Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename: /in/Rodgg
function name: (null)
number of ops: 17
compiled vars: !0 = $x
line #* E I O op fetch ext return operands
-------------------------------------------------------------------------------------
3 0 E > INIT_FCALL 'str_replace'
1 SEND_VAL '0x'
2 SEND_VAL ''
3 SEND_VAL '%0A%09%090x54%2C+0x68%2C+0x65%2C+0x20%2C+0x64%2C+0x68%2C+0x6f%2C+0x6c%2C%0A%09%090x65%2C+0x20%2C+0x28%2C+0x70%2C+0x72%2C+0x6f%2C+0x6e%2C+0x6f%2C%0A%09%090x75%2C+0x6e%2C+0x63%2C+0x65%2C+0x64%2C+0x20%2C+0x22%2C+0x64%2C%0A%09%090x6f%2C+0x6c%2C+0x65%2C+0x22%2C+0x29%2C+0x20%2C+0x69%2C+0x73%2C%0A%09%090x20%2C+0x61%2C+0x6c%2C+0x73%2C+0x6f%2C+0x20%2C+0x6b%2C+0x6e%2C%0A%09%090x6f%2C+0x77%2C+0x6e%2C+0x20%2C+0x61%2C+0x73%2C+0x20%2C+0x74%2C%0A%09%090x68%2C+0x65%2C+0x20%2C+0x41%2C+0x73%2C+0x69%2C+0x61%2C+0x74%2C%0A%09%090x69%2C+0x63%2C+0x20%2C+0x77%2C+0x69%2C+0x6c%2C+0x64%2C+0x20%2C%0A%09%090x64%2C+0x6f%2C+0x67%2C+0x2c%2C+0x20%2C+0x72%2C+0x65%2C+0x64%2C%0A%09%090x20%2C+0x64%2C+0x6f%2C+0x67%2C+0x2c%2C+0x20%2C+0x61%2C+0x6e%2C%0A%09%090x64%2C+0x20%2C+0x77%2C+0x68%2C+0x69%2C+0x73%2C+0x74%2C+0x6c%2C%0A%09%090x69%2C+0x6e%2C+0x67%2C+0x20%2C+0x64%2C+0x6f%2C+0x67%2C+0x2e%2C%0A%09%090x20%2C+0x49%2C+0x74%2C+0x20%2C+0x69%2C+0x73%2C+0x20%2C+0x61%2C%0A%09%090x62%2C+0x6f%2C+0x75%2C+0x74%2C+0x20%2C+0x74%2C+0x68%2C+0x65%2C%0A%09%090x20%2C+0x73%2C+0x69%2C+0x7a%2C+0x65%2C+0x20%2C+0x6f%2C+0x66%2C%0A%09%090x20%2C+0x61%2C+0x20%2C+0x47%2C+0x65%2C+0x72%2C+0x6d%2C+0x61%2C%0A%09%090x6e%2C+0x20%2C+0x73%2C+0x68%2C+0x65%2C+0x70%2C+0x68%2C+0x65%2C%0A%09%090x72%2C+0x64%2C+0x20%2C+0x62%2C+0x75%2C+0x74%2C+0x20%2C+0x6c%2C%0A%09%090x6f%2C+0x6f%2C+0x6b%2C+0x73%2C+0x20%2C+0x6d%2C+0x6f%2C+0x72%2C%0A%09%090x65%2C+0x20%2C+0x6c%2C+0x69%2C+0x6b%2C+0x65%2C+0x20%2C+0x61%2C%0A%09%090x20%2C+0x6c%2C+0x6f%2C+0x6e%2C+0x67%2C+0x2d%2C+0x6c%2C+0x65%2C%0A%09%090x67%2C+0x67%2C+0x65%2C+0x64%2C+0x20%2C+0x66%2C+0x6f%2C+0x78%2C%0A%09%090x2e%2C+0x20%2C+0x54%2C+0x68%2C+0x69%2C+0x73%2C+0x20%2C+0x68%2C%0A%09%090x69%2C+0x67%2C+0x68%2C+0x6c%2C+0x79%2C+0x20%2C+0x65%2C+0x6c%2C%0A%09%090x75%2C+0x73%2C+0x69%2C+0x76%2C+0x65%2C+0x20%2C+0x61%2C+0x6e%2C%0A%09%090x64%2C+0x20%2C+0x73%2C+0x6b%2C+0x69%2C+0x6c%2C+0x6c%2C+0x65%2C%0A%09%090x64%2C+0x20%2C+0x6a%2C+0x75%2C+0x6d%2C+0x70%2C+0x65%2C+0x72%2C%0A%09%090x20%2C+0x69%2C+0x73%2C+0x20%2C+0x63%2C+0x6c%2C+0x61%2C+0x73%2C%0A%09%090x73%2C+0x69%2C+0x66%2C+0x69%2C+0x65%2C+0x64%2C+0x20%2C+0x77%2C%0A%09%090x69%2C+0x74%2C+0x68%2C+0x20%2C+0x77%2C+0x6f%2C+0x6c%2C+0x76%2C%0A%09%090x65%2C+0x73%2C+0x2c%2C+0x20%2C+0x63%2C+0x6f%2C+0x79%2C+0x6f%2C%0A%09%090x74%2C+0x65%2C+0x73%2C+0x2c%2C+0x20%2C+0x6a%2C+0x61%2C+0x63%2C%0A%09%090x6b%2C+0x61%2C+0x6c%2C+0x73%2C+0x2c%2C+0x20%2C+0x61%2C+0x6e%2C%0A%09%090x64%2C+0x20%2C+0x66%2C+0x6f%2C+0x78%2C+0x65%2C+0x73%2C+0x20%2C%0A%09%090x69%2C+0x6e%2C+0x20%2C+0x74%2C+0x68%2C+0x65%2C+0x20%2C+0x74%2C%0A%09%090x61%2C+0x78%2C+0x6f%2C+0x6e%2C+0x6f%2C+0x6d%2C+0x69%2C+0x63%2C%0A%09%090x20%2C+0x66%2C+0x61%2C+0x6d%2C+0x69%2C+0x6c%2C+0x79%2C+0x20%2C%0A%09%090x43%2C+0x61%2C+0x6e%2C+0x69%2C+0x64%2C+0x61%2C+0x65%2C+0x2e%2C'
4 DO_ICALL $1
5 ASSIGN !0, $1
42 6 INIT_FCALL 'preg_replace'
7 SEND_VAL '%2F%5B%5E0-9a-f%5D%2F'
8 SEND_VAL ''
9 SEND_VAR !0
10 DO_ICALL $3
11 ASSIGN !0, $3
43 12 INIT_FCALL 'hex2bin'
13 SEND_VAR !0
14 DO_ICALL $5
15 ECHO $5
16 > RETURN 1
Generated using Vulcan Logic Dumper, using php 8.0.0