Hacked By AnonymousFox

Current Path : C:/Windows/System32/DriverStore/FileRepository/vdrvroot.inf_amd64_5cdebe29069284d7/
Upload File :
Current File : C:/Windows/System32/DriverStore/FileRepository/vdrvroot.inf_amd64_5cdebe29069284d7/vdrvroot.sys

MZ@	!L!This program cannot be run in DOS mode.

$RichPEd
Վ"
,p


 `AP<Xj@(8!8P"T P.text
 h.rdataL @H.data0@.pdata(@ @H.idataP$@HPAGE `* `INITF bGFIDS8H@B.rsrcXjlJ@B.reloc@BH(H=t3H(L
LH&H
Hp@DH(H(LT$`M	HD$PAR$3EB(MJIBfA;R*soIB@AJ(DA8	IB8NMtMBtKIJHI#H;u<AIB0ʃIAAJBEtDDAB*;rH(E2AD#̸ffH;
)uHfuH̹)H8Lm3HL$`MuHDLEDAE3HL$(E3AH
,D$ H=>DH8̋9uB9AuB9AuB9Au3H(SLH
H
H=DH(H\$WH HHmHHH\$0H _H\$Hl$Ht$WH 3HHHu
vmHH
HH=DL
HLMHVH<Dxc؅xQ؅xFHHl؅x5H@8h0t$HOhHHHEHH*HGh3H\$0Hl$8Ht$@H _H(HHtHH;t=mH(H\$WH03H
H=H;LL;szI@H;wlA8Pu_IXPH;w]I@8LHt H
;HML<HH
H;DxLH;됸{H\$@H0_@SH0HH
HH;tXH;wSHC@Ht L#HH
E;L;HH
lLH";DHPH;vH0[H\$WH HH=H;v{,H;(u)HC Ht
;HCH(H;r3H\$0H _øH(MA8HIH(H(ALDLAtA@McPLHcL#IcNHBHHBTt	ƒLM3IZH(ffLH+IOsXMItDHHIHAuItfHIȈAuIffffffHrpكtL+AoAIMII vIooLH fAfIIuOffffffffffffftIȈHufHrD@HuHooLffIH@oDoLfAfIuIIs$MIyIIOsOMItHDHIHuItfDHIȈuIffffffHwtHtL+HoD@HMII vIoDoLH fAf	IuTffffffffffffftHɊIȈufHwHD@uHoDoLfAfIH@oDofAf	uIIs$MI~HIrGIIIOsPMIIfDJTIuItJTfIt
BTIuffffffffHnLHHL+MIt/))AH)A)AI)A)A)A)AuIMItfDHIuItBD̄@AB*3AR$AR(IRIRfyIJ0ș3LcIQH(H
=Hu3H(HZ5DHH(HXHH3HD$@HD$0HD$ zHL$@H3-HXH8HLNDʺ+HD$ n5H8DL$ HHHLL$hHD$0HD$(LL$ Dʺ+%5HHLEK HXHfIS(ICA!ICISIS ICISȺ+EL4HXLL$ HHHLD$hHD$0Dʺ+HD$(LD$ L@r4HH̀w)tA@AA,A@AA)I3AA)AA,IAHT$LD$LL$ SVWH 3H	LD׋ߋu<DFAu1fA;w+fD;w HVHufufEuALH
x5LL$PMHIHQ3DxHH;vHÿffH _^[HHLMtHfA|AH@uHE
MHD$0HL$(HILDLVHgLL$ Dʺ+2HH0PP!8
PP\DosDevices\GLOBAL\VDRVROOTP4.XBZڙH<DUEtwUnregisterEtwRegisterClassicProviderWmiQueryTraceInformationWmiTraceMessagePsGetVersionH䶅 fՎ%P%PՎ
x%xՎ>}$mVCeKmdfLibraryrrrrAqAq!r!rUpr\Registry\Machine\System\CurrentControlSet\Services\FsDepends-f{4M%ڥJ_G@PŠ NULL{8e7bd593-6e6c-4c52-86a6-77175494dd8e}\MsCompatibleVhdHba{8e7bd593-6e6c-4c52-86a6-77175494dd8e}\MsVhdHbaVHD Bus 0%02dMicrosoft_VHD_ISO_VHBA_%02d0Aű5׶ZMniRSDS+K=YoS+vdrvroot.pdbUGPP.text$lp01vdrvroot.sys!35_hybridbootP.text$mn0.text$mn$00@*.text$mn$21jV.text$zy*.text$zz .rdata$brc!.giats!.rdata"8.rdata$00"0.rdata$PAGE$zz#@.rdata$zzP%.rdata$zzzdbg)<.xdata0.data$00$brc0.data$dk00$brc0.data0.kmdfclassbind$a0.kmdfclassbind$c0.kmdfclassbind$d0.kmdftypeinit$a0.kmdftypeinit$c0H.bss(1X.bss$001x.bss$dk003.bss$pr00@(.pdataP.idata$5P.00cfgP(.idata$2Q.idata$3 Q.idata$4Q..idata$6`PAGE$lp01vdrvroot.sys!35_hybridbootdPAGE$zyfPAGE$zz@INIT@ZINIT$lp01vdrvroot.sys!35_hybridboot_INIT$zy8.gfids`.rsrc$01`h.rsrc$02 t-(P8"4,`]`)"`]`)"4,dd@)	d4p"@d)R0"b8c).BB"`")

4
Rp
dT4
rp20d42p4
rp4p`P

4
2p
dT4rp		b@B,4~x
p`P2p`0
dT42pBR0
	
4
2p0 1""0"32-+] f0R)`")`~)*4c+pP**+)+v(+++ %8+@y@+iH+j)*8*@o*x**$k*g*p)`]`)]`b()b8c)@cd)dd@)deP)ef)ff)gj<*0jj*jk,*kIl)Pl1m)@mn*nho*pooP*pAr`*PrrP*r {*@d)|)SSSSfRRRRRRRFRS6SJSbSrSS.RSRRSQ@ HQS(P QTPSSSSfRRRRRRRFRS6SJSbSrSS.RSRRSQBIoReportRootDeviceKeEnterCriticalRegion
ZwLoadDriverRtlInitUnicodeStringExAcquirePushLockExclusiveExExReleasePushLockExclusiveEx{EtwWriteTransferKeSetEventuEtwUnregisterExReleasePushLockSharedExMmGetSystemRoutineAddressExAcquirePushLockSharedExpEtwRegisterIoWMIRegistrationControlKeInitializeEventKeWaitForSingleObjectKeResetEvent=KeLeaveCriticalRegion
_vsnwprintfntoskrnl.exe`RtlCopyUnicodeStringWdfVersionUnbindWdfVersionBind	WdfVersionUnbindClassWdfVersionBindClassWDFLDR.SYSH|$ UHl$H@HgH3HE8LHT$8H
H=H;tA,*=H$`7HA*H
iHB3HMDB`۸HT$8HH
0LEHEE3H.E`EHHLL$0H
HT$8E3HX؅3HL$`DB`YHT$0HHEHL$@HLD$`D$``E3D$hD$mD$dEHHL$ H
fP؅H_LHT$0E3H
9Hh؅HCHL$HHDHLD$HHT$0H
H؅rHAHT$0AH
HkHLE HT$0H
E HE0HkE3H
Y3HDH
tH;tA,
H$`HM8H3议H$hH@]@SH0HH9tL\H
H-HK8HLkHL$ LHK3H[HuH0[HHH;D$PHL$0H9DHL$0HDH|HHL$0H	DHL$0HDHHHL$0HDHL$0HDHtH][HtE3HL$PE33|$ProHuHL$0HyDHL$0H DHHt:H HL$0HDDHL$0HDHHHÀy)HI
茷HT$8H
WH;tA,ty)rHIwH
&H;Q,y)DDHIL]dH
H;mA,Iy)?DH
H;>A,y)DH
zH;A,y)Zy)HILD譵̃WH
HHHpD/H\$WH0HH
H=H;t&A,ty)rHILXDJ"H
3HD$PHHD$PD$TH MH
fLD$PHE3LQHH
@I'H
FH;t(Q,t y)rHILȼD蓴H\$@H0_H\$LL$ LD$UVWHPHHHDHHH
HHH
H-H;tQ,ty)rHIL詴$=,Y-=8-t
HSLL$8H
7AHHD$ Hh؅yCH
#H;Q,y)HILDdHT$8؅H
H;}A,ry)hfHH$HL$ LL$HH
oA HHhI؅yBH
dH;A,
y)HILֺD覲HH$HL$ LL$@H
E3HHp؅y,H
H;A,y)D$HD$0LD$HH΋$HD$(HD$@HD$ ؅y#H
H;t<A,t5y)r/*H\HDD$0H
=H 3H7DH
HH8H
H;tA,ty)rHI>HDH\$pHP_^]@SH HH
HH;tA,ty)rHIٰHHH
pHS9H [H\$HT$WH@H3H
HDu]H<HL$0HDHL$0HDظuH؅x~uk3H
HDHD$XHD$X-AHD$ E3H
l3HD3H
=HD=:u
.33H
H|DH\$PH@_H\$WH03:t
&=uRHRH
؅y5H
HH;tQ,ty)rHIDˉ|$ 舯3H\$@H0_H\$Hl$Ht$WH@H3H
FAIHD==w63H
"HDHxn3H
HD=u4HL$xDHLHL$(HL$pHL$ H
3H
H3DH\$PHl$XHt$`H@_H\$Ht$WH HHH
H5H;tA,ty)rHI轭H&D3H
 HD
AH
H=E33)K)
C )K0
H&DH
H;t%A,ty)rHILe E30tHh觬33H
IHDHDHt$8H\$0H _@SH HHD3H
HDH9un=ueH
HD3HwHxHyHzH{H|H}tHTë3H
nHDH+DH [H\$WH HH=xH;tYu.HtBHK8HtH%HC8H[HuuHHDH=H\$0H _H\$Hl$Ht$ WATAUAVAWH@L$3MDAA]A	H
"HH$HL ffH@Hu?v

MuD
DA/AA;wtE3IŨA.EfAvMtAAIfHEIWWt,IN(HGHI AAЈ_)_,HHuAm#AA.AEH$Ht(A0(IV@HO蛠uHHu껕Au_)_,H_=IFHD$0HGu`HL$ALt$ HT$pAHuD$pG)HiHW,Lt$ L$DAD$4G,D$2G)L\$@I[8Ik@IsHIA_A^A]A\_H\$WH HHHIH
wH@]DCHQH
pHiH;t&Q,ty)rHILk
D趨H\$0H _H\$UVWAVAWH$@HHH3H(հH(
װE3)0A(Ӱ)P(AwHD$H)p()@(
)(߰)`(
fH0)(հ)(
HD$hH)(Ͱ)(
HD$X)ư H)(
HT$0D$@D$`tv)D$P^`D$pHD$xL|$8H
L5I;t(A,t!y)rHIVELHT$0HdA*H
GH*HCLD$PHT$0H
"H؅yCH
 I;Q,y)DHILaHվLD$PHT$0H
H؅y/H
I;A,ey)[
DH{LD$`HT$0H
ZH=؅y2H
XI;GA,y)D4DHHL$@Ѧ؅y2H
I;A,y)DHҽLD$@HT$0H
H؅y2H
I;A,by)XDHuHT$0H
YH<3HMAӢHT$0HwH
(LEHEPH)EHDHHL$@؅y2H
I;A,y)DH
ʸI;tA,ty)rLL$HHIHLL$pHT$0LD$@H
uD$ 	HP؅y2H
kI;ZA,y)DGH1A	HT$0H
HHLL$8H
HT$0E3HX؅y/H
I;A,y)DHT$8LEpH
3HEp0HHHH~upEtHExDžDžHDžDžDžHfoPLHT$83H
HHHHDžDžDžH3DF H0HLfoګHT$8H
qDžPDžDžDžDžDžDžHDžDžDžDžfDžDžHHֹDHT$8DH
HHT$8HHEHHEHHEH1E0HUH
gLEHE3HEHEHEHEHEH
HEHGuL}H H
2I;t%A,ty)rHIL5D耠HH3WH$HA_A^_^]HHtH2-+H;tHHkù)H\$Ht$WHHH賏3HHH5hHiH5jH5sH5g2H
[H5TH;tA,3H$HD$xLL$`HD$`LHD$pHH$H$H$H1HD$h3HD$@HD$PHD$XHHL$(HL$@HD$HHƲD$`8D$xD$|D$@ HHL$ H
mCHHADL$I[IsI_̀y)HI
莙H
AH;t$Q,ty)rL$HI<֘`0@p`g0j@mnpPrL00H`x				 p	=`t&
WEVT_TEMPLATEMUI00PPMpMpd23
df<n~|"М#(Starting an IO.

,Completing an IO.

Error

Warning

 Information

Verbose

 IO request

8Microsoft-Windows-VHDMP

PMicrosoft-Windows-VHDMP/Operational

@Microsoft-Windows-VDRVROOT

XMicrosoft-Windows-VDRVROOT/Operational

|The VHD %1 has come online (surfaced) as disk number %2.

The VHD %1 has been removed (unsurfaced) as disk number %2.

`Failed to surface VHD %1. Error status %2.

|Failed to surface VHD %1. Surface attempt was cancelled.

TFailed to %1 VHD %2. Error status %3.

Operation failed on VHD %2. Operation type %1. Error status %3.

The Vhd Chain for VHD %4 is corrupted. The expected LastWriteGUID %2 (%3) did not match the parent's actual LastWriteGUID (%1).

The change tracking file for VHD %1 is corrupted and cannot be read. No change tracking information will be available for this VHD, and change tracking will need to be enabled again before changed are tracked.

The VHD file %1 has been modified without updating its associated change tracking file. Because the consistency of the change tracking information cannot be ensured, the change tracking data has been reset. No change tracking information will be available for this VHD, and change tracking will need to be enabled again before changed are tracked.

Error %2 occured when attempting to update the change tracking file for VHD %1. This will invalidate the file's change tracking information. Change tracking will not be available for this VHD until change tracking is enabled again.

Surface for VHD %2 is invalidated and will be removed (unsurfaced) because of a %1 operation failure with status %3.

XPerforming %1 VHD for %2 (target '%3').

LSuccessfully performed %1 VHD %2.

Vhd resiliency initiated for %1 (VM ID: %2). A %3 IO failed with error %4.

tVhd resiliency successfully recovered %1 (VM ID: %2).

Vhd resiliency failed to recover %1 (VM ID: %2) with error %3.

Recovery initiated for %1 (VM ID: %2) due to an IO failure with error %3.

XRecovery succeeded for %1 (VM ID: %2).

lRecovery failed for %1 (VM ID: %2) with error %3.

HFile %1 is invalidated (VM ID: %2) from current mode %3 with error %4. Any recovery in process will be failed and the virtual disk will be invalidated as well.

Waiting on file (%4) recovery for %1 (VM ID: %2) due to an IO failure with error %3.

Waiting on file (%4) recovery for %1 (VM ID: %2) completed with status %3.

lFile (%3) recovery succeeded for %1 (VM ID: %2).

File (%4) recovery failed for %1 (VM ID: %2) with error %3.

PFailed to open file %1 with error %3. The file handle was previously invalidated due to a critical error. This operation will be retried periodically. (VM ID: %2).

File %1 has been closed before initiating a recovery attempt. The file was open in mode %3. (VM ID: %2).

Recovery attempt initiated for virtual disk %1 (VM ID: %2).

Recovery attempt completed successfully for virtual disk %1 (VM ID: %2).

Recovery attempt for virtual disk %1 failed with status %3 (VM ID: %2).

\Reopening handles to file %1 (VM ID: %2).

Waiting for handles to file %1 to be reactivated (VM ID: %2).

Recovery attempt completed for file %1 with status %3 (VM ID: %2).

lI/O failed with status %3 on file %1 (VM ID: %2).

Change Tracking has been enabled for the VHD %1 (%2) with log file %3.

xChange Tracking has been disabled for the VHD %1 (%2).

Change Tracking for the VHD %1 to the log file %2 has been stopped due to the error %3.

Flushing of the header of the log file %1 has failed due to error %2.

Flushing of the buffers to the log file %1 has failed due to error %2.

Opening the log file %1 for tracking has failed due to error %2.

Offline changes are detected for VHD %2. Log file: %1, VHD time: %4, Log file time: %5

(Starting an IO.

,Completing an IO.

A %4 %3 IO to %1 (VM ID: %2) failed with error %7. Recovery of this virtual disk has been initiated. If this IO was initiated by a VM then it will be internally retried later when the virtual disk has successfully recovered.

A %4 %3 IO to %1 (VM ID: %2) failed with error %7. Recovery for this virtual disk could not be initiated either because this is not a recoverable failure or recovery has failed or the virtual disk is in an invalid state.

The VHD HBA driver is registered with the root enumerator.

The VHD HBA driver is unregistered with the root enumerator.

Write

Read

Flush

$Offload write

$Offload read

$Project read

$Project write

Unmap

(Get LBA status

<File wrapper access check

Storport

Private

Internal

Mirror

,Read-only, shared

4Read-only, exclusive

4Read-write, exclusive

Invalid

,Shared Reference

0Exclusive Reference

$QoS Reference

CRIM=FcOy@8H䶅 f<WEVT;	P
2L22h333CHANLMicrosoft-Windows-VHDMP-OperationalHMicrosoft-Windows-VHDMP-AnalyticMAPS8lVMAPd
		

VMAP4
VMAP4dVMAP,FileModeMap$FileRefTypeMapIoTypeMapSrbTypeMapTTBL0/TEMPHCpH&aWW\!/D	EventDataAAoData)KNameVhdFileName
AEoData-KName
VhdDiskNumber
VhdFileName VhdDiskNumberTEMPcU\PbD	EventDataAAoData)KNameVhdFileName
VhdFileNameTEMP,{VY,-dD	EventDataAAoData)KNameVhdFileName
A7oDataKNameStatus
VhdFileNameStatusTEMP8VY)5פ8D	EventDataA=oData%KName	VhdIoType
AAoData)KNameVhdFileName
A7oDataKNameStatus
ltVhdIoTypeVhdFileNameStatusTEMPT
Gvx]yI5uD	EventDataA?oData'KName
VhdMetaOps
AAoData)KNameVhdFileName
A7oDataKNameStatus
	0	L	VhdMetaOpsVhdFileNameStatusTEMP
ҷ^~T$!D	EventDataA?oData'KName
VhdMetaOps
AAoData)KNameVhdFileName
AMoData5KNameTargetVhdFileName


VhdMetaOpsVhdFileName(TargetVhdFileNameTEMPTN"QD'D	EventDataAAoData)KNameVhdFileName
AAoData)KNameVirtualDisk

AAoData)KNameLogFileName

VhdFileNameVirtualDiskLogFileNameTEMP@
!aqZ]Ј,2P<D	EventDataAAoData)KNameVhdFileName
AAoData)KNameVirtualDisk



VhdFileNameVirtualDiskTEMP@CaUX䧵D	EventDataAAoData)KNameVirtualDisk

AAoData)KNameLogFileName
A7oDataKNameStatus

|VirtualDiskLogFileNameStatusTEMP,!?^D	EventDataAAoData)KNameLogFileName
A7oDataKNameStatus
LogFileNameStatusTEMP,!?^D	EventDataAAoData)KNameLogFileName
A7oDataKNameStatus
LogFileNameStatusTEMP,!?^D	EventDataAAoData)KNameLogFileName
A7oDataKNameStatus
8LogFileNameStatusTEMPGA5\za*FAxD	EventDataAAoData)KNameLogFileName
AAoData)KNameVhdFileName
A7oDataKNameStatus
AAoData)KNameVHDFileTime

AAoData)KNameLogFileTime

\x

LogFileNameVhdFileNameStatusVHDFileTimeLogFileTimeTEMPZYn_;;-}D	EventDataAQoData9KNameParentLastWriteGUID
AcoDataKKNameExpectedParentLastWriteGUID1
AcoDataKKNameExpectedParentLastWriteGUID2
AAoData)KNameVhdFileName
 `,ParentLastWriteGUID@ExpectedParentLastWriteGUID1@ExpectedParentLastWriteGUID2VhdFileNameTEMPTDX=Wv4+D	EventDataAAoData)KNameVhdFileName
AKoData3KNameCorruptionReason
VhdFileName(CorruptionReasonTEMPcU\PbD	EventDataAAoData)KNameVhdFileName
VhdFileNameTEMP`hC6qp̤XTig\D	EventDataA5oDataKNameVhdId
A=oData%KName	VhdIoType
A?oData'KName
VhdSrbType
A7oDataKNameOffset

A7oDataKNameLength
l

$VhdIdVhdIoTypeVhdSrbTypeOffsetLengthTEMPe~V)YEGD	EventDataA9oData!KNameVhdFile
A7oDataKNameStatus
,@VhdFileStatusTEMP,` wo@_< `D	EventDataA9oData!KNameVhdFile
A3oDataKNameVmId
A=oData%KName	VhdIoType
A?oData'KName
VhdSrbType
A7oDataKNameOffset

A7oDataKNameLength
A7oDataKNameStatus
 !l!(!

D!X!l!VhdFileVmIdVhdIoTypeVhdSrbTypeOffsetLengthStatusTEMP"}kް%S3+%qD	EventDataA9oData!KNameVhdFile
A3oDataKNameVmId
A=oData%KName	VhdIoType
A7oDataKNameStatus
#0#l@#X#VhdFileVmIdVhdIoTypeStatusTEMP4$^@Su)94D	EventDataA9oData!KNameVhdFile
A3oDataKNameVmId
\$p$VhdFileVmIdTEMP|%MP_U,F4K<D	EventDataA9oData!KNameVhdFile
A3oDataKNameVmId
A7oDataKNameStatus
%%%VhdFileVmIdStatusTEMP|'MP_U,F4K<D	EventDataA9oData!KNameVhdFile
A3oDataKNameVmId
A7oDataKNameStatus
@'T'd'VhdFileVmIdStatusTEMP(|]/\±D	EventDataA9oData!KNameVhdFile
A3oDataKNameVmId
A3oDataKNameMode
A7oDataKNameStatus
)),)<)VhdFileVmIdModeStatusTEMP,+4Z0D	EventDataA9oData!KNameVhdFile
A3oDataKNameVmId
A7oDataKNameStatus
A9oData!KNameRefType
A3oDataKNameMode
ASoData;KNamePendingRecoveryCount
+++8++,VhdFileVmIdStatusRefTypeMode0PendingRecoveryCountTEMPx-Qkn?R&mxgD	EventDataA9oData!KNameVhdFile
A3oDataKNameVmId
A7oDataKNameStatus
A9oData!KNameRefType
---8.VhdFileVmIdStatusRefTypeTEMPx/.TKr3hD	EventDataA9oData!KNameVhdFile
A3oDataKNameVmId
A9oData!KNameRefType
A3oDataKNameMode
ASoData;KNamePendingRecoveryCount
0(0880L0\0VhdFileVmIdRefTypeMode0PendingRecoveryCountTEMP|1MP_U,F4K<D	EventDataA9oData!KNameVhdFile
A3oDataKNameVmId
A7oDataKNameStatus
111VhdFileVmIdStatusPRVAD2Microsoft-Windows-VHDMPOPCOh0p202 VHD_START_IO$VHD_COMPLETE_IOLEVLP2P3P$3PL3win:Errorwin:Warning(win:Informationalwin:VerboseTASKDMMp.Aw2P3VHD_IO_TASKKEYWEVNTP,222,22 222		2

2 222`	2332dd!2eel#2ff$2nn%2ool#2pp$2qqx'2rrP)2ss0,2tt.2uuP)2vv$2wwx'2xx02yy02zz02{{02||02}}02~~02,22$222 2L2M@X22t3M@d22t3@T2@T2WEVTP<
<==X=d=p=CHANpl<TMicrosoft-Windows-VDRVROOT/OperationalPRVAL<Microsoft-Windows-VDRVROOTOPCOLEVL@P0=(win:InformationalTASKKEYWEVNTp$=\<$=\<4VS_VERSION_INFO
cE
cE?StringFileInfo040904B0LCompanyNameMicrosoft CorporationdFileDescriptionVirtual Drive Root Enumeratorh$FileVersion10.0.17763.1 (WinBuild.160101.0800):
InternalNamevdrvroot.sys.LegalCopyright Microsoft Corporation. All rights reserved.B
OriginalFilenamevdrvroot.sysj%ProductNameMicrosoft Windows Operating System>
ProductVersion10.0.17763.1DVarFileInfo$Translation	|5
GXuS	Sse*WEVT_TEMPLATEMUIMUIen-US Xpx0@HP`xPРؠ,AR2YTt8]`qyXsiSsSsSt)TMt^T:z8f{x|<|=o{>JV?ӿxSCTTOU d[[\`\]`4PPQQQQ0RgR#SSVV@WWXYYYZ[\_p,QRuRTT;UU>VVVWWXX8YZ<ZZeQpO 8!0!+	*H
!0!10
	`He0\
+7N0L0
+70	010
	`He 
mpnfQ2&YFf+,O]
003"y=0
	*H
010	UUS10U
Washington10URedmond10U
Microsoft Corporation1.0,U%Microsoft Windows Production PCA 20110
180703204550Z
190726204550Z0p10	UUS10U
Washington10URedmond10U
Microsoft Corporation10UMicrosoft Windows0"0
	*H
0
pTC:(N,Yf܅eJh8<"o;l`ӜI[N"lOB.9^8|۳Yno&	38U4Qmu	F-}~۩E CMŚs Ꞔ-I0o"k()PX"#[nԍ	ӆG\dXt$pNzvPc'zY,;7%	w0~0U%0
+7
+0Uqr5o1!A10TUM0KI0G1-0+U$Microsoft Ireland Operations Limited10U
229879+4379540U#0)9ėx͐O|US0TUM0K0IGEChttp://www.microsoft.com/pkiops/crl/MicWinProPCA2011_2011-10-19.crl0a+U0S0Q+0Ehttp://www.microsoft.com/pkiops/certs/MicWinProPCA2011_2011-10-19.crt0U00
	*H
gr0j
8րDiSHp6:Ik~՘zp/cQBv+?rѕm׺@gM,^x֔WGy)CKspfuVtaea
[ު{bszx[j>{Cy~t*&4Ev|^:1nwV*@H#hI$50lzsډPJvje;/kt*00
avV0
	*H
010	UUS10U
Washington10URedmond10U
Microsoft Corporation1200U)Microsoft Root Certificate Authority 20100
111019184142Z
261019185142Z010	UUS10U
Washington10URedmond10U
Microsoft Corporation1.0,U%Microsoft Windows Production PCA 20110"0
	*H
0
.	i!i33T ҋ8-|byJ?5 pk6u1ݍp7tF([`#,GgQ'rɹ;S5|'#	oFn<Aˣ?]jMi%(\6C
[''x0[*	k"S`,hSIah	sD]}T+y5]l+\μ#on&6O'2;A,wTN\eCmwZ$HC0?0	+70U)9ėx͐O|US0	+7
SubCA0U0U00U#0Vˏ\bh=[Κ0VUO0M0KIGEhttp://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl0Z+N0L0J+0>http://www.microsoft.com/pki/certs/MicRooCerAut_2010-06-23.crt0
	*H
|qQyn9><Rn+?shH4M&1Fay8.Ek(	L
6fj@26vZƿӬhbTlP0X|N|sWR!s4ZV	~?rSc=1e=BА_TGosNA@_*s!(s9_>\`	QfG=*hwLb{Ǻz4KbzJ7-W|=ܸZij:ni!7ށugӓW^)9-Es[zFX^gl5?$5
uVx,Јߺ~,c#!xlX6+̤-@EΊ\k>p*
j_Gc
26*pZBYqKW~!<ŹE ŕ]b֠c uw}=EWo3wbY~100010	UUS10U
Washington10URedmond10U
Microsoft Corporation1.0,U%Microsoft Windows Production PCA 20113"y=0
	`He0	*H
	1
+70
+710
+70/	*H
	1" AaL&|!R0<
+7
1.,sjH6jFEnf/I5hssG+Rv+ef59PCd+alVxgFDnWWi22bk=0Z
+71L0J$"Microsoft Windows" http://www.microsoft.com/windows0
	*H
dd4RkNBt/$OgԊf>"Z}t(WuIu/a'͎JY_(ցk5Kx-:|}`C*8Aw	ƞ@tPp3xW@[>h{!4~c#}2؟.6Y7D͖q½342u:sQuB)ɀ&CXfTvVև==gO?>R'n$2j@0	A{vELxZ~b֥O0
+710	*H
010
	`He0Q*H
	@<08
+Y
010
	`He x`|Aj~aҜ<^P)z7Ra[
h'20180915013010.355Z0Ф010	UUS10	UWA10URedmond10U
Microsoft Corporation1-0+U$Microsoft Ireland Operations Limited1&0$UThales TSS ESN:179E-4BB0-82461%0#UMicrosoft Time-Stamp service<00٠3۪m"4%0
	*H
0|10	UUS10U
Washington10URedmond10U
Microsoft Corporation1&0$UMicrosoft Time-Stamp PCA 20100
180823202653Z
191123202653Z010	UUS10	UWA10URedmond10U
Microsoft Corporation1-0+U$Microsoft Ireland Operations Limited1&0$UThales TSS ESN:179E-4BB0-82461%0#UMicrosoft Time-Stamp service0"0
	*H
0
$K6n;OT\S
0Ϊ 0ޖ&
u0	%
MRt	a)V	ݡcfc̳?vHj`&,o2~n}"(&gw;eb _T?k=#)e!9Eu"FQs-<5߷Ԫ8P?Da:ֱ
㾁b\Co"Y]M,#
4/z6-ods1ӳ%/M00U\sͶ*CH0U#0c:\1C{|F3hZmU0VUO0M0KIGEhttp://crl.microsoft.com/pki/crl/products/MicTimStaPCA_2010-07-01.crl0Z+N0L0J+0>http://www.microsoft.com/pki/certs/MicTimStaPCA_2010-07-01.crt0U00U%0
+0
	*H
Bš`~"G$違^nWcQG엓Y1LXi OP28@qVv(Cfd}Z,ٹ0z;Fk/`vȂLu=Et@BO+G8,=ɍI>ѯ1W3—Fg>ݭ2LFldȣqmDf\_RXX{BsQJp:ZTd=!0q0Y
a	*0
	*H
010	UUS10U
Washington10URedmond10U
Microsoft Corporation1200U)Microsoft Root Certificate Authority 20100
100701213655Z
250701214655Z0|10	UUS10U
Washington10URedmond10U
Microsoft Corporation1&0$UMicrosoft Time-Stamp PCA 20100"0
	*H
0

w: iktTե
|hK,_av>f+[S'1A	|a0Y0D`TCM8Bݓs0W&E
GͿ$`2X`FXG2tag_TϓLĦ]an(aF'$gr!KdPb]w=WuBM@Q>gfD~Knʱz*
1N5x</Dd 	xD]^O"M00	+70Uc:\1C{|F3hZmU0	+7
SubCA0U0U00U#0Vˏ\bh=[Κ0VUO0M0KIGEhttp://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl0Z+N0L0J+0>http://www.microsoft.com/pki/certs/MicRooCerAut_2010-06-23.crt0U 00	+7.00=+1http://www.microsoft.com/PKI/docs/CPS/default.htm0@+042 Legal_Policy_Statement. 0
	*H
Q
?q=!o1Wm0fjxǨ%kTW+QDS`v@@A\\^5$VKtBȯ7}Z?yJR8/ye٩kzoK0D$"<Y)p2J'U/3b_W@ΙfjbJ&9Jqc{!mÜ<}jxm8ؔƥ
B"8 %d~cY%z.9Wvqa˚Gͧ};q	]t"aڰPo1:eGxHr~akow˧	9؂r*T9[
Uzs;-3.)/T'!ȬN(ۖBAM*f0ӻt2Kc{/!YD<PqסUiW0M
]O8/X.
P5	'ճ~56_tI070Ф010	UUS10	UWA10URedmond10U
Microsoft Corporation1-0+U$Microsoft Ireland Operations Limited1&0$UThales TSS ESN:179E-4BB0-82461%0#UMicrosoft Time-Stamp service#
0+[)Np<$OjD[o00~0|10	UUS10U
Washington10URedmond10U
Microsoft Corporation1&0$UMicrosoft Time-Stamp PCA 20100
	*H
F0"20180915065440Z20180916065440Z0w0=
+Y
1/0-0
F0
0i0
H006
+Y
1(0&0
+Y

0 
00
	*H
9MzB(L\W)5(l1A8p7/ǿdů0(t]T^W!aV( Rwwqkߔ}.I^GkWԪ,’j1
0	00|10	UUS10U
Washington10URedmond10U
Microsoft Corporation1&0$UMicrosoft Time-Stamp PCA 20103۪m"4%0
	`HeJ0	*H
	1
*H
	0/	*H
	1" (r%u'E e+iE״0S0*H
	/1000 SӘ-"j#%c}G !00~0|10	UUS10U
Washington10URedmond10U
Microsoft Corporation1&0$UMicrosoft Time-Stamp PCA 20103۪m"4%0" %!($:Bǩd\[_д0
	*H
zJ;5uc~Np\[# 78H‰ܑe>-+jV7 Le"<?5hk
!"G_eю׵k{%p6vcQӛ[f!y<ІVg	8<n25ȴYJ0߬zzNFt	5k/Uq'B<V}=	D݊(S+>l|X

Hacked By AnonymousFox1.0, Coded By AnonymousFox