Finding entry points
Branch analysis from position: 0
2 jumps found. (Code = 43) Position 1 = 5, Position 2 = 20
Branch analysis from position: 5
1 jumps found. (Code = 42) Position 1 = 21
Branch analysis from position: 21
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 20
1 jumps found. (Code = 62) Position 1 = -2
filename: /in/Is24j
function name: (null)
number of ops: 59
compiled vars: !0 = $plaintext, !1 = $salt
line #* E I O op fetch ext return operands
-------------------------------------------------------------------------------------
40 0 E > ASSIGN !0, 'mySuperSecretPassword'
42 1 INIT_FCALL 'function_exists'
2 SEND_VAL 'random_bytes'
3 DO_ICALL $3
4 > JMPZ $3, ->20
44 5 > INIT_FCALL 'substr'
6 INIT_FCALL 'md5'
7 INIT_FCALL 'random_bytes'
8 SEND_VAL 16
9 DO_ICALL $4
10 SEND_VAR $4
11 DO_ICALL $5
12 SEND_VAR $5
13 SEND_VAL 0
14 SEND_VAL 12
15 DO_ICALL $6
16 CONCAT ~7 '%242%24', $6
17 CONCAT ~8 ~7, '%24'
18 ASSIGN !1, ~8
42 19 > JMP ->21
51 20 > ASSIGN !1, '%242y%2409%24anexampl%24'
54 21 > STRLEN ~11 !1
22 CONCAT ~12 'salt+length+%3D+', ~11
23 CONCAT ~13 ~12, '%0A'
24 ECHO ~13
55 25 INIT_FCALL 'crypt'
26 SEND_VAR !0
27 SEND_VAR !1
28 DO_ICALL $14
29 STRLEN ~15 $14
30 CONCAT ~16 ~15, '%0A'
31 ECHO ~16
56 32 INIT_FCALL 'crypt'
33 SEND_VAL 'U%2AU'
34 SEND_VAL '%242a%24CCCCCCCCCCCCCCCCCCCCC.E5YPO9kmyuRGyh0XouQYb4YMJKvyOeW'
35 DO_ICALL $17
36 CONCAT ~18 $17, '%0A'
37 ECHO ~18
57 38 INIT_FCALL 'crypt'
39 SEND_VAR !0
40 SEND_VAR !1
41 DO_ICALL $19
42 CONCAT ~20 $19, '%0A'
43 ECHO ~20
58 44 INIT_FCALL 'getcryptedpassword'
45 SEND_VAR !0
46 SEND_VAR !1
47 SEND_VAL 'crypt-blowfish'
48 DO_FCALL 0 $21
49 STRLEN ~22 $21
50 CONCAT ~23 ~22, '%0A'
51 ECHO ~23
59 52 INIT_FCALL 'getcryptedpassword'
53 SEND_VAR !0
54 SEND_VAR !1
55 SEND_VAL 'crypt-blowfish'
56 DO_FCALL 0 $24
57 ECHO $24
58 > RETURN 1
Function getcryptedpassword:
Finding entry points
Branch analysis from position: 0
2 jumps found. (Code = 43) Position 1 = 5, Position 2 = 17
Branch analysis from position: 5
1 jumps found. (Code = 42) Position 1 = 37
Branch analysis from position: 37
9 jumps found. (Code = 188) Position 1 = 53, Position 2 = 54, Position 3 = 69, Position 4 = 69, Position 5 = 69, Position 6 = 69, Position 7 = 79, Position 8 = 79, Position 9 = 38
Branch analysis from position: 53
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 54
2 jumps found. (Code = 43) Position 1 = 64, Position 2 = 67
Branch analysis from position: 64
1 jumps found. (Code = 42) Position 1 = 68
Branch analysis from position: 68
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 67
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 69
2 jumps found. (Code = 43) Position 1 = 70, Position 2 = 72
Branch analysis from position: 70
1 jumps found. (Code = 42) Position 1 = 73
Branch analysis from position: 73
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 72
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 69
Branch analysis from position: 69
Branch analysis from position: 69
Branch analysis from position: 79
2 jumps found. (Code = 43) Position 1 = 80, Position 2 = 86
Branch analysis from position: 80
1 jumps found. (Code = 42) Position 1 = 90
Branch analysis from position: 90
2 jumps found. (Code = 43) Position 1 = 92, Position 2 = 95
Branch analysis from position: 92
1 jumps found. (Code = 42) Position 1 = 96
Branch analysis from position: 96
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 95
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 86
2 jumps found. (Code = 43) Position 1 = 92, Position 2 = 95
Branch analysis from position: 92
Branch analysis from position: 95
Branch analysis from position: 79
Branch analysis from position: 38
2 jumps found. (Code = 44) Position 1 = 40, Position 2 = 53
Branch analysis from position: 40
2 jumps found. (Code = 44) Position 1 = 42, Position 2 = 54
Branch analysis from position: 42
2 jumps found. (Code = 44) Position 1 = 44, Position 2 = 69
Branch analysis from position: 44
2 jumps found. (Code = 44) Position 1 = 46, Position 2 = 69
Branch analysis from position: 46
2 jumps found. (Code = 44) Position 1 = 48, Position 2 = 69
Branch analysis from position: 48
2 jumps found. (Code = 44) Position 1 = 50, Position 2 = 69
Branch analysis from position: 50
2 jumps found. (Code = 44) Position 1 = 52, Position 2 = 79
Branch analysis from position: 52
1 jumps found. (Code = 42) Position 1 = 79
Branch analysis from position: 79
Branch analysis from position: 79
Branch analysis from position: 69
Branch analysis from position: 69
Branch analysis from position: 69
Branch analysis from position: 69
Branch analysis from position: 54
Branch analysis from position: 53
Branch analysis from position: 17
2 jumps found. (Code = 43) Position 1 = 21, Position 2 = 36
Branch analysis from position: 21
1 jumps found. (Code = 42) Position 1 = 37
Branch analysis from position: 37
Branch analysis from position: 36
9 jumps found. (Code = 188) Position 1 = 53, Position 2 = 54, Position 3 = 69, Position 4 = 69, Position 5 = 69, Position 6 = 69, Position 7 = 79, Position 8 = 79, Position 9 = 38
Branch analysis from position: 53
Branch analysis from position: 54
Branch analysis from position: 69
Branch analysis from position: 69
Branch analysis from position: 69
Branch analysis from position: 69
Branch analysis from position: 79
Branch analysis from position: 79
Branch analysis from position: 38
filename: /in/Is24j
function name: getCryptedPassword
number of ops: 98
compiled vars: !0 = $plaintext, !1 = $salt, !2 = $encryption, !3 = $show_encrypt, !4 = $encrypted
line #* E I O op fetch ext return operands
-------------------------------------------------------------------------------------
2 0 E > RECV !0
1 RECV_INIT !1 ''
2 RECV_INIT !2 'crypt-blowfish'
3 RECV_INIT !3 <false>
5 4 > JMPZ !1, ->17
7 5 > INIT_FCALL 'substr'
6 INIT_FCALL 'preg_replace'
7 SEND_VAL '%7C%5E%7Bcrypt%7D%7Ci'
8 SEND_VAL ''
9 SEND_VAR !1
10 DO_ICALL $5
11 SEND_VAR $5
12 SEND_VAL 0
13 SEND_VAL 16
14 DO_ICALL $6
15 ASSIGN !1, $6
5 16 > JMP ->37
11 17 > INIT_FCALL 'function_exists'
18 SEND_VAL 'random_bytes'
19 DO_ICALL $8
20 > JMPZ $8, ->36
13 21 > INIT_FCALL 'substr'
22 INIT_FCALL 'md5'
23 INIT_FCALL 'random_bytes'
24 SEND_VAL 16
25 DO_ICALL $9
26 SEND_VAR $9
27 DO_ICALL $10
28 SEND_VAR $10
29 SEND_VAL 0
30 SEND_VAL 12
31 DO_ICALL $11
32 CONCAT ~12 '%242%24', $11
33 CONCAT ~13 ~12, '%24'
34 ASSIGN !1, ~13
11 35 > JMP ->37
18 36 > ASSIGN !1, '%242%249936b047ea8b%24'
22 37 > > SWITCH_STRING !2, [ 'plain':->53, 'sha':->54, 'crypt':->69, 'crypt-des':->69, 'crypt-md5':->69, 'crypt-blowfish':->69, 'md5-hex':->79, ], ->79
24 38 > IS_EQUAL !2, 'plain'
39 > JMPNZ ~16, ->53
26 40 > IS_EQUAL !2, 'sha'
41 > JMPNZ ~16, ->54
29 42 > IS_EQUAL !2, 'crypt'
43 > JMPNZ ~16, ->69
30 44 > IS_EQUAL !2, 'crypt-des'
45 > JMPNZ ~16, ->69
31 46 > IS_EQUAL !2, 'crypt-md5'
47 > JMPNZ ~16, ->69
32 48 > IS_EQUAL !2, 'crypt-blowfish'
49 > JMPNZ ~16, ->69
34 50 > IS_EQUAL !2, 'md5-hex'
51 > JMPNZ ~16, ->79
52 > > JMP ->79
25 53 > > RETURN !0
27 54 > INIT_FCALL 'base64_encode'
55 INIT_FCALL_BY_NAME 'mhash'
56 FETCH_CONSTANT ~17 'MHASH_SHA1'
57 SEND_VAL_EX ~17
58 SEND_VAR_EX !0
59 DO_FCALL 0 $18
60 SEND_VAR $18
61 DO_ICALL $19
62 ASSIGN !4, $19
28 63 > JMPZ !3, ->67
64 > CONCAT ~21 '%7BSHA%7D', !4
65 QM_ASSIGN ~22 ~21
66 > JMP ->68
67 > QM_ASSIGN ~22 !4
68 > > RETURN ~22
33 69 > > JMPZ !3, ->72
70 > QM_ASSIGN ~23 '%7Bcrypt%7D'
71 > JMP ->73
72 > QM_ASSIGN ~23 ''
73 > INIT_FCALL 'crypt'
74 SEND_VAR !0
75 SEND_VAR !1
76 DO_ICALL $24
77 CONCAT ~25 ~23, $24
78 > RETURN ~25
36 79 > > JMPZ !1, ->86
80 > INIT_FCALL 'md5'
81 CONCAT ~26 !0, !1
82 SEND_VAL ~26
83 DO_ICALL $27
84 QM_ASSIGN ~28 $27
85 > JMP ->90
86 > INIT_FCALL 'md5'
87 SEND_VAR !0
88 DO_ICALL $29
89 QM_ASSIGN ~28 $29
90 > ASSIGN !4, ~28
37 91 > JMPZ !3, ->95
92 > CONCAT ~31 '%7BMD5%7D', !4
93 QM_ASSIGN ~32 ~31
94 > JMP ->96
95 > QM_ASSIGN ~32 !4
96 > > RETURN ~32
39 97* > RETURN null
End of function getcryptedpassword
Generated using Vulcan Logic Dumper, using php 8.0.0