Finding entry points Branch analysis from position: 0 1 jumps found. (Code = 62) Position 1 = -2 filename: /in/JhA43 function name: (null) number of ops: 9 compiled vars: !0 = $app_filename line #* E I O op fetch ext return operands ------------------------------------------------------------------------------------- 3 0 E > ASSIGN !0, 'AntivirusSecurity_02_cb-508164-ce_ac8a0e5e-35f8-4c7b-b591-7e28cab94b4e.apk' 5 1 ASSIGN !0, 'AntivirusSecurity_748164.apk' 6 2 ASSIGN !0, 'AntivirusSecurity_3542683-1.apk' 7 3 ASSIGN !0, 'AntivirusSecurity_1.apk' 40 4 INIT_FCALL 'extract_click_id_from_filename' 5 SEND_VAR !0 6 DO_FCALL 0 $5 7 ECHO $5 8 > RETURN 1 Function extract_click_id_from_filename: Finding entry points Branch analysis from position: 0 2 jumps found. (Code = 43) Position 1 = 18, Position 2 = 21 Branch analysis from position: 18 1 jumps found. (Code = 62) Position 1 = -2 Branch analysis from position: 21 2 jumps found. (Code = 46) Position 1 = 37, Position 2 = 42 Branch analysis from position: 37 2 jumps found. (Code = 43) Position 1 = 43, Position 2 = 46 Branch analysis from position: 43 1 jumps found. (Code = 62) Position 1 = -2 Branch analysis from position: 46 2 jumps found. (Code = 46) Position 1 = 65, Position 2 = 70 Branch analysis from position: 65 2 jumps found. (Code = 43) Position 1 = 71, Position 2 = 74 Branch analysis from position: 71 1 jumps found. (Code = 62) Position 1 = -2 Branch analysis from position: 74 1 jumps found. (Code = 62) Position 1 = -2 Branch analysis from position: 70 Branch analysis from position: 42 filename: /in/JhA43 function name: extract_click_id_from_filename number of ops: 76 compiled vars: !0 = $app_filename, !1 = $minimum_click_id_length, !2 = $click_id_fence_beginning, !3 = $click_id_fence_end, !4 = $fields line #* E I O op fetch ext return operands ------------------------------------------------------------------------------------- 9 0 E > RECV_INIT !0 '' 10 1 ASSIGN !1, 4 13 2 ASSIGN !2, 'cb-' 14 3 ASSIGN !3, '-ce' 15 4 INIT_FCALL 'preg_match_all' 5 ROPE_INIT 5 ~9 '%5E' 6 ROPE_ADD 1 ~9 ~9, !2 7 ROPE_ADD 2 ~9 ~9, '%28.%2A%3F%29' 8 ROPE_ADD 3 ~9 ~9, !3 9 ROPE_END 4 ~8 ~9, '%5E' 10 SEND_VAL ~8 11 SEND_VAR !0 12 SEND_REF !4 13 DO_ICALL 17 14 FETCH_DIM_IS ~13 !4, 1 15 ISSET_ISEMPTY_DIM_OBJ 1 ~14 ~13, 0 16 BOOL_NOT ~15 ~14 17 > JMPZ ~15, ->21 18 18 > FETCH_DIM_R ~16 !4, 1 19 FETCH_DIM_R ~17 ~16, 0 20 > RETURN ~17 21 21 > ASSIGN !2, 'AntivirusSecurity_' 22 22 ASSIGN !3, '%5C.apk' 23 23 INIT_FCALL 'preg_match_all' 24 ROPE_INIT 5 ~21 '%5E' 25 ROPE_ADD 1 ~21 ~21, !2 26 ROPE_ADD 2 ~21 ~21, '%28%5B0-9%5D%2A%3F%29' 27 ROPE_ADD 3 ~21 ~21, !3 28 ROPE_END 4 ~20 ~21, '%5E' 29 SEND_VAL ~20 30 SEND_VAR !0 31 SEND_REF !4 32 DO_ICALL 25 33 FETCH_DIM_IS ~25 !4, 1 34 ISSET_ISEMPTY_DIM_OBJ 1 ~26 ~25, 0 35 BOOL_NOT ~27 ~26 36 > JMPZ_EX ~27 ~27, ->42 37 > FETCH_DIM_R ~28 !4, 1 38 FETCH_DIM_R ~29 ~28, 0 39 STRLEN ~30 ~29 40 IS_SMALLER_OR_EQUAL ~31 !1, ~30 41 BOOL ~27 ~31 42 > > JMPZ ~27, ->46 26 43 > FETCH_DIM_R ~32 !4, 1 44 FETCH_DIM_R ~33 ~32, 0 45 > RETURN ~33 29 46 > ASSIGN !2, 'AntivirusSecurity_' 30 47 ASSIGN !3, '-' 31 48 INIT_FCALL 'preg_match_all' 49 ROPE_INIT 5 ~37 '%5E' 50 ROPE_ADD 1 ~37 ~37, !2 51 ROPE_ADD 2 ~37 ~37, '%28%5B0-9%5D%2A%3F%29' 52 ROPE_ADD 3 ~37 ~37, !3 53 ROPE_END 4 ~36 ~37, '%5E' 54 SEND_VAL ~36 55 SEND_VAR !0 56 SEND_REF !4 57 DO_ICALL 33 58 INIT_FCALL 'print_r' 59 SEND_VAR !4 60 DO_ICALL 34 61 FETCH_DIM_IS ~42 !4, 1 62 ISSET_ISEMPTY_DIM_OBJ 1 ~43 ~42, 0 63 BOOL_NOT ~44 ~43 64 > JMPZ_EX ~44 ~44, ->70 65 > FETCH_DIM_R ~45 !4, 1 66 FETCH_DIM_R ~46 ~45, 0 67 STRLEN ~47 ~46 68 IS_SMALLER_OR_EQUAL ~48 !1, ~47 69 BOOL ~44 ~48 70 > > JMPZ ~44, ->74 35 71 > FETCH_DIM_R ~49 !4, 1 72 FETCH_DIM_R ~50 ~49, 0 73 > RETURN ~50 38 74 > > RETURN null 39 75* > RETURN null End of function extract_click_id_from_filename
Generated using Vulcan Logic Dumper, using php 8.0.0