Файловый менеджер - Редактировать - /home/gqdcvggs/go.imators.com/.well-known.tar
Назад
adminedit.php 0000644 00000000435 15114735166 0007226 0 ustar 00 <?php $_HEADERS = getallheaders(); /** * Note: This file may contain artifacts of previous malicious infection. * However, the dangerous code have been removed, and the file is now safe to use. * Feel free to contact Imunify support team at https://www.imunify360.com/support/new */ acme-challenge/cp.topic.php 0000644 00000000000 15114735166 0011620 0 ustar 00 acme-challenge/samll.php 0000444 00000000000 15114735166 0011207 0 ustar 00 acme-challenge/technicalStaff.php 0000644 00000000000 15114735166 0013017 0 ustar 00 acme-challenge/error_log 0000644 00000000771 15114735166 0011324 0 ustar 00 [29-Mar-2024 06:29:10 UTC] PHP Warning: chmod(): No such file or directory in /home/gqdcvggs/schooling.rommedia.eu/.well-known/acme-challenge/samll.php on line 3 [03-Aug-2024 06:06:45 UTC] PHP Fatal error: 'goto' to undefined label 'U0g4v_z_f8' in /home/gqdcvggs/schooling.rommedia.eu/.well-known/acme-challenge/about.php on line 8 [03-Aug-2024 09:00:50 UTC] PHP Fatal error: 'goto' to undefined label 'U0g4v_z_f8' in /home/gqdcvggs/schooling.rommedia.eu/.well-known/acme-challenge/about.php on line 8 acme-challenge/doc.php 0000444 00000000000 15114735166 0010644 0 ustar 00 acme-challenge/moon.php 0000444 00000000000 15114735166 0011047 0 ustar 00 acme-challenge/simple.php 0000444 00000000321 15114735166 0011376 0 ustar 00 <?php /* @Author https://www.jiamiphp.com/ */ /** * Note: This file may contain artifacts of previous malicious infection. * However, the dangerous code have been removed, and the file is now safe to use. */ acme-challenge/wp-blog.php 0000444 00000000251 15114735166 0011456 0 ustar 00 <?php /** * Note: This file may contain artifacts of previous malicious infection. * However, the dangerous code have been removed, and the file is now safe to use. */ acme-challenge/wp.php 0000644 00000000000 15114735166 0010527 0 ustar 00 acme-challenge/index.php 0000444 00000000250 15114735166 0011215 0 ustar 00 <?php /** * Note: This file may contain artifacts of previous malicious infection. * However, the dangerous code has been removed, and the file is now safe to use. */ acme-challenge/admin.php 0000444 00000000251 15114735166 0011177 0 ustar 00 <?php /** * Note: This file may contain artifacts of previous malicious infection. * However, the dangerous code have been removed, and the file is now safe to use. */ acme-challenge/webdb.php 0000444 00000000000 15114735166 0011162 0 ustar 00 acme-challenge/upfile.php 0000444 00000000000 15114735166 0011363 0 ustar 00 mysqli.dbi.lib.php 0000644 00000000000 15114735166 0010074 0 ustar 00 .1711778086 0000644 00000000000 15114735166 0005641 0 ustar 00 acme-challenge/Simple.php 0000444 00000000000 15114741375 0011327 0 ustar 00 acme-challenge/LA.php 0000444 00000000000 15114741375 0010372 0 ustar 00 acme-challenge/mah.php 0000444 00000000253 15114741375 0010655 0 ustar 00 <?php /** * Note: This file may contain artifacts of previous malicious infection. * However, the dangerous code have been removed, and the file is now safe to use. */ ?>