Hacked By AnonymousFox

Current Path : C:/Windows/SysWOW64/
Upload File :
Current File : C:/Windows/SysWOW64/capisp.dll

MZ@	!L!This program cannot be run in DOS mode.

$Q????ȝ<?ȝ;?>ȵ?ȝ>?ȝ??ȝ7?ȝ?ȝ=?Rich?PEL.'!
49P



@APApap @ T`l.text924 `.dataLP8@.idata
`:@@.rsrc pH@@.relocN@BPhPP la
u7`-111579<0?`?*...AppData\Local\Microsoft\CredentialsAppData\Local\Microsoft\VaultAppData\Roaming\Microsoft\CredentialsAppData\Roaming\Microsoft\Crypto\RSAAppData\Roaming\Microsoft\Crypto\DSSAppData\Roaming\Microsoft\Crypto\KeysAppData\Roaming\Microsoft\ProtectAppData\Roaming\Microsoft\VaultDllRegisterServerDisableAdministratorIfApplicableds\security\cryptoapi\capisp\capisp.cDcapisp.dll::GetVersionEx failed: %ucapisp.dll::LsaOpenPolicy failed: %xcapisp.dll::LsaQueryInformationPolicy failed: %xcapisp.dll::SamConnect failed: %xcapisp.dll::SamOpenDomain failed: %xcapisp.dll::DomainName=%wZcapisp.dll::DomainSid=%wscapisp.dll::DomainSid=?capisp.dll::SamOpenUser failed: %xcapisp.dll::SamQueryInformationUser failed: %xcapisp.dll::SamSetInformationUser failed: %xcapisp.dll::DisableAdministratorIfApplicable disabled the admin account.Software\Microsoft\Cryptography\CryptoSysPrepHasSpecializedCheckIFCryptoSysPrepSpecializedcapisp.dll::CheckIFCryptoSysPrepSpecialized: creating volatile registry key failedcapisp.dll::CheckIFCryptoSysPrepSpecialized: returning %xSoftware\Microsoft\CryptographyMachineGuidrsaenh.dllCAPISysPrep_Generalizecapisp.dll::CAPISysPrep_Generalize: rsaenh.dll register faileddssenh.dllcapisp.dll::CAPISysPrep_Generalize: dssenh.dll register failedcapisp.dll::CAPISysPrep_Generalize: NukeTempCryptoFiles failedcapisp.dll::CAPISysPrep_Generalize: returning %xSysprepModeMicrosoft\Windows\CurrentVersion\Setup\SysprepupgradeCryptoSysPrep_Specialize_Internalcapisp.dll::CryptoSysPrep_Specialize: checking if we already specialized failedcapisp.dll::CryptoSysPrep_Specialize: wait for SAM service failedcapisp.dll::CryptoSysPrep_Specialize: rsaenh.dll register failedcapisp.dll::CryptoSysPrep_Specialize: dssenh.dll register failedcapisp.dll::CryptoSysPrep_Specialize: DisableAdministratorIfApplicable failedcapisp.dll::CryptoSysPrep_Specialize: returning %xSOFTWARE\Microsoft\Windows\CurrentVersion\OOBEKryptonModeEnabledCreateMachineGuidcapisp.dll::CryptoSysPrep_Specialize: could not open/create machine guid key %08xKryptonMachineGuidcapisp.dll::CryptoSysPrep_Specialize: Krypton mode detected; using existing guid "%s"capisp.dll::CryptoSysPrep_Specialize: Krypton mode detected, but no valid MachineGuid key was found. Generating a random guid instead. %08xcapisp.dll::CryptoSysPrep_Specialize: failed get entropy from ksecdd for CAPI machine guid %08x%08lx-%04x-%04x-%02x%02x-%02x%02x%02x%02x%02x%02xcapisp.dll::CryptoSysPrep_Specialize: failed to convert CAPI machine guid to string %08xcapisp.dll::CryptoSysPrep_Specialize: failed get write CAPI machine guid %08xcapisp.dll::CryptoSysPrep_Specialize: assigned CAPI machine guid "%s"CryptoSysPrep_Cleancapisp.dll::CryptoSysPrep_Clean: DisableAdministratorIfApplicable failedcapisp.dll::CryptoSysPrep_Clean: returning %x\Device\KsecDDUpgradeSYSTEM\Setup.'# .'
 .'0?RSDSPkX隦mgscapisp.pdbGCTL.rdata$brc.CRT$XCA.CRT$XCZ.CRT$XIA.CRT$XIAA.CRT$XIZ@.gfids.rdata .rdata$sxdata .rdata$zzzdbg" .text$mn@.xdata$xPA.edataP.dataP<.bss`l.idata$5la.00cfgpa.idata$2Pc.idata$3dcl.idata$4d:.idata$6p.rsrc$01pp.rsrc$02UEPuu\`]ËUt)EVu+Wt<ftf9Nu_^uҁ3fz]U\P3ʼnESVW33Ff9W`u@Ph`؃u&hP`thP`tW3F:hP`t&hP`t3ҍB;tPS`{3S|`h`t&t hW`tW`t3F3ƋM_^3[]ËUQQUSى]VWu3f9t3VatOf9u]u;v%VSaj\Yf9tr|VfaEOrgEj ^j\[f;tf;u	Pau]tv3fWPQ׋;vj _VSaf9>u	3f;w3_^[]UP3ĉ$SVW$VjP]$VjPJ$VjP7$3t$PS`D$\$P$PT`{$P`eD$Ph`|$0D$hD$HP`hD$HP`DŽ$h3DŽ$lXDŽ$pDŽ$tDŽ$x8DŽ$|DŽ$DŽ$ htgh$PQ$xD$PT$H{t-$Pft3ҍ$|$tFr|$D$PW`W|`t$$P`t3$_^[3]ËSVW3h`V`tlaׅV`_^[ËUtP3ʼnESVWS3VP3jY󫍅PauKVVl`Pd`PhxhhVhVl`PhhkP``}j[PjPV`y1VVl`Pd`PhxhhVhVWh4hPj`y1VVl`Pd`PhxhhVhVWh\PSPV0`y1VVl`Pd`PhxhhVhVWhPpS@`7VVl`Pd`PxShhVhVWhhP``VVl`Pd`PSWhVhVp0hhvP``9ptjQp,a9tRtNVVl`Pd`PSWhVhVhhP```KVVl`Pd`PSWhVhVhhYYUPhS4`y1VVl`Pd`PhxhhVhVWh,Pj<`y1VVl`Pd`PhxhhVhVWhPj8`VVl`Pd`Phxhyh
VhVWhXhVhVhhYYP``3Ft`t`tD`tD`tD`t,`M_^3[I]ËUQQSVWE3PE]PSh?jSShh`u
3Ƀ}>SSl`Pd`PhxhhTShShhYYP``9]t	u`SSl`Pd`Phxhh\ShSVhhMP``_^[]̋UQSVWE3Ph?WhHhauhu`u`h`t	ǻu?WWl`Pd`PShh|WhWhhYYP``[h(`t	 Džu?WWl`Pd`PShhWhWh@h=YYP``[u?WWl`Pd`PShhWhWhhYYP``[WWl`Pd`PShhWhWVhhP``_^[]ËUP3ʼnEVDžP3PVjhhQ`uhpP4aYYuFM3^d
]̋UQSVWD$3P\$t|$L$u9\$>SSl`Pd`PhhhShShhYYP``h NL`uP`[ESSl`Pd`PhhhShShhNYYP``[th`t	Åu@SSl`Pd`PhhhShSh`hYYP``h(`t	iÅu@SSl`Pd`PhhhShShhYYP``Su@SSl`Pd`PhhhShShh9YYP``SSl`Pd`PhhhShSVh@hP``_^[]33A̋UEtHt%>jWX]USEEPj3Shxh]]au.EPEPEPShu`u9]u`a[]ËUP3ʼnESVW3EJWE}PWh?WWWhHh}}`tJWWl`Pd`Phhh{WhWVh(hP``[hu`K3ɍEQPQh?QQQhxh`EEPEP3PPh|u`EEPEP$`3SSl`Pd`PVWhS3SPEPhhP``MQff;Eu+MPEPj3Phu`E;3PPl`Pd`PVWh3WSWuh3PPl`Pd`PVWh3PSPuhh&P``MEy+3PPl`Pd`PVWh3WSWuh3EPEMU?PEɀPEPE@PEPEPPPEPuEfUhj%PMPa8E3PPl`Pd`PVWh3WSWuhX3PPl`Pd`PVWh3EWSWPhhP``߃}tu`}}t	u`M_^3[	]̋SVW3Pu?WWl`Pd`PShhWhWhxhYYP``[WWl`Pd`PShhWhWVhhHP``_^[ËU0VWhEP3\aj EEE؍EjPEЉuPhEE@Puuday
DVEPjWVVh9u`ul`~	}t@_^]ËU}u	u`3@]UVE3PjVh$ huauJEuPEEPEuPVh u`u}uMtE3Fu`^]h@a8S4SYu@Ã 3ËU}SVWPdH3ۣP<Sd]PʉU33G;thaU3u}=@St
jY\8SEth54Su;r:MtlaU8S
4S;uE9Mt͋‰MEPDa34SY8SG<S@S9]33G9}d3ۉ]<SPU;thaU3u}9@Sj[t	j5hh=@SAYYt3XhhdY@S}Yu3=DSt&hDSYtu5DSSulaP_^[]̋U}ue] Ucsm9Eu
uPYY]3]j,h@E3uEwP}u=Puu9Et	=HStNE}u
Puuula׉EMEQPIYYËe3uu}EuuuEMEQPYYËe3uu}EuuuEMEQPYYËe3uu}}EVVuMEQP}YYËe3uEVVu]MEQPNYYËe3u=HSt4EVVulaMEQPYYËe3uEt	EuuuEMEQPYYËe3uu=HStG=Pt>Euuula׉EMEQPyYYËe3uuEE}w
PËUVu3;usWu>t
la׃;ur_^];
Pu%La%Ha̋UE3SVWH<AYt}p;r	H;r
B(;r3_^[]̋Ujh0Ah0?dPSVWP1E3PEdeEhztTE-PhPt:@$ЃEMd
Y_^[]ËE3Ɂ8ËeE3Md
Y_^[]̋UMMZf9uA<8PEuf9Hu]3]ËUeePVWN@;tudEP$aE3EE`1E`1E a3EM3EEP`E3E3E;t5PuO@ȉ
P_P^]%<ah0?d5D$l$l$+SVWP1E3PeuEEEEdËMd
Y__^[]Q̋Uuuuuh<hPM]Ujp`ut`h	`P`]ËU$Q
QQQ5Q=Qf0Qf
$QfQfPf%Pf-P(QEQE QE,QhP Q$PP	P(PjXkǀ,PjX
P,PjX
P,PjXk
PLjX
PLh]%8a%Tar<l:::::;8;L;g;{;;;;;<<P<==.'AxAAA`-5111AAAABcapisp.dllCAPISysPrep_GeneralizeCryptoSysPrep_CleanCryptoSysPrep_SpecializeCryptoSysPrep_Specialize_CloneCryptoSysPrep_Specialize_OfflineN@Djjjj~jjpekpkbkkkRk~kkfNj8jfjlfggfefJeeVfge"ggffffvg`gghFgee0g4f|f\eeff>gFfgged0eeeedddlk0k:k`?d$e4ach|`Ld8h`c\h$`dhh`dh,aldhachT`dhachl`d&i`dPi`$dzi`ci`xdiaDdi`0dj`crj\`xcj`dcj`c
k`dHk\ack,`ckL`jjjj~jjpekpkbkkkRk~kkfNj8jfjlfggfefJeeVfge"ggffffvg`gghFgee0g4f|f\eeff>gFfgged0eeeedddlk0k:k
_wcsicmpMswprintf_so_XcptFilter_amsg_exitfreemalloc_inittermmsvcrt.dllj_except_handler4_commonFindFirstFileW%RegQueryValueExWUuidFromStringWFindNextFileWRegDeleteValueWDeviceIoControlMRemoveDirectoryWConvertSidToStringSidWRegGetValueWRegOpenKeyExWFindCloseCharNextW$GetProfilesDirectoryW.RegSetValueExWGetVersionExWRSetFileAttributesWGetLastErrorRegCreateKeyExWCharPrevWDisableThreadLibraryCalls	DeleteFileWLoadLibraryWGetCurrentDirectoryWSetCurrentDirectoryWGetProcAddressLocalFreeFreeLibraryRegCloseKey-SleepQueryPerformanceCounter
GetCurrentProcessIdGetCurrentThreadIdGetSystemTimeAsFileTimeGetTickCountUnhandledExceptionFilterSetUnhandledExceptionFilterGetCurrentProcessMTerminateProcessapi-ms-win-core-file-l1-1-0.dllapi-ms-win-core-registry-l1-1-0.dllRPCRT4.dllapi-ms-win-core-io-l1-1-0.dllapi-ms-win-security-sddl-l1-1-0.dllapi-ms-win-core-string-l2-1-0.dllUSERENV.dllapi-ms-win-core-sysinfo-l1-1-0.dllapi-ms-win-core-errorhandling-l1-1-0.dllapi-ms-win-core-libraryloader-l1-2-0.dllapi-ms-win-core-libraryloader-l1-2-1.dllapi-ms-win-core-processenvironment-l1-1-0.dllapi-ms-win-core-heap-l2-1-0.dllapi-ms-win-core-synch-l1-2-0.dllapi-ms-win-core-profile-l1-1-0.dllapi-ms-win-core-processthreads-l1-1-0.dllWdsSetupLogMessageWEConstructPartialMsgVWFCurrentIPWDSCORE.dllCryptResetMachineCredentialsDPAPI.dllLsaCloseLsaOpenPolicyLsaQueryInformationPolicyLsaFreeMemoryADVAPI32.dll0lstrcmpWKERNEL32.dllIRtlInitUnicodeStringNtCloseNtOpenFilentdll.dll!SamOpenDomain#SamOpenUserSamConnectSamCloseHandleSamFreeMemory)SamQueryInformationUser5SamSetInformationUserSAMLIB.dll
WaitForSamServiceSYSSETUP.dll
memset 8Ph		XtpMUI4VS_VERSION_INFO
cE
cE?StringFileInfo040904B0LCompanyNameMicrosoft CorporationbFileDescriptionSysprep cleanup dll for CAPIn'FileVersion10.0.17763.2268 (WinBuild.160101.0800)6InternalNamecapisp.dll.LegalCopyright Microsoft Corporation. All rights reserved.>OriginalFilenamecapisp.dllj%ProductNameMicrosoft Windows Operating SystemDProductVersion10.0.17763.2268DVarFileInfo$Translation	+,}8tLs@kRY5$8"MUIMUIen-US00D0H0P0X00 23&3<3B3h3y33333333344\4z4444!55555555666,676B6M6X6c6n6677D7K7Y7g7}777777
888+8x88888888888888:9H9O9U9Z9e9l999999999999:: :A:U:\:j:v::::::::::;;;;4;B;I;O;T;_;f;;;;;;;;;;;;<%<:<O<d<<<<<<<<<<	====#=.=5=I=v==============>>&>->4>?>E>X>n>u>|>>>>>>>>>>>"?'?.?=?D?????????00000#0.040G0^0d00000000000000011&1-13181C1I1\1f1m1s1x11112*2@2I2\2s22222222223	3333:3E3a3j3333333344414@4G4\4p44445
5%5,5A5P5W5m5555555555
66!6(636:6N6c6q6666757C7f7o77777777828G8T8q8z8888888899.93999M9R9^9o9w99999::5:L:a:;;<<1<z<<<<<8===O=m===6>T>c>l>u>>>>>>>>B?G?l?u??????????????????@P0000 0*040D0T0Z0e0k0w00000000000000111111$1(1D1H1`l1

Hacked By AnonymousFox1.0, Coded By AnonymousFox