Hacked By AnonymousFox

Current Path : C:/Windows/SysWOW64/
Upload File :
Current File : C:/Windows/SysWOW64/TapiUnattend.exe

MZ@	!L!This program cannot be run in DOS mode.

$VttttttttttKttRichtPELV
#0@


ph@ @dP8`4T8@.text `.datap0@.idata@ @@.rsrc8P&@@.reloc4`.@B@0@0@@@p@@|@X@ @@h@0@@@@@	u @P @#@P  ##@##P$&&CopyValueInRegprintscan\tapi\unattend\tapiunattend.cppDTapiUnattend:Error during RegQueryValue for buf size failed: err=%dTapiUnattend:Error during new buffer hr=%lxTapiUnattend:Error during RegQueryValue failed: err=%dTapiUnattend:Error during RegSetValue failed: err=%dwmainTapiUnattend:Error during RegOpenKey Tapi locations failed: err=%dTapiUnattend:There are already some locations (migration ?): discard unattend settingsTapiUnattend:Error during RegOpenKey Unattend locations failed: err=%dTapiUnattend:RegQueryValue for country returned err=%lxTapiUnattend:Unattend country == 0, ignore these settingsTapiUnattend:Error during RegCreateKey Location1 failed: err=%dFailed for value name=%ws hr=%lxTapiUnattend:Error during RegCreateKey AreaCodeRules failed: err=%dTapiUnattend:Error during RegSetValue CurrentId failed: err=%dTapiUnattend:Error during RegSetValue NextID failed: err=%dNextIDInternationalCarrierCodeAreaCodeRulesNameDisableCallWaitingLongDistanceAccessFlagsSoftware\Microsoft\Windows\CurrentVersion\Telephony\LocationsCurrentIDOutsideAccessLocation1AreaCodeSoftware\Microsoft\Windows NT\CurrentVersion\UnattendSettings\TapiUnattendLocationLongDistanceCarrierCodeCountryV)V
00V&RSDSÒ/kH6"TapiUnattend.pdbGCTL.rdata$brc.CRT$XCA.CRT$XCAA.CRT$XCZ.CRT$XIA.CRT$XIAA.CRT$XIY.CRT$XIZ(.gfids .rdata.rdata$sxdata.rdata$zzzdbg(.text$mn8(\.xdata$x0.data0`.bss@.idata$5@.00cfg@P.idata$2@.idata$3A.idata$4A.idata$6P.rsrc$01P.rsrc$02UEPuuX@@]ËUSVWM3ۍMQSMEQSuP@@tQ	SS@@PT@@Ph @h@@jfSh@SWh@hvPP@@ugYu0SS@@PT@@Ph @h@@jmSh@SVh@먍EPSEPjuu@@t>	jj@@PT@@Ph @h@@jujh@jWh@WuSujuu@@tP	jj@@PT@@Ph @h@@j}jh@jWh@@hlPP@@SY_^[]U(SVW3VVjV@@EuPhVh@huuu@@؅tM	VV@@PT@@Phx@h@@hVh@VSh@hpj_EuPE}PEPVh@u@@uL}vFVV@@PT@@Phx@h@@hVh@Vh@h\YYPP@@3GEPhVh@h@@؅t@	VV@@PT@@Phx@h@@hVh@VSh(@EuPE}PEPVh@u@@t>VV@@PT@@Phx@h@@hVh@VWhp@h,9uu0VV@@PT@@Phx@h@@hVh@Vh@EPEPVhVh@Vh@u@@؅t@	VV@@PT@@Phx@h@@hVh@VSh@4@UM;C	rލEPEPVhVh@VhT@u@@؅t@	VV@@PT@@Phx@h@@hVh@VShP@jEEPjVhT@u@@؅t@	VV@@PT@@Phx@h@@hVh@VSh@&E@jEEPjVh@u@@؅	VV@@PT@@Phx@h@@hVh@VSh@VV@@PT@@Phx@h@@hVh@VW4@h(@hRPP@@9utu@@u9utu@@u9utu@@u9ut	u@@y_^[]ËUV
uYtuYt^]>j(0@P@@
\3@
`3@YYx@@
<0@@@
00@=0@uhP$@p@@Y3̡80@h,0@540@,0@h 0@h0@h0@@@$0@jh8(@Y3ۉ]dpd3@3
t;u3FhD@@3F95h3@u
jY:9h3@u,5h3@h@h@YYtE50@95h3@uh@h@YYh3@u	3d3@=l3@t#hl3@YtSjS5l3@@@5 0@50@50@0@=(0@u6P|@@MEQP{YYËeE0@=(0@uPh@@=0@ut@@0@E<ËUVu3;usWu>t
@@׃;ur_^]øMZf9@uU
<@@PEuC@f;tf;u(@v39@Ãt@v
39@3;
0@u%@@%@@%@@̋UE8csmu+xu%@= t=!t="t=@u@@3]h@#@@@@3%@@jhX(@3ɋEtKtFMMZf9u2P<x+s#‰EPE#	3@Ëe3ɉMEUj<@@t PtH\jXf;t
u3@]ËE]%@@3̋UE3SVWH<AYt}p;r	H;r
B(;r3_^[]̋Ujhx(@h&@dPSVW0@1E3PEdeEh@ztTE-@Ph@Pt:@$ЃEMd
Y_^[]ËE3Ɂ8ËeE3Md
Y_^[]̋UMMZf9uA<8PEuf9Hu]3]ËUee0@VWN@;tudEP,@@E3EE4@@1E0@@1E(@@3EM3EEP8@@E3E3E;t50@uO@ȉ
0@_0@^]hh`@@YY%l@@h&@d5D$l$l$+SVW0@1E3PeuEEEEdËMd
Y__^[]Q̋Uuuuuh#@h0@M]Uj@@@u$@@h	 @@PH@@]ËU$@1@
<1@81@41@501@=,1@fX1@f
L1@f(1@f$1@f% 1@f-1@P1@ED1@EH1@ET1@0@H1@L0@@0@	D0@P0@jXkǀT0@jX
0@T0@jX
0@T0@jXk
0@LjX
0@Lh@]%d@@"@&"@#@#@;%@N%@N@DAAABAB,BZD>D.DDCCCCCCnDNC|CdC&C4CBBBBBBBBB|BnBfBZBPBC&@AB@(ABB@pAC`@`ACP@AAABAB,BZD>D.DDCCCCCCnDNC|CdC&C4CBBBBBBBBB|BnBfBZBPBCRegQueryValueExWRegOpenKeyExWRegSetValueExWdRegCreateKeyExW[RegCloseKeyADVAPI32.dllaGetLastErrorMHeapSetInformationKERNEL32.dllmalloc"_callnewhfreeo_XcptFilter__p__commode_amsg_exit__wgetmainargs__set_app_typeexits_exit$_cexit__p__fmode__setusermatherr_inittermmsvcrt.dll5?terminate@@YAXXZ7_controlfpj_except_handler4_commonWdsSetupLogMessageWEConstructPartialMsgVWFCurrentIPWDSCORE.dll}SleepmSetUnhandledExceptionFilterxGetModuleHandleWMQueryPerformanceCounterGetCurrentProcessIdGetCurrentThreadIdGetSystemTimeAsFileTimeGetTickCountUnhandledExceptionFilterGetCurrentProcessTerminateProcess 8Ph		XSP<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<!-- Copyright (c) Microsoft Corporation -->
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
  <assemblyIdentity
    name="TAPIUNATTEND"
    processorArchitecture="x86"
    type="win32"
    version="1.0.0.0"
    />
  <description>
    Telephony Unattend Action
  </description>
  <trustInfo xmlns="urn:schemas-microsoft-com:asm.v3">
      <security>
          <requestedPrivileges>
              <requestedExecutionLevel
                  level="asInvoker"
                  uiAccess="false"
              />
          </requestedPrivileges>
      </security>
  </trustInfo>
</assembly>
4VS_VERSION_INFO
cE
cE?.StringFileInfo
040904B0LCompanyNameMicrosoft Corporation1FileDescriptionMicrosoft Windows(TM) Telephony Unattend Actionh$FileVersion10.0.17763.1 (WinBuild.160101.0800)<InternalNameTapi Unattend.LegalCopyright Microsoft Corporation. All rights reserved.JOriginalFilenameTapiUnattend.exej%ProductNameMicrosoft Windows Operating System>
ProductVersion10.0.17763.1DVarFileInfo$Translation	000000 0$0(0,000t0x000000!:N:k:r:x:}:::::::::::;!;';,;5;=;T;s;z;;;;;;;;;<<$<)<4<;<h<q<<<<<<<<<<<<=
===9=B=P=W=]=b=m=t===========>>
>>>->\>b>k>>>>>>>>>>>>>	??*?3?T?[?a?f?q?x???????????? 0X0d0j0q0z00000000000000000121=1O1W1\1a11111111111111122-232=2C2L2Q22222222223"3(3.3y333334F444445555555
66.666K6T6Y6v6666777)7/757;7A7G7N7U7\7c7j7q7x77777777777777788 8/8L8P8l8p888@0

Hacked By AnonymousFox1.0, Coded By AnonymousFox