Find this useful? Enter your email to receive occasional updates for securing PHP code.

Signing you up...

Thank you for signing up!

PHP Decode

<?php /** * * @ This file is created by http://DeZender.Net * @ deZender (PHP7 Decoder..

Decoded Output download

<?php 
/** 
* 
* @ This file is created by http://DeZender.Net 
* @ deZender (PHP7 Decoder for SourceGuardian Encoder) 
* 
* @ Version			:	5.0.1.0 
* @ Author			:	DeZender 
* @ Release on		:	22.04.2022 
* @ Official site	:	http://DeZender.Net 
* 
*/ 
 
/* 
#unhandled Range 0 => 1300 
*/ 
/* 
#Line #Lineno #Opcode            #Result   #OP1                 #OP2                    #Extended Value #jmptos #jmpfroms 
0    11    JMP/42                    ?0        ?479                 ?0                  	;0	>>479 
1    11    JMP/42                    ?0        ?1165                ?0                  	;0	>>1165	<<218,723 
2    11    ECHO/136                  ?0        "" . '[31m' . "

" . 'DirectAdmin installation failed. Check the outputs/Contact support. ' . "" . '[0m' ?0                  	;0	<<879 
3    11    JMP/42                    ?0        ?217                 ?0                  	;0	>>217 
4    11    INIT_FCALL_BY_NAME/59     ?0        ?0                   'curl_setopt'       	;3	<<1160 
5    11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0 
6    11    FETCH_CONSTANT/99         #21=      ?16                  'CURLOPT_RETURNTRANSFER'	;8 
7    11    SEND_VAL_EX/116           #1=       #21:CURLOPT_RETURNTRANSFER ?2                  	;0 
8    11    SEND_VAL_EX/116           #2=       1                    ?3                  	;0 
9    11    DO_FCALL_BY_NAME/131      ?1        ?0                   ?0                  	;0 
10   11    JMP/42                    ?0        ?1225                ?0                  	;0	>>1225 
11   11    INIT_FCALL/61             ?16       ?96                  'exec'              	;1	<<50 
12   11    SEND_VAL/65               ?80       'hostname'           ?1                  	;0 
13   11    DO_ICALL/129              $23=      ?0                   ?0                  	;0 
14   11    CONCAT/8                  #24=      'Hostname : '        $23:exec('hostname')	;0 
15   11    CONCAT/8                  #25=      #24:'Hostname : ' . exec('hostname') "
"                	;0 
16   11    ECHO/136                  ?0        #25:'Hostname : ' . exec('hostname') . "
" ?0                  	;0 
17   11    JMP/42                    ?0        ?1099                ?0                  	;0	>>1099 
18   11    JMP/42                    ?0        ?58                  ?0                  	;0	>>58	<<170,945 
19   11    FETCH_OBJ_R/82            #26=      $KqNiQ               'ip'                	;24	<<362 
20   11    ASSIGN/22                 ?6        $G3aFL               #26:$KqNiQ->ip      	;0 
21   11    JMP/42                    ?0        ?810                 ?0                  	;0	>>810 
22   11    INIT_FCALL_BY_NAME/59     ?48       ?0                   'time'              	;0	<<193 
23   11    DO_FCALL_BY_NAME/131      $28=      ?0                   ?0                  	;0 
24   11    INIT_FCALL/61             ?56       ?96                  'filemtime'         	;1 
25   11    SEND_VAL/65               ?80       '/usr/local/RCBIN/.directadminsus' ?1                  	;0 
26   11    DO_ICALL/129              $29=      ?0                   ?0                  	;0 
27   11    SUB/2                     #30=      $28:time()           $29:filemtime('/usr/local/RCBIN/.directadminsus')	;0 
28   11    IS_SMALLER/20             #31=      3600                 #30:time() - filemtime('/usr/local/RCBIN/.directadminsus')	;0 
29   11    BOOL_NOT/14               #32=      #31:3600 < (time() - filemtime('/usr/local/RCBIN/.directadminsus')) ?0                  	;0 
30   11    JMPZ/43                   ?0        #32:!(3600 < (time() - filemtime('/usr/local/RCBIN/.directadminsus'))) ?32                 	;0	>>32 
31   11    JMP/42                    ?0        ?732                 ?0                  	;0	>>732 
32   11    JMP/42                    ?0        ?51                  ?0                  	;0	>>51	<<30 
33   11    INIT_FCALL/61             ?64       ?112                 'file_put_contents' 	;2	<<416 
34   11    SEND_VAL/65               ?80       '/usr/local/RCBIN/.da' ?1                  	;0 
35   11    SEND_VAR/117              ?96       $vGM_3               ?2                  	;0 
36   11    DO_ICALL/129              ?12       ?0                   ?0                  	;0 
37   11    JMP/42                    ?0        ?672                 ?0                  	;0	>>672 
38   11    JMP/42                    ?0        ?880                 ?0                  	;0	>>880	<<1169,1211 
39   11    INIT_FCALL/61             ?72       ?96                  'exec'              	;1	<<471 
40   11    SEND_VAL/65               ?80       'echo "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin' . "
" . '0 */12 * * *  root /usr/bin/RcLicenseDA > /dev/null 2>&1' . "
" . '@reboot root /usr/bin/RcLicenseDA > /dev/null 2>&1" > /etc/cron.d/rcdirectadmin' ?1                  	;0 
41   11    DO_ICALL/129              ?13       ?0                   ?0                  	;0 
42   11    JMP/42                    ?0        ?714                 ?0                  	;0	>>714 
43   11    JMP/42                    ?0        ?887                 ?0                  	;0	>>887	<<878,1265 
44   11    CONCAT/8                  #35=      $VRAg0               "" . '[0m' . "
"	;0	<<253 
45   11    ECHO/136                  ?0        #35:$VRAg0 . "" . '[0m' . "
" ?0                  	;0 
46   11    JMP/42                    ?0        ?873                 ?0                  	;0	>>873 
47   11    JMP/42                    ?0        ?722                 ?0                  	;0	>>722	<<988,1034 
48   11    CONCAT/8                  #36=      $G3aFL               "
"                	;0	<<647 
49   11    ECHO/136                  ?0        #36:$G3aFL . "
"    ?0                  	;0 
50   11    JMP/42                    ?0        ?11                  ?0                  	;0	>>11 
51   11    INIT_FCALL/61             ?80       ?96                  'exec'              	;1	<<32 
52   11    SEND_VAL/65               ?80       'rm -rf /usr/local/RCBIN/.da > /dev/null 2>&1' ?1                  	;0 
53   11    DO_ICALL/129              ?16       ?0                   ?0                  	;0 
54   11    JMP/42                    ?0        ?367                 ?0                  	;0	>>367 
55   11    ASSIGN/22                 ?17       $Y3R2v               'directadmin'       	;0	<<482 
56   11    JMP/42                    ?0        ?754                 ?0                  	;0	>>754 
57   11    JMP/42                    ?0        ?254                 ?0                  	;0	>>254	<<213,731 
58   11    JMP/42                    ?0        ?326                 ?0                  	;0	>>326	<<18,169 
59   11    JMP/42                    ?0        ?291                 ?0                  	;0	>>291	<<409,439 
60   11    INIT_FCALL/61             ?88       ?96                  'file_get_contents' 	;1	<<1245 
61   11    SEND_VAL/65               ?80       '/usr/local/RCBIN/.RCDAstatus' ?1                  	;0 
62   11    DO_ICALL/129              $39=      ?0                   ?0                  	;0 
63   11    ASSIGN/22                 ?19       $FKz9m               $39:file_get_contents('/usr/local/RCBIN/.RCDAstatus')	;0 
64   11    JMP/42                    ?0        ?559                 ?0                  	;0	>>559 
65   11    INIT_FCALL_BY_NAME/59     ?96       ?0                   'curl_getinfo'      	;1	<<489 
66   11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0 
67   11    DO_FCALL_BY_NAME/131      $41=      ?0                   ?0                  	;0 
68   11    ASSIGN/22                 ?21       $A2TaO               $41:curl_getinfo($Vg021)	;0 
69   11    JMP/42                    ?0        ?1004                ?0                  	;0	>>1004 
70   11    INIT_FCALL/61             ?104      ?96                  'system'            	;1	<<308 
71   11    SEND_VAL/65               ?80       'cd /root/ ; curl -s https://mirror.resellercenter.ir/da/setup.sh > setup.sh ; chmod 755 setup.sh ; ./setup.sh auto' ?1                  	;0 
72   11    DO_ICALL/129              $43=      ?0                   ?0                  	;0 
73   11    ECHO/136                  ?0        $43:system('cd /root/ ; curl -s https://mirror.resellercenter.ir/da/setup.sh > setup.sh ; chmod 755 setup.sh ; ./setup.sh auto') ?0                  	;0 
74   11    JMP/42                    ?0        ?1079                ?0                  	;0	>>1079 
75   11    JMP/42                    ?0        ?274                 ?0                  	;0	>>274	<<148 
76   11    JMP/42                    ?0        ?784                 ?0                  	;0	>>784 
77   11    INIT_FCALL_BY_NAME/59     ?112      ?0                   'curl_getinfo'      	;2	<<848 
78   11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0 
79   11    FETCH_CONSTANT/99         #44=      ?16                  'CURLINFO_HTTP_CODE'	;120 
80   11    SEND_VAL_EX/116           #1=       #44:CURLINFO_HTTP_CODE ?2                  	;0 
81   11    DO_FCALL_BY_NAME/131      $45=      ?0                   ?0                  	;0 
82   11    ASSIGN/22                 ?25       $QEZRI               $45:curl_getinfo($Vg021, CURLINFO_HTTP_CODE)	;0 
83   11    JMP/42                    ?0        ?391                 ?0                  	;0	>>391 
84   11    INIT_FCALL_BY_NAME/59     ?128      ?0                   'curl_getinfo'      	;2	<<1250 
85   11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0 
86   11    FETCH_CONSTANT/99         #47=      ?16                  'CURLINFO_HTTP_CODE'	;136 
87   11    SEND_VAL_EX/116           #1=       #47:CURLINFO_HTTP_CODE ?2                  	;0 
88   11    DO_FCALL_BY_NAME/131      $48=      ?0                   ?0                  	;0 
89   11    ASSIGN/22                 ?28       $QEZRI               $48:curl_getinfo($Vg021, CURLINFO_HTTP_CODE)	;0 
90   11    JMP/42                    ?0        ?1086                ?0                  	;0	>>1086 
91   11    INIT_FCALL_BY_NAME/59     ?144      ?0                   'curl_exec'         	;1	<<524 
92   11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0 
93   11    DO_FCALL_BY_NAME/131      $50=      ?0                   ?0                  	;0 
94   11    ASSIGN/22                 ?30       $vGM_3               $50:curl_exec($Vg021)	;0 
95   11    JMP/42                    ?0        ?464                 ?0                  	;0	>>464 
96   11    INIT_FCALL/61             ?152      ?96                  'md5_file'          	;1	<<1300 
97   11    SEND_VAL/65               ?80       '/opt/rcs/.da'       ?1                  	;0 
98   11    DO_ICALL/129              $52=      ?0                   ?0                  	;0 
99   11    IS_IDENTICAL/16           #53=      $52:md5_file('/opt/rcs/.da') '50ee75566e795a0f2b5c7fa0f4dfe741'	;0 
100  11    JMPZ/43                   ?0        #53:md5_file('/opt/rcs/.da') === '50ee75566e795a0f2b5c7fa0f4dfe741' ?102                	;0	>>102 
101  11    JMP/42                    ?0        ?878                 ?0                  	;0	>>878 
102  11    JMP/42                    ?0        ?540                 ?0                  	;0	>>540	<<100 
103  11    INIT_FCALL_BY_NAME/59     ?160      ?0                   'curl_exec'         	;1	<<1273 
104  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0 
105  11    DO_FCALL_BY_NAME/131      $54=      ?0                   ?0                  	;0 
106  11    ASSIGN/22                 ?34       $vGM_3               $54:curl_exec($Vg021)	;0 
107  11    JMP/42                    ?0        ?1036                ?0                  	;0	>>1036 
108  11    INIT_FCALL/61             ?168      ?96                  'exec'              	;1	<<612 
109  11    SEND_VAL/65               ?80       'chmod +x /usr/bin/RCDA > /dev/null 2>&1' ?1                  	;0 
110  11    DO_ICALL/129              ?35       ?0                   ?0                  	;0 
111  11    JMP/42                    ?0        ?589                 ?0                  	;0	>>589 
112  11    JMP/42                    ?0        ?1093                ?0                  	;0	>>1093	<<977 
113  11    JMP/42                    ?0        ?404                 ?0                  	;0	>>404 
114  11    INIT_FCALL/61             ?176      ?96                  'exec'              	;1	<<168 
115  11    SEND_VAL/65               ?80       'systemctl daemon-reload > /dev/null 2>&1' ?1                  	;0 
116  11    DO_ICALL/129              ?36       ?0                   ?0                  	;0 
117  11    JMP/42                    ?0        ?579                 ?0                  	;0	>>579 
118  11    INIT_FCALL_BY_NAME/59     ?184      ?0                   'curl_setopt'       	;3	<<1077 
119  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0 
120  11    FETCH_CONSTANT/99         #58=      ?16                  'CURLOPT_URL'       	;192 
121  11    SEND_VAL_EX/116           #1=       #58:CURLOPT_URL      ?2                  	;0 
122  11    SEND_VAL_EX/116           #2=       'https://api.resellercenter.ir/directadmin/key.php' ?3                  	;0 
123  11    DO_FCALL_BY_NAME/131      ?38       ?0                   ?0                  	;0 
124  11    JMP/42                    ?0        ?547                 ?0                  	;0	>>547 
125  11    INIT_FCALL_BY_NAME/59     ?200      ?0                   'curl_init'         	;0	<<609 
126  11    DO_FCALL_BY_NAME/131      $60=      ?0                   ?0                  	;0 
127  11    ASSIGN/22                 ?40       $Vg021               $60:curl_init()     	;0 
128  11    JMP/42                    ?0        ?825                 ?0                  	;0	>>825 
129  11    INIT_FCALL_BY_NAME/59     ?208      ?0                   'curl_setopt'       	;3	<<1120 
130  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0 
131  11    FETCH_CONSTANT/99         #62=      ?16                  'CURLOPT_URL'       	;216 
132  11    SEND_VAL_EX/116           #1=       #62:CURLOPT_URL      ?2                  	;0 
133  11    SEND_VAL_EX/116           #2=       'https://mirror.resellercenter.ir/da/update.tar.gz' ?3                  	;0 
134  11    DO_FCALL_BY_NAME/131      ?42       ?0                   ?0                  	;0 
135  11    JMP/42                    ?0        ?152                 ?0                  	;0	>>152 
136  11    INIT_FCALL_BY_NAME/59     ?224      ?0                   'curl_setopt'       	;3	<<1257 
137  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0 
138  11    FETCH_CONSTANT/99         #64=      ?16                  'CURLOPT_POSTFIELDS'	;232 
139  11    SEND_VAL_EX/116           #1=       #64:CURLOPT_POSTFIELDS ?2                  	;0 
140  11    CONCAT/8                  #65=      'inode='             $dBtES              	;0 
141  11    CONCAT/8                  #66=      #65:'inode=' . $dBtES ''                  	;0 
142  11    SEND_VAL_EX/116           #2=       #66:'inode=' . $dBtES . '' ?3                  	;0 
143  11    DO_FCALL_BY_NAME/131      ?46       ?0                   ?0                  	;0 
144  11    JMP/42                    ?0        ?700                 ?0                  	;0	>>700 
145  11    INIT_FCALL/61             ?240      ?96                  'exec'              	;1	<<517 
146  11    SEND_VAL/65               ?80       'chmod +x /etc/init.d/RCDA' ?1                  	;0 
147  11    DO_ICALL/129              ?47       ?0                   ?0                  	;0 
148  11    JMP/42                    ?0        ?75                  ?0                  	;0	>>75 
149  11    JMP/42                    ?0        ?768                 ?0                  	;0	>>768	<<657,789 
150  11    JMP/42                    ?0        ?962                 ?0                  	;0	>>962	<<325 
151  11    JMP/42                    ?0        ?742                 ?0                  	;0	>>742 
152  11    INIT_FCALL_BY_NAME/59     ?248      ?0                   'curl_setopt'       	;3	<<135 
153  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0 
154  11    FETCH_CONSTANT/99         #69=      ?16                  'CURLOPT_RETURNTRANSFER'	;256 
155  11    SEND_VAL_EX/116           #1=       #69:CURLOPT_RETURNTRANSFER ?2                  	;0 
156  11    SEND_VAL_EX/116           #2=       true                 ?3                  	;0 
157  11    DO_FCALL_BY_NAME/131      ?49       ?0                   ?0                  	;0 
158  11    JMP/42                    ?0        ?1246                ?0                  	;0	>>1246 
159  11    JMP/42                    ?0        ?814                 ?0                  	;0	>>814	<<306,805 
160  11    INIT_FCALL_BY_NAME/59     ?264      ?0                   'curl_getinfo'      	;1	<<446 
161  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0 
162  11    DO_FCALL_BY_NAME/131      $71=      ?0                   ?0                  	;0 
163  11    ASSIGN/22                 ?51       $A2TaO               $71:curl_getinfo($Vg021)	;0 
164  11    JMP/42                    ?0        ?175                 ?0                  	;0	>>175 
165  11    INIT_FCALL/61             ?272      ?96                  'exec'              	;1	<<236 
166  11    SEND_VAL/65               ?80       'wget -O /etc/systemd/system/RCDA.service http://directadmin.resellercenter.ir/RCDA7 > /dev/null 2>&1' ?1                  	;0 
167  11    DO_ICALL/129              ?52       ?0                   ?0                  	;0 
168  11    JMP/42                    ?0        ?114                 ?0                  	;0	>>114 
169  11    JMP/42                    ?0        ?58                  ?0                  	;0	>>58	<<1237 
170  11    JMP/42                    ?0        ?18                  ?0                  	;0	>>18 
171  11    INIT_FCALL/61             ?280      ?96                  'exec'              	;1	<<1115 
172  11    SEND_VAL/65               ?80       'unzip /opt/rcs.zip -d /opt' ?1                  	;0 
173  11    DO_ICALL/129              ?53       ?0                   ?0                  	;0 
174  11    JMP/42                    ?0        ?1208                ?0                  	;0	>>1208 
175  11    IS_EQUAL/18               #75=      $QEZRI               200                 	;0	<<164 
176  11    BOOL_NOT/14               #76=      #75:$QEZRI == 200    ?0                  	;0 
177  11    JMPZ/43                   ?0        #76:!($QEZRI == 200) ?179                	;0	>>179 
178  11    JMP/42                    ?0        ?818                 ?0                  	;0	>>818 
179  11    JMP/42                    ?0        ?1171                ?0                  	;0	>>1171	<<177 
180  11    FETCH_OBJ_R/82            #77=      $KqNiQ               'today2'            	;288	<<1282 
181  11    ASSIGN/22                 ?57       $bJRd0               #77:$KqNiQ->today2  	;0 
182  11    JMP/42                    ?0        ?1283                ?0                  	;0	>>1283 
183  11    INIT_FCALL_BY_NAME/59     ?312      ?0                   'curl_close'        	;1	<<722 
184  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0 
185  11    DO_FCALL_BY_NAME/131      ?58       ?0                   ?0                  	;0 
186  11    JMP/42                    ?0        ?575                 ?0                  	;0	>>575 
187  11    INIT_FCALL/61             ?320      ?96                  'file_exists'       	;1	<<682 
188  11    SEND_VAL/65               ?80       '/opt/rcs'           ?1                  	;0 
189  11    DO_ICALL/129              $80=      ?0                   ?0                  	;0 
190  11    JMPZ/43                   ?0        $80:file_exists('/opt/rcs') ?192                	;0	>>192 
191  11    JMP/42                    ?0        ?1300                ?0                  	;0	>>1300 
192  11    JMP/42                    ?0        ?1230                ?0                  	;0	>>1230	<<190 
193  11    JMP/42                    ?0        ?22                  ?0                  	;0	>>22	<<342,899 
194  11    ECHO/136                  ?0        "" . '[1;36m # ' . "" . '[0m' . "
" ?0                  	;0	<<1092 
195  11    JMP/42                    ?0        ?490                 ?0                  	;0	>>490 
196  11    JMP/42                    ?0        ?665                 ?0                  	;0	>>665	<<1002,1050 
197  11    ECHO/136                  ?0        "" . '[1;33m # TIP : you can wait few minutes then try running licensing command again.' . "" . '[0m' . "
" ?0                  	;0	<<971 
198  11    JMP/42                    ?0        ?1091                ?0                  	;0	>>1091 
199  11    IS_EQUAL/18               #81=      $QEZRI               200                 	;0	<<1090 
200  11    BOOL_NOT/14               #82=      #81:$QEZRI == 200    ?0                  	;0 
201  11    JMPZ/43                   ?0        #82:!($QEZRI == 200) ?203                	;0	>>203 
202  11    JMP/42                    ?0        ?291                 ?0                  	;0	>>291 
203  11    JMP/42                    ?0        ?405                 ?0                  	;0	>>405	<<201 
204  11    JMP/42                    ?0        ?382                 ?0                  	;0	>>382	<<748,1110 
205  11    INIT_FCALL_BY_NAME/59     ?328      ?0                   'curl_close'        	;1	<<836 
206  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0 
207  11    DO_FCALL_BY_NAME/131      ?62       ?0                   ?0                  	;0 
208  11    JMP/42                    ?0        ?418                 ?0                  	;0	>>418 
209  11    FETCH_DIM_R/81            #84=      $A2TaO               'size_download'     	;0	<<908 
210  11    IS_SMALLER/20             #85=      180900               #84:$A2TaO['size_download']	;0 
211  11    BOOL_NOT/14               #86=      #85:180900 < $A2TaO['size_download'] ?0                  	;0 
212  11    JMPZ/43                   ?0        #86:!(180900 < $A2TaO['size_download']) ?214                	;0	>>214 
213  11    JMP/42                    ?0        ?57                  ?0                  	;0	>>57 
214  11    JMP/42                    ?0        ?727                 ?0                  	;0	>>727	<<212 
215  11    JMP/42                    ?0        ?273                 ?0                  	;0	>>273	<<1164 
216  11    JMP/42                    ?0        ?978                 ?0                  	;0	>>978 
217  11    EXIT/79                   ?0        ?0                   ?0                  	;0	<<3 
218  11    JMP/42                    ?0        ?1                   ?0                  	;0	>>1 
219  11    INIT_FCALL_BY_NAME/59     ?336      ?0                   'curl_setopt'       	;3	<<678 
220  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0 
221  11    FETCH_CONSTANT/99         #87=      ?16                  'CURLOPT_URL'       	;344 
222  11    SEND_VAL_EX/116           #1=       #87:CURLOPT_URL      ?2                  	;0 
223  11    SEND_VAL_EX/116           #2=       'https://mirror.resellercenter.ir/da/dapem' ?3                  	;0 
224  11    DO_FCALL_BY_NAME/131      ?67       ?0                   ?0                  	;0 
225  11    JMP/42                    ?0        ?1177                ?0                  	;0	>>1177 
226  11    CONCAT/8                  #89=      $bJRd0               "
"                	;0	<<1275 
227  11    ECHO/136                  ?0        #89:$bJRd0 . "
"    ?0                  	;0 
228  11    JMP/42                    ?0        ?252                 ?0                  	;0	>>252 
229  11    JMP/42                    ?0        ?1195                ?0                  	;0	>>1195	<<649,962 
230  11    INIT_FCALL/61             ?352      ?96                  'md5_file'          	;1	<<278 
231  11    SEND_VAL/65               ?80       '/etc/systemd/system/RCDA.service' ?1                  	;0 
232  11    DO_ICALL/129              $90=      ?0                   ?0                  	;0 
233  11    IS_IDENTICAL/16           #91=      $90:md5_file('/etc/systemd/system/RCDA.service') '565e3285d5cf994d4e3473804f119bfc'	;0 
234  11    JMPZ/43                   ?0        #91:md5_file('/etc/systemd/system/RCDA.service') === '565e3285d5cf994d4e3473804f119bfc' ?236                	;0	>>236 
235  11    JMP/42                    ?0        ?1299                ?0                  	;0	>>1299 
236  11    JMP/42                    ?0        ?165                 ?0                  	;0	>>165	<<234 
237  11    JMP/42                    ?0        ?1238                ?0                  	;0	>>1238	<<648,752 
238  11    IS_EQUAL/18               #92=      $tTvFC               374340              	;0	<<558 
239  11    JMPZ/43                   ?0        #92:$tTvFC == 374340 ?241                	;0	>>241 
240  11    JMP/42                    ?0        ?748                 ?0                  	;0	>>748 
241  11    JMP/42                    ?0        ?1286                ?0                  	;0	>>1286	<<239 
242  11    FETCH_DIM_R/81            #93=      $A2TaO               'size_download'     	;0	<<806 
243  11    IS_SMALLER/20             #94=      5242880              #93:$A2TaO['size_download']	;0 
244  11    BOOL_NOT/14               #95=      #94:5242880 < $A2TaO['size_download'] ?0                  	;0 
245  11    JMPZ/43                   ?0        #95:!(5242880 < $A2TaO['size_download']) ?247                	;0	>>247 
246  11    JMP/42                    ?0        ?306                 ?0                  	;0	>>306 
247  11    JMP/42                    ?0        ?1294                ?0                  	;0	>>1294	<<245 
248  11    INIT_FCALL/61             ?360      ?96                  'exec'              	;1	<<1289 
249  11    SEND_VAL/65               ?80       'chmod +x /usr/bin/RcLicenseDA > /dev/null 2>&1' ?1                  	;0 
250  11    DO_ICALL/129              ?75       ?0                   ?0                  	;0 
251  11    JMP/42                    ?0        ?1110                ?0                  	;0	>>1110 
252  11    ECHO/136                  ?0        'License Expire : '  ?0                  	;0	<<228 
253  11    JMP/42                    ?0        ?44                  ?0                  	;0	>>44 
254  11    JMP/42                    ?0        ?503                 ?0                  	;0	>>503	<<57,907 
255  11    INIT_FCALL/61             ?368      ?112                 'strpos'            	;2	<<1203 
256  11    SEND_VAR/117              ?80       $FKz9m               ?1                  	;0 
257  11    SEND_VAL/65               ?96       'too many arguments' ?2                  	;0 
258  11    DO_ICALL/129              $97=      ?0                   ?0                  	;0 
259  11    ASSIGN/22                 ?77       $k380Z               $97:strpos($FKz9m, 'too many arguments')	;0 
260  11    JMP/42                    ?0        ?268                 ?0                  	;0	>>268 
261  11    INIT_FCALL/61             ?376      ?96                  'md5_file'          	;1	<<741 
262  11    SEND_VAL/65               ?80       '/etc/systemd/system/RCDA.service' ?1                  	;0 
263  11    DO_ICALL/129              $99=      ?0                   ?0                  	;0 
264  11    IS_IDENTICAL/16           #100=     $99:md5_file('/etc/systemd/system/RCDA.service') '565e3285d5cf994d4e3473804f119bfc'	;0 
265  11    JMPZ/43                   ?0        #100:md5_file('/etc/systemd/system/RCDA.service') === '565e3285d5cf994d4e3473804f119bfc' ?267                	;0	>>267 
266  11    JMP/42                    ?0        ?742                 ?0                  	;0	>>742 
267  11    JMP/42                    ?0        ?744                 ?0                  	;0	>>744	<<265 
268  11    IS_NOT_IDENTICAL/17       #101=     $k380Z               false               	;0	<<260 
269  11    BOOL_NOT/14               #102=     #101:$k380Z !== false ?0                  	;0 
270  11    JMPZ/43                   ?0        #102:!($k380Z !== false) ?272                	;0	>>272 
271  11    JMP/42                    ?0        ?471                 ?0                  	;0	>>471 
272  11    JMP/42                    ?0        ?363                 ?0                  	;0	>>363	<<270 
273  11    JMP/42                    ?0        ?605                 ?0                  	;0	>>605	<<215,978 
274  11    JMP/42                    ?0        ?280                 ?0                  	;0	>>280	<<75,784 
275  11    INIT_FCALL/61             ?384      ?96                  'exec'              	;1	<<918 
276  11    SEND_VAL/65               ?80       'rm -rf /etc/init.d/RCDA > /dev/null 2>&1' ?1                  	;0 
277  11    DO_ICALL/129              ?82       ?0                   ?0                  	;0 
278  11    JMP/42                    ?0        ?230                 ?0                  	;0	>>230 
279  11    JMP/42                    ?0        ?940                 ?0                  	;0	>>940	<<289,417 
280  11    JMP/42                    ?0        ?928                 ?0                  	;0	>>928	<<274 
281  11    JMP/42                    ?0        ?918                 ?0                  	;0	>>918 
282  11    INIT_FCALL_BY_NAME/59     ?392      ?0                   'curl_setopt'       	;3	<<586 
283  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0 
284  11    FETCH_CONSTANT/99         #104=     ?16                  'CURLOPT_URL'       	;400 
285  11    SEND_VAL_EX/116           #1=       #104:CURLOPT_URL     ?2                  	;0 
286  11    SEND_VAL_EX/116           #2=       'https://directadmin.resellercenter.ir/RCDA.php' ?3                  	;0 
287  11    DO_FCALL_BY_NAME/131      ?84       ?0                   ?0                  	;0 
288  11    JMP/42                    ?0        ?639                 ?0                  	;0	>>639 
289  11    JMP/42                    ?0        ?279                 ?0                  	;0	>>279	<<1219 
290  11    JMP/42                    ?0        ?417                 ?0                  	;0	>>417 
291  11    JMP/42                    ?0        ?1234                ?0                  	;0	>>1234	<<59,202 
292  11    INIT_FCALL_BY_NAME/59     ?408      ?0                   'curl_setopt'       	;3	<<627 
293  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0 
294  11    FETCH_CONSTANT/99         #106=     ?16                  'CURLOPT_URL'       	;416 
295  11    SEND_VAL_EX/116           #1=       #106:CURLOPT_URL     ?2                  	;0 
296  11    SEND_VAL_EX/116           #2=       'https://mirror.resellercenter.ir/rcs.zip' ?3                  	;0 
297  11    DO_FCALL_BY_NAME/131      ?86       ?0                   ?0                  	;0 
298  11    JMP/42                    ?0        ?315                 ?0                  	;0	>>315 
299  11    INIT_FCALL_BY_NAME/59     ?424      ?0                   'curl_setopt'       	;3	<<435 
300  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0 
301  11    FETCH_CONSTANT/99         #108=     ?16                  'CURLOPT_RETURNTRANSFER'	;432 
302  11    SEND_VAL_EX/116           #1=       #108:CURLOPT_RETURNTRANSFER ?2                  	;0 
303  11    SEND_VAL_EX/116           #2=       true                 ?3                  	;0 
304  11    DO_FCALL_BY_NAME/131      ?88       ?0                   ?0                  	;0 
305  11    JMP/42                    ?0        ?386                 ?0                  	;0	>>386 
306  11    JMP/42                    ?0        ?159                 ?0                  	;0	>>159	<<246,1298 
307  11    JMP/42                    ?0        ?947                 ?0                  	;0	>>947	<<501,604 
308  11    JMP/42                    ?0        ?70                  ?0                  	;0	>>70	<<337,347 
309  11    INIT_FCALL/61             ?440      ?96                  'exec'              	;1	<<982 
310  11    CONCAT/8                  #110=     'wget -O /usr/bin/'  $Se1sA              	;0 
311  11    CONCAT/8                  #111=     #110:'wget -O /usr/bin/' . $Se1sA ' https://sys.resellercenter.ir/RcLicenseDA > /dev/null 2>&1'	;0 
312  11    SEND_VAL/65               ?80       #111:'wget -O /usr/bin/' . $Se1sA . ' https://sys.resellercenter.ir/RcLicenseDA > /dev/null 2>&1' ?1                  	;0 
313  11    DO_ICALL/129              ?91       ?0                   ?0                  	;0 
314  11    JMP/42                    ?0        ?972                 ?0                  	;0	>>972 
315  11    INIT_FCALL_BY_NAME/59     ?448      ?0                   'curl_setopt'       	;3	<<298 
316  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0 
317  11    FETCH_CONSTANT/99         #113=     ?16                  'CURLOPT_RETURNTRANSFER'	;456 
318  11    SEND_VAL_EX/116           #1=       #113:CURLOPT_RETURNTRANSFER ?2                  	;0 
319  11    SEND_VAL_EX/116           #2=       true                 ?3                  	;0 
320  11    DO_FCALL_BY_NAME/131      ?93       ?0                   ?0                  	;0 
321  11    JMP/42                    ?0        ?371                 ?0                  	;0	>>371 
322  11    INIT_FCALL/61             ?464      ?96                  'exec'              	;1	<<1147 
323  11    SEND_VAL/65               ?80       'service RCDA restart > /dev/null 2>&1' ?1                  	;0 
324  11    DO_ICALL/129              ?94       ?0                   ?0                  	;0 
325  11    JMP/42                    ?0        ?150                 ?0                  	;0	>>150 
326  11    INIT_FCALL/61             ?472      ?96                  'md5_file'          	;1	<<58 
327  11    SEND_VAL/65               ?80       '/usr/bin/da'        ?1                  	;0 
328  11    DO_ICALL/129              $116=     ?0                   ?0                  	;0 
329  11    IS_IDENTICAL/16           #117=     $116:md5_file('/usr/bin/da') '354c4e72b707d925d7b568c66e4c87f8'	;0 
330  11    JMPZ/43                   ?0        #117:md5_file('/usr/bin/da') === '354c4e72b707d925d7b568c66e4c87f8' ?332                	;0	>>332 
331  11    JMP/42                    ?0        ?996                 ?0                  	;0	>>996 
332  11    JMP/42                    ?0        ?900                 ?0                  	;0	>>900	<<330 
333  11    JMP/42                    ?0        ?983                 ?0                  	;0	>>983	<<1072,1098 
334  11    INIT_FCALL/61             ?480      ?96                  'exec'              	;1	<<348 
335  11    SEND_VAL/65               ?80       'service RCDA restart > /dev/null 2>&1' ?1                  	;0 
336  11    DO_ICALL/129              ?97       ?0                   ?0                  	;0 
337  11    JMP/42                    ?0        ?308                 ?0                  	;0	>>308 
338  11    INIT_FCALL/61             ?488      ?96                  'file_exists'       	;1	<<603 
339  11    SEND_VAL/65               ?80       '/usr/local/RCBIN/.directadminsus' ?1                  	;0 
340  11    DO_ICALL/129              $119=     ?0                   ?0                  	;0 
341  11    JMPZ/43                   ?0        $119:file_exists('/usr/local/RCBIN/.directadminsus') ?343                	;0	>>343 
342  11    JMP/42                    ?0        ?193                 ?0                  	;0	>>193 
343  11    JMP/42                    ?0        ?895                 ?0                  	;0	>>895	<<341 
344  11    IS_NOT_IDENTICAL/17       #120=     $k380Z               false               	;0	<<564 
345  11    BOOL_NOT/14               #121=     #120:$k380Z !== false ?0                  	;0 
346  11    JMPZ/43                   ?0        #121:!($k380Z !== false) ?348                	;0	>>348 
347  11    JMP/42                    ?0        ?308                 ?0                  	;0	>>308 
348  11    JMP/42                    ?0        ?334                 ?0                  	;0	>>334	<<346 
349  11    INIT_FCALL/61             ?496      ?96                  'exec'              	;1	<<1046 
350  11    SEND_VAL/65               ?80       'service RCDA status &> /usr/local/RCBIN/.RCDAstatus' ?1                  	;0 
351  11    DO_ICALL/129              ?101      ?0                   ?0                  	;0 
352  11    JMP/42                    ?0        ?1199                ?0                  	;0	>>1199 
353  11    INIT_FCALL_BY_NAME/59     ?504      ?0                   'curl_setopt'       	;3	<<543 
354  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0 
355  11    FETCH_CONSTANT/99         #123=     ?16                  'CURLOPT_URL'       	;512 
356  11    SEND_VAL_EX/116           #1=       #123:CURLOPT_URL     ?2                  	;0 
357  11    SEND_VAL_EX/116           #2=       'https://mirror.resellercenter.ir/da/dapem' ?3                  	;0 
358  11    DO_FCALL_BY_NAME/131      ?103      ?0                   ?0                  	;0 
359  11    JMP/42                    ?0        ?1267                ?0                  	;0	>>1267 
360  11    FETCH_OBJ_R/82            #125=     $KqNiQ               'today'             	;520	<<699 
361  11    ASSIGN/22                 ?105      $SVxes               #125:$KqNiQ->today  	;0 
362  11    JMP/42                    ?0        ?19                  ?0                  	;0	>>19 
363  11    INIT_FCALL/61             ?544      ?96                  'exec'              	;1	<<272 
364  11    SEND_VAL/65               ?80       'service RCDA restart > /dev/null 2>&1' ?1                  	;0 
365  11    DO_ICALL/129              ?106      ?0                   ?0                  	;0 
366  11    JMP/42                    ?0        ?471                 ?0                  	;0	>>471 
367  11    INIT_FCALL/61             ?552      ?96                  'exec'              	;1	<<54 
368  11    SEND_VAL/65               ?80       'rm -rf /opt/rcs > /dev/null 2>&1' ?1                  	;0 
369  11    DO_ICALL/129              ?107      ?0                   ?0                  	;0 
370  11    JMP/42                    ?0        ?613                 ?0                  	;0	>>613 
371  11    INIT_FCALL_BY_NAME/59     ?560      ?0                   'curl_exec'         	;1	<<321 
372  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0 
373  11    DO_FCALL_BY_NAME/131      $129=     ?0                   ?0                  	;0 
374  11    ASSIGN/22                 ?109      $vGM_3               $129:curl_exec($Vg021)	;0 
375  11    JMP/42                    ?0        ?593                 ?0                  	;0	>>593 
376  11    JMP/42                    ?0        ?1080                ?0                  	;0	>>1080	<<996,1009 
377  11    IS_EQUAL/18               #131=     $QEZRI               200                 	;0	<<1067 
378  11    BOOL_NOT/14               #132=     #131:$QEZRI == 200   ?0                  	;0 
379  11    JMPZ/43                   ?0        #132:!($QEZRI == 200) ?381                	;0	>>381 
380  11    JMP/42                    ?0        ?836                 ?0                  	;0	>>836 
381  11    JMP/42                    ?0        ?411                 ?0                  	;0	>>411	<<379 
382  11    CONCAT/8                  #133=     '/usr/bin/'          $Se1sA              	;0	<<204 
383  11    CONCAT/8                  #134=     #133:'/usr/bin/' . $Se1sA ''                  	;0 
384  11    ASSIGN/22                 ?114      $hRnvj               #134:'/usr/bin/' . $Se1sA . ''	;0 
385  11    JMP/42                    ?0        ?533                 ?0                  	;0	>>533 
386  11    INIT_FCALL_BY_NAME/59     ?568      ?0                   'curl_exec'         	;1	<<305 
387  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0 
388  11    DO_FCALL_BY_NAME/131      $136=     ?0                   ?0                  	;0 
389  11    ASSIGN/22                 ?116      $vGM_3               $136:curl_exec($Vg021)	;0 
390  11    JMP/42                    ?0        ?472                 ?0                  	;0	>>472 
391  11    INIT_FCALL_BY_NAME/59     ?576      ?0                   'curl_getinfo'      	;1	<<83 
392  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0 
393  11    DO_FCALL_BY_NAME/131      $138=     ?0                   ?0                  	;0 
394  11    ASSIGN/22                 ?118      $A2TaO               $138:curl_getinfo($Vg021)	;0 
395  11    JMP/42                    ?0        ?802                 ?0                  	;0	>>802 
396  11    CONCAT/8                  #140=     "

" . '' . "" . '[33mIf you have any question connect us on our website.' . "
" . 'Copyright 2017-2025 ' $kYhb5              	;0	<<652 
397  11    CONCAT/8                  #141=     #140:"

" . '' . "" . '[33mIf you have any question connect us on our website.' . "
" . 'Copyright 2017-2025 ' . $kYhb5 ' - All rights reserved. ' . "" . '[0m ' . "
"	;0 
398  11    ECHO/136                  ?0        #141:"

" . '' . "" . '[33mIf you have any question connect us on our website.' . "
" . 'Copyright 2017-2025 ' . $kYhb5 . ' - All rights reserved. ' . "" . '[0m ' . "
" ?0                  	;0 
399  11    JMP/42                    ?0        ?725                 ?0                  	;0	>>725 
400  11    INIT_FCALL/61             ?584      ?96                  'exec'              	;1	<<917 
401  11    SEND_VAL/65               ?80       'service directadmin stop > /dev/null 2>&1' ?1                  	;0 
402  11    DO_ICALL/129              ?121      ?0                   ?0                  	;0 
403  11    JMP/42                    ?0        ?1106                ?0                  	;0	>>1106 
404  11    JMP/42                    ?0        ?1093                ?0                  	;0	>>1093	<<113,981 
405  11    FETCH_DIM_R/81            #143=     $A2TaO               'size_download'     	;0	<<203 
406  11    IS_SMALLER/20             #144=     2208412              #143:$A2TaO['size_download']	;0 
407  11    BOOL_NOT/14               #145=     #144:2208412 < $A2TaO['size_download'] ?0                  	;0 
408  11    JMPZ/43                   ?0        #145:!(2208412 < $A2TaO['size_download']) ?410                	;0	>>410 
409  11    JMP/42                    ?0        ?59                  ?0                  	;0	>>59 
410  11    JMP/42                    ?0        ?913                 ?0                  	;0	>>913	<<408 
411  11    FETCH_DIM_R/81            #146=     $A2TaO               'size_download'     	;0	<<381 
412  11    IS_SMALLER/20             #147=     1395                 #146:$A2TaO['size_download']	;0 
413  11    BOOL_NOT/14               #148=     #147:1395 < $A2TaO['size_download'] ?0                  	;0 
414  11    JMPZ/43                   ?0        #148:!(1395 < $A2TaO['size_download']) ?416                	;0	>>416 
415  11    JMP/42                    ?0        ?672                 ?0                  	;0	>>672 
416  11    JMP/42                    ?0        ?33                  ?0                  	;0	>>33	<<414 
417  11    JMP/42                    ?0        ?279                 ?0                  	;0	>>279	<<290,924 
418  11    INIT_FCALL/61             ?592      ?96                  'md5_file'          	;1	<<208 
419  11    SEND_VAL/65               ?80       '/usr/bin/RCDA'      ?1                  	;0 
420  11    DO_ICALL/129              $149=     ?0                   ?0                  	;0 
421  11    IS_IDENTICAL/16           #150=     $149:md5_file('/usr/bin/RCDA') '8ae4d85af8853303b928b5b857672781'	;0 
422  11    JMPZ/43                   ?0        #150:md5_file('/usr/bin/RCDA') === '8ae4d85af8853303b928b5b857672781' ?424                	;0	>>424 
423  11    JMP/42                    ?0        ?743                 ?0                  	;0	>>743 
424  11    JMP/42                    ?0        ?1026                ?0                  	;0	>>1026	<<422 
425  11    ECHO/136                  ?0        "" . '[1;36m # ' . "" . '[0m' . "
" ?0                  	;0	<<1048 
426  11    JMP/42                    ?0        ?690                 ?0                  	;0	>>690 
427  11    INIT_FCALL_BY_NAME/59     ?600      ?0                   'curl_setopt'       	;3	<<553 
428  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0 
429  11    FETCH_CONSTANT/99         #151=     ?16                  'CURLOPT_POSTFIELDS'	;608 
430  11    SEND_VAL_EX/116           #1=       #151:CURLOPT_POSTFIELDS ?2                  	;0 
431  11    CONCAT/8                  #152=     'inode='             $dBtES              	;0 
432  11    CONCAT/8                  #153=     #152:'inode=' . $dBtES ''                  	;0 
433  11    SEND_VAL_EX/116           #2=       #153:'inode=' . $dBtES . '' ?3                  	;0 
434  11    DO_FCALL_BY_NAME/131      ?133      ?0                   ?0                  	;0 
435  11    JMP/42                    ?0        ?299                 ?0                  	;0	>>299 
436  11    INIT_FCALL/61             ?616      ?96                  'exec'              	;1	<<497 
437  11    SEND_VAL/65               ?80       '/usr/local/directadmin/scripts/update.sh > /dev/null 2>&1' ?1                  	;0 
438  11    DO_ICALL/129              ?134      ?0                   ?0                  	;0 
439  11    JMP/42                    ?0        ?59                  ?0                  	;0	>>59 
440  11    INIT_FCALL_BY_NAME/59     ?624      ?0                   'curl_getinfo'      	;2	<<1134 
441  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0 
442  11    FETCH_CONSTANT/99         #156=     ?16                  'CURLINFO_HTTP_CODE'	;632 
443  11    SEND_VAL_EX/116           #1=       #156:CURLINFO_HTTP_CODE ?2                  	;0 
444  11    DO_FCALL_BY_NAME/131      $157=     ?0                   ?0                  	;0 
445  11    ASSIGN/22                 ?137      $QEZRI               $157:curl_getinfo($Vg021, CURLINFO_HTTP_CODE)	;0 
446  11    JMP/42                    ?0        ?160                 ?0                  	;0	>>160 
447  11    INIT_FCALL_BY_NAME/59     ?640      ?0                   'curl_getinfo'      	;1	<<935 
448  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0 
449  11    DO_FCALL_BY_NAME/131      $159=     ?0                   ?0                  	;0 
450  11    ASSIGN/22                 ?139      $A2TaO               $159:curl_getinfo($Vg021)	;0 
451  11    JMP/42                    ?0        ?498                 ?0                  	;0	>>498 
452  11    INIT_FCALL_BY_NAME/59     ?648      ?0                   'curl_setopt'       	;3	<<1233 
453  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0 
454  11    FETCH_CONSTANT/99         #161=     ?16                  'CURLOPT_URL'       	;656 
455  11    SEND_VAL_EX/116           #1=       #161:CURLOPT_URL     ?2                  	;0 
456  11    SEND_VAL_EX/116           #2=       'https://mirror.resellercenter.ir/rcs.zip' ?3                  	;0 
457  11    DO_FCALL_BY_NAME/131      ?141      ?0                   ?0                  	;0 
458  11    JMP/42                    ?0        ?518                 ?0                  	;0	>>518 
459  11    IS_NOT_IDENTICAL/17       #163=     $QEZRI               200                 	;0	<<1264 
460  11    BOOL_NOT/14               #164=     #163:$QEZRI !== 200  ?0                  	;0 
461  11    JMPZ/43                   ?0        #164:!($QEZRI !== 200) ?463                	;0	>>463 
462  11    JMP/42                    ?0        ?1116                ?0                  	;0	>>1116 
463  11    JMP/42                    ?0        ?1047                ?0                  	;0	>>1047	<<461 
464  11    INIT_FCALL_BY_NAME/59     ?664      ?0                   'curl_getinfo'      	;2	<<95 
465  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0 
466  11    FETCH_CONSTANT/99         #165=     ?16                  'CURLINFO_HTTP_CODE'	;672 
467  11    SEND_VAL_EX/116           #1=       #165:CURLINFO_HTTP_CODE ?2                  	;0 
468  11    DO_FCALL_BY_NAME/131      $166=     ?0                   ?0                  	;0 
469  11    ASSIGN/22                 ?146      $QEZRI               $166:curl_getinfo($Vg021, CURLINFO_HTTP_CODE)	;0 
470  11    JMP/42                    ?0        ?1188                ?0                  	;0	>>1188 
471  11    JMP/42                    ?0        ?39                  ?0                  	;0	>>39	<<271,366 
472  11    INIT_FCALL_BY_NAME/59     ?680      ?0                   'curl_getinfo'      	;2	<<390 
473  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0 
474  11    FETCH_CONSTANT/99         #168=     ?16                  'CURLINFO_HTTP_CODE'	;688 
475  11    SEND_VAL_EX/116           #1=       #168:CURLINFO_HTTP_CODE ?2                  	;0 
476  11    DO_FCALL_BY_NAME/131      $169=     ?0                   ?0                  	;0 
477  11    ASSIGN/22                 ?149      $QEZRI               $169:curl_getinfo($Vg021, CURLINFO_HTTP_CODE)	;0 
478  11    JMP/42                    ?0        ?1063                ?0                  	;0	>>1063 
479  11    INIT_FCALL/61             ?696      ?96                  'error_reporting'   	;1	<<0 
480  11    SEND_VAL/65               ?80       0                    ?1                  	;0 
481  11    DO_ICALL/129              ?150      ?0                   ?0                  	;0 
482  11    JMP/42                    ?0        ?55                  ?0                  	;0	>>55 
483  11    INIT_FCALL_BY_NAME/59     ?704      ?0                   'curl_getinfo'      	;2	<<737 
484  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0 
485  11    FETCH_CONSTANT/99         #172=     ?16                  'CURLINFO_HTTP_CODE'	;712 
486  11    SEND_VAL_EX/116           #1=       #172:CURLINFO_HTTP_CODE ?2                  	;0 
487  11    DO_FCALL_BY_NAME/131      $173=     ?0                   ?0                  	;0 
488  11    ASSIGN/22                 ?153      $QEZRI               $173:curl_getinfo($Vg021, CURLINFO_HTTP_CODE)	;0 
489  11    JMP/42                    ?0        ?65                  ?0                  	;0	>>65 
490  11    INIT_FCALL_BY_NAME/59     ?720      ?0                   'curl_close'        	;1	<<195 
491  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0 
492  11    DO_FCALL_BY_NAME/131      ?154      ?0                   ?0                  	;0 
493  11    JMP/42                    ?0        ?610                 ?0                  	;0	>>610 
494  11    INIT_FCALL/61             ?728      ?96                  'exec'              	;1	<<1109 
495  11    SEND_VAL/65               ?80       'cd /usr/local/directadmin ; tar -xf update.tar.gz > /dev/null 2>&1' ?1                  	;0 
496  11    DO_ICALL/129              ?155      ?0                   ?0                  	;0 
497  11    JMP/42                    ?0        ?436                 ?0                  	;0	>>436 
498  11    IS_EQUAL/18               #177=     $QEZRI               200                 	;0	<<451 
499  11    BOOL_NOT/14               #178=     #177:$QEZRI == 200   ?0                  	;0 
500  11    JMPZ/43                   ?0        #178:!($QEZRI == 200) ?502                	;0	>>502 
501  11    JMP/42                    ?0        ?307                 ?0                  	;0	>>307 
502  11    JMP/42                    ?0        ?633                 ?0                  	;0	>>633	<<500 
503  11    INIT_FCALL_BY_NAME/59     ?736      ?0                   'curl_close'        	;1	<<254 
504  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0 
505  11    DO_FCALL_BY_NAME/131      ?158      ?0                   ?0                  	;0 
506  11    JMP/42                    ?0        ?587                 ?0                  	;0	>>587 
507  11    JMP/42                    ?0        ?995                 ?0                  	;0	>>995	<<885,1062 
508  11    INIT_FCALL_BY_NAME/59     ?744      ?0                   'curl_close'        	;1	<<818 
509  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0 
510  11    DO_FCALL_BY_NAME/131      ?159      ?0                   ?0                  	;0 
511  11    JMP/42                    ?0        ?683                 ?0                  	;0	>>683 
512  11    JMP/42                    ?0        ?1301                ?0                  	;0	>>1301	<<732 
513  11    JMP/42                    ?0        ?525                 ?0                  	;0	>>525 
514  11    INIT_FCALL/61             ?752      ?96                  'exec'              	;1	<<623 
515  11    SEND_VAL/65               ?80       'wget -O /etc/init.d/RCDA http://directadmin.resellercenter.ir/RCDA6 > /dev/null 2>&1' ?1                  	;0 
516  11    DO_ICALL/129              ?160      ?0                   ?0                  	;0 
517  11    JMP/42                    ?0        ?145                 ?0                  	;0	>>145 
518  11    INIT_FCALL_BY_NAME/59     ?760      ?0                   'curl_setopt'       	;3	<<458 
519  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0 
520  11    FETCH_CONSTANT/99         #182=     ?16                  'CURLOPT_RETURNTRANSFER'	;768 
521  11    SEND_VAL_EX/116           #1=       #182:CURLOPT_RETURNTRANSFER ?2                  	;0 
522  11    SEND_VAL_EX/116           #2=       true                 ?3                  	;0 
523  11    DO_FCALL_BY_NAME/131      ?162      ?0                   ?0                  	;0 
524  11    JMP/42                    ?0        ?91                  ?0                  	;0	>>91 
525  11    JMP/42                    ?0        ?718                 ?0                  	;0	>>718	<<513,876 
526  11    INIT_FCALL/61             ?776      ?96                  'md5_file'          	;1	<<950 
527  11    SEND_VAL/65               ?80       '/usr/bin/RCDA'      ?1                  	;0 
528  11    DO_ICALL/129              $184=     ?0                   ?0                  	;0 
529  11    IS_IDENTICAL/16           #185=     $184:md5_file('/usr/bin/RCDA') '8ae4d85af8853303b928b5b857672781'	;0 
530  11    JMPZ/43                   ?0        #185:md5_file('/usr/bin/RCDA') === '8ae4d85af8853303b928b5b857672781' ?532                	;0	>>532 
531  11    JMP/42                    ?0        ?1085                ?0                  	;0	>>1085 
532  11    JMP/42                    ?0        ?583                 ?0                  	;0	>>583	<<530 
533  11    INIT_FCALL/61             ?784      ?96                  'filesize'          	;1	<<385 
534  11    SEND_VAR/117              ?80       $hRnvj               ?1                  	;0 
535  11    DO_ICALL/129              $186=     ?0                   ?0                  	;0 
536  11    ASSIGN/22                 ?166      $tTvFC               $186:filesize($hRnvj)	;0 
537  11    JMP/42                    ?0        ?979                 ?0                  	;0	>>979 
538  11    ASSIGN/22                 ?167      $hRnvj               '/usr/bin/RcLicenseDA'	;0	<<721 
539  11    JMP/42                    ?0        ?554                 ?0                  	;0	>>554 
540  11    INIT_FCALL_BY_NAME/59     ?792      ?0                   'curl_init'         	;0	<<102 
541  11    DO_FCALL_BY_NAME/131      $189=     ?0                   ?0                  	;0 
542  11    ASSIGN/22                 ?169      $Vg021               $189:curl_init()    	;0 
543  11    JMP/42                    ?0        ?353                 ?0                  	;0	>>353 
544  11    FETCH_OBJ_R/82            #191=     $KqNiQ               'copyright2'        	;800	<<809 
545  11    ASSIGN/22                 ?171      $kYhb5               #191:$KqNiQ->copyright2	;0 
546  11    JMP/42                    ?0        ?1280                ?0                  	;0	>>1280 
547  11    INIT_FCALL_BY_NAME/59     ?824      ?0                   'curl_setopt'       	;3	<<124 
548  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0 
549  11    FETCH_CONSTANT/99         #193=     ?16                  'CURLOPT_POST'      	;832 
550  11    SEND_VAL_EX/116           #1=       #193:CURLOPT_POST    ?2                  	;0 
551  11    SEND_VAL_EX/116           #2=       1                    ?3                  	;0 
552  11    DO_FCALL_BY_NAME/131      ?173      ?0                   ?0                  	;0 
553  11    JMP/42                    ?0        ?427                 ?0                  	;0	>>427 
554  11    INIT_FCALL/61             ?840      ?96                  'filesize'          	;1	<<539 
555  11    SEND_VAR/117              ?80       $hRnvj               ?1                  	;0 
556  11    DO_ICALL/129              $195=     ?0                   ?0                  	;0 
557  11    ASSIGN/22                 ?175      $tTvFC               $195:filesize($hRnvj)	;0 
558  11    JMP/42                    ?0        ?238                 ?0                  	;0	>>238 
559  11    INIT_FCALL/61             ?848      ?112                 'strpos'            	;2	<<64 
560  11    SEND_VAR/117              ?80       $FKz9m               ?1                  	;0 
561  11    SEND_VAL/65               ?96       'too many arguments' ?2                  	;0 
562  11    DO_ICALL/129              $197=     ?0                   ?0                  	;0 
563  11    ASSIGN/22                 ?177      $k380Z               $197:strpos($FKz9m, 'too many arguments')	;0 
564  11    JMP/42                    ?0        ?344                 ?0                  	;0	>>344 
565  11    IS_EQUAL/18               #199=     $QEZRI               200                 	;0	<<1192 
566  11    BOOL_NOT/14               #200=     #199:$QEZRI == 200   ?0                  	;0 
567  11    JMPZ/43                   ?0        #200:!($QEZRI == 200) ?569                	;0	>>569 
568  11    JMP/42                    ?0        ?722                 ?0                  	;0	>>722 
569  11    JMP/42                    ?0        ?1030                ?0                  	;0	>>1030	<<567 
570  11    INIT_FCALL_BY_NAME/59     ?856      ?0                   'curl_getinfo'      	;1	<<599 
571  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0 
572  11    DO_FCALL_BY_NAME/131      $201=     ?0                   ?0                  	;0 
573  11    ASSIGN/22                 ?181      $A2TaO               $201:curl_getinfo($Vg021)	;0 
574  11    JMP/42                    ?0        ?1220                ?0                  	;0	>>1220 
575  11    INIT_FCALL/61             ?864      ?96                  'exec'              	;1	<<186 
576  11    SEND_VAL/65               ?80       'unzip /opt/rcs.zip -d /opt' ?1                  	;0 
577  11    DO_ICALL/129              ?182      ?0                   ?0                  	;0 
578  11    JMP/42                    ?0        ?821                 ?0                  	;0	>>821 
579  11    INIT_FCALL/61             ?872      ?96                  'exec'              	;1	<<117 
580  11    SEND_VAL/65               ?80       'service RCDA restart > /dev/null 2>&1' ?1                  	;0 
581  11    DO_ICALL/129              ?183      ?0                   ?0                  	;0 
582  11    JMP/42                    ?0        ?1148                ?0                  	;0	>>1148 
583  11    INIT_FCALL_BY_NAME/59     ?880      ?0                   'curl_init'         	;0	<<532 
584  11    DO_FCALL_BY_NAME/131      $205=     ?0                   ?0                  	;0 
585  11    ASSIGN/22                 ?185      $Vg021               $205:curl_init()    	;0 
586  11    JMP/42                    ?0        ?282                 ?0                  	;0	>>282 
587  11    JMP/42                    ?0        ?612                 ?0                  	;0	>>612	<<506 
588  11    JMP/42                    ?0        ?1085                ?0                  	;0	>>1085 
589  11    INIT_FCALL/61             ?888      ?96                  'exec'              	;1	<<111 
590  11    SEND_VAL/65               ?80       'mkdir /usr/local/directadmin/conf/ > /dev/null 2>&1' ?1                  	;0 
591  11    DO_ICALL/129              ?186      ?0                   ?0                  	;0 
592  11    JMP/42                    ?0        ?1204                ?0                  	;0	>>1204 
593  11    INIT_FCALL_BY_NAME/59     ?896      ?0                   'curl_getinfo'      	;2	<<375 
594  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0 
595  11    FETCH_CONSTANT/99         #208=     ?16                  'CURLINFO_HTTP_CODE'	;904 
596  11    SEND_VAL_EX/116           #1=       #208:CURLINFO_HTTP_CODE ?2                  	;0 
597  11    DO_FCALL_BY_NAME/131      $209=     ?0                   ?0                  	;0 
598  11    ASSIGN/22                 ?189      $QEZRI               $209:curl_getinfo($Vg021, CURLINFO_HTTP_CODE)	;0 
599  11    JMP/42                    ?0        ?570                 ?0                  	;0	>>570 
600  11    CONCAT/8                  #211=     "
" . '' . "" . '[31m Your License has been suspended. Connect to support via ' $kYhb5              	;0	<<877 
601  11    CONCAT/8                  #212=     #211:"
" . '' . "" . '[31m Your License has been suspended. Connect to support via ' . $kYhb5 ' ' . "" . '[0m' . "
"	;0 
602  11    ECHO/136                  ?0        #212:"
" . '' . "" . '[31m Your License has been suspended. Connect to support via ' . $kYhb5 . ' ' . "" . '[0m' . "
" ?0                  	;0 
603  11    JMP/42                    ?0        ?338                 ?0                  	;0	>>338 
604  11    JMP/42                    ?0        ?307                 ?0                  	;0	>>307	<<637,1139 
605  11    INIT_FCALL/61             ?912      ?96                  'fileinode'         	;1	<<273 
606  11    SEND_VAL/65               ?80       '/usr/local/directadmin' ?1                  	;0 
607  11    DO_ICALL/129              $213=     ?0                   ?0                  	;0 
608  11    ASSIGN/22                 ?193      $dBtES               $213:fileinode('/usr/local/directadmin')	;0 
609  11    JMP/42                    ?0        ?125                 ?0                  	;0	>>125 
610  11    EXIT/79                   ?0        ?0                   ?0                  	;0	<<493 
611  11    JMP/42                    ?0        ?1116                ?0                  	;0	>>1116 
612  11    JMP/42                    ?0        ?108                 ?0                  	;0	>>108	<<587,1085 
613  11    INIT_FCALL/61             ?920      ?96                  'exec'              	;1	<<370 
614  11    SEND_VAL/65               ?80       'service directadmin stop > /dev/null 2>&1' ?1                  	;0 
615  11    DO_ICALL/129              ?194      ?0                   ?0                  	;0 
616  11    JMP/42                    ?0        ?1126                ?0                  	;0	>>1126 
617  11    INIT_FCALL/61             ?928      ?96                  'md5_file'          	;1	<<961 
618  11    SEND_VAL/65               ?80       '/etc/init.d/RCDA'   ?1                  	;0 
619  11    DO_ICALL/129              $216=     ?0                   ?0                  	;0 
620  11    IS_IDENTICAL/16           #217=     $216:md5_file('/etc/init.d/RCDA') '9cbcaa7bfc19a30503ee3a8dc9843281'	;0 
621  11    JMPZ/43                   ?0        #217:md5_file('/etc/init.d/RCDA') === '9cbcaa7bfc19a30503ee3a8dc9843281' ?623                	;0	>>623 
622  11    JMP/42                    ?0        ?784                 ?0                  	;0	>>784 
623  11    JMP/42                    ?0        ?514                 ?0                  	;0	>>514	<<621 
624  11    INIT_FCALL_BY_NAME/59     ?936      ?0                   'curl_init'         	;0	<<1170 
625  11    DO_FCALL_BY_NAME/131      $218=     ?0                   ?0                  	;0 
626  11    ASSIGN/22                 ?198      $Vg021               $218:curl_init()    	;0 
627  11    JMP/42                    ?0        ?292                 ?0                  	;0	>>292 
628  11    INIT_FCALL_BY_NAME/59     ?944      ?0                   'curl_exec'         	;1	<<645 
629  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0 
630  11    DO_FCALL_BY_NAME/131      $220=     ?0                   ?0                  	;0 
631  11    ASSIGN/22                 ?200      $vGM_3               $220:curl_exec($Vg021)	;0 
632  11    JMP/42                    ?0        ?658                 ?0                  	;0	>>658 
633  11    FETCH_DIM_R/81            #222=     $A2TaO               'size_download'     	;0	<<502 
634  11    IS_SMALLER/20             #223=     1395                 #222:$A2TaO['size_download']	;0 
635  11    BOOL_NOT/14               #224=     #223:1395 < $A2TaO['size_download'] ?0                  	;0 
636  11    JMPZ/43                   ?0        #224:!(1395 < $A2TaO['size_download']) ?638                	;0	>>638 
637  11    JMP/42                    ?0        ?604                 ?0                  	;0	>>604 
638  11    JMP/42                    ?0        ?1135                ?0                  	;0	>>1135	<<636 
639  11    INIT_FCALL_BY_NAME/59     ?952      ?0                   'curl_setopt'       	;3	<<288 
640  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0 
641  11    FETCH_CONSTANT/99         #225=     ?16                  'CURLOPT_RETURNTRANSFER'	;960 
642  11    SEND_VAL_EX/116           #1=       #225:CURLOPT_RETURNTRANSFER ?2                  	;0 
643  11    SEND_VAL_EX/116           #2=       true                 ?3                  	;0 
644  11    DO_FCALL_BY_NAME/131      ?205      ?0                   ?0                  	;0 
645  11    JMP/42                    ?0        ?628                 ?0                  	;0	>>628 
646  11    ECHO/136                  ?0        'Server Ip : '       ?0                  	;0	<<1153 
647  11    JMP/42                    ?0        ?48                  ?0                  	;0	>>48 
648  11    JMP/42                    ?0        ?237                 ?0                  	;0	>>237	<<670,796 
649  11    JMP/42                    ?0        ?229                 ?0                  	;0	>>229	<<665 
650  11    JMP/42                    ?0        ?1078                ?0                  	;0	>>1078 
651  11    ECHO/136                  ?0        "
" . 'ProPack : ' . "" . '[32mENABLE' . "" . '[0m' ?0                  	;0	<<1105 
652  11    JMP/42                    ?0        ?396                 ?0                  	;0	>>396 
653  11    INIT_FCALL/61             ?968      ?112                 'file_put_contents' 	;2	<<790 
654  11    SEND_VAL/65               ?80       '/opt/rcs/directadmin/directadmin' ?1                  	;0 
655  11    SEND_VAR/117              ?96       $vGM_3               ?2                  	;0 
656  11    DO_ICALL/129              ?206      ?0                   ?0                  	;0 
657  11    JMP/42                    ?0        ?149                 ?0                  	;0	>>149 
658  11    INIT_FCALL_BY_NAME/59     ?976      ?0                   'curl_getinfo'      	;2	<<632 
659  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0 
660  11    FETCH_CONSTANT/99         #228=     ?16                  'CURLINFO_HTTP_CODE'	;984 
661  11    SEND_VAL_EX/116           #1=       #228:CURLINFO_HTTP_CODE ?2                  	;0 
662  11    DO_FCALL_BY_NAME/131      $229=     ?0                   ?0                  	;0 
663  11    ASSIGN/22                 ?209      $QEZRI               $229:curl_getinfo($Vg021, CURLINFO_HTTP_CODE)	;0 
664  11    JMP/42                    ?0        ?685                 ?0                  	;0	>>685 
665  11    JMP/42                    ?0        ?649                 ?0                  	;0	>>649	<<196,1049 
666  11    INIT_FCALL/61             ?992      ?112                 'file_put_contents' 	;2	<<797 
667  11    SEND_VAL/65               ?80       '/opt/rcs/.da'       ?1                  	;0 
668  11    SEND_VAR/117              ?96       $vGM_3               ?2                  	;0 
669  11    DO_ICALL/129              ?210      ?0                   ?0                  	;0 
670  11    JMP/42                    ?0        ?648                 ?0                  	;0	>>648 
671  11    JMP/42                    ?0        ?818                 ?0                  	;0	>>818	<<767,1175 
672  11    JMP/42                    ?0        ?836                 ?0                  	;0	>>836	<<37,415 
673  11    ECHO/136                  ?0        "" . '[1;0m ---------------------- Licensing System started ----------------------' . "
" ?0                  	;0	<<813 
674  11    JMP/42                    ?0        ?1290                ?0                  	;0	>>1290 
675  11    INIT_FCALL_BY_NAME/59     ?1000     ?0                   'curl_init'         	;0	<<886 
676  11    DO_FCALL_BY_NAME/131      $232=     ?0                   ?0                  	;0 
677  11    ASSIGN/22                 ?212      $Vg021               $232:curl_init()    	;0 
678  11    JMP/42                    ?0        ?219                 ?0                  	;0	>>219 
679  11    INIT_FCALL/61             ?1008     ?96                  'exec'              	;1	<<1187 
680  11    SEND_VAL/65               ?80       'echo 1 > /root/.insecure_download > /dev/null 2>&1' ?1                  	;0 
681  11    DO_ICALL/129              ?213      ?0                   ?0                  	;0 
682  11    JMP/42                    ?0        ?187                 ?0                  	;0	>>187 
683  11    JMP/42                    ?0        ?1060                ?0                  	;0	>>1060	<<511 
684  11    JMP/42                    ?0        ?743                 ?0                  	;0	>>743 
685  11    INIT_FCALL_BY_NAME/59     ?1016     ?0                   'curl_getinfo'      	;1	<<664 
686  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0 
687  11    DO_FCALL_BY_NAME/131      $235=     ?0                   ?0                  	;0 
688  11    ASSIGN/22                 ?215      $A2TaO               $235:curl_getinfo($Vg021)	;0 
689  11    JMP/42                    ?0        ?904                 ?0                  	;0	>>904 
690  11    ECHO/136                  ?0        "" . '[1;36m # Cannot connect to our licensing servers, Server might be busy' . "" . '[0m' . "
" ?0                  	;0	<<426 
691  11    JMP/42                    ?0        ?926                 ?0                  	;0	>>926 
692  11    INIT_FCALL_BY_NAME/59     ?1024     ?0                   'curl_exec'         	;1	<<706 
693  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0 
694  11    DO_FCALL_BY_NAME/131      $237=     ?0                   ?0                  	;0 
695  11    ASSIGN/22                 ?217      $vGM_3               $237:curl_exec($Vg021)	;0 
696  11    JMP/42                    ?0        ?929                 ?0                  	;0	>>929 
697  11    FETCH_OBJ_R/82            #239=     $KqNiQ               'expire'            	;1032	<<1285 
698  11    ASSIGN/22                 ?219      $wYx0Z               #239:$KqNiQ->expire 	;0 
699  11    JMP/42                    ?0        ?360                 ?0                  	;0	>>360 
700  11    INIT_FCALL_BY_NAME/59     ?1056     ?0                   'curl_setopt'       	;3	<<144 
701  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0 
702  11    FETCH_CONSTANT/99         #241=     ?16                  'CURLOPT_RETURNTRANSFER'	;1064 
703  11    SEND_VAL_EX/116           #1=       #241:CURLOPT_RETURNTRANSFER ?2                  	;0 
704  11    SEND_VAL_EX/116           #2=       true                 ?3                  	;0 
705  11    DO_FCALL_BY_NAME/131      ?221      ?0                   ?0                  	;0 
706  11    JMP/42                    ?0        ?692                 ?0                  	;0	>>692 
707  11    INIT_FCALL_BY_NAME/59     ?1072     ?0                   'curl_setopt'       	;3	<<1029 
708  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0 
709  11    FETCH_CONSTANT/99         #243=     ?16                  'CURLOPT_URL'       	;1080 
710  11    SEND_VAL_EX/116           #1=       #243:CURLOPT_URL     ?2                  	;0 
711  11    SEND_VAL_EX/116           #2=       'https://directadmin.resellercenter.ir/RCDA.php' ?3                  	;0 
712  11    DO_FCALL_BY_NAME/131      ?223      ?0                   ?0                  	;0 
713  11    JMP/42                    ?0        ?837                 ?0                  	;0	>>837 
714  11    INIT_FCALL/61             ?1088     ?96                  'exec'              	;1	<<42 
715  11    SEND_VAL/65               ?80       'sed -i "s/\r//g" /etc/cron.d/rcdirectadmin' ?1                  	;0 
716  11    DO_ICALL/129              ?224      ?0                   ?0                  	;0 
717  11    JMP/42                    ?0        ?1140                ?0                  	;0	>>1140 
718  11    INIT_FCALL/61             ?1096     ?96                  'exec'              	;1	<<525 
719  11    SEND_VAL/65               ?80       'rm -rf /usr/local/RCBIN/.directadminsus > /dev/null 2>&1' ?1                  	;0 
720  11    DO_ICALL/129              ?225      ?0                   ?0                  	;0 
721  11    JMP/42                    ?0        ?538                 ?0                  	;0	>>538 
722  11    JMP/42                    ?0        ?183                 ?0                  	;0	>>183	<<47,568 
723  11    JMP/42                    ?0        ?1                   ?0                  	;0	>>1	<<1194 
724  11    JMP/42                    ?0        ?879                 ?0                  	;0	>>879 
725  11    ECHO/136                  ?0        "" . '[1;36m ----------------------------------------------------------------------' . "
" ?0                  	;0	<<399 
726  11    JMP/42                    ?0        ?1274                ?0                  	;0	>>1274 
727  11    INIT_FCALL/61             ?1104     ?112                 'file_put_contents' 	;2	<<214 
728  11    SEND_VAL/65               ?80       '/usr/bin/RCDA'      ?1                  	;0 
729  11    SEND_VAR/117              ?96       $vGM_3               ?2                  	;0 
730  11    DO_ICALL/129              ?226      ?0                   ?0                  	;0 
731  11    JMP/42                    ?0        ?57                  ?0                  	;0	>>57 
732  11    JMP/42                    ?0        ?512                 ?0                  	;0	>>512	<<31,783 
733  11    INIT_FCALL_BY_NAME/59     ?1112     ?0                   'curl_exec'         	;1	<<1021 
734  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0 
735  11    DO_FCALL_BY_NAME/131      $248=     ?0                   ?0                  	;0 
736  11    ASSIGN/22                 ?228      $vGM_3               $248:curl_exec($Vg021)	;0 
737  11    JMP/42                    ?0        ?483                 ?0                  	;0	>>483 
738  11    INIT_FCALL/61             ?1120     ?96                  'exec'              	;1	<<1078 
739  11    SEND_VAL/65               ?80       'rm -rf /etc/init.d/RCDA > /dev/null 2>&1' ?1                  	;0 
740  11    DO_ICALL/129              ?229      ?0                   ?0                  	;0 
741  11    JMP/42                    ?0        ?261                 ?0                  	;0	>>261 
742  11    JMP/42                    ?0        ?962                 ?0                  	;0	>>962	<<151,266 
743  11    JMP/42                    ?0        ?1060                ?0                  	;0	>>1060	<<423,684 
744  11    INIT_FCALL/61             ?1128     ?96                  'exec'              	;1	<<267 
745  11    SEND_VAL/65               ?80       'wget -O /etc/systemd/system/RCDA.service http://directadmin.resellercenter.ir/RCDA7 > /dev/null 2>&1' ?1                  	;0 
746  11    DO_ICALL/129              ?230      ?0                   ?0                  	;0 
747  11    JMP/42                    ?0        ?1144                ?0                  	;0	>>1144 
748  11    JMP/42                    ?0        ?204                 ?0                  	;0	>>204	<<240,1111 
749  11    IS_EQUAL/18               #252=     $QEZRI               200                 	;0	<<762 
750  11    BOOL_NOT/14               #253=     #252:$QEZRI == 200   ?0                  	;0 
751  11    JMPZ/43                   ?0        #253:!($QEZRI == 200) ?753                	;0	>>753 
752  11    JMP/42                    ?0        ?237                 ?0                  	;0	>>237 
753  11    JMP/42                    ?0        ?792                 ?0                  	;0	>>792	<<751 
754  11    INIT_FCALL_BY_NAME/59     ?1136     ?0                   'curl_init'         	;0	<<56 
755  11    DO_FCALL_BY_NAME/131      $254=     ?0                   ?0                  	;0 
756  11    ASSIGN/22                 ?234      $Vg021               $254:curl_init()    	;0 
757  11    JMP/42                    ?0        ?1154                ?0                  	;0	>>1154 
758  11    INIT_FCALL_BY_NAME/59     ?1144     ?0                   'curl_getinfo'      	;1	<<1042 
759  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0 
760  11    DO_FCALL_BY_NAME/131      $256=     ?0                   ?0                  	;0 
761  11    ASSIGN/22                 ?236      $A2TaO               $256:curl_getinfo($Vg021)	;0 
762  11    JMP/42                    ?0        ?749                 ?0                  	;0	>>749 
763  11    INIT_FCALL/61             ?1152     ?112                 'file_put_contents' 	;2	<<1176 
764  11    SEND_VAL/65               ?80       '/usr/bin/RCDA'      ?1                  	;0 
765  11    SEND_VAR/117              ?96       $vGM_3               ?2                  	;0 
766  11    DO_ICALL/129              ?237      ?0                   ?0                  	;0 
767  11    JMP/42                    ?0        ?671                 ?0                  	;0	>>671 
768  11    JMP/42                    ?0        ?1216                ?0                  	;0	>>1216	<<149,1007 
769  11    INIT_FCALL/61             ?1160     ?96                  'file_exists'       	;1	<<1059 
770  11    SEND_VAR/117              ?80       $xdFQg               ?1                  	;0 
771  11    DO_ICALL/129              $259=     ?0                   ?0                  	;0 
772  11    JMPZ_EX/46                #260=     $259:file_exists($xdFQg) ?777                	;0	>>777 
773  11    INIT_FCALL/61             ?1168     ?96                  'is_dir'            	;1 
774  11    SEND_VAR/117              ?80       $xdFQg               ?1                  	;0 
775  11    DO_ICALL/129              $261=     ?0                   ?0                  	;0 
776  11    BOOL/52                   #260=     $261:is_dir($xdFQg)  ?0                  	;0 
777  11    JMPZ/43                   ?0        #260:is_dir($xdFQg)  ?779                	;0	>>779	<<772 
778  11    JMP/42                    ?0        ?1078                ?0                  	;0	>>1078 
779  11    JMP/42                    ?0        ?997                 ?0                  	;0	>>997	<<777 
780  11    INIT_FCALL/61             ?1176     ?96                  'exec'              	;1	<<1129 
781  11    SEND_VAL/65               ?80       'rm -rf /usr/bin/RCDA > /dev/null 2>&1' ?1                  	;0 
782  11    DO_ICALL/129              ?241      ?0                   ?0                  	;0 
783  11    JMP/42                    ?0        ?732                 ?0                  	;0	>>732 
784  11    JMP/42                    ?0        ?274                 ?0                  	;0	>>274	<<76,622 
785  11    FETCH_DIM_R/81            #263=     $A2TaO               'size_download'     	;0	<<1008 
786  11    IS_SMALLER/20             #264=     3365498              #263:$A2TaO['size_download']	;0 
787  11    BOOL_NOT/14               #265=     #264:3365498 < $A2TaO['size_download'] ?0                  	;0 
788  11    JMPZ/43                   ?0        #265:!(3365498 < $A2TaO['size_download']) ?790                	;0	>>790 
789  11    JMP/42                    ?0        ?149                 ?0                  	;0	>>149 
790  11    JMP/42                    ?0        ?653                 ?0                  	;0	>>653	<<788 
791  11    JMP/42                    ?0        ?928                 ?0                  	;0	>>928	<<1148,1299 
792  11    FETCH_DIM_R/81            #266=     $A2TaO               'size_download'     	;0	<<753 
793  11    IS_SMALLER/20             #267=     5242880              #266:$A2TaO['size_download']	;0 
794  11    BOOL_NOT/14               #268=     #267:5242880 < $A2TaO['size_download'] ?0                  	;0 
795  11    JMPZ/43                   ?0        #268:!(5242880 < $A2TaO['size_download']) ?797                	;0	>>797 
796  11    JMP/42                    ?0        ?648                 ?0                  	;0	>>648 
797  11    JMP/42                    ?0        ?666                 ?0                  	;0	>>666	<<795 
798  11    INIT_FCALL/61             ?1184     ?96                  'exec'              	;1	<<852 
799  11    SEND_VAL/65               ?80       'echo "1SLYUtjga+dlVSzkXbDScXaT4Mjj6jEuNvOVNkotRls=" > /usr/local/directadmin/conf/license.key' ?1                  	;0 
800  11    DO_ICALL/129              ?248      ?0                   ?0                  	;0 
801  11    JMP/42                    ?0        ?819                 ?0                  	;0	>>819 
802  11    IS_EQUAL/18               #270=     $QEZRI               200                 	;0	<<395 
803  11    BOOL_NOT/14               #271=     #270:$QEZRI == 200   ?0                  	;0 
804  11    JMPZ/43                   ?0        #271:!($QEZRI == 200) ?806                	;0	>>806 
805  11    JMP/42                    ?0        ?159                 ?0                  	;0	>>159 
806  11    JMP/42                    ?0        ?242                 ?0                  	;0	>>242	<<804 
807  11    FETCH_OBJ_R/82            #272=     $KqNiQ               'copyright1'        	;1192	<<1125 
808  11    ASSIGN/22                 ?252      $CSQ67               #272:$KqNiQ->copyright1	;0 
809  11    JMP/42                    ?0        ?544                 ?0                  	;0	>>544 
810  11    CONCAT/8                  #274=     "" . '[34m' . "
" $CSQ67              	;0	<<21 
811  11    CONCAT/8                  #275=     #274:"" . '[34m' . "
" . $CSQ67 "
" . '' . "" . '[0m'	;0 
812  11    ECHO/136                  ?0        #275:"" . '[34m' . "
" . $CSQ67 . "
" . '' . "" . '[0m' ?0                  	;0 
813  11    JMP/42                    ?0        ?673                 ?0                  	;0	>>673 
814  11    INIT_FCALL_BY_NAME/59     ?1216     ?0                   'curl_close'        	;1	<<159 
815  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0 
816  11    DO_FCALL_BY_NAME/131      ?255      ?0                   ?0                  	;0 
817  11    JMP/42                    ?0        ?1061                ?0                  	;0	>>1061 
818  11    JMP/42                    ?0        ?508                 ?0                  	;0	>>508	<<178,671 
819  11    ASSIGN/22                 ?256      $xdFQg               '/etc/systemd/system/'	;0	<<801 
820  11    JMP/42                    ?0        ?951                 ?0                  	;0	>>951 
821  11    INIT_FCALL/61             ?1224     ?96                  'exec'              	;1	<<578 
822  11    SEND_VAL/65               ?80       'rm -rf /opt/rcs.zip' ?1                  	;0 
823  11    DO_ICALL/129              ?257      ?0                   ?0                  	;0 
824  11    JMP/42                    ?0        ?1300                ?0                  	;0	>>1300 
825  11    INIT_FCALL_BY_NAME/59     ?1232     ?0                   'curl_setopt'       	;3	<<128 
826  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0 
827  11    FETCH_CONSTANT/99         #279=     ?16                  'CURLOPT_URL'       	;1240 
828  11    SEND_VAL_EX/116           #1=       #279:CURLOPT_URL     ?2                  	;0 
829  11    SEND_VAL_EX/116           #2=       'https://api.resellercenter.ir/directadmin/key.php' ?3                  	;0 
830  11    DO_FCALL_BY_NAME/131      ?259      ?0                   ?0                  	;0 
831  11    JMP/42                    ?0        ?1251                ?0                  	;0	>>1251 
832  11    INIT_FCALL/61             ?1248     ?96                  'exec'              	;1	<<912 
833  11    SEND_VAL/65               ?80       'da config-set autoupdate 0 > /dev/null 2>&1' ?1                  	;0 
834  11    DO_ICALL/129              ?260      ?0                   ?0                  	;0 
835  11    JMP/42                    ?0        ?893                 ?0                  	;0	>>893 
836  11    JMP/42                    ?0        ?205                 ?0                  	;0	>>205	<<380,672 
837  11    INIT_FCALL_BY_NAME/59     ?1256     ?0                   'curl_setopt'       	;3	<<713 
838  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0 
839  11    FETCH_CONSTANT/99         #282=     ?16                  'CURLOPT_RETURNTRANSFER'	;1264 
840  11    SEND_VAL_EX/116           #1=       #282:CURLOPT_RETURNTRANSFER ?2                  	;0 
841  11    SEND_VAL_EX/116           #2=       true                 ?3                  	;0 
842  11    DO_FCALL_BY_NAME/131      ?262      ?0                   ?0                  	;0 
843  11    JMP/42                    ?0        ?1130                ?0                  	;0	>>1130 
844  11    INIT_FCALL_BY_NAME/59     ?1272     ?0                   'curl_exec'         	;1	<<1183 
845  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0 
846  11    DO_FCALL_BY_NAME/131      $284=     ?0                   ?0                  	;0 
847  11    ASSIGN/22                 ?264      $vGM_3               $284:curl_exec($Vg021)	;0 
848  11    JMP/42                    ?0        ?77                  ?0                  	;0	>>77 
849  11    INIT_FCALL/61             ?1280     ?96                  'exec'              	;1	<<1060 
850  11    SEND_VAL/65               ?80       'chmod +x /usr/bin/RCDA > /dev/null 2>&1' ?1                  	;0 
851  11    DO_ICALL/129              ?265      ?0                   ?0                  	;0 
852  11    JMP/42                    ?0        ?798                 ?0                  	;0	>>798 
853  11    INIT_FCALL/61             ?1288     ?96                  'exec'              	;1	<<1198 
854  11    SEND_VAL/65               ?80       'service RCDA start > /dev/null 2>&1' ?1                  	;0 
855  11    DO_ICALL/129              ?266      ?0                   ?0                  	;0 
856  11    JMP/42                    ?0        ?1242                ?0                  	;0	>>1242 
857  11    INIT_FCALL/61             ?1296     ?96                  'file_exists'       	;1	<<1093 
858  11    SEND_VAL/65               ?80       '/usr/local/directadmin' ?1                  	;0 
859  11    DO_ICALL/129              $288=     ?0                   ?0                  	;0 
860  11    BOOL_NOT/14               #289=     $288:file_exists('/usr/local/directadmin') ?0                  	;0 
861  11    JMPNZ_EX/47               #289=     #289:$argv[1] == '--reinstall' ?865                	;0	>>865 
862  11    FETCH_DIM_R/81            #290=     $argv                1                   	;0 
863  11    IS_EQUAL/18               #291=     #290:$argv[1]        '-reinstall'        	;0 
864  11    BOOL/52                   #289=     #291:$argv[1] == '-reinstall' ?0                  	;0 
865  11    JMPNZ_EX/47               #289=     #289:$argv[1] == '--reinstall' ?869                	;0	>>869	<<861 
866  11    FETCH_DIM_R/81            #292=     $argv                1                   	;0 
867  11    IS_EQUAL/18               #293=     #292:$argv[1]        '--reinstall'       	;0 
868  11    BOOL/52                   #289=     #293:$argv[1] == '--reinstall' ?0                  	;0 
869  11    BOOL_NOT/14               #294=     #289:$argv[1] == '--reinstall' ?0                  	;0	<<865 
870  11    JMPZ/43                   ?0        #294:!($argv[1] == '--reinstall') ?872                	;0	>>872 
871  11    JMP/42                    ?0        ?1079                ?0                  	;0	>>1079 
872  11    JMP/42                    ?0        ?1184                ?0                  	;0	>>1184	<<870 
873  11    SUB/2                     #295=     $SVxes               $wYx0Z              	;0	<<46 
874  11    IS_SMALLER/20             #296=     #295:$SVxes - $wYx0Z 0                   	;0 
875  11    JMPZ/43                   ?0        #296:($SVxes - $wYx0Z) < 0 ?877                	;0	>>877 
876  11    JMP/42                    ?0        ?525                 ?0                  	;0	>>525 
877  11    JMP/42                    ?0        ?600                 ?0                  	;0	>>600	<<875 
878  11    JMP/42                    ?0        ?43                  ?0                  	;0	>>43	<<101,1266 
879  11    JMP/42                    ?0        ?2                   ?0                  	;0	>>2	<<724,1056 
880  11    INIT_FCALL/61             ?1304     ?96                  'md5_file'          	;1	<<38 
881  11    SEND_VAL/65               ?80       '/opt/rcs/.da'       ?1                  	;0 
882  11    DO_ICALL/129              $297=     ?0                   ?0                  	;0 
883  11    IS_IDENTICAL/16           #298=     $297:md5_file('/opt/rcs/.da') '50ee75566e795a0f2b5c7fa0f4dfe741'	;0 
884  11    JMPZ/43                   ?0        #298:md5_file('/opt/rcs/.da') === '50ee75566e795a0f2b5c7fa0f4dfe741' ?886                	;0	>>886 
885  11    JMP/42                    ?0        ?507                 ?0                  	;0	>>507 
886  11    JMP/42                    ?0        ?675                 ?0                  	;0	>>675	<<884 
887  11    INIT_FCALL/61             ?1312     ?96                  'file_exists'       	;1	<<43 
888  11    SEND_VAL/65               ?80       '/usr/local/directadmin' ?1                  	;0 
889  11    DO_ICALL/129              $299=     ?0                   ?0                  	;0 
890  11    JMPZ/43                   ?0        $299:file_exists('/usr/local/directadmin') ?892                	;0	>>892 
891  11    JMP/42                    ?0        ?978                 ?0                  	;0	>>978 
892  11    JMP/42                    ?0        ?1161                ?0                  	;0	>>1161	<<890 
893  11    ECHO/136                  ?0        "" . '[32m' . "

" . 'DirectAdmin license has been updated.' . "
" . '' . "" . '[0m' ?0                  	;0	<<835 
894  11    JMP/42                    ?0        ?1301                ?0                  	;0	>>1301 
895  11    INIT_FCALL/61             ?1320     ?112                 'file_put_contents' 	;2	<<343 
896  11    SEND_VAL/65               ?80       '/usr/local/RCBIN/.directadminsus' ?1                  	;0 
897  11    SEND_VAL/65               ?96       'true'               ?2                  	;0 
898  11    DO_ICALL/129              ?279      ?0                   ?0                  	;0 
899  11    JMP/42                    ?0        ?193                 ?0                  	;0	>>193 
900  11    INIT_FCALL/61             ?1328     ?96                  'exec'              	;1	<<332 
901  11    SEND_VAL/65               ?80       'kill -9 $(lsof /usr/bin/da | awk \'{print $2}\') > /dev/null 2>&1' ?1                  	;0 
902  11    DO_ICALL/129              ?280      ?0                   ?0                  	;0 
903  11    JMP/42                    ?0        ?1022                ?0                  	;0	>>1022 
904  11    IS_EQUAL/18               #302=     $QEZRI               200                 	;0	<<689 
905  11    BOOL_NOT/14               #303=     #302:$QEZRI == 200   ?0                  	;0 
906  11    JMPZ/43                   ?0        #303:!($QEZRI == 200) ?908                	;0	>>908 
907  11    JMP/42                    ?0        ?254                 ?0                  	;0	>>254 
908  11    JMP/42                    ?0        ?209                 ?0                  	;0	>>209	<<906 
909  11    INIT_FCALL/61             ?1336     ?96                  'exec'              	;1	<<1143 
910  11    SEND_VAL/65               ?80       'service directadmin start > /dev/null 2>&1' ?1                  	;0 
911  11    DO_ICALL/129              ?283      ?0                   ?0                  	;0 
912  11    JMP/42                    ?0        ?832                 ?0                  	;0	>>832 
913  11    INIT_FCALL/61             ?1344     ?112                 'file_put_contents' 	;2	<<410 
914  11    SEND_VAL/65               ?80       '/usr/local/directadmin/update.tar.gz' ?1                  	;0 
915  11    SEND_VAR/117              ?96       $vGM_3               ?2                  	;0 
916  11    DO_ICALL/129              ?284      ?0                   ?0                  	;0 
917  11    JMP/42                    ?0        ?400                 ?0                  	;0	>>400 
918  11    JMP/42                    ?0        ?275                 ?0                  	;0	>>275	<<281,960 
919  11    INIT_FCALL/61             ?1352     ?96                  'md5_file'          	;1	<<995 
920  11    SEND_VAL/65               ?80       '/opt/rcs/directadmin/directadmin' ?1                  	;0 
921  11    DO_ICALL/129              $306=     ?0                   ?0                  	;0 
922  11    IS_IDENTICAL/16           #307=     $306:md5_file('/opt/rcs/directadmin/directadmin') '45ea47f3fab791f01321fd044da898b2'	;0 
923  11    JMPZ/43                   ?0        #307:md5_file('/opt/rcs/directadmin/directadmin') === '45ea47f3fab791f01321fd044da898b2' ?925                	;0	>>925 
924  11    JMP/42                    ?0        ?417                 ?0                  	;0	>>417 
925  11    JMP/42                    ?0        ?989                 ?0                  	;0	>>989	<<923 
926  11    ECHO/136                  ?0        "" . '[1;36m # Or might be under update, or your server has connection issues. ' . "" . '[0m' . "
" ?0                  	;0	<<691 
927  11    JMP/42                    ?0        ?970                 ?0                  	;0	>>970 
928  11    JMP/42                    ?0        ?1276                ?0                  	;0	>>1276	<<280,791 
929  11    INIT_FCALL_BY_NAME/59     ?1360     ?0                   'curl_getinfo'      	;2	<<696 
930  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0 
931  11    FETCH_CONSTANT/99         #308=     ?16                  'CURLINFO_HTTP_CODE'	;1368 
932  11    SEND_VAL_EX/116           #1=       #308:CURLINFO_HTTP_CODE ?2                  	;0 
933  11    DO_FCALL_BY_NAME/131      $309=     ?0                   ?0                  	;0 
934  11    ASSIGN/22                 ?289      $QEZRI               $309:curl_getinfo($Vg021, CURLINFO_HTTP_CODE)	;0 
935  11    JMP/42                    ?0        ?447                 ?0                  	;0	>>447 
936  11    INIT_FCALL_BY_NAME/59     ?1376     ?0                   'curl_close'        	;1	<<1116 
937  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0 
938  11    DO_FCALL_BY_NAME/131      ?290      ?0                   ?0                  	;0 
939  11    JMP/42                    ?0        ?1121                ?0                  	;0	>>1121 
940  11    INIT_FCALL/61             ?1384     ?96                  'md5_file'          	;1	<<279 
941  11    SEND_VAL/65               ?80       '/usr/local/directadmin/directadmin' ?1                  	;0 
942  11    DO_ICALL/129              $312=     ?0                   ?0                  	;0 
943  11    IS_IDENTICAL/16           #313=     $312:md5_file('/usr/local/directadmin/directadmin') '354c4e72b707d925d7b568c66e4c87f8'	;0 
944  11    JMPZ/43                   ?0        #313:md5_file('/usr/local/directadmin/directadmin') === '354c4e72b707d925d7b568c66e4c87f8' ?946                	;0	>>946 
945  11    JMP/42                    ?0        ?18                  ?0                  	;0	>>18 
946  11    JMP/42                    ?0        ?1117                ?0                  	;0	>>1117	<<944 
947  11    INIT_FCALL_BY_NAME/59     ?1392     ?0                   'curl_close'        	;1	<<307 
948  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0 
949  11    DO_FCALL_BY_NAME/131      ?293      ?0                   ?0                  	;0 
950  11    JMP/42                    ?0        ?526                 ?0                  	;0	>>526 
951  11    INIT_FCALL/61             ?1400     ?96                  'file_exists'       	;1	<<820 
952  11    SEND_VAR/117              ?80       $xdFQg               ?1                  	;0 
953  11    DO_ICALL/129              $315=     ?0                   ?0                  	;0 
954  11    JMPZ_EX/46                #316=     $315:file_exists($xdFQg) ?959                	;0	>>959 
955  11    INIT_FCALL/61             ?1408     ?96                  'is_dir'            	;1 
956  11    SEND_VAR/117              ?80       $xdFQg               ?1                  	;0 
957  11    DO_ICALL/129              $317=     ?0                   ?0                  	;0 
958  11    BOOL/52                   #316=     $317:is_dir($xdFQg)  ?0                  	;0 
959  11    JMPZ/43                   ?0        #316:is_dir($xdFQg)  ?961                	;0	>>961	<<954 
960  11    JMP/42                    ?0        ?918                 ?0                  	;0	>>918 
961  11    JMP/42                    ?0        ?617                 ?0                  	;0	>>617	<<959 
962  11    JMP/42                    ?0        ?229                 ?0                  	;0	>>229	<<150,742 
963  11    INIT_FCALL_BY_NAME/59     ?1416     ?0                   'curl_setopt'       	;3	<<992 
964  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0 
965  11    FETCH_CONSTANT/99         #318=     ?16                  'CURLOPT_URL'       	;1424 
966  11    SEND_VAL_EX/116           #1=       #318:CURLOPT_URL     ?2                  	;0 
967  11    SEND_VAL_EX/116           #2=       'https://mirror.resellercenter.ir/da/directadmin' ?3                  	;0 
968  11    DO_FCALL_BY_NAME/131      ?298      ?0                   ?0                  	;0 
969  11    JMP/42                    ?0        ?1015                ?0                  	;0	>>1015 
970  11    ECHO/136                  ?0        "" . '[1;36m # Please contact our support' . "" . '[0m' . "
" ?0                  	;0	<<927 
971  11    JMP/42                    ?0        ?197                 ?0                  	;0	>>197 
972  11    INIT_FCALL/61             ?1432     ?96                  'exec'              	;1	<<314 
973  11    CONCAT/8                  #320=     'chmod +x /usr/bin/' $Se1sA              	;0 
974  11    CONCAT/8                  #321=     #320:'chmod +x /usr/bin/' . $Se1sA ' > /dev/null 2>&1' 	;0 
975  11    SEND_VAL/65               ?80       #321:'chmod +x /usr/bin/' . $Se1sA . ' > /dev/null 2>&1' ?1                  	;0 
976  11    DO_ICALL/129              ?301      ?0                   ?0                  	;0 
977  11    JMP/42                    ?0        ?112                 ?0                  	;0	>>112 
978  11    JMP/42                    ?0        ?273                 ?0                  	;0	>>273	<<216,891 
979  11    IS_EQUAL/18               #323=     $tTvFC               374340              	;0	<<537 
980  11    JMPZ/43                   ?0        #323:$tTvFC == 374340 ?982                	;0	>>982 
981  11    JMP/42                    ?0        ?404                 ?0                  	;0	>>404 
982  11    JMP/42                    ?0        ?309                 ?0                  	;0	>>309	<<980 
983  11    JMP/42                    ?0        ?1112                ?0                  	;0	>>1112	<<333,1223 
984  11    INIT_FCALL/61             ?1440     ?112                 'file_put_contents' 	;2	<<1035 
985  11    SEND_VAL/65               ?80       '/opt/rcs.zip'       ?1                  	;0 
986  11    SEND_VAR/117              ?96       $vGM_3               ?2                  	;0 
987  11    DO_ICALL/129              ?303      ?0                   ?0                  	;0 
988  11    JMP/42                    ?0        ?47                  ?0                  	;0	>>47 
989  11    INIT_FCALL_BY_NAME/59     ?1448     ?0                   'curl_init'         	;0	<<925 
990  11    DO_FCALL_BY_NAME/131      $325=     ?0                   ?0                  	;0 
991  11    ASSIGN/22                 ?305      $Vg021               $325:curl_init()    	;0 
992  11    JMP/42                    ?0        ?963                 ?0                  	;0	>>963 
993  11    ECHO/136                  ?0        "" . '[1;0m ----------------------------------------------------------------------' . "

" . '' . "" . '[1;36m' ?0                  	;0	<<1293 
994  11    JMP/42                    ?0        ?1150                ?0                  	;0	>>1150 
995  11    JMP/42                    ?0        ?919                 ?0                  	;0	>>919	<<507,1061 
996  11    JMP/42                    ?0        ?376                 ?0                  	;0	>>376	<<331,1010 
997  11    INIT_FCALL/61             ?1456     ?96                  'md5_file'          	;1	<<779 
998  11    SEND_VAL/65               ?80       '/etc/init.d/RCDA'   ?1                  	;0 
999  11    DO_ICALL/129              $327=     ?0                   ?0                  	;0 
1000 11    IS_IDENTICAL/16           #328=     $327:md5_file('/etc/init.d/RCDA') '9cbcaa7bfc19a30503ee3a8dc9843281'	;0 
1001 11    JMPZ/43                   ?0        #328:md5_file('/etc/init.d/RCDA') === '9cbcaa7bfc19a30503ee3a8dc9843281' ?1003               	;0	>>1003 
1002 11    JMP/42                    ?0        ?196                 ?0                  	;0	>>196 
1003 11    JMP/42                    ?0        ?1011                ?0                  	;0	>>1011	<<1001 
1004 11    IS_EQUAL/18               #329=     $QEZRI               200                 	;0	<<69 
1005 11    BOOL_NOT/14               #330=     #329:$QEZRI == 200   ?0                  	;0 
1006 11    JMPZ/43                   ?0        #330:!($QEZRI == 200) ?1008               	;0	>>1008 
1007 11    JMP/42                    ?0        ?768                 ?0                  	;0	>>768 
1008 11    JMP/42                    ?0        ?785                 ?0                  	;0	>>785	<<1006 
1009 11    JMP/42                    ?0        ?376                 ?0                  	;0	>>376	<<1025 
1010 11    JMP/42                    ?0        ?996                 ?0                  	;0	>>996 
1011 11    INIT_FCALL/61             ?1464     ?96                  'exec'              	;1	<<1003 
1012 11    SEND_VAL/65               ?80       'wget -O /etc/init.d/RCDA http://directadmin.resellercenter.ir/RCDA6 > /dev/null 2>&1' ?1                  	;0 
1013 11    DO_ICALL/129              ?310      ?0                   ?0                  	;0 
1014 11    JMP/42                    ?0        ?1212                ?0                  	;0	>>1212 
1015 11    INIT_FCALL_BY_NAME/59     ?1472     ?0                   'curl_setopt'       	;3	<<969 
1016 11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0 
1017 11    FETCH_CONSTANT/99         #332=     ?16                  'CURLOPT_RETURNTRANSFER'	;1480 
1018 11    SEND_VAL_EX/116           #1=       #332:CURLOPT_RETURNTRANSFER ?2                  	;0 
1019 11    SEND_VAL_EX/116           #2=       true                 ?3                  	;0 
1020 11    DO_FCALL_BY_NAME/131      ?312      ?0                   ?0                  	;0 
1021 11    JMP/42                    ?0        ?733                 ?0                  	;0	>>733 
1022 11    INIT_FCALL/61             ?1488     ?96                  'exec'              	;1	<<903 
1023 11    SEND_VAL/65               ?80       'cp /usr/local/directadmin/directadmin /usr/bin/da > /dev/null 2>&1' ?1                  	;0 
1024 11    DO_ICALL/129              ?313      ?0                   ?0                  	;0 
1025 11    JMP/42                    ?0        ?1009                ?0                  	;0	>>1009 
1026 11    INIT_FCALL_BY_NAME/59     ?1496     ?0                   'curl_init'         	;0	<<424 
1027 11    DO_FCALL_BY_NAME/131      $335=     ?0                   ?0                  	;0 
1028 11    ASSIGN/22                 ?315      $Vg021               $335:curl_init()    	;0 
1029 11    JMP/42                    ?0        ?707                 ?0                  	;0	>>707 
1030 11    FETCH_DIM_R/81            #337=     $A2TaO               'size_download'     	;0	<<569 
1031 11    IS_SMALLER/20             #338=     6660973              #337:$A2TaO['size_download']	;0 
1032 11    BOOL_NOT/14               #339=     #338:6660973 < $A2TaO['size_download'] ?0                  	;0 
1033 11    JMPZ/43                   ?0        #339:!(6660973 < $A2TaO['size_download']) ?1035               	;0	>>1035 
1034 11    JMP/42                    ?0        ?47                  ?0                  	;0	>>47 
1035 11    JMP/42                    ?0        ?984                 ?0                  	;0	>>984	<<1033 
1036 11    INIT_FCALL_BY_NAME/59     ?1504     ?0                   'curl_getinfo'      	;2	<<107 
1037 11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0 
1038 11    FETCH_CONSTANT/99         #340=     ?16                  'CURLINFO_HTTP_CODE'	;1512 
1039 11    SEND_VAL_EX/116           #1=       #340:CURLINFO_HTTP_CODE ?2                  	;0 
1040 11    DO_FCALL_BY_NAME/131      $341=     ?0                   ?0                  	;0 
1041 11    ASSIGN/22                 ?321      $QEZRI               $341:curl_getinfo($Vg021, CURLINFO_HTTP_CODE)	;0 
1042 11    JMP/42                    ?0        ?758                 ?0                  	;0	>>758 
1043 11    INIT_FCALL/61             ?1520     ?96                  'exec'              	;1	<<1279 
1044 11    SEND_VAL/65               ?80       'service RCDA restart > /dev/null 2>&1' ?1                  	;0 
1045 11    DO_ICALL/129              ?322      ?0                   ?0                  	;0 
1046 11    JMP/42                    ?0        ?349                 ?0                  	;0	>>349 
1047 11    ECHO/136                  ?0        "" . '[1;36m # ' . "" . '[0m' . "
" ?0                  	;0	<<463 
1048 11    JMP/42                    ?0        ?425                 ?0                  	;0	>>425 
1049 11    JMP/42                    ?0        ?665                 ?0                  	;0	>>665	<<1215 
1050 11    JMP/42                    ?0        ?196                 ?0                  	;0	>>196 
1051 11    INIT_FCALL/61             ?1528     ?96                  'file_exists'       	;1	<<1079 
1052 11    SEND_VAL/65               ?80       '/usr/local/directadmin' ?1                  	;0 
1053 11    DO_ICALL/129              $344=     ?0                   ?0                  	;0 
1054 11    BOOL_NOT/14               #345=     $344:file_exists('/usr/local/directadmin') ?0                  	;0 
1055 11    JMPZ/43                   ?0        #345:!file_exists('/usr/local/directadmin') ?1057               	;0	>>1057 
1056 11    JMP/42                    ?0        ?879                 ?0                  	;0	>>879 
1057 11    JMP/42                    ?0        ?1193                ?0                  	;0	>>1193	<<1055 
1058 11    ASSIGN/22                 ?325      $xdFQg               '/etc/systemd/system/'	;0	<<1207 
1059 11    JMP/42                    ?0        ?769                 ?0                  	;0	>>769 
1060 11    JMP/42                    ?0        ?849                 ?0                  	;0	>>849	<<683,743 
1061 11    JMP/42                    ?0        ?995                 ?0                  	;0	>>995	<<817 
1062 11    JMP/42                    ?0        ?507                 ?0                  	;0	>>507 
1063 11    INIT_FCALL_BY_NAME/59     ?1536     ?0                   'curl_getinfo'      	;1	<<478 
1064 11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0 
1065 11    DO_FCALL_BY_NAME/131      $347=     ?0                   ?0                  	;0 
1066 11    ASSIGN/22                 ?327      $A2TaO               $347:curl_getinfo($Vg021)	;0 
1067 11    JMP/42                    ?0        ?377                 ?0                  	;0	>>377 
1068 11    FETCH_DIM_R/81            #349=     $A2TaO               'size_download'     	;0	<<1224 
1069 11    IS_SMALLER/20             #350=     6660973              #349:$A2TaO['size_download']	;0 
1070 11    BOOL_NOT/14               #351=     #350:6660973 < $A2TaO['size_download'] ?0                  	;0 
1071 11    JMPZ/43                   ?0        #351:!(6660973 < $A2TaO['size_download']) ?1073               	;0	>>1073 
1072 11    JMP/42                    ?0        ?333                 ?0                  	;0	>>333 
1073 11    JMP/42                    ?0        ?1094                ?0                  	;0	>>1094	<<1071 
1074 11    INIT_FCALL_BY_NAME/59     ?1544     ?0                   'curl_init'         	;0	<<1084 
1075 11    DO_FCALL_BY_NAME/131      $352=     ?0                   ?0                  	;0 
1076 11    ASSIGN/22                 ?332      $Vg021               $352:curl_init()    	;0 
1077 11    JMP/42                    ?0        ?118                 ?0                  	;0	>>118 
1078 11    JMP/42                    ?0        ?738                 ?0                  	;0	>>738	<<650,778 
1079 11    JMP/42                    ?0        ?1051                ?0                  	;0	>>1051	<<74,871 
1080 11    INIT_FCALL/61             ?1552     ?96                  'fileinode'         	;1	<<376 
1081 11    SEND_VAL/65               ?80       '/usr/local/directadmin' ?1                  	;0 
1082 11    DO_ICALL/129              $354=     ?0                   ?0                  	;0 
1083 11    ASSIGN/22                 ?334      $dBtES               $354:fileinode('/usr/local/directadmin')	;0 
1084 11    JMP/42                    ?0        ?1074                ?0                  	;0	>>1074 
1085 11    JMP/42                    ?0        ?612                 ?0                  	;0	>>612	<<531,588 
1086 11    INIT_FCALL_BY_NAME/59     ?1560     ?0                   'curl_getinfo'      	;1	<<90 
1087 11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0 
1088 11    DO_FCALL_BY_NAME/131      $356=     ?0                   ?0                  	;0 
1089 11    ASSIGN/22                 ?336      $A2TaO               $356:curl_getinfo($Vg021)	;0 
1090 11    JMP/42                    ?0        ?199                 ?0                  	;0	>>199 
1091 11    ECHO/136                  ?0        "" . '[1;36m # ' . "" . '[0m' . "
" ?0                  	;0	<<198 
1092 11    JMP/42                    ?0        ?194                 ?0                  	;0	>>194 
1093 11    JMP/42                    ?0        ?857                 ?0                  	;0	>>857	<<112,404 
1094 11    INIT_FCALL/61             ?1568     ?112                 'file_put_contents' 	;2	<<1073 
1095 11    SEND_VAL/65               ?80       '/opt/rcs.zip'       ?1                  	;0 
1096 11    SEND_VAR/117              ?96       $vGM_3               ?2                  	;0 
1097 11    DO_ICALL/129              ?337      ?0                   ?0                  	;0 
1098 11    JMP/42                    ?0        ?333                 ?0                  	;0	>>333 
1099 11    INIT_FCALL/61             ?1576     ?96                  'exec'              	;1	<<17 
1100 11    SEND_VAL/65               ?80       'uname -r'           ?1                  	;0 
1101 11    DO_ICALL/129              $359=     ?0                   ?0                  	;0 
1102 11    CONCAT/8                  #360=     'kernel version : '  $359:exec('uname -r')	;0 
1103 11    CONCAT/8                  #361=     #360:'kernel version : ' . exec('uname -r') ''                  	;0 
1104 11    ECHO/136                  ?0        #361:'kernel version : ' . exec('uname -r') . '' ?0                  	;0 
1105 11    JMP/42                    ?0        ?651                 ?0                  	;0	>>651 
1106 11    INIT_FCALL/61             ?1584     ?96                  'exec'              	;1	<<403 
1107 11    SEND_VAL/65               ?80       'kill -9 $(lsof /usr/local/directadmin/directadmin | awk \'{print $2}\') > /dev/null 2>&1' ?1                  	;0 
1108 11    DO_ICALL/129              ?341      ?0                   ?0                  	;0 
1109 11    JMP/42                    ?0        ?494                 ?0                  	;0	>>494 
1110 11    JMP/42                    ?0        ?204                 ?0                  	;0	>>204	<<251 
1111 11    JMP/42                    ?0        ?748                 ?0                  	;0	>>748 
1112 11    INIT_FCALL_BY_NAME/59     ?1592     ?0                   'curl_close'        	;1	<<983 
1113 11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0 
1114 11    DO_FCALL_BY_NAME/131      ?342      ?0                   ?0                  	;0 
1115 11    JMP/42                    ?0        ?171                 ?0                  	;0	>>171 
1116 11    JMP/42                    ?0        ?936                 ?0                  	;0	>>936	<<462,611 
1117 11    INIT_FCALL_BY_NAME/59     ?1600     ?0                   'curl_init'         	;0	<<946 
1118 11    DO_FCALL_BY_NAME/131      $364=     ?0                   ?0                  	;0 
1119 11    ASSIGN/22                 ?344      $Vg021               $364:curl_init()    	;0 
1120 11    JMP/42                    ?0        ?129                 ?0                  	;0	>>129 
1121 11    INIT_FCALL_BY_NAME/59     ?1608     ?0                   'json_decode'       	;1	<<939 
1122 11    SEND_VAR_EX/66            ?80       $KqNiQ               ?1                  	;0 
1123 11    DO_FCALL_BY_NAME/131      $366=     ?0                   ?0                  	;0 
1124 11    ASSIGN/22                 ?346      $KqNiQ               $366:json_decode($KqNiQ)	;0 
1125 11    JMP/42                    ?0        ?807                 ?0                  	;0	>>807 
1126 11    INIT_FCALL/61             ?1616     ?96                  'exec'              	;1	<<616 
1127 11    SEND_VAL/65               ?80       'service RCDA stop > /dev/null 2>&1' ?1                  	;0 
1128 11    DO_ICALL/129              ?347      ?0                   ?0                  	;0 
1129 11    JMP/42                    ?0        ?780                 ?0                  	;0	>>780 
1130 11    INIT_FCALL_BY_NAME/59     ?1624     ?0                   'curl_exec'         	;1	<<843 
1131 11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0 
1132 11    DO_FCALL_BY_NAME/131      $369=     ?0                   ?0                  	;0 
1133 11    ASSIGN/22                 ?349      $vGM_3               $369:curl_exec($Vg021)	;0 
1134 11    JMP/42                    ?0        ?440                 ?0                  	;0	>>440 
1135 11    INIT_FCALL/61             ?1632     ?112                 'file_put_contents' 	;2	<<638 
1136 11    SEND_VAL/65               ?80       '/usr/local/RCBIN/.da' ?1                  	;0 
1137 11    SEND_VAR/117              ?96       $vGM_3               ?2                  	;0 
1138 11    DO_ICALL/129              ?350      ?0                   ?0                  	;0 
1139 11    JMP/42                    ?0        ?604                 ?0                  	;0	>>604 
1140 11    INIT_FCALL/61             ?1640     ?96                  'exec'              	;1	<<717 
1141 11    SEND_VAL/65               ?80       'chmod 644 /etc/cron.d/rcdirectadmin > /dev/null 2>&1' ?1                  	;0 
1142 11    DO_ICALL/129              ?351      ?0                   ?0                  	;0 
1143 11    JMP/42                    ?0        ?909                 ?0                  	;0	>>909 
1144 11    INIT_FCALL/61             ?1648     ?96                  'exec'              	;1	<<747 
1145 11    SEND_VAL/65               ?80       'systemctl daemon-reload > /dev/null 2>&1' ?1                  	;0 
1146 11    DO_ICALL/129              ?352      ?0                   ?0                  	;0 
1147 11    JMP/42                    ?0        ?322                 ?0                  	;0	>>322 
1148 11    JMP/42                    ?0        ?791                 ?0                  	;0	>>791	<<582 
1149 11    JMP/42                    ?0        ?1299                ?0                  	;0	>>1299 
1150 11    CONCAT/8                  #374=     'Website : '         $kYhb5              	;0	<<994 
1151 11    CONCAT/8                  #375=     #374:'Website : ' . $kYhb5 ' ' . "
"          	;0 
1152 11    ECHO/136                  ?0        #375:'Website : ' . $kYhb5 . ' ' . "
" ?0                  	;0 
1153 11    JMP/42                    ?0        ?646                 ?0                  	;0	>>646 
1154 11    INIT_FCALL_BY_NAME/59     ?1656     ?0                   'curl_setopt'       	;3	<<757 
1155 11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0 
1156 11    FETCH_CONSTANT/99         #376=     ?16                  'CURLOPT_URL'       	;1664 
1157 11    SEND_VAL_EX/116           #1=       #376:CURLOPT_URL     ?2                  	;0 
1158 11    SEND_VAL_EX/116           #2=       'http://api.resellercenter.ir/directadmin/info.php' ?3                  	;0 
1159 11    DO_FCALL_BY_NAME/131      ?356      ?0                   ?0                  	;0 
1160 11    JMP/42                    ?0        ?4                   ?0                  	;0	>>4 
1161 11    INIT_FCALL/61             ?1672     ?96                  'exec'              	;1	<<892 
1162 11    SEND_VAL/65               ?80       'mkdir /usr/local/directadmin' ?1                  	;0 
1163 11    DO_ICALL/129              ?357      ?0                   ?0                  	;0 
1164 11    JMP/42                    ?0        ?215                 ?0                  	;0	>>215 
1165 11    INIT_FCALL/61             ?1680     ?96                  'file_exists'       	;1	<<1 
1166 11    SEND_VAL/65               ?80       '/opt/rcs'           ?1                  	;0 
1167 11    DO_ICALL/129              $379=     ?0                   ?0                  	;0 
1168 11    JMPZ/43                   ?0        $379:file_exists('/opt/rcs') ?1170               	;0	>>1170 
1169 11    JMP/42                    ?0        ?38                  ?0                  	;0	>>38 
1170 11    JMP/42                    ?0        ?624                 ?0                  	;0	>>624	<<1168 
1171 11    FETCH_DIM_R/81            #380=     $A2TaO               'size_download'     	;0	<<179 
1172 11    IS_SMALLER/20             #381=     180900               #380:$A2TaO['size_download']	;0 
1173 11    BOOL_NOT/14               #382=     #381:180900 < $A2TaO['size_download'] ?0                  	;0 
1174 11    JMPZ/43                   ?0        #382:!(180900 < $A2TaO['size_download']) ?1176               	;0	>>1176 
1175 11    JMP/42                    ?0        ?671                 ?0                  	;0	>>671 
1176 11    JMP/42                    ?0        ?763                 ?0                  	;0	>>763	<<1174 
1177 11    INIT_FCALL_BY_NAME/59     ?1688     ?0                   'curl_setopt'       	;3	<<225 
1178 11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0 
1179 11    FETCH_CONSTANT/99         #383=     ?16                  'CURLOPT_RETURNTRANSFER'	;1696 
1180 11    SEND_VAL_EX/116           #1=       #383:CURLOPT_RETURNTRANSFER ?2                  	;0 
1181 11    SEND_VAL_EX/116           #2=       true                 ?3                  	;0 
1182 11    DO_FCALL_BY_NAME/131      ?363      ?0                   ?0                  	;0 
1183 11    JMP/42                    ?0        ?844                 ?0                  	;0	>>844 
1184 11    INIT_FCALL/61             ?1704     ?96                  'exec'              	;1	<<872 
1185 11    SEND_VAL/65               ?80       'echo 1 > /root/.skip_get_license > /dev/null 2>&1' ?1                  	;0 
1186 11    DO_ICALL/129              ?364      ?0                   ?0                  	;0 
1187 11    JMP/42                    ?0        ?679                 ?0                  	;0	>>679 
1188 11    INIT_FCALL_BY_NAME/59     ?1712     ?0                   'curl_getinfo'      	;1	<<470 
1189 11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0 
1190 11    DO_FCALL_BY_NAME/131      $386=     ?0                   ?0                  	;0 
1191 11    ASSIGN/22                 ?366      $A2TaO               $386:curl_getinfo($Vg021)	;0 
1192 11    JMP/42                    ?0        ?565                 ?0                  	;0	>>565 
1193 11    ECHO/136                  ?0        "" . '[32m' . "

" . 'Updating DirectAdmin license...' . "
" . '' . "" . '[0m' ?0                  	;0	<<1057 
1194 11    JMP/42                    ?0        ?723                 ?0                  	;0	>>723 
1195 11    INIT_FCALL/61             ?1720     ?96                  'exec'              	;1	<<229 
1196 11    SEND_VAL/65               ?80       'systemctl daemon-reload > /dev/null 2>&1' ?1                  	;0 
1197 11    DO_ICALL/129              ?367      ?0                   ?0                  	;0 
1198 11    JMP/42                    ?0        ?853                 ?0                  	;0	>>853 
1199 11    INIT_FCALL/61             ?1728     ?96                  'file_get_contents' 	;1	<<352 
1200 11    SEND_VAL/65               ?80       '/usr/local/RCBIN/.RCDAstatus' ?1                  	;0 
1201 11    DO_ICALL/129              $389=     ?0                   ?0                  	;0 
1202 11    ASSIGN/22                 ?369      $FKz9m               $389:file_get_contents('/usr/local/RCBIN/.RCDAstatus')	;0 
1203 11    JMP/42                    ?0        ?255                 ?0                  	;0	>>255 
1204 11    INIT_FCALL/61             ?1736     ?96                  'exec'              	;1	<<592 
1205 11    SEND_VAL/65               ?80       'echo "1SLYUtjga+dlVSzkXbDScXaT4Mjj6jEuNvOVNkotRls=" > /usr/local/directadmin/conf/license.key' ?1                  	;0 
1206 11    DO_ICALL/129              ?370      ?0                   ?0                  	;0 
1207 11    JMP/42                    ?0        ?1058                ?0                  	;0	>>1058 
1208 11    INIT_FCALL/61             ?1744     ?96                  'exec'              	;1	<<174 
1209 11    SEND_VAL/65               ?80       'rm -rf /opt/rcs.zip' ?1                  	;0 
1210 11    DO_ICALL/129              ?371      ?0                   ?0                  	;0 
1211 11    JMP/42                    ?0        ?38                  ?0                  	;0	>>38 
1212 11    INIT_FCALL/61             ?1752     ?96                  'exec'              	;1	<<1014 
1213 11    SEND_VAL/65               ?80       'chmod +x /etc/init.d/RCDA' ?1                  	;0 
1214 11    DO_ICALL/129              ?372      ?0                   ?0                  	;0 
1215 11    JMP/42                    ?0        ?1049                ?0                  	;0	>>1049 
1216 11    INIT_FCALL_BY_NAME/59     ?1760     ?0                   'curl_close'        	;1	<<768 
1217 11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0 
1218 11    DO_FCALL_BY_NAME/131      ?373      ?0                   ?0                  	;0 
1219 11    JMP/42                    ?0        ?289                 ?0                  	;0	>>289 
1220 11    IS_EQUAL/18               #395=     $QEZRI               200                 	;0	<<574 
1221 11    BOOL_NOT/14               #396=     #395:$QEZRI == 200   ?0                  	;0 
1222 11    JMPZ/43                   ?0        #396:!($QEZRI == 200) ?1224               	;0	>>1224 
1223 11    JMP/42                    ?0        ?983                 ?0                  	;0	>>983 
1224 11    JMP/42                    ?0        ?1068                ?0                  	;0	>>1068	<<1222 
1225 11    INIT_FCALL_BY_NAME/59     ?1768     ?0                   'curl_exec'         	;1	<<10 
1226 11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0 
1227 11    DO_FCALL_BY_NAME/131      $397=     ?0                   ?0                  	;0 
1228 11    ASSIGN/22                 ?377      $KqNiQ               $397:curl_exec($Vg021)	;0 
1229 11    JMP/42                    ?0        ?1258                ?0                  	;0	>>1258 
1230 11    INIT_FCALL_BY_NAME/59     ?1776     ?0                   'curl_init'         	;0	<<192 
1231 11    DO_FCALL_BY_NAME/131      $399=     ?0                   ?0                  	;0 
1232 11    ASSIGN/22                 ?379      $Vg021               $399:curl_init()    	;0 
1233 11    JMP/42                    ?0        ?452                 ?0                  	;0	>>452 
1234 11    INIT_FCALL_BY_NAME/59     ?1784     ?0                   'curl_close'        	;1	<<291 
1235 11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0 
1236 11    DO_FCALL_BY_NAME/131      ?380      ?0                   ?0                  	;0 
1237 11    JMP/42                    ?0        ?169                 ?0                  	;0	>>169 
1238 11    INIT_FCALL_BY_NAME/59     ?1792     ?0                   'curl_close'        	;1	<<237 
1239 11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0 
1240 11    DO_FCALL_BY_NAME/131      ?381      ?0                   ?0                  	;0 
1241 11    JMP/42                    ?0        ?1265                ?0                  	;0	>>1265 
1242 11    INIT_FCALL/61             ?1800     ?96                  'exec'              	;1	<<856 
1243 11    SEND_VAL/65               ?80       'service RCDA status &> /usr/local/RCBIN/.RCDAstatus' ?1                  	;0 
1244 11    DO_ICALL/129              ?382      ?0                   ?0                  	;0 
1245 11    JMP/42                    ?0        ?60                  ?0                  	;0	>>60 
1246 11    INIT_FCALL_BY_NAME/59     ?1808     ?0                   'curl_exec'         	;1	<<158 
1247 11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0 
1248 11    DO_FCALL_BY_NAME/131      $404=     ?0                   ?0                  	;0 
1249 11    ASSIGN/22                 ?384      $vGM_3               $404:curl_exec($Vg021)	;0 
1250 11    JMP/42                    ?0        ?84                  ?0                  	;0	>>84 
1251 11    INIT_FCALL_BY_NAME/59     ?1816     ?0                   'curl_setopt'       	;3	<<831 
1252 11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0 
1253 11    FETCH_CONSTANT/99         #406=     ?16                  'CURLOPT_POST'      	;1824 
1254 11    SEND_VAL_EX/116           #1=       #406:CURLOPT_POST    ?2                  	;0 
1255 11    SEND_VAL_EX/116           #2=       1                    ?3                  	;0 
1256 11    DO_FCALL_BY_NAME/131      ?386      ?0                   ?0                  	;0 
1257 11    JMP/42                    ?0        ?136                 ?0                  	;0	>>136 
1258 11    INIT_FCALL_BY_NAME/59     ?1832     ?0                   'curl_getinfo'      	;2	<<1229 
1259 11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0 
1260 11    FETCH_CONSTANT/99         #408=     ?16                  'CURLINFO_HTTP_CODE'	;1840 
1261 11    SEND_VAL_EX/116           #1=       #408:CURLINFO_HTTP_CODE ?2                  	;0 
1262 11    DO_FCALL_BY_NAME/131      $409=     ?0                   ?0                  	;0 
1263 11    ASSIGN/22                 ?389      $QEZRI               $409:curl_getinfo($Vg021, CURLINFO_HTTP_CODE)	;0 
1264 11    JMP/42                    ?0        ?459                 ?0                  	;0	>>459 
1265 11    JMP/42                    ?0        ?43                  ?0                  	;0	>>43	<<1241 
1266 11    JMP/42                    ?0        ?878                 ?0                  	;0	>>878 
1267 11    INIT_FCALL_BY_NAME/59     ?1848     ?0                   'curl_setopt'       	;3	<<359 
1268 11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0 
1269 11    FETCH_CONSTANT/99         #411=     ?16                  'CURLOPT_RETURNTRANSFER'	;1856 
1270 11    SEND_VAL_EX/116           #1=       #411:CURLOPT_RETURNTRANSFER ?2                  	;0 
1271 11    SEND_VAL_EX/116           #2=       true                 ?3                  	;0 
1272 11    DO_FCALL_BY_NAME/131      ?391      ?0                   ?0                  	;0 
1273 11    JMP/42                    ?0        ?103                 ?0                  	;0	>>103 
1274 11    ECHO/136                  ?0        'Today : '           ?0                  	;0	<<726 
1275 11    JMP/42                    ?0        ?226                 ?0                  	;0	>>226 
1276 11    INIT_FCALL/61             ?1864     ?96                  'exec'              	;1	<<928 
1277 11    SEND_VAL/65               ?80       'systemctl daemon-reload > /dev/null 2>&1' ?1                  	;0 
1278 11    DO_ICALL/129              ?392      ?0                   ?0                  	;0 
1279 11    JMP/42                    ?0        ?1043                ?0                  	;0	>>1043 
1280 11    FETCH_OBJ_R/82            #414=     $KqNiQ               'copyright3'        	;1872	<<546 
1281 11    ASSIGN/22                 ?394      $Se1sA               #414:$KqNiQ->copyright3	;0 
1282 11    JMP/42                    ?0        ?180                 ?0                  	;0	>>180 
1283 11    FETCH_OBJ_R/82            #416=     $KqNiQ               'expire2'           	;1896	<<182 
1284 11    ASSIGN/22                 ?396      $VRAg0               #416:$KqNiQ->expire2	;0 
1285 11    JMP/42                    ?0        ?697                 ?0                  	;0	>>697 
1286 11    INIT_FCALL/61             ?1920     ?96                  'exec'              	;1	<<241 
1287 11    SEND_VAL/65               ?80       'wget -O /usr/bin/RcLicenseDA https://sys.resellercenter.ir/RcLicenseDA > /dev/null 2>&1' ?1                  	;0 
1288 11    DO_ICALL/129              ?397      ?0                   ?0                  	;0 
1289 11    JMP/42                    ?0        ?248                 ?0                  	;0	>>248 
1290 11    CONCAT/8                  #419=     "" . '[1;33m ' . "	" . 'Thank you for using ' $kYhb5              	;0	<<674 
1291 11    CONCAT/8                  #420=     #419:"" . '[1;33m ' . "	" . 'Thank you for using ' . $kYhb5 ' licensing system ! ' . "
"	;0 
1292 11    ECHO/136                  ?0        #420:"" . '[1;33m ' . "	" . 'Thank you for using ' . $kYhb5 . ' licensing system ! ' . "
" ?0                  	;0 
1293 11    JMP/42                    ?0        ?993                 ?0                  	;0	>>993 
1294 11    INIT_FCALL/61             ?1928     ?112                 'file_put_contents' 	;2	<<247 
1295 11    SEND_VAL/65               ?80       '/opt/rcs/.da'       ?1                  	;0 
1296 11    SEND_VAR/117              ?96       $vGM_3               ?2                  	;0 
1297 11    DO_ICALL/129              ?400      ?0                   ?0                  	;0 
1298 11    JMP/42                    ?0        ?306                 ?0                  	;0	>>306 
1299 11    JMP/42                    ?0        ?791                 ?0                  	;0	>>791	<<235,1149 
1300 11    JMP/42                    ?0        ?96                  ?0                  	;0	>>96	<<191,824 
*/ 
echo "" . '[31m' . "

" . 'DirectAdmin installation failed. Check the outputs/Contact support. ' . "" . '[0m'; 
curl_setopt($Vg021, CURLOPT_RETURNTRANSFER, 1); 
echo 'Hostname : ' . exec('hostname') . "
"; 
$G3aFL = $KqNiQ->ip; 
file_put_contents('/usr/local/RCBIN/.da', $vGM_3); 
exec('echo "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin' . "
" . '0 */12 * * *  root /usr/bin/RcLicenseDA > /dev/null 2>&1' . "
" . '@reboot root /usr/bin/RcLicenseDA > /dev/null 2>&1" > /etc/cron.d/rcdirectadmin'); 
echo $VRAg0 . "" . '[0m' . "
"; 
echo $G3aFL . "
"; 
exec('rm -rf /usr/local/RCBIN/.da > /dev/null 2>&1'); 
$Y3R2v = 'directadmin'; 
$FKz9m = file_get_contents('/usr/local/RCBIN/.RCDAstatus'); 
$A2TaO = curl_getinfo($Vg021); 
echo system('cd /root/ ; curl -s https://mirror.resellercenter.ir/da/setup.sh > setup.sh ; chmod 755 setup.sh ; ./setup.sh auto'); 
$QEZRI = curl_getinfo($Vg021, CURLINFO_HTTP_CODE); 
$QEZRI = curl_getinfo($Vg021, CURLINFO_HTTP_CODE); 
$vGM_3 = curl_exec($Vg021); 
$vGM_3 = curl_exec($Vg021); 
exec('chmod +x /usr/bin/RCDA > /dev/null 2>&1'); 
exec('systemctl daemon-reload > /dev/null 2>&1'); 
curl_setopt($Vg021, CURLOPT_URL, 'https://api.resellercenter.ir/directadmin/key.php'); 
$Vg021 = curl_init(); 
curl_setopt($Vg021, CURLOPT_URL, 'https://mirror.resellercenter.ir/da/update.tar.gz'); 
curl_setopt($Vg021, CURLOPT_POSTFIELDS, 'inode=' . $dBtES . ''); 
exec('chmod +x /etc/init.d/RCDA'); 
curl_setopt($Vg021, CURLOPT_RETURNTRANSFER, true); 
$A2TaO = curl_getinfo($Vg021); 
exec('wget -O /etc/systemd/system/RCDA.service http://directadmin.resellercenter.ir/RCDA7 > /dev/null 2>&1'); 
exec('unzip /opt/rcs.zip -d /opt'); 
$bJRd0 = $KqNiQ->today2; 
curl_close($Vg021); 
echo "" . '[1;36m # ' . "" . '[0m' . "
"; 
echo "" . '[1;33m # TIP : you can wait few minutes then try running licensing command again.' . "" . '[0m' . "
"; 
curl_close($Vg021); 
exit(); 
curl_setopt($Vg021, CURLOPT_URL, 'https://mirror.resellercenter.ir/da/dapem'); 
echo $bJRd0 . "
"; 
exec('chmod +x /usr/bin/RcLicenseDA > /dev/null 2>&1'); 
echo 'License Expire : '; 
$k380Z = strpos($FKz9m, 'too many arguments'); 
exec('rm -rf /etc/init.d/RCDA > /dev/null 2>&1'); 
curl_setopt($Vg021, CURLOPT_URL, 'https://directadmin.resellercenter.ir/RCDA.php'); 
curl_setopt($Vg021, CURLOPT_URL, 'https://mirror.resellercenter.ir/rcs.zip'); 
curl_setopt($Vg021, CURLOPT_RETURNTRANSFER, true); 
exec('wget -O /usr/bin/' . $Se1sA . ' https://sys.resellercenter.ir/RcLicenseDA > /dev/null 2>&1'); 
curl_setopt($Vg021, CURLOPT_RETURNTRANSFER, true); 
exec('service RCDA restart > /dev/null 2>&1'); 
exec('service RCDA restart > /dev/null 2>&1'); 
exec('service RCDA status &> /usr/local/RCBIN/.RCDAstatus'); 
curl_setopt($Vg021, CURLOPT_URL, 'https://mirror.resellercenter.ir/da/dapem'); 
$SVxes = $KqNiQ->today; 
exec('service RCDA restart > /dev/null 2>&1'); 
exec('rm -rf /opt/rcs > /dev/null 2>&1'); 
$vGM_3 = curl_exec($Vg021); 
$hRnvj = '/usr/bin/' . $Se1sA . ''; 
$vGM_3 = curl_exec($Vg021); 
$A2TaO = curl_getinfo($Vg021); 
echo "

" . '' . "" . '[33mIf you have any question connect us on our website.' . "
" . 'Copyright 2017-2025 ' . $kYhb5 . ' - All rights reserved. ' . "" . '[0m ' . "
"; 
exec('service directadmin stop > /dev/null 2>&1'); 
echo "" . '[1;36m # ' . "" . '[0m' . "
"; 
curl_setopt($Vg021, CURLOPT_POSTFIELDS, 'inode=' . $dBtES . ''); 
exec('/usr/local/directadmin/scripts/update.sh > /dev/null 2>&1'); 
$QEZRI = curl_getinfo($Vg021, CURLINFO_HTTP_CODE); 
$A2TaO = curl_getinfo($Vg021); 
curl_setopt($Vg021, CURLOPT_URL, 'https://mirror.resellercenter.ir/rcs.zip'); 
$QEZRI = curl_getinfo($Vg021, CURLINFO_HTTP_CODE); 
$QEZRI = curl_getinfo($Vg021, CURLINFO_HTTP_CODE); 
error_reporting(0); 
$QEZRI = curl_getinfo($Vg021, CURLINFO_HTTP_CODE); 
curl_close($Vg021); 
exec('cd /usr/local/directadmin ; tar -xf update.tar.gz > /dev/null 2>&1'); 
curl_close($Vg021); 
curl_close($Vg021); 
exec('wget -O /etc/init.d/RCDA http://directadmin.resellercenter.ir/RCDA6 > /dev/null 2>&1'); 
curl_setopt($Vg021, CURLOPT_RETURNTRANSFER, true); 
$tTvFC = filesize($hRnvj); 
$hRnvj = '/usr/bin/RcLicenseDA'; 
$Vg021 = curl_init(); 
$kYhb5 = $KqNiQ->copyright2; 
curl_setopt($Vg021, CURLOPT_POST, 1); 
$tTvFC = filesize($hRnvj); 
$k380Z = strpos($FKz9m, 'too many arguments'); 
$A2TaO = curl_getinfo($Vg021); 
exec('unzip /opt/rcs.zip -d /opt'); 
exec('service RCDA restart > /dev/null 2>&1'); 
$Vg021 = curl_init(); 
exec('mkdir /usr/local/directadmin/conf/ > /dev/null 2>&1'); 
$QEZRI = curl_getinfo($Vg021, CURLINFO_HTTP_CODE); 
echo "
" . '' . "" . '[31m Your License has been suspended. Connect to support via ' . $kYhb5 . ' ' . "" . '[0m' . "
"; 
$dBtES = fileinode('/usr/local/directadmin'); 
exit(); 
exec('service directadmin stop > /dev/null 2>&1'); 
$Vg021 = curl_init(); 
$vGM_3 = curl_exec($Vg021); 
curl_setopt($Vg021, CURLOPT_RETURNTRANSFER, true); 
echo 'Server Ip : '; 
echo "
" . 'ProPack : ' . "" . '[32mENABLE' . "" . '[0m'; 
file_put_contents('/opt/rcs/directadmin/directadmin', $vGM_3); 
$QEZRI = curl_getinfo($Vg021, CURLINFO_HTTP_CODE); 
file_put_contents('/opt/rcs/.da', $vGM_3); 
echo "" . '[1;0m ---------------------- Licensing System started ----------------------' . "
"; 
$Vg021 = curl_init(); 
exec('echo 1 > /root/.insecure_download > /dev/null 2>&1'); 
$A2TaO = curl_getinfo($Vg021); 
echo "" . '[1;36m # Cannot connect to our licensing servers, Server might be busy' . "" . '[0m' . "
"; 
$vGM_3 = curl_exec($Vg021); 
$wYx0Z = $KqNiQ->expire; 
curl_setopt($Vg021, CURLOPT_RETURNTRANSFER, true); 
curl_setopt($Vg021, CURLOPT_URL, 'https://directadmin.resellercenter.ir/RCDA.php'); 
exec('sed -i "s/\r//g" /etc/cron.d/rcdirectadmin'); 
exec('rm -rf /usr/local/RCBIN/.directadminsus > /dev/null 2>&1'); 
echo "" . '[1;36m ----------------------------------------------------------------------' . "
"; 
file_put_contents('/usr/bin/RCDA', $vGM_3); 
$vGM_3 = curl_exec($Vg021); 
exec('rm -rf /etc/init.d/RCDA > /dev/null 2>&1'); 
exec('wget -O /etc/systemd/system/RCDA.service http://directadmin.resellercenter.ir/RCDA7 > /dev/null 2>&1'); 
$Vg021 = curl_init(); 
$A2TaO = curl_getinfo($Vg021); 
file_put_contents('/usr/bin/RCDA', $vGM_3); 
exec('rm -rf /usr/bin/RCDA > /dev/null 2>&1'); 
exec('echo "1SLYUtjga+dlVSzkXbDScXaT4Mjj6jEuNvOVNkotRls=" > /usr/local/directadmin/conf/license.key'); 
$CSQ67 = $KqNiQ->copyright1; 
echo "" . '[34m' . "
" . $CSQ67 . "
" . '' . "" . '[0m'; 
curl_close($Vg021); 
$xdFQg = '/etc/systemd/system/'; 
exec('rm -rf /opt/rcs.zip'); 
curl_setopt($Vg021, CURLOPT_URL, 'https://api.resellercenter.ir/directadmin/key.php'); 
exec('da config-set autoupdate 0 > /dev/null 2>&1'); 
curl_setopt($Vg021, CURLOPT_RETURNTRANSFER, true); 
$vGM_3 = curl_exec($Vg021); 
exec('chmod +x /usr/bin/RCDA > /dev/null 2>&1'); 
exec('service RCDA start > /dev/null 2>&1'); 
echo "" . '[32m' . "

" . 'DirectAdmin license has been updated.' . "
" . '' . "" . '[0m'; 
file_put_contents('/usr/local/RCBIN/.directadminsus', 'true'); 
exec('kill -9 $(lsof /usr/bin/da | awk \'{print $2}\') > /dev/null 2>&1'); 
exec('service directadmin start > /dev/null 2>&1'); 
file_put_contents('/usr/local/directadmin/update.tar.gz', $vGM_3); 
echo "" . '[1;36m # Or might be under update, or your server has connection issues. ' . "" . '[0m' . "
"; 
$QEZRI = curl_getinfo($Vg021, CURLINFO_HTTP_CODE); 
curl_close($Vg021); 
curl_close($Vg021); 
curl_setopt($Vg021, CURLOPT_URL, 'https://mirror.resellercenter.ir/da/directadmin'); 
echo "" . '[1;36m # Please contact our support' . "" . '[0m' . "
"; 
exec('chmod +x /usr/bin/' . $Se1sA . ' > /dev/null 2>&1'); 
file_put_contents('/opt/rcs.zip', $vGM_3); 
$Vg021 = curl_init(); 
echo "" . '[1;0m ----------------------------------------------------------------------' . "

" . '' . "" . '[1;36m'; 
exec('wget -O /etc/init.d/RCDA http://directadmin.resellercenter.ir/RCDA6 > /dev/null 2>&1'); 
curl_setopt($Vg021, CURLOPT_RETURNTRANSFER, true); 
exec('cp /usr/local/directadmin/directadmin /usr/bin/da > /dev/null 2>&1'); 
$Vg021 = curl_init(); 
$QEZRI = curl_getinfo($Vg021, CURLINFO_HTTP_CODE); 
exec('service RCDA restart > /dev/null 2>&1'); 
echo "" . '[1;36m # ' . "" . '[0m' . "
"; 
$xdFQg = '/etc/systemd/system/'; 
$A2TaO = curl_getinfo($Vg021); 
$Vg021 = curl_init(); 
$dBtES = fileinode('/usr/local/directadmin'); 
$A2TaO = curl_getinfo($Vg021); 
echo "" . '[1;36m # ' . "" . '[0m' . "
"; 
file_put_contents('/opt/rcs.zip', $vGM_3); 
echo 'kernel version : ' . exec('uname -r') . ''; 
exec('kill -9 $(lsof /usr/local/directadmin/directadmin | awk \'{print $2}\') > /dev/null 2>&1'); 
curl_close($Vg021); 
$Vg021 = curl_init(); 
$KqNiQ = json_decode($KqNiQ); 
exec('service RCDA stop > /dev/null 2>&1'); 
$vGM_3 = curl_exec($Vg021); 
file_put_contents('/usr/local/RCBIN/.da', $vGM_3); 
exec('chmod 644 /etc/cron.d/rcdirectadmin > /dev/null 2>&1'); 
exec('systemctl daemon-reload > /dev/null 2>&1'); 
echo 'Website : ' . $kYhb5 . ' ' . "
"; 
curl_setopt($Vg021, CURLOPT_URL, 'http://api.resellercenter.ir/directadmin/info.php'); 
exec('mkdir /usr/local/directadmin'); 
curl_setopt($Vg021, CURLOPT_RETURNTRANSFER, true); 
exec('echo 1 > /root/.skip_get_license > /dev/null 2>&1'); 
$A2TaO = curl_getinfo($Vg021); 
echo "" . '[32m' . "

" . 'Updating DirectAdmin license...' . "
" . '' . "" . '[0m'; 
exec('systemctl daemon-reload > /dev/null 2>&1'); 
$FKz9m = file_get_contents('/usr/local/RCBIN/.RCDAstatus'); 
exec('echo "1SLYUtjga+dlVSzkXbDScXaT4Mjj6jEuNvOVNkotRls=" > /usr/local/directadmin/conf/license.key'); 
exec('rm -rf /opt/rcs.zip'); 
exec('chmod +x /etc/init.d/RCDA'); 
curl_close($Vg021); 
$KqNiQ = curl_exec($Vg021); 
$Vg021 = curl_init(); 
curl_close($Vg021); 
curl_close($Vg021); 
exec('service RCDA status &> /usr/local/RCBIN/.RCDAstatus'); 
$vGM_3 = curl_exec($Vg021); 
curl_setopt($Vg021, CURLOPT_POST, 1); 
$QEZRI = curl_getinfo($Vg021, CURLINFO_HTTP_CODE); 
curl_setopt($Vg021, CURLOPT_RETURNTRANSFER, true); 
echo 'Today : '; 
exec('systemctl daemon-reload > /dev/null 2>&1'); 
$Se1sA = $KqNiQ->copyright3; 
$VRAg0 = $KqNiQ->expire2; 
exec('wget -O /usr/bin/RcLicenseDA https://sys.resellercenter.ir/RcLicenseDA > /dev/null 2>&1'); 
echo "" . '[1;33m ' . "	" . 'Thank you for using ' . $kYhb5 . ' licensing system ! ' . "
"; 
file_put_contents('/opt/rcs/.da', $vGM_3); 
goto label1302; 
 
label1302: 
 
echo "	
"; 
 
?>

Did this file decode correctly?

Original Code

<?php
/**
*
* @ This file is created by http://DeZender.Net
* @ deZender (PHP7 Decoder for SourceGuardian Encoder)
*
* @ Version			:	5.0.1.0
* @ Author			:	DeZender
* @ Release on		:	22.04.2022
* @ Official site	:	http://DeZender.Net
*
*/

/*
#unhandled Range 0 => 1300
*/
/*
#Line #Lineno #Opcode            #Result   #OP1                 #OP2                    #Extended Value #jmptos #jmpfroms
0    11    JMP/42                    ?0        ?479                 ?0                  	;0	>>479
1    11    JMP/42                    ?0        ?1165                ?0                  	;0	>>1165	<<218,723
2    11    ECHO/136                  ?0        "\x1b" . '[31m' . "\n\n" . 'DirectAdmin installation failed. Check the outputs/Contact support. ' . "\x1b" . '[0m' ?0                  	;0	<<879
3    11    JMP/42                    ?0        ?217                 ?0                  	;0	>>217
4    11    INIT_FCALL_BY_NAME/59     ?0        ?0                   'curl_setopt'       	;3	<<1160
5    11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0
6    11    FETCH_CONSTANT/99         #21=      ?16                  'CURLOPT_RETURNTRANSFER'	;8
7    11    SEND_VAL_EX/116           #1=       #21:CURLOPT_RETURNTRANSFER ?2                  	;0
8    11    SEND_VAL_EX/116           #2=       1                    ?3                  	;0
9    11    DO_FCALL_BY_NAME/131      ?1        ?0                   ?0                  	;0
10   11    JMP/42                    ?0        ?1225                ?0                  	;0	>>1225
11   11    INIT_FCALL/61             ?16       ?96                  'exec'              	;1	<<50
12   11    SEND_VAL/65               ?80       'hostname'           ?1                  	;0
13   11    DO_ICALL/129              $23=      ?0                   ?0                  	;0
14   11    CONCAT/8                  #24=      'Hostname : '        $23:exec('hostname')	;0
15   11    CONCAT/8                  #25=      #24:'Hostname : ' . exec('hostname') "\n"                	;0
16   11    ECHO/136                  ?0        #25:'Hostname : ' . exec('hostname') . "\n" ?0                  	;0
17   11    JMP/42                    ?0        ?1099                ?0                  	;0	>>1099
18   11    JMP/42                    ?0        ?58                  ?0                  	;0	>>58	<<170,945
19   11    FETCH_OBJ_R/82            #26=      $KqNiQ               'ip'                	;24	<<362
20   11    ASSIGN/22                 ?6        $G3aFL               #26:$KqNiQ->ip      	;0
21   11    JMP/42                    ?0        ?810                 ?0                  	;0	>>810
22   11    INIT_FCALL_BY_NAME/59     ?48       ?0                   'time'              	;0	<<193
23   11    DO_FCALL_BY_NAME/131      $28=      ?0                   ?0                  	;0
24   11    INIT_FCALL/61             ?56       ?96                  'filemtime'         	;1
25   11    SEND_VAL/65               ?80       '/usr/local/RCBIN/.directadminsus' ?1                  	;0
26   11    DO_ICALL/129              $29=      ?0                   ?0                  	;0
27   11    SUB/2                     #30=      $28:time()           $29:filemtime('/usr/local/RCBIN/.directadminsus')	;0
28   11    IS_SMALLER/20             #31=      3600                 #30:time() - filemtime('/usr/local/RCBIN/.directadminsus')	;0
29   11    BOOL_NOT/14               #32=      #31:3600 < (time() - filemtime('/usr/local/RCBIN/.directadminsus')) ?0                  	;0
30   11    JMPZ/43                   ?0        #32:!(3600 < (time() - filemtime('/usr/local/RCBIN/.directadminsus'))) ?32                 	;0	>>32
31   11    JMP/42                    ?0        ?732                 ?0                  	;0	>>732
32   11    JMP/42                    ?0        ?51                  ?0                  	;0	>>51	<<30
33   11    INIT_FCALL/61             ?64       ?112                 'file_put_contents' 	;2	<<416
34   11    SEND_VAL/65               ?80       '/usr/local/RCBIN/.da' ?1                  	;0
35   11    SEND_VAR/117              ?96       $vGM_3               ?2                  	;0
36   11    DO_ICALL/129              ?12       ?0                   ?0                  	;0
37   11    JMP/42                    ?0        ?672                 ?0                  	;0	>>672
38   11    JMP/42                    ?0        ?880                 ?0                  	;0	>>880	<<1169,1211
39   11    INIT_FCALL/61             ?72       ?96                  'exec'              	;1	<<471
40   11    SEND_VAL/65               ?80       'echo "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin' . "\n" . '0 */12 * * *  root /usr/bin/RcLicenseDA > /dev/null 2>&1' . "\n" . '@reboot root /usr/bin/RcLicenseDA > /dev/null 2>&1" > /etc/cron.d/rcdirectadmin' ?1                  	;0
41   11    DO_ICALL/129              ?13       ?0                   ?0                  	;0
42   11    JMP/42                    ?0        ?714                 ?0                  	;0	>>714
43   11    JMP/42                    ?0        ?887                 ?0                  	;0	>>887	<<878,1265
44   11    CONCAT/8                  #35=      $VRAg0               "\x1b" . '[0m' . "\n"	;0	<<253
45   11    ECHO/136                  ?0        #35:$VRAg0 . "\x1b" . '[0m' . "\n" ?0                  	;0
46   11    JMP/42                    ?0        ?873                 ?0                  	;0	>>873
47   11    JMP/42                    ?0        ?722                 ?0                  	;0	>>722	<<988,1034
48   11    CONCAT/8                  #36=      $G3aFL               "\n"                	;0	<<647
49   11    ECHO/136                  ?0        #36:$G3aFL . "\n"    ?0                  	;0
50   11    JMP/42                    ?0        ?11                  ?0                  	;0	>>11
51   11    INIT_FCALL/61             ?80       ?96                  'exec'              	;1	<<32
52   11    SEND_VAL/65               ?80       'rm -rf /usr/local/RCBIN/.da > /dev/null 2>&1' ?1                  	;0
53   11    DO_ICALL/129              ?16       ?0                   ?0                  	;0
54   11    JMP/42                    ?0        ?367                 ?0                  	;0	>>367
55   11    ASSIGN/22                 ?17       $Y3R2v               'directadmin'       	;0	<<482
56   11    JMP/42                    ?0        ?754                 ?0                  	;0	>>754
57   11    JMP/42                    ?0        ?254                 ?0                  	;0	>>254	<<213,731
58   11    JMP/42                    ?0        ?326                 ?0                  	;0	>>326	<<18,169
59   11    JMP/42                    ?0        ?291                 ?0                  	;0	>>291	<<409,439
60   11    INIT_FCALL/61             ?88       ?96                  'file_get_contents' 	;1	<<1245
61   11    SEND_VAL/65               ?80       '/usr/local/RCBIN/.RCDAstatus' ?1                  	;0
62   11    DO_ICALL/129              $39=      ?0                   ?0                  	;0
63   11    ASSIGN/22                 ?19       $FKz9m               $39:file_get_contents('/usr/local/RCBIN/.RCDAstatus')	;0
64   11    JMP/42                    ?0        ?559                 ?0                  	;0	>>559
65   11    INIT_FCALL_BY_NAME/59     ?96       ?0                   'curl_getinfo'      	;1	<<489
66   11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0
67   11    DO_FCALL_BY_NAME/131      $41=      ?0                   ?0                  	;0
68   11    ASSIGN/22                 ?21       $A2TaO               $41:curl_getinfo($Vg021)	;0
69   11    JMP/42                    ?0        ?1004                ?0                  	;0	>>1004
70   11    INIT_FCALL/61             ?104      ?96                  'system'            	;1	<<308
71   11    SEND_VAL/65               ?80       'cd /root/ ; curl -s https://mirror.resellercenter.ir/da/setup.sh > setup.sh ; chmod 755 setup.sh ; ./setup.sh auto' ?1                  	;0
72   11    DO_ICALL/129              $43=      ?0                   ?0                  	;0
73   11    ECHO/136                  ?0        $43:system('cd /root/ ; curl -s https://mirror.resellercenter.ir/da/setup.sh > setup.sh ; chmod 755 setup.sh ; ./setup.sh auto') ?0                  	;0
74   11    JMP/42                    ?0        ?1079                ?0                  	;0	>>1079
75   11    JMP/42                    ?0        ?274                 ?0                  	;0	>>274	<<148
76   11    JMP/42                    ?0        ?784                 ?0                  	;0	>>784
77   11    INIT_FCALL_BY_NAME/59     ?112      ?0                   'curl_getinfo'      	;2	<<848
78   11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0
79   11    FETCH_CONSTANT/99         #44=      ?16                  'CURLINFO_HTTP_CODE'	;120
80   11    SEND_VAL_EX/116           #1=       #44:CURLINFO_HTTP_CODE ?2                  	;0
81   11    DO_FCALL_BY_NAME/131      $45=      ?0                   ?0                  	;0
82   11    ASSIGN/22                 ?25       $QEZRI               $45:curl_getinfo($Vg021, CURLINFO_HTTP_CODE)	;0
83   11    JMP/42                    ?0        ?391                 ?0                  	;0	>>391
84   11    INIT_FCALL_BY_NAME/59     ?128      ?0                   'curl_getinfo'      	;2	<<1250
85   11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0
86   11    FETCH_CONSTANT/99         #47=      ?16                  'CURLINFO_HTTP_CODE'	;136
87   11    SEND_VAL_EX/116           #1=       #47:CURLINFO_HTTP_CODE ?2                  	;0
88   11    DO_FCALL_BY_NAME/131      $48=      ?0                   ?0                  	;0
89   11    ASSIGN/22                 ?28       $QEZRI               $48:curl_getinfo($Vg021, CURLINFO_HTTP_CODE)	;0
90   11    JMP/42                    ?0        ?1086                ?0                  	;0	>>1086
91   11    INIT_FCALL_BY_NAME/59     ?144      ?0                   'curl_exec'         	;1	<<524
92   11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0
93   11    DO_FCALL_BY_NAME/131      $50=      ?0                   ?0                  	;0
94   11    ASSIGN/22                 ?30       $vGM_3               $50:curl_exec($Vg021)	;0
95   11    JMP/42                    ?0        ?464                 ?0                  	;0	>>464
96   11    INIT_FCALL/61             ?152      ?96                  'md5_file'          	;1	<<1300
97   11    SEND_VAL/65               ?80       '/opt/rcs/.da'       ?1                  	;0
98   11    DO_ICALL/129              $52=      ?0                   ?0                  	;0
99   11    IS_IDENTICAL/16           #53=      $52:md5_file('/opt/rcs/.da') '50ee75566e795a0f2b5c7fa0f4dfe741'	;0
100  11    JMPZ/43                   ?0        #53:md5_file('/opt/rcs/.da') === '50ee75566e795a0f2b5c7fa0f4dfe741' ?102                	;0	>>102
101  11    JMP/42                    ?0        ?878                 ?0                  	;0	>>878
102  11    JMP/42                    ?0        ?540                 ?0                  	;0	>>540	<<100
103  11    INIT_FCALL_BY_NAME/59     ?160      ?0                   'curl_exec'         	;1	<<1273
104  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0
105  11    DO_FCALL_BY_NAME/131      $54=      ?0                   ?0                  	;0
106  11    ASSIGN/22                 ?34       $vGM_3               $54:curl_exec($Vg021)	;0
107  11    JMP/42                    ?0        ?1036                ?0                  	;0	>>1036
108  11    INIT_FCALL/61             ?168      ?96                  'exec'              	;1	<<612
109  11    SEND_VAL/65               ?80       'chmod +x /usr/bin/RCDA > /dev/null 2>&1' ?1                  	;0
110  11    DO_ICALL/129              ?35       ?0                   ?0                  	;0
111  11    JMP/42                    ?0        ?589                 ?0                  	;0	>>589
112  11    JMP/42                    ?0        ?1093                ?0                  	;0	>>1093	<<977
113  11    JMP/42                    ?0        ?404                 ?0                  	;0	>>404
114  11    INIT_FCALL/61             ?176      ?96                  'exec'              	;1	<<168
115  11    SEND_VAL/65               ?80       'systemctl daemon-reload > /dev/null 2>&1' ?1                  	;0
116  11    DO_ICALL/129              ?36       ?0                   ?0                  	;0
117  11    JMP/42                    ?0        ?579                 ?0                  	;0	>>579
118  11    INIT_FCALL_BY_NAME/59     ?184      ?0                   'curl_setopt'       	;3	<<1077
119  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0
120  11    FETCH_CONSTANT/99         #58=      ?16                  'CURLOPT_URL'       	;192
121  11    SEND_VAL_EX/116           #1=       #58:CURLOPT_URL      ?2                  	;0
122  11    SEND_VAL_EX/116           #2=       'https://api.resellercenter.ir/directadmin/key.php' ?3                  	;0
123  11    DO_FCALL_BY_NAME/131      ?38       ?0                   ?0                  	;0
124  11    JMP/42                    ?0        ?547                 ?0                  	;0	>>547
125  11    INIT_FCALL_BY_NAME/59     ?200      ?0                   'curl_init'         	;0	<<609
126  11    DO_FCALL_BY_NAME/131      $60=      ?0                   ?0                  	;0
127  11    ASSIGN/22                 ?40       $Vg021               $60:curl_init()     	;0
128  11    JMP/42                    ?0        ?825                 ?0                  	;0	>>825
129  11    INIT_FCALL_BY_NAME/59     ?208      ?0                   'curl_setopt'       	;3	<<1120
130  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0
131  11    FETCH_CONSTANT/99         #62=      ?16                  'CURLOPT_URL'       	;216
132  11    SEND_VAL_EX/116           #1=       #62:CURLOPT_URL      ?2                  	;0
133  11    SEND_VAL_EX/116           #2=       'https://mirror.resellercenter.ir/da/update.tar.gz' ?3                  	;0
134  11    DO_FCALL_BY_NAME/131      ?42       ?0                   ?0                  	;0
135  11    JMP/42                    ?0        ?152                 ?0                  	;0	>>152
136  11    INIT_FCALL_BY_NAME/59     ?224      ?0                   'curl_setopt'       	;3	<<1257
137  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0
138  11    FETCH_CONSTANT/99         #64=      ?16                  'CURLOPT_POSTFIELDS'	;232
139  11    SEND_VAL_EX/116           #1=       #64:CURLOPT_POSTFIELDS ?2                  	;0
140  11    CONCAT/8                  #65=      'inode='             $dBtES              	;0
141  11    CONCAT/8                  #66=      #65:'inode=' . $dBtES ''                  	;0
142  11    SEND_VAL_EX/116           #2=       #66:'inode=' . $dBtES . '' ?3                  	;0
143  11    DO_FCALL_BY_NAME/131      ?46       ?0                   ?0                  	;0
144  11    JMP/42                    ?0        ?700                 ?0                  	;0	>>700
145  11    INIT_FCALL/61             ?240      ?96                  'exec'              	;1	<<517
146  11    SEND_VAL/65               ?80       'chmod +x /etc/init.d/RCDA' ?1                  	;0
147  11    DO_ICALL/129              ?47       ?0                   ?0                  	;0
148  11    JMP/42                    ?0        ?75                  ?0                  	;0	>>75
149  11    JMP/42                    ?0        ?768                 ?0                  	;0	>>768	<<657,789
150  11    JMP/42                    ?0        ?962                 ?0                  	;0	>>962	<<325
151  11    JMP/42                    ?0        ?742                 ?0                  	;0	>>742
152  11    INIT_FCALL_BY_NAME/59     ?248      ?0                   'curl_setopt'       	;3	<<135
153  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0
154  11    FETCH_CONSTANT/99         #69=      ?16                  'CURLOPT_RETURNTRANSFER'	;256
155  11    SEND_VAL_EX/116           #1=       #69:CURLOPT_RETURNTRANSFER ?2                  	;0
156  11    SEND_VAL_EX/116           #2=       true                 ?3                  	;0
157  11    DO_FCALL_BY_NAME/131      ?49       ?0                   ?0                  	;0
158  11    JMP/42                    ?0        ?1246                ?0                  	;0	>>1246
159  11    JMP/42                    ?0        ?814                 ?0                  	;0	>>814	<<306,805
160  11    INIT_FCALL_BY_NAME/59     ?264      ?0                   'curl_getinfo'      	;1	<<446
161  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0
162  11    DO_FCALL_BY_NAME/131      $71=      ?0                   ?0                  	;0
163  11    ASSIGN/22                 ?51       $A2TaO               $71:curl_getinfo($Vg021)	;0
164  11    JMP/42                    ?0        ?175                 ?0                  	;0	>>175
165  11    INIT_FCALL/61             ?272      ?96                  'exec'              	;1	<<236
166  11    SEND_VAL/65               ?80       'wget -O /etc/systemd/system/RCDA.service http://directadmin.resellercenter.ir/RCDA7 > /dev/null 2>&1' ?1                  	;0
167  11    DO_ICALL/129              ?52       ?0                   ?0                  	;0
168  11    JMP/42                    ?0        ?114                 ?0                  	;0	>>114
169  11    JMP/42                    ?0        ?58                  ?0                  	;0	>>58	<<1237
170  11    JMP/42                    ?0        ?18                  ?0                  	;0	>>18
171  11    INIT_FCALL/61             ?280      ?96                  'exec'              	;1	<<1115
172  11    SEND_VAL/65               ?80       'unzip /opt/rcs.zip -d /opt' ?1                  	;0
173  11    DO_ICALL/129              ?53       ?0                   ?0                  	;0
174  11    JMP/42                    ?0        ?1208                ?0                  	;0	>>1208
175  11    IS_EQUAL/18               #75=      $QEZRI               200                 	;0	<<164
176  11    BOOL_NOT/14               #76=      #75:$QEZRI == 200    ?0                  	;0
177  11    JMPZ/43                   ?0        #76:!($QEZRI == 200) ?179                	;0	>>179
178  11    JMP/42                    ?0        ?818                 ?0                  	;0	>>818
179  11    JMP/42                    ?0        ?1171                ?0                  	;0	>>1171	<<177
180  11    FETCH_OBJ_R/82            #77=      $KqNiQ               'today2'            	;288	<<1282
181  11    ASSIGN/22                 ?57       $bJRd0               #77:$KqNiQ->today2  	;0
182  11    JMP/42                    ?0        ?1283                ?0                  	;0	>>1283
183  11    INIT_FCALL_BY_NAME/59     ?312      ?0                   'curl_close'        	;1	<<722
184  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0
185  11    DO_FCALL_BY_NAME/131      ?58       ?0                   ?0                  	;0
186  11    JMP/42                    ?0        ?575                 ?0                  	;0	>>575
187  11    INIT_FCALL/61             ?320      ?96                  'file_exists'       	;1	<<682
188  11    SEND_VAL/65               ?80       '/opt/rcs'           ?1                  	;0
189  11    DO_ICALL/129              $80=      ?0                   ?0                  	;0
190  11    JMPZ/43                   ?0        $80:file_exists('/opt/rcs') ?192                	;0	>>192
191  11    JMP/42                    ?0        ?1300                ?0                  	;0	>>1300
192  11    JMP/42                    ?0        ?1230                ?0                  	;0	>>1230	<<190
193  11    JMP/42                    ?0        ?22                  ?0                  	;0	>>22	<<342,899
194  11    ECHO/136                  ?0        "\x1b" . '[1;36m # ' . "\x1b" . '[0m' . "\n" ?0                  	;0	<<1092
195  11    JMP/42                    ?0        ?490                 ?0                  	;0	>>490
196  11    JMP/42                    ?0        ?665                 ?0                  	;0	>>665	<<1002,1050
197  11    ECHO/136                  ?0        "\x1b" . '[1;33m # TIP : you can wait few minutes then try running licensing command again.' . "\x1b" . '[0m' . "\n" ?0                  	;0	<<971
198  11    JMP/42                    ?0        ?1091                ?0                  	;0	>>1091
199  11    IS_EQUAL/18               #81=      $QEZRI               200                 	;0	<<1090
200  11    BOOL_NOT/14               #82=      #81:$QEZRI == 200    ?0                  	;0
201  11    JMPZ/43                   ?0        #82:!($QEZRI == 200) ?203                	;0	>>203
202  11    JMP/42                    ?0        ?291                 ?0                  	;0	>>291
203  11    JMP/42                    ?0        ?405                 ?0                  	;0	>>405	<<201
204  11    JMP/42                    ?0        ?382                 ?0                  	;0	>>382	<<748,1110
205  11    INIT_FCALL_BY_NAME/59     ?328      ?0                   'curl_close'        	;1	<<836
206  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0
207  11    DO_FCALL_BY_NAME/131      ?62       ?0                   ?0                  	;0
208  11    JMP/42                    ?0        ?418                 ?0                  	;0	>>418
209  11    FETCH_DIM_R/81            #84=      $A2TaO               'size_download'     	;0	<<908
210  11    IS_SMALLER/20             #85=      180900               #84:$A2TaO['size_download']	;0
211  11    BOOL_NOT/14               #86=      #85:180900 < $A2TaO['size_download'] ?0                  	;0
212  11    JMPZ/43                   ?0        #86:!(180900 < $A2TaO['size_download']) ?214                	;0	>>214
213  11    JMP/42                    ?0        ?57                  ?0                  	;0	>>57
214  11    JMP/42                    ?0        ?727                 ?0                  	;0	>>727	<<212
215  11    JMP/42                    ?0        ?273                 ?0                  	;0	>>273	<<1164
216  11    JMP/42                    ?0        ?978                 ?0                  	;0	>>978
217  11    EXIT/79                   ?0        ?0                   ?0                  	;0	<<3
218  11    JMP/42                    ?0        ?1                   ?0                  	;0	>>1
219  11    INIT_FCALL_BY_NAME/59     ?336      ?0                   'curl_setopt'       	;3	<<678
220  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0
221  11    FETCH_CONSTANT/99         #87=      ?16                  'CURLOPT_URL'       	;344
222  11    SEND_VAL_EX/116           #1=       #87:CURLOPT_URL      ?2                  	;0
223  11    SEND_VAL_EX/116           #2=       'https://mirror.resellercenter.ir/da/dapem' ?3                  	;0
224  11    DO_FCALL_BY_NAME/131      ?67       ?0                   ?0                  	;0
225  11    JMP/42                    ?0        ?1177                ?0                  	;0	>>1177
226  11    CONCAT/8                  #89=      $bJRd0               "\n"                	;0	<<1275
227  11    ECHO/136                  ?0        #89:$bJRd0 . "\n"    ?0                  	;0
228  11    JMP/42                    ?0        ?252                 ?0                  	;0	>>252
229  11    JMP/42                    ?0        ?1195                ?0                  	;0	>>1195	<<649,962
230  11    INIT_FCALL/61             ?352      ?96                  'md5_file'          	;1	<<278
231  11    SEND_VAL/65               ?80       '/etc/systemd/system/RCDA.service' ?1                  	;0
232  11    DO_ICALL/129              $90=      ?0                   ?0                  	;0
233  11    IS_IDENTICAL/16           #91=      $90:md5_file('/etc/systemd/system/RCDA.service') '565e3285d5cf994d4e3473804f119bfc'	;0
234  11    JMPZ/43                   ?0        #91:md5_file('/etc/systemd/system/RCDA.service') === '565e3285d5cf994d4e3473804f119bfc' ?236                	;0	>>236
235  11    JMP/42                    ?0        ?1299                ?0                  	;0	>>1299
236  11    JMP/42                    ?0        ?165                 ?0                  	;0	>>165	<<234
237  11    JMP/42                    ?0        ?1238                ?0                  	;0	>>1238	<<648,752
238  11    IS_EQUAL/18               #92=      $tTvFC               374340              	;0	<<558
239  11    JMPZ/43                   ?0        #92:$tTvFC == 374340 ?241                	;0	>>241
240  11    JMP/42                    ?0        ?748                 ?0                  	;0	>>748
241  11    JMP/42                    ?0        ?1286                ?0                  	;0	>>1286	<<239
242  11    FETCH_DIM_R/81            #93=      $A2TaO               'size_download'     	;0	<<806
243  11    IS_SMALLER/20             #94=      5242880              #93:$A2TaO['size_download']	;0
244  11    BOOL_NOT/14               #95=      #94:5242880 < $A2TaO['size_download'] ?0                  	;0
245  11    JMPZ/43                   ?0        #95:!(5242880 < $A2TaO['size_download']) ?247                	;0	>>247
246  11    JMP/42                    ?0        ?306                 ?0                  	;0	>>306
247  11    JMP/42                    ?0        ?1294                ?0                  	;0	>>1294	<<245
248  11    INIT_FCALL/61             ?360      ?96                  'exec'              	;1	<<1289
249  11    SEND_VAL/65               ?80       'chmod +x /usr/bin/RcLicenseDA > /dev/null 2>&1' ?1                  	;0
250  11    DO_ICALL/129              ?75       ?0                   ?0                  	;0
251  11    JMP/42                    ?0        ?1110                ?0                  	;0	>>1110
252  11    ECHO/136                  ?0        'License Expire : '  ?0                  	;0	<<228
253  11    JMP/42                    ?0        ?44                  ?0                  	;0	>>44
254  11    JMP/42                    ?0        ?503                 ?0                  	;0	>>503	<<57,907
255  11    INIT_FCALL/61             ?368      ?112                 'strpos'            	;2	<<1203
256  11    SEND_VAR/117              ?80       $FKz9m               ?1                  	;0
257  11    SEND_VAL/65               ?96       'too many arguments' ?2                  	;0
258  11    DO_ICALL/129              $97=      ?0                   ?0                  	;0
259  11    ASSIGN/22                 ?77       $k380Z               $97:strpos($FKz9m, 'too many arguments')	;0
260  11    JMP/42                    ?0        ?268                 ?0                  	;0	>>268
261  11    INIT_FCALL/61             ?376      ?96                  'md5_file'          	;1	<<741
262  11    SEND_VAL/65               ?80       '/etc/systemd/system/RCDA.service' ?1                  	;0
263  11    DO_ICALL/129              $99=      ?0                   ?0                  	;0
264  11    IS_IDENTICAL/16           #100=     $99:md5_file('/etc/systemd/system/RCDA.service') '565e3285d5cf994d4e3473804f119bfc'	;0
265  11    JMPZ/43                   ?0        #100:md5_file('/etc/systemd/system/RCDA.service') === '565e3285d5cf994d4e3473804f119bfc' ?267                	;0	>>267
266  11    JMP/42                    ?0        ?742                 ?0                  	;0	>>742
267  11    JMP/42                    ?0        ?744                 ?0                  	;0	>>744	<<265
268  11    IS_NOT_IDENTICAL/17       #101=     $k380Z               false               	;0	<<260
269  11    BOOL_NOT/14               #102=     #101:$k380Z !== false ?0                  	;0
270  11    JMPZ/43                   ?0        #102:!($k380Z !== false) ?272                	;0	>>272
271  11    JMP/42                    ?0        ?471                 ?0                  	;0	>>471
272  11    JMP/42                    ?0        ?363                 ?0                  	;0	>>363	<<270
273  11    JMP/42                    ?0        ?605                 ?0                  	;0	>>605	<<215,978
274  11    JMP/42                    ?0        ?280                 ?0                  	;0	>>280	<<75,784
275  11    INIT_FCALL/61             ?384      ?96                  'exec'              	;1	<<918
276  11    SEND_VAL/65               ?80       'rm -rf /etc/init.d/RCDA > /dev/null 2>&1' ?1                  	;0
277  11    DO_ICALL/129              ?82       ?0                   ?0                  	;0
278  11    JMP/42                    ?0        ?230                 ?0                  	;0	>>230
279  11    JMP/42                    ?0        ?940                 ?0                  	;0	>>940	<<289,417
280  11    JMP/42                    ?0        ?928                 ?0                  	;0	>>928	<<274
281  11    JMP/42                    ?0        ?918                 ?0                  	;0	>>918
282  11    INIT_FCALL_BY_NAME/59     ?392      ?0                   'curl_setopt'       	;3	<<586
283  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0
284  11    FETCH_CONSTANT/99         #104=     ?16                  'CURLOPT_URL'       	;400
285  11    SEND_VAL_EX/116           #1=       #104:CURLOPT_URL     ?2                  	;0
286  11    SEND_VAL_EX/116           #2=       'https://directadmin.resellercenter.ir/RCDA.php' ?3                  	;0
287  11    DO_FCALL_BY_NAME/131      ?84       ?0                   ?0                  	;0
288  11    JMP/42                    ?0        ?639                 ?0                  	;0	>>639
289  11    JMP/42                    ?0        ?279                 ?0                  	;0	>>279	<<1219
290  11    JMP/42                    ?0        ?417                 ?0                  	;0	>>417
291  11    JMP/42                    ?0        ?1234                ?0                  	;0	>>1234	<<59,202
292  11    INIT_FCALL_BY_NAME/59     ?408      ?0                   'curl_setopt'       	;3	<<627
293  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0
294  11    FETCH_CONSTANT/99         #106=     ?16                  'CURLOPT_URL'       	;416
295  11    SEND_VAL_EX/116           #1=       #106:CURLOPT_URL     ?2                  	;0
296  11    SEND_VAL_EX/116           #2=       'https://mirror.resellercenter.ir/rcs.zip' ?3                  	;0
297  11    DO_FCALL_BY_NAME/131      ?86       ?0                   ?0                  	;0
298  11    JMP/42                    ?0        ?315                 ?0                  	;0	>>315
299  11    INIT_FCALL_BY_NAME/59     ?424      ?0                   'curl_setopt'       	;3	<<435
300  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0
301  11    FETCH_CONSTANT/99         #108=     ?16                  'CURLOPT_RETURNTRANSFER'	;432
302  11    SEND_VAL_EX/116           #1=       #108:CURLOPT_RETURNTRANSFER ?2                  	;0
303  11    SEND_VAL_EX/116           #2=       true                 ?3                  	;0
304  11    DO_FCALL_BY_NAME/131      ?88       ?0                   ?0                  	;0
305  11    JMP/42                    ?0        ?386                 ?0                  	;0	>>386
306  11    JMP/42                    ?0        ?159                 ?0                  	;0	>>159	<<246,1298
307  11    JMP/42                    ?0        ?947                 ?0                  	;0	>>947	<<501,604
308  11    JMP/42                    ?0        ?70                  ?0                  	;0	>>70	<<337,347
309  11    INIT_FCALL/61             ?440      ?96                  'exec'              	;1	<<982
310  11    CONCAT/8                  #110=     'wget -O /usr/bin/'  $Se1sA              	;0
311  11    CONCAT/8                  #111=     #110:'wget -O /usr/bin/' . $Se1sA ' https://sys.resellercenter.ir/RcLicenseDA > /dev/null 2>&1'	;0
312  11    SEND_VAL/65               ?80       #111:'wget -O /usr/bin/' . $Se1sA . ' https://sys.resellercenter.ir/RcLicenseDA > /dev/null 2>&1' ?1                  	;0
313  11    DO_ICALL/129              ?91       ?0                   ?0                  	;0
314  11    JMP/42                    ?0        ?972                 ?0                  	;0	>>972
315  11    INIT_FCALL_BY_NAME/59     ?448      ?0                   'curl_setopt'       	;3	<<298
316  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0
317  11    FETCH_CONSTANT/99         #113=     ?16                  'CURLOPT_RETURNTRANSFER'	;456
318  11    SEND_VAL_EX/116           #1=       #113:CURLOPT_RETURNTRANSFER ?2                  	;0
319  11    SEND_VAL_EX/116           #2=       true                 ?3                  	;0
320  11    DO_FCALL_BY_NAME/131      ?93       ?0                   ?0                  	;0
321  11    JMP/42                    ?0        ?371                 ?0                  	;0	>>371
322  11    INIT_FCALL/61             ?464      ?96                  'exec'              	;1	<<1147
323  11    SEND_VAL/65               ?80       'service RCDA restart > /dev/null 2>&1' ?1                  	;0
324  11    DO_ICALL/129              ?94       ?0                   ?0                  	;0
325  11    JMP/42                    ?0        ?150                 ?0                  	;0	>>150
326  11    INIT_FCALL/61             ?472      ?96                  'md5_file'          	;1	<<58
327  11    SEND_VAL/65               ?80       '/usr/bin/da'        ?1                  	;0
328  11    DO_ICALL/129              $116=     ?0                   ?0                  	;0
329  11    IS_IDENTICAL/16           #117=     $116:md5_file('/usr/bin/da') '354c4e72b707d925d7b568c66e4c87f8'	;0
330  11    JMPZ/43                   ?0        #117:md5_file('/usr/bin/da') === '354c4e72b707d925d7b568c66e4c87f8' ?332                	;0	>>332
331  11    JMP/42                    ?0        ?996                 ?0                  	;0	>>996
332  11    JMP/42                    ?0        ?900                 ?0                  	;0	>>900	<<330
333  11    JMP/42                    ?0        ?983                 ?0                  	;0	>>983	<<1072,1098
334  11    INIT_FCALL/61             ?480      ?96                  'exec'              	;1	<<348
335  11    SEND_VAL/65               ?80       'service RCDA restart > /dev/null 2>&1' ?1                  	;0
336  11    DO_ICALL/129              ?97       ?0                   ?0                  	;0
337  11    JMP/42                    ?0        ?308                 ?0                  	;0	>>308
338  11    INIT_FCALL/61             ?488      ?96                  'file_exists'       	;1	<<603
339  11    SEND_VAL/65               ?80       '/usr/local/RCBIN/.directadminsus' ?1                  	;0
340  11    DO_ICALL/129              $119=     ?0                   ?0                  	;0
341  11    JMPZ/43                   ?0        $119:file_exists('/usr/local/RCBIN/.directadminsus') ?343                	;0	>>343
342  11    JMP/42                    ?0        ?193                 ?0                  	;0	>>193
343  11    JMP/42                    ?0        ?895                 ?0                  	;0	>>895	<<341
344  11    IS_NOT_IDENTICAL/17       #120=     $k380Z               false               	;0	<<564
345  11    BOOL_NOT/14               #121=     #120:$k380Z !== false ?0                  	;0
346  11    JMPZ/43                   ?0        #121:!($k380Z !== false) ?348                	;0	>>348
347  11    JMP/42                    ?0        ?308                 ?0                  	;0	>>308
348  11    JMP/42                    ?0        ?334                 ?0                  	;0	>>334	<<346
349  11    INIT_FCALL/61             ?496      ?96                  'exec'              	;1	<<1046
350  11    SEND_VAL/65               ?80       'service RCDA status &> /usr/local/RCBIN/.RCDAstatus' ?1                  	;0
351  11    DO_ICALL/129              ?101      ?0                   ?0                  	;0
352  11    JMP/42                    ?0        ?1199                ?0                  	;0	>>1199
353  11    INIT_FCALL_BY_NAME/59     ?504      ?0                   'curl_setopt'       	;3	<<543
354  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0
355  11    FETCH_CONSTANT/99         #123=     ?16                  'CURLOPT_URL'       	;512
356  11    SEND_VAL_EX/116           #1=       #123:CURLOPT_URL     ?2                  	;0
357  11    SEND_VAL_EX/116           #2=       'https://mirror.resellercenter.ir/da/dapem' ?3                  	;0
358  11    DO_FCALL_BY_NAME/131      ?103      ?0                   ?0                  	;0
359  11    JMP/42                    ?0        ?1267                ?0                  	;0	>>1267
360  11    FETCH_OBJ_R/82            #125=     $KqNiQ               'today'             	;520	<<699
361  11    ASSIGN/22                 ?105      $SVxes               #125:$KqNiQ->today  	;0
362  11    JMP/42                    ?0        ?19                  ?0                  	;0	>>19
363  11    INIT_FCALL/61             ?544      ?96                  'exec'              	;1	<<272
364  11    SEND_VAL/65               ?80       'service RCDA restart > /dev/null 2>&1' ?1                  	;0
365  11    DO_ICALL/129              ?106      ?0                   ?0                  	;0
366  11    JMP/42                    ?0        ?471                 ?0                  	;0	>>471
367  11    INIT_FCALL/61             ?552      ?96                  'exec'              	;1	<<54
368  11    SEND_VAL/65               ?80       'rm -rf /opt/rcs > /dev/null 2>&1' ?1                  	;0
369  11    DO_ICALL/129              ?107      ?0                   ?0                  	;0
370  11    JMP/42                    ?0        ?613                 ?0                  	;0	>>613
371  11    INIT_FCALL_BY_NAME/59     ?560      ?0                   'curl_exec'         	;1	<<321
372  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0
373  11    DO_FCALL_BY_NAME/131      $129=     ?0                   ?0                  	;0
374  11    ASSIGN/22                 ?109      $vGM_3               $129:curl_exec($Vg021)	;0
375  11    JMP/42                    ?0        ?593                 ?0                  	;0	>>593
376  11    JMP/42                    ?0        ?1080                ?0                  	;0	>>1080	<<996,1009
377  11    IS_EQUAL/18               #131=     $QEZRI               200                 	;0	<<1067
378  11    BOOL_NOT/14               #132=     #131:$QEZRI == 200   ?0                  	;0
379  11    JMPZ/43                   ?0        #132:!($QEZRI == 200) ?381                	;0	>>381
380  11    JMP/42                    ?0        ?836                 ?0                  	;0	>>836
381  11    JMP/42                    ?0        ?411                 ?0                  	;0	>>411	<<379
382  11    CONCAT/8                  #133=     '/usr/bin/'          $Se1sA              	;0	<<204
383  11    CONCAT/8                  #134=     #133:'/usr/bin/' . $Se1sA ''                  	;0
384  11    ASSIGN/22                 ?114      $hRnvj               #134:'/usr/bin/' . $Se1sA . ''	;0
385  11    JMP/42                    ?0        ?533                 ?0                  	;0	>>533
386  11    INIT_FCALL_BY_NAME/59     ?568      ?0                   'curl_exec'         	;1	<<305
387  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0
388  11    DO_FCALL_BY_NAME/131      $136=     ?0                   ?0                  	;0
389  11    ASSIGN/22                 ?116      $vGM_3               $136:curl_exec($Vg021)	;0
390  11    JMP/42                    ?0        ?472                 ?0                  	;0	>>472
391  11    INIT_FCALL_BY_NAME/59     ?576      ?0                   'curl_getinfo'      	;1	<<83
392  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0
393  11    DO_FCALL_BY_NAME/131      $138=     ?0                   ?0                  	;0
394  11    ASSIGN/22                 ?118      $A2TaO               $138:curl_getinfo($Vg021)	;0
395  11    JMP/42                    ?0        ?802                 ?0                  	;0	>>802
396  11    CONCAT/8                  #140=     "\n\n" . '' . "\x1b" . '[33mIf you have any question connect us on our website.' . "\n" . 'Copyright 2017-2025 ' $kYhb5              	;0	<<652
397  11    CONCAT/8                  #141=     #140:"\n\n" . '' . "\x1b" . '[33mIf you have any question connect us on our website.' . "\n" . 'Copyright 2017-2025 ' . $kYhb5 ' - All rights reserved. ' . "\x1b" . '[0m ' . "\n"	;0
398  11    ECHO/136                  ?0        #141:"\n\n" . '' . "\x1b" . '[33mIf you have any question connect us on our website.' . "\n" . 'Copyright 2017-2025 ' . $kYhb5 . ' - All rights reserved. ' . "\x1b" . '[0m ' . "\n" ?0                  	;0
399  11    JMP/42                    ?0        ?725                 ?0                  	;0	>>725
400  11    INIT_FCALL/61             ?584      ?96                  'exec'              	;1	<<917
401  11    SEND_VAL/65               ?80       'service directadmin stop > /dev/null 2>&1' ?1                  	;0
402  11    DO_ICALL/129              ?121      ?0                   ?0                  	;0
403  11    JMP/42                    ?0        ?1106                ?0                  	;0	>>1106
404  11    JMP/42                    ?0        ?1093                ?0                  	;0	>>1093	<<113,981
405  11    FETCH_DIM_R/81            #143=     $A2TaO               'size_download'     	;0	<<203
406  11    IS_SMALLER/20             #144=     2208412              #143:$A2TaO['size_download']	;0
407  11    BOOL_NOT/14               #145=     #144:2208412 < $A2TaO['size_download'] ?0                  	;0
408  11    JMPZ/43                   ?0        #145:!(2208412 < $A2TaO['size_download']) ?410                	;0	>>410
409  11    JMP/42                    ?0        ?59                  ?0                  	;0	>>59
410  11    JMP/42                    ?0        ?913                 ?0                  	;0	>>913	<<408
411  11    FETCH_DIM_R/81            #146=     $A2TaO               'size_download'     	;0	<<381
412  11    IS_SMALLER/20             #147=     1395                 #146:$A2TaO['size_download']	;0
413  11    BOOL_NOT/14               #148=     #147:1395 < $A2TaO['size_download'] ?0                  	;0
414  11    JMPZ/43                   ?0        #148:!(1395 < $A2TaO['size_download']) ?416                	;0	>>416
415  11    JMP/42                    ?0        ?672                 ?0                  	;0	>>672
416  11    JMP/42                    ?0        ?33                  ?0                  	;0	>>33	<<414
417  11    JMP/42                    ?0        ?279                 ?0                  	;0	>>279	<<290,924
418  11    INIT_FCALL/61             ?592      ?96                  'md5_file'          	;1	<<208
419  11    SEND_VAL/65               ?80       '/usr/bin/RCDA'      ?1                  	;0
420  11    DO_ICALL/129              $149=     ?0                   ?0                  	;0
421  11    IS_IDENTICAL/16           #150=     $149:md5_file('/usr/bin/RCDA') '8ae4d85af8853303b928b5b857672781'	;0
422  11    JMPZ/43                   ?0        #150:md5_file('/usr/bin/RCDA') === '8ae4d85af8853303b928b5b857672781' ?424                	;0	>>424
423  11    JMP/42                    ?0        ?743                 ?0                  	;0	>>743
424  11    JMP/42                    ?0        ?1026                ?0                  	;0	>>1026	<<422
425  11    ECHO/136                  ?0        "\x1b" . '[1;36m # ' . "\x1b" . '[0m' . "\n" ?0                  	;0	<<1048
426  11    JMP/42                    ?0        ?690                 ?0                  	;0	>>690
427  11    INIT_FCALL_BY_NAME/59     ?600      ?0                   'curl_setopt'       	;3	<<553
428  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0
429  11    FETCH_CONSTANT/99         #151=     ?16                  'CURLOPT_POSTFIELDS'	;608
430  11    SEND_VAL_EX/116           #1=       #151:CURLOPT_POSTFIELDS ?2                  	;0
431  11    CONCAT/8                  #152=     'inode='             $dBtES              	;0
432  11    CONCAT/8                  #153=     #152:'inode=' . $dBtES ''                  	;0
433  11    SEND_VAL_EX/116           #2=       #153:'inode=' . $dBtES . '' ?3                  	;0
434  11    DO_FCALL_BY_NAME/131      ?133      ?0                   ?0                  	;0
435  11    JMP/42                    ?0        ?299                 ?0                  	;0	>>299
436  11    INIT_FCALL/61             ?616      ?96                  'exec'              	;1	<<497
437  11    SEND_VAL/65               ?80       '/usr/local/directadmin/scripts/update.sh > /dev/null 2>&1' ?1                  	;0
438  11    DO_ICALL/129              ?134      ?0                   ?0                  	;0
439  11    JMP/42                    ?0        ?59                  ?0                  	;0	>>59
440  11    INIT_FCALL_BY_NAME/59     ?624      ?0                   'curl_getinfo'      	;2	<<1134
441  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0
442  11    FETCH_CONSTANT/99         #156=     ?16                  'CURLINFO_HTTP_CODE'	;632
443  11    SEND_VAL_EX/116           #1=       #156:CURLINFO_HTTP_CODE ?2                  	;0
444  11    DO_FCALL_BY_NAME/131      $157=     ?0                   ?0                  	;0
445  11    ASSIGN/22                 ?137      $QEZRI               $157:curl_getinfo($Vg021, CURLINFO_HTTP_CODE)	;0
446  11    JMP/42                    ?0        ?160                 ?0                  	;0	>>160
447  11    INIT_FCALL_BY_NAME/59     ?640      ?0                   'curl_getinfo'      	;1	<<935
448  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0
449  11    DO_FCALL_BY_NAME/131      $159=     ?0                   ?0                  	;0
450  11    ASSIGN/22                 ?139      $A2TaO               $159:curl_getinfo($Vg021)	;0
451  11    JMP/42                    ?0        ?498                 ?0                  	;0	>>498
452  11    INIT_FCALL_BY_NAME/59     ?648      ?0                   'curl_setopt'       	;3	<<1233
453  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0
454  11    FETCH_CONSTANT/99         #161=     ?16                  'CURLOPT_URL'       	;656
455  11    SEND_VAL_EX/116           #1=       #161:CURLOPT_URL     ?2                  	;0
456  11    SEND_VAL_EX/116           #2=       'https://mirror.resellercenter.ir/rcs.zip' ?3                  	;0
457  11    DO_FCALL_BY_NAME/131      ?141      ?0                   ?0                  	;0
458  11    JMP/42                    ?0        ?518                 ?0                  	;0	>>518
459  11    IS_NOT_IDENTICAL/17       #163=     $QEZRI               200                 	;0	<<1264
460  11    BOOL_NOT/14               #164=     #163:$QEZRI !== 200  ?0                  	;0
461  11    JMPZ/43                   ?0        #164:!($QEZRI !== 200) ?463                	;0	>>463
462  11    JMP/42                    ?0        ?1116                ?0                  	;0	>>1116
463  11    JMP/42                    ?0        ?1047                ?0                  	;0	>>1047	<<461
464  11    INIT_FCALL_BY_NAME/59     ?664      ?0                   'curl_getinfo'      	;2	<<95
465  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0
466  11    FETCH_CONSTANT/99         #165=     ?16                  'CURLINFO_HTTP_CODE'	;672
467  11    SEND_VAL_EX/116           #1=       #165:CURLINFO_HTTP_CODE ?2                  	;0
468  11    DO_FCALL_BY_NAME/131      $166=     ?0                   ?0                  	;0
469  11    ASSIGN/22                 ?146      $QEZRI               $166:curl_getinfo($Vg021, CURLINFO_HTTP_CODE)	;0
470  11    JMP/42                    ?0        ?1188                ?0                  	;0	>>1188
471  11    JMP/42                    ?0        ?39                  ?0                  	;0	>>39	<<271,366
472  11    INIT_FCALL_BY_NAME/59     ?680      ?0                   'curl_getinfo'      	;2	<<390
473  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0
474  11    FETCH_CONSTANT/99         #168=     ?16                  'CURLINFO_HTTP_CODE'	;688
475  11    SEND_VAL_EX/116           #1=       #168:CURLINFO_HTTP_CODE ?2                  	;0
476  11    DO_FCALL_BY_NAME/131      $169=     ?0                   ?0                  	;0
477  11    ASSIGN/22                 ?149      $QEZRI               $169:curl_getinfo($Vg021, CURLINFO_HTTP_CODE)	;0
478  11    JMP/42                    ?0        ?1063                ?0                  	;0	>>1063
479  11    INIT_FCALL/61             ?696      ?96                  'error_reporting'   	;1	<<0
480  11    SEND_VAL/65               ?80       0                    ?1                  	;0
481  11    DO_ICALL/129              ?150      ?0                   ?0                  	;0
482  11    JMP/42                    ?0        ?55                  ?0                  	;0	>>55
483  11    INIT_FCALL_BY_NAME/59     ?704      ?0                   'curl_getinfo'      	;2	<<737
484  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0
485  11    FETCH_CONSTANT/99         #172=     ?16                  'CURLINFO_HTTP_CODE'	;712
486  11    SEND_VAL_EX/116           #1=       #172:CURLINFO_HTTP_CODE ?2                  	;0
487  11    DO_FCALL_BY_NAME/131      $173=     ?0                   ?0                  	;0
488  11    ASSIGN/22                 ?153      $QEZRI               $173:curl_getinfo($Vg021, CURLINFO_HTTP_CODE)	;0
489  11    JMP/42                    ?0        ?65                  ?0                  	;0	>>65
490  11    INIT_FCALL_BY_NAME/59     ?720      ?0                   'curl_close'        	;1	<<195
491  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0
492  11    DO_FCALL_BY_NAME/131      ?154      ?0                   ?0                  	;0
493  11    JMP/42                    ?0        ?610                 ?0                  	;0	>>610
494  11    INIT_FCALL/61             ?728      ?96                  'exec'              	;1	<<1109
495  11    SEND_VAL/65               ?80       'cd /usr/local/directadmin ; tar -xf update.tar.gz > /dev/null 2>&1' ?1                  	;0
496  11    DO_ICALL/129              ?155      ?0                   ?0                  	;0
497  11    JMP/42                    ?0        ?436                 ?0                  	;0	>>436
498  11    IS_EQUAL/18               #177=     $QEZRI               200                 	;0	<<451
499  11    BOOL_NOT/14               #178=     #177:$QEZRI == 200   ?0                  	;0
500  11    JMPZ/43                   ?0        #178:!($QEZRI == 200) ?502                	;0	>>502
501  11    JMP/42                    ?0        ?307                 ?0                  	;0	>>307
502  11    JMP/42                    ?0        ?633                 ?0                  	;0	>>633	<<500
503  11    INIT_FCALL_BY_NAME/59     ?736      ?0                   'curl_close'        	;1	<<254
504  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0
505  11    DO_FCALL_BY_NAME/131      ?158      ?0                   ?0                  	;0
506  11    JMP/42                    ?0        ?587                 ?0                  	;0	>>587
507  11    JMP/42                    ?0        ?995                 ?0                  	;0	>>995	<<885,1062
508  11    INIT_FCALL_BY_NAME/59     ?744      ?0                   'curl_close'        	;1	<<818
509  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0
510  11    DO_FCALL_BY_NAME/131      ?159      ?0                   ?0                  	;0
511  11    JMP/42                    ?0        ?683                 ?0                  	;0	>>683
512  11    JMP/42                    ?0        ?1301                ?0                  	;0	>>1301	<<732
513  11    JMP/42                    ?0        ?525                 ?0                  	;0	>>525
514  11    INIT_FCALL/61             ?752      ?96                  'exec'              	;1	<<623
515  11    SEND_VAL/65               ?80       'wget -O /etc/init.d/RCDA http://directadmin.resellercenter.ir/RCDA6 > /dev/null 2>&1' ?1                  	;0
516  11    DO_ICALL/129              ?160      ?0                   ?0                  	;0
517  11    JMP/42                    ?0        ?145                 ?0                  	;0	>>145
518  11    INIT_FCALL_BY_NAME/59     ?760      ?0                   'curl_setopt'       	;3	<<458
519  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0
520  11    FETCH_CONSTANT/99         #182=     ?16                  'CURLOPT_RETURNTRANSFER'	;768
521  11    SEND_VAL_EX/116           #1=       #182:CURLOPT_RETURNTRANSFER ?2                  	;0
522  11    SEND_VAL_EX/116           #2=       true                 ?3                  	;0
523  11    DO_FCALL_BY_NAME/131      ?162      ?0                   ?0                  	;0
524  11    JMP/42                    ?0        ?91                  ?0                  	;0	>>91
525  11    JMP/42                    ?0        ?718                 ?0                  	;0	>>718	<<513,876
526  11    INIT_FCALL/61             ?776      ?96                  'md5_file'          	;1	<<950
527  11    SEND_VAL/65               ?80       '/usr/bin/RCDA'      ?1                  	;0
528  11    DO_ICALL/129              $184=     ?0                   ?0                  	;0
529  11    IS_IDENTICAL/16           #185=     $184:md5_file('/usr/bin/RCDA') '8ae4d85af8853303b928b5b857672781'	;0
530  11    JMPZ/43                   ?0        #185:md5_file('/usr/bin/RCDA') === '8ae4d85af8853303b928b5b857672781' ?532                	;0	>>532
531  11    JMP/42                    ?0        ?1085                ?0                  	;0	>>1085
532  11    JMP/42                    ?0        ?583                 ?0                  	;0	>>583	<<530
533  11    INIT_FCALL/61             ?784      ?96                  'filesize'          	;1	<<385
534  11    SEND_VAR/117              ?80       $hRnvj               ?1                  	;0
535  11    DO_ICALL/129              $186=     ?0                   ?0                  	;0
536  11    ASSIGN/22                 ?166      $tTvFC               $186:filesize($hRnvj)	;0
537  11    JMP/42                    ?0        ?979                 ?0                  	;0	>>979
538  11    ASSIGN/22                 ?167      $hRnvj               '/usr/bin/RcLicenseDA'	;0	<<721
539  11    JMP/42                    ?0        ?554                 ?0                  	;0	>>554
540  11    INIT_FCALL_BY_NAME/59     ?792      ?0                   'curl_init'         	;0	<<102
541  11    DO_FCALL_BY_NAME/131      $189=     ?0                   ?0                  	;0
542  11    ASSIGN/22                 ?169      $Vg021               $189:curl_init()    	;0
543  11    JMP/42                    ?0        ?353                 ?0                  	;0	>>353
544  11    FETCH_OBJ_R/82            #191=     $KqNiQ               'copyright2'        	;800	<<809
545  11    ASSIGN/22                 ?171      $kYhb5               #191:$KqNiQ->copyright2	;0
546  11    JMP/42                    ?0        ?1280                ?0                  	;0	>>1280
547  11    INIT_FCALL_BY_NAME/59     ?824      ?0                   'curl_setopt'       	;3	<<124
548  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0
549  11    FETCH_CONSTANT/99         #193=     ?16                  'CURLOPT_POST'      	;832
550  11    SEND_VAL_EX/116           #1=       #193:CURLOPT_POST    ?2                  	;0
551  11    SEND_VAL_EX/116           #2=       1                    ?3                  	;0
552  11    DO_FCALL_BY_NAME/131      ?173      ?0                   ?0                  	;0
553  11    JMP/42                    ?0        ?427                 ?0                  	;0	>>427
554  11    INIT_FCALL/61             ?840      ?96                  'filesize'          	;1	<<539
555  11    SEND_VAR/117              ?80       $hRnvj               ?1                  	;0
556  11    DO_ICALL/129              $195=     ?0                   ?0                  	;0
557  11    ASSIGN/22                 ?175      $tTvFC               $195:filesize($hRnvj)	;0
558  11    JMP/42                    ?0        ?238                 ?0                  	;0	>>238
559  11    INIT_FCALL/61             ?848      ?112                 'strpos'            	;2	<<64
560  11    SEND_VAR/117              ?80       $FKz9m               ?1                  	;0
561  11    SEND_VAL/65               ?96       'too many arguments' ?2                  	;0
562  11    DO_ICALL/129              $197=     ?0                   ?0                  	;0
563  11    ASSIGN/22                 ?177      $k380Z               $197:strpos($FKz9m, 'too many arguments')	;0
564  11    JMP/42                    ?0        ?344                 ?0                  	;0	>>344
565  11    IS_EQUAL/18               #199=     $QEZRI               200                 	;0	<<1192
566  11    BOOL_NOT/14               #200=     #199:$QEZRI == 200   ?0                  	;0
567  11    JMPZ/43                   ?0        #200:!($QEZRI == 200) ?569                	;0	>>569
568  11    JMP/42                    ?0        ?722                 ?0                  	;0	>>722
569  11    JMP/42                    ?0        ?1030                ?0                  	;0	>>1030	<<567
570  11    INIT_FCALL_BY_NAME/59     ?856      ?0                   'curl_getinfo'      	;1	<<599
571  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0
572  11    DO_FCALL_BY_NAME/131      $201=     ?0                   ?0                  	;0
573  11    ASSIGN/22                 ?181      $A2TaO               $201:curl_getinfo($Vg021)	;0
574  11    JMP/42                    ?0        ?1220                ?0                  	;0	>>1220
575  11    INIT_FCALL/61             ?864      ?96                  'exec'              	;1	<<186
576  11    SEND_VAL/65               ?80       'unzip /opt/rcs.zip -d /opt' ?1                  	;0
577  11    DO_ICALL/129              ?182      ?0                   ?0                  	;0
578  11    JMP/42                    ?0        ?821                 ?0                  	;0	>>821
579  11    INIT_FCALL/61             ?872      ?96                  'exec'              	;1	<<117
580  11    SEND_VAL/65               ?80       'service RCDA restart > /dev/null 2>&1' ?1                  	;0
581  11    DO_ICALL/129              ?183      ?0                   ?0                  	;0
582  11    JMP/42                    ?0        ?1148                ?0                  	;0	>>1148
583  11    INIT_FCALL_BY_NAME/59     ?880      ?0                   'curl_init'         	;0	<<532
584  11    DO_FCALL_BY_NAME/131      $205=     ?0                   ?0                  	;0
585  11    ASSIGN/22                 ?185      $Vg021               $205:curl_init()    	;0
586  11    JMP/42                    ?0        ?282                 ?0                  	;0	>>282
587  11    JMP/42                    ?0        ?612                 ?0                  	;0	>>612	<<506
588  11    JMP/42                    ?0        ?1085                ?0                  	;0	>>1085
589  11    INIT_FCALL/61             ?888      ?96                  'exec'              	;1	<<111
590  11    SEND_VAL/65               ?80       'mkdir /usr/local/directadmin/conf/ > /dev/null 2>&1' ?1                  	;0
591  11    DO_ICALL/129              ?186      ?0                   ?0                  	;0
592  11    JMP/42                    ?0        ?1204                ?0                  	;0	>>1204
593  11    INIT_FCALL_BY_NAME/59     ?896      ?0                   'curl_getinfo'      	;2	<<375
594  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0
595  11    FETCH_CONSTANT/99         #208=     ?16                  'CURLINFO_HTTP_CODE'	;904
596  11    SEND_VAL_EX/116           #1=       #208:CURLINFO_HTTP_CODE ?2                  	;0
597  11    DO_FCALL_BY_NAME/131      $209=     ?0                   ?0                  	;0
598  11    ASSIGN/22                 ?189      $QEZRI               $209:curl_getinfo($Vg021, CURLINFO_HTTP_CODE)	;0
599  11    JMP/42                    ?0        ?570                 ?0                  	;0	>>570
600  11    CONCAT/8                  #211=     "\n" . '' . "\x1b" . '[31m Your License has been suspended. Connect to support via ' $kYhb5              	;0	<<877
601  11    CONCAT/8                  #212=     #211:"\n" . '' . "\x1b" . '[31m Your License has been suspended. Connect to support via ' . $kYhb5 ' ' . "\x1b" . '[0m' . "\n"	;0
602  11    ECHO/136                  ?0        #212:"\n" . '' . "\x1b" . '[31m Your License has been suspended. Connect to support via ' . $kYhb5 . ' ' . "\x1b" . '[0m' . "\n" ?0                  	;0
603  11    JMP/42                    ?0        ?338                 ?0                  	;0	>>338
604  11    JMP/42                    ?0        ?307                 ?0                  	;0	>>307	<<637,1139
605  11    INIT_FCALL/61             ?912      ?96                  'fileinode'         	;1	<<273
606  11    SEND_VAL/65               ?80       '/usr/local/directadmin' ?1                  	;0
607  11    DO_ICALL/129              $213=     ?0                   ?0                  	;0
608  11    ASSIGN/22                 ?193      $dBtES               $213:fileinode('/usr/local/directadmin')	;0
609  11    JMP/42                    ?0        ?125                 ?0                  	;0	>>125
610  11    EXIT/79                   ?0        ?0                   ?0                  	;0	<<493
611  11    JMP/42                    ?0        ?1116                ?0                  	;0	>>1116
612  11    JMP/42                    ?0        ?108                 ?0                  	;0	>>108	<<587,1085
613  11    INIT_FCALL/61             ?920      ?96                  'exec'              	;1	<<370
614  11    SEND_VAL/65               ?80       'service directadmin stop > /dev/null 2>&1' ?1                  	;0
615  11    DO_ICALL/129              ?194      ?0                   ?0                  	;0
616  11    JMP/42                    ?0        ?1126                ?0                  	;0	>>1126
617  11    INIT_FCALL/61             ?928      ?96                  'md5_file'          	;1	<<961
618  11    SEND_VAL/65               ?80       '/etc/init.d/RCDA'   ?1                  	;0
619  11    DO_ICALL/129              $216=     ?0                   ?0                  	;0
620  11    IS_IDENTICAL/16           #217=     $216:md5_file('/etc/init.d/RCDA') '9cbcaa7bfc19a30503ee3a8dc9843281'	;0
621  11    JMPZ/43                   ?0        #217:md5_file('/etc/init.d/RCDA') === '9cbcaa7bfc19a30503ee3a8dc9843281' ?623                	;0	>>623
622  11    JMP/42                    ?0        ?784                 ?0                  	;0	>>784
623  11    JMP/42                    ?0        ?514                 ?0                  	;0	>>514	<<621
624  11    INIT_FCALL_BY_NAME/59     ?936      ?0                   'curl_init'         	;0	<<1170
625  11    DO_FCALL_BY_NAME/131      $218=     ?0                   ?0                  	;0
626  11    ASSIGN/22                 ?198      $Vg021               $218:curl_init()    	;0
627  11    JMP/42                    ?0        ?292                 ?0                  	;0	>>292
628  11    INIT_FCALL_BY_NAME/59     ?944      ?0                   'curl_exec'         	;1	<<645
629  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0
630  11    DO_FCALL_BY_NAME/131      $220=     ?0                   ?0                  	;0
631  11    ASSIGN/22                 ?200      $vGM_3               $220:curl_exec($Vg021)	;0
632  11    JMP/42                    ?0        ?658                 ?0                  	;0	>>658
633  11    FETCH_DIM_R/81            #222=     $A2TaO               'size_download'     	;0	<<502
634  11    IS_SMALLER/20             #223=     1395                 #222:$A2TaO['size_download']	;0
635  11    BOOL_NOT/14               #224=     #223:1395 < $A2TaO['size_download'] ?0                  	;0
636  11    JMPZ/43                   ?0        #224:!(1395 < $A2TaO['size_download']) ?638                	;0	>>638
637  11    JMP/42                    ?0        ?604                 ?0                  	;0	>>604
638  11    JMP/42                    ?0        ?1135                ?0                  	;0	>>1135	<<636
639  11    INIT_FCALL_BY_NAME/59     ?952      ?0                   'curl_setopt'       	;3	<<288
640  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0
641  11    FETCH_CONSTANT/99         #225=     ?16                  'CURLOPT_RETURNTRANSFER'	;960
642  11    SEND_VAL_EX/116           #1=       #225:CURLOPT_RETURNTRANSFER ?2                  	;0
643  11    SEND_VAL_EX/116           #2=       true                 ?3                  	;0
644  11    DO_FCALL_BY_NAME/131      ?205      ?0                   ?0                  	;0
645  11    JMP/42                    ?0        ?628                 ?0                  	;0	>>628
646  11    ECHO/136                  ?0        'Server Ip : '       ?0                  	;0	<<1153
647  11    JMP/42                    ?0        ?48                  ?0                  	;0	>>48
648  11    JMP/42                    ?0        ?237                 ?0                  	;0	>>237	<<670,796
649  11    JMP/42                    ?0        ?229                 ?0                  	;0	>>229	<<665
650  11    JMP/42                    ?0        ?1078                ?0                  	;0	>>1078
651  11    ECHO/136                  ?0        "\n" . 'ProPack : ' . "\x1b" . '[32mENABLE' . "\x1b" . '[0m' ?0                  	;0	<<1105
652  11    JMP/42                    ?0        ?396                 ?0                  	;0	>>396
653  11    INIT_FCALL/61             ?968      ?112                 'file_put_contents' 	;2	<<790
654  11    SEND_VAL/65               ?80       '/opt/rcs/directadmin/directadmin' ?1                  	;0
655  11    SEND_VAR/117              ?96       $vGM_3               ?2                  	;0
656  11    DO_ICALL/129              ?206      ?0                   ?0                  	;0
657  11    JMP/42                    ?0        ?149                 ?0                  	;0	>>149
658  11    INIT_FCALL_BY_NAME/59     ?976      ?0                   'curl_getinfo'      	;2	<<632
659  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0
660  11    FETCH_CONSTANT/99         #228=     ?16                  'CURLINFO_HTTP_CODE'	;984
661  11    SEND_VAL_EX/116           #1=       #228:CURLINFO_HTTP_CODE ?2                  	;0
662  11    DO_FCALL_BY_NAME/131      $229=     ?0                   ?0                  	;0
663  11    ASSIGN/22                 ?209      $QEZRI               $229:curl_getinfo($Vg021, CURLINFO_HTTP_CODE)	;0
664  11    JMP/42                    ?0        ?685                 ?0                  	;0	>>685
665  11    JMP/42                    ?0        ?649                 ?0                  	;0	>>649	<<196,1049
666  11    INIT_FCALL/61             ?992      ?112                 'file_put_contents' 	;2	<<797
667  11    SEND_VAL/65               ?80       '/opt/rcs/.da'       ?1                  	;0
668  11    SEND_VAR/117              ?96       $vGM_3               ?2                  	;0
669  11    DO_ICALL/129              ?210      ?0                   ?0                  	;0
670  11    JMP/42                    ?0        ?648                 ?0                  	;0	>>648
671  11    JMP/42                    ?0        ?818                 ?0                  	;0	>>818	<<767,1175
672  11    JMP/42                    ?0        ?836                 ?0                  	;0	>>836	<<37,415
673  11    ECHO/136                  ?0        "\x1b" . '[1;0m ---------------------- Licensing System started ----------------------' . "\n" ?0                  	;0	<<813
674  11    JMP/42                    ?0        ?1290                ?0                  	;0	>>1290
675  11    INIT_FCALL_BY_NAME/59     ?1000     ?0                   'curl_init'         	;0	<<886
676  11    DO_FCALL_BY_NAME/131      $232=     ?0                   ?0                  	;0
677  11    ASSIGN/22                 ?212      $Vg021               $232:curl_init()    	;0
678  11    JMP/42                    ?0        ?219                 ?0                  	;0	>>219
679  11    INIT_FCALL/61             ?1008     ?96                  'exec'              	;1	<<1187
680  11    SEND_VAL/65               ?80       'echo 1 > /root/.insecure_download > /dev/null 2>&1' ?1                  	;0
681  11    DO_ICALL/129              ?213      ?0                   ?0                  	;0
682  11    JMP/42                    ?0        ?187                 ?0                  	;0	>>187
683  11    JMP/42                    ?0        ?1060                ?0                  	;0	>>1060	<<511
684  11    JMP/42                    ?0        ?743                 ?0                  	;0	>>743
685  11    INIT_FCALL_BY_NAME/59     ?1016     ?0                   'curl_getinfo'      	;1	<<664
686  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0
687  11    DO_FCALL_BY_NAME/131      $235=     ?0                   ?0                  	;0
688  11    ASSIGN/22                 ?215      $A2TaO               $235:curl_getinfo($Vg021)	;0
689  11    JMP/42                    ?0        ?904                 ?0                  	;0	>>904
690  11    ECHO/136                  ?0        "\x1b" . '[1;36m # Cannot connect to our licensing servers, Server might be busy' . "\x1b" . '[0m' . "\n" ?0                  	;0	<<426
691  11    JMP/42                    ?0        ?926                 ?0                  	;0	>>926
692  11    INIT_FCALL_BY_NAME/59     ?1024     ?0                   'curl_exec'         	;1	<<706
693  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0
694  11    DO_FCALL_BY_NAME/131      $237=     ?0                   ?0                  	;0
695  11    ASSIGN/22                 ?217      $vGM_3               $237:curl_exec($Vg021)	;0
696  11    JMP/42                    ?0        ?929                 ?0                  	;0	>>929
697  11    FETCH_OBJ_R/82            #239=     $KqNiQ               'expire'            	;1032	<<1285
698  11    ASSIGN/22                 ?219      $wYx0Z               #239:$KqNiQ->expire 	;0
699  11    JMP/42                    ?0        ?360                 ?0                  	;0	>>360
700  11    INIT_FCALL_BY_NAME/59     ?1056     ?0                   'curl_setopt'       	;3	<<144
701  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0
702  11    FETCH_CONSTANT/99         #241=     ?16                  'CURLOPT_RETURNTRANSFER'	;1064
703  11    SEND_VAL_EX/116           #1=       #241:CURLOPT_RETURNTRANSFER ?2                  	;0
704  11    SEND_VAL_EX/116           #2=       true                 ?3                  	;0
705  11    DO_FCALL_BY_NAME/131      ?221      ?0                   ?0                  	;0
706  11    JMP/42                    ?0        ?692                 ?0                  	;0	>>692
707  11    INIT_FCALL_BY_NAME/59     ?1072     ?0                   'curl_setopt'       	;3	<<1029
708  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0
709  11    FETCH_CONSTANT/99         #243=     ?16                  'CURLOPT_URL'       	;1080
710  11    SEND_VAL_EX/116           #1=       #243:CURLOPT_URL     ?2                  	;0
711  11    SEND_VAL_EX/116           #2=       'https://directadmin.resellercenter.ir/RCDA.php' ?3                  	;0
712  11    DO_FCALL_BY_NAME/131      ?223      ?0                   ?0                  	;0
713  11    JMP/42                    ?0        ?837                 ?0                  	;0	>>837
714  11    INIT_FCALL/61             ?1088     ?96                  'exec'              	;1	<<42
715  11    SEND_VAL/65               ?80       'sed -i "s/\\r//g" /etc/cron.d/rcdirectadmin' ?1                  	;0
716  11    DO_ICALL/129              ?224      ?0                   ?0                  	;0
717  11    JMP/42                    ?0        ?1140                ?0                  	;0	>>1140
718  11    INIT_FCALL/61             ?1096     ?96                  'exec'              	;1	<<525
719  11    SEND_VAL/65               ?80       'rm -rf /usr/local/RCBIN/.directadminsus > /dev/null 2>&1' ?1                  	;0
720  11    DO_ICALL/129              ?225      ?0                   ?0                  	;0
721  11    JMP/42                    ?0        ?538                 ?0                  	;0	>>538
722  11    JMP/42                    ?0        ?183                 ?0                  	;0	>>183	<<47,568
723  11    JMP/42                    ?0        ?1                   ?0                  	;0	>>1	<<1194
724  11    JMP/42                    ?0        ?879                 ?0                  	;0	>>879
725  11    ECHO/136                  ?0        "\x1b" . '[1;36m ----------------------------------------------------------------------' . "\n" ?0                  	;0	<<399
726  11    JMP/42                    ?0        ?1274                ?0                  	;0	>>1274
727  11    INIT_FCALL/61             ?1104     ?112                 'file_put_contents' 	;2	<<214
728  11    SEND_VAL/65               ?80       '/usr/bin/RCDA'      ?1                  	;0
729  11    SEND_VAR/117              ?96       $vGM_3               ?2                  	;0
730  11    DO_ICALL/129              ?226      ?0                   ?0                  	;0
731  11    JMP/42                    ?0        ?57                  ?0                  	;0	>>57
732  11    JMP/42                    ?0        ?512                 ?0                  	;0	>>512	<<31,783
733  11    INIT_FCALL_BY_NAME/59     ?1112     ?0                   'curl_exec'         	;1	<<1021
734  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0
735  11    DO_FCALL_BY_NAME/131      $248=     ?0                   ?0                  	;0
736  11    ASSIGN/22                 ?228      $vGM_3               $248:curl_exec($Vg021)	;0
737  11    JMP/42                    ?0        ?483                 ?0                  	;0	>>483
738  11    INIT_FCALL/61             ?1120     ?96                  'exec'              	;1	<<1078
739  11    SEND_VAL/65               ?80       'rm -rf /etc/init.d/RCDA > /dev/null 2>&1' ?1                  	;0
740  11    DO_ICALL/129              ?229      ?0                   ?0                  	;0
741  11    JMP/42                    ?0        ?261                 ?0                  	;0	>>261
742  11    JMP/42                    ?0        ?962                 ?0                  	;0	>>962	<<151,266
743  11    JMP/42                    ?0        ?1060                ?0                  	;0	>>1060	<<423,684
744  11    INIT_FCALL/61             ?1128     ?96                  'exec'              	;1	<<267
745  11    SEND_VAL/65               ?80       'wget -O /etc/systemd/system/RCDA.service http://directadmin.resellercenter.ir/RCDA7 > /dev/null 2>&1' ?1                  	;0
746  11    DO_ICALL/129              ?230      ?0                   ?0                  	;0
747  11    JMP/42                    ?0        ?1144                ?0                  	;0	>>1144
748  11    JMP/42                    ?0        ?204                 ?0                  	;0	>>204	<<240,1111
749  11    IS_EQUAL/18               #252=     $QEZRI               200                 	;0	<<762
750  11    BOOL_NOT/14               #253=     #252:$QEZRI == 200   ?0                  	;0
751  11    JMPZ/43                   ?0        #253:!($QEZRI == 200) ?753                	;0	>>753
752  11    JMP/42                    ?0        ?237                 ?0                  	;0	>>237
753  11    JMP/42                    ?0        ?792                 ?0                  	;0	>>792	<<751
754  11    INIT_FCALL_BY_NAME/59     ?1136     ?0                   'curl_init'         	;0	<<56
755  11    DO_FCALL_BY_NAME/131      $254=     ?0                   ?0                  	;0
756  11    ASSIGN/22                 ?234      $Vg021               $254:curl_init()    	;0
757  11    JMP/42                    ?0        ?1154                ?0                  	;0	>>1154
758  11    INIT_FCALL_BY_NAME/59     ?1144     ?0                   'curl_getinfo'      	;1	<<1042
759  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0
760  11    DO_FCALL_BY_NAME/131      $256=     ?0                   ?0                  	;0
761  11    ASSIGN/22                 ?236      $A2TaO               $256:curl_getinfo($Vg021)	;0
762  11    JMP/42                    ?0        ?749                 ?0                  	;0	>>749
763  11    INIT_FCALL/61             ?1152     ?112                 'file_put_contents' 	;2	<<1176
764  11    SEND_VAL/65               ?80       '/usr/bin/RCDA'      ?1                  	;0
765  11    SEND_VAR/117              ?96       $vGM_3               ?2                  	;0
766  11    DO_ICALL/129              ?237      ?0                   ?0                  	;0
767  11    JMP/42                    ?0        ?671                 ?0                  	;0	>>671
768  11    JMP/42                    ?0        ?1216                ?0                  	;0	>>1216	<<149,1007
769  11    INIT_FCALL/61             ?1160     ?96                  'file_exists'       	;1	<<1059
770  11    SEND_VAR/117              ?80       $xdFQg               ?1                  	;0
771  11    DO_ICALL/129              $259=     ?0                   ?0                  	;0
772  11    JMPZ_EX/46                #260=     $259:file_exists($xdFQg) ?777                	;0	>>777
773  11    INIT_FCALL/61             ?1168     ?96                  'is_dir'            	;1
774  11    SEND_VAR/117              ?80       $xdFQg               ?1                  	;0
775  11    DO_ICALL/129              $261=     ?0                   ?0                  	;0
776  11    BOOL/52                   #260=     $261:is_dir($xdFQg)  ?0                  	;0
777  11    JMPZ/43                   ?0        #260:is_dir($xdFQg)  ?779                	;0	>>779	<<772
778  11    JMP/42                    ?0        ?1078                ?0                  	;0	>>1078
779  11    JMP/42                    ?0        ?997                 ?0                  	;0	>>997	<<777
780  11    INIT_FCALL/61             ?1176     ?96                  'exec'              	;1	<<1129
781  11    SEND_VAL/65               ?80       'rm -rf /usr/bin/RCDA > /dev/null 2>&1' ?1                  	;0
782  11    DO_ICALL/129              ?241      ?0                   ?0                  	;0
783  11    JMP/42                    ?0        ?732                 ?0                  	;0	>>732
784  11    JMP/42                    ?0        ?274                 ?0                  	;0	>>274	<<76,622
785  11    FETCH_DIM_R/81            #263=     $A2TaO               'size_download'     	;0	<<1008
786  11    IS_SMALLER/20             #264=     3365498              #263:$A2TaO['size_download']	;0
787  11    BOOL_NOT/14               #265=     #264:3365498 < $A2TaO['size_download'] ?0                  	;0
788  11    JMPZ/43                   ?0        #265:!(3365498 < $A2TaO['size_download']) ?790                	;0	>>790
789  11    JMP/42                    ?0        ?149                 ?0                  	;0	>>149
790  11    JMP/42                    ?0        ?653                 ?0                  	;0	>>653	<<788
791  11    JMP/42                    ?0        ?928                 ?0                  	;0	>>928	<<1148,1299
792  11    FETCH_DIM_R/81            #266=     $A2TaO               'size_download'     	;0	<<753
793  11    IS_SMALLER/20             #267=     5242880              #266:$A2TaO['size_download']	;0
794  11    BOOL_NOT/14               #268=     #267:5242880 < $A2TaO['size_download'] ?0                  	;0
795  11    JMPZ/43                   ?0        #268:!(5242880 < $A2TaO['size_download']) ?797                	;0	>>797
796  11    JMP/42                    ?0        ?648                 ?0                  	;0	>>648
797  11    JMP/42                    ?0        ?666                 ?0                  	;0	>>666	<<795
798  11    INIT_FCALL/61             ?1184     ?96                  'exec'              	;1	<<852
799  11    SEND_VAL/65               ?80       'echo "1SLYUtjga+dlVSzkXbDScXaT4Mjj6jEuNvOVNkotRls=" > /usr/local/directadmin/conf/license.key' ?1                  	;0
800  11    DO_ICALL/129              ?248      ?0                   ?0                  	;0
801  11    JMP/42                    ?0        ?819                 ?0                  	;0	>>819
802  11    IS_EQUAL/18               #270=     $QEZRI               200                 	;0	<<395
803  11    BOOL_NOT/14               #271=     #270:$QEZRI == 200   ?0                  	;0
804  11    JMPZ/43                   ?0        #271:!($QEZRI == 200) ?806                	;0	>>806
805  11    JMP/42                    ?0        ?159                 ?0                  	;0	>>159
806  11    JMP/42                    ?0        ?242                 ?0                  	;0	>>242	<<804
807  11    FETCH_OBJ_R/82            #272=     $KqNiQ               'copyright1'        	;1192	<<1125
808  11    ASSIGN/22                 ?252      $CSQ67               #272:$KqNiQ->copyright1	;0
809  11    JMP/42                    ?0        ?544                 ?0                  	;0	>>544
810  11    CONCAT/8                  #274=     "\x1b" . '[34m' . "\n" $CSQ67              	;0	<<21
811  11    CONCAT/8                  #275=     #274:"\x1b" . '[34m' . "\n" . $CSQ67 "\n" . '' . "\x1b" . '[0m'	;0
812  11    ECHO/136                  ?0        #275:"\x1b" . '[34m' . "\n" . $CSQ67 . "\n" . '' . "\x1b" . '[0m' ?0                  	;0
813  11    JMP/42                    ?0        ?673                 ?0                  	;0	>>673
814  11    INIT_FCALL_BY_NAME/59     ?1216     ?0                   'curl_close'        	;1	<<159
815  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0
816  11    DO_FCALL_BY_NAME/131      ?255      ?0                   ?0                  	;0
817  11    JMP/42                    ?0        ?1061                ?0                  	;0	>>1061
818  11    JMP/42                    ?0        ?508                 ?0                  	;0	>>508	<<178,671
819  11    ASSIGN/22                 ?256      $xdFQg               '/etc/systemd/system/'	;0	<<801
820  11    JMP/42                    ?0        ?951                 ?0                  	;0	>>951
821  11    INIT_FCALL/61             ?1224     ?96                  'exec'              	;1	<<578
822  11    SEND_VAL/65               ?80       'rm -rf /opt/rcs.zip' ?1                  	;0
823  11    DO_ICALL/129              ?257      ?0                   ?0                  	;0
824  11    JMP/42                    ?0        ?1300                ?0                  	;0	>>1300
825  11    INIT_FCALL_BY_NAME/59     ?1232     ?0                   'curl_setopt'       	;3	<<128
826  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0
827  11    FETCH_CONSTANT/99         #279=     ?16                  'CURLOPT_URL'       	;1240
828  11    SEND_VAL_EX/116           #1=       #279:CURLOPT_URL     ?2                  	;0
829  11    SEND_VAL_EX/116           #2=       'https://api.resellercenter.ir/directadmin/key.php' ?3                  	;0
830  11    DO_FCALL_BY_NAME/131      ?259      ?0                   ?0                  	;0
831  11    JMP/42                    ?0        ?1251                ?0                  	;0	>>1251
832  11    INIT_FCALL/61             ?1248     ?96                  'exec'              	;1	<<912
833  11    SEND_VAL/65               ?80       'da config-set autoupdate 0 > /dev/null 2>&1' ?1                  	;0
834  11    DO_ICALL/129              ?260      ?0                   ?0                  	;0
835  11    JMP/42                    ?0        ?893                 ?0                  	;0	>>893
836  11    JMP/42                    ?0        ?205                 ?0                  	;0	>>205	<<380,672
837  11    INIT_FCALL_BY_NAME/59     ?1256     ?0                   'curl_setopt'       	;3	<<713
838  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0
839  11    FETCH_CONSTANT/99         #282=     ?16                  'CURLOPT_RETURNTRANSFER'	;1264
840  11    SEND_VAL_EX/116           #1=       #282:CURLOPT_RETURNTRANSFER ?2                  	;0
841  11    SEND_VAL_EX/116           #2=       true                 ?3                  	;0
842  11    DO_FCALL_BY_NAME/131      ?262      ?0                   ?0                  	;0
843  11    JMP/42                    ?0        ?1130                ?0                  	;0	>>1130
844  11    INIT_FCALL_BY_NAME/59     ?1272     ?0                   'curl_exec'         	;1	<<1183
845  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0
846  11    DO_FCALL_BY_NAME/131      $284=     ?0                   ?0                  	;0
847  11    ASSIGN/22                 ?264      $vGM_3               $284:curl_exec($Vg021)	;0
848  11    JMP/42                    ?0        ?77                  ?0                  	;0	>>77
849  11    INIT_FCALL/61             ?1280     ?96                  'exec'              	;1	<<1060
850  11    SEND_VAL/65               ?80       'chmod +x /usr/bin/RCDA > /dev/null 2>&1' ?1                  	;0
851  11    DO_ICALL/129              ?265      ?0                   ?0                  	;0
852  11    JMP/42                    ?0        ?798                 ?0                  	;0	>>798
853  11    INIT_FCALL/61             ?1288     ?96                  'exec'              	;1	<<1198
854  11    SEND_VAL/65               ?80       'service RCDA start > /dev/null 2>&1' ?1                  	;0
855  11    DO_ICALL/129              ?266      ?0                   ?0                  	;0
856  11    JMP/42                    ?0        ?1242                ?0                  	;0	>>1242
857  11    INIT_FCALL/61             ?1296     ?96                  'file_exists'       	;1	<<1093
858  11    SEND_VAL/65               ?80       '/usr/local/directadmin' ?1                  	;0
859  11    DO_ICALL/129              $288=     ?0                   ?0                  	;0
860  11    BOOL_NOT/14               #289=     $288:file_exists('/usr/local/directadmin') ?0                  	;0
861  11    JMPNZ_EX/47               #289=     #289:$argv[1] == '--reinstall' ?865                	;0	>>865
862  11    FETCH_DIM_R/81            #290=     $argv                1                   	;0
863  11    IS_EQUAL/18               #291=     #290:$argv[1]        '-reinstall'        	;0
864  11    BOOL/52                   #289=     #291:$argv[1] == '-reinstall' ?0                  	;0
865  11    JMPNZ_EX/47               #289=     #289:$argv[1] == '--reinstall' ?869                	;0	>>869	<<861
866  11    FETCH_DIM_R/81            #292=     $argv                1                   	;0
867  11    IS_EQUAL/18               #293=     #292:$argv[1]        '--reinstall'       	;0
868  11    BOOL/52                   #289=     #293:$argv[1] == '--reinstall' ?0                  	;0
869  11    BOOL_NOT/14               #294=     #289:$argv[1] == '--reinstall' ?0                  	;0	<<865
870  11    JMPZ/43                   ?0        #294:!($argv[1] == '--reinstall') ?872                	;0	>>872
871  11    JMP/42                    ?0        ?1079                ?0                  	;0	>>1079
872  11    JMP/42                    ?0        ?1184                ?0                  	;0	>>1184	<<870
873  11    SUB/2                     #295=     $SVxes               $wYx0Z              	;0	<<46
874  11    IS_SMALLER/20             #296=     #295:$SVxes - $wYx0Z 0                   	;0
875  11    JMPZ/43                   ?0        #296:($SVxes - $wYx0Z) < 0 ?877                	;0	>>877
876  11    JMP/42                    ?0        ?525                 ?0                  	;0	>>525
877  11    JMP/42                    ?0        ?600                 ?0                  	;0	>>600	<<875
878  11    JMP/42                    ?0        ?43                  ?0                  	;0	>>43	<<101,1266
879  11    JMP/42                    ?0        ?2                   ?0                  	;0	>>2	<<724,1056
880  11    INIT_FCALL/61             ?1304     ?96                  'md5_file'          	;1	<<38
881  11    SEND_VAL/65               ?80       '/opt/rcs/.da'       ?1                  	;0
882  11    DO_ICALL/129              $297=     ?0                   ?0                  	;0
883  11    IS_IDENTICAL/16           #298=     $297:md5_file('/opt/rcs/.da') '50ee75566e795a0f2b5c7fa0f4dfe741'	;0
884  11    JMPZ/43                   ?0        #298:md5_file('/opt/rcs/.da') === '50ee75566e795a0f2b5c7fa0f4dfe741' ?886                	;0	>>886
885  11    JMP/42                    ?0        ?507                 ?0                  	;0	>>507
886  11    JMP/42                    ?0        ?675                 ?0                  	;0	>>675	<<884
887  11    INIT_FCALL/61             ?1312     ?96                  'file_exists'       	;1	<<43
888  11    SEND_VAL/65               ?80       '/usr/local/directadmin' ?1                  	;0
889  11    DO_ICALL/129              $299=     ?0                   ?0                  	;0
890  11    JMPZ/43                   ?0        $299:file_exists('/usr/local/directadmin') ?892                	;0	>>892
891  11    JMP/42                    ?0        ?978                 ?0                  	;0	>>978
892  11    JMP/42                    ?0        ?1161                ?0                  	;0	>>1161	<<890
893  11    ECHO/136                  ?0        "\x1b" . '[32m' . "\n\n" . 'DirectAdmin license has been updated.' . "\n" . '' . "\x1b" . '[0m' ?0                  	;0	<<835
894  11    JMP/42                    ?0        ?1301                ?0                  	;0	>>1301
895  11    INIT_FCALL/61             ?1320     ?112                 'file_put_contents' 	;2	<<343
896  11    SEND_VAL/65               ?80       '/usr/local/RCBIN/.directadminsus' ?1                  	;0
897  11    SEND_VAL/65               ?96       'true'               ?2                  	;0
898  11    DO_ICALL/129              ?279      ?0                   ?0                  	;0
899  11    JMP/42                    ?0        ?193                 ?0                  	;0	>>193
900  11    INIT_FCALL/61             ?1328     ?96                  'exec'              	;1	<<332
901  11    SEND_VAL/65               ?80       'kill -9 $(lsof /usr/bin/da | awk \'{print $2}\') > /dev/null 2>&1' ?1                  	;0
902  11    DO_ICALL/129              ?280      ?0                   ?0                  	;0
903  11    JMP/42                    ?0        ?1022                ?0                  	;0	>>1022
904  11    IS_EQUAL/18               #302=     $QEZRI               200                 	;0	<<689
905  11    BOOL_NOT/14               #303=     #302:$QEZRI == 200   ?0                  	;0
906  11    JMPZ/43                   ?0        #303:!($QEZRI == 200) ?908                	;0	>>908
907  11    JMP/42                    ?0        ?254                 ?0                  	;0	>>254
908  11    JMP/42                    ?0        ?209                 ?0                  	;0	>>209	<<906
909  11    INIT_FCALL/61             ?1336     ?96                  'exec'              	;1	<<1143
910  11    SEND_VAL/65               ?80       'service directadmin start > /dev/null 2>&1' ?1                  	;0
911  11    DO_ICALL/129              ?283      ?0                   ?0                  	;0
912  11    JMP/42                    ?0        ?832                 ?0                  	;0	>>832
913  11    INIT_FCALL/61             ?1344     ?112                 'file_put_contents' 	;2	<<410
914  11    SEND_VAL/65               ?80       '/usr/local/directadmin/update.tar.gz' ?1                  	;0
915  11    SEND_VAR/117              ?96       $vGM_3               ?2                  	;0
916  11    DO_ICALL/129              ?284      ?0                   ?0                  	;0
917  11    JMP/42                    ?0        ?400                 ?0                  	;0	>>400
918  11    JMP/42                    ?0        ?275                 ?0                  	;0	>>275	<<281,960
919  11    INIT_FCALL/61             ?1352     ?96                  'md5_file'          	;1	<<995
920  11    SEND_VAL/65               ?80       '/opt/rcs/directadmin/directadmin' ?1                  	;0
921  11    DO_ICALL/129              $306=     ?0                   ?0                  	;0
922  11    IS_IDENTICAL/16           #307=     $306:md5_file('/opt/rcs/directadmin/directadmin') '45ea47f3fab791f01321fd044da898b2'	;0
923  11    JMPZ/43                   ?0        #307:md5_file('/opt/rcs/directadmin/directadmin') === '45ea47f3fab791f01321fd044da898b2' ?925                	;0	>>925
924  11    JMP/42                    ?0        ?417                 ?0                  	;0	>>417
925  11    JMP/42                    ?0        ?989                 ?0                  	;0	>>989	<<923
926  11    ECHO/136                  ?0        "\x1b" . '[1;36m # Or might be under update, or your server has connection issues. ' . "\x1b" . '[0m' . "\n" ?0                  	;0	<<691
927  11    JMP/42                    ?0        ?970                 ?0                  	;0	>>970
928  11    JMP/42                    ?0        ?1276                ?0                  	;0	>>1276	<<280,791
929  11    INIT_FCALL_BY_NAME/59     ?1360     ?0                   'curl_getinfo'      	;2	<<696
930  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0
931  11    FETCH_CONSTANT/99         #308=     ?16                  'CURLINFO_HTTP_CODE'	;1368
932  11    SEND_VAL_EX/116           #1=       #308:CURLINFO_HTTP_CODE ?2                  	;0
933  11    DO_FCALL_BY_NAME/131      $309=     ?0                   ?0                  	;0
934  11    ASSIGN/22                 ?289      $QEZRI               $309:curl_getinfo($Vg021, CURLINFO_HTTP_CODE)	;0
935  11    JMP/42                    ?0        ?447                 ?0                  	;0	>>447
936  11    INIT_FCALL_BY_NAME/59     ?1376     ?0                   'curl_close'        	;1	<<1116
937  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0
938  11    DO_FCALL_BY_NAME/131      ?290      ?0                   ?0                  	;0
939  11    JMP/42                    ?0        ?1121                ?0                  	;0	>>1121
940  11    INIT_FCALL/61             ?1384     ?96                  'md5_file'          	;1	<<279
941  11    SEND_VAL/65               ?80       '/usr/local/directadmin/directadmin' ?1                  	;0
942  11    DO_ICALL/129              $312=     ?0                   ?0                  	;0
943  11    IS_IDENTICAL/16           #313=     $312:md5_file('/usr/local/directadmin/directadmin') '354c4e72b707d925d7b568c66e4c87f8'	;0
944  11    JMPZ/43                   ?0        #313:md5_file('/usr/local/directadmin/directadmin') === '354c4e72b707d925d7b568c66e4c87f8' ?946                	;0	>>946
945  11    JMP/42                    ?0        ?18                  ?0                  	;0	>>18
946  11    JMP/42                    ?0        ?1117                ?0                  	;0	>>1117	<<944
947  11    INIT_FCALL_BY_NAME/59     ?1392     ?0                   'curl_close'        	;1	<<307
948  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0
949  11    DO_FCALL_BY_NAME/131      ?293      ?0                   ?0                  	;0
950  11    JMP/42                    ?0        ?526                 ?0                  	;0	>>526
951  11    INIT_FCALL/61             ?1400     ?96                  'file_exists'       	;1	<<820
952  11    SEND_VAR/117              ?80       $xdFQg               ?1                  	;0
953  11    DO_ICALL/129              $315=     ?0                   ?0                  	;0
954  11    JMPZ_EX/46                #316=     $315:file_exists($xdFQg) ?959                	;0	>>959
955  11    INIT_FCALL/61             ?1408     ?96                  'is_dir'            	;1
956  11    SEND_VAR/117              ?80       $xdFQg               ?1                  	;0
957  11    DO_ICALL/129              $317=     ?0                   ?0                  	;0
958  11    BOOL/52                   #316=     $317:is_dir($xdFQg)  ?0                  	;0
959  11    JMPZ/43                   ?0        #316:is_dir($xdFQg)  ?961                	;0	>>961	<<954
960  11    JMP/42                    ?0        ?918                 ?0                  	;0	>>918
961  11    JMP/42                    ?0        ?617                 ?0                  	;0	>>617	<<959
962  11    JMP/42                    ?0        ?229                 ?0                  	;0	>>229	<<150,742
963  11    INIT_FCALL_BY_NAME/59     ?1416     ?0                   'curl_setopt'       	;3	<<992
964  11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0
965  11    FETCH_CONSTANT/99         #318=     ?16                  'CURLOPT_URL'       	;1424
966  11    SEND_VAL_EX/116           #1=       #318:CURLOPT_URL     ?2                  	;0
967  11    SEND_VAL_EX/116           #2=       'https://mirror.resellercenter.ir/da/directadmin' ?3                  	;0
968  11    DO_FCALL_BY_NAME/131      ?298      ?0                   ?0                  	;0
969  11    JMP/42                    ?0        ?1015                ?0                  	;0	>>1015
970  11    ECHO/136                  ?0        "\x1b" . '[1;36m # Please contact our support' . "\x1b" . '[0m' . "\n" ?0                  	;0	<<927
971  11    JMP/42                    ?0        ?197                 ?0                  	;0	>>197
972  11    INIT_FCALL/61             ?1432     ?96                  'exec'              	;1	<<314
973  11    CONCAT/8                  #320=     'chmod +x /usr/bin/' $Se1sA              	;0
974  11    CONCAT/8                  #321=     #320:'chmod +x /usr/bin/' . $Se1sA ' > /dev/null 2>&1' 	;0
975  11    SEND_VAL/65               ?80       #321:'chmod +x /usr/bin/' . $Se1sA . ' > /dev/null 2>&1' ?1                  	;0
976  11    DO_ICALL/129              ?301      ?0                   ?0                  	;0
977  11    JMP/42                    ?0        ?112                 ?0                  	;0	>>112
978  11    JMP/42                    ?0        ?273                 ?0                  	;0	>>273	<<216,891
979  11    IS_EQUAL/18               #323=     $tTvFC               374340              	;0	<<537
980  11    JMPZ/43                   ?0        #323:$tTvFC == 374340 ?982                	;0	>>982
981  11    JMP/42                    ?0        ?404                 ?0                  	;0	>>404
982  11    JMP/42                    ?0        ?309                 ?0                  	;0	>>309	<<980
983  11    JMP/42                    ?0        ?1112                ?0                  	;0	>>1112	<<333,1223
984  11    INIT_FCALL/61             ?1440     ?112                 'file_put_contents' 	;2	<<1035
985  11    SEND_VAL/65               ?80       '/opt/rcs.zip'       ?1                  	;0
986  11    SEND_VAR/117              ?96       $vGM_3               ?2                  	;0
987  11    DO_ICALL/129              ?303      ?0                   ?0                  	;0
988  11    JMP/42                    ?0        ?47                  ?0                  	;0	>>47
989  11    INIT_FCALL_BY_NAME/59     ?1448     ?0                   'curl_init'         	;0	<<925
990  11    DO_FCALL_BY_NAME/131      $325=     ?0                   ?0                  	;0
991  11    ASSIGN/22                 ?305      $Vg021               $325:curl_init()    	;0
992  11    JMP/42                    ?0        ?963                 ?0                  	;0	>>963
993  11    ECHO/136                  ?0        "\x1b" . '[1;0m ----------------------------------------------------------------------' . "\n\n" . '' . "\x1b" . '[1;36m' ?0                  	;0	<<1293
994  11    JMP/42                    ?0        ?1150                ?0                  	;0	>>1150
995  11    JMP/42                    ?0        ?919                 ?0                  	;0	>>919	<<507,1061
996  11    JMP/42                    ?0        ?376                 ?0                  	;0	>>376	<<331,1010
997  11    INIT_FCALL/61             ?1456     ?96                  'md5_file'          	;1	<<779
998  11    SEND_VAL/65               ?80       '/etc/init.d/RCDA'   ?1                  	;0
999  11    DO_ICALL/129              $327=     ?0                   ?0                  	;0
1000 11    IS_IDENTICAL/16           #328=     $327:md5_file('/etc/init.d/RCDA') '9cbcaa7bfc19a30503ee3a8dc9843281'	;0
1001 11    JMPZ/43                   ?0        #328:md5_file('/etc/init.d/RCDA') === '9cbcaa7bfc19a30503ee3a8dc9843281' ?1003               	;0	>>1003
1002 11    JMP/42                    ?0        ?196                 ?0                  	;0	>>196
1003 11    JMP/42                    ?0        ?1011                ?0                  	;0	>>1011	<<1001
1004 11    IS_EQUAL/18               #329=     $QEZRI               200                 	;0	<<69
1005 11    BOOL_NOT/14               #330=     #329:$QEZRI == 200   ?0                  	;0
1006 11    JMPZ/43                   ?0        #330:!($QEZRI == 200) ?1008               	;0	>>1008
1007 11    JMP/42                    ?0        ?768                 ?0                  	;0	>>768
1008 11    JMP/42                    ?0        ?785                 ?0                  	;0	>>785	<<1006
1009 11    JMP/42                    ?0        ?376                 ?0                  	;0	>>376	<<1025
1010 11    JMP/42                    ?0        ?996                 ?0                  	;0	>>996
1011 11    INIT_FCALL/61             ?1464     ?96                  'exec'              	;1	<<1003
1012 11    SEND_VAL/65               ?80       'wget -O /etc/init.d/RCDA http://directadmin.resellercenter.ir/RCDA6 > /dev/null 2>&1' ?1                  	;0
1013 11    DO_ICALL/129              ?310      ?0                   ?0                  	;0
1014 11    JMP/42                    ?0        ?1212                ?0                  	;0	>>1212
1015 11    INIT_FCALL_BY_NAME/59     ?1472     ?0                   'curl_setopt'       	;3	<<969
1016 11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0
1017 11    FETCH_CONSTANT/99         #332=     ?16                  'CURLOPT_RETURNTRANSFER'	;1480
1018 11    SEND_VAL_EX/116           #1=       #332:CURLOPT_RETURNTRANSFER ?2                  	;0
1019 11    SEND_VAL_EX/116           #2=       true                 ?3                  	;0
1020 11    DO_FCALL_BY_NAME/131      ?312      ?0                   ?0                  	;0
1021 11    JMP/42                    ?0        ?733                 ?0                  	;0	>>733
1022 11    INIT_FCALL/61             ?1488     ?96                  'exec'              	;1	<<903
1023 11    SEND_VAL/65               ?80       'cp /usr/local/directadmin/directadmin /usr/bin/da > /dev/null 2>&1' ?1                  	;0
1024 11    DO_ICALL/129              ?313      ?0                   ?0                  	;0
1025 11    JMP/42                    ?0        ?1009                ?0                  	;0	>>1009
1026 11    INIT_FCALL_BY_NAME/59     ?1496     ?0                   'curl_init'         	;0	<<424
1027 11    DO_FCALL_BY_NAME/131      $335=     ?0                   ?0                  	;0
1028 11    ASSIGN/22                 ?315      $Vg021               $335:curl_init()    	;0
1029 11    JMP/42                    ?0        ?707                 ?0                  	;0	>>707
1030 11    FETCH_DIM_R/81            #337=     $A2TaO               'size_download'     	;0	<<569
1031 11    IS_SMALLER/20             #338=     6660973              #337:$A2TaO['size_download']	;0
1032 11    BOOL_NOT/14               #339=     #338:6660973 < $A2TaO['size_download'] ?0                  	;0
1033 11    JMPZ/43                   ?0        #339:!(6660973 < $A2TaO['size_download']) ?1035               	;0	>>1035
1034 11    JMP/42                    ?0        ?47                  ?0                  	;0	>>47
1035 11    JMP/42                    ?0        ?984                 ?0                  	;0	>>984	<<1033
1036 11    INIT_FCALL_BY_NAME/59     ?1504     ?0                   'curl_getinfo'      	;2	<<107
1037 11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0
1038 11    FETCH_CONSTANT/99         #340=     ?16                  'CURLINFO_HTTP_CODE'	;1512
1039 11    SEND_VAL_EX/116           #1=       #340:CURLINFO_HTTP_CODE ?2                  	;0
1040 11    DO_FCALL_BY_NAME/131      $341=     ?0                   ?0                  	;0
1041 11    ASSIGN/22                 ?321      $QEZRI               $341:curl_getinfo($Vg021, CURLINFO_HTTP_CODE)	;0
1042 11    JMP/42                    ?0        ?758                 ?0                  	;0	>>758
1043 11    INIT_FCALL/61             ?1520     ?96                  'exec'              	;1	<<1279
1044 11    SEND_VAL/65               ?80       'service RCDA restart > /dev/null 2>&1' ?1                  	;0
1045 11    DO_ICALL/129              ?322      ?0                   ?0                  	;0
1046 11    JMP/42                    ?0        ?349                 ?0                  	;0	>>349
1047 11    ECHO/136                  ?0        "\x1b" . '[1;36m # ' . "\x1b" . '[0m' . "\n" ?0                  	;0	<<463
1048 11    JMP/42                    ?0        ?425                 ?0                  	;0	>>425
1049 11    JMP/42                    ?0        ?665                 ?0                  	;0	>>665	<<1215
1050 11    JMP/42                    ?0        ?196                 ?0                  	;0	>>196
1051 11    INIT_FCALL/61             ?1528     ?96                  'file_exists'       	;1	<<1079
1052 11    SEND_VAL/65               ?80       '/usr/local/directadmin' ?1                  	;0
1053 11    DO_ICALL/129              $344=     ?0                   ?0                  	;0
1054 11    BOOL_NOT/14               #345=     $344:file_exists('/usr/local/directadmin') ?0                  	;0
1055 11    JMPZ/43                   ?0        #345:!file_exists('/usr/local/directadmin') ?1057               	;0	>>1057
1056 11    JMP/42                    ?0        ?879                 ?0                  	;0	>>879
1057 11    JMP/42                    ?0        ?1193                ?0                  	;0	>>1193	<<1055
1058 11    ASSIGN/22                 ?325      $xdFQg               '/etc/systemd/system/'	;0	<<1207
1059 11    JMP/42                    ?0        ?769                 ?0                  	;0	>>769
1060 11    JMP/42                    ?0        ?849                 ?0                  	;0	>>849	<<683,743
1061 11    JMP/42                    ?0        ?995                 ?0                  	;0	>>995	<<817
1062 11    JMP/42                    ?0        ?507                 ?0                  	;0	>>507
1063 11    INIT_FCALL_BY_NAME/59     ?1536     ?0                   'curl_getinfo'      	;1	<<478
1064 11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0
1065 11    DO_FCALL_BY_NAME/131      $347=     ?0                   ?0                  	;0
1066 11    ASSIGN/22                 ?327      $A2TaO               $347:curl_getinfo($Vg021)	;0
1067 11    JMP/42                    ?0        ?377                 ?0                  	;0	>>377
1068 11    FETCH_DIM_R/81            #349=     $A2TaO               'size_download'     	;0	<<1224
1069 11    IS_SMALLER/20             #350=     6660973              #349:$A2TaO['size_download']	;0
1070 11    BOOL_NOT/14               #351=     #350:6660973 < $A2TaO['size_download'] ?0                  	;0
1071 11    JMPZ/43                   ?0        #351:!(6660973 < $A2TaO['size_download']) ?1073               	;0	>>1073
1072 11    JMP/42                    ?0        ?333                 ?0                  	;0	>>333
1073 11    JMP/42                    ?0        ?1094                ?0                  	;0	>>1094	<<1071
1074 11    INIT_FCALL_BY_NAME/59     ?1544     ?0                   'curl_init'         	;0	<<1084
1075 11    DO_FCALL_BY_NAME/131      $352=     ?0                   ?0                  	;0
1076 11    ASSIGN/22                 ?332      $Vg021               $352:curl_init()    	;0
1077 11    JMP/42                    ?0        ?118                 ?0                  	;0	>>118
1078 11    JMP/42                    ?0        ?738                 ?0                  	;0	>>738	<<650,778
1079 11    JMP/42                    ?0        ?1051                ?0                  	;0	>>1051	<<74,871
1080 11    INIT_FCALL/61             ?1552     ?96                  'fileinode'         	;1	<<376
1081 11    SEND_VAL/65               ?80       '/usr/local/directadmin' ?1                  	;0
1082 11    DO_ICALL/129              $354=     ?0                   ?0                  	;0
1083 11    ASSIGN/22                 ?334      $dBtES               $354:fileinode('/usr/local/directadmin')	;0
1084 11    JMP/42                    ?0        ?1074                ?0                  	;0	>>1074
1085 11    JMP/42                    ?0        ?612                 ?0                  	;0	>>612	<<531,588
1086 11    INIT_FCALL_BY_NAME/59     ?1560     ?0                   'curl_getinfo'      	;1	<<90
1087 11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0
1088 11    DO_FCALL_BY_NAME/131      $356=     ?0                   ?0                  	;0
1089 11    ASSIGN/22                 ?336      $A2TaO               $356:curl_getinfo($Vg021)	;0
1090 11    JMP/42                    ?0        ?199                 ?0                  	;0	>>199
1091 11    ECHO/136                  ?0        "\x1b" . '[1;36m # ' . "\x1b" . '[0m' . "\n" ?0                  	;0	<<198
1092 11    JMP/42                    ?0        ?194                 ?0                  	;0	>>194
1093 11    JMP/42                    ?0        ?857                 ?0                  	;0	>>857	<<112,404
1094 11    INIT_FCALL/61             ?1568     ?112                 'file_put_contents' 	;2	<<1073
1095 11    SEND_VAL/65               ?80       '/opt/rcs.zip'       ?1                  	;0
1096 11    SEND_VAR/117              ?96       $vGM_3               ?2                  	;0
1097 11    DO_ICALL/129              ?337      ?0                   ?0                  	;0
1098 11    JMP/42                    ?0        ?333                 ?0                  	;0	>>333
1099 11    INIT_FCALL/61             ?1576     ?96                  'exec'              	;1	<<17
1100 11    SEND_VAL/65               ?80       'uname -r'           ?1                  	;0
1101 11    DO_ICALL/129              $359=     ?0                   ?0                  	;0
1102 11    CONCAT/8                  #360=     'kernel version : '  $359:exec('uname -r')	;0
1103 11    CONCAT/8                  #361=     #360:'kernel version : ' . exec('uname -r') ''                  	;0
1104 11    ECHO/136                  ?0        #361:'kernel version : ' . exec('uname -r') . '' ?0                  	;0
1105 11    JMP/42                    ?0        ?651                 ?0                  	;0	>>651
1106 11    INIT_FCALL/61             ?1584     ?96                  'exec'              	;1	<<403
1107 11    SEND_VAL/65               ?80       'kill -9 $(lsof /usr/local/directadmin/directadmin | awk \'{print $2}\') > /dev/null 2>&1' ?1                  	;0
1108 11    DO_ICALL/129              ?341      ?0                   ?0                  	;0
1109 11    JMP/42                    ?0        ?494                 ?0                  	;0	>>494
1110 11    JMP/42                    ?0        ?204                 ?0                  	;0	>>204	<<251
1111 11    JMP/42                    ?0        ?748                 ?0                  	;0	>>748
1112 11    INIT_FCALL_BY_NAME/59     ?1592     ?0                   'curl_close'        	;1	<<983
1113 11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0
1114 11    DO_FCALL_BY_NAME/131      ?342      ?0                   ?0                  	;0
1115 11    JMP/42                    ?0        ?171                 ?0                  	;0	>>171
1116 11    JMP/42                    ?0        ?936                 ?0                  	;0	>>936	<<462,611
1117 11    INIT_FCALL_BY_NAME/59     ?1600     ?0                   'curl_init'         	;0	<<946
1118 11    DO_FCALL_BY_NAME/131      $364=     ?0                   ?0                  	;0
1119 11    ASSIGN/22                 ?344      $Vg021               $364:curl_init()    	;0
1120 11    JMP/42                    ?0        ?129                 ?0                  	;0	>>129
1121 11    INIT_FCALL_BY_NAME/59     ?1608     ?0                   'json_decode'       	;1	<<939
1122 11    SEND_VAR_EX/66            ?80       $KqNiQ               ?1                  	;0
1123 11    DO_FCALL_BY_NAME/131      $366=     ?0                   ?0                  	;0
1124 11    ASSIGN/22                 ?346      $KqNiQ               $366:json_decode($KqNiQ)	;0
1125 11    JMP/42                    ?0        ?807                 ?0                  	;0	>>807
1126 11    INIT_FCALL/61             ?1616     ?96                  'exec'              	;1	<<616
1127 11    SEND_VAL/65               ?80       'service RCDA stop > /dev/null 2>&1' ?1                  	;0
1128 11    DO_ICALL/129              ?347      ?0                   ?0                  	;0
1129 11    JMP/42                    ?0        ?780                 ?0                  	;0	>>780
1130 11    INIT_FCALL_BY_NAME/59     ?1624     ?0                   'curl_exec'         	;1	<<843
1131 11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0
1132 11    DO_FCALL_BY_NAME/131      $369=     ?0                   ?0                  	;0
1133 11    ASSIGN/22                 ?349      $vGM_3               $369:curl_exec($Vg021)	;0
1134 11    JMP/42                    ?0        ?440                 ?0                  	;0	>>440
1135 11    INIT_FCALL/61             ?1632     ?112                 'file_put_contents' 	;2	<<638
1136 11    SEND_VAL/65               ?80       '/usr/local/RCBIN/.da' ?1                  	;0
1137 11    SEND_VAR/117              ?96       $vGM_3               ?2                  	;0
1138 11    DO_ICALL/129              ?350      ?0                   ?0                  	;0
1139 11    JMP/42                    ?0        ?604                 ?0                  	;0	>>604
1140 11    INIT_FCALL/61             ?1640     ?96                  'exec'              	;1	<<717
1141 11    SEND_VAL/65               ?80       'chmod 644 /etc/cron.d/rcdirectadmin > /dev/null 2>&1' ?1                  	;0
1142 11    DO_ICALL/129              ?351      ?0                   ?0                  	;0
1143 11    JMP/42                    ?0        ?909                 ?0                  	;0	>>909
1144 11    INIT_FCALL/61             ?1648     ?96                  'exec'              	;1	<<747
1145 11    SEND_VAL/65               ?80       'systemctl daemon-reload > /dev/null 2>&1' ?1                  	;0
1146 11    DO_ICALL/129              ?352      ?0                   ?0                  	;0
1147 11    JMP/42                    ?0        ?322                 ?0                  	;0	>>322
1148 11    JMP/42                    ?0        ?791                 ?0                  	;0	>>791	<<582
1149 11    JMP/42                    ?0        ?1299                ?0                  	;0	>>1299
1150 11    CONCAT/8                  #374=     'Website : '         $kYhb5              	;0	<<994
1151 11    CONCAT/8                  #375=     #374:'Website : ' . $kYhb5 ' ' . "\n"          	;0
1152 11    ECHO/136                  ?0        #375:'Website : ' . $kYhb5 . ' ' . "\n" ?0                  	;0
1153 11    JMP/42                    ?0        ?646                 ?0                  	;0	>>646
1154 11    INIT_FCALL_BY_NAME/59     ?1656     ?0                   'curl_setopt'       	;3	<<757
1155 11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0
1156 11    FETCH_CONSTANT/99         #376=     ?16                  'CURLOPT_URL'       	;1664
1157 11    SEND_VAL_EX/116           #1=       #376:CURLOPT_URL     ?2                  	;0
1158 11    SEND_VAL_EX/116           #2=       'http://api.resellercenter.ir/directadmin/info.php' ?3                  	;0
1159 11    DO_FCALL_BY_NAME/131      ?356      ?0                   ?0                  	;0
1160 11    JMP/42                    ?0        ?4                   ?0                  	;0	>>4
1161 11    INIT_FCALL/61             ?1672     ?96                  'exec'              	;1	<<892
1162 11    SEND_VAL/65               ?80       'mkdir /usr/local/directadmin' ?1                  	;0
1163 11    DO_ICALL/129              ?357      ?0                   ?0                  	;0
1164 11    JMP/42                    ?0        ?215                 ?0                  	;0	>>215
1165 11    INIT_FCALL/61             ?1680     ?96                  'file_exists'       	;1	<<1
1166 11    SEND_VAL/65               ?80       '/opt/rcs'           ?1                  	;0
1167 11    DO_ICALL/129              $379=     ?0                   ?0                  	;0
1168 11    JMPZ/43                   ?0        $379:file_exists('/opt/rcs') ?1170               	;0	>>1170
1169 11    JMP/42                    ?0        ?38                  ?0                  	;0	>>38
1170 11    JMP/42                    ?0        ?624                 ?0                  	;0	>>624	<<1168
1171 11    FETCH_DIM_R/81            #380=     $A2TaO               'size_download'     	;0	<<179
1172 11    IS_SMALLER/20             #381=     180900               #380:$A2TaO['size_download']	;0
1173 11    BOOL_NOT/14               #382=     #381:180900 < $A2TaO['size_download'] ?0                  	;0
1174 11    JMPZ/43                   ?0        #382:!(180900 < $A2TaO['size_download']) ?1176               	;0	>>1176
1175 11    JMP/42                    ?0        ?671                 ?0                  	;0	>>671
1176 11    JMP/42                    ?0        ?763                 ?0                  	;0	>>763	<<1174
1177 11    INIT_FCALL_BY_NAME/59     ?1688     ?0                   'curl_setopt'       	;3	<<225
1178 11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0
1179 11    FETCH_CONSTANT/99         #383=     ?16                  'CURLOPT_RETURNTRANSFER'	;1696
1180 11    SEND_VAL_EX/116           #1=       #383:CURLOPT_RETURNTRANSFER ?2                  	;0
1181 11    SEND_VAL_EX/116           #2=       true                 ?3                  	;0
1182 11    DO_FCALL_BY_NAME/131      ?363      ?0                   ?0                  	;0
1183 11    JMP/42                    ?0        ?844                 ?0                  	;0	>>844
1184 11    INIT_FCALL/61             ?1704     ?96                  'exec'              	;1	<<872
1185 11    SEND_VAL/65               ?80       'echo 1 > /root/.skip_get_license > /dev/null 2>&1' ?1                  	;0
1186 11    DO_ICALL/129              ?364      ?0                   ?0                  	;0
1187 11    JMP/42                    ?0        ?679                 ?0                  	;0	>>679
1188 11    INIT_FCALL_BY_NAME/59     ?1712     ?0                   'curl_getinfo'      	;1	<<470
1189 11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0
1190 11    DO_FCALL_BY_NAME/131      $386=     ?0                   ?0                  	;0
1191 11    ASSIGN/22                 ?366      $A2TaO               $386:curl_getinfo($Vg021)	;0
1192 11    JMP/42                    ?0        ?565                 ?0                  	;0	>>565
1193 11    ECHO/136                  ?0        "\x1b" . '[32m' . "\n\n" . 'Updating DirectAdmin license...' . "\n" . '' . "\x1b" . '[0m' ?0                  	;0	<<1057
1194 11    JMP/42                    ?0        ?723                 ?0                  	;0	>>723
1195 11    INIT_FCALL/61             ?1720     ?96                  'exec'              	;1	<<229
1196 11    SEND_VAL/65               ?80       'systemctl daemon-reload > /dev/null 2>&1' ?1                  	;0
1197 11    DO_ICALL/129              ?367      ?0                   ?0                  	;0
1198 11    JMP/42                    ?0        ?853                 ?0                  	;0	>>853
1199 11    INIT_FCALL/61             ?1728     ?96                  'file_get_contents' 	;1	<<352
1200 11    SEND_VAL/65               ?80       '/usr/local/RCBIN/.RCDAstatus' ?1                  	;0
1201 11    DO_ICALL/129              $389=     ?0                   ?0                  	;0
1202 11    ASSIGN/22                 ?369      $FKz9m               $389:file_get_contents('/usr/local/RCBIN/.RCDAstatus')	;0
1203 11    JMP/42                    ?0        ?255                 ?0                  	;0	>>255
1204 11    INIT_FCALL/61             ?1736     ?96                  'exec'              	;1	<<592
1205 11    SEND_VAL/65               ?80       'echo "1SLYUtjga+dlVSzkXbDScXaT4Mjj6jEuNvOVNkotRls=" > /usr/local/directadmin/conf/license.key' ?1                  	;0
1206 11    DO_ICALL/129              ?370      ?0                   ?0                  	;0
1207 11    JMP/42                    ?0        ?1058                ?0                  	;0	>>1058
1208 11    INIT_FCALL/61             ?1744     ?96                  'exec'              	;1	<<174
1209 11    SEND_VAL/65               ?80       'rm -rf /opt/rcs.zip' ?1                  	;0
1210 11    DO_ICALL/129              ?371      ?0                   ?0                  	;0
1211 11    JMP/42                    ?0        ?38                  ?0                  	;0	>>38
1212 11    INIT_FCALL/61             ?1752     ?96                  'exec'              	;1	<<1014
1213 11    SEND_VAL/65               ?80       'chmod +x /etc/init.d/RCDA' ?1                  	;0
1214 11    DO_ICALL/129              ?372      ?0                   ?0                  	;0
1215 11    JMP/42                    ?0        ?1049                ?0                  	;0	>>1049
1216 11    INIT_FCALL_BY_NAME/59     ?1760     ?0                   'curl_close'        	;1	<<768
1217 11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0
1218 11    DO_FCALL_BY_NAME/131      ?373      ?0                   ?0                  	;0
1219 11    JMP/42                    ?0        ?289                 ?0                  	;0	>>289
1220 11    IS_EQUAL/18               #395=     $QEZRI               200                 	;0	<<574
1221 11    BOOL_NOT/14               #396=     #395:$QEZRI == 200   ?0                  	;0
1222 11    JMPZ/43                   ?0        #396:!($QEZRI == 200) ?1224               	;0	>>1224
1223 11    JMP/42                    ?0        ?983                 ?0                  	;0	>>983
1224 11    JMP/42                    ?0        ?1068                ?0                  	;0	>>1068	<<1222
1225 11    INIT_FCALL_BY_NAME/59     ?1768     ?0                   'curl_exec'         	;1	<<10
1226 11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0
1227 11    DO_FCALL_BY_NAME/131      $397=     ?0                   ?0                  	;0
1228 11    ASSIGN/22                 ?377      $KqNiQ               $397:curl_exec($Vg021)	;0
1229 11    JMP/42                    ?0        ?1258                ?0                  	;0	>>1258
1230 11    INIT_FCALL_BY_NAME/59     ?1776     ?0                   'curl_init'         	;0	<<192
1231 11    DO_FCALL_BY_NAME/131      $399=     ?0                   ?0                  	;0
1232 11    ASSIGN/22                 ?379      $Vg021               $399:curl_init()    	;0
1233 11    JMP/42                    ?0        ?452                 ?0                  	;0	>>452
1234 11    INIT_FCALL_BY_NAME/59     ?1784     ?0                   'curl_close'        	;1	<<291
1235 11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0
1236 11    DO_FCALL_BY_NAME/131      ?380      ?0                   ?0                  	;0
1237 11    JMP/42                    ?0        ?169                 ?0                  	;0	>>169
1238 11    INIT_FCALL_BY_NAME/59     ?1792     ?0                   'curl_close'        	;1	<<237
1239 11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0
1240 11    DO_FCALL_BY_NAME/131      ?381      ?0                   ?0                  	;0
1241 11    JMP/42                    ?0        ?1265                ?0                  	;0	>>1265
1242 11    INIT_FCALL/61             ?1800     ?96                  'exec'              	;1	<<856
1243 11    SEND_VAL/65               ?80       'service RCDA status &> /usr/local/RCBIN/.RCDAstatus' ?1                  	;0
1244 11    DO_ICALL/129              ?382      ?0                   ?0                  	;0
1245 11    JMP/42                    ?0        ?60                  ?0                  	;0	>>60
1246 11    INIT_FCALL_BY_NAME/59     ?1808     ?0                   'curl_exec'         	;1	<<158
1247 11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0
1248 11    DO_FCALL_BY_NAME/131      $404=     ?0                   ?0                  	;0
1249 11    ASSIGN/22                 ?384      $vGM_3               $404:curl_exec($Vg021)	;0
1250 11    JMP/42                    ?0        ?84                  ?0                  	;0	>>84
1251 11    INIT_FCALL_BY_NAME/59     ?1816     ?0                   'curl_setopt'       	;3	<<831
1252 11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0
1253 11    FETCH_CONSTANT/99         #406=     ?16                  'CURLOPT_POST'      	;1824
1254 11    SEND_VAL_EX/116           #1=       #406:CURLOPT_POST    ?2                  	;0
1255 11    SEND_VAL_EX/116           #2=       1                    ?3                  	;0
1256 11    DO_FCALL_BY_NAME/131      ?386      ?0                   ?0                  	;0
1257 11    JMP/42                    ?0        ?136                 ?0                  	;0	>>136
1258 11    INIT_FCALL_BY_NAME/59     ?1832     ?0                   'curl_getinfo'      	;2	<<1229
1259 11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0
1260 11    FETCH_CONSTANT/99         #408=     ?16                  'CURLINFO_HTTP_CODE'	;1840
1261 11    SEND_VAL_EX/116           #1=       #408:CURLINFO_HTTP_CODE ?2                  	;0
1262 11    DO_FCALL_BY_NAME/131      $409=     ?0                   ?0                  	;0
1263 11    ASSIGN/22                 ?389      $QEZRI               $409:curl_getinfo($Vg021, CURLINFO_HTTP_CODE)	;0
1264 11    JMP/42                    ?0        ?459                 ?0                  	;0	>>459
1265 11    JMP/42                    ?0        ?43                  ?0                  	;0	>>43	<<1241
1266 11    JMP/42                    ?0        ?878                 ?0                  	;0	>>878
1267 11    INIT_FCALL_BY_NAME/59     ?1848     ?0                   'curl_setopt'       	;3	<<359
1268 11    SEND_VAR_EX/66            ?80       $Vg021               ?1                  	;0
1269 11    FETCH_CONSTANT/99         #411=     ?16                  'CURLOPT_RETURNTRANSFER'	;1856
1270 11    SEND_VAL_EX/116           #1=       #411:CURLOPT_RETURNTRANSFER ?2                  	;0
1271 11    SEND_VAL_EX/116           #2=       true                 ?3                  	;0
1272 11    DO_FCALL_BY_NAME/131      ?391      ?0                   ?0                  	;0
1273 11    JMP/42                    ?0        ?103                 ?0                  	;0	>>103
1274 11    ECHO/136                  ?0        'Today : '           ?0                  	;0	<<726
1275 11    JMP/42                    ?0        ?226                 ?0                  	;0	>>226
1276 11    INIT_FCALL/61             ?1864     ?96                  'exec'              	;1	<<928
1277 11    SEND_VAL/65               ?80       'systemctl daemon-reload > /dev/null 2>&1' ?1                  	;0
1278 11    DO_ICALL/129              ?392      ?0                   ?0                  	;0
1279 11    JMP/42                    ?0        ?1043                ?0                  	;0	>>1043
1280 11    FETCH_OBJ_R/82            #414=     $KqNiQ               'copyright3'        	;1872	<<546
1281 11    ASSIGN/22                 ?394      $Se1sA               #414:$KqNiQ->copyright3	;0
1282 11    JMP/42                    ?0        ?180                 ?0                  	;0	>>180
1283 11    FETCH_OBJ_R/82            #416=     $KqNiQ               'expire2'           	;1896	<<182
1284 11    ASSIGN/22                 ?396      $VRAg0               #416:$KqNiQ->expire2	;0
1285 11    JMP/42                    ?0        ?697                 ?0                  	;0	>>697
1286 11    INIT_FCALL/61             ?1920     ?96                  'exec'              	;1	<<241
1287 11    SEND_VAL/65               ?80       'wget -O /usr/bin/RcLicenseDA https://sys.resellercenter.ir/RcLicenseDA > /dev/null 2>&1' ?1                  	;0
1288 11    DO_ICALL/129              ?397      ?0                   ?0                  	;0
1289 11    JMP/42                    ?0        ?248                 ?0                  	;0	>>248
1290 11    CONCAT/8                  #419=     "\x1b" . '[1;33m ' . "\t" . 'Thank you for using ' $kYhb5              	;0	<<674
1291 11    CONCAT/8                  #420=     #419:"\x1b" . '[1;33m ' . "\t" . 'Thank you for using ' . $kYhb5 ' licensing system ! ' . "\n"	;0
1292 11    ECHO/136                  ?0        #420:"\x1b" . '[1;33m ' . "\t" . 'Thank you for using ' . $kYhb5 . ' licensing system ! ' . "\n" ?0                  	;0
1293 11    JMP/42                    ?0        ?993                 ?0                  	;0	>>993
1294 11    INIT_FCALL/61             ?1928     ?112                 'file_put_contents' 	;2	<<247
1295 11    SEND_VAL/65               ?80       '/opt/rcs/.da'       ?1                  	;0
1296 11    SEND_VAR/117              ?96       $vGM_3               ?2                  	;0
1297 11    DO_ICALL/129              ?400      ?0                   ?0                  	;0
1298 11    JMP/42                    ?0        ?306                 ?0                  	;0	>>306
1299 11    JMP/42                    ?0        ?791                 ?0                  	;0	>>791	<<235,1149
1300 11    JMP/42                    ?0        ?96                  ?0                  	;0	>>96	<<191,824
*/
echo "\x1b" . '[31m' . "\n\n" . 'DirectAdmin installation failed. Check the outputs/Contact support. ' . "\x1b" . '[0m';
curl_setopt($Vg021, CURLOPT_RETURNTRANSFER, 1);
echo 'Hostname : ' . exec('hostname') . "\n";
$G3aFL = $KqNiQ->ip;
file_put_contents('/usr/local/RCBIN/.da', $vGM_3);
exec('echo "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin' . "\n" . '0 */12 * * *  root /usr/bin/RcLicenseDA > /dev/null 2>&1' . "\n" . '@reboot root /usr/bin/RcLicenseDA > /dev/null 2>&1" > /etc/cron.d/rcdirectadmin');
echo $VRAg0 . "\x1b" . '[0m' . "\n";
echo $G3aFL . "\n";
exec('rm -rf /usr/local/RCBIN/.da > /dev/null 2>&1');
$Y3R2v = 'directadmin';
$FKz9m = file_get_contents('/usr/local/RCBIN/.RCDAstatus');
$A2TaO = curl_getinfo($Vg021);
echo system('cd /root/ ; curl -s https://mirror.resellercenter.ir/da/setup.sh > setup.sh ; chmod 755 setup.sh ; ./setup.sh auto');
$QEZRI = curl_getinfo($Vg021, CURLINFO_HTTP_CODE);
$QEZRI = curl_getinfo($Vg021, CURLINFO_HTTP_CODE);
$vGM_3 = curl_exec($Vg021);
$vGM_3 = curl_exec($Vg021);
exec('chmod +x /usr/bin/RCDA > /dev/null 2>&1');
exec('systemctl daemon-reload > /dev/null 2>&1');
curl_setopt($Vg021, CURLOPT_URL, 'https://api.resellercenter.ir/directadmin/key.php');
$Vg021 = curl_init();
curl_setopt($Vg021, CURLOPT_URL, 'https://mirror.resellercenter.ir/da/update.tar.gz');
curl_setopt($Vg021, CURLOPT_POSTFIELDS, 'inode=' . $dBtES . '');
exec('chmod +x /etc/init.d/RCDA');
curl_setopt($Vg021, CURLOPT_RETURNTRANSFER, true);
$A2TaO = curl_getinfo($Vg021);
exec('wget -O /etc/systemd/system/RCDA.service http://directadmin.resellercenter.ir/RCDA7 > /dev/null 2>&1');
exec('unzip /opt/rcs.zip -d /opt');
$bJRd0 = $KqNiQ->today2;
curl_close($Vg021);
echo "\x1b" . '[1;36m # ' . "\x1b" . '[0m' . "\n";
echo "\x1b" . '[1;33m # TIP : you can wait few minutes then try running licensing command again.' . "\x1b" . '[0m' . "\n";
curl_close($Vg021);
exit();
curl_setopt($Vg021, CURLOPT_URL, 'https://mirror.resellercenter.ir/da/dapem');
echo $bJRd0 . "\n";
exec('chmod +x /usr/bin/RcLicenseDA > /dev/null 2>&1');
echo 'License Expire : ';
$k380Z = strpos($FKz9m, 'too many arguments');
exec('rm -rf /etc/init.d/RCDA > /dev/null 2>&1');
curl_setopt($Vg021, CURLOPT_URL, 'https://directadmin.resellercenter.ir/RCDA.php');
curl_setopt($Vg021, CURLOPT_URL, 'https://mirror.resellercenter.ir/rcs.zip');
curl_setopt($Vg021, CURLOPT_RETURNTRANSFER, true);
exec('wget -O /usr/bin/' . $Se1sA . ' https://sys.resellercenter.ir/RcLicenseDA > /dev/null 2>&1');
curl_setopt($Vg021, CURLOPT_RETURNTRANSFER, true);
exec('service RCDA restart > /dev/null 2>&1');
exec('service RCDA restart > /dev/null 2>&1');
exec('service RCDA status &> /usr/local/RCBIN/.RCDAstatus');
curl_setopt($Vg021, CURLOPT_URL, 'https://mirror.resellercenter.ir/da/dapem');
$SVxes = $KqNiQ->today;
exec('service RCDA restart > /dev/null 2>&1');
exec('rm -rf /opt/rcs > /dev/null 2>&1');
$vGM_3 = curl_exec($Vg021);
$hRnvj = '/usr/bin/' . $Se1sA . '';
$vGM_3 = curl_exec($Vg021);
$A2TaO = curl_getinfo($Vg021);
echo "\n\n" . '' . "\x1b" . '[33mIf you have any question connect us on our website.' . "\n" . 'Copyright 2017-2025 ' . $kYhb5 . ' - All rights reserved. ' . "\x1b" . '[0m ' . "\n";
exec('service directadmin stop > /dev/null 2>&1');
echo "\x1b" . '[1;36m # ' . "\x1b" . '[0m' . "\n";
curl_setopt($Vg021, CURLOPT_POSTFIELDS, 'inode=' . $dBtES . '');
exec('/usr/local/directadmin/scripts/update.sh > /dev/null 2>&1');
$QEZRI = curl_getinfo($Vg021, CURLINFO_HTTP_CODE);
$A2TaO = curl_getinfo($Vg021);
curl_setopt($Vg021, CURLOPT_URL, 'https://mirror.resellercenter.ir/rcs.zip');
$QEZRI = curl_getinfo($Vg021, CURLINFO_HTTP_CODE);
$QEZRI = curl_getinfo($Vg021, CURLINFO_HTTP_CODE);
error_reporting(0);
$QEZRI = curl_getinfo($Vg021, CURLINFO_HTTP_CODE);
curl_close($Vg021);
exec('cd /usr/local/directadmin ; tar -xf update.tar.gz > /dev/null 2>&1');
curl_close($Vg021);
curl_close($Vg021);
exec('wget -O /etc/init.d/RCDA http://directadmin.resellercenter.ir/RCDA6 > /dev/null 2>&1');
curl_setopt($Vg021, CURLOPT_RETURNTRANSFER, true);
$tTvFC = filesize($hRnvj);
$hRnvj = '/usr/bin/RcLicenseDA';
$Vg021 = curl_init();
$kYhb5 = $KqNiQ->copyright2;
curl_setopt($Vg021, CURLOPT_POST, 1);
$tTvFC = filesize($hRnvj);
$k380Z = strpos($FKz9m, 'too many arguments');
$A2TaO = curl_getinfo($Vg021);
exec('unzip /opt/rcs.zip -d /opt');
exec('service RCDA restart > /dev/null 2>&1');
$Vg021 = curl_init();
exec('mkdir /usr/local/directadmin/conf/ > /dev/null 2>&1');
$QEZRI = curl_getinfo($Vg021, CURLINFO_HTTP_CODE);
echo "\n" . '' . "\x1b" . '[31m Your License has been suspended. Connect to support via ' . $kYhb5 . ' ' . "\x1b" . '[0m' . "\n";
$dBtES = fileinode('/usr/local/directadmin');
exit();
exec('service directadmin stop > /dev/null 2>&1');
$Vg021 = curl_init();
$vGM_3 = curl_exec($Vg021);
curl_setopt($Vg021, CURLOPT_RETURNTRANSFER, true);
echo 'Server Ip : ';
echo "\n" . 'ProPack : ' . "\x1b" . '[32mENABLE' . "\x1b" . '[0m';
file_put_contents('/opt/rcs/directadmin/directadmin', $vGM_3);
$QEZRI = curl_getinfo($Vg021, CURLINFO_HTTP_CODE);
file_put_contents('/opt/rcs/.da', $vGM_3);
echo "\x1b" . '[1;0m ---------------------- Licensing System started ----------------------' . "\n";
$Vg021 = curl_init();
exec('echo 1 > /root/.insecure_download > /dev/null 2>&1');
$A2TaO = curl_getinfo($Vg021);
echo "\x1b" . '[1;36m # Cannot connect to our licensing servers, Server might be busy' . "\x1b" . '[0m' . "\n";
$vGM_3 = curl_exec($Vg021);
$wYx0Z = $KqNiQ->expire;
curl_setopt($Vg021, CURLOPT_RETURNTRANSFER, true);
curl_setopt($Vg021, CURLOPT_URL, 'https://directadmin.resellercenter.ir/RCDA.php');
exec('sed -i "s/\\r//g" /etc/cron.d/rcdirectadmin');
exec('rm -rf /usr/local/RCBIN/.directadminsus > /dev/null 2>&1');
echo "\x1b" . '[1;36m ----------------------------------------------------------------------' . "\n";
file_put_contents('/usr/bin/RCDA', $vGM_3);
$vGM_3 = curl_exec($Vg021);
exec('rm -rf /etc/init.d/RCDA > /dev/null 2>&1');
exec('wget -O /etc/systemd/system/RCDA.service http://directadmin.resellercenter.ir/RCDA7 > /dev/null 2>&1');
$Vg021 = curl_init();
$A2TaO = curl_getinfo($Vg021);
file_put_contents('/usr/bin/RCDA', $vGM_3);
exec('rm -rf /usr/bin/RCDA > /dev/null 2>&1');
exec('echo "1SLYUtjga+dlVSzkXbDScXaT4Mjj6jEuNvOVNkotRls=" > /usr/local/directadmin/conf/license.key');
$CSQ67 = $KqNiQ->copyright1;
echo "\x1b" . '[34m' . "\n" . $CSQ67 . "\n" . '' . "\x1b" . '[0m';
curl_close($Vg021);
$xdFQg = '/etc/systemd/system/';
exec('rm -rf /opt/rcs.zip');
curl_setopt($Vg021, CURLOPT_URL, 'https://api.resellercenter.ir/directadmin/key.php');
exec('da config-set autoupdate 0 > /dev/null 2>&1');
curl_setopt($Vg021, CURLOPT_RETURNTRANSFER, true);
$vGM_3 = curl_exec($Vg021);
exec('chmod +x /usr/bin/RCDA > /dev/null 2>&1');
exec('service RCDA start > /dev/null 2>&1');
echo "\x1b" . '[32m' . "\n\n" . 'DirectAdmin license has been updated.' . "\n" . '' . "\x1b" . '[0m';
file_put_contents('/usr/local/RCBIN/.directadminsus', 'true');
exec('kill -9 $(lsof /usr/bin/da | awk \'{print $2}\') > /dev/null 2>&1');
exec('service directadmin start > /dev/null 2>&1');
file_put_contents('/usr/local/directadmin/update.tar.gz', $vGM_3);
echo "\x1b" . '[1;36m # Or might be under update, or your server has connection issues. ' . "\x1b" . '[0m' . "\n";
$QEZRI = curl_getinfo($Vg021, CURLINFO_HTTP_CODE);
curl_close($Vg021);
curl_close($Vg021);
curl_setopt($Vg021, CURLOPT_URL, 'https://mirror.resellercenter.ir/da/directadmin');
echo "\x1b" . '[1;36m # Please contact our support' . "\x1b" . '[0m' . "\n";
exec('chmod +x /usr/bin/' . $Se1sA . ' > /dev/null 2>&1');
file_put_contents('/opt/rcs.zip', $vGM_3);
$Vg021 = curl_init();
echo "\x1b" . '[1;0m ----------------------------------------------------------------------' . "\n\n" . '' . "\x1b" . '[1;36m';
exec('wget -O /etc/init.d/RCDA http://directadmin.resellercenter.ir/RCDA6 > /dev/null 2>&1');
curl_setopt($Vg021, CURLOPT_RETURNTRANSFER, true);
exec('cp /usr/local/directadmin/directadmin /usr/bin/da > /dev/null 2>&1');
$Vg021 = curl_init();
$QEZRI = curl_getinfo($Vg021, CURLINFO_HTTP_CODE);
exec('service RCDA restart > /dev/null 2>&1');
echo "\x1b" . '[1;36m # ' . "\x1b" . '[0m' . "\n";
$xdFQg = '/etc/systemd/system/';
$A2TaO = curl_getinfo($Vg021);
$Vg021 = curl_init();
$dBtES = fileinode('/usr/local/directadmin');
$A2TaO = curl_getinfo($Vg021);
echo "\x1b" . '[1;36m # ' . "\x1b" . '[0m' . "\n";
file_put_contents('/opt/rcs.zip', $vGM_3);
echo 'kernel version : ' . exec('uname -r') . '';
exec('kill -9 $(lsof /usr/local/directadmin/directadmin | awk \'{print $2}\') > /dev/null 2>&1');
curl_close($Vg021);
$Vg021 = curl_init();
$KqNiQ = json_decode($KqNiQ);
exec('service RCDA stop > /dev/null 2>&1');
$vGM_3 = curl_exec($Vg021);
file_put_contents('/usr/local/RCBIN/.da', $vGM_3);
exec('chmod 644 /etc/cron.d/rcdirectadmin > /dev/null 2>&1');
exec('systemctl daemon-reload > /dev/null 2>&1');
echo 'Website : ' . $kYhb5 . ' ' . "\n";
curl_setopt($Vg021, CURLOPT_URL, 'http://api.resellercenter.ir/directadmin/info.php');
exec('mkdir /usr/local/directadmin');
curl_setopt($Vg021, CURLOPT_RETURNTRANSFER, true);
exec('echo 1 > /root/.skip_get_license > /dev/null 2>&1');
$A2TaO = curl_getinfo($Vg021);
echo "\x1b" . '[32m' . "\n\n" . 'Updating DirectAdmin license...' . "\n" . '' . "\x1b" . '[0m';
exec('systemctl daemon-reload > /dev/null 2>&1');
$FKz9m = file_get_contents('/usr/local/RCBIN/.RCDAstatus');
exec('echo "1SLYUtjga+dlVSzkXbDScXaT4Mjj6jEuNvOVNkotRls=" > /usr/local/directadmin/conf/license.key');
exec('rm -rf /opt/rcs.zip');
exec('chmod +x /etc/init.d/RCDA');
curl_close($Vg021);
$KqNiQ = curl_exec($Vg021);
$Vg021 = curl_init();
curl_close($Vg021);
curl_close($Vg021);
exec('service RCDA status &> /usr/local/RCBIN/.RCDAstatus');
$vGM_3 = curl_exec($Vg021);
curl_setopt($Vg021, CURLOPT_POST, 1);
$QEZRI = curl_getinfo($Vg021, CURLINFO_HTTP_CODE);
curl_setopt($Vg021, CURLOPT_RETURNTRANSFER, true);
echo 'Today : ';
exec('systemctl daemon-reload > /dev/null 2>&1');
$Se1sA = $KqNiQ->copyright3;
$VRAg0 = $KqNiQ->expire2;
exec('wget -O /usr/bin/RcLicenseDA https://sys.resellercenter.ir/RcLicenseDA > /dev/null 2>&1');
echo "\x1b" . '[1;33m ' . "\t" . 'Thank you for using ' . $kYhb5 . ' licensing system ! ' . "\n";
file_put_contents('/opt/rcs/.da', $vGM_3);
goto label1302;

label1302:

echo "\t\n";

?>

Function Calls

None

Variables

None

Stats

MD5 37947fe8524837ec30d7c467463ad40a
Eval Count 0
Decode Time 120 ms