MZ@ !L!This program cannot be run in DOS mode. $u<1R1R1Rڭ0RP0RRich1RPEL-p\!  " @@ h$0>.textp@@.rsrch @@-p\ T.rdataT.rdata$zzzdbg .rsrc$01 x.rsrc$02( @Xp   P<$ 4VS_VERSION_INFOov?&StringFileInfo040904B0LCompanyNameMicrosoft CorporationDFileDescriptionaspnet_rc.dll^FileVersion4.8.3761.0 built by: NET48REL1<InternalNameaspnet_rc.dll/LegalCopyright Microsoft Corporation. All rights reserved.DOriginalFilenameaspnet_rc.dllTProductNameMicrosoft .NET Framework: ProductVersion4.8.3761.04CommentsFlavor=Retail2 PrivateBuildDDBLD438DVarFileInfo$Translation !@@(@@@@D@@@@h@@@@@@4@5@l@@@@H@,@(4dLfhg0i $0k'1|`̧`Ȩ  `%&423(6k-5 Setup Uninstall Web Event (File Monitoring $Admin Service xaspnet_wp.exe (PID: %1) was recycled after %2 seconds. aspnet_wp.exe (PID: %1) was recycled after being idle for %2 seconds. aspnet_wp.exe (PID: %1) was recycled after serving %2 requests. Start registering ASP.NET (version %1) (internal flag: %2) Finish registering ASP.NET (version %1). Detailed registration logs can be found in %2 Starting %1 Stopping %1 ,Restarting W3SVC 8Finish restarting W3SVC \Start unregistering ASP.NET (version %1) Finish unregistering ASP.NET (version %1). Detailed unregistration logs can be found in %2 `The current version at the IIS root is %1. hState server starts listening with %1 listeners DState server stops listening %1 ,ASP.Net Web Admin `Account for running ASP.Net Web Admin Tasks Setup has detected some errors during the operation. For details, please read the setup log file %1 The eventlog may contain more information about the error. Start granting %1 access to the IIS configuration and other directories used by ASP.NET. Finished granting %1 access to the IIS configuration and other directories used by ASP.NET. lStart setting the web admin tool connection type. PEncrypting configuration section... PDecrypting configuration section... DCreating RSA Key container... DDeleting RSA Key container... DExporting RSA Keys to file... HImporting RSA Keys from file.. lAdding ACL for access to the RSA Key container... pRemoving ACL for access to the RSA Key container... tFinished setting the web admin tool connection type. The Web Site Administration Tool has been configured to allow remote connections and to use Forms authentication. The Web Site Administration Tool has been configured to allow remote connections and to use Windows authentication. The Web Site Administration Tool has been configured to allow only local connections and to use Windows authentication. If the aspnet_webadmin application was previously set to use a Secure Sockets Layer (SSL) connection, it is still configured to require SSL. "Provides support for configuring ASP.NET applications and configuration." 8"ASP.NET Admin Service" DThe user '%1' does not exist. Failed to queue the request to the worker thread pool. Error code = %1 ASP.NET d8 ASP.NET MMC extension base page font size. XView or edit the global configuration. HView or edit the configuration. HSelect the version of ASP.NET. \IIS metabase path of the current object. TPhysical path of the current object. xDate and time the configuration file was last modified. lDate and time the configuration file was created. |Unable to determine the local path of the current object. 0Date not available. DASP.NET Management Extension PASP.NET Management Extension About XMicrosoft ASP.NET Management Extension DASP.NET Management Extension 4Microsoft Corporation Error TAn error was encountered loading %1. ,ASP.NET version: $Virtual path: (File location: 4File does not exist. 0File creation date: 0File last modified: DEdit &Global Configuration... 8&Edit Configuration... |Remote configuration is not enabled on the remote server. L%1: it can run only as a service D%1: exiting with error %2 %3 $Event code: %1 %rEvent message: %2 %rEvent time: %3 %rEvent time (UTC): %4 %rEvent ID: %5 %rEvent sequence: %6 %rEvent occurrence: %7 %rEvent detail code: %8 %r %rApplication information: %r%b%b%b%bApplication domain: %9 %r%b%b%b%bTrust level: %10 %r%b%b%b%bApplication Virtual Path: %11 %r%b%b%b%bApplication Path: %12 %r%b%b%b%bMachine name: %13 %r %rCustom event details: %r%14 Event code: %1 %rEvent message: %2 %rEvent time: %3 %rEvent time (UTC): %4 %rEvent ID: %5 %rEvent sequence: %6 %rEvent occurrence: %7 %rEvent detail code: %8 %r %rApplication information: %r%b%b%b%bApplication domain: %9 %r%b%b%b%bTrust level: %10 %r%b%b%b%bApplication Virtual Path: %11 %r%b%b%b%bApplication Path: %12 %r%b%b%b%bMachine name: %13 %r %rProcess information: %r%b%b%b%bProcess ID: %15 %r%b%b%b%bProcess name: %16 %r%b%b%b%bAccount name: %17 %r %rCustom event details: %r%14 Event code: %1 %rEvent message: %2 %rEvent time: %3 %rEvent time (UTC): %4 %rEvent ID: %5 %rEvent sequence: %6 %rEvent occurrence: %7 %rEvent detail code: %8 %r %rApplication information: %r%b%b%b%bApplication domain: %9 %r%b%b%b%bTrust level: %10 %r%b%b%b%bApplication Virtual Path: %11 %r%b%b%b%bApplication Path: %12 %r%b%b%b%bMachine name: %13 %r %rProcess information: %r%b%b%b%bProcess ID: %15 %r%b%b%b%bProcess name: %16 %r%b%b%b%bAccount name: %17 %r %rCustom event details: %r%14 Event code: %1 %rEvent message: %2 %rEvent time: %3 %rEvent time (UTC): %4 %rEvent ID: %5 %rEvent sequence: %6 %rEvent occurrence: %7 %rEvent detail code: %8 %r %rApplication information: %r%b%b%b%bApplication domain: %9 %r%b%b%b%bTrust level: %10 %r%b%b%b%bApplication Virtual Path: %11 %r%b%b%b%bApplication Path: %12 %r%b%b%b%bMachine name: %13 %r %rProcess information: %r%b%b%b%bProcess ID: %15 %r%b%b%b%bProcess name: %16 %r%b%b%b%bAccount name: %17 %r %rRequest information: %r%b%b%b%bRequest URL: %18 %r%b%b%b%bRequest path: %19 %r%b%b%b%bUser host address: %20 %r%b%b%b%bUser: %21 %r%b%b%b%bIs authenticated: %22 %r%b%b%b%bAuthentication Type: %23 %r%b%b%b%bThread account name: %24 %r %rCustom event details: %r%14 Event code: %1 %rEvent message: %2 %rEvent time: %3 %rEvent time (UTC): %4 %rEvent ID: %5 %rEvent sequence: %6 %rEvent occurrence: %7 %rEvent detail code: %8 %r %rApplication information: %r%b%b%b%bApplication domain: %9 %r%b%b%b%bTrust level: %10 %r%b%b%b%bApplication Virtual Path: %11 %r%b%b%b%bApplication Path: %12 %r%b%b%b%bMachine name: %13 %r %rProcess information: %r%b%b%b%bProcess ID: %15 %r%b%b%b%bProcess name: %16 %r%b%b%b%bAccount name: %17 %r %rProcess statistics: %r%b%b%b%bProcess start time: %18 %r%b%b%b%bThread count: %19 %r%b%b%b%bWorking set: %20 bytes %r%b%b%b%bPeak working set: %21 bytes %r%b%b%b%bManaged heap size: %22 bytes %r%b%b%b%bApplication domain count: %23 %r%b%b%b%bRequests executing: %24 %r%b%b%b%bRequests queued: %25 %r%b%b%b%bRequests rejected: %26 %r %rCustom event details: %r%14 Event code: %1 %rEvent message: %2 %rEvent time: %3 %rEvent time (UTC): %4 %rEvent ID: %5 %rEvent sequence: %6 %rEvent occurrence: %7 %rEvent detail code: %8 %r %rApplication information: %r%b%b%b%bApplication domain: %9 %r%b%b%b%bTrust level: %10 %r%b%b%b%bApplication Virtual Path: %11 %r%b%b%b%bApplication Path: %12 %r%b%b%b%bMachine name: %13 %r %rProcess information: %r%b%b%b%bProcess ID: %15 %r%b%b%b%bProcess name: %16 %r%b%b%b%bAccount name: %17 %r %rRequest information: %r%b%b%b%bRequest URL: %18 %r%b%b%b%bRequest path: %19 %r%b%b%b%bUser host address: %20 %r%b%b%b%bUser: %21 %r%b%b%b%bIs authenticated: %22 %r%b%b%b%bAuthentication Type: %23 %r%b%b%b%bThread account name: %24 %r %rCustom event details: %r%14 Event code: %1 %rEvent message: %2 %rEvent time: %3 %rEvent time (UTC): %4 %rEvent ID: %5 %rEvent sequence: %6 %rEvent occurrence: %7 %rEvent detail code: %8 %r %rApplication information: %r%b%b%b%bApplication domain: %9 %r%b%b%b%bTrust level: %10 %r%b%b%b%bApplication Virtual Path: %11 %r%b%b%b%bApplication Path: %12 %r%b%b%b%bMachine name: %13 %r %rProcess information: %r%b%b%b%bProcess ID: %15 %r%b%b%b%bProcess name: %16 %r%b%b%b%bAccount name: %17 %r %rRequest information: %r%b%b%b%bRequest URL: %18 %r%b%b%b%bRequest path: %19 %r%b%b%b%bUser host address: %20 %r%b%b%b%bUser: %21 %r%b%b%b%bIs authenticated: %22 %r%b%b%b%bAuthentication Type: %23 %r%b%b%b%bThread account name: %24 %r %rCustom event details: %r%14 4Event code: %1 %rEvent message: %2 %rEvent time: %3 %rEvent time (UTC): %4 %rEvent ID: %5 %rEvent sequence: %6 %rEvent occurrence: %7 %rEvent detail code: %8 %r %rApplication information: %r%b%b%b%bApplication domain: %9 %r%b%b%b%bTrust level: %10 %r%b%b%b%bApplication Virtual Path: %11 %r%b%b%b%bApplication Path: %12 %r%b%b%b%bMachine name: %13 %r %rProcess information: %r%b%b%b%bProcess ID: %15 %r%b%b%b%bProcess name: %16 %r%b%b%b%bAccount name: %17 %r %rRequest information: %r%b%b%b%bRequest URL: %18 %r%b%b%b%bRequest path: %19 %r%b%b%b%bUser host address: %20 %r%b%b%b%bUser: %21 %r%b%b%b%bIs authenticated: %22 %r%b%b%b%bAuthentication Type: %23 %r%b%b%b%bThread account name: %24 %r %rName to authenticate: %25 %r %rCustom event details: %r%14 Event code: %1 %rEvent message: %2 %rEvent time: %3 %rEvent time (UTC): %4 %rEvent ID: %5 %rEvent sequence: %6 %rEvent occurrence: %7 %rEvent detail code: %8 %r %rApplication information: %r%b%b%b%bApplication domain: %9 %r%b%b%b%bTrust level: %10 %r%b%b%b%bApplication Virtual Path: %11 %r%b%b%b%bApplication Path: %12 %r%b%b%b%bMachine name: %13 %r %rProcess information: %r%b%b%b%bProcess ID: %15 %r%b%b%b%bProcess name: %16 %r%b%b%b%bAccount name: %17 %r %rRequest information: %r%b%b%b%bRequest URL: %18 %r%b%b%b%bRequest path: %19 %r%b%b%b%bUser host address: %20 %r%b%b%b%bUser: %21 %r%b%b%b%bIs authenticated: %22 %r%b%b%b%bAuthentication Type: %23 %r%b%b%b%bThread account name: %24 %r %rCustom event details: %r%14 4Event code: %1 %rEvent message: %2 %rEvent time: %3 %rEvent time (UTC): %4 %rEvent ID: %5 %rEvent sequence: %6 %rEvent occurrence: %7 %rEvent detail code: %8 %r %rApplication information: %r%b%b%b%bApplication domain: %9 %r%b%b%b%bTrust level: %10 %r%b%b%b%bApplication Virtual Path: %11 %r%b%b%b%bApplication Path: %12 %r%b%b%b%bMachine name: %13 %r %rProcess information: %r%b%b%b%bProcess ID: %15 %r%b%b%b%bProcess name: %16 %r%b%b%b%bAccount name: %17 %r %rRequest information: %r%b%b%b%bRequest URL: %18 %r%b%b%b%bRequest path: %19 %r%b%b%b%bUser host address: %20 %r%b%b%b%bUser: %21 %r%b%b%b%bIs authenticated: %22 %r%b%b%b%bAuthentication Type: %23 %r%b%b%b%bThread account name: %24 %r %rName to authenticate: %25 %r %rCustom event details: %r%14 Event code: %1 %rEvent message: %2 %rEvent time: %3 %rEvent time (UTC): %4 %rEvent ID: %5 %rEvent sequence: %6 %rEvent occurrence: %7 %rEvent detail code: %8 %r %rApplication information: %r%b%b%b%bApplication domain: %9 %r%b%b%b%bTrust level: %10 %r%b%b%b%bApplication Virtual Path: %11 %r%b%b%b%bApplication Path: %12 %r%b%b%b%bMachine name: %13 %r %rProcess information: %r%b%b%b%bProcess ID: %15 %r%b%b%b%bProcess name: %16 %r%b%b%b%bAccount name: %17 %r %rRequest information: %r%b%b%b%bRequest URL: %18 %r%b%b%b%bRequest path: %19 %r%b%b%b%bUser host address: %20 %r%b%b%b%bUser: %21 %r%b%b%b%bIs authenticated: %22 %r%b%b%b%bAuthentication Type: %23 %r%b%b%b%bThread account name: %24 %r %rViewStateException information: %r%b%b%b%bException message: %25 %r%b%b%b%bClient IP: %26 %r%b%b%b%bPort: %27 %r%b%b%b%bUser-Agent: %28 %r%b%b%b%bPersistedState: %29 %r%b%b%b%bReferer: %30 %r%b%b%b%bPath: %31 %r %rCustom event details: %r%14 Installation stopped because the specified path (%1) is not a valid website. The -app parameter is missing. It is required when you use the -site parameter. The value used in the -app parameter must begin with a forward slash. The error indicates that IIS is in 64 bit mode, while this application is a 32 bit application and thus not compatible. The error indicates that IIS is in 32 bit mode, while this application is a 64 bit application and thus not compatible. (Failed to execute request because the worker process account does not have access to the IIS Metabase. This may be fixed by running "aspnet_regiis -ga <account-name>" for the worker process account. However, there are security implications of running "aspnet_regiis -ga". [-site site-name-or-ID] The site of the virtual path specified in -app. If not specified, the default web site will be used. tA request mapped to aspnet_isapi.dll was made within an application pool running in Integrated .NET mode. Aspnet_isapi.dll can only be used when running in Classic .NET mode. Please either specify preCondition="ISAPImode" on the handler mapping to make it run only in application pools running in Classic .NET mode, or move the application to another application pool running in Classic .NET mode in order to use this handler mapping. Updates to the IIS metabase were aborted because IIS is either not installed or is disabled on this machine. To configure ASP.NET to run in IIS, please install or enable IIS and re-register ASP.NET using aspnet_regiis.exe /i. During unregistration (version %1), a clean uninstall was done because the process failed to get the next highest version. Error code: %2 Updates to the IIS metabase were aborted because IIS is either not installed or is disabled on this machine. To completely uninstall ASP.NET from IIS, please re-enable IIS and unregister ASP.NET using aspnet_regiis.exe /u. Registration (version %1) will not register the DLL in the scriptmap properties of any IIS website because the version is not high enough to replace the existing one at the root. See help for the explanation of version comparison during installation. Failed reading registry key %1 for value %2. Error code: %3 Failed while verifying that the ASP.NET DLL (Path:%1) (Version:%2) exists. Error code: %3 Failed while verifying that the ASP.NET DLL (Version:%1) exists. Error code: %2 pThe ASP.NET DLL (Path: %1) (Version:%2) is missing Failed while getting the version of %1, which is found in a scriptmap in IIS. The file could be missing. Error code: %2 Registration failed to find the highest installed version from the registry. As a result, registration will use the IIS Default Document, Mimemap settings and ISAPI Filter DLL path from the current version. Error code: %1 @Couldn't create app domain PUnhandled exception in managed code dFailed to assign request using process model <Cannot queue the request ASPNET_ISAPI.DLL can not run in DLLHOST.EXE. Please, re-register ASP.NET pManaged code failure while executing this request. TWorker process stopped unexpectedly. 0Server Unavailable HServer Application Unavailable hThe web application you are attempting to access on this web server is currently unavailable.&nbsp; Please hit the "Refresh" button in your web browser to retry your request. 0Administrator Note: An error message detailing the cause of this specific request failure can be found in the application event log of the web server. Please review this log entry to discover what caused this error to occur. DWorker process was recycled. Username and/or password supplied in the processmodel section of the config file are invalid Worker process was recycled because it exceeded the configured time limit. Worker process was recycled because it exceeded the configured idle time limit. Worker process was recycled because it exceeded the configured requests limit. Worker process was recycled because its request queue exceeded the configured limit. Worker process was recycled because its memory consumption exceeded the configured limit. Worker process was recycled because it failed to respond to ping message. t<html><body><h1>Server is too busy</h1></body></html> tFailed while enumerating files in %1. Error code: %2 Failed while creating files and directories in %1. Error code: %2 Failed while enumerating files and directories in %1. Error code: %2 |Failed while copying files from %1 to %2. Error code: %3 dFailed while removing file %1. Error code: %2 Failed while copying files and directories from %1 to %2. Error code: %3 pFailed while removing files from %1. Error code: %2 tFailed while removing directory (%1). Error code: %2 Failed while setting access permissions for IIS application %1. Error code: %2 Failed while removing the access permissions for IIS application %1. Error code: %2 %1 ASP.NET Admin Service has rejected a request from user '%1' because the user does not belong to the IIS_WPG group. ASP.NET Admin Service has rejected a request because the request was unauthenticated. ASP.NET Admin Service has rejected a request because the authentication level was not RPC_C_AUTHN_LEVEL_PKT_PRIVACY. ASP.NET Admin Service has rejected a request because client impersonation failed. Succeeded! Failed! Enabling remote access of this server's ASP.Net configuration files. Disabling remote access of this server's ASP.Net configuration files. Event code: %1 %rEvent message: %2 %rEvent time: %3 %rEvent time (UTC): %4 %rEvent ID: %5 %rEvent sequence: %6 %rEvent occurrence: %7 %rEvent detail code: %8 %r %rApplication information: %r%b%b%b%bApplication domain: %9 %r%b%b%b%bTrust level: %10 %r%b%b%b%bApplication Virtual Path: %11 %r%b%b%b%bApplication Path: %12 %r%b%b%b%bMachine name: %13 %r %rProcess information: %r%b%b%b%bProcess ID: %15 %r%b%b%b%bProcess name: %16 %r%b%b%b%bAccount name: %17 %r %rException information: %r%b%b%b%bException type: %18 %r%b%b%b%bException message: %19 %r %rCustom event details: %r%14 Event code: %1 %rEvent message: %2 %rEvent time: %3 %rEvent time (UTC): %4 %rEvent ID: %5 %rEvent sequence: %6 %rEvent occurrence: %7 %rEvent detail code: %8 %r %rApplication information: %r%b%b%b%bApplication domain: %9 %r%b%b%b%bTrust level: %10 %r%b%b%b%bApplication Virtual Path: %11 %r%b%b%b%bApplication Path: %12 %r%b%b%b%bMachine name: %13 %r %rProcess information: %r%b%b%b%bProcess ID: %15 %r%b%b%b%bProcess name: %16 %r%b%b%b%bAccount name: %17 %r %rException information: %r%b%b%b%bException type: %18 %r%b%b%b%bException message: %19 %r %rRequest information: %r%b%b%b%bRequest URL: %20 %r%b%b%b%bRequest path: %21 %r%b%b%b%bUser host address: %22 %r%b%b%b%bUser: %23 %r%b%b%b%bIs authenticated: %24 %r%b%b%b%bAuthentication Type: %25 %r%b%b%b%bThread account name: %26 %r %rThread information: %r%b%b%b%bThread ID: %27 %r%b%b%b%bThread account name: %28 %r%b%b%b%bIs impersonating: %29 %r%b%b%b%bStack trace: %30 %r %rCustom event details: %r%14 Event code: %1 %rEvent message: %2 %rEvent time: %3 %rEvent time (UTC): %4 %rEvent ID: %5 %rEvent sequence: %6 %rEvent occurrence: %7 %rEvent detail code: %8 %r %rApplication information: %r%b%b%b%bApplication domain: %9 %r%b%b%b%bTrust level: %10 %r%b%b%b%bApplication Virtual Path: %11 %r%b%b%b%bApplication Path: %12 %r%b%b%b%bMachine name: %13 %r %rProcess information: %r%b%b%b%bProcess ID: %15 %r%b%b%b%bProcess name: %16 %r%b%b%b%bAccount name: %17 %r %rException information: %r%b%b%b%bException type: %18 %r%b%b%b%bException message: %19 %r %rRequest information: %r%b%b%b%bRequest URL: %20 %r%b%b%b%bRequest path: %21 %r%b%b%b%bUser host address: %22 %r%b%b%b%bUser: %23 %r%b%b%b%bIs authenticated: %24 %r%b%b%b%bAuthentication Type: %25 %r%b%b%b%bThread account name: %26 %r %rThread information: %r%b%b%b%bThread ID: %27 %r%b%b%b%bThread account name: %28 %r%b%b%b%bIs impersonating: %29 %r%b%b%b%bStack trace: %30 %r %rCustom event details: %r%14 haspnet_wp.exe (PID: %1) stopped unexpectedly. aspnet_wp.exe (PID: %1) was recycled because memory consumption exceeded the %2 MB (%3 percent of available RAM). aspnet_wp.exe (PID: %1) was recycled because the number of queued requests exceeded %2. ,aspnet_wp.exe (PID: %1) was recycled because it was suspected to be in a deadlocked state. It did not send any responses for pending requests in the last %2 seconds. This timeout may be adjusted using the <processModel responseDeadlockInterval> setting in machine.config. $aspnet_wp.exe could not be launched because the username and/or password supplied in the processModel section of the config file are invalid. aspnet_wp.exe (PID: %1) was recycled because it failed to respond to ping message. aspnet_wp.exe (PID: %1) failed to startup because the synchronization event could not be initialized. Error code: %2 aspnet_wp.exe (PID: %1) failed to startup because the synchronous pipes could not be initialized. Error code: %2 aspnet_wp.exe (PID: %1) failed to startup because the asynchronous pipe could not be initialized. Error code: %2 aspnet_wp.exe (PID: %1) failed to startup because the .NET Runtime could not be initialized. Error code: %2 aspnet_wp.exe (PID: %1) failed to startup because CoInitializeEx failed. Error code: %2 aspnet_wp.exe (PID: %1) failed to startup because CoInitializeSecurity failed. Error code: %2 aspnet_wp.exe (PID: %1) failed to startup because webengine4.dll could not be initialized. Error code: %2 aspnet_wp.exe (PID: %1) failed to startup because of failure to create the thread for answering ping messages. Error code: %2 Failed while registering ASP.NET (version %1) in IIS. Error code: %2 hFailed while restarting W3SVC. Error code: %1 Failed while unregistering ASP.NET (version %1) in IIS. Error code: %2 Registration failed when trying to find the highest version installed on the machine. Error code: %1 `ASP.NET does not support /3GB memory mode. It is not possible to run two different versions of ASP.NET in the same IIS process. Please use the IIS Administration Tool to reconfigure your server to run the application in a separate process. An error occurred in while processing a request in state server. Major callstack: %1. Error code: %2 State server socket timeout thread exits because of repeating error. Error code: %1 DThe state server has closed an expired TCP/IP connection. The IP address of the client is %1.%2.%3.%4. The expired %5 operation began at %6/%7/%8 %9:%10:%11. P(For debugging) State Server expiry thread is closing a socket. The IP address of the client is %1.%2.%3.%4. The expired %5 operation began at %6/%7/%8 %9:%10:%11. "Provides support for out-of-process session states for ASP.NET. If this service is stopped, out-of-process requests will not be processed. If this service is disabled, any services that explicitly depend on it will fail to start." 8"ASP.NET State Service" Installation failed because the user does not have administrative rights on this machine. Uninstallation failed because the user does not have administrative rights on this machine. aspnet_wp.exe could not be started. The error code for the failure is %1. This error can be caused when the worker process account has insufficient rights to read the .NET Framework files. Please ensure that the .NET Framework is correctly installed and that the ACLs on the installation directory allow access to the configured account. 8ASP.NET Machine Account Account used for running the ASP.NET worker process (aspnet_wp.exe) Failed to execute request due to internal failure. Error: %1 Failed to execute request because the App-Domain could not be created. Error: %1 Failed to execute the request because the ASP.NET process identity does not have read permissions to the global assembly cache. Error: %1 Failed to execute request because QueryInterface for ASP.NET runtime failed. Error: %1 |Failed to execute request due to unknown error. Error: %1 ,Deadlock detected dUnable to get the private bytes memory limit for the W3WP process. The ASP.NET cache will be unable to limit its memory use, which may lead to a process restart. Error: %1 Administration utility to install and uninstall ASP.NET on the local machine. 0Invalid arguments. Start copying the ASP.NET client script files for this version (%1). Finished copying the ASP.NET client script files for this version (%1). Start removing the ASP.NET client script files for all versions. Finished removing the ASP.NET client script files for all versions. Start removing the ASP.NET client script files for this version (%1). Finished removing the ASP.NET client script files for this version (%1). `Start uninstalling all versions of ASP.NET. hFinished uninstalling all versions of ASP.NET. LStart uninstalling ASP.NET (%1). PFinished uninstalling ASP.NET (%1). Start installing ASP.NET (%1) and changing IIS configuration to use this version of ASP.NET. Finished installing ASP.NET (%1) and changing IIS configuration to use this version of ASP.NET. HStart installing ASP.NET (%1). LFinished installing ASP.NET (%1). Start installing ASP.NET (%1) without changing existing web applications to use this version of ASP.Net. Finished installing ASP.NET (%1) without changing existing web applications to use this version of ASP.Net. PCannot find any installed version. $Valid (Root) Valid Invalid lStart registering ASP.NET (%1) recursively at %2. tFinished registering ASP.NET (%1) recursively at %2. TStart registering ASP.NET (%1) at %2. \Finished registering ASP.NET (%1) at %2. |Error when validating the IIS path (%1). Error code = %2 Installation stopped because the specified path (%1) is invalid. |Start removing any version of ASP.NET recursively at %1. Finished removing any version of ASP.NET recursively at %1. dStart removing any version of ASP.NET at %1. pFinished removing any version of ASP.NET DLL at %1. Some options specified are not compatible. Use aspnet_regiis /? to see all options. DAn error has occurred: %1 %2 The error indicates that IIS is not installed on the machine. Please install IIS before using this tool. The error indicates that IIS is disabled on the machine. Please enable IIS before using this tool. You must have administrative rights on this machine in order to run this tool. The error indicates that this version of ASP.NET must first be registered on the machine. %1 TransmitFile failed. File Name: %1, Impersonation Enabled: %2, Token Valid: %3, HRESULT: %4 hTransmitFile failed. File Name: %1, HRESULT: %2 TransmitFile failed. The worker process token does not have read access to %1. TransmitFile failed. The impersonation token does not have read access to %1. %1 P-- ASP.NET REGISTRATION OPTIONS -- Install this version of ASP.NET and update IIS configuration at the root level to use this version of ASP.Net. Install this version of ASP.NET, register only. Do not change any web applications to use this version. 4Install this version of ASP.NET. If there are any existing applications that uses ASP.NET, it will not change IIS configuration to use this version. When -enable is specified with -i, -ir or -r, ASP.NET will be enabled in the IIS security console (IIS 6.0 or later). When -disable is specified with -i, -ir or -r, ASP.NET will be disabled in the IIS security console (IIS 6.0 or later). -s <path> Install scriptmaps for this version at the specified path, recursively. PE.g. %1 -s W3SVC/1/ROOT/SampleApp1 -sn <path> Install scriptmaps for this version at the specified path, non-recursively. Install this version of ASP.NET and update scriptmaps at the IIS metabase root and for all scriptmaps below the root. Existing scriptmaps are upgraded to this version regardless of the original versions. 8Uninstall this version of ASP.NET. Existing scriptmaps to this version are remapped to highest remaining version of ASP.NET installed on the machine. lUninstall all versions of ASP.NET on the machine. -k <path> Remove all scriptmaps to any version of ASP.NET from the specified path, recursively (not supported on Windows Vista and higher versions). PE.g. %1 -k W3SVC/1/ROOT/SampleApp1 -kn <path> Remove all scriptmaps to any version ASP.NET from the specified path, non-recursively (not supported on Windows Vista and higher versions). List all versions of ASP.NET that are installed on the machine, with status and installation path. List all the path of all IIS metabase keys where ASP.NET is scriptmapped, together with the version. Keys that inherit ASP.NET scriptmaps from a parent key will not be displayed (not supported on Windows Vista and higher versions). Install the client side scripts for this version to the aspnet_client subdirectory of each IIS site directory. Remove the client side scripts for this version from the aspnet_client subdirectory of each IIS site directory. Remove the client side scripts for all versions from the aspnet_client subdirectory of each IIS site directory. -ga <user> Grant the specified user or group access to the IIS metabase and other directories used by ASP.NET. T-- WEB ADMINISTRATION TOOL OPTIONS -- -w <site>|* XInstall the web admin tool to the site specified by <site>, where <site> is the path of the site defined in IIS. If the * argument is used, then the web admin tool is installed on all sites on the machine. If a copy of web administration tool already exists on a site, it will be overwritten. 0E.g. %1 -w W3SVC/1 $-wu <site>|* 8Remove the web admin tool from the site specified by <site>, where <site> is the path of the site defined in IIS. If the * argument is used, then the web admin tool is removed from all sites on the machine, and the WADM_[machinename] account will be get disabled on the machine. $-wr <site>|* If the web admin tool is already installed on a site, this command will copy over the content of the app_globalresources and app_localresources folders from the .NET Framework installation directory to the web admin tool directory of the site. <Site> is the path of the site defined in IIS. If * argument is used, this command will work on all sites. 8-wct <connection type> Change the connection type for the web admin tool. Connection type: PHF (Hosted + Forms Authentication) THW (Hosted + Windows Authentication) L (Local) X-- CONFIGURATION ENCRYPTION OPTIONS -- -pe section L-pef section web-app-physical-dir xEncrypt the configuration section. Optional arguments: h[-prov provider] Use this provider to encrypt. [-app virtual-path] Encrypt at this virtual path. Virtual path must begin with a forward slash. If it is '/', then it refers to the root of the site. If -app is not specified, the root web.config will be encrypted. X[-location sub-path] Location sub path. -pd section L-pdf section web-app-physical-dir xDecrypt the configuration section. Optional arguments: PDecrypt the configuration section. [-app virtual-path] Decrypt at this virtual path. Virtual path must begin with a forward slash. If it is '/', then it refers to the root of the site. If -app is not specified, the root web.config will be decrypted. X[-location sub-path] Location sub path. $-pc container Create an RSA keypair in ContainerName. Optional arguments: `[-size key-size] Key-size. Default is 1024. p[-pku] User container instead of machine container. [-pkm] Encrypt/decrypt the machine.config instead of web.config. \[-exp] Make the private keys exportable. T[-csp provider] Csp Provider to use. $-pz container dDelete the ContainerName. Optional arguments: p[-pku] User container instead of machine container. 0-pi container file Import an RSA keypair from the Xml file. Optional arguments: p[-pku] User container instead of machine container. H[-exp] Create exportable keys. T[-csp provider] Csp Provider to use. 0-px container file Export an RSA keypair to the Xml file. Optional arguments: p[-pku] User container instead of machine container. D[-pri] Include private keys. T[-csp provider] Csp Provider to use. 4-pa container account xAdd access for the account to the container. Arguments: p[-pku] User container instead of machine container. T[-csp provider] Csp Provider to use. l[-full] Add full access (default is Read access). 4-pr container account Remove access for the account from the container. Arguments: p[-pku] User container instead of machine container. T[-csp provider] Csp Provider to use. \-- CONFIGURATION REMOTE ACCESS OPTIONS -- XEnable remote access of configuration. XDisable remote access of configuration. Error: Can't execute the command using the 32-bit version under WOW64. Please run the command in the 64-bit installation directory. @Obsolete. Do not localize. DWarning: Doing register only. Warning: No 64-bit install detected. You should register the 64-bit version before using the 32-bit version under WOW64. Please run "aspnet_regiis -ir" in the 64-bit installation directory. |Error: No 64-bit install detected. You must register the 64-bit version before using 32-bit version under WOW64. Please run "aspnet_regiis -ir" in the 64-bit installation directory. Start installing ASP.NET web administration tool (%1) on path %2. Finished installing ASP.NET web administration tool (%1) on path %2. Start installing ASP.NET web administration tool resource files (%1) on path %2. Finished installing ASP.NET web administration tool resource files (%1) on path %2. Start uninstalling ASP.NET web administration tool (%1) from path %2. Finished uninstalling ASP.NET web administration tool (%1) from path %2. Start installing ASP.NET web administration tool (%1) on all web sites. Finished installing ASP.NET web administration tool (%1) on all web sites. Start installing ASP.NET web administration tool resource files (%1) on all web sites. Finished installing ASP.NET web administration tool resource files (%1) on all web sites. Start uninstalling ASP.NET web administration tool (%1) from all web sites. Finished uninstalling ASP.NET web administration tool (%1) from all web sites. Operation failed because ASP.NET web administration tool is not installed on the path %1. The following exception was thrown by the web event provider '%1' in the application '%2' (in an application lifetime a maximum of one exception will be logged per provider instance):%r%r%3 pCannot specify the same option (%1) multiple times. %1 Changing the Framework version requires a restart of the W3SVC service. Alternatively, you can change the Framework version without restarting the W3SVC service by running: aspnet_regiis.exe -norestart -s IIS-Viirtual-Path Do you want to continue (this will change the Framework version and restart the W3SVC service)? Confirm \Start uninstalling ASP.NET language pack. dFinished uninstalling ASP.NET language pack. This option is not supported on this version of the operating system. Administrators should instead install/uninstall ASP.NET 4.5 with IIS8 using the "Turn Windows Features On/Off" dialog, the Server Manager management tool, or the dism.exe command line tool. For more details please see http://go.microsoft.com/fwlink/?LinkID=216771. This option is not supported on this version of the operating system. Copyright (C) Microsoft Corporation. All rights reserved. XMicrosoft (R) ASP.NET RegIIS version %1 ASP.NET State ServiceProvides support for out-of-process session states for ASP.NET. If this service is stopped, out-of-process requests will not be processed. If this service is disabled, any services that explicitly depend on it will fail to start.0>0> *H >0> 1 0 +0L +7>0<0 +70 0!0 +iwiLQC#t00 3æ;\0  *H 0w1 0 UUS10U Washington10URedmond10U Microsoft Corporation1!0UMicrosoft Time-Stamp PCA0 181024210734Z 200110210734Z01 0 UUS10U Washington10URedmond10U Microsoft Corporation1%0#U Microsoft America Operations1&0$U Thales TSS ESN:12BC-E3AE-74EB1%0#UMicrosoft Time-Stamp Service0"0  *H 0 +)wیؠSMg @*!LҀeι>y~3ڭ  ~>xUtE yZx:Iq$|݁xT|/eh_ f<%Oζ:ʨ,h[Jr^ CieYDWKe7ިʥ2e,J('CyUɖ|Esϭ(/9&q>P}BF G˰K 00U%r:xcf._ۗUL>iI-c~åӿ9!0f6oޫh(i&Sxo106+0@YHFQ J-tUDz$} 3#_)m2Zj'ϰ z}"ZKӄcWkIx:T?%^ǡ "[/(Uzӏv*_0[0U% 0 +0UDw>Uq>s0PUI0GE0C1)0'U  Microsoft Operations Puerto Rico10U 229803+4379500U#0ҴX7.3L 0VUO0M0KIGEhttp://crl.microsoft.com/pki/crl/products/MicCodSigPCA_08-31-2010.crl0Z+N0L0J+0>http://www.microsoft.com/pki/certs/MicCodSigPCA_08-31-2010.crt0  *H 3š{^줦(]W%#% ipMi/ٛYhd4ckv{BtE3]FICqxӞەA14p,Cw/=aJcY}R`E?P~BXA8I0O)/;GY7!f/-mk u!2ZE?VQ̮}0H& (D-ԇIW M4# Í2 5(Ј?0p00 a3&10  *H 0_10 &,dcom10 &,d microsoft1-0+U$Microsoft Root Certificate Authority0 100831221932Z 200831222932Z0y1 0 UUS10U Washington10URedmond10U Microsoft Corporation1#0!UMicrosoft Code Signing PCA0"0  *H 0 rY\0d` BvSl>ok:t/2BN#r5W ʮ IhMKyKqG%ߝuϪsDׁ6\Eܯ=(hrsV5rv_wE8s[gRi/ t)v/T0Yҍb_F1P'@0r)("7N=2=͡8\NV(*2KOc-bE=F[&SzJF7<8w\V< _^0Z0U00UҴX7.3L 0 U0 +70# +71N&`;1o<-0 +7  SubCA0U#0`@V'%* SY0PUI0G0ECA?http://crl.microsoft.com/pki/crl/products/microsoftrootcert.crl0T+H0F0D+08http://www.microsoft.com/pki/certs/MicrosoftRootCert.crt0  *H Y9>&Fo@2j/nI_uL;-C -1#|P!]=/LVpyIr>A i˥ - PV-JҼp VชKWB4^s\v-^ݶr:"8ݿ'E{~*RQٵp$&q?w3#W$+斦RNGuڴ^"[ro3Yr(@0# +71#0#| *H #m0#i10  `He0\ +7N0L0 +70 010  `He "XcL#2oXPYvX_%vՠ 003^%0  *H  0~1 0 UUS10U Washington10URedmond10U Microsoft Corporation1(0&UMicrosoft Code Signing PCA 20110 180712200848Z 190726200848Z0t1 0 UUS10U Washington10URedmond10U Microsoft Corporation10UMicrosoft Corporation0"0  *H 0 єv6憫6iF|PːpU$~9{s ԛ$\9~3l;&]SkWe˯M.2V+N4i!>D|v}rvadLFζ:wwg!Z^G< =ͲPxф<"]Z@Njstz_Fg(w1K^Te? F,:h4e9&cݽ%(4y*_0;j#~0z0U%0 +7L+0UG?e8]w@0PUI0GE0C1)0'U  Microsoft Operations Puerto Rico10U 230012+4379650U#0HndPӂ77"mu0TUM0K0IGEChttp://www.microsoft.com/pkiops/crl/MicCodSigPCA2011_2011-07-08.crl0a+U0S0Q+0Ehttp://www.microsoft.com/pkiops/certs/MicCodSigPCA2011_2011-07-08.crt0 U00  *H  S ? &D џcK?\3le3[Խa1&'H5d"k-;,)75 $9nx )`'v4$ݹu;"P &I}EC4ρ\,ԓgs=2`0,.E(T\͖ہض0CHF]^v*XHLaA骸jB>x#x[mY}9y` =6E6n=;ԧ%vEZC1؄u}Q7'5qWqɘҞZdv}j51ruȈjEfΒu'[oIoX]i*SK{lOW`q Q4G=u"U?j9kZ?#x085Y$@:g_;I mP>!JA[nnT5fgr|R"r?0z0b a0  *H  01 0 UUS10U Washington10URedmond10U Microsoft Corporation1200U)Microsoft Root Certificate Authority 20110 110708205909Z 260708210909Z0~1 0 UUS10U Washington10URedmond10U Microsoft Corporation1(0&UMicrosoft Code Signing PCA 20110"0  *H 0 r.nM4X!B*kZP8I 7k 8™91BӉ yd~`$lIh^ߛS ,ï٩+z זY`fv2R&/PϳD].uhm:\F8dnd5xc-@ \yI) w=+ZMV(zr:I^C{{>]O/Y;-3Xŷ>2ӳ=8~ҝ,NV!5%9ndS#_R!t%_('(8%9J6|#faj(I_%]!K>RĵW?$z[/#p]QFwἬ_UK9#ID|Erzr$߿FWۃMI0[ݰf{KI)(}gbx_/W\w((m(,@7OD LԥC/tnx X,]`>O3ڰޞNFlֈ 00 +70UHndPӂ77"mu0 +7  SubCA0 U0U00U#0r-:1CN1#40ZUS0Q0OMKIhttp://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl0^+R0P0N+0Bhttp://www.microsoft.com/pki/certs/MicRooCerAut2011_2011_03_22.crt0U 00 +7.00?+3http://www.microsoft.com/pkiops/docs/primarycps.htm0@+042 Legal_policy_statement. 0  *H  g򆥘Ty.tg" cB}y e_.,>rm? ;Gic"5]e}FPU |K.)=Եw9dD=xz#}t&F*Š hh.*?*kXIc inZF+;н5n%'(M= 2-[I9 ƭQEX82q'',: iYhnot@*(>?Mf Mo}Ev@*e]Rbc6'ͥ]cA[>wuaaA(e/\֡FY KH)ű?Ew5Ңzz"HG#kKux7yKֳ#hu i;0Lumc=ѝVNOW"x2!zA ?̤]WqVNHEBɛv[ HkymmjRs zP1n0j00~1 0 UUS10U Washington10URedmond10U Microsoft Corporation1(0&UMicrosoft Code Signing PCA 20113^%0  `He0 *H  10 *H  1  +70 +7 10  +70/ *H  1" }3GJ*C^2avr[0B +7 1402Microsofthttp://www.microsoft.com0  *H C *([(!;q׏ttjpޯ931i猀#d͚D g|e31V=FiT#GXSY%݈Y2- g/=H}{/ZDލ=B7-R> )m$q<٥AWVBO)Lh"nBNTkNv+,x^]Ky7<=>]M3,{@0 +710 *H 010  `He0Q *H  @<08 +Y 010  `He EK4ju*V3U/_p-K\HI20190328085928.463Z0Ф01 0 UUS10U Washington10URedmond10U Microsoft Corporation1%0#U Microsoft America Operations1&0$U Thales TSS ESN:49BC-E37A-233C1%0#UMicrosoft Time-Stamp Service<00٠36;0  *H  0|1 0 UUS10U Washington10URedmond10U Microsoft Corporation1&0$UMicrosoft Time-Stamp PCA 20100 181024211415Z 200110211415Z01 0 UUS10U Washington10URedmond10U Microsoft Corporation1%0#U Microsoft America Operations1&0$U Thales TSS ESN:49BC-E37A-233C1%0#UMicrosoft Time-Stamp Service0"0  *H 0 V54䣓HeiQQHFl ܏ÂK\">޷ڬEo-O v!7KW~!i! [ſOlth d[#-$ Pg 7Շp"TWU)V.Mr*L*%΀`bW t隈V,ͯi]/8QlR2'I~8͟l/De]Z=http://www.microsoft.com/pki/certs/MicTimStaPCA_2010-07-01.crt0 U00U% 0 +0  *H  ? !{Yߌ\bN!`σ'M]NY#,,r&sZ'ehZNr7n,͔``_v)W xɤ EWC&q/'nr]ݠ+tw&_M{ 4%T!nK}$Ҩ.8!Y3gwOfN|ZV9/T!\F0q0Y a *0  *H  01 0 UUS10U Washington10URedmond10U Microsoft Corporation1200U)Microsoft Root Certificate Authority 20100 100701213655Z 250701214655Z0|1 0 UUS10U Washington10URedmond10U Microsoft Corporation1&0$UMicrosoft Time-Stamp PCA 20100"0  *H 0  w: iktTե |hK,_av>f+[S'1A |a0Y0D`TC M8Bݓs0W&E GͿ$`2X`FXG2tag_TϓLĦ]an(aF'$gr!KdPb]w=WuBM@Q>gfD~Knʱz* 1N5xhttp://www.microsoft.com/pki/certs/MicRooCerAut_2010-06-23.crt0U 00 +7.00=+1http://www.microsoft.com/PKI/docs/CPS/default.htm0@+042 Legal_Policy_Statement. 0  *H  Q ?q=!o1Wm0fjxǨ%kTW+QDS`v@@A\\^5$VKtBȯ7}Z?yJR8/ye٩kzoK0D$"<Y)p2J'U/3b_W@ΙfjbJ &9Jqc{!mÜ<}jxm8ؔƥ B"8 %d~cY%z.9Wvqa˚Gͧ};q ]t"aڰPo1:eGxHr~akow˧ 9؂r*T9[ Uzs;-3.)/T'!ȬN(ۖBAM*f0ӻt2Kc{/!YDN f3$d Pz\"eO5L$]~l N1ӊ$ B1| 4L`&c Vʃ^ CH.1 0 00|1 0 UUS10U Washington10URedmond10U Microsoft Corporation1&0$UMicrosoft Time-Stamp PCA 201036;0  `HeJ0 *H  1  *H  0/ *H  1" WX)pNZCpb.t(W0 *H  /1000 ?">w5>Q !+ #/.00~0|1 0 UUS10U Washington10URedmond10U Microsoft Corporation1&0$UMicrosoft Time-Stamp PCA 201036;0" Oi]r`RL! Yދ90  *H  _Ni񕕲p1 ]ZҝDPqox[Ct_ӼBks57(*!H);