Finding entry points Branch analysis from position: 0 1 jumps found. (Code = 62) Position 1 = -2 filename: /in/GkSIA function name: (null) number of ops: 104 compiled vars: !0 = $buyer_email, !1 = $buyer_lastname, !2 = $buyer_message, !3 = $buyer_name, !4 = $buyer_phone, !5 = $country_id, !6 = $error_url, !7 = $header_image, !8 = $item_ammount_1, !9 = $item_code_1, !10 = $item_currency_1, !11 = $item_name_1, !12 = $item_quantity_1, !13 = $merchant, !14 = $ok_url, !15 = $payment_method_available, !16 = $transaction_id, !17 = $concatenar line #* E I O op fetch ext return operands ------------------------------------------------------------------------------------- 30 0 E > INIT_FCALL 'urlencodechar' 1 SEND_VAL 'WrathBRL%40zmail.blizzard.com' 2 DO_FCALL 0 $18 3 ASSIGN !0, $18 31 4 INIT_FCALL 'urlencodechar' 5 SEND_VAL 'Wing' 6 DO_FCALL 0 $20 7 ASSIGN !1, $20 32 8 INIT_FCALL 'urlencodechar' 9 SEND_VAL '0' 10 DO_FCALL 0 $22 11 ASSIGN !2, $22 33 12 INIT_FCALL 'urlencodechar' 13 SEND_VAL 'Death' 14 DO_FCALL 0 $24 15 ASSIGN !3, $24 34 16 INIT_FCALL 'urlencodechar' 17 SEND_VAL '800123123123' 18 DO_FCALL 0 $26 19 ASSIGN !4, $26 35 20 INIT_FCALL 'urlencodechar' 21 SEND_VAL '2' 22 DO_FCALL 0 $28 23 ASSIGN !5, $28 36 24 INIT_FCALL 'urlencodechar' 25 SEND_VAL 'https%3A%2F%2Fus.battle.net%2Faccount%2Fmanagement%2Fpayment%2Foffsite-payment-landing.html%3Fresult%3Dfail%26method%3Ddinero_mail%26regionId%3D1%26orderId%3D163692109' 26 DO_FCALL 0 $30 27 ASSIGN !6, $30 37 28 INIT_FCALL 'urlencodechar' 29 SEND_VAL '' 30 DO_FCALL 0 $32 31 ASSIGN !7, $32 38 32 INIT_FCALL 'urlencodechar' 33 SEND_VAL '10.00' 34 DO_FCALL 0 $34 35 ASSIGN !8, $34 39 36 INIT_FCALL 'urlencodechar' 37 SEND_VAL '11000019191000002369' 38 DO_FCALL 0 $36 39 ASSIGN !9, $36 40 40 INIT_FCALL 'urlencodechar' 41 SEND_VAL 'BRL' 42 DO_FCALL 0 $38 43 ASSIGN !10, $38 41 44 INIT_FCALL 'urlencodechar' 45 SEND_VAL 'Balance+Load' 46 DO_FCALL 0 $40 47 ASSIGN !11, $40 42 48 INIT_FCALL 'urlencodechar' 49 SEND_VAL '1' 50 DO_FCALL 0 $42 51 ASSIGN !12, $42 43 52 INIT_FCALL 'urlencodechar' 53 SEND_VAL 'D6B8F807-0911-4E7F-8E1F-59674A7EC971' 54 DO_FCALL 0 $44 55 ASSIGN !13, $44 44 56 INIT_FCALL 'urlencodechar' 57 SEND_VAL 'https%3A%2F%2Fus.battle.net%2Faccount%2Fmanagement%2Fpayment%2Foffsite-payment-landing.html%3Fresult%3Dsuccess%26method%3Ddinero_mail%26regionId%3D1%26orderId%3D163676383' 58 DO_FCALL 0 $46 59 ASSIGN !14, $46 45 60 INIT_FCALL 'urlencodechar' 61 SEND_VAL 'all' 62 DO_FCALL 0 $48 63 ASSIGN !15, $48 46 64 INIT_FCALL 'urlencodechar' 65 SEND_VAL 'KTGSHG' 66 DO_FCALL 0 $50 67 ASSIGN !16, $50 48 68 CONCAT ~52 '%26buyer_email%3D', !0 69 ASSIGN_OP 8 !17, ~52 49 70 CONCAT ~54 '%26buyer_lastname%3D', !1 71 ASSIGN_OP 8 !17, ~54 50 72 CONCAT ~56 '%26buyer_message%3D', !2 73 ASSIGN_OP 8 !17, ~56 51 74 CONCAT ~58 '%26buyer_name%3D', !3 75 ASSIGN_OP 8 !17, ~58 52 76 CONCAT ~60 '%26buyer_phone%3D', !4 77 ASSIGN_OP 8 !17, ~60 53 78 CONCAT ~62 '%26country_id%3D', !5 79 ASSIGN_OP 8 !17, ~62 54 80 CONCAT ~64 '%26error_url%3D', !6 81 ASSIGN_OP 8 !17, ~64 55 82 CONCAT ~66 '%26header_image%3D', !7 83 ASSIGN_OP 8 !17, ~66 56 84 CONCAT ~68 '%26item_ammount_1%3D', !8 85 ASSIGN_OP 8 !17, ~68 57 86 CONCAT ~70 '%26item_code_1%3D', !9 87 ASSIGN_OP 8 !17, ~70 58 88 CONCAT ~72 '%26item_currency_1%3D', !10 89 ASSIGN_OP 8 !17, ~72 59 90 CONCAT ~74 '%26item_name_1%3D', !11 91 ASSIGN_OP 8 !17, ~74 60 92 CONCAT ~76 '%26item_quantity_1%3D', !12 93 ASSIGN_OP 8 !17, ~76 61 94 CONCAT ~78 '%26merchant%3D', !13 95 ASSIGN_OP 8 !17, ~78 62 96 CONCAT ~80 '%26ok_url%3D', !14 97 ASSIGN_OP 8 !17, ~80 63 98 CONCAT ~82 '%26payment_method_available%3D', !15 99 ASSIGN_OP 8 !17, ~82 64 100 CONCAT ~84 '%26Transaction_id%3D', !16 101 ASSIGN_OP 8 !17, ~84 69 102 ECHO !17 71 103 > RETURN 1 Function urlencodechar: Finding entry points Branch analysis from position: 0 1 jumps found. (Code = 42) Position 1 = 34 Branch analysis from position: 34 2 jumps found. (Code = 44) Position 1 = 36, Position 2 = 6 Branch analysis from position: 36 1 jumps found. (Code = 62) Position 1 = -2 Branch analysis from position: 6 2 jumps found. (Code = 43) Position 1 = 14, Position 2 = 16 Branch analysis from position: 14 1 jumps found. (Code = 42) Position 1 = 20 Branch analysis from position: 20 2 jumps found. (Code = 43) Position 1 = 26, Position 2 = 28 Branch analysis from position: 26 1 jumps found. (Code = 42) Position 1 = 33 Branch analysis from position: 33 2 jumps found. (Code = 44) Position 1 = 36, Position 2 = 6 Branch analysis from position: 36 Branch analysis from position: 6 Branch analysis from position: 28 2 jumps found. (Code = 44) Position 1 = 36, Position 2 = 6 Branch analysis from position: 36 Branch analysis from position: 6 Branch analysis from position: 16 2 jumps found. (Code = 43) Position 1 = 26, Position 2 = 28 Branch analysis from position: 26 Branch analysis from position: 28 filename: /in/GkSIA function name: urlencodechar number of ops: 38 compiled vars: !0 = $str, !1 = $newstrencode, !2 = $countstr, !3 = $i, !4 = $newstr, !5 = $strencode, !6 = $newstrencodeaux line #* E I O op fetch ext return operands ------------------------------------------------------------------------------------- 7 0 E > RECV !0 8 1 ASSIGN !1, '' 9 2 STRLEN ~8 !0 3 ASSIGN !2, ~8 10 4 ASSIGN !3, 0 5 > JMP ->34 11 6 > INIT_FCALL 'substr' 7 SEND_VAR !0 8 SEND_VAR !3 9 SEND_VAL 1 10 DO_ICALL $11 11 ASSIGN !4, $11 12 12 IS_EQUAL !4, '+' 13 > JMPZ ~13, ->16 13 14 > ASSIGN !5, '%2520' 15 > JMP ->20 16 16 > INIT_FCALL 'urlencode' 17 SEND_VAR !4 18 DO_ICALL $15 19 ASSIGN !5, $15 18 20 > INIT_FCALL 'substr_count' 21 SEND_VAR !5 22 SEND_VAL '%25' 23 DO_ICALL $17 24 IS_EQUAL $17, 0 25 > JMPZ ~18, ->28 19 26 > ASSIGN_OP 8 !1, !5 27 > JMP ->33 22 28 > INIT_FCALL 'strtolower' 29 SEND_VAR !5 30 DO_ICALL $20 31 ASSIGN !6, $20 23 32 ASSIGN_OP 8 !1, !6 10 33 > PRE_INC !3 34 > IS_SMALLER !3, !2 35 > JMPNZ ~24, ->6 27 36 > > RETURN !1 28 37* > RETURN null End of function urlencodechar
Generated using Vulcan Logic Dumper, using php 8.0.0