Finding entry points Branch analysis from position: 0 2 jumps found. (Code = 43) Position 1 = 8, Position 2 = 10 Branch analysis from position: 8 1 jumps found. (Code = 79) Position 1 = -2 Branch analysis from position: 10 1 jumps found. (Code = 42) Position 1 = 44 Branch analysis from position: 44 2 jumps found. (Code = 44) Position 1 = 45, Position 2 = 11 Branch analysis from position: 45 1 jumps found. (Code = 62) Position 1 = -2 Branch analysis from position: 11 2 jumps found. (Code = 43) Position 1 = 19, Position 2 = 20 Branch analysis from position: 19 1 jumps found. (Code = 42) Position 1 = 45 Branch analysis from position: 45 Branch analysis from position: 20 2 jumps found. (Code = 77) Position 1 = 23, Position 2 = 34 Branch analysis from position: 23 2 jumps found. (Code = 78) Position 1 = 24, Position 2 = 34 Branch analysis from position: 24 2 jumps found. (Code = 43) Position 1 = 32, Position 2 = 33 Branch analysis from position: 32 1 jumps found. (Code = 42) Position 1 = 23 Branch analysis from position: 23 Branch analysis from position: 33 Branch analysis from position: 34 2 jumps found. (Code = 43) Position 1 = 37, Position 2 = 38 Branch analysis from position: 37 1 jumps found. (Code = 42) Position 1 = 45 Branch analysis from position: 45 Branch analysis from position: 38 2 jumps found. (Code = 43) Position 1 = 40, Position 2 = 42 Branch analysis from position: 40 1 jumps found. (Code = 42) Position 1 = 43 Branch analysis from position: 43 1 jumps found. (Code = 79) Position 1 = -2 Branch analysis from position: 42 1 jumps found. (Code = 79) Position 1 = -2 Branch analysis from position: 34 filename: /in/eLuX7 function name: (null) number of ops: 46 compiled vars: !0 = $flag, !1 = $password, !2 = $reg, !3 = $arr, !4 = $c, !5 = $ps, !6 = $pt line #* E I O op fetch ext return operands ------------------------------------------------------------------------------------- 2 0 E > ASSIGN !0, 'THIS+IS+FLAG' 3 1 ASSIGN !1, '42.' 5 2 INIT_FCALL 'preg_match' 3 SEND_VAL '%2F%5E%5B%5B%3Agraph%3A%5D%5D%7B12%2C%7D%24%2F' 4 SEND_VAR !1 5 DO_ICALL $9 6 IS_SMALLER_OR_EQUAL $9, 0 7 > JMPZ ~10, ->10 7 8 > ECHO 'Wrong+Format' 8 9 > EXIT 11 10 > > JMP ->44 13 11 > ASSIGN !2, '%2F%28%5B%5B%3Apunct%3A%5D%5D%2B%7C%5B%5B%3Adigit%3A%5D%5D%2B%7C%5B%5B%3Aupper%3A%5D%5D%2B%7C%5B%5B%3Alower%3A%5D%5D%2B%29%2F' 14 12 INIT_FCALL 'preg_match_all' 13 SEND_VAR !2 14 SEND_VAR !1 15 SEND_REF !3 16 DO_ICALL $12 17 IS_SMALLER $12, 6 18 > JMPZ ~13, ->20 15 19 > > JMP ->45 17 20 > ASSIGN !4, 0 18 21 ASSIGN !5, <array> 19 22 > FE_RESET_R $16 !5, ->34 23 > > FE_FETCH_R $16, !6, ->34 21 24 > INIT_FCALL 'preg_match' 25 ROPE_INIT 3 ~18 '%2F%5B%5B%3A' 26 ROPE_ADD 1 ~18 ~18, !6 27 ROPE_END 2 ~17 ~18, '%3A%5D%5D%2B%2F' 28 SEND_VAL ~17 29 SEND_VAR !1 30 DO_ICALL $20 31 > JMPZ $20, ->33 22 32 > ASSIGN_OP 1 !4, 1 19 33 > > JMP ->23 34 > FE_FREE $16 25 35 IS_SMALLER !4, 3 36 > JMPZ ~22, ->38 37 > > JMP ->45 26 38 > IS_EQUAL !1, '42' 39 > JMPZ ~23, ->42 40 > ECHO !0 41 > JMP ->43 27 42 > ECHO 'Wrong+password' 28 43 > > EXIT 11 44 > > JMPNZ <true>, ->11 30 45 > > RETURN 1
Generated using Vulcan Logic Dumper, using php 8.0.0