MZ@ !L!This program cannot be run in DOS mode. $Rؕ3}3}3}H̴3}H̱3}Rich3}PEL!  \@.rsrc@@ 0H &0H`x 8Ph(@Xp3490:H`x            0 @ P ` p             0 @ P ` p          (80>p!@#h%j&)|,X1n57$8:f>vDIINO8R$\TVXv8[d]V_b~TdtflilnTppqd(sds t$MUIX WSF&61%\:6O&Q MUI en-US#Invalid Name Constraints extension 0Invalid name information in the end certificate *Name Constraint not supported for <%1!s!> 4Permitted [%1!d!] Subtrees Constraint not supported 3Excluded [%1!d!] Subtrees Constraint not supported )No Permitted Name Constraint for <%1!s!> 1Excluded [%1!d!] Subtrees Constraint for <%2!s!> $Missing Name Constraint for <%1!s!> *Failed Signature Hygiene Checks for %1!s! 0Subject Type=%1!s!, Path Length Constraint=%2!d!0Subject Type=%1!s!, Path Length Constraint=%2!s!None End EntityCA UnspecifiedPAKey Compromise CA CompromiseAffiliation Changed SupersededCessation of OperationCertificate HoldUnknown Alternative NameRemove from CRL", [%1!d!]Subtrees Constraint:%2!s!Information Not Available Other Name: RFC822 Name= DNS Name=X.400 Address=Directory Address:EDI Party Name=PAURL= IP Address=Registered ID= %1!s! (%2!d!) %1!s!%2!s!YesNo Available Not AvailableFinancial Information=%1!s!:[%1!d!]SMIME Capability: Object ID=%2!S!, Parameters=%3!s!1Financial Information=%1!s!, Meets Criteria=%2!s! KeyID=%1!s!Certificate SerialNumber=%1!s!Certificate Issuer: %1!s!Digital SignatureKey EnciphermentData Encipherment Key AgreementCertificate SigningOff-line CRL Signing CRL Signing Decipher OnlyNon-Repudiation Encipher Only([%1!d!]SMIME Capability: Object ID=%2!S! %1!s! (%2!S!)No alternative nameUnknown Access MethodQ[%1!d!]Authority Info Access: Access Method=%2!s! (%3!S!), Alternative Name=%4!s! %1!s! (%2!d!)Unknown Key Usage %1!s! (%2!s!)SundayMondayTuesday WednesdayThursdayFridaySaturdayJanuaryFebruaryPAMarchAprilMayJuneJulyAugust SeptemberOctoberNovemberDecemberAMPM5%1!s!, %2!s! %3!u!, %4!u! %5!u!:%6!02u!:%7!02u! %8!s!&HighDateTime: %1!d! LowDateTime: %2!d! KeyID=%1!s!PAKey Usage=%1!s!Not After=%1!s!Not Before=%1!s!Restricted Key Usage=%1!s![%1!d!]Cert PolicyId=%2!s!Full Name:%1!s! Issuer RDNUnknown Name (%d)Unknown CRL reasonDistribution Point Name:%1!s!CRL Reason=%1!s!$[%1!d!]CRL Distribution Point: %2!s!CRL Issuer:%1!s!*Policy Qualifier Id=%1!s!, Qualifier:%2!s!Policy Qualifier Id=%1!s!([%1!d!,%2!d!]Policy Qualifier Info:%3!s!1[%1!d!]Certificate Policy:Policy Identifier=%2!s!8[%1!d!]Certificate Policy:Policy Identifier=%2!s!, %3!s! URL=%1!s! Moniker:%1!s!File Link=%1!s!Unknown Link (%1!d!)Image Link:%1!s!Image BitMap=%1!s!Image MetaFile=%1!s!Image Enhanced MetaFile=%1!s!Image GifFile=%1!s!Policy Information:%1!s!Policy Display=%1!s!Policy Logo Link:%1!s!Policy Logo Image:%1!s!0Subject Type=%1!s! Path Length Constraint=%2!d! 0Subject Type=%1!s! Path Length Constraint=%2!s! ![%1!d!]Subtrees Constraint: %2!s!1Financial Information=%1!s! Meets Criteria=%2!s! Financial Information=%1!s! C[%1!d!]SMIME Capability Object ID=%2!S! Parameters=%3!s! -[%1!d!]SMIME Capability Object ID=%2!S! [[%1!d!]Authority Info Access Access Method=%2!s! (%3!S!) Alternative Name: %4!s! :[%1!d!]Authority Info Access Alternative Name: %2!s! KeyID=%1!s! Key Usage=%1!s! Not Before=%1!s! Not After=%1!s! [%1!d!]Cert PolicyId=%2!s! Restricted Key Usage=%1!s! PAFull Name: %1!s!. Distribution Point Name: %1!s!  CRL Reason=%1!s!  CRL Issuer: %1!s! #[%1!d!]CRL Distribution Point %2!s!4Policy Qualifier Id=%1!s! Qualifier: %2!s!8 [%1!d!,%2!d!]Policy Qualifier Info: %3!s!=[%1!d!]Certificate Policy: Policy Identifier=%2!s! %3!s!8[%1!d!]Certificate Policy: Policy Identifier=%2!s! Moniker: %1!s! Image Link: t%1!s!  Image BitMap=%1!s!  Image MetaFile=%1!s! # Image Enhanced MetaFile=%1!s!  Image GifFile=%1!s! Policy Information: %1!s! PAPolicy Display=%1!s! Policy Logo Image: %1!s!Policy Logo Link: %1!s! Certificate Issuer: %1!s!4[%1!d!]Authority Info Access: Alternative Name=%2!s!SerializedData=%1!s! ClassId=%1!s!    a00xDirectory Address: %1!s!%1!s! V%1!d!.%2!d! V%1!d!.%2!d! SSL Client AuthenticationSSL Server AuthenticationSMIME SignatureSSL CASMIME CA Signature CAUnknown cert type Other Name: %1!s!=%2!s! %1!s!=%2!s! %1!s!=%2!s! %1!s!=%2!s!  %1!s! Notice Text= Organization=Notice Reference:Notice Number=Policy Qualifier Id=%1!s! %1!d!%2!s! %1!s!%2!s!PA%1!s!(%2!s!)%3!s!CRL Number=%1!s!%2!s!"Minimum Base CRL Number=%1!s!%2!s!"Virtual Base CRL Number=%1!s!%2!s!(%1!s!Only Contains User Certs=%2!s!%3!s!&%1!s!Only Contains CA Certs=%2!s!%3!s!%1!s!Indirect CRL=%2!s!%3!s!Distribution Point Name:%1!s!$Distribution Point Name: %1!s! [%1!d!]Freshest CRL: %2!s![%1!d!]Freshest CRL %2!s![%1!d!]Locations: %2!s![%1!d!]Locations %2!s!Permitted%1!s! Excluded%1!s!Permitted=None%1!s!PAExcluded=None%1!s!)%1!s![%2!d!]Subtrees (%3!d!..%4!d!):%5!s!'%1!s![%2!d!]Subtrees (%3!d!..Max):%4!s!D[%1!d!]Application Certificate Policy:Policy Identifier=%2!s!, %3!s!I[%1!d!]Application Certificate Policy: Policy Identifier=%2!s! %3!s!=[%1!d!]Application Certificate Policy:Policy Identifier=%2!s!D[%1!d!]Application Certificate Policy: Policy Identifier=%2!s! [%1!d!]Issuer Domain=%2!s!%3!s!%1!s!Subject Domain=%2!s!%3!s!.Required Explicit Policy Skip Certs=%1!d!%2!s!,Inhibit Policy Mapping Skip Certs=%1!d!%2!s!2Template=%1!s!%2!s!Major Version Number=%3!d!%4!s!Minor Version Number=%1!d!%2!s!%1!d!.%2!d!.%3!d!.%4!d!>%1!d!.%2!d!.%3!d!.%4!d!%5!s!%6!s!Mask=%7!d!.%8!d!.%9!d!.%10!d!~%1!02x!%2!02x!:%3!02x!%4!02x!:%5!02x!%6!02x!:%7!02x!%8!02x!:%9!02x!%10!02x!:%11!02x!%12!02x!:%13!02x!%14!02x!:%15!02x!%16!02x!PA%1!02x!%2!02x!:%3!02x!%4!02x!:%5!02x!%6!02x!:%7!02x!%8!02x!:%9!02x!%10!02x!:%11!02x!%12!02x!:%13!02x!%14!02x!:%15!02x!%16!02x!%17!s!%18!s!Mask=%19!02x!%20!02x!:%21!02x!%22!02x!:%23!02x!%24!02x!:%25!02x!%26!02x!:%27!02x!%28!02x!:%29!02x!%30!02x!:%31!02x!%32!02x!:%33!02x!%34!02x!"Delta Sync Time=%1!d! seconds%2!s!<[%1!d!]Cross-Certificate Distribution Point: %2!s!%3!s!%4!s!HTTP Response StatusThe certificate protecting this web site uses weak cryptography, SHA1. The web site should replace this certificate with a SHA2 certificate before SHA1 is no longer allowedRSA Signature KeyRSA KeyExchange Key*Using your private exchange key to decrypt+Signing data with your private exchange key Creating a new RSA signature keyCreating a new RSA exchange keyDSS Signature KeyDH KeyExchange Key Creating a new DSS signature key*Creating a new Diffie-Hellman exchange key>Using your Diffie-Hellman exchange key to create an agreed keyMigrating keys to new storage#Deleting your private signature key"Deleting your private exchange key>Deleting your old private signature key for migration purposes=Deleting your old private exchange key for migration purposes,Signing data with your private signature key#Exporting your private exchange key$Exporting your private signature keyPA$Importing a new private exchange key%Importing a new private signature keyCryptoAPI Private KeyAuthority Key IdentifierKey AttributesKey Usage RestrictionSubject Alternative NameIssuer Alternative NameBasic Constraints Key UsageCertificate PoliciesSubject Key IdentifierCRL Reason CodeCRL Distribution PointsEnhanced Key UsageAuthority Information AccessCertificate ExtensionsNext Update LocationYes or No TrustPA Email AddressUnstructured Name Content TypeMessage Digest Signing Time Counter SignChallenge PasswordUnstructured AddressSMIME CapabilitiesPrefer Signed DataCPS User Notice#On-line Certificate Status ProtocolCertification Authority IssuerCertificate Template NameCertificate TypeCertificate ManifoldNetscape Cert TypeNetscape Base URLNetscape Revocation URLNetscape CA Revocation URLNetscape Cert Renewal URLNetscape CA Policy URLNetscape SSL ServerNameNetscape CommentSpcSpAgencyInfoSpcFinancialCriteriaSpcMinimalCriteriaCountry/Region OrganizationOrganizational Unit Common NameLocalityState Or ProvinceTitle Given NameInitialsSur NameDomain ComponentStreet Address Serial Number CA Version"Serialized Signature Serial NumberPrincipal NameWindows Product UpdateEnrollment Name Value Pair OS VersionEnrollment CSP CRL NumberDelta CRL IndicatorIssuing Distribution Point Freshest CRLName ConstraintsPolicy MappingsPolicy Constraints%Cross-Certificate Distribution PointsApplication PoliciesApplication Policy MappingsApplication Policy ConstraintsCMC Data CMC ResponseUnsigned CMC RequestCMC Status InfoPACMC ExtensionsCMC Attributes PKCS 7 Data PKCS 7 SignedPKCS 7 EnvelopedPKCS 7 Signed EnvelopedPKCS 7 DigestedPKCS 7 EncryptedPrevious CA Certificate HashVirtual Base CRL NumberNext CRL PublishPrivate Key ArchivalKey Recovery Agent Certificate Template InformationEnterprise Root OID Dummy SignerEncrypted Private KeyPublished CRL Locations Enforce Certificate Chain PolicyTransaction Id Sender NonceRecipient NonceReg InfoGet CertificateGet CRLRevoke Request Query PendingCertificate Trust ListArchived Key Certificate HashPrivate Key Usage PeriodClient InformationCross CA VersionPALogotype BiometricInhibit Any PolicyOCSP No Revocation Checking Qualified Certificate StatementsSubject Information AccessCertification RepositoryDS Object GuidConfirm Certificate AcceptanceJurisdiction HashRoot Program FlagsEndorsement Key InformationEndorsement Key ChallengeCA Exchange Certificate HashSubject Directory AttributesSupported AlgorithmsPATPM SpecificationTPM Security AssertionsIntent To SealSealing SignatureSealing TimestampAttestation StatementAttestation ChallengeKey Storage Provider NameEncryption AlgorithmPAServer AuthenticationClient Authentication Code Signing Secure Email Time StampingMicrosoft Trust List SigningMicrosoft Time StampingIP security end systemIP security tunnel terminationIP security userMicrosoft Server Gated CryptoNetscape Server Gated CryptoPAEncrypting File System$Windows Hardware Driver Verification%Windows System Component Verification)OEM Windows System Component Verification.Embedded Windows System Component VerificationKey Pack LicensesLicense Server VerificationSmart Card LogonDigital RightsQualified Subordination Key RecoveryDocument SigningIP security IKE intermediate File RecoveryRoot List SignerAll application policies#Directory Service Email ReplicationCertificate Request AgentKey Recovery AgentPrivate Key ArchivalLifetime Signing OCSP Signing Any PurposeKDC AuthenticationKernel Mode Code Signing CTL UsageRevoked List SignerEarly Launch Antimalware DriverDisallowed List HAL ExtensionEndorsement Key CertificatePAPlatform Certificate$Attestation Identity Key CertificateWindows Kits ComponentWindows RT Verification$Protected Process Light VerificationWindows TCB ComponentProtected Process Verification Windows StoreDynamic Code GeneratorMicrosoft Publisher)Windows Third Party Application Component'Windows Software Extension VerificationAll issuance policiesEuropean Qualified Certificate6Secure Signature Creation Device Qualified CertificateEndorsement Key Verified$Endorsement Key Certificate VerifiedEndorsement Key Trusted on UsePA&Trusted Root Certification AuthoritiesPersonalEnterprise Trust&Intermediate Certification AuthoritiesActive Directory User Object Smart Card Other PeopleTrusted PublishersUntrusted Certificates*Third-Party Root Certification AuthoritiesCertificate Enrollment RequestsTrusted PeopleSmart Card Trusted RootsClient Authentication IssuersRegistry Group PolicyLocal ComputerUser Certificate Enterprise Third-Party Smart Card Shared User` PR`` <00PPPP@ p px p ppppppp pp|pppp()p*pX3p3p5p5p<p<pLFpFplPpPpRpRpZpZp ppD  0The Cryptographic Services service failed to initialize the Catalog Database. The error was: %1 : %2. The Cryptographic Services service failed to initialize the Catalog Database. The ESENT error was: %1. The Cryptographic Services service failed to initialize the VSS backup "System Writer" object.%1. Cryptographic Services failed while processing the OnIdentity() call in the System Writer Object.%1. Successful auto update of third-party root certificate:: Subject: <%1> Sha1 thumbprint: <%2>. Successful auto update retrieval of third-party root list cab from: <%1>. Failed auto update retrieval of third-party root list cab from: <%1> with error: %2. Successful auto update retrieval of third-party root certificate from: <%1>. Failed auto update retrieval of third-party root certificate from: <%1> with error: %2. Reached crypt32 threshold of %1 events and will suspend logging for %2 minutes. Successful auto update retrieval of third-party root list sequence number from: <%1>. Failed auto update retrieval of third-party root list sequence number from: <%1> with error: %2. Untrusted root certificate:: Subject: <%1> Sha1 thumbprint: <%2>. Partial Chain:: Issuer: <%1> Subject Sha1 thumbprint: <%2>. Failed extract of third-party root list from auto update cab at: <%1> with error: %2. Successful auto delete of third-party root certificate:: Subject: <%1> Sha1 thumbprint: <%2>. Successful auto property update of third-party root certificate:: Subject: <%1> Sha1 thumbprint: <%2>. Failed to add certificate to Third-Party Root Certification Authorities store with error: %2 Successful auto update of third-party root list with effective date: %1. Successful auto update of disallowed certificate list with effective date: %1. PFX operation failed as AuthSafes count doesn't lie in expected range. Maximum permissible value: %1. Erroneous value: %2. PFX operation failed as Iteration count doesn't lie in expected range. Maximum permissible value: %1. Erroneous value: %2. PFX operation failed as SafeBags count doesn't lie in expected range. Maximum permissible value: %1. Erroneous value: %2. Possible detection of CVE: %1%nAdditional Information: %2%n%nThis Event is generated when an attempt to exploit a known vulnerability (%1) is detected.%nThis Event is raised by a User mode process.%n (Path Validation (Path Discovery Revocation Cache Retrieval 4Automatic Root Update 0Trust Verification Private Key ,Certificate Store 0Certificate Details Catalog Info Start Stop Critical Error Information Verbose Build Chain XRetrieve Issuer Certificate from Cache \Retrieve Issuer Certificate from Network TInhibit Issuer Certificate Retrieval lRetrieve Third-Party Root Certificate from Cache pRetrieve Third-Party Root Certificate from Network TRetrieve Cross Certificate from Cache XRetrieve Cross Certificate from Network 0Verify Chain Policy ,Verify Revocation DReject Revocation Information @Retrieve Object from Cache DRetrieve Object from Network Open Store HAcquire Certificate Private Key $Verify Trust HFind Security Catalog for File $X509 Objects hAdd a Security Catalog to the Catalog Database pRemove a Security Catalog from the Catalog Database lSync a Security Catalog with the Catalog Database `Rebuild a subsystem of the Catalog Database Search for Security Catalogs in the Catalog Database that contain the hash 8Microsoft-Windows-CAPI2 Application PMicrosoft-Windows-CAPI2/Operational hMicrosoft-Windows-CAPI2/Catalog Database Debug For more details for this event, please refer to the "Details" section pThe catalog file %2 is being added to subsystem %1. pAddition of the catalog file completed. Status %1. The catalog file %2 is being removed from the subsystem %1. lRemoval of the catalog file completed. Status %1. |The catalog file %2 is being synced to the subsystem %1. hSync of the catalog file completed. Status %1. xThe Catalog Database is being rebuilt for subsystem %1. Rebuild of the Catalog Database for the chosen subsystem has completed. Status %1. A hash of type %2, length %3 and value %4 is being searched for in subsystem %1. The hash search completed and was found in %2 catalogs. Status %1. LSync of subsystem %1 has started. `Sync of the subsystem completed. Status %1. 4VS_VERSION_INFO P% P%?StringFileInfo040904B0LCompanyNameMicrosoft CorporationB FileDescriptionCrypto API321FileVersion6.3.9600.20512 (winblue_ltsb_escrow.220711-1746)8 InternalNameCRYPT32.DLL.LegalCopyright Microsoft Corporation. All rights reserved.HOriginalFilenameCRYPT32.DLL.MUIj%ProductNameMicrosoft Windows Operating SystemBProductVersion6.3.9600.20512DVarFileInfo$Translation PADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDING