Finding entry points Branch analysis from position: 0 1 jumps found. (Code = 62) Position 1 = -2 filename: /in/Rodgg function name: (null) number of ops: 17 compiled vars: !0 = $x line #* E I O op fetch ext return operands ------------------------------------------------------------------------------------- 3 0 E > INIT_FCALL 'str_replace' 1 SEND_VAL '0x' 2 SEND_VAL '' 3 SEND_VAL '%0A%09%090x54%2C+0x68%2C+0x65%2C+0x20%2C+0x64%2C+0x68%2C+0x6f%2C+0x6c%2C%0A%09%090x65%2C+0x20%2C+0x28%2C+0x70%2C+0x72%2C+0x6f%2C+0x6e%2C+0x6f%2C%0A%09%090x75%2C+0x6e%2C+0x63%2C+0x65%2C+0x64%2C+0x20%2C+0x22%2C+0x64%2C%0A%09%090x6f%2C+0x6c%2C+0x65%2C+0x22%2C+0x29%2C+0x20%2C+0x69%2C+0x73%2C%0A%09%090x20%2C+0x61%2C+0x6c%2C+0x73%2C+0x6f%2C+0x20%2C+0x6b%2C+0x6e%2C%0A%09%090x6f%2C+0x77%2C+0x6e%2C+0x20%2C+0x61%2C+0x73%2C+0x20%2C+0x74%2C%0A%09%090x68%2C+0x65%2C+0x20%2C+0x41%2C+0x73%2C+0x69%2C+0x61%2C+0x74%2C%0A%09%090x69%2C+0x63%2C+0x20%2C+0x77%2C+0x69%2C+0x6c%2C+0x64%2C+0x20%2C%0A%09%090x64%2C+0x6f%2C+0x67%2C+0x2c%2C+0x20%2C+0x72%2C+0x65%2C+0x64%2C%0A%09%090x20%2C+0x64%2C+0x6f%2C+0x67%2C+0x2c%2C+0x20%2C+0x61%2C+0x6e%2C%0A%09%090x64%2C+0x20%2C+0x77%2C+0x68%2C+0x69%2C+0x73%2C+0x74%2C+0x6c%2C%0A%09%090x69%2C+0x6e%2C+0x67%2C+0x20%2C+0x64%2C+0x6f%2C+0x67%2C+0x2e%2C%0A%09%090x20%2C+0x49%2C+0x74%2C+0x20%2C+0x69%2C+0x73%2C+0x20%2C+0x61%2C%0A%09%090x62%2C+0x6f%2C+0x75%2C+0x74%2C+0x20%2C+0x74%2C+0x68%2C+0x65%2C%0A%09%090x20%2C+0x73%2C+0x69%2C+0x7a%2C+0x65%2C+0x20%2C+0x6f%2C+0x66%2C%0A%09%090x20%2C+0x61%2C+0x20%2C+0x47%2C+0x65%2C+0x72%2C+0x6d%2C+0x61%2C%0A%09%090x6e%2C+0x20%2C+0x73%2C+0x68%2C+0x65%2C+0x70%2C+0x68%2C+0x65%2C%0A%09%090x72%2C+0x64%2C+0x20%2C+0x62%2C+0x75%2C+0x74%2C+0x20%2C+0x6c%2C%0A%09%090x6f%2C+0x6f%2C+0x6b%2C+0x73%2C+0x20%2C+0x6d%2C+0x6f%2C+0x72%2C%0A%09%090x65%2C+0x20%2C+0x6c%2C+0x69%2C+0x6b%2C+0x65%2C+0x20%2C+0x61%2C%0A%09%090x20%2C+0x6c%2C+0x6f%2C+0x6e%2C+0x67%2C+0x2d%2C+0x6c%2C+0x65%2C%0A%09%090x67%2C+0x67%2C+0x65%2C+0x64%2C+0x20%2C+0x66%2C+0x6f%2C+0x78%2C%0A%09%090x2e%2C+0x20%2C+0x54%2C+0x68%2C+0x69%2C+0x73%2C+0x20%2C+0x68%2C%0A%09%090x69%2C+0x67%2C+0x68%2C+0x6c%2C+0x79%2C+0x20%2C+0x65%2C+0x6c%2C%0A%09%090x75%2C+0x73%2C+0x69%2C+0x76%2C+0x65%2C+0x20%2C+0x61%2C+0x6e%2C%0A%09%090x64%2C+0x20%2C+0x73%2C+0x6b%2C+0x69%2C+0x6c%2C+0x6c%2C+0x65%2C%0A%09%090x64%2C+0x20%2C+0x6a%2C+0x75%2C+0x6d%2C+0x70%2C+0x65%2C+0x72%2C%0A%09%090x20%2C+0x69%2C+0x73%2C+0x20%2C+0x63%2C+0x6c%2C+0x61%2C+0x73%2C%0A%09%090x73%2C+0x69%2C+0x66%2C+0x69%2C+0x65%2C+0x64%2C+0x20%2C+0x77%2C%0A%09%090x69%2C+0x74%2C+0x68%2C+0x20%2C+0x77%2C+0x6f%2C+0x6c%2C+0x76%2C%0A%09%090x65%2C+0x73%2C+0x2c%2C+0x20%2C+0x63%2C+0x6f%2C+0x79%2C+0x6f%2C%0A%09%090x74%2C+0x65%2C+0x73%2C+0x2c%2C+0x20%2C+0x6a%2C+0x61%2C+0x63%2C%0A%09%090x6b%2C+0x61%2C+0x6c%2C+0x73%2C+0x2c%2C+0x20%2C+0x61%2C+0x6e%2C%0A%09%090x64%2C+0x20%2C+0x66%2C+0x6f%2C+0x78%2C+0x65%2C+0x73%2C+0x20%2C%0A%09%090x69%2C+0x6e%2C+0x20%2C+0x74%2C+0x68%2C+0x65%2C+0x20%2C+0x74%2C%0A%09%090x61%2C+0x78%2C+0x6f%2C+0x6e%2C+0x6f%2C+0x6d%2C+0x69%2C+0x63%2C%0A%09%090x20%2C+0x66%2C+0x61%2C+0x6d%2C+0x69%2C+0x6c%2C+0x79%2C+0x20%2C%0A%09%090x43%2C+0x61%2C+0x6e%2C+0x69%2C+0x64%2C+0x61%2C+0x65%2C+0x2e%2C' 4 DO_ICALL $1 5 ASSIGN !0, $1 42 6 INIT_FCALL 'preg_replace' 7 SEND_VAL '%2F%5B%5E0-9a-f%5D%2F' 8 SEND_VAL '' 9 SEND_VAR !0 10 DO_ICALL $3 11 ASSIGN !0, $3 43 12 INIT_FCALL 'hex2bin' 13 SEND_VAR !0 14 DO_ICALL $5 15 ECHO $5 16 > RETURN 1
Generated using Vulcan Logic Dumper, using php 8.0.0