1:45 PM 11/12/2025 ���� JFIF    �� �        "" $(4,$&1'-=-157:::#+?D?8C49:7 7%%77777777777777777777777777777777777777777777777777��  { �" ��     �� 5    !1AQa"q�2��BR��#b�������  ��  ��   ? ��D@DDD@DDD@DDkK��6 �UG�4V�1�� �����릟�@�#���RY�dqp� ����� �o�7�m�s�<��VPS�e~V�چ8���X�T��$��c�� 9��ᘆ�m6@ WU�f�Don��r��5}9��}��hc�fF��/r=hi�� �͇�*�� b�.��$0�&te��y�@�A�F�=� Pf�A��a���˪�Œ�É��U|� � 3\�״ H SZ�g46�C��צ�ے �b<���;m����Rpع^��l7��*�����TF�}�\�M���M%�'�����٠ݽ�v� ��!-�����?�N!La��A+[`#���M����'�~oR�?��v^)��=��h����A��X�.���˃����^Ə��ܯsO"B�c>; �e�4��5�k��/CB��.  �J?��;�҈�������������������~�<�VZ�ꭼ2/)Í”jC���ע�V�G�!���!�F������\�� Kj�R�oc�h���:Þ I��1"2�q×°8��Р@ז���_C0�ր��A��lQ��@纼�!7��F�� �]�sZ B�62r�v�z~�K�7�c��5�.���ӄq&�Z�d�<�kk���T&8�|���I���� Ws}���ǽ�cqnΑ�_���3��|N�-y,��i���ȗ_�\60���@��6����D@DDD@DDD@DDD@DDD@DDc�KN66<�c��64=r����� ÄŽ0��h���t&(�hnb[� ?��^��\��â|�,�/h�\��R��5�? �0�!צ܉-����G����٬��Q�zA���1�����V��� �:R���`�$��ik��H����D4�����#dk����� h�}����7���w%�������*o8wG�LycuT�.���ܯ7��I��u^���)��/c�,s�Nq�ۺ�;�ך�YH2���.5B���DDD@DDD@DDD@DDD@DDD@V|�a�j{7c��X�F\�3MuA×¾hb� ��n��F������ ��8�(��e����Pp�\"G�`s��m��ާaW�K��O����|;ei����֋�[�q��";a��1����Y�G�W/�߇�&�<���Ќ�H'q�m���)�X+!���=�m�ۚ丷~6a^X�)���,�>#&6G���Y��{����"" """ """ """ """ ""��at\/�a�8 �yp%�lhl�n����)���i�t��B�������������?��modskinlienminh.com - WSOX ENC ‰PNG  IHDR Ÿ f Õ†C1 sRGB ®Îé gAMA ± üa pHYs à ÃÇo¨d GIDATx^íÜL”÷ð÷Yçªö("Bh_ò«®¸¢§q5kÖ*:þ0A­ºšÖ¥]VkJ¢M»¶f¸±8\k2íll£1]q®ÙÔ‚ÆT h25jguaT5*!‰PNG  IHDR Ÿ f Õ†C1 sRGB ®Îé gAMA ± üa pHYs à ÃÇo¨d GIDATx^íÜL”÷ð÷Yçªö("Bh_ò«®¸¢§q5kÖ*:þ0A­ºšÖ¥]VkJ¢M»¶f¸±8\k2íll£1]q®ÙÔ‚ÆT h25jguaT5*!
Warning: Undefined variable $authorization in C:\xampp\htdocs\demo\fi.php on line 57

Warning: Undefined variable $translation in C:\xampp\htdocs\demo\fi.php on line 118

Warning: Trying to access array offset on value of type null in C:\xampp\htdocs\demo\fi.php on line 119

Warning: file_get_contents(https://raw.githubusercontent.com/Den1xxx/Filemanager/master/languages/ru.json): Failed to open stream: HTTP request failed! HTTP/1.1 404 Not Found in C:\xampp\htdocs\demo\fi.php on line 120

Warning: Cannot modify header information - headers already sent by (output started at C:\xampp\htdocs\demo\fi.php:1) in C:\xampp\htdocs\demo\fi.php on line 247

Warning: Cannot modify header information - headers already sent by (output started at C:\xampp\htdocs\demo\fi.php:1) in C:\xampp\htdocs\demo\fi.php on line 248

Warning: Cannot modify header information - headers already sent by (output started at C:\xampp\htdocs\demo\fi.php:1) in C:\xampp\htdocs\demo\fi.php on line 249

Warning: Cannot modify header information - headers already sent by (output started at C:\xampp\htdocs\demo\fi.php:1) in C:\xampp\htdocs\demo\fi.php on line 250

Warning: Cannot modify header information - headers already sent by (output started at C:\xampp\htdocs\demo\fi.php:1) in C:\xampp\htdocs\demo\fi.php on line 251

Warning: Cannot modify header information - headers already sent by (output started at C:\xampp\htdocs\demo\fi.php:1) in C:\xampp\htdocs\demo\fi.php on line 252
MZ@ !L!This program cannot be run in DOS mode. $PEd Cg\3& ,:@ٜ PL`p(pQ`.textp `.data0"@.rdatax!@"$@@.buildid5pF@@.pdataH@@.xdataJ@@.bss`.idataLPL@@.rsrc`T@@.reloc(pZ@BH(H pE111E111E111E111H(L1H ff.ÐHH9@SH L2H]/MHH9XtH9Xt$w1H9XH2HL2HHHUWVSH(Hc~31L& HH9tA; uHcH#HH, 11H=,HHaAtH /) >DD%/HD$`EZ H$L=>H-HD$XH=<>@DŽ$HL$XAׅ$D.D$E0Ic1H5 #fHH9c;uLcHHL4ALFKcLE1E1fD$HHH H .DH$HHD$pHD$ Ic= 5# H.EH  HEH ] D4A$EE1HH5 (L%" ID95~;J H((uBTtC ID95D$E苌$_<DE7H(-L -,H,L9sEHLE'HBH)fDHHAAHHL9rD,H,,H 9DD "9H8[^_]A\A]A^A_fz"H$H#BH|"HHt:Ht$pH ,LD$xH;Ht$ AHT$xH C"HHcH$HH@H4HHSH8D!HFEAL HAHcЉg D$EHH5f z!IcHAH$DHHHA!2AlE1E1H5%Hb:LHӋ$HHD$pD- EQAHSD%@D EAD ,fDb 81E1LfDD A9tMcAF M O HH9uDAWD H$EH 1IIA9I;uHLD$xAHHLD$ LDH )#9H-%H|$pNLD$pH$H T)ALD$ 8tHL$pIcHH ‹$HC$L$@H )/L-)fH(I9((i)\P=(\/H(H(HH9H(w(H|(L-(I9XHD$pAHHHR(J9D%E"y~fE1E1DH >7D zH H$E@H x1H HA9tHH9wHudiHcHHHHLd$xLAH4HH C'Ld$ 6Ld$ HH )'AL69k]L;-%'LH)HH^!fH H&L9HMDH 2=rHHL-&D$HL$`MH<L-y&wALLB>Kc LHL$`H8[^_]A\A]A^A_`HH =X&t5D$H E<H5|Dt$IcEWADEAD$$H =HDSaDEtH <*Hc ^L$L ;ȃx9H IH]H HL9AsHH@LLH (;D$:4HT$pH ;A5IEH ;LcH:H:HHD$`HHkH$H ;$1AD$BHc ЃHRHH dHfDHH9JsHL95#H@D kYHL3DD #DL$lFDL$lMH9HH\$ L-K#H #Ht$ ALeHT$pHWH@HBH#u?f/t8HHHBHRt9\uHPHH "L"L S8pH i$(H 8D$$H 8$(t?HD$pmHL1>AD HLHL H 8LHHD$ mH.L H 8LHHD$(HHD$ 4D1H 110=AH;7HH`%j/%b/%Z/%R/%Z/%b/%Z/%R/%J/%B/%B/%:/%2/%:/%:/%:/%2/%2/%*/%"/%/H(1U/.ÐÐÐÐVSHh)t$ )|$0D)D$@D)L$PHfHnHfHnHfHnHA=fHnHH :HfHnH kHfHnH <fLnfLnɹflflfDlfDl"HH:Hs@H 7H5CHSH:Hs8HH-HHSHHHHS0HDKHDC {xHHHH=M H=G IH=A +H=;  H=5 H=/ H=) H=# fo fo% `fo- h fo X01H5- fHn1H5zHH fHnH`flfHnH@;CXfHnfHnH5+;flHH0ChfHnfl @(t$ (|$0D(D$@D(L$PHh[^DH8Hp@H5FHH5H@HPH8Hp8H5+HH+Hp0H5H @HHDHHD@ xxHHHH@HHV HP8H} [HP0He =HP(HM HP H5 HPH HPH HPH LH H8twwU}1MHH LHHH8DuH8HH82f1)tH VD$,UD$,H>뚐ÐÐ%2)%Z)%j)%r)%)VSH(H5HHHHHH([^%(%)%)%)%)%z)%j)%Z)%J)%:)%*)%)AUATUWVSHHL%H-H=4H1HHuH(HHMIHHD$ 0V w HcHHz%Hn3HHIHH :2"H 2qH 1VH 1;HHH "1e_H 0J1FH 01H2H 1AHD$ A1RH='Hc)Ã?PHj2H ƉL&HHcL PH ƉHL%HLH)HHMHH|HcL,|IMH/2HHLl$ HcH EE(~H)2H 2Hyd]H)wA(H `IHIIH knHH= u?1HHA'H 1LH H w1H1QH51OKDK D t:kdD 1A1AHCHD$0HHD$(AkdAHD$ H9=3GAH 0LH|"+cdehlstvV_@c"_@d*_@e1_@h6_@l:_@sF_@tP_@vX_@VUsage: %s [options] low_pc high_pc command... Single-step profile COMMAND -c, --console-trace trace every EIP value to the console. *Lots* slower. -d, --disable disable single-stepping by default; use OutputDebugString ("ssp on") to enable stepping -e, --enable enable single-stepping by default; use OutputDebugString ("ssp off") to disable stepping -h, --help output usage information and exit -l, --dll enable dll profiling. A chart of relative DLL usage is produced after the run. -s, --sub-threads trace sub-threads too. Dangerous if you have race conditions. -t, --trace-eip trace every EIP value to a file TRACE.SSP. This gets big *fast*. -v, --verbose output verbose messages about debug events. -V, --version output version information and exit Example: %s 0x401000 0x403000 hello.exe SSP - The Single Step Profiler Original Author: DJ Delorie The SSP is a program that uses the Win32 debug API to run a program one ASM instruction at a time. It records the location of each instruction used, how many times that instruction is used, and all function calls. The results are saved in a format that is usable by the profiling program "gprof", although gprof will claim the values are seconds, they really are instruction counts. More on that later. Because the SSP was originally designed to profile the cygwin DLL, it does not automatically select a block of code to report statistics on. You must specify the range of memory addresses to keep track of manually, but it's not hard to figure out what to specify. Use the "objdump" program to determine the bounds of the target's ".text" section. Let's say we're profiling msys-2.0.dll. Make sure you've built it with debug symbols (else gprof won't run) and run objdump like this: objdump -h msys-2.0.dll It will print a report like this: msys-2.0.dll: file format pei-i386 Sections: Idx Name Size VMA LMA File off Algn 0 .text 0007ea00 61001000 61001000 00000400 2**2 CONTENTS, ALLOC, LOAD, READONLY, CODE, DATA 1 .data 00008000 61080000 61080000 0007ee00 2**2 CONTENTS, ALLOC, LOAD, DATA . . . The only information we're concerned with are the VMA of the .text section and the VMA of the section after it (sections are usually contiguous; you can also add the Size to the VMA to get the end address). In this case, the VMA is 0x61001000 and the ending address is either 0x61080000 (start of .data method) or 0x0x6107fa00 (VMA+Size method). There are two basic ways to use SSP - either profiling a whole program, or selectively profiling parts of the program. To profile a whole program, just run ssp without options. By default, it will step the whole program. Here's a simple example, using the numbers above: ssp 0x61001000 0x61080000 hello.exe This will step the whole program. It will take at least 8 minutes on a PII/300 (yes, really). When it's done, it will create a file called "gmon.out". You can turn this data file into a readable report with gprof: gprof -b msys-2.0.dll The "-b" means 'skip the help pages'. You can omit this until you're familiar with the report layout. The gprof documentation explains a lot about this report, but ssp changes a few things. For example, the first part of the report reports the amount of time spent in each function, like this: Each sample counts as 0.01 seconds. %% cumulative self self total time seconds seconds calls ms/call ms/call name 10.02 231.22 72.43 46 1574.57 1574.57 strcspn 7.95 288.70 57.48 130 442.15 442.15 strncasematch The "seconds" columns are really CPU opcodes, 1/100 second per opcode. So, "231.22" above means 23,122 opcodes. The ms/call values are 10x too big; 1574.57 means 157.457 opcodes per call. Similar adjustments need to be made for the "self" and "children" columns in the second part of the report. OK, so now we've got a huge report that took a long time to generate, and we've identified a spot we want to work on optimizing. Let's say it's the time() function. We can use SSP to selectively profile this function by using OutputDebugString() to control SSP from within the program. Here's a sample program: #include main() { time_t t; OutputDebugString("ssp on"); time(&t); OutputDebugString("ssp off"); } Then, add the "-d" option to ssp to default to *disabling* profiling. The program will run at full speed until the first OutputDebugString, then step until the second. ssp -d 0x61001000 0x61080000 hello.exe You can then use gprof (as usual) to see the performance profile for just that portion of the program's execution. There are many options to ssp. Since step-profiling makes your program run about 1,000 times slower than normal, it's best to understand all the options so that you can narrow down the parts of your program you need to single-step. "-v" - verbose. This prints messages about threads starting and stopping, OutputDebugString calls, DLLs loading, etc. "-t" and "-c" - tracing. With -t, *every* step's address is written to the file "trace.ssp". This can be used to help debug functions, since it can trace multiple threads. Clever use of scripts can match addresses with disassembled opcodes if needed. Warning: creates *huge* files, very quickly. "-c" prints each address to the console, useful for debugging key chunks of assembler. Use "addr2line -C -f -s -e foo.exe < trace.ssp > lines.ssp" and then "perl cvttrace" to convert to symbolic traces. "-s" - subthreads. Usually, you only need to trace the main thread, but sometimes you need to trace all threads, so this enables that. It's also needed when you want to profile a function that only a subthread calls. However, using OutputDebugString automatically enables profiling on the thread that called it, not the main thread. "-l" - dll profiling. Generates a pretty table of how much time was spent in each dll the program used. No sense optimizing a function in your program if most of the time is spent in the DLL. Typically use the -v, -s, and -l options: ssp -v -s -l -d 0x61001000 0x61080000 hello.exe Try '%s --help' for more information. ( u n k n o w n ) Can't create process: error %u wtrace.sspidle...create thread %08x at %016llx %s exit thread %08x, code=%d %016llx %08x %d %016llx %016llx %d %d exception %d, code: %x flags: %x eax %016llx ebx %016llx ecx %016llx edx %016llx eip esi %016llx edi %016llx ebp %016llx esp %016llx %016llx error reading memory: %zu %u ODS: %p/%d "%s" ssp onssp offload dll %016llx: %s unload dllprocess %08x %08x exit %d total cycles: %d, counted cycles: %d (ȼȻNйtracing *all* $eip to the consolestepping disabled; enable via OutputDebugString ("ssp on")stepping enabled; disable via OutputDebugString ("ssp off")profiling dll usagetracing all sub-threads too, not just the main onetracing all $eip to trace.sspverbose messages enabledssp (cygwin) %d.%d.%d Single-Step Profiler Copyright (C) 2000 - %s Cygwin Authors This is free software; see the source for copying conditions. There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. Feb 6 2025Try `%s --help' for more information. %lliHey, low_pc must be lower than high_pc Ouch, malloc failed prun: [%016llx,%016llx] Running '%s' wbgmon.out Main-Thread Other-Thread BaseAddr DLL Name%7d %3d%% %7d %3d%% %016llx %s nS:console-tracedisableenablehelpdllsub-threadstrace-eipverboseversionH ^GCC: (GNU) 13.3.0GCC: (GNU) 13.3.0GCC: (GNU) 13.3.0GCC: (GNU) 13.3.0GCC: (GNU) 13.3.0GCC: (GNU) 13.3.0GCC: (GNU) 13.3.0GCC: (GNU) 13.3.0GCC: (GNU) 13.3.0GCC: (GNU) 13.3.0GCC: (GNU) 13.3.0GCC: (GNU) 13.3.0GCC: (GNU) 13.3.0GCC: (GNU) 13.3.0GCC: (GNU) 13.3.0`-@pFRSDS an JDPepq M,P</L0!"X###########''''|(((Đ((Ȑ()̐)_-p`-e-ؐB20B0`pP  20`pPB0`pPB0` ' 0 ` p P  0`pPB x h0`bB0`@PVQ@Q 0@` @` X<3CQjwHP,`7LXjx0"XF@iz(p@8h+8E WPdp__imp_ResumeThread__lib64_libkernel32_a_iname__imp__dll_crt0__imp_tolower__imp_ContinueDebugEvent__imp_calloc__nm_optind_head_msys_2_0_dll__imp_SetThreadPriority__imp_SetThreadContext__imp_strcmp__imp_cygwin_internal__imp_posix_memalign__imp_GetLastError__imp_free__nm__impure_ptr__imp_puts__imp_CreateProcessA__IAT_end____imp_dll_dllcrt0__imp_WaitForDebugEvent__imp_setbuf__imp___locale_ctype_ptr__imp_fwrite__imp_WriteProcessMemory_head_lib64_libkernel32_a__imp_msys_detach_dll__imp_GetThreadContext__imp_sscanf__imp_program_invocation_short_name__nm_program_invocation_short_name__imp___getreent__imp_GetModuleHandleA__imp___main__imp_malloc__imp__impure_ptr__imp_realloc__imp_exit__IAT_start____imp_perror__imp___cxa_atexit__imp_fprintf__imp_optind__imp_qsort__imp_fclose__imp_fflush__imp_getopt_long__imp_printf__imp_fopen__imp_ReadProcessMemorymsys_2_0_dll_iname