MZ@ !L!This program cannot be run in DOS mode. $~v~v~v5~~v5v~v5r~v5~v5t~vRich~vPELF"! 0 P#@`I@"H!T.text `.data@0@.rsrc@@@F"<llF" F"$44RSDSEZ6yQ:GҬ݉3api-ms-win-security-base-l1-1-0.pdbGCTLT.rdataT.rdata$voltmdl.rdata$zzzdbg`I.edata0@.bss@`.rsrc$01`@.rsrc$02 EZ6yQ:GҬ݉3NwO|F"F"Raa !f"i <s"S~!X Dq`Fo6b0p. q (!Y!!!!8"s""""3#\####+$N$v$$$$#%[%%%%4&r&&&&&'`'''(S((()U))vJU'Z Cl Bw<UJ5` $Q|V R !F!u!!!"[""""%#J#w### $?$$f$$$ %C%|%%%&Z&&&&'G''''9(v(((;)x)  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGIHJKLMNOPQRSTUVWXYZ[\]^_`api-ms-win-security-base-l1-1-0.dllAccessCheckadvapi32.AccessCheckAccessCheckAndAuditAlarmWadvapi32.AccessCheckAndAuditAlarmWAccessCheckByTypeadvapi32.AccessCheckByTypeAccessCheckByTypeAndAuditAlarmWadvapi32.AccessCheckByTypeAndAuditAlarmWAccessCheckByTypeResultListadvapi32.AccessCheckByTypeResultListAccessCheckByTypeResultListAndAuditAlarmByHandleWadvapi32.AccessCheckByTypeResultListAndAuditAlarmByHandleWAccessCheckByTypeResultListAndAuditAlarmWadvapi32.AccessCheckByTypeResultListAndAuditAlarmWAddAccessAllowedAceadvapi32.AddAccessAllowedAceAddAccessAllowedAceExadvapi32.AddAccessAllowedAceExAddAccessAllowedObjectAceadvapi32.AddAccessAllowedObjectAceAddAccessDeniedAceadvapi32.AddAccessDeniedAceAddAccessDeniedAceExadvapi32.AddAccessDeniedAceExAddAccessDeniedObjectAceadvapi32.AddAccessDeniedObjectAceAddAceadvapi32.AddAceAddAuditAccessAceadvapi32.AddAuditAccessAceAddAuditAccessAceExadvapi32.AddAuditAccessAceExAddAuditAccessObjectAceadvapi32.AddAuditAccessObjectAceAddMandatoryAceadvapi32.AddMandatoryAceAdjustTokenGroupsadvapi32.AdjustTokenGroupsAdjustTokenPrivilegesadvapi32.AdjustTokenPrivilegesAllocateAndInitializeSidadvapi32.AllocateAndInitializeSidAllocateLocallyUniqueIdadvapi32.AllocateLocallyUniqueIdAreAllAccessesGrantedadvapi32.AreAllAccessesGrantedAreAnyAccessesGrantedadvapi32.AreAnyAccessesGrantedCheckTokenMembershipadvapi32.CheckTokenMembershipConvertToAutoInheritPrivateObjectSecurityadvapi32.ConvertToAutoInheritPrivateObjectSecurityCopySidadvapi32.CopySidCreatePrivateObjectSecurityadvapi32.CreatePrivateObjectSecurityCreatePrivateObjectSecurityExadvapi32.CreatePrivateObjectSecurityExCreatePrivateObjectSecurityWithMultipleInheritanceadvapi32.CreatePrivateObjectSecurityWithMultipleInheritanceCreateRestrictedTokenadvapi32.CreateRestrictedTokenCreateWellKnownSidadvapi32.CreateWellKnownSidDeleteAceadvapi32.DeleteAceDestroyPrivateObjectSecurityadvapi32.DestroyPrivateObjectSecurityDuplicateTokenadvapi32.DuplicateTokenDuplicateTokenExadvapi32.DuplicateTokenExEqualDomainSidadvapi32.EqualDomainSidEqualPrefixSidadvapi32.EqualPrefixSidEqualSidadvapi32.EqualSidFindFirstFreeAceadvapi32.FindFirstFreeAceFreeSidadvapi32.FreeSidGetAceadvapi32.GetAceGetAclInformationadvapi32.GetAclInformationGetFileSecurityWadvapi32.GetFileSecurityWGetKernelObjectSecurityadvapi32.GetKernelObjectSecurityGetLengthSidadvapi32.GetLengthSidGetPrivateObjectSecurityadvapi32.GetPrivateObjectSecurityGetSecurityDescriptorControladvapi32.GetSecurityDescriptorControlGetSecurityDescriptorDacladvapi32.GetSecurityDescriptorDaclGetSecurityDescriptorGroupadvapi32.GetSecurityDescriptorGroupGetSecurityDescriptorLengthadvapi32.GetSecurityDescriptorLengthGetSecurityDescriptorOwneradvapi32.GetSecurityDescriptorOwnerGetSecurityDescriptorRMControladvapi32.GetSecurityDescriptorRMControlGetSecurityDescriptorSacladvapi32.GetSecurityDescriptorSaclGetSidIdentifierAuthorityadvapi32.GetSidIdentifierAuthorityGetSidLengthRequiredadvapi32.GetSidLengthRequiredGetSidSubAuthorityadvapi32.GetSidSubAuthorityGetSidSubAuthorityCountadvapi32.GetSidSubAuthorityCountGetTokenInformationadvapi32.GetTokenInformationGetWindowsAccountDomainSidadvapi32.GetWindowsAccountDomainSidImpersonateAnonymousTokenadvapi32.ImpersonateAnonymousTokenImpersonateLoggedOnUseradvapi32.ImpersonateLoggedOnUserImpersonateSelfadvapi32.ImpersonateSelfInitializeAcladvapi32.InitializeAclInitializeSecurityDescriptoradvapi32.InitializeSecurityDescriptorInitializeSidadvapi32.InitializeSidIsTokenRestrictedadvapi32.IsTokenRestrictedIsValidAcladvapi32.IsValidAclIsValidRelativeSecurityDescriptoradvapi32.IsValidRelativeSecurityDescriptorIsValidSecurityDescriptoradvapi32.IsValidSecurityDescriptorIsValidSidadvapi32.IsValidSidIsWellKnownSidadvapi32.IsWellKnownSidMakeAbsoluteSD2advapi32.MakeAbsoluteSD2MakeAbsoluteSDadvapi32.MakeAbsoluteSDMakeSelfRelativeSDadvapi32.MakeSelfRelativeSDMapGenericMaskadvapi32.MapGenericMaskObjectCloseAuditAlarmWadvapi32.ObjectCloseAuditAlarmWObjectDeleteAuditAlarmWadvapi32.ObjectDeleteAuditAlarmWObjectOpenAuditAlarmWadvapi32.ObjectOpenAuditAlarmWObjectPrivilegeAuditAlarmWadvapi32.ObjectPrivilegeAuditAlarmWPrivilegeCheckadvapi32.PrivilegeCheckPrivilegedServiceAuditAlarmWadvapi32.PrivilegedServiceAuditAlarmWQuerySecurityAccessMaskadvapi32.QuerySecurityAccessMaskRevertToSelfadvapi32.RevertToSelfSetAclInformationadvapi32.SetAclInformationSetFileSecurityWadvapi32.SetFileSecurityWSetKernelObjectSecurityadvapi32.SetKernelObjectSecuritySetPrivateObjectSecurityadvapi32.SetPrivateObjectSecuritySetPrivateObjectSecurityExadvapi32.SetPrivateObjectSecurityExSetSecurityAccessMaskadvapi32.SetSecurityAccessMaskSetSecurityDescriptorControladvapi32.SetSecurityDescriptorControlSetSecurityDescriptorDacladvapi32.SetSecurityDescriptorDaclSetSecurityDescriptorGroupadvapi32.SetSecurityDescriptorGroupSetSecurityDescriptorOwneradvapi32.SetSecurityDescriptorOwnerSetSecurityDescriptorRMControladvapi32.SetSecurityDescriptorRMControlSetSecurityDescriptorSacladvapi32.SetSecurityDescriptorSaclSetTokenInformationadvapi32.SetTokenInformation0 H`@|4VS_VERSION_INFO |O |O?StringFileInfo040904B0LCompanyNameMicrosoft CorporationHFileDescriptionApiSet Stub DLLh$FileVersion10.0.20348.1 (WinBuild.160101.0800)6 InternalNameapisetstub.LegalCopyright Microsoft Corporation. All rights reserved.> OriginalFilenameapisetstubj%ProductNameMicrosoft Windows Operating System> ProductVersion10.0.20348.1DVarFileInfo$Translation H!0!7 *H !(0!$10  `He0\ +7N0L0 +70 010  `He 3}X߻#bkhԌ$%Gbnt 003,EEHD0  *H  01 0 UUS10U Washington10URedmond10U Microsoft Corporation1.0,U%Microsoft Windows Production PCA 20110 201215212914Z 211202212914Z0p1 0 UUS10U Washington10URedmond10U Microsoft Corporation10UMicrosoft Windows0"0  *H 0 MHo]ԫpD՝և6*/^bnPb`"35L %AC%mYsaY2)p0y ok#7|]9O+ĭm.@Oˊ:H@!]9^L e!*rQmgn3v+C z~[-~@i7Pո'=rl",^ɢ6&Q{1#l&\̎":0~0U%0 +7 +0Uh\2)BY*30TUM0KI0G1-0+U $Microsoft Ireland Operations Limited10U 229879+4633440U#0)9ėx͐O|US0TUM0K0IGEChttp://www.microsoft.com/pkiops/crl/MicWinProPCA2011_2011-10-19.crl0a+U0S0Q+0Ehttp://www.microsoft.com/pkiops/certs/MicWinProPCA2011_2011-10-19.crt0 U00  *H   6Ǻp8n5%KR]Un6\w9 ,JX|fmO=3g x54LE5޶@[_O>SO\MgT[k Dz+,73Z7mJL}(| VC#{g6#O_zц<]겥~+ڍo>3=ja{BTxҞ㞼CI* f g X\\00 avV0  *H  01 0 UUS10U Washington10URedmond10U Microsoft Corporation1200U)Microsoft Root Certificate Authority 20100 111019184142Z 261019185142Z01 0 UUS10U Washington10URedmond10U Microsoft Corporation1.0,U%Microsoft Windows Production PCA 20110"0  *H 0  . i!i33T ҋ8-|byJ?5 pk6u1ݍp7tF([`#,GgQ'rɹ;S5|'# oFnhttp://www.microsoft.com/pki/certs/MicRooCerAut_2010-06-23.crt0  *H  |qQyn9>\` QfG=*hwLb{Ǻz4KbzJ7-W|=ܸZij:ni!7ށugӓW^)9-Es[zFX^gl5?$5 uVx,Јߺ~,c#!xlX6+̤-@EΊ\k>p* j_Gc 26*pZBYqKW~!<ŹE ŕ]b֠c uw}=EWo3wbY~10001 0 UUS10U Washington10URedmond10U Microsoft Corporation1.0,U%Microsoft Windows Production PCA 20113,EEHD0  `He0 *H  1  +70 +7 10  +70/ *H  1" Y۠io:-d0< +7 1. ,rPpN/u6SWMihnBJzYAZzL9q/M9MsJk6icmz2XeXd7gc=0Z +7 1L0J$"Microsoft Windows" http://www.microsoft.com/windows0  *H іQx58zV=PAp'J5SVêPb?І`WA#@. Bc[ ::xڬyrς8Jgەdqgx#n8^Uśn& =i<GW_kOˍڵr˰nʥDMwS^nu$HH!A -7XtPhtʤu\FqF Gndȵds16PF=Oټ0 +710 *H 010  `He0U *H  D@0< +Y 010  `He S)~".$>w籞P6)`h220210508002648.853Z0Ԥ01 0 UUS10U Washington10URedmond10U Microsoft Corporation1)0'U  Microsoft Operations Puerto Rico1&0$U Thales TSS ESN:60BC-E383-26351%0#UMicrosoft Time-Stamp ServiceD00ݠ3Z,nD4o(Z0  *H  0|1 0 UUS10U Washington10URedmond10U Microsoft Corporation1&0$UMicrosoft Time-Stamp PCA 20100 210114190216Z 220411190216Z01 0 UUS10U Washington10URedmond10U Microsoft Corporation1)0'U  Microsoft Operations Puerto Rico1&0$U Thales TSS ESN:60BC-E383-26351%0#UMicrosoft Time-Stamp Service0"0  *H 0 \W 'ushIxy>)F/N7αd! 2G f$겻m7y}͊;Д)nlzD(KX P4,EhJADtΖ٧s=yHcr͹xJA p/cG&"ZwK,biIj#)F6nt4{00Uds%?~94<1g0U#0c:\1C{|F3hZmU0VUO0M0KIGEhttp://crl.microsoft.com/pki/crl/products/MicTimStaPCA_2010-07-01.crl0Z+N0L0J+0>http://www.microsoft.com/pki/certs/MicTimStaPCA_2010-07-01.crt0 U00U% 0 +0  *H  m|XR,8cS" J'" R^W&`(ǚYb\OZXgQ3鏳,.{{D8͆4/O>@0J!j >J<@% ƥ+9g͎:)WCS :o/&(UˮlHSg{Vl~oeB$ ܒx?,.6FMo]-qf ?*)H0q0Y a *0  *H  01 0 UUS10U Washington10URedmond10U Microsoft Corporation1200U)Microsoft Root Certificate Authority 20100 100701213655Z 250701214655Z0|1 0 UUS10U Washington10URedmond10U Microsoft Corporation1&0$UMicrosoft Time-Stamp PCA 20100"0  *H 0  w: iktTե |hK,_av>f+[S'1A |a0Y0D`TC M8Bݓs0W&E GͿ$`2X`FXG2tag_TϓLĦ]an(aF'$gr!KdPb]w=WuBM@Q>gfD~Knʱz* 1N5xhttp://www.microsoft.com/pki/certs/MicRooCerAut_2010-06-23.crt0U 00 +7.00=+1http://www.microsoft.com/PKI/docs/CPS/default.htm0@+042 Legal_Policy_Statement. 0  *H  Q ?q=!o1Wm0fjxǨ%kTW+QDS`v@@A\\^5$VKtBȯ7}Z?yJR8/ye٩kzoK0D$"<Y)p2J'U/3b_W@ΙfjbJ &9Jqc{!mÜ<}jxm8ؔƥ B"8 %d~cY%z.9Wvqa˚Gͧ};q ]t"aڰPo1:eGxHr~akow˧ 9؂r*T9[ Uzs;-3.)/T'!ȬN(ۖBAM*f0ӻt2Kc{/!YD|GY{"=j]ë&B'vxo31^1 0 00|1 0 UUS10U Washington10URedmond10U Microsoft Corporation1&0$UMicrosoft Time-Stamp PCA 20103Z,nD4o(Z0  `HeJ0 *H  1  *H  0/ *H  1" Dʫo9ƌWܘ!&wx%q䐅m0 *H  /1000 &tIJ]0Â&,ޓ4K"rm00~0|1 0 UUS10U Washington10URedmond10U Microsoft Corporation1&0$UMicrosoft Time-Stamp PCA 20103Z,nD4o(Z0" jW2Քt N^jGϯS⏯s«0  *H  k5fdލvXpim33i05SNHۑWVY$So@Q*D^3T4VE 2$bp@k2JiQ ]WJ ӡO0}$1N:( ~m ytd^Vb$]>mZvZ?^:o§~k.?E{M =50<28LH@ \!, ƯQxB]~A