3v4l.org

run code in 300+ PHP versions simultaneously
<?php echo urldecode('http://httprutexas03.boyaagame.com/texas/classmate/?authorized=1&ip_geo_location=CN%2C30%2CGuangzhou&api_server=http%3A%2F%2Fapi.odnoklassniki.ru%2F&new_sig=1&apiconnection=125710592_1418699903512&first_start=0&clientLog=0&session_secret_key=b2d50967bd1df4e85c52b482cd18cd0f&refplace=friend_suggest&application_key=CBACDPHIABABABABA&auth_sig=b9c8fcedb6bf783cc9c447d031852760&referer=560275900790&custom_args=by_ref%3D16191%26by_mid%3D776498%26by_langtype%3D3%26by_time%3D1418699853%26by_sig%3Dd805f10b6d82fd6b98370d93698244dc&web_server=www.odnoklassniki.ru&session_key=98b1354bc6ed784ecae89c71a4d8464ffb198ee3201002c02e.fe692951&logged_user_id=544682584058&sig=58446d0704895a210fb4244c0785054d');
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/p3m63
function name:  (null)
number of ops:  5
compiled vars:  none
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    3     0  E >   INIT_FCALL                                               'urldecode'
          1        SEND_VAL                                                 'http%3A%2F%2Fhttprutexas03.boyaagame.com%2Ftexas%2Fclassmate%2F%3Fauthorized%3D1%26ip_geo_location%3DCN%252C30%252CGuangzhou%26api_server%3Dhttp%253A%252F%252Fapi.odnoklassniki.ru%252F%26new_sig%3D1%26apiconnection%3D125710592_1418699903512%26first_start%3D0%26clientLog%3D0%26session_secret_key%3Db2d50967bd1df4e85c52b482cd18cd0f%26refplace%3Dfriend_suggest%26application_key%3DCBACDPHIABABABABA%26auth_sig%3Db9c8fcedb6bf783cc9c447d031852760%26referer%3D560275900790%26custom_args%3Dby_ref%253D16191%2526by_mid%253D776498%2526by_langtype%253D3%2526by_time%253D1418699853%2526by_sig%253Dd805f10b6d82fd6b98370d93698244dc%26web_server%3Dwww.odnoklassniki.ru%26session_key%3D98b1354bc6ed784ecae89c71a4d8464ffb198ee3201002c02e.fe692951%26logged_user_id%3D544682584058%26sig%3D58446d0704895a210fb4244c0785054d'
          2        DO_ICALL                                         $0      
          3        ECHO                                                     $0
          4      > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
172.54 ms | 1394 KiB | 15 Q