KGRKJGETMRETU895U-589TY5MIGM5JGB5SDFESFREWTGR54TY
Server : Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.2.12
System : Windows NT SERVER-PC 10.0 build 26200 (Windows 11) AMD64
User : ServerPC ( 0)
PHP Version : 8.2.12
Disable Function : NONE
Directory :  C:/Windows/System32/en-US/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Current File : C:/Windows/System32/en-US/msv1_0.dll.mui
MZ����@���	�!�L�!This program cannot be run in DOS mode.

$A[=�:S�:S�:S�|���:S�|�Q�:S�Rich:S�PEL���j�!&d

��l@ |a8.rdata�@@.rsrc|a b@@���j
lPP���j$����8.rdata8.rdata$voltmdP�.rdata$zzzdbg `.rsrc$01`!(`.rsrc$02 �JyQ�Lo�L�ֶ���Bc�jkJ���$���j0�0�N�H�`�x�@���������	�			 X!��1���1�K��}��MOFDATAMSV1_0MUIFOMB�pDS}�TR�B?��B�	!�0(K��&&@�$
0/@��l0-�1�����	Ie@ȣ�x�D��6�D���	'����&��	P�%(cD�E� �bo,�E8q���A�c����{HT����MN�ŕxTaO`�
 Z����	<^�c�P���Y���P��D"��u d�'�S���P^
�r
)D�^ar��,4	C�O����[&��BD;���,%z�(D8&1�ax��q��0#�D��u�h&hR��8��chQ��������H�	� ���Ώ� �ə��]�~���YBg+�G���l��H`�M�~ ?��;�/l8�
���A�T��d��p��`��pb�����E9�#�]!B]R:B!S�'�����T��AA:0D���LP�x��8ķ���P�w_���i�!v<���ucz�x�q�O��$�s���K�{�1��M �Kș�z�5h�P#D=�(a�Gz��QJ��@7w�ap)��!zؒ����4�`��Q�?|�1P��c�8�XO��Yȷ c�8�ň��1X��6��젞l|~y���N����Pan<�6�I���م��)e������:s��� B�aPG�!J���?^0ܓ?�i|g8<,(�#fr�^�|�a����P����q��oQ�`��1���پh����c����������F�C��F��f�/��<�Cs�c8>-> �oq:�ᱱ1�����D�~��s���F�q�� x�7�	��`�y�|��G��{_�q�B�'hG���#ゎ}�OL!�#~�`;@�$���#� q�>A0��/����zd��Y8\F�Qp��?�`��c��u�
�Or�:�X�
��u�*����Y`����%� ѣ����'�Wu���G������ZN�}	��!C#�����H��9���I��{N�ap�Y�5�c3ȁ=�!�cĝRnh����Ts��Ɲ��p�Ƙ5xO�5`�?j6�ñkX28ܨ��Ҩq7`q���S�����>�| �	B�`P7��0�����^�6^q��*�B[�]ssHQN��Q�@G�E!JP>�Ā��46�?hC8���<.�仑����0�u��ot�`�'��Q�Ʌ�)g��$�1��$,��'	��w�ǰ��\ ij~,x�8��cA�,i�0��$p9�8	�k>��`�|������3��0�e�ʀ9��a��I�)��!3��`ŃP\ԙ�|
��I�_�����'hIV���[F�A�}�`a_�}b�=��ށ�����C&=�[�	,�{�4!|�|�d��1��4=�#ŀ�1���`,Å
"l�0�3�Qw�Ǹ��t^F|g�g ��?�MƠ�'	��p����%��:_����[�C~T��{Z�C�`�u��3.���s��:�����L��=i��p:#�9`����,��������0CC���xL������x��t�e‡-��c3ȁ=��!�#��#F3��
m{4P��aaFI�>_�ᜍ1=j�F<j�۱w�i�����?fD���Ӄd�����br�a��b����2��$��g�g�������p�
�N ��l��C!8qO�l�F;_����gp����G�`�q~��B�>e�4�������~��#��p��k8b� ��71#���!ij�<rx�/�>���q
�y	3�g�ܗ�u�p9j̭wpn��Q6�����;9����5,n�����Ԁ1��-�p�-����"0�1젧����'vD>n��9�sz��ry'Py���c!?��p�6BaP��gT�=�'
��s�2�;G0c��Uw��_��ĢN�XE_��
�G��ħ~2�t��a��;�ρ
7�y�`#�3E�+~'�Ԇ;'x��>�<�Y!��=�?V��=��P�q�����D�T|h��
6ߨ�ۙ��Ғh !#<�x��o�F~^ah�C,O"n�OÞK(�!��p�;�g�0��_�B=�r��wx$6���qg�I$8�pf�w	�3D���CC�3�����;���#��)���0�qH���`��cO$�{�4D�#�E�83y40J��l����
��kfTQ�.�C\P�It�4D�59�c��`�Z��c,�,�C���E,8c��E,�0�Y�,�c��ςa�g���`X�Y0,�,��]R�x�ǵwf����|2�\��w&�<�`o��$n<�}���PL԰,�6�
�,�Gz0����-
7Jߝ|[�i7m�Q���@�A((jX�Z�
`�r��O���'���=���Bɧ���x;_��� zP�(�Yp%�n�ǦA���Uwa���3:�w%,1��u��`R`�ۢ/�>P�i8G`[3�000�4pg�^)<wc=~���Z�����A� N ��Xk�O ���	�Gz4�<~{0F�!������
����ͮ����>(�i�Q���;π����q���
�:���Y;����q�e���e�����`�ۋ/���"8�qc����X��C������g�h���"��0�
,�9�0��2q�(pc��0<��L�hcC�
� �"�ǁ18z`�ళ��݂�#dװ����с}0���lt`<Q�K�5�H'*�r��;
��0��Y�
����8A}Lf�g
z����?S�W���59�����rD�:/���y�!N����������w����A���b�0�s�,�9��������>p�`p��j�c�s"
��0����;Ԁ#��I,�|1`�?����wd�?1�0GD�k�C*�9�u:�s���ƫ��x%�����)�G
�:+����I
���$��op�o~.:��X��n���10j`�r�/��,p��Y�@3>�3��>��p��y|\������I��pp���nd�>w�2༽�s�6����;��`<.��p��\�^���K|N���	�rǮv�n�������Q����g�9�f�<J|V�я����q���p�;.���x����Ap�NY0�C����7�Lȡ��U�:}Dp��g@�;�
o��re���j�<#��?a��l`�*lt\�t`���,����Nk`���ր��p���r !�������5�Q<��78�a=� ?�����
m��hԪA�e��S�1c���뉠�9?�@��Y#k���aJt��l T��K�(����s�3�V@XV- ,��i��3�m8Ba^D$�@�>U L�+��g#�|�!z_�nk ,���G��@�B�ar_"�}�L�?0�BD�
���X�+G 
"P��"
r�/B "�����e<�d� r0 ��="@d	.�Xd*�%"0G�#QQ���b r@ �J}6"�@4�
D���ဨ�'�����/BC$O

��h��q�D@��DB~7��c�A�P@T�%8�C�@T�[@j���j!2�0� u$ �J�i"@��@T�b �G��x��q~/(ym�1Aja��@D:����Q
�ă��h@T�L@�" ��P���Sѽ��]�E �%�k��.^���wy�����MOFDATAMUIen-USPP�pp���,d�e��-�-�����������������%�����*�����/A�C� 6Error

Warning

 Information

$Blocking NTLM

$Auditing NTLM

Max

8Microsoft-Windows-NTLM

PMicrosoft-Windows-NTLM/Operational

,NTLM authentication failed because the account was a member of the Protected User group.%n%nAccount Name:%t%1%nDevice Name:%t%2%nError Code:%t%3

�NTLM authentication failed because access control restrictions are required.%n%nAccount Name:%t%1%nDevice Name:%t%2%nError Code:%t%3%n%nAuthentication Policy Information:%n%tSilo Name:%t%4%n%tPolicyName:%t%5

 NTLM authentication succeded, but it will fail when Authentication Policy is enforced because access control restrictions are required.%n%nAccount Name:%t%1%nDevice Name:%t%2%nError Code:%t%3%n%nAuthentication Policy Information:%n%tSilo Name:%t%4%n%tPolicyName:%t%5

�NTLM client blocked: Outgoing NTLM authentication traffic to remote servers that is blocked.%nTarget server: %1%nSupplied user: %2%nSupplied domain: %3%nPID of client process: %4%nName of client process: %5%nLUID of client process: %6%nUser identity of client process: %7%nDomain name of user identity of client process: %8%nMechanism OID: %9%n%nNTLM authentication requests from this computer are blocked.%n%nIf you want to allow this computer to use NTLM authentication, set the security policy Network Security: Restrict NTLM: Outgoing NTLM traffic to remote servers to Allow all.%n%nIf you want only the target server %1 to accept NTLM authentication requests from this computer, set the security policy Network Security: Restrict NTLM: Outgoing NTLM traffic to remote servers to Deny all and then set the security policy Network Security: Restrict NTLM: Add remote server exceptions and list the target server %1 as an exception to use NTLM authentication.

�NTLM server blocked: Incoming NTLM traffic to servers that is blocked%nCalling process PID: %1%nCalling process name: %2%nCalling process LUID: %3%nCalling process user identity: %4%nCalling process domain identity: %5%nMechanism OID: %6%n%nNTLM authentication requests to this server have been blocked.%n%nIf you want this server to allow NTLM authentication, set the security policy Network Security: Restrict NTLM: Incoming NTLM Traffic to Allow all.

�NTLM server blocked in the domain: NTLM authentication in this domain that is blocked%nUser: %1%nDomain: %2%nWorkstation: %3%nPID: %4%nProcess: %5%nLogon type: %6%nInProc: %7%nMechanism: %8%n%nNTLM authentication within the domain %2 is blocked.%n%nIf you want to allow NTLM authentication requests in the domain %1, set the security policy Network Security: Restrict NTLM: NTLM authentication in this domain to Disabled.%n%nIf you want to allow NTLM authentication requests only to specific servers in the domain %1, set the security policy Network Security: Restrict NTLM: NTLM authentication in this domain to Deny for domain servers or Deny domain accounts to domain servers, and then set the security policy Network Security: Restrict NTLM: Add server exceptions in this domain to define a list of servers in this domain as an exception to use NTLM authentication.

,NTLM Minimum Client Security Block:%nCalling process PID: %1%nCalling Process Name: %2%nNegotiated Security Flags: %3%nMinimum Security Flags: %4

,NTLM Minimum Server Security Block:%nCalling process PID: %1%nCalling Process Name: %2%nNegotiated Security Flags: %3%nMinimum Security Flags: %4

pNTLM client used the domain password. The attempt to use the DC-generated NTLM secret failed, and fallback to the domain password succeeded.%nAccount Name:%t%1%nDevice Name:%t%2%n

 Attempt to use NTLMv1 failed.%n%nTarget server: %1%nSupplied user: %2%nSupplied domain: %3%nPID of client process: %4%nName of client process: %5%nLUID of client process: %6%nUser identity of client process: %7%nDomain name of user identity of client process: %8%nMechanism OID: %9%n%nThis device does not support NTLMv1. For more information, see https://go.microsoft.com/fwlink/?linkid=856826.

Attempt to get credential key by call package blocked by Credential Guard.%n%nCalling Process Name: %1%nService Host Tag: %2

LNTLM client blocked: Outgoing NTLM authentication traffic to remote servers that is blocked.%nTarget server: %1%nSupplied user: %2%nSupplied domain: %3%nPID of client process: %4%nName of client process: %5%nLUID of client process: %6%nUser identity of client process: %7%nDomain name of user identity of client process: %8%nMechanism OID: %9%n%nAn application on this computer attempted NTLM for authentication but the application explicitly blocks NTLM usage. Using an IP address or local user credentials from a remote computer may lead to an NTLM authentication attempt. This event does not mean that NTLM is blocked for all authentication attempts from this computer.

(This machine attempted to authenticate to a remote resource via NTLM.%n%nProcess Information:%n%tProcess Name: %1%n%tProcess PID: %2%n%nClient Information:%n%tUsername: %3%n%tDomain: %4%n%tHostname: %5 %n%tSign-On Type: %6%n%nTarget Information:%n%tTarget Machine: %7%n%tTarget Domain: %8%n%tTarget Resource: %9%n%tTarget IP: %10%n%tTarget Network Name: %11%n%nNTLM Usage:%n%tReason ID: %12%n%tReason: %13%n%nNTLM Security:%n%tNegotiated Flags: %14%n%tNTLM Version: %15%n%tSession Key Status: %16%n%tChannel Binding: %17%n%tService Binding: %18%n%tMIC Status: %19%n%tAvFlags: %20%n%tAvFlags String: %21%n%nFor more information, see aka.ms/ntlmlogandblock

�A remote client is using NTLM to authenticate to this workstation.%n%nProcess Information:%n%tProcess Name: %1%n%tProcess PID: %2%n%nRemote Client Information:%n%tUsername: %3%n%tDomain: %4%n%tClient Machine: %5%n%tClient IP: %6%n%tClient Network Name: %7%n%nNTLM Security:%n%tNegotiated Flags: %8%n%tNTLM Version: %9%n%tSession Key Status: %10%n%tChannel Binding: %11%n%tService Binding: %12%n%tTarget Machine: %13%n%tTarget Domain: %14%n%tMIC Status: %15%n%tAvlFlags: %16%n%tAvlFlags String: %17%n%nStatus: %18%nStatus Message: %19%n%nFor more information, see aka.ms/ntlmlogandblock

4Auditing an attempt to use NTLMv1-derived credentials for Single Sign-On. %n%nTarget server: %1%nSupplied user: %2%nSupplied domain: %3%nPID of client process: %4%nName of client process: %5%nLUID of client process: %6%nUser identity of client process: %7%nDomain name of user identity of client process: %8%nMechanism OID: %9%n%nFor more information, see https://go.microsoft.com/fwlink/?linkid=2321802.

TAn attempt to use NTLMv1-derived credentials for Single Sign-On was blocked due to policy.%n%nTarget server: %1%nSupplied user: %2%nSupplied domain: %3%nPID of client process: %4%nName of client process: %5%nLUID of client process: %6%nUser identity of client process: %7%nDomain name of user identity of client process: %8%nMechanism OID: %9%n%nFor more information, see https://go.microsoft.com/fwlink/?linkid=2321802.

�NTLM client blocked audit: Audit outgoing NTLM authentication traffic that would be blocked.%nTarget server: %1%nSupplied user: %2%nSupplied domain: %3%nPID of client process: %4%nName of client process: %5%nLUID of client process: %6%nUser identity of client process: %7%nDomain name of user identity of client process: %8%nMechanism OID: %9%n%nAudit the NTLM authentication requests from this computer that would be blocked by the target server %1 if the security policy Network Security: Restrict NTLM: Outgoing NTLM traffic to remote servers is set to Deny all.%n%nIf you want all servers to accept NTLM authentication requests from this computer, set the security policy Network Security: Restrict NTLM: Outgoing NTLM traffic to remote servers to Allow all.%n%nIf you want only the target server %1 to accept NTLM authentication requests from this computer, set the security policy Network Security: Restrict NTLM: Outgoing NTLM traffic to remote servers to Deny all, and then set the security policy Network Security: Restrict NTLM: Add remote server exceptions and list the target server %1 as an exception to use NTLM authentication.

�NTLM server blocked audit: Audit Incoming NTLM Traffic that would be blocked%nCalling process PID: %1%nCalling process name: %2%nCalling process LUID: %3%nCalling process user identity: %4%nCalling process domain identity: %5%nMechanism OID: %6%n%nAudit NTLM authentication requests to this server that would be blocked if the security policy Network Security: Restrict NTLM: Incoming NTLM Traffic is set to Deny all accounts or Deny all domain accounts.%n%nIf you want this server to allow NTLM authentication, set the security policy Network Security: Restrict NTLM: Incoming NTLM Traffic to Allow all.

 NTLM server blocked in the domain audit: Audit NTLM authentication in this domain%nUser: %1%nDomain: %2%nWorkstation: %3%nPID: %4%nProcess: %5%nLogon type: %6%nInProc: %7%nMechanism: %8%n%nAudit NTLM authentication requests within this domain that would be blocked if the security policy Network Security: Restrict NTLM: NTLM authentication in this domain is set to Deny for domain servers or Deny domain accounts to domain servers.%n%nIf you want to allow NTLM authentication requests in the domain %1, set the security policy Network Security: Restrict NTLM: NTLM authentication in this domain to Disabled.%n%nIf you want to allow NTLM authentication requests to specific servers in the domain %1, set the security policy Network Security: Restrict NTLM: NTLM authentication in this domain to Deny for domain servers or Deny domain accounts to domain servers, and then set the security policy Network Security: Restrict NTLM: Add server exceptions in this domain to define a list of servers in this domain to use NTLM authentication.

�4VS_VERSION_INFO��
k�e
k�e?StringFileInfo�040904B0LCompanyNameMicrosoft Corporationt&FileDescriptionMicrosoft Authentication Package v1.0n'FileVersion10.0.26100.7019 (WinBuild.160101.0800)6InternalNameMSV1_0.DLL�.LegalCopyright� Microsoft Corporation. All rights reserved.FOriginalFilenameMSV1_0.DLL.MUIj%ProductNameMicrosoft� Windows� Operating SystemDProductVersion10.0.26100.7019DVarFileInfo$Translation	�PADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADD

Anon7 - 2021