", "id": "KB5001917", "href": "https://support.microsoft.com/en-us/help/5001917", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2023-06-23T19:31:40", "description": "None\n## Summary\n\nThis security update resolves a Microsoft SharePoint Server remote code execution vulnerability and a Microsoft SharePoint spoofing vulnerability and information disclosure vulnerability. To learn more about these vulnerabilities, see the following security advisories:\n\n * [Microsoft Common Vulnerabilities and Exposures CVE-2021-26418](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-26418>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2021-28474](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-28474>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2021-28478](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-28478>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2021-31171](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31171>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2021-31172](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31172>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2021-31173](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31173>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2021-31181](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31181>)\n\n**Note: **To apply this security update, you must have the release version of Microsoft SharePoint Server 2019 installed on the computer.\n\n## Improvements and fixes\n\nThis security update contains improvements and fixes for the following nonsecurity issues in SharePoint Server 2019:\n\n * Adds the ability to update the SQL authentication account username and password when SharePoint uses Azure SQL Managed Instance. To do this, use the following script:`\n \n \r$db = Get-SPDatabase databasename\r$db.Username = \"PlaceholderAccountName\"\r$db.Password = \"PlaceholderPassword\"\r$db.Update()\n\n`\n * Fixes the issue that affects the file path limit of 260 characters for the site collection that's hosted in a web application that's configured with multiple authentication methods.\n * Fixes an issue in which assigned badges don't render on discussions, in a My Membership web part, or a members list.\n * Fixes an issue in which shared columns in a document set are unexpectedly synchronized to a contained folder after the folder is renamed.\nThis update also contains fixes for the following issues. To fix these issues, you have to install KB 5001915 together with this update.\n\n * Fixes an issue in which a link is still added even though you select **Cancel **on the **Add a link** page in the site Edit navigation pane.\n * Fixes an issue in which the focus isn't clearly visible on an Activity list when high contrast mode is on.\n * Fixes an issue in which you can't activate a submenu drop-down box in scan mode.\n * Fixes an issue in which the Persona Component doesn't have the sufficient color contrast.\n * Fixes an issue in which the focus doesn't go to the first interactive element of the submenu in the Documents recent activity feed pane.\n * Fixes an issue in which attachments in a custom list can't be deleted.\n * Fixes an issue in which timestamps of comments are displayed as a link.\n * Fixes an issue in which the focus order is not correct on the Documents page in the Narrator scan mode.\n * Fixes an issue in which the screen reader is not announcing sufficient information for the \"about me\" menu in the upper-right corner of a site.\n * Fixes an issue in which the focus is not visible on the **Hide in SharePoint mobile app** checkbox in the **New link** dialog box.\nThis security update also contains a fix for the following nonsecurity issue in Microsoft Project Server 2019:\n * After you run the ExportWorkspaceItemsByDisplayName2019.sql script from the General Data Protection Regulation (GDPR) for Project Server, you can't find the OwnerUserClaimsAccount field in the query results.\n\n## How to get and install the update\n\n### Method 1: Microsoft Update\n\nThis update is available from Microsoft Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see [Windows Update: FAQ](<https://support.microsoft.com/help/12373/windows-update-faq>).\n\n### Method 2: Microsoft Update Catalog\n\nTo get the standalone package for this update, go to the [Microsoft Update Catalog](<https://www.catalog.update.microsoft.com/Search.aspx?q=KB5001916>) website.\n\n### Method 3: Microsoft Download Center\n\nYou can get the standalone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.\n\n * [Download security update 5001916 for the 64-bit version of SharePoint Server 2019](<http://www.microsoft.com/download/details.aspx?familyid=0036da36-a42a-47e3-855d-9485daf73539>)\n\n## More information\n\n### Security update deployment information\n\nFor deployment information about this update, see Security update deployment information: May 11, 2021.\n\n### Security update replacement information\n\nThis security update replaces previously released security update [4504716](<http://support.microsoft.com/kb/4504716>).\n\n### File hash information\n\nFile name| | SHA256 hash \n---|---|--- \nsts2019-kb5001916-fullfile-x64-glb.exe| | 4813DC9B0773667CA3F5844023BD416F0E14B69623D31C2D0D7B7E294C760655 \n \n### File information\n\nThe English (United States) version of this software update installs files that have the attributes that are listed in the following table. The dates and times for these files are listed in Coordinated Universal Time (UTC). The dates and times for these files on your local computer are displayed in your local time together with your current daylight saving time (DST) bias. Additionally, the dates and times may change when you perform certain operations on the files.\n\n#### \n\n__\n\nFor all supported x64-based versions of SharePoint Server 2019\n\nFile identifier| File name| File version| File size| Date| Time \n---|---|---|---|---|--- \naccsvcdp.dll| accsvcdp.dll| 16.0.10374.20000| 267672| 13-Apr-21| 07:56 \nmicrosoft.office.access.services.moss.dll| microsoft.office.access.services.moss.dll| 16.0.10374.20000| 767920| 13-Apr-21| 07:56 \nascalc.dll| ascalc.dll| 16.0.10374.20000| 972200| 13-Apr-21| 07:53 \nmicrosoft.office.access.server.application.dll| microsoft.office.access.server.application.dll| 16.0.10374.20000| 614840| 13-Apr-21| 07:53 \nmicrosoft.office.access.server.calculation.interop.dll| microsoft.office.access.server.calculation.interop.dll| 16.0.10374.20000| 62376| 13-Apr-21| 07:53 \nmicrosoft.office.access.server.dll| microsoft.office.access.server.dll| 16.0.10374.20000| 1410480| 13-Apr-21| 07:53 \naccsrv.layouts.root.accsrvscripts.js| accessserverscripts.js| | 575532| 13-Apr-21| 07:57 \nconversion.office.biplatserver.dll| biplatserver.dll| 16.0.10374.20000| 524712| 13-Apr-21| 07:57 \nppt.conversion.biplatserver.dll| biplatserver.dll| 16.0.10374.20000| 524712| 13-Apr-21| 07:57 \nppt.edit.biplatserver.dll| biplatserver.dll| 16.0.10374.20000| 524712| 13-Apr-21| 07:57 \nwac.office.biplatserver.dll| biplatserver.dll| 16.0.10374.20000| 524712| 13-Apr-21| 07:57 \nconversion.chartserver.dll| chartserver.dll| 16.0.10374.20000| 16148912| 13-Apr-21| 07:56 \nppt.conversion.chartserver.dll| chartserver.dll| 16.0.10374.20000| 16148912| 13-Apr-21| 07:56 \nppt.edit.chartserver.dll| chartserver.dll| 16.0.10374.20000| 16148912| 13-Apr-21| 07:56 \nwac.office.chartserver.dll| chartserver.dll| 16.0.10374.20000| 16148912| 13-Apr-21| 07:56 \nprodfeat.xml| feature.xml| | 616| 13-Apr-21| 07:53 \naddgroup.asx| cmsslwpaddeditgroup.aspx| | 6406| 12-Apr-21| 03:35 \nastcmmn_js| assetcommon.js| | 18253| 13-Apr-21| 07:53 \nastpkrs_js| assetpickers.js| | 68292| 13-Apr-21| 07:53 \nsm.js| cmssitemanager.js| | 29279| 13-Apr-21| 07:53 \ncmssummarylinks_js| cmssummarylinks.js| | 6015| 13-Apr-21| 07:53 \neditmenu_js| editingmenu.js| | 11359| 13-Apr-21| 07:53 \nhierlist_js| hierarchicallistbox.js| | 30327| 13-Apr-21| 07:53 \nmediaplayer.js| mediaplayer.js| | 47725| 13-Apr-21| 07:53 \nptdlg.js| pickertreedialog.js| | 2950| 13-Apr-21| 07:53 \nselect_js| select.js| | 2387| 13-Apr-21| 07:53 \nslctctls_js| selectorcontrols.js| | 13288| 13-Apr-21| 07:53 \nserializ_js| serialize.js| | 3219| 13-Apr-21| 07:53 \nsp.ui.assetlibrary.ribbon.debug.js| sp.ui.assetlibrary.debug.js| | 13220| 13-Apr-21| 07:53 \nsp.ui.assetlibrary.js| sp.ui.assetlibrary.js| | 5367| 13-Apr-21| 07:53 \nsp.ui.pub.htmldesign.debug.js| sp.ui.pub.htmldesign.debug.js| | 38342| 13-Apr-21| 07:53 \nsp.ui.pub.htmldesign.js| sp.ui.pub.htmldesign.js| | 19407| 13-Apr-21| 07:53 \nsp.ui.pub.ribbon.debug.js| sp.ui.pub.ribbon.debug.js| | 146313| 13-Apr-21| 07:53 \nsp.ui.pub.ribbon.js| sp.ui.pub.ribbon.js| | 84979| 13-Apr-21| 07:53 \nsp.ui.rte.publishing.debug.js| sp.ui.rte.publishing.debug.js| | 98216| 13-Apr-21| 07:53 \nsp.ui.rte.publishing.js| sp.ui.rte.publishing.js| | 49716| 13-Apr-21| 07:53 \nsp.ui.spellcheck.debug.js| sp.ui.spellcheck.debug.js| | 68393| 13-Apr-21| 07:53 \nsp.ui.spellcheck.js| sp.ui.spellcheck.js| | 36522| 13-Apr-21| 07:53 \nsplchkpg_js| spellcheckentirepage.js| | 6653| 13-Apr-21| 07:53 \nspelchek_js| spellchecker.js| | 34657| 13-Apr-21| 07:53 \nvideoportal.js| videoportal.js| | 14742| 13-Apr-21| 07:53 \nmicrosoft.sharepoint.publishing.dll_isapi| microsoft.sharepoint.publishing.dll| 16.0.10374.20000| 5412808| 13-Apr-21| 07:53 \nsharepointpub.dll| microsoft.sharepoint.publishing.dll| 16.0.10374.20000| 5412808| 13-Apr-21| 07:53 \nsharepointpub_gac.dll| microsoft.sharepoint.publishing.dll| 16.0.10374.20000| 5412808| 13-Apr-21| 07:53 \nsppubint.dll| microsoft.sharepoint.publishing.intl.dll| 16.0.10374.20000| 350656| 13-Apr-21| 07:53 \nsppubint_gac.dll| microsoft.sharepoint.publishing.intl.dll| 16.0.10374.20000| 350656| 13-Apr-21| 07:53 \nschema.xml_pubresfeap| schema.xml| | 44173| 13-Apr-21| 07:56 \nasctyps.xml| assetcontenttypes.xml| | 2846| 13-Apr-21| 07:53 \nasctyps2.xml| assetcontenttypes2.xml| | 2460| 13-Apr-21| 07:53 \nasflds.xml| assetfields.xml| | 1366| 13-Apr-21| 07:53 \nasflds2.xml| assetfields2.xml| | 1045| 13-Apr-21| 07:53 \naslibalt.xml| assetlibrarytemplate.xml| | 555| 13-Apr-21| 07:53 \naslibft.xml| feature.xml| | 2763| 13-Apr-21| 07:53 \naslibui.xml| provisionedui.xml| | 5075| 13-Apr-21| 07:53 \naslibui2.xml| provisionedui2.xml| | 1708| 13-Apr-21| 07:53 \ncdsele.xml| contentdeploymentsource.xml| | 637| 13-Apr-21| 07:57 \ncdsfeatu.xml| feature.xml| | 604| 13-Apr-21| 07:57 \ndocmpgcv.xml| docmpageconverter.xml| | 496| 13-Apr-21| 07:53 \ndocxpgcv.xml| docxpageconverter.xml| | 496| 13-Apr-21| 07:53 \nconvfeat.xml| feature.xml| | 766| 13-Apr-21| 07:53 \nippagecv.xml| infopathpageconverter.xml| | 577| 13-Apr-21| 07:53 \nxslappcv.xml| xslapplicatorconverter.xml| | 575| 13-Apr-21| 07:53 \nanalyticsreports.xml| analyticsreports.xml| | 2850| 13-Apr-21| 07:57 \nxspsset.xml| catalogsitesettings.xml| | 556| 13-Apr-21| 07:57 \nxspfeat.xml| feature.xml| | 1514| 13-Apr-21| 07:57 \ndepoper.xml| deploymentoperations.xml| | 2415| 13-Apr-21| 07:53 \ndepfeat.xml| feature.xml| | 788| 13-Apr-21| 07:53 \npestset.xml| enhancedhtmlediting.xml| | 157| 13-Apr-21| 07:53 \npefeat.xml| feature.xml| | 793| 13-Apr-21| 07:52 \nenthmft.xml| feature.xml| | 564| 13-Apr-21| 07:53 \nenthmset.xml| themingsitesettings.xml| | 1005| 13-Apr-21| 07:53 \nenctb.xml| enterprisewikicontenttypebinding.xml| | 559| 13-Apr-21| 07:54 \nenctb2.xml| enterprisewikicontenttypebinding2.xml| | 390| 13-Apr-21| 07:54 \nenfet.xml| feature.xml| | 1168| 13-Apr-21| 07:54 \nenct.xml| enterprisewikicontenttypes.xml| | 1456| 13-Apr-21| 07:53 \nenct2.xml| enterprisewikicontenttypes2.xml| | 1211| 13-Apr-21| 07:53 \nenlayfet.xml| feature.xml| | 1618| 13-Apr-21| 07:53 \nprov.xml| provisionedfiles.xml| | 1181| 13-Apr-21| 07:53 \nprov2.xml| provisionedfiles2.xml| | 1197| 13-Apr-21| 07:53 \newiki2.xml| feature.xml| | 766| 13-Apr-21| 07:57 \nhtmlfeat.xml| feature.xml| | 11263| 13-Apr-21| 07:56 \nhtmlcolm.xml| htmldesigncolumns.xml| | 909| 13-Apr-21| 07:56 \nhtmlcol2.xml| htmldesigncolumns2.xml| | 543| 13-Apr-21| 07:56 \nhtmlcol3.xml| htmldesigncolumns3.xml| | 597| 13-Apr-21| 07:56 \nhtmlcont.xml| htmldesigncontenttypes.xml| | 2330| 13-Apr-21| 07:56 \nhtmlfile.xml| htmldesignfiles.xml| | 657| 13-Apr-21| 07:56 \nhtmlfil2.xml| htmldesignfiles2.xml| | 771| 13-Apr-21| 07:56 \nhtmlfil3.xml| htmldesignfiles3.xml| | 895| 13-Apr-21| 07:56 \nhtmldpui.xml| htmldesignprovisionedui.xml| | 669| 13-Apr-21| 07:56 \nhtmldrib.xml| htmldesignribbon.xml| | 29320| 13-Apr-21| 07:56 \nhtmldpct.xml| htmldisplaytemplatecontenttypes.xml| | 11361| 13-Apr-21| 07:56 \nhtmldpwp.xml| htmldisplaytemplatefiles.xml| | 9302| 13-Apr-21| 07:56 \nhtmldpwp10.xml| htmldisplaytemplatefiles10.xml| | 575| 13-Apr-21| 07:56 \nhtmldpwp11.xml| htmldisplaytemplatefiles11.xml| | 1091| 13-Apr-21| 07:56 \nhtmldpwp12.xml| htmldisplaytemplatefiles12.xml| | 401| 13-Apr-21| 07:56 \nhtmldpwp13.xml| htmldisplaytemplatefiles13.xml| | 396| 13-Apr-21| 07:56 \nhtmldpwp14.xml| htmldisplaytemplatefiles14.xml| | 856| 13-Apr-21| 07:56 \nhtmldpwp15.xml| htmldisplaytemplatefiles15.xml| | 492| 13-Apr-21| 07:56 \nhtmldpwp2.xml| htmldisplaytemplatefiles2.xml| | 830| 13-Apr-21| 07:56 \nhtmldpwp3.xml| htmldisplaytemplatefiles3.xml| | 497| 13-Apr-21| 07:56 \nhtmldpwp4.xml| htmldisplaytemplatefiles4.xml| | 496| 13-Apr-21| 07:56 \nhtmldpwp5.xml| htmldisplaytemplatefiles5.xml| | 506| 13-Apr-21| 07:56 \nhtmldpwp6.xml| htmldisplaytemplatefiles6.xml| | 412| 13-Apr-21| 07:56 \nhtmldpwp7.xml| htmldisplaytemplatefiles7.xml| | 4003| 13-Apr-21| 07:56 \nhtmldpwp8.xml| htmldisplaytemplatefiles8.xml| | 399| 13-Apr-21| 07:56 \nhtmldpwp9.xml| htmldisplaytemplatefiles9.xml| | 401| 13-Apr-21| 07:56 \nhtmldtcbs.xml| htmldisplaytemplatefilesoobcbs.xml| | 580| 13-Apr-21| 07:56 \nhtmldtqb.xml| htmldisplaytemplatefilesqb.xml| | 598| 13-Apr-21| 07:56 \nhtmldtqbref.xml| htmldisplaytemplatefilesqbref.xml| | 507| 13-Apr-21| 07:56 \nhtmldpwp_recs.xml| htmldisplaytemplatefilesrecs.xml| | 418| 13-Apr-21| 07:56 \nststngimplk.xml| sitesettingsimportlink.xml| | 667| 13-Apr-21| 07:56 \naltmp.xam| alternatemediaplayer.xaml| | 35634| 13-Apr-21| 07:54 \nmwpfeat.xml| feature.xml| | 940| 13-Apr-21| 07:54 \nmwpprovf.xml| provisionedfiles.xml| | 1457| 13-Apr-21| 07:54 \nmwpprovu.xml| provisionedui.xml| | 22914| 13-Apr-21| 07:54 \nmwpprovui2.xml| provisionedui2.xml| | 2690| 13-Apr-21| 07:54 \npnfeat.xml| feature.xml| | 782| 13-Apr-21| 07:55 \npnstset.xml| navigationsitesettings.xml| | 4721| 13-Apr-21| 07:55 \nplnfeat.xml| feature.xml| | 760| 13-Apr-21| 07:56 \nplnstset.xml| navigationsitesettings.xml| | 152| 13-Apr-21| 07:56 \ntpfeat.xml| feature.xml| | 2846| 13-Apr-21| 07:57 \ntpcls.xml| pointpublishingcolumns.xml| | 701| 13-Apr-21| 07:57 \ntpcts.xml| pointpublishingcontenttypes.xml| | 488| 13-Apr-21| 07:57 \ntptltsch.xml| schema.xml| | 4088| 13-Apr-21| 07:56 \npclts.xml| schema.xml| | 2354| 13-Apr-21| 07:52 \npcltf.xml| feature.xml| | 857| 13-Apr-21| 07:55 \npclt.xml| productcataloglisttemplate.xml| | 753| 13-Apr-21| 07:56 \npcfeat.xml| feature.xml| | 1699| 13-Apr-21| 07:56 \npccol.xml| productcatalogcolumns.xml| | 6259| 13-Apr-21| 07:56 \npcct.xml| productcatalogcontenttypes.xml| | 830| 13-Apr-21| 07:56 \npcct2.xml| productcatalogcontenttypes2.xml| | 643| 13-Apr-21| 07:55 \npcprov.xml| provisionedfiles.xml| | 926| 13-Apr-21| 07:56 \npubpubpf.xml| feature.xml| | 551| 13-Apr-21| 07:57 \npppptset.xml| portalsettings.xml| | 584| 13-Apr-21| 07:57 \nctconvst.xml| contenttypeconvertersettings.xml| | 511| 13-Apr-21| 07:54 \ndoclbset.xml| documentlibrarysettings.xml| | 524| 13-Apr-21| 07:54 \neditmenu.xml| editingmenu.xml| | 470| 13-Apr-21| 07:54 \npubfeat.xml| feature.xml| | 2696| 13-Apr-21| 07:54 \npaglttmp.xml| pageslisttemplate.xml| | 516| 13-Apr-21| 07:54 \nprovui.xml| provisionedui.xml| | 40574| 13-Apr-21| 07:54 \nprovui2.xml| provisionedui2.xml| | 1489| 13-Apr-21| 07:54 \nprovui3.xml| provisionedui3.xml| | 2135| 13-Apr-21| 07:54 \npubstset.xml| publishingsitesettings.xml| | 6235| 13-Apr-21| 07:54 \nregext.xml| regionalsettingsextensions.xml| | 328| 13-Apr-21| 07:54 \nsiteacmn.xml| siteactionmenucustomization.xml| | 646| 13-Apr-21| 07:54 \nvarflagc.xml| variationsflagcontrol.xml| | 473| 13-Apr-21| 07:54 \nvarnomin.xml| variationsnomination.xml| | 613| 13-Apr-21| 07:54 \npblyfeat.xml| feature.xml| | 6194| 13-Apr-21| 07:57 \npblyprovfile.xml| provisionedfiles.xml| | 7964| 13-Apr-21| 07:57 \npblyprovfile2.xml| provisionedfiles2.xml| | 610| 13-Apr-21| 07:57 \npblyprovfile4.xml| provisionedfiles4.xml| | 308| 13-Apr-21| 07:57 \npblyprovfile5.xml| provisionedfiles5.xml| | 414| 13-Apr-21| 07:57 \npblyprovfile6.xml| provisionedfiles6.xml| | 385| 13-Apr-21| 07:57 \npblyprovfile7.xml| provisionedfiles7.xml| | 1170| 13-Apr-21| 07:57 \npblyprovfile8.xml| provisionedfiles8.xml| | 507| 13-Apr-21| 07:57 \npblyprovui.xml| provisionedui.xml| | 11330| 13-Apr-21| 07:57 \nxspfeatlayouts.xml| searchboundpagelayouts.xml| | 3671| 13-Apr-21| 07:57 \npubmelem.xml| elements.xml| | 4149| 13-Apr-21| 07:53 \npubmele2.xml| elements2.xml| | 592| 13-Apr-21| 07:53 \npubmfeat.xml| feature.xml| | 1697| 13-Apr-21| 07:53 \npubmprui.xml| provisionedui.xml| | 1548| 13-Apr-21| 07:53 \npubmstng.xml| sitesettings.xml| | 670| 13-Apr-21| 07:53 \npubprft.xml| feature.xml| | 758| 13-Apr-21| 07:54 \npubrfeat.xml| feature.xml| | 4927| 13-Apr-21| 07:56 \nprovfile.xml| provisionedfiles.xml| | 4739| 13-Apr-21| 07:56 \nprovfl4.xml| provisionedfiles4.xml| | 1394| 13-Apr-21| 07:56 \npubrcol.xml| publishingcolumns.xml| | 20566| 13-Apr-21| 07:56 \npubrctt.xml| publishingcontenttypes.xml| | 12093| 13-Apr-21| 07:56 \npubrctt2.xml| publishingcontenttypes2.xml| | 304| 13-Apr-21| 07:56 \npubrctt3.xml| publishingcontenttypes3.xml| | 500| 13-Apr-21| 07:56 \npubrcont.xml| publishingcontrols.xml| | 405| 13-Apr-21| 07:56 \nprsset.xml| publishingresourcessitesettings.xml| | 3506| 13-Apr-21| 07:56 \nupgd1.xml| upgrade1.xml| | 548| 13-Apr-21| 07:56 \nupgd2.xml| upgrade2.xml| | 486| 13-Apr-21| 07:56 \nupgd3.xml| upgrade3.xml| | 600| 13-Apr-21| 07:56 \npubtfeat.xml| feature.xml| | 1477| 13-Apr-21| 07:57 \nrollplf.xml| feature.xml| | 862| 13-Apr-21| 07:54 \nrollplpf.xml| provisionedfiles.xml| | 14529| 13-Apr-21| 07:53 \nrollplct.xml| rolluppagecontenttype.xml| | 742| 13-Apr-21| 07:53 \nrollpf.xml| feature.xml| | 816| 13-Apr-21| 07:53 \nrollps.xml| rolluppagesettings.xml| | 4091| 13-Apr-21| 07:53 \nseofeatu.xml| feature.xml| | 1253| 13-Apr-21| 07:56 \nseoopt.xml| searchengineoptimization.xml| | 3578| 13-Apr-21| 07:56 \nseoopt1.xml| searchengineoptimization1.xml| | 2904| 13-Apr-21| 07:56 \nsppelm.xml| elements.xml| | 1843| 13-Apr-21| 07:56 \nsppfea.xml| feature.xml| | 1015| 13-Apr-21| 07:55 \nsaicona.xml| consoleaction.xml| | 412| 13-Apr-21| 07:56 \nsaifeat.xml| feature.xml| | 1324| 13-Apr-21| 07:56 \nsairibn.xml| ribbon.xml| | 2895| 13-Apr-21| 07:56 \nsaisset.xml| sitesettings.xml| | 584| 13-Apr-21| 07:56 \naddtheme.xml| additionalthemes.xml| | 3819| 13-Apr-21| 07:53 \nsbwcopa.xml| colorpalette.xml| | 4813| 13-Apr-21| 07:52 \nsbwcona.xml| consoleaction.xml| | 692| 13-Apr-21| 07:53 \nsbwct.xml| contenttypes.xml| | 4261| 13-Apr-21| 07:53 \nsbwdesba.xml| designbuilderaction.xml| | 444| 13-Apr-21| 07:53 \nsbwdesea.xml| designeditoraction.xml| | 438| 13-Apr-21| 07:53 \nsbwdpa.xml| designpackageactions.xml| | 418| 13-Apr-21| 07:53 \nsbwdpr.xml| designpreviewaction.xml| | 447| 13-Apr-21| 07:53 \nsbwdmt.xml| disablesystemmasterpagetheming.xml| | 436| 13-Apr-21| 07:53 \nsbwfeat.xml| feature.xml| | 6499| 13-Apr-21| 07:53 \nsbwinsdes.xml| installeddesigns.xml| | 536| 13-Apr-21| 07:53 \nsbwmob.xml| mobilechannel.xml| | 1098| 13-Apr-21| 07:53 \nsbwpagela.xml| pagelayouts.xml| | 4119| 13-Apr-21| 07:53 \nsbwpages.xml| pages.xml| | 13120| 13-Apr-21| 07:53 \npubblogwp.xml| publishingblogwebparts.xml| | 949| 13-Apr-21| 07:53 \nsbwqd.xml| quicklaunchdatasource.xml| | 685| 13-Apr-21| 07:53 \nsbwrb.xml| ribbon.xml| | 44107| 13-Apr-21| 07:53 \nsbwsearch.xml| search.xml| | 2352| 13-Apr-21| 07:52 \nsbwsc.xml| sitecolumns.xml| | 3579| 13-Apr-21| 07:53 \nsbwsec.xml| siteelementcontrols.xml| | 952| 13-Apr-21| 07:53 \nsbwss.xml| sitesettings.xml| | 14657| 13-Apr-21| 07:53 \nsbwcss.xml| styles.xml| | 625| 13-Apr-21| 07:53 \nsbwwps.xml| webparts.xml| | 509| 13-Apr-21| 07:53 \nsbwfsf.xml| feature.xml| | 708| 13-Apr-21| 07:53 \nscfeatr.xml| feature.xml| | 856| 13-Apr-21| 07:57 \nspelchek.xml| spellchecking.xml| | 1033| 13-Apr-21| 07:57 \nspelchk2.xml| spellchecking2.xml| | 2641| 13-Apr-21| 07:57 \ncms_tenantadmindeploymentlinksfeature_feature_xml| feature.xml| | 826| 13-Apr-21| 07:55 \ncms_tenantadmindeploymentlinksfeature_links_xml| links.xml| | 542| 13-Apr-21| 07:55 \ntopicplf.xml| feature.xml| | 732| 13-Apr-21| 07:55 \ntopicpf.xml| feature.xml| | 713| 13-Apr-21| 07:54 \nplnkfeat.xml| feature.xml| | 621| 13-Apr-21| 07:53 \npublcol.xml| publishedlinkscolumns.xml| | 1206| 13-Apr-21| 07:53 \npublctt.xml| publishedlinkscontenttypes.xml| | 948| 13-Apr-21| 07:53 \nv2vpblyfeat.xml| feature.xml| | 540| 13-Apr-21| 07:56 \nv2vpblyprovfil.xml| provisionedfiles.xml| | 1934| 13-Apr-21| 07:56 \nvwfrmlk.xml| feature.xml| | 794| 13-Apr-21| 07:54 \nxmlsfeat.xml| feature.xml| | 818| 13-Apr-21| 07:57 \nxmlsitem.xml| xmlsitemap.xml| | 624| 13-Apr-21| 07:57 \nmicrosoft.cobaltcore.dll| microsoft.cobaltcore.dll| 16.0.10374.20000| 3081640| 13-Apr-21| 07:54 \nmicrosoft.cobalt.base.dll| microsoft.cobalt.base.dll| 16.0.10374.20000| 874912| 13-Apr-21| 07:56 \nsystem.collections.immutable.dll| system.collections.immutable.dll| 4.6.23123.00| 193448| | \nupdate_system.collections.immutable.dll| system.collections.immutable.dll| 4.6.23123.00| 193448| 12-Apr-21| 03:25 \ncsisrv.dll| csisrv.dll| 16.0.10374.20000| 1283528| 13-Apr-21| 07:53 \ncsisrvexe.exe| csisrvexe.exe| 16.0.10374.20000| 328640| 13-Apr-21| 07:53 \nonfda.dll| onfda.dll| 16.0.10374.20000| 2096560| 13-Apr-21| 07:53 \ncolumnfiltering.ascx| columnfiltering.ascx| | 443| 13-Apr-21| 11:26 \ndocsettemplates.ascx| docsettemplates.ascx| | 1459| 13-Apr-21| 11:26 \nmetadatanavkeyfilters.ascx| metadatanavkeyfilters.ascx| | 4647| 13-Apr-21| 11:26 \nmetadatanavtree.ascx| metadatanavtree.ascx| | 2686| 13-Apr-21| 11:26 \nmultilangtemplates.ascx| transmgmtlibtemplates.ascx| | 3287| 13-Apr-21| 11:26 \nvideosettemplates.ascx| videosettemplates.ascx| | 1972| 13-Apr-21| 11:26 \nmicrosoft_office_server_conversions_launcher_exe| microsoft.office.server.conversions.launcher.exe| 16.0.10374.20000| 78744| 13-Apr-21| 11:26 \nmicrosoft_office_server_conversions_loadbalancer_exe| microsoft.office.server.conversions.loadbalancer.exe| 16.0.10374.20000| 37272| 13-Apr-21| 11:26 \nmicrosoft.office.server.conversions.dll| microsoft.office.server.conversions.dll| 16.0.10374.20000| 26504| 13-Apr-21| 11:26 \neditdlg.htm_multilang| editdlg.htm| | 4796| 13-Apr-21| 11:26 \nfiledlg.htm_multilang| filedlg.htm| | 3344| 13-Apr-21| 11:26 \nmicrosoft.office.documentmanagement.pages.dll| microsoft.office.documentmanagement.pages.dll| 16.0.10374.20000| 162184| 13-Apr-21| 11:26 \ndocsetversions.aspx| docsetversions.aspx| | 18741| 13-Apr-21| 11:26 \nsts_odspnextnewux28a4170101ed2c3b56c2de05294311b1| folder-small_flap_media.svg| | 2017| 21-Mar-21| 05:44 \nsts_odspnextnewux73a97fa9644604baf0e8c8e1a0ddfdec| folder-small_frontplate_nopreview.svg| | 2017| 21-Mar-21| 05:44 \nsts_odspnextnewux560fb09bbdefe4a825b09a4a5b42cc1f| folder-small_frontplate_thumbnail.svg| | 2228| 21-Mar-21| 05:44 \nsts_odspnextnewuxfdd387718603b45572c38b0e683a7582| lg-bg.svg| | 1176| 21-Mar-21| 05:44 \nsts_odspnextnewux217c5f49b970807caa544557a4c23025| lg-fg.svg| | 1013| 21-Mar-21| 05:44 \nsts_odspnextnewux8c1b0581379a0695a2a49d4118c0caea| lg-fg-media.svg| | 1013| 21-Mar-21| 05:44 \nsts_odspnextnewux92d12eb802e7c5644df24bfa3b531c73| sm-bg.svg| | 1129| 21-Mar-21| 05:44 \nsts_odspnextnewux99e54461762d5614d2c71eecc45a942b| sm-fg.svg| | 888| 21-Mar-21| 05:44 \nsts_odspnextnewuxfeb755d64021af10cd2cfc56915ea5d5| sm-fg-media.svg| | 866| 21-Mar-21| 05:44 \nsts_odspnextnewuxee5697f761f94ca16ffd86a4ef02d1a8| recyclebindeferred.js| | 3138043| 10-Apr-21| 08:03 \nsts_odspnextnewux759803f73d82cd669caf6d930c79a020| recyclebinexecutors.js| | 616921| 10-Apr-21| 08:03 \nsts_odspnextnewux736776bec9f6c6dad2f7dda661dc3dfd| recyclebinreactcontrols.js| | 317587| 10-Apr-21| 08:03 \nsts_odspnextnewux93b96c9ec083c1109a79bd3123411cdf| recyclebinscenario.js| | 516383| 21-Mar-21| 05:44 \nsts_odspnextnewux14b2229aa8737494be04fb698fedbc8d| sitehub.js| | 372523| 10-Apr-21| 08:03 \nsts_odspnextnewuxb8931dbbdb97beb330defb6bad1ae332| sitehubdeferred.js| | 2418464| 10-Apr-21| 08:03 \nsts_odspnextnewuxbed2e8db2e84613293dad61e0584dfb2| sitehubexecutors.js| | 759963| 21-Mar-21| 05:44 \nsts_odspnextnewuxafb6081087eefbfe800401ef617122bd| sitehubreactcontrolsbeforeplt.js| | 1455143| 10-Apr-21| 08:03 \nsts_odspnextnewux72bfe35ac1f8fee6cf37ba0be87c481a| sitehubreactcontrolsdeferred.js| | 40363| 21-Mar-21| 05:44 \nsts_odspnextnewux301104ef8046861277fc65372887860d| siteusage.js| | 416367| 10-Apr-21| 08:03 \nsts_odspnextnewuxd4f616ce0ce5d815121f4cb904bab0b2| splist.js| | 853547| 21-Mar-21| 05:44 \nsts_odspnextnewux75199cdb9d900d5ff11f7782399cb17f| splistdeferred.js| | 2264888| 10-Apr-21| 08:03 \nsts_odspnextnewux506c878c67f39538b69ab51117ced233| splistdeferredexpress.js| | 1644946| 10-Apr-21| 08:03 \nsts_odspnextnewuxdc9ebd6c43507fcad50632f22cb166c4| splistexecutors.js| | 386520| 21-Mar-21| 05:44 \nsts_odspnextnewux643043514490c475b8e63daa45587cfb| splistreactcontrolsbeforeplt.js| | 263195| 21-Mar-21| 05:44 \nsts_odspnextnewux95c14b220e8e6a345ca52833f517b678| splistreactcontrolsdeferred.js| | 289667| 10-Apr-21| 08:03 \nsts_odspnextnewux30484b0717864b439efabcb4caaf6538| spoapp.js| | 272977| 21-Mar-21| 05:44 \nsts_odspnextnewuxb680d3a8e2013810dae29dafe4d75340| spofiles.js| | 610898| 21-Mar-21| 05:44 \nsts_odspnextnewuxceea7ee2c5681d1ddacc2916754e6b3b| spooneup.js| | 377558| 21-Mar-21| 05:44 \nsts_odspnextnewuxa1bba3f539805635ed1b4d1828dbd548| spouploadmanager.js| | 71254| 21-Mar-21| 05:44 \nsts_spclientnewux11247c610eb2b35fec6b7d74a26c38f0| 0.0.js| | 398482| 10-Apr-21| 08:03 \nsts_spclientnewuxe5f4fb44132db455bfc5684abc91d769| 0.contentrollupwebpart-propertypanesettings.js| | 13836| 10-Apr-21| 08:03 \nsts_spclientnewuxf8f9524d7aede8aa27335bd307d3283c| 0.developer-tools.js| | 482459| 10-Apr-21| 08:03 \nsts_spclientnewux8f54e1232a604b66101d785f00e07c5d| 0.image-gallery-edit-mode.js| | 39729| 10-Apr-21| 08:03 \nsts_spclientnewuxff8815132906d9df7e1085f59343125e| 0.legacy-third-party-fabric-core.js| | 240168| 21-Mar-21| 05:44 \nsts_spclientnewuxd03d39b7bc05077c4ac3479593f09e2c| 0.live-persona-card-loader.js| | 106951| 21-Mar-21| 05:44 \nsts_spclientnewux10b60c752308e4797414cc1592352c08| 0.page-picker-component.js| | 135945| 10-Apr-21| 08:03 \nsts_spclientnewuxe567272b5c2a010aa70b17e8c313858a| 0.quick-links-property-pane.js| | 13168| 10-Apr-21| 08:03 \nsts_spclientnewux5b94fcc774f1d14f356a8939ad0c76cf| 0.sp-filepickercontrol.js| | 286178| 10-Apr-21| 08:03 \nsts_spclientnewux1a0dd8556ea12fdfdce46c1b97bf966d| 0.sp-pages-panels.js| | 636681| 10-Apr-21| 08:03 \nsts_spclientnewuxf51e90850f93328c38d84d1e68d27fb3| 0.sp-people-contact-card.js| | 13725| 10-Apr-21| 08:03 \nsts_spclientnewux892018044204a190e9f581edcd620dae| 0.sp-rte-propertypane.js| | 39875| 10-Apr-21| 08:03 \nsts_spclientnewuxe8964dd3d437ce4f33115b3bc0557c72| 0.sp-webpart-base-propertypane.js| | 130210| 10-Apr-21| 08:03 \nsts_spclientnewux6bcd61d2c5362c6320b3a14b80a5b5a8| 0.toolbox.js| | 34942| 10-Apr-21| 08:03 \nsts_spclientnewux48cae7c08b68c5b16fa6bb6d1d734fe3| 0ef418ba-5d19-4ade-9db0-b339873291d0.json| | 12533| 10-Apr-21| 08:03 \nsts_spclientnewux1f88042f059a10dcc631cc92435f2162| 1.1.js| | 14524| 21-Mar-21| 05:44 \nsts_spclientnewux0c482d383b518aa8956558dbdc75bd48| 1.debug-prompt-components.js| | 342348| 10-Apr-21| 08:03 \nsts_spclientnewuxb2f3b0a56c9ef61cd2b5cfa27b5fc37e| 1.people-property-pane.js| | 2745| 21-Mar-21| 05:44 \nsts_spclientnewuxe45badc655897ae1f90884f5a1a97ee7| 1.sp-pages-comments.js| | 99693| 10-Apr-21| 08:03 \nsts_spclientnewuxb2c3d8de1fdcb7cca7c4b2044da486f5| 1.sp-title-region-webpart-edit-mode.js| | 5423| 10-Apr-21| 08:03 \nsts_spclientnewux62046735201d3091111f28556666e654| 1.sp-webpart-base-maintenancemode.js| | 4830| 10-Apr-21| 08:03 \nsts_spclientnewuxf9441b622f01689f522ab5fb5fe73335| 1.twitter-web-part-property-pane-configuration.js| | 4502| 10-Apr-21| 08:03 \nsts_spclientnewux41d07474eaad6a249c862dbff5fab353| 10.10.js| | 15664| 21-Mar-21| 05:44 \nsts_spclientnewux2640b3a11359099d8bdf5c5c5f8d0e69| 10.sp-pages-search.js| | 1795915| 10-Apr-21| 08:03 \nsts_spclientnewuxce961279a04d1e9bccb6d8ad5f571796| 11.11.js| | 1285| 21-Mar-21| 05:44 \nsts_spclientnewuxe55cf1ad4778c2077dbf827d2685ec68| 11.sp-pages-service.js| | 111866| 21-Mar-21| 05:44 \nsts_spclientnewux889e4440a3ddc053863f3696a06989bb| 12.12.js| | 1829| 21-Mar-21| 05:44 \nsts_spclientnewuxa36a04dce9a2a71bf262086728c8fca4| 12.sp-news-digest-layout-component.js| | 78475| 10-Apr-21| 08:03 \nsts_spclientnewux2c83e4872ef1e9ff80fe92bd21ba887c| 13.13.js| | 1154| 21-Mar-21| 05:44 \nsts_spclientnewux0abc9921c94a0185a26543546fe69bf9| 13.sp-command-bar.js| | 85469| 10-Apr-21| 08:03 \nsts_spclientnewux02828a3e864c89d73895cd73034ff255| 14.14.js| | 2736| 21-Mar-21| 05:44 \nsts_spclientnewux5fc507cbbaf792d92d7c965bf98229fb| 14.sp-pages-news.js| | 33108| 10-Apr-21| 08:03 \nsts_spclientnewuxff81272d188ed22f063786fc806b6676| 15.15.js| | 2437| 21-Mar-21| 05:44 \nsts_spclientnewux04433df09825dcc90ce9d666db6a231d| 15.odsp-datasources.js| | 33247| 21-Mar-21| 05:44 \nsts_spclientnewuxfae2c3c1e5e77fdb095806d57713a906| 16.16.js| | 1364| 21-Mar-21| 05:44 \nsts_spclientnewux0ac00e19bb36ceac5b16c783f9c57697| 16.sp-pages-sitesseeall.js| | 10059| 10-Apr-21| 08:03 \nsts_spclientnewux0e37c89b1861312b41dbbb30777d87e8| 17.17.js| | 1255| 21-Mar-21| 05:44 \nsts_spclientnewux34bd612300838bb534ab17b955244e64| 17.sp-pages-seeall.js| | 10003| 10-Apr-21| 08:03 \nsts_spclientnewux7e1e2bea49fc00a6adbc89e9987c0963| 18.18.js| | 3528| 21-Mar-21| 05:44 \nsts_spclientnewux703f83fa82314d3646b6336ccfc68c7d| 18.sp-pages-firstrun.js| | 21481| 10-Apr-21| 08:03 \nsts_spclientnewux12874335eb7bbf6e4065aedb0ef64952| 19.19.js| | 334| 21-Mar-21| 05:44 \nsts_spclientnewux7ba0584c61764c54362d49e256636a60| 2.herowebpart-propertypaneconfiguration.js| | 20379| 10-Apr-21| 08:03 \nsts_spclientnewux4ae937081b814e011b3a30f8781ff6a0| 2.sp-list-webpart-setup.js| | 4226| 10-Apr-21| 08:03 \nsts_spclientnewuxd27a762a6f595ea2f447ab2d8ec565da| 2.sp-pages-social.js| | 50017| 10-Apr-21| 08:03 \nsts_spclientnewux959911483362095cb4dd9eb7c9975bc7| 20.20.js| | 1809| 21-Mar-21| 05:44 \nsts_spclientnewuxe24fd72f1cbfb12913e16ac1df4cdcb5| 20745d7d-8581-4a6c-bf26-68279bc123fc.json| | 12654| 10-Apr-21| 08:03 \nsts_spclientnewux7e9feb247bd54a5bb28e3fc5a1539310| 21.21.js| | 3305| 21-Mar-21| 05:44 \nsts_spclientnewux52b9b523aa83665cd001252b93e94ac1| 2161a1c6-db61-4731-b97c-3cdb303f7cbb.json| | 13230| 10-Apr-21| 08:03 \nsts_spclientnewux85f0f717a8093f6e3b01469c62ed8283| 22.22.js| | 2042| 21-Mar-21| 05:44 \nsts_spclientnewux401fd8351c028dd61da35791e25970db| 22.sp-pages-uservoice.js| | 11249| 21-Mar-21| 05:44 \nsts_spclientnewux427709c4b6b83889860a7669c248e340| 23.23.js| | 2780| 21-Mar-21| 05:44 \nsts_spclientnewuxc54eccabfa9009b899cb953abfdf678f| 23.sp-pages-planner.js| | 3542| 10-Apr-21| 08:03 \nsts_spclientnewux43f114275e211f71a6aa28582376f682| 24.24.js| | 1346| 21-Mar-21| 05:44 \nsts_spclientnewuxf6dfe077c4098d2785be12a31e5473d2| 24.sp-pages-mobileupsellview.js| | 1782| 10-Apr-21| 08:03 \nsts_spclientnewuxf6f7df5704468d218c5f3b26fe863bd9| 243166f5-4dc3-4fe2-9df2-a7971b546a0a.json| | 6971| 10-Apr-21| 08:03 \nsts_spclientnewux208981fead3354ada0b720ecfcf4adf3| 25.25.js| | 1313| 21-Mar-21| 05:44 \nsts_spclientnewuxc81847f87b94153a324bd86419f281a7| 25.sp-pages-app.js| | 1875| 10-Apr-21| 08:03 \nsts_spclientnewuxbf4a9d8327022f52c08fc0b8b827fdb6| 26.26.js| | 927| 21-Mar-21| 05:44 \nsts_spclientnewux885bed98cc2c8a6a50ccff7712d30be2| 26.sp-pages-flow.js| | 62267| 21-Mar-21| 05:44 \nsts_spclientnewuxbcc2e41034699e20bab148d3e4a71ba0| 27.27.js| | 1124| 21-Mar-21| 05:44 \nsts_spclientnewux1a6632074e8c351e24f3b2938f603736| 27.editnavchunk.js| | 59395| 10-Apr-21| 08:03 \nsts_spclientnewuxffbcf313abc7966e7e6a8b536675bbe5| 275c0095-a77e-4f6d-a2a0-6a7626911518.json| | 21207| 10-Apr-21| 08:03 \nsts_spclientnewux7ac3cb45c89324cbe52bbdcfc0898043| 28.28.js| | 1684| 21-Mar-21| 05:44 \nsts_spclientnewux9410bcb4de7701afa0ace4d4e855cfc5| 28.sp-pages-newpagedialog.js| | 36075| 10-Apr-21| 08:03 \nsts_spclientnewuxd9fd2b17e7320f97ce6affe2e9c7eab7| 29.officebrowserfeedback-floodgate.js| | 403227| 21-Mar-21| 05:44 \nsts_spclientnewux36bc50758605996dd2de21816e72ee1b| 2ba60960-c928-4ae5-9bb2-f40c17c611b8.json| | 13174| 10-Apr-21| 08:03 \nsts_spclientnewux0ebe3b2589e383ae358631657a956c04| 2e57bdfd-b419-4536-8fc1-e0681be4c1a6.json| | 13203| 10-Apr-21| 08:03 \nsts_spclientnewux9002d42808bdc96a0128827a146586b0| 3.3.js| | 53134| 21-Mar-21| 05:44 \nsts_spclientnewux263fefdcdce7237f0c86c5e707b0cb41| 3.sp-imageeditcontrol.js| | 27070| 10-Apr-21| 08:03 \nsts_spclientnewux97cf7a0b7f088024120f36c9581e9186| 3.sp-pages-events.js| | 203036| 10-Apr-21| 08:03 \nsts_spclientnewuxd021e3ca9b9233f9d967372d073cf77b| 30.sp-pages-pagestatusnotifier.js| | 2550| 10-Apr-21| 08:03 \nsts_spclientnewuxc566a0d999b605794c7046a4418c5166| 31.sp-pages-newsdigest-navbar.js| | 2232| 10-Apr-21| 08:03 \nsts_spclientnewuxb86635d3446dedd3ac668ca110311406| 31e9537e-f9dc-40a4-8834-0e3b7df418bc.json| | 14677| 10-Apr-21| 08:03 \nsts_spclientnewux25567c008f252c3716b1d7bc25a0a230| 32.oauth-token-data-source.js| | 9489| 21-Mar-21| 05:44 \nsts_spclientnewux7c1f37bee238bcafc089f9dbf053a981| 33.sp-pages-migrateblogdialog.js| | 9832| 21-Mar-21| 05:44 \nsts_spclientnewux07d34bca797f60c1a73b0d1676b500e5| 39c4c1c2-63fa-41be-8cc2-f6c0b49b253d.json| | 12263| 10-Apr-21| 08:03 \nsts_spclientnewux055932804d22159a348485cfa217e4f6| 4.4.js| | 7092| 21-Mar-21| 05:44 \nsts_spclientnewux58e18b3d801d33325553bb31ac88885c| 4.image-gallery-light-box.js| | 6463| 10-Apr-21| 08:03 \nsts_spclientnewuxe2421af58d3d88a988faa8ba86b4adba| 4.sp-pages-sharebyemail.js| | 77643| 10-Apr-21| 08:03 \nsts_spclientnewux342db9533a3215a3913c429babe7abdc| 46698648-fcd5-41fc-9526-c7f7b2ace919.json| | 13806| 10-Apr-21| 08:03 \nsts_spclientnewux158a628d96eef5d6058dbfae15012eca| 490d7c76-1824-45b2-9de3-676421c997fa.json| | 15352| 10-Apr-21| 08:03 \nsts_spclientnewuxfc1c21929fc4bc49c3ed006279e9ffcf| 5.5.js| | 4658| 21-Mar-21| 05:44 \nsts_spclientnewuxfb61b8977a1e1fb434df06105e16277f| 5.sp-pages-navigation.js| | 19604| 10-Apr-21| 08:03 \nsts_spclientnewux4986186266f727199b59946626fb8518| 544dd15b-cf3c-441b-96da-004d5a8cea1d.json| | 13834| 10-Apr-21| 08:03 \nsts_spclientnewux2ca3bbec796cba926a39b7ae922c3e53| 6.6.js| | 1062| 21-Mar-21| 05:44 \nsts_spclientnewux4d9926c72355629935d2adcd87c2211d| 6.sp-pages-statemanager.js| | 50866| 21-Mar-21| 05:44 \nsts_spclientnewuxb907f5fcee962e6ea16d517b503603f4| 6410b3b6-d440-4663-8744-378976dc041e.json| | 15198| 10-Apr-21| 08:03 \nsts_spclientnewux9947ff60b8287e06021dd8602e52a729| 6676088b-e28e-4a90-b9cb-d0d0303cd2eb.json| | 14484| 10-Apr-21| 08:03 \nsts_spclientnewuxe573e1c43b252eac8631cfe75d0d91db| 7.7.js| | 1036| 21-Mar-21| 05:44 \nsts_spclientnewux868be7c5142528b6fecf08512ca55648| 7.siteheaderdeferredchunk.js| | 5182| 21-Mar-21| 05:44 \nsts_spclientnewux87639a606cb4eff65fc640a791358fab| 71c19a43-d08c-4178-8218-4df8554c0b0e.json| | 14978| 10-Apr-21| 08:03 \nsts_spclientnewuxa2e20ea074942a4b9cd5953a7cf70276| 7f718435-ee4d-431c-bdbf-9c4ff326f46e.json| | 13553| 10-Apr-21| 08:03 \nsts_spclientnewuxc1cc208490839b3b2af5bf834aac4571| 8.8.js| | 1108| 21-Mar-21| 05:44 \nsts_spclientnewux02a02097d6ed870b775f256f6f0651ec| 8.onepagenavigation-todoclib.js| | 13259| 21-Mar-21| 05:44 \nsts_spclientnewux7b48f61cb957c98d82358746f12289b0| 8654b779-4886-46d4-8ffb-b5ed960ee986.json| | 12583| 10-Apr-21| 08:03 \nsts_spclientnewux1496efe075e30075e96a884d8a074cd1| 893a257e-9c92-49bc-8a36-2f6bb058da34.json| | 141748| 10-Apr-21| 08:03 \nsts_spclientnewuxc5a328833cf912cc5b9867a481094c28| 8c88f208-6c77-4bdb-86a0-0c47b4316588.json| | 12200| 10-Apr-21| 08:03 \nsts_spclientnewuxc1d0be5dcd5e70e48e514cd3645961f4| 9.9.js| | 5393| 21-Mar-21| 05:44 \nsts_spclientnewuxa7df2052c2e0346723a7875f2e78139d| 9.sp-pages-teamstab.js| | 111372| 10-Apr-21| 08:03 \nsts_spclientnewuxcace392aa7eeb0215447d8373ed109d9| 91a50c94-865f-4f5c-8b4e-e49659e69772.json| | 15541| 10-Apr-21| 08:03 \nsts_spclientnewux0682b2fe8e8e6f7cccca4db9a0c29990| 9d7e898c-f1bb-473a-9ace-8b415036578b.json| | 13841| 10-Apr-21| 08:03 \nsts_spclientnewux0fdddb1f7d99376230fe4d4bb49759c8| a5df8fdf-b508-4b66-98a6-d83bc2597f63.json| | 12061| 10-Apr-21| 08:03 \nsts_spclientnewux9b063290a30a8d5d00ea6c82b1f584dd| accdb_16x1_29eca36a7511b70d241d15c0481802cb.png| | 1455| 21-Mar-21| 05:44 \nsts_spclientnewuxf8b36b9a2392f853c12870aca6c08bcb| accdb_16x1_5_2e9a20b483165dae071683e917b3d650.png| | 1563| 21-Mar-21| 05:44 \nsts_spclientnewux6c988bc2126a0c97acc4b91a081b0dc7| accdb_16x2_4232770535c4bfe73d627e871f1b5205.png| | 622| 21-Mar-21| 05:44 \nsts_spclientnewuxac36d113a5cd18c05cc6dce91a26c516| accdb_16x3_4e737595845a04d204c0cd9b44e62876.png| | 803| 21-Mar-21| 05:44 \nsts_spclientnewuxc9082699c347824d9fdf93859d418569| accdb_48x1_5_865a0ff81a029dcfd49cd1e60f2b7bd4.png| | 1991| 21-Mar-21| 05:44 \nsts_spclientnewux2370ef46b4e0aa0a373b5eed1ec4d2d6| accdb_48x1_c19b676f9fab42cad41c9de7b66f3714.png| | 1747| 21-Mar-21| 05:44 \nsts_spclientnewux3f805a435e986a8afd79fff40690df0c| accdb_48x2_b6485e369bd8ec0b44da26a1e4e4cd1c.png| | 1165| 21-Mar-21| 05:44 \nsts_spclientnewux16937efe9fa9f372232c83850229a907| accdb_48x3_806989e96dd3338dc0d9878a786227b3.png| | 1628| 21-Mar-21| 05:44 \nsts_spclientnewux5c01a47d8d1a98c972d11381a56a4485| accdb_96x1_5_2c340919026c41d0650324c6488f17c3.png| | 1592| 21-Mar-21| 05:44 \nsts_spclientnewuxfe54f2cfae0e89651a21c9ec976e4887| accdb_96x1_6dced4441105144a031c4e81f0c92e4e.png| | 2141| 21-Mar-21| 05:44 \nsts_spclientnewuxc2afa7d8529997c56a4e51d04983e222| accdb_96x2_f19a240c216041f8340b2359f6e29f04.png| | 2803| 21-Mar-21| 05:44 \nsts_spclientnewux2ed5d89277491e397d6ec3b71250fae1| accdb_96x3_8e8b5adf844ef4312e7d931766334f45.png| | 3608| 21-Mar-21| 05:44 \nsts_spclientnewux14c8fe43cdc82d9d166d701bd836b8ec| access_16x1_5_6948cb3cea4684b50b85de45f9b82037.png| | 563| 21-Mar-21| 05:44 \nsts_spclientnewux3c2fdf4bd33157d4a3386eefb4744580| access_16x1_653b762c1ed72b0cd5b2164c7a35061d.png| | 420| 21-Mar-21| 05:44 \nsts_spclientnewuxd8f6bfd86b57ea434499bd89e9f22486| access_16x2_5b6264abef342b1f7dc79a4dee157bba.png| | 748| 21-Mar-21| 05:44 \nsts_spclientnewux6890f53aa7f13964d849f8ec6de01de2| access_16x3_b551babd1e8a6affdc154783705f5b1b.png| | 1949| 21-Mar-21| 05:44 \nsts_spclientnewux7f88e1613b37e837b95938a039151a46| access_48x1_5_87c3cb72d13b5a1db3c5ab9f6964639e.png| | 3091| 21-Mar-21| 05:44 \nsts_spclientnewuxc583ff03963ae5cc3195ec74400299a5| access_48x1_b551babd1e8a6affdc154783705f5b1b.png| | 1949| 21-Mar-21| 05:44 \nsts_spclientnewuxe03ddd3385bd20a0bbbdd68ea08b7d64| access_48x2_acaeab4e1dc07494d3c12508ee54e87e.png| | 4121| 21-Mar-21| 05:44 \nsts_spclientnewux8c1601cd0029740cd2e28ec325ddfde6| access_48x3_41d48725aebf48317d44ac138398cbb2.png| | 6499| 21-Mar-21| 05:44 \nsts_spclientnewux8a29272c7a6e1b22baa47e2a554fdbb4| access_96x1_5_87396554873581bffca1ab0bcd2e6d00.png| | 6442| 21-Mar-21| 05:44 \nsts_spclientnewuxfad8527840cb2dba2ea883f4c0ee1311| access_96x1_bb9c816b5bf213c6ac5babe26ba5e7df.png| | 4114| 21-Mar-21| 05:44 \nsts_spclientnewux0cc4b0020573f648597e787d81ed8b05| access_96x2_8614021e7b018cb8dbe7f3f4ca35fd60.png| | 8391| 21-Mar-21| 05:44 \nsts_spclientnewux11ad913a5bc7fde805672e3c890114ed| access_96x3_01528343f06f9f32762c2196fa40279f.png| | 13652| 21-Mar-21| 05:44 \nsts_spclientnewuxcf9063f036a2e975629266aaa103d655| af8be689-990e-492a-81f7-ba3e4cd3ed9c.json| | 15397| 10-Apr-21| 08:03 \nsts_spclientnewuxd98a7a0da89134c14b2cda056449e632| b19b3b9e-8d13-4fec-a93c-401a091c0707.json| | 15301| 10-Apr-21| 08:03 \nsts_spclientnewux79892d83bd937bf01186bd091972e9a1| b7dd04e1-19ce-4b24-9132-b60a1c2b910d.json| | 23126| 10-Apr-21| 08:03 \nsts_spclientnewuxf5e9c8e2184df5b63ca16f1319fa7960| c4bd7b2f-7b6e-4599-8485-16504575f590.json| | 15854| 10-Apr-21| 08:03 \nsts_spclientnewux7e3c7f016142a2f71b28f9d75fc43958| c70391ea-0b10-4ee9-b2b4-006d3fcad0cd.json| | 14970| 10-Apr-21| 08:03 \nsts_spclientnewux408dd0ffcb6b1d88eceefc32163a8518| cbe7b0a9-3504-44dd-a3a3-0e5cacd07788.json| | 14195| 10-Apr-21| 08:03 \nsts_spclientnewuxa3264eecc8f003b168703c1a15995ffa| csv_16x1_4fc16f1723ce4839abdc01f2a901a384.png| | 1477| 21-Mar-21| 05:44 \nsts_spclientnewuxe4618744896cc0d2c40cea603b3b11fb| csv_16x1_5_4dabadab978dd4d83fe47c01e7d23573.png| | 1641| 21-Mar-21| 05:44 \nsts_spclientnewux67f4b89c4654d5a85a60833cf03840bf| csv_16x2_1e5c3167954f56367fa27253c6c56144.png| | 1592| 21-Mar-21| 05:44 \nsts_spclientnewuxe3baff1c9491c7372651ec160e90bb27| csv_16x3_28cdb33a6661b3b060346f31c621495c.png| | 1126| 21-Mar-21| 05:44 \nsts_spclientnewuxfc3f482373df3b4e21bb588dfe2b3155| csv_48x1_07020046013917eefc2be8e1787e9dca.png| | 2027| 21-Mar-21| 05:44 \nsts_spclientnewux9bad21b1c841989e60f9a6df3c789647| csv_48x1_5_d148f7369cd5f3a4d477c5d700fee676.png| | 2321| 21-Mar-21| 05:44 \nsts_spclientnewux4b4a142b159d2e966313038af60d456a| csv_48x2_545383d43974d4a65fb68bd817b54e96.png| | 1769| 21-Mar-21| 05:44 \nsts_spclientnewux1229ccefbc054024523b33fa2629da8b| csv_48x3_de84df743754e9d08851968fcc5c7d12.png| | 2506| 21-Mar-21| 05:44 \nsts_spclientnewuxacf8a484c11f82e55a95826f8f58c551| csv_96x1_5_0518cee3f9d6daa79587500a2ddd5684.png| | 2297| 21-Mar-21| 05:44 \nsts_spclientnewux58d27833e08d1ab492107cc61e123a71| csv_96x1_a70e1383d349d396443bb39efff139ef.png| | 2517| 21-Mar-21| 05:44 \nsts_spclientnewux730859dcb6287e5d9157e4bbff6a941a| csv_96x2_79e6a3717c2033276d4fc5cc74ccecd3.png| | 2850| 21-Mar-21| 05:44 \nsts_spclientnewux7969046426b5a254c6d2a41bc2147e0f| csv_96x3_f8c424976012461927df153d46e9674d.png| | 4326| 21-Mar-21| 05:44 \nsts_spclientnewuxe04b7ba5c57d6efdd1b3f023a9afd70f| d1d91016-032f-456d-98a4-721247c305e8.json| | 12829| 10-Apr-21| 08:03 \nsts_spclientnewuxe0de0464927d19518f48aaff08ed2ad1| daf0b71c-6de8-4ef7-b511-faae7c388708.json| | 17481| 10-Apr-21| 08:03 \nsts_spclientnewuxa08a88a1a20d60fc6fa9f6eecf78666e| embed-webpart-base.js| | 47158| 10-Apr-21| 08:03 \nsts_spclientnewux1248484f0eaf072567b2270eb74e2a1f| listview-host-assembly.js| | 725391| 10-Apr-21| 08:03 \nsts_spclientnewuxa8c9aa3afb3e1858c4883c80b87b0886| sp-application-base.js| | 89558| 10-Apr-21| 08:03 \nsts_spclientnewux26dacaeae91404692b5c89ca58e6ef98| sp-bing-map-webpart-bundle.js| | 74178| 10-Apr-21| 08:03 \nediscoveryquerystatistics.ascx| ediscoveryquerystatistics.ascx| | 1357| 13-Apr-21| 11:26 \nediscoverytemplate.ascx| ediscoverytemplate.ascx| | 3267| 13-Apr-21| 11:26 \nmicrosoft.office.mhtexport.dll| microsoft.office.mhtexport.dll| 16.0.10374.20000| 28048| 13-Apr-21| 11:26 \npdfirml.dll_0002| microsoft.office.irm.pdfprotectorlib.dll| 16.0.10374.20000| 1308560| 13-Apr-21| 11:26 \nmicrosoft.office.documentmanagement.dll| microsoft.office.documentmanagement.dll| 16.0.10374.20000| 567704| 13-Apr-21| 11:26 \nmicrosoft.office.documentmanagement.dll_isapi| microsoft.office.documentmanagement.dll| 16.0.10374.20000| 567704| 13-Apr-21| 11:26 \nmopap.dll| microsoft.office.policy.adminpages.dll| 16.0.10374.20000| 27528| 13-Apr-21| 11:26 \nbarcodeglobalsettings.ascx| barcodeglobalsettings.ascx| | 1473| 13-Apr-21| 11:26 \nbargensettings.ascx| bargensettings.ascx| | 1523| 13-Apr-21| 11:26 \ndropoffzoneroutingform.ascx| dropoffzoneroutingform.ascx| | 3528| 13-Apr-21| 11:26 \ndefault.aspx_edcons| default.aspx| | 4619| 13-Apr-21| 11:26 \nrecordsribbon.ascx| recordsribbon.ascx| | 367| 13-Apr-21| 11:26 \nmicrosoft.office.policy.dll| microsoft.office.policy.dll| 16.0.10374.20000| 2383752| 13-Apr-21| 11:26 \nmicrosoft.office.policy.dll_isapi| microsoft.office.policy.dll| 16.0.10374.20000| 2383752| 13-Apr-21| 11:26 \nmicrosoft.office.policy.pages.dll| microsoft.office.policy.pages.dll| 16.0.10374.20000| 538512| 13-Apr-21| 11:26 \nauditcustquery.ascx| auditcustomquery.ascx| | 11154| 13-Apr-21| 11:26 \nauditsettings.ascx| auditsettings.ascx| | 3594| 13-Apr-21| 11:26 \nbarcodesettings.ascx| barcodesettings.ascx| | 1399| 13-Apr-21| 11:26 \ndiscoveryglobalcontrol.ascx| discoveryglobalcontrol.ascx| | 5175| 13-Apr-21| 11:26 \ndiscoveryproperties.ascx| discoveryproperties.ascx| | 7132| 13-Apr-21| 11:26 \ndiscoveryquerystatistics.ascx| discoveryquerystatistics.ascx| | 3788| 13-Apr-21| 11:26 \ndlptemplatepicker.ascx| dlptemplatepicker.ascx| | 3594| 13-Apr-21| 11:26 \nlabelsettings.ascx| labelsettings.ascx| | 9510| 13-Apr-21| 11:26 \nretentionsettings.ascx| retentionsettings.ascx| | 11060| 13-Apr-21| 11:26 \nvideothumbnailer.exe| videothumbnailer.exe| 16.0.10374.20000| 22920| 13-Apr-21| 11:26 \ndlcworkflowactions_dll| microsoft.office.workflow.actions.dll| 16.0.10374.20000| 152456| 13-Apr-21| 11:26 \ndlcworkflowactionsvs_dll| microsoft.office.workflow.actions.dll| 16.0.10374.20000| 152456| 13-Apr-21| 11:26 \nmicrosoft.office.workflow.feature.dll| microsoft.office.workflow.feature.dll| 16.0.10374.20000| 32648| 13-Apr-21| 11:26 \nmicrosoft.office.workflow.pages.dll| microsoft.office.workflow.pages.dll| 16.0.10374.20000| 92056| 13-Apr-21| 11:26 \ndlc.workflow.routing.dll| microsoft.office.workflow.routing.dll| 16.0.10374.20000| 123280| 13-Apr-21| 11:26 \ndlc.workflow.tasks.dll| microsoft.office.workflow.tasks.dll| 16.0.10374.20000| 44432| 13-Apr-21| 11:26 \ndlc.workflow.tasks.dll2| microsoft.office.workflow.tasks.dll| 16.0.10374.20000| 44432| 13-Apr-21| 11:26 \nmicrosoft.office.workflowsoap.dll| microsoft.office.workflowsoap.dll| 16.0.10374.20000| 56208| 13-Apr-21| 11:26 \ndw20.exe_0001| dw20.exe| 16.0.10374.20000| 2138576| 13-Apr-21| 07:54 \ndwtrig20.exe| dwtrig20.exe| 16.0.10374.20000| 318928| 13-Apr-21| 07:54 \nmicrosoft.office.server.directory| microsoft.office.server.directory.dll| 16.0.10374.20000| 1374664| 13-Apr-21| 07:54 \nppt.conversion.gkpowerpoint.dll| gkpowerpoint.dll| 16.0.10374.20000| 3487648| 13-Apr-21| 07:54 \nwac.word.gkword.dll| gkword.dll| 16.0.10374.20000| 4607928| 13-Apr-21| 07:54 \nwdsrv.conversion.gkword.dll| gkword.dll| 16.0.10374.20000| 4607928| 13-Apr-21| 07:54 \nconversion.office.gfxserver.dll| gfxserver.dll| 16.0.10374.20000| 5277600| 13-Apr-21| 07:57 \nppt.conversion.gfxserver.dll| gfxserver.dll| 16.0.10374.20000| 5277600| 13-Apr-21| 07:57 \nppt.edit.gfxserver.dll| gfxserver.dll| 16.0.10374.20000| 5277600| 13-Apr-21| 07:57 \nwac.office.gfxserver.dll| gfxserver.dll| 16.0.10374.20000| 5277600| 13-Apr-21| 07:57 \nconversion.igxserver.dll| igxserver.dll| 16.0.10374.20000| 12129176| 13-Apr-21| 07:58 \nppt.conversion.igxserver.dll| igxserver.dll| 16.0.10374.20000| 12129176| 13-Apr-21| 07:58 \nppt.edit.igxserver.dll| igxserver.dll| 16.0.10374.20000| 12129176| 13-Apr-21| 07:58 \nwac.office.igxserver.dll| igxserver.dll| 16.0.10374.20000| 12129176| 13-Apr-21| 07:58 \nsltemp.asc| sldlibtemplates.ascx| | 12554| 13-Apr-21| 07:58 \nsldlib.js| sldlib.js| | 29295| 13-Apr-21| 07:57 \neditdlg.htm_slfeat| editdlg.htm| | 4796| 13-Apr-21| 07:54 \nfiledlg.htm_slfeat| filedlg.htm| | 3344| 13-Apr-21| 07:54 \nclientx.dll| microsoft.office.sharepoint.clientextensions.dll| 16.0.10374.20000| 381904| 13-Apr-21| 07:58 \nclientxr.dll.x64| microsoft.office.sharepoint.clientextensions.dll| 16.0.10374.20000| 381904| 13-Apr-21| 07:58 \nmicrosoft.office.server.chart.dll| microsoft.office.server.chart.dll| 16.0.10374.20000| 614344| 13-Apr-21| 07:58 \nmicrosoft.office.server.chart_gac.dll| microsoft.office.server.chart.dll| 16.0.10374.20000| 614344| 13-Apr-21| 07:58 \nas_adal_dll_32.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| adal.dll| | 1456656| 12-Apr-21| 03:31 \nas_adal_dll_64.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| adal.dll| | 1784544| 12-Apr-21| 03:32 \nas_azureclient_dll_32.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| microsoft.analysisservices.azureclient.dll| | 316496| 12-Apr-21| 03:31 \nas_azureclient_dll_64.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| microsoft.analysisservices.azureclient.dll| | 316496| 12-Apr-21| 03:32 \nas_client_db2v0801_xsl_32.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| db2v0801.xsl| | 30717| 12-Apr-21| 03:31 \nas_client_db2v0801_xsl_64.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| db2v0801.xsl| | 30717| 12-Apr-21| 03:31 \nas_client_hive_xsl_32.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| hive.xsl| | 81782| 12-Apr-21| 03:31 \nas_client_hive_xsl_64.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| hive.xsl| | 81782| 12-Apr-21| 03:31 \nas_client_msql_xsl_32.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| msql.xsl| | 128792| 12-Apr-21| 03:32 \nas_client_msql_xsl_64.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| msql.xsl| | 128792| 12-Apr-21| 03:32 \nas_client_orcl7_xsl_32.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| orcl7.xsl| | 95739| 12-Apr-21| 03:31 \nas_client_orcl7_xsl_64.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| orcl7.xsl| | 95739| 12-Apr-21| 03:31 \nas_client_sqlpdw_xsl_32.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| sqlpdw.xsl| | 105635| 12-Apr-21| 03:31 \nas_client_sqlpdw_xsl_64.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| sqlpdw.xsl| | 105635| 12-Apr-21| 03:31 \nas_client_trdtv2r41_xsl_32.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| trdtv2r41.xsl| | 105800| 12-Apr-21| 03:31 \nas_client_trdtv2r41_xsl_64.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| trdtv2r41.xsl| | 105800| 12-Apr-21| 03:31 \nas_client_xmsrv_dll_32.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| xmsrv.dll| | 35081808| 12-Apr-21| 03:32 \nas_client_xmsrv_dll_64.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| xmsrv.dll| | 25498704| 12-Apr-21| 03:32 \nas_clientas80_xsl_32.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| as80.xsl| | 17484| 12-Apr-21| 03:31 \nas_clientas80_xsl_64.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| as80.xsl| | 17484| 12-Apr-21| 03:31 \nas_clientas90_xsl_32.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| as90.xsl| | 20021| 12-Apr-21| 03:32 \nas_clientas90_xsl_64.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| as90.xsl| | 20021| 12-Apr-21| 03:32 \nas_clientinformix_xsl_32.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| informix.xsl| | 32145| 12-Apr-21| 03:31 \nas_clientinformix_xsl_64.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| informix.xsl| | 32145| 12-Apr-21| 03:31 \nas_clientmsjet_xsl_32.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| msjet.xsl| | 30427| 12-Apr-21| 03:31 \nas_clientmsjet_xsl_64.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| msjet.xsl| | 30427| 12-Apr-21| 03:31 \nas_clientmsmgdsrv_dll_32.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| msmgdsrv.dll| | 7638824| 12-Apr-21| 03:31 \nas_clientmsmgdsrv_dll_64.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| msmgdsrv.dll| | 9328720| 12-Apr-21| 03:32 \nas_clientsql120_xsl_32.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| sql120.xsl| | 135247| 12-Apr-21| 03:32 \nas_clientsql120_xsl_64.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| sql120.xsl| | 135247| 12-Apr-21| 03:32 \nas_clientsql2000_xsl_32.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| sql2000.xsl| | 35014| 12-Apr-21| 03:32 \nas_clientsql2000_xsl_64.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| sql2000.xsl| | 35014| 12-Apr-21| 03:32 \nas_clientsql70_xsl_32.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| sql70.xsl| | 33181| 12-Apr-21| 03:31 \nas_clientsql70_xsl_64.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| sql70.xsl| | 33181| 12-Apr-21| 03:31 \nas_clientsql90_xsl_32.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| sql90.xsl| | 136426| 12-Apr-21| 03:31 \nas_clientsql90_xsl_64.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| sql90.xsl| | 136426| 12-Apr-21| 03:31 \nas_clientsybase_xsl_32.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| sybase.xsl| | 30964| 12-Apr-21| 03:31 \nas_clientsybase_xsl_64.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| sybase.xsl| | 30964| 12-Apr-21| 03:31 \nas_msmdlocal_dll_32.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| msmdlocal.dll| | 45813840| 12-Apr-21| 03:32 \nas_msmdlocal_dll_64.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| msmdlocal.dll| | 63495968| 12-Apr-21| 03:31 \nas_msolap_dll_32.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| msolap.dll| | 7999272| 12-Apr-21| 03:32 \nas_msolap_dll_64.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| msolap.dll| | 10331936| 12-Apr-21| 03:31 \nas_msolui_dll_32.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| msolui.dll| | 292128| 12-Apr-21| 03:31 \nas_msolui_dll_64.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| msolui.dll| | 312616| 12-Apr-21| 03:32 \nas_sqldumper_exe_32.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| sqldumper.exe| | 147560| 12-Apr-21| 03:32 \nas_sqldumper_exe_64.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| sqldumper.exe| | 172368| 12-Apr-21| 03:31 \nas_xmlrw_dll_32.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| xmlrw.dll| | 289376| 12-Apr-21| 03:32 \nas_xmlrw_dll_64.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| xmlrw.dll| | 333928| 12-Apr-21| 03:31 \nas_xmlrwbin_dll_32.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| xmlrwbin.dll| | 194152| 12-Apr-21| 03:32 \nas_xmlrwbin_dll_64.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| xmlrwbin.dll| | 224864| 12-Apr-21| 03:31 \nconversion.office.mso99lres.dll| mso99lres.dll| 16.0.10374.20000| 14980536| 13-Apr-21| 07:55 \nppt.conversion.mso99lres.dll| mso99lres.dll| 16.0.10374.20000| 14980536| 13-Apr-21| 07:55 \nppt.edit.mso99lres.dll| mso99lres.dll| 16.0.10374.20000| 14980536| 13-Apr-21| 07:55 \nwac.office.mso99lres.dll| mso99lres.dll| 16.0.10374.20000| 14980536| 13-Apr-21| 07:55 \nconversion.office.mso20win32server.dll| mso20win32server.dll| 16.0.10374.20000| 4399032| 13-Apr-21| 07:55 \nmso.mso20win32server.dll| mso20win32server.dll| 16.0.10374.20000| 4399032| 13-Apr-21| 07:55 \nppt.conversion.mso20win32server.dll| mso20win32server.dll| 16.0.10374.20000| 4399032| 13-Apr-21| 07:55 \nppt.edit.mso20win32server.dll| mso20win32server.dll| 16.0.10374.20000| 4399032| 13-Apr-21| 07:55 \nwac.office.mso20win32server.dll| mso20win32server.dll| 16.0.10374.20000| 4399032| 13-Apr-21| 07:55 \nconversion.office.mso30win32server.dll| mso30win32server.dll| 16.0.10374.20000| 5585312| 13-Apr-21| 07:58 \nmso.mso30win32server.dll| mso30win32server.dll| 16.0.10374.20000| 5585312| 13-Apr-21| 07:58 \nppt.conversion.mso30win32server.dll| mso30win32server.dll| 16.0.10374.20000| 5585312| 13-Apr-21| 07:58 \nppt.edit.mso30win32server.dll| mso30win32server.dll| 16.0.10374.20000| 5585312| 13-Apr-21| 07:58 \nwac.office.mso30win32server.dll| mso30win32server.dll| 16.0.10374.20000| 5585312| 13-Apr-21| 07:58 \nconversion.office.mso40uiwin32server.dll| mso40uiwin32server.dll| 16.0.10374.20000| 12497336| 13-Apr-21| 07:58 \nppt.conversion.mso40uiwin32server.dll| mso40uiwin32server.dll| 16.0.10374.20000| 12497336| 13-Apr-21| 07:58 \nppt.edit.mso40uiwin32server.dll| mso40uiwin32server.dll| 16.0.10374.20000| 12497336| 13-Apr-21| 07:58 \nwac.office.mso40uiwin32server.dll| mso40uiwin32server.dll| 16.0.10374.20000| 12497336| 13-Apr-21| 07:58 \nconversion.office.mso98win32server.dll| mso98win32server.dll| 16.0.10374.20000| 3952568| 13-Apr-21| 07:55 \nppt.conversion.mso98win32server.dll| mso98win32server.dll| 16.0.10374.20000| 3952568| 13-Apr-21| 07:55 \nppt.edit.mso98win32server.dll| mso98win32server.dll| 16.0.10374.20000| 3952568| 13-Apr-21| 07:55 \nwac.office.mso98win32server.dll| mso98win32server.dll| 16.0.10374.20000| 3952568| 13-Apr-21| 07:55 \nconversion.office.msoserver.dll| msoserver.dll| 16.0.10374.20000| 14484392| 13-Apr-21| 07:58 \nppt.conversion.msoserver.dll| msoserver.dll| 16.0.10374.20000| 14484392| 13-Apr-21| 07:58 \nppt.edit.msoserver.dll| msoserver.dll| 16.0.10374.20000| 14484392| 13-Apr-21| 07:58 \nwac.office.msoserver.dll| msoserver.dll| 16.0.10374.20000| 14484392| 13-Apr-21| 07:58 \nconversion.office.msores.dll| msores.dll| 16.0.10374.20000| 73689000| 13-Apr-21| 07:56 \nppt.conversion.msores.dll| msores.dll| 16.0.10374.20000| 73689000| 13-Apr-21| 07:56 \nppt.edit.msores.dll| msores.dll| 16.0.10374.20000| 73689000| 13-Apr-21| 07:56 \nwac.office.msores.dll| msores.dll| 16.0.10374.20000| 73689000| 13-Apr-21| 07:56 \nmicrosoft.office.web.environment.officeserver.dll| microsoft.office.web.environment.officeserver.dll| 16.0.10374.20000| 62408| 13-Apr-21| 07:56 \nmicrosoft.office.web.common.dll| microsoft.office.web.common.dll| 16.0.10374.20000| 1973168| 13-Apr-21| 07:55 \nnl7data0011.dll_osssearch| nl7data0011.dll| 16.0.10374.20000| 7782904| 13-Apr-21| 07:58 \nnl7data0404.dll_osssearch| nl7data0404.dll| 16.0.10374.20000| 2708472| 13-Apr-21| 07:58 \nnl7data0804.dll_osssearch| nl7data0804.dll| 16.0.10374.20000| 3588088| 13-Apr-21| 07:58 \nprm0009.bin_osssearch| prm0009.bin| | 13280768| 13-Apr-21| 07:58 \nconversion.oartodfserver.dll| oartodfserver.dll| 16.0.10374.20000| 3555752| 13-Apr-21| 07:55 \nppt.conversion.oartodfserver.dll| oartodfserver.dll| 16.0.10374.20000| 3555752| 13-Apr-21| 07:55 \nppt.edit.oartodfserver.dll| oartodfserver.dll| 16.0.10374.20000| 3555752| 13-Apr-21| 07:55 \nwac.office.oartodfserver.dll| oartodfserver.dll| 16.0.10374.20000| 3555752| 13-Apr-21| 07:55 \nconversion.office.oartserver.dll| oartserver.dll| 16.0.10374.20000| 18202552| 13-Apr-21| 07:55 \nppt.conversion.oartserver.dll| oartserver.dll| 16.0.10374.20000| 18202552| 13-Apr-21| 07:55 \nppt.edit.oartserver.dll| oartserver.dll| 16.0.10374.20000| 18202552| 13-Apr-21| 07:55 \nwac.office.oartserver.dll| oartserver.dll| 16.0.10374.20000| 18202552| 13-Apr-21| 07:55 \nmicrosoft.office.connectedservices.identity.dll| microsoft.office.connectedservices.identity.dll| 16.0.10374.20000| 62888| 13-Apr-21| 07:58 \nconversion.cultures.office.odf| office.odf| | 2224584| 13-Apr-21| 07:55 \noffice.odf| office.odf| | 2224584| 13-Apr-21| 07:55 \nppt.conversion.cultures.office.odf| office.odf| | 2224584| 13-Apr-21| 07:55 \nvisioserver.cultures.office.odf| office.odf| | 2224584| 13-Apr-21| 07:55 \nwac.conversion.cultures.office.odf| office.odf| | 2224584| 13-Apr-21| 07:55 \nwac.powerpoint.edit.bin.cultures.office.odf| office.odf| | 2224584| 13-Apr-21| 07:55 \nxlsrv.ecs.culture.office.odf| office.odf| | 2224584| 13-Apr-21| 07:55 \nxlsrv.ecs.office.odf| office.odf| | 2224584| 13-Apr-21| 07:55 \nhtmlchkr.dll.x64| htmlchkr.dll| 16.0.10374.20000| 1149384| 13-Apr-21| 07:55 \nconversionhtmlutil.dll| htmlutil.dll| 16.0.10374.20000| 2855344| 13-Apr-21| 07:55 \nbusdata.dll| microsoft.businessdata.dll| 16.0.10374.20000| 131024| 13-Apr-21| 07:55 \nbusdatar.dll.x64| microsoft.businessdata.dll| 16.0.10374.20000| 131024| 13-Apr-21| 07:55 \nmicrosoft_web_design_server.dll| microsoft.web.design.server.dll| 16.0.10374.20000| 396224| 13-Apr-21| 07:55 \nonetnative.dll| onetnative.dll| 16.0.10374.20000| 811952| 13-Apr-21| 07:55 \nonetnative_1.dll| onetnative.dll| 16.0.10374.20000| 811952| 13-Apr-21| 07:55 \nonetutil.dll| onetutil.dll| 16.0.10374.20000| 2866112| 13-Apr-21| 07:55 \nconversion.office.osfserver.dll| osfserver.dll| 16.0.10374.20000| 164256| 13-Apr-21| 07:55 \nwac.office.osfserver.dll| osfserver.dll| 16.0.10374.20000| 164256| 13-Apr-21| 07:55 \nconversion.office.osfsharedserver.dll| osfsharedserver.dll| 16.0.10374.20000| 734136| 13-Apr-21| 07:55 \nwac.office.osfsharedserver.dll| osfsharedserver.dll| 16.0.10374.20000| 734136| 13-Apr-21| 07:55 \nconversion.office.osfuiserver.dll| osfuiserver.dll| 16.0.10374.20000| 487840| 13-Apr-21| 07:55 \nwac.office.osfuiserver.dll| osfuiserver.dll| 16.0.10374.20000| 487840| 13-Apr-21| 07:55 \nosfserver_activities_dll.x64| microsoft.sharepoint.workflowservices.activities.dll| 16.0.10374.20000| 286144| 13-Apr-21| 07:55 \nosfserver_workflow_dll| microsoft.sharepoint.workflowservices.dll| 16.0.10374.20000| 498632| 13-Apr-21| 07:55 \nosfextap.dll| microsoft.sharepoint.officeextension.applicationpages.dll| 16.0.10374.20000| 16336| 13-Apr-21| 07:55 \noffice_extension_manager_js| sp.officeextensionmanager.js| | 50999| 13-Apr-21| 07:55 \nmicrosoft.office.serviceinfrastructure.runtime.dll| microsoft.office.serviceinfrastructure.runtime.dll| 16.0.10374.20000| 1053128| 13-Apr-21| 07:55 \nosrvadml.xml| officeserveradminlinks.xml| | 3483| 12-Apr-21| 03:48 \nugcdot.xml| feature.xml| | 629| 12-Apr-21| 03:45 \nmicrosoft.office.server.directory.sharepoint| microsoft.office.server.directory.sharepoint.dll| 16.0.10374.20000| 747472| 13-Apr-21| 07:55 \nmicrosoft.office.server.dll| microsoft.office.server.dll| 16.0.10374.20000| 3042728| 13-Apr-21| 07:55 \nmicrosoft.office.server.dll_isapi| microsoft.office.server.dll| 16.0.10374.20000| 3042728| 13-Apr-21| 07:55 \nmicrosoft.office.server.filtercontrols.dll| microsoft.office.server.filtercontrols.dll| 16.0.10374.20000| 158160| 13-Apr-21| 07:55 \nmicrosoft.office.server.importprofileproperties| microsoft.office.server.importprofileproperties.dll| 16.0.10374.20000| 77792| 13-Apr-21| 07:55 \nosrvintl.dll| microsoft.office.server.intl.dll| 16.0.10374.20000| 287712| 13-Apr-21| 07:55 \nmicrosoft.office.server.openxml.dll| microsoft.office.server.openxml.dll| 16.0.10374.20000| 1658280| 13-Apr-21| 07:55 \nmicrosoft.office.server.userprofiles.dll| microsoft.office.server.userprofiles.dll| 16.0.10374.20000| 5332920| 13-Apr-21| 07:55 \nmicrosoft.office.server.userprofiles.dll_isapi| microsoft.office.server.userprofiles.dll| 16.0.10374.20000| 5332920| 13-Apr-21| 07:55 \nmicrosoft.sharepoint.taxonomy.dll| microsoft.sharepoint.taxonomy.dll| 16.0.10374.20000| 1744312| 13-Apr-21| 07:55 \nmicrosoft.sharepoint.taxonomy.dll_gac| microsoft.sharepoint.taxonomy.dll| 16.0.10374.20000| 1744312| 13-Apr-21| 07:55 \nmicrosoft.sharepoint.taxonomy.dll_gac1| microsoft.sharepoint.taxonomy.dll| 16.0.10374.20000| 1744312| 13-Apr-21| 07:55 \nmicrosoft.office.server.userprofiles.proxy.dll| microsoft.office.server.userprofiles.dll| 16.0.10374.20000| 1466328| 13-Apr-21| 07:58 \nscriptresources.rsx| scriptresources.resx| | 18203| 13-Apr-21| 07:55 \nscriptforwebtaggingui.js| scriptforwebtaggingui.js| | 132939| 12-Apr-21| 03:32 \nsp.ui.taxonomy.js| sp.ui.taxonomy.js| | 46516| 12-Apr-21| 03:32 \newafieldlist.png| ewafieldlist.png| | 3210| 6-Aug-19| 05:21 \newanov.png| ewanov.png| | 6857| 6-Aug-19| 05:21 \newaribbonchart.png| ewaribbonchart.png| | 13248| 6-Aug-19| 05:21 \newaribboninsert.png| ewaribboninsert.png| | 46008| 6-Aug-19| 05:21 \newaribbonview.png| ewaribbonview.png| | 1940| 6-Aug-19| 05:21 \nwac.livebooks.notetags.intl.112_16_n.png_10266| 112_16_n.16x16x32.png| | 261| 6-Aug-19| 05:21 \nwac.livebooks.notetags.intl.23_16_n.png_10266| 23_16_n.16x16x32.png| | 266| 6-Aug-19| 05:21 \newaanth.gif| ewaanth.gif| | 216| 6-Aug-19| 05:22 \newaantv.gif| ewaantv.gif| | 213| 6-Aug-19| 05:22 \newr023.gif| ewr023.gif| | 908| 6-Aug-19| 05:22 \nfavicon_excel.ico| favicon_excel.ico| | 8958| 6-Aug-19| 05:22 \nopenfromurl.web.favicon_excel.ico| favicon_excel.ico| | 8958| 6-Aug-19| 05:22 \nmediaplayer.xap| mediaplayer.xap| | 53010| 13-Apr-21| 11:39 \ndecompositiontree.xap| decompositiontree.xap| | 117420| 13-Apr-21| 11:39 \naddgal.xap| addgallery.xap| | 416791| 13-Apr-21| 11:39 \nwpgalim.xap| webpartgalleryimages.xap| | 109796| 13-Apr-21| 11:39 \naddgallery.xap_silverlight| addgallery.xap| | 383089| 13-Apr-21| 11:39 \nmicrosoft.sharepoint.client.xap| microsoft.sharepoint.client.xap| | 321027| 13-Apr-21| 11:39 \ndsigres.cab.x64| dsigres.cab| | 231445| 13-Apr-21| 11:39 \ndsigres.cab.x64_10266| dsigres.cab| | 231445| 13-Apr-21| 11:39 \ndsigres.cab.x64_1033| dsigres.cab| | 231445| 13-Apr-21| 11:39 \ndsigres.cab.x64_1087| dsigres.cab| | 231445| 13-Apr-21| 11:39 \ndsigctrl.cab.x64| dsigctrl.cab| | 481223| 13-Apr-21| 11:39 \ndsigres.cab.x86| dsigres.cab| | 193223| 13-Apr-21| 11:41 \ndsigres.cab.x86_10266| dsigres.cab| | 193223| 13-Apr-21| 11:41 \ndsigres.cab.x86_1033| dsigres.cab| | 193223| 13-Apr-21| 11:41 \ndsigres.cab.x86_1087| dsigres.cab| | 193223| 13-Apr-21| 11:41 \ndsigctrl.cab.x86| dsigctrl.cab| | 528257| 13-Apr-21| 11:41 \nmossbi.wfe.gac.scorecards.client.dll| microsoft.performancepoint.scorecards.client.dll| 16.0.10374.20000| 2233832| 13-Apr-21| 07:58 \nmossbi.wfe.gac.scorecards.servercommon.dll| microsoft.performancepoint.scorecards.servercommon.dll| 16.0.10374.20000| 333816| 13-Apr-21| 07:58 \nmossbi.wfe.gac.scorecards.webcontrols.dll| microsoft.performancepoint.scorecards.webcontrols.dll| 16.0.10374.20000| 345096| 13-Apr-21| 07:58 \nsts_spclientnewux46be2393a35a55172ff4bbbbd4d0e51c| vsdx_48x2_e3becfeb024cbd3c46477b32b6fd3cae.png| | 1601| 21-Mar-21| 05:46 \nsts_spclientnewux522b80f3d51b476a0dda839d975ca09f| vsdx_48x3_bde94d5ae43f8bf84396338bd2f23a19.png| | 2285| 21-Mar-21| 05:46 \nsts_spclientnewux4bfd71d75f5c36d9ec4093b444c5b077| vsdx_96x1_5_eef3c215df8bb98b59db649569d6a0b7.png| | 2046| 21-Mar-21| 05:46 \nsts_spclientnewux0c23522926745ff870fdb9c91e62e920| vsdx_96x1_70d2e9f604f1b5a341b5a4c0342768c0.png| | 2500| 21-Mar-21| 05:46 \nsts_spclientnewux66bfb4af2c35d5a59041a193f44b5383| vsdx_96x2_f474a1b19da5215a7eab918efadbdb3e.png| | 2547| 21-Mar-21| 05:46 \nsts_spclientnewux2448ae88f11fb5d72da1e3885be94fb4| vsdx_96x3_16c2db9ccb2da0e93e3e31f6a81a96db.png| | 3891| 21-Mar-21| 05:46 \nsts_spclientnewux4f1b185849a54e36a4fd79a41b03ee4b| vssx_16x1_23673d773d2e84e8cb02ed0391e48950.png| | 1321| 21-Mar-21| 05:46 \nsts_spclientnewuxf4783f501b24fda1bccf0a3aaa449bd1| vssx_16x1_5_ece371e69212b24bbe11123c1a56df9b.png| | 1499| 21-Mar-21| 05:46 \nsts_spclientnewux6989f8a7abd8ccd3ad0555ab5f968b88| vssx_16x2_41e188b398c92e9c3e5737366a941ae8.png| | 532| 21-Mar-21| 05:46 \nsts_spclientnewuxf048ff5cf6f1bfe6dc7d190d48bd9bfa| vssx_16x3_c235741aadd6f2194ff6b0030772d1fa.png| | 705| 21-Mar-21| 05:46 \nsts_spclientnewux905e08d7477fe697ab5c95ba6acb4825| vssx_48x1_5_133a4c533a831abfe262f6c3ae88a272.png| | 1824| 21-Mar-21| 05:46 \nsts_spclientnewux589e933f9bc5ddc69f744bed90b3970c| vssx_48x1_e46d27a4d9f7161e7264798737511387.png| | 1626| 21-Mar-21| 05:46 \nsts_spclientnewuxffc0781ccc84e5c4b7674db088dc8efc| vssx_48x2_5db92e09f6e93f5ac9a6acd0c0b0efd0.png| | 1018| 21-Mar-21| 05:46 \nsts_spclientnewux8b9ade185d38647b14012b06f976f027| vssx_48x3_20cee415a165e5b1d9f5860f5a61730f.png| | 1416| 21-Mar-21| 05:46 \nsts_spclientnewuxfe69dda904861eab895266dcc33eafeb| vssx_96x1_304d4b3db91a5fab49a49ac71d4ad491.png| | 1940| 21-Mar-21| 05:46 \nsts_spclientnewux6bba68b13fc096a832e5110a66e5a17e| vssx_96x1_5_62ef76b7015b6acdb793ff8ceaa7f96d.png| | 1270| 21-Mar-21| 05:46 \nsts_spclientnewux5ba777a9e10f9e3beb6b51b9d3077970| vssx_96x2_55ba8d81db214f9f2cfacc5a1ca947b8.png| | 1640| 21-Mar-21| 05:46 \nsts_spclientnewux294f38c8d236c306a36e04fbb00bb7a4| vssx_96x3_6138d40859b5fa945df9d862fc3a77b7.png| | 2295| 21-Mar-21| 05:46 \nsts_spclientnewux0523f888c49e50fef4713eaf8a4d1284| vstx_16x1_5_5cc00b7044c143b1ccfeedbd95806acf.png| | 1608| 21-Mar-21| 05:46 \nsts_spclientnewuxeb906a458ec4da9ddae1a0dd920f13ea| vstx_16x1_e8bbd84ad07d13458d5fe9a3e41d496f.png| | 1376| 21-Mar-21| 05:46 \nsts_spclientnewux2db81c901a09a60b94e37b2ff63f536b| vstx_16x2_564935220019958b0f4952e1342f3f09.png| | 728| 21-Mar-21| 05:46 \nsts_spclientnewuxe1c0b3cd4c0ce30a0526327857a90839| vstx_16x3_c12c7a6f375155dac42e7b02dd46f002.png| | 1024| 21-Mar-21| 05:46 \nsts_spclientnewux824c9b4b670debdfc2183094c0dd3d19| vstx_48x1_5_bd92f3ebbafa8cc68983a8822a8b99e8.png| | 2262| 21-Mar-21| 05:46 \nsts_spclientnewux4a72fcfc636555ae4d69f1d6edf3be60| vstx_48x1_a080021fb4cd85b590d146d5946662f3.png| | 1957| 21-Mar-21| 05:46 \nsts_spclientnewux97b8a2af03fd84420ee8182ae1427212| vstx_48x2_845753ded3e968bf6600a502fd8e742d.png| | 1351| 21-Mar-21| 05:46 \nsts_spclientnewuxf6009284223717865eadaae78adf2d6d| vstx_48x3_db83862135a37c85f07f7e263b7cb8b5.png| | 2224| 21-Mar-21| 05:46 \nsts_spclientnewux74ba0bdcfb04f8635681372394cc608a| vstx_96x1_5_1c0b7cb1691e3c01184b9d5a6e49945a.png| | 1950| 21-Mar-21| 05:46 \nsts_spclientnewux61340ccd70111e2786de01c4e9165959| vstx_96x1_da5bd9b6cdcc11bfecfd98356bd44391.png| | 2475| 21-Mar-21| 05:46 \nsts_spclientnewux01d482f452da07ee8a793f53e336cc16| vstx_96x2_098089d613867c4a71c5c043534aad48.png| | 2501| 21-Mar-21| 05:46 \nsts_spclientnewux3192da3bfa2a20a11983c02c5de87aae| vstx_96x3_2904adb44857649814c781376d574d96.png| | 3794| 21-Mar-21| 05:46 \nsts_spclientnewuxf944546bb71cd877a97d36c423740c5b| word_16x1_170c8b215333e956079ce7952b27642f.png| | 365| 21-Mar-21| 05:46 \nsts_spclientnewuxcb5dcc99118b73e3628bc7725c347c31| word_16x1_5_23bc1a35f790a9e6cc967a5e5b5d7e83.png| | 447| 21-Mar-21| 05:46 \nsts_spclientnewux3eac1f8106d652be5d59857b451cac1e| word_16x2_972b09e6377d716ad86898f455329cf1.png| | 543| 21-Mar-21| 05:46 \nsts_spclientnewuxdd588b9b95c540c76520bf7d39d9439d| word_16x3_ea143039d306df4162229498c2dcefa0.png| | 1403| 21-Mar-21| 05:46 \nsts_spclientnewux80d5d1f8a495aad41167b0eb5d0d6bb2| word_48x1_5_3cc4a4f6c2c8455cedc707099b0abd54.png| | 2202| 21-Mar-21| 05:46 \nsts_spclientnewuxaad81c6cb24b4e79ef3fe70e727f226e| word_48x1_ea143039d306df4162229498c2dcefa0.png| | 1403| 21-Mar-21| 05:46 \nsts_spclientnewux90bc32d5864ce720368322c6b033dd41| word_48x2_d6cdf0009b6bf95356d953bbf929464c.png| | 2982| 21-Mar-21| 05:46 \nsts_spclientnewux1710e548340626fe269359d708253cc8| word_48x3_8ac5a5d7e625e320586836b55ac39f5a.png| | 4785| 21-Mar-21| 05:46 \nsts_spclientnewuxbf56fa563b6a78f537c2398a7fd1d7e6| word_96x1_5_f1e6c2137f47b3a11531b3ea0eea155f.png| | 4763| 21-Mar-21| 05:46 \nsts_spclientnewux612f463faa2fa48d2ee8e97a30b7bd96| word_96x1_d3143f16ad95fc8ae5c7f541a6e8135f.png| | 3002| 21-Mar-21| 05:46 \nsts_spclientnewux25858e900847d8497371db5042bd7168| word_96x2_45a9c8f359f8f7339995be3a6d742d47.png| | 6103| 21-Mar-21| 05:46 \nsts_spclientnewuxfb0b972552779549b87dfeb8273c2488| word_96x3_4e101d6264263a8df2b059dad999ee40.png| | 10265| 21-Mar-21| 05:46 \nsts_spclientnewux169d7458041ed7f33f68923ebc0c71f4| xls_16x1_5_b306b2273aeb28b19848a1f22ccf67e2.png| | 1469| 21-Mar-21| 05:46 \nsts_spclientnewux38c6e3d8098edbff902a695c88e22a43| xls_16x1_c070349ae47519fd6c414493693c12c8.png| | 1460| 21-Mar-21| 05:46 \nsts_spclientnewux804e7bd414c1c01ea56c290ee3a62364| xls_16x2_4f5a0eab318a46a41e6c92ece008fae9.png| | 670| 21-Mar-21| 05:46 \nsts_spclientnewux55acf5f2d9e930e7316a5ede09537a06| xls_16x3_2f855b289ee4706700bdc358c593c2f1.png| | 684| 21-Mar-21| 05:46 \nsts_spclientnewux64d7c2af6960f21c5804d3eb8cec271a| xls_48x1_5_dc65e29921a17ab7eeecbea7b439c069.png| | 1916| 21-Mar-21| 05:46 \nsts_spclientnewux289609e57c51889e5b870bf468db3b59| xls_48x1_6cc45efa4dd7ddb236eb71b6de2ceb4e.png| | 1706| 21-Mar-21| 05:46 \nsts_spclientnewuxf29787f6a70c4efbe977daa16edf5647| xls_48x2_7e3f36ee57409ac238645c31d53379ef.png| | 957| 21-Mar-21| 05:46 \nsts_spclientnewuxb60395a0402df93ef80cf3b956207747| xls_48x3_dd4d554a909b4690fa7932c503ecc108.png| | 1153| 21-Mar-21| 05:46 \nsts_spclientnewux60671ce1e7d40b8dca9ee4dc41c68ae6| xls_96x1_5_535a6996efb5d6a5f68f0d8bb0694f9e.png| | 2109| 21-Mar-21| 05:46 \nsts_spclientnewux584c7d200faf0ed7a4cad498107cc4c4| xls_96x1_b7e40330dfd777a5b3bfdd6e77c95d31.png| | 2010| 21-Mar-21| 05:46 \nsts_spclientnewux46d7557d37043e959cc5871faaccfed7| xls_96x2_230640a0f5cb2ba035c089988f91c223.png| | 1529| 21-Mar-21| 05:46 \nsts_spclientnewux83866892f76ac62a472d86697623ce8e| xls_96x3_2d2053f508d1c384833e77890db7a318.png| | 1948| 21-Mar-21| 05:46 \nsts_spclientnewux193e68db71cf5489494fb960cd5568e9| xlsx_16x1_5_5483276dc29e83ea26a4b4938786be38.png| | 543| 21-Mar-21| 05:46 \nsts_spclientnewux509e0958f21a117a482c074c504b123f| xlsx_16x1_751fd099c54b2b7a3da99b080eeca2e4.png| | 1474| 21-Mar-21| 05:46 \nsts_spclientnewux4f43fc6540bbb5a992916cea45021e3d| xlsx_16x2_a9b08b0f631119d3d595898147b37ab9.png| | 683| 21-Mar-21| 05:46 \nsts_spclientnewuxeea1e3b67ed20304e30715478124754c| xlsx_16x3_76f898eb25ce1b7d8583bef5e62db859.png| | 894| 21-Mar-21| 05:46 \nsts_spclientnewux11fc5dbb14efae9fa6995fa7a01082c0| xlsx_48x1_5_2ac0528e37c96a4abe710da65d5dd9db.png| | 1053| 21-Mar-21| 05:46 \nsts_spclientnewux0e5366efaf7d68e85fecf98cead9e00c| xlsx_48x1_8817915a2b258a5a4cc8bd809a0a83ae.png| | 1845| 21-Mar-21| 05:46 \nsts_spclientnewux1d8e179e5fef76f66d246a1786acd76a| xlsx_48x2_fde930a87fc61b0bdc057f8544aeb383.png| | 1301| 21-Mar-21| 05:46 \nsts_spclientnewuxa8bb205cdf6250f21bedd463d7c757d2| xlsx_48x3_d0bd2d7f0da4d666c3adebfbc352783d.png| | 1799| 21-Mar-21| 05:46 \nsts_spclientnewux3603748bcb9c5a9ab55073ffe209bc88| xlsx_96x1_43589e4cdeeadb1ddbaf3d22a82fcf6c.png| | 2140| 21-Mar-21| 05:46 \nsts_spclientnewux1b063e3f3ad86ed12475728a9b040413| xlsx_96x1_5_ff9b977a88adea5fa1ad3ee0522a357f.png| | 1669| 21-Mar-21| 05:46 \nsts_spclientnewux7a491e6eccd936674ad4b4647e41130c| xlsx_96x2_4cb85e7afaf4e847965e1d1eadb3ed1b.png| | 2893| 21-Mar-21| 05:46 \nsts_spclientnewux48890bf4e73aad7146e32d3339cf39ce| xlsx_96x3_9b1c4833c646556293ac076cac403db6.png| | 3817| 21-Mar-21| 05:46 \nsts_spclientnewux8301975b16e42de4112d9e6f24d0534f| xltx_16x1_228481ced91e9a2357ac4fbd0bc0d833.png| | 1409| 21-Mar-21| 05:46 \nsts_spclientnewux80547fb9509151985fa53c880b508ec3| xltx_16x1_5_ddcb15910b685d2f6b52e1add0f4c582.png| | 523| 21-Mar-21| 05:46 \nsts_spclientnewuxd45ade28d963d8e54de839b6892ee5a9| xltx_16x2_d8ea07232894718dbdda5e700719feac.png| | 634| 21-Mar-21| 05:46 \nsts_spclientnewuxac4c4d91889fcf5595ed71262f1e44f8| xltx_16x3_a50ade65aa08d25f13b6455859927505.png| | 874| 21-Mar-21| 05:46 \nsts_spclientnewux6c804b2643b95f5cc6af95d0bf7924bc| xltx_48x1_5_0a223d8a2fdd65be22242edcebcfb56a.png| | 1013| 21-Mar-21| 05:46 \nsts_spclientnewux269e4a426ba1262dd81cce577806ca21| xltx_48x1_f92fcc9fb31bbcd4fb9d5d1b0d952721.png| | 1777| 21-Mar-21| 05:46 \nsts_spclientnewuxb941eb557afedae4ad1026624e01f438| xltx_48x2_cd27c3a3a7c988361c38e7a65e8f1bb2.png| | 1202| 21-Mar-21| 05:46 \nsts_spclientnewux8cc553cc01174afcaf8e2417e6cb08ca| xltx_48x3_c3ddf7f9ada62c5f26f78ea8a1afdd06.png| | 1662| 21-Mar-21| 05:46 \nsts_spclientnewux6cca7a871051f0b0d4ec06f7e017fc59| xltx_96x1_5_79ab0afe48c7f408467258d5eb663888.png| | 1593| 21-Mar-21| 05:46 \nsts_spclientnewux6d6a10c9630caf79a5cd3f9f8995b281| xltx_96x1_98edf15f105d5e4bf249e6dd6026bf88.png| | 2143| 21-Mar-21| 05:46 \nsts_spclientnewux9b0d68d149897e13d7464cb33612bc8f| xltx_96x2_58084d6743f9132c2309420b7120da6f.png| | 2017| 21-Mar-21| 05:46 \nsts_spclientnewuxd825db6215c3c3564db93be26fc3ae4d| xltx_96x3_fe2df9b9b42a1cb688dddeb650555ddb.png| | 2821| 21-Mar-21| 05:46 \nsts_spclientnewuxc6fbaaf249a164465499494c5d7f4414| xsn_16x1_5_c010de05f55977d65b73747561684e45.png| | 1381| 21-Mar-21| 05:46 \nsts_spclientnewuxbfe4ecd5fd1dc53c3b98128a84558aec| xsn_16x1_6c8220ddeffaa1046149d679d32b578d.png| | 1326| 21-Mar-21| 05:46 \nsts_spclientnewux81b8172cb52e6a93c61f83e1da071b1c| xsn_16x2_2643953284151fd5e8e29573998ac242.png| | 449| 21-Mar-21| 05:46 \nsts_spclientnewux9b27af62c111847e8aacdc03e43a29a4| xsn_16x3_b739f8a4f17d34d6856a96d83b524d8c.png| | 601| 21-Mar-21| 05:46 \nsts_spclientnewuxbe9f5f1ce26590b3eb9cdbc90a1be766| xsn_48x1_5_46afa00da1bf482ee121b402a223b3bc.png| | 1727| 21-Mar-21| 05:46 \nsts_spclientnewux4327591e61b336a89d224b4d36e249fc| xsn_48x1_d65422c82aa59e45db6a69a191b4cccc.png| | 1536| 21-Mar-21| 05:46 \nsts_spclientnewux542d0f0e60250b4c2fef5c9978ffdaa5| xsn_48x2_7f04d0abec191245896205f22c311657.png| | 834| 21-Mar-21| 05:46 \nsts_spclientnewuxa9c2c94463a6a7fc35bbecb2a196945c| xsn_48x3_7e815f5b7f701adfb95f774d1b99cee3.png| | 1146| 21-Mar-21| 05:46 \nsts_spclientnewuxd143339058745a3fa58c6f6f40e9aaf5| xsn_96x1_5_87ea08d27a3693cf30863f0779a1ae32.png| | 1105| 21-Mar-21| 05:46 \nsts_spclientnewuxc3eb0627ed2a299265865a96d6dba909| xsn_96x1_51e42aafb97346413d26983a72aee7d7.png| | 1847| 21-Mar-21| 05:46 \nsts_spclientnewux02ab5360b0a27a83c0d8e62779362e4a| xsn_96x2_9988070767c0460fd82a16ec1fa12418.png| | 1391| 21-Mar-21| 05:46 \nsts_spclientnewux8a24c2795d22123dce3f204dac06a11b| xsn_96x3_a6444c641777a2debfe921a4c6581e77.png| | 1905| 21-Mar-21| 05:46 \nsts_sphomenewux47c2f9686e99961bcfa3599f0e14cb26| sharepointhome.json| | 40268| 10-Apr-21| 08:04 \nsts_sphomenewuxc0250aabec4b1e71150a3c5e78e664b7| searchux-main-sphome.js| | 1600572| 21-Mar-21| 05:46 \nsts_sphomenewuxab3efcb3b4702929d33f754cfd563158| searchux-resources.js| | 25528| 21-Mar-21| 05:46 \nsts_sphomenewuxc68fcb315164c60c6aace83a71fcbbe2| sharepointhome.js| | 1556915| 10-Apr-21| 08:04 \nsts_sphomenewux5764a9aadaf922139c9748a2b692c69f| sphome-react.js| | 208322| 21-Mar-21| 05:46 \nsts_sphomenewuxe5fc5d0c85aa24eb1adbac8ec1c9b954| sphome-rx.js| | 66245| 21-Mar-21| 05:46 \nsts_sphomenewux9e081e46518267288e7b11980f7811a4| sphome-signalr.js| | 129937| 21-Mar-21| 05:46 \nsts_sphomenewux4bf88d694ee8449f7f0ea170824568fb| sphome-utilities.js| | 123605| 10-Apr-21| 08:04 \ncui.debug.js| cui.debug.js| | 657986| 13-Apr-21| 07:56 \ncui.js| cui.js| | 364464| 13-Apr-21| 07:56 \nxui.debug.js| xui.debug.js| | 45549| 13-Apr-21| 07:56 \nxui.js| xui.js| | 18952| 13-Apr-21| 07:56 \nwac.word.sword.dll| sword.dll| 16.0.10374.20000| 12661168| 13-Apr-21| 07:58 \nwdsrv.conversion.sword.dll| sword.dll| 16.0.10374.20000| 12661168| 13-Apr-21| 07:58 \nwdsrv.dll| microsoft.office.word.server.dll| 16.0.10374.20000| 376248| 13-Apr-21| 07:58 \nwdsrv.isapi.dll| microsoft.office.word.server.dll| 16.0.10374.20000| 376248| 13-Apr-21| 07:58 \nmicrosoft.office.translationservices.dll| microsoft.office.translationservices.dll| 16.0.10374.20000| 417184| 13-Apr-21| 07:58 \nmicrosoft.office.translationservices.machinetranslation.dll| microsoft.office.translationservices.machinetranslation.dll| 16.0.10374.20000| 550328| 13-Apr-21| 07:58 \ntranslationqueue.sql| translationqueue.sql| | 53164| 13-Apr-21| 07:58 \ncore.js| core.js| | 646739| 12-Apr-21| 03:45 \nifswfe.dll| microsoft.office.infopath.server.dll| 16.0.10374.20000| 3175856| 13-Apr-21| 07:58 \nifswfepriv.dll| microsoft.office.infopath.server.dll| 16.0.10374.20000| 3175856| 13-Apr-21| 07:58 \nipomload.dll| microsoft.office.infopath.clrloader.dll| 16.0.10374.20000| 17904| 13-Apr-21| 07:56 \noffxml.dll| offxml.dll| 16.0.10374.20000| 412600| 13-Apr-21| 07:56 \nppt.conversion.ppserver.dll| ppserver.dll| 16.0.10374.20000| 12353464| 13-Apr-21| 07:58 \nppt.edit.ppserver.dll| ppserver.dll| 16.0.10374.20000| 12353464| 13-Apr-21| 07:58 \nppt.conversion.webclient.config| client.config| | 2059| 12-Apr-21| 03:47 \nppt.conversion.web.config| web.config| | 3375| 12-Apr-21| 03:46 \nmicrosoft.office.server.powerpoint.dll| microsoft.office.server.powerpoint.dll| 16.0.10374.20000| 108976| 13-Apr-21| 07:55 \npowerpointpowershell.format.ps1xml| powerpointpowershell.format.ps1xml| | 14382| 12-Apr-21| 03:36 \npjintl_1_new.dll| pjintl.dll| 16.0.10374.20000| 4898736| 13-Apr-21| 07:57 \nschedengine_new.exe| schedengine.exe| 16.0.10374.20000| 16463296| 13-Apr-21| 07:58 \nmicrosoft.projectserver.client.silverlight.dll| microsoft.projectserver.client.silverlight.dll| 16.0.10374.20000| 396192| 13-Apr-21| 07:58 \nmicrosoft.projectserver.client.phone.dll| microsoft.projectserver.client.phone.dll| 16.0.10374.20000| 396208| 13-Apr-21| 07:55 \ncontentdatabasecreate.sql| contentdatabasecreate.sql| | 8488750| 13-Apr-21| 07:58 \nmicrosoft.office.project.schema.dll| microsoft.office.project.schema.dll| 16.0.10374.20000| 6844320| 13-Apr-21| 07:58 \nmicrosoft.office.project.server.communications.dll| microsoft.office.project.server.communications.dll| 16.0.10374.20000| 371608| 13-Apr-21| 07:58 \nmicrosoft.office.project.server.communications.internal.dll| microsoft.office.project.server.communications.internal.dll| 16.0.10374.20000| 761240| 13-Apr-21| 07:58 \nmicrosoft.office.project.server.database.dll| microsoft.office.project.server.database.dll| 16.0.10374.20000| 10458544| 13-Apr-21| 07:58 \nmicrosoft.office.project.server.database.extension.dll| microsoft.office.project.server.database.extension.dll| 16.0.10374.20000| 4383656| 13-Apr-21| 07:58 \nmicrosoft.office.project.server.dll| microsoft.office.project.server.dll| 16.0.10374.20000| 9607096| 13-Apr-21| 07:58 \nmicrosoft.office.project.server.events.remote.dll| microsoft.office.project.server.events.remote.dll| 16.0.10374.20000| 59296| 13-Apr-21| 07:58 \nmicrosoft.office.project.server.inproc.dll| microsoft.office.project.server.inproc.dll| 16.0.10374.20000| 802232| 13-Apr-21| 07:58 \nmicrosoft.office.project.server.library.dll| microsoft.office.project.server.library.dll| 16.0.10374.20000| 1971632| 13-Apr-21| 07:58 \nsdk.microsoft.office.project.server.library.dll| microsoft.office.project.server.library.dll| 16.0.10374.20000| 1971632| 13-Apr-21| 07:58 \nmicrosoft.office.project.server.optimizer.dll| microsoft.office.project.server.optimizer.dll| 16.0.10374.20000| 262568| 13-Apr-21| 07:58 \nmicrosoft.office.project.server.workflow.dll| microsoft.office.project.server.workflow.dll| 16.0.10374.20000| 196536| 13-Apr-21| 07:58 \nsdk.microsoft.office.project.server.workflow.dll| microsoft.office.project.server.workflow.dll| 16.0.10374.20000| 196536| 13-Apr-21| 07:58 \nmicrosoft.office.project.shared.dll| microsoft.office.project.shared.dll| 16.0.10374.20000| 1897392| 13-Apr-21| 07:58 \nsdk.microsoft.office.project.shared.dll| microsoft.office.project.shared.dll| 16.0.10374.20000| 1897392| 13-Apr-21| 07:58 \nmicrosoft.projectserver.client.dll| microsoft.projectserver.client.dll| 16.0.10374.20000| 396264| 13-Apr-21| 07:58 \nmicrosoft.projectserver.client.dll_001| microsoft.projectserver.client.dll| 16.0.10374.20000| 396264| 13-Apr-21| 07:58 \nmicrosoft.projectserver.dll| microsoft.projectserver.dll| 16.0.10374.20000| 888808| 13-Apr-21| 07:58 \nmicrosoft.projectserver.dll_001| microsoft.projectserver.dll| 16.0.10374.20000| 888808| 13-Apr-21| 07:58 \nmicrosoft.projectserver.serverproxy.dll| microsoft.projectserver.serverproxy.dll| 16.0.10374.20000| 1305040| 13-Apr-21| 07:58 \nps.csom.scriptclient.debug.js| ps.debug.js| | 1030292| 12-Apr-21| 03:31 \nps.csom.scriptclient.js| ps.js| | 623325| 12-Apr-21| 03:32 \nmicrosoft.office.project.server.pwa.applicationpages.dll| microsoft.office.project.server.pwa.applicationpages.dll| 16.0.10374.20000| 1051608| 13-Apr-21| 07:58 \nmicrosoft.office.project.server.pwa.dll| microsoft.office.project.server.pwa.dll| 16.0.10374.20000| 2758616| 13-Apr-21| 07:58 \nmicrosoft.office.project.server.administration.dll| microsoft.office.project.server.administration.dll| 16.0.10374.20000| 1003432| 13-Apr-21| 07:57 \npwa.admin.addmodifyuser.aspx| addmodifyuser.aspx| | 143704| 12-Apr-21| 03:34 \npwa.admin.editcustomfield.aspx| editcustomfield.aspx| | 153222| 12-Apr-21| 03:34 \npwa.admin.editlookuptable.aspx| editlookuptable.aspx| | 71493| 12-Apr-21| 03:34 \npwa.common.respicker.aspx| respicker.aspx| | 3737| 12-Apr-21| 03:49 \npwa.library.projectdrilldownsatellite.debug.js| projectdrilldownsatellite.debug.js| | 152603| 12-Apr-21| 03:34 \npwa.library.projectdrilldownsatellite.js| projectdrilldownsatellite.js| | 83340| 12-Apr-21| 03:34 \npwa.library.projectservertreepicker.debug.js| projectservertreepicker.debug.js| | 81985| 12-Apr-21| 03:32 \npwa.library.projectservertreepicker.js| projectservertreepicker.js| | 42509| 12-Apr-21| 03:32 \npwa.library.projectserverscripts.core.debug.js| ps.core.debug.js| | 373260| 12-Apr-21| 03:32 \npwa.library.projectserverscripts.core.js| ps.core.js| | 228332| 12-Apr-21| 03:32 \npwa.library.projectserverscripts.rm.debug.js| ps.resourcemanagers.debug.js| | 255143| 12-Apr-21| 03:31 \npwa.library.projectserverscripts.rm.js| ps.resourcemanagers.js| | 155142| 12-Apr-21| 03:31 \npwa.library.shell.debug.js| shell.debug.js| | 92012| 12-Apr-21| 03:32 \npwa.library.shell.js| shell.js| | 45380| 12-Apr-21| 03:32 \npwa.portfoliooptimizer.optimizerspreadsheet.aspx| costconstraintanalysis.aspx| | 81336| 12-Apr-21| 03:33 \npwa.portfoliooptimizer.plannerspreadsheet.aspx| resourceconstraintanalysis.aspx| | 69689| 12-Apr-21| 03:34 \npwa.resx| pwa.resx| | 824177| 13-Apr-21| 07:55 \npwa.timesheet.timesheethistory.aspx| timesheethistory.aspx| | 4300| 12-Apr-21| 03:32 \nworkflowactivitiesdll| microsoft.office.project.server.workflowactivities.dll| 16.0.10374.20000| 55208| 13-Apr-21| 07:58 \nconversion.office.riched20.dll| riched20.dll| 16.0.10374.20000| 3242912| 13-Apr-21| 07:55 \nppt.conversion.riched20.dll| riched20.dll| 16.0.10374.20000| 3242912| 13-Apr-21| 07:55 \nppt.edit.riched20.dll| riched20.dll| 16.0.10374.20000| 3242912| 13-Apr-21| 07:55 \nwac.office.riched20.dll| riched20.dll| 16.0.10374.20000| 3242912| 13-Apr-21| 07:55 \nxlsrv.ecs.riched20.dll| riched20.dll| 16.0.10374.20000| 3242912| 13-Apr-21| 07:55 \nmicrosoft.eedict_companies.de.dll| microsoft.eedict_companies.de| 16.0.10374.20000| 18856| 13-Apr-21| 07:58 \nmicrosoft.eedict_companies.dll| microsoft.eedict_companies| 16.0.10374.20000| 109863840| 13-Apr-21| 07:58 \nmicrosoft.eedict_companies.en.dll| microsoft.eedict_companies.en| 16.0.10374.20000| 16800| 13-Apr-21| 07:58 \nmicrosoft.eedict_companies.es.dll| microsoft.eedict_companies.es| 16.0.10374.20000| 16808| 13-Apr-21| 07:58 \nmicrosoft.eedict_companies.fr.dll| microsoft.eedict_companies.fr| 16.0.10374.20000| 25016| 13-Apr-21| 07:58 \nmicrosoft.eedict_companies.it.dll| microsoft.eedict_companies.it| 16.0.10374.20000| 46520| 13-Apr-21| 07:58 \nmicrosoft.eedict_companies.ja.dll| microsoft.eedict_companies.ja| 16.0.10374.20000| 1533880| 13-Apr-21| 07:58 \nmicrosoft.eedict_companies.nl.dll| microsoft.eedict_companies.nl| 16.0.10374.20000| 18360| 13-Apr-21| 07:58 \nmicrosoft.eedict_companies.no.dll| microsoft.eedict_companies.no| 16.0.10374.20000| 2098080| 13-Apr-21| 07:58 \nmicrosoft.eedict_companies.pt.dll| microsoft.eedict_companies.pt| 16.0.10374.20000| 17848| 13-Apr-21| 07:58 \nmicrosoft.eedict_companies.ru.dll| microsoft.eedict_companies.ru| 16.0.10374.20000| 33214888| 13-Apr-21| 07:58 \nmicrosoft.eedict_companies_acceptor.ar.dll| microsoft.eedict_companies_acceptor.ar| 16.0.10374.20000| 9888160| 13-Apr-21| 07:58 \nmicrosoft.stopworddictionary.dll| microsoft.stopworddictionary.dll| 16.0.10374.20000| 32696| 13-Apr-21| 07:58 \nmicrosoft.system_dictionaries_spellcheck.dll| microsoft.system_dictionaries_spellcheck.dll| 16.0.10374.20000| 24632752| 13-Apr-21| 07:58 \nodffilt.dll.x64| odffilt.dll| 16.0.10374.20000| 1840592| 13-Apr-21| 07:55 \nofffiltx.dll.x64| offfiltx.dll| 16.0.10374.20000| 2115000| 13-Apr-21| 07:55 \nmicrosoft.ceres.common.tools.sandbox.dll| microsoft.ceres.common.tools.sandbox.dll| 16.0.10374.20000| 95648| 13-Apr-21| 07:55 \nmicrosoft.ceres.common.utils.dllmsil| microsoft.ceres.common.utils.dll| 16.0.10374.20000| 322464| 13-Apr-21| 07:58 \nmicrosoft.ceres.contentengine.contentpush.dll| microsoft.ceres.contentengine.contentpush.dll| 16.0.10374.20000| 160168| 13-Apr-21| 07:58 \nmicrosoft.ceres.contentengine.nlpevaluators.dll| microsoft.ceres.contentengine.nlpevaluators.dll| 16.0.10374.20000| 251832| 13-Apr-21| 07:58 \nmicrosoft.ceres.contentengine.operators.mars.dll| microsoft.ceres.contentengine.operators.mars.dll| 16.0.10374.20000| 37280| 13-Apr-21| 07:58 \ndocumentformat.openxml.dllmsil2| documentformat.openxml.dll| 2.6.0.4| 5305360| | \nupdate_documentformat.openxml.dllmsil2| documentformat.openxml.dll| 2.6.0.4| 5305360| 12-Apr-21| 03:32 \nsystem.io.packaging.dllmsil| system.io.packaging.dll| 1.0.0.4| 121872| | \nupdate_system.io.packaging.dllmsil| system.io.packaging.dll| 1.0.0.4| 121872| 12-Apr-21| 03:31 \nmicrosoft.ceres.docparsing.formathandlers.pdf.dllmsil| microsoft.ceres.docparsing.formathandlers.pdf.dll| 16.0.10374.20000| 4218792| 13-Apr-21| 07:55 \nmicrosoft.ceres.evaluation.operators.dll| microsoft.ceres.evaluation.operators.dll| 16.0.10374.20000| 288184| 13-Apr-21| 07:58 \nmicrosoft.ceres.interactionengine.processing.builtin.dll| microsoft.ceres.interactionengine.processing.builtin.dll| 16.0.10374.20000| 402872| 13-Apr-21| 07:55 \nmicrosoft.ceres.nlpbase.dictionaries.dll| microsoft.ceres.nlpbase.dictionaries.dll| 16.0.10374.20000| 138664| 13-Apr-21| 07:55 \nmanagedblingsigned.dll| managedblingsigned.dll| | 1862344| | \nupdate_managedblingsigned.dll| managedblingsigned.dll| | 1862344| 12-Apr-21| 03:32 \nmicrosoft.ceres.nlpbase.richfields.dll| microsoft.ceres.nlpbase.richfields.dll| 16.0.10374.20000| 97696| 13-Apr-21| 07:58 \nmicrosoft.ceres.nlpbase.wordbreaker.dll| microsoft.ceres.nlpbase.wordbreaker.dll| 16.0.10374.20000| 124320| 13-Apr-21| 07:55 \nmicrosoft.contentpushhybridflow.dll| microsoft.contentpushhybridflow.dll| 16.0.10374.3000| 105896| 13-Apr-21| 07:58 \nmicrosoft.crawlerlfow.dll| microsoft.crawlerflow.dll| 16.0.10374.3000| 68032| 13-Apr-21| 07:58 \nmicrosoft.crawlerpropertymappingsubflow.dll| microsoft.crawlerpropertymappingsubflow.dll| 16.0.10374.3000| 27568| 13-Apr-21| 07:58 \nmicrosoft.sharepointsearchproviderflow.dll| microsoft.sharepointsearchproviderflow.dll| 16.0.10374.3000| 27056| 13-Apr-21| 07:58 \nsearchcore.clustering.indexclusteringmember.dll| microsoft.ceres.searchcore.clustering.indexclusteringmember.dll| 16.0.10374.20000| 62368| 13-Apr-21| 07:58 \nsearchcore.clustering.indexclustermanager.dll| microsoft.ceres.searchcore.clustering.indexclustermanager.dll| 16.0.10374.20000| 128416| 13-Apr-21| 07:58 \nmicrosoft.ceres.searchcore.indexstorage.dll| microsoft.ceres.searchcore.indexstorage.dll| 16.0.10374.20000| 30648| 13-Apr-21| 07:58 \nmicrosoft.ceres.searchcore.journalshipper.dll| microsoft.ceres.searchcore.journalshipper.dll| 16.0.10374.20000| 87480| 13-Apr-21| 07:56 \nmicrosoft.ceres.searchcore.query.marslookupcomponent.dll| microsoft.ceres.searchcore.query.marslookupcomponent.dll| 16.0.10374.20000| 583088| 13-Apr-21| 07:58 \nmicrosoft.ceres.searchcore.seeding.dll| microsoft.ceres.searchcore.seeding.dll| 16.0.10374.20000| 132512| 13-Apr-21| 07:58 \najaxtkid.js| ajaxtoolkit.debug.js| | 312267| 12-Apr-21| 03:33 \najaxtkit.js| ajaxtoolkit.js| | 132858| 12-Apr-21| 03:32 \nsrchccd.js| search.clientcontrols.debug.js| | 380631| 12-Apr-21| 03:37 \nsrchcc.js| search.clientcontrols.js| | 204222| 12-Apr-21| 03:37 \nsrchuicd.js| searchui.debug.js| | 116371| 12-Apr-21| 03:48 \nsrchuicc.js| searchui.js| | 50907| 12-Apr-21| 03:48 \nsrchquerypipeline.dll| microsoft.office.server.search.query.dll| 16.0.10374.20000| 1103816| 13-Apr-21| 07:58 \nossapp.dll| microsoft.office.server.search.applications.dll| 16.0.10374.20000| 455096| 13-Apr-21| 07:58 \nossapp.dll_0001| microsoft.office.server.search.applications.dll| 16.0.10374.20000| 455096| 13-Apr-21| 07:58 \nclkprdct.dll| microsoft.office.server.search.clickpredict.dll| 16.0.10374.20000| 202680| 13-Apr-21| 07:58 \nsearchom.dll| microsoft.office.server.search.dll| 16.0.10374.20000| 21206960| 13-Apr-21| 07:58 \nsearchom.dll_0001| microsoft.office.server.search.dll| 16.0.10374.20000| 21206960| 13-Apr-21| 07:58 \nossex.dll| microsoft.office.server.search.exchangeadapter.dll| 16.0.10374.20000| 107456| 13-Apr-21| 07:58 \nossex.dll_0001| microsoft.office.server.search.exchangeadapter.dll| 16.0.10374.20000| 107456| 13-Apr-21| 07:58 \nsrchomnt.dll| microsoft.office.server.search.native.dll| 16.0.10374.20000| 517576| 13-Apr-21| 07:58 \nsearchom.dll_0003| microsoft.sharepoint.search.dll| 16.0.10374.20000| 3882432| 13-Apr-21| 07:55 \nsearchom.dll_0005| microsoft.sharepoint.search.dll| 16.0.10374.20000| 3882432| 13-Apr-21| 07:55 \nsrchomnt.dll_1| microsoft.sharepoint.search.native.dll| 16.0.10374.20000| 485824| 13-Apr-21| 07:55 \nmsscpi.dll| msscpi.dll| 16.0.10374.20000| 359344| 13-Apr-21| 07:55 \nmssdmn.exe| mssdmn.exe| 16.0.10374.20000| 625584| 13-Apr-21| 07:55 \nmssearch.exe| mssearch.exe| 16.0.10374.20000| 292304| 13-Apr-21| 07:55 \nmsslad.dll| msslad.dll| 16.0.10374.20000| 205240| 13-Apr-21| 07:55 \nmssph.dll| mssph.dll| 16.0.10374.20000| 2204608| 13-Apr-21| 07:55 \nmssrch.dll| mssrch.dll| 16.0.10374.20000| 3266488| 13-Apr-21| 07:55 \nquery9x.dll_0001| query.dll| 16.0.10374.20000| 136112| 13-Apr-21| 07:55 \ntquery.dll| tquery.dll| 16.0.10374.20000| 760240| 13-Apr-21| 07:55 \nnoteswebservice.dll.oss.x86| noteswebservice.dll| 16.0.10374.20000| 740280| 13-Apr-21| 07:54 \ncontrol_defaultresult.html| control_searchresults.html| | 31805| 12-Apr-21| 03:43 \ncontrol_defaultresult.js| control_searchresults.js| | 33455| 12-Apr-21| 03:44 \nitem_excel.html| item_excel.html| | 2696| 12-Apr-21| 03:43 \nitem_excel.js| item_excel.js| | 4014| 12-Apr-21| 03:43 \nitem_powerpoint.html| item_powerpoint.html| | 3221| 12-Apr-21| 03:43 \nitem_powerpoint.js| item_powerpoint.js| | 4570| 12-Apr-21| 03:43 \nitem_word.html| item_word.html| | 2832| 12-Apr-21| 03:43 \nitem_word.js| item_word.js| | 4160| 12-Apr-21| 03:43 \nsearchcenterlitefiles.default.aspx| default.aspx| | 2866| 12-Apr-21| 03:43 \nsearchcenterlitefiles.results.aspx| results.aspx| | 3395| 12-Apr-21| 03:43 \naddsnm.apx| addservernamemappings.aspx| | 10829| 12-Apr-21| 03:31 \nedtrelst.apx| editrelevancesettings.aspx| | 13350| 12-Apr-21| 03:31 \nlstsnm.apx| listservernamemappings.aspx| | 10204| 12-Apr-21| 03:32 \nmchrule1.apx| matchingrule.aspx| | 22333| 12-Apr-21| 03:31 \ncateg.apx| category.aspx| | 14271| 12-Apr-21| 03:38 \ncrprop.apx| crawledproperty.aspx| | 15447| 12-Apr-21| 03:38 \nlstcat.apx| listcategories.aspx| | 11119| 12-Apr-21| 03:37 \nlstcct.apx| listcrawledproperties.aspx| | 14243| 12-Apr-21| 03:37 \nlstmnp.apx| listmanagedproperties.aspx| | 16328| 12-Apr-21| 03:37 \nmprop.apx| managedproperty.aspx| | 35108| 12-Apr-21| 03:37 \nscope1.apx| scope.aspx| | 15130| 12-Apr-21| 03:31 \nsrcadmin.apx| searchadministration.aspx| | 11329| 12-Apr-21| 03:32 \nschpause.apx| searchapppause.aspx| | 9223| 12-Apr-21| 03:32 \nschreset.apx| searchreset.aspx| | 9733| 12-Apr-21| 03:32 \nresrem.apx| searchresultremoval.aspx| | 10164| 12-Apr-21| 03:32 \nvwscope1.apx| viewscopes.aspx| | 11793| 12-Apr-21| 03:32 \nvwscpse1.apx| viewscopesettings.aspx| | 11421| 12-Apr-21| 03:31 \naddcs.apx| addcontentsource.aspx| | 9315| 12-Apr-21| 03:33 \neditcs.apx| editcontentsource.aspx| | 36714| 12-Apr-21| 03:33 \nlstcs.apx| listcontentsources.aspx| | 8045| 12-Apr-21| 03:33 \nclcss.apx| crawllogcontentsources.aspx| | 15891| 12-Apr-21| 03:38 \nclcrawls.apx| crawllogcrawls.aspx| | 17110| 12-Apr-21| 03:37 \ncldbs.apx| crawllogdatabases.aspx| | 14408| 12-Apr-21| 03:37 \nclerrors.apx| crawllogerrors.aspx| | 15830| 12-Apr-21| 03:37 \nclhosts.apx| crawlloghosts.aspx| | 16035| 12-Apr-21| 03:38 \nclurlex.apx| crawllogurlexplorer.aspx| | 28624| 12-Apr-21| 03:37 \naddtype.apx| addfiletype.aspx| | 10522| 12-Apr-21| 03:32 \neditrule.apx| editcrawlrule.aspx| | 9413| 12-Apr-21| 03:32 \nmngrules.apx| managecrawlrules.aspx| | 8033| 12-Apr-21| 03:32 \nmngtypes.apx| managefiletypes.aspx| | 10128| 12-Apr-21| 03:32 \nedtresss.apx| editresultsourcessa.aspx| | 9668| 12-Apr-21| 03:38 \nmngresss.apx| manageresultsourcesssa.aspx| | 8750| 12-Apr-21| 03:37 \nhrcpumem.apx| cpumemoryusage.aspx| | 20285| 12-Apr-21| 03:32 \nhrfrsh.apx| crawlfreshness.aspx| | 18343| 12-Apr-21| 03:32 \nhrclrate.apx| crawlhealthreports.aspx| | 20847| 12-Apr-21| 03:31 \nhrltncy.apx| crawllatency.aspx| | 23194| 12-Apr-21| 03:32 \nhrqueue.apx| crawlqueue.aspx| | 14512| 12-Apr-21| 03:32 \nqrdeffl.apx| defaultflowquerylatency.aspx| | 17032| 12-Apr-21| 03:32 \nhrsutime.apx| documentprocessingactivity.aspx| | 14728| 12-Apr-21| 03:31 \nqrfed.apx| federationquerylatency.aspx| | 14972| 12-Apr-21| 03:32 \nhrhipri.apx| highprioritytransactions.aspx| | 16906| 12-Apr-21| 03:31 \nqrindex.apx| indexenginequerylatency.aspx| | 14996| 12-Apr-21| 03:31 \nqrall.apx| overallquerylatency.aspx| | 15704| 12-Apr-21| 03:32 \nqrps.apx| peoplesearchproviderquerylatency.aspx| | 17485| 12-Apr-21| 03:32 \nqrmain.apx| queryhealthreports.aspx| | 16747| 12-Apr-21| 03:31 \nqrsps.apx| sharepointsearchproviderquerylatency.aspx| | 17502| 12-Apr-21| 03:32 \neqctssa.apx| editqueryclienttypesssa.aspx| | 8169| 12-Apr-21| 03:39 \nmqctssa.apx| managequeryclienttypesssa.aspx| | 8097| 12-Apr-21| 03:38 \nedtqrs.apx| editqueryrule.aspx| | 71815| 12-Apr-21| 03:38 \nlstqr.apx| listqueryrules.aspx| | 16035| 12-Apr-21| 03:37 \nliqrs.apx| listqueryrules.aspx| | 18660| 12-Apr-21| 03:37 \nmngrb.apx| manageresultblock.aspx| | 39447| 12-Apr-21| 03:37 \nqrorsel.apx| orderselectedrules.aspx| | 12383| 12-Apr-21| 03:37 \nqradsrcs.apx| queryruleaddsource.aspx| | 9375| 12-Apr-21| 03:37 \nqredtbbs.apx| queryruleeditbestbet.aspx| | 20715| 12-Apr-21| 03:38 \nqraddtxs.apx| queryruletaxonomy.aspx| | 9852| 12-Apr-21| 03:37 \nlistqrl.apx| listqueryrules.aspx| | 14885| 12-Apr-21| 03:34 \nqsset.apx| querysuggestionsettings.aspx| | 15207| 12-Apr-21| 03:49 \nqsimp.apx| querysuggestionsimport.aspx| | 9830| 12-Apr-21| 03:47 \nscsets.apx| searchcentersettings.aspx| | 10043| 12-Apr-21| 03:37 \npplsearchres.aspx| peoplesearchresults.aspx| | 3821| 12-Apr-21| 03:37 \nreportsanddataresults_aspx| reportsanddataresults.aspx| | 3821| 12-Apr-21| 03:37 \nsearchmain.aspx| searchmain.aspx| | 3361| 12-Apr-21| 03:37 \nsearchres.aspx| searchresults.aspx| | 3821| 12-Apr-21| 03:37 \nmicrosoft.ceres.usageanalytics.analysis.dllmsil| microsoft.ceres.usageanalytics.analysis.dll| 16.0.10374.20000| 237984| 13-Apr-21| 07:58 \nsetup.exe| setup.exe| 16.0.10374.20000| 1972648| 13-Apr-21| 07:58 \nsvrsetup.exe| setup.exe| 16.0.10374.20000| 1972648| 13-Apr-21| 07:58 \nsvrsetup.dll| svrsetup.dll| 16.0.10374.20000| 17144736| 13-Apr-21| 07:58 \nwsssetup.dll| wsssetup.dll| 16.0.10374.20000| 17143696| 13-Apr-21| 07:58 \nvisioserver.microsoft.office.graphics.shapebuilder.dll| microsoft.office.graphics.shapebuilder.dll| 16.0.10374.20000| 13148088| 13-Apr-21| 07:58 \nsptrns.dll| microsoft.sharepoint.translation.dll| 16.0.10374.20000| 1104816| 13-Apr-21| 07:55 \nmicrosoft.fileservices.v2.dll| microsoft.fileservices.v2.dll| 16.0.10374.20000| 981928| 13-Apr-21| 07:58 \nspdxap.dll| microsoft.sharepoint.appmonitoring.applicationpages.dll| 16.0.10374.20000| 65936| 13-Apr-21| 07:58 \nmicrosoft.sharepoint.flighting.dll| microsoft.sharepoint.flighting.dll| 16.0.10374.20000| 2284960| 13-Apr-21| 07:55 \nactxprjlchrd.js| activexwinprojlauncher.debug.js| | 2095| 13-Apr-21| 07:55 \nactxprjlchr.js| activexwinprojlauncher.js| | 983| 13-Apr-21| 07:55 \nbitreeview.js| bitreeview.js| | 12879| 13-Apr-21| 07:55 \ncontentfollowing.debug.js| contentfollowing.debug.js| | 123898| 13-Apr-21| 07:55 \ncontentfollowing.js| contentfollowing.js| | 54228| 13-Apr-21| 07:55 \nfollowedtags.debug.js| followedtags.debug.js| | 6347| 13-Apr-21| 07:55 \nfollowedtags.js| followedtags.js| | 2726| 13-Apr-21| 07:55 \nfollowingcommon.debug.js| followingcommon.debug.js| | 21971| 13-Apr-21| 07:55 \nfollowingcommon.js| followingcommon.js| | 9646| 13-Apr-21| 07:55 \ngroup.debug.js| group.debug.js| | 125958| 13-Apr-21| 07:55 \ngroup.js| group.js| | 75983| 13-Apr-21| 07:55 \nhashtagprofile.debug.js| hashtagprofile.debug.js| | 6184| 13-Apr-21| 07:55 \nhashtagprofile.js| hashtagprofile.js| | 3285| 13-Apr-21| 07:55 \nhierarchytreeview.js| hierarchytreeview.js| | 8799| 13-Apr-21| 07:55 \nhtmlmenu.js| htmlmenus.js| | 21157| 13-Apr-21| 07:55 \nkpilro.js| kpilro.js| | 3182| 13-Apr-21| 07:55 \nmrudocs.debug.js| mrudocs.debug.js| | 9192| 13-Apr-21| 07:55 \nmrudocs.js| mrudocs.js| | 5862| 13-Apr-21| 07:55 \nmydocs.debug.js| mydocs.debug.js| | 73509| 13-Apr-21| 07:55 \nmydocs.js| mydocs.js| | 34453| 13-Apr-21| 07:55 \nmylinks.debug.js| mylinks.debug.js| | 7003| 13-Apr-21| 07:55 \nmylinks.js| mylinks.js| | 2629| 13-Apr-21| 07:55 \nmysiterecommendationsdebug.js| mysiterecommendations.debug.js| | 74489| 13-Apr-21| 07:55 \nmysiterecommendations.js| mysiterecommendations.js| | 41310| 13-Apr-21| 07:55 \nnotificationpanel.debug.js| notificationpanel.debug.js| | 14102| 13-Apr-21| 07:55 \nnotificationpanel.js| notificationpanel.js| | 7017| 13-Apr-21| 07:55 \nportal.debug.js| portal.debug.js| | 94804| 13-Apr-21| 07:55 \nportal.js| portal.js| | 52481| 13-Apr-21| 07:55 \nprbrows.debug.js| profilebrowsercontrol.debug.js| | 52762| 13-Apr-21| 07:55 \nprbrows.js| profilebrowsercontrol.js| | 28062| 13-Apr-21| 07:55 \nprojectsummary.debug.js| projectsummary.debug.js| | 36524| 13-Apr-21| 07:55 \nprojectsummary.js| projectsummary.js| | 13118| 13-Apr-21| 07:55 \nratings.js| ratings.js| | 18205| 13-Apr-21| 07:55 \nreputation.debug.js| reputation.debug.js| | 5317| 13-Apr-21| 07:55 \nreputation.js| reputation.js| | 3428| 13-Apr-21| 07:55 \nsoccom.js| socialcomment.js| | 23526| 13-Apr-21| 07:55 \nsocdata.js| socialdata.js| | 14889| 13-Apr-21| 07:55 \nsoctag.js| socialtag.js| | 9992| 13-Apr-21| 07:55 \nsprecdocsd.js| sp.recentdocs.debug.js| | 40634| 13-Apr-21| 07:55 \nsprecdocs.js| sp.recentdocs.js| | 18260| 13-Apr-21| 07:55 \nannouncementtilesdebug.js| sp.ui.announcementtiles.debug.js| | 14781| 13-Apr-21| 07:55 \nannouncementtiles.js| sp.ui.announcementtiles.js| | 8782| 13-Apr-21| 07:55 \nspui_cold.js| sp.ui.collabmailbox.debug.js| | 11768| 13-Apr-21| 07:55 \nspui_col.js| sp.ui.collabmailbox.js| | 7592| 13-Apr-21| 07:55 \ncommunities.js| sp.ui.communities.js| | 43980| 13-Apr-21| 07:55 \ncommunitiestileview.js| sp.ui.communities.tileview.js| | 8538| 13-Apr-21| 07:55 \ncommunityfeed.js| sp.ui.communityfeed.js| | 9997| 13-Apr-21| 07:55 \ncommunitymoderation.js| sp.ui.communitymoderation.js| | 8223| 13-Apr-21| 07:55 \nsp.ui.documentssharedbyme.debug.js| sp.ui.documentssharedbyme.debug.js| | 3174| 13-Apr-21| 07:55 \nsp.ui.documentssharedbyme.js| sp.ui.documentssharedbyme.js| | 2210| 13-Apr-21| 07:55 \nsp.ui.documentssharedwithme.debug.js| sp.ui.documentssharedwithme.debug.js| | 41725| 13-Apr-21| 07:55 \nsp.ui.documentssharedwithme.js| sp.ui.documentssharedwithme.js| | 24710| 13-Apr-21| 07:55 \nspui_listsearchbox_debug.js| sp.ui.listsearchbox.debug.js| | 39586| 13-Apr-21| 07:55 \nspui_listsearchbox.js| sp.ui.listsearchbox.js| | 20180| 13-Apr-21| 07:55 \nspui_listsearchboxbootstrap_debug.js| sp.ui.listsearchboxbootstrap.debug.js| | 7401| 13-Apr-21| 07:55 \nspui_listsearchboxbootstrap.js| sp.ui.listsearchboxbootstrap.js| | 3068| 13-Apr-21| 07:55 \nmicrofeeddebug.js| sp.ui.microfeed.debug.js| | 393708| 13-Apr-21| 07:55 \nmicrofeed.js| sp.ui.microfeed.js| | 230147| 13-Apr-21| 07:55 \nmysitecommondebug.js| sp.ui.mysitecommon.debug.js| | 131548| 13-Apr-21| 07:55 \nmysitecommon.js| sp.ui.mysitecommon.js| | 75538| 13-Apr-21| 07:55 \nmysitenavigationdebug.js| sp.ui.mysitenavigation.debug.js| | 2523| 13-Apr-21| 07:55 \nmysitenavigation.js| sp.ui.mysitenavigation.js| | 2523| 13-Apr-21| 07:55 \nmysiterecommendationsuidebug.js| sp.ui.mysiterecommendations.debug.js| | 14330| 13-Apr-21| 07:55 \nmysiterecommendationsui.js| sp.ui.mysiterecommendations.js| | 7266| 13-Apr-21| 07:55 \npeopledebug.js| sp.ui.people.debug.js| | 87048| 13-Apr-21| 07:55 \npeopledebug.js1| sp.ui.people.debug.js| | 87048| 13-Apr-21| 07:55 \npeople.js| sp.ui.people.js| | 59577| 13-Apr-21| 07:55 \npeople.js1| sp.ui.people.js| | 59577| 13-Apr-21| 07:55 \nspui_persond.js| sp.ui.person.debug.js| | 18230| 13-Apr-21| 07:55 \nspui_person.js| sp.ui.person.js| | 10324| 13-Apr-21| 07:55 \nspui_psd.js| sp.ui.promotedsites.debug.js| | 24862| 13-Apr-21| 07:55 \nspui_ps.js| sp.ui.promotedsites.js| | 15123| 13-Apr-21| 07:55 \nsp.ui.ratings.debug.js| sp.ui.ratings.debug.js| | 20220| 13-Apr-21| 07:55 \nsp.ui.ratings.js| sp.ui.ratings.js| | 11909| 13-Apr-21| 07:55 \nsp.ui.reputation.debug.js| sp.ui.reputation.debug.js| | 42482| 13-Apr-21| 07:55 \nsp.ui.reputation.js| sp.ui.reputation.js| | 25974| 13-Apr-21| 07:55 \nspssoc.js| sp.ui.socialribbon.js| | 20740| 13-Apr-21| 07:55 \nhomeapi.dll_gac| microsoft.sharepoint.homeapi.dll| 16.0.10374.20000| 352192| 13-Apr-21| 07:58 \nhomeapi.dll_isapi| microsoft.sharepoint.homeapi.dll| 16.0.10374.20000| 352192| 13-Apr-21| 07:58 \nportal.dll| microsoft.sharepoint.portal.dll| 16.0.10374.20000| 6995384| 13-Apr-21| 07:55 \nportal.dll_001| microsoft.sharepoint.portal.dll| 16.0.10374.20000| 6995384| 13-Apr-21| 07:55 \nprofileext.sql| profileext.sql| | 1388377| 12-Apr-21| 03:48 \nprofilesrp.sql| profilesrp.sql| | 1553927| 12-Apr-21| 03:48 \nprofilesrp_c.sql| profilesrp_c.sql| | 150583| 12-Apr-21| 03:48 \nprofilesrp_n.sql| profilesrp_n.sql| | 1004057| 12-Apr-21| 03:48 \nantixsslibrary.dll| antixsslibrary.dll| 3.0.3259.31320| 26256| | \nupdate_antixsslibrary.dll| antixsslibrary.dll| 3.0.3259.31320| 26256| 12-Apr-21| 03:24 \nmicrosoft_office_securestoreservice.dll| microsoft.office.securestoreservice.dll| 16.0.10374.20000| 645576| 13-Apr-21| 07:58 \nstsapa.dll| microsoft.sharepoint.applicationpages.administration.dll| 16.0.10374.20000| 688568| 13-Apr-21| 07:55 \nwssadmop.dll_0001| microsoft.sharepoint.administrationoperation.dll| 16.0.10374.20000| 1173472| 13-Apr-21| 07:58 \nanglesharp.dll| anglesharp.dll| 0.9.7| 1203712| | \nupdate_anglesharp.dll| anglesharp.dll| 0.9.7| 1203712| 12-Apr-21| 03:26 \ntimezone.xml| timezone.xml| | 89327| 12-Apr-21| 03:44 \nsiteupgrade.xml| siteupgradelinks.xml| | 534| 12-Apr-21| 03:38 \nsiteupgrade.xml_14| siteupgradelinks.xml| | 534| 12-Apr-21| 03:38 \nmicrosoft.sharepoint.health.dll| microsoft.sharepoint.health.dll| 16.0.10374.20000| 136160| 13-Apr-21| 07:58 \nmicrosoft.sharepoint.identitymodel.dll| microsoft.sharepoint.identitymodel.dll| 16.0.10374.20000| 658344| 13-Apr-21| 07:58 \nmicrosoft.owin.3.0.1.dll| microsoft.owin.dll| 3.0.40213.64| 101032| | \nupdate_microsoft.owin.3.0.1.dll| microsoft.owin.dll| 3.0.40213.64| 101032| 12-Apr-21| 03:26 \nmicrosoft.owin.host.systemweb.3.0.1.dll| microsoft.owin.host.systemweb.dll| 3.0.40213.64| 133288| | \nupdate_microsoft.owin.host.systemweb.3.0.1.dll| microsoft.owin.host.systemweb.dll| 3.0.40213.64| 133288| 12-Apr-21| 03:25 \nmicrosoft.sharepoint.client.dll.x64| microsoft.sharepoint.client.dll| 16.0.10374.20000| 852384| 13-Apr-21| 07:55 \nmicrosoft.sharepoint.client.dll_0001.x64| microsoft.sharepoint.client.dll| 16.0.10374.20000| 852384| 13-Apr-21| 07:55 \nmicrosoft.sharepoint.client.phone.dll| microsoft.sharepoint.client.phone.dll| 16.0.10374.20000| 797104| 13-Apr-21| 07:55 \nmicrosoft.sharepoint.client.portable.dll.x64| microsoft.sharepoint.client.portable.dll| 16.0.10374.20000| 813496| 13-Apr-21| 07:55 \nmicrosoft.sharepoint.client.portable.dll_gac.x64| microsoft.sharepoint.client.portable.dll| 16.0.10374.20000| 813496| 13-Apr-21| 07:55 \nmicrosoft.sharepoint.client.serverruntime.dll| microsoft.sharepoint.client.serverruntime.dll| 16.0.10374.20000| 740816| 13-Apr-21| 07:55 \nmicrosoft.sharepoint.client.serverruntime.dll_0001| microsoft.sharepoint.client.serverruntime.dll| 16.0.10374.20000| 740816| 13-Apr-21| 07:55 \nmicrosoft.sharepoint.client.silverlight.dll.x64| microsoft.sharepoint.client.silverlight.dll| 16.0.10374.20000| 796624| 13-Apr-21| 07:55 \ncontextinfo.dll_0001| microsoft.sharepoint.context.dll| 16.0.10374.20000| 48568| 13-Apr-21| 07:55 \nsplinq.dll| microsoft.sharepoint.linq.dll| 16.0.10374.20000| 388512| 13-Apr-21| 07:55 \nsplinqvs.dll| microsoft.sharepoint.linq.dll| 16.0.10374.20000| 388512| 13-Apr-21| 07:55 \nrenderlist.dll_0001| microsoft.sharepoint.renderlist.dll| 16.0.10374.20000| 22960| 13-Apr-21| 07:55 \nmicrosoft.sharepoint.serverstub.dll| microsoft.sharepoint.serverstub.dll| 16.0.10374.20000| 2882016| 13-Apr-21| 07:55 \nnewtonsoft.json.6.0.8.dll| newtonsoft.json.dll| 6.0.8.18111| 513536| | \nupdate_newtonsoft.json.6.0.8.dll| newtonsoft.json.dll| 6.0.8.18111| 513536| 12-Apr-21| 03:24 \noffprsx.dll| offparser.dll| 16.0.10374.20000| 2139080| 13-Apr-21| 07:55 \nowin.1.0.dll| owin.dll| 1.0| 4608| | \nupdate_owin.1.0.dll| owin.dll| 1.0| 4608| 12-Apr-21| 03:24 \nstslib.dll_0001| microsoft.sharepoint.library.dll| 16.0.10374.20000| 230328| 13-Apr-21| 07:58 \nowssvr.dll_0001| owssvr.dll| 16.0.10374.20000| 6900168| 13-Apr-21| 07:58 \nmicrosoft.sharepoint.powershell.dll_0001| microsoft.sharepoint.powershell.dll| 16.0.10374.20000| 1065920| 13-Apr-21| 07:55 \nmicrosoft.sharepoint.powershell.intl.dll| microsoft.sharepoint.powershell.intl.dll| 16.0.10374.20000| 97224| 13-Apr-21| 07:55 \npsconfig.exe| psconfig.exe| 16.0.10374.20000| 538568| 13-Apr-21| 07:58 \npsconfigui.exe| psconfigui.exe| 16.0.10374.20000| 809952| 13-Apr-21| 07:58 \ncore_0.rsx| core.resx| | 526140| 13-Apr-21| 07:58 \nsts_addgallery_server| microsoft.sharepoint.addgallery.server.dll| 16.0.10374.20000| 118192| 13-Apr-21| 07:55 \nsp.res_0.resx| sp.res.resx| | 78081| 13-Apr-21| 07:55 \nsts.spuchostservice.exe| spuchostservice.exe| 16.0.10374.20000| 154120| 13-Apr-21| 07:58 \nspusercode.dll_0001| microsoft.sharepoint.usercode.dll| 16.0.10374.20000| 26024| 13-Apr-21| 07:58 \ncloudweb.cfg| cloudweb.config| | 79372| 12-Apr-21| 03:39 \nstsom.dll| microsoft.sharepoint.dll| 16.0.10374.20000| 38506928| 13-Apr-21| 07:55 \nstsom.dll_0001| microsoft.sharepoint.dll| 16.0.10374.20000| 38506928| 13-Apr-21| 07:55 \nstsomdr.dll| microsoft.sharepoint.intl.dll| 16.0.10374.20000| 1409968| 13-Apr-21| 07:55 \nweb.cfg| web.config| | 79372| 12-Apr-21| 03:39 \nstsap.dll| microsoft.sharepoint.applicationpages.dll| 16.0.10374.20000| 2448360| 13-Apr-21| 07:55 \nstssoap.dll| stssoap.dll| 16.0.10374.20000| 775616| 13-Apr-21| 07:55 \nsubsetproxy.dll_0001| microsoft.sharepoint.subsetproxy.dll| 16.0.10374.20000| 1140704| 13-Apr-21| 07:55 \nsubsetshim.dll_0001| microsoft.sharepoint.dll| 16.900.rup.rpr| 2449840| 13-Apr-21| 07:58 \nsystem.net.http.formatting.5.2.3.dll| system.net.http.formatting.dll| 5.2.30128.0| 185544| | \nupdate_system.net.http.formatting.5.2.3.dll| system.net.http.formatting.dll| 5.2.30128.0| 185544| 12-Apr-21| 03:25 \nsystem.web.http.5.2.3.dll| system.web.http.dll| 5.2.30128.0| 471240| | \nupdate_system.web.http.5.2.3.dll| system.web.http.dll| 5.2.30128.0| 471240| 12-Apr-21| 03:26 \nblog.xsl| blog.xsl| | 37382| 12-Apr-21| 03:45 \napplications.asx_0014| applications.aspx| | 3998| 12-Apr-21| 03:33 \napps.asx_0014| apps.aspx| | 3974| 12-Apr-21| 03:32 \nbackups.asx_0014| backups.aspx| | 3983| 12-Apr-21| 03:33 \nconfigurationwizards.asx_0014| configurationwizards.aspx| | 4022| 12-Apr-21| 03:33 \ndefault.asx_0014| default.aspx| | 5440| 12-Apr-21| 03:33 \ngenappsettings.asx_0014| generalapplicationsettings.aspx| | 4041| 12-Apr-21| 03:32 \nmonitoring.asx_0014| monitoring.aspx| | 3992| 12-Apr-21| 03:33 \no365config.asx_0015| office365configuration.aspx| | 5180| 12-Apr-21| 03:32 \nsecurity.asx_0014| security.aspx| | 3986| 12-Apr-21| 03:32 \nsysset.asx_0014| systemsettings.aspx| | 4004| 12-Apr-21| 03:33 \nupgandmig.asx_0014| upgradeandmigration.aspx| | 4019| 12-Apr-21| 03:32 \ndepl.xsd.x64| deploymentmanifest.xsd| | 91463| 12-Apr-21| 03:46 \ndip.js| dip.js| | 50374| 12-Apr-21| 03:48 \ndip.js_14| dip.js| | 50374| 12-Apr-21| 03:48 \nfldtypes.xsl| fldtypes.xsl| | 134868| 12-Apr-21| 03:47 \ninternal.xsl| internal.xsl| | 11270| 12-Apr-21| 03:46 \naccreqctl.debug.js| accessrequestscontrol.debug.js| | 20696| 13-Apr-21| 07:55 \naccreqctl.js| accessrequestscontrol.js| | 11682| 13-Apr-21| 07:55 \naccreqviewtmpl.debug.js| accessrequestsviewtemplate.debug.js| | 50013| 13-Apr-21| 07:55 \naccreqviewtmpl.js| accessrequestsviewtemplate.js| | 22931| 13-Apr-21| 07:55 \nappcatalogfieldtemplate.debug.js| appcatalogfieldtemplate.debug.js| | 9638| 13-Apr-21| 07:55 \nappcatalogfieldtemplate.js| appcatalogfieldtemplate.js| | 3693| 13-Apr-21| 07:55 \nappdeveloperdash.debug.js| appdeveloperdash.debug.js| | 23162| 13-Apr-21| 07:55 \nappdeveloperdash.js| appdeveloperdash.js| | 11550| 13-Apr-21| 07:55 \napprequestmanagefieldtemplate.debug.js| apprequestmanagefieldtemplate.debug.js| | 2771| 13-Apr-21| 07:55 \napprequestmanagefieldtemplate.js| apprequestmanagefieldtemplate.js| | 1474| 13-Apr-21| 07:55 \nautofill.debug.js| autofill.debug.js| | 20542| 13-Apr-21| 07:55 \nautofill.js| autofill.js| | 11560| 13-Apr-21| 07:55 \nautohostedlicensingtemplates.debug.js| autohostedlicensingtemplates.debug.js| | 21187| 13-Apr-21| 07:55 \nautohostedlicensingtemplates.js| autohostedlicensingtemplates.js| | 8987| 13-Apr-21| 07:55 \nbform.debug.js| bform.debug.js| | 460795| 13-Apr-21| 07:55 \nbform.js| bform.js| | 259447| 13-Apr-21| 07:55 \nblank.debug.js| blank.debug.js| | 755| 13-Apr-21| 07:55 \nblank.js| blank.js| | 454| 13-Apr-21| 07:55 \ncallout.debug.js| callout.debug.js| | 92058| 13-Apr-21| 07:55 \ncallout.js| callout.js| | 29840| 13-Apr-21| 07:55 \nchoicebuttonfieldtemplate.debug.js| choicebuttonfieldtemplate.debug.js| | 6382| 13-Apr-21| 07:55 \nchoicebuttonfieldtemplate.js| choicebuttonfieldtemplate.js| | 2741| 13-Apr-21| 07:55 \nclientforms.debug.js| clientforms.debug.js| | 156496| 13-Apr-21| 07:55 \nclientforms.js| clientforms.js| | 79485| 13-Apr-21| 07:55 \nclientpeoplepicker.debug.js| clientpeoplepicker.debug.js| | 83429| 13-Apr-21| 07:55 \nclientpeoplepicker.js| clientpeoplepicker.js| | 44308| 13-Apr-21| 07:55 \nclientrenderer.debug.js| clientrenderer.debug.js| | 30681| 13-Apr-21| 07:55 \nclientrenderer.js| clientrenderer.js| | 12958| 13-Apr-21| 07:55 \nclienttemplates.debug.js| clienttemplates.debug.js| | 398977| 13-Apr-21| 07:55 \nclienttemplates.js| clienttemplates.js| | 203892| 13-Apr-21| 07:55 \ncommonvalidation.debug.js| commonvalidation.debug.js| | 6758| 13-Apr-21| 07:55 \ncomval.js| commonvalidation.js| | 4222| 13-Apr-21| 07:55 \ncore.debug.js| core.debug.js| | 956325| 13-Apr-21| 07:55 \ncore.js_0001| core.js| | 507438| 13-Apr-21| 07:55 \ncreatesharedfolderdialog.debug.js| createsharedfolderdialog.debug.js| | 43148| 13-Apr-21| 07:55 \ncreatesharedfolderdialog.js| createsharedfolderdialog.js| | 18920| 13-Apr-21| 07:55 \ndatepicker.debug.js| datepicker.debug.js| | 160480| 13-Apr-21| 07:55 \ndatepick.js| datepicker.js| | 71515| 13-Apr-21| 07:55 \ndesigngallery.debug.js| designgallery.debug.js| | 47390| 13-Apr-21| 07:55 \ndesigngallery.js| designgallery.js| | 29173| 13-Apr-21| 07:55 \ndevdash.debug.js| devdash.debug.js| | 89841| 13-Apr-21| 07:55 \ndevdash.js| devdash.js| | 38402| 13-Apr-21| 07:55 \ndragdrop.debug.js| dragdrop.debug.js| | 237831| 13-Apr-21| 07:55 \ndragdrop.js| dragdrop.js| | 122516| 13-Apr-21| 07:55 \nentityeditor.debug.js| entityeditor.debug.js| | 73995| 13-Apr-21| 07:55 \nentityeditor.js| entityeditor.js| | 38997| 13-Apr-21| 07:55 \nfilepreview.debug.js| filepreview.debug.js| | 25986| 13-Apr-21| 07:55 \nfilepreview.js| filepreview.js| | 14044| 13-Apr-21| 07:55 \nfoldhyperlink.debug.js| foldhyperlink.debug.js| | 3924| 13-Apr-21| 07:55 \nfoldhyperlink.js| foldhyperlink.js| | 1861| 13-Apr-21| 07:55 \nform.debug.js| form.debug.js| | 241306| 13-Apr-21| 07:55 \nform.js| form.js| | 129250| 13-Apr-21| 07:55 \nganttscript.debug.js| ganttscript.debug.js| | 9384| 13-Apr-21| 07:55 \nganttscr.js| ganttscript.js| | 5098| 13-Apr-21| 07:55 \ngeolocationfieldtemplate.debug.js| geolocationfieldtemplate.debug.js| | 41051| 13-Apr-21| 07:55 \ngeolocationfieldtemplate.js| geolocationfieldtemplate.js| | 15434| 13-Apr-21| 07:55 \ngroupboard.debug.js| groupboard.debug.js| | 16339| 13-Apr-21| 07:55 \ngroupboard.js| groupboard.js| | 9548| 13-Apr-21| 07:55 \ngroupeditempicker.debug.js| groupeditempicker.debug.js| | 21014| 13-Apr-21| 07:55 \ngip.js| groupeditempicker.js| | 12055| 13-Apr-21| 07:55 \nhierarchytaskslist.debug.js| hierarchytaskslist.debug.js| | 60796| 13-Apr-21| 07:55 \nhierarchytaskslist.js| hierarchytaskslist.js| | 20086| 13-Apr-21| 07:55 \nimglib.debug.js| imglib.debug.js| | 91322| 13-Apr-21| 07:55 \nimglib.js| imglib.js| | 53905| 13-Apr-21| 07:55 \ninit.debug.js| init.debug.js| | 626836| 13-Apr-21| 07:55 \ninit.js_0001| init.js| | 303224| 13-Apr-21| 07:55 \ninplview.debug.js| inplview.debug.js| | 156138| 13-Apr-21| 07:55 \ninplview.js| inplview.js| | 79676| 13-Apr-21| 07:55 \njsgrid.debug.js| jsgrid.debug.js| | 1186695| 13-Apr-21| 07:55 \njsgrid.gantt.debug.js| jsgrid.gantt.debug.js| | 110109| 13-Apr-21| 07:55 \njsgrid.gantt.js| jsgrid.gantt.js| | 42304| 13-Apr-21| 07:55 \njsgrid.js| jsgrid.js| | 445122| 13-Apr-21| 07:55 \nlanguagepickercontrol.js| languagepickercontrol.js| | 11516| 13-Apr-21| 07:55 \nlistview.debug.js| listview.debug.js| | 933331| 13-Apr-21| 07:55 \nlistview.js| listview.js| | 401278| 13-Apr-21| 07:55 \nmapviewtemplate.debug.js| mapviewtemplate.debug.js| | 38394| 13-Apr-21| 07:55 \nmapviewtemplate.js| mapviewtemplate.js| | 15542| 13-Apr-21| 07:55 \nmenu.debug.js| menu.debug.js| | 103516| 13-Apr-21| 07:55 \nmenu.js_0001| menu.js| | 52559| 13-Apr-21| 07:55 \nsuitenav.js| suitenav.js| | 205345| 12-Apr-21| 03:31 \nsuitenavstandalone.js| suitenavstandalone.js| | 244520| 12-Apr-21| 03:31 \nmountpt.debug.js| mountpoint.debug.js| | 13632| 13-Apr-21| 07:55 \nmountpt.js| mountpoint.js| | 6211| 13-Apr-21| 07:55 \nmquery.debug.js| mquery.debug.js| | 60340| 13-Apr-21| 07:55 \nmquery.js| mquery.js| | 22614| 13-Apr-21| 07:55 \nms.rte.debug.js| ms.rte.debug.js| | 717392| 13-Apr-21| 07:55 \nms.rte.js| ms.rte.js| | 402861| 13-Apr-21| 07:55 \noffline.debug.js| offline.debug.js| | 22154| 13-Apr-21| 07:55 \noffline.js| offline.js| | 11383| 13-Apr-21| 07:55 \nows.debug.js| ows.debug.js| | 714698| 13-Apr-21| 07:55 \nows.js| ows.js| | 377272| 13-Apr-21| 07:55 \nowsbrows.debug.js| owsbrows.debug.js| | 24954| 13-Apr-21| 07:55 \nowsbrows.js| owsbrows.js| | 13300| 13-Apr-21| 07:55 \npickerhierarchycontrol.js| pickerhierarchycontrol.js| | 84676| 13-Apr-21| 07:55 \npivotcontrol.debug.js| pivotcontrol.debug.js| | 18165| 12-Apr-21| 03:36 \npivotcontrol.js| pivotcontrol.js| | 8592| 12-Apr-21| 03:36 \nquicklaunch.debug.js| quicklaunch.debug.js| | 135522| 13-Apr-21| 07:55 \nquicklaunch.js| quicklaunch.js| | 74048| 13-Apr-21| 07:55 \nradiobuttonwithchildren.js| radiobuttonwithchildren.js| | 3555| 13-Apr-21| 07:55 \nroamingapps.debug.js| roamingapps.debug.js| | 55031| 13-Apr-21| 07:55 \nroamingapps.js| roamingapps.js| | 21853| 13-Apr-21| 07:55 \nsharing.debug.js| sharing.debug.js| | 322361| 13-Apr-21| 07:55 \nsharing.js| sharing.js| | 135348| 13-Apr-21| 07:55 \nsharingmodern.debug.js| sharingmodern.debug.js| | 18196| 13-Apr-21| 07:55 \nsharingmodern.js| sharingmodern.js| | 5805| 13-Apr-21| 07:55 \nsinglesignon.debug.js| singlesignon.debug.js| | 17059| 13-Apr-21| 07:55 \nsinglesignon.js| singlesignon.js| | 6060| 13-Apr-21| 07:55 \nsiteupgrade.debug.js| siteupgrade.debug.js| | 1693| 13-Apr-21| 07:55 \nsiteupgrade.debug.js_14| siteupgrade.debug.js| | 1693| 13-Apr-21| 07:55 \nsiteupgrade.js| siteupgrade.js| | 1119| 13-Apr-21| 07:55 \nsiteupgrade.js_14| siteupgrade.js| | 1119| 13-Apr-21| 07:55 \nsp.accessibility.debug.js| sp.accessibility.debug.js| | 34811| 13-Apr-21| 07:55 \nsp.accessibility.js| sp.accessibility.js| | 21841| 13-Apr-21| 07:55 \nsp.core.debug.js| sp.core.debug.js| | 166073| 13-Apr-21| 07:55 \nsp.core.js| sp.core.js| | 87928| 13-Apr-21| 07:55 \nsp.datetimeutil.debug.js| sp.datetimeutil.debug.js| | 116020| 13-Apr-21| 07:55 \nsp.datetimeutil.js| sp.datetimeutil.js| | 66950| 13-Apr-21| 07:55 \nsp.debug.js| sp.debug.js| | 1703154| 13-Apr-21| 07:55 \nsp.exp.debug.js| sp.exp.debug.js| | 41182| 13-Apr-21| 07:55 \nsp.exp.js| sp.exp.js| | 24498| 13-Apr-21| 07:55 \nsp.init.debug.js| sp.init.debug.js| | 57831| 13-Apr-21| 07:55 \nsp.init.js| sp.init.js| | 32952| 13-Apr-21| 07:55 \nsp.js| sp.js| | 1042985| 13-Apr-21| 07:55 \nspmap.debug.js| sp.map.debug.js| | 15759| 13-Apr-21| 07:55 \nspmap.js| sp.map.js| | 8531| 13-Apr-21| 07:55 \nsppageinstr.debug.js| sp.pageinstrumentation.debug.js| | 1925| 13-Apr-21| 07:55 \nsppageinstr.js| sp.pageinstrumentation.js| | 1395| 13-Apr-21| 07:55 \nsp.requestexecutor.debug.js| sp.requestexecutor.debug.js| | 100405| 13-Apr-21| 07:55 \nsp.requestexecutor.js| sp.requestexecutor.js| | 63696| 13-Apr-21| 07:55 \nsp.ribbon.debug.js| sp.ribbon.debug.js| | 361474| 13-Apr-21| 07:55 \nsp.ribbon.js| sp.ribbon.js| | 222917| 13-Apr-21| 07:55 \nsp.runtime.debug.js| sp.runtime.debug.js| | 197022| 13-Apr-21| 07:55 \nsp.runtime.js| sp.runtime.js| | 115684| 13-Apr-21| 07:55 \nsp.simpleloggermobile.debug.js| sp.simpleloggermobile.debug.js| | 40931| 13-Apr-21| 07:55 \nsp.simpleloggermobile.js| sp.simpleloggermobile.js| | 20442| 13-Apr-21| 07:55 \nsp.storefront.debug.js| sp.storefront.debug.js| | 443986| 13-Apr-21| 07:55 \nsp.storefront.js| sp.storefront.js| | 299460| 13-Apr-21| 07:55 \nsp.ui.admin.debug.js| sp.ui.admin.debug.js| | 18904| 13-Apr-21| 07:55 \nsp.ui.admin.js| sp.ui.admin.js| | 11611| 13-Apr-21| 07:55 \nsp.ui.allapps.debug.js| sp.ui.allapps.debug.js| | 45304| 13-Apr-21| 07:55 \nsp.ui.allapps.js| sp.ui.allapps.js| | 27972| 13-Apr-21| 07:55 \nsp.ui.applicationpages.calendar.debug.js| sp.ui.applicationpages.calendar.debug.js| | 278413| 13-Apr-21| 07:55 \nsp.ui.applicationpages.calendar.js| sp.ui.applicationpages.calendar.js| | 143448| 13-Apr-21| 07:55 \nsp.ui.applicationpages.debug.js| sp.ui.applicationpages.debug.js| | 11283| 13-Apr-21| 07:55 \nsp.ui.applicationpages.js| sp.ui.applicationpages.js| | 7682| 13-Apr-21| 07:55 \nsp.ui.bdcadminpages.debug.js| sp.ui.bdcadminpages.debug.js| | 16634| 13-Apr-21| 07:55 \nsp.ui.bdcadminpages.js| sp.ui.bdcadminpages.js| | 11650| 13-Apr-21| 07:55 \nspblogd.js| sp.ui.blogs.debug.js| | 51882| 13-Apr-21| 07:55 \nspblog.js| sp.ui.blogs.js| | 31202| 13-Apr-21| 07:55 \nsp.ui.combobox.debug.js| sp.ui.combobox.debug.js| | 100153| 13-Apr-21| 07:55 \nsp.ui.combobox.js| sp.ui.combobox.js| | 52056| 13-Apr-21| 07:55 \nsp.ui.controls.debug.js| sp.ui.controls.debug.js| | 58556| 13-Apr-21| 07:55 \nsp.ui.controls.js| sp.ui.controls.js| | 39727| 13-Apr-21| 07:55 \nsp.ui.dialog.debug.js| sp.ui.dialog.debug.js| | 75579| 13-Apr-21| 07:55 \nsp.ui.dialog.js| sp.ui.dialog.js| | 44112| 13-Apr-21| 07:55 \nspdiscd.js| sp.ui.discussions.debug.js| | 136965| 13-Apr-21| 07:55 \nspdisc.js| sp.ui.discussions.js| | 81948| 13-Apr-21| 07:55 \nspimgcd.js| sp.ui.imagecrop.debug.js| | 28399| 13-Apr-21| 07:55 \nspimgc.js| sp.ui.imagecrop.js| | 28399| 13-Apr-21| 07:55 \nspui_rid.js| sp.ui.relateditems.debug.js| | 29224| 13-Apr-21| 07:55 \nspui_ri.js| sp.ui.relateditems.js| | 18376| 13-Apr-21| 07:55 \nsp.ui.rte.debug.js| sp.ui.rte.debug.js| | 356388| 13-Apr-21| 07:55 \nsp.ui.rte.js| sp.ui.rte.js| | 218138| 13-Apr-21| 07:55 \nsp.ui.tileview.debug.js| sp.ui.tileview.debug.js| | 100921| 13-Apr-21| 07:55 \nsp.ui.tileview.js| sp.ui.tileview.js| | 61800| 13-Apr-21| 07:55 \nspui_tld.js| sp.ui.timeline.debug.js| | 488762| 13-Apr-21| 07:55 \nspui_tl.js| sp.ui.timeline.js| | 265916| 13-Apr-21| 07:55 \nspgantt.debug.js| spgantt.debug.js| | 193531| 13-Apr-21| 07:55 \nspgantt.js| spgantt.js| | 70034| 13-Apr-21| 07:55 \nspgridview.debug.js| spgridview.debug.js| | 7876| 13-Apr-21| 07:55 \nspgridvw.js| spgridview.js| | 4901| 13-Apr-21| 07:55 \nstart.debug.js| start.debug.js| | 185210| 13-Apr-21| 07:55 \nstart.js| start.js| | 101322| 13-Apr-21| 07:55 \nsuitelinks.debug.js| suitelinks.debug.js| | 32319| 13-Apr-21| 07:55 \nsuitelnk.js| suitelinks.js| | 13506| 13-Apr-21| 07:55 \ntimecard.debug.js| timecard.debug.js| | 37455| 13-Apr-21| 07:55 \ntimecard.js| timecard.js| | 21190| 13-Apr-21| 07:55 \ntouchapp.js| touchapp.js| | 498041| 12-Apr-21| 03:36 \nwpadder.debug.js| wpadder.debug.js| | 52865| 13-Apr-21| 07:55 \nwpadder.js| wpadder.js| | 33268| 13-Apr-21| 07:55 \nwpcm.debug.js| wpcm.debug.js| | 7521| 13-Apr-21| 07:55 \nwpcm.js| wpcm.js| | 3847| 13-Apr-21| 07:55 \nmain.xsl| main.xsl| | 6124| 12-Apr-21| 03:47 \nsigstore.dll| sigstore.dll| | 19888| | \nupdate_sigstore.dll| sigstore.dll| | 19888| 12-Apr-21| 03:33 \nstore.sql| store.sql| | 8074807| 12-Apr-21| 03:34 \nstore.xml| store.xml| | 8917277| 13-Apr-21| 07:55 \nstoreazure.xml| store_azure.xml| | 8917277| 13-Apr-21| 07:55 \nusagedb.sql| usagedb.sql| | 88742| 12-Apr-21| 03:34 \nusgdbup.sql| usgdbup.sql| | 88551| 12-Apr-21| 03:33 \nappassoc.asx| applicationassociations.aspx| | 5504| 12-Apr-21| 03:36 \nauthen.asx| authentication.aspx| | 13965| 12-Apr-21| 03:36 \nblkftyp.asx| blockedfiletype.aspx| | 4282| 12-Apr-21| 03:36 \ndftcntdb.asx| defaultcontentdb.aspx| | 6243| 12-Apr-21| 03:36 \nhealrepo.asx| healthreport.aspx| | 6499| 12-Apr-21| 03:36 \nincemail.asx| incomingemail.aspx| | 22663| 12-Apr-21| 03:36 \nirmadmin.asx| irmadmin.aspx| | 8804| 12-Apr-21| 03:36 \nlogusage.asx| logusage.aspx| | 14555| 12-Apr-21| 03:36 \nmetrics.asx| metrics.aspx| | 15403| 12-Apr-21| 03:36 \nofadmin.asx| officialfileadmin.aspx| | 13839| 12-Apr-21| 03:36 \nprivacy.asx| privacy.aspx| | 10182| 12-Apr-21| 03:36 \nslctcfaz.asx| selectcrossfirewallaccesszone.aspx| | 5643| 12-Apr-21| 03:36 \nsvcappcn.asx| serviceapplicationconnect.aspx| | 5027| 12-Apr-21| 03:37 \nsiteex.asx| siteandlistexport.aspx| | 12538| 12-Apr-21| 03:36 \nsitebaks.asx| sitebackuporexportstatus.aspx| | 10389| 12-Apr-21| 03:36 \nsitecbac.asx| sitecollectionbackup.aspx| | 10764| 12-Apr-21| 03:37 \nsitequot.asx| sitequota.aspx| | 24455| 12-Apr-21| 03:36 \nspscrstg.asx_0002| spsecuritysettings.aspx| | 7731| 12-Apr-21| 03:36 \nunatcdb.asx| unattacheddbselect.aspx| | 6322| 12-Apr-21| 03:37 \nuser_solution.asx| usersolutions.aspx| | 9571| 12-Apr-21| 03:37 \nlightbox.asx| lightbox.aspx| | 10265| 12-Apr-21| 03:44 \ndialog.mas| dialog.master| | 13033| 12-Apr-21| 03:34 \nshare.asx| share.aspx| | 47815| 12-Apr-21| 03:44 \nupload.asx_1| upload.aspx| | 17828| 12-Apr-21| 03:44 \nversions.asx| versions.aspx| | 37378| 12-Apr-21| 03:44 \nwss.rsx| wss.resx| | 762444| 13-Apr-21| 07:55 \nofadmin.aspx_tenantadmin| ta_officialfileadmin.aspx| | 11593| 12-Apr-21| 03:48 \nvwstyles.xsl| vwstyles.xsl| | 131251| 12-Apr-21| 03:45 \nowstimer.exe_0001| owstimer.exe| 16.0.10374.20000| 80808| 13-Apr-21| 07:57 \nmicrosoft.extensions.dependencyinjection.abstractions.1.0.0.dll| microsoft.extensions.dependencyinjection.abstractions.dll| 1.0.0.20622| 35728| | \nupdate_microsoft.extensions.dependencyinjection.abstractions.1.0.0.dll| microsoft.extensions.dependencyinjection.abstractions.dll| 1.0.0.20622| 35728| 12-Apr-21| 03:32 \nmicrosoft.extensions.dependencyinjection.1.0.0.dll| microsoft.extensions.dependencyinjection.dll| 1.0.0.20622| 37280| | \nupdate_microsoft.extensions.dependencyinjection.1.0.0.dll| microsoft.extensions.dependencyinjection.dll| 1.0.0.20622| 37280| 12-Apr-21| 03:31 \nmicrosoft.odata.core.7.0.0.dll| microsoft.odata.core.dll| 7.0.0.0| 1395624| | \nupdate_microsoft.odata.core.7.0.0.dll| microsoft.odata.core.dll| 7.0.0.0| 1395624| 12-Apr-21| 03:31 \nmicrosoft.odata.edm.7.0.0.dll| microsoft.odata.edm.dll| 7.0.0.0| 780184| | \nupdate_microsoft.odata.edm.7.0.0.dll| microsoft.odata.edm.dll| 7.0.0.0| 780184| 12-Apr-21| 03:32 \nmicrosoft.spatial.7.0.0.dll| microsoft.spatial.dll| 7.0.0.0| 135600| | \nupdate_microsoft.spatial.7.0.0.dll| microsoft.spatial.dll| 7.0.0.0| 135600| 12-Apr-21| 03:31 \nmicrosoft.vroom.sharepoint.dll| microsoft.vroom.sharepoint.dll| 16.0.10374.20000| 623544| 13-Apr-21| 07:55 \nsystem.collections.immutable.1.2.0.dll| system.collections.immutable.dll| 1.0.24212.01| 174016| | \nupdate_system.collections.immutable.1.2.0.dll| system.collections.immutable.1.2.0.dll| 1.0.24212.01| 174016| 12-Apr-21| 03:32 \nsystem.web.http.owin.5.2.3.dll| system.web.http.owin.dll| 5.2.30128.0| 64400| | \nupdate_system.web.http.owin.5.2.3.dll| system.web.http.owin.dll| 5.2.30128.0| 64400| 12-Apr-21| 03:32 \nsystem.web.odata.6.0.0.dll| system.web.odata.dll| 6.0.40914.0| 779688| | \nupdate_system.web.odata.6.0.0.dll| system.web.odata.dll| 6.0.40914.0| 779688| 12-Apr-21| 03:32 \nspwriter.exe_0001| spwriter.exe| 16.0.10374.20000| 51136| 13-Apr-21| 07:55 \nstswel.dll| stswel.dll| 16.0.10374.20000| 3670472| 13-Apr-21| 07:58 \nstswfacb.dll| microsoft.sharepoint.workflowactions.dll| 16.0.10374.20000| 312776| 13-Apr-21| 07:58 \nstswfact.dll| microsoft.sharepoint.workflowactions.dll| 16.0.10374.20000| 312776| 13-Apr-21| 07:58 \nsts.workflows.dll| microsoft.sharepoint.workflows.dll| 16.0.10374.20000| 65464| 13-Apr-21| 07:58 \nie50up.debug.js| ie50up.debug.js| | 155104| 13-Apr-21| 07:57 \nie50up.js| ie50up.js| | 81713| 13-Apr-21| 07:57 \nie55up.debug.js| ie55up.debug.js| | 154298| 13-Apr-21| 07:57 \nie55up.js| ie55up.js| | 81174| 13-Apr-21| 07:57 \nnon_ie.debug.js| non_ie.debug.js| | 102961| 13-Apr-21| 07:57 \nnon_ie.js| non_ie.js| | 60386| 13-Apr-21| 07:57 \nbpstd.debug.js| bpstd.debug.js| | 8308| 13-Apr-21| 07:55 \nbpstd.js| bpstd.js| | 4687| 13-Apr-21| 07:55 \nctp.debug.js| ctp.debug.js| | 8054| 13-Apr-21| 07:55 \nctp.js| ctp.js| | 4242| 13-Apr-21| 07:55 \ncvtp.debug.js| cvtp.debug.js| | 5066| 13-Apr-21| 07:55 \ncvtp.js| cvtp.js| | 2702| 13-Apr-21| 07:55 \nitp.debug.js| itp.debug.js| | 13120| 13-Apr-21| 07:55 \nitp.js| itp.js| | 9812| 13-Apr-21| 07:55 \nxtp.debug.js| xtp.debug.js| | 3605| 13-Apr-21| 07:55 \nxtp.js| xtp.js| | 1799| 13-Apr-21| 07:55 \nconversion.office.msosvgwin32server.dll| msosvgwin32server.dll| 16.0.10374.20000| 1799608| 13-Apr-21| 07:58 \nppt.conversion.msosvgwin32server.dll| msosvgwin32server.dll| 16.0.10374.20000| 1799608| 13-Apr-21| 07:58 \nppt.edit.msosvgwin32server.dll| msosvgwin32server.dll| 16.0.10374.20000| 1799608| 13-Apr-21| 07:58 \nosrv_sandbox.dll| microsoft.office.server.sandbox.dll| 16.0.10374.20000| 761296| 13-Apr-21| 07:56 \nmicrosoft.office.web.sandbox.dll| microsoft.office.web.sandbox.dll| 16.0.10374.20000| 761288| 13-Apr-21| 07:56 \nsts_sandbox.dll| microsoft.sharepoint.sandbox.dll| 16.0.10374.20000| 761288| 13-Apr-21| 07:56 \nvisfilt.dll.x64| visfilt.dll| 16.0.10374.20000| 6143424| 13-Apr-21| 07:58 \nvsrvwfe.dll| microsoft.office.visio.server.dll| 16.0.10374.20000| 2023864| 13-Apr-21| 07:57 \nvsrvvgs.dll| microsoft.office.visio.server.graphicsserver.dll| 16.0.10374.20000| 1299376| 13-Apr-21| 07:57 \nvisioserver.vutils.dll| vutils.dll| 16.0.10374.20000| 3149200| 13-Apr-21| 07:56 \noffice365icons.eot| office365icons.eot| | 84528| | \noffice365icons_1.eot| office365icons.eot| | 84528| 21-Mar-21| 04:26 \nsts_odspnextnewux1f1ebb360d2bde34a50cf953c975391e| createsite.js| | 1072105| 21-Mar-21| 05:43 \nsts_odspnextnewux1efa61166de43c71668b949c99f0686b| listitemformdeferred.js| | 2261447| 10-Apr-21| 08:03 \nsts_odspnextnewuxcd202787c8a8cb28e2c71ee818995ab3| listitemformexecutors.js| | 618554| 10-Apr-21| 08:03 \nsts_odspnextnewuxe8f363779e230efb9d852eceace8ab24| listitemformreactcontrols.js| | 199950| 10-Apr-21| 08:03 \nsts_odspnextnewux71d8b89e6d9d95995887b0a27dbc8f99| listitemformscenario.js| | 882914| 10-Apr-21| 08:03 \nsts_odspnextnewuxbe3313501487c79fe05e26c262deaaa9| createsite.json| | 43509| 10-Apr-21| 08:03 \nsts_odspnextnewux73bf67ca708ed0b9bbee05da7d4ab95b| listitemform.json| | 178963| 10-Apr-21| 08:03 \nodbonedrive.json| odbonedrive.json| | 359933| 10-Apr-21| 08:03 \nsts_odspnextnewux0caa67c96a8a488d88a0b64e58cf6219| recyclebin.json| | 190098| 10-Apr-21| 08:03 \nsts_odspnextnewux82ec74261e20424f9653d60d8846afce| sitehub.json| | 225442| 10-Apr-21| 08:03 \nsts_odspnextnewuxc2feb86763199de55a499729d395cb83| splist.json| | 302157| 10-Apr-21| 08:03 \nsts_odspnextnewuxc4da3cf2e6b1ad11477e32ac2c90cea6| odbdeferred.js| | 2425266| 10-Apr-21| 08:03 \nsts_odspnextnewux308f9878bc3bd35d6e7c02477ff10b6f| odbdeferredcontrols.js| | 690377| 10-Apr-21| 08:03 \nsts_odspnextnewux9e5f0d05cada29614b74c28d9065e102| odbexecutors.js| | 963199| 10-Apr-21| 08:03 \nsts_odspnextnewuxc563bd732bac9201f0dcad0747118e6b| odbfiles.js| | 857033| 21-Mar-21| 05:44 \nsts_odspnextnewux5964abaa1561be691a032b47f1bdd7b4| odbfiles2.js| | 205446| 21-Mar-21| 05:44 \nsts_odspnextnewux8c0380eb9a20542616b7c1feeac0f995| odbonedrive.js| | 678317| 21-Mar-21| 05:44 \nsts_odspnextnewuxc20d13897d513d628243ef8eadce0dfe| odbonedriveapp.js| | 410305| 21-Mar-21| 05:44 \nsts_odspnextnewux6e3d88bd0f1447b264307d9749f011bc| odboneup.js| | 354486| 21-Mar-21| 05:44 \nsts_odspnextnewux4a79707daf48fcca13da03638a9e77b8| odbreactcontrols.js| | 593612| 10-Apr-21| 08:03 \nsts_odspnextnewux57f35b229017c79fd2db2964ca66fbca| odbsites.js| | 149260| 21-Mar-21| 05:44 \nsts_odspnextnewuxdf192495e18fd01667a80b7f5657d569| odbtiles.js| | 261599| 21-Mar-21| 05:44 \nsts_odspnextnewux1a2b15ed274bbfbba6d5eaa8be1efc60| odbuploadmanager.js| | 64717| 21-Mar-21| 05:44 \nsts_odspnextnewux795d12a100cd0691f928c64b88b80240| odrestore.js| | 367704| 21-Mar-21| 05:44 \nsts_odspnextnewuxb04c6bd9af89e0b8de15413f309e7ade| 112x80_blankdocument.png| | 206| 21-Mar-21| 05:44 \nsts_odspnextnewux54576faed46c6dfea9ae9eb039a20d20| 112x80_default_back.png| | 478| 21-Mar-21| 05:44 \nsts_odspnextnewux5283eb8f4cab57bb8fc15650a0d92f99| 112x80_default_front.png| | 774| 21-Mar-21| 05:44 \nsts_odspnextnewux6afbec05ecfc043a474f4964397533b7| 112x80_photo_front.png| | 580| 21-Mar-21| 05:44 \nsts_odspnextnewuxc213e014150d89455dba0fb815be612f| 112x80_photos_back.png| | 645| 21-Mar-21| 05:44 \nsts_odspnextnewuxf9ae978879649d30526534752882f692| 112x80_shadow.png| | 545| 21-Mar-21| 05:44 \nsts_odspnextnewux4c0d7498c1ef7a1534ccb3701897c981| 112x80_shadow_empty.png| | 529| 21-Mar-21| 05:44 \nsts_odspnextnewux9ffcc6e0423cb2cf4d2279bbba952eb4| 72x52_blankdocument.png| | 158| 21-Mar-21| 05:44 \nsts_odspnextnewux322aceb9f2715ebb19952afe869c2d0e| 72x52_default_back.png| | 333| 21-Mar-21| 05:44 \nsts_odspnextnewux7741d42fb8239e3ac5fd1a56cabf10a4| 72x52_default_front.png| | 534| 21-Mar-21| 05:44 \nsts_odspnextnewuxf2d1c3d60bf986902ce0af4a3071dad9| 72x52_photos_back.png| | 426| 21-Mar-21| 05:44 \nsts_odspnextnewuxcace19a340d6a2d63e36484366da4af9| 72x52_photos_front.png| | 467| 21-Mar-21| 05:44 \nsts_odspnextnewux9e87e72501f75739fab4d90fe2fbd053| 72x52_shadow.png| | 447| 21-Mar-21| 05:44 \nsts_odspnextnewux91ea61cfe45f5a4886ea97f8b3e9df0f| 72x52_shadow_empty.png| | 441| 21-Mar-21| 05:44 \nsts_odspnextnewux0c84be7e892dce2fb4ae731c6b9a14ee| folder-large_backplate.png| | 545| 21-Mar-21| 05:44 \nsts_odspnextnewuxb362e9cb71ddd733f36d1adcd6dc7f4d| folder-large_backplate.svg| | 1175| 21-Mar-21| 05:44 \nsts_odspnextnewux404603879511a4af70482fd310157cdd| folder-large_flap_default.svg| | 1195| 21-Mar-21| 05:44 \nsts_odspnextnewux0d134d5b66025651d495eab3555b15d8| folder-large_flap_media.svg| | 1212| 21-Mar-21| 05:44 \nsts_odspnextnewux5c6f7a05c3d558d10d5cc95cd386eadc| folder-large_frontplate_nopreview.png| | 1334| 21-Mar-21| 05:44 \nsts_odspnextnewux6168c5a9d68489dba620e12ff64ba180| folder-large_frontplate_nopreview.svg| | 871| 21-Mar-21| 05:44 \nsts_odspnextnewux838f5a64bacc969feceaa93510aed1b4| folder-large_frontplate_thumbnail.png| | 1597| 21-Mar-21| 05:44 \nsts_odspnextnewux298c9d1a11a533c493ed146a2c555568| folder-large_frontplate_thumbnail.svg| | 871| 21-Mar-21| 05:44 \nsts_odspnextnewux9a5e4bf68c23039c663575b25f34361c| folder-small_backplate.png| | 459| 21-Mar-21| 05:44 \nsts_odspnextnewuxb742d6ff581d9d0e32238529044b9953| folder-small_backplate.svg| | 1156| 21-Mar-21| 05:44 \nsts_odspnextnewux9ced1d81dfe4631d43ef958edc4ba5d0| folder-small_flap_default.svg| | 1177| 21-Mar-21| 05:44 \nsts_odspnextnewux6b6dc99cb33e983665320f56766c7a15| folder-small_flap_media.svg| | 1195| 21-Mar-21| 05:44 \nsts_odspnextnewux04960d6ce0ad6a1742dd535546397b7d| folder-small_frontplate_nopreview.png| | 1057| 21-Mar-21| 05:44 \nsts_odspnextnewux8b0b149721f293226894dec4f36a7ab7| folder-small_frontplate_nopreview.svg| | 773| 21-Mar-21| 05:44 \nsts_odspnextnewux86f9124932bf14a49d845a4757f76a02| folder-small_frontplate_thumbnail.png| | 891| 21-Mar-21| 05:44 \nsts_odspnextnewux559328626fe966ab52f042408dfe22f2| folder-small_frontplate_thumbnail.svg| | 770| 21-Mar-21| 05:44 \nsts_odspnextnewux928db2dc492aad740d1dd70509dd229e| lg-bg.svg| | 1176| 21-Mar-21| 05:44 \nsts_odspnextnewux20c4a9a1c94fd22a3e33ee82a7305fea| lg-fg.svg| | 1013| 21-Mar-21| 05:44 \nsts_odspnextnewux3a20f7582f17dcc933da585ad75d025c| lg-fg-media.svg| | 1013| 21-Mar-21| 05:44 \nsts_odspnextnewuxf7b61e9dacc1e0386920e7c35976959e| s-ldefaultback.png| | 333| 21-Mar-21| 05:44 \nsts_odspnextnewux82651529693d43a777ae3f006def616d| s-ldefaultfront.png| | 534| 21-Mar-21| 05:44 \nsts_odspnextnewuxc423a1a10d519af4a14833af6ed30ce6| s-lphotoback.png| | 426| 21-Mar-21| 05:44 \nsts_odspnextnewux97119f0acfe0408d546bafccb8724965| s-lphotosfront.png| | 467| 21-Mar-21| 05:44 \nsts_odspnextnewux8771c0695903e8f54bb795fb35613332| s-lthroughlgblankdocument.png| | 158| 21-Mar-21| 05:44 \nsts_odspnextnewuxa1cb3cf25c598e5511ecaff055354c3c| sm-bg.svg| | 1129| 21-Mar-21| 05:44 \nsts_odspnextnewux95ebb686e4776792d10fa31736128156| sm-fg.svg| | 888| 21-Mar-21| 05:44 \nsts_odspnextnewux41493385163ad6f1a33a68c9d1eaaeb8| sm-fg-media.svg| | 866| 21-Mar-21| 05:44 \nsts_odspnextnewux3ef65dc44133824821784517fcf5325e| vault-lg.svg| | 1985| 21-Mar-21| 05:44 \nsts_odspnextnewuxc7a3c1c96228bf1ee9da4e90a476bea4| vault-lg-open.svg| | 2886| 21-Mar-21| 05:44 \nsts_odspnextnewux30314ad6b431d143c7812e0e6ee061fd| vault-sm.svg| | 1779| 21-Mar-21| 05:44 \nsts_odspnextnewux8c09d3d1ffa7076c696c868f28ca7261| vault-sm-open.svg| | 2901| 21-Mar-21| 05:44 \nsts_odspnextnewux63558fb05c0db532a9cbca7fc29d683a| xxxxl-xlblankdocument.png| | 206| 21-Mar-21| 05:44 \nsts_odspnextnewuxf248dcb43a7d768d9084f753cfb0d6ed| xxxxl-xldefaultback.png| | 478| 21-Mar-21| 05:44 \nsts_odspnextnewux80120c82b98dbc4ae60f63348f0ac154| xxxxl-xldefaultfront.png| | 774| 21-Mar-21| 05:44 \nsts_odspnextnewux83577380a0fa4d4f9973205858ace2dc| xxxxl-xlphotoback.png| | 645| 21-Mar-21| 05:44 \nsts_odspnextnewux26dcbd17f5b4b267c7bdc6eabef72c6a| xxxxl-xlphotofront.png| | 580| 21-Mar-21| 05:44 \nsts_odspnextnewux52a3d4a744eb827f1450e9d405752c66| folder-large_backplate.svg| | 2420| 21-Mar-21| 05:44 \nsts_odspnextnewuxad6ea3e5246b46c958c2e04a479f99cd| folder-large_flap_default.svg| | 2365| 21-Mar-21| 05:44 \nsts_odspnextnewux7dc016ac879592ba2092550f8b12a89d| folder-large_flap_media.svg| | 2361| 21-Mar-21| 05:44 \nsts_odspnextnewux4f8b457703336304e1deb55d24cad97b| folder-large_frontplate_nopreview.svg| | 2365| 21-Mar-21| 05:44 \nsts_odspnextnewuxaad5b2797a49bebdadde74a8c31d315f| folder-large_frontplate_thumbnail.svg| | 2361| 21-Mar-21| 05:44 \nsts_odspnextnewuxf4d538c2b1a98fb4eaf08b79d265b545| folder-small_backplate.svg| | 2307| 21-Mar-21| 05:44 \nsts_odspnextnewuxaa3f1f457553f8558e0f1eac32f1a024| folder-small_flap_default.svg| | 2228| 21-Mar-21| 05:44 \nsts_spclientnewuxa61f5e0f461e05cce0e0c856fdaae280| sp-blogs-webpart-bundle.js| | 138928| 10-Apr-21| 08:03 \nsts_spclientnewuxf5d396401fea052502b6aae89b8cc207| sp-canvas.js| | 304959| 10-Apr-21| 08:03 \nsts_spclientnewuxacbcfd1635aafc26d7fa34d3a4170557| sp-carousel-layout.js| | 74688| 10-Apr-21| 08:03 \nsts_spclientnewux22d4383e576bd2d0767efe61a9b0177f| sp-classic-page-assembly.js| | 1528061| 10-Apr-21| 08:03 \nsts_spclientnewux687ed0916c9953c4eb72b0f5cd6905e1| sp-compactcard-layout.js| | 26189| 10-Apr-21| 08:03 \nsts_spclientnewux3fd286c73a51e55671b2cf05ad879fe4| sp-component-layouts.js| | 193103| 10-Apr-21| 08:03 \nsts_spclientnewux6d0b88b1fc07d52bfd5ed0e7ffd2ff96| sp-component-utilities.js| | 106926| 10-Apr-21| 08:03 \nsts_spclientnewuxf9e26c8ba0232226f164fb3134158861| sp-connector-webpart.js| | 137981| 10-Apr-21| 08:03 \nsts_spclientnewuxaeab4a7dad255efb982d8cc6384a6b30| sp-contentrollup-webpart-bundle.js| | 226371| 10-Apr-21| 08:03 \nsts_spclientnewux2a2fc2a92e0cb8cd022d363ea1786ae4| sp-custommessageregion-bundle.js| | 34510| 10-Apr-21| 08:03 \nsts_spclientnewuxc80a54337999c221a2752d525a9f98ac| sp-dataproviders.js| | 95993| 10-Apr-21| 08:03 \nsts_spclientnewuxd14e8603d99cfdea0f8636f109640add| sp-datetimepicker.js| | 105535| 10-Apr-21| 08:03 \nsts_spclientnewux294ffd36afbed5a9fdb51794f4f3a730| sp-default-assembly.js| | 703251| 10-Apr-21| 08:03 \nsts_spclientnewuxe526f3106af18bfd9a893c145a68bea1| sp-divider-webpart-bundle.js| | 32150| 10-Apr-21| 08:03 \nsts_spclientnewux6c85212e5fd53659abdaac84362ead1f| sp-documentembed-webpart-bundle.js| | 97121| 10-Apr-21| 08:03 \nsts_spclientnewuxc67750e80ee512c39aae0f51156cc4c5| sp-embed-webparts-bundle.js| | 43199| 10-Apr-21| 08:03 \nsts_spclientnewux960f55d92c073ad967c1d41757c1f0a8| sp-events-webpart-bundle.js| | 71224| 10-Apr-21| 08:03 \nsts_spclientnewuxe983fe94f37bdad72135b55a29225aed| sp-forms-webpart-bundle.js| | 61656| 10-Apr-21| 08:03 \nsts_spclientnewuxf19a838e191127967cd29ae6b20ab799| sp-groupcalendar-webpart-bundle.js| | 133450| 10-Apr-21| 08:03 \nsts_spclientnewuxa591d003a7a8c3afca3c8688ad401ea0| sp-hero-webpart-bundle.js| | 128411| 10-Apr-21| 08:03 \nsts_spclientnewux772296c19fc27e1b6f18d28759f2ba5b| sp-html-embed.js| | 40476| 10-Apr-21| 08:03 \nsts_spclientnewux8f461cff81c07d944621f876e997777e| sp-image-gallery-webpart-bundle.js| | 81367| 10-Apr-21| 08:03 \nsts_spclientnewux2d92f617d4e9cc7ec385e0e500a3d7b2| sp-image-webpart-bundle.js| | 105611| 10-Apr-21| 08:03 \nsts_spclientnewux42e703f43e251f868d972f61dafd921e| sp-linkpreview-webpart-bundle.js| | 66341| 10-Apr-21| 08:03 \nsts_spclientnewux49b289bb50fa43774a9d4645eef75e88| sp-list-webpart-bundle.js| | 1031192| 10-Apr-21| 08:03 \nsts_spclientnewux6b8c7c4233559a13836ef1a691ba7023| sp-loader.js| | 147060| 10-Apr-21| 08:03 \nsts_spclientnewux383919f8fe3b958e524c8a635d1e2c2c| sp-loader-assembly.js| | 584557| 10-Apr-21| 08:03 \nsts_spclientnewuxe842d74f8bb0760b55d7f43f35d0d7a7| sp-newsfeed-webpart-bundle.js| | 136805| 10-Apr-21| 08:03 \nsts_spclientnewux11d2e484811a186abfb7f9a6c7275fd4| sp-newsreel-webpart-bundle.js| | 136797| 10-Apr-21| 08:03 \nsts_spclientnewuxe2e58fc5fb56b66cddf843e55ff5f992| sp-news-webpart-bundle.js| | 136619| 10-Apr-21| 08:03 \nsts_spclientnewuxc21a3246bdf5a3aa770903ed6fd493ee| sp-pages.js| | 493903| 10-Apr-21| 08:03 \nsts_spclientnewuxb3b4f7cd0e237860f1b8fdbe1372826e| sp-pages-assembly.js| | 2562127| 10-Apr-21| 08:03 \nsts_spclientnewuxb7c159038749343c1c4b0ec9f2deec4c| sp-pages-core.js| | 59295| 10-Apr-21| 08:03 \nsts_spclientnewuxb3342cfbf53938dec6fdf773f6adeebc| sp-people-webparts-bundle.js| | 163839| 10-Apr-21| 08:03 \nsts_spclientnewuxb501aed454e9ea1b719ba92103130738| sp-planner-webpart-bundle.js| | 3143147| 21-Mar-21| 05:44 \nsts_spclientnewuxea46ce84a74da087564f5d905acd4e56| sp-powerapps-webpart.js| | 24084| 10-Apr-21| 08:03 \nsts_spclientnewux22fad59d46fcfec7745b173cc20fd92d| sp-queryfilter.js| | 141726| 10-Apr-21| 08:03 \nsts_spclientnewuxec0d18f646f918f9cae4bd08ccdc09ab| sp-quickchart-webpart-bundle.js| | 255118| 10-Apr-21| 08:03 \nsts_spclientnewux0bbc1a9825e04eb5a37f62f2a09d2dbf| sp-quick-links-webpart.js| | 95055| 10-Apr-21| 08:03 \nsts_spclientnewux113384fd2f31fde205b8bf2f79ccdcd3| sp-siteactivity-webpart-bundle.js| | 195003| 10-Apr-21| 08:03 \nsts_spclientnewux2f7f2f92075f659c5926320cfab3f096| sp-sitepicker.js| | 44819| 10-Apr-21| 08:03 \nsts_spclientnewux6c3d8d275dd7351021418bffbebe3d8c| sp-spacer-webpart-bundle.js| | 44319| 10-Apr-21| 08:03 \nsts_spclientnewuxf5437647b691243399470c6a80d66804| sp-title-region-webpart.js| | 129204| 10-Apr-21| 08:03 \nsts_spclientnewuxb200a6283a80b8a6b4ee220419563723| sp-toolbox.js| | 31106| 10-Apr-21| 08:03 \nsts_spclientnewux3436740e82f30185ab432f7dbe7eed84| sp-twitter-webpart-bundle.js| | 44259| 10-Apr-21| 08:03 \nsts_spclientnewux084c8b925815606929921fa578f05539| sp-webpart-application-assembly.js| | 1523100| 10-Apr-21| 08:03 \nsts_spclientnewuxf9d542f5e7a1ffba716f8cf63efa490b| sp-webpart-base.js| | 106452| 10-Apr-21| 08:03 \nsts_spclientnewux1113dc0b40c4f62ba0b2c0cbbc272713| sp-webpart-shared.js| | 151404| 10-Apr-21| 08:03 \nsts_spclientnewuxf6f4d7aff6b346521ef692276ec4c4c6| sp-webpart-workbench.js| | 51898| 10-Apr-21| 08:03 \nsts_spclientnewux96fbeacb80b41e044617bbe3fade4c6c| sp-webpart-workbench-assembly.js| | 1920470| 10-Apr-21| 08:03 \nsts_spclientnewuxb936577a0b035ab65bc7e49bd5e6a9ab| sp-yammerembed-webpart-bundle.js| | 144166| 10-Apr-21| 08:03 \nsts_spclientnewux84505203ddf82c3742f2de6283fac55b| docx_16x1_5_053e1e11915d9427b3e53d8afa6a83d0.png| | 585| 21-Mar-21| 05:44 \nsts_spclientnewux162b3a6ca51af753b9bd4843fe72d73e| docx_16x1_5d551916093e87d3ee343537fb8b88a6.png| | 1398| 21-Mar-21| 05:44 \nsts_spclientnewuxf497b0d9739710ab47621ed013958700| docx_16x2_71f9b62260e4b54bc8a4e67432c68025.png| | 627| 21-Mar-21| 05:44 \nsts_spclientnewux0356c36d9372976aa44fa8b66a60aad1| docx_16x3_4147703edb3002728b81f5cfa5a91c48.png| | 800| 21-Mar-21| 05:44 \nsts_spclientnewux79d2445aca482099f6df2e36d89461a0| docx_48x1_5_91acd6ead8deb3ea9c1235e4d4e16bdf.png| | 1029| 21-Mar-21| 05:44 \nsts_spclientnewuxe3a71083330a36a0eabe838a39d0b3c1| docx_48x1_95ded5a67197f256abb3c6dc1fdfd59f.png| | 1800| 21-Mar-21| 05:44 \nsts_spclientnewux0d5db131be96001650ead186260bd110| docx_48x2_64db322bc02431d4fbdbb48c2801d000.png| | 1325| 21-Mar-21| 05:44 \nsts_spclientnewuxcd219fe8c823f0b30359401090f8d8c3| docx_48x3_ff9f50d887901f42b0bee4f7c511f018.png| | 1852| 21-Mar-21| 05:44 \nsts_spclientnewux7cd02027da5448f87eef42787c8915ea| docx_96x1_4d0ad5d46d38513bc8fd478f6a723adf.png| | 2173| 21-Mar-21| 05:44 \nsts_spclientnewuxbde31235d2341bae8e3fb3bd773a2ba3| docx_96x1_5_9366cab6bb01500d444217ccbee74d76.png| | 1697| 21-Mar-21| 05:44 \nsts_spclientnewux157716a601a23bdcc82711713c178f89| docx_96x2_3e32a452a3e65ad09e0cf29a525d8a27.png| | 2124| 21-Mar-21| 05:44 \nsts_spclientnewux62380155bba07e21931cbd4c2c8819ee| docx_96x3_7e372763d14c0826ed8aba9a0fbe3d4f.png| | 3070| 21-Mar-21| 05:44 \nsts_spclientnewux8766926ce4c6eadaf66d6c870efd71a9| dotx_16x1_2b312ced2e9cca5bfe1963b6eb49c2e5.png| | 1360| 21-Mar-21| 05:44 \nsts_spclientnewuxeac0104f583d7aafce09495a9c48b46b| dotx_16x1_5_9587d3f8637ccf6f6dd8ca5748013923.png| | 516| 21-Mar-21| 05:44 \nsts_spclientnewux3e4c1fa274d624cf42c4645e65569671| dotx_16x2_c23c391373a8f96945cdd9d32cb24dbc.png| | 612| 21-Mar-21| 05:44 \nsts_spclientnewux403751d49b9ba3d93d637a1ea4e74154| dotx_16x3_4130e8847068434fa8b94072182f0e5c.png| | 831| 21-Mar-21| 05:44 \nsts_spclientnewuxe9572cf13d1e19a8e961628bb68132fb| dotx_48x1_5_492df226937a5fb3e5acbd7d66adfac3.png| | 988| 21-Mar-21| 05:44 \nsts_spclientnewux14208fd33bfe8ed0a7d7b0fdc85b9b92| dotx_48x1_73701fd95ef5e319da36d350bf2068e2.png| | 1755| 21-Mar-21| 05:44 \nsts_spclientnewuxde231664a23f9a0c373482ef0f5be921| dotx_48x2_cd8f82b2a79f3c22a3fe2d5e9ffe252b.png| | 1274| 21-Mar-21| 05:44 \nsts_spclientnewux8e1dc10ad2d154ea949b6e42bbfb7088| dotx_48x3_14dec4e5ad960aa52adcb43f5d4ad5c6.png| | 1790| 21-Mar-21| 05:44 \nsts_spclientnewuxa4f5eebc187758a2238b72e64dffedf3| dotx_96x1_5_5d1102527d493c61185a7e7a62a788ba.png| | 1578| 21-Mar-21| 05:44 \nsts_spclientnewuxe10968b7ab0b4844174297af0272e3ce| dotx_96x1_a1017900087f3cc70d726dee36a76994.png| | 2124| 21-Mar-21| 05:44 \nsts_spclientnewux8abca0bc280247d0ed7bd9e12b8b9f71| dotx_96x2_bdc47178af937d029e28a3e7ce249ddd.png| | 2061| 21-Mar-21| 05:44 \nsts_spclientnewux268eea4f384766e3832393e1b96ac383| dotx_96x3_33a48dc068889f7bd8ea72c90b977910.png| | 2970| 21-Mar-21| 05:44 \nsts_spclientnewux80dae808de3b5078b4efc4fb29865793| e377ea37-9047-43b9-8cdb-a761be2f8e09.json| | 13427| 10-Apr-21| 08:03 \nsts_spclientnewuxab7b1df6c15b0a294a30492e9ac8fae1| eb95c819-ab8f-4689-bd03-0c2d65d47b1f.json| | 14590| 10-Apr-21| 08:03 \nsts_spclientnewuxa4a2550216affc2874c3e81dc4018f2c| excel_16x1_5_3909e6cfb9ed574b7a4038703354688b.png| | 446| 21-Mar-21| 05:44 \nsts_spclientnewuxbe05b957f12fc509273423f56e4510e1| excel_16x1_9f85f99d3a24a45edf7c45acfc1505df.png| | 349| 21-Mar-21| 05:44 \nsts_spclientnewux9e612331e3d566da56e363a3bb8869d7| excel_16x2_b42c81daea3f36a79f7d1274c8e163a0.png| | 591| 21-Mar-21| 05:44 \nsts_spclientnewuxd355e5cb62bc4a671aba8c58b62f87eb| excel_16x3_0f3f65dc466cb70bd4da4c627a14dbb7.png| | 1387| 21-Mar-21| 05:44 \nsts_spclientnewux06bac27fbe0d073ba86b1000355ab67a| excel_48x1_0f3f65dc466cb70bd4da4c627a14dbb7.png| | 1387| 21-Mar-21| 05:44 \nsts_spclientnewux62af1d1b6aa82699a64db860e9300a47| excel_48x1_5_60704c48d93d26a884fa59095704a159.png| | 2199| 21-Mar-21| 05:44 \nsts_spclientnewux4776fee8e784a7fec675e8d974476340| excel_48x2_52ad507872842023c6dfc3bfb86b7924.png| | 2948| 21-Mar-21| 05:44 \nsts_spclientnewux79c23087af66f18bfc0cde56c79b0c95| excel_48x3_d9ad58e9a2a90c784d10a1c77f614050.png| | 4729| 21-Mar-21| 05:44 \nsts_spclientnewuxf0412560dd2e7a56af9f87852c333535| excel_96x1_5_0a0bc8cf913b213485b2056e7c75b6b6.png| | 4704| 21-Mar-21| 05:44 \nsts_spclientnewuxb5df036c286cf302d5f77402206293b8| excel_96x1_826f376978b7f5c5d84f01b0c175cdf5.png| | 2964| 21-Mar-21| 05:44 \nsts_spclientnewuxf1b335926db7c5a5cbeb471c59ed7cb5| excel_96x2_4962366bac5f3f0710950f368a5c487a.png| | 5950| 21-Mar-21| 05:44 \nsts_spclientnewuxbed36bf334a09b5c725c5113fe43a669| excel_96x3_80e5831f5dbb4a95bd15401feedd5e10.png| | 10107| 21-Mar-21| 05:44 \nsts_spclientnewux8ef36081a346aba067e958bbb3d5a845| f6fdf4f8-4a24-437b-a127-32e66a5dd9b4.json| | 13416| 10-Apr-21| 08:03 \nsts_spclientnewuxcb869d957d4e64318530b63e610d75f7| f92bf067-bc19-489e-a556-7fe95f508720.json| | 18015| 10-Apr-21| 08:03 \nsts_spclientnewuxf2d1a7f35d2ba5854680149e140e38f6| fabricmdl2icons-2.23_1850f50d510fc4b7fd7bf4889ea7da21.ttf| | 187984| 21-Mar-21| 05:44 \nsts_spclientnewuxdf3482c3e74fc57578122ab0b6dec981| fabricmdl2icons-2.23_af4a0833031abba2a3d0a55ee0add2c6.woff2| | 71744| 21-Mar-21| 05:44 \nsts_spclientnewuxca45653d077dd8f8160018077e0a9432| fabricmdl2icons-2.23_e312e6548dd1dd9ba24d9b96a7f1fd09.woff| | 94656| 21-Mar-21| 05:44 \nsts_spclientnewuxdf217af2c449434cc978237da49860dc| fabricmdl2icons-2.53_3200458db3cc6a10921a7a82c6711d45.woff| | 134252| 21-Mar-21| 05:44 \nsts_spclientnewux37401c5f5c8c6e0bebcbbd737692b878| fabricmdl2icons-2.53_4fe7efcad26d25b8f508ef80a91ee73b.woff2| | 105000| 21-Mar-21| 05:44 \nsts_spclientnewuxde72b466d6fbb352015a237d127bef27| fabricmdl2icons-2.53_9632e65543d2acfd1e277e6a3d28e601.ttf| | 263324| 21-Mar-21| 05:44 \nsts_spclientnewux0567dea9d8e26f0c4e57d2d730e1498c| infopath_16x1_429365d97899093c0d0662620631e182.png| | 1426| 21-Mar-21| 05:44 \nsts_spclientnewux038964b23bcd894601107c09748b97cc| infopath_16x1_5_6c56b62ff5748eeb26efc44ee009d777.png| | 1482| 21-Mar-21| 05:44 \nsts_spclientnewux1ae82f61b693dcab6c352906f41f3f51| infopath_16x2_7af4b21d5e1a0012598ebf077f77e017.png| | 707| 21-Mar-21| 05:44 \nsts_spclientnewux0af56f37475008374274f5244ea2e15b| infopath_16x3_1d081b470135a6f3bd25666fefcacf67.png| | 941| 21-Mar-21| 05:44 \nsts_spclientnewux665c4b4ce5c1706a93698aeb39ba1d95| infopath_48x1_5_d9a2431e0e59ba88d725aa970fc75914.png| | 2098| 21-Mar-21| 05:44 \nsts_spclientnewux2212cab7b69805d9409e27a5547b34d0| infopath_48x1_ca1a6dbcc5b7551d7cfee910fd7bbf5b.png| | 1920| 21-Mar-21| 05:44 \nsts_spclientnewuxe7a0c94dfa417ef96de11d9bd61843c1| infopath_48x2_92a5156284920439a13a11ca89a7ab4d.png| | 1373| 21-Mar-21| 05:44 \nsts_spclientnewux1e552c7812e30d87e9bb64d1d7874ab6| infopath_48x3_d971a75bbd733d3a4b9a05db484f993f.png| | 2059| 21-Mar-21| 05:44 \nsts_spclientnewux982d814efce20be6ecf6f0fa03fa0edd| infopath_96x1_34d96f820a628f53a9edb0b99382be9f.png| | 2539| 21-Mar-21| 05:44 \nsts_spclientnewux1a2f5b5573f5828549078a2453523a56| infopath_96x1_5_b8b5705b43faeec64c45815e2844d36a.png| | 2819| 21-Mar-21| 05:44 \nsts_spclientnewux2b11c4cc6340eb3c3df894816536da09| infopath_96x2_c5d38e886dc3a11de2e6e9d4210547c1.png| | 2577| 21-Mar-21| 05:44 \nsts_spclientnewux9b0bc6b412f6cfd07baa9d1263011e7b| infopath_96x3_76ec1760c3b91989adaa91037c71e809.png| | 3775| 21-Mar-21| 05:44 \nsts_spclientnewux967f273dd90b110453dab8b878d2bf81| leelawadeeui-bold_6cdc55f3988d8090f2582b1ade83df2b.woff| | 43896| 21-Mar-21| 05:44 \nsts_spclientnewux6f96908d468281085d3ab22367dfb75d| leelawadeeui-bold_a047f883e11cf168d54af7c8d5a48c79.woff2| | 38304| 21-Mar-21| 05:44 \nsts_spclientnewux2fc3af47d18316f6ee8767e276529643| leelawadeeui-regular_46e5f18647acd852fbe0ad149e166b95.woff| | 47832| 21-Mar-21| 05:44 \nsts_spclientnewux5f3a6e0eb23d3b0829be6b035a29edf7| leelawadeeui-regular_69b84090e124679cc8440393db24f914.woff2| | 41808| 21-Mar-21| 05:44 \nsts_spclientnewuxa17c77c2eec3801e69af1a999290d8bc| leelawadeeui-semilight_13764acab069edc637f71683b8cd1686.woff2| | 37772| 21-Mar-21| 05:44 \nsts_spclientnewux31bff09f85d42d6fffad6c686e881c70| leelawadeeui-semilight_b1fe5c446bd5de63c376ad54fb2e6d90.woff| | 43820| 21-Mar-21| 05:44 \nsts_spclientnewux2e8f0649b2b51d464fb6d12bb368a21f| spclientmanifests.json| | 842362| 10-Apr-21| 08:04 \nsts_spclientnewux99f5dd30cc1620deb2450f752eb89610| mpp_16x1_1010b4ea50a744c4e6efc4958109ef6d.png| | 1387| 21-Mar-21| 05:45 \nsts_spclientnewux2827d59862ac8cc6b8d4241a4796434f| mpp_16x1_5_bbb449dc2ef5a9443510c7fb6fb5b3b6.png| | 500| 21-Mar-21| 05:45 \nsts_spclientnewux56c9db207bc878f403f7678316782972| mpp_16x2_dec709baaefb24a2a80842f20bdf7f19.png| | 574| 21-Mar-21| 05:45 \nsts_spclientnewux4f98f7ef7530392632f9b07bd019254f| mpp_16x3_9e6e57964ff544dbd15aeaceda5bca2d.png| | 709| 21-Mar-21| 05:45 \nsts_spclientnewuxf87a55d678afae72ca59f187035aef67| mpp_48x1_5_82574f1537bc47111b0a63c5e126196c.png| | 828| 21-Mar-21| 05:45 \nsts_spclientnewuxaa9a7cb931ea4c2634faa835e6c17631| mpp_48x1_b904e94455dd03895546f41dcb9bd306.png| | 1686| 21-Mar-21| 05:45 \nsts_spclientnewux7102fab14b868f195aff00e731e8502d| mpp_48x2_13ade8dd0d4dfc9af24f78a2896748dc.png| | 1851| 21-Mar-21| 05:45 \nsts_spclientnewux0797527f80620130016a08105dda404a| mpp_48x3_ade9155c84598f2b2493940822486f83.png| | 2260| 21-Mar-21| 05:45 \nsts_spclientnewuxf1b07831582cbbe6b36e31b30d3b6bcf| mpp_96x1_5_60d8aac23b7acc5b7344bd40ab34aad8.png| | 1431| 21-Mar-21| 05:45 \nsts_spclientnewuxd9016ef5dc6067a0740b4530aebcc328| mpp_96x1_ab6bc51bee1d4409658ab3424ea7c5b3.png| | 2004| 21-Mar-21| 05:45 \nsts_spclientnewux0884c20268f53dd1c6e6b197df5c18b1| mpp_96x2_41f1145a74ea0d674e8d31fe5e00dfbb.png| | 1698| 21-Mar-21| 05:45 \nsts_spclientnewux93dbd9ac6bc4c891067d76af20c9f63e| mpp_96x3_d2bb13af4c9f4fd5ffe323e630c452f6.png| | 2427| 21-Mar-21| 05:45 \nsts_spclientnewuxf50e8f501255a034483d9e7f2db76afe| mpt_16x1_5_570cafb5d0edad07c5ce99ac7dfdfd06.png| | 467| 21-Mar-21| 05:45 \nsts_spclientnewuxb7257e562cd166c3f2ce42ea5947fb41| mpt_16x1_a90bb595bca3e895610018bd26a8f21c.png| | 1356| 21-Mar-21| 05:45 \nsts_spclientnewux9fb47e4060a1b729d39fbe83d1844768| mpt_16x2_0ed0f313e5053f642851bced03083687.png| | 561| 21-Mar-21| 05:45 \nsts_spclientnewux8daf4980251272a02d39a01ac05b18f9| mpt_16x3_5aa607f0157cd3f7d57b1e7afe242adf.png| | 728| 21-Mar-21| 05:45 \nsts_spclientnewuxed9998e06049d03a0bd8f9d215da1f5b| mpt_48x1_211b603eb5ff1d72c81484cae589e162.png| | 1647| 21-Mar-21| 05:45 \nsts_spclientnewux8fb6b9ce81c2e3063ecd801e2bb4663d| mpt_48x1_5_1be0fc21808475404ff41967da6722ab.png| | 823| 21-Mar-21| 05:45 \nsts_spclientnewux9b631ae49ca71b9a97cef85c874e40e6| mpt_48x2_518133a35ff544b9f8d763ab04b35eb5.png| | 1033| 21-Mar-21| 05:45 \nsts_spclientnewux4f5058682ec6a687217cb426fdf4f4b5| mpt_48x3_6fa74bdefca2e538d0edb1391c18dc8f.png| | 1432| 21-Mar-21| 05:45 \nsts_spclientnewux6598587e9510c16f80b8ad0ebcc0876c| mpt_96x1_5_d7409818dcc9fc24b50904ab22faca20.png| | 1348| 21-Mar-21| 05:45 \nsts_spclientnewuxee880dc0bc0e96ffcf45f85e4c33b8f1| mpt_96x1_5f4846d6cbbe85c44aecabad05817b9f.png| | 1973| 21-Mar-21| 05:45 \nsts_spclientnewuxef8ec71822faf55f1045a4e5be112cee| mpt_96x2_008d41ef196833760b213e20254a48f9.png| | 1661| 21-Mar-21| 05:45 \nsts_spclientnewuxafd1735abf6b97f3c0fc085e251f2678| mpt_96x3_86db70c1212fa230f78630d7e71fb3ab.png| | 2364| 21-Mar-21| 05:45 \nsts_spclientnewuxfc697664cdf725397b9cd73acb9ca971| odp_16x1_0652ef644f639f1625512762417b7d07.png| | 1535| 21-Mar-21| 05:45 \nsts_spclientnewuxc17022bed963ae16743a2e99ee8c7ca5| odp_16x1_5_e6a2231502a4569309c1443476ebc22c.png| | 707| 21-Mar-21| 05:45 \nsts_spclientnewuxef105b9ab2150adaba53f17c793fb090| odp_16x2_ddac034a03a7e58641bf63dcabe97e80.png| | 1670| 21-Mar-21| 05:45 \nsts_spclientnewuxdbca1293f338f13c7bda180e70fbadf2| odp_16x3_06f3a1e1aba2ff65b3b7699517a40cd0.png| | 1094| 21-Mar-21| 05:45 \nsts_spclientnewux56fc39247722e891b42b067652af3007| odp_48x1_5_7e272558574c272eb8588c3f285b7b44.png| | 1152| 21-Mar-21| 05:45 \nsts_spclientnewux3898d55324b7bf255321dd90878bf567| odp_48x1_b62b9212a606bfd73e27a6c20e9813cd.png| | 1896| 21-Mar-21| 05:45 \nsts_spclientnewuxf94f1626c128986797da06bcb23090fd| odp_48x2_f71e3a54f9a149317b468bb872b91f1b.png| | 1395| 21-Mar-21| 05:45 \nsts_spclientnewux065672a6a0fae1ecbde65402f18190c3| odp_48x3_37dd0400edb8d44057b755b0e73dd835.png| | 2003| 21-Mar-21| 05:45 \nsts_spclientnewux697155bc435e1efeed846a7ed0b0c7c3| odp_96x1_5_3d5645dbd7c8063ca69983d226f4f70e.png| | 1922| 21-Mar-21| 05:45 \nsts_spclientnewuxc83a5a142e4e4ec21ffe0048cd51a773| odp_96x1_7ae2c11d295fd44e42034954b05cd868.png| | 2452| 21-Mar-21| 05:45 \nsts_spclientnewux1db21e34914c799e99266990944e8a3d| odp_96x2_93b70e4c3b8f50e6d9146455063e79e0.png| | 2463| 21-Mar-21| 05:45 \nsts_spclientnewuxc7f94a48cd6335579a1b96b2c18390fb| odp_96x3_7b6c678eaddaae13b2620f3d0d913410.png| | 3577| 21-Mar-21| 05:45 \nsts_spclientnewux8bbcce7341376fb01468323d69c148da| ods_16x1_5_655d4bb9e48011acb264766c86093166.png| | 1784| 21-Mar-21| 05:45 \nsts_spclientnewuxe23bab01318c04f9c295c6b39252202e| ods_16x1_bb993b307cab21bd330978c310ca510e.png| | 1603| 21-Mar-21| 05:45 \nsts_spclientnewuxd131303728eb3dd64dc36d644428df15| ods_16x2_30809d3c9ce0a92d0264cdd6e8fdc49c.png| | 1750| 21-Mar-21| 05:45 \nsts_spclientnewuxc2488c67646f04798609242cde5f2635| ods_16x3_da00453de559c4c175ec83e836989945.png| | 1251| 21-Mar-21| 05:45 \nsts_spclientnewux9d37951ebb875fb2004fed8e66e130aa| ods_48x1_5_091e2c6413d0c41305efebdfd233a49b.png| | 2438| 21-Mar-21| 05:45 \nsts_spclientnewux1b78b3513adcec7b33110695f696ce03| ods_48x1_518499ba4faf2fe042434721d1a19d57.png| | 2035| 21-Mar-21| 05:45 \nsts_spclientnewux0853e3f35f4052c59c94fc198281efaf| ods_48x2_752ec3bb85787feb85cd21f376c9efb7.png| | 1621| 21-Mar-21| 05:45 \nsts_spclientnewux75135d1d959cd571dd927a41bc192715| ods_48x3_8fc6fe8163811e3e4afe19a1dea38a17.png| | 2279| 21-Mar-21| 05:45 \nsts_spclientnewux16be39df6279b430152e6c0a03ba263c| ods_96x1_22b133866829a6b4d3e5bb877fb70636.png| | 2605| 21-Mar-21| 05:45 \nsts_spclientnewuxbaa596ef1bc571ecd9c1a45c1587a5b3| ods_96x1_5_606ee559d015baeca21754282f484bc3.png| | 2198| 21-Mar-21| 05:45 \nsts_spclientnewuxa8ea00470118105bd6de6471628360b0| ods_96x2_9eddaa4e76efd2d82caea2103ab63b87.png| | 2778| 21-Mar-21| 05:45 \nsts_spclientnewux0144b072201854403eedd7c9c5924573| ods_96x3_3acc059f00f80a5378ac93531aa3ada5.png| | 4143| 21-Mar-21| 05:45 \nsts_spclientnewux8a9ecec5097c0731077401824e0098ef| odt_16x1_5_5941fb2960d03792ec0afc5c562a4bf2.png| | 763| 21-Mar-21| 05:45 \nsts_spclientnewux97b9b594d6b98a6b9d4e50f652e4c93d| odt_16x1_e5aec88e88cd69be7d2dc453ec079555.png| | 1545| 21-Mar-21| 05:45 \nsts_spclientnewux47c3761a8a542fad0a7605fea55f83ac| odt_16x2_285d5e580470899895ccc3944a3f8f1d.png| | 1744| 21-Mar-21| 05:45 \nsts_spclientnewux2e01511fb90e9b0a926b459d24b9b56c| odt_16x3_c592db34f2de4e39792cfb9d612bfee4.png| | 1163| 21-Mar-21| 05:45 \nsts_spclientnewux6e4397b9982a9f500126d10d58879d4d| odt_48x1_5_a3219473a0734821db9138f63524ed90.png| | 1362| 21-Mar-21| 05:45 \nsts_spclientnewux3c9593d6ac254185c3400c3cce199d3e| odt_48x1_6a445e48f9b78a7113cd39b405ef432a.png| | 2062| 21-Mar-21| 05:45 \nsts_spclientnewuxccbc4692416e0db865991cbc66d9d4b8| odt_48x2_f3f4d46ecf671115a8e0e25badf123b5.png| | 1704| 21-Mar-21| 05:45 \nsts_spclientnewuxf4a92a830eb68a8abaf332ae65072945| odt_48x3_39ac359955b520e643d138738e60f8bb.png| | 2459| 21-Mar-21| 05:45 \nsts_spclientnewux45e1c848b983d857436347558a976b87| odt_96x1_5_579b328615ab8b00a2d9d8fd67714009.png| | 2230| 21-Mar-21| 05:45 \nsts_spclientnewux5047171b02ae6c10000711f1bc531c38| odt_96x1_78c30e583fd92d128b7d0d324fad3314.png| | 2676| 21-Mar-21| 05:45 \nsts_spclientnewuxbf14f6f1bbc5e4c5d4b3e736dcef7e54| odt_96x2_b5c886500d30e344851a3750c511e687.png| | 2896| 21-Mar-21| 05:45 \nsts_spclientnewux11379768c807dc802e5a6d258262f009| odt_96x3_5fbd93972f01f9e1f8b631f66ea194a2.png| | 4316| 21-Mar-21| 05:45 \nsts_spclientnewux0ea4912ad4b6e2a91376daf4efd1d82c| office_16x1_5_ec7699cc55361c66980e465fe32a8782.png| | 734| 21-Mar-21| 05:45 \nsts_spclientnewuxe1b985d81f63b5c9241e3e0fc6e0b94f| office_16x1_a13161719190df10e297a686a21db3d1.png| | 499| 21-Mar-21| 05:45 \nsts_spclientnewux196bf924aed05d6a9c20764e9253bd8f| office_16x2_681d5b444d2f5c50dfc5e55519dc0dcf.png| | 889| 21-Mar-21| 05:45 \nsts_spclientnewux88a04bff1c6a567a9898b9118bb06d49| office_16x3_7b2e74d0e008ac7beb1ff2e4a609ebe8.png| | 1655| 21-Mar-21| 05:45 \nsts_spclientnewux8145791b10da8c8ad6a4955b096578ad| office_48x1_5_09d52490a1253f071723a8284f0ade95.png| | 2790| 21-Mar-21| 05:45 \nsts_spclientnewuxebbcd84e5b2e439912b6c2c5821ad783| office_48x1_7b2e74d0e008ac7beb1ff2e4a609ebe8.png| | 1655| 21-Mar-21| 05:45 \nsts_spclientnewux61055a6fe43eab354281b29b43038514| office_48x2_e5dbaebd9a34133e9399c0329ba4adec.png| | 3926| 21-Mar-21| 05:45 \nsts_spclientnewux5aaa090a1af19ec8b1e5a08ab35e51dd| office_48x3_dcafd0dd73840a7a3a71c183f418b280.png| | 5645| 21-Mar-21| 05:45 \nsts_spclientnewux72526247372a12b7575bac8fb15a61c4| office_96x1_5_b2526be872f607490b9c3e28fcfc8dd1.png| | 5661| 21-Mar-21| 05:45 \nsts_spclientnewuxf8d108fca1408ddf45217cf1c8a48694| office_96x1_e5dbaebd9a34133e9399c0329ba4adec.png| | 3926| 21-Mar-21| 05:45 \nsts_spclientnewux0f4c2843d503dd3a0f0926c07a695e0d| office_96x2_3bfa647cb4efb82d293539717f982232.png| | 7717| 21-Mar-21| 05:45 \nsts_spclientnewux7f6919d17ce7f4625a42666a42b5628a| office_96x3_2419f9561fb44372f4f2a3bd71523638.png| | 11900| 21-Mar-21| 05:45 \nsts_spclientnewuxcdd2fade97e6bd1c609dafc0204d0272| office-ui-fabric-react-bundle.js| | 548732| 10-Apr-21| 08:04 \nsts_spclientnewux8b2ac4bde84da6d035aa8358f61f1dc9| one_16x1_06078ed2327fe826fab79a4ffae33291.png| | 1339| 21-Mar-21| 05:45 \nsts_spclientnewuxb568411ffd089a51ae0c26c31c76bd9a| one_16x1_5_f0d8bec3550e70b86da3b21a3abacf5b.png| | 1426| 21-Mar-21| 05:45 \nsts_spclientnewux698070f1ba57e75ea06ac9be5df12a9f| one_16x2_4c392808ab8cd648309f4c2e95ea0f8c.png| | 476| 21-Mar-21| 05:45 \nsts_spclientnewux16dbf9e92d14dc5e03b94e5b5980ef2d| one_16x3_e8099922d5036fd221885b6f5b05c08f.png| | 639| 21-Mar-21| 05:45 \nsts_spclientnewuxef6ec3e2c2859661d5a40d4cff85c34d| one_48x1_5_a550da06a954af02aaaf84d86a5c3e6e.png| | 1759| 21-Mar-21| 05:45 \nsts_spclientnewux9a4bb0c5b8aa555b7bf9679e0b4cac34| one_48x1_ed0a2d84d5340e67519dc2d69e6dcdd6.png| | 1544| 21-Mar-21| 05:45 \nsts_spclientnewux36c02e6edcf71f57e936683fd7904c5b| one_48x2_2aeba6417765fc0a4406cd734a5b754b.png| | 939| 21-Mar-21| 05:45 \nsts_spclientnewux350fc595907321a38b46e3d58831d165| one_48x3_550ee91b80f33b2238d5245e6eaee8a2.png| | 1222| 21-Mar-21| 05:45 \nsts_spclientnewuxda279aad71c957c44dcf2cc674ddbb31| one_96x1_5_3603283a8f03a6d056b83a195b86cf72.png| | 1249| 21-Mar-21| 05:45 \nsts_spclientnewuxf6cf50fd76a8d6fb1d6dffcac150eb6a| one_96x1_9f6c6f81bf94aa2f33f2954406076981.png| | 1865| 21-Mar-21| 05:45 \nsts_spclientnewux99e374ef4dc8fa72758b6d35beb26f3d| one_96x2_c5f187f69b443e242a74607998f7976a.png| | 2370| 21-Mar-21| 05:45 \nsts_spclientnewux0cbc76d08dc33b6badbbc57049b98bf2| one_96x3_af1f530050d6c5ca00203c3786c2210c.png| | 2949| 21-Mar-21| 05:45 \nsts_spclientnewux49ee3b4403ae588a29b197ab4d054733| onedrive_16x1_5_580964d90840893ec99d7b4588041702.png| | 532| 21-Mar-21| 05:45 \nsts_spclientnewuxde80ec02dfdfa0e1c70d9e990a6431c5| onedrive_16x1_ad200983f29c2ab23c8acceb99a0d609.png| | 391| 21-Mar-21| 05:45 \nsts_spclientnewuxbd4bc9e955beee02e6b79dc899c54599| onedrive_16x2_7eb74d7742b2b04a6cf623993588bd34.png| | 697| 21-Mar-21| 05:45 \nsts_spclientnewux9b37b5e1c9b1676609c346b4fa65f574| onedrive_16x3_937e4efd018fbda0ab8ef6982d9d481c.png| | 2048| 21-Mar-21| 05:45 \nsts_spclientnewuxdb7c4cc78bc4dd4c619d3d59ab9c0b7b| onedrive_48x1_5_9dc787eef493df319215c145a3802e2b.png| | 3280| 21-Mar-21| 05:45 \nsts_spclientnewux171feb5ea1ec9da44952b0bf89f8327a| onedrive_48x1_937e4efd018fbda0ab8ef6982d9d481c.png| | 2048| 21-Mar-21| 05:45 \nsts_spclientnewux8658412fb29198fd07cf23cdd9eac3f5| onedrive_48x2_07d48c7cd2cd28f787c34c4ee69771d6.png| | 4614| 21-Mar-21| 05:45 \nsts_spclientnewux5b814285bf6435da99c84b305ee0d79f| onedrive_48x3_0b0ba8a3e2574cf78aae89a0c975d56b.png| | 7431| 21-Mar-21| 05:45 \nsts_spclientnewuxeee6dd48b6e7e61953bc47e1c37924c3| onedrive_96x1_5_12a4543a7ca269f78b378ca7eb946d2e.png| | 7465| 21-Mar-21| 05:45 \nsts_spclientnewux4b5db9fdf914d1003c0375e9dfc14be7| onedrive_96x1_68050d871c56f6af2de0f63c8db1a096.png| | 4567| 21-Mar-21| 05:45 \nsts_spclientnewux41c549919e77d2b6b0684f0383756cc7| onedrive_96x2_ffa6200db67bbddc7c1edac1ee47dacd.png| | 9335| 21-Mar-21| 05:45 \nsts_spclientnewux723be2ea5c08ebd5ab734773c849d16d| onedrive_96x3_daaffab07ea290aecad69b385f6106d8.png| | 16378| 21-Mar-21| 05:45 \nsts_spclientnewuxaf813f3795c75f76b5be594c15a5445e| onenote_16x1_5_71c029f74226db57a96fa0001910ac7b.png| | 380| 21-Mar-21| 05:45 \nsts_spclientnewuxcee263786432008d4b22488e54062ce7| onenote_16x1_7835f8e3ca8b3a1be9846ce957b71798.png| | 345| 21-Mar-21| 05:45 \nsts_spclientnewux35d6671bb2192c5c1ee942a882ed3568| onenote_16x2_970f30eff687bc1799ded44d6bb17837.png| | 440| 21-Mar-21| 05:45 \nsts_spclientnewuxe97ec67fe131f41593c824c264680383| onenote_16x3_bfa94d3e46a64200286bac0851aff7db.png| | 1348| 21-Mar-21| 05:45 \nsts_spclientnewux53d823030334c3703d200d3f69cd7922| onenote_48x1_5_4b71ceaec9fca977e561e58296fc3886.png| | 2076| 21-Mar-21| 05:45 \nsts_spclientnewuxbe92306b5cee921863d5c602d4a7c0ca| onenote_48x1_bfa94d3e46a64200286bac0851aff7db.png| | 1348| 21-Mar-21| 05:45 \nsts_spclientnewux79e429b1a06f32900c4a036518691680| onenote_48x2_fd4f28fb2ae0bb5d11f8dc0346b62325.png| | 2751| 21-Mar-21| 05:45 \nsts_spclientnewux67b5a4682f6bafa46b100b2b971a9c44| onenote_48x3_478c741b2f7f860be8326e628d59775d.png| | 4462| 21-Mar-21| 05:45 \nsts_spclientnewuxf3d25893c829536715c291859990b221| onenote_96x1_5_f4ec645620b08f74c6922e8d871e6c3e.png| | 4476| 21-Mar-21| 05:45 \nsts_spclientnewuxd1ea998f3e129c37a725a1f393da4186| onenote_96x1_d5a12d216466db180c9ae56ee0176ce0.png| | 2717| 21-Mar-21| 05:45 \nsts_spclientnewux12b6bc9a6d6c3de037b82d23d95cbec6| onenote_96x2_6ae4dd77675879a0fa09a200cbb33585.png| | 5724| 21-Mar-21| 05:45 \nsts_spclientnewux2bc6fad6151043ecaad21cb9ca81dbb0| onenote_96x3_3ffc4eef38c31af32008c861efb51b4e.png| | 9483| 21-Mar-21| 05:45 \nsts_spclientnewux6b799a81dd24a6006c1f1201b8dd7582| onepkg_16x1_227cd84e77c0884fd9049e5407b0318d.png| | 1382| 21-Mar-21| 05:45 \nsts_spclientnewux9717b186430fbb9e61ea827567ccfc91| onepkg_16x1_5_b8b9a6a5b8bb0b9b7ceffbb84b59d888.png| | 1461| 21-Mar-21| 05:45 \nsts_spclientnewux61df94c73bcdc6248fe29c1c9b556964| onepkg_16x2_d03a13ebfe3c0e917e75f0679d7bf8a0.png| | 539| 21-Mar-21| 05:45 \nsts_spclientnewuxf21c9e2a42d732f8456e58106f3b0689| onepkg_16x3_48d3e0456a14956bdbb3e3639f13b782.png| | 706| 21-Mar-21| 05:45 \nsts_spclientnewuxa81dd96aa77e372335d2e20c3677f28f| onepkg_48x1_5_5787217c78361b69ef991c884c6fde19.png| | 1829| 21-Mar-21| 05:45 \nsts_spclientnewux726843af796e7bb026589615f5d19dc4| onepkg_48x1_775930370aef1321481b7716cdd02380.png| | 1687| 21-Mar-21| 05:45 \nsts_spclientnewuxf3bb448758471023a39493f987b418d6| onepkg_48x2_5f2f64ce776dacd38f76b501d2be0c90.png| | 1023| 21-Mar-21| 05:45 \nsts_spclientnewux2e2e9b54d12cee7e51f0e0f83ad4adee| onepkg_48x3_1860fdfee652c527eea6608efccdd9c8.png| | 1353| 21-Mar-21| 05:45 \nsts_spclientnewuxd4458e61cc85d4394bcaaaff01441e82| onepkg_96x1_06c835415cec8efeab8113d25cfe0410.png| | 1918| 21-Mar-21| 05:45 \nsts_spclientnewuxd96a6ca4d1f29051ab6be89e01b5b849| onepkg_96x1_5_b1acc0818e091ecf622a9908f5e83e17.png| | 1298| 21-Mar-21| 05:45 \nsts_spclientnewux9a12420dd23bd44ef8b15ea09bf35ec2| onepkg_96x2_d9abf3041053f70cffb45cb1fda4e065.png| | 2445| 21-Mar-21| 05:45 \nsts_spclientnewux42956cadcdc329f1b544a135f2786346| onepkg_96x3_240101f1f8c7d233756ec0684ffe7863.png| | 3032| 21-Mar-21| 05:45 \nsts_spclientnewux35749a6818e0f8665d1055a986a61fb7| onetoc_16x1_474c7634ec192e461a72eb8057bf61bd.png| | 1332| 21-Mar-21| 05:45 \nsts_spclientnewux52f8715c2e21243f7d40449279af75ec| onetoc_16x1_5_b1e30fd607223113877d6af2a26a5fad.png| | 1453| 21-Mar-21| 05:45 \nsts_spclientnewuxd44da58b81c339f1df864795a3ac4efa| onetoc_16x2_05f84c0c8c37bd9509d595043bd65680.png| | 484| 21-Mar-21| 05:45 \nsts_spclientnewuxda9ed235b0529e6b9762fd604e944aaa| onetoc_16x3_e22660c4299dde4cc6a3e0afcf2f6320.png| | 658| 21-Mar-21| 05:45 \nsts_spclientnewuxa9f3215f938e91ae74b4845bb5aa2aa4| onetoc_48x1_5_e7767a4acf424e21e3dd4159d5870cd3.png| | 1830| 21-Mar-21| 05:45 \nsts_spclientnewux84595b31a7623a6e15c86dafafb5d94c| onetoc_48x1_78769282167fa5faf3b56211745795a8.png| | 1584| 21-Mar-21| 05:45 \nsts_spclientnewux0a7937080ffd98ce1d67186cb6bc009f| onetoc_48x2_bcd769644320cf1d33e731e56f794a34.png| | 1149| 21-Mar-21| 05:45 \nsts_spclientnewux140b5b180905402f69db1e19ddcc061b| onetoc_48x3_24d09779a832388888d75f40e9d42f65.png| | 1580| 21-Mar-21| 05:45 \nsts_spclientnewuxfa93fc4422ba48314d91a42d18ce6338| onetoc_96x1_5_863f122960f17c2758421fa9809d2740.png| | 1490| 21-Mar-21| 05:45 \nsts_spclientnewux701baccef454763d277311c9da280df1| onetoc_96x1_87b9b903487d64024a6b572d5c196eb0.png| | 1986| 21-Mar-21| 05:45 \nsts_spclientnewux228a8630fb26a3c1de1df8b9ff2faa39| onetoc_96x2_71f3f24213e9e190e4138c6f6203e555.png| | 1972| 21-Mar-21| 05:45 \nsts_spclientnewux66b85f880d6f28dd87c8c9801c4978a4| onetoc_96x3_a05100039b8bf7eac1615d39793aa2d6.png| | 2776| 21-Mar-21| 05:45 \nsts_spclientnewux783e5e7fc06578bb5d69670760b88dfd| outlook_16x1_5_5c87e27ba6a10ecbad26a7aabbe2f455.png| | 669| 21-Mar-21| 05:45 \nsts_spclientnewuxe4a93b93d654259675099057a8e9b3e7| outlook_16x1_b331f27256d6ef2f7556aeebe686b5cd.png| | 476| 21-Mar-21| 05:45 \nsts_spclientnewux17282bf8087502c6b2d5eeaf342cd4aa| outlook_16x2_a68a44a677a1a658f6ccd091b5201f43.png| | 923| 21-Mar-21| 05:45 \nsts_spclientnewux86f33977836e385af05c3262afeb98b1| outlook_16x3_938a57f2f8547d7bde6598d7f68a3a73.png| | 2479| 21-Mar-21| 05:45 \nsts_spclientnewux17fa8ba606f8011f2eec4b534523efd8| outlook_48x1_5_8261b2df7fba563cfedad9e3e5dc846e.png| | 4216| 21-Mar-21| 05:45 \nsts_spclientnewux8bcd607ec2edb848f0229727e1cada6c| outlook_48x1_938a57f2f8547d7bde6598d7f68a3a73.png| | 2479| 21-Mar-21| 05:45 \nsts_spclientnewuxa47707101d17b55f2fcb827b0746b95d| outlook_48x2_298abf80ae13e76e052563ef6b8f868e.png| | 6351| 21-Mar-21| 05:45 \nsts_spclientnewuxae369aebe4acdebb23b06b2db094efd5| outlook_48x3_90f49dc188fc0363d2b248c291996c26.png| | 10621| 21-Mar-21| 05:45 \nsts_spclientnewux401469fa3c58e9f3daf01d33c53eb4d6| outlook_96x1_5_56673a9892d1e984c9c81316e80f1419.png| | 10610| 21-Mar-21| 05:45 \nsts_spclientnewuxa4c99abed2aa704bdea2f53ade16f446| outlook_96x1_d55d0c23ea3d70136d36196f45443f3a.png| | 6335| 21-Mar-21| 05:45 \nsts_spclientnewux23034083507a352ebf324d978e4f62f3| outlook_96x2_1ea11db60f1b7de9b611b8b8e59236e6.png| | 15167| 21-Mar-21| 05:45 \nsts_spclientnewux14b8fab7144b1a6f5c0b0d10f5f87f60| outlook_96x3_e9da421dff71797d53baa3fc6ffad83c.png| | 26043| 21-Mar-21| 05:45 \nsts_spclientnewuxa3c3c2ece22cfd2e4b2d5325eed20b9e| potx_16x1_5_d9b2f3417001f2d85dbd0d232e97a12b.png| | 531| 21-Mar-21| 05:45 \nsts_spclientnewuxe5e70f63deb5478b170fa498dace9864| potx_16x1_ec38333385f5f918d9103af1283dff84.png| | 1373| 21-Mar-21| 05:45 \nsts_spclientnewux2464e0e858353b4330b00d9e5b7eb58b| potx_16x2_d0ac8cd8955a409b77e587af6f0ac3be.png| | 647| 21-Mar-21| 05:45 \nsts_spclientnewuxf5c1d8378686871b09056b0544f23036| potx_16x3_6c625c175ded14041cf451e94506401d.png| | 865| 21-Mar-21| 05:45 \nsts_spclientnewuxa686961b21b0004e0b70ebc20db83c82| potx_48x1_5_e6c7b36c680c5941ce0fdd32131c21e0.png| | 935| 21-Mar-21| 05:45 \nsts_spclientnewux7d981234a205bc409931c302fd363b0e| potx_48x1_c8acf1ef4bfec6897ad8243cf99bc995.png| | 1702| 21-Mar-21| 05:45 \nsts_spclientnewux1265e0ebd08c23bd3107d4bb6a93aee1| potx_48x2_69aeac5fb36d704967349bfe5edb4a71.png| | 1175| 21-Mar-21| 05:45 \nsts_spclientnewux13f4479455af274eb635c2cf3ef816da| potx_48x3_ef8965d983b113bc768e59ec5bda6bd0.png| | 1682| 21-Mar-21| 05:45 \nsts_spclientnewux9296a560b95d31e96717ce7a4548b74b| potx_96x1_5_9de4b23189346de7a617fd5f5bbb858f.png| | 1720| 21-Mar-21| 05:45 \nsts_spclientnewux7f9a41c9fef528aab10abb377b00986a| potx_96x1_86101bbc9854b5658ed2aa69af5065e3.png| | 2212| 21-Mar-21| 05:45 \nsts_spclientnewuxe8bd369dc9e6b1b99eebf43e274d45a1| potx_96x2_7a7b4f2bc984b48528381a37015e47fe.png| | 2186| 21-Mar-21| 05:45 \nsts_spclientnewux9c08f8aa7cfcdad56a1f9961ee1a80b7| potx_96x3_f5c913794b14a8c55b4ecd63a7d3f7e0.png| | 3143| 21-Mar-21| 05:45 \nsts_spclientnewux7c07c5abd3b9ca204bfa3f7f1e27c7d0| powerpoint_16x1_5_95899a21ab9c310d698591c16e221cc0.png| | 520| 21-Mar-21| 05:45 \nsts_spclientnewux556924fa6d5090c7d8cd90cfc17b2d46| powerpoint_16x1_521f738a5689875072f5ecd701ad3535.png| | 411| 21-Mar-21| 05:45 \nsts_spclientnewuxd67520fd57466e7cfff268bec82f4060| powerpoint_16x2_52d97bf259c360def5f418c5dfcd49a8.png| | 673| 21-Mar-21| 05:45 \nsts_spclientnewux0ea9fae991ef48d4007fb3d2956e2826| powerpoint_16x3_205e941a085680ce9a6b4775425a4f69.png| | 2006| 21-Mar-21| 05:45 \nsts_spclientnewux77a41409952364ecde16df4c38d4cf34| powerpoint_48x1_205e941a085680ce9a6b4775425a4f69.png| | 2006| 21-Mar-21| 05:45 \nsts_spclientnewux28b54114a61ba24609a26e9975017a7a| powerpoint_48x1_5_941df5daa20d9e23eb3273671df6ee9b.png| | 3290| 21-Mar-21| 05:45 \nsts_spclientnewuxda8102846f212d7507de825c1210db4b| powerpoint_48x2_f0d4e64b4ea1d0b133bfb04696c1baf3.png| | 4400| 21-Mar-21| 05:45 \nsts_spclientnewux02c37b81fb86983b189cb63ee2bb2c49| powerpoint_48x3_771503087da2b44dab70b9a8bd17a08c.png| | 6536| 21-Mar-21| 05:45 \nsts_spclientnewuxf13b100e4c908753060ef1717b6d4e89| powerpoint_96x1_2c1e97b157ea50d3bc3a7220233cf203.png| | 4451| 21-Mar-21| 05:45 \nsts_spclientnewuxb7ad25e087adc5dc35d680b9ddd2782b| powerpoint_96x1_5_767692ce7f9910b9e9360cd7f580fa7a.png| | 6543| 21-Mar-21| 05:45 \nsts_spclientnewux6811c249ded39e00f3ce640aeb8e612a| powerpoint_96x2_36b5fe9d29fff26172b06ef78395035a.png| | 8644| 21-Mar-21| 05:45 \nsts_spclientnewux515474d19ee5cb55a172f89a8bf85697| powerpoint_96x3_a23c2c272c6892447b321fd658417a26.png| | 14389| 21-Mar-21| 05:45 \nsts_spclientnewux410096cb746961bf0fa79953b3441436| ppsx_16x1_5_790982a1280a144ba74aacc975180a93.png| | 442| 21-Mar-21| 05:45 \nsts_spclientnewux5b5443b4c7d423e670592dc511cfa0e5| ppsx_16x1_dbb56ba5b3feb65adc5139a785a3c840.png| | 1335| 21-Mar-21| 05:45 \nsts_spclientnewux3d96a3e35e637d464a56a6b5df0a7d7b| ppsx_16x2_3b6e07c1e80133bfa4a4eea9a52bebc9.png| | 1248| 21-Mar-21| 05:45 \nsts_spclientnewuxad0d131ac6202c368992f8b20fc6f432| ppsx_16x3_090fba79557ac8250abcd41c11fbba5f.png| | 526| 21-Mar-21| 05:45 \nsts_spclientnewux9b528b324594fe86c418b27113ffaded| ppsx_48x1_5_e32bcea5d9b968e5279530c2227e7cb1.png| | 1093| 21-Mar-21| 05:45 \nsts_spclientnewux5c9201d1e4ca87bc4f2a9165451c0fc8| ppsx_48x1_e2a84878a933d987cf44de929a540953.png| | 1817| 21-Mar-21| 05:45 \nsts_spclientnewux7923a72c8523969e2215fb505b44fff5| ppsx_48x2_feaeccb8e4e602ba11111f05ef40b5a8.png| | 1260| 21-Mar-21| 05:45 \nsts_spclientnewuxd0bd24e571b321169b2e36f59181ca38| ppsx_48x3_9e8af2676943ce9edd4ca9c3db4edbf3.png| | 1777| 21-Mar-21| 05:45 \nsts_spclientnewux7f0ee76f446b08a9fb0c7778a2260488| ppsx_96x1_5_f2ae7fe46cd84dbba844a070a1bc420b.png| | 1772| 21-Mar-21| 05:45 \nsts_spclientnewuxeaf3c389ae4a9ea15c42c4aa1dddf844| ppsx_96x1_8ecb28ba951229d595b065eee33d19ac.png| | 2286| 21-Mar-21| 05:45 \nsts_spclientnewuxd3b37127beb0e8ed6e1b289a7f78af2d| ppsx_96x2_115a03817dda01884862bfa2b76874ba.png| | 2189| 21-Mar-21| 05:45 \nsts_spclientnewux2675959c90f4bcb6d6977febc1ece604| ppsx_96x3_4ac3d26c5baf19cf5da791d9aa64c273.png| | 3160| 21-Mar-21| 05:45 \nsts_spclientnewuxeb7932da59d337a06f90985ae7ffad6c| pptx_16x1_5_ece5b018d48b2f28ff296337e859b116.png| | 540| 21-Mar-21| 05:45 \nsts_spclientnewux79cfbd7859371f3308a6bcb34bb504a8| pptx_16x1_b9d460ef31b53b0f11add2d612e6f562.png| | 1413| 21-Mar-21| 05:45 \nsts_spclientnewuxded2adf1d5cbbe51c55b4ded67b93318| pptx_16x2_3d9ad3c908be2eee976c8490414c42db.png| | 664| 21-Mar-21| 05:45 \nsts_spclientnewux353b09747866726e40ea2475dc158224| pptx_16x3_88b44d104f3e4425e36aa14d3d772fd7.png| | 829| 21-Mar-21| 05:45 \nsts_spclientnewux7075757f5a7b664c3fafb313162bd664| pptx_48x1_5_b3e80007a9639f5cbd6e0b93078d2852.png| | 1074| 21-Mar-21| 05:45 \nsts_spclientnewuxf9632325c6e8b0ac162a32439d7ff982| pptx_48x1_62bc7e26981e7f314e8767b4aac9b25b.png| | 1857| 21-Mar-21| 05:45 \nsts_spclientnewux4287d17f81e4e813ee912d87f810a771| pptx_48x2_8928056765d09f9381169968ac76e17c.png| | 1342| 21-Mar-21| 05:45 \nsts_spclientnewuxd6e194558fd28ffd68d23f5c42b51760| pptx_48x3_6f37937f2bbb8053ef615c4b8a730710.png| | 1895| 21-Mar-21| 05:45 \nsts_spclientnewux75a229e04c87f1e879167a6e4f9fe576| pptx_96x1_5_728a7eb2b8717833b5afce00214e9b2d.png| | 1829| 21-Mar-21| 05:45 \nsts_spclientnewux7c25f7e833388b2d0b8ed4a9bba9aea7| pptx_96x1_7057a44aa3dfe1a810f2afeeb12dcbca.png| | 2284| 21-Mar-21| 05:45 \nsts_spclientnewuxeb9a3e051ceeada2b12c8e999e2abd3a| pptx_96x2_a61408511135e2a2518b4c6e00564d85.png| | 2279| 21-Mar-21| 05:45 \nsts_spclientnewux55ec2f9324b96009c0d2b118a0f88926| pptx_96x3_a80d73f9ebb1f993bede1414d9f38ce8.png| | 3334| 21-Mar-21| 05:45 \nsts_spclientnewux88c7bef3c41cb96cb80f75b619cf3a3e| project_16x1_5_ae8a41016b428e83cfa15c7f54ef6a2e.png| | 1618| 21-Mar-21| 05:45 \nsts_spclientnewux779d35fb6b0e753858a79a80a80d44b1| project_16x1_7a45d6b6f61b3c60285a755a4ede3cb3.png| | 332| 21-Mar-21| 05:45 \nsts_spclientnewux993aa0bd8122b20cfaf12a18701b0bcf| project_16x2_6bdc785623090b36e0fcd9b6b50a7b80.png| | 644| 21-Mar-21| 05:45 \nsts_spclientnewux1ffe6fd77bb03c3e11be7ee95567321d| project_16x3_6c4998e2688565a69074ccbde25f272c.png| | 924| 21-Mar-21| 05:45 \nsts_spclientnewux042dc99b22a974d6dc670e6de3ab23c7| project_48x1_5_c4e2dc8e6e76fe4d7d6abe17e2de99fc.png| | 2295| 21-Mar-21| 05:45 \nsts_spclientnewux382c4836b19d03deb3d9d2ead113db1c| project_48x1_805f358f0b9e09afdabf5d6cdc6cbffc.png| | 1138| 21-Mar-21| 05:45 \nsts_spclientnewux4d2b0ffecac6b8ec15487fc34435dffd| project_48x2_c9765a2e16acfdcbcfa82a7c9b5db559.png| | 1438| 21-Mar-21| 05:45 \nsts_spclientnewuxc76816e1d04da6268d90cc9fdc5411ac| project_48x3_a8a782124e0e07a19dba004e251f9e07.png| | 2114| 21-Mar-21| 05:45 \nsts_spclientnewux7ccb688e54cd365a176703b20bf5f8d8| project_96x1_5_9132ac99aea4a726306e2be603b2bd18.png| | 2025| 21-Mar-21| 05:45 \nsts_spclientnewuxf10189c48dc53407b4885615754bbe0c| project_96x1_b8230c25b4f52a99eac544ec61dedaa1.png| | 2294| 21-Mar-21| 05:45 \nsts_spclientnewux174d8aea6e7922491890fb68131336aa| project_96x2_d41618c588c2f5fa243b6e53ffd0db7b.png| | 2685| 21-Mar-21| 05:45 \nsts_spclientnewux0dc6bd095b77b305aafffc571aa8dba7| project_96x3_355e3cc8e18d97cdfe9ccb364c01bc8a.png| | 3899| 21-Mar-21| 05:45 \nsts_spclientnewux5384cea7d9b52030c4aea6b2928b6c31| pub_16x1_5_2332e7318eaf797ddef18058c125b992.png| | 521| 21-Mar-21| 05:45 \nsts_spclientnewux3b98c2b60e1bf01e8bfc5acbd510a75a| pub_16x1_ebfdbe022c094edf0a8737db76480f98.png| | 1395| 21-Mar-21| 05:45 \nsts_spclientnewux2614cf1ac68c98b1ffc1fd62be40155d| pub_16x2_f72f9a551fcac38420ef310635332a91.png| | 602| 21-Mar-21| 05:45 \nsts_spclientnewux90a71ab094e48b68ac0169c13c948f43| pub_16x3_cff1b6773f457c579d4b17a1e07b3c89.png| | 752| 21-Mar-21| 05:45 \nsts_spclientnewux4171cf8bb662a9ff223d6790307e0920| pub_48x1_5_76d5f60aa226e56178b44924d024d46c.png| | 830| 21-Mar-21| 05:45 \nsts_spclientnewuxe5d14b0af75122ab4f237ee7ee3f3875| pub_48x1_8c5cc5e03db039797231ac2987a39677.png| | 1670| 21-Mar-21| 05:45 \nsts_spclientnewuxa6be26b1046a5241f79a892338786b46| pub_48x2_b2cbf1007f3f2e83b504fd45b67acdfe.png| | 1918| 21-Mar-21| 05:45 \nsts_spclientnewux109e6aec60eb33b950f3f7071f756e13| pub_48x3_d892aa688f7823f3d1456344b8b595f6.png| | 2249| 21-Mar-21| 05:45 \nsts_spclientnewux98d3a57aac90e2ac555168da2d6e39ca| pub_96x1_5_587a0d668690ca0e984badc77a53b8a7.png| | 1397| 21-Mar-21| 05:45 \nsts_spclientnewuxcb939d9c58ef0dc752ad056b91d52801| pub_96x1_cae35678c79c0f4705fc93866b1d0b51.png| | 1971| 21-Mar-21| 05:45 \nsts_spclientnewux62c5d524238a798f830891f589c64e21| pub_96x2_64432be186ffaa13e66be1119cf03a13.png| | 1716| 21-Mar-21| 05:45 \nsts_spclientnewuxea1973a0a951d0497e9a2db970ea56cc| pub_96x3_732a5dcfd692f3c956a626572d01597d.png| | 2409| 21-Mar-21| 05:45 \nsts_spclientnewux98fdc013a89de66164023b1a90d2b52a| segoeui-bold_00a8a2e0a7feded81b77e36622338dbe.woff2| | 43868| 21-Mar-21| 05:45 \nsts_spclientnewux6bd17fa6a958814af77f24d7e3d3b77b| segoeui-bold_1729e0cca0b4e15a571c8943277f428e.woff| | 55496| 21-Mar-21| 05:45 \nsts_spclientnewux69fde7923cb7dd9b3f9153cea6b01521| segoeui-bold_18738737200cf8e46a65db625abba8cc.woff2| | 35408| 21-Mar-21| 05:45 \nsts_spclientnewux8748e6e90bdeafbb7841b68c362567cc| segoeui-bold_2c47175b890a2788244dbbb04fd15810.woff2| | 32964| 21-Mar-21| 05:45 \nsts_spclientnewux62d02d87d391eea9d4b481f178d5fd5f| segoeui-bold_2ece9866fc7c325f4593a8e8e151d7c1.woff2| | 42788| 21-Mar-21| 05:45 \nsts_spclientnewux53b5d503481dca80876d6a3b975caa1d| segoeui-bold_6870e52f16d72f5085e9cf8dcbb6ab14.woff| | 41644| 21-Mar-21| 05:45 \nsts_spclientnewuxb895ee44a9aaaeaa33aec54f839f54bd| segoeui-bold_7670fcad720d662aeae5246acb160915.woff| | 38360| 21-Mar-21| 05:45 \nsts_spclientnewuxd7f19e398290de2ddbd387f12232fc66| segoeui-bold_9d3adc4c7719ae2a3bb54b4281996bfe.woff2| | 63344| 21-Mar-21| 05:45 \nsts_spclientnewuxa9691f2e24a93a05b2f0aea66ecd2b39| sp-page-context.js| | 24215| 21-Mar-21| 05:46 \nsts_spclientnewuxd6110cac400251f3be610cf051fe0306| segoeui-bold_a6e7024959542da97b48764015cb2912.woff| | 76124| 21-Mar-21| 05:45 \nsts_spclientnewux0abfc468174a7731d197c779850a4d96| segoeui-bold_b9c579295a2e1db8635d0a9a244954c4.woff| | 50536| 21-Mar-21| 05:45 \nsts_spclientnewux1d13369d81ef1b62eeda680cfe5260e4| segoeui-bold_cf12db8a2720d67c975b0b99951f3fe2.woff| | 79792| 21-Mar-21| 05:45 \nsts_spclientnewux542a8333d6eb454003994dcb90adc921| segoeui-bold_db5a0e1149b0aa25176764ca925df569.woff2| | 42980| 21-Mar-21| 05:45 \nsts_spclientnewuxd2d5d9a94c848bbc7d0005c0181100a4| segoeui-bold_e7c62f35d3a8a60765846452cdea20f7.woff| | 51496| 21-Mar-21| 05:45 \nsts_spclientnewux3993b58044c950e07f3a7bc7f0d32a71| segoeui-bold_f964699843376a4cd45d10a41c41cc23.woff2| | 71732| 21-Mar-21| 05:45 \nsts_spclientnewux43c0c60685bc2f23783e37b5a0102061| segoeui-light_0fde8f2a95d1517dad89c4c06b31deac.woff2| | 62788| 21-Mar-21| 05:45 \nsts_spclientnewuxa9fa6e0d242efc33abbbda989b01eb44| segoeui-light_1f57bc2cb31f22bc9094d22c5134d589.woff2| | 39776| 21-Mar-21| 05:45 \nsts_spclientnewuxe2093a46ead921462c515abb5a3abf01| segoeui-light_2fd9614c0deb54d27b7f8257e237ccc1.woff2| | 30836| 21-Mar-21| 05:45 \nsts_spclientnewux90560c9f5867981d0594c177ebe1c56b| segoeui-light_330e17beeeecee428dea32f39b679d3b.woff2| | 28740| 21-Mar-21| 05:45 \nsts_spclientnewux0c51ec3bf94d7b42b14c8354f59cadee| segoeui-light_3cead85155e0de2d7e9b721eb34fee76.woff| | 46632| 21-Mar-21| 05:45 \nsts_spclientnewuxeca141a7e6c5fcfc83b31e5a56be0539| segoeui-light_89dc18e4fa3fac2779928262e8e2f4e6.woff| | 73624| 21-Mar-21| 05:45 \nsts_spclientnewux2d7b33d4a9796de999fe52ef820053c6| segoeui-light_9e15a0188be993b49f37286f9d759ff0.woff| | 45000| 21-Mar-21| 05:45 \nsts_spclientnewuxea7b612f0ad0746591d118e3be5e376d| segoeui-light_a7a0d35a2e5d0c1e3bc30b45a11dc36c.woff| | 46744| 21-Mar-21| 05:45 \nsts_spclientnewux99a368ffbc9e315e65b1dbd4d25d98e8| segoeui-light_b734f1fd85091592e77747be6ea5a910.woff| | 36844| 21-Mar-21| 05:45 \nsts_spclientnewux2f9e4c0839f9f5460ff2fb2c0059269b| segoeui-light_b9f0073120dc85d152929803a1080c4b.woff2| | 38336| 21-Mar-21| 05:45 \nsts_spclientnewuxa3c3d5b27cb7e088b6c70ab8819dc368| segoeui-light_dd854137779d360dc33d99866c62aec5.woff2| | 67992| 21-Mar-21| 05:45 \nsts_spclientnewuxee37f05f925a33d8f972ce7a90d3b52c| segoeui-light_e48ea1ac1846a2e80cb60f9a23494a50.woff| | 33752| 21-Mar-21| 05:45 \nsts_spclientnewux545df6c3cea8abf4e281022a817f1d1b| segoeui-light_f1d4b0e953fa0758da4db09e88531b93.woff| | 75568| 21-Mar-21| 05:45 \nsts_spclientnewux4366170e7dbdb045a4ebad49b8581faa| segoeui-light_fe64866d56c34385e3833dde54a08b9c.woff2| | 37892| 21-Mar-21| 05:45 \nsts_spclientnewux11fee05cd1897fe9512edf62e33a5474| segoeui-regular_28959e485d3ae31c66dbef059dce1265.woff| | 55604| 21-Mar-21| 05:45 \nsts_spclientnewuxba227bdf3fa698cf6c49711b887d5dd0| segoeui-regular_53b650cb4ad3b562dd9e152400eaf2c2.woff2| | 47288| 21-Mar-21| 05:45 \nsts_spclientnewuxcde9de09101026016f177ef0e53015d0| segoeui-regular_5fa620c9eefcd9c86b00199b3733d6e8.woff| | 75464| 21-Mar-21| 05:45 \nsts_spclientnewux90a46abf7b8ff5c083d11554258b281b| segoeui-regular_697230d0942e89a4e8582ea9f463bc30.woff2| | 39176| 21-Mar-21| 05:45 \nsts_spclientnewux3666c8b7d79269023ca66dcf996ca281| segoeui-regular_78aea412d491b3c930b06f2007feff44.woff| | 45616| 21-Mar-21| 05:45 \nsts_spclientnewux8c8b85fe70573ba86b67c8b1aac0a24b| segoeui-regular_7b6cba99d25f22ff1ccdee97c12482d1.woff| | 60540| 21-Mar-21| 05:45 \nsts_spclientnewux8664aa54fef9844d3ddfb3905d6082d5| segoeui-regular_7db9efbd4f0051eec003a69d52208a40.woff| | 66632| 21-Mar-21| 05:45 \nsts_spclientnewuxa84b2cf53c1d31eb9c2e939143b12e4a| segoeui-regular_7e0879cc50cdc9845eef81efe62d76d2.woff2| | 59140| 21-Mar-21| 05:45 \nsts_spclientnewux395310c463d2122fda0dc96c2b4ed122| segoeui-regular_865f1db6545fc94a2f4444dd60e7bbc6.woff2| | 36344| 21-Mar-21| 05:45 \nsts_spclientnewux37a4e2868b2413a6651c2a02f7f22aaa| segoeui-regular_8e5beaebb27bbf92146977bd1062eb11.woff| | 42236| 21-Mar-21| 05:45 \nsts_spclientnewuxa5417e269e594aab4089c7cef6849ae3| segoeui-regular_a174c5c5aca9fc207f0774e74b6a5017.woff| | 56896| 21-Mar-21| 05:45 \nsts_spclientnewuxcc2f9dc9071267ec95c94c923a14d179| segoeui-regular_a66ac4b246c87c08e18b5ba6d7e83798.woff2| | 47716| 21-Mar-21| 05:45 \nsts_spclientnewux626592d53cbcdf9efb4fa570480949ec| segoeui-regular_de7cd3a972e93e3f2c920b53c13b58ae.woff2| | 63928| 21-Mar-21| 05:45 \nsts_spclientnewux1c639428f948d14fce3267118b782fa4| segoeui-regular_f51d4cde8cd85b1caa064a18c0fa8b92.woff2| | 48012| 21-Mar-21| 05:45 \nsts_spclientnewuxf3e9d7b2eecb84d597ce582d94a137be| segoeui-semibold_03f00b8d19f7f27318f4653f9d5bab24.woff2| | 69908| 21-Mar-21| 05:45 \nsts_spclientnewux9c9d4d531b690b69d774b59793279494| segoeui-semibold_204b492169988b818ea24253774d6ee1.woff| | 40692| 21-Mar-21| 05:45 \nsts_spclientnewuxdb1bfd34224db15a24c475a2efe46ac7| segoeui-semibold_2aab0c00d3723964e503969f2d554c13.woff2| | 65772| 21-Mar-21| 05:45 \nsts_spclientnewux8791a953c99bfbb0a9af1ba0161d1620| segoeui-semibold_40f607089688633d2659e6042ac33620.woff| | 78492| 21-Mar-21| 05:45 \nsts_spclientnewux7658de07d18b46fbcf668e6a7cf0c3b0| segoeui-semibold_66d11e55b7a413ddf6a84e858697e7b6.woff2| | 31824| 21-Mar-21| 05:45 \nsts_spclientnewux1f827be026738099fcf4acaff86813bf| segoeui-semibold_67a64f575e084b02e863817a1242b92a.woff| | 76908| 21-Mar-21| 05:45 \nsts_spclientnewuxcf1e222f0ee3fc0b96cbb456fceeda44| segoeui-semibold_690fc91487e8393ee7496881ba915389.woff| | 50184| 21-Mar-21| 05:45 \nsts_spclientnewux1456b68af58274e2d2e5b9ba39aeb114| segoeui-semibold_6b8d94ee3b0185feaafe1f19e9587f1f.woff| | 37236| 21-Mar-21| 05:45 \nsts_spclientnewux29bec47b357612107fa8a25d9f0a9561| segoeui-semibold_8551e8694644280ece249254e10bf910.woff| | 49212| 21-Mar-21| 05:45 \nsts_spclientnewuxcab33662f63ea8dcd23c0758f866b1ea| segoeui-semibold_87bd68a4637619c40a489d9d13e42747.woff2| | 41724| 21-Mar-21| 05:45 \nsts_spclientnewux9be6c00153f9d18d9d8d0d9b1c69ab02| segoeui-semibold_917c51fdfabab1435e52275e3f460017.woff| | 54224| 21-Mar-21| 05:45 \nsts_spclientnewux85fba1389bf729b7ea5c7a5e3bba027a| segoeui-semibold_9b3d5bf54cd48c3eefd8ac1217253a56.woff2| | 42800| 21-Mar-21| 05:45 \nsts_spclientnewuxf01340f50fe9a547d6d2a65d55801aa0| segoeui-semibold_c9307fd69140b02de407557064719c73.woff2| | 34572| 21-Mar-21| 05:45 \nsts_spclientnewuxcde125ec6309d831574dd26d5791738c| segoeui-semibold_ebd6cfb03ec224b96c3fe02c13befa55.woff2| | 41532| 21-Mar-21| 05:45 \nsts_spclientnewux5ead2154e3dee002a02735809a6910e5| segoeui-semilight_0e95088a90a65a1c397f347e9517826f.woff2| | 40128| 21-Mar-21| 05:45 \nsts_spclientnewuxdae0ed6737476841a9630b20f17d9928| segoeui-semilight_3ff95bf86e54359409f750eeb604bf95.woff| | 76836| 21-Mar-21| 05:45 \nsts_spclientnewux04fb6d5d66cc49470a26f0658311f11a| segoeui-semilight_4d650c89d860efeb3a1c77d9c0742c4a.woff| | 28504| 21-Mar-21| 05:45 \nsts_spclientnewux590ec3664f65c2eecf03fe3bea6cda63| segoeui-semilight_5000bfb344caca36abc9930579e87909.woff2| | 65788| 21-Mar-21| 05:45 \nsts_spclientnewuxa5fd063fc3fbb406ff26b45a8d64f869| segoeui-semilight_6984a87b441bd33e9ef4106f43dda279.woff2| | 40236| 21-Mar-21| 05:45 \nsts_spclientnewux9b288e31dd56b4ae70b6371f77f4357e| segoeui-semilight_7263170323b9c598485bf2632f0d39fc.woff| | 47700| 21-Mar-21| 05:45 \nsts_spclientnewuxc30d59866e0f48cf2365d76e9b04235c| segoeui-semilight_77a9efbe7a4f246e7e83ca2248e26a36.woff2| | 29936| 21-Mar-21| 05:45 \nsts_spclientnewux18fcc9fcf00cc845ceb2662a5fdbfe31| segoeui-semilight_7bf8c217f3e999717e5a2b5c78d151b6.woff2| | 39920| 21-Mar-21| 05:45 \nsts_spclientnewuxb62e8b720352b727ff4fd4c58f8c453f| segoeui-semilight_897f07bb31e3216cbf844b2c09e2cde5.woff| | 35300| 21-Mar-21| 05:45 \nsts_spclientnewuxbad569b0a4283dac2ccc0c8b4f81331e| segoeui-semilight_91a966e76f349cf84dcfcb30d24c3bd3.woff| | 52180| 21-Mar-21| 05:45 \nsts_spclientnewuxdb8899172a90cc6a287cea7d056a1e35| segoeui-semilight_9a12b3dbf8920a3174853867d0f0cbbf.woff| | 48316| 21-Mar-21| 05:45 \nsts_spclientnewux8f0c6d69a147418ffe80caafa921b889| segoeui-semilight_ac85d4edbcabf09efd9fb6cccc403e23.woff2| | 32128| 21-Mar-21| 05:45 \nsts_spclientnewux44090e977086ec2a4143c2654ebd2a90| segoeui-semilight_e748f71274adb7dcc350e322f5802540.woff| | 38288| 21-Mar-21| 05:45 \nsts_spclientnewux3f1bfeb2bc729e696390c433c2d9ec64| segoeui-semilight_f5d83201b9de2f4d51a2cfb6cc8e3445.woff2| | 24432| 21-Mar-21| 05:45 \nsts_spclientnewuxd948aa5673f2ae756920bb5382248233| selawik-bold_2c03fc898ff48ca28968079f3c9f5839.woff| | 19336| 21-Mar-21| 05:45 \nsts_spclientnewux904f600a3f3bb704808fa8b9d2fa0f75| selawik-bold_685fb6280fec3582a82006a0a09e2b6f.woff2| | 14424| 21-Mar-21| 05:45 \nsts_spclientnewuxc6387ceea9cbeb78ae56c6ee7b4f5e25| selawik-light_18b8c53b827002bac4d1eb60f9d8d207.woff| | 19524| 21-Mar-21| 05:45 \nsts_spclientnewux3dcccc03b51a669e4059049127785bfe| selawik-light_2080ecbe44abf1d585763d718c144d0f.woff2| | 14544| 21-Mar-21| 05:45 \nsts_spclientnewuxff93e55bf121b388f14b105c36973428| selawik-regular_c1aa8c51674cf0eb4a615b2e55e158c1.woff2| | 14632| 21-Mar-21| 05:45 \nsts_spclientnewuxd09475a2bdf5f6be4aeb641708337a13| selawik-regular_ceebb048d952cbfe385109812d1e02da.woff| | 19596| 21-Mar-21| 05:45 \nsts_spclientnewux23b3237dc6fabbe334dfd5d72b609f8b| selawik-semibold_17eab24cc0c2e0e43b886bf5e9b966e7.woff2| | 14896| 21-Mar-21| 05:45 \nsts_spclientnewux72011d6116ef1ea31cd909aa0736792e| selawik-semibold_a8a0ec9a04c3e8089a2e4c1a95472bec.woff| | 19824| 21-Mar-21| 05:45 \nsts_spclientnewuxfbeae9f1dac898fc67ca0251087da6c7| sp-safehtml.js| | 17535| 21-Mar-21| 05:46 \nsts_spclientnewux5394ce16dd0d7da4524a1dd1af87de1f| selawik-semilight_744e92b0cad631df4366f497d6bd644d.woff2| | 14864| 21-Mar-21| 05:45 \nsts_spclientnewuxc33f3c4ba1d90763c4d099e669b33801| selawik-semilight_ff7350adb693801aa55f19afaafe0fa5.woff| | 19944| 21-Mar-21| 05:45 \nsts_spclientnewuxba1eaa313c38bf5fdca388af985407e6| sharepoint_16x1_5_54d4684c6511492a93a17c51e5cb453a.png| | 667| 21-Mar-21| 05:45 \nsts_spclientnewux4e09209825d0f30fee1a94fbe6ec31d8| sharepoint_16x1_60fed59eb24bba330eaa7134c2b35354.png| | 456| 21-Mar-21| 05:45 \nsts_spclientnewux29911c62fc38df7a422dca1288ec3962| sharepoint_16x2_3d7f07c1ce3f3c67c81f8be76cefa954.png| | 927| 21-Mar-21| 05:45 \nsts_spclientnewuxdfbd21744c8ce511cfea23e31cfc5db8| sharepoint_16x3_994d525eb6f806a620b11f62d889ad0a.png| | 2748| 21-Mar-21| 05:45 \nsts_spclientnewux2cb223574ad67644afe54eaffb65e1ef| sharepoint_48x1_5_d49b03aa3acc2bd1a2c3e742faf95056.png| | 4523| 21-Mar-21| 05:45 \nsts_spclientnewuxb68874e76f816a8d9c00572a089f1102| sharepoint_48x1_994d525eb6f806a620b11f62d889ad0a.png| | 2748| 21-Mar-21| 05:45 \nsts_spclientnewux278d718673d0f0314b2f18a446a18cf3| sharepoint_48x2_92191738c1d805cd51156256ee1cdb17.png| | 6178| 21-Mar-21| 05:45 \nsts_spclientnewux4052d784ce1dcf1cd2d44282e23e5ba2| sharepoint_48x3_213cc2361d61cd7ddf2d840dc73f06dd.png| | 9576| 21-Mar-21| 05:45 \nsts_spclientnewux61b323d30f83b76046f18eb8275f3186| sharepoint_96x1_5_031a1917fbc191f080148374355340f0.png| | 9487| 21-Mar-21| 05:45 \nsts_spclientnewuxc0fcfec6842082a066c675f66dd7d2b7| sharepoint_96x1_c434aa9f4e4901a86fa4ca274076a3ff.png| | 6140| 21-Mar-21| 05:45 \nsts_spclientnewux28b847b13b9d12716f97f8a5bbb1a384| sharepoint_96x2_858dfdb2a683ba6eba930bc4431b084c.png| | 13877| 21-Mar-21| 05:45 \nsts_spclientnewux6791844307e768b1cda0305d87d4710e| sharepoint_96x3_0ce9ea9c5a551308866960076d0de984.png| | 21919| 21-Mar-21| 05:45 \nsts_spclientnewux7ffed58434bba18019f8dc25a6921a4f| sp-a11y.js| | 18449| 21-Mar-21| 05:45 \nsts_spclientnewux80477eda0db88481a24ec28e3ec1a3d4| sp-component-base.js| | 15558| 21-Mar-21| 05:46 \nsts_spclientnewuxd06b22027fae659d53ac198990a2bb9a| sp-dragzone.js| | 8397| 10-Apr-21| 08:04 \nsts_spclientnewuxdce4aa0e772fc2b45853242803a8efdf| sp-flex-layout.js| | 6517| 10-Apr-21| 08:04 \nsts_spclientnewux121e8abb46c9ff351343b680014b113b| sp-hero-layout.js| | 20682| 10-Apr-21| 08:04 \nsts_spclientnewuxf915d58a5d7a11c9f0074f6a6b62e431| sp-masonry-layout.js| | 73604| 10-Apr-21| 08:04 \nsts_spclientnewux45c199cda8c597c6b22274f4ccd6346b| tab-test-field-customizer.js| | 5718| 10-Apr-21| 08:04 \nsts_spclientnewuxf27942de8bf5be30c8d15ef048860ddd| visio_16x1_4c1d923ec0faa9fb8eae2db30aef89e2.png| | 439| 21-Mar-21| 05:46 \nsts_spclientnewuxe7396a59b5eedff5e7435233a62e9c21| visio_16x1_5_78cbfd0a1390cf35af2676cf1f2fbc21.png| | 534| 21-Mar-21| 05:46 \nsts_spclientnewuxcd0b532d68b3df4f515bb9da2eb098e1| visio_16x2_9518363f6a0609c0e8fe02fb6bb55877.png| | 710| 21-Mar-21| 05:46 \nsts_spclientnewuxbc72d857c4c257cd97e0de75533a0374| visio_16x3_5412174a280e6e2855820adadf707a6d.png| | 1720| 21-Mar-21| 05:46 \nsts_spclientnewuxc07033e73ab0b8d148b3384afc0ab2e7| visio_48x1_5_618764ef718bf23076904b4bfc0611c5.png| | 2791| 21-Mar-21| 05:46 \nsts_spclientnewuxb6c0813b5c6459267eecd1ff9d6ef3b9| visio_48x1_5412174a280e6e2855820adadf707a6d.png| | 1720| 21-Mar-21| 05:46 \nsts_spclientnewuxd9562d2b4303d2ecde3fa655005772eb| visio_48x2_dfcfb564a48b7fc49203c5050985a152.png| | 3732| 21-Mar-21| 05:46 \nsts_spclientnewuxd0685442b622a3cfc540f6bdced1ad29| visio_48x3_eac6e2fd59138e9c2c0ab15f234bcd9e.png| | 6054| 21-Mar-21| 05:46 \nsts_spclientnewuxe785979898e1367803b5edf061dbad7e| visio_96x1_45b9266fda6ff4bcb6b64cac55320532.png| | 3724| 21-Mar-21| 05:46 \nsts_spclientnewuxae33df669824e4720a4dbd076f834f08| visio_96x1_5_4428a305a7bc1b1ddc1e9cfce64ae6cb.png| | 6065| 21-Mar-21| 05:46 \nsts_spclientnewux5f740b9132f808ba34b509429852deaf| visio_96x2_aa9d76ef7ce27682fae963a87dc848e3.png| | 8030| 21-Mar-21| 05:46 \nsts_spclientnewuxb84db68e21caf2d2530b88ea74251490| visio_96x3_7bd21e75b273310b9206d68ec4399361.png| | 13387| 21-Mar-21| 05:46 \nsts_spclientnewux593f7140154a8b70feae78d41e7271dc| vsdx_16x1_4430ba06293826a3c92891bd1e70a022.png| | 1407| 21-Mar-21| 05:46 \nsts_spclientnewuxf3dc099a7e95a90107d54f133810a453| vsdx_16x1_5_7d61906b3614fb55f1963754bbdaa3a5.png| | 1643| 21-Mar-21| 05:46 \nsts_spclientnewux914b8d40b763f49f13b3d6c1037cb6e8| vsdx_16x2_e454713a3cc9d266e9a58d90ed4a5c8e.png| | 746| 21-Mar-21| 05:46 \nsts_spclientnewux2c46cd33ead68fe394aa1a4c1d104b78| vsdx_16x3_5ddaa063d2f373cf8b2bc252f7dd36ac.png| | 984| 21-Mar-21| 05:46 \nsts_spclientnewux9fa1614717387e76385e88cae3961d6e| vsdx_48x1_5_bc7d1cf87bbc4dd921aecdb2deaf6705.png| | 2267| 21-Mar-21| 05:46 \nsts_spclientnewuxb6c185672d32527b6b23674fd618c072| vsdx_48x1_67341fd0ff33731357594e3b092a2c8e.png| | 1989| 21-Mar-21| 05:46 \n \n## Information about protection and security\n\nProtect yourself online: [Windows Security support](<https://support.microsoft.com/hub/4099151>)Learn how we guard against cyber threats: [Microsoft Security](<https://www.microsoft.com/security>)\n", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-05-11T07:00:00", "type": "mskb", "title": "Description of the security update for SharePoint Server 2019: May 11, 2021 (KB5001916)", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-26418", "CVE-2021-28474", "CVE-2021-28478", "CVE-2021-31171", "CVE-2021-31172", "CVE-2021-31173", "CVE-2021-31181"], "modified": "2021-05-11T07:00:00", "id": "KB5001916", "href": "https://support.microsoft.com/en-us/help/5001916", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2023-06-23T19:31:39", "description": "None\n## Summary\n\nThis security update resolves a Microsoft Excel remote code execution vulnerability and Office information disclosure vulnerability. To learn more, see the following security advisories:\n\n * [Microsoft Common Vulnerabilities and Exposures CVE-2021-31174](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31174>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2021-31175](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31175>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2021-31177](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31177>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2021-31178](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31178>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2021-31179](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31179>)\n\n**Note: **To apply this security update, you must have the release version of Microsoft Office Online Server installed on the computer.\n\n## How to get and install the update\n\n### Method 1: Microsoft Update\n\nThis update is available from Microsoft Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see [Windows Update: FAQ](<https://support.microsoft.com/help/12373/windows-update-faq>).\n\n### Method 2: Microsoft Update Catalog\n\nTo get the standalone package for this update, go to the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/Search.aspx?q=KB5001914>) website.\n\n### Method 3: Microsoft Download Center\n\nYou can get the standalone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.\n\n * [Download security update 5001914 for the 64-bit version of Office Online Server](<http://www.microsoft.com/download/details.aspx?familyid=1fb124f1-cb15-4104-b068-7d040204bdd1>)\n\n## More information\n\n### Security update deployment information\n\nFor deployment information about this update, see Security update deployment information: May 11, 2021.\n\n### Security update replacement information\n\nThis security update replaces previously released security update [4504714](<https://support.microsoft.com/kb/4504714>).\n\n### File hash information\n\nFile name| | SHA256 hash \n---|---|--- \nwacserver2019-kb5001914-fullfile-x64-glb.exe| | C33A6A5F9CF3127354AA4C9F43AB09A2785C6988550B8B200883C3DA41023085 \n \n### File information\n\nDownload [the list of files that are included in security update 5001914](<https://download.microsoft.com/download/6/6/3/66370ab0-579c-4378-83aa-1d55fe6dd70a/5001914.csv>).\n\n## Information about protection and security\n\nProtect yourself online: [Windows Security support](<https://support.microsoft.com/hub/4099151>)Learn how we guard against cyber threats: [Microsoft Security](<https://www.microsoft.com/security>)\n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2021-05-11T07:00:00", "type": "mskb", "title": "Description of the security update for Office Online Server: May 11, 2021 (KB5001914)", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-31174", "CVE-2021-31175", "CVE-2021-31177", "CVE-2021-31178", "CVE-2021-31179"], "modified": "2021-05-11T07:00:00", "id": "KB5001914", "href": "https://support.microsoft.com/en-us/help/5001914", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-06-23T19:31:41", "description": "None\n## Summary\n\nThis security update resolves a Microsoft Excel remote code execution vulnerability, Office information disclosure vulnerability. To learn more about the vulnerabilities, see the following security advisories:\n\n * [Microsoft Common Vulnerabilities and Exposures CVE-2021-31174](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31174>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2021-31175](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31175>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2021-31177](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31177>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2021-31178](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31178>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2021-31179](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31179>)\n\n**Note: **To apply this security update, you must have the release version of Microsoft Office 2016 installed on the computer.\n\nBe aware that the update in the Microsoft Download Center applies to the Microsoft Installer (.msi)-based edition of Office 2016. It doesn't apply to the Office 2016 Click-to-Run editions, such as Microsoft Office 365 Home (see [What version of Office am I using?](<https://support.office.com/article/About-Office-What-version-of-Office-am-I-using-932788B8-A3CE-44BF-BB09-E334518B8B19>)). \n\n## How to get and install the update\n\n### Method 1: Microsoft Update\n\nThis update is available from Microsoft Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see [Windows Update: FAQ](<https://support.microsoft.com/help/12373/windows-update-faq>).\n\n### Method 2: Microsoft Update Catalog\n\nTo get the standalone package for this update, go to the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/Search.aspx?q=KB5001918>) website.\n\n### Method 3: Microsoft Download Center\n\nYou can get the standalone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.\n\n * [Download security update 5001918 for the 32-bit version of Excel 2016](<http://www.microsoft.com/download/details.aspx?familyid=8a39e8f6-771d-4775-9342-0bfdf4625414>)\n * [Download security update 5001918 for the 64-bit version of Excel 2016](<http://www.microsoft.com/download/details.aspx?familyid=369c4470-f556-4a78-810c-3f54f0f74f18>)\n\n## More information\n\n### Security update deployment information\n\nFor deployment information about this update, see Security update deployment information: May 11, 2021.\n\n### Security update replacement information\n\nThis security update replaces previously released security update [4504721](<https://support.microsoft.com/kb/4504721>).\n\n### File hash information\n\nFile name| | SHA256 hash \n---|---|--- \nexcel2016-kb5001918-fullfile-x86-glb.exe| | C9E92AC96C80C7B522AE2833C2030229277ABDA02465738ACD472F14BF0C69AD \nexcel2016-kb5001918-fullfile-x64-glb.exe| | F6679ECA020C6899A090D276301F678C949FDD09E8C108897DB7B7E0E1E43C43 \n \n### File information\n\nThe English (United States) version of this software update installs files that have the attributes that are listed in the following table. The dates and times for these files are listed in Coordinated Universal Time (UTC). The dates and times for these files on your local computer are displayed in your local time together with your current daylight saving time (DST) bias. Additionally, the dates and times may change when you perform certain operations on the files.\n\n#### \n\n__\n\nFor all supported x86-based versions of Excel 2016\n\nFile identifier| File name| File version| File size| Date| Time \n---|---|---|---|---|--- \nxlintl32.dll_1025| xlintl32.dll| 16.0.5149.1000| 17106744| 15-Apr-21| 03:11 \nxlintl32.dll_1026| xlintl32.dll| 16.0.5149.1000| 17151280| 15-Apr-21| 03:11 \nxlintl32.dll_1029| xlintl32.dll| 16.0.5149.1000| 17184624| 15-Apr-21| 03:11 \nxlintl32.dll_1030| xlintl32.dll| 16.0.5149.1000| 17086808| 15-Apr-21| 03:11 \nxllex.dll_1030| xllex.dll| 16.0.4684.1000| 46312| 15-Apr-21| 03:11 \nxlintl32.dll_1031| xlintl32.dll| 16.0.5149.1000| 17225568| 15-Apr-21| 03:11 \nxlintl32.dll_1032| xlintl32.dll| 16.0.5149.1000| 17257280| 15-Apr-21| 03:11 \nxlintl32.dll_3082| xlintl32.dll| 16.0.5149.1000| 17136008| 15-Apr-21| 03:11 \nxlintl32.dll_1061| xlintl32.dll| 16.0.5149.1000| 17074024| 15-Apr-21| 03:11 \nxlintl32.dll_1035| xlintl32.dll| 16.0.5149.1000| 17084744| 15-Apr-21| 03:11 \nxlintl32.dll_1036| xlintl32.dll| 16.0.5149.1000| 17207160| 15-Apr-21| 03:11 \nxlintl32.dll_1037| xlintl32.dll| 16.0.5149.1000| 17041720| 15-Apr-21| 03:11 \nxlintl32.dll_1081| xlintl32.dll| 16.0.5149.1000| 17189184| 15-Apr-21| 03:11 \nxlintl32.dll_1050| xlintl32.dll| 16.0.5149.1000| 17111448| 15-Apr-21| 03:11 \nxlintl32.dll_1038| xlintl32.dll| 16.0.5149.1000| 17196368| 15-Apr-21| 03:11 \nxlintl32.dll_1057| xlintl32.dll| 16.0.5149.1000| 17079144| 15-Apr-21| 03:11 \nxlintl32.dll_1040| xlintl32.dll| 16.0.5149.1000| 17122168| 15-Apr-21| 03:11 \nxlintl32.dll_1041| xlintl32.dll| 16.0.5149.1000| 17139544| 15-Apr-21| 03:11 \nxlintl32.dll_1087| xlintl32.dll| 16.0.5149.1000| 17207600| 15-Apr-21| 03:11 \nxlintl32.dll_1042| xlintl32.dll| 16.0.5149.1000| 17123128| 15-Apr-21| 03:11 \nxlintl32.dll_1063| xlintl32.dll| 16.0.5149.1000| 17156480| 15-Apr-21| 03:11 \nxlintl32.dll_1062| xlintl32.dll| 16.0.5149.1000| 17131384| 15-Apr-21| 03:11 \nxlintl32.dll_1086| xlintl32.dll| 16.0.5149.1000| 17083760| 15-Apr-21| 03:11 \nxlintl32.dll_1044| xlintl32.dll| 16.0.5149.1000| 17071464| 15-Apr-21| 03:11 \nxlintl32.dll_1043| xlintl32.dll| 16.0.5149.1000| 17130864| 15-Apr-21| 03:11 \nxlintl32.dll_1045| xlintl32.dll| 16.0.5149.1000| 17202056| 15-Apr-21| 03:12 \nxlintl32.dll_1046| xlintl32.dll| 16.0.5149.1000| 17150328| 15-Apr-21| 03:12 \nxlintl32.dll_2070| xlintl32.dll| 16.0.5149.1000| 17151872| 15-Apr-21| 03:12 \nxlintl32.dll_1048| xlintl32.dll| 16.0.5149.1000| 17207672| 15-Apr-21| 03:12 \nxlintl32.dll_1049| xlintl32.dll| 16.0.5149.1000| 17142576| 15-Apr-21| 03:12 \nxlintl32.dll_1051| xlintl32.dll| 16.0.5149.1000| 17196912| 15-Apr-21| 03:12 \nxlintl32.dll_1060| xlintl32.dll| 16.0.5149.1000| 17120648| 15-Apr-21| 03:12 \nxlintl32.dll_2074| xlintl32.dll| 16.0.5149.1000| 17134984| 15-Apr-21| 03:12 \nxlintl32.dll_9242| xlintl32.dll| 16.0.5149.1000| 17134480| 15-Apr-21| 03:12 \nxlintl32.dll_1053| xlintl32.dll| 16.0.5149.1000| 17077616| 15-Apr-21| 03:12 \nxlintl32.dll_1054| xlintl32.dll| 16.0.5149.1000| 17144608| 15-Apr-21| 03:12 \nxlintl32.dll_1055| xlintl32.dll| 16.0.5149.1000| 17183624| 15-Apr-21| 03:12 \nxlintl32.dll_1058| xlintl32.dll| 16.0.5149.1000| 17147208| 15-Apr-21| 03:12 \nxlintl32.dll_1066| xlintl32.dll| 16.0.5149.1000| 17198936| 15-Apr-21| 03:12 \nxlintl32.dll_2052| xlintl32.dll| 16.0.5149.1000| 16975680| 15-Apr-21| 03:12 \nxlintl32.dll_1028| xlintl32.dll| 16.0.5149.1000| 16989488| 15-Apr-21| 03:12 \natpvbada.xlam_1030| atpvbada.xlam| | 54808| 15-Apr-21| 03:11 \natpvbade.xlam_1031| atpvbade.xlam| | 54814| 15-Apr-21| 03:11 \natpvbaes.xlam_3082| atpvbaes.xlam| | 54796| 15-Apr-21| 03:11 \natpvbafi.xlam_1035| atpvbafi.xlam| | 54821| 15-Apr-21| 03:11 \natpvbafr.xlam_1036| atpvbafr.xlam| | 54867| 15-Apr-21| 03:11 \natpvbait.xlam_1040| atpvbait.xlam| | 54845| 15-Apr-21| 03:11 \natpvbajp.xlam_1041| atpvbajp.xlam| | 54939| 15-Apr-21| 03:11 \natpvbako.xlam_1042| atpvbako.xlam| | 54843| 15-Apr-21| 03:11 \natpvbano.xlam_1044| atpvbano.xlam| | 54823| 15-Apr-21| 03:11 \natpvbanl.xlam_1043| atpvbanl.xlam| | 54791| 15-Apr-21| 03:11 \natpvbapb.xlam_1046| atpvbapb.xlam| | 54805| 15-Apr-21| 03:12 \natpvbptg.xlam_2070| atpvbptg.xlam| | 54748| 15-Apr-21| 03:12 \natpvbasv.xlam_1053| atpvbasv.xlam| | 54857| 15-Apr-21| 03:12 \natpvbacs.xlam_2052| atpvbacs.xlam| | 54805| 15-Apr-21| 03:12 \natpvbatc.xlam_1028| atpvbatc.xlam| | 54851| 15-Apr-21| 03:12 \nclient.models.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.models.dll| | 142816| 14-Apr-21| 10:06 \nclient.windows.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.dll| | 0| 14-Apr-21| 10:06 \ncontainer35.exe.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.container.exe| | 27376| 14-Apr-21| 10:06 \ncontainer35.exe.config.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.container.exe.config| | 137| 14-Apr-21| 10:06 \ncontainer40.exe.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.container.netfx40.exe| | 27384| 14-Apr-21| 10:06 \ncontainer40.exe.config.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.container.netfx40.exe.config| | 137| 14-Apr-21| 10:06 \ncontainer45.exe.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.container.netfx45.exe| | 28800| 14-Apr-21| 10:06 \ncontainer45.exe.config.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.container.netfx45.exe.config| | 137| 14-Apr-21| 10:06 \ndocument.af_za.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 224928| 14-Apr-21| 10:06 \ndocument.am_et.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 275496| 14-Apr-21| 10:06 \ndocument.ar_sa.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 271400| 14-Apr-21| 10:06 \ndocument.as_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 332880| 14-Apr-21| 10:06 \ndocument.az_latn_az.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 241312| 14-Apr-21| 10:06 \ndocument.be_by.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 279632| 14-Apr-21| 10:06 \ndocument.bg_bg.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 287824| 14-Apr-21| 10:06 \ndocument.bn_bd.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 332880| 14-Apr-21| 10:06 \ndocument.bn_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 339608| 14-Apr-21| 10:06 \ndocument.bs_latn_ba.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 229016| 14-Apr-21| 10:06 \ndocument.ca_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 234608| 14-Apr-21| 10:06 \ndocument.ca_es_valencia.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 233112| 14-Apr-21| 10:06 \ndocument.cs_cz.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 234536| 14-Apr-21| 10:06 \ndocument.cy_gb.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 229024| 14-Apr-21| 10:06 \ndocument.da_dk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 229016| 14-Apr-21| 10:06 \ndocument.de_de.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 238680| 14-Apr-21| 10:06 \ndocument.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.dll| | 2663464| 14-Apr-21| 10:06 \ndocument.el_gr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 304208| 14-Apr-21| 10:06 \ndocument.es_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 233112| 14-Apr-21| 10:06 \ndocument.et_ee.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 226392| 14-Apr-21| 10:06 \ndocument.eu_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 230440| 14-Apr-21| 10:06 \ndocument.fa_ir.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 261792| 14-Apr-21| 10:06 \ndocument.fi_fi.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 230440| 14-Apr-21| 10:06 \ndocument.fil_ph.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 238664| 14-Apr-21| 10:06 \ndocument.fr_fr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 241304| 14-Apr-21| 10:06 \ndocument.ga_ie.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 238672| 14-Apr-21| 10:06 \ndocument.gd_gb.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 246824| 14-Apr-21| 10:06 \ndocument.gl_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 234536| 14-Apr-21| 10:06 \ndocument.gu_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 324688| 14-Apr-21| 10:06 \ndocument.he_il.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 257688| 14-Apr-21| 10:06 \ndocument.hi_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 323232| 14-Apr-21| 10:06 \ndocument.hr_hr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 231904| 14-Apr-21| 10:06 \ndocument.hu_hu.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 238632| 14-Apr-21| 10:06 \ndocument.hy_am.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 287784| 14-Apr-21| 10:06 \ndocument.id_id.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 226416| 14-Apr-21| 10:06 \ndocument.is_is.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 230480| 14-Apr-21| 10:06 \ndocument.it_it.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 233112| 14-Apr-21| 10:06 \ndocument.ja_jp.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 255056| 14-Apr-21| 10:06 \ndocument.ka_ge.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 347800| 14-Apr-21| 10:06 \ndocument.kk_kz.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 281056| 14-Apr-21| 10:06 \ndocument.km_kh.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 332880| 14-Apr-21| 10:06 \ndocument.kn_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 341064| 14-Apr-21| 10:06 \ndocument.ko_kr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 238672| 14-Apr-21| 10:06 \ndocument.kok_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 328784| 14-Apr-21| 10:06 \ndocument.ky_kg.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 285152| 14-Apr-21| 10:06 \ndocument.lb_lu.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 237216| 14-Apr-21| 10:06 \ndocument.lt_lt.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 233120| 14-Apr-21| 10:06 \ndocument.lv_lv.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 234576| 14-Apr-21| 10:06 \ndocument.mi_nz.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 233112| 14-Apr-21| 10:06 \ndocument.mk_mk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 291920| 14-Apr-21| 10:06 \ndocument.ml_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 365648| 14-Apr-21| 10:06 \ndocument.mn_mn.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 283688| 14-Apr-21| 10:06 \ndocument.mr_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 324648| 14-Apr-21| 10:06 \ndocument.ms_my.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 227808| 14-Apr-21| 10:06 \ndocument.mt_mt.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 230440| 14-Apr-21| 10:06 \ndocument.nb_no.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 226344| 14-Apr-21| 10:06 \ndocument.ne_np.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 339616| 14-Apr-21| 10:06 \ndocument.nl_nl.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 233120| 14-Apr-21| 10:06 \ndocument.nn_no.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 226344| 14-Apr-21| 10:06 \ndocument.or_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 349256| 14-Apr-21| 10:06 \ndocument.pa_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 320552| 14-Apr-21| 10:06 \ndocument.pl_pl.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 238672| 14-Apr-21| 10:06 \ndocument.prs_af.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 265880| 14-Apr-21| 10:06 \ndocument.pt_br.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 234568| 14-Apr-21| 10:06 \ndocument.pt_pt.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 234576| 14-Apr-21| 10:06 \ndocument.quz_pe.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 234536| 14-Apr-21| 10:06 \ndocument.ro_ro.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 236000| 14-Apr-21| 10:06 \ndocument.ru_ru.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 286368| 14-Apr-21| 10:06 \ndocument.sd_arab_pk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 261784| 14-Apr-21| 10:06 \ndocument.si_lk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 322016| 14-Apr-21| 10:06 \ndocument.sk_sk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 234536| 14-Apr-21| 10:06 \ndocument.sl_si.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 234536| 14-Apr-21| 10:06 \ndocument.sq_al.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 238632| 14-Apr-21| 10:06 \ndocument.sr_cyrl_ba.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 281056| 14-Apr-21| 10:06 \ndocument.sr_cyrl_rs.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 281056| 14-Apr-21| 10:06 \ndocument.sr_latn_cs.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 231904| 14-Apr-21| 10:06 \ndocument.sr_latn_rs.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 230440| 14-Apr-21| 10:06 \ndocument.sv_se.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 229024| 14-Apr-21| 10:06 \ndocument.sw_ke.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 230480| 14-Apr-21| 10:06 \ndocument.ta_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 361512| 14-Apr-21| 10:06 \ndocument.te_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 341032| 14-Apr-21| 10:06 \ndocument.th_th.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 326112| 14-Apr-21| 10:06 \ndocument.tk_tm.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 230480| 14-Apr-21| 10:06 \ndocument.tr_tr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 230480| 14-Apr-21| 10:06 \ndocument.tt_ru.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 279632| 14-Apr-21| 10:06 \ndocument.ug_cn.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 279592| 14-Apr-21| 10:06 \ndocument.uk_ua.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 283728| 14-Apr-21| 10:06 \ndocument.ur_pk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 271440| 14-Apr-21| 10:06 \nexptoows.xla.1029| exptoows.xla| | 98304| 14-Apr-21| 10:09 \ndocument.uz_latn_uz.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 238632| 14-Apr-21| 10:06 \ndocument.vi_vn.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 250920| 14-Apr-21| 10:06 \ndocument.xmlserializers.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.xmlserializers.dll| | 1007256| 14-Apr-21| 10:06 \ndocument.zh_cn.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 216728| 14-Apr-21| 10:06 \ndocument.zh_tw.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 222248| 14-Apr-21| 10:06 \ndocumentformat.openxml.dll.07275332_82e4_4820_9fdd_2423cd8daa85| documentformat.openxml.dll| | 0| 14-Apr-21| 10:06 \ndocumentservices.af_za.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52936| 14-Apr-21| 10:06 \ndocumentservices.am_et.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 59872| 14-Apr-21| 10:06 \ndocumentservices.ar_sa.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52904| 14-Apr-21| 10:06 \ndocumentservices.as_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 62504| 14-Apr-21| 10:06 \ndocumentservices.az_latn_az.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52912| 14-Apr-21| 10:06 \ndocumentservices.be_by.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 57016| 14-Apr-21| 10:06 \ndocumentservices.bg_bg.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 56992| 14-Apr-21| 10:06 \ndocumentservices.bn_bd.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 59872| 14-Apr-21| 10:06 \ndocumentservices.bn_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 61104| 14-Apr-21| 10:06 \ndocumentservices.bs_latn_ba.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52896| 14-Apr-21| 10:06 \ndocumentservices.ca_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52896| 14-Apr-21| 10:06 \ndocumentservices.ca_es_valencia.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 54312| 14-Apr-21| 10:06 \ndocumentservices.cs_cz.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52912| 14-Apr-21| 10:06 \ndocumentservices.cy_gb.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 54360| 14-Apr-21| 10:06 \ndocumentservices.da_dk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 54312| 14-Apr-21| 10:06 \ndocumentservices.de_de.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52888| 14-Apr-21| 10:06 \ndocumentservices.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.dll| | 409128| 14-Apr-21| 10:06 \ndocumentservices.el_gr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 59872| 14-Apr-21| 10:06 \ndocumentservices.es_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 54312| 14-Apr-21| 10:06 \ndocumentservices.et_ee.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52888| 14-Apr-21| 10:06 \ndocumentservices.eu_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 54312| 14-Apr-21| 10:06 \ndocumentservices.fa_ir.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52912| 14-Apr-21| 10:06 \ndocumentservices.fi_fi.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52896| 14-Apr-21| 10:06 \ndocumentservices.fil_ph.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52912| 14-Apr-21| 10:06 \ndocumentservices.fr_fr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52912| 14-Apr-21| 10:06 \ndocumentservices.ga_ie.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 54352| 14-Apr-21| 10:06 \ndocumentservices.gd_gb.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 54352| 14-Apr-21| 10:06 \ndocumentservices.gl_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52888| 14-Apr-21| 10:06 \ndocumentservices.gu_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 57008| 14-Apr-21| 10:06 \ndocumentservices.he_il.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52912| 14-Apr-21| 10:06 \ndocumentservices.hi_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 62544| 14-Apr-21| 10:06 \ndocumentservices.hr_hr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52888| 14-Apr-21| 10:06 \ndocumentservices.hu_hu.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 55776| 14-Apr-21| 10:06 \ndocumentservices.hy_am.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 57008| 14-Apr-21| 10:06 \ndocumentservices.id_id.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52896| 14-Apr-21| 10:06 \ndocumentservices.is_is.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52896| 14-Apr-21| 10:06 \ndocumentservices.it_it.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 54312| 14-Apr-21| 10:06 \ndocumentservices.ja_jp.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52912| 14-Apr-21| 10:06 \ndocumentservices.ka_ge.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 61128| 14-Apr-21| 10:06 \ndocumentservices.kk_kz.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 58408| 14-Apr-21| 10:06 \ndocumentservices.km_kh.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 61088| 14-Apr-21| 10:06 \ndocumentservices.kn_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 62504| 14-Apr-21| 10:06 \ndocumentservices.ko_kr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52896| 14-Apr-21| 10:06 \ndocumentservices.kok_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 62544| 14-Apr-21| 10:06 \ndocumentservices.ky_kg.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 57008| 14-Apr-21| 10:06 \ndocumentservices.lb_lu.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52912| 14-Apr-21| 10:06 \ndocumentservices.lt_lt.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52888| 14-Apr-21| 10:06 \ndocumentservices.lv_lv.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 54352| 14-Apr-21| 10:06 \ndocumentservices.mi_nz.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52912| 14-Apr-21| 10:06 \ndocumentservices.mk_mk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 58440| 14-Apr-21| 10:06 \ndocumentservices.ml_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 61104| 14-Apr-21| 10:06 \ndocumentservices.mn_mn.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 57008| 14-Apr-21| 10:06 \ndocumentservices.mr_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 61080| 14-Apr-21| 10:06 \ndocumentservices.ms_my.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 54312| 14-Apr-21| 10:06 \ndocumentservices.mt_mt.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52912| 14-Apr-21| 10:06 \ndocumentservices.nb_no.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52912| 14-Apr-21| 10:06 \ndocumentservices.ne_np.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 57008| 14-Apr-21| 10:06 \ndocumentservices.nl_nl.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52896| 14-Apr-21| 10:06 \ndocumentservices.nn_no.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 54352| 14-Apr-21| 10:06 \ndocumentservices.or_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 61104| 14-Apr-21| 10:06 \ndocumentservices.pa_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 61104| 14-Apr-21| 10:06 \ndocumentservices.pl_pl.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52888| 14-Apr-21| 10:06 \ndocumentservices.prs_af.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52912| 14-Apr-21| 10:06 \ndocumentservices.pt_br.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52912| 14-Apr-21| 10:06 \ndocumentservices.pt_pt.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 54312| 14-Apr-21| 10:06 \ndocumentservices.quz_pe.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 54312| 14-Apr-21| 10:06 \ndocumentservices.ro_ro.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 54312| 14-Apr-21| 10:06 \ndocumentservices.ru_ru.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 56984| 14-Apr-21| 10:06 \ndocumentservices.sd_arab_pk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 55776| 14-Apr-21| 10:06 \ndocumentservices.si_lk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 57008| 14-Apr-21| 10:06 \ndocumentservices.sk_sk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52912| 14-Apr-21| 10:06 \ndocumentservices.sl_si.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52912| 14-Apr-21| 10:06 \ndocumentservices.sq_al.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52896| 14-Apr-21| 10:06 \ndocumentservices.sr_cyrl_ba.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 56984| 14-Apr-21| 10:06 \ndocumentservices.sr_cyrl_rs.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 59872| 14-Apr-21| 10:06 \ndocumentservices.sr_latn_cs.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 54352| 14-Apr-21| 10:06 \ndocumentservices.sr_latn_rs.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52888| 14-Apr-21| 10:06 \ndocumentservices.sv_se.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 54352| 14-Apr-21| 10:06 \ndocumentservices.sw_ke.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52912| 14-Apr-21| 10:06 \ndocumentservices.ta_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 62552| 14-Apr-21| 10:06 \ndocumentservices.te_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 61104| 14-Apr-21| 10:06 \ndocumentservices.th_th.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 61080| 14-Apr-21| 10:06 \ndocumentservices.tk_tm.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52936| 14-Apr-21| 10:06 \ndocumentservices.tr_tr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 54352| 14-Apr-21| 10:06 \ndocumentservices.tt_ru.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 57008| 14-Apr-21| 10:06 \ndocumentservices.ug_cn.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 57008| 14-Apr-21| 10:06 \ndocumentservices.uk_ua.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 58408| 14-Apr-21| 10:06 \ndocumentservices.ur_pk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 54352| 14-Apr-21| 10:06 \ndocumentservices.uz_latn_uz.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52912| 14-Apr-21| 10:06 \ndocumentservices.vi_vn.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 55776| 14-Apr-21| 10:06 \ndocumentservices.zh_cn.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 54352| 14-Apr-21| 10:06 \ndocumentservices.zh_tw.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52896| 14-Apr-21| 10:06 \neventsource.dll.07275332_82e4_4820_9fdd_2423cd8daa85| eventsource.dll| | 0| 14-Apr-21| 10:06 \nexcel.af_za.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 74792| 14-Apr-21| 10:06 \nexcel.am_et.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 85664| 14-Apr-21| 10:06 \nexcel.ar_sa.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 82984| 14-Apr-21| 10:06 \nexcel.as_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 104928| 14-Apr-21| 10:06 \nexcel.az_latn_az.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 80352| 14-Apr-21| 10:06 \nexcel.be_by.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 87080| 14-Apr-21| 10:06 \nexcel.bg_bg.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 92640| 14-Apr-21| 10:06 \nexcel.bn_bd.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 109024| 14-Apr-21| 10:06 \nexcel.bn_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 106144| 14-Apr-21| 10:06 \nexcel.bs_latn_ba.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 74832| 14-Apr-21| 10:06 \nexcel.ca_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 78888| 14-Apr-21| 10:06 \nexcel.ca_es_valencia.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 78888| 14-Apr-21| 10:06 \nexcel.cs_cz.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 74832| 14-Apr-21| 10:06 \nexcel.cy_gb.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 73368| 14-Apr-21| 10:06 \nexcel.da_dk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 74792| 14-Apr-21| 10:06 \nexcel.de_de.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 77472| 14-Apr-21| 10:06 \nexcel.editorribbon.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.editorribbon.dll| | 42672| 14-Apr-21| 10:06 \nexcel.el_gr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 95320| 14-Apr-21| 10:06 \nexcel.es_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 74832| 14-Apr-21| 10:06 \nexcel.et_ee.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 73376| 14-Apr-21| 10:06 \nexcel.eu_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 74792| 14-Apr-21| 10:06 \nexcel.extensions.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.extensions.dll| | 288416| 14-Apr-21| 10:06 \nexcel.fa_ir.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 81568| 14-Apr-21| 10:06 \nexcel.fi_fi.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 74792| 14-Apr-21| 10:06 \nexcel.fil_ph.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 78936| 14-Apr-21| 10:06 \nexcel.fr_fr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 77464| 14-Apr-21| 10:06 \nexcel.ga_ie.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 78888| 14-Apr-21| 10:06 \nexcel.gd_gb.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 77464| 14-Apr-21| 10:06 \nexcel.gl_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 76256| 14-Apr-21| 10:06 \nexcel.gu_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 103464| 14-Apr-21| 10:06 \nexcel.he_il.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 105704| 14-Apr-21| 10:06 \nexcel.hi_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 102048| 14-Apr-21| 10:06 \nexcel.hr_hr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 74792| 14-Apr-21| 10:06 \nexcel.hu_hu.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 78888| 14-Apr-21| 10:06 \nexcel.hy_am.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 91176| 14-Apr-21| 10:06 \nexcel.id_id.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 73376| 14-Apr-21| 10:06 \nexcel.is_is.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 74792| 14-Apr-21| 10:06 \nexcel.it_it.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 78888| 14-Apr-21| 10:06 \nexcel.ja_jp.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 82984| 14-Apr-21| 10:06 \nexcel.ka_ge.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 106144| 14-Apr-21| 10:06 \nexcel.kk_kz.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 87128| 14-Apr-21| 10:06 \nexcel.km_kh.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 103504| 14-Apr-21| 10:06 \nexcel.kn_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 107608| 14-Apr-21| 10:06 \nexcel.ko_kr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 78888| 14-Apr-21| 10:06 \nexcel.kok_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 103464| 14-Apr-21| 10:06 \nexcel.ky_kg.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 87080| 14-Apr-21| 10:06 \nexcel.lb_lu.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 78928| 14-Apr-21| 10:06 \nexcel.lt_lt.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 74792| 14-Apr-21| 10:06 \nexcel.lv_lv.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 74832| 14-Apr-21| 10:06 \nexcel.mi_nz.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 74832| 14-Apr-21| 10:06 \nexcel.mk_mk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 89760| 14-Apr-21| 10:06 \nexcel.ml_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 117216| 14-Apr-21| 10:06 \nexcel.mn_mn.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 91216| 14-Apr-21| 10:06 \nexcel.mr_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 103464| 14-Apr-21| 10:06 \nexcel.ms_my.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 74840| 14-Apr-21| 10:06 \nexcel.mt_mt.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 73376| 14-Apr-21| 10:06 \nexcel.nb_no.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 74840| 14-Apr-21| 10:06 \nexcel.ne_np.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 102040| 14-Apr-21| 10:06 \nexcel.nl_nl.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 73368| 14-Apr-21| 10:06 \nexcel.nn_no.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 74792| 14-Apr-21| 10:06 \nexcel.or_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 107600| 14-Apr-21| 10:06 \nexcel.pa_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 102048| 14-Apr-21| 10:06 \nexcel.pl_pl.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 77464| 14-Apr-21| 10:06 \nexcel.prs_af.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 87128| 14-Apr-21| 10:06 \nexcel.pt_br.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 74792| 14-Apr-21| 10:06 \nexcel.pt_pt.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 77472| 14-Apr-21| 10:06 \nexcel.quz_pe.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 78928| 14-Apr-21| 10:06 \nexcel.ro_ro.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 77496| 14-Apr-21| 10:06 \nexcel.ru_ru.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 85664| 14-Apr-21| 10:06 \nexcel.sd_arab_pk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 85656| 14-Apr-21| 10:06 \nexcel.si_lk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 99408| 14-Apr-21| 10:06 \nexcel.sk_sk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 73368| 14-Apr-21| 10:06 \nexcel.sl_si.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 74792| 14-Apr-21| 10:06 \nexcel.sq_al.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 77472| 14-Apr-21| 10:06 \nexcel.sr_cyrl_ba.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 89760| 14-Apr-21| 10:06 \nexcel.sr_cyrl_rs.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 91176| 14-Apr-21| 10:06 \nexcel.sr_latn_cs.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 74832| 14-Apr-21| 10:06 \nexcel.sr_latn_rs.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 74792| 14-Apr-21| 10:06 \nexcel.sv_se.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 73376| 14-Apr-21| 10:06 \nexcel.sw_ke.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 73376| 14-Apr-21| 10:06 \nexcel.ta_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 111656| 14-Apr-21| 10:06 \nexcel.te_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 103464| 14-Apr-21| 10:06 \nexcel.th_th.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 97952| 14-Apr-21| 10:06 \nexcel.themes.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.themes.dll| | 67407000| 14-Apr-21| 10:06 \nexcel.tk_tm.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 73368| 14-Apr-21| 10:06 \nexcel.tr_tr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 73376| 14-Apr-21| 10:06 \nexcel.tt_ru.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 85664| 14-Apr-21| 10:06 \nexcel.ug_cn.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 87128| 14-Apr-21| 10:06 \nexcel.uk_ua.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 87080| 14-Apr-21| 10:06 \nexcel.ur_pk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 85664| 14-Apr-21| 10:06 \nexcel.uz_latn_uz.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 76256| 14-Apr-21| 10:06 \nexcel.vi_vn.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 84448| 14-Apr-21| 10:06 \nexcel.zh_cn.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 70736| 14-Apr-21| 10:06 \nexcel.zh_tw.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 70744| 14-Apr-21| 10:06 \nfil9270b25a9451a19a141d6fe93a590a7c.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.dll| | 1535528| 14-Apr-21| 10:06 \nhis.connectors.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.hostintegration.connectors.dll| | 5224528| 14-Apr-21| 10:06 \nlocalytics.dll.07275332_82e4_4820_9fdd_2423cd8daa85| localytics.dll| | 0| 14-Apr-21| 10:06 \nmashup.addintelemetry.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.addintelemetry.dll| | 37928| 14-Apr-21| 10:06 \nmashupcompression.dll.07275332_82e4_4820_9fdd_2423cd8daa85| mashupcompression.dll| | 127648| 14-Apr-21| 10:06 \nmashupengine.ar_sa.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 709712| 14-Apr-21| 10:06 \nmashupengine.bg_bg.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 813536| 14-Apr-21| 10:06 \nmashupengine.ca_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 599080| 14-Apr-21| 10:06 \nmashupengine.cs_cz.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 585376| 14-Apr-21| 10:06 \nmashupengine.da_dk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 590888| 14-Apr-21| 10:06 \nmashupengine.de_de.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 629216| 14-Apr-21| 10:06 \nmashupengine.el_gr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 881704| 14-Apr-21| 10:06 \nmashupengine.es_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 603176| 14-Apr-21| 10:06 \nmashupengine.et_ee.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 558160| 14-Apr-21| 10:06 \nmashupengine.eu_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 578632| 14-Apr-21| 10:06 \nmashupengine.fi_fi.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 581280| 14-Apr-21| 10:06 \nmashupengine.fr_fr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 622240| 14-Apr-21| 10:06 \nmashupengine.gl_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 589472| 14-Apr-21| 10:06 \nmashupengine.he_il.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 659104| 14-Apr-21| 10:06 \nmashupengine.hi_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 999072| 14-Apr-21| 10:06 \nmashupengine.hr_hr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 573088| 14-Apr-21| 10:06 \nmashupengine.hu_hu.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 635944| 14-Apr-21| 10:06 \nmashupengine.id_id.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 573088| 14-Apr-21| 10:06 \nmashupengine.it_it.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 607320| 14-Apr-21| 10:06 \nmashupengine.ja_jp.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 652368| 14-Apr-21| 10:06 \nmashupengine.kk_kz.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 779304| 14-Apr-21| 10:06 \nmashupengine.ko_kr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 615464| 14-Apr-21| 10:06 \nmashupengine.lt_lt.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 586832| 14-Apr-21| 10:06 \nmashupengine.lv_lv.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 604640| 14-Apr-21| 10:06 \nmashupengine.ms_my.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 577176| 14-Apr-21| 10:06 \nmashupengine.nb_no.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 574504| 14-Apr-21| 10:06 \nmashupengine.nl_nl.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 612832| 14-Apr-21| 10:06 \nmashupengine.pl_pl.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 615464| 14-Apr-21| 10:06 \nmashupengine.pt_br.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 594984| 14-Apr-21| 10:06 \nmashupengine.pt_pt.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 599120| 14-Apr-21| 10:06 \nmashupengine.ro_ro.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 611368| 14-Apr-21| 10:06 \nmashupengine.ru_ru.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 812072| 14-Apr-21| 10:06 \nmashupengine.sk_sk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 616240| 14-Apr-21| 10:06 \nmashupengine.sl_si.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 570448| 14-Apr-21| 10:06 \nmashupengine.sr_cyrl_rs.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 775208| 14-Apr-21| 10:06 \nmashupengine.sr_latn_cs.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 570408| 14-Apr-21| 10:06 \nmashupengine.sr_latn_rs.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 570440| 14-Apr-21| 10:06 \nmashupengine.sv_se.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 578648| 14-Apr-21| 10:06 \nmashupengine.th_th.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 937632| 14-Apr-21| 10:06 \nmashupengine.tr_tr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 594984| 14-Apr-21| 10:06 \nmashupengine.uk_ua.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 803920| 14-Apr-21| 10:06 \nmashupengine.vi_vn.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 659104| 14-Apr-21| 10:06 \nmashupengine.zh_cn.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 521296| 14-Apr-21| 10:06 \nmashupengine.zh_tw.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 528024| 14-Apr-21| 10:06 \nmicrosoft.data.edm.netfx35.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.edm.netfx35.dll| | 667864| 14-Apr-21| 10:06 \nmicrosoft.data.odata.netfx35.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.odata.netfx35.dll| | 1461472| 14-Apr-21| 10:06 \nmicrosoft.data.odata.qu.35.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.odata.query.netfx35.dll| | 188152| 14-Apr-21| 10:06 \nmicrosoft.data.sapclient.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.dll| | 927408| 14-Apr-21| 10:06 \nmicrosoft.mashup.client.initialize.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.initialization.dll| | 0| 14-Apr-21| 10:06 \nmicrosoft.mashup.client.ui.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.dll| | 43292712| 14-Apr-21| 10:06 \nmicrosoft.mashup.eventsource.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.eventsource.dll| | 160808| 14-Apr-21| 10:06 \nmicrosoft.mashup.sapbwprovider.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.sapbwprovider.dll| | 317600| 14-Apr-21| 10:06 \nmicrosoft.mashup.shims.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.shims.dll| | 31200| 14-Apr-21| 10:06 \nmicrosoft.mashupengine.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.dll| | 13881384| 14-Apr-21| 10:06 \nmicrosoft.odata.core.netfx35.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.odata.core.netfx35.dll| | 1444576| 14-Apr-21| 10:06 \nmicrosoft.odata.core.netfx35.v7.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.odata.core.netfx35.v7.dll| | 1267944| 14-Apr-21| 10:06 \nmicrosoft.odata.edm.netfx35.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.odata.edm.netfx35.dll| | 785632| 14-Apr-21| 10:06 \nmicrosoft.odata.edm.netfx35.v7.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.odata.edm.netfx35.v7.dll| | 751840| 14-Apr-21| 10:06 \nmicrosoft.powerbi.adomdclient.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.powerbi.adomdclient.dll| | 1111232| 14-Apr-21| 10:06 \nmicrosoft.spatial.netfx35.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.spatial.netfx35.dll| | 133336| 14-Apr-21| 10:06 \nmicrosoft.spatial.netfx35.v7.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.spatial.netfx35.v7.dll| | 131296| 14-Apr-21| 10:06 \nmicrsoft.mashup.internallibrary.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.internallibrary.dll| | 166952| 14-Apr-21| 10:06 \noauth.ar_sa.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 22192| 14-Apr-21| 10:06 \noauth.bg_bg.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 22192| 14-Apr-21| 10:06 \noauth.ca_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 14-Apr-21| 10:06 \noauth.cs_cz.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 14-Apr-21| 10:06 \noauth.da_dk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 14-Apr-21| 10:06 \noauth.de_de.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 14-Apr-21| 10:06 \noauth.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.dll| | 89760| 14-Apr-21| 10:06 \noauth.el_gr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 22704| 14-Apr-21| 10:06 \noauth.es_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 14-Apr-21| 10:06 \noauth.et_ee.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 14-Apr-21| 10:06 \noauth.eu_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 14-Apr-21| 10:06 \noauth.fi_fi.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 14-Apr-21| 10:06 \noauth.fr_fr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 14-Apr-21| 10:06 \noauth.gl_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 14-Apr-21| 10:06 \noauth.he_il.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 14-Apr-21| 10:06 \noauth.hi_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 22704| 14-Apr-21| 10:06 \noauth.hr_hr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 14-Apr-21| 10:06 \noauth.hu_hu.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 14-Apr-21| 10:06 \noauth.id_id.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 14-Apr-21| 10:06 \noauth.it_it.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 14-Apr-21| 10:06 \noauth.ja_jp.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 22184| 14-Apr-21| 10:06 \noauth.kk_kz.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 22192| 14-Apr-21| 10:06 \noauth.ko_kr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 14-Apr-21| 10:06 \noauth.lt_lt.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 14-Apr-21| 10:06 \noauth.lv_lv.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 14-Apr-21| 10:06 \noauth.ms_my.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 14-Apr-21| 10:06 \noauth.nb_no.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 14-Apr-21| 10:06 \noauth.nl_nl.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 14-Apr-21| 10:06 \noauth.pl_pl.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 14-Apr-21| 10:06 \noauth.pt_br.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 14-Apr-21| 10:06 \noauth.pt_pt.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 14-Apr-21| 10:06 \noauth.ro_ro.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 14-Apr-21| 10:06 \noauth.ru_ru.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 22704| 14-Apr-21| 10:06 \noauth.sk_sk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 14-Apr-21| 10:06 \noauth.sl_si.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 14-Apr-21| 10:06 \noauth.sr_cyrl_rs.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 22192| 14-Apr-21| 10:06 \noauth.sr_latn_cs.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 14-Apr-21| 10:06 \noauth.sr_latn_rs.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 14-Apr-21| 10:06 \noauth.sv_se.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 14-Apr-21| 10:06 \noauth.th_th.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 23216| 14-Apr-21| 10:06 \noauth.tr_tr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 14-Apr-21| 10:06 \noauth.uk_ua.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 22192| 14-Apr-21| 10:06 \noauth.vi_vn.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 22192| 14-Apr-21| 10:06 \noauth.zh_cn.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21168| 14-Apr-21| 10:06 \noauth.zh_tw.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21168| 14-Apr-21| 10:06 \noledbinteropdll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbinterop.dll| | 147616| 14-Apr-21| 10:06 \noledbprovider.ar_sa.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 14-Apr-21| 10:06 \noledbprovider.bg_bg.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 14-Apr-21| 10:06 \noledbprovider.ca_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 14-Apr-21| 10:06 \noledbprovider.cs_cz.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 14-Apr-21| 10:06 \noledbprovider.da_dk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 14-Apr-21| 10:06 \noledbprovider.de_de.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 14-Apr-21| 10:06 \noledbprovider.el_gr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 14-Apr-21| 10:06 \noledbprovider.es_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 14-Apr-21| 10:06 \noledbprovider.et_ee.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 14-Apr-21| 10:06 \noledbprovider.eu_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 14-Apr-21| 10:06 \noledbprovider.fi_fi.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 14-Apr-21| 10:06 \noledbprovider.fr_fr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 14-Apr-21| 10:06 \noledbprovider.gl_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 14-Apr-21| 10:06 \noledbprovider.he_il.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 14-Apr-21| 10:06 \noledbprovider.hi_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 14-Apr-21| 10:06 \noledbprovider.hr_hr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 14-Apr-21| 10:06 \noledbprovider.hu_hu.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 14-Apr-21| 10:06 \noledbprovider.id_id.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 14-Apr-21| 10:06 \noledbprovider.it_it.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 14-Apr-21| 10:06 \noledbprovider.ja_jp.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 14-Apr-21| 10:06 \noledbprovider.kk_kz.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 14-Apr-21| 10:06 \noledbprovider.ko_kr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 14-Apr-21| 10:06 \noledbprovider.lt_lt.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 14-Apr-21| 10:06 \noledbprovider.lv_lv.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 14-Apr-21| 10:06 \noledbprovider.ms_my.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 14-Apr-21| 10:06 \noledbprovider.nb_no.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 14-Apr-21| 10:06 \noledbprovider.nl_nl.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 14-Apr-21| 10:06 \noledbprovider.pl_pl.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 14-Apr-21| 10:06 \noledbprovider.pt_br.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 14-Apr-21| 10:06 \noledbprovider.pt_pt.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 14-Apr-21| 10:06 \noledbprovider.ro_ro.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 14-Apr-21| 10:06 \noledbprovider.ru_ru.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 14-Apr-21| 10:06 \noledbprovider.sk_sk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 14-Apr-21| 10:06 \noledbprovider.sl_si.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 14-Apr-21| 10:06 \noledbprovider.sr_cyrl_rs.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 14-Apr-21| 10:06 \noledbprovider.sr_latn_cs.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 14-Apr-21| 10:06 \noledbprovider.sr_latn_rs.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 14-Apr-21| 10:06 \noledbprovider.sv_se.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 14-Apr-21| 10:06 \noledbprovider.th_th.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 14-Apr-21| 10:06 \noledbprovider.tr_tr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 14-Apr-21| 10:06 \noledbprovider.uk_ua.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 14-Apr-21| 10:06 \noledbprovider.vi_vn.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 14-Apr-21| 10:06 \noledbprovider.zh_cn.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 14-Apr-21| 10:06 \noledbprovider.zh_tw.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 14-Apr-21| 10:06 \noledbproviderdll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.dll| | 69160| 14-Apr-21| 10:06 \npackaging.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.packaging.dll| | 52384| 14-Apr-21| 10:06 \nprivate_odbc32.dll.07275332_82e4_4820_9fdd_2423cd8daa85| private_odbc32.dll| | 657088| 14-Apr-21| 10:06 \nprovidershared.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.providershared.dll| | 55456| 14-Apr-21| 10:06 \nsapclient.ar_sa.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 44720| 14-Apr-21| 10:06 \nsapclient.bg_bg.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 35504| 14-Apr-21| 10:06 \nsapclient.ca_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 32432| 14-Apr-21| 10:06 \nexptoows.xla.1030| exptoows.xla| | 98304| 14-Apr-21| 10:05 \nexptoows.xla.1031| exptoows.xla| | 98304| 14-Apr-21| 10:09 \nsapclient.cs_cz.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 31920| 14-Apr-21| 10:06 \nsapclient.da_dk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 31920| 14-Apr-21| 10:06 \nsapclient.de_de.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 32432| 14-Apr-21| 10:06 \nsapclient.el_gr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 48816| 14-Apr-21| 10:06 \nsapclient.es_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 32432| 14-Apr-21| 10:06 \nsapclient.et_ee.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 31408| 14-Apr-21| 10:06 \nsapclient.eu_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 31920| 14-Apr-21| 10:06 \nsapclient.fi_fi.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 31920| 14-Apr-21| 10:06 \nsapclient.fr_fr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 32432| 14-Apr-21| 10:06 \nsapclient.gl_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 31920| 14-Apr-21| 10:06 \nsapclient.he_il.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 32944| 14-Apr-21| 10:06 \nsapclient.hi_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 48816| 14-Apr-21| 10:06 \nsapclient.hr_hr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 31920| 14-Apr-21| 10:06 \nsapclient.hu_hu.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 32432| 14-Apr-21| 10:06 \nsapclient.id_id.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 31408| 14-Apr-21| 10:06 \nsapclient.it_it.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 32944| 14-Apr-21| 10:06 \nsapclient.ja_jp.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 44720| 14-Apr-21| 10:06 \nsapclient.kk_kz.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 44720| 14-Apr-21| 10:06 \nsapclient.ko_kr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 32432| 14-Apr-21| 10:06 \nsapclient.lt_lt.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 31920| 14-Apr-21| 10:06 \nsapclient.lv_lv.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 31920| 14-Apr-21| 10:06 \nsapclient.ms_my.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 31408| 14-Apr-21| 10:06 \nsapclient.nb_no.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 31408| 14-Apr-21| 10:06 \nsapclient.nl_nl.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 32432| 14-Apr-21| 10:06 \nsapclient.pl_pl.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 32944| 14-Apr-21| 10:06 \nsapclient.pt_br.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 32432| 14-Apr-21| 10:06 \nsapclient.pt_pt.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 31920| 14-Apr-21| 10:06 \nsapclient.ro_ro.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 31920| 14-Apr-21| 10:06 \nsapclient.ru_ru.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 35504| 14-Apr-21| 10:06 \nsapclient.sk_sk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 32432| 14-Apr-21| 10:06 \nsapclient.sl_si.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 31920| 14-Apr-21| 10:06 \nsapclient.sr_cyrl_rs.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 35504| 14-Apr-21| 10:06 \nsapclient.sr_latn_cs.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 31920| 14-Apr-21| 10:06 \nexptoows.xla.1032| exptoows.xla| | 98304| 14-Apr-21| 10:05 \nexptoows.xla.1033| exptoows.xla| | 98304| 14-Apr-21| 10:09 \nsapclient.sr_latn_rs.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 31920| 14-Apr-21| 10:06 \nsapclient.sv_se.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 31920| 14-Apr-21| 10:06 \nsapclient.th_th.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 48816| 14-Apr-21| 10:06 \nsapclient.tr_tr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 32432| 14-Apr-21| 10:06 \nsapclient.uk_ua.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 48816| 14-Apr-21| 10:06 \nsapclient.vi_vn.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 32944| 14-Apr-21| 10:06 \nsapclient.zh_cn.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 30896| 14-Apr-21| 10:06 \nsapclient.zh_tw.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.resources.dll| | 30896| 14-Apr-21| 10:06 \nscriptdom.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.scriptdom.dll| | 2371760| 14-Apr-21| 10:06 \nsqmapi.dll.07275332_82e4_4820_9fdd_2423cd8daa85| sqmapi_x86.dll| | 0| 14-Apr-21| 10:06 \nstorage.xmlserializers.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.storage.xmlserializers.dll| | 151216| 14-Apr-21| 10:06 \nstorageclient.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.windowsazure.storageclient.dll| | 0| 14-Apr-21| 10:06 \nsystem.spatial.netfx35.dll.07275332_82e4_4820_9fdd_2423cd8daa85| system.spatial.netfx35.dll| | 124624| 14-Apr-21| 10:06 \ntransformdatabyexample.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.dataintegration.transformdatabyexample.dll| | 62016| 14-Apr-21| 10:06 \nui.af_za.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 242776| 14-Apr-21| 10:06 \nui.am_et.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 294560| 14-Apr-21| 10:06 \nui.ar_sa.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 279632| 14-Apr-21| 10:06 \nui.as_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 357416| 14-Apr-21| 10:06 \nui.az_latn_az.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 255016| 14-Apr-21| 10:06 \nui.be_by.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 304168| 14-Apr-21| 10:06 \nui.bg_bg.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 315008| 14-Apr-21| 10:06 \nui.bn_bd.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 360096| 14-Apr-21| 10:06 \nui.bn_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 368280| 14-Apr-21| 10:06 \nui.bs_latn_ba.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 242768| 14-Apr-21| 10:06 \nui.ca_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 249464| 14-Apr-21| 10:06 \nui.ca_es_valencia.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 249496| 14-Apr-21| 10:06 \nui.cs_cz.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 246832| 14-Apr-21| 10:06 \nui.cy_gb.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 244192| 14-Apr-21| 10:06 \nui.da_dk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 246792| 14-Apr-21| 10:06 \nui.de_de.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 254984| 14-Apr-21| 10:06 \nui.el_gr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 332808| 14-Apr-21| 10:06 \nui.es_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 249472| 14-Apr-21| 10:06 \nui.et_ee.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 238600| 14-Apr-21| 10:06 \nui.eu_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 241280| 14-Apr-21| 10:06 \nui.fa_ir.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 287784| 14-Apr-21| 10:06 \nui.fi_fi.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 242736| 14-Apr-21| 10:06 \nui.fil_ph.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 250920| 14-Apr-21| 10:06 \nui.fr_fr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 254984| 14-Apr-21| 10:06 \nui.ga_ie.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 255016| 14-Apr-21| 10:06 \nui.gd_gb.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 255016| 14-Apr-21| 10:06 \nui.gl_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 248256| 14-Apr-21| 10:06 \nui.gu_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 347808| 14-Apr-21| 10:06 \nui.he_il.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 268768| 14-Apr-21| 10:06 \nui.hi_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 351904| 14-Apr-21| 10:06 \nui.hr_hr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 244160| 14-Apr-21| 10:06 \nui.hu_hu.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 260544| 14-Apr-21| 10:06 \nui.hy_am.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 312408| 14-Apr-21| 10:06 \nui.id_id.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 237184| 14-Apr-21| 10:06 \nui.is_is.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 241312| 14-Apr-21| 10:06 \nui.it_it.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 250888| 14-Apr-21| 10:06 \nui.ja_jp.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 263256| 14-Apr-21| 10:06 \nexptoows.xla.1035| exptoows.xla| | 98304| 14-Apr-21| 10:05 \nui.ka_ge.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 381992| 14-Apr-21| 10:06 \nui.kk_kz.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 300040| 14-Apr-21| 10:06 \nui.km_kh.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 365648| 14-Apr-21| 10:06 \nui.kn_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 373800| 14-Apr-21| 10:06 \nui.ko_kr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 245376| 14-Apr-21| 10:06 \nui.kok_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 355992| 14-Apr-21| 10:06 \nui.ky_kg.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 309728| 14-Apr-21| 10:06 \nui.lb_lu.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 255056| 14-Apr-21| 10:06 \nui.lt_lt.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 249472| 14-Apr-21| 10:06 \nui.lv_lv.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 250928| 14-Apr-21| 10:06 \nui.mi_nz.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 246824| 14-Apr-21| 10:06 \nui.mk_mk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 310944| 14-Apr-21| 10:06 \nui.ml_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 402512| 14-Apr-21| 10:06 \nui.mn_mn.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 304216| 14-Apr-21| 10:06 \nui.mr_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 357416| 14-Apr-21| 10:06 \nui.ms_my.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 242696| 14-Apr-21| 10:06 \nui.mt_mt.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 246864| 14-Apr-21| 10:06 \nexptoows.xla.1036| exptoows.xla| | 98304| 14-Apr-21| 10:09 \nui.nb_no.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 242744| 14-Apr-21| 10:06 \nui.ne_np.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 376472| 14-Apr-21| 10:06 \nui.nl_nl.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 246792| 14-Apr-21| 10:06 \nui.nn_no.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 242776| 14-Apr-21| 10:06 \nui.or_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 386128| 14-Apr-21| 10:06 \nui.pa_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 346592| 14-Apr-21| 10:06 \nui.pl_pl.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 249472| 14-Apr-21| 10:06 \nui.prs_af.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 294560| 14-Apr-21| 10:06 \nui.pt_br.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 246792| 14-Apr-21| 10:06 \nui.pt_pt.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 249472| 14-Apr-21| 10:06 \nui.quz_pe.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 246896| 14-Apr-21| 10:06 \nui.ro_ro.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 250888| 14-Apr-21| 10:06 \nui.ru_ru.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 312376| 14-Apr-21| 10:06 \nui.sd_arab_pk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 279632| 14-Apr-21| 10:06 \nui.si_lk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 343704| 14-Apr-21| 10:06 \nui.sk_sk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 245376| 14-Apr-21| 10:06 \nui.sl_si.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 242696| 14-Apr-21| 10:06 \nui.sq_al.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 255048| 14-Apr-21| 10:06 \nui.sr_cyrl_ba.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 304168| 14-Apr-21| 10:06 \nui.sr_cyrl_rs.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 298624| 14-Apr-21| 10:06 \nui.sr_latn_cs.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 241272| 14-Apr-21| 10:06 \nui.sr_latn_rs.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 242696| 14-Apr-21| 10:06 \nui.sv_se.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 241272| 14-Apr-21| 10:06 \nui.sw_ke.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 242768| 14-Apr-21| 10:06 \nui.ta_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 406568| 14-Apr-21| 10:06 \nui.te_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 373840| 14-Apr-21| 10:06 \nui.th_th.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 349264| 14-Apr-21| 10:06 \nui.tk_tm.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 242728| 14-Apr-21| 10:06 \nui.tr_tr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 248248| 14-Apr-21| 10:06 \nui.tt_ru.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 308304| 14-Apr-21| 10:06 \nui.ug_cn.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 300072| 14-Apr-21| 10:06 \nui.uk_ua.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 305600| 14-Apr-21| 10:06 \nui.ur_pk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 296016| 14-Apr-21| 10:06 \nui.uz_latn_uz.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 250920| 14-Apr-21| 10:06 \nui.vi_vn.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 263208| 14-Apr-21| 10:06 \nui.zh_cn.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 224920| 14-Apr-21| 10:06 \nui.zh_tw.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.resources.dll| | 229024| 14-Apr-21| 10:06 \nunity.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.practices.unity.dll| | 133328| 14-Apr-21| 10:06 \nwindows.af_za.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 14-Apr-21| 10:06 \nwindows.am_et.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 14-Apr-21| 10:06 \nwindows.ar_sa.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 14-Apr-21| 10:06 \nwindows.as_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 14-Apr-21| 10:06 \nwindows.az_latn_az.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 14-Apr-21| 10:06 \nwindows.be_by.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 14-Apr-21| 10:06 \nwindows.bg_bg.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 14-Apr-21| 10:06 \nwindows.bn_bd.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 14-Apr-21| 10:06 \nwindows.bn_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 14-Apr-21| 10:06 \nwindows.bs_latn_ba.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 14-Apr-21| 10:06 \nwindows.ca_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 14-Apr-21| 10:06 \nwindows.ca_es_valencia.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 14-Apr-21| 10:06 \nwindows.cs_cz.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 14-Apr-21| 10:06 \nwindows.cy_gb.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 14-Apr-21| 10:06 \nwindows.da_dk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 14-Apr-21| 10:06 \nwindows.de_de.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 14-Apr-21| 10:06 \nwindows.el_gr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 14-Apr-21| 10:06 \nwindows.es_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 14-Apr-21| 10:06 \nwindows.et_ee.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 14-Apr-21| 10:06 \nwindows.eu_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 14-Apr-21| 10:06 \nwindows.fa_ir.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 14-Apr-21| 10:06 \nwindows.fi_fi.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 14-Apr-21| 10:06 \nwindows.fil_ph.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 14-Apr-21| 10:06 \nwindows.fr_fr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 14-Apr-21| 10:06 \nwindows.ga_ie.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 14-Apr-21| 10:06 \nwindows.gd_gb.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 14-Apr-21| 10:06 \nwindows.gl_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 14-Apr-21| 10:06 \nwindows.gu_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 14-Apr-21| 10:06 \nwindows.he_il.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 14-Apr-21| 10:06 \nwindows.hi_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 14-Apr-21| 10:06 \nwindows.hr_hr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 14-Apr-21| 10:06 \nwindows.hu_hu.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 14-Apr-21| 10:06 \nwindows.hy_am.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.resources.dll| | 0| 14-Apr-21| 10:06 \nwindows.id_id.resources.dll.07275332_82e4_4820_9fdd_2423cd