Sample details: bcab712c0e8e4d60b4caa3bc2e760efa --

Hashes
MD5: bcab712c0e8e4d60b4caa3bc2e760efa
SHA1: a9f11b2c63ab19d5adaefa683c0e85befeb19238
SHA256: 0652c6097aa8c2caf51ade345f85e459001ea39e9ddae6d93f7453c3a6c49757
SSDEEP: 6144:5PWeSORYdgUOyx4Ry5RFbkIAqdLVkTbqx6mU:5wOwgqxZ5kIHdxO26r
Details
File Type: PE32+
Yara Hits
YRP/Microsoft_Visual_Cpp_80 | YRP/Microsoft_Visual_Cpp_80_DLL | YRP/IsPE64 | YRP/IsConsole | YRP/HasOverlay | YRP/HasDebugData | YRP/HasRichSignature | YRP/domain | YRP/IP | YRP/url | YRP/contentis_base64 | YRP/Misc_Suspicious_Strings | YRP/DebuggerCheck__QueryInfo | YRP/DebuggerException__SetConsoleCtrl | YRP/disable_dep | YRP/win_mutex |
Strings
		!This program cannot be run in DOS mode.
`.rdata
@.data
.pdata
@.didat
@.reloc
UVWATAUAVAWH
fF9,su
fD9,ku
@A_A^A]A\_^]
UWATAVAWH
fE9$@u
A_A^A\_]
\$ UVWATAUAVAWH
`A_A^A]A\_^]
UVWATAUAVAWH
u"8^!u
A_A^A]A\_^]
x ATAVAWH
fD9 tE
 A_A^A\
C@	p8H
@USVWATAUH
fC94wu
fD9$Cu
A]A\_^[]
UVWATAUAVAWH
A_A^A]A\_^]
WAUAVH
WAVAWH
 A_A^_
UVWATAWI
A_A\_^]
t$ WATAUAVAWH
fD9$yu
fF9$xu
A_A^A]A\_
USVWATAUAVAWH
A_A^A]A\_^[]
t\HcL$xH
\$ UVWAVAWH
pA_A^_^]
f9(t	H
f9(t	H
f9(t	H
fD90t	H
f90t	H
fD90t	H
fD90t	H
f90t	H
f9(t?H
|$ AVH
 v5f98
@SUVWATAUAVAWH
|$4fE99
l$@D8=
fG9,~u
4FfE9>
A_A^A]A\_^][
UAVAWH
@A_A^]
UVWATAUAVAWH
A_A^A]A\_^]
t$ UWAVH
SUVWATAUAVAWH
A_A^A]A\_^][
@USVWATAUAVAWH
fD9$Fu
A_A^A]A\_^[]
x ATAVAWH
 A_A^A\
fA9,Hu
f9lQ,u
WAVAWH
 A_A^_
AUAVAWH
0A_A^A]
0A_A^A]
0A_A^A]
fF9,Pu
<GHcD$PH
HcD$PH
SVWATAUAVAWH
+D$XHc
A_A^A]A\_^[
8:uCH9-?
@USVWH
u?Hc|$ H
f99uiH
L$8f99u_+
f9(u$H
t$ WATAUAVAWH
fD9$xu
A_A^A]A\_
x	9\$P
WATAUAVAWH
fE9&t_E
fE9$nu
 A_A^A]A\_
UWATAVAWH
A_A^A\_]
@USVWATAUAVAWH
fG9,tu
fD9,{u
fD9,Cu
Hc|$ H
A_A^A]A\_^[]
WAVAWH
 A_A^_
WATAUAVAWH
|$[fD9?
u+fD9o
A_A^A]A\_
UVWATAUAVAWH
fD94Gu
A_A^A]A\_^]
UVWATAUAVAWH
fD9<Gu
@A_A^A]A\_^]
x ATAVAWH
fD9$Zu
fD9 tcH
fD9$Cu
 A_A^A\
@USVWATAUAVAWH
A_A^A]A\_^[]
UWATAVAWH
A_A^A\_]
|$ AVH
t$ WAVAWH
fB9<su
WATAUAVAWH
H!|$`I
A_A^A]A\_
@SUVWAVH
0A^_^][
|$ ATAVAWH
fD9$Cu
fD9$xu
A_A^A\
fE9<nu
fD9<{u
t$PD9=
fD9<Cu
VWATAVAWH
pA_A^A\_^
D$@H9t$@
f90t+3
s WATAUAVAWH
fD9$Su
fD9$Bu
A_A^A]A\_
UVATAUAVH
A^A]A\^]
UVWATAUAVAWH
A_A^A]A\_^]
@SVAUH
|$ AVH
UVATAVAWH
fD99t~D9=p
 A_A^A\^]
|$ AVH
UVWATAUAVAWH
!u~f90
0A_A^A]A\_^]
UVWATAUAVAWH
fE9$Ou
fE9$Gu
 A_A^A]A\_^]
CHcD$pH
HcD$pE3
UVWATAUAVAWH
0A_A^A]A\_^]
f90t/3
t$ WATAVH
 A^A\_
WATAUAVAWH
A_A^A]A\_
UVWATAUAVAWH
A_A^A]A\_^]
x ATAVAWH
 A_A^A\
\$ UVWATAUAVAWH
fD9<xu
fD9<Wu
fB9<ku
A_A^A]A\_^]
D9D$0u
@USVWATAUAVAWH
A_A^A]A\_^[]
H+|$HH
SVWATAVAWH
\$x@8=
f98tDA
fA9<@u
A_A^A\_^[
UVWATAUAVAWH
fD9<qu
A_A^A]A\_^]
H!\$ L
x AUAVAWH
@A_A^A]
h UAVAWH
fA9<Vu
fA9<Fu
x UATAUAVAWH
t$PM9&u
A_A^A]A\]
\$ UVWATAUAVAWH
A_A^A]A\_^]
fD9,Gu
fD9,Ou
t$ UWATAVAWH
A_A^A\_]
UVWATAUAVAWH
fD94Gu
@A_A^A]A\_^]
WAVAWH
WAVAWH
WATAUAVAWH
fB94iu
 A_A^A]A\_
UWATAVAWH
fD93u6H;
A_A^A\_]
UVWATAUAVAWH
fA9<Vu
@8|$ t
A_A^A]A\_^]
L$0f9:
F f98t
@USVWATAVAWH
A_A^A\_^[]
UVWATAUAVAWH
A_A^A]A\_^]
WAVAWH
fF9<Au
 A_A^_
x UAVAWH
UVWATAUAVAWH
#L$LA#
G0D9G$v
A_A^A]A\_^]
fD9DF0u
x UATAUAVAWH
A_A^A]A\]
@USVWATAUAVAWH
fB9<xu
D$49|$P
A_A^A]A\_^[]
UVWATAUAVAWH
 A_A^A]A\_^]
@USVWATAUAVAWH
A_A^A]A\_^[]
@USVWATAVAWH
A_A^A\_^[]
VWATAVAWH
@A_A^A\_^
UVWATAUAVAWH
0A_A^A]A\_^]
UVWAVAWH
A_A^_^]
x ATAVAWH
 A_A^A\
u*9Q<|%
LcA<E3
 H3E H3E
SVWAVH
8A^_^[
u$D9d$ 
D$x;D$`
H#D$pt
H#D$pH
D$xfA+
fE9<Du
fD9,Cu
D9|$0u
D9|$0u
fD9d$P
fD9<Hu
u)L9eHt#
fE9$wu
8H9w H
t%H9p H
fD9$su
HcT$0I
fA9<Vu
CxfD90
fD94xu
fD9$Au
fD9$Au
L+D$ H+
fE94Du
fE94Du
f;0u>H
9|$Pt H9
t<fD9{
fD9$Hu
|$z:tA
fD9&t	H
fD9&u	H
tjD9t$xucH
fD9/t	H
fD9/u	H
tGD9t$pu@H
\$dD9L$T
fD9TH,u
fA9,Pu
L$ht"A
fD9$xu
fE9,Ft
p WAVAWH
 A_A^_
UVWAVAWH
D$8H!t$8H
A_A^_^]
D$0fD98t	H
@SUVWAVH
t"D85`!
A^_^][
@SUVWH
D9C(t	H
WATAUAVAWH
A_A^A]A\_
L$ SWH
WAVAWH
0A_A^_
x ATAVAWH
H9{Ps<
 A_A^A\
D$0f90t
L$0f91t
HcL$ HcD$$H
@SUVWH
@USVWATAUAVAWH
Ft:fD9
fD9$Fu
fD9$Fu
fD9$Fu
A_A^A]A\_^[]
|$ UAVAWH
t6fD93t0H
fD94Cu
D$XfD90t
\$ UVWATAUAVAWH
@A_A^A]A\_^]
\$ UVWATAUAVAWH
fD9,_u
fD9,Gu
@A_A^A]A\_^]
Gxf9(u)3
Gxf9(u(3
WATAUAVAWH
fD9$nu
fD9$_u
tOD9%RC
fD9$_u
 A_A^A]A\_
x UATAUAVAWH
fD9(uA3
A_A^A]A\]
f90u H
f90u H
{ ATAVAWH
fE9$Fu
AfD9!u
fD9$Au
@A_A^A\
VWATAVAWH
|$P.uEH
fD9$Fu
fD9$hu
A_A^A\_^
UVWATAUAVAWH
A_A^A]A\_^]
{ ATAVAWH
fE9$Fu
AfD9!u
fD9$Au
@A_A^A\
t$0u?E3
H9L$@r
tgHcL$8L
HcT$8H
tgf9|$Xv`
t&fD92t I
M0H9M`t
WAVAWH
fD9<Gu
@SUVWATH
\$`fD9+t
tgfD9/tafD9lo
A\_^][
x UATAUAVAWH
A_A^A]A\]
t$ UWAUAVAWH
A_A^A]_]
f9|$Vt"
d$ AUAVAWH
A_A^A]
t$ WATAUAVAWH
D$PH9C
 A_A^A]A\_
fD94Qu
L$ USWH
9t$@~ 
UVWATAUAVAWH
d$Ht)D
D;d$@D
A_A^A]A\_^]
x ATAVAWH
@A_A^A\
t$ UWAVH
H!|$ L
@SVWATAUAVAWH
pA_A^A]A\_^[
fD94Gu
fD94su
WATAUAVAWH
4gfE9.
 A_A^A]A\_
fD9>tIH
nfD9;u
@SUVWH
UVWATAUAVAWH
fD9 t&f
A_A^A]A\_^]
\$ UVWH
UVWAVAWH
fF9<Cu
A_A^_^]
t$ UWATAVAWH
u^9\$@u
9\$DtR
A_A^A\_]
UVWAVAWH
A_A^_^]
WATAUAVAWH
A_A^A]A\_
WAVAWH
D9y$ve
fD9|A0u
fD9|A0u
 A_A^_
UVWATAUAVAWH
l$PHcw$H
fF9Dj0u
A_A^A]A\_^]
SVWATAUAVAWH
@A_A^A]A\_^[
WATAUAVAWH
H9t$Xt
A_A^A]A\_
UWATAVAWH
A_A^A\_]
UVWAVAWH
@A_A^_^]
SetConsoleInputExeNameW
IsDebuggerPresent
CopyFileExW
SetThreadUILanguage
bad allocation
ext-ms-win-branding-winbrand-l1-1-0.dll
ext-ms-win-cmd-util-l1-1-0.dll
generic
unknown error
iostream
iostream stream error
system
invalid string position
string too long
no such file or directory
function not supported
no lock available
not enough memory
resource unavailable try again
cross device link
operation canceled
too many files open
permission_denied
address_in_use
address_not_available
address_family_not_supported
connection_already_in_progress
bad_file_descriptor
connection_aborted
connection_refused
connection_reset
destination_address_required
bad_address
host_unreachable
operation_in_progress
interrupted
invalid_argument
already_connected
too_many_files_open
message_size
filename_too_long
network_down
network_reset
network_unreachable
no_buffer_space
no_protocol_option
not_connected
not_a_socket
operation_not_supported
protocol_not_supported
wrong_protocol_type
timed_out
operation_would_block
address family not supported
address in use
address not available
already connected
argument list too long
argument out of domain
bad address
bad file descriptor
bad message
broken pipe
connection aborted
connection already in progress
connection refused
connection reset
destination address required
executable format error
file too large
host unreachable
identifier removed
illegal byte sequence
inappropriate io control operation
invalid seek
is a directory
message size
network down
network reset
network unreachable
no buffer space
no child process
no link
no message available
no message
no protocol option
no stream resources
no such device or address
no such process
not a directory
not a socket
not a stream
not connected
not supported
operation in progress
operation not permitted
operation not supported
operation would block
owner dead
protocol error
protocol not supported
read only file system
resource deadlock would occur
result out of range
state not recoverable
stream timeout
text file busy
timed out
too many files open in system
too many links
too many symbolic link levels
value too large
wrong protocol type
permission denied
file exists
no such device
filename too long
device or resource busy
io error
directory not empty
invalid argument
no space on device
Exception
ReturnHr
FailFast
internal\sdk\inc\wil\ResultMacros.h
internal\sdk\inc\wil\Resource.h
WilError_01
RtlDllShutdownInProgress
CMD Internal Error %s
Null environment
APerformUnaryOperation: '%c'
APerformArithmeticOperation: '%c'
NtQueryInformationProcess
Copyright (c) Microsoft Corporation. All rights reserved.
onecore\base\cmd\maxpathawarestring.cpp
oesZM?
cmd.pdb
.text$di
.text$lp00cmd.exe!20_pri7
.text$lp01cmd.exe!20_pri7
.text$mn
.text$mn$00
.text$x
.text$yd
.text$zy
.text$zz
.rdata$brc
.rdata$00$brc
.idata$5
.00cfg
.CRT$XCA
.CRT$XCAA
.CRT$XCU
.CRT$XCZ
.CRT$XIA
.CRT$XIAA
.CRT$XIY
.CRT$XIZ
.gfids
.giats
.gljmp
.rdata
.rdata$00
.rdata$zz
.rdata$zzzdbg
.xdata
.xdata$x
.didat$2
.didat$3
.didat$4
.didat$6
.didat$7
.idata$2
.idata$3
.idata$4
.idata$6
.data$brc
.data$dk00$brc
.data$r$brc
.data$00
.data$01
.data$pr00
.data$zz
.bss$00
.bss$01
.bss$dk00
.bss$pr00
.bss$zz
.pdata
.didat$5
.rsrc$01
.rsrc$02
BrandingFormatString
CmdBatNotificationStub
SaferWorker
MessageBeepStub
GetVDMCurrentDirectoriesStub
ShellExecuteWorker
DoSHChangeNotify
QueryFullProcessImageNameWStub
WNetGetConnectionWStub
WNetCancelConnection2WStub
WNetAddConnection2WStub
LookupAccountSidWStub
FindFirstStreamWStub
FindNextStreamWStub
_vsnwprintf
memcpy_s
??3@YAXPEAX@Z
__C_specific_handler
longjmp
??_V@YAXPEAX@Z
wcsspn
towupper
_getch
_get_osfhandle
wcstol
_wcsnicmp
_wpopen
ferror
_pclose
memmove
wcschr
iswspace
_wcsicmp
iswdigit
_wcsupr
setlocale
towlower
realloc
wcsrchr
fprintf
printf
_errno
wcstoul
iswalpha
wcsstr
fflush
iswxdigit
_setmode
wcsncmp
_ultoa
swscanf
_open_osfhandle
_close
_wcslwr
calloc
_XcptFilter
_amsg_exit
__getmainargs
__set_app_type
_cexit
__setusermatherr
_initterm
_fmode
_commode
msvcrt.dll
_unlock
__dllonexit
_onexit
?terminate@@YAXXZ
__CxxFrameHandler3
RtlCreateUnicodeStringFromAsciiz
NtCancelSynchronousIoFile
RtlNtStatusToDosError
NtQueryInformationProcess
NtSetInformationProcess
NtQueryVolumeInformationFile
NtSetInformationFile
RtlDosPathNameToRelativeNtPathName_U_WithStatus
NtOpenFile
RtlReleaseRelativeName
RtlFreeUnicodeString
RtlFindLeastSignificantBit
RtlDosPathNameToNtPathName_U
NtFsControlFile
RtlFreeHeap
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
ntdll.dll
CopyFileW
api-ms-win-core-kernel32-legacy-l1-1-0.dll
GetModuleFileNameA
CreateSemaphoreExW
HeapFree
SetLastError
ReleaseSemaphore
GetModuleHandleExW
WaitForSingleObject
GetCurrentThreadId
ReleaseMutex
FormatMessageW
GetLastError
OutputDebugStringW
WaitForSingleObjectEx
OpenSemaphoreW
CloseHandle
HeapAlloc
GetProcAddress
CreateMutexExW
GetCurrentProcessId
GetProcessHeap
GetModuleHandleW
DebugBreak
IsDebuggerPresent
VirtualQuery
GetCPInfo
GetConsoleOutputCP
SetThreadLocale
SetFilePointer
GetFullPathNameW
FindFirstFileW
FindNextFileW
FindClose
CreateFileW
ReadFile
MultiByteToWideChar
GetFileSize
WideCharToMultiByte
GetStdHandle
FlushConsoleInputBuffer
RevertToSelf
AcquireSRWLockShared
ReleaseSRWLockShared
GetConsoleScreenBufferInfo
ReadConsoleW
SetConsoleCursorPosition
FillConsoleOutputCharacterW
WriteConsoleW
GetFileType
GetUserDefaultLCID
GetLocaleInfoW
SetLocalTime
GetSystemTime
SystemTimeToFileTime
FileTimeToLocalFileTime
FileTimeToSystemTime
GetDateFormatW
GetTimeFormatW
GetLocalTime
GetConsoleMode
SetConsoleMode
GetEnvironmentVariableW
GetCommandLineW
GetNumaHighestNodeNumber
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
SetEnvironmentStringsW
GetConsoleTitleW
SetErrorMode
InitializeProcThreadAttributeList
UpdateProcThreadAttribute
DeleteProcThreadAttributeList
GetStartupInfoW
CreateProcessAsUserW
CreateProcessW
GetFileAttributesW
NeedCurrentDirectoryForExePathW
RegOpenKeyExW
RegCloseKey
RegQueryValueExW
RegEnumKeyExW
RegDeleteKeyExW
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
LoadLibraryExW
ReadProcessMemory
MoveFileWithProgressW
MoveFileExW
SetConsoleTitleW
LocalFree
SearchPathW
WriteFile
SetFilePointerEx
GlobalAlloc
GlobalFree
GetVolumeInformationW
TryAcquireSRWLockExclusive
ReleaseSRWLockExclusive
ExpandEnvironmentStringsW
InitializeCriticalSection
SetConsoleCtrlHandler
GetWindowsDirectoryW
GetModuleFileNameW
EnterCriticalSection
LeaveCriticalSection
GetVersion
GetDriveTypeW
GetFileAttributesExW
OpenThread
HeapSetInformation
VirtualFree
VirtualAlloc
HeapReAlloc
HeapSize
DuplicateHandle
FlushFileBuffers
GetACP
ScrollConsoleScreenBufferW
FillConsoleOutputAttribute
SetConsoleTextAttribute
CreateDirectoryW
SetFileAttributesW
SetEndOfFile
DeleteFileW
SetFileTime
SetCurrentDirectoryW
TerminateProcess
GetExitCodeProcess
GetCurrentDirectoryW
GetFileInformationByHandleEx
RemoveDirectoryW
CompareFileTime
GetFileSecurityW
GetSecurityDescriptorOwner
DeviceIoControl
GetDiskFreeSpaceExW
FindFirstFileExW
GetThreadGroupAffinity
GetNumaNodeProcessorMaskEx
ResumeThread
GetThreadLocale
GetVolumePathNameW
CreateSymbolicLinkW
CreateHardLinkW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetTickCount
api-ms-win-core-libraryloader-l1-2-0.dll
api-ms-win-core-synch-l1-1-0.dll
api-ms-win-core-heap-l1-1-0.dll
api-ms-win-core-errorhandling-l1-1-0.dll
api-ms-win-core-processthreads-l1-1-0.dll
api-ms-win-core-localization-l1-2-0.dll
api-ms-win-core-debug-l1-1-0.dll
api-ms-win-core-handle-l1-1-0.dll
api-ms-win-core-memory-l1-1-0.dll
api-ms-win-core-console-l1-1-0.dll
api-ms-win-core-file-l1-1-0.dll
api-ms-win-core-string-l1-1-0.dll
api-ms-win-core-processenvironment-l1-1-0.dll
api-ms-win-core-console-l2-1-0.dll
api-ms-win-security-base-l1-1-0.dll
api-ms-win-core-sysinfo-l1-1-0.dll
api-ms-win-core-timezone-l1-1-0.dll
api-ms-win-core-datetime-l1-1-0.dll
api-ms-win-core-systemtopology-l1-1-0.dll
api-ms-win-core-processenvironment-l1-2-0.dll
api-ms-win-core-registry-l1-1-0.dll
api-ms-win-core-file-l2-1-0.dll
api-ms-win-core-heap-l2-1-0.dll
api-ms-win-core-io-l1-1-0.dll
api-ms-win-core-processtopology-l1-1-0.dll
api-ms-win-core-synch-l1-2-0.dll
api-ms-win-core-profile-l1-1-0.dll
lstrcmpiW
lstrcmpW
api-ms-win-core-string-obsolete-l1-1-0.dll
SetProcessAffinityMask
api-ms-win-core-processtopology-obsolete-l1-1-0.dll
ApiSetQueryApiSetPresence
api-ms-win-core-apiquery-l1-1-0.dll
__iob_func
malloc
_callnewh
_purecall
??0exception@@QEAA@AEBQEBD@Z
??0exception@@QEAA@AEBQEBDH@Z
??0exception@@QEAA@AEBV0@@Z
??1exception@@UEAA@XZ
?what@exception@@UEBAPEBDXZ
_CxxThrowException
memcpy
??1type_info@@UEAA@XZ
NtOpenProcessToken
NtQueryInformationToken
NtClose
NtOpenThreadToken
ResolveDelayLoadedAPI
DelayLoadFailureHook
api-ms-win-core-delayload-l1-1-1.dll
api-ms-win-core-delayload-l1-1-0.dll
_local_unwind
_setjmp
memcmp
memset
wcscmp
.?AVbad_alloc@std@@
.?AVexception@@
.?AVlogic_error@std@@
.?AVlength_error@std@@
.?AVout_of_range@std@@
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<!-- Copyright (c) Microsoft Corporation -->
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<assemblyIdentity
    version="5.1.0.0"
    processorArchitecture="amd64"
    name="Microsoft.Windows.FileSystem.CMD"
    type="win32"
<description>Windows Command Processor</description>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v3">
    <security>
        <requestedPrivileges>
            <requestedExecutionLevel
                level="asInvoker"
                uiAccess="false"
            />
        </requestedPrivileges>
    </security>
</trustInfo>
<application  xmlns="urn:schemas-microsoft-com:asm.v3">
    <windowsSettings>
        <dpiAware  xmlns="http://schemas.microsoft.com/SMI/2005/WindowsSettings">true</dpiAware>
    </windowsSettings>
    <windowsSettings xmlns:ws2="http://schemas.microsoft.com/SMI/2016/WindowsSettings">
        <ws2:longPathAware>true</ws2:longPathAware>
    </windowsSettings>
</application>
</assembly>
wwwwwwwwwwwwwwwwwwwww
Se%ae`
cCBR_p
RRRRP%
CCCC@40`P@ 
cG?CCRRRRP`R
4qaCCRCCCB
pqacG%%apppppppaB
prRRRPa
wwwwwwwwwwwwwwwwwwwww
wwwwwwwwwwwwwww
se%%%%% R
u%6RRRRRPp
wwwwwwwwwwwwwww
wwwwwwwwp
wwwwwwww
((((&&(&&&(&(&&&&&&(((#&&###
*)))))))))))))))))))))
eIDATx
 """"""""""""""""""""""""""""""""""""""""
'Px0&D
XXX8Pvh8v
],//cuu
`ii	+++<
n<DSbb
`ii	7o
!KD4)#
NDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD
-v%;/PO
Washington1
Redmond1
Microsoft Corporation1.0,
%Microsoft Windows Production PCA 20110
171022050530Z
181021070000Z0p1
Washington1
Redmond1
Microsoft Corporation1
Microsoft Windows0
vts&h/
Epi^kp
}w_,*crOT
AOC1402
+229879+719555cb-6de2-446c-acba-d90894acd8720
bY['1F,|
Washington1
Redmond1
Microsoft Corporation1200
)Microsoft Root Certificate Authority 20100
171022050530Z
321021071000Z0
Washington1
Redmond1
Microsoft Corporation1.0,
%Microsoft Windows Production PCA 20110
N'Lx#_
 g@^!9)
Washington1
Redmond1
Microsoft Corporation1200
)Microsoft Root Certificate Authority 20100
171022050529Z
421021070637Z0
Washington1
Redmond1
Microsoft Corporation1200
)Microsoft Root Certificate Authority 20100
N'Lx#_
DigiCert Inc1
www.digicert.com1!0
DigiCert Assured ID CA-10
141022000000Z
241022000000Z0G1
DigiCert1%0#
DigiCert Timestamp Responder0
https://www.digicert.com/CPS0
2http://crl3.digicert.com/DigiCertAssuredIDCA-1.crl08
2http://crl4.digicert.com/DigiCertAssuredIDCA-1.crl0w
http://ocsp.digicert.com0A
5http://cacerts.digicert.com/DigiCertAssuredIDCA-1.crt0
iW!]4/
DigiCert Inc1
www.digicert.com1$0"
DigiCert Assured ID Root CA0
061110000000Z
211110000000Z0b1
DigiCert Inc1
www.digicert.com1!0
DigiCert Assured ID CA-10
.http://www.digicert.com/ssl-cps-repository.htm0
http://ocsp.digicert.com0C
7http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
4http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0:
4http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0
Washington1
Redmond1
Microsoft Corporation1.0,
%Microsoft Windows Production PCA 2011
)q jbm
DigiCert Inc1
www.digicert.com1!0
DigiCert Assured ID CA-1
171022052911Z0#
wXu/P0A