3v4l.org

run code in 300+ PHP versions simultaneously
<?php var_dump( unserialize(gzuncompress(base64_decode(' eJxLtDK0qi62MrFSKi1OLVKyLrYytlJydHJRsq4FAG93B7g= '))) );
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/0l22W
function name:  (null)
number of ops:  13
compiled vars:  none
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    2     0  E >   INIT_FCALL                                               'var_dump'
    3     1        INIT_FCALL                                               'unserialize'
          2        INIT_FCALL                                               'gzuncompress'
          3        INIT_FCALL                                               'base64_decode'
          4        SEND_VAL                                                 '%0A%0AeJxLtDK0qi62MrFSKi1OLVKyLrYytlJydHJRsq4FAG93B7g%3D%0A%0A'
          5        DO_ICALL                                         $0      
          6        SEND_VAR                                                 $0
          7        DO_ICALL                                         $1      
          8        SEND_VAR                                                 $1
          9        DO_ICALL                                         $2      
         10        SEND_VAR                                                 $2
         11        DO_ICALL                                                 
    8    12      > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
157.28 ms | 1394 KiB | 21 Q