Hacked By AnonymousFox

Current Path : C:/Windows/Microsoft.NET/Framework64/v2.0.50727/1033/
Upload File :
Current File : C:/Windows/Microsoft.NET/Framework64/v2.0.50727/1033/CvtResUI.dll

MZ@	!L!This program cannot be run in DOS mode.

$-TٽL:L:L:FL:BL:RichL:PEd1bj["  *@
.rsrc
@@ `ExF9	 	0	@	P	`	p	$hl4VS_VERSION_INFOR%'R%'?pStringFileInfoL040904B0LCompanyNameMicrosoft CorporationTFileDescriptionMicrosoft Resource File To COFF Object Conversion Utility Errors/Warnings/Messagesp(FileVersion8.00.50727.9554 (WinRelRS5.050727-9000):
InternalNameCVTRESUI.DLL/LegalCopyright Microsoft Corporation.  All rights reserved.B
OriginalFilenameCVTRESUI.DLL^ProductNameMicrosoft Visual Studio 2005DProductVersion8.00.50727.9554DVarFileInfo$Translation	6duplicate resource.  type:%s, name:%s, language:0x%04Xcannot open '%s' for reading out of memory; %u bytes requiredcannot read filecannot get location in filecannot seek in filecannot write to file'%s' is corruptcannot open %s for writing!target machine "%s" requires "%s"3resource type or name string exceeds limit of 65535&machine type not specified; assumed %sHadding resource. type:%s, name:%s, language:0x%04X, flags:0x%X, size:%u
 converting %dbpp %s to %dbpp %s
CVTRES : fatal error CVT%04d:%cCVTRES : warning CVT%04d:%c>Microsoft (R) Windows Resource To Object Converter Version %s
;Copyright (C) Microsoft Corporation.  All rights reserved.
!usage: CVTRES [options] [files]


   options:

      /DEFINE:symbol
1      /MACHINE:{ARM|EBC|IA64|IPS|MIPS16|MIPSFPU|
-                MIPSFPU16|SH4|THUMB|X64|X86}
      /NOLOGO
      /OUT:filename
      /READONLY
      /VERBOSE
'      /WINDOWSCE[:{CONVERT|EMULATION}]
0u	*H
f0b10	+0L
+7>0<0
+70	0!0	+##<}?UZO+q003}mk&G0
	*H
0w10	UUS10U
Washington10URedmond10U
Microsoft Corporation1!0UMicrosoft Time-Stamp PCA0
160907175844Z
180907175844Z010	UUS10U
Washington10URedmond10U
Microsoft Corporation1
0UMOPR1'0%UnCipher DSE ESN:B8EC-30A4-71441%0#UMicrosoft Time-Stamp Service0"0
	*H
0
|3>ڰ{,I*,lLЎNxqDK#f7D8I);Un gs")n}&HטH`guǻ1k81jptJOu?ySḼ5~mCL`YjpSo{:Ȅnʁ*qw̒^x7+;,=7n@ceKa
άdb
-b%уKo+Un	W	00U 4vtM^|0U#0#4RFp
@v+50TUM0K0IGEChttp://crl.microsoft.com/pki/crl/products/MicrosoftTimeStampPCA.crl0X+L0J0H+0<http://www.microsoft.com/pki/certs/MicrosoftTimeStampPCA.crt0U%0
+0
	*H
IZhQ4[]VaMN넅U Tyd!*uDs(fFr 3'9
uw*a)x$Ч3k*l%pΛc*r}fިϘF)j7{r$љil?nfȌ3
ɍeC&X\a0c.5w2Qx5w.3g;LM:G'#P'e{>iұIl$++C~;GѷE+#A00à3Te_0
	*H
0y10	UUS10U
Washington10URedmond10U
Microsoft Corporation1#0!UMicrosoft Code Signing PCA0
180712201119Z
190726201119Z0t10	UUS10U
Washington10URedmond10U
Microsoft Corporation10UMicrosoft Corporation0"0
	*H
0
RO,S=]#JW-֊_Fxk !>%r:xcf._ۗUL>iI-c~åӿ9!0f6oޫh(i&Sxo106+0@YHFQJ-tUDz$}3#_)m2Zj'ϰz}"ZKӄcWkIx:T?%^ǡ
"[/(Uzӏv*_0[0U%0
+0UDw>Uq>s0PUI0GE0C1)0'U Microsoft Operations Puerto Rico10U
229803+4379500U#0ҴX7.3L
0VUO0M0KIGEhttp://crl.microsoft.com/pki/crl/products/MicCodSigPCA_08-31-2010.crl0Z+N0L0J+0>http://www.microsoft.com/pki/certs/MicCodSigPCA_08-31-2010.crt0
	*H
3š{^줦(]W%#%	ipMi/ٛYhd4ckv{BtE3]FICqxӞەA14p,Cw/=aJcY}R`E?P~BXA8I0O)/;GY7!f/-mku!2ZE?VQ̮}0H&
(D-ԇIWM4#
Í2	5(Ј?0p00
a3&10
	*H
0_10
	&,dcom10
	&,d	microsoft1-0+U$Microsoft Root Certificate Authority0
100831221932Z
200831222932Z0y10	UUS10U
Washington10URedmond10U
Microsoft Corporation1#0!UMicrosoft Code Signing PCA0"0
	*H
0
rY\0d`  BvSl>ok:t/2BN#r5W
ʮ IhMKyKqG%ߝuϪsDׁ6\Eܯ=(hrsV5rv_wE8s[gRi/t)v/T0Yҍb_F1P'@0r)("7N=2=͡8\NV(*2KOc-bE=F[&SzJF7<8w\V<	_^0Z0U00UҴX7.3L
0U0	+70#	+71N&`;1o<-0	+7
SubCA0U#0`@V'%*
SY0PUI0G0ECA?http://crl.microsoft.com/pki/crl/products/microsoftrootcert.crl0T+H0F0D+08http://www.microsoft.com/pki/certs/MicrosoftRootCert.crt0
	*H
Y9>&Fo@2j/nI_uL;-C-1#|P!]=/LVpyIr>Ai˥ -PV-JҼp
VชKWB4<VS#*NNҏr*qmSg"\͢'ycVDQXVݛED/_ڮԂ2ni穢,+e&	e8zJVx\5_ݓI-4D]5[!Θ	OmN=|)HrlpWW}HZϣg
t6-/r7o<gR3edoFy,
'@F`Ge`@NBNvy
4	m1TGdP.|!zA'iÓɍ؛!
\𢮆hj-vk{$jG1/q=~bGΈɸr=@ji7P=00
ah40
	*H
0_10
	&,dcom10
	&,d	microsoft1-0+U$Microsoft Root Certificate Authority0
070403125309Z
210403130309Z0w10	UUS10U
Washington10URedmond10U
Microsoft Corporation1!0UMicrosoft Time-Stamp PCA0"0
	*H
0
lH*|k.řQ#PN$ѧLt0 TIB\0&k{3$g,{N#SʍE	^аBlg(FS(F.'OUR,j0nY0~֗!~SmREHJGf')fJG	UxP0F#F-TxA1w̛;a
"KT 00U00U#4RFp
@v+50U0	+70U#0`@V'%*
SY䤡ca0_10
	&,dcom10
	&,d	microsoft1-0+U$Microsoft Root Certificate AuthorityyJLsX.e0PUI0G0ECA?http://crl.microsoft.com/pki/crl/products/microsoftrootcert.crl0T+H0F0D+08http://www.microsoft.com/pki/certs/MicrosoftRootCert.crt0U%0
+0
	*H
\D6鴭wyQM.tq[mξ{.mbWN Pz@WXx;⾏
ȍHSOjՀ/*$"px.
pNk
r9g-Qb\? ?21Jv1=+rp=

a׸N5+^}B{Sr!0ʻxe\[
<fX-/QVpl9Lyzb))4wb=m,C}㤨t5Nq#&v<RqZFCMgȟBy!0fB^Ȟ"!C+H,2L&*H$_ZVޙ:o'tv!'Tj=vanGo2lQȌ#fd=-Y!嵰cxTA.Pxuْu"/2n[%!OɚIeo}in꧗1)[\M/?.Uk1000y10	UUS10U
Washington10URedmond10U
Microsoft Corporation1#0!UMicrosoft Code Signing PCA3Te_0	+0	*H
	1
+70
+710
+70#	*H
	1,gmVn(0D
+71604cvtresui.dllhttp://microsoft.com0
	*H
Nc?=ƛ,wkJ}z;B<Db%jQA4W9b(ݹbm.լ"n]GA@U6HbV}1s%E9в:ԇRFvYӦ:~vs@`Iut}M a
ع^N3^5 Ɠp1%)ˡQ6zNAÐN2iAeՃ#>&%KDVe#h(0$	*H
	1000w10	UUS10U
Washington10URedmond10U
Microsoft Corporation1!0UMicrosoft Time-Stamp PCA3}mk&G0	+]0	*H
	1	*H
0	*H
	1
180808051333Z0#	*H
	1ttGŸkp>bV0
	*H
Gr℮ZH.3.UlvF+E/k=nxסחPG]9}Ps񓬐E'8f5GMB$8?7x{{zJWJKe$U[ԎY7W60\RĶY~#UZ#<ToRDN-/@}
 /4śaOw:.q~}`ֵ2)a*JZ

Hacked By AnonymousFox1.0, Coded By AnonymousFox