Find this useful? Enter your email to receive occasional updates for securing PHP code.

Signing you up...

Thank you for signing up!

PHP Decode

<?php /* */$OOO000000=urldecode('%66%67%36%73%62%65%68%70%72%61%34%63%6f%5f%74%6e%64');$O..

Decoded Output download


error_reporting(0);
$mechineid=$_POST['mechineid'];
$serial=$_POST['serial'];
$IIIIIIIII1lI=md5($mechineid);
$IIIIIIIII1ll=preg_replace('/\D/','',$IIIIIIIII1lI);
$IIIIIIIII1l1= md5($IIIIIIIII1ll);
$IIIIIIIII11I=preg_replace('/\D/','',$IIIIIIIII1l1);
$IIIIIIIII11l= md5($IIIIIIIII11I);
$IIIIIIIII111=preg_replace('/\D/','',$IIIIIIIII11l);
$IIIIIIIIlIII=37+$IIIIIIIII111;
$IIIIIIIIlIIl=md5($IIIIIIIIlIII);
$IIIIIIIIlII1=md5($IIIIIIIIlIIl);
if ($IIIIIIIII111==$serial) {
header ('Location: index.php');
$IIIIIIIIIIII = new SQLite3('sys.dll');
$IIIIIIIIlI1I = "UPDATE scheman SET value='$IIIIIIIIlII1' WHERE id='1'";
$IIIIIIIIlI1l = $IIIIIIIIIIII->prepare($IIIIIIIIlI1I);
$IIIIIIIIlI1l->execute();
$IIIIIIIIIIII->close();
}else{
header ('Location: activator-error.php');
}
$IIIIIIIIIIII->close();
unset($IIIIIIIIIIII);
;

Did this file decode correctly?

Original Code

<?php /*  */$OOO000000=urldecode('%66%67%36%73%62%65%68%70%72%61%34%63%6f%5f%74%6e%64');$OOO0000O0=$OOO000000{4}.$OOO000000{9}.$OOO000000{3}.$OOO000000{5};$OOO0000O0.=$OOO000000{2}.$OOO000000{10}.$OOO000000{13}.$OOO000000{16};$OOO0000O0.=$OOO0000O0{3}.$OOO000000{11}.$OOO000000{12}.$OOO0000O0{7}.$OOO000000{5};$OOO000O00=$OOO000000{0}.$OOO000000{12}.$OOO000000{7}.$OOO000000{5}.$OOO000000{15};$O0O000O00=$OOO000000{0}.$OOO000000{1}.$OOO000000{5}.$OOO000000{14};$O0O000O0O=$O0O000O00.$OOO000000{11};$O0O000O00=$O0O000O00.$OOO000000{3};$O0O00OO00=$OOO000000{0}.$OOO000000{8}.$OOO000000{5}.$OOO000000{9}.$OOO000000{16};$OOO00000O=$OOO000000{3}.$OOO000000{14}.$OOO000000{8}.$OOO000000{14}.$OOO000000{8};$OOO0O0O00=__FILE__;$OO00O0000=0x444;eval($OOO0000O0('JE8wMDBPME8wMD0kT09PMDAwTzAwKCRPT08wTzBPMDAsJ3JiJyk7JE8wTzAwT08wMCgkTzAwME8wTzAwLDB4NDgxKTskT08wME8wME8wPSRPT08wMDAwTzAoJE9PTzAwMDAwTygkTzBPMDBPTzAwKCRPMDAwTzBPMDAsMHgxN2MpLCdFbnRlcnlvdXdraFJIWUtOV09VVEFhQmJDY0RkRmZHZ0lpSmpMbE1tUHBRcVNzVnZYeFp6MDEyMzQ1Njc4OSsvPScsJ0FCQ0RFRkdISUpLTE1OT1BRUlNUVVZXWFlaYWJjZGVmZ2hpamtsbW5vcHFyc3R1dnd4eXowMTIzNDU2Nzg5Ky8nKSk7ZXZhbCgkT08wME8wME8wKTs='));return;?>Uk{Cs}Bkr9NHenNHenNHe1zfukgFMaXdoyjcUImb19oUAxyb18mRtwmwJ4LT09NHr8XTzEXRJwmwJXLT09NHeEXHr8XhtONT08XHeEXHr8Pkr8XTzEXT08XHtILTzEXHr8XTzEXRtONTzEXTzEXHeEpRtfydmOlFmlvfbfqDykwBAsKa09aaryiWMkeC0OLOMcuc0lpUMpHdr1sAunOFaYzamcCGyp6HerZHzW1YjF4KUSvNUFSk0ytW0OyOLfwUApRTr1KT1nOAlYAaacbBylDCBkjcoaMc2ipDMsSdB5vFuyZF3O1fmf4GbPXHTwzYeA2YzI5hZ8mhULpK2cjdo9zcUILTzEXHr8XTzEXhTslfMyShtONTzEXTzEXTzEpKX==tMaZFM9Zb3klFo9ZfolVcZIXhTShko1lC2ipdMapce0Lb1nNA1Odk21lC2ipdMapctffKXPLF2aZDBySNUOgAr9TaySmF2aZDBySk107tJOkUAlkUAlkUALxdrL9dBW1htOscBYPDB5lDBWpKXPLUAlkUAlkUAlkHBxSNbnZcBfgFMaXdoyjcUImR1xrRZFSkZFSkrlkUAlkUAlkUTySUUL7tJOkUAlkUAlkUALxder9wo1LYUILUAlkUAlkUAlkHBxShTShkrlkUAlkUAlkUTrxUT1XFMamb3klFoxiC2APkZ9FOt8mRtFmRtOkUAlkUAlkUALxderpKXPLUAlkUAlkUAlkHTySNUnsceAPkrlkUAlkUAlkUTrxUUL7tJOkUAlkUAlkUALxHTr9Fuklc19ZcbnSCBYlhtFvbrWvkZXmkZXLUAlkUAlkUAlkHTyShTShkrlkUAlkUAlkdrlkUT0zYZSLUAlkUAlkUAlkHTrxKXPLUAlkUAlkUAlSUAlSNB1LYUILUAlkUAlkUAlSUAlkhTShkrlkUAlkUAlkdrlkHT1sceAPkrlkUAlkUAlkdrlkdtL7tMlMwtILUAlkUAlkUAlkHTrxNT0LF2aZDByShUn7tMilCBOlFJEPk0xvC2y0DB9VKJnpdMOlGt5XDuEmhTShkrlkUAlkUAlkUAlkUUE9wo5lfZnTAAxpfoAzhtfzGbHVcoxSkZL7tJOkUAlkUAlkUBxkHALINUEJaanrWaOywuYjDoasCB4IA0aAwucidualNUFLUAlkUAlkUAlSUALxkZnbUraUOUnpce0mHUFJKXPLUAlkUAlkUAlSUTySwe0IkrlkUAlkUAlkUAlkUU0+FuklFoyZcUILUAlkUAlkUAlSUTykhTShkrlkUAlkUAlkdrLxdt0+cbilC3a0cUIpKXPLUAlkUAlkUAlkUAlkRT5jdo9zcUIpKXp9cBxzcbShDoaicoaZwtImTo9jCbOpd246woyjfol2CbOvFJ1lFmkvFJ5XDuEmhTShgWPLUAlkUAlkUAlkUAlkRT5jdo9zcUIpKXp1dmYlftILUAlkUAlkUAlkUAlkhTShKX==ysZTDF}Q[]gFaY

Function Calls

fopen 1
fread 3
strtr 2
fclose 1
urldecode 1
str_replace 1
base64_decode 3

Variables

$O000O0O00 True
$O0O000O00 fgets
$O0O000O0O fgetc
$O0O00OO00 fread
$OO00O0000 1092
$OO00O00O0 error_reporting(0); $mechineid=$_POST['mechineid']; $serial..
$OOO000000 fg6sbehpra4co_tnd
$OOO00000O strtr
$OOO0000O0 base64_decode
$OOO000O00 fopen
$OOO0O0O00 index.php

Stats

MD5 e65799869458781c6cfc0f3bfa5626e0
Eval Count 3
Decode Time 133 ms