The PHP encryption is to use what tool.

A set of source code, there are several file is encrypted.
%%JW3ACZeY7OpF7v7yhWmVhH9a9x5uTMDAvFzQcYQhvmJ21kT2u9ZQHgaaVjGsbubIetC0ZPst6yxSm

+clzG7JPFo34vf4eIHd1qkobVmrhwWC3mjUmOLSyNaoVHVh55wUA7CC1ULA2Zm1VkaYEWVreFFct8YK6O2sOjPW3eUo9FkO

+2LXWeqVjEcM3b5Jcpg155Ir181idabbBpeLg8JwhRa85KoLMxkKcT/osZu1jEX2kH7Dfh

+rfFYZyaJAZLvrYpUJahmiY1ihbU1ixioKpf177BfK8Nv2gLmxvPSLUbcqlDuNF3ShGYj

+78g3r9vTp7pmIVqAq14OrUFOaBNZa1mXOxWtSu356P/mNC4f0vuz5XHQNNgjthYGHJP0X7LuhrtvT0TlQmj0fbQDGP8S8s5tvjQEy3d57eA

+wp4GK71Ig85o2JxJUeg+Vli/WGJfd6C4bxlaHtlmBcviB6OAJgRkKKfDBTR

+J475QaTqIQxMmoJgMkAtZnboJK3/U5J44BbqqU2twvQxyyH1BBeH8WctkM/S7bL3Fz8JwHvJv8AhdsGoAZhZQFj7CX4SK5J0D9CyYdeok/bTHbR9pp

ruhs5H/eCt54BbfLVwchbaZFAxr9U1Fk8geBA/qZ1/Zwt8AfY0moU52JxZ/bj2e9/7YokANYs9/WXeRsqRkdeM5qAzh9Wj9tn3UpOzRYHzq

+20eCKtL4dzRVQJwX73Ts+not78hN3yGCvxd/CerQ0ubOHMDI2s3F6LBmKngj5SNglBmkcCnykBezEmrkPQ

+cbjXhMVD1A8QxgdHN4WaccrFyXJ2X2yFyQzBzR0tc9LlVrBODza0fPMu+x0tSHm/i8ZvX0THB+

+dudiQVKsQEbMvJaPHDcoViD4lstYUdfgeezTXAXXpP/c1kXu3Y7NOp0mxeDo2xTOHdTawELcOSPu0qsCYrQV1ZGdY1+FOgCyvdYw/vbacbVsxJuR9X

ztQNbxkeJGjhRrXS0Xt4lyve+HF3yuYx1LXXbR2HtYI+y+BHgV3R+DqA3Q+YAmCg5RtumJS3DcgYfXdltHTVxNrkClzx

+4M8QmPUnw61syFHHdFk9pKPbGWOzQguXR72edjoreWh9XiRuqrlMlIJK9UVfDt7dOZQ/6+xtiJlGYsnkEpdlLDEPW2biTYMZ9X78AesGMhN4/OIYS

+tLf9LeAtzf82PErIduCWmQ7MwFR

+LcGROwhFpPZwxKvjnNTmIiYQHE12HxuIr0ogIghCknjao4+cfK4krOFLrYAX8KIVYwcy5XxMSXFYiNcwqS4LXXapF

+SLqFTxeFiW8xhpYL2dGl8NsoHGUzv34bUsKhGqtLkzvMschLM/Nv3MHGxoC07mW2PtsSVt7GocjSOgxUrGN1+KdP0I5TiTldxJNeFQxk

+dryMvS4zOT4xZoh/oM9PRiJNjbKKuKnEHW1S4cYdbaTpajWsfkjWsMw9+Iaiz5K+363QQcd3y+Z+XQ4ir

+JLCsROPAEKulDnppHUXShf6oOk7IoMUla+TsCEqZZEhmW30zIa4uD/I2f0hOGkFYANeX

+IlgVB8chdhx86EUJ7BHjA4IWsB4efLm3QrT9VAgRFSe4wym8O3wYLfZ7CY1h1ZiK5aamowvfJ6ExMCBc6D7YLsxoxejsnmU6urnPFBsQ

+9LoQ6CYBocVL8oY5pBJ2gpZYpVJZJoEjx9604h1B8wKTa7VJb+SlSuJ7p3IiCQzdGYe37dJswGO3zBd5yKgs6ZeQYC3bk7pxqtd1B

+mNIMa1Xdll7/

+vDZuDOXG6jU1CVQFoU1wkcgi7/rgj5A7FFez2FZBviCIDetciRj9DKQdyAmVl7KHXaKclNKfbexdWS3cDgZrHjnmv5XP4pkVRRwwhYIm/AUXh4gZBj

gprGa4XMa+fH46jYSJv4YHVeOFI4nY8xheHFQgcF06nzB94pzXCiRJGS15QO+4IjfbX57fm4eXpP4ReF+1Ntaf0W2FJc6ErIxn6PtqnQqCckW1yC

+d8MwvDfHmB1qkiZ6/SX5eBEhxbSx15/TmQzUz3odn8w69gbEM34Z8MYIoWdAFyl4k0x9IX1uLUMxyZ64A07ozzTVXQTst7g8Q4UgNPsq9S36UowyEf

wJDNxU8yOj+ByQLOMS1M9+pllKTkAotQPqCWLqK23LIec2LoakxCOtxFLdr0A

+F4IUxyY5fyMNxR/98VnUN2UN/tACjduD29KT4eRsohsxwGaYxXEnud4ytNrwG61U

+euQWJy7JzmDfWhmrkjfHmZXztOu6FNYjWR1/q2eKV/3zFzAod7yzr8/Gh559gy/OCTQW

+Ek3wazbHkWkdOpV8pfqzqxUmAzgyFJmCVP6IiT/rg3kJqjh6Nr8o6EvOZvzQcjg

+kjOSMwWPfODvJrRQyYnM/x9yp8ut8WRTyEWyT1bScKHnLKCM3JzjPb3t2Sje23zhWMK1hmBjFBMEtkiK/qfOcJBDljis/RsxAD3Yx34lOIIvTvALRc

Nwl56sLq21QSzDXNWzm3u0wjLTtlTzvpFDW9227ooozZ/H5opGaIKkE08tdLG0XNXdAroPKvyiIMUZHNrO7oxDwdbV

+kzsjffARtztvwOPfmDyMX0P9HkP9PB+BPQcqyk0zwMgOp

+UG7mIrROu8UOYtjzJZ9VVXsMWRFUf77O3f0avAryEquss6bOjfm4eNO0rntW7ALwCAZlt3H5Y/Z5f2CSYHLS7aPSg/r/qhgAdVAtiXOJ

+ObMr//Sx7L1Qm2uBs9dgzJujduh61s5AjAQ1c7jL+HRZlbqEU73BnATXB2ibo6SL+eoBGRnpfFn

+9gO1k1VoDwbtKitIAQw9PGw1+JhbpGr6Xd2/aSmi0xmAme9wKxA

+33fdNFbJLzWhGTPZZ/G6T9aQUz5CqGQewnfo1YZHPLdN3j6Ud8Wf6zLk5PtgXywOvm55OUT2VWpHHfTXezACLSqVXb

+dYpHvTm3kQi1uZWOgvBCaUKaF2aajOxc/h6+eogRkEU7bZUKc9aJw6uD/VZGMnnb9xrDIob5XETkn1GE8ivC5D4NwKbDkI6ivgagUgYHP1+YcFXDe5

9V3646dqqSwq6SZ8Gke1Ofmltb3XI132Qxd3qRBRTThAMSDBGdVGT50S4S0SE

+XYYTiuy3bVbcwoCEwPnuqdpKF3X5I7Xr6W0DqLnf0pv2ThLTsCw5bPL7mdEoqBvFLzNoM

+9YFCTyJ150iPlUuOfSJbepA2WTuLgz4kxDehwKqfJqj/ZXkvF7Gbqud0ZhbvLZ6EUBi7H0T

+dYhXZapYbvxo///jwvgVrAB4jLU0SEleEk/ttvOpnOgPsYP1Ak/2si1OTJStAFjhD4sxeOvjt3YOLIWFOypCGWaS3NCLSLDfTaCvLscDRNpfuSe8m9

woX7u0YDY/LRqIM9+yjNLmmzzB2Q0VLHNv8H6YRUm00G93eV28y1LhtRU12kqqehU30QQp6U9knPcjrjRwMAePLQnV2kEBDqQ


Ask the master what is this encryption ah, what is needed to run PHP components, Zend acceleration component seems not.

Started by Miriam at November 02, 2016 - 12:41 AM

Look from the surface, like a layer of base64. But this is only the encrypted text, see the installation documentation procedures, there should be a description of the. If no special instructions, then certainly own decryption program

Posted by Abel at November 17, 2016 - 1:06 AM


We need to find out decryption code.!
Find a hair to see Kazakhstan

Posted by Anita at November 19, 2016 - 1:56 AM

You have a key to unlock. Go online to find the brute force of software.

Posted by Henry at November 25, 2016 - 2:46 AM

See what files into his, should be able to crack.

Posted by Sammy at December 03, 2016 - 3:27 AM

This looks like a Base64
If it is in the source code to a part of it, the decoding part must be in a source file

Posted by Evan at December 17, 2016 - 3:35 AM

zend

Posted by Louisa at December 27, 2016 - 3:38 AM