Finding entry points Branch analysis from position: 0 1 jumps found. (Code = 62) Position 1 = -2 filename: /in/fuHAH function name: (null) number of ops: 11 compiled vars: !0 = $subject, !1 = $content, !2 = $theurl line #* E I O op fetch ext return operands ------------------------------------------------------------------------------------- 6 0 E > ASSIGN !0, '%0A%3C%21%5BCDATA%5B%0AXxx-AV+22194+%E6%98%A5%E5%A5%88+%E3%83%95%E3%83%ABHD+%E3%83%91%E3%82%A4%E3%83%91%E3%83%B3%E3%83%A2%E3%83%87%E3%83%AB%E3%81%AE%E4%B8%AD%E5%87%BA%E3%81%97%E3%83%AC%E3%83%83%E3%82%B9%E3%83%B3%E5%80%8B%E4%BA%BA%E6%92%AE%E5%BD%B1%E4%BC%9A%E3%81%A7%E7%94%9F%E6%80%A7%E4%BA%A4+PART.2%3Cbr+%2F%3E+%E6%98%A5%E5%A5%88%3Cbr+%2F%3E+%E5%85%AC%E9%96%8B%E6%97%A5%3A+2015-09-20%3Cbr+%2F%3E+%E5%86%8D%E7%94%9F%E6%99%82%E9%96%93%3A+00%3A50%3A44%3Cbr+%2F%3E+%E3%82%B5%E3%82%A4%E3%82%BA%3A+1990MB%3Cbr+%2F%3E+%E3%82%AB%E3%83%86%E3%82%B4%E3%83%AA%3A+AV%E5%A5%B3%E5%84%AA%3Cbr+%2F%3E+%E3%82%B8%E3%83%A3%E3%83%B3%E3%83%AB%3A%3Cbr+%2F%3E+%E3%82%AD%E3%83%BC%E3%83%AF%E3%83%BC%E3%83%89%EF%BC%9A+%E3%83%89%E3%82%AD%E3%83%A5%E3%83%A1%E3%83%B3%E3%83%88+%E7%BE%8E%E4%B9%B3+%E3%82%B9%E3%83%AC%E3%83%B3%E3%83%80%E3%83%BC+%E7%BE%8E%E5%B0%BB+%E7%BE%8E%E8%84%9A+%E3%81%9D%E3%81%AE%E4%BB%96%E3%82%B3%E3%82%B9%E3%83%97%E3%83%AC+%E7%94%9F%E6%8C%BF%E5%85%A5+%E4%B8%AD%E5%87%BA%E3%81%97+%E3%83%AD%E3%83%BC%E3%82%BF%E3%83%BC+%E9%9B%BB%E6%B0%97%E3%81%82%E3%82%93%E3%81%BE%E5%99%A8+%E5%AE%8C%E5%85%A8%E7%84%A1%E4%BF%AE%E6%AD%A3%3Cbr+%2F%3E+%3Cbr+%2F%3E+%3Ca+href%3D%22http%3A%2F%2Fwww.imgbabes.com%2F8csqmlfikk7z%2Fmovie_main.jpg.html%22+target%3D%22_blank%22+class%3D%22externalLink%22+rel%3D%22nofollow%22%3E%3Cimg+src%3D%22http%3A%2F%2Ft1.imgbabes.com%2Fi%2F00638%2F8csqmlfikk7z_t.jpg%22+class%3D%22bbCodeImage+LbImage%22+alt%3D%22%5B%26%23x200B%3BIMG%5D%22+data-url%3D%22http%3A%2F%2Ft1.imgbabes.com%2Fi%2F00638%2F8csqmlfikk7z_t.jpg%22+%2F%3E%3C%2Fa%3E+%3Ca+href%3D%22http%3A%2F%2Fwww.imgbabes.com%2Frzcvbduyy3ah%2Fxox0024_01.jpeg.html%22+target%3D%22_blank%22+class%3D%22externalLink%22+rel%3D%22nofollow%22%3E%3Cimg+src%3D%22http%3A%2F%2Ft1.imgbabes.com%2Fi%2F00638%2Frzcvbduyy3ah_t.jpg%22+class%3D%22bbCodeImage+LbImage%22+alt%3D%22%5B%26%23x200B%3BIMG%5D%22+data-url%3D%22http%3A%2F%2Ft1.imgbabes.com%2Fi%2F00638%2Frzcvbduyy3ah_t.jpg%22+%2F%3E%3C%2Fa%3E...%3Cbr+%2F%3E+%3Cbr+%2F%3E+%3Ca+href%3D%22https%3A%2F%2Fwww.akiba-online.com%2Fthreads%2Fhd-1-85g-xxx-av-22194-furuhd-paipanmoderunoshiressunde-part-2.1571604%2F%22+class%3D%22internalLink%22%3E%5BHD%2F1.85G%5D+Xxx-AV+22194+%E6%98%A5%E5%A5%88+%E3%83%95%E3%83%ABHD+%E3%83%91%E3%82%A4%E3%83%91%E3%83%B3%E3%83%A2%E3%83%87%E3%83%AB%E3%81%AE%E4%B8%AD%E5%87%BA%E3%81%97%E3%83%AC%E3%83%83%E3%82%B9%E3%83%B3%E5%80%8B%E4%BA%BA%E6%92%AE%E5%BD%B1%E4%BC%9A%E3%81%A7%E7%94%9F%E6%80%A7%E4%BA%A4+PART.2%3C%2Fa%3E%0A%5D%5D%3E%0A' 12 1 ASSIGN !1, !0 13 2 INIT_FCALL_BY_NAME 'check_pic' 3 SEND_VAR_EX !0 4 DO_FCALL 0 $5 5 ASSIGN !2, $5 18 6 ECHO '%3Cbr+%2F%3E' 19 7 ECHO '%3Cbr+%2F%3E' 22 8 FETCH_DIM_R ~7 !2, 'content' 9 ECHO ~7 334 10 > RETURN 1 Function check_pic: Finding entry points Branch analysis from position: 0 2 jumps found. (Code = 43) Position 1 = 9, Position 2 = 60 Branch analysis from position: 9 1 jumps found. (Code = 62) Position 1 = -2 Branch analysis from position: 60 filename: /in/fuHAH function name: check_pic number of ops: 64 compiled vars: !0 = $subject, !1 = $pattern, !2 = $result, !3 = $matches, !4 = $url, !5 = $url2, !6 = $url3, !7 = $content line #* E I O op fetch ext return operands ------------------------------------------------------------------------------------- 37 0 E > RECV !0 42 1 ASSIGN !1, '%2F%28%3F%3C%3D%3Ca+href%3D%5C%22%29%28.%2A%3F%29%28%3F%3D%5C%22+target%29%2F' 44 2 INIT_FCALL 'preg_match_all' 3 SEND_VAR !1 4 SEND_VAR !0 5 SEND_REF !3 6 DO_ICALL $9 7 ASSIGN !2, $9 48 8 > JMPZ !2, ->60 50 9 > INIT_FCALL_BY_NAME 'get_pic' 10 CHECK_FUNC_ARG 11 FETCH_DIM_FUNC_ARG $11 !3, 0 12 FETCH_DIM_FUNC_ARG $12 $11, 0 13 SEND_FUNC_ARG $12 14 DO_FCALL 0 $13 15 ASSIGN !4, $13 56 16 INIT_FCALL_BY_NAME 'get_pic' 17 CHECK_FUNC_ARG 18 FETCH_DIM_FUNC_ARG $15 !3, 0 19 FETCH_DIM_FUNC_ARG $16 $15, 1 20 SEND_FUNC_ARG $16 21 DO_FCALL 0 $17 22 ASSIGN !5, $17 57 23 INIT_FCALL_BY_NAME 'get_pic' 24 CHECK_FUNC_ARG 25 FETCH_DIM_FUNC_ARG $19 !3, 0 26 FETCH_DIM_FUNC_ARG $20 $19, 2 27 SEND_FUNC_ARG $20 28 DO_FCALL 0 $21 29 ASSIGN !6, $21 60 30 INIT_FCALL 'str_replace' 31 FETCH_DIM_R ~23 !3, 0 32 FETCH_DIM_R ~24 ~23, 0 33 SEND_VAL ~24 34 SEND_VAR !4 35 SEND_VAR !0 36 DO_ICALL $25 37 ASSIGN !7, $25 61 38 INIT_FCALL 'str_replace' 39 FETCH_DIM_R ~27 !3, 0 40 FETCH_DIM_R ~28 ~27, 1 41 SEND_VAL ~28 42 SEND_VAR !5 43 SEND_VAR !7 44 DO_ICALL $29 45 ASSIGN !7, $29 62 46 INIT_FCALL 'str_replace' 47 FETCH_DIM_R ~31 !3, 0 48 FETCH_DIM_R ~32 ~31, 2 49 SEND_VAL ~32 50 SEND_VAR !6 51 SEND_VAR !7 52 DO_ICALL $33 53 ASSIGN !7, $33 66 54 CONCAT ~35 !4, '++++1%3Cbr+%2F%3E' 55 ECHO ~35 67 56 CONCAT ~36 !5, '++++2%3Cbr+%2F%3E' 57 ECHO ~36 68 58 CONCAT ~37 !6, '++++3%3Cbr+%2F%3E' 59 ECHO ~37 77 60 > INIT_ARRAY ~38 !4, 'picurl' 61 ADD_ARRAY_ELEMENT ~38 !7, 'content' 62 > RETURN ~38 79 63* > RETURN null End of function check_pic Function get_pic: Finding entry points Branch analysis from position: 0 2 jumps found. (Code = 43) Position 1 = 11, Position 2 = 14 Branch analysis from position: 11 1 jumps found. (Code = 42) Position 1 = 192 Branch analysis from position: 192 2 jumps found. (Code = 43) Position 1 = 199, Position 2 = 202 Branch analysis from position: 199 1 jumps found. (Code = 62) Position 1 = -2 Branch analysis from position: 202 Branch analysis from position: 14 2 jumps found. (Code = 43) Position 1 = 20, Position 2 = 23 Branch analysis from position: 20 1 jumps found. (Code = 42) Position 1 = 192 Branch analysis from position: 192 Branch analysis from position: 23 2 jumps found. (Code = 43) Position 1 = 29, Position 2 = 32 Branch analysis from position: 29 1 jumps found. (Code = 42) Position 1 = 192 Branch analysis from position: 192 Branch analysis from position: 32 2 jumps found. (Code = 43) Position 1 = 38, Position 2 = 41 Branch analysis from position: 38 1 jumps found. (Code = 42) Position 1 = 192 Branch analysis from position: 192 Branch analysis from position: 41 2 jumps found. (Code = 43) Position 1 = 47, Position 2 = 50 Branch analysis from position: 47 1 jumps found. (Code = 42) Position 1 = 192 Branch analysis from position: 192 Branch analysis from position: 50 2 jumps found. (Code = 43) Position 1 = 56, Position 2 = 59 Branch analysis from position: 56 1 jumps found. (Code = 42) Position 1 = 192 Branch analysis from position: 192 Branch analysis from position: 59 2 jumps found. (Code = 43) Position 1 = 65, Position 2 = 86 Branch analysis from position: 65 1 jumps found. (Code = 42) Position 1 = 192 Branch analysis from position: 192 Branch analysis from position: 86 2 jumps found. (Code = 43) Position 1 = 92, Position 2 = 143 Branch analysis from position: 92 1 jumps found. (Code = 42) Position 1 = 192 Branch analysis from position: 192 Branch analysis from position: 143 2 jumps found. (Code = 43) Position 1 = 149, Position 2 = 152 Branch analysis from position: 149 1 jumps found. (Code = 42) Position 1 = 192 Branch analysis from position: 192 Branch analysis from position: 152 2 jumps found. (Code = 43) Position 1 = 158, Position 2 = 171 Branch analysis from position: 158 1 jumps found. (Code = 42) Position 1 = 192 Branch analysis from position: 192 Branch analysis from position: 171 2 jumps found. (Code = 43) Position 1 = 177, Position 2 = 190 Branch analysis from position: 177 1 jumps found. (Code = 42) Position 1 = 192 Branch analysis from position: 192 Branch analysis from position: 190 2 jumps found. (Code = 43) Position 1 = 199, Position 2 = 202 Branch analysis from position: 199 Branch analysis from position: 202 filename: /in/fuHAH function name: get_pic number of ops: 204 compiled vars: !0 = $the_pic_link, !1 = $the_source, !2 = $pattern, !3 = $matchme, !4 = $para, !5 = $url, !6 = $ch, !7 = $temp, !8 = $success, !9 = $match line #* E I O op fetch ext return operands ------------------------------------------------------------------------------------- 85 0 E > RECV !0 87 1 INIT_FCALL 'file_get_contents' 2 SEND_VAR !0 3 DO_ICALL $10 4 ASSIGN !1, $10 92 5 INIT_FCALL 'strpos' 6 SEND_VAR !0 7 SEND_VAL 'imgdream' 8 DO_ICALL $12 9 TYPE_CHECK 1018 $12 10 > JMPZ ~13, ->14 93 11 > ASSIGN !2, '%2F%28http%3A%5C%2F%5C%2F%28www%5C.%29%3Fimgdream%5C.net%5C%2Fimages%5C%2F%29%28.%2A%3F%29%28.jpg%29%2F' 94 12 ASSIGN !3, 0 13 > JMP ->192 97 14 > INIT_FCALL 'strpos' 15 SEND_VAR !0 16 SEND_VAL 'img-365.com' 17 DO_ICALL $16 18 TYPE_CHECK 1018 $16 19 > JMPZ ~17, ->23 98 20 > ASSIGN !2, '%2F%28http%3A%5C%2F%5C%2F%28www%5C.%29%3Fimg-365%5C.com%5C%2Fimages%5C%2F%29%28.%2A%3F%29%28.jpg%29%2F' 99 21 ASSIGN !3, 1 22 > JMP ->192 101 23 > INIT_FCALL 'strpos' 24 SEND_VAR !0 25 SEND_VAL 'daily-img.com' 26 DO_ICALL $20 27 TYPE_CHECK 1018 $20 28 > JMPZ ~21, ->32 102 29 > ASSIGN !2, '%2F%28http%3A%5C%2F%5C%2F%28www%5C.%29%3Fdaily-img.com%5C%2Fimages%5C%2F%29%28.%2A%3F%29%28.jpg%29%2F' 103 30 ASSIGN !3, 1 31 > JMP ->192 105 32 > INIT_FCALL 'strpos' 33 SEND_VAR !0 34 SEND_VAL 'pixroute.com' 35 DO_ICALL $24 36 TYPE_CHECK 1018 $24 37 > JMPZ ~25, ->41 106 38 > ASSIGN !2, '%2F%28http%3A%5C%2F%5C%2F%28www%5C.%29%3F%29%28.%2A%3F%29%28%5C.jp%28e%29%3Fg%29%28%3F%3D%5C%22%29%2F' 107 39 ASSIGN !3, 1 40 > JMP ->192 110 41 > INIT_FCALL 'strpos' 42 SEND_VAR !0 43 SEND_VAL 'imgdream.net' 44 DO_ICALL $28 45 TYPE_CHECK 1018 $28 46 > JMPZ ~29, ->50 111 47 > ASSIGN !2, '%2F%28%28http%3A%5C%2F%5C%2F%28www%5C.%29%3Fimgdream%5C.net%5C%2F%29%3Fimages%5C%2F%29%28.%2A%3F%29%28.jp%28e%29%3Fg%29%28%3F%3D%5C%22%29%2F' 113 48 ASSIGN !3, 0 49 > JMP ->192 116 50 > INIT_FCALL 'strpos' 51 SEND_VAR !0 52 SEND_VAL 'imgserve.net' 53 DO_ICALL $32 54 TYPE_CHECK 1018 $32 55 > JMPZ ~33, ->59 117 56 > ASSIGN !2, '%2F%28http%3A%5C%2F%5C%2F%28www%5C.%29%3F%29%28.%2A%3F%29%28%5C.jpeg%29%2F' 119 57 ASSIGN !3, 0 58 > JMP ->192 123 59 > INIT_FCALL 'strpos' 60 SEND_VAR !0 61 SEND_VAL 'imgmega.com' 62 DO_ICALL $36 63 TYPE_CHECK 1018 $36 64 > JMPZ ~37, ->86 124 65 > ASSIGN !2, '%2F%28http%3A%5C%2F%5C%2F%28www%5C.%29%3F%29%28.%2A%3F%29%28.jpg%29%28%3F%3D%5C%22%29%2F' 127 66 INIT_FCALL 'urlencode' 67 SEND_VAL 'view' 68 DO_ICALL $39 69 INIT_ARRAY ~40 $39, 'op' 129 70 INIT_FCALL 'urlencode' 71 SEND_VAL '1' 72 DO_ICALL $41 73 ADD_ARRAY_ELEMENT ~40 $41, 'pre' 130 74 INIT_FCALL 'urlencode' 75 SEND_VAL 'Continue+to+image' 76 DO_ICALL $42 77 ADD_ARRAY_ELEMENT ~40 $42, 'next' 126 78 ASSIGN !4, ~40 133 79 INIT_FCALL_BY_NAME 'pic_post' 80 SEND_VAR_EX !0 81 SEND_VAR_EX !4 82 DO_FCALL 0 $44 83 ASSIGN !1, $44 137 84 ASSIGN !3, 0 85 > JMP ->192 141 86 > INIT_FCALL 'strpos' 87 SEND_VAR !0 88 SEND_VAL 'imgbabes.com' 89 DO_ICALL $47 90 TYPE_CHECK 1018 $47 91 > JMPZ ~48, ->143 142 92 > ASSIGN !2, '%2F%28http%3A%5C%2F%5C%2F%28t1%5C.%29%3F%29%28.%2A%3F%29%28.jp%28e%29%3Fg%29%28%3F%3D%5C%22%29%2F' 144 93 ASSIGN !3, 0 147 94 ASSIGN !5, !0 148 95 INIT_FCALL_BY_NAME 'curl_init' 96 DO_FCALL 0 $52 97 ASSIGN !6, $52 149 98 INIT_FCALL_BY_NAME 'curl_setopt' 99 SEND_VAR_EX !6 100 FETCH_CONSTANT ~54 'CURLOPT_URL' 101 SEND_VAL_EX ~54 102 SEND_VAR_EX !5 103 DO_FCALL 0 150 104 INIT_FCALL_BY_NAME 'curl_setopt' 105 SEND_VAR_EX !6 106 FETCH_CONSTANT ~56 'CURLOPT_HEADER' 107 SEND_VAL_EX ~56 108 SEND_VAL_EX <false> 109 DO_FCALL 0 153 110 INIT_FCALL_BY_NAME 'curl_setopt' 111 SEND_VAR_EX !6 112 FETCH_CONSTANT ~58 'CURLOPT_SSL_VERIFYHOST' 113 SEND_VAL_EX ~58 114 SEND_VAL_EX <false> 115 DO_FCALL 0 154 116 INIT_FCALL_BY_NAME 'curl_setopt' 117 SEND_VAR_EX !6 118 FETCH_CONSTANT ~60 'CURLOPT_SSL_VERIFYPEER' 119 SEND_VAL_EX ~60 120 SEND_VAL_EX <false> 121 DO_FCALL 0 157 122 INIT_FCALL_BY_NAME 'curl_setopt' 123 SEND_VAR_EX !6 124 FETCH_CONSTANT ~62 'CURLOPT_COOKIE' 125 SEND_VAL_EX ~62 126 SEND_VAL_EX 'denial%3D93a7a7e8b5af9f19a6df5e9850f8a64a%3B' 127 DO_FCALL 0 161 128 INIT_FCALL_BY_NAME 'curl_setopt' 129 SEND_VAR_EX !6 130 FETCH_CONSTANT ~64 'CURLOPT_RETURNTRANSFER' 131 SEND_VAL_EX ~64 132 SEND_VAL_EX 1 133 DO_FCALL 0 163 134 INIT_FCALL_BY_NAME 'curl_exec' 135 SEND_VAR_EX !6 136 DO_FCALL 0 $66 137 ASSIGN ~67 !7, $66 138 ASSIGN !1, ~67 167 139 INIT_FCALL_BY_NAME 'curl_close' 140 SEND_VAR_EX !6 141 DO_FCALL 0 142 > JMP ->192 183 143 > INIT_FCALL 'strpos' 144 SEND_VAR !0 145 SEND_VAL 'imageteam.org' 146 DO_ICALL $70 147 TYPE_CHECK 1018 $70 148 > JMPZ ~71, ->152 184 149 > ASSIGN !2, '%2F%28http%3A%5C%2F%5C%2F%28www%5C.%29%3F%29%28.%2A%3F%29%28.jpeg%29%2F' 186 150 ASSIGN !3, 0 151 > JMP ->192 192 152 > INIT_FCALL 'strpos' 153 SEND_VAR !0 154 SEND_VAL 'erimge.com' 155 DO_ICALL $74 156 TYPE_CHECK 1018 $74 157 > JMPZ ~75, ->171 193 158 > ASSIGN !2, '%2F%28http%3A%5C%2F%5C%2F%28www%5C.%29%3Ferimge%5C.com%5C%2F%29%28.%2A%3F%29%28.jpg%29%2F' 196 159 INIT_FCALL 'urlencode' 160 SEND_VAL 'Continue+to+image' 161 DO_ICALL $77 162 INIT_ARRAY ~78 $77, 'imgContinue' 195 163 ASSIGN !4, ~78 199 164 INIT_FCALL_BY_NAME 'pic_post' 165 SEND_VAR_EX !0 166 SEND_VAR_EX !4 167 DO_FCALL 0 $80 168 ASSIGN !1, $80 203 169 ASSIGN !3, 0 170 > JMP ->192 207 171 > INIT_FCALL 'strpos' 172 SEND_VAR !0 173 SEND_VAL 'imgbb.net' 174 DO_ICALL $83 175 TYPE_CHECK 1018 $83 176 > JMPZ ~84, ->190 208 177 > ASSIGN !2, '%2F%28http%3A%5C%2F%5C%2F%28www%5C.%29%3F%29%28.%2A%3F%29%28.jp%28e%29%3Fg%29%2F' 211 178 INIT_FCALL 'urlencode' 179 SEND_VAL 'Continue+to+image' 180 DO_ICALL $86 181 INIT_ARRAY ~87 $86, 'imgContinue' 210 182 ASSIGN !4, ~87 215 183 INIT_FCALL_BY_NAME 'pic_post' 184 SEND_VAR_EX !0 185 SEND_VAR_EX !4 186 DO_FCALL 0 $89 187 ASSIGN !1, $89 219 188 ASSIGN !3, 0 189 > JMP ->192 224 190 > ASSIGN !2, '%2F%28http%3A%5C%2F%5C%2F%28www%5C.%29%3F%29%28.%2A%3F%29%28.jpg%29%2F' 225 191 ASSIGN !3, 0 236 192 > INIT_FCALL 'preg_match_all' 193 SEND_VAR !2 194 SEND_VAR !1 195 SEND_REF !9 196 DO_ICALL $94 197 ASSIGN !8, $94 237 198 > JMPZ !8, ->202 240 199 > FETCH_DIM_R ~96 !9, 0 200 FETCH_DIM_R ~97 ~96, !3 201 ASSIGN !5, ~97 252 202 > > RETURN !5 254 203* > RETURN null End of function get_pic Function affiliate_redirect: Finding entry points Branch analysis from position: 0 2 jumps found. (Code = 46) Position 1 = 3, Position 2 = 7 Branch analysis from position: 3 2 jumps found. (Code = 43) Position 1 = 8, Position 2 = 25 Branch analysis from position: 8 2 jumps found. (Code = 43) Position 1 = 11, Position 2 = 20 Branch analysis from position: 11 1 jumps found. (Code = 79) Position 1 = -2 Branch analysis from position: 20 Branch analysis from position: 25 1 jumps found. (Code = 62) Position 1 = -2 Branch analysis from position: 7 filename: /in/fuHAH function name: affiliate_redirect number of ops: 26 compiled vars: !0 = $url line #* E I O op fetch ext return operands ------------------------------------------------------------------------------------- 258 0 E > FETCH_IS ~1 '_GET' 1 ISSET_ISEMPTY_DIM_OBJ 0 ~2 ~1, 'cookie' 2 > JMPZ_EX ~2 ~2, ->7 3 > FETCH_R global ~3 '_GET' 4 FETCH_DIM_R ~4 ~3, 'cookie' 5 IS_NOT_EQUAL ~5 ~4, '' 6 BOOL ~2 ~5 7 > > JMPZ ~2, ->25 259 8 > FETCH_IS ~6 '_COOKIE' 9 ISSET_ISEMPTY_DIM_OBJ 1 ~6, 'cookie' 10 > JMPZ ~7, ->20 260 11 > INIT_FC
Generated using Vulcan Logic Dumper, using php 8.0.0