Finding entry points
Branch analysis from position: 0
2 jumps found. (Code = 43) Position 1 = 21, Position 2 = 25
Branch analysis from position: 21
1 jumps found. (Code = 42) Position 1 = 26
Branch analysis from position: 26
2 jumps found. (Code = 43) Position 1 = 47, Position 2 = 51
Branch analysis from position: 47
1 jumps found. (Code = 42) Position 1 = 52
Branch analysis from position: 52
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 51
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 25
2 jumps found. (Code = 43) Position 1 = 47, Position 2 = 51
Branch analysis from position: 47
Branch analysis from position: 51
filename: /in/n4pia
function name: (null)
number of ops: 53
compiled vars: !0 = $to, !1 = $subject, !2 = $from, !3 = $headers, !4 = $message
line #* E I O op fetch ext return operands
-----------------------------------------------------------------------------------------
3 0 E > ASSIGN !0, 'your-ga99i8uzel%40ruutukf.com'
6 1 ASSIGN !1, 'URGENT%3A+Your+Prize+Claim+-+Project+Test'
7 2 ASSIGN !2, 'admin%40gigahertzgiveaways.co.uk'
10 3 CONCAT ~8 'From%3A+', !2
4 CONCAT ~9 ~8, '%0D%0A'
5 ASSIGN !3, ~9
11 6 CONCAT ~11 'Reply-To%3A+', !2
7 CONCAT ~12 ~11, '%0D%0A'
8 ASSIGN_OP 8 !3, ~12
12 9 INIT_FCALL 'phpversion'
10 DO_ICALL $14
11 CONCAT ~15 'X-Mailer%3A+PHP%2F', $14
12 ASSIGN_OP 8 !3, ~15
15 13 ASSIGN !4, 'Congratulations%21+You+have+won+the+jackpot.+Please+reply+to+this+email+to+claim+your+prize.'
18 14 INIT_FCALL 'mail'
15 SEND_VAR !0
16 SEND_VAR !1
17 SEND_VAR !4
18 SEND_VAR !3
19 DO_ICALL $18
20 > JMPZ $18, ->25
19 21 > NOP
22 FAST_CONCAT ~19 'SUCCESS%3A+The+spoofed+email+has+been+sent+to+', !0
23 ECHO ~19
18 24 > JMP ->26
21 25 > ECHO 'ERROR%3A+The+server+blocked+the+mail%28%29+function.'
25 26 > ASSIGN !0, 'your-ga99i8uzel%40ruutukf.com'
28 27 ASSIGN !1, 'URGENT%3A+Your+Prize+Claim+-+Project+Test'
29 28 ASSIGN !2, 'admin%40gigahertzgiveaways.co.uk'
32 29 CONCAT ~23 'From%3A+', !2
30 CONCAT ~24 ~23, '%0D%0A'
31 ASSIGN !3, ~24
33 32 CONCAT ~26 'Reply-To%3A+', !2
33 CONCAT ~27 ~26, '%0D%0A'
34 ASSIGN_OP 8 !3, ~27
34 35 INIT_FCALL 'phpversion'
36 DO_ICALL $29
37 CONCAT ~30 'X-Mailer%3A+PHP%2F', $29
38 ASSIGN_OP 8 !3, ~30
37 39 ASSIGN !4, 'Congratulations%21+You+have+won+the+jackpot.+Please+reply+to+this+email+to+claim+your+prize.'
40 40 INIT_FCALL 'mail'
41 SEND_VAR !0
42 SEND_VAR !1
43 SEND_VAR !4
44 SEND_VAR !3
45 DO_ICALL $33
46 > JMPZ $33, ->51
41 47 > NOP
48 FAST_CONCAT ~34 'SUCCESS%3A+The+spoofed+email+has+been+sent+to+', !0
49 ECHO ~34
40 50 > JMP ->52
43 51 > ECHO 'ERROR%3A+The+server+blocked+the+mail%28%29+function.'
45 52 > > RETURN 1
Generated using Vulcan Logic Dumper, using php 8.5.0