MZ@ !L!This program cannot be run in DOS mode. $Rؕ3}3}3}H̴3}H̱3}Rich3}PEL!  4P$@`2.rsrc@4@@( @Xp    ->MUINTd$#+pCi MUI en-US00PPTPPt  L  @    @# # 8$  &  '  '  (  (  )  )  *М*Info Start Stop Log Always Error Warning Information Verbose HMicrosoft-Windows-CodeIntegrity `Microsoft-Windows-CodeIntegrity/Operational XMicrosoft-Windows-CodeIntegrity/Verbose \Code Integrity determined an unsigned kernel module %2 is loaded into the system. Check with the publisher to see if a signed version of the kernel module is available. ,Code Integrity is unable to verify the image integrity of the file %2 because the set of per-page image hashes could not be found on the system. Code Integrity is unable to verify the image integrity of the file %2 because the set of per-page image hashes could not be found on the system. The image is allowed to load because kernel mode debugger is attached. 8Windows is unable to verify the image integrity of the file %2 because file hash could not be found on the system. A recent hardware or software change might have installed a file that is signed incorrectly or damaged, or that might be malicious software from an unknown source. Code Integrity is unable to verify the image integrity of the file %2 because a file hash could not be found on the system. The image is allowed to load because kernel mode debugger is attached. Code Integrity found a set of per-page image hashes for the file %2 in a catalog %4. Code Integrity found a set of per-page image hashes for the file %2 in the image embedded certificate. Code Integrity found a file hash for the file %2 in a catalog %4. Code Integrity found a file hash for the file %2 in the image embedded certificate. lCode Integrity was unable to load the %2 catalog. pCode Integrity successfully loaded the %2 catalog. hCode Integrity started loading the %2 catalog. `Code Integrity started reloading catalogs. xCode Integrity started validating file hash of %2 file. |Code Integrity started validating page hashes of %2 file. Code Integrity started loading catalog cache from %2 file. `Code Integrity determined a revoked kernel module %2 is loaded into the system. Check with the publisher to see if a new signed version of the kernel module is available. 8Code Integrity determined a revoked kernel module %2 is loaded into the system. The image is allowed to load because kernel mode debugger is attached. Windows is unable to verify the integrity of the file %2 because the signing certificate has been revoked. Check with the publisher to see if a new signed version of the kernel module is available. Windows was unable to update the boot catalog cache file. Status %1. Code Integrity determined kernel module %2 is loaded into the system which does not have a valid embedded digital signature. Check with the publisher to see if an embedded signed version of the kernel module is available. `Code Integrity was unable to load the %2 catalog because the signing certificate for this catalog has been revoked. This can result in images failing to load because a valid signature cannot be found. Check with the publisher to see if a new signed version of the catalog and images are available. Code Integrity started loading catalog %2 from the cache file. xCode Integrity started saving catalog cache to %2 file. pCode Integrity saved catalog %2 to the cache file. @Code Integrity determined a revoked image %2 is loaded into the system. Check with the publisher to see if a new signed version of the image is available. Code Integrity determined that a process (%4) attempted to load %2 that did not meet the %5 signing level requirements. tCode Integrity determined that a process (%4) attempted to load %2 that did not meet the %5 signing level requirements. However, due to system policy, the image was allowed to load. (Code Integrity determined a revoked image %2 is loaded into the system. The image is allowed to load because kernel mode debugger is attached. Windows is unable to verify the integrity of the file %2 because the signing certificate has been revoked. Check with the publisher to see if a new signed version of the kernel module is available. <Code Integrity determined an unsigned image %2 is loaded into the system. Check with the publisher to see if a signed version of the image is available. Code Integrity started validating image header of %2 file. Code Integrity started retrieving the cached data of %2 file. tCode Integrity started setting the cache of %2 file. Code Integrity determined that a process (%4) attempted to load %2 that did not meet the security requirements for %5. tCode Integrity determined that a process (%4) attempted to load %2 that did not meet the security requirements for %5. However, due to system policy, the image was allowed to load. xCode Integrity completed reloading catalogs. Status %1. |Code Integrity completed validating file hash. Status %1. Code Integrity completed validating page hashes. Status %1. Code Integrity completed loading catalog cache. Status %1. |Code Integrity completed saving catalog cache. Status %1. Code Integrity completed validating image header. Status %1. Code Integrity completed retrieval of file cache. Status %1. Code Integrity completed setting the file cache. Status %1. Unchecked Unsigned Custom 0 Custom 1 $Authenticode Custom 2 Store 8Custom 3 / Antimalware Microsoft Custom 4 Custom 5 8Dynamic Code Generation Windows HWindows Protected Process Light Windows TCB Custom 6 8other (see event data) (Shared Sections 4VS_VERSION_INFO@%@%?StringFileInfo040904B0LCompanyNameMicrosoft CorporationbFileDescriptionCode Integrity Module (Test)r)FileVersion6.3.9600.16384 (winblue_rtm.130821-1623).InternalNameci.dll.LegalCopyright Microsoft Corporation. All rights reserved.> OriginalFilenameci.dll.muij%ProductNameMicrosoft Windows Operating SystemBProductVersion6.3.9600.16384DVarFileInfo$Translation PADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDING