Hacked By AnonymousFox

Current Path : C:/Windows/System32/
Upload File :
Current File : C:/Windows/System32/shgina.dll

MZ@	!L!This program cannot be run in DOS mode.

$?n9^j^j^j&j^j8k^j8k^j^j^j8k^j8k^j8	k^j8j^j8k^jRich^jPEL:!
.,0@


@Ap<{P|ppTTPt9.text,. `.data@2@.idataP
4@@.didatp`>@.rsrcpp@@@.relocTX@B@h@p-0P@,0p  0#P((*@)`)@+p+$&P+p@ PH!u.0P@Pp  0#$&P((@)`)*@+p++,p---.03P77PSHLWAPI.dll\
D{r<K<MJr<.aLf`
\}%"OLEAUT32.dllsamcli.dllnetutils.dllapi-ms-win-security-lsalookup-l2-1-0.dllADVAPI32.dllCSCAPI.dllFFForceGuestSYSTEM\CurrentControlSet\Control\LSAGuestSeDenyInteractiveLogonRightSeDenyNetworkLogonRightAdministratorEnableLUASoftware\Microsoft\Windows\CurrentVersion\Policies\SystemK<MJr<.aFhTQGs))>9DBZb3!:#$$	:
HHH	:P7RSDS<K&_N˒shgina.pdbGCTL4.rdata$brc4.CRT$XCA8.CRT$XCZ<.CRT$XIA@.CRT$XIAAD.CRT$XIZH.gfids.giats .rdata .rdata$sxdata$l.rdata$zzzdbgH!.text$mn8.xdata$xt9.didat$2T: .didat$3t:p.didat$4:.didat$6;t.didat$7p<{.edata@.data@p.bssP.idata$5P.00cfgPh.idata$2\R.idata$3pR.idata$4`Sz.idata$6`p.didat$5p.rsrc$01qp.rsrc$02U @3ʼnESVW] uEQ#uVjjP0`yQhjP hP5`CLPt	uPP$`x5SQP0NPVPqP֋M_^3[+]UQQSVY3W3qEPRqMEPjQ1N PV xIESuPq8Pօx.PqP֋EEPqPEVpP֋E_^[]USVW3ы;FuZ}rEPurxeEMQjP0N PV xDESuPq8Pօx)PqP֋EPqPE]x*u3uuN(SPV(SqP֋QpP֋뺸_^[]USVuىU3W;GAu{?u-Ws0SPօ#PqPփe{e}sEPusExqEMQjP0N PV xJE{WuPq8Pօx/PqP֋E?PqP֋E}EE}x_jj(`u 7uuN,uuusWPV,WEqP֋EQpP֋?돸_^[]̋UVEtU^]WOtVQpPփg^_̋UMA@A]̋UMIA
dC3]̋USVu@W}&3ɋ;uAu3ɋ;uAuMQpP3_^[]̋UU3VW
9Mu(u,D;uAuM@_^]̋U}t	dC
dC3]UQS]VM#3;uFu3ɋ;uQAujj(PP0Pt"uWx@dC_3%@^[]UeEVj^PEuPEPhhhhPȅuDj
Y9uuEtu?3ɃE379uu)j0Xj1Zf;Etf;Uu3f;UՁuj
Y~	Ɂ^]UQQVj@@`t3Oj@`tCj@`u7!EEPEEPjhhh<`u
EH#^]̋UMIA WytVjpP^3_]̋Uuuhtu8`]̋UE3]̋UE }uMUPI]̋UuMuUuIuf]̋Uu(Mu$Uu IuuuuD]$̋U(@3ʼnEVut7jXfEPEEPDPtEPhl,`F3WM3^]UEW3U8EPjWd`ESpPEPEPPj@<P؅EupPPSPtWEωEMt3VEQpPuSPȋMAM;r֋E3^PSPMEPS8PPuX`[_]UQV3W95\Cu-EPuM\C
t	u8P\Cuj^_^]ËU@3ʼnE=XCSV3Wfpj[DžPPE3PPPWP`u^jD^VEWPdPPEPPEPhTWL`tEPPtXftNPPx?Pj@<Pt,P 
xκXC3
tV8P_^[MXC3x]̋U8S]V3uu9uu
@W|OMQjPVh`:E@-3G}"jY3}EEPh3ҍEPRUU`PPMEPEPuu`PP}9Evttmt+Pwjh`jjPuE1t)PwjhjjPu
Emu}W`	F#u`}u}t3j^}}t	uX`~	Ef8_^[]̋Uh@3ʼnESVuWu5EPjWjh`؅!ES`ujWS``؅jY}EEPhEPS`PP؅M؅t@jYj6Xj8fE}XfE`EjEEPSuu`PPutBjYj.Xj0fE}XfEEjEEPjuu`u	PP؍C#u`uX`j[~	ہM_^3[/
]̋Uh@3ʼnEESVuEWu7jY3}EEPhEPj`PP؅M؅t?jYj6Xj8fE}XfE`EjEEPuu`PPutCjYj.Xj0fE}XfEEjEEPuu`u	PP؋uu`uHtJujX3MURPQ1N PV Mx3f+E#MuHt<MQjPjh`؅u,ESHujPS``uX`j[~	ہM_^3[[]̋UQQWE3PhGWjhPx>EUVRPqPօx39EEPqP^EO_f3]̋UQWEPhjjhPx3M3f9EV1PQNPVEPqP^_]̋UP3ɅEIf3]̋UQVu3!EPfEP`u9Etf3^]U8@3ʼnE=TCPDžPDžPEPPPjP`tRVWPPx?Pj@<Pt,PxκTC3
tV8P_^8PMTC3	]̋UVW}3u
@ESjYt?;tt6WdhTuD`uhuD`u΋E+tuujYPf,`G[_^]̋UQEPQQx
UMf]̋UQQSVW3f}3WEEPWjWWWhSxPu)jEPjWhu|P9]t	utP~	_^[]̋UVlF$
dCEt1^]UQSVWjjM(PP0Pt/gGGlG$GdC3t(Vu0WP֍O؋QrP_^[]̃l$Ut+EVW+t<ftf9Nu_^uҁ3fz]U3tvWxQuQ	t3f]tQj(PP,P̡̋UVdCM,3ҋ;uBuuUE 
dC^]39dCËUEV3+tuMuVPP5`C;9uu65\C8P5XC5\C8P5TC5XC8P5TC3@^]U5u5P5uhP]hPlChCYu@Ã 3ËU}SVW@dH3ۣ@pCd]PʉU33G;thPU3u}=tCt
jY\lCEth5hCu;r:MtPUlC
hC;uE9Mt͋‰MEPP3hCYlCGpCtC9]33G9}d3ۉ]pCPU;thPU3u}9tCj[t	j5hDh<=tCAYYt3Xh8h4YtC}Yu3=xCt&hxCYtu5xCSuP@_^[]̋U}u] Ucsm9Eu
uP,YY]3]j,h8E3uEw@}u=@uu9Et	=|CtNE}u
@uuuP׉EMEQPIYYËe3uu}EuuuEMEQPYYËe3uu}EuuuEMEQPYYËe3uu}}EVVuMEQP}YYËe3uEVVu]MEQPNYYËe3u=|Ct4EVVuPMEQPYYËe3uEt	EuuuEMEQPYYËe3uu=|CtG=@t>EuuuP׉EMEQPyYYËe3uuEE}w
@ËUVu3;usWu>t
P׃;ur_^];
@u*UjPu Ph	`PPdP]ËU$A
AAA5A=Af0Af
$AfAf@f%@f-@(AEAE AE,Ah@ A$@@	@(@jXkǀ,@jX
@,@jX
@,@jXk
@LjX
@Lh]%P%P̋UE3SVWH<AYt}p;r	H;r
B(;r3_^[]̋UjhX9hP7dPSVW@1E3PEdeEhztTE-PhPt:@$ЃEMd
Y_^[]ËE3Ɂ8ËeE3Md
Y_^[]̋UMMZf9uA<8PEuf9Hu]3]ËUee@VWN@;tudEPPE3EEXP1E\P1EP3EM3EEPlPE3E3E;t5@uO@ȉ
@_@^]%PhP7d5D$l$l$+SVW@1E3PeuEEEEdËMd
Y__^[]Q̋Uuuuuh3h@]%P@`QRPht9ZY<`8`D`0`QRPh9lZY$`(`,`d`QRPh93ZYX`QRPh9ZYP`QRPh9ZYL`h````QRPh:ZY``````QRPh4:wZY%PR3L1`111112,2G2[22222303554C8`:;@8C$`:<P<C``:$<`@CX`:,<pDCL`:4<HC`t:H<LC`:d<x;;;h;;;;:.;;;V;:D;SHGetValueWNetUserModalsGetNetApiBufferFreeLookupAccountSidWLookupAccountNameWNetUserGetInfo!NetUserSetInfoLsaOpenPolicyLsaEnumerateAccountRightsLsaFreeMemoryLsaCloseLsaRemoveAccountRightsLsaAddAccountRightsOfflineFilesQueryStatus:<<<<<--<<SHGINA.dllDllCanUnloadNowDllGetClassObjectSHUNIMPL.#187N@DTlXTXTRU6UTUTTFTWSUUUpUUUSSSTTW.UUU,TTTTTlT|TSS`SS|SnSX2X78SSPRVLPR2VtPpRVVPSvVPRV8PRVPRVPRW(PS&WPRHWXPRrWlPSWPRWDPSXPXSJXPRXPxRXPTlXTXTRU6UTUTTFTWSUUUpUUUSSSTTW.UUU,TTTTTlT|TSS`SS|SnSX2Xo_XcptFilter_amsg_exitfreemalloc_inittermmsvcrt.dllj_except_handler4_commonGetModuleFileNameWRegCreateKeyExW.RegSetValueExWRegCloseKeyRegGetValueW	CoCreateInstanceAGetSidSubAuthorityCountLocalAlloc?GetSidLengthRequiredIInitializeSid>GetSidIdentifierAuthority@GetSidSubAuthorityGetLastErrorLocalFree,EqualSidCompareStringWHeapAllocGetProcessHeapHeapFreeDisableThreadLibraryCalls-SleepUnhandledExceptionFilterSetUnhandledExceptionFilterGetCurrentProcessMTerminateProcessQueryPerformanceCounter
GetCurrentProcessIdGetCurrentThreadIdGetSystemTimeAsFileTimeGetTickCountapi-ms-win-core-libraryloader-l1-2-0.dllapi-ms-win-core-registry-l1-1-0.dllapi-ms-win-core-com-l1-1-0.dllapi-ms-win-security-base-l1-1-0.dllapi-ms-win-core-heap-l2-1-0.dllapi-ms-win-core-errorhandling-l1-1-0.dllapi-ms-win-core-string-l1-1-0.dllapi-ms-win-core-heap-l1-1-0.dllapi-ms-win-core-synch-l1-2-0.dllapi-ms-win-core-processthreads-l1-1-0.dllapi-ms-win-core-profile-l1-1-0.dllapi-ms-win-core-sysinfo-l1-1-0.dll"GetComputerNameWapi-ms-win-core-kernel32-legacy-l1-1-0.dlllstrlenWapi-ms-win-core-string-obsolete-l1-1-0.dllRtlNtStatusToDosErrorntdll.dllResolveDelayLoadedAPIDelayLoadFailureHookapi-ms-win-core-delayload-l1-1-1.dllapi-ms-win-core-delayload-l1-1-0.dll
memset888j888877777777L8188`87V8(@Xp{			(yH
uqTYPELIB<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<!-- Copyright (c) Microsoft Corporation -->
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<assemblyIdentity
    name="Microsoft.Windows.SHGina"
    processorArchitecture="x86"
    version="5.1.0.0"
    type="win32"/>
<description>Windows Shell</description>
<dependency>
    <dependentAssembly>
        <assemblyIdentity
            type="win32"
            name="Microsoft.Windows.Common-Controls"
            version="6.0.0.0"
            processorArchitecture="*"
            publicKeyToken="6595b64144ccf1df"
            language="*"
        />
    </dependentAssembly>
</dependency>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v3">
    <security>
        <requestedPrivileges>
            <requestedExecutionLevel level="asInvoker" uiAccess="false"/>
        </requestedPrivileges>
    </security>
</trustInfo>
<application xmlns="urn:schemas-microsoft-com:asm.v3">
    <windowsSettings>
        <dpiAware  xmlns="http://schemas.microsoft.com/SMI/2005/WindowsSettings">true</dpiAware>
    </windowsSettings>
</application>
</assembly>
4VS_VERSION_INFO
cE
cE?StringFileInfo040904B0LCompanyNameMicrosoft CorporationZFileDescriptionWindows Shell User Logonh$FileVersion10.0.17763.1 (WinBuild.160101.0800).InternalNameSHGINA.LegalCopyright Microsoft Corporation. All rights reserved.>OriginalFilenameSHGINA.DLLj%ProductNameMicrosoft Windows Operating System>
ProductVersion10.0.17763.1DVarFileInfo$Translation	MSFT	A+ dP,t|xLPH
 !`
4"
HPH%"H
`,<0H`\
D{r<0FFK<MJr<.adLf`
\}%"d0-stdole2.tlbWWWTp4|0X,	lSHGINALibWWW8<ILM_GUEST_FLAGSW0!ILM_GUEST_ACCOUNTWWW0ILM_GUEST_INTERACTIVE_LOGONW03ILM_GUEST_NETWORK_LOGONWd
8}ILocalMachineWWWdMachineNameW
pvarValWd%isGuestEnabledWWoflagsWWW	7pbEnabledWWWdY]isRemoteConnectionsEnabledWWdZ9AccountNameW
4varAccountWWd&isGuestAccessModeWWWYpbForceGuestdpRisOfflineFilesEnabledWWWdisLUAEnableddEnableGuestWd+DisableGuest8iYShellLocalMachineWWWSHGINA 1.0 Type LibraryWWWILocalMachine InterfaceWWWGet the machine name.W*Test whether the Guest account is enabled.,Test whether remote connections are enabled.WW%Enable or disable remote connections.W#Get a well-known user account name.WWWXTest whether all network traffic will be treated as through it were local guest account.WW&Test whether Offline Files is enabled.Test whether LUA is enabledWWWEnable or disable LUAW>Enable the Guest account for interactive and/or network logon.?Disable the Guest account for interactive and/or network logon.WWWLocalMachine Class@@<444@@@4T|(,LD8
8 \DP
,$LD|
,(D!8,\Dp
,0LD
,4LDX
,8LD
,<D!,	@D		,
DD	
	dee2300X,d Lx00000000 0$0(0,0004080<0@0D0H0L0P0T0X0\0`0d0h0l0p0t0|000000@1778
8'8G8`88889-9Y99999:0:D:r:::;';=;R;u;;;;<<d<k<<<<=N=W=p======> >+>>>>>>>6?\?e? @)0Q0`0f00000001#1B1T1]1e1p1111111X222222333o33333-474`4j44444(5G5|555556$6/6C6L66667*717W7q7|77778 8_8h8n8888889!9y999:!:0:Q:b:p:x:::::';;;;;;;<<><E<V<]<c<j<x<<<X=_=======	>>>>!>'>->3>9>L>U>[>c>i>>>>>>>>?'?4?Q?Z?`?????????0000-020>0O0W0j0v0~00001,1A1e2}2223Z3333333333334444 4'4.454=4E4M4Y4b4g4m4w444444444444X5]5o5555V6t66666666667b7g7777777777777	88$828?8M8W8a8k8x88888888888899999 9(9,94989@9D9L9P9l9p9P0`40000000$0(0,00080<0@0D0L0P0X0`0d0h0

Hacked By AnonymousFox1.0, Coded By AnonymousFox