????

Your IP : 3.135.201.186


Current Path : C:/Program Files/Microsoft SQL Server/150/DTS/Binn/Resources/1033/
Upload File :
Current File : C:/Program Files/Microsoft SQL Server/150/DTS/Binn/Resources/1033/dtuparse.rll

MZ����@���	�!�L�!This program cannot be run in DOS mode.

$��d���
���
���
�������
��՝���
������
�Rich��
�PEd�瀊]�" �@�	`A  n�0?.rdatap@@.rsrc n p @@瀊]
TGCTL.rdataT.rdata$zzzdbg  .rsrc$01 "l.rsrc$020�p���������	��
��0�H�`�x�	�	�	�	�	�	�	�		 "Tx'�
P2Z�7N;.�5E�G0@���}!Option index %1!d! is not valid.
%Missing argument for option "%1!s!".
2Argument "%1!s!" for option "%2!s!" is not valid.
+Option "%1!s!" can only be specified once.
Option %1!d! is not valid.
OAn out of memory error occurred while saving.  Option: %1!s!, Argument: %2!s!.
7A type mismatch occurred in an argument set operation.
~Only one action (Copy, Delete, Dump, Encrypt, Exists, Move, Sign, FCreate, FDelete, FRename, FExists, FDirectory) is allowed.
CAn unknown error occurred for option "%1!s!" with argument "%2!s!"
CThe destination type for option "%1!s!" must be SQL, File, or DTS.
RThe DTS option cannot be specified with the File, SQL, User, or Password options.
ZThe File option cannot be specified with the DTS, SQL, Server, User, or Password options.
AThe SQL option cannot be specified with the DTS or File options.
<The Password option must be specified with the User option.
YThe SQL option must be specified if the User, Password, or Server options are specified.
AAt least one of the DTS, SQL, or File options must be specified.
Option "%1!s!" is not valid.
\The DTS destination cannot be specified with the File, SQL, User, or Password destinations.
dThe File destination cannot be specified with the DTS, SQL, Server, User, or Password destinations.
KThe SQL destination cannot be specified with the DTS or File destinations.
DThe DestPassword option must be specified with the DestUser option.
hA SQL destination must be specified if the DestUser, DestPassword, or DestServer options are specified.
`A DTS, SQL, or File destination must be specified if a Copy, Move, or Sign action is specified.
�At least one action (Copy, Delete, Dump, Encrypt, Exists, Move, Sign, FCreate, FDelete, FRename, FExists, FDirectory) must be specified.
Destination server, user, and password are not allowed with folder operations.  Use source server, user, and password instead.
GThe DTS, File, and SQL options are not allowed with folder operations.
eThe flags for option "%1!s!" can only contain an S (list all sub folders from the specified folder).
0The type for option "%1!s!" must be SQL or DTS.
7The protection level must be a number between 1 and 5.
3The protection level, %1!lu!, requires a password.
6The protection level, %1!lu!, cannot have a password.
NThe protection level, %1!lu!, cannot be server storage when saving to a file.
Enter decryption password: Enter encryption password: "Enter source SQL Server password: 'Enter destination SQL Server password: 1/Si[gn]             {SQL | FILE | DTS};Path;Hash
/SourceP[assword]   Password
/SourceS[erver]     Server
/SourceU[ser]       User name
 /SQ[L]              PackagePath
IA process ID (PID) to dump must be specified when using the dump option.
5
Usage: DTUtil /option [value] [/option [value]] ...
XOptions are case-insensitive.
A hyphen (-) may be used in place of a forward slash (/).
MThe vertical bar (|) is the OR operator and is used to list possible values.
MFor extended help use /help with an option.  For example: DTUtil /help Copy

,/C[opy]             {SQL | FILE | DTS};Path
/Dec[rypt]          Password

/Del[ete]
/DestP[assword]     Password
/DestS[erver]       Server
/DestU[ser]         User name
?/DT[S]              PackagePath
/Dump               Process ID
G/En[crypt]          {SQL | FILE | DTS};Path;ProtectionLevel[;Password]

/Ex[ists]
?/FC[reate]          {SQL | DTS};ParentFolderPath;NewFolderName
</FDe[lete]          {SQL | DTS};ParentFolderPath;FolderName
1/FDi[rectory]       {SQL | DTS}[;FolderPath[;S]]
+/FE[xists]          {SQL | DTS};FolderPath
M/FR[ename]          {SQL | DTS};ParentFolderPath;OldFolderName;NewFolderName
/Fi[le]             Filespec
/H[elp]             [Option]
/I[DRegenerate]
,/M[ove]             {SQL | FILE | DTS};Path
	/Q[uiet]
/R[emark]           [Text]
�4VS_VERSION_INFO������?,StringFileInfo040904B0PlatformNT�ILegalTrademarksMicrosoft SQL Server is a registered trademark of Microsoft Corporation. CommentsSQL&GoldenBitsTrueLCompanyNameMicrosoft Corporation�>FileDescriptionData Transformation Services Package Utility Parser Resourcesx,FileVersion2019.0150.2000.05 ((SQLServer).190924-2033)2	InternalNameDTUParsed LegalCopyrightMicrosoft. All rights reserved.B
OriginalFilenameDTUParse.RLLJProductNameMicrosoft SQL Server<ProductVersion15.0.2000.5DVarFileInfo$Translation	�hC[opy] {SQL | FILE | DTS};Path



Operation. Copy the package to the specified location and path.



Examples:

o Copy from a SQL server to a SSIS store's MSDB folder on the local machine.  

     dtutil /SQL srcPackage /Copy DTS;MSDB\destPackage 



o Copy from a file system to a file system.

     dtutil /File c:\developmentpackages\package.dtsx 

	         /Copy file;c:\testpackages\newpackage.dtsx



o Copy from a file system to a SQL server on another machine.  

     dtutil /File c:\developmentpackages\package.dtsx /DestServer myotherserver

            /copy SQL;newpackage



Note: Windows Authentication is used since /DestU[ser] and /DestP[assword] 

      were not used.

tDel[ete]



Operation. Delete the specified package.

�DestP[assword] Password



Optional. Allows the storage of a package that is protected by SQL Server 

Authentication. This option is used in conjunction with the DestUser option and

when the destination of an operation is SQL. However, you can use the 

DestPassword option only if you use the DestUser option. If the DestPassword 

option is omitted and the DestUser option is used, a blank password is used.



* Security Note: When possible, use Windows Authentication.

tDestS[erver] server_name



Optional. Specifies the name of server to which to store the package. If you 

omit the DestServer option, storage is attempted against the local server.

�DestU[ser] Username



Optional. Allows the storage of a package that is protected by SQL Server 

Authentication. You use this option when the destination of an operation is 

SQL.



* Security Note: When possible, use Windows Authentication.

DD[TS] package



Loads a package that is stored in the SSIS package store. The package argument

specifies the name and path of the package to retrieve.



However, you can use the DTS option in conjunction with the SrcServer option.



If the SrcServer option is omitted, the local server is assumed.



If you use the DTS option in conjunction with any of the following options, 

DTUtil fails: 

o File

o SQL

�Ex[ists]



Operation. Determines if the specified package exists.

4Fi[le] filespec



Loads a package that is saved in the file system as a .dtsx file. The filespec 

argument specifies the path and file name of the package. You can specify the 

path as either a Universal Naming Convention (UNC) path or local path.



If you use the File option in conjunction with any of the following options, 

DTUtil fails: 

o DTS 

o SQL 

o SrcUser 

o SrcPassword 

o SrcServer 

hH[elp] [option_name]



Optional. Displays a list of options and their associated arguments unless the 

option_name argument is specified. 



If you specify an option_name argument, DTUtil displays the command line help

for the specified option.



For example, the following is used to display the extended help for the Quiet 

option:



DTUtil /Help Quiet

 or

DTUtil /H Q





DTUtil supports performing one of several actions against a source package.

The source package and its location are specified with the /SQL, /FILE, and 

/DTS commands.  Some actions require a destination package and its location.



For example the following copies the srcPackage, which is on a local SQLServer,

to destPackage, which will be on the local SSIS Store.



DTUtil /SQL srcPackage /COPY DTS;destPackage 



NOTE: Commands can be in any order.  Therefore, the above example could be 

written as:

DTUtil /COPY DTS;destPackage /SQL srcPackage 

LM[ove] {SQL | FILE | DTS};Path



Operation. Move the package to the specified path.



o SQL  - Path is the path and name of the destination package.

o File - Path is the fully qualified path and file name for the package.

o DTS  - Path is the path and name of the destination package.

�Q[uiet]



Optional. Do not ask for permission to overwrite a package when copying or 

moving, just overwrite it.

�Rem comment



Optional. Places comments on the command prompt or in command files. The 

comment argument is optional. The value of comment is a string that either must

be enclosed in quotation marks or contains no white space.

�Si[gn] {SQL | FILE | DTS};Path;Hash



Operation. Sign the loaded package with the specified hash and save it to the 

specified location.



o SQL  - Path is the path and name of the destination package.

o File - Path is the fully qualified path and file name for the package.

o DTS  - Path is the path and name of the destination package.

pSourceP[assword] password



Optional. Allows the retrieval of a package that is protected by SQL Server 

Authentication. This option is used in conjunction with the SQL and SrcUser 

options. However, you can use the SrcPassword option only if you use the 

SrcUser option. If the SrcPassword option is omitted and the SrcUser option is 

used, a blank password is used.



* Security Note: When possible, use Windows Authentication.

�SourceS[erver] server_name



Optional. Specifies the name of the server from which to retrieve the package.

If you omit the SourceServer option, package retrieval is attempted against 

the local server.

�SourceU[ser] user_name



Optional. Allows the retrieval of a package that is protected by SQL Server 

Authentication. You use this option in conjunction with the SQL option. 



* Security Note: When possible, use Windows Authentication.

�SQ[L] package_name



Loads a package that is stored in SQL Server. The package_name argument 

specifies the name and path of the package to retrieve.



However, you can use the SQL option in conjunction with options SrcUser, 

SrcPassword, and SrcServer. If you omit the SrcUser option, Windows 

Authentication is used to access the package. If it is present, the SrcUser 

login name specified is associated with SQL Server Authentication.



You can use the SrcPassword option only in conjunction with the SrcUser option.

If you use the SrcPassword option, DTUtil accesses the package with the user 

name and password information that you provide. If you omit the SrcPassword 

option, a blank password is used.



* Security Note: When possible, use Windows Authentication.





If the SrcServer option is omitted, the default local instance of SQL Server

is assumed.



If you use the SQL option in conjunction with any of the following options, 

DTUtil fails: 

o DTS 

o File 

�FC[reate] {SQL | DTS};ParentFolderPath;NewFolderName



Operation. Create a folder on SSIS or SQL Server.  The ParentFolderPath is the

location for the new folder.  The NewFolderName is the name of the new folder.

�FDe[lete] {SQL | DTS};ParentFolderPath;FolderName



Operation. Delete a folder on SSIS or SQL Server.  The ParentFolderPath is the

location of the folder to delete.  The FolderName is the name of the folder to

delete.

@FE[xists] {SQL | DTS};FolderPath



Operation. Check if a folder exists on SSIS or SQL Server.  FolderPath is the

path and name of the folder to look for.

DFR[ename] {SQL | DTS};ParentFolderPath;OldFolderName;NewFolderName



Operation. Rename the specified folder on SSIS or SQL Server. The 

ParentFolderPath is the location of the folder to rename.  The OldFolderName

is the current name of the folder. The NewFolderName is the new name.

�FDi[rectory] {SQL | DTS}[;FolderPath[;S]]



Operation. List the contents (folders and packages) in a folder on SSIS or SQL

Server.  The optional FolderPath is the folder to list the contents of. If none

is supplied then the root folder is used.  The optional S allows for listing

the contents off all the subfolders of the folder specified.

�Dec[rypt] password



Optional. Sets the decryption password used when loading a package with

password encryption.

�En[crypt] {SQL | FILE | DTS};Path;ProtectionLevel[;password]



Operation. Encrypts the loaded package with the specified protection level and

password and save it to the specified location.  The level determines whether

the password is needed or not.



o SQL  - Path is the path and name of the destination package.

o File - Path is the fully qualified path and file name for the package.

o DTS  - Path is the path and name of the destination package.



Protection  

  Level     Description

    0       Strip sensitive information.

    1       Sensitive information is encrypted using local user credentials.

    2       Sensitive information is encrypted using the required password.

    3       Package is encrypted using the required password.

    4       Package is encrypted using local user credentials.

    5       Package uses SQLServer storage encryption.

8I[DRegenerate]



Operation. Generates a new GUID for the loaded package and updates the package 

ID property with the new GUID.  If a package was copied then the user may 

desire to generate a new ID for the new copy so that it may be be uniquely 

identified in logging data.

�DTUtil performs operations on packages and folders.  To get more information on

its usage specify the /help option on the command line.  To get detailed help 

about an option specify /help option on the command line.

<?xml version='1.0' encoding='UTF-8' standalone='yes'?>
<assembly xmlns='urn:schemas-microsoft-com:asm.v1' manifestVersion='1.0'>
  <trustInfo xmlns="urn:schemas-microsoft-com:asm.v3">
    <security>
      <requestedPrivileges>
        <requestedExecutionLevel level='asInvoker' uiAccess='false' />
      </requestedPrivileges>
    </security>
  </trustInfo>
</assembly>
0?0�?#	*�H��
��?0�?10	+0L
+�7�>0<0
+�70	���0!0	+��b��q��j1:��2�u���0��0� 3�o(�m�0
	*�H��
0w10	UUS10U
Washington10URedmond10U
Microsoft Corporation1!0UMicrosoft Time-Stamp PCA0
181024210730Z
200110210730Z0��10	UUS10U
Washington10URedmond10U
Microsoft Corporation1%0#UMicrosoft America Operations1&0$UThales TSS ESN:3BBD-E338-E9A11%0#UMicrosoft Time-Stamp Service0�"0
	*�H��
�0�
��*4�f=��*^jQ��da�����P:@&�:�x�M�Ix�Z��L�D��~�뙪u�L�p~��*
Mw��X/S��H&4�@�Wi�#���'��#���i�	�o���ȄK�Af>�����f���������HF�R�v�0� 	y����c�D���_q�(
k
 ��o�=]�ؽ�5F�|'�����xЭ���oK�V�f��ۧ �3 ��
7��Q �5e�ն�3ݭ�E��	0�0U�mmO��L�3�J��ک��+0U#0�#4��RFp
�@�v��+��5�0TUM0K0I�G�E�Chttp://crl.microsoft.com/pki/crl/products/MicrosoftTimeStampPCA.crl0X+L0J0H+0�<http://www.microsoft.com/pki/certs/MicrosoftTimeStampPCA.crt0U%0
+0
	*�H��
��y��<TD��bF��F�ą)�R���?t�.�������S6��hL�ͮ��X��-CqЀ�;���m2?��b�E��<M����C��:a�E�%�L�\�V���xD��5�-B�>���M�y�/�b��It���$E���l�I�۹� �B��!ڂϱ�r�& |���|�'�r���kw.<��{���Vp��ٻf��)�s��2BGN�_�+�?s�U�+a�($��d��5E¹	�-�6��R0��0�۠3�}������0
	*�H��
0y10	UUS10U
Washington10URedmond10U
Microsoft Corporation1#0!UMicrosoft Code Signing PCA0
190502212032Z
200502212032Z0t10	UUS10U
Washington10URedmond10U
Microsoft Corporation10UMicrosoft Corporation0�"0
	*�H��
�0�
���
���q��5/S����T��=!MY���
m�����S��`.��:�%�@�/{ꔨ���o��{GNӓ`�P� M^5n���D�~���`��"_����)�����B�X��<�j�>Ոc?1Ϩj8fGY�<ƹ�Z�̉P#4r5L۳��>)�8�$������Ai�u�Fp�%t����VfQ�1���k<j���){��U]j���0
��c�Cj��
Ei���[�����w0�s0U%0
+0U�B�u��˜���k�_l��00PUI0G�E0C1)0'U Microsoft Operations Puerto Rico10U
229803+4541050U#0��p�R4���'���ؽ�mGN0bU[0Y0W�U�S�Qhttp://crl.microsoft.com/pki/crl/products/Microsoft%20Code%20Signing%20PCA(2).crl0f+Z0X0V+0�Jhttp://www.microsoft.com/pki/certs/Microsoft%20Code%20Signing%20PCA(2).crt0
	*�H��
�9�n����T��%��/�<G.��Ʀ��ch
GL�M�	�'��9���l��I^f����r1�rT���n�U�n�(��
�ړ� OKN�ԣ�[R5n#����9�n�K�0�ZߡI��i�
��ֱ��"��-/��)��c��|��țJ	B��r-C�@�u+t���zf Y�PTR�(��4?bțvTNJ�ό���y#�ڮ�T#�*���pwƪ��M�����&���V���}:��.�w'�p��p0��0���
a5E?0
	*�H��
0_10
	�&���,dcom10
	�&���,d	microsoft1-0+U$Microsoft Root Certificate Authority0
180920174200Z
210509232813Z0y10	UUS10U
Washington10URedmond10U
Microsoft Corporation1#0!UMicrosoft Code Signing PCA0�"0
	*�H��
�0�
��������F��fɧ]
~�=���1��ԅ���2����A��7��|W����Z`�1
a�"�|V4b�^Z�.�@*�=�aD؎�6Y�c���������_+�P_�	Ґ頷,DA�eR7,�����,���c�Q����8^|�����)@ߔv*�e��m�'�§���j�Ƨ�f�hw�^��	�R�sQ�*�Q#�I�����P^�Oc?�/���M+q�Y('M��^0�Z0U�0�0U�p�R4���'���ؽ�mGN0U�0	+�70#	+�7<����Up�iB���8��W0	+�7
SubCA0U#0���`@V'��%�*�
S�Y�0PUI0G0E�C�A�?http://crl.microsoft.com/pki/crl/products/microsoftrootcert.crl0T+H0F0D+0�8http://www.microsoft.com/pki/certs/MicrosoftRootCert.crt0
	*�H��
�={�.�6�B�UO�����9
������"˅yC�����5�˅�->M�Q�$����c������
m.U5�,yaƶM�V&��e��.�<He��D���4
ީ�c����d�U�����e~���0���;��u�]π��q�B��ғ��T�|!�싼�~�)	P�+:�=��W��8��ߚ8Ё�'��y;4���"�e�La<��.2h�)���v�߆)�
㴳�L�gZT�Y'��HBn1L�L��h�#J�T㔕l����(�YD���򨅳=�*�7��=7�8�*G�gY�-�z�w��JI*t7��/��C-�2���LI�����G辞�1d������uI{db��~��g\AG�N6-�7�k�?R����"%�9[�Ez��������d�΋��}��mW[*{ol~�C�
�]�gԋ���Nz���߽4����gn�d��L�3��QpU�\}�ݧU��ǣ�Fz��D��c�}�"u0�0��
ah40
	*�H��
0_10
	�&���,dcom10
	�&���,d	microsoft1-0+U$Microsoft Root Certificate Authority0
070403125309Z
210403130309Z0w10	UUS10U
Washington10URedmond10U
Microsoft Corporation1!0UMicrosoft Time-Stamp PCA0�"0
	*�H��
�0�
���l���H�*|k.���řQ#P���N$�ѧ�L�t0 ��T�I�B���\0&�k�{�������3$����g,�{���N���#Sʍ�E�	�^�аB���l�g�(�FS����(F.'��OUR�,�j��0n��Y0��~֗��!�~����SmR�E��HJGf')f�����J����G	����Ux��P�0F��#F��-T��xA1w̛�;���a�
������"KT���� ���0��0U�0�0U#4��RFp
�@�v��+��5�0U�0	+�70��U#��0�����`@V'��%�*�
S�Y䤡c�a0_10
	�&���,dcom10
	�&���,d	microsoft1-0+U$Microsoft Root Certificate Authority�y��J���LsX�.e0PUI0G0E�C�A�?http://crl.microsoft.com/pki/crl/products/microsoftrootcert.crl0T+H0F0D+0�8http://www.microsoft.com/pki/certs/MicrosoftRootCert.crt0U%0
+0
	*�H��
����\D6�鴭w��yQM�.tq[m�ξ{��.���mb�W�N P��z@�W��X�����x���;�⾏
ȍH��S�O����jՀ���/��*$"p����x�.
��p�N��k
r���9�g-�Q�b\?�� ?�2��1Jv1=+r��p=��
��
a��׸�N��5+^���}B{�Sr!�0ʻxe\[
����<�fX�-/���QV�p�l�9L�y��zb))4wb�=m���,��C���}�㤨t5�N�q#&v<R�qZFC����MgȟB��y!��0f�B^Ȟ"!�C�+��H�,��2�L&*H$_Z�V�ޙ��:o��'t�v!����'T��j=��va�n����G�o��2l���QȌ#�f���d=-�Y���!嵰�c�xT�A.P����x����uْ�u"/2�n�[�%����!��Oɚ�I�eo�}�i��n꧗�1)��[\�M��/�?.Uk���1�)
0�)0��0y10	UUS10U
Washington10URedmond10U
Microsoft Corporation1#0!UMicrosoft Code Signing PCA3�}������0	+���0	*�H��
	1
+�70
+�710
+�70#	*�H��
	1W
�0f�g��u��x ��0N
+�71@0>� �SQL Server 2019��http://www.microsoft.com0
	*�H��
�����Njq�� �>%�I�F�m���d1�I
�%E��SA�_�������&(2�\5�✤��B��G\�
&\��DA����`z�WI���v�; ��*\��GYԓ/��
���y!1j����5�P�C�y=D�����2P�L��vﳰB6�BDO|nR|��7
5q7�T���~�50z��[���"j6융;_-T���LX���ް.�j�'��J��*\�1�ō�|��e#�Wi��&�0�$	*�H��
	1�0�0��0w10	UUS10U
Washington10URedmond10U
Microsoft Corporation1!0UMicrosoft Time-Stamp PCA3�o(�m�0	+�]0	*�H��
	1	*�H��
0	*�H��
	1
190924204755Z0#	*�H��
	1�=*�Ϣ����e�a�x|��0
	*�H��
�bo	N��Ș&[�ڗu�È�˽ޭ�+��#�9�RX�8}H��.l� �ǐ�U脓����a�H�E�&�����()���ϔ	��\�q�֫���µ�2��J�@�'����ҁ�#�WX'o���Y��s`0�0(b1lD�P�J����7�ym'k��I^/��)b��ëTٟ�����Sa=�mq�%�dP�0�z.�g諯������o�1�/��],�m!p���4�e�6�?�Au�X��0�$q
+�71�$a0�$]	*�H��
��$N0�$J10
	`�He0\
+�7�N0L0
+�70	���010
	`�He ������x ��_�ț�����>Y�#��
�0��0��3Q���@q�AQ0
	*�H��
0~10	UUS10U
Washington10URedmond10U
Microsoft Corporation1(0&UMicrosoft Code Signing PCA 20110
190502213746Z
200502213746Z0t10	UUS10U
Washington10URedmond10U
Microsoft Corporation10UMicrosoft Corporation0�"0
	*�H��
�0�
��ZƆiG4�U�fu�bTXg'�*�H��V4Ia�xf'�V!,����;����fm�<4S(����S !/H�-����Z��H��Ns_;���]��
�31��|�i�z)V�,�����=z3�Ï�^��}[4I�*T�l)��@��åa��yh7y:�	s�8O����3���e�qCu����q�Ŧ5�3.�����ي�D��jߐO�MyVm�+6���@��� 2`�n�l�ګ��ΎD���~0�z0U%0
+�7L+0UW��J�����P��Fb��0PUI0G�E0C1)0'U Microsoft Operations Puerto Rico10U
230012+4541350U#0�Hnd�Pӂ�77"�m��u�0TUM0K0I�G�E�Chttp://www.microsoft.com/pkiops/crl/MicCodSigPCA2011_2011-07-08.crl0a+U0S0Q+0�Ehttp://www.microsoft.com/pkiops/certs/MicCodSigPCA2011_2011-07-08.crt0U�00
	*�H��
�Z��.��ʮ�,��'���]C��"W�}�n�70[ݕ%m+'���	�R���
��_�i�em��})`�g8����D�}Vl�|r~,���Z�5o�&Ve-|	�]���ڝ=+xZ����
�
~C��h�ZW�&�T�q�H�r�E�W��
U�!���NVjҬ�v�-gaʵ�v~�6{Q���Yº�g�l�̉n�Q/RV$�lZ�cW�[�0��n��q0u���:v6w~��]
��h�[��1U�21}a~M��&��*�G��U�|J(00I�bj�v/�
����A��3-��8����-�F?)�u���5I�8���
��V$�9.S�
`~��Ւ(�O�.5���k��"x�B���a;��9�糥��N6���6���ߖ���w}}����s�Z\�y��D���zXք�ؓ���n6g}g���ك.ȋ�K.��B��?EE�j�gQ�̀~����<"(F����
������]y�#�M�p�P3�0�z0�b�
a��0
	*�H��
0��10	UUS10U
Washington10URedmond10U
Microsoft Corporation1200U)Microsoft Root Certificate Authority 20110
110708205909Z
260708210909Z0~10	UUS10U
Washington10URedmond10U
Microsoft Corporation1(0&UMicrosoft Code Signing PCA 20110�"0
	*�H��
�0�
���r.��n��M4��X!�B*k�ZP��8I���7k���8™��9�1BӉ
yd�~�`$l��I��h^�ߛS�
,ï٩+�z	�זY�`�fv�2R&/�PϳD�]��.u�h��m�:\��F��8d�nd5x��c-�@����
�\y�I)�
��w��=��+ZMV(�zr�:�I^���C���{�{��>��]�O��/Y�;-�3Xŷ>�2ӳ=����8~ҝ�,�NV�!5%�9ndS���#������_��R������!t%_(��'(8%�9J6�|���#��f�aj�(I�_��%]�!K>RĵW?$��z[/�#�p]QFw��Ἤ�_����UK�9��#I��D|E��rz�r�$߿F����Wۃ��MI0�����[���ݰf��{���K�I)�(��}g��bx_�/��W�\�w((��m�(�,�@7O��D��	L�ԥC/t��n�x X,]`��>O3�ڰ�ޞN�F�l���ֈ����0��0	+�70UHnd�Pӂ�77"�m��u�0	+�7
SubCA0U�0U�0�0U#0�r-:1�C�N���1�#�40ZUS0Q0O�M�K�Ihttp://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl0^+R0P0N+0�Bhttp://www.microsoft.com/pki/certs/MicRooCerAut2011_2011_03_22.crt0��U ��0��0��	+�7.0��0?+3http://www.microsoft.com/pkiops/docs/primarycps.htm0@+042 Legal_policy_statement. 0
	*�H��
�g򆥘�Ty.��tg"���c��B�}�y��e_.,>��r�m���?�
�;�G���i�c�"5��]e��}�FPU��|�K�<B�Rа�k�>.)��=�Եw�9��d�D=xz#�}��t����&F*Š�����h�h.��*?*kXIc	inZ�����F+�;н5�n%��'������(��M=����2���-�[��I9
�
�ƭ�����QEX82q'��'��,: i��Y�hno��t�@�*(>�?Mf��M��o}E�v�@*e��]Rb��c6��������'�ͥ���]cA�[��>w��u�aa������A�(��e/��\��֡F�Y�	KH���)ű��?Ew5�Ң��zz"�H���G#�����k�K���ux��7�yK�ֳ#hu������i;��0�L���umc�=ѝVNO��W"�x2!z�A
�?��̤]����WqVNHE�Bɛv[
�Hk�y���mmj�Rs
zP�1�O0�K0��0~10	UUS10U
Washington10URedmond10U
Microsoft Corporation1(0&UMicrosoft Code Signing PCA 20113Q���@q�AQ0
	`�He���0
*�H��
	10	*�H��
	1
+�70
+�710
+�70/	*�H��
	1" Zv=�]jf����,��x-��������0N
+�71@0>� �SQL Server 2019��http://www.microsoft.com0
	*�H��
��BP�GBcž��g�q׶�<<�E�4�(_B�LZ��I.�D���d�/�3i2c��F�P�
�_6�5����|�kQ��ά��ňl|�ٍ��
L�,An�`e�,��W����]�#c^�Lگg��F:x�,����SI��Kq�q�%��^?�R#7.[�a�k:��c����af_�$p�{��-p�O��A�y�ĸ�딱r"�I�3�
��ĝ�B�}�WE6��k��.�!R�7z
�lRH�L���+M. �gꡂ�0��
+�71��0��	*�H��
���0��10
	`�He0�X*�H��
	��G�C0�?
+�Y
010
	`�He �n�	}��vD���Y�&��kJ?}i�n���]���j�20190924204755.671Z0��Ԥ��0��10	UUS10U
Washington10URedmond10U
Microsoft Corporation1)0'U Microsoft Operations Puerto Rico1&0$UThales TSS ESN:BBEC-30CA-2DBE1%0#UMicrosoft Time-Stamp Service��"0��0�ݠ3�/�k�k��0
	*�H��
0|10	UUS10U
Washington10URedmond10U
Microsoft Corporation1&0$UMicrosoft Time-Stamp PCA 20100
190906204109Z
201204204109Z0��10	UUS10U
Washington10URedmond10U
Microsoft Corporation1)0'U Microsoft Operations Puerto Rico1&0$UThales TSS ESN:BBEC-30CA-2DBE1%0#UMicrosoft Time-Stamp Service0�"0
	*�H��
�0�
���-�-��b+\k¯�r�H14�$d��V!?����-����|�[*��'f��u�1�_��8�7?�Ȇ��Y�c�0J�OE��G*��D�Q���w-� ���߬UW�	���J�����oL���K�~��R��,L]nRb��݋��d�y�>9>\.d���p�t@Ƃ����?���2����I�ٓ�.Gd��tS&�-�%R��F�;�%���[�̌?CŶјWt��n�nd��[*�5���0�0U���߱|V|����6r0@W�0U#0��c:\�1��C{|F�3hZ�mU0VUO0M0K�I�G�Ehttp://crl.microsoft.com/pki/crl/products/MicTimStaPCA_2010-07-01.crl0Z+N0L0J+0�>http://www.microsoft.com/pki/certs/MicTimStaPCA_2010-07-01.crt0U�00U%0
+0
	*�H��
��	�BX�n�J̀y�-aա�w��?�Q �S��ާ��q��v�-i�h��~���p��}���*Nߩqw�f&YC�t��$1�JD�#v��O�*pUՎ�l��=�5	3�H�'�3~�<k�"�I�	8o6_bwJ <R3	�����s���������^;���V����p�$ƈ�${&�`*6YN�X�^`�pV���e�2KwvC�ˁW\����rk�EM�&���
��6���م;��
8���e+�0�q0�Y�
a	�*0
	*�H��
0��10	UUS10U
Washington10URedmond10U
Microsoft Corporation1200U)Microsoft Root Certificate Authority 20100
100701213655Z
250701214655Z0|10	UUS10U
Washington10URedmond10U
Microsoft Corporation1&0$UMicrosoft Time-Stamp PCA 20100�"0
	*�H��
�0�
��
�w�: ����i�ktTե
����|hK,_���a�v�>f+[�S'1A��	�|a0Y�0D�`��TC�M�8�Bݓ��s0W&��E
��G�Ϳ$`2X`F�XG�2�tag�_�T�ϓL��Ħ]�an(������a�F�'$gr!��Kd�Pb�]�w=�Wu���BM@Q��>g�f��D~��K�n�ʱ��z*
1��N���5�x���<�/D����d��� 	�x����D]^�O"M���0��0	+�70U�c:\�1��C{|F�3hZ�mU0	+�7
SubCA0U�0U�0�0U#0��Vˏ�\bh�=��[�Κ�0VUO0M0K�I�G�Ehttp://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl0Z+N0L0J+0�>http://www.microsoft.com/pki/certs/MicRooCerAut_2010-06-23.crt0��U ���0��0��	+�7.0��0=+1http://www.microsoft.com/PKI/docs/CPS/default.htm0@+042 Legal_Policy_Statement. 0
	*�H��
��Q
���?�q=���!o���1����Wm0���f�j���x�Ǩ�%��kTW+Q�D��S���`�v�@@A��\�\�^5�$VKt�Bȯ���7}Z?�yJ�R�8�/y�e٩�k����zoK0D$"<�����Y)����p�2J'�U�/���3�b_��W@��Ιf���jb��J�&�9�Jqc�{!mÜ��<�}�j�x�m���8ؔ�ƥ
������B�����"8 �%�d��~cY%z.9Wv�q����a�˚�G����ͧ��}���;q	�]t�"aڰPo�����1��:�eGx�H���r~akow��˧	�9����؂�r�����*T9�[��
U�z�s;�-��3.)��/T'!�ȬN�(���ۖ��B���AM�*��f0ӻt2K�c{���/�!�Y���D<�Pqס��U�i�W���0����M�
�]O�8/��X.�
�P5��	'ճ~5��6��_��t�I���0��0����Ԥ��0��10	UUS10U
Washington10URedmond10U
Microsoft Corporation1)0'U Microsoft Operations Puerto Rico1&0$UThales TSS ESN:BBEC-30CA-2DBE1%0#UMicrosoft Time-Stamp Service�%
0	+6�5h�6L�{���:�:w���0�ۤ��0��10	UUS10U
Washington10URedmond10U
Microsoft Corporation1)0'U Microsoft Operations Puerto Rico1'0%UnCipher NTS ESN:4DE9-0C5E-3E091+0)U"Microsoft Time Source Master Clock0
	*�H��
�4�@0"20190924204448Z20190925204448Z0w0=
+�Y
1/0-0
�4�@0
"(�0n0
�5�06
+�Y
1(0&0
+�Y
�
0�`�
0� 0
	*�H��
��.�!��r�p��22B/�E?4\C�����<��c���^�޾�;���+^T?H:�R5W�2�{��g|o\��\�h��L3�y|e.4ū+�W�:s������uK�o�}�{�B<�o�gd���^���d�o�.�Ib��
碮�� �v�]�)>0�ކ	8�=�#���[���}%u�d���?�t���bۢ���`����v$/ā7�B,�@��$%-���}_��j~���R�1��0��0��0|10	UUS10U
Washington10URedmond10U
Microsoft Corporation1&0$UMicrosoft Time-Stamp PCA 20103�/�k�k��0
	`�He��20	*�H��
	1
*�H��
	0/	*�H��
	1" Q�7�{z�b��OBz\tS�,d�K�&g{(�.0��*�H��
	1��0��0��0��6�5h�6L�{���:�:w0��0���~0|10	UUS10U
Washington10URedmond10U
Microsoft Corporation1&0$UMicrosoft Time-Stamp PCA 20103�/�k�k��0칊�&��V�+=_�#�0
	*�H��
�'��߾)TE�X�]0�w'nl�nr�9�ao���G�$Մ�S���~�+];Y�@׎�2h�wא&, �T�VCK�	���tP��)1![�ў���?�z�Y@
�]@�|��-�l�<Ә²Wt1�Z��G����A5$I,9���89B��#5��M�O=�;3�tiO���w��d϶��~;�wE����
ʛ�T���5.u�5�׭���:�Q$g[d�?s1�>���ó��)4rr�Xb�{�73�Ừ