ˆI;iÑë!dx;;iôx½„Ö­Accept-Encoding,User-AgentÔT øuÄ(rô€c.N¨„ KEY: http://avaliareassessoria.com.br/Ven-C404/root/proc/3/cwd/usr/local/maldetect.bk512/maldetect.bk1128/internals/panel_alert.etpl HTTP/1.1 200 OK Date: Thu, 11 Dec 2025 21:45:28 GMT Server: Apache Last-Modified: Mon, 27 Mar 2023 19:17:37 GMT Accept-Ranges: bytes Content-Length: 2172 Vary: Accept-Encoding,User-Agent Connection: close if [ -z "$type" ]; then type=scan fi cat >> $tmpf <> $tmpf fi if [ "$days" ] && [ ! "$days" == "all" ]; then echo "RANGE: $days days" >> $tmpf fi cat >> $tmpf <> $tmpf echo "To enable, set quarantine_hits=1 and/or to quarantine hits from this scan run:" >> $tmpf echo -e "/usr/local/sbin/maldet -q $datestamp.$$\n" >> $tmpf elif [ "$quarantine_hits" == "1" ]; then echo "NOTICE: Automatic quarantine is enabled, and all detected threats have been quarantined." >> $tmpf echo "All quarantined files have been moved to $quardir, and their metadata have been preserved." >> $tmpf echo "Please see below for details on which files have been moved to quarantine." >> $tmpf fi if [ "$quarantine_clean" == "1" ]; then if [ "$type" == "scan" ] && [ -f "$sessdir/clean.$$" ] && [ ! -z "$(cat $sessdir/clean.$$)" ]; then cleaned_list="$sessdir/clean.$$" fi if [ -f "$cleaned_list" ]; then cat >> $tmpf <> $tmpf <> $tmpf if [ "$coltest" ]; then cat $hitlist_file | column -s ':' -t -o ':' >> $tmpf else cat $hitlist_file >> $tmpf fi fi fi cat >> $tmpf < EOF