????

Your IP : 216.73.216.152


Current Path : C:/Windows/System32/en-US/
Upload File :
Current File : C:/Windows/System32/en-US/PktMon.exe.mui

MZ����@���	�!�L�!This program cannot be run in DOS mode.

$��<߱�R���R���R�U�����R�U�P���R�Rich��R�PEL�!�

BD@ D�8.rdata�@@.rsrc� �@@dx3�
T88dx3�$��8.rdata8x.rdata$zzzdbg p.rsrc$01p.h�.rsrc$02 ��	�/{}�}�^P��F[��Ċz��dx3�h�(�@�����I�������(�@�X�p�
����
��������0�H�`�x���������&��'�( �)8�*P�,h�-��3��4��5��6��7��8�9(�:@�?X�@p�A��B��C��E��F��J�L�M0�NH�P`�Rx�X��Y��Z��[��\��]�^ �_8�`P�ah�b��e��f��k��l��q��r	�w(	�x@	�~X	�p	���	��	�	�		�		�		�		�		
	
	(
	8
	H
	X
	h
	x
	�
	�
	�
	�
	�
	�
	�
	�
			(	8	H	X	h	x	�	�	�	�	�	�	�	�			(	8	H	X	h	x	�	�	�	�	�	�	�	�	
	
	(
	8
	H
	X
	h
	x
	�
	�
	�
	�
	�
	�
	�
	�
			(	8	H	Xp.�� /��1���2���4n��5b�`8v��9��:��p<��(=�<>���>��`@�pB��TF��LG
�XH�hKJ��N��lOh��OV�,P\��P6��P`� Q���Q^�8R^��R<��Rb�8Sh��S���[���m��n$�@r��@x��$�H�l���D��������D���������P��B�0�@�p����p���������d����P�P�8���d��������X�B�����������h������������� �����b����������@��p������x� �`���4�����MUI����	�L�周%�H���R�S��%��-*gx�8�%���MUIen-US/Failed to communicate with the PktMon driver. +Failed to stop the PktMon driver service: /Unknown command '%1$s'. See pktmon %2$s help.
1Unknown parameter '%1$s'. See pktmon %2$s help.
+Error: Parameter '%1$s' requires a value.
4Error: Parameter '%2$s' modifies parameter '%1$s'.
2Error: Parameter '%1$s' does not support '%2$s'.
QError: '%1$s' is not a valid argument to parameter '%2$s'. See pktmon %3$s help
&Error: '%1$s' is not a valid number.
PAFError: Packet truncation size must be between 0 and %1$d, inclusive.
+Error: '%1$s' is not a valid MAC address.
'Error: '%1$s' is not a valid VLAN Id.
)Error: '%1$s' is not a valid EtherType.
PA(Error: '%1$s' is not a valid protocol.
(Error: '%1$s' is not a valid TCP flag.
*Error: '%1$s' is not a valid IP address.
-Error: '%1$s' is not a valid prefix length.
PA4Error: Both IP addresses must be the same version.
+Error: '%1$s' is not a valid port number.
@Error: Event trace is enabled, but no providers are specified.
1Error: '%1$s' is not a valid event provider Id.
%Error: Cannot obtain current state.
,Error: '%1$d' is not a valid component Id.
PA#Error: Invalid HEX character %1$c
Error: Input is too long
7Error: Failed to initialize the live console display.  Packet Monitor is not running.
Failed to add filter: PA6Error: Failed to add filter. No parameters provided.
[Unknown Name][???]&Error: Unable to stop trace session: PAError: Invalid file name %1$s
Error: cannot open file %1$s
Processing error.
#Event: %d. Formatting Error 0x%X.
$Error: Cannot enable provider %1$s
LevelKeywordEventTask	FunctionPAUnknown failure reason.
3State cannot be modified while PktMon is running.
0A resource with the given name already exists.
No arguments were specified.
+Already have the maximum of %1$d filters.
PAAll counters reset to 0.
Active measurement started.
PA$Packet Monitor is already started.
Failed to start ETW session: Stopped data collection.
PktMon driver unloaded.
Collected Data:
    Counters
%    Packet counters, packet capture
PA-    Packet counters, packet capture, events
    Events
Monitored Components:

    None
	    All
    Network adapters
No Network Adapters present
Network Adapters:
Capture Type:
    All packets
    Flow packets only
    Drop packets only
PALogger Parameters:
    Logger name:        %s
$    Logging mode:       Multi-File
"    Logging mode:       Circular
#    Logging mode:       Real-Time
'    Logging mode:       Memory Buffer
    Log file:           %s
    Max file size:      %d MB
    Buffer size:        %d KB
    Min buffers:        %d
    Max buffers:        %d
    Buffers allocated:  %d
    Memory used:        %d MB
    Buffers written:    %d
    Events lost:        %d
    Buffers lost:       %d
PA    Buffers free:       %d
PError: Nothing to monitor. Enable packet capture or specify an event provider.
Processing...

&Some events were lost during logging
"Events lost during logging: %1$u
Events formatted:    %1$llu
PAFormatting errors:   %1$llu
Formatted file:      %1$s
Log file name:     %1$s
Logging mode:      %1$s
Maximum file size: %1$d MB
Drop: Buffer size:       %1$d MB
"Buffer size:       %1$d MB (max)
Flushing logs...
Packets total:       %1$llu
Packet drop count:   %1$llu
Packets formatted:   %1$llu
WPP events skipped:  %1$llu
Merging metadata...
Duplicate Drop: PAStart time              Stop time               Build info              %1$S
 Events total            %1$llu
 Events lost             %1$llu
 Manifest-based events   %1$llu
 WPP events              %1$llu
 WMI events              %1$llu
 TraceLogging            %1$llu
 Manifest metadata       %1$llu
Provider                %1$s
#Keywords                %1$016llX
IDLevel	KeywordsEvent Providers:
PA<empty>No packet filters specified.
Filter added.
Removed all filters.
PAPacket Filters:
#NameMAC AddressVlan ID
EtherType	ProtocolPAIP AddressPortEncapsulationVXLAN PortPAAll counters are zero.
* (All)Unregistered MiniportFilter Drivers:
Protocols:
Application Protocols:
PAVM Network Adapters:IdDriverPANameVM NameCounter
DirectionPAPacketsBytes!Log file: %1$s (No events lost)
PA$Log file: %1$s (Events lost: %2$d)
"pktmon <command> [OPTIONS | help]�
    Advanced packet capture and event collection.

Commands
    filter     Manage packet filters.
    list       List packet processing components.

    start      Start packet capture and event collection.
    stop       Stop data collection.
    status     Query current status.
    unload     Unload PktMon driver.

    counters   Display current packet counters.
    reset      Reset packet counters to zero.

    etl2txt    Convert log file to text format.
    etl2pcap   Convert log file to pcapng format.
    hex2pkt    Decode packet in hexadecimal format.

    help       Show help text for specific command.
               Example: pktmon start help

)pktmon filter <command> [OPTIONS | help]

Commands
    add       Add a filter to control which packets are reported.
    list      Display active packet filters.
    remove    Removes all packet filters.

    help      Show help text for specific command.
              Example: pktmon filter add help

PApktmon filter list&
    Display active packet filters.

�pktmon filter add <name> [-m <mac> [mac2]] [-v <vlan>] [-d { IPv4 | IPv6 | number }]
                         [-t { TCP [flags...] | UDP | ICMP | ICMPv6 | number }]
                         [-i <ip> [ip2]] [-p <port> [port2]] [-b] [-e [port]]�
    Add a filter to control which packets are reported. For a packet to be
    reported, it must match all conditions specified in at least one filter.
    Up to 32 filters can be active at once.

    NOTE1: When two MACs (-m), IPs (-i), or ports (-p) are specified, the filter
           matches packets that contain both. It will not distinguish between source
           or destination for this purpose.

name
    Optional name or description of the filter.

Ethernet frame
    -m, --mac[-address]
        Match source or destination MAC address. See NOTE1 above.

    -v, --vlan
        Match by VLAN Id (VID) in the 802.1Q header.

    -d, --data-link[-protocol], --ethertype
        Match by data link (layer 2) protocol. Can be IPv4, IPv6, ARP, or
        a protocol number.

IP header
    -t, --transport[-protocol], --ip-protocol
        Match by transport (layer 4) protocol. Can be TCP, UDP, ICMP, ICMPv6, or
        a protocol number.
        To further filter TCP packets, an optional list of TCP flags to match can
        be provided. Supported flags are FIN, SYN, RST, PSH, ACK, URG, ECE, and CWR.

    -i, --ip[-address]
        Match source or destination IP address. See NOTE1 above.
        To match by subnet, use CIDR notation with the prefix length.

TCP/UDP header
    -p, --port
        Match source or destination port number. See NOTE1 above.

Cluster Heartbeat
    -b, --heartbeat
        Match RCP heartbeat messages over UDP port 3343.

Encapsulation
    -e, --encap
        Apply above filtering parameters to both inner and outer encapsulation headers.
        Supported encapsulation methods are VXLAN, GRE, NVGRE, and IP-in-IP.
        Custom VXLAN port is optional, and defaults to 4789.

Example 1: Ping filter
    pktmon filter add MyPing -i 10.10.10.10 -t ICMP

Example 2: TCP SYN filter for SMB traffic
    pktmon filter add MySmbSyn -i 10.10.10.10 -t TCP SYN -p 445

Example 3: Subnet filter
    pktmon filter add MySubnet -i 10.10.10.0/24

PApktmon filter remove"
    Remove all packet filters.

PA'pktmon comp <command> [OPTIONS | help]�

Commands
    list        List all active components.
    counters    Display current per-component counters.

help
    Show help text for a command.

0pktmon list [--all] [--include-hidden] [--json]
    List networking components that can be monitored.

-a, --all
    Show all component types. Only network adapters are
    displayed by default.

-i, --include-hidden
    Show components that are hidden by default.

--json
    Output in JSON format. Implies -i and -a.

�pktmon counters [--type { all | flow | drop }] [--include-hidden] [--zero]
                [--drop-reason] [--live] [--refresh-rate <n>] [--json]]
    Show packet counters from monitored components.

-t, --type { all | flow | drop }
    Select what type of counters to show. Default is all.

-i, --include-hidden
    Show counters from components that are hidden by default.

-z, --zero
    Show counters that are zero in both directions.

-r, --drop-reason
    Show the most recent drop reason for each drop counter.

--live
    Automatically refresh the counters. Press Ctrl+C to stop.

--refresh-rate <n>
   Number of times to refresh the counters per second, from 1 to 30.
   Default is 10.

--json
    Output in JSON format. Implies -i and -r.

PA
pktmon reset*
    Reset all packet counters to zero.

pktmon status [--buffer-info]c
    Query current Packet Monitor status.

-b, --buffer-info
    Display ETW buffer information.

$pktmon start [--capture [--counters-only] [--comp <selector>] [--type <type>]
                        [--pkt-size <bytes>] [--flags <mask>]]
             [--trace --provider <name> [--keywords <k>] [--level <n>] ...]
             [--file-name <name>] [--file-size <size>] [--log-mode <mode>]
    Start packet capture and event collection.

Packet Capture
    -c, --capture
        Enable packet capture and packet counters.

        -o, --counters-only
            Collect packet counters only. No packet logging.

        --comp { all | nics | id1 id2 ... }
            Select components to capture packets on. Can be ALL components,
            NICs only, or a list of component Ids. Default is ALL.

        --type { all | flow | drop }
            Select which packets to capture. Default is ALL.

        --pkt-size <bytes>
            Number of bytes to log from each packet. To always log the entire
            packet set this to 0. Default is 128 bytes.

        --flags <mask>
            Hexadecimal bitmask that controls information logged during packet
            capture. Default is 0x012.

            0x001 - Internal Packet Monitor errors.
            0x002 - Information about components, counters and filters.
            0x004 - NET_BUFFER_LIST group source and destination information.
            0x008 - Select packet metadata from NDIS_NET_BUFFER_LIST_INFO.
            0x010 - Raw packet, truncated to the size from --pkt-size.

Event Providers
    -t, --trace
        Enable event collection.

        -p, --provider <name>
            Event provider name or GUID. For multiple providers, use this
            parameter more than once.

        -k, --keywords <k>
            Hexadecimal bitmask that controls which events are logged
            for the corresponding provider. Default is 0xFFFFFFFF.

        -l, --level <n>
            Logging level for the corresponding provider.
            Default is 4 (info level).

Logging Parameters
    -f, --file-name <name>
        Log file name. Default is PktMon.etl.

    -s, --file-size <size>
        Maximum log file size in megabytes. Default is 512 MB.

    -m, --log-mode { circular | multi-file | memory | real-time }
        Logging mode. Default is circular.

        circular    New events overwrite the oldest ones when the log is full.

        multi-file  No limit on number of captured events, but a new log file
                    is created each time the log is full.

        memory      Like circular, but the entire log is stored in memory.
                    It is written to a file when pktmon is stopped.

        real-time   Display events and packets on screen at real time. No log
                    file is created. Press Ctrl+C to stop monitoring.

Example 1: Packet capture
    pktmon start --capture

Example 2: Packet counters only
    pktmon start --capture --counters-only

Example 3: Event logging
    pktmon start --trace -p Microsoft-Windows-TCPIP -p Microsoft-Windows-NDIS

Example 4: Packet capture with event logging
    pktmon start --capture --trace -p Microsoft-Windows-TCPIP -k 0xFF -l 4


PApktmon stop
    Stop data collection.

pktmon unload�
    Stop the PktMon driver service and unload PktMon.sys. Effectively equivalent
    to 'sc.exe stop PktMon'. Measurement (if active) will immediately stop, and
    any state will be deleted (counters, filters, etc.).

�pktmon etl2txt <file> [--out <name>] [--stats-only] [--timestamp-only] [--metadata]
                      [--tmfpath <path>] [--brief] [--verbose <n>] [--hex]
                      [--no-ethernet] [--vxlan <port>]S
    Convert ETL log file to text format.

<file>
    ETL file to convert.

-o, --out <name>
    Name of the formatted text file.

-s, --stats-only
    Display log file statistical information.

-t, --timestamp-only
    Use timestamp only prefix for events and packets.

-m, --metadata
    Print event metadata, such as logging level and keywords.

-p, --tmfpath <path>
    Path to TMF files for decoding WPP traces.
    Multiple paths should be separated by semicolon.
    All WPP traces are skipped when this option is not specified.

Network packet formatting options

    -b, --brief
        Use abbreviated packet format.

    -v, --verbose <n>
        Verbosity level from 1 to 3.

    -x, --hex
        Include hexadecimal format.

    -e, --no-ethernet
        Don't print ethernet header.

    -l, --vxlan <port>
        Custom VXLAN port.

Jpktmon etl2pcap <file> [--out <name>] [--drop-only] [--component-id <id>]7
    Convert pktmon log file to pcapng format.
    Dropped packets are not included by default.

<file>
    ETL file to convert.

-o, --out <name>
    Name of the formatted pcapng file.

-d, --drop-only
    Convert dropped packets only.

-c, --component-id <id>
    Filter packets by a specific component ID.

1pktmon hex2pkt [--type { Ethernet | IP | HTTP }]�
    Decode packet in hexadecimal format.

-t, --type { Ethernet | IP | HTTP }
    Packet type to decode. Default is Ethernet.

NDIS	MiniportFilter	ProtocolVM Nic
Host vNicExtension MiniportVMS Protocol NicPANetVscHTTP
IP InterfaceSlbmuxIPSecNetCxN/AInOutRxTxIngressEgressifIndexMiniport ifIndexLower ifIndexifGuidNdisMediumMAC AddressPA
EtherType
Opt DatapathNdis ObjectSwitch nameExt ifIndexNic ifIndexIP AddressIP ifIndexVSIDVLANCompartment ID
MAX_VALUEN/AVXLANGRE	IP in IPEnabledPAAllDropsFlowsNot specified
Invalid dataInvalid packetInsufficient resourcesAdapter not readyAdapter disconnected
Not AcceptedDevice busy	FilteredFiltered VLANUnauthorized VLANUnauthorized MACFailed security policyFailed pVlan setting	QoS dropIPSec dropPA#Spoofed MAC address is not allowedFailed DHCP guardFailed Router Guard Bridge is not allowed inside VM!Virtual Subnet ID does not match&Required vSwitch extension is missing$vSwitch over vSwitch is not allowed
MTU mismatchNative forwarding requiredInvalid VLAN formatInvalid destination MACInvalid source MACFirst NB too small%Windows Network Virtualization errorStorm limit exceeded ICMP request injected by switch"Failed to update destination listDestination NIC is disabledDestination NIC packet filtervSwitch data flow is disabled Untagged traffic is not allowedInvalid PD queueAdapter is in low power statePAAdapter pausedAdapter reset in progress
Send abortedUnsupported EtherTypeMicroport error
VF not readyMicroport not readyVMBus errorPALoopback Ethernet packetInvalid SNAP headerInvalid EtherTypeInvalid packet lengthHeader not contiguousInvalid destination typeInterface not readyProvider not readyInvalid LSO informationInvalid USO informationInvalid medium typeInvalid ARP header"No interface for the isolation IDBad source addressNot locally destinedProtocol unreachablePort unreachableBad lengthMalformed headerNo route available
Beyond scopeInspection dropToo many decapsulationsAdministratively prohibited
Bad checksum Max receive path discard reasonHop limit exceededAddress unreachableRSC packet Max forward path discard reasonArbitration unhandledInspection absorbFragment MTU exceededBuffer length exceededAddress resolution timeoutAddress resolution failureIPsec failureExtension headers failureIPSNPI client dropUnsupported offloadRouting failureAncillary data failureRaw data failureSession state failurePA#IPSNPI: modified but not forwardedIPSNPI: no next hop specifiedIPSNPI: no compartmentIPSNPI: no interfaceIPSNPI: no subinterfaceIPSNPI: disabled interfaceIPSNPI: segmentation failedIPSNPI: no Ethernet headerIPSNPI: unexpected fragment#IPSNPI: unsupported interface typeIPSNPI: invalid LSO infoIPSNPI: invald USO infoUnexpected internal error$Administratively configured settingBad option2This type of packet is not accepted over loopback Scope of address is too limitedFull queueDisabled interfaceICMP: general failureICMP: truncated headerICMP: invalid checksumICMP: inspection drop,ICMP: rejecting loopback neighbor discoveryICMP: unknown type/codeICMP: truncated IP headerICMP: oversized IP headerICMP: no handler*ICMP: not responding with error for errorICMP: invalid sourceICMP: interface rate limitICMP: path rate limitPAICMP: no routeICMP: no matching requestICMP: buffer too small&ICMP: failed to obtain ancillary dataICMP: incorrect hop limitICMP: unknown codeICMP: source not linklocalICMP: truncated ND header'ICMP: invalid ND option SourceLinkAddrICMP: invalid ND option MTU*ICMP: invalid ND option PrefixInformation)ICMP: invalid ND option RouteInformationICMP: invalid ND option RDNSSICMP: invalid ND option DNSSLICMP: packet parsing failure.ICMP: disallowed by the current configurationPA#ICMP: invalid router advertisement?ICMP: source address is not on the same link as this interfaceAICMP: invalid destination or target address for redirect message(ICMP: invalid neighbor discovery targetpICMP: invalid neighbor advertisement - the solicited flag cannot be set if the destination address is multicast7ICMP: the link layer address belongs to this interfaceICMP: duplicate echo request\ICMP: router advertisement came from a router that is not part of the potential router listICMP: invalid MLD queryICMP: invalid MLD report-ICMP: received MLD report from local machineICMP: not locally destinedARP: invalid sourceARP: invalid targetHARP: the source address in the DL header belongs to the local interfaceARP: not locally destinedINET: source unspecifiedINET: destination is multicastINET: header is invalidINET: checksum is invalid'INET: transport endpoint was not foundINET: connected path errorINET: session state errorINET: receive inspection$INET: invalid ACK in SYN_SENT stateINET: expected SYNINET: received RST+INET: received SYN while in SYN_RCVD stateINET: simultaneous connectINET: PAWS failedINET: land attackINET: missed RSTINET: outside receive windowINET: duplicate segmentINET: closed windowINET: TCB removedINET: FIN-WAIT2INET: reassembly conflictINET: FIN received3INET: listener received segment with invalid flags(INET: TCB was not inserted in TCB table8INET: TIME-WAIT TCB received RST outside receive windowBINET: TIME-WAIT TCB received segment with SYN and other flags set&INET: packet dropped by TIME_WAIT TCB+INET: SYN+ACK with fastopen cookie request;INET: listener dropped SYN because SO_PAUSE_ACCEPT was set5INET: listener dropped SYN to reduce memory pressureINET: accept inspectionINET: accept redirection7IPSNPI: URO segment size exceeds forward interface MTUICMP: packet was fragmentedVFP: Failed ARP GuardVFP: Invalid ARP Pkt LimiterVFP: Invalid DHCP Pkt LimiterVFP: Broadcast BlockedVFP: Block Non-IP PktVFP: Invalid ARP FilterVFP: Failed IPv4 GuardVFP: Failed IPv6 GuardVFP: Failed MAC Guard.VFP: No Broadcast destination ports available,VFP: No Unicast destination ports availableVFP: Unicast port not readyVFP: Switch callback failedVFP: Invalid ICMPV6 limiterVFP: Intercept Pkt DropVFP: Intercept BlockedPAVFP: Failed NDP GuardVFP: Port BlockedVFP: NIC SuspendedPASlbMux: Parsing failureDSlbMux: First packet for the fragmented datagram is not at offset 0^SlbMux: Failed to parse or validate the IP packet contained in the ICMP error message payloadbSlbMux: IP packet contained in the ICMP error message payload does not match any existing session:SlbMux: Failed to find a nexthop for external hairpinning?SlbMux: No matching static mapping exists to let the packet in<SlbMux: Failed to acquire a reference on the nexthop object#SlbMux: Failed to clone the packet'SlbMux: Failed to translate the packetSlbMux: Hop limit exceededCSlbMux: Packet is larger than nexthop MTU and cannot be fragmented(SlbMux: Unexpected route lookup failurePABSlbMux: No route to the packet (translated) destination was found*SlbMux: Failed to create a session object_SlbMux: The interface over which the packet is to be routed is not a SLBMUX external interfacefSlbMux: The interface over which the packet is to be routed does not have a matching SLBMUX instanceeTSlbMux: SLBMUX device itself is not allowed to be an internal host at the same time:SlbMux: Packet is routable in its own arrival compartment=SlbMux: Packet transport protocol is not supported by SLBMUX,SlbMux: Packet is destined to SLBMUX itselffSlbMux: Packet destination address and port do not fall within any SLBMUX external address port range#SlbMux: SLBMUX rejected the packet;SlbMux: SLBMUX failed to find the Vip or Dip configuration6SlbMux: SLBMUX failed to send the encapsulated packetKSlbMux: SLBMUX found invalid reachability encap type for diagnostic packetASlbMux: SLBMUX received redirect packet as the diagnostic packet0SlbMux: SLBMUX unable to handle redirect packet=IPSEC: The SPI in the packet does not match a valid IPsec SAEIPSEC: Packet was received on an IPsec SA whose lifetime has expiredYIPSEC: Packet was received on an IPsec SA that does not match the packet characteristics2IPSEC: Packet sequence number replay check failed<IPSEC: IPsec header and/or trailer in the packet is invalid$IPSEC: IPsec integrity check failed)IPSEC: IPsec dropped a clear text packetKIPSEC: IPsec dropped an incoming ESP packet in authenticated firewall modePA4IPSEC: IPsec dropped a packet due to DoS throttling;IPSEC: IPsec DoS Protection matched an explicit block rule]IPSEC: IPsec DoS Protection received an IPsec specific multicast packet which is not allowedEIPSEC: IPsec DoS Protection received an incorrectly formatted packet4IPSEC: IPsec DoS Protection failed to look up state|IPSEC: IPsec DoS Protection failed to create state because the maximum number of entries allowed by policy has been reachedtIPSEC: IPsec DoS Protection received an IPsec negotiation packet for a keying module which is not allowed by policy�IPSEC: IPsec DoS Protection failed to create a per internal IP rate limit queue because the maximum number of queues allowed by policy has been reached!IPSEC: Failed to allocate memory"IPSEC: Operation was unsuccessful(NETCX: Failed to parse NetPacket Layout7NETCX: Failed to calculate NetBuffer software checksum+NETCX: Queue is being stopped or destroyedNETCX: Invalid NetBuffer size'NETCX: Large Send Offload (LSO) failed-NETCX: UDP Segmentation Offload (USO) failed)NETCX: NetBuffer bounce operation failedPA	EthernetToken RingFDDIWAN
LocalTalk
DIX EtherentARCNETARCNET (878.2)ATM
Wireless WANIrDA
Broadcast PCConnection-Oriented WANIEEE 1394 (FireWire)InfiniBandTunnelWi-Fi	LoopbackWiMAXGeneric IP
MAX_VALUE�4VS_VERSION_INFO��
!|O
!|O?�StringFileInfo�040904B0LCompanyNameMicrosoft CorporationFFileDescriptionPacket Monitorn'FileVersion10.0.20348.2849 (WinBuild.160101.0800)6InternalNamePktMon.exe�.LegalCopyright� Microsoft Corporation. All rights reserved.FOriginalFilenamePktMon.exe.muij%ProductNameMicrosoft� Windows� Operating SystemDProductVersion10.0.20348.2849DVarFileInfo$Translation	�PADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPAD