3v4l.org

run code in 300+ PHP versions simultaneously
<?php $t = 'z4OXa4HRsRPzCZMW40gp3VBJJUtwXeA%2FAr5wcPTgo2RvWa%2FBgtZjKOtD%2B8ERUvJO%2FkOkijIka6RWslC0sr7uoA%3D%3D'; echo unserialize(base64_decode(urldecode($t)));
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/bULOr
function name:  (null)
number of ops:  12
compiled vars:  !0 = $t
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    2     0  E >   ASSIGN                                                   !0, 'z4OXa4HRsRPzCZMW40gp3VBJJUtwXeA%252FAr5wcPTgo2RvWa%252FBgtZjKOtD%252B8ERUvJO%252FkOkijIka6RWslC0sr7uoA%253D%253D'
    4     1        INIT_FCALL                                               'unserialize'
          2        INIT_FCALL                                               'base64_decode'
          3        INIT_FCALL                                               'urldecode'
          4        SEND_VAR                                                 !0
          5        DO_ICALL                                         $2      
          6        SEND_VAR                                                 $2
          7        DO_ICALL                                         $3      
          8        SEND_VAR                                                 $3
          9        DO_ICALL                                         $4      
         10        ECHO                                                     $4
         11      > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
154.45 ms | 1394 KiB | 19 Q