DonatShell
Server IP : 180.180.241.3  /  Your IP : 216.73.216.252
Web Server : Microsoft-IIS/7.5
System : Windows NT NETWORK-NHRC 6.1 build 7601 (Windows Server 2008 R2 Standard Edition Service Pack 1) i586
User : IUSR ( 0)
PHP Version : 5.3.28
Disable Function : NONE
MySQL : ON  |  cURL : ON  |  WGET : OFF  |  Perl : OFF  |  Python : OFF  |  Sudo : OFF  |  Pkexec : OFF
Directory :  /Windows/SysWOW64/en-US/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ HOME SHELL ]     

Current File : /Windows/SysWOW64/en-US//cipher.exe.mui
MZ@	!L!This program cannot be run in DOS mode.

$uEEELlDLl
DRichEPEL[J!	L`f@8J.rsrcPL@@(@Xp			EVMUI'ؔjzUƭj61BMUIen-USLtTI\PZ[OK]

[ERR]



 Listing %1

 New files added to this directory will be encrypted.





 Listing %1

 New files added to this directory will not be encrypted.





Of %1 file(s) within %2 directorie(s)

%3 are encrypted and %4 are not encrypted.



t

 Setting the directory %1 to encrypt new files %0



@

 Encrypting files in %1



@

 Encrypting files in %1





%1 file(s) [or directorie(s)] within %2 directorie(s) were encrypted.



|

 Setting the directory %1 not to encrypt new files %0



@

 Decrypting files in %1



@

 Decrypting files in %1





%1 file(s) [or directorie(s)] within %2 directorie(s) were decrypted.



(Out of memory.

$[Skipping %1]

%1!-*s!%0

%1

l%1: The file system does not support encryption.

to 1 %0

HInvalid drive specification: %1

Error finding user certificate in Active Directory Domain Services

4Invalid Parameter: %1



EFS certificate thumbprint for computer %1:

 

  %2

    

T

Encrypted File(s) on your system:



<%1: Encryption updated.



Converting files from plaintext to ciphertext may leave sections of old

plaintext on the disk volume(s). It is recommended to use command

CIPHER /W:directory to clean up the disk after all converting is done.

xPlease type in the password to protect your .PFX file:

XPlease retype the password to confirm:

tPasswords do not match. No certificate is generated.

8Overwrite %1? (Yes/No):

YN

\Your .CER file was created successfully.

\Your .PFX file was created successfully.

 Writing %1

To remove as much data as possible, please close all other applications while

running CIPHER /W.

0x00

0xFF

(Random Numbers

There is no local EFS certificate that is used to encrypt this file. No

local EFS certificate is backed up.

There is no local current EFS certificate to be backed up.

Your certificate(s) and the corresponding key(s) are being backed up. If you didn't start the process, press CANCEL. Press OK to confirm.

pEFS certificate(s) is(are) backed up successfully.

HEFS certificate backup failed.

HEFS certificate and key backup.

TPlease type the backup PFX file name.

Output PFX file path too long. Make it shorter and try again.

<  Users who can decrypt:

    %1 

4  No User found.

  

Unknown

T    Certificate thumbprint: %1

     

<  Recovery Certificates:

T  No recovery certificate found.

  

h  Key information cannot be retrieved.

      

  Key Information:

    Algorithm: %1

    Key Length: %2!d!

    Key Entropy: %3!d!

        

<  Compatibility Level:  

0    Windows 2000



D    Windows XP/Server 2003



H    Windows Vista/Server 2008



(    Windows 7



4    Unknown Version



l

 Adding user to files in encrypted folder %1



X

 Adding user to encrypted folder %1



X

 Adding user to files in folder  %1





User was added to %1 file(s) [or directorie(s)] within %2 directorie(s).



t

 Removing user from files in encrypted folder %1



`

 Removing user from encrypted folder %1



`

 Removing user from files in folder  %1





User was removed from %1 file(s) [or directorie(s)] within %2 directorie(s).



U %1

E %1

x

 Updating EFS KEY from files in encrypted folder %1



h

 Updating EFS KEY from encrypted folder %1



d

 Updating EFS KEY from files in folder %1





EFS KEY was updated on %1 file(s) [or directorie(s)] within %2 directorie(s).



)Displays or alters the encryption of directories [files] on NTFS partitions.



  CIPHER [/E | /D | /C] 

         [/S:directory] [/B] [/H] [pathname [...]]

  

  CIPHER /K [/ECC:256|384|521]

  

  CIPHER /R:filename [/SMARTCARD] [/ECC:256|384|521]

  

  CIPHER /U [/N]

  

  CIPHER /W:directory

  

  CIPHER /X[:efsfile] [filename]

  

  CIPHER /Y

 

  CIPHER /ADDUSER [/CERTHASH:hash | /CERTFILE:filename | /USER:username]

         [/S:directory] [/B] [/H] [pathname [...]]



  CIPHER /FLUSHCACHE [/SERVER:servername]

 

  CIPHER /REMOVEUSER /CERTHASH:hash

         [/S:directory] [/B] [/H] [pathname [...]]



  CIPHER /REKEY [pathname [...]]



    /B        Abort if an error is encountered. By default, CIPHER continues 

              executing even if errors are encountered.

    /C        Displays information on the encrypted file.

    /D        Decrypts the specified files or directories.

    /E        Encrypts the specified files or directories. Directories will be

              marked so that files added afterward will be encrypted. The

              encrypted file could become decrypted when it is modified if the

              parent directory is not encrypted. It is recommended that you

              encrypt the file and the parent directory.

    /H        Displays files with the hidden or system attributes. These files

              are omitted by default.

    /K        Creates a new certificate and key for use with EFS. If this

              option is chosen, all the other options will be ignored.



              Note: By default, /K creates a certificate and key that conform

                    to current group policy. If ECC is specified, a self-signed

                    certificate will be created with the supplied key size.



    /N        This option only works with /U. This will prevent keys being

              updated. This is used to find all the encrypted files on the

              local drives.

    /R        Generates an EFS recovery key and certificate, then writes them

              to a .PFX file (containing certificate and private key) and a

              .CER file (containing only the certificate). An administrator may

              add the contents of the .CER to the EFS recovery policy to create

              the recovery key for users, and import the .PFX to recover

              individual files. If SMARTCARD is specified, then writes the

              recovery key and certificate to a smart card. A .CER file is

              generated (containing only the certificate). No .PFX file is

              generated.



              Note: By default, /R creates an 2048-bit RSA recovery key and

                    certificate. If ECC is specified, it must be followed by a

                    key size of 256, 384, or 521.



    /S        Performs the specified operation on the given directory and all

              files and subdirectories within it.

    /U        Tries to touch all the encrypted files on local drives. This will

              update user's file encryption key or recovery keys to the current

              ones if they are changed. This option does not work with other

              options except /N.

    /W        Removes data from available unused disk space on the entire

              volume. If this option is chosen, all other options are ignored.

              The directory specified can be anywhere in a local volume. If it

              is a mount point or points to a directory in another volume, the

              data on that volume will be removed.

    /X        Backup EFS certificate and keys into file filename. If efsfile is

              provided, the current user's certificate(s) used to encrypt the

              file will be backed up. Otherwise, the user's current EFS

              certificate and keys will be backed up.

    /Y        Displays your current EFS certificate thumbnail on the local PC.

    /ADDUSER  Adds a user to the specified encrypted file(s). If CERTHASH is

              provided, cipher will search for a certificate with this SHA1

              hash. If CERTFILE is provided, cipher will extract the

              certificate from the file. If USER is provided, cipher will

              try to locate the user's certificate in Active Directory Domain

              Services.

    /FLUSHCACHE

              Clears the calling user's EFS key cache on the specified server.

              If servername is not provided, cipher clears the user's key cache

              on the local machine.

    /REKEY    Updates the specified encrypted file(s) to use the configured

              EFS current key.

    /REMOVEUSER

              Removes a user from the specified file(s). CERTHASH must be the

              SHA1 hash of the certificate to remove.



    directory A directory path.

    filename  A filename without extensions.

    pathname  Specifies a pattern, file or directory.

    efsfile   An encrypted file path.



    Used without parameters, CIPHER displays the encryption state of the

    current directory and any files it contains. You may use multiple directory

    names and wildcards. You must put spaces between multiple parameters.

4VS_VERSION_INFO@@?StringFileInfo040904B0LCompanyNameMicrosoft CorporationXFileDescriptionFile Encryption Utilityl&FileVersion6.1.7600.16385 (win7_rtm.090713-1255).InternalNamecipher.LegalCopyright Microsoft Corporation. All rights reserved.FOriginalFilenameCIPHER.EXE.MUIj%ProductNameMicrosoft Windows Operating SystemBProductVersion6.1.7600.16385DVarFileInfo$Translation	PADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGX

Anon7 - 2022
AnonSec Team