Mini Kabibi Habibi

Current Path : C:/Windows/System32/downlevel/
Upload File :
Current File : C:/Windows/System32/downlevel/api-ms-win-security-base-l1-1-0.dll

MZ����@���	�!�L�!This program cannot be run in DOS mode.

$���be��be��be��	e��be��	a��be��	���be��	g��be�Rich�be�PEd�`�6�" �


@�R``L0�""T.rdatap@@.rsrc�0@@`�6<�(�`�6
d�(�`�6$L)L`�6Raa�����!f�"i��<s���"S~��!X��	Dq�`���Fo����6b���0p��.q��( Y � � � 8!s!�!�!�!3"\"�"�"�"+#N#u#�#�#�##$[$�$�$�$4%r%�%�%�%&&`&�&�&'S'�'�'(U(�(v��J��U���'Z���
Cl��	Bw��<U��J��5`����
$Q|��V��R�� F u � � ![!�!�!�!%"J"w"�"�" #?#f#�#�#�#$C$|$�$�$%Z%�%�%�%&G&�&�&�&9'v'�'�';(x(	

 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`api-ms-win-security-base-l1-1-0.dllAccessCheckadvapi32.AccessCheckAccessCheckAndAuditAlarmWadvapi32.AccessCheckAndAuditAlarmWAccessCheckByTypeadvapi32.AccessCheckByTypeAccessCheckByTypeAndAuditAlarmWadvapi32.AccessCheckByTypeAndAuditAlarmWAccessCheckByTypeResultListadvapi32.AccessCheckByTypeResultListAccessCheckByTypeResultListAndAuditAlarmByHandleWadvapi32.AccessCheckByTypeResultListAndAuditAlarmByHandleWAccessCheckByTypeResultListAndAuditAlarmWadvapi32.AccessCheckByTypeResultListAndAuditAlarmWAddAccessAllowedAceadvapi32.AddAccessAllowedAceAddAccessAllowedAceExadvapi32.AddAccessAllowedAceExAddAccessAllowedObjectAceadvapi32.AddAccessAllowedObjectAceAddAccessDeniedAceadvapi32.AddAccessDeniedAceAddAccessDeniedAceExadvapi32.AddAccessDeniedAceExAddAccessDeniedObjectAceadvapi32.AddAccessDeniedObjectAceAddAceadvapi32.AddAceAddAuditAccessAceadvapi32.AddAuditAccessAceAddAuditAccessAceExadvapi32.AddAuditAccessAceExAddAuditAccessObjectAceadvapi32.AddAuditAccessObjectAceAddMandatoryAceadvapi32.AddMandatoryAceAdjustTokenGroupsadvapi32.AdjustTokenGroupsAdjustTokenPrivilegesadvapi32.AdjustTokenPrivilegesAllocateAndInitializeSidadvapi32.AllocateAndInitializeSidAllocateLocallyUniqueIdadvapi32.AllocateLocallyUniqueIdAreAllAccessesGrantedadvapi32.AreAllAccessesGrantedAreAnyAccessesGrantedadvapi32.AreAnyAccessesGrantedCheckTokenMembershipadvapi32.CheckTokenMembershipConvertToAutoInheritPrivateObjectSecurityadvapi32.ConvertToAutoInheritPrivateObjectSecurityCopySidadvapi32.CopySidCreatePrivateObjectSecurityadvapi32.CreatePrivateObjectSecurityCreatePrivateObjectSecurityExadvapi32.CreatePrivateObjectSecurityExCreatePrivateObjectSecurityWithMultipleInheritanceadvapi32.CreatePrivateObjectSecurityWithMultipleInheritanceCreateRestrictedTokenadvapi32.CreateRestrictedTokenCreateWellKnownSidadvapi32.CreateWellKnownSidDeleteAceadvapi32.DeleteAceDestroyPrivateObjectSecurityadvapi32.DestroyPrivateObjectSecurityDuplicateTokenadvapi32.DuplicateTokenDuplicateTokenExadvapi32.DuplicateTokenExEqualDomainSidadvapi32.EqualDomainSidEqualPrefixSidadvapi32.EqualPrefixSidEqualSidadvapi32.EqualSidFindFirstFreeAceadvapi32.FindFirstFreeAceFreeSidadvapi32.FreeSidGetAceadvapi32.GetAceGetAclInformationadvapi32.GetAclInformationGetFileSecurityWadvapi32.GetFileSecurityWGetKernelObjectSecurityadvapi32.GetKernelObjectSecurityGetLengthSidadvapi32.GetLengthSidGetPrivateObjectSecurityadvapi32.GetPrivateObjectSecurityGetSecurityDescriptorControladvapi32.GetSecurityDescriptorControlGetSecurityDescriptorDacladvapi32.GetSecurityDescriptorDaclGetSecurityDescriptorGroupadvapi32.GetSecurityDescriptorGroupGetSecurityDescriptorLengthadvapi32.GetSecurityDescriptorLengthGetSecurityDescriptorOwneradvapi32.GetSecurityDescriptorOwnerGetSecurityDescriptorRMControladvapi32.GetSecurityDescriptorRMControlGetSecurityDescriptorSacladvapi32.GetSecurityDescriptorSaclGetSidIdentifierAuthorityadvapi32.GetSidIdentifierAuthorityGetSidLengthRequiredadvapi32.GetSidLengthRequiredGetSidSubAuthorityadvapi32.GetSidSubAuthorityGetSidSubAuthorityCountadvapi32.GetSidSubAuthorityCountGetTokenInformationadvapi32.GetTokenInformationGetWindowsAccountDomainSidadvapi32.GetWindowsAccountDomainSidImpersonateAnonymousTokenadvapi32.ImpersonateAnonymousTokenImpersonateLoggedOnUseradvapi32.ImpersonateLoggedOnUserImpersonateSelfadvapi32.ImpersonateSelfInitializeAcladvapi32.InitializeAclInitializeSecurityDescriptoradvapi32.InitializeSecurityDescriptorInitializeSidadvapi32.InitializeSidIsTokenRestrictedadvapi32.IsTokenRestrictedIsValidAcladvapi32.IsValidAclIsValidRelativeSecurityDescriptoradvapi32.IsValidRelativeSecurityDescriptorIsValidSecurityDescriptoradvapi32.IsValidSecurityDescriptorIsValidSidadvapi32.IsValidSidIsWellKnownSidadvapi32.IsWellKnownSidMakeAbsoluteSDadvapi32.MakeAbsoluteSDMakeAbsoluteSD2advapi32.MakeAbsoluteSD2MakeSelfRelativeSDadvapi32.MakeSelfRelativeSDMapGenericMaskadvapi32.MapGenericMaskObjectCloseAuditAlarmWadvapi32.ObjectCloseAuditAlarmWObjectDeleteAuditAlarmWadvapi32.ObjectDeleteAuditAlarmWObjectOpenAuditAlarmWadvapi32.ObjectOpenAuditAlarmWObjectPrivilegeAuditAlarmWadvapi32.ObjectPrivilegeAuditAlarmWPrivilegeCheckadvapi32.PrivilegeCheckPrivilegedServiceAuditAlarmWadvapi32.PrivilegedServiceAuditAlarmWQuerySecurityAccessMaskadvapi32.QuerySecurityAccessMaskRevertToSelfadvapi32.RevertToSelfSetAclInformationadvapi32.SetAclInformationSetFileSecurityWadvapi32.SetFileSecurityWSetKernelObjectSecurityadvapi32.SetKernelObjectSecuritySetPrivateObjectSecurityadvapi32.SetPrivateObjectSecuritySetPrivateObjectSecurityExadvapi32.SetPrivateObjectSecurityExSetSecurityAccessMaskadvapi32.SetSecurityAccessMaskSetSecurityDescriptorControladvapi32.SetSecurityDescriptorControlSetSecurityDescriptorDacladvapi32.SetSecurityDescriptorDaclSetSecurityDescriptorGroupadvapi32.SetSecurityDescriptorGroupSetSecurityDescriptorOwneradvapi32.SetSecurityDescriptorOwnerSetSecurityDescriptorRMControladvapi32.SetSecurityDescriptorRMControlSetSecurityDescriptorSacladvapi32.SetSecurityDescriptorSaclSetTokenInformationadvapi32.SetTokenInformationRSDSi�� ��˧�鑣�鉩api-ms-win-security-base-l1-1-0.pdb`.rdata`L.edata�(�.rdata$zzzdbg0`.rsrc$01`0�.rsrc$02 i�� ��˧�鑣�鉩T���KW�wu�c�`�6�0�	H`0�|4VS_VERSION_INFO��
aJ
aJ?�StringFileInfo�040904B0LCompanyNameMicrosoft CorporationHFileDescriptionApiSet Stub DLLh$FileVersion10.0.19041.1 (WinBuild.160101.0800)6InternalNameapisetstub�.LegalCopyright� Microsoft Corporation. All rights reserved.>OriginalFilenameapisetstubj%ProductNameMicrosoft� Windows� Operating System>
ProductVersion10.0.19041.1DVarFileInfo$Translation	�"0�!�	*�H��
��!�0�!�10
	`�He0\
+�7�N0L0
+�70	���010
	`�He �-��6�8.��:GOK>�Ŝ��G3�t�fࠂ
�0�0��32A�Y�m�M�20
	*�H��
0��10	UUS10U
Washington10URedmond10U
Microsoft Corporation1.0,U%Microsoft Windows Production PCA 20110
190502212436Z
200502212436Z0p10	UUS10U
Washington10URedmond10U
Microsoft Corporation10UMicrosoft Windows0�"0
	*�H��
�0�
��c[v��P( �\��
f�A��u?�`��S9�dɞ�)�K�G���ʢ���I;��W���]~e����.�}bgk#!F���-��I��O��|u� nR�a�j���7�G7t�ƾ׃�$�\��;���.��y��v�d�\CHx�NMD6���[���>l��ʴ�A,T�4ų���ФT`7;��[�E������X�p)�T�ľ4�0P��:Iǵzr �j��֓�HA1o7w�k�����0�~0U%0
+�7
+0U���M���3��ھ���ŻZ0TUM0K�I0G1-0+U$Microsoft Ireland Operations Limited10U
229879+4541120U#0��)9�ėx͐��O��|U�S0TUM0K0I�G�E�Chttp://www.microsoft.com/pkiops/crl/MicWinProPCA2011_2011-10-19.crl0a+U0S0Q+0�Ehttp://www.microsoft.com/pkiops/certs/MicWinProPCA2011_2011-10-19.crt0U�00
	*�H��
�����&�*0i�:X|�
�p���TroW�y�@c�}�
(�{4�7 �1]֐�R��	޿�I�V��@r�k8�9�^�z'�>��,�����н�/¡��ɉ��h�0ӮE,[�����^xLD���E�6������F�$GVޏ�޾?=�^,?2+�!�R�#��L+x`r�9Lԭ����]���w�f�	�R�+�b��fD��h���0'����fF+;�"F	�WqЗZe�D�n!w�0��0���
avV0
	*�H��
0��10	UUS10U
Washington10URedmond10U
Microsoft Corporation1200U)Microsoft Root Certificate Authority 20100
111019184142Z
261019185142Z0��10	UUS10U
Washington10URedmond10U
Microsoft Corporation1.0,U%Microsoft Windows Production PCA 20110�"0
	*�H��
�0�
�����.	����i�!�i33��T����� ��ҋ�8����-|by��J?5 p���k�6u�1ݍp��7�tF�([�`#,��G�g�Q'�r��ɹ;S5|���'�����#	o�F��n�<A�ˣ?]jM�i%(\6��C
��������['�'x0�[*	k"�S`,�hS��I�a��h	sD]}�T+�y��5]l+\μ�#�on�&�6�O�'��2;A�,���w�TN�\�e�C���mw�Z$�H��C0�?0	+�70U�)9�ėx͐��O��|U�S0	+�7
SubCA0U�0U�0�0U#0��Vˏ�\bh�=��[�Κ�0VUO0M0K�I�G�Ehttp://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl0Z+N0L0J+0�>http://www.microsoft.com/pki/certs/MicRooCerAut_2010-06-23.crt0
	*�H��
��|qQ�y�n��9>�<Rn+?s��h�H�4M��&�1F�ay�8.Ek��(�����	��L
6fj���������@26v�Zƿ���Ӭ�h�b��TlP0X��|���N���|�sW�R!s4Z�V��	����~�����?�rS��c��=1e�������=����BА�_T���G�o�sNA�@�_�*��s�!(���s9_>�\`����	���Q�fG���=�*hw��Lb{��Ǻz�4Kbz����J7�-�W|�=ܸZ��ij�:��n�i!7ށ�ugӓW^)9��-���Es[���z��FX�^���g�l5��?$�5�
u�V��x,��Ј���ߺ~,c��#!�xl�X6+�̤��-����@�E�Ί\k>��p*
j�_G��c
2��6*pZ�BYqKW�~���!<��Ź���E��� ����ŕ�]b֠c �uw}=�E�����W�o3��w�bY~1��0��0��0��10	UUS10U
Washington10URedmond10U
Microsoft Corporation1.0,U%Microsoft Windows Production PCA 201132A�Y�m�M�20
	`�He��0	*�H��
	1
+�70
+�710
+�70/	*�H��
	1" *J=��+�gNQp�d�I�\��Ukh7E�!�0<
+�7
1.,ZFVjG5qgNGC7mZjdz9u/qQORnoMWoQzlfM9DaD1QOl8=0Z
+�71L0J�$�"Microsoft Windows�"� http://www.microsoft.com/windows0
	*�H��
����}�nu�a��J���'C��&�B�F`&?�N��5�ȧYY���Ϡ#�M��1�9��m�^�5�vk�BH�~��)��OKV�<��́
�
��7�Sf(�bps���mROf[h'6#�ģ�BLMX�¶
;>z����]��N8%�.����C��1�A��cV�pkb�#�g���ڗ�AYK��=@��=2�Kc����n�|bSt�-o�CßF��U,C������e
�]NS�ҡ��0��
+�71��0��	*�H��
���0��10
	`�He0�X*�H��
	��G�C0�?
+�Y
010
	`�He ��J��۟�Q�7�ٟ��ZK����\�P��'�7�]�Wo20191207005706.735Z0��Ԥ��0��10	UUS10U
Washington10URedmond10U
Microsoft Corporation1)0'U Microsoft Operations Puerto Rico1&0$UThales TSS ESN:BBEC-30CA-2DBE1%0#UMicrosoft Time-Stamp Service��0��0�ݠ3�/�k�k��0
	*�H��
0|10	UUS10U
Washington10URedmond10U
Microsoft Corporation1&0$UMicrosoft Time-Stamp PCA 20100
190906204109Z
201204204109Z0��10	UUS10U
Washington10URedmond10U
Microsoft Corporation1)0'U Microsoft Operations Puerto Rico1&0$UThales TSS ESN:BBEC-30CA-2DBE1%0#UMicrosoft Time-Stamp Service0�"0
	*�H��
�0�
���-�-��b+\k¯�r�H14�$d��V!?����-����|�[*��'f��u�1�_��8�7?�Ȇ��Y�c�0J�OE��G*��D�Q���w-� ���߬UW�	���J�����oL���K�~��R��,L]nRb��݋��d�y�>9>\.d���p�t@Ƃ����?���2����I�ٓ�.Gd��tS&�-�%R��F�;�%���[�̌?CŶјWt��n�nd��[*�5���0�0U���߱|V|����6r0@W�0U#0��c:\�1��C{|F�3hZ�mU0VUO0M0K�I�G�Ehttp://crl.microsoft.com/pki/crl/products/MicTimStaPCA_2010-07-01.crl0Z+N0L0J+0�>http://www.microsoft.com/pki/certs/MicTimStaPCA_2010-07-01.crt0U�00U%0
+0
	*�H��
��	�BX�n�J̀y�-aա�w��?�Q �S��ާ��q��v�-i�h��~���p��}���*Nߩqw�f&YC�t��$1�JD�#v��O�*pUՎ�l��=�5	3�H�'�3~�<k�"�I�	8o6_bwJ <R3	�����s���������^;���V����p�$ƈ�${&�`*6YN�X�^`�pV���e�2KwvC�ˁW\����rk�EM�&���
��6���م;��
8���e+�0�q0�Y�
a	�*0
	*�H��
0��10	UUS10U
Washington10URedmond10U
Microsoft Corporation1200U)Microsoft Root Certificate Authority 20100
100701213655Z
250701214655Z0|10	UUS10U
Washington10URedmond10U
Microsoft Corporation1&0$UMicrosoft Time-Stamp PCA 20100�"0
	*�H��
�0�
��
�w�: ����i�ktTե
����|hK,_���a�v�>f+[�S'1A��	�|a0Y�0D�`��TC�M�8�Bݓ��s0W&��E
��G�Ϳ$`2X`F�XG�2�tag�_�T�ϓL��Ħ]�an(������a�F�'$gr!��Kd�Pb�]�w=�Wu���BM@Q��>g�f��D~��K�n�ʱ��z*
1��N���5�x���<�/D����d��� 	�x����D]^�O"M���0��0	+�70U�c:\�1��C{|F�3hZ�mU0	+�7
SubCA0U�0U�0�0U#0��Vˏ�\bh�=��[�Κ�0VUO0M0K�I�G�Ehttp://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl0Z+N0L0J+0�>http://www.microsoft.com/pki/certs/MicRooCerAut_2010-06-23.crt0��U ���0��0��	+�7.0��0=+1http://www.microsoft.com/PKI/docs/CPS/default.htm0@+042 Legal_Policy_Statement. 0
	*�H��
��Q
���?�q=���!o���1����Wm0���f�j���x�Ǩ�%��kTW+Q�D��S���`�v�@@A��\�\�^5�$VKt�Bȯ���7}Z?�yJ�R�8�/y�e٩�k����zoK0D$"<�����Y)����p�2J'�U�/���3�b_��W@��Ιf���jb��J�&�9�Jqc�{!mÜ��<�}�j�x�m���8ؔ�ƥ
������B�����"8 �%�d��~cY%z.9Wv�q����a�˚�G����ͧ��}���;q	�]t�"aڰPo�����1��:�eGx�H���r~akow��˧	�9����؂�r�����*T9�[��
U�z�s;�-��3.)��/T'!�ȬN�(���ۖ��B���AM�*��f0ӻt2K�c{���/�!�Y���D<�Pqס��U�i�W���0����M�
�]O�8/��X.�
�P5��	'ճ~5��6��_��t�I���0��0����Ԥ��0��10	UUS10U
Washington10URedmond10U
Microsoft Corporation1)0'U Microsoft Operations Puerto Rico1&0$UThales TSS ESN:BBEC-30CA-2DBE1%0#UMicrosoft Time-Stamp Service�%
0	+6�5h�6L�{���:�:w���0�ۤ��0��10	UUS10U
Washington10URedmond10U
Microsoft Corporation1)0'U Microsoft Operations Puerto Rico1'0%UnCipher NTS ESN:4DE9-0C5E-3E091+0)U"Microsoft Time Source Master Clock0
	*�H��
ᔠ40"20191206173900Z20191207173900Z0t0:
+�Y
1,0*0
ᔠ40%j0Y0
��06
+�Y
1(0&0
+�Y
�
0�`�
0� 0
	*�H��
����-l̽�
�L`�hbqF��#e�%����B�e"[x�НߘW�Œ�6p:�l��*����HZ}2\c�%~�|U�n�
5�;ݘ���o}�2��,�O(	)����%�M��rS��#ى�wC��;Ȥo�`s\����6�_��r�h����e�<cM��g��)u���yw"�׌_�IfW�T?,�洳#��l��MT��>�Ad�r�������H`X��q��S ���<_��8�|=�G'1��0��0��0|10	UUS10U
Washington10URedmond10U
Microsoft Corporation1&0$UMicrosoft Time-Stamp PCA 20103�/�k�k��0
	`�He��20	*�H��
	1
*�H��
	0/	*�H��
	1" œ
i�u2������x���Yq��|SQ,��/0��*�H��
	1��0��0��0��6�5h�6L�{���:�:w0��0���~0|10	UUS10U
Washington10URedmond10U
Microsoft Corporation1&0$UMicrosoft Time-Stamp PCA 20103�/�k�k��0��;��"�V.������m0
	*�H��
�&s��7���!�#���LCsU���?�K_��l�=��rP(�.sWۿ}P��5���8��M±�I���7��kdp0v�a?��	���/'��-ٺ��\���J��`	"�g���Hȯ��f��n�_�K�С܃��[�Q��_’DQ����<j�&��n��&��W	���?
'bm_�=2�e�[� C�����Ra��H�@�3@�:�J�E�9<pSI5,y�9nV�yL��H�L�o|b��˨m�6L