3v4l.org

run code in 300+ PHP versions simultaneously
<?php abstract class XYZ implements Serializable {} echo unserialize('C:3:"XYZ":18446744075857035259:{}'); ?>
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/X6V70
function name:  (null)
number of ops:  6
compiled vars:  none
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    2     0  E >   DECLARE_CLASS                                            'xyz'
    3     1        INIT_FCALL                                               'unserialize'
          2        SEND_VAL                                                 'C%3A3%3A%22XYZ%22%3A18446744075857035259%3A%7B%7D'
          3        DO_ICALL                                         $0      
          4        ECHO                                                     $0
    4     5      > RETURN                                                   1

Class XYZ: [no user functions]

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
153.6 ms | 1398 KiB | 15 Q