Hacked By AnonymousFox

Current Path : C:/Windows/SysWOW64/en-US/
Upload File :
Current File : C:/Windows/SysWOW64/en-US/PresentationHost.exe.mui

MZ@	!L!This program cannot be run in DOS mode.

$ٙ|||.|.|Rich|PELRH"!	 a@P .rsrc@@(@`x				 tDMUIi\:ʿb]	0Y̳B
=[(DWMUIen-USWindows Markup File5Contains markup for a Windows application or documentXPS document1Contains markup and resources for an XPS documentXAML Browser Application<Contains deployment manifest for an XAML browser applicationComposite Font File2Windows Presentation Foundation Font Cache 3.0.0.0Optimizes performance of Windows Presentation Foundation (WPF) applications by caching commonly used font data. WPF applications will start this service if it is not already running. It can be disabled, though doing so will degrade the performance of WPF applications.The content you are trying to access requires the Microsoft .NET Framework.
Do you want to open a page that has information about how to download and install the .NET Framework?PA4VS_VERSION_INFO?xStringFileInfoT040904B0LCompanyNameMicrosoft Corporationr%FileDescriptionWindows Presentation Foundation HostVFileVersion4.0.41210.0 built by: MainJInternalNamePresentationHost.exe/LegalCopyright Microsoft Corporation.  All rights reserved.ZOriginalFilenamePresentationHost.exe.muiTProductNameMicrosoft .NET Framework<ProductVersion4.0.41210.04CommentsFlavor=Retail4
PrivateBuildDDBLD844BDVarFileInfo$Translation	PADDINGXXPADDINGPADDINGXXPADDINGP 0 A	*H
 20 .10	+0L
+7>0<0
+70	0!0	+6X|K 2*;%00 3H=k0
	*H
0w10	UUS10U
Washington10URedmond10U
Microsoft Corporation1!0UMicrosoft Time-Stamp PCA0
180131190309Z
180907190309Z010	UUS10	UWA10URedmond10U
Microsoft Corporation1-0+U$Microsoft Ireland Operations Limited1&0$UThales TSS ESN:A240-4B82-130E1%0#UMicrosoft Time-Stamp service0"0
	*H
0
̧LH:gu~	NQI:UZFؖأ<&|[K88UډWŘkbfTu-GY~HJ,:T]x">HJ| JDyxwl]@ O9s¥
^Ai
nSvCڥ W$Jg#:!VP%uxUf*;

HW@*9]BDWWU/\Z ӷ9	00UԼ	1%^r0U#0#4RFp
@v+50TUM0K0IGEChttp://crl.microsoft.com/pki/crl/products/MicrosoftTimeStampPCA.crl0X+L0J0H+0<http://www.microsoft.com/pki/certs/MicrosoftTimeStampPCA.crt0U%0
+0
	*H
`C"mA^l;r\smK)I\qd5|+
gdqsS7@m YЫ5ph
p܏!)A;P-|}	Y
Jű퀗ƙ0,<^Ʊ.tWV҂Iz&@A'yW^5ہy.=q(x!233!~R o=YGo300à3Te_0
	*H
0y10	UUS10U
Washington10URedmond10U
Microsoft Corporation1#0!UMicrosoft Code Signing PCA0
180712201119Z
190726201119Z0t10	UUS10U
Washington10URedmond10U
Microsoft Corporation10UMicrosoft Corporation0"0
	*H
0
RO,S=]#JW-֊_Fxk !>%r:xcf._ۗUL>iI-c~åӿ9!0f6oޫh(i&Sxo106+0@YHFQJ-tUDz$}3#_)m2Zj'ϰz}"ZKӄcWkIx:T?%^ǡ
"[/(Uzӏv*_0[0U%0
+0UDw>Uq>s0PUI0GE0C1)0'U Microsoft Operations Puerto Rico10U
229803+4379500U#0ҴX7.3L
0VUO0M0KIGEhttp://crl.microsoft.com/pki/crl/products/MicCodSigPCA_08-31-2010.crl0Z+N0L0J+0>http://www.microsoft.com/pki/certs/MicCodSigPCA_08-31-2010.crt0
	*H
3š{^줦(]W%#%	ipMi/ٛYhd4ckv{BtE3]FICqxӞەA14p,Cw/=aJcY}R`E?P~BXA8I0O)/;GY7!f/-mku!2ZE?VQ̮}0H&
(D-ԇIWM4#
Í2	5(Ј?0p00yJLsX.e0
	*H
0_10
	&,dcom10
	&,d	microsoft1-0+U$Microsoft Root Certificate Authority0
010509231922Z
210509232813Z0_10
	&,dcom10
	&,d	microsoft1-0+U$Microsoft Root Certificate Authority0"0
	*H
0
]gZ, 5<uͷ`hZq)v|%vX46߯X+w"4d<"^	uXyY؟Xh)m2ҨKH2O븭O\oەuۨw[Hjy}p}mpG/l`y|֦~~<6ymn3R}s6ۋkM&g%315N4ySյc2Y@6NM=[3X?SdBY5WE|$M8t"hDtoKo6BZa0Gq
B(j*?wq IE~-EQ*솞[S(@߁39ٲE#U1-`A}.$Ks2[3Ybp2.@-{!g0#AѰn6@tXe`z[8ȏ&|@kl5Q0O0U0U00U`@V'%*
SY0	+70
	*H
M:`]Rw6Ȳ \"5cԚGo&WU&_֩PhҸnxYtf46>l8L30
&QSZN
m.NKl3oTdP}z97c6T;Qb:M9'[컾 `qlVm#~h=ckM0ʔK]0=Ql( $'+KkphЍ;$(r3_Yޓ:bZ49Uk-i6ɠ/ixzc986[{Vjdb8⪿Qff"k0-)=;Ch)78 %m|g~$$G쥞ϻvVBX1"_Y>n"C%Vhdk|춓bWn.X1I&)50qp[<i}.ZR
+C+0桅u3~lsdbi/}ʖmM0=n!!=kJѡCw?00
a3&10
	*H
0_10
	&,dcom10
	&,d	microsoft1-0+U$Microsoft Root Certificate Authority0
100831221932Z
200831222932Z0y10	UUS10U
Washington10URedmond10U
Microsoft Corporation1#0!UMicrosoft Code Signing PCA0"0
	*H
0
rY\0d`  BvSl>ok:t/2BN#r5W
ʮ IhMKyKqG%ߝuϪsDׁ6\Eܯ=(hrsV5rv_wE8s[gRi/t)v/T0Yҍb_F1P'@0r)("7N=2=͡8\NV(*2KOc-bE=F[&SzJF7<8w\V<	_^0Z0U00UҴX7.3L
0U0	+70#	+71N&`;1o<-0	+7
SubCA0U#0`@V'%*
SY0PUI0G0ECA?http://crl.microsoft.com/pki/crl/products/microsoftrootcert.crl0T+H0F0D+08http://www.microsoft.com/pki/certs/MicrosoftRootCert.crt0
	*H
Y9>&Fo@2j/nI_uL;-C-1#|P!]=/LVpyIr>Ai˥ -PV-JҼp
VชKWB4<VS#*NNҏr*qmSg"\͢'ycVDQXVݛED/_ڮԂ2ni穢,+e&	e8zJVx\5_ݓI-4D]5[!Θ	OmN=|)HrlpWW}HZϣg
t6-/r7o<gR3edoFy,
'@F`Ge`@NBNvy
4	m1TGdP.|!zA'iÓɍ؛!
\𢮆hj-vk{$jG1/q=~bGΈɸr=@ji7P=00
ah40
	*H
0_10
	&,dcom10
	&,d	microsoft1-0+U$Microsoft Root Certificate Authority0
070403125309Z
210403130309Z0w10	UUS10U
Washington10URedmond10U
Microsoft Corporation1!0UMicrosoft Time-Stamp PCA0"0
	*H
0
lH*|k.řQ#PN$ѧLt0 TIB\0&k{3$g,{N#SʍE	^аBlg(FS(F.'OUR,j0nY0~֗!~SmREHJGf')fJG	UxP0F#F-TxA1w̛;a
"KT 00U00U#4RFp
@v+50U0	+70U#0`@V'%*
SY䤡ca0_10
	&,dcom10
	&,d	microsoft1-0+U$Microsoft Root Certificate AuthorityyJLsX.e0PUI0G0ECA?http://crl.microsoft.com/pki/crl/products/microsoftrootcert.crl0T+H0F0D+08http://www.microsoft.com/pki/certs/MicrosoftRootCert.crt0U%0
+0
	*H
\D6鴭wyQM.tq[mξ{.mbWN Pz@WXx;⾏
ȍHSOjՀ/*$"px.
pNk
r9g-Qb\? ?21Jv1=+rp=

a׸N5+^}B{Sr!0ʻxe\[
<fX-/QVpl9Lyzb))4wb=m,C}㤨t5Nq#&v<RqZFCMgȟBy!0fB^Ȟ"!C+H,2L&*H$_ZVޙ:o'tv!'Tj=vanGo2lQȌ#fd=-Y!嵰cxTA.Pxuْu"/2n[%!OɚIeo}in꧗1)[\M/?.Uk1000y10	UUS10U
Washington10URedmond10U
Microsoft Corporation1#0!UMicrosoft Code Signing PCA3Te_0	+0	*H
	1
+70
+710
+70#	*H
	1rJ$
Ҽs10\
+71N0L20PresentationHost.exe.muihttp://microsoft.com0
	*H
^rwK
$O0^m4So)UVbBz
BU	'(7;M
	mذ)aK%幁F}>9mb*h:dq1$[!|YV<)`wcN +~hJMV)Ώ=ԖZeZqYR<J6,iCr,[m7\p%hg|KNS(0$	*H
	1000w10	UUS10U
Washington10URedmond10U
Microsoft Corporation1!0UMicrosoft Time-Stamp PCA3H=k0	+]0	*H
	1	*H
0	*H
	1
180807055123Z0#	*H
	1s5Lo_)0
	*H
e ϛ2`e
9c䰵*j6'4:ghsA
nXWRXy$*KBCz3go|+JeW+*ٓ=ґ#c˸kMq1w}b V)BH@,]5s']@ts'rE)QISm91
Iw-"O@Сc+RdS"?̌gHd;awKMY,
H# :,

Hacked By AnonymousFox1.0, Coded By AnonymousFox