Finding entry points
Branch analysis from position: 0
2 jumps found. (Code = 43) Position 1 = 23, Position 2 = 28
Branch analysis from position: 23
1 jumps found. (Code = 42) Position 1 = 81
Branch analysis from position: 81
2 jumps found. (Code = 43) Position 1 = 104, Position 2 = 109
Branch analysis from position: 104
1 jumps found. (Code = 42) Position 1 = 162
Branch analysis from position: 162
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 109
2 jumps found. (Code = 43) Position 1 = 115, Position 2 = 160
Branch analysis from position: 115
2 jumps found. (Code = 43) Position 1 = 130, Position 2 = 157
Branch analysis from position: 130
2 jumps found. (Code = 44) Position 1 = 144, Position 2 = 149
Branch analysis from position: 144
2 jumps found. (Code = 44) Position 1 = 146, Position 2 = 151
Branch analysis from position: 146
2 jumps found. (Code = 44) Position 1 = 148, Position 2 = 153
Branch analysis from position: 148
1 jumps found. (Code = 42) Position 1 = 155
Branch analysis from position: 155
1 jumps found. (Code = 42) Position 1 = 162
Branch analysis from position: 162
Branch analysis from position: 153
1 jumps found. (Code = 42) Position 1 = 156
Branch analysis from position: 156
Branch analysis from position: 151
1 jumps found. (Code = 42) Position 1 = 156
Branch analysis from position: 156
Branch analysis from position: 149
1 jumps found. (Code = 42) Position 1 = 156
Branch analysis from position: 156
Branch analysis from position: 157
Branch analysis from position: 160
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 28
2 jumps found. (Code = 43) Position 1 = 34, Position 2 = 79
Branch analysis from position: 34
2 jumps found. (Code = 43) Position 1 = 49, Position 2 = 76
Branch analysis from position: 49
2 jumps found. (Code = 44) Position 1 = 63, Position 2 = 68
Branch analysis from position: 63
2 jumps found. (Code = 44) Position 1 = 65, Position 2 = 70
Branch analysis from position: 65
2 jumps found. (Code = 44) Position 1 = 67, Position 2 = 72
Branch analysis from position: 67
1 jumps found. (Code = 42) Position 1 = 74
Branch analysis from position: 74
1 jumps found. (Code = 42) Position 1 = 81
Branch analysis from position: 81
Branch analysis from position: 72
1 jumps found. (Code = 42) Position 1 = 75
Branch analysis from position: 75
Branch analysis from position: 70
1 jumps found. (Code = 42) Position 1 = 75
Branch analysis from position: 75
Branch analysis from position: 68
1 jumps found. (Code = 42) Position 1 = 75
Branch analysis from position: 75
Branch analysis from position: 76
Branch analysis from position: 79
2 jumps found. (Code = 43) Position 1 = 104, Position 2 = 109
Branch analysis from position: 104
Branch analysis from position: 109
filename: /in/c6k0a
function name: (null)
number of ops: 163
compiled vars: !0 = $apiKey, !1 = $domain, !2 = $url, !3 = $options, !4 = $context, !5 = $result, !6 = $data
line #* E I O op fetch ext return operands
-------------------------------------------------------------------------------------
3 0 E > ASSIGN !0, 'c7b9a2de14b386f7a7dde163f2ecac98'
4 1 ASSIGN !1, 'aizhan.com'
7 2 ROPE_INIT 3 ~10 'https%3A%2F%2Fapistore.aizhan.com%2Ficp%2Fcheckdomain%2F'
3 ROPE_ADD 1 ~10 ~10, !0
4 ROPE_END 2 ~9 ~10, '%3Fdomain%3D'
5 INIT_FCALL 'urlencode'
6 SEND_VAR !1
7 DO_ICALL $12
8 CONCAT ~13 ~9, $12
9 ASSIGN !2, ~13
10 10 ASSIGN !3, <array>
22 11 INIT_FCALL 'stream_context_create'
12 SEND_VAR !3
13 DO_ICALL $16
14 ASSIGN !4, $16
23 15 INIT_FCALL 'file_get_contents'
16 SEND_VAR !2
17 SEND_VAL <false>
18 SEND_VAR !4
19 DO_ICALL $18
20 ASSIGN !5, $18
26 21 TYPE_CHECK 4 !5
22 > JMPZ ~20, ->28
27 23 > ECHO '%E8%AF%B7%E6%B1%82%E5%A4%B1%E8%B4%A5%EF%BC%8C%E8%AF%B7%E6%A3%80%E6%9F%A5%E7%BD%91%E7%BB%9C%E6%88%96+URL+%E6%98%AF%E5%90%A6%E6%AD%A3%E7%A1%AE%E3%80%82%0A'
28 24 CONCAT ~21 '%E5%B0%9D%E8%AF%95%E8%AE%BF%E9%97%AE%E7%9A%84+URL%3A+', !2
25 CONCAT ~22 ~21, '%0A'
26 ECHO ~22
26 27 > JMP ->81
31 28 > INIT_FCALL 'json_decode'
29 SEND_VAR !5
30 SEND_VAL <true>
31 DO_ICALL $23
32 ASSIGN !6, $23
32 33 > JMPZ !6, ->79
33 34 > ECHO '%3D%3D%3D+%E8%A7%A3%E6%9E%90%E5%90%8E%E7%9A%84%E7%BB%93%E6%9E%9C+%3D%3D%3D%0A'
34 35 FETCH_DIM_R ~25 !6, 'status'
36 CONCAT ~26 '%E7%8A%B6%E6%80%81%3A+', ~25
37 CONCAT ~27 ~26, '%0A'
38 ECHO ~27
35 39 FETCH_DIM_R ~28 !6, 'code'
40 CONCAT ~29 '%E8%BF%94%E5%9B%9E%E7%A0%81%3A+', ~28
41 CONCAT ~30 ~29, '%0A'
42 ECHO ~30
36 43 FETCH_DIM_R ~31 !6, 'msg'
44 CONCAT ~32 '%E6%B6%88%E6%81%AF%3A+', ~31
45 CONCAT ~33 ~32, '%0A'
46 ECHO ~33
37 47 ISSET_ISEMPTY_DIM_OBJ 0 !6, 'data'
48 > JMPZ ~34, ->76
38 49 > FETCH_DIM_R ~35 !6, 'data'
50 FETCH_DIM_R ~36 ~35, 'domain'
51 CONCAT ~37 '%E5%9F%9F%E5%90%8D%3A+', ~36
52 CONCAT ~38 ~37, '%0A'
53 ECHO ~38
39 54 FETCH_DIM_R ~39 !6, 'data'
55 FETCH_DIM_R ~40 ~39, 'blackListLevel'
56 CONCAT ~41 '%E9%BB%91%E5%90%8D%E5%8D%95%E7%AD%89%E7%BA%A7%3A+', ~40
57 CONCAT ~42 ~41, '+'
58 ECHO ~42
40 59 FETCH_DIM_R ~43 !6, 'data'
60 FETCH_DIM_R ~44 ~43, 'blackListLevel'
41 61 CASE ~44, 2
62 > JMPNZ ~45, ->68
42 63 > CASE ~44, 0
64 > JMPNZ ~45, ->70
40 65 > CASE ~44, -1
66 > JMPNZ ~45, ->72
67 > > JMP ->74
41 68 > ECHO '%28%E6%AD%A3%E5%B8%B8%E5%9F%9F%E5%90%8D%29%0A'
69 > JMP ->75
42 70 > ECHO '%28%E5%B7%B2%E5%88%97%E5%85%A5%E9%BB%91%E5%90%8D%E5%8D%95%29%0A'
71 > JMP ->75
43 72 > ECHO '%28%E7%8A%B6%E6%80%81%E6%9C%AA%E7%9F%A5%29%0A'
73 > JMP ->75
44 74 > ECHO '%0A'
75 > FREE ~44
47 76 > ECHO '%0A%3D%3D%3D+%E5%8E%9F%E5%A7%8B+JSON+%3D%3D%3D%0A'
48 77 ECHO !5
32 78 > JMP ->81
50 79 > CONCAT ~46 '%E5%8E%9F%E5%A7%8B%E8%BF%94%E5%9B%9E%E5%86%85%E5%AE%B9%3A%0A', !5
80 ECHO ~46
55 81 > ASSIGN !0, 'c7b9a2de14b386f7a7dde163f2ecac98'
56 82 ASSIGN !1, 'aizhan.com'
59 83 ROPE_INIT 3 ~50 'https%3A%2F%2Fapistore.aizhan.com%2Ficp%2Fcheckdomain%2F'
84 ROPE_ADD 1 ~50 ~50, !0
85 ROPE_END 2 ~49 ~50, '%3Fdomain%3D'
86 INIT_FCALL 'urlencode'
87 SEND_VAR !1
88 DO_ICALL $52
89 CONCAT ~53 ~49, $52
90 ASSIGN !2, ~53
62 91 ASSIGN !3, <array>
74 92 INIT_FCALL 'stream_context_create'
93 SEND_VAR !3
94 DO_ICALL $56
95 ASSIGN !4, $56
75 96 INIT_FCALL 'file_get_contents'
97 SEND_VAR !2
98 SEND_VAL <false>
99 SEND_VAR !4
100 DO_ICALL $58
101 ASSIGN !5, $58
78 102 TYPE_CHECK 4 !5
103 > JMPZ ~60, ->109
79 104 > ECHO '%E8%AF%B7%E6%B1%82%E5%A4%B1%E8%B4%A5%EF%BC%8C%E8%AF%B7%E6%A3%80%E6%9F%A5%E7%BD%91%E7%BB%9C%E6%88%96+URL+%E6%98%AF%E5%90%A6%E6%AD%A3%E7%A1%AE%E3%80%82%0A'
80 105 CONCAT ~61 '%E5%B0%9D%E8%AF%95%E8%AE%BF%E9%97%AE%E7%9A%84+URL%3A+', !2
106 CONCAT ~62 ~61, '%0A'
107 ECHO ~62
78 108 > JMP ->162
83 109 > INIT_FCALL 'json_decode'
110 SEND_VAR !5
111 SEND_VAL <true>
112 DO_ICALL $63
113 ASSIGN !6, $63
84 114 > JMPZ !6, ->160
85 115 > ECHO '%3D%3D%3D+%E8%A7%A3%E6%9E%90%E5%90%8E%E7%9A%84%E7%BB%93%E6%9E%9C+%3D%3D%3D%0A'
86 116 FETCH_DIM_R ~65 !6, 'status'
117 CONCAT ~66 '%E7%8A%B6%E6%80%81%3A+', ~65
118 CONCAT ~67 ~66, '%0A'
119 ECHO ~67
87 120 FETCH_DIM_R ~68 !6, 'code'
121 CONCAT ~69 '%E8%BF%94%E5%9B%9E%E7%A0%81%3A+', ~68
122 CONCAT ~70 ~69, '%0A'
123 ECHO ~70
88 124 FETCH_DIM_R ~71 !6, 'msg'
125 CONCAT ~72 '%E6%B6%88%E6%81%AF%3A+', ~71
126 CONCAT ~73 ~72, '%0A'
127 ECHO ~73
89 128 ISSET_ISEMPTY_DIM_OBJ 0 !6, 'data'
129 > JMPZ ~74, ->157
90 130 > FETCH_DIM_R ~75 !6, 'data'
131 FETCH_DIM_R ~76 ~75, 'domain'
132 CONCAT ~77 '%E5%9F%9F%E5%90%8D%3A+', ~76
133 CONCAT ~78 ~77, '%0A'
134 ECHO ~78
91 135 FETCH_DIM_R ~79 !6, 'data'
136 FETCH_DIM_R ~80 ~79, 'blackListLevel'
137 CONCAT ~81 '%E9%BB%91%E5%90%8D%E5%8D%95%E7%AD%89%E7%BA%A7%3A+', ~80
138 CONCAT ~82 ~81, '+'
139 ECHO ~82
92 140 FETCH_DIM_R ~83 !6, 'data'
141 FETCH_DIM_R ~84 ~83, 'blackListLevel'
93 142 CASE ~84, 2
143 > JMPNZ ~85, ->149
94 144 > CASE ~84, 0
145 > JMPNZ ~85, ->151
92 146 > CASE ~84, -1
147 > JMPNZ ~85, ->153
148 > > JMP ->155
93 149 > ECHO '%28%E6%AD%A3%E5%B8%B8%E5%9F%9F%E5%90%8D%29%0A'
150 > JMP ->156
94 151 > ECHO '%28%E5%B7%B2%E5%88%97%E5%85%A5%E9%BB%91%E5%90%8D%E5%8D%95%29%0A'
152 > JMP ->156
95 153 > ECHO '%28%E7%8A%B6%E6%80%81%E6%9C%AA%E7%9F%A5%29%0A'
154 > JMP ->156
96 155 > ECHO '%0A'
156 > FREE ~84
99 157 > ECHO '%0A%3D%3D%3D+%E5%8E%9F%E5%A7%8B+JSON+%3D%3D%3D%0A'
100 158 ECHO !5
84 159 > JMP ->162
102 160 > CONCAT ~86 '%E5%8E%9F%E5%A7%8B%E8%BF%94%E5%9B%9E%E5%86%85%E5%AE%B9%3A%0A', !5
161 ECHO ~86
105 162 > > RETURN 1
Generated using Vulcan Logic Dumper, using php 8.0.0