Finding entry points Branch analysis from position: 0 1 jumps found. (Code = 62) Position 1 = -2 filename: /in/Vol9i function name: (null) number of ops: 8 compiled vars: !0 = $app_filename line #* E I O op fetch ext return operands ------------------------------------------------------------------------------------- 3 0 E > ASSIGN !0, 'AntivirusSecurity_02_cb-508164-ce_ac8a0e5e-35f8-4c7b-b591-7e28cab94b4e.apk' 5 1 ASSIGN !0, 'AntivirusSecurity_748164.apk' 6 2 ASSIGN !0, 'AntivirusSecurity_3542683-1.apk' 35 3 INIT_FCALL 'extract_click_id_from_filename' 4 SEND_VAR !0 5 DO_FCALL 0 $4 6 ECHO $4 7 > RETURN 1 Function extract_click_id_from_filename: Finding entry points Branch analysis from position: 0 2 jumps found. (Code = 43) Position 1 = 17, Position 2 = 20 Branch analysis from position: 17 1 jumps found. (Code = 62) Position 1 = -2 Branch analysis from position: 20 2 jumps found. (Code = 43) Position 1 = 36, Position 2 = 39 Branch analysis from position: 36 1 jumps found. (Code = 62) Position 1 = -2 Branch analysis from position: 39 2 jumps found. (Code = 43) Position 1 = 58, Position 2 = 61 Branch analysis from position: 58 1 jumps found. (Code = 62) Position 1 = -2 Branch analysis from position: 61 1 jumps found. (Code = 62) Position 1 = -2 filename: /in/Vol9i function name: extract_click_id_from_filename number of ops: 62 compiled vars: !0 = $app_filename, !1 = $click_id_fence_beginning, !2 = $click_id_fence_end, !3 = $fields line #* E I O op fetch ext return operands ------------------------------------------------------------------------------------- 8 0 E > RECV_INIT !0 '' 11 1 ASSIGN !1, 'cb-' 12 2 ASSIGN !2, '-ce' 13 3 INIT_FCALL 'preg_match_all' 4 ROPE_INIT 5 ~7 '%5E' 5 ROPE_ADD 1 ~7 ~7, !1 6 ROPE_ADD 2 ~7 ~7, '%28.%2A%3F%29' 7 ROPE_ADD 3 ~7 ~7, !2 8 ROPE_END 4 ~6 ~7, '%5E' 9 SEND_VAL ~6 10 SEND_VAR !0 11 SEND_REF !3 12 DO_ICALL 15 13 FETCH_DIM_IS ~11 !3, 1 14 ISSET_ISEMPTY_DIM_OBJ 1 ~12 ~11, 0 15 BOOL_NOT ~13 ~12 16 > JMPZ ~13, ->20 16 17 > FETCH_DIM_R ~14 !3, 1 18 FETCH_DIM_R ~15 ~14, 0 19 > RETURN ~15 19 20 > ASSIGN !1, 'AntivirusSecurity_' 20 21 ASSIGN !2, '%5C.apk' 21 22 INIT_FCALL 'preg_match_all' 23 ROPE_INIT 5 ~19 '%5E' 24 ROPE_ADD 1 ~19 ~19, !1 25 ROPE_ADD 2 ~19 ~19, '%28%5B0-9%5D%2A%3F%29' 26 ROPE_ADD 3 ~19 ~19, !2 27 ROPE_END 4 ~18 ~19, '%5E' 28 SEND_VAL ~18 29 SEND_VAR !0 30 SEND_REF !3 31 DO_ICALL 23 32 FETCH_DIM_IS ~23 !3, 1 33 ISSET_ISEMPTY_DIM_OBJ 1 ~24 ~23, 0 34 BOOL_NOT ~25 ~24 35 > JMPZ ~25, ->39 24 36 > FETCH_DIM_R ~26 !3, 1 37 FETCH_DIM_R ~27 ~26, 0 38 > RETURN ~27 27 39 > ASSIGN !1, 'AntivirusSecurity_' 28 40 ASSIGN !2, '-' 29 41 INIT_FCALL 'preg_match_all' 42 ROPE_INIT 5 ~31 '%5E' 43 ROPE_ADD 1 ~31 ~31, !1 44 ROPE_ADD 2 ~31 ~31, '%28%5B0-9%5D%2A%3F%29' 45 ROPE_ADD 3 ~31 ~31, !2 46 ROPE_END 4 ~30 ~31, '%5E' 47 SEND_VAL ~30 48 SEND_VAR !0 49 SEND_REF !3 50 DO_ICALL 31 51 INIT_FCALL 'print_r' 52 SEND_VAR !3 53 DO_ICALL 32 54 FETCH_DIM_IS ~36 !3, 1 55 ISSET_ISEMPTY_DIM_OBJ 1 ~37 ~36, 0 56 BOOL_NOT ~38 ~37 57 > JMPZ ~38, ->61 33 58 > FETCH_DIM_R ~39 !3, 1 59 FETCH_DIM_R ~40 ~39, 0 60 > RETURN ~40 34 61 > > RETURN null End of function extract_click_id_from_filename
Generated using Vulcan Logic Dumper, using php 8.0.0