3v4l.org

run code in 300+ PHP versions simultaneously
<?php unserialize('C:3:"GMP":18446744075857035259:{}');?>
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/KAkbU
function name:  (null)
number of ops:  4
compiled vars:  none
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    1     0  E >   INIT_FCALL                                               'unserialize'
          1        SEND_VAL                                                 'C%3A3%3A%22GMP%22%3A18446744075857035259%3A%7B%7D'
          2        DO_ICALL                                                 
          3      > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
156.91 ms | 1393 KiB | 15 Q