Finding entry points Branch analysis from position: 0 1 jumps found. (Code = 42) Position 1 = 21 Branch analysis from position: 21 2 jumps found. (Code = 44) Position 1 = 23, Position 2 = 18 Branch analysis from position: 23 1 jumps found. (Code = 62) Position 1 = -2 Branch analysis from position: 18 2 jumps found. (Code = 44) Position 1 = 23, Position 2 = 18 Branch analysis from position: 23 Branch analysis from position: 18 filename: /in/EIqv0 function name: (null) number of ops: 50 compiled vars: !0 = $browser, !1 = $handle, !2 = $im, !3 = $rawBytes line #* E I O op fetch ext return operands ------------------------------------------------------------------------------------- 3 0 E > NEW $4 'COM' 1 SEND_VAL_EX 'InternetExplorer.Application' 2 DO_FCALL 0 3 ASSIGN !0, $4 4 4 FETCH_OBJ_R ~7 !0, 'HWND' 5 ASSIGN !1, ~7 5 6 ASSIGN_OBJ !0, 'Visible' 7 OP_DATA <true> 6 8 ASSIGN_OBJ !0, 'Width' 9 OP_DATA 800 7 10 ASSIGN_OBJ !0, 'Height' 11 OP_DATA 3000 8 12 ASSIGN_OBJ !0, 'Resizable' 13 OP_DATA <false> 9 14 INIT_METHOD_CALL !0, 'Navigate' 15 SEND_VAL_EX 'http%3A%2F%2Fsurrenderat20.net' 16 DO_FCALL 0 11 17 > JMP ->21 12 18 > INIT_FCALL_BY_NAME 'com_message_pump' 19 SEND_VAL_EX 4000 20 DO_FCALL 0 11 21 > FETCH_OBJ_R ~15 !0, 'Busy' 22 > JMPNZ ~15, ->18 15 23 > INIT_FCALL 'ob_start' 24 DO_ICALL 17 25 INIT_FCALL_BY_NAME 'imagegrabwindow' 26 SEND_VAR_EX !1 27 SEND_VAL_EX 0 28 DO_FCALL 0 $17 29 ASSIGN !2, $17 18 30 INIT_FCALL_BY_NAME 'imagejpeg' 31 SEND_VAR_EX !2 32 SEND_VAL_EX null 33 SEND_VAL_EX 100 34 DO_FCALL 0 19 35 INIT_FCALL 'ob_get_clean' 36 DO_ICALL $20 37 ASSIGN !3, $20 21 38 INIT_FCALL 'base64_encode' 39 SEND_VAR !3 40 DO_ICALL $22 41 CONCAT ~23 '%3Cdiv+id%3D%27screenshot%27%3E%3Cimg+src%3D%27data%3Aimages%2Fjpeg%3Bbase64%2C', $22 42 CONCAT ~24 ~23, '%27%2F%3E%3C%2Fdiv%3E' 43 ECHO ~24 23 44 INIT_METHOD_CALL !0, 'Quit' 45 DO_FCALL 0 24 46 INIT_FCALL_BY_NAME 'imagedestroy' 47 SEND_VAR_EX !2 48 DO_FCALL 0 49 > RETURN 1
Generated using Vulcan Logic Dumper, using php 8.0.0