Finding entry points
Branch analysis from position: 0
2 jumps found. (Code = 43) Position 1 = 12, Position 2 = 71
Branch analysis from position: 12
2 jumps found. (Code = 46) Position 1 = 18, Position 2 = 20
Branch analysis from position: 18
2 jumps found. (Code = 43) Position 1 = 21, Position 2 = 71
Branch analysis from position: 21
1 jumps found. (Code = 42) Position 1 = 63
Branch analysis from position: 63
2 jumps found. (Code = 44) Position 1 = 65, Position 2 = 23
Branch analysis from position: 65
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 23
2 jumps found. (Code = 43) Position 1 = 37, Position 2 = 53
Branch analysis from position: 37
1 jumps found. (Code = 42) Position 1 = 62
Branch analysis from position: 62
2 jumps found. (Code = 44) Position 1 = 65, Position 2 = 23
Branch analysis from position: 65
Branch analysis from position: 23
Branch analysis from position: 53
2 jumps found. (Code = 44) Position 1 = 65, Position 2 = 23
Branch analysis from position: 65
Branch analysis from position: 23
Branch analysis from position: 71
Branch analysis from position: 20
Branch analysis from position: 71
filename: /in/XAlZT
function name: (null)
number of ops: 73
compiled vars: !0 = $text, !1 = $matches, !2 = $allMatches, !3 = $i
line #* E I O op fetch ext return operands
-------------------------------------------------------------------------------------
2 0 E > INIT_FCALL 'define'
1 SEND_VAL 'HAZELFENCES_WEBSITE'
2 SEND_VAL 'https%3A%2F%2Ftest.com'
3 DO_ICALL
3 4 ASSIGN !0, '%5Byoutube%5Dhttps%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DxHLE2LTAItw%26amp%3Bt%3D53s%5B%2Fyoutube%5D'
4 5 ASSIGN_OP 8 !0, '%5Byoutube%5Dhttps%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DxHLE2LTAItw%5B%2Fyoutube%5D'
5 6 INIT_FCALL 'preg_match_all'
7 SEND_VAL '%2F%5C%5Byoutube%5C%5D%28%28%5Cs%7C.%29%2B%3F%29%5C%5B%5C%2Fyoutube%5C%5D%2Fi'
8 SEND_VAR !0
9 SEND_REF !1
10 DO_ICALL $7
11 > JMPZ $7, ->71
6 12 > FETCH_DIM_R ~8 !1, 0
13 COUNT ~9 ~8
14 ASSIGN !2, ~9
8 15 FETCH_DIM_R ~11 !1, 0
16 TYPE_CHECK 128 ~12 ~11
17 > JMPZ_EX ~12 ~12, ->20
18 > IS_SMALLER ~13 0, !2
19 BOOL ~12 ~13
20 > > JMPZ ~12, ->71
9 21 > ASSIGN !3, 0
22 > JMP ->63
10 23 > INIT_FCALL 'str_replace'
24 SEND_VAL 'watch%3Fv%3D'
25 SEND_VAL 'embed%2F'
26 SEND_VAR !0
27 DO_ICALL $15
28 ASSIGN !0, $15
12 29 INIT_FCALL 'strpos'
30 FETCH_DIM_R ~17 !1, 0
31 FETCH_DIM_R ~18 ~17, !3
32 SEND_VAL ~18
33 SEND_VAL '%26amp%3Bt%3D'
34 DO_ICALL $19
35 TYPE_CHECK 1018 $19
36 > JMPZ ~20, ->53
13 37 > INIT_FCALL 'str_replace'
38 SEND_VAL '%26amp%3Bt%3D'
39 SEND_VAL '%3Fstart%3D'
40 SEND_VAR !0
41 DO_ICALL $21
42 ASSIGN !0, $21
14 43 INIT_FCALL 'preg_replace'
44 SEND_VAL '%23s%5C%5B%5C%2Fyoutube%5C%5D%23i'
45 FETCH_CONSTANT ~23 'HAZELFENCES_WEBSITE'
46 CONCAT ~24 '%26enablejsapi%3D1%26origin%3D', ~23
47 CONCAT ~25 ~24, '%5B%2Fyoutube%5D'
48 SEND_VAL ~25
49 SEND_VAR !0
50 DO_ICALL $26
51 ASSIGN !0, $26
12 52 > JMP ->62
16 53 > INIT_FCALL 'preg_replace'
54 SEND_VAL '%23%5C%5B%5C%2Fyoutube%5C%5D%23i'
55 FETCH_CONSTANT ~28 'HAZELFENCES_WEBSITE'
56 CONCAT ~29 '%3Fenablejsapi%3D1%26origin%3D', ~28
57 CONCAT ~30 ~29, '%5B%2Fyoutube%5D'
58 SEND_VAL ~30
59 SEND_VAR !0
60 DO_ICALL $31
61 ASSIGN !0, $31
9 62 > PRE_INC !3
63 > IS_SMALLER !3, !2
64 > JMPNZ ~34, ->23
20 65 > INIT_FCALL 'preg_replace'
66 SEND_VAL '%2F%5C%5Byoutube%5C%5D%28%28%5Cs%7C.%29%2B%3F%29%5C%5B%5C%2Fyoutube%5C%5D%2Fi'
67 SEND_VAL '%3Ciframe+width%3D%22640%22+height%3D%22510%22+src%3D%22%5C1%22+loading%3D%22lazy%22+frameborder%3D%220%22+allow%3D%22accelerometer%3B+autoplay%3B+encrypted-media%3B+gyroscope%3B+picture-in-picture%22+allowfullscreen%3E%3C%2Fiframe%3E'
68 SEND_VAR !0
69 DO_ICALL $35
70 ASSIGN !0, $35
24 71 > ECHO !0
25 72 > RETURN 1
Generated using Vulcan Logic Dumper, using php 8.0.0