Hacked By AnonymousFox

Current Path : C:/Windows/System32/
Upload File :
Current File : C:/Windows/System32/pcwum.dll

MZ@	!L!This program cannot be run in DOS mode.

$UլUլUլ0ѭQլ0ԭVլUԬVլ0֭Tլ0խTլ0ݭWլ0*Tլ0׭TլRichUլPELj!
.0


@E`
P%B#$T.text `.data00@.idata@@@.rsrc%P&@B.reloc$@@B0@EPj"j
((jRSDSHxi;֊pcwum.pdbGCTL.rdata$brc.gfidsT.rdata.rdata$zzzdbg`.text$mn`
.edata0.data0 .bss@.00cfgP.rsrc$01Q$.rsrc$02Umu]U=0t=0N@uh0Y0У0]ËU0VjXE}r)E EEEEЋEeEjhE$EEEEE EEEEE(E܋E؋E;Eu빋EeLȋEeME3EME8tE8N@u	EO@^]̀@s sË3Ҁ33j''$(w^@6 u$s/E<<R  `   \L*zrX`v"&v*rB R   	

 !"#$%&pcwum.dllPcwAddQueryItemapi-ms-win-core-perfcounters-l1-1-0.PcwAddQueryItemPcwClearCounterSetSecurityapi-ms-win-core-perfcounters-l1-1-0.PcwClearCounterSetSecurityPcwCollectDataapi-ms-win-core-perfcounters-l1-1-0.PcwCollectDataPcwCompleteNotificationapi-ms-win-core-perfcounters-l1-1-0.PcwCompleteNotificationPcwCreateNotifierapi-ms-win-core-perfcounters-l1-1-0.PcwCreateNotifierPcwCreateQueryapi-ms-win-core-perfcounters-l1-1-0.PcwCreateQueryPcwDisconnectCounterSetapi-ms-win-core-perfcounters-l1-1-0.PcwDisconnectCounterSetPcwEnumerateInstancesapi-ms-win-core-perfcounters-l1-1-0.PcwEnumerateInstancesPcwIsNotifierAliveapi-ms-win-core-perfcounters-l1-1-0.PcwIsNotifierAlivePcwQueryCounterSetSecurityapi-ms-win-core-perfcounters-l1-1-0.PcwQueryCounterSetSecurityPcwReadNotificationDataapi-ms-win-core-perfcounters-l1-1-0.PcwReadNotificationDataPcwRegisterCounterSetapi-ms-win-core-perfcounters-l1-1-0.PcwRegisterCounterSetPcwRemoveQueryItemapi-ms-win-core-perfcounters-l1-1-0.PcwRemoveQueryItemPcwSendNotificationapi-ms-win-core-perfcounters-l1-1-0.PcwSendNotificationPcwSendStatelessNotificationapi-ms-win-core-perfcounters-l1-1-0.PcwSendStatelessNotificationPcwSetCounterSetSecurityapi-ms-win-core-perfcounters-l1-1-0.PcwSetCounterSetSecurityPcwSetQueryItemUserDataapi-ms-win-core-perfcounters-l1-1-0.PcwSetQueryItemUserDataPerfCreateInstanceapi-ms-win-core-perfcounters-l1-1-0.PerfCreateInstancePerfDecrementULongCounterValueapi-ms-win-core-perfcounters-l1-1-0.PerfDecrementULongCounterValuePerfDecrementULongLongCounterValueapi-ms-win-core-perfcounters-l1-1-0.PerfDecrementULongLongCounterValuePerfDeleteInstanceapi-ms-win-core-perfcounters-l1-1-0.PerfDeleteInstancePerfIncrementULongCounterValueapi-ms-win-core-perfcounters-l1-1-0.PerfIncrementULongCounterValuePerfIncrementULongLongCounterValueapi-ms-win-core-perfcounters-l1-1-0.PerfIncrementULongLongCounterValuePerfQueryInstanceapi-ms-win-core-perfcounters-l1-1-0.PerfQueryInstancePerfSetCounterRefValueapi-ms-win-core-perfcounters-l1-1-0.PerfSetCounterRefValuePerfSetCounterSetInfoapi-ms-win-core-perfcounters-l1-1-0.PerfSetCounterSetInfoPerfSetULongCounterValueapi-ms-win-core-perfcounters-l1-1-0.PerfSetULongCounterValuePerfSetULongLongCounterValueapi-ms-win-core-perfcounters-l1-1-0.PerfSetULongLongCounterValuePerfStartProviderapi-ms-win-core-perfcounters-l1-1-0.PerfStartProviderPerfStartProviderExapi-ms-win-core-perfcounters-l1-1-0.PerfStartProviderExPerfStopProviderapi-ms-win-core-perfcounters-l1-1-0.PerfStopProviderStmAlignSizeapi-ms-win-core-perfcounters-l1-1-0.StmAlignSizeStmAllocateFlatapi-ms-win-core-perfcounters-l1-1-0.StmAllocateFlatStmCoalesceChunksapi-ms-win-core-perfcounters-l1-1-0.StmCoalesceChunksStmDeinitializeapi-ms-win-core-perfcounters-l1-1-0.StmDeinitializeStmInitializeapi-ms-win-core-perfcounters-l1-1-0.StmInitializeStmReduceSizeapi-ms-win-core-perfcounters-l1-1-0.StmReduceSizeStmReserveapi-ms-win-core-perfcounters-l1-1-0.StmReserveStmWriteapi-ms-win-core-perfcounters-l1-1-0.StmWriteN@DP(@Xp			tTQ
WEVT_TEMPLATEMUI4VS_VERSION_INFO
cE
cE?
StringFileInfo040904B0LCompanyNameMicrosoft Corporation,FileDescriptionPerformance Counters for Windows Native DLLh$FileVersion10.0.17763.1 (WinBuild.160101.0800)4
InternalNamepcwum.dll.LegalCopyright Microsoft Corporation. All rights reserved.<
OriginalFilenamepcwum.dllj%ProductNameMicrosoft Windows Operating System>
ProductVersion10.0.17763.1DVarFileInfo$Translation	CRIM6yOc$WEVT	|D
$CHAN@l\Microsoft-Windows-Diagnosis-PCW/OperationalXMicrosoft-Windows-Diagnosis-PCW/AnalyticPMicrosoft-Windows-Diagnosis-PCW/DebugMAPSVMAPD4NotificationRequestCodeTTBLhTEMP,$@\vn2D	EventDataA5oDataKNameError
ACoData+KNameProviderGuid
L\Error ProviderGuidTEMPTd<MSX3ED	EventDataACoData+KNameProviderGuid
AGoData/KNameCounterSetGuid
 ProviderGuid$CounterSetGuidTEMP%	[cD	EventDataA5oDataKNameError
ACoData+KNameProviderGuid
AGoData/KNameCounterSetGuid
0@`Error ProviderGuid$CounterSetGuidTEMP(eCNZ -Y4D	EventDataA5oDataKNameError
AGoData/KNameCounterSetGuid
ACoData+KNameInstanceName
A?oData'KName
InstanceId
<LpError$CounterSetGuid InstanceNameInstanceIdTEMPT,
YcV[hJJD	EventDataACoData+KNameProviderGuid
AGoData/KNameCallbackReason
AAoData)KNameMachineName
AIoData1KNameMachineNameSize
|



 ProviderGuid$CallbackReasonMachineName$MachineNameSizeTEMP$*QqXD	EventDataA7oDataKNameStatus
StatusTEMP,,sPys>mD	EventDataACoData+KNameProviderGuid
A3oDataKNameSize
 ProviderGuidSizeTEMPD
T^֯_!IND	EventDataACoData+KNameProviderGuid
AAoData)KNameRequestCode

 ProviderGuidRequestCodeTEMP4
93YeԭD	EventDataACoData+KNameProviderGuid
A7oDataKNameStatus
A3oDataKNameSize
p ProviderGuidStatusSizeTEMP$`/W*Fe*{D	EventDataACoData+KNameProviderGuid
A/oDataKNameId



 ProviderGuidIdTEMP5>9&LU\߃!NxD	EventDataA5oDataKNameError
AGoData/KNameCounterSetGuid
ACoData+KNameInstanceName
A?oData'KName
InstanceId
A=oData%KName	CounterId
<XError$CounterSetGuid InstanceNameInstanceIdCounterIdTEMP @nxQWrLYD	EventDataA=oData%KName	ErrorCode
A5oDataKNamePhase
hErrorCodePhaseTEMPSk/3^pz]D	EventDataA=oData%KName	ErrorCode
ASoData;KNameCounterSetNameLength
AGoData/KNameCounterSetName
 PErrorCode0CounterSetNameLength$CounterSetNameTEMPPxMwP׷#D	EventDataA=oData%KName	ErrorCode
ASoData;KNameCounterSetNameLength
AGoData/KNameCounterSetName
AOoData7KNameInstanceNameLength
ACoData+KNameInstanceName
 LErrorCode0CounterSetNameLength$CounterSetName,InstanceNameLength InstanceNameTEMP@LT7[X >[D	EventDataA=oData%KName	ErrorCode
AEoData-KName
FunctionIndex
tErrorCode FunctionIndexPRVATMicrosoft-Windows-Diagnosis-PCWOPCOLEVLTASKKEYWp
 @errorscallouts notificationsqueriesEVNT P@@      $	  	
@@
Pptt@l |000@@PPPP`0000000000H.<
4DNb+*N1*WEVT_TEMPLATEMUIMUIen-US<0H0P02&212<2C2@0#0#	*H
#0#10
	`He0
+700
+70մ$fڎ`10|
+71lhC5jLM+&suyj].;+&%L[S֒nwu2DK)RW}g ͑'cXǹ~YŦ|#FPf3^j$TGq/͝-&b#Hlkj
Qjv~FKh7cH.$+OjD:/ǟ6Lw*|VrW&bdY	|Yhf<0J6:Di3v'ZR~khKG$ox:/@a9`z,7x4}\Ќ2B010
	`He HC8(,PJ?1HM8rȯ
003"y=0
	*H
010	UUS10U
Washington10URedmond10U
Microsoft Corporation1.0,U%Microsoft Windows Production PCA 20110
180703204550Z
190726204550Z0p10	UUS10U
Washington10URedmond10U
Microsoft Corporation10UMicrosoft Windows0"0
	*H
0
pTC:(N,Yf܅eJh8<"o;l`ӜI[N"lOB.9^8|۳Yno&	38U4Qmu	F-}~۩E CMŚs Ꞔ-I0o"k()PX"#[nԍ	ӆG\dXt$pNzvPc'zY,;7%	w0~0U%0
+7
+0Uqr5o1!A10TUM0KI0G1-0+U$Microsoft Ireland Operations Limited10U
229879+4379540U#0)9ėx͐O|US0TUM0K0IGEChttp://www.microsoft.com/pkiops/crl/MicWinProPCA2011_2011-10-19.crl0a+U0S0Q+0Ehttp://www.microsoft.com/pkiops/certs/MicWinProPCA2011_2011-10-19.crt0U00
	*H
gr0j
8րDiSHp6:Ik~՘zp/cQBv+?rѕm׺@gM,^x֔WGy)CKspfuVtaea
[ު{bszx[j>{Cy~t*&4Ev|^:1nwV*@H#hI$50lzsډPJvje;/kt*00
avV0
	*H
010	UUS10U
Washington10URedmond10U
Microsoft Corporation1200U)Microsoft Root Certificate Authority 20100
111019184142Z
261019185142Z010	UUS10U
Washington10URedmond10U
Microsoft Corporation1.0,U%Microsoft Windows Production PCA 20110"0
	*H
0
.	i!i33T ҋ8-|byJ?5 pk6u1ݍp7tF([`#,GgQ'rɹ;S5|'#	oFn<Aˣ?]jMi%(\6C
[''x0[*	k"S`,hSIah	sD]}T+y5]l+\μ#on&6O'2;A,wTN\eCmwZ$HC0?0	+70U)9ėx͐O|US0	+7
SubCA0U0U00U#0Vˏ\bh=[Κ0VUO0M0KIGEhttp://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl0Z+N0L0J+0>http://www.microsoft.com/pki/certs/MicRooCerAut_2010-06-23.crt0
	*H
|qQyn9><Rn+?shH4M&1Fay8.Ek(	L
6fj@26vZƿӬhbTlP0X|N|sWR!s4ZV	~?rSc=1e=BА_TGosNA@_*s!(s9_>\`	QfG=*hwLb{Ǻz4KbzJ7-W|=ܸZij:ni!7ށugӓW^)9-Es[zFX^gl5?$5
uVx,Јߺ~,c#!xlX6+̤-@EΊ\k>p*
j_Gc
26*pZBYqKW~!<ŹE ŕ]b֠c uw}=EWo3wbY~100010	UUS10U
Washington10URedmond10U
Microsoft Corporation1.0,U%Microsoft Windows Production PCA 20113"y=0
	`He0	*H
	1
+70
+710
+70/	*H
	1" ɩ:y
Q;[Sx*Ѵ4%*Zҕ#0<
+7
1.,hy3mklUURVh/n9DujWyCJRdql7yH+EgmrCTzPvxMWMQ=0Z
+71L0J$"Microsoft Windows" http://www.microsoft.com/windows0
	*H
aFxö#ZOwII_yc#ss	ۘx_/9 +o~LO~ՆRZk&˳Z(G)޽?խXn$hg4 #}}#\1"wBa+LªХ[_N1k&x1");!Q᫨~z$,A‡͐O}/BLr!*Z	6|Yy`QD*;;~A	fᡂ0
+710	*H
010
	`He0X*H
	GC0?
+Y
010
	`He {t~u6lH2p[GW/73ѹ[KC̪20180915010238.664Z0Ԥ010	UUS10U
Washington10URedmond10U
Microsoft Corporation1)0'U Microsoft Operations Puerto Rico1&0$UThales TSS ESN:C0F4-3086-DEF81%0#UMicrosoft Time-Stamp Service00ݠ3j`a0
	*H
0|10	UUS10U
Washington10URedmond10U
Microsoft Corporation1&0$UMicrosoft Time-Stamp PCA 20100
180823202628Z
191123202628Z010	UUS10U
Washington10URedmond10U
Microsoft Corporation1)0'U Microsoft Operations Puerto Rico1&0$UThales TSS ESN:C0F4-3086-DEF81%0#UMicrosoft Time-Stamp Service0"0
	*H
0
>6Z}*< 9 <C4Ihz9H&('@eCK8kaa7Le{M:+_R͸Ʒ'aY{lxsOos{~`2*41]gCdd5g.ܬT?MlYݏaY$oߵ]*Glq%)dST*Mhet9O=kJ_{h/EZWU
z\kŚt63RΒF+00U(k%S2:wq0U#0c:\1C{|F3hZmU0VUO0M0KIGEhttp://crl.microsoft.com/pki/crl/products/MicTimStaPCA_2010-07-01.crl0Z+N0L0J+0>http://www.microsoft.com/pki/certs/MicTimStaPCA_2010-07-01.crt0U00U%0
+0
	*H
$d	ZS6n< `]|F	Z>+QMcIMN;ۧIGL7gYM6\a.w4A[]i.N2JUтvz9!" cpŵ={ӨeIV"uF
0^L5_]2d$&k%*',G"kzqG]%kAV|A7Z/A;)y:&p,0q0Y
a	*0
	*H
010	UUS10U
Washington10URedmond10U
Microsoft Corporation1200U)Microsoft Root Certificate Authority 20100
100701213655Z
250701214655Z0|10	UUS10U
Washington10URedmond10U
Microsoft Corporation1&0$UMicrosoft Time-Stamp PCA 20100"0
	*H
0

w: iktTե
|hK,_av>f+[S'1A	|a0Y0D`TCM8Bݓs0W&E
GͿ$`2X`FXG2tag_TϓLĦ]an(aF'$gr!KdPb]w=WuBM@Q>gfD~Knʱz*
1N5x</Dd 	xD]^O"M00	+70Uc:\1C{|F3hZmU0	+7
SubCA0U0U00U#0Vˏ\bh=[Κ0VUO0M0KIGEhttp://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl0Z+N0L0J+0>http://www.microsoft.com/pki/certs/MicRooCerAut_2010-06-23.crt0U 00	+7.00=+1http://www.microsoft.com/PKI/docs/CPS/default.htm0@+042 Legal_Policy_Statement. 0
	*H
Q
?q=!o1Wm0fjxǨ%kTW+QDS`v@@A\\^5$VKtBȯ7}Z?yJR8/ye٩kzoK0D$"<Y)p2J'U/3b_W@ΙfjbJ&9Jqc{!mÜ<}jxm8ؔƥ
B"8 %d~cY%z.9Wvqa˚Gͧ};q	]t"aڰPo1:eGxHr~akow˧	9؂r*T9[
Uzs;-3.)/T'!ȬN(ۖBAM*f0ӻt2Kc{/!YD<PqסUiW0M
]O8/X.
P5	'ճ~56_tI00Ԥ010	UUS10U
Washington10URedmond10U
Microsoft Corporation1)0'U Microsoft Operations Puerto Rico1&0$UThales TSS ESN:C0F4-3086-DEF81%0#UMicrosoft Time-Stamp Service%
0	+))qq2W76ӣ1>0ۤ010	UUS10U
Washington10URedmond10U
Microsoft Corporation1)0'U Microsoft Operations Puerto Rico1'0%UnCipher NTS ESN:57F6-C1E0-554C1+0)U"Microsoft Time Source Master Clock0
	*H
F90"20180915073521Z20180916073521Z0t0:
+Y
1,0*0
F90
Z00
H06
+Y
1(0&0
+Y

0`
0 0
	*H
G(%ACF$(awiT,a%CP%fL:|Bze/c5+Y>m
JZkxn6PޅU=G+e~0$նAՇx=-qQo9*uſiž>H3JLH]L]9уaXJNmU8[_x}eHY뙶BZzA܉֠aNTHs6~1000|10	UUS10U
Washington10URedmond10U
Microsoft Corporation1&0$UMicrosoft Time-Stamp PCA 20103j`a0
	`He20	*H
	1
*H
	0/	*H
	1" ɇL0z_U!mAa1h"0*H
	1000))qq2W76ӣ1>00~0|10	UUS10U
Washington10URedmond10U
Microsoft Corporation1&0$UMicrosoft Time-Stamp PCA 20103j`a0LFk[\t&
@o0
	*H
u7&>t6ӹ5]?cVQD8w6eS*LF:bAbp`HSsҳƸ~KcIgݠul6M8o t]؀'K}Јrnr$Bm:(<m&󁈒z
OÃhGg kt)n?wEf@<CWa<{\o+*VRʅ}H	a1=

Hacked By AnonymousFox1.0, Coded By AnonymousFox