3v4l.org

run code in 300+ PHP versions simultaneously
<?php $t = '26%7CaU0qPfB4CCAOFIxzW9F5KA%3D%3D%7CAi6ivHQUFe9lwMc1a0tVmGJNHWFd%2BVafbvsRic5iL2LE3Bh72665IZ1vDTwdKEV3%7Cb6M4oPHIy8m4KwnoveOoiQqXbFgoGc3wX261BRuOwsk%3D'; $t = base64_decode($t); echo unserialize($t);
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/7XJdU
function name:  (null)
number of ops:  10
compiled vars:  !0 = $t
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    2     0  E >   ASSIGN                                                   !0, '26%257CaU0qPfB4CCAOFIxzW9F5KA%253D%253D%257CAi6ivHQUFe9lwMc1a0tVmGJNHWFd%252BVafbvsRic5iL2LE3Bh72665IZ1vDTwdKEV3%257Cb6M4oPHIy8m4KwnoveOoiQqXbFgoGc3wX261BRuOwsk%253D'
    4     1        INIT_FCALL                                               'base64_decode'
          2        SEND_VAR                                                 !0
          3        DO_ICALL                                         $2      
          4        ASSIGN                                                   !0, $2
    5     5        INIT_FCALL                                               'unserialize'
          6        SEND_VAR                                                 !0
          7        DO_ICALL                                         $4      
          8        ECHO                                                     $4
          9      > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
282.18 ms | 1394 KiB | 18 Q