Finding entry points
Branch analysis from position: 0
2 jumps found. (Code = 43) Position 1 = 8, Position 2 = 10
Branch analysis from position: 8
1 jumps found. (Code = 79) Position 1 = -2
Branch analysis from position: 10
1 jumps found. (Code = 42) Position 1 = 44
Branch analysis from position: 44
2 jumps found. (Code = 44) Position 1 = 45, Position 2 = 11
Branch analysis from position: 45
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 11
2 jumps found. (Code = 43) Position 1 = 19, Position 2 = 20
Branch analysis from position: 19
1 jumps found. (Code = 42) Position 1 = 45
Branch analysis from position: 45
Branch analysis from position: 20
2 jumps found. (Code = 77) Position 1 = 23, Position 2 = 34
Branch analysis from position: 23
2 jumps found. (Code = 78) Position 1 = 24, Position 2 = 34
Branch analysis from position: 24
2 jumps found. (Code = 43) Position 1 = 32, Position 2 = 33
Branch analysis from position: 32
1 jumps found. (Code = 42) Position 1 = 23
Branch analysis from position: 23
Branch analysis from position: 33
Branch analysis from position: 34
2 jumps found. (Code = 43) Position 1 = 37, Position 2 = 38
Branch analysis from position: 37
1 jumps found. (Code = 42) Position 1 = 45
Branch analysis from position: 45
Branch analysis from position: 38
2 jumps found. (Code = 43) Position 1 = 40, Position 2 = 42
Branch analysis from position: 40
1 jumps found. (Code = 42) Position 1 = 43
Branch analysis from position: 43
1 jumps found. (Code = 79) Position 1 = -2
Branch analysis from position: 42
1 jumps found. (Code = 79) Position 1 = -2
Branch analysis from position: 34
filename: /in/eLuX7
function name: (null)
number of ops: 46
compiled vars: !0 = $flag, !1 = $password, !2 = $reg, !3 = $arr, !4 = $c, !5 = $ps, !6 = $pt
line #* E I O op fetch ext return operands
-------------------------------------------------------------------------------------
2 0 E > ASSIGN !0, 'THIS+IS+FLAG'
3 1 ASSIGN !1, '42.'
5 2 INIT_FCALL 'preg_match'
3 SEND_VAL '%2F%5E%5B%5B%3Agraph%3A%5D%5D%7B12%2C%7D%24%2F'
4 SEND_VAR !1
5 DO_ICALL $9
6 IS_SMALLER_OR_EQUAL $9, 0
7 > JMPZ ~10, ->10
7 8 > ECHO 'Wrong+Format'
8 9 > EXIT
11 10 > > JMP ->44
13 11 > ASSIGN !2, '%2F%28%5B%5B%3Apunct%3A%5D%5D%2B%7C%5B%5B%3Adigit%3A%5D%5D%2B%7C%5B%5B%3Aupper%3A%5D%5D%2B%7C%5B%5B%3Alower%3A%5D%5D%2B%29%2F'
14 12 INIT_FCALL 'preg_match_all'
13 SEND_VAR !2
14 SEND_VAR !1
15 SEND_REF !3
16 DO_ICALL $12
17 IS_SMALLER $12, 6
18 > JMPZ ~13, ->20
15 19 > > JMP ->45
17 20 > ASSIGN !4, 0
18 21 ASSIGN !5, <array>
19 22 > FE_RESET_R $16 !5, ->34
23 > > FE_FETCH_R $16, !6, ->34
21 24 > INIT_FCALL 'preg_match'
25 ROPE_INIT 3 ~18 '%2F%5B%5B%3A'
26 ROPE_ADD 1 ~18 ~18, !6
27 ROPE_END 2 ~17 ~18, '%3A%5D%5D%2B%2F'
28 SEND_VAL ~17
29 SEND_VAR !1
30 DO_ICALL $20
31 > JMPZ $20, ->33
22 32 > ASSIGN_OP 1 !4, 1
19 33 > > JMP ->23
34 > FE_FREE $16
25 35 IS_SMALLER !4, 3
36 > JMPZ ~22, ->38
37 > > JMP ->45
26 38 > IS_EQUAL !1, '42'
39 > JMPZ ~23, ->42
40 > ECHO !0
41 > JMP ->43
27 42 > ECHO 'Wrong+password'
28 43 > > EXIT
11 44 > > JMPNZ <true>, ->11
30 45 > > RETURN 1
Generated using Vulcan Logic Dumper, using php 8.0.0