Description
Myphpguard is an obfuscator and encoder tool that will help you protect php code easily. It renames variables, functions, fields and methods. Hides and encode all strings and Superglobals($_GET,$_SERVER,...). MyPhpGuard process all files from selected project folder into a single step maintaining the consistency between dependent files(-requires and -includes).Main features include:
- You can save, open and create new projects using the File Menu or click the respective button from toolbar.
- This obfuscator renames variables, functions, methods from classes.
- Hides all strings and Superglobals, also variable names.(optional)
- Encode strings and variable names with base64.(optional)
- Delete all comments (Support only for c/c++ style comments).
- Include custom setting for particular variables, functions, fields and methods.
- You can select generate mapping files for obfuscated files and can reuse this mapping files for others projects.
- Do not support variable functions.
- If use string hiding with static strings, result code will not work.( static $var1="select";)
- Myphpguard is a multiplatform obfuscator-encoder, work on any OS with .Net Framework(2.0 or higher) or Mono 2.x (version 1.35 require Mono 2.8).
For Windows 98/Me/XP and later:
- Download the installer.
- Double-click the installer file to run it.
- Download the zip with binary files, extract it to any folder.
- Execute the command mono EXTRACT_DIR/MyPhpGuard.exe to run the obfuscator.
Example
The following files show an example using the php obfuscator myphpguard 1.354: alltest.php,
exfuncs.php, exvars.php. The file alltest.php include references to variables
and functions from exvars.php and exfuncs, respectively.
Note: The php obfuscator installer files includes all sample files.
alltest.php
<?php include "exfuncs.php"; include "./exvars.php"; echo "<HTML><HEAD><TITLE>$title</TITLE></HEAD><BODY>"; echo getElementH2($title); //*** String Test //$cadena1="String Test"; $cadena2='Multiple Line: -$cadena1 -$cadena2'; $cadena3="\"$test1\" $cadena2"; addElementH3($test1); echo "$cadena3.</br>"; function AddTestForm() { echo '<form method="post" action="#" > <p>Texto:</p> <input id="Texto" type="text" style="width: 250px" name="Texto" /> <input id="subEnviar" type="submit" value="Send" name="subMsg" /> </form>'; } //*** Class Test /* * * * Class Lista */ class Lista { private $myList; private $cadena; private $style; public function Lista($uLista,$style="") { $this->myList=$uLista; $this->style=$style; } public function ShowLista() { if(!isset($this->myList) ) { return; } // $this->cadena="<ol style='$this->style' >"; $this->AddElements(); $this->cadena.="</ol>"; echo $this->cadena; } private function AddElements() { if(count($this->myList)>10) { return; } foreach ($this->myList as $item) { $this->cadena.="<li>$item</li>"; } } } addElementH3($test2); $style="color: #cccccc;"; $colorLista=new Lista($elementos,$style); $Lista=new Lista($elementos); ?> <div><?php $colorLista->ShowLista(); ?> </div> <div><?php echo "<hr>"; $Lista->ShowLista(); ?> </div> <?php //*** Form Test addElementH3($test3); AddTestForm(); if( isset($_POST["subMsg"]) ) { if(!empty($_POST["Texto"])) { $texto=$_POST["Texto"]; echo "<div style='border: 1px solid gray' > Texto:$texto </div>"; } } echo '</BODY></HTML>'; ?>
exvars.php
<?php $title="Myphpguard obfuscator - All test"; $test1="String Test"; $test2="Class Test"; $test3="Form Test"; $nroElementos=4; $elementos=array(1=>"item1",2=>"item2",3=>"<b>elemento</b>",9=>"item9"); /* function err() { return "sssdd"; } */ ?>
exfuncs.php
<?php function getElementH2($cadena) { return '<H2>'.$cadena.'</H2>'; } function addElementH3($cadena) { echo "<H3>$cadena</H3><hr>"; } ?>Now, show the obfuscated files generated for the php obfuscator Myphpguard 1.354.
Obfuscated alltest.php - Test A:
Advanced string obfuscation disabled.<?php include "\x65\x78\x66u\x6e\x63\x73.\x70\x68\x70";include "\x2e\x2f\x65x\x76\x61\x72s\x2e\x70\x68\x70";echo "\x3c\x48\x54M\x4c>\x3cH\x45\x41\x44><\x54\x49\x54L\x45>"."$xl3s2235"."\x3c\x2f\x54I\x54\x4c\x45>\x3c\x2f\x48\x45A\x44>\x3cB\x4f\x44\x59>"; echo xl2s155($xl3s2235); $PFRJVx="\x4d\x75\x6c\x74\x69\x70\x6c\x65\x20\x4c\x69\x6e\x65\x3a\xd\xa\x2d\x24\x63\x61\x64\x65\x6e\x61\x31\xd\xa\x2d\x24\x63\x61\x64\x65\x6e\x61\x32" ;$xl1s2236="\"$xl3s2236\" "."$PFRJVx";xl2s156($xl3s2236);echo "$xl1s2236"."\x2e\x3c\x2fb\x72>"; function xl1s155(){ echo "\x3c\x66\x6f\x72\x6d\x20\x6d\x65\x74\x68\x6f\x64\x3d\x22\x70\x6f\x73\x74\x22\x20\x61\x63\x74\x69\x6f\x6e\x3d\x22\x23\x22\x20\x3e\xd\xa\x20\x20\x20\x20\x20\x20\x20\x20\x20\x3c\x70\x3e\x54\x65\x78\x74\x6f\x3a\x3c\x2f\x70\x3e\xd\xa\x20\x20\x20\x20\x20\x20\x20\x20\x20\x3c\x69\x6e\x70\x75\x74\x20\x69\x64\x3d\x22\x54\x65\x78\x74\x6f\x22\x20\x74\x79\x70\x65\x3d\x22\x74\x65\x78\x74\x22\x20\x73\x74\x79\x6c\x65\x3d\x22\x77\x69\x64\x74\x68\x3a\x20\x32\x35\x30\x70\x78\x22\x20\x6e\x61\x6d\x65\x3d\x22\x54\x65\x78\x74\x6f\x22\x20\x2f\x3e\xd\xa\x20\x20\x20\x20\x20\x20\x20\x20\x20\x3c\x69\x6e\x70\x75\x74\x20\x69\x64\x3d\x22\x73\x75\x62\x45\x6e\x76\x69\x61\x72\x22\x20\x74\x79\x70\x65\x3d\x22\x73\x75\x62\x6d\x69\x74\x22\x20\x76\x61\x6c\x75\x65\x3d\x22\x53\x65\x6e\x64\x22\x20\x6e\x61\x6d\x65\x3d\x22\x73\x75\x62\x4d\x73\x67\x22\x20\x2f\x3e\xd\xa\x20\x20\x20\x20\x20\x20\x20\x20\x20\x3c\x2f\x66\x6f\x72\x6d\x3e" ;}class Lista{private $xl1s156;private $xl1s157;private $xl1s158;public function Lista($xl1s4235,$xl1s4236=""){$this->xl1s156=$xl1s4235;$this->xl1s158=$xl1s4236;}public function xlz11(){if(!isset($this->xl1s156) ) {return;}$this->xl1s157="\x3c\x6f\x6c \x73\x74\x79l\x65\x3d\x27"."$this->xl1s158"."\x27\x20>";$this->xl1s161();$this->xl1s157.="\x3c\x2f\x6fl>";echo $this->xl1s157;}private function xl1s161(){if(count($this->xl1s156)>10) {return;}foreach ($this->xl1s156 as $xl1s6235){$this->xl1s157.="\x3c\x6c\x69>"."$xl1s6235"."\x3c\x2f\x6ci>";}}}xl2s156($xl3s2237);$xl1s7236="\x63\x6f\x6co\x72\x3a\x20#\x63\x63\x63\x63c\x63\x3b";$xl1s7237=new Lista($xl3s2240,$xl1s7236); $xl1s7239=new Lista($xl3s2240); ?> <div> <?php $xl1s7237->xlz11(); ?> </div> <div> <?php echo "\x3c\x68\x72>"; $xl1s7239->xlz11(); ?> </div> <?php xl2s156($xl3s2238);xl1s155();if( isset(${"_\x50\x4f\x53T"}["\x73\x75\x62M\x73\x67"]) ){if(!empty(${"\x5fP\x4fS\x54"}["\x54\x65\x78t\x6f"])){$xl1s10236=${"_\x50O\x53T"}["\x54\x65\x78t\x6f"]; echo "\x3c\x64\x69v\x20\x73\x74y\x6c\x65\x3d\x27b\x6f\x72\x64e\x72\x3a\x201\x70\x78 \x73\x6f\x6c\x69\x64 \x67r\x61y\x27 > \x20 \x20 \x20 \x20\x54\x65\x78t\x6f:"."$xl1s10236"." \x20 \x20\x20\x20 \x20\x3c\x2f\x64i\x76>" ;}}echo "\x3c\x2f\x42\x4f\x44\x59\x3e\x3c\x2f\x48\x54\x4d\x4c\x3e"; ?>
Obfuscated alltest.php - Test B:
Advanced string obfuscation enabled, encode string disabled and variable names hiding disabled.<?php if(!function_exists("xl1s44")){class xl1s21 { static $xl1s202="\x65x\x66un\x63s.\x70h\x70"; static $xl1s225=".\x2fex\x76a\x72\x73.p\x68p"; static $xl1s248="\x3c\x48T\x4dL\x3e\x3c\x48EA\x44>\x3c\x54IT\x4cE\x3e"; static $xl1s271="<\x2fT\x49\x54L\x45><\x2f\x48E\x41D>\x3c\x42\x4f\x44\x59>"; static $xl1s294="\x4d\x75\x6c\x74\x69\x70\x6c\x65\x20\x4c\x69\x6e\x65\x3a\xd\xa\x2d\x24\x63\x61\x64\x65\x6e\x61\x31\xd\xa\x2d\x24\x63\x61\x64\x65\x6e\x61\x32"; static $xl1s317="\x2e</\x62r>"; static $xl1s340="\x3c\x66\x6f\x72\x6d\x20\x6d\x65\x74\x68\x6f\x64\x3d\x22\x70\x6f\x73\x74\x22\x20\x61\x63\x74\x69\x6f\x6e\x3d\x22\x23\x22\x20\x3e\xd\xa\x20\x20\x20\x20\x20\x20\x20\x20\x20\x3c\x70\x3e\x54\x65\x78\x74\x6f\x3a\x3c\x2f\x70\x3e\xd\xa\x20\x20\x20\x20\x20\x20\x20\x20\x20\x3c\x69\x6e\x70\x75\x74\x20\x69\x64\x3d\x22\x54\x65\x78\x74\x6f\x22\x20\x74\x79\x70\x65\x3d\x22\x74\x65\x78\x74\x22\x20\x73\x74\x79\x6c\x65\x3d\x22\x77\x69\x64\x74\x68\x3a\x20\x32\x35\x30\x70\x78\x22\x20\x6e\x61\x6d\x65\x3d\x22\x54\x65\x78\x74\x6f\x22\x20\x2f\x3e\xd\xa\x20\x20\x20\x20\x20\x20\x20\x20\x20\x3c\x69\x6e\x70\x75\x74\x20\x69\x64\x3d\x22\x73\x75\x62\x45\x6e\x76\x69\x61\x72\x22\x20\x74\x79\x70\x65\x3d\x22\x73\x75\x62\x6d\x69\x74\x22\x20\x76\x61\x6c\x75\x65\x3d\x22\x53\x65\x6e\x64\x22\x20\x6e\x61\x6d\x65\x3d\x22\x73\x75\x62\x4d\x73\x67\x22\x20\x2f\x3e\xd\xa\x20\x20\x20\x20\x20\x20\x20\x20\x20\x3c\x2f\x66\x6f\x72\x6d\x3e"; static $xl1s363="<o\x6c s\x74y\x6c\x65='"; static $xl1s386="\x27\x20\x3e"; static $xl1s409="</\x6fl\x3e"; static $xl1s432="\x3cli\x3e"; static $xl1s455="</\x6c\x69\x3e"; static $xl1s478="\x63o\x6cor\x3a\x20#c\x63\x63c\x63c\x3b"; static $xl1s501="<h\x72>"; static $xl1s524="s\x75\x62M\x73g"; static $xl1s547="Te\x78\x74\x6f"; static $xl1s570="T\x65x\x74o"; static $xl1s593="<d\x69v \x73t\x79\x6c\x65=\x27bo\x72de\x72: \x31px\x20\x73ol\x69d \x67r\x61y'\x20>\xd \x20\x20 \x20\x20 T\x65x\x74\x6f:"; static $xl1s616=" \xa\x20\x20 \x20 \x20 \x3c\x2fd\x69v>"; static $xl1s639="\x3c\x2f\x42\x4f\x44\x59\x3e\x3c\x2f\x48\x54\x4d\x4c\x3e"; }eval("e\x76\x61\x6c\x28b\x61s\x656\x34\x5f\x64e\x63o\x64e\x28\x27\x5anV\x75Y3R\x70b24\x67e\x47wx\x63\x7aQ\x30KCR\x34\x62\x44FzN\x6aUp\x49Hty\x5a\x58\x521c\x6d4ge\x47\x77xc\x7aIxO\x6aoke\x79R7\x49nh\x73X\x48gzM\x58Nc\x65DM\x32XHg\x7aNSJ\x39\x66Tt\x39\x27\x29\x29\x3b");} include xl1s44("x\x6c1s2\x302");include xl1s44("xl1\x73\x322\x35");echo xl1s44("x\x6c1\x73\x324\x38")."$xl3s2235".xl1s44("xl1\x73271");echo xl2s155($xl3s2235);$PFRJVx=xl1s44("x\x6c\x31s\x3294");$xl1s2236="\"$xl3s2236\" "."$PFRJVx"; xl2s156($xl3s2236);echo "$xl1s2236".xl1s44("xl1\x733\x31\x37"); function xl1s155(){echo xl1s44("x\x6c1s3\x340");}class Lista{private $xl1s156;private $xl1s157;private $xl1s158;public function Lista($xl1s4235,$xl1s4236=""){ $this->xl1s156=$xl1s4235;$this->xl1s158=$xl1s4236;}public function xlz11(){if(!isset($this->xl1s156) ){return;}$this->xl1s157=xl1s44("\x78\x6c\x31\x73\x33\x363")."$this->xl1s158".xl1s44("xl\x31s\x3386"); $this->xl1s161();$this->xl1s157.=xl1s44("\x78l1\x7340\x39");echo $this->xl1s157;}private function xl1s161(){if(count($this->xl1s156)>10){return;}foreach ($this->xl1s156 as $xl1s6235){$this->xl1s157.=xl1s44("xl\x31s43\x32")."$xl1s6235".xl1s44("\x78l\x31\x73455"); }}}xl2s156($xl3s2237);$xl1s7236=xl1s44("xl\x31s4\x378");$xl1s7237=new Lista($xl3s2240,$xl1s7236);$xl1s7239=new Lista($xl3s2240); ?> <div> <?php $xl1s7237->xlz11(); ?> </div> <div> <?php echo xl1s44("\x78l1s\x350\x31"); $xl1s7239->xlz11(); ?> </div> <?php xl2s156($xl3s2238);xl1s155();if( isset($_POST[xl1s44("xl\x31\x73\x3524")]) ){if(!empty($_POST[xl1s44("\x78l\x31s54\x37")])){$xl1s10236=$_POST[xl1s44("xl\x31s5\x370")];echo xl1s44("\x78\x6c\x31\x7359\x33")."$xl1s10236".xl1s44("xl1\x736\x316") ;}}echo xl1s44("x\x6c1s\x3639"); ?>
Obfuscated alltest.php - Test C:
Advanced string obfuscation enabled (array mode), encode string with base64 enabled and variable names hiding enabled.<?php if(!function_exists("xl1s47")){${"G\x4cO\x42A\x4c\x53"} ["xl\x31\x7321"]= array( "xl1s282"=>"ZXh\x6dd\x575\x6ac\x795wa\x48A\x3d", "xl1s180"=>"x\x6c1s\x37\x39", "xl1s383"=>"Li9\x6ceHZ\x68cn\x4ducG\x68w", "xl1s484"=>"PE\x68\x55T\x55\x77\x2bPEh\x46Q\x55Q+\x50F\x52JVE\x78FP\x67=\x3d", "xl1s178"=>"b\x61\x73e\x36\x34\x5fde\x63o\x64e", "xl1s585"=>"PC\x39USV\x52MRT\x348\x4c\x30hF\x51U\x51+P\x45JP\x52Fk\x2b", "xl1s179"=>"\x78\x6c1s\x347", "xl1s688"=>"TX\x56s\x64\x47lwb\x47UgT\x47l\x75Z\x54oN\x43i0k\x592\x46kZ\x575\x68MQ\x30\x4bLS\x52jYW\x52lb\x6dE\x79", "xl1s789"=>"\x4cjw\x76YnI\x2b", "xl1s890"=>"PG\x5avcm\x30gb\x57V\x30aG9\x6b\x50\x53Jw\x62\x33\x4e\x30IiB\x68\x59\x33Rpb\x32\x349I\x69Mi\x49\x444N\x43\x69Ag\x49CAg\x49C\x41g\x49\x44xw\x50\x6cR\x6ceHR\x76\x4fjw\x76cD\x34\x4e\x43i\x41gI\x43AgI\x43Ag\x49Dxp\x62n\x421dC\x42p\x5aD0i\x56G\x564\x64G8\x69I\x48R5c\x47U\x39In\x52l\x65\x48QiI\x48\x4e0eW\x78lPS\x4a\x33aWR\x30aDo\x67M\x6aUwc\x48\x67i\x49\x475\x68b\x57U9I\x6c\x52le\x48Rv\x49iA\x76Pg0\x4bI\x43A\x67I\x43\x41gIC\x41gPG\x6c\x75cH\x56\x30I\x47\x6ck\x50SJz\x64WJ\x46bn\x5a\x70\x59X\x49iI\x48\x525cG\x559\x49n\x4e1Y\x6d\x31pdC\x49\x67dmF\x73dWU\x39I\x6cN\x6cbmQ\x69IG5\x68b\x57U9\x49nN\x31Yk1\x7aZy\x49\x67\x4cz4\x4e\x43i\x41gI\x43\x41\x67\x49CAg\x49Dwv\x5am9\x79bT4\x3d", "xl1s991"=>"\x50G\x39s\x49HN\x30e\x57\x78lP\x53\x63\x3d", "xl1s1092"=>"Jy\x41+", "xl1s1193"=>"\x50C9v\x62D4\x3d", "xl1s1294"=>"PG\x78\x70P\x67\x3d=", "xl1s1395"=>"P\x439\x73\x61T\x34\x3d", "xl1s1497"=>"Y29\x73b3\x496IC\x4ejY\x32Nj\x592\x4d7", "xl1s1396"=>"eG\x77xc\x7acy\x4dz\x59=", "xl1s1600"=>"PGh\x79P\x67\x3d\x3d", "xl1s181"=>"X1\x42\x50\x55\x31Q\x3d", "xl1s1702"=>"c3V\x69TXN\x6e", "xl1s1803"=>"V\x47\x564\x64G8\x3d", "xl1s1904"=>"VGV\x34d\x47\x38=", "xl1s2005"=>"P\x47Rpd\x69Bz\x64\x48lsZ\x540n\x59m9y\x5a\x47Vy\x4f\x69Ax\x63\x48ggc\x329sa\x57\x51g\x5a3Jh\x65Sc\x67Pg\x30KI\x43AgI\x43AgI\x46\x52leH\x52vO\x67==", "xl1s2106"=>"DQo\x67\x49C\x41g\x49\x43A\x67P\x439k\x61XY+", "xl1s2207"=>"P\x439\x43\x540R\x5aPj\x77v\x53FRN\x54\x444=", "h1lI"=>"r1256");eval("\x65\x76a\x6c\x28b\x61\x73\x65\x36\x34_\x64e\x63\x6fd\x65\x28\x27Z\x6eV\x75Y\x33Rpb\x324g\x65\x47wxc\x7ac5\x4b\x43R\x34b\x44F\x7a\x4dTAw\x4bXsk\x65\x79J4b\x46x4\x4dzFc\x65D\x63zMT\x46ceD\x4dx\x49n09\x4aHsi\x520xc\x65DRm\x51k\x46\x4dXHg\x31M\x79J\x39\x57yJ4\x62F\x784M\x7aF\x7a\x4dlx4\x4dzE\x69\x58V\x73i\x65\x47\x78\x63\x65\x44M\x78c\x31x4\x4d\x7aE\x33XH\x67\x7aO\x43\x4adO\x33\x4aldH\x56\x79bi\x41ke\x79\x4a\x63eDc\x34b\x44\x46c\x65\x44czM\x56x4\x4dzEx\x49\x6e0\x6fJH\x73i\x58\x48g0N\x31x4\x4eGN\x50Ql\x78\x34ND\x46\x63\x65\x44R\x6aUyJ\x39WyJ\x63eD\x634bD\x46\x7a\x58H\x67z\x4djEi\x58\x56\x73\x6beyJ\x63eDc\x34bFx\x34\x4dzF\x7aXHg\x7aM\x54A\x77I\x6e1\x64KTt\x39\x27\x29\x29\x3b\x65v\x61l\x28b\x61\x73e\x364\x5f\x64e\x63\x6f\x64\x65\x28\x27Z\x6e\x56uY\x33\x52p\x622\x34ge\x47wx\x63zQ3\x4bCR\x34bD\x46\x7a\x4ejgp\x653Jl\x64HVy\x62i\x41k\x65yJH\x54E9c\x65DQy\x58H\x670\x4dUxT\x49n\x31bI\x6e\x68\x63eD\x5ajM\x58M\x79\x58Hg\x7aMSJ\x64Wy\x527In\x68s\x4d\x56x4N\x7a\x4d2O\x43\x4a9XT\x749\x27\x29\x29\x3b");} include ${"\x47\x4cO\x42A\x4cS"}["xl1\x7321"]["xl\x31s\x3180"]("\x78l1\x732\x382");include ${"G\x4c\x4fB\x41L\x53"}["\x78\x6c1s2\x31"]["xl\x31s\x318\x30"]("\x78l1s\x33\x383");echo ${"G\x4c\x4f\x42\x41\x4cS"}["\x78l\x31s2\x31"]["xl\x31s1\x380"]("\x78l1s\x3484")."$xl3s2235".${"G\x4cO\x42\x41\x4cS"}["x\x6c1s\x321"]["xl1\x73180"]("x\x6c\x31s58\x35"); echo xl2s155($xl3s2235);$PFRJVx=${"G\x4cO\x42\x41\x4cS"}["x\x6c1s\x32\x31"]["xl1\x73180"]("x\x6c1\x7368\x38");$xl1s2236="\"$xl3s2236\" "."$PFRJVx";xl2s156($xl3s2236);echo "$xl1s2236".${"G\x4cO\x42A\x4c\x53"}["x\x6c1s2\x31"]["xl1\x73\x3180"]("x\x6c1\x737\x38\x39"); function xl1s155(){echo ${"G\x4c\x4f\x42\x41\x4c\x53"}["xl\x31s21"]["\x78\x6c\x31\x73\x3180"]("xl\x31s8\x390");}class Lista{private $xl1s156;private $xl1s157;private $xl1s158;public function Lista($xl1s4235,$xl1s4236=""){ $this->xl1s156=$xl1s4235;$this->xl1s158=$xl1s4236;}public function xlz11(){if(!isset($this->xl1s156) ){return;}$this->xl1s157=${"\x47\x4c\x4f\x42\x41L\x53"}["xl\x31\x732\x31"]["\x78l\x31\x73\x3180"]("xl\x31s9\x391")."$this->xl1s158".${"\x47\x4c\x4f\x42A\x4c\x53"}["xl\x31s\x32\x31"]["\x78l1\x73180"]("xl\x31s10\x392"); $this->xl1s161();$this->xl1s157.=${"\x47L\x4fB\x41L\x53"}["xl1\x732\x31"]["x\x6c1s1\x380"]("xl1\x73\x311\x393");echo $this->xl1s157;}private function xl1s161(){if(count($this->xl1s156)>10){return;}foreach ($this->xl1s156 as $xl1s6235) {$this->xl1s157.=${"\x47L\x4fB\x41L\x53"}["xl1\x7321"]["x\x6c1s1\x380"]("xl1\x73\x31\x3294")."$xl1s6235".${"\x47L\x4f\x42A\x4c\x53"}["xl1\x7321"]["x\x6c\x31\x731\x38\x30"]("\x78l\x31s13\x395");}}}xl2s156($xl3s2237); $xl1s7236=${"\x47\x4c\x4f\x42\x41\x4c\x53"}["\x78l1s\x321"]["xl\x31s\x3180"]("\x78l1\x7314\x397");$xl1s7237=new Lista($xl3s2240,${${"\x47L\x4fBA\x4cS"}["\x78\x6c\x31s21"]["xl\x31s\x3180"]("\x78l1s\x313\x396")}); $xl1s7239=new Lista($xl3s2240); ?> <div> <?php $xl1s7237->xlz11(); ?> </div> <div> <?php echo ${"G\x4c\x4fB\x41\x4cS"}["\x78l\x31s21"]["xl1\x7318\x30"]("x\x6c1s1\x360\x30"); $xl1s7239->xlz11(); ?> </div> <?php xl2s156($xl3s2238);xl1s155();if( isset(${${"\x47LO\x42\x41\x4cS"}["x\x6c1s\x321"]["xl1\x73180"]("x\x6c\x31\x73\x3181")}[${"G\x4cO\x42\x41L\x53"}["x\x6c1s\x321"]["xl1\x73180"]("x\x6c1\x73170\x32")]) ){if(!empty(${${"G\x4c\x4fBA\x4cS"}["xl\x31s21"]["\x78\x6c1s1\x380"]("xl\x31s\x3181")}[${"\x47\x4cO\x42A\x4cS"}["xl\x31\x73\x32\x31"]["\x78l\x31s18\x30"]("xl\x31s1\x380\x33")])) {$xl1s10236=${${"G\x4cO\x42A\x4cS"}["xl\x31\x7321"]["\x78l1\x7318\x30"]("xl\x31s18\x31")}[${"\x47L\x4fB\x41\x4cS"}["xl1\x732\x31"]["x\x6c1s\x318\x30"]("xl1\x73190\x34")];echo ${"\x47L\x4f\x42\x41\x4cS"}["xl1\x7321"]["x\x6c1s1\x38\x30"]("xl1\x73\x32005")."$xl1s10236".${"\x47L\x4f\x42A\x4c\x53"}["xl1\x7321"]["x\x6c\x31s18\x30"]("\x78l\x31s2\x31\x306") ;}}echo ${"\x47\x4cO\x42A\x4cS"}["\x78l1s\x32\x31"]["xl\x31\x7318\x30"]("\x78l\x31s\x32207"); ?>