Hacked By AnonymousFox

Current Path : C:/Windows/Microsoft.NET/Framework64/v2.0.50727/
Upload File :
Current File : C:/Windows/Microsoft.NET/Framework64/v2.0.50727/dfsvc.exe

MZ@	!L!This program cannot be run in DOS mode.

$PELdj[
n) @@ D@)W@`(  H.textt	 
 `.rsrc@@@.reloc`@BP)H 	P D)UL6[/!U~JM6pNnXŢX,ohs
,l,ߎv /-؁i&)kZs0>~\x}
L"(
*BSJBv2.0.50727` #~H#Strings#GUID#BlobG	3
VObAg%<OqRKbO
) ]
!)19AIQYaiqy$= .K[..).#/.+:.3G.;G..S.[.c.k.s.{)...)F<Module>dfsvc.exeEntryPointSystem.Deployment.Application.InternalmscorlibSystemObjectMainSystem.Runtime.CompilerServicesRuntimeCompatibilityAttribute.ctorSystem.ReflectionAssemblyKeyFileAttributeAssemblyDelaySignAttributeSystem.ResourcesNeutralResourcesLanguageAttributeSatelliteContractVersionAttributeAssemblyInformationalVersionAttributeAssemblyFileVersionAttributeAssemblyVersionAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDefaultAliasAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeCLSCompliantAttributeSystem.Runtime.InteropServicesComVisibleAttributeSystem.DiagnosticsDebuggableAttributeDebuggingModesCompilationRelaxationsAttributedfsvcMTAThreadAttributeargsSystem.DeploymentSystem.Deployment.ApplicationDFServiceEntryPointInitializeaO\IX'>8'(z\V4    M $$RSA1WĮ.
j쏇vlL;ݚ6!r<wwO)2!d\L(]b,e,=t]o-~^Ė=&Ce m4MZғ?_
:TWrapNonExceptionThrows*%f:\dd\Tools\devdiv\FinalPublicKey.snk
en-US2.0.0.02.0.50727.90314/© Microsoft Corporation.  All rights reserved.Microsoft® .NET FrameworkMicrosoft Corporation	dfsvc.exedj["(
RSDSj3UIdfsvc.pdb<)^) P)_CorExeMainmscoree.dll% @ 8Ph		@8D4VS_VERSION_INFOG#'G#'?StringFileInfo040904B0LCompanyNameMicrosoft Corporation<
FileDescriptiondfsvc.exen'FileVersion2.0.50727.9031 (WinRelRS5.050727-9000)4
InternalNamedfsvc.exe/LegalCopyright Microsoft Corporation.  All rights reserved.<
OriginalFilenamedfsvc.exeTProductNameMicrosoft .NET FrameworkBProductVersion2.0.50727.90314CommentsFlavor=RetailDVarFileInfo$Translation	<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"> 
 
 
 
 
 
 
      <trustInfo xmlns="urn:schemas-microsoft-com:asm.v3"> 
        <security> 
          <requestedPrivileges> 
            <requestedExecutionLevel 
              level="asInvoker" 
              uiAccess="false"/> 
          </requestedPrivileges> 
        </security> 
      </trustInfo> 
    </assembly> p9

Hacked By AnonymousFox1.0, Coded By AnonymousFox