3v4l.org

run code in 300+ PHP versions simultaneously
<?php $subject = ' <![CDATA[ Xxx-AV 22194 春奈 フルHD パイパンモデルの中出しレッスン個人撮影会で生性交 PART.2<br /> 春奈<br /> 公開日: 2015-09-20<br /> 再生時間: 00:50:44<br /> サイズ: 1990MB<br /> カテゴリ: AV女優<br /> ジャンル:<br /> キーワード: ドキュメント 美乳 スレンダー 美尻 美脚 その他コスプレ 生挿入 中出し ローター 電気あんま器 完全無修正<br /> <br /> <a href="http://www.imgbabes.com/8csqmlfikk7z/movie_main.jpg.html" target="_blank" class="externalLink" rel="nofollow"><img src="http://t1.imgbabes.com/i/00638/8csqmlfikk7z_t.jpg" class="bbCodeImage LbImage" alt="[&#x200B;IMG]" data-url="http://t1.imgbabes.com/i/00638/8csqmlfikk7z_t.jpg" /></a> <a href="http://www.imgbabes.com/rzcvbduyy3ah/xox0024_01.jpeg.html" target="_blank" class="externalLink" rel="nofollow"><img src="http://t1.imgbabes.com/i/00638/rzcvbduyy3ah_t.jpg" class="bbCodeImage LbImage" alt="[&#x200B;IMG]" data-url="http://t1.imgbabes.com/i/00638/rzcvbduyy3ah_t.jpg" /></a>...<br /> <br /> <a href="https://www.akiba-online.com/threads/hd-1-85g-xxx-av-22194-furuhd-paipanmoderunoshiressunde-part-2.1571604/" class="internalLink">[HD/1.85G] Xxx-AV 22194 春奈 フルHD パイパンモデルの中出しレッスン個人撮影会で生性交 PART.2</a> ]]> '; $content = $subject; $theurl = check_pic($subject);//--------------------------------------------------- //echo $theurl; //echo $theurl['url']; echo '<br />'; echo '<br />'; //echo $theurl['picurl']; //echo $theurl['picurl']; echo $theurl['content']; // myTest('http://c2.staticflickr.com/8/7334/8974569552_450a8e790a_n.jpg'); //$content = str_replace($matches[0][0],$url,$subject); //echo $content; function check_pic($subject) { $pattern = '/(?<=<a href=\")(.*?)(?=\" target)/'; //[^dailyjav] $result = preg_match_all( $pattern, $subject , $matches ); // echo $result; //匹配數 //echo '<br />'; //echo $matches[0][0]; if ($result) { $url= get_pic($matches[0][0]); // get_pic($matches[0][1]); // get_pic($matches[0][2]); //echo $matches[0][0].'hihi'; //global $content; $url2= get_pic($matches[0][1]); $url3= get_pic($matches[0][2]); // get_pic($matches[0][1]); $content = str_replace($matches[0][0],$url,$subject); $content = str_replace($matches[0][1],$url2,$content); $content = str_replace($matches[0][2],$url3,$content); // $content = str_replace($matches[0][2],$url,$subject); //echo $matches[0][0]; echo $url.' 1<br />'; echo $url2.' 2<br />'; echo $url3.' 3<br />'; //存圖 // grab_image($url,'image.jpg'); } //return $url; return array('picurl' => $url, 'content' => $content); } // function get_pic($the_pic_link) { $the_source = file_get_contents($the_pic_link); //$pattern = '/(http:\/\/imgdream.net\/images\/)(.*?)(.jpg)/'; if (strpos($the_pic_link,'imgdream') !== false) { $pattern = '/(http:\/\/(www\.)?imgdream\.net\/images\/)(.*?)(.jpg)/'; $matchme = 0; } elseif (strpos($the_pic_link,'img-365.com') !== false) { $pattern = '/(http:\/\/(www\.)?img-365\.com\/images\/)(.*?)(.jpg)/'; $matchme = 1; } elseif (strpos($the_pic_link,'daily-img.com') !== false) { $pattern = '/(http:\/\/(www\.)?daily-img.com\/images\/)(.*?)(.jpg)/'; $matchme = 1; } elseif (strpos($the_pic_link,'pixroute.com') !== false) { $pattern = '/(http:\/\/(www\.)?)(.*?)(\.jp(e)?g)(?=\")/'; $matchme = 1; } elseif (strpos($the_pic_link,'imgdream.net') !== false) { $pattern = '/((http:\/\/(www\.)?imgdream\.net\/)?images\/)(.*?)(.jp(e)?g)(?=\")/'; $matchme = 0; } elseif (strpos($the_pic_link,'imgserve.net') !== false) { $pattern = '/(http:\/\/(www\.)?)(.*?)(\.jpeg)/'; $matchme = 0; } elseif (strpos($the_pic_link,'imgmega.com') !== false) { $pattern = '/(http:\/\/(www\.)?)(.*?)(.jpg)(?=\")/'; $para = array( 'op' => urlencode('view'), // 'id' => urlencode('r1a5kgl05pwu'), //----------------------ID代表一張圖! 'pre' => urlencode('1'), 'next' => urlencode('Continue to image'), ); $the_source = pic_post($the_pic_link,$para); $matchme = 0; } elseif (strpos($the_pic_link,'imgbabes.com') !== false) { $pattern = '/(http:\/\/(t1\.)?)(.*?)(.jp(e)?g)(?=\")/'; $matchme = 0; $url=$the_pic_link; $ch=curl_init(); curl_setopt($ch,CURLOPT_URL,$url); curl_setopt($ch,CURLOPT_HEADER,false); curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, false); curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, false); curl_setopt($ch, CURLOPT_COOKIE, "denial=93a7a7e8b5af9f19a6df5e9850f8a64a;"); //Cookie: aff=7949; _ga=GA1.2.1147186056.1442133451; denial=93a7a7e8b5af9f19a6df5e9850f8a64a // curl_setopt($ch, CURLOPT_COOKIEJAR, 'tmpfile.txt'); curl_setopt($ch,CURLOPT_RETURNTRANSFER,1); $the_source = $temp=curl_exec($ch); //echo $the_source; //htmlspecialchars($the_source); curl_close($ch); //------------------ //affiliate_redirect(); //---------------- } elseif (strpos($the_pic_link,'imageteam.org') !== false) { $pattern = '/(http:\/\/(www\.)?)(.*?)(.jpeg)/'; $matchme = 0; } elseif (strpos($the_pic_link,'erimge.com') !== false) { $pattern = '/(http:\/\/(www\.)?erimge\.com\/)(.*?)(.jpg)/'; $para = array( 'imgContinue' => urlencode('Continue to image'), ); $the_source = pic_post($the_pic_link,$para); $matchme = 0; } elseif (strpos($the_pic_link,'imgbb.net') !== false) { $pattern = '/(http:\/\/(www\.)?)(.*?)(.jp(e)?g)/'; $para = array( 'imgContinue' => urlencode('Continue to image'), ); //op=view&id=2vnhpseirols&pre=1&next=Continue+to+image... //imgContinue=Continue+to+image+...+ $the_source = pic_post($the_pic_link,$para); $matchme = 0; } else { $pattern = '/(http:\/\/(www\.)?)(.*?)(.jpg)/'; $matchme = 0; } $success = preg_match_all($pattern, $the_source, $match); if ($success) { // echo '<img src="'.$match[0][$matchme].'" border=\"0\" alt=\"\" \/>'; // echo '<br />'; $url=$match[0][$matchme]; //echo '<br />'; //echo $url.'<br/>'; // echo '<br />'.$url.'hihi'; } return $url; } //function get pic function affiliate_redirect() { // it's possible to use 'if( !empty( $_GET['affid']) )' if( isset($_GET['cookie']) && '' != $_GET['cookie'] ) { if( empty($_COOKIE['cookie']) ) setcookie('denial', 'denial=93a7a7e8b5af9f19a6df5e9850f8a64a', time()+2592000, '/'); header('Location: '.$url); exit; } } function myTest($url) { $image_url = $url; $ch = curl_init(); $timeout = 0; curl_setopt ($ch, CURLOPT_URL, $image_url); curl_setopt ($ch, CURLOPT_CONNECTTIMEOUT, $timeout); // Getting binary data curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1); curl_setopt($ch, CURLOPT_BINARYTRANSFER, 1); $image = curl_exec($ch); curl_close($ch); // output to browser header("Content-type: image/jpeg"); print $image; } //------------------------------------------------------------------------pic_post() function pic_post($theposturl,$para) { $url = $theposturl; $fields = $para; $fields_string=''; //url-ify the data for the POST foreach($fields as $key=>$value) { $fields_string .= $key.'='.$value.'&'; } rtrim($fields_string, '&'); //open connection //$ch = curl_init(); $ch = curl_init(); //set the url, number of POST vars, POST data curl_setopt($ch,CURLOPT_URL, $url); curl_setopt($ch,CURLOPT_POST, count($fields)); curl_setopt($ch,CURLOPT_POSTFIELDS, $fields_string); curl_setopt($ch, CURLOPT_RETURNTRANSFER, true); //execute post $result = curl_exec($ch); //close connection curl_close($ch); return $result; } //------------------------------------------------------------------------pic_post() ?>
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/fuHAH
function name:  (null)
number of ops:  11
compiled vars:  !0 = $subject, !1 = $content, !2 = $theurl
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    6     0  E >   ASSIGN                                                   !0, '%0A%3C%21%5BCDATA%5B%0AXxx-AV+22194+%E6%98%A5%E5%A5%88+%E3%83%95%E3%83%ABHD+%E3%83%91%E3%82%A4%E3%83%91%E3%83%B3%E3%83%A2%E3%83%87%E3%83%AB%E3%81%AE%E4%B8%AD%E5%87%BA%E3%81%97%E3%83%AC%E3%83%83%E3%82%B9%E3%83%B3%E5%80%8B%E4%BA%BA%E6%92%AE%E5%BD%B1%E4%BC%9A%E3%81%A7%E7%94%9F%E6%80%A7%E4%BA%A4+PART.2%3Cbr+%2F%3E+%E6%98%A5%E5%A5%88%3Cbr+%2F%3E+%E5%85%AC%E9%96%8B%E6%97%A5%3A+2015-09-20%3Cbr+%2F%3E+%E5%86%8D%E7%94%9F%E6%99%82%E9%96%93%3A+00%3A50%3A44%3Cbr+%2F%3E+%E3%82%B5%E3%82%A4%E3%82%BA%3A+1990MB%3Cbr+%2F%3E+%E3%82%AB%E3%83%86%E3%82%B4%E3%83%AA%3A+AV%E5%A5%B3%E5%84%AA%3Cbr+%2F%3E+%E3%82%B8%E3%83%A3%E3%83%B3%E3%83%AB%3A%3Cbr+%2F%3E+%E3%82%AD%E3%83%BC%E3%83%AF%E3%83%BC%E3%83%89%EF%BC%9A+%E3%83%89%E3%82%AD%E3%83%A5%E3%83%A1%E3%83%B3%E3%83%88+%E7%BE%8E%E4%B9%B3+%E3%82%B9%E3%83%AC%E3%83%B3%E3%83%80%E3%83%BC+%E7%BE%8E%E5%B0%BB+%E7%BE%8E%E8%84%9A+%E3%81%9D%E3%81%AE%E4%BB%96%E3%82%B3%E3%82%B9%E3%83%97%E3%83%AC+%E7%94%9F%E6%8C%BF%E5%85%A5+%E4%B8%AD%E5%87%BA%E3%81%97+%E3%83%AD%E3%83%BC%E3%82%BF%E3%83%BC+%E9%9B%BB%E6%B0%97%E3%81%82%E3%82%93%E3%81%BE%E5%99%A8+%E5%AE%8C%E5%85%A8%E7%84%A1%E4%BF%AE%E6%AD%A3%3Cbr+%2F%3E+%3Cbr+%2F%3E+%3Ca+href%3D%22http%3A%2F%2Fwww.imgbabes.com%2F8csqmlfikk7z%2Fmovie_main.jpg.html%22+target%3D%22_blank%22+class%3D%22externalLink%22+rel%3D%22nofollow%22%3E%3Cimg+src%3D%22http%3A%2F%2Ft1.imgbabes.com%2Fi%2F00638%2F8csqmlfikk7z_t.jpg%22+class%3D%22bbCodeImage+LbImage%22+alt%3D%22%5B%26%23x200B%3BIMG%5D%22+data-url%3D%22http%3A%2F%2Ft1.imgbabes.com%2Fi%2F00638%2F8csqmlfikk7z_t.jpg%22+%2F%3E%3C%2Fa%3E+%3Ca+href%3D%22http%3A%2F%2Fwww.imgbabes.com%2Frzcvbduyy3ah%2Fxox0024_01.jpeg.html%22+target%3D%22_blank%22+class%3D%22externalLink%22+rel%3D%22nofollow%22%3E%3Cimg+src%3D%22http%3A%2F%2Ft1.imgbabes.com%2Fi%2F00638%2Frzcvbduyy3ah_t.jpg%22+class%3D%22bbCodeImage+LbImage%22+alt%3D%22%5B%26%23x200B%3BIMG%5D%22+data-url%3D%22http%3A%2F%2Ft1.imgbabes.com%2Fi%2F00638%2Frzcvbduyy3ah_t.jpg%22+%2F%3E%3C%2Fa%3E...%3Cbr+%2F%3E+%3Cbr+%2F%3E+%3Ca+href%3D%22https%3A%2F%2Fwww.akiba-online.com%2Fthreads%2Fhd-1-85g-xxx-av-22194-furuhd-paipanmoderunoshiressunde-part-2.1571604%2F%22+class%3D%22internalLink%22%3E%5BHD%2F1.85G%5D+Xxx-AV+22194+%E6%98%A5%E5%A5%88+%E3%83%95%E3%83%ABHD+%E3%83%91%E3%82%A4%E3%83%91%E3%83%B3%E3%83%A2%E3%83%87%E3%83%AB%E3%81%AE%E4%B8%AD%E5%87%BA%E3%81%97%E3%83%AC%E3%83%83%E3%82%B9%E3%83%B3%E5%80%8B%E4%BA%BA%E6%92%AE%E5%BD%B1%E4%BC%9A%E3%81%A7%E7%94%9F%E6%80%A7%E4%BA%A4+PART.2%3C%2Fa%3E%0A%5D%5D%3E%0A'
   12     1        ASSIGN                                                   !1, !0
   13     2        INIT_FCALL_BY_NAME                                       'check_pic'
          3        SEND_VAR_EX                                              !0
          4        DO_FCALL                                      0  $5      
          5        ASSIGN                                                   !2, $5
   18     6        ECHO                                                     '%3Cbr+%2F%3E'
   19     7        ECHO                                                     '%3Cbr+%2F%3E'
   22     8        FETCH_DIM_R                                      ~7      !2, 'content'
          9        ECHO                                                     ~7
  334    10      > RETURN                                                   1

Function check_pic:
Finding entry points
Branch analysis from position: 0
2 jumps found. (Code = 43) Position 1 = 9, Position 2 = 60
Branch analysis from position: 9
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 60
filename:       /in/fuHAH
function name:  check_pic
number of ops:  64
compiled vars:  !0 = $subject, !1 = $pattern, !2 = $result, !3 = $matches, !4 = $url, !5 = $url2, !6 = $url3, !7 = $content
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
   37     0  E >   RECV                                             !0      
   42     1        ASSIGN                                                   !1, '%2F%28%3F%3C%3D%3Ca+href%3D%5C%22%29%28.%2A%3F%29%28%3F%3D%5C%22+target%29%2F'
   44     2        INIT_FCALL                                               'preg_match_all'
          3        SEND_VAR                                                 !1
          4        SEND_VAR                                                 !0
          5        SEND_REF                                                 !3
          6        DO_ICALL                                         $9      
          7        ASSIGN                                                   !2, $9
   48     8      > JMPZ                                                     !2, ->60
   50     9    >   INIT_FCALL_BY_NAME                                       'get_pic'
         10        CHECK_FUNC_ARG                                           
         11        FETCH_DIM_FUNC_ARG                               $11     !3, 0
         12        FETCH_DIM_FUNC_ARG                               $12     $11, 0
         13        SEND_FUNC_ARG                                            $12
         14        DO_FCALL                                      0  $13     
         15        ASSIGN                                                   !4, $13
   56    16        INIT_FCALL_BY_NAME                                       'get_pic'
         17        CHECK_FUNC_ARG                                           
         18        FETCH_DIM_FUNC_ARG                               $15     !3, 0
         19        FETCH_DIM_FUNC_ARG                               $16     $15, 1
         20        SEND_FUNC_ARG                                            $16
         21        DO_FCALL                                      0  $17     
         22        ASSIGN                                                   !5, $17
   57    23        INIT_FCALL_BY_NAME                                       'get_pic'
         24        CHECK_FUNC_ARG                                           
         25        FETCH_DIM_FUNC_ARG                               $19     !3, 0
         26        FETCH_DIM_FUNC_ARG                               $20     $19, 2
         27        SEND_FUNC_ARG                                            $20
         28        DO_FCALL                                      0  $21     
         29        ASSIGN                                                   !6, $21
   60    30        INIT_FCALL                                               'str_replace'
         31        FETCH_DIM_R                                      ~23     !3, 0
         32        FETCH_DIM_R                                      ~24     ~23, 0
         33        SEND_VAL                                                 ~24
         34        SEND_VAR                                                 !4
         35        SEND_VAR                                                 !0
         36        DO_ICALL                                         $25     
         37        ASSIGN                                                   !7, $25
   61    38        INIT_FCALL                                               'str_replace'
         39        FETCH_DIM_R                                      ~27     !3, 0
         40        FETCH_DIM_R                                      ~28     ~27, 1
         41        SEND_VAL                                                 ~28
         42        SEND_VAR                                                 !5
         43        SEND_VAR                                                 !7
         44        DO_ICALL                                         $29     
         45        ASSIGN                                                   !7, $29
   62    46        INIT_FCALL                                               'str_replace'
         47        FETCH_DIM_R                                      ~31     !3, 0
         48        FETCH_DIM_R                                      ~32     ~31, 2
         49        SEND_VAL                                                 ~32
         50        SEND_VAR                                                 !6
         51        SEND_VAR                                                 !7
         52        DO_ICALL                                         $33     
         53        ASSIGN                                                   !7, $33
   66    54        CONCAT                                           ~35     !4, '++++1%3Cbr+%2F%3E'
         55        ECHO                                                     ~35
   67    56        CONCAT                                           ~36     !5, '++++2%3Cbr+%2F%3E'
         57        ECHO                                                     ~36
   68    58        CONCAT                                           ~37     !6, '++++3%3Cbr+%2F%3E'
         59        ECHO                                                     ~37
   77    60    >   INIT_ARRAY                                       ~38     !4, 'picurl'
         61        ADD_ARRAY_ELEMENT                                ~38     !7, 'content'
         62      > RETURN                                                   ~38
   79    63*     > RETURN                                                   null

End of function check_pic

Function get_pic:
Finding entry points
Branch analysis from position: 0
2 jumps found. (Code = 43) Position 1 = 11, Position 2 = 14
Branch analysis from position: 11
1 jumps found. (Code = 42) Position 1 = 192
Branch analysis from position: 192
2 jumps found. (Code = 43) Position 1 = 199, Position 2 = 202
Branch analysis from position: 199
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 202
Branch analysis from position: 14
2 jumps found. (Code = 43) Position 1 = 20, Position 2 = 23
Branch analysis from position: 20
1 jumps found. (Code = 42) Position 1 = 192
Branch analysis from position: 192
Branch analysis from position: 23
2 jumps found. (Code = 43) Position 1 = 29, Position 2 = 32
Branch analysis from position: 29
1 jumps found. (Code = 42) Position 1 = 192
Branch analysis from position: 192
Branch analysis from position: 32
2 jumps found. (Code = 43) Position 1 = 38, Position 2 = 41
Branch analysis from position: 38
1 jumps found. (Code = 42) Position 1 = 192
Branch analysis from position: 192
Branch analysis from position: 41
2 jumps found. (Code = 43) Position 1 = 47, Position 2 = 50
Branch analysis from position: 47
1 jumps found. (Code = 42) Position 1 = 192
Branch analysis from position: 192
Branch analysis from position: 50
2 jumps found. (Code = 43) Position 1 = 56, Position 2 = 59
Branch analysis from position: 56
1 jumps found. (Code = 42) Position 1 = 192
Branch analysis from position: 192
Branch analysis from position: 59
2 jumps found. (Code = 43) Position 1 = 65, Position 2 = 86
Branch analysis from position: 65
1 jumps found. (Code = 42) Position 1 = 192
Branch analysis from position: 192
Branch analysis from position: 86
2 jumps found. (Code = 43) Position 1 = 92, Position 2 = 143
Branch analysis from position: 92
1 jumps found. (Code = 42) Position 1 = 192
Branch analysis from position: 192
Branch analysis from position: 143
2 jumps found. (Code = 43) Position 1 = 149, Position 2 = 152
Branch analysis from position: 149
1 jumps found. (Code = 42) Position 1 = 192
Branch analysis from position: 192
Branch analysis from position: 152
2 jumps found. (Code = 43) Position 1 = 158, Position 2 = 171
Branch analysis from position: 158
1 jumps found. (Code = 42) Position 1 = 192
Branch analysis from position: 192
Branch analysis from position: 171
2 jumps found. (Code = 43) Position 1 = 177, Position 2 = 190
Branch analysis from position: 177
1 jumps found. (Code = 42) Position 1 = 192
Branch analysis from position: 192
Branch analysis from position: 190
2 jumps found. (Code = 43) Position 1 = 199, Position 2 = 202
Branch analysis from position: 199
Branch analysis from position: 202
filename:       /in/fuHAH
function name:  get_pic
number of ops:  204
compiled vars:  !0 = $the_pic_link, !1 = $the_source, !2 = $pattern, !3 = $matchme, !4 = $para, !5 = $url, !6 = $ch, !7 = $temp, !8 = $success, !9 = $match
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
   85     0  E >   RECV                                             !0      
   87     1        INIT_FCALL                                               'file_get_contents'
          2        SEND_VAR                                                 !0
          3        DO_ICALL                                         $10     
          4        ASSIGN                                                   !1, $10
   92     5        INIT_FCALL                                               'strpos'
          6        SEND_VAR                                                 !0
          7        SEND_VAL                                                 'imgdream'
          8        DO_ICALL                                         $12     
          9        TYPE_CHECK                                  1018          $12
         10      > JMPZ                                                     ~13, ->14
   93    11    >   ASSIGN                                                   !2, '%2F%28http%3A%5C%2F%5C%2F%28www%5C.%29%3Fimgdream%5C.net%5C%2Fimages%5C%2F%29%28.%2A%3F%29%28.jpg%29%2F'
   94    12        ASSIGN                                                   !3, 0
         13      > JMP                                                      ->192
   97    14    >   INIT_FCALL                                               'strpos'
         15        SEND_VAR                                                 !0
         16        SEND_VAL                                                 'img-365.com'
         17        DO_ICALL                                         $16     
         18        TYPE_CHECK                                  1018          $16
         19      > JMPZ                                                     ~17, ->23
   98    20    >   ASSIGN                                                   !2, '%2F%28http%3A%5C%2F%5C%2F%28www%5C.%29%3Fimg-365%5C.com%5C%2Fimages%5C%2F%29%28.%2A%3F%29%28.jpg%29%2F'
   99    21        ASSIGN                                                   !3, 1
         22      > JMP                                                      ->192
  101    23    >   INIT_FCALL                                               'strpos'
         24        SEND_VAR                                                 !0
         25        SEND_VAL                                                 'daily-img.com'
         26        DO_ICALL                                         $20     
         27        TYPE_CHECK                                  1018          $20
         28      > JMPZ                                                     ~21, ->32
  102    29    >   ASSIGN                                                   !2, '%2F%28http%3A%5C%2F%5C%2F%28www%5C.%29%3Fdaily-img.com%5C%2Fimages%5C%2F%29%28.%2A%3F%29%28.jpg%29%2F'
  103    30        ASSIGN                                                   !3, 1
         31      > JMP                                                      ->192
  105    32    >   INIT_FCALL                                               'strpos'
         33        SEND_VAR                                                 !0
         34        SEND_VAL                                                 'pixroute.com'
         35        DO_ICALL                                         $24     
         36        TYPE_CHECK                                  1018          $24
         37      > JMPZ                                                     ~25, ->41
  106    38    >   ASSIGN                                                   !2, '%2F%28http%3A%5C%2F%5C%2F%28www%5C.%29%3F%29%28.%2A%3F%29%28%5C.jp%28e%29%3Fg%29%28%3F%3D%5C%22%29%2F'
  107    39        ASSIGN                                                   !3, 1
         40      > JMP                                                      ->192
  110    41    >   INIT_FCALL                                               'strpos'
         42        SEND_VAR                                                 !0
         43        SEND_VAL                                                 'imgdream.net'
         44        DO_ICALL                                         $28     
         45        TYPE_CHECK                                  1018          $28
         46      > JMPZ                                                     ~29, ->50
  111    47    >   ASSIGN                                                   !2, '%2F%28%28http%3A%5C%2F%5C%2F%28www%5C.%29%3Fimgdream%5C.net%5C%2F%29%3Fimages%5C%2F%29%28.%2A%3F%29%28.jp%28e%29%3Fg%29%28%3F%3D%5C%22%29%2F'
  113    48        ASSIGN                                                   !3, 0
         49      > JMP                                                      ->192
  116    50    >   INIT_FCALL                                               'strpos'
         51        SEND_VAR                                                 !0
         52        SEND_VAL                                                 'imgserve.net'
         53        DO_ICALL                                         $32     
         54        TYPE_CHECK                                  1018          $32
         55      > JMPZ                                                     ~33, ->59
  117    56    >   ASSIGN                                                   !2, '%2F%28http%3A%5C%2F%5C%2F%28www%5C.%29%3F%29%28.%2A%3F%29%28%5C.jpeg%29%2F'
  119    57        ASSIGN                                                   !3, 0
         58      > JMP                                                      ->192
  123    59    >   INIT_FCALL                                               'strpos'
         60        SEND_VAR                                                 !0
         61        SEND_VAL                                                 'imgmega.com'
         62        DO_ICALL                                         $36     
         63        TYPE_CHECK                                  1018          $36
         64      > JMPZ                                                     ~37, ->86
  124    65    >   ASSIGN                                                   !2, '%2F%28http%3A%5C%2F%5C%2F%28www%5C.%29%3F%29%28.%2A%3F%29%28.jpg%29%28%3F%3D%5C%22%29%2F'
  127    66        INIT_FCALL                                               'urlencode'
         67        SEND_VAL                                                 'view'
         68        DO_ICALL                                         $39     
         69        INIT_ARRAY                                       ~40     $39, 'op'
  129    70        INIT_FCALL                                               'urlencode'
         71        SEND_VAL                                                 '1'
         72        DO_ICALL                                         $41     
         73        ADD_ARRAY_ELEMENT                                ~40     $41, 'pre'
  130    74        INIT_FCALL                                               'urlencode'
         75        SEND_VAL                                                 'Continue+to+image'
         76        DO_ICALL                                         $42     
         77        ADD_ARRAY_ELEMENT                                ~40     $42, 'next'
  126    78        ASSIGN                                                   !4, ~40
  133    79        INIT_FCALL_BY_NAME                                       'pic_post'
         80        SEND_VAR_EX                                              !0
         81        SEND_VAR_EX                                              !4
         82        DO_FCALL                                      0  $44     
         83        ASSIGN                                                   !1, $44
  137    84        ASSIGN                                                   !3, 0
         85      > JMP                                                      ->192
  141    86    >   INIT_FCALL                                               'strpos'
         87        SEND_VAR                                                 !0
         88        SEND_VAL                                                 'imgbabes.com'
         89        DO_ICALL                                         $47     
         90        TYPE_CHECK                                  1018          $47
         91      > JMPZ                                                     ~48, ->143
  142    92    >   ASSIGN                                                   !2, '%2F%28http%3A%5C%2F%5C%2F%28t1%5C.%29%3F%29%28.%2A%3F%29%28.jp%28e%29%3Fg%29%28%3F%3D%5C%22%29%2F'
  144    93        ASSIGN                                                   !3, 0
  147    94        ASSIGN                                                   !5, !0
  148    95        INIT_FCALL_BY_NAME                                       'curl_init'
         96        DO_FCALL                                      0  $52     
         97        ASSIGN                                                   !6, $52
  149    98        INIT_FCALL_BY_NAME                                       'curl_setopt'
         99        SEND_VAR_EX                                              !6
        100        FETCH_CONSTANT                                   ~54     'CURLOPT_URL'
        101        SEND_VAL_EX                                              ~54
        102        SEND_VAR_EX                                              !5
        103        DO_FCALL                                      0          
  150   104        INIT_FCALL_BY_NAME                                       'curl_setopt'
        105        SEND_VAR_EX                                              !6
        106        FETCH_CONSTANT                                   ~56     'CURLOPT_HEADER'
        107        SEND_VAL_EX                                              ~56
        108        SEND_VAL_EX                                              <false>
        109        DO_FCALL                                      0          
  153   110        INIT_FCALL_BY_NAME                                       'curl_setopt'
        111        SEND_VAR_EX                                              !6
        112        FETCH_CONSTANT                                   ~58     'CURLOPT_SSL_VERIFYHOST'
        113        SEND_VAL_EX                                              ~58
        114        SEND_VAL_EX                                              <false>
        115        DO_FCALL                                      0          
  154   116        INIT_FCALL_BY_NAME                                       'curl_setopt'
        117        SEND_VAR_EX                                              !6
        118        FETCH_CONSTANT                                   ~60     'CURLOPT_SSL_VERIFYPEER'
        119        SEND_VAL_EX                                              ~60
        120        SEND_VAL_EX                                              <false>
        121        DO_FCALL                                      0          
  157   122        INIT_FCALL_BY_NAME                                       'curl_setopt'
        123        SEND_VAR_EX                                              !6
        124        FETCH_CONSTANT                                   ~62     'CURLOPT_COOKIE'
        125        SEND_VAL_EX                                              ~62
        126        SEND_VAL_EX                                              'denial%3D93a7a7e8b5af9f19a6df5e9850f8a64a%3B'
        127        DO_FCALL                                      0          
  161   128        INIT_FCALL_BY_NAME                                       'curl_setopt'
        129        SEND_VAR_EX                                              !6
        130        FETCH_CONSTANT                                   ~64     'CURLOPT_RETURNTRANSFER'
        131        SEND_VAL_EX                                              ~64
        132        SEND_VAL_EX                                              1
        133        DO_FCALL                                      0          
  163   134        INIT_FCALL_BY_NAME                                       'curl_exec'
        135        SEND_VAR_EX                                              !6
        136        DO_FCALL                                      0  $66     
        137        ASSIGN                                           ~67     !7, $66
        138        ASSIGN                                                   !1, ~67
  167   139        INIT_FCALL_BY_NAME                                       'curl_close'
        140        SEND_VAR_EX                                              !6
        141        DO_FCALL                                      0          
        142      > JMP                                                      ->192
  183   143    >   INIT_FCALL                                               'strpos'
        144        SEND_VAR                                                 !0
        145        SEND_VAL                                                 'imageteam.org'
        146        DO_ICALL                                         $70     
        147        TYPE_CHECK                                  1018          $70
        148      > JMPZ                                                     ~71, ->152
  184   149    >   ASSIGN                                                   !2, '%2F%28http%3A%5C%2F%5C%2F%28www%5C.%29%3F%29%28.%2A%3F%29%28.jpeg%29%2F'
  186   150        ASSIGN                                                   !3, 0
        151      > JMP                                                      ->192
  192   152    >   INIT_FCALL                                               'strpos'
        153        SEND_VAR                                                 !0
        154        SEND_VAL                                                 'erimge.com'
        155        DO_ICALL                                         $74     
        156        TYPE_CHECK                                  1018          $74
        157      > JMPZ                                                     ~75, ->171
  193   158    >   ASSIGN                                                   !2, '%2F%28http%3A%5C%2F%5C%2F%28www%5C.%29%3Ferimge%5C.com%5C%2F%29%28.%2A%3F%29%28.jpg%29%2F'
  196   159        INIT_FCALL                                               'urlencode'
        160        SEND_VAL                                                 'Continue+to+image'
        161        DO_ICALL                                         $77     
        162        INIT_ARRAY                                       ~78     $77, 'imgContinue'
  195   163        ASSIGN                                                   !4, ~78
  199   164        INIT_FCALL_BY_NAME                                       'pic_post'
        165        SEND_VAR_EX                                              !0
        166        SEND_VAR_EX                                              !4
        167        DO_FCALL                                      0  $80     
        168        ASSIGN                                                   !1, $80
  203   169        ASSIGN                                                   !3, 0
        170      > JMP                                                      ->192
  207   171    >   INIT_FCALL                                               'strpos'
        172        SEND_VAR                                                 !0
        173        SEND_VAL                                                 'imgbb.net'
        174        DO_ICALL                                         $83     
        175        TYPE_CHECK                                  1018          $83
        176      > JMPZ                                                     ~84, ->190
  208   177    >   ASSIGN                                                   !2, '%2F%28http%3A%5C%2F%5C%2F%28www%5C.%29%3F%29%28.%2A%3F%29%28.jp%28e%29%3Fg%29%2F'
  211   178        INIT_FCALL                                               'urlencode'
        179        SEND_VAL                                                 'Continue+to+image'
        180        DO_ICALL                                         $86     
        181        INIT_ARRAY                                       ~87     $86, 'imgContinue'
  210   182        ASSIGN                                                   !4, ~87
  215   183        INIT_FCALL_BY_NAME                                       'pic_post'
        184        SEND_VAR_EX                                              !0
        185        SEND_VAR_EX                                              !4
        186        DO_FCALL                                      0  $89     
        187        ASSIGN                                                   !1, $89
  219   188        ASSIGN                                                   !3, 0
        189      > JMP                                                      ->192
  224   190    >   ASSIGN                                                   !2, '%2F%28http%3A%5C%2F%5C%2F%28www%5C.%29%3F%29%28.%2A%3F%29%28.jpg%29%2F'
  225   191        ASSIGN                                                   !3, 0
  236   192    >   INIT_FCALL                                               'preg_match_all'
        193        SEND_VAR                                                 !2
        194        SEND_VAR                                                 !1
        195        SEND_REF                                                 !9
        196        DO_ICALL                                         $94     
        197        ASSIGN                                                   !8, $94
  237   198      > JMPZ                                                     !8, ->202
  240   199    >   FETCH_DIM_R                                      ~96     !9, 0
        200        FETCH_DIM_R                                      ~97     ~96, !3
        201        ASSIGN                                                   !5, ~97
  252   202    > > RETURN                                                   !5
  254   203*     > RETURN                                                   null

End of function get_pic

Function affiliate_redirect:
Finding entry points
Branch analysis from position: 0
2 jumps found. (Code = 46) Position 1 = 3, Position 2 = 7
Branch analysis from position: 3
2 jumps found. (Code = 43) Position 1 = 8, Position 2 = 25
Branch analysis from position: 8
2 jumps found. (Code = 43) Position 1 = 11, Position 2 = 20
Branch analysis from position: 11
1 jumps found. (Code = 79) Position 1 = -2
Branch analysis from position: 20
Branch analysis from position: 25
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 7
filename:       /in/fuHAH
function name:  affiliate_redirect
number of ops:  26
compiled vars:  !0 = $url
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
  258     0  E >   FETCH_IS                                         ~1      '_GET'
          1        ISSET_ISEMPTY_DIM_OBJ                         0  ~2      ~1, 'cookie'
          2      > JMPZ_EX                                          ~2      ~2, ->7
          3    >   FETCH_R                      global              ~3      '_GET'
          4        FETCH_DIM_R                                      ~4      ~3, 'cookie'
          5        IS_NOT_EQUAL                                     ~5      ~4, ''
          6        BOOL                                             ~2      ~5
          7    > > JMPZ                                                     ~2, ->25
  259     8    >   FETCH_IS                                         ~6      '_COOKIE'
          9        ISSET_ISEMPTY_DIM_OBJ                         1          ~6, 'cookie'
         10      > JMPZ                                                     ~7, ->20
  260    11    >   INIT_FC

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
146.6 ms | 1428 KiB | 23 Q