Finding entry points Branch analysis from position: 0 2 jumps found. (Code = 77) Position 1 = 10, Position 2 = 47 Branch analysis from position: 10 2 jumps found. (Code = 78) Position 1 = 11, Position 2 = 47 Branch analysis from position: 11 2 jumps found. (Code = 43) Position 1 = 14, Position 2 = 46 Branch analysis from position: 14 2 jumps found. (Code = 43) Position 1 = 21, Position 2 = 22 Branch analysis from position: 21 1 jumps found. (Code = 42) Position 1 = 29 Branch analysis from position: 29 2 jumps found. (Code = 43) Position 1 = 33, Position 2 = 35 Branch analysis from position: 33 1 jumps found. (Code = 42) Position 1 = 36 Branch analysis from position: 36 1 jumps found. (Code = 42) Position 1 = 10 Branch analysis from position: 10 Branch analysis from position: 35 1 jumps found. (Code = 42) Position 1 = 10 Branch analysis from position: 10 Branch analysis from position: 22 2 jumps found. (Code = 43) Position 1 = 27, Position 2 = 28 Branch analysis from position: 27 1 jumps found. (Code = 42) Position 1 = 29 Branch analysis from position: 29 Branch analysis from position: 28 2 jumps found. (Code = 43) Position 1 = 33, Position 2 = 35 Branch analysis from position: 33 Branch analysis from position: 35 Branch analysis from position: 46 Branch analysis from position: 47 1 jumps found. (Code = 62) Position 1 = -2 Branch analysis from position: 47 filename: /in/ATE7f function name: (null) number of ops: 50 compiled vars: !0 = $reg_exUrl, !1 = $text, !2 = $matches, !3 = $usedPatterns, !4 = $pattern, !5 = $start line #* E I O op fetch ext return operands ------------------------------------------------------------------------------------- 2 0 E > ASSIGN !0, '%2F%28%28http%7Chttps%29%5C%3A%5C%2F%5C%2F%7C%28www%29%5C.%29%5Ba-zA-Z0-9%5C-%5C.%5D%2B%5C.%5Ba-zA-Z%5D%7B2%2C3%7D%28%5C%2F%5CS%2A%29%3F%2F' 3 1 ASSIGN !1, 'some+text+http%3A%2F%2Fgoogle.bg%2F' 4 2 INIT_FCALL 'preg_match_all' 3 SEND_VAR !0 4 SEND_VAR !1 5 SEND_REF !2 6 DO_ICALL 5 7 ASSIGN !3, <array> 6 8 FETCH_DIM_R ~10 !2, 0 9 > FE_RESET_R $11 ~10, ->47 10 > > FE_FETCH_R $11, !4, ->47 7 11 > ARRAY_KEY_EXISTS ~12 !4, !3 12 BOOL_NOT ~13 ~12 13 > JMPZ ~13, ->46 9 14 > ASSIGN_DIM !3, !4 15 OP_DATA <true> 10 16 INIT_FCALL 'preg_match' 17 SEND_VAL '%25https%3A%2F%2F%25' 18 SEND_VAR !4 19 DO_ICALL $15 20 > JMPZ $15, ->22 11 21 > > JMP ->29 14 22 > INIT_FCALL 'preg_match' 23 SEND_VAL '%25http%3A%2F%2F%25' 24 SEND_VAR !4 25 DO_ICALL $16 26 > JMPZ $16, ->28 15 27 > > JMP ->29 20 28 > ASSIGN !5, 'http%3A%2F%2F' 23 29 > INIT_FCALL 'str_replace' 30 SEND_VAR !4 31 ISSET_ISEMPTY_CV !5 32 > JMPZ ~18, ->35 33 > QM_ASSIGN ~19 !5 34 > JMP ->36 35 > QM_ASSIGN ~19 '' 36 > CONCAT ~20 '%3Ca+href%3D%27', ~19 37 ROPE_INIT 4 ~22 !4 38 ROPE_ADD 1 ~22 ~22, '%27+target%3D%27_blank%27%3E' 39 ROPE_ADD 2 ~22 ~22, !4 40 ROPE_END 3 ~21 ~22, '%3C%2Fa%3E+' 41 CONCAT ~24 ~20, ~21 42 SEND_VAL ~24 43 SEND_VAR !1 44 DO_ICALL $25 45 ASSIGN !1, $25 6 46 > > JMP ->10 47 > FE_FREE $11 26 48 ECHO !1 49 > RETURN 1
Generated using Vulcan Logic Dumper, using php 8.0.0