DonatShell
Server IP : 180.180.241.3  /  Your IP : 216.73.216.252
Web Server : Microsoft-IIS/7.5
System : Windows NT NETWORK-NHRC 6.1 build 7601 (Windows Server 2008 R2 Standard Edition Service Pack 1) i586
User : IUSR ( 0)
PHP Version : 5.3.28
Disable Function : NONE
MySQL : ON  |  cURL : ON  |  WGET : OFF  |  Perl : OFF  |  Python : OFF  |  Sudo : OFF  |  Pkexec : OFF
Directory :  /Windows/SysWOW64/en-US/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ HOME SHELL ]     

Current File : /Windows/SysWOW64/en-US//netlogon.dll.mui
MZ@	!L!This program cannot be run in DOS mode.

$uEEELlDLl
DRichEPELA[J!	2Pb@0.rsrc@2@@8Ph?(@@~Xp					(	8	H	X	h	x	2T@n#&.+D-(=MOFDATAMOFRESOURCEMUIFOMB",DS}TƕB
ObńP\I&&@$
0/@l0-1(D" y`O{8C9 X42PCNe(H QĪ
DA3(o\A9)*A(%a|;
@PLpL$JBs-Uh&'b#@
·/(D.)N"J29DA3&HQLPx8Vg)">:
tN'@c$}\C	x\w0Щt.@zZy%F959}~Aܧq<'ca-:@GQRhc'Ă80`+̱xXk	r#x>x3~~Bw3dO|<x=cԢē@{6SOg! !!Aghb	<#d7GCÜȸ^"Ϲ77371(uV1QDpst#Ǚ $/=Aso-0o3D:م^s|MsNCĝ?YŃ|1	V|0{W)	42qJh?%!ՈA=Clg
8p*0^}
Xyb˂AYڧ/?Á¸[`s؇?B5]E4k@=Z={`\1?-S 7AzH8=iO
=NN@@ސNy@135,\gpxqhMàag,<=S8i+|e:,>4!-C= %(?	x}SAN'e=tRy<'\ܱ /ؓ8C829bFegpMx?< !oʸ9C	>=blqPsQlΈSJQ9@N,ب7
B#>x䏋p=ܑ0n0;؃2wĀ?PN7<0u<qŝi8c<
#
8~Zpо0أ`
?*0q0ު{,	K9fsy&6Ɲz#1_	Oh;Kx;g|bjpubNp]ЦOFQA>3H`
c<
aAhǁ@,
Bca}0iW	Rb1a@(@4&IQY~XG"0Y,D@DQюX4Y+B@	"`b	JM?PA63S&D08/7D(=6+iMOFDATAMUIen-US
ParametersGroup PolicyNetlogonTMaintains a secure channel between this computer and the domain controller for authenticating users and services. If this service is stopped, the computer may not authenticate users and services and the domain controller cannot register DNS records. If this service is disabled, any services that explicitly depend on it will fail to start.Netlogon Service (RPC)Netlogon Service (NP-In)Netlogon Service (RPC-EPMAP)IInbound rule for the NetLogon service to be remotely managed via RPC/TCP.NInbound rule for the NetLogon service to be remotely managed over Named Pipes.UInbound rule for the RPCSS service to allow RPC/TCP traffic for the NetLogon service.Netlogon ServiceNetlogonNetlogon3Counters for measuring the performance of Netlogon.Semaphore WaitersSemaphore Waiters<Number of thread currently waiting to acquire the semaphore.Semaphore HoldersSemaphore Holders1Number of thread currently holding the semaphore.Semaphore AcquiresSemaphore AcquiresThe total number of times the semaphore has been acquired over the lifetime of the Secure Channel connection (or since system boot for _Total).PASemaphore TimeoutsSemaphore TimeoutsThe total number of times a thread has timed out waiting for the semaphore over the lifetime of the Secure Channel connection (or since system boot for _Total).Average Semaphore Hold TimeAverage Semaphore Hold TimeFThe average amount of time the semaphore is held over the last sample.Semaphore Hold Time BaseSemaphore Hold Time BaseAThe base value used to calculate the average semaphore hold time.NetlogonNetlogonPA3Netlogon is required for domain joined machines.  Maintains a secure channel between this computer and the domain controller for authenticating users and services. If this component is not installed, the computer may not authenticate users and services and the domain controller cannot register DNS records.TMaintains a secure channel between this computer and the domain controller for authenticating users and services. If this service is stopped, the computer may not authenticate users and services and the domain controller cannot register DNS records. If this service is disabled, any services that explicitly depend on it will fail to start.PAThis feature is used to maintain a secure channel between domain clients and a domain controller for authenticating users and services. (Uses RPC)PP@ppx DDWarning

 Information

$Blocking NTLM

$Auditing NTLM

Max

PMicrosoft-Windows-Security-Netlogon

Domain Controller Blocked: NTLM authentication to this domain controller is blocked.%nSecure Channel name: %1%nUser name: %2%nDomain name: %3%nWorkstation name: %4%nSecure Channel type: %5%n%nNTLM authentication within the domain %3 is blocked.%n%nIf you want to allow NTLM authentication requests in the domain %3, set the security policy Network Security: Restrict NTLM: NTLM authentication in this domain to Disabled.%n%nIf you want to allow NTLM authentication requests only to specific servers in the domain %3, set the security policy Network Security: Restrict NTLM: NTLM authentication in this domain to Deny for domain servers or Deny domain accounts to domain servers, and then set the security policy Network Security: Restrict NTLM: Add server exceptions in this domain to define a list of servers in this domain as an exception to use NTLM authentication.

Domain Controller Blocked Audit: Audit NTLM authentication to this domain controller.%nSecure Channel name: %1%nUser name: %2%nDomain name: %3%nWorkstation name: %4%nSecure Channel type: %5%n%nAudit NTLM authentication requests within the domain %3 that would be blocked if the security policy Network Security: Restrict NTLM: NTLM authentication in this domain is set to any of the Deny options.%n%nIf you want to allow NTLM authentication requests in the domain %3, set the security policy Network Security: Restrict NTLM: NTLM authentication in this domain to Disabled.%n%nIf you want to allow NTLM authentication requests to specific servers in the domain %3, set the security policy Network Security: Restrict NTLM: NTLM authentication in this domain to Deny for domain servers or Deny domain accounts to domain servers, and then set the security policy Network Security: Restrict NTLM: Add server exceptions in this domain to define a list of servers in the domain %3 to which clients are allowed to use NTLM authentication.

4VS_VERSION_INFO@@?StringFileInfo040904B0LCompanyNameMicrosoft CorporationVFileDescriptionNet Logon Services DLLl&FileVersion6.1.7600.16385 (win7_rtm.090713-1255):
InternalNameNetLogon.DLL.LegalCopyright Microsoft Corporation. All rights reserved.JOriginalFilenameNetLogon.DLL.MUIj%ProductNameMicrosoft Windows Operating SystemBProductVersion6.1.7600.16385DVarFileInfo$Translation	PADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADD

Anon7 - 2022
AnonSec Team