????

Your IP : 18.227.140.134


Current Path : C:/Users/All Users/Microsoft/Windows Defender/Platform/4.18.25030.2-0/en-GB/
Upload File :
Current File : C:/Users/All Users/Microsoft/Windows Defender/Platform/4.18.25030.2-0/en-GB/MpAsDesc.dll.mui

MZ����@���	�!�L�!This program cannot be run in DOS mode.

$	(=�MIS�MIS�MIS�̬�LIS��Q�LIS�RichMIS�PEL�����!)��2h@ ����%8.rdata�@@.rsrc� �@@����
lPP����$����8.rdata8.rdata$voltmdP�.rdata$zzzdbg 0.rsrc$010(ؿ.rsrc$02 �ؖH�Q�����Ы�{� W�n'\�<t���� �0�H�������&������0�H�`�x�?��@��A��B��~���� ��8��P��h�������������������9�x(��@��X��p����	
��

��
���
���
��
��
0��
H�`�x�	�	�	�	�	�	�	�			 	0	@	P	`	p	�	�	�	�	�	�	�	�			 	0	@	P	`	p	�	�	�	�	�	�	�	�		((���(��|,X��,h�<-��(.���.��/p�X0p��0��l1��2��4 �45�	�$?��E���K���O���W$��]��a��|g��hm��r2�Ly��~j��~ �����4�:�p�J���������$����������D�Ԡh�<�	�D�T����-�L�8�MUI����%B^yhз�.��jҧ�m���]O�\�ZV����MUIen-GBHHelps protect users from malware and other potentially unwanted softwareMicrosoft Antimalware ServicepHelps guard against intrusion attempts targeting known and newly discovered vulnerabilities in network protocolsMicrosoft Network InspectionQMonitors the availability, health, and performance of various security componentsMicrosoft Defender Core Service.Microsoft Purview Data Loss Prevention Service.Microsoft Purview Data Loss Prevention ServicePAMicrosoft Defender Antivirus$Microsoft Defender Antivirus Service7Microsoft Defender Antivirus Network Inspection Service/Microsoft Defender Antivirus Mini-Filter DriverLMicrosoft Defender Antivirus On-Access Malware Protection Mini-Filter Driver=Microsoft Defender Antivirus Network Inspection System Driver7Non-critical files used by Microsoft Defender Antivirus(Microsoft Defender Antivirus Boot Driver(Microsoft Defender Antivirus Boot DriverUnknownAdwareSpywarePassword StealerTrojan DownloaderWormBackdoorPATrojan
Email FlooderDiallerMonitoring SoftwareBrowser ModifierJoke ProgramSoftware BundlerTrojan NotifierSettings ModifierPAPotentially Unwanted SoftwareExploitFile Sharing ProgramMalware Creation ToolRemote Control SoftwareToolTrojan Denial of ServiceTrojan DropperTrojan Mass MailerTrojan Monitoring SoftwareTrojan Proxy ServerVirus	PermittedNot Yet ClassifiedSuspicious Behaviour
VulnerabilityPolicyEnterprise Unwanted Software
RansomwareOA system change was detected. This generally occurs when software is installed.�A program that displays advertisements. While some adware can be beneficial by subsidising a program or service, other adware programs may display advertisements without adequate consent.�A program that collects information, such as the websites a user visits, without adequate consent. Unauthorised actions may include installing without prominent notice or running without a clear method to disable the program.=A Trojan that captures or transmits passwords to an attacker.?A Trojan that silently installs other programs without consent.�Self-propagating malicious code that can automatically distribute itself from one computer to another through network connections.GA Trojan used to bypass security policies or gain access to a computer.�A program that appears to be useful or harmless but contains hidden code designed to exploit or damage the system it is running on.CA Trojan designed to overwhelm an email user's inbox with messages.SA Trojan that uses the computer's modem to generate unauthorised telephone charges.FA program that monitors activity, such as keystrokes or screen images.XA program that changes browser settings, such as the homepage, without adequate consent.PA]A program designed to amuse or scare a user, such as imitating a virus without taking action.�A program that installs other potentially unwanted software, such as adware or spyware. The licence agreement of the bundling program may require these other components in order to function.IA Trojan used to notify an attacker when the software has been installed.9A program that changes settings without adequate consent.�A program with potentially unwanted behaviour that is brought to the user's attention for review. This behaviour may impact the user's privacy, security or computing experience.1A program that exploits a security vulnerability._A program used to distribute and download files, often as part of a peer-to-peer (P2P) network.7A tool used to create viruses, worms and other malware.�A program that provides access to a computer from a remote location. These programs are often installed by the computer owner or administrator, and are only a risk if unexpected.UA tool that can be abused by an attacker and may be used to bypass or lower security.2A program that creates a Denial of Service attack.+A program that comes bundled with a Trojan.+A Trojan that sends large volumes of email.�A Trojan that records user activity, such as keystrokes. This information may be sent to an attacker using email or other methods.3A Trojan that installs a proxy server on a machine.gMalicious code that attempts to spread from computer to computer by attaching itself to a host program.8A program that has been classified and permitted to run.+A program that has not yet been classified.PAKThis program delivers potentially unwanted advertisements to your computer.bThis program appears to be a spyware removal software but does not disclose advertising behaviour.FThis program displays advertisements separate from the parent program.,This program displays pop-up advertisements.BThis program displays advertisements based on Web browsing habits.8This program displays advertisements with adult content.NThis program displays advertisements and is often bundled with other programs.PADThis program displays advertisements and may be difficult to remove.@This program displays advertisements based on Web search habits.9This program delivers advertisements and tracks activity.[This program displays advertisements and may be delivered through unsolicited installation.GThis program displays advertisements and runs without a user interface.;This program displays advertisements inside other software.1This program displays deceptive product messages.DThis program displays advertisements and may install other software.1This program is used to bypass security policies.KThis program changes various Web browser settings without adequate consent.*This program changes the default homepage.@This program changes the default search engine and the homepage.XThis program changes the default search engine, the homepage and other browser settings.+This program redirects access to Web pages.BThis program changes browser settings and displays advertisements.'This program modifies Web page content.PA$This program changes Web page links.)This program adds links to adult content.ZThis program adds a browser toolbar and may be delivered through unsolicited installation.HThis program adds a sidebar to the browser that displays advertisements.$This program displays adult content./This program changes the default search engine.OThis program changes browser settings and is often bundled with other programs.KThis program dials local/national rate numbers to create telephone charges.OThis program dials local/national rate numbers to gain access to adult content.]This program dials local/national rate numbers and delivers advertisements for adult content.?This program can be used to perform a denial of service attack.;This program overwhelms a user's inbox with email messages.9This program takes advantage of a security vulnerability.5This program allows users to download or share files.4This program is designed to amuse or scare the user.>This program monitors user activity, such as keystrokes typed.?This program is used to create viruses, worms or other malware.'This program monitors user information.6This program is dangerous and captures user passwords.=This program is often installed a bundle with other programs.CThis program may have been installed without adequate user consent.GThis program runs automatically and without adequate user notification.lThis program may update without adequate user consent and may be delivered through unsolicited installation.AThis program updates automatically without adequate user consent.IThis program does not adequately disclose potentially unwanted behaviour.XThis program is often distributed as a component of other potentially unwanted software.0This program has potentially unwanted behaviour.AThis program disables other software as part of its installation.GThis program provides remote access to the computer it is installed on.HThis program changes various computer settings without adequate consent.:This program installs other potentially unwanted software.PA=This program may install other potentially unwanted software.This program installs adware.This program installs spyware.(This program installs browser modifiers.;This program installs software that displays adult content.&This program sends unauthorised email.'This program collects user information.9This program tracks activity and delivers advertisements.<This program tracks activity and may disable other programs.FThis program tracks activity and is often bundled with other programs.<This program tracks activity and may be difficult to remove.NThis program tracks activity and all Web page content, including secure pages.8This program connects to the Internet in the background.@This program can be used for malicious purposes if unauthorised.PAEThis program is dangerous and exploits the computer it is running on.TThis program is dangerous, exploits the computer, and provides access to user files.NThis program is dangerous, exploits the computer, and shares user information.7This program is dangerous and downloads other programs.6This program is dangerous and installs other programs.4This program is dangerous and records user activity.BThis program silently informs a server when it has been installed.5This program is dangerous and acts as a proxy server.HThis program is dangerous and self-propagates over a network connection.PADThis program monitors user information, such as Web browsing habits./This program changes various computer settings.+This program changes the system hosts file.FThis program monitors sensitive information, such as keystrokes typed.8This program is dangerous and monitors user information.BThis program is dangerous and replicates by infecting other files.CThis program is dangerous and can hide programs or bypass security.AThis program is dangerous and executes commands from an attacker.OA system change was detected. This generally occurs when software is installed.wThis application was removed because it is blocked according to the Windows Defender Advanced Threat Protection policy.}For your protection, this application was blocked by Microsoft Defender for Endpoint according to your organisation's policy.dThis content was blocked by Microsoft Defender for Endpoint according to your organisation's policy.PARPermit this detected item only if you trust the program or the software publisher.�This software is typically benign when it runs on your computer, unless it was installed without your knowledge. If you're not sure whether to permit it, review the alert details or check if you recognise and trust the publisher of the software.�Review the alert details to see why the software was detected. If you do not like how the software operates or if you do not recognise and trust the publisher, consider blocking or removing the software.!Remove this software immediately.!Remove this software immediately.Not Yet ClassifiedLowMediumHighSeverePAOA system change was detected. This generally occurs when software is installed.ePrograms that are typically benign unless they are installed on your computer without your knowledge.�Programs that might affect your privacy or make changes to your computer that could negatively impact your computing experience, for example, by collecting personal information or changing settings.�Programs that might collect your personal information and negatively affect your privacy or damage your computer, for example, by collecting information or changing settings, typically without your knowledge or consent.�Widespread or exceptionally harmful programs, similar to viruses or worms, that negatively affect your privacy and your computer's security, and that damage your computer.UnknownClean
QuarantineRemoveBlockIgnore
Ignore AlwaysRevert
Select ActionPA6Block executable content from email client and webmail3Block all Office apps from creating child processes2Block Office apps from creating executable content:Block Office apps from injecting code into other processesIBlock JavaScript or VBScript from launching downloaded executable content1Block execution of potentially obfuscated scripts'Block Win32 API calls from Office macro_Block executable files from running unless they meet a prevalence, age or trusted list criteria*Use advanced protection against ransomwareYBlock credential stealing from the Windows local security authority subsystem (lsass.exe)@Block process creations originating from PSExec and WMI commands8Block untrusted and unsigned processes that run from USBBBlock only Office communication apps from creating child processes0Block Adobe Reader from creating child processes#Block WebShell Creation For Servers0Block persistence through WMI event subscriptionPA>Block abuse of in-the-wild exploited vulnerable signed drivers$Block rebooting machine in Safe Mode0Block use of copied or impersonated system toolsH,@�	\ �6��oB�>I �� ��!] U�:�B.!� g� TM<�g ��H�e�3�I# & ��9#�m�?� g>�:]*Anti-malware engine has stopped respondingApplication NameApplication VersionEngine VersionRStand-alone System Sweeper has detected that its scanning engine is not responding=Microsoft Anti-malware scanning engine has stopped responding9Microsoft Defender scanning engine has stopped responding=Microsoft Anti-malware scanning engine has stopped respondingStandalone System SweeperMicrosoft AntimalwareMicrosoft Defender AntivirusHScan your system for malware, rootkits and potentially unwanted software2Protection against malicious and unwanted softwareAProtection against spyware or other potentially unwanted softwareMicrosoft AntimalwareMicrosoft AntimalwarePA2Protection against malicious and unwanted software2Protection against malicious and unwanted software=Microsoft Anti-malware scanning engine has stopped responding=Microsoft Anti-malware scanning engine has stopped respondingPeriodic clean-up task.Periodic verification task.Periodic maintenance task.Periodic scan task.Periodic signature update task.(A scan required to complete remediation.Antimalware status changeBMicrosoft Antimalware has detected setting changes due to malware.IMicrosoft Defender Antivirus has detected setting changes due to malware.FStandalone System Sweeper has detected setting changes due to malware.	Threat IDPAFound some malwareRestart your PCNMicrosoft Security Client found threats and is removing them from your device.EMicrosoft Security Client found a threat. Please restart your device.8Microsoft Defender Antivirus found threats. Get details.LMicrosoft Defender Antivirus found [%s] in [%s]. Please restart your device.RestartWMicrosoft Defender Antivirus found Threats.  Please run an offline scan of your device.$Actions needed in Microsoft DefenderScan$Actions needed in Microsoft DefenderUMicrosoft Defender Antivirus found [%s] in [%s]. Please restart and scan your device.Restart and scan$Actions needed in Microsoft DefenderWMicrosoft Defender Antivirus found [%s] in [%s]. Please run a full scan of your device.Scan-Support for your version of Windows is ending_When this support ends, Microsoft Defender won't be supported and your device might be at risk.-Support for your version of Windows has endedKMicrosoft Defender is no longer supported and your device might be at risk.-Support for your version of Windows has endedKMicrosoft Defender is no longer supported and your device might be at risk.;Review files that Microsoft Defender will send to MicrosoftcSending us this information can improve how Microsoft Defender Antivirus helps protect your device.Review
Send files%Microsoft Security Client took action(Microsoft Defender Antivirus took actiondYour IT settings cause the blocking of any app that might perform unwanted actions on your computer.eYour IT settings cause the detection of any app that might perform unwanted actions on your computer.Microsoft Defender summaryNMicrosoft Defender Antivirus did not find any threats since your last summary.\Microsoft Defender Antivirus successfully took action on %s threats since your last summary.pMicrosoft Defender Antivirus did not find any threats since your last summary. Your device was scanned %s times.~Microsoft Defender Antivirus successfully took action on %s threats since your last summary. Your device was scanned %s times.Microsoft Defender scan resultsXMicrosoft Defender Antivirus scanned your device at %s on %s. No new threats were found.^Microsoft Defender Antivirus scanned your device at %s on %s, and took action against threats.'Microsoft Defender periodic scanning on�Microsoft Defender Antivirus is periodically scanning your device. You are also using another antivirus program for active protection.%Enterprise Unwanted Application foundPThis application was removed because it is blocked by your IT security settings.2Microsoft Defender Antivirus is scanning this file#Your file will be available shortly$Your organisation requires this scan�The item you just downloaded or opened is being scanned as required by your IT administrator. The scan can take up to %s seconds.+Microsoft Security Client is taking action.
Threats foundPAActions needed$Actions needed in Microsoft Defender�Your IT settings caused Microsoft Defender Antivirus to block an app that may potentially perform unwanted actions on your device.Your IT settings caused Microsoft Security Client to block an app that may potentially perform unwanted actions on your device.Item skipped during scandThe Microsoft Defender Antivirus scan skipped an item due to exclusion or network scanning settings.Threat scan infoLMicrosoft Defender Antivirus couldn't completely resolve a potential threat.'Microsoft Defender notification optionsWWould you like to continue receiving periodic summaries of Microsoft Defender activity?YesNoDetailed notification settingsnThe item you just downloaded or opened is being scanned as required by %s. The scan can take up to %s seconds.��������������������A�A��$�$�H"$�"$�h	P�P��	P�P��P��P��
�P��P�|�P��P��
�P��P��P��P���P��P���P��P��"�P�(�P��0�P�0�P��%�P��P�'This program's service has stopped. You can start the service manually or restart your device, which will start the service.

This program's service has stopped. You can start the service manually or restart your device, which will start the service.

This program's service has stopped. You can start the service manually or restart your device, which will start the service.

This program's service has stopped. You can start the service manually or restart your device, which will start the service.

�This version of the software is not compatible with the version of Windows you're running. Check your device's system information to see whether you need a x86 (32-bit) or x64 (64-bit) version of the program, and then contact the software publisher.

TThe Windows Installer Service could not be accessed. Make sure that Windows Installer is installed and that you are not running Windows in safe mode, then try again.

 An unexpected problem occurred while checking for updates. For information on installing or troubleshooting updates, see Help and Support.

hThe program can't check for definition updates.

LAn unexpected problem occurred. Install any available updates, then try to start the program again. For information on installing updates, see Help and Support.

�One or more actions could not be completed successfully. For details, click on an individual item or go to History.

�The program can't find definition files that help detect unwanted software. Check for updates to the definition files, then try again. For information on installing updates, see Help and Support.

pA problem is preventing the program from starting. Install any available updates, then try to start the program again. For information on installing updates, see Help and Support.

pA problem is preventing the program from starting. Install any available updates, then try to start the program again. For information on installing updates, see Help and Support.

pA problem is preventing the program from starting. Install any available updates, then try to start the program again. For information on installing updates, see Help and Support.

,Your device is low on memory. Close some programs and try again, or search Help and Support for information about preventing low memory problems.

�Your history may be corrupt, which is causing some items to not display.

To use this program, you need to install the latest updates for your device. For information on installing updates, see Help and Support.

An unexpected problem has prevented the program from scanning your device for unwanted software. Try to scan your device again.

An unexpected problem has prevented the program from scanning your device for unwanted software. Try to scan your device again.

PAn unexpected problem has prevented the program from scanning your device for unwanted software. Try clearing the program history, and then scan your device again.

\The quarantined item cannot be restored.

Some actions couldn't be applied to potentially harmful items. The items might be stored in a read-only location. Delete the files or folders that contains the items or, for information on removing read-only permissions from files and folders, see Help and Support.

The file or drive you are trying to scan does not exist on this device. Choose another file or drive and then scan your device again.

�To finish removing malware and other potentially unwanted software, restart the device.

�The program could not find the malware and other potentially unwanted software on this device.

HTo finish removing malware and other potentially unwanted software, you need to run a full scan. For information about scanning options, see Help and Support.

To see how to finish removing malware and other potentially unwanted software, see the support article on the Microsoft Security website.

�This program can't remove a potentially harmful item from the contents of an archived file. To remove the item, you need to delete the archive. For more information, search for removing malware in Help and Support.

�This copy of Windows is not genuine. To receive the full protection of this program, you must verify that your copy of Windows is genuine. Until you successfully validate your copy of Windows, this program will only remove certain threats. Only users of genuine Microsoft software get access to the latest updates, features and product support.

�Some email components are stored in a location we were unable to modify. A list of infected email messages are displayed in the details pane. You should try to remove these email messages using your mail client.

PTo finish removing malware and other potentially unwanted software, you need to run an offline scan. For information about scanning options, see Help and Support.

�The program can't find definition files that help detect unwanted software. Check for updates to the definition files, then try again. For information on installing updates, see Help and Support.

�The program can't find definition files that help detect unwanted software. Check for updates to the definition files, then try again. For information on installing updates, see Help and Support.

�This package does not contain up-to-date definition files for this program. For more information, see Help and Support.

�This package does not contain up-to-date definition files for this program. For more information, see Help and Support.

�The program can't find definition files that help detect unwanted software. Check for updates to the definition files, then try again. For information on installing updates, see Help and Support.

84VS_VERSION_INFO���a�a?�StringFileInfot080904B0LCompanyNameMicrosoft CorporationfFileDescriptionDefinition Update Descriptions2	InternalNamempasdesc�.LegalCopyright� Microsoft Corporation. All rights reserved.JOriginalFilenamempasdesc.dll.muij%ProductNameMicrosoft� Windows� Operating System�8FileVersion4.18.25030.2 (000028f0c1f345a538ea89b768605447f1c02bdf)>
ProductVersion4.18.25030.2l&PrivateBuild"�cK<-]gm?�(� Q c�W�5U�mVI�UBS4��S)DVarFileInfo$Translation	�PADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPAD�%0�%�	*�H��
��%�0�%}10
	`�He0\
+�7�N0L0
+�70	���010
	`�He :|=MD�E��Խ�E���ƨi��Zɝ,3Wܠ�
�0��0��3��測]_��0
	*�H��
0��10	UUS10U
Washington10URedmond10U
Microsoft Corporation1.0,U%Microsoft Windows Production PCA 20110
240912200407Z
250911200407Z0p10	UUS10U
Washington10URedmond10U
Microsoft Corporation10UMicrosoft Windows0�"0
	*�H��
�0�
�� 6��É���zY�����W���Cd��`����q�����-9��2��U��F)h.�)�#F�(���b=…e�I���O�6�,��]R«�>p�<�c~���=5��&0��$[oF�ho���W��	VN�˞��%��\hr���1s��]!^S-���{�L�$�Ho3�~=�����aY�`���W�z\QW@���T$p���ikh7�������T!��H$gN�"�]7�6̋��L�*�R�+� r0�B���v0�r0U%0
+�7
+0U�rJ,�������g�����0EU>0<�:0810UMicrosoft Corporation10U
229879+5029570U#0��)9�ėx͐��O��|U�S0WUP0N0L�J�H�Fhttp://www.microsoft.com/pkiops/crl/MicWinProPCA2011_2011-10-19.crl%200a+U0S0Q+0�Ehttp://www.microsoft.com/pkiops/certs/MicWinProPCA2011_2011-10-19.crt0U�00
	*�H��
��Uh>	�^�C��|�M$57���ݣ�;�"��������.�p��[�����\��7AW����r�`�84�m�#ә-�{��f���R�6U`�߷�r�G�x���>�%cj�Q9�
x��ޣ�C{�2D����WjuO�-[�@j�-��R.�k�[�UQ�%�|(��&��Ϊ�%��T����A���jզ�']g�7����/:1�H�:�����nq�‰Q�E��l��p<���2�0��0���
avV0
	*�H��
0��10	UUS10U
Washington10URedmond10U
Microsoft Corporation1200U)Microsoft Root Certificate Authority 20100
111019184142Z
261019185142Z0��10	UUS10U
Washington10URedmond10U
Microsoft Corporation1.0,U%Microsoft Windows Production PCA 20110�"0
	*�H��
�0�
�����.	����i�!�i33��T����� ��ҋ�8����-|by��J?5 p���k�6u�1ݍp��7�tF�([�`#,��G�g�Q'�r��ɹ;S5|���'�����#	o�F��n�<A�ˣ?]jM�i%(\6��C
��������['�'x0�[*	k"�S`,�hS��I�a��h	sD]}�T+�y��5]l+\μ�#�on�&�6�O�'��2;A�,���w�TN�\�e�C���mw�Z$�H��C0�?0	+�70U�)9�ėx͐��O��|U�S0	+�7
SubCA0U�0U�0�0U#0��Vˏ�\bh�=��[�Κ�0VUO0M0K�I�G�Ehttp://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl0Z+N0L0J+0�>http://www.microsoft.com/pki/certs/MicRooCerAut_2010-06-23.crt0
	*�H��
��|qQ�y�n��9>�<Rn+?s��h�H�4M��&�1F�ay�8.Ek��(�����	��L
6fj���������@26v�Zƿ���Ӭ�h�b��TlP0X��|���N���|�sW�R!s4Z�V��	����~�����?�rS��c��=1e�������=����BА�_T���G�o�sNA�@�_�*��s�!(���s9_>�\`����	���Q�fG���=�*hw��Lb{��Ǻz�4Kbz����J7�-�W|�=ܸZ��ij�:��n�i!7ށ�ugӓW^)9��-���Es[���z��FX�^���g�l5��?$�5�
u�V��x,��Ј���ߺ~,c��#!�xl�X6+�̤��-����@�E�Ί\k>��p*
j�_G��c
2��6*pZ�BYqKW�~���!<��Ź���E��� ����ŕ�]b֠c �uw}=�E�����W�o3��w�bY~1�*0�&0��0��10	UUS10U
Washington10URedmond10U
Microsoft Corporation1.0,U%Microsoft Windows Production PCA 20113��測]_��0
	`�He���0	*�H��
	1
+�70
+�710
+�70/	*�H��
	1" X��K���F|5��uR�&���~Ѱ��Ӟ0B
+�71402��Microsoft��http://www.microsoft.com0
	*�H��
��T��u�?�ni����IJ�Ƿ~���=�o�e�-���5u�H�J��-���Om��>���&C�j!��j����g�w�>d3n��0HYg|�r{�=���J]�$�~�E�Y��޻�Қ�xk��v�a{�f?�
"���]�$=\̸�J
��hɃ�a��%�x4žs��Z�r���{._��za�������WM������ӹ�ź�!z\���U!ڍ�I�r��������
o��(x�`������0��
+�71��0��	*�H��
���0��10
	`�He0�Z*�H��
	��I�E0�A
+�Y
010
	`�He �F!�9	|g�]���X��ٰ�+�9��g�2�¼20250312050450.162Z0��٤��0��10	UUS10U
Washington10URedmond10U
Microsoft Corporation1-0+U$Microsoft Ireland Operations Limited1'0%UnShield TSS ESN:521A-05E0-D9471%0#UMicrosoft Time-Stamp Service���0�(0��3ת*V0
	*�H��
0|10	UUS10U
Washington10URedmond10U
Microsoft Corporation1&0$UMicrosoft Time-Stamp PCA 20100
240725183121Z
251022183121Z0��10	UUS10U
Washington10URedmond10U
Microsoft Corporation1-0+U$Microsoft Ireland Operations Limited1'0%UnShield TSS ESN:521A-05E0-D9471%0#UMicrosoft Time-Stamp Service0�"0
	*�H��
�0�
��U�iҤ?d�z����{(�=����/۩��Hf�`��ؤ>��帅 w:.��z��O��i,�R��FP[f����yt����suZ(\v�QI���^�ֳ	��IV�ɳ�K����\�XJ���L��
���6[�@��6:q)�2V.�y%����~)���֜�JI�� J�wނ��y���XP
Y�9͇�:�6�y,��-���}���.��Aq�(8)٨XcX��{�'|�����I��R�a�/�/�v�˄�p�o�<�8e�Y��p�
ۑ-�5���:�su�X���a��u�+L|`=��͈Y��t�L,���[���3`m�ª�I�F����;c��e6������{)��Y�Y�3aQ���]ŦƮU�k�v��3��C�&�Y��wDh��Y���p��;���|"2&�!J��l����%z�=�>��-���Q�=6�eV1���pђ���)cW���y�8�ϴ�Y<���nɡ!�NӾ���\����I0�E0U�%$ھ	#*��^}�}ww:0U#0���]^b]����e�S5�r0_UX0V0T�R�P�Nhttp://www.microsoft.com/pkiops/crl/Microsoft%20Time-Stamp%20PCA%202010(1).crl0l+`0^0\+0�Phttp://www.microsoft.com/pkiops/certs/Microsoft%20Time-Stamp%20PCA%202010(1).crt0U�00U%�0
+0U��0
	*�H��
�(�xѴ�����
sX�8�ǽn�W��`�9iS�`��ط��Ke-؀ǃL���U��]z��62����S�x�-5��`:z;]�;{z�-a=*��b����p"ĨK`����O(s0Z���e���
���q�f����~� �w=;�x87u�SZ���|P�bU�x B.�O@1��DR�q%0���t��q�"
e��\� a��w�F�^4L~y*I_)Q�]�[�� ^����F�V��2�5��/�]�5�	�#�U��06�^����x ob��}�_�X7��>ZbP7�N~��4x5�)��Z���fEÕ~Ⱥ��;���QR��ݜ;"l�s��m��))L��ы��Ԋ�q�����.��K�@�~���Nx��EpsL�U��3�yѵ��1%��LVw�a!��2%;��f���1J�}ㄤ"���`����
|�!�mͶ�%Oo�Ґ۟g�8ْ>B�����A��e�NML`ICN�C0�q0�Y�3��k��I�0
	*�H��
0��10	UUS10U
Washington10URedmond10U
Microsoft Corporation1200U)Microsoft Root Certificate Authority 20100
210930182225Z
300930183225Z0|10	UUS10U
Washington10URedmond10U
Microsoft Corporation1&0$UMicrosoft Time-Stamp PCA 20100�"0
	*�H��
�0�
���L�r!y���$y�Ղ��ҩlNu��5W�lJ�⽹>`3�\O�f��SqZ�~JZ��6g�F#���w2��`}jR�D���Fk��v��P�D�q\Q17�
8n����&S|9azĪ�ri����6�5&dژ;�{3��[~��R���b%�j�]�S���VM�ݼ��㑏�9,Q��pi
�6-p�1�5(�㴇$��ɏ~�T��U�mh;�F��z)7���E�Fn�2��0\O,�b�͹⍈䖬J��q�[g`���=� �s}A�Fu��_4���� }~�ٞE߶r/�}_��۪~6�6L�+n�Q���s�M7t�4���G��|?Lۯ^����s=CN�39L��Bh.�QF�ѽjZas�g�^�(v�3rק ��
�co�6d�[���!]_0t���عP��a�65�G������k�\RQ]�%��Pzl�r�Rą��<�7�?x�E���^ڏ�riƮ{��>j�.����0��0	+�70#	+�7*�R�dĚ���<F5)��/�0U��]^b]����e�S5�r0\U U0S0Q+�7L�}0A0?+3http://www.microsoft.com/pkiops/Docs/Repository.htm0U%0
+0	+�7
SubCA0U�0U�0�0U#0��Vˏ�\bh�=��[�Κ�0VUO0M0K�I�G�Ehttp://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl0Z+N0L0J+0�>http://www.microsoft.com/pki/certs/MicRooCerAut_2010-06-23.crt0
	*�H��
��U}�*��,g1$[�rK��o�\�>NGdx���=13�9��q6?�dl|�u9m�1��lѡ�"��fg:SMݘ��x�6.���V����i�	�{�jo�)�n�?Hu��m��m#T�xSu$W�ݟ�=��h�e��V����(U'�$�@���]='�@�8���)�ü�T�B�������j�BRu�6��as.,k{n?,	x鑲�[�I�t�쑀�=�J>f;O���2ٖ����t��Lro�u0�4�z�P�
X�@<�Tm�ctH,�NG-�q�d�$�smʎ	��WITd�s�[D�Z�k
��(�g($�8K�n�!TkjEG����^O���Lv�WT	�iD~|�als�
��Af=i��AI~~���;����>�1Q������{��p���(��6ںL���
�4�$5g+�
�挙��"��'B=%��tt[jў>�~�13}���{�8pDѐ�ȫ:�:b�pcSM��m��qj�U3X��pf�V0�>0���٤��0��10	UUS10U
Washington10URedmond10U
Microsoft Corporation1-0+U$Microsoft Ireland Operations Limited1'0%UnShield TSS ESN:521A-05E0-D9471%0#UMicrosoft Time-Stamp Service�#
0+���-�����/{.U�l�֎d���0���~0|10	UUS10U
Washington10URedmond10U
Microsoft Corporation1&0$UMicrosoft Time-Stamp PCA 20100
	*�H��
�{
�0"20250311192930Z20250312192930Z0t0:
+�Y
1,0*0
�{
�0�0�0
�|_06
+�Y
1(0&0
+�Y
�
0� �
0��0
	*�H��
�=��+h��{ÖH:$�PK_�Ry)���X n�F�I�T~a�{^�	�ZaE�ja۝�>��4��m��~��Q��LQ%M~��F��p�u�e����,��J��n7�)��� �
�
l[=��p?��P��Ūu\�]1�lj�v֍wO�ȵ垃��]�8��M~6����N�kYx@8g*p_���`��W�-�p%��N�|K������W�j����m)�w���ZYq��k�.�<�1�
0�	0��0|10	UUS10U
Washington10URedmond10U
Microsoft Corporation1&0$UMicrosoft Time-Stamp PCA 20103ת*V0
	`�He��J0	*�H��
	1
*�H��
	0/	*�H��
	1" �&�;[~���$Nq$-r���z;��.�0��*�H��
	/1��0��0��0�� ����5�ۺ�MeW�_3h᥮F�H��JO�'0��0���~0|10	UUS10U
Washington10URedmond10U
Microsoft Corporation1&0$UMicrosoft Time-Stamp PCA 20103ת*V0" ��r{��\Ū��1,��8��b���s��0
	*�H��
������"͛�b���f�۞&��/)���)�Gb;
Uڕ9�=�-=���ZNM�L㺇!������+�2�	@��S�zc�7mcL��?|�ؿ�����I~*4
*�H�٨��#��sI�#fl���U�K�}�դ均oS��C1�&4i-J�n�x���A�
�o�\�K+26�D΂�PX&"v|�h����b�a�b���z�T�b�GH|Ӯ%G�_+C���	W��1�q]QP�l����ӥ.���~'�d�������d��=C�T�2�k�yA�t`���=�+��C(nes��U}�+��~xٮ���8�T��Y%�j+�/eH�;�d �xo�w���70�{�`C+���/|l����F�+e����
&5�>���B��~�2�S}���u*]hD���O�
p�"%7*#���+��9 YF�`�N�������:n�D2G�$:�,Jb�p~��e�ݿ���
i�3xkCU˭�b�{7L