관리-도구
편집 파일: scanweekly.log
----------- SCAN REPORT ----------- TimeStamp: Sun, 12 Jan 2025 00:00:02 +0000 (/usr/sbin/cxs --allusers --clamdsock /var/clamd --dbreport --defapache nobody --doptions Mv --exploitscan --nofallback --filemax 10000 --noforce --html --ignore /etc/cxs/cxs.ignore --mail root --options mMOLfuSGchexdnwZRrD --noprobability --qoptions Mv --quiet --report /var/log/cxsreports/scanweekly.log --sizemax 1000000 --smtp --ssl --nosummary --sversionscan --timemax 30 --nounofficial --virusscan --vmrssmax 2000000 --voptions fmMhexT --waitscan 0 --www --xtra /etc/cxs/cxs.xtra) (74) adiktivsports, Scanning /home/adiktivsports/public_html: (73) alieddefenseserv, Scanning /home/alieddefenseserv/public_html: '/home/alieddefenseserv/public_html/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (72) allieddefenseser, Scanning /home/allieddefenseser/public_html: '/home/allieddefenseser/public_html/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (71) allieddefenseses, Scanning /home/allieddefenseses/public_html: '/home/allieddefenseses/public_html/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (70) amyscleaning, Scanning /home/amyscleaning/public_html: (69) batabay, Scanning /home/batabay/public_html: (68) betarwreality, Scanning /home/betarwreality/public_html: (67) bigappleimprints, Scanning /home/bigappleimprints/public_html: '/home/bigappleimprints/public_html/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (66) bobinadosmagneti, Scanning /home/bobinadosmagneti/public_html: (65) calendarraise, Scanning /home/calendarraise/public_html: '/home/calendarraise/public_html/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (64) caseyssportscoll, Scanning /home/caseyssportscoll/public_html: (63) ckgcustoms, Scanning /home/ckgcustoms/public_html: (62) claudiamarinspee, Scanning /home/claudiamarinspee/public_html: '/home/claudiamarinspee/public_html/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (61) cmsdigtalsdesign, Scanning /home/cmsdigtalsdesign/plugin.cms.digtalsdesigns.com: (61) cmsdigtalsdesign, Scanning /home/cmsdigtalsdesign/public_html: # Scan Timeout (30 secs) while processing: '/home/cmsdigtalsdesign/public_html/wordpress-6.4.2.zip' '/home/cmsdigtalsdesign/public_html/cabinetsallwood/.tmb' # World writeable directory '/home/cmsdigtalsdesign/public_html/cabinetsallwood/wp-content/languages' # World writeable directory '/home/cmsdigtalsdesign/public_html/cabinetsallwood/wp-content/languages/plugins' # World writeable directory '/home/cmsdigtalsdesign/public_html/cabinetsallwood/wp-content/plugins/all-in-one-wp-migration/all-in-one-wp-migration.php' # Script version check [OLD] [All-in-One WP Migration v7.79 < v7.81] '/home/cmsdigtalsdesign/public_html/cabinetsallwood/wp-content/plugins/woocommerce/includes/admin/class-wc-admin-menus.php' # Universal decode regex match = [universal decoder] '/home/cmsdigtalsdesign/public_html/cabinetsallwood/wp-content/plugins/woocommerce/src/Internal/Admin/WcPayWelcomePage.php' # Universal decode regex match = [universal decoder] '/home/cmsdigtalsdesign/public_html/cabinetsallwood/wp-content/plugins/woocommerce/vendor/maxmind-db/reader/ext/maxminddb.c' # Suspicious file type [application/x-c] '/home/cmsdigtalsdesign/public_html/cabinetsallwood/wp-content/plugins/woocommerce-gateway-bank-of-america/vendor/cybersource/rest-client-php/lib/Model/Ptsv2creditsProcessingInformation.php' # Universal decode regex match = [universal decoder] '/home/cmsdigtalsdesign/public_html/cabinetsallwood/wp-content/plugins/woocommerce-gateway-bank-of-america/vendor/cybersource/rest-client-php/lib/Model/Ptsv2paymentsProcessingInformation.php' # Universal decode regex match = [universal decoder] '/home/cmsdigtalsdesign/public_html/cabinetsallwood/wp-content/plugins/woocommerce-gateway-bank-of-america/vendor/cybersource/rest-client-php/lib/Model/Ptsv2paymentsidcapturesProcessingInformation.php' # Universal decode regex match = [universal decoder] '/home/cmsdigtalsdesign/public_html/cabinetsallwood/wp-content/plugins/woocommerce-gateway-bank-of-america/vendor/cybersource/rest-client-php/lib/Model/Ptsv2paymentsidrefundsProcessingInformation.php' # Universal decode regex match = [universal decoder] '/home/cmsdigtalsdesign/public_html/cabinetsallwood/wp-content/plugins/woocommerce-gateway-bank-of-america/vendor/cybersource/rest-client-php/lib/Model/Ptsv2paymentsidreversalsProcessingInformation.php' # Universal decode regex match = [universal decoder] '/home/cmsdigtalsdesign/public_html/cabinetsallwood/wp-content/plugins/wp-file-manager/lib/codemirror/mode/clike/index.html' # Suspicious file type [application/x-c] '/home/cmsdigtalsdesign/public_html/cabinetsallwood/wp-content/plugins/yith-woocommerce-wishlist/init.php' # Script version check [OLD] [YITH WooCommerce Wishlist v3.31.0 < v3.34.0] '/home/cmsdigtalsdesign/public_html/cabinetsallwood/wp-includes/version.php' # Script version check [OLD] [Wordpress v6.4.2 < v6.7.1] '/home/cmsdigtalsdesign/public_html/companynotary/.tmb' # World writeable directory '/home/cmsdigtalsdesign/public_html/companynotary/wp-content/plugins/all-in-one-wp-migration/all-in-one-wp-migration.php' # Script version check [OLD] [All-in-One WP Migration v7.80 < v7.81] '/home/cmsdigtalsdesign/public_html/companynotary/wp-content/plugins/elementor/elementor.php' # Script version check [OLD] [Elementor v3.19.4 < v3.21.5] '/home/cmsdigtalsdesign/public_html/companynotary/wp-content/plugins/essential-addons-for-elementor-lite/essential_adons_elementor.php' # Script version check [OLD] [Essential Addons for Elementor v5.9.10 < v5.9.21] '/home/cmsdigtalsdesign/public_html/companynotary/wp-content/plugins/gravityforms/gravityforms.php' # Universal decode regex match = [universal decoder] '/home/cmsdigtalsdesign/public_html/companynotary/wp-content/plugins/qi-addons-for-elementor/class-qiaddonsforelementor.php' # Script version check [OLD] [Qi Addons For Elementor v1.6.9 < v1.7.1] '/home/cmsdigtalsdesign/public_html/companynotary/wp-content/plugins/royal-elementor-addons/wpr-addons.php' # Script version check [OLD] [Royal Elementor Addons v1.3.93 < v1.3.975] '/home/cmsdigtalsdesign/public_html/companynotary/wp-content/plugins/royal-elementor-addons/admin/plugin-options.php' # Universal decode regex match = [universal decoder] '/home/cmsdigtalsdesign/public_html/companynotary/wp-content/plugins/templately/templately.php' # Script version check [OLD] [Templately v3.0.3 < v3.0.6] '/home/cmsdigtalsdesign/public_html/companynotary/wp-content/plugins/unlimited-elements-for-elementor/unlimited_elements.php' # Script version check [OLD] [Unlimited Elements for Elementor v1.5.98 < v1.5.106] '/home/cmsdigtalsdesign/public_html/companynotary/wp-content/plugins/wp-file-manager/lib/codemirror/mode/clike/index.html' # Suspicious file type [application/x-c] '/home/cmsdigtalsdesign/public_html/companynotary/wp-content/themes/astra/admin/includes/class-astra-menu.php' # Universal decode regex match = [universal decoder] '/home/cmsdigtalsdesign/public_html/companynotary/wp-includes/version.php' # Script version check [OLD] [Wordpress v6.4.2 < v6.7.1] '/home/cmsdigtalsdesign/public_html/expertwirelessrepair/wp-content/languages' # World writeable directory '/home/cmsdigtalsdesign/public_html/expertwirelessrepair/wp-content/languages/plugins' # World writeable directory '/home/cmsdigtalsdesign/public_html/expertwirelessrepair/wp-content/plugins/all-in-one-seo-pack/all_in_one_seo_pack.php' # Script version check [OLD] [All in One SEO v4.5.7.2 < v4.6.2] '/home/cmsdigtalsdesign/public_html/expertwirelessrepair/wp-content/plugins/all-in-one-seo-pack/app/Common/Views/admin/settings-page.php' # Universal decode regex match = [universal decoder] '/home/cmsdigtalsdesign/public_html/expertwirelessrepair/wp-content/plugins/elementor/elementor.php' # Script version check [OLD] [Elementor v3.19.4 < v3.21.5] '/home/cmsdigtalsdesign/public_html/expertwirelessrepair/wp-content/plugins/google-analytics-for-wordpress/googleanalytics.php' # Script version check [OLD] [Google Analytics for WordPress by MonsterInsights v8.24.0 < v8.26.0] '/home/cmsdigtalsdesign/public_html/expertwirelessrepair/wp-content/plugins/google-analytics-for-wordpress/includes/helpers.php' # Universal decode regex match = [universal decoder] '/home/cmsdigtalsdesign/public_html/expertwirelessrepair/wp-content/plugins/gravityforms/gravityforms.php' # Universal decode regex match = [universal decoder] '/home/cmsdigtalsdesign/public_html/expertwirelessrepair/wp-content/plugins/mailchimp-for-wp/mailchimp-for-wp.php' # Script version check [OLD] [MC4WP: Mailchimp for WordPress v4.9.11 < v4.9.13] '/home/cmsdigtalsdesign/public_html/expertwirelessrepair/wp-content/plugins/one-click-demo-import/one-click-demo-import.php' # Script version check [OLD] [One Click Demo Import v3.2.0 < v3.2.1] '/home/cmsdigtalsdesign/public_html/expertwirelessrepair/wp-content/plugins/woo-variation-swatches/woo-variation-swatches.php' # Script version check [OLD] [Variation Swatches for WooCommerce v2.0.30 < v2.0.31] '/home/cmsdigtalsdesign/public_html/expertwirelessrepair/wp-content/plugins/woocommerce/woocommerce.php' # Script version check [OLD] [WooCommerce v8.6.1 < v8.8.3] '/home/cmsdigtalsdesign/public_html/expertwirelessrepair/wp-content/plugins/woocommerce/includes/admin/class-wc-admin-menus.php' # Universal decode regex match = [universal decoder] '/home/cmsdigtalsdesign/public_html/expertwirelessrepair/wp-content/plugins/woocommerce/src/Internal/Admin/WcPayWelcomePage.php' # Universal decode regex match = [universal decoder] '/home/cmsdigtalsdesign/public_html/expertwirelessrepair/wp-content/plugins/woocommerce/vendor/maxmind-db/reader/ext/maxminddb.c' # Suspicious file type [application/x-c] '/home/cmsdigtalsdesign/public_html/expertwirelessrepair/wp-content/plugins/wpforms-lite/wpforms.php' # Script version check [OLD] [WPForms Lite v1.8.6.4 < v1.8.8.3] '/home/cmsdigtalsdesign/public_html/expertwirelessrepair/wp-content/plugins/yith-woocommerce-compare/init.php' # Script version check [OLD] [YITH WooCommerce Compare v2.36.0 < v2.38.0] '/home/cmsdigtalsdesign/public_html/expertwirelessrepair/wp-content/plugins/yith-woocommerce-wishlist/init.php' # Script version check [OLD] [YITH WooCommerce Wishlist v3.30.0 < v3.34.0] '/home/cmsdigtalsdesign/public_html/expertwirelessrepair/wp-includes/version.php' # Script version check [OLD] [Wordpress v6.4.2 < v6.7.1] '/home/cmsdigtalsdesign/public_html/notaryservice/wp-content/plugins/akismet/akismet.php' # Script version check [OLD] [Akismet Anti-Spam: Spam Protection v5.1 < v5.3.2] '/home/cmsdigtalsdesign/public_html/notaryservice/wp-content/plugins/all-in-one-wp-migration/all-in-one-wp-migration.php' # Script version check [OLD] [All-in-One WP Migration v7.79 < v7.81] '/home/cmsdigtalsdesign/public_html/notaryservice/wp-content/plugins/elementor/elementor.php' # Script version check [OLD] [Elementor v3.15.2 < v3.21.5] '/home/cmsdigtalsdesign/public_html/notaryservice/wp-content/plugins/wp-file-manager/lib/codemirror/mode/clike/index.html' # Suspicious file type [application/x-c] '/home/cmsdigtalsdesign/public_html/notaryservice/wp-content/themes/astra/admin/includes/class-astra-menu.php' # Universal decode regex match = [universal decoder] '/home/cmsdigtalsdesign/public_html/notaryservice/wp-includes/version.php' # Script version check [OLD] [Wordpress v6.4.2 < v6.7.1] '/home/cmsdigtalsdesign/public_html/nutcrackertherapy/wp-content/languages' # World writeable directory '/home/cmsdigtalsdesign/public_html/nutcrackertherapy/wp-content/languages/plugins' # World writeable directory '/home/cmsdigtalsdesign/public_html/nutcrackertherapy/wp-content/plugins/all-in-one-wp-migration/all-in-one-wp-migration.php' # Script version check [OLD] [All-in-One WP Migration v7.79 < v7.81] '/home/cmsdigtalsdesign/public_html/nutcrackertherapy/wp-content/plugins/elementor/elementor.php' # Script version check [OLD] [Elementor v3.17.3 < v3.21.5] '/home/cmsdigtalsdesign/public_html/nutcrackertherapy/wp-content/plugins/elementskit-lite/elementskit-lite.php' # Script version check [OLD] [ElementsKit Lite v3.0.2 < v3.1.3] '/home/cmsdigtalsdesign/public_html/nutcrackertherapy/wp-content/plugins/header-footer-elementor/header-footer-elementor.php' # Script version check [OLD] [Elementor Header & Footer Builder v1.6.17 < v1.6.31] '/home/cmsdigtalsdesign/public_html/nutcrackertherapy/wp-content/plugins/metform/metform.php' # Script version check [OLD] [MetForm v3.8.0 < v3.8.8] '/home/cmsdigtalsdesign/public_html/nutcrackertherapy/wp-content/plugins/ultimate-member/ultimate-member.php' # Script version check [OLD] [Ultimate Member v2.7.0 < v2.8.5] '/home/cmsdigtalsdesign/public_html/nutcrackertherapy/wp-includes/version.php' # Script version check [OLD] [Wordpress v6.4.2 < v6.7.1] '/home/cmsdigtalsdesign/public_html/ontaptees/wp-content/plugins/newsletter/plugin.php' # Script version check [OLD] [Newsletter v7.9.3 < v8.3.2] '/home/cmsdigtalsdesign/public_html/ontaptees/wp-content/plugins/woocommerce/woocommerce.php' # Script version check [OLD] [WooCommerce v8.1.1 < v8.8.3] '/home/cmsdigtalsdesign/public_html/ontaptees/wp-content/plugins/woocommerce/includes/admin/class-wc-admin-menus.php' # Universal decode regex match = [universal decoder] '/home/cmsdigtalsdesign/public_html/ontaptees/wp-content/plugins/woocommerce/src/Internal/Admin/WcPayWelcomePage.php' # Universal decode regex match = [universal decoder] '/home/cmsdigtalsdesign/public_html/ontaptees/wp-content/plugins/woocommerce/vendor/maxmind-db/reader/ext/maxminddb.c' # Suspicious file type [application/x-c] '/home/cmsdigtalsdesign/public_html/ontaptees/wp-content/plugins/wp-reset/wp-reset.php' # Script version check [OLD] [WP Reset v1.97 < v2.02] '/home/cmsdigtalsdesign/public_html/ontaptees/wp-content/uploads/2023/06' # Skipped - too many resources: 57070 ( > filemax=10000) '/home/cmsdigtalsdesign/public_html/ontaptees/wp-includes/version.php' # Script version check [OLD] [Wordpress v6.4.2 < v6.7.1] '/home/cmsdigtalsdesign/public_html/stullertestproject/wp-content/plugins/akismet/akismet.php' # Script version check [OLD] [Akismet Anti-spam: Spam Protection v5.3 < v5.3.2] '/home/cmsdigtalsdesign/public_html/stullertestproject/wp-content/plugins/google-listings-and-ads/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect571k1.php' # Universal decode regex match = [universal decoder] '/home/cmsdigtalsdesign/public_html/stullertestproject/wp-content/plugins/google-listings-and-ads/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect571r1.php' # Universal decode regex match = [universal decoder] '/home/cmsdigtalsdesign/public_html/stullertestproject/wp-content/plugins/jetpack/jetpack.php' # Script version check [OLD] [Jetpack v12.9 < v13.4.2] '/home/cmsdigtalsdesign/public_html/stullertestproject/wp-content/plugins/jetpack/modules/masterbar/admin-menu/class-admin-menu.php' # Universal decode regex match = [universal decoder] '/home/cmsdigtalsdesign/public_html/stullertestproject/wp-content/plugins/mailpoet/mailpoet.php' # Script version check [OLD] [MailPoet v4.39.0 < v4.50.0] '/home/cmsdigtalsdesign/public_html/stullertestproject/wp-content/plugins/mailpoet/lib/Config/Menu.php' # Universal decode regex match = [universal decoder] '/home/cmsdigtalsdesign/public_html/stullertestproject/wp-content/plugins/pinterest-for-woocommerce/pinterest-for-woocommerce.php' # Script version check [OLD] [Pinterest for WooCommerce v1.3.15 < v1.3.24] '/home/cmsdigtalsdesign/public_html/stullertestproject/wp-content/plugins/woocommerce/woocommerce.php' # Script version check [OLD] [WooCommerce v8.3.1 < v8.8.3] '/home/cmsdigtalsdesign/public_html/stullertestproject/wp-content/plugins/woocommerce/includes/admin/class-wc-admin-menus.php' # Universal decode regex match = [universal decoder] '/home/cmsdigtalsdesign/public_html/stullertestproject/wp-content/plugins/woocommerce/src/Internal/Admin/WcPayWelcomePage.php' # Universal decode regex match = [universal decoder] '/home/cmsdigtalsdesign/public_html/stullertestproject/wp-content/plugins/woocommerce/vendor/maxmind-db/reader/ext/maxminddb.c' # Suspicious file type [application/x-c] '/home/cmsdigtalsdesign/public_html/stullertestproject/wp-includes/version.php' # Script version check [OLD] [Wordpress v6.4.2 < v6.7.1] (60) cosmoutd, Scanning /home/cosmoutd/public_html: (59) csnwine, Scanning /home/csnwine/public_html: '/home/csnwine/public_html/web/storage' # World writeable directory '/home/csnwine/public_html/web/storage/app' # World writeable directory '/home/csnwine/public_html/web/storage/app/public' # World writeable directory '/home/csnwine/public_html/web/storage/framework' # World writeable directory '/home/csnwine/public_html/web/storage/framework/cache' # World writeable directory '/home/csnwine/public_html/web/storage/framework/cache/data' # World writeable directory '/home/csnwine/public_html/web/storage/framework/sessions' # World writeable directory '/home/csnwine/public_html/web/storage/framework/testing' # World writeable directory '/home/csnwine/public_html/web/storage/framework/views' # World writeable directory '/home/csnwine/public_html/web/storage/logs' # World writeable directory '/home/csnwine/public_html/web/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (58) customdevdevopdi, Scanning /home/customdevdevopdi/absoluteelegance.customdev.devopdigital.com: (58) customdevdevopdi, Scanning /home/customdevdevopdi/absvaccines.customdev.devopdigital.com: (58) customdevdevopdi, Scanning /home/customdevdevopdi/acxss.customdev.devopdigital.com: (58) customdevdevopdi, Scanning /home/customdevdevopdi/adminbooking.customdev.devopdigital.com: (58) customdevdevopdi, Scanning /home/customdevdevopdi/adu4u2.customdev.devopdigital.com: (58) customdevdevopdi, Scanning /home/customdevdevopdi/api.datland.customdev.devopdigital.com: (58) customdevdevopdi, Scanning /home/customdevdevopdi/azurelisechocolate.customdev.devopdigital.com: (58) customdevdevopdi, Scanning /home/customdevdevopdi/backend.datland.customdev.devopdigital.com: (58) customdevdevopdi, Scanning /home/customdevdevopdi/backendthatreads.customdev.devopdigital.com: (58) customdevdevopdi, Scanning /home/customdevdevopdi/bookingform.customdev.devopdigital.com: (58) customdevdevopdi, Scanning /home/customdevdevopdi/brainmedia.customdev.devopdigital.com: (58) customdevdevopdi, Scanning /home/customdevdevopdi/cbicontracting.customdev.devopdigital.com: (58) customdevdevopdi, Scanning /home/customdevdevopdi/cedian.customdev.devopdigital.com: (58) customdevdevopdi, Scanning /home/customdevdevopdi/cornerstone.customdev.devopdigital.com: (58) customdevdevopdi, Scanning /home/customdevdevopdi/datland.tech.customdev.devopdigital.com: (58) customdevdevopdi, Scanning /home/customdevdevopdi/dreamhome.customdev.devopdigital.com: (58) customdevdevopdi, Scanning /home/customdevdevopdi/dwight.customdev.devopdigital.com: (58) customdevdevopdi, Scanning /home/customdevdevopdi/eve2dawn.customdev.devopdigital.com: (58) customdevdevopdi, Scanning /home/customdevdevopdi/evenglos.customdev.devopdigital.com: (58) customdevdevopdi, Scanning /home/customdevdevopdi/facesofboston.customdev.devopdigital.com: (58) customdevdevopdi, Scanning /home/customdevdevopdi/farazcustom.customdev.devopdigital.com: (58) customdevdevopdi, Scanning /home/customdevdevopdi/findjobs.customdev.devopdigital.com: (58) customdevdevopdi, Scanning /home/customdevdevopdi/forms-evenglos.customdev.devopdigital.com: (58) customdevdevopdi, Scanning /home/customdevdevopdi/franjipa.customdev.devopdigital.com: '/home/customdevdevopdi/franjipa.customdev.devopdigital.com/wp-content/plugins/elementor/elementor.php' # Script version check [OLD] [Elementor v3.16.4 < v3.21.5] '/home/customdevdevopdi/franjipa.customdev.devopdigital.com/wp-content/plugins/elementskit-lite/elementskit-lite.php' # Script version check [OLD] [ElementsKit Lite v2.9.2 < v3.1.3] '/home/customdevdevopdi/franjipa.customdev.devopdigital.com/wp-content/plugins/really-simple-ssl/rlrsssl-really-simple-ssl.php' # Script version check [OLD] [Really Simple SSL v7.0.9 < v8.1.1] '/home/customdevdevopdi/franjipa.customdev.devopdigital.com/wp-content/plugins/woo-variation-swatches/woo-variation-swatches.php' # Script version check [OLD] [Variation Swatches for WooCommerce v2.0.26 < v2.0.31] '/home/customdevdevopdi/franjipa.customdev.devopdigital.com/wp-content/plugins/woocommerce/woocommerce.php' # Script version check [OLD] [WooCommerce v8.1.1 < v8.8.3] '/home/customdevdevopdi/franjipa.customdev.devopdigital.com/wp-content/plugins/woocommerce/includes/admin/class-wc-admin-menus.php' # Universal decode regex match = [universal decoder] '/home/customdevdevopdi/franjipa.customdev.devopdigital.com/wp-content/plugins/woocommerce/src/Internal/Admin/WcPayWelcomePage.php' # Universal decode regex match = [universal decoder] '/home/customdevdevopdi/franjipa.customdev.devopdigital.com/wp-content/plugins/woocommerce/vendor/maxmind-db/reader/ext/maxminddb.c' # Suspicious file type [application/x-c] '/home/customdevdevopdi/franjipa.customdev.devopdigital.com/wp-content/plugins/woocommerce-services/woocommerce-services.php' # Script version check [OLD] [WooCommerce Shipping & Tax v2.3.5 < v2.5.7] '/home/customdevdevopdi/franjipa.customdev.devopdigital.com/wp-content/plugins/wp-custom-cursors/admin/class-wp-custom-cursors-admin.php' # Universal decode regex match = [universal decoder] '/home/customdevdevopdi/franjipa.customdev.devopdigital.com/wp-content/themes/astra/admin/includes/class-astra-menu.php' # Universal decode regex match = [universal decoder] '/home/customdevdevopdi/franjipa.customdev.devopdigital.com/wp-includes/version.php' # Script version check [OLD] [Wordpress v6.3.5 < v6.7.1] (58) customdevdevopdi, Scanning /home/customdevdevopdi/frazinascustomprintsnew.customdev.devopdigital.com: (58) customdevdevopdi, Scanning /home/customdevdevopdi/frontdatlandnew.customdev.devopdigital.com: (58) customdevdevopdi, Scanning /home/customdevdevopdi/frontendthatreads.customdev.devopdigital.com: (58) customdevdevopdi, Scanning /home/customdevdevopdi/hauckusa.customdev.devopdigital.com: (58) customdevdevopdi, Scanning /home/customdevdevopdi/healway.customdev.devopdigital.com: (58) customdevdevopdi, Scanning /home/customdevdevopdi/house-cleaning.customdev.devopdigital.com: (58) customdevdevopdi, Scanning /home/customdevdevopdi/impoundlocator.customdev.devopdigital.com: (58) customdevdevopdi, Scanning /home/customdevdevopdi/interiordecorconsult.customdev.devopdigital.com: (58) customdevdevopdi, Scanning /home/customdevdevopdi/landing.customdev.devopdigital.com: (58) customdevdevopdi, Scanning /home/customdevdevopdi/lilac.home.customdev.devopdigital.com: (58) customdevdevopdi, Scanning /home/customdevdevopdi/luxuryhouseboat.customdev.devopdigital.com: (58) customdevdevopdi, Scanning /home/customdevdevopdi/lw.customdev.devopdigital.com: (58) customdevdevopdi, Scanning /home/customdevdevopdi/oasisbuilder.customdev.devopdigital.com: (58) customdevdevopdi, Scanning /home/customdevdevopdi/outlandcreation.customdev.devopdigital.com: (58) customdevdevopdi, Scanning /home/customdevdevopdi/overly-craftinated.customdev.devopdigital.com: (58) customdevdevopdi, Scanning /home/customdevdevopdi/phase4.customdev.devopdigital.com: (58) customdevdevopdi, Scanning /home/customdevdevopdi/pheonix.customdev.devopdigital.com: (58) customdevdevopdi, Scanning /home/customdevdevopdi/photossturgis.customdev.devopdigital.com: (58) customdevdevopdi, Scanning /home/customdevdevopdi/picsbyjd.customdev.devopdigital.com: (58) customdevdevopdi, Scanning /home/customdevdevopdi/provider.customdev.devopdigital.com: (58) customdevdevopdi, Scanning /home/customdevdevopdi/public_html: '/home/customdevdevopdi/public_html/earlyliteracylearningnew/.phpintel' # World writeable directory '/home/customdevdevopdi/public_html/earlyliteracylearningnew/.well-known' # World writeable directory '/home/customdevdevopdi/public_html/earlyliteracylearningnew/app' # World writeable directory '/home/customdevdevopdi/public_html/earlyliteracylearningnew/bootstrap' # World writeable directory '/home/customdevdevopdi/public_html/earlyliteracylearningnew/cgi-bin' # World writeable directory '/home/customdevdevopdi/public_html/earlyliteracylearningnew/config' # World writeable directory '/home/customdevdevopdi/public_html/earlyliteracylearningnew/database' # World writeable directory '/home/customdevdevopdi/public_html/earlyliteracylearningnew/public' # World writeable directory '/home/customdevdevopdi/public_html/earlyliteracylearningnew/resources' # World writeable directory '/home/customdevdevopdi/public_html/earlyliteracylearningnew/routes' # World writeable directory '/home/customdevdevopdi/public_html/earlyliteracylearningnew/storage' # World writeable directory '/home/customdevdevopdi/public_html/earlyliteracylearningnew/storage/logs' # World writeable directory '/home/customdevdevopdi/public_html/earlyliteracylearningnew/tests' # World writeable directory '/home/customdevdevopdi/public_html/earlyliteracylearningnew/upload' # World writeable directory '/home/customdevdevopdi/public_html/earlyliteracylearningnew/vendor' # World writeable directory (58) customdevdevopdi, Scanning /home/customdevdevopdi/snpindustries.customdev.devopdigital.com: (58) customdevdevopdi, Scanning /home/customdevdevopdi/stockgrow.customdev.devopdigital.com: (58) customdevdevopdi, Scanning /home/customdevdevopdi/thatreads.customdev.devopdigital.com: (58) customdevdevopdi, Scanning /home/customdevdevopdi/theautopaint.customdev.devopdigital.com: (58) customdevdevopdi, Scanning /home/customdevdevopdi/tm.technologies.customdev.devopdigital.com: (58) customdevdevopdi, Scanning /home/customdevdevopdi/turo.customdev.devopdigital.com: (58) customdevdevopdi, Scanning /home/customdevdevopdi/valvemapper.customdev.devopdigital.com: (58) customdevdevopdi, Scanning /home/customdevdevopdi/vest-nscollection.customdev.devopdigital.com: (58) customdevdevopdi, Scanning /home/customdevdevopdi/waist-nscollection.customdev.devopdigital.com: (58) customdevdevopdi, Scanning /home/customdevdevopdi/woocommercemanage.customdev.devopdigital.com: (57) depodoctors, Scanning /home/depodoctors/public_html: (56) devhub, Scanning /home/devhub/102ecom.devhub.digtalsdesigns.com: '/home/devhub/102ecom.devhub.digtalsdesigns.com/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect571k1.php' # Universal decode regex match = [universal decoder] '/home/devhub/102ecom.devhub.digtalsdesigns.com/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect571r1.php' # Universal decode regex match = [universal decoder] '/home/devhub/102ecom.devhub.digtalsdesigns.com/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (56) devhub, Scanning /home/devhub/5of5.devhub.digtalsdesigns.com: (56) devhub, Scanning /home/devhub/active-outdoor.devhub.digtalsdesigns.com: '/home/devhub/active-outdoor.devhub.digtalsdesigns.com/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (56) devhub, Scanning /home/devhub/alumniboost.devhub.digtalsdesigns.com: '/home/devhub/alumniboost.devhub.digtalsdesigns.com/vendor/srmklive/paypal/tests/Mocks/Responses/Identity.php' # Universal decode regex match = [universal decoder] '/home/devhub/alumniboost.devhub.digtalsdesigns.com/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (56) devhub, Scanning /home/devhub/amwtraining.devhub.digtalsdesigns.com: '/home/devhub/amwtraining.devhub.digtalsdesigns.com/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (56) devhub, Scanning /home/devhub/anthempsychiatry-booking.devhub.digtalsdesigns.com: (56) devhub, Scanning /home/devhub/armorzone.devhub.digtalsdesigns.com: (56) devhub, Scanning /home/devhub/backend-rocrita.devhub.digtalsdesigns.com: '/home/devhub/backend-rocrita.devhub.digtalsdesigns.com/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (56) devhub, Scanning /home/devhub/backend.bolt-corp.devhub.digtalsdesigns.com: '/home/devhub/backend.bolt-corp.devhub.digtalsdesigns.com/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (56) devhub, Scanning /home/devhub/backend.fronteda.devhub.digtalsdesigns.com: '/home/devhub/backend.fronteda.devhub.digtalsdesigns.com/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (56) devhub, Scanning /home/devhub/backend.thatreadsnew.devhub.digtalsdesigns.com: '/home/devhub/backend.thatreadsnew.devhub.digtalsdesigns.com/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (56) devhub, Scanning /home/devhub/baycolorlab.devhub.digtalsdesigns.com: (56) devhub, Scanning /home/devhub/bigappleimprints.devhub.digtalsdesigns.com: '/home/devhub/bigappleimprints.devhub.digtalsdesigns.com/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (56) devhub, Scanning /home/devhub/bobinados.devhub.digtalsdesigns.com: (56) devhub, Scanning /home/devhub/bolt-corp.devhub.digtalsdesigns.com: (56) devhub, Scanning /home/devhub/buy4wheels.devhub.digtalsdesigns.com: '/home/devhub/buy4wheels.devhub.digtalsdesigns.com/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (56) devhub, Scanning /home/devhub/cadabra.devhub.digtalsdesigns.com: '/home/devhub/cadabra.devhub.digtalsdesigns.com/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (56) devhub, Scanning /home/devhub/carmatchrentals.devhub.digtalsdesigns.com: '/home/devhub/carmatchrentals.devhub.digtalsdesigns.com/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (56) devhub, Scanning /home/devhub/certifiedlions.devhub.digtalsdesigns.com: '/home/devhub/certifiedlions.devhub.digtalsdesigns.com/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (56) devhub, Scanning /home/devhub/checkonrates.devhub.digtalsdesigns.com: '/home/devhub/checkonrates.devhub.digtalsdesigns.com/vendor/srmklive/paypal/tests/Mocks/Responses/Identity.php' # Universal decode regex match = [universal decoder] '/home/devhub/checkonrates.devhub.digtalsdesigns.com/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (56) devhub, Scanning /home/devhub/claudiamarinspeech.devhub.digtalsdesigns.com: '/home/devhub/claudiamarinspeech.devhub.digtalsdesigns.com/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (56) devhub, Scanning /home/devhub/craftedstones.devhub.digtalsdesigns.com: '/home/devhub/craftedstones.devhub.digtalsdesigns.com/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (56) devhub, Scanning /home/devhub/datastreetpartners.devhub.digtalsdesigns.com: (56) devhub, Scanning /home/devhub/daxpro.devhub.digtalsdesigns.com: '/home/devhub/daxpro.devhub.digtalsdesigns.com/node_modules/node-notifier/vendor/notifu/notifu.exe' # MS Windows Binary/Executable [application/x-winexec] '/home/devhub/daxpro.devhub.digtalsdesigns.com/node_modules/node-notifier/vendor/notifu/notifu64.exe' # MS Windows Binary/Executable [application/x-winexec] '/home/devhub/daxpro.devhub.digtalsdesigns.com/node_modules/node-notifier/vendor/snoreToast/snoretoast-x64.exe' # MS Windows Binary/Executable [application/x-winexec] '/home/devhub/daxpro.devhub.digtalsdesigns.com/node_modules/node-notifier/vendor/snoreToast/snoretoast-x86.exe' # MS Windows Binary/Executable [application/x-winexec] '/home/devhub/daxpro.devhub.digtalsdesigns.com/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (56) devhub, Scanning /home/devhub/dream-home.devhub.digtalsdesigns.com: '/home/devhub/dream-home.devhub.digtalsdesigns.com/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (56) devhub, Scanning /home/devhub/dsi-keyboards.devhub.digtalsdesigns.com: (56) devhub, Scanning /home/devhub/emereshr.devhub.digtalsdesigns.com: '/home/devhub/emereshr.devhub.digtalsdesigns.com/vendor/amphp/process/bin/windows/ProcessWrapper.exe' # MS Windows Binary/Executable [application/x-winexec] '/home/devhub/emereshr.devhub.digtalsdesigns.com/vendor/amphp/process/bin/windows/ProcessWrapper64.exe' # MS Windows Binary/Executable [application/x-winexec] '/home/devhub/emereshr.devhub.digtalsdesigns.com/vendor/google/apiclient-services/src/Contentwarehouse/BlueGingerClientVisibleProtoBlueGingerSupportedServicesBlueGingerModule.php' # Universal decode regex match = [universal decoder] '/home/devhub/emereshr.devhub.digtalsdesigns.com/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect571k1.php' # Universal decode regex match = [universal decoder] '/home/devhub/emereshr.devhub.digtalsdesigns.com/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect571r1.php' # Universal decode regex match = [universal decoder] '/home/devhub/emereshr.devhub.digtalsdesigns.com/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] '/home/devhub/emereshr.devhub.digtalsdesigns.com/vendor/webklex/php-imap/src/Message.php' # Regular expression match = [setuid\(\s*(\"|\')?0] # (decoded file [depth: 0]) Regular expression match = [setuid\(\s*(\"|\')?0] (56) devhub, Scanning /home/devhub/enabling.devhub.digtalsdesigns.com: '/home/devhub/enabling.devhub.digtalsdesigns.com/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (56) devhub, Scanning /home/devhub/evo.devhub.digtalsdesigns.com: (56) devhub, Scanning /home/devhub/familyreunionsincharlotte.devhub.digtalsdesigns.com: (56) devhub, Scanning /home/devhub/fronteda.devhub.digtalsdesigns.com: (56) devhub, Scanning /home/devhub/gabbiesfreezedried.devhub.digtalsdesigns.com: (56) devhub, Scanning /home/devhub/gemafric.devhub.digtalsdesigns.com: '/home/devhub/gemafric.devhub.digtalsdesigns.com/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (56) devhub, Scanning /home/devhub/icrtechnologies.devhub.digtalsdesigns.com: '/home/devhub/icrtechnologies.devhub.digtalsdesigns.com/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (56) devhub, Scanning /home/devhub/ip3things.devhub.digtalsdesigns.com: '/home/devhub/ip3things.devhub.digtalsdesigns.com/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (56) devhub, Scanning /home/devhub/joeblos.devhub.digtalsdesigns.com: (56) devhub, Scanning /home/devhub/kindsoulz.devhub.digtalsdesigns.com: '/home/devhub/kindsoulz.devhub.digtalsdesigns.com/node_modules/@esbuild/win32-x64/esbuild.exe' # MS Windows Binary/Executable [application/x-winexec] '/home/devhub/kindsoulz.devhub.digtalsdesigns.com/node_modules/@rollup/rollup-win32-x64-msvc/rollup.win32-x64-msvc.node' # MS Windows Binary/Executable [application/x-winexec] '/home/devhub/kindsoulz.devhub.digtalsdesigns.com/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (56) devhub, Scanning /home/devhub/lunchthymecatering.devhub.digtalsdesigns.com: '/home/devhub/lunchthymecatering.devhub.digtalsdesigns.com/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (56) devhub, Scanning /home/devhub/manx2.devhub.digtalsdesigns.com: '/home/devhub/manx2.devhub.digtalsdesigns.com/administrator/manifests/packages/pkg_akeeba.xml' # Script version check [OLD] [Akeeba Backup v8.3.3 < v9.7.1] '/home/devhub/manx2.devhub.digtalsdesigns.com/administrator/manifests/packages/pkg_jce.xml' # Script version check [OLD] [JCE v2.9.55 < v2.9.71] '/home/devhub/manx2.devhub.digtalsdesigns.com/administrator/manifests/packages/pkg_sourcerer.xml' # Script version check [OLD] [Sourcerer v9.4.0 < v10.1.1] '/home/devhub/manx2.devhub.digtalsdesigns.com/libraries/fof30/Cli/wrong_php.php' # Universal decode regex match = [universal decoder] '/home/devhub/manx2.devhub.digtalsdesigns.com/libraries/fof40/Cli/wrong_php.php' # Universal decode regex match = [universal decoder] (56) devhub, Scanning /home/devhub/media-print.devhub.digtalsdesigns.com: '/home/devhub/media-print.devhub.digtalsdesigns.com/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (56) devhub, Scanning /home/devhub/mellymunchies.devhub.digtalsdesigns.com: (56) devhub, Scanning /home/devhub/mexam-mailbox.devhub.digtalsdesigns.com: '/home/devhub/mexam-mailbox.devhub.digtalsdesigns.com/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (56) devhub, Scanning /home/devhub/mocksurl.devhub.digtalsdesigns.com: '/home/devhub/mocksurl.devhub.digtalsdesigns.com/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (56) devhub, Scanning /home/devhub/ontimetaxi.devhub.digtalsdesigns.com: (56) devhub, Scanning /home/devhub/pixelmarketing.devhub.digtalsdesigns.com: '/home/devhub/pixelmarketing.devhub.digtalsdesigns.com/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (56) devhub, Scanning /home/devhub/populi.devhub.digtalsdesigns.com: '/home/devhub/populi.devhub.digtalsdesigns.com/admin-panel/vendors/codemirror-5.30.0/mode/clike/index.html' # Suspicious file type [application/x-c] '/home/devhub/populi.devhub.digtalsdesigns.com/assets/libs/ffmpeg/qt-faststart' # Linux Binary/Executable [application/x-executable] '/home/devhub/populi.devhub.digtalsdesigns.com/assets/libs/google-lib/vendor/google/crc32/ext/hash_crc32c.c' # Suspicious file type [application/x-c] '/home/devhub/populi.devhub.digtalsdesigns.com/assets/libs/google-lib/vendor/google/crc32/ext/php_crc32c.c' # Suspicious file type [application/x-c] '/home/devhub/populi.devhub.digtalsdesigns.com/assets/libs/s3-lib/vendor/aws/aws-crt-php/ext/awscrt.c' # Suspicious file type [application/x-c] '/home/devhub/populi.devhub.digtalsdesigns.com/assets/libs/s3-lib/vendor/aws/aws-crt-php/ext/crc.c' # Suspicious file type [application/x-c] '/home/devhub/populi.devhub.digtalsdesigns.com/assets/libs/s3-lib/vendor/aws/aws-crt-php/ext/credentials.c' # Suspicious file type [application/x-c] '/home/devhub/populi.devhub.digtalsdesigns.com/assets/libs/s3-lib/vendor/aws/aws-crt-php/ext/crt.c' # Suspicious file type [application/x-c] '/home/devhub/populi.devhub.digtalsdesigns.com/assets/libs/s3-lib/vendor/aws/aws-crt-php/ext/event_loop.c' # Suspicious file type [application/x-c] '/home/devhub/populi.devhub.digtalsdesigns.com/assets/libs/s3-lib/vendor/aws/aws-crt-php/ext/http.c' # Suspicious file type [application/x-c] '/home/devhub/populi.devhub.digtalsdesigns.com/assets/libs/s3-lib/vendor/aws/aws-crt-php/ext/logging.c' # Suspicious file type [application/x-c] '/home/devhub/populi.devhub.digtalsdesigns.com/assets/libs/s3-lib/vendor/aws/aws-crt-php/ext/php_util.c' # Suspicious file type [application/x-c] '/home/devhub/populi.devhub.digtalsdesigns.com/assets/libs/s3-lib/vendor/aws/aws-crt-php/ext/signing.c' # Suspicious file type [application/x-c] '/home/devhub/populi.devhub.digtalsdesigns.com/assets/libs/s3-lib/vendor/aws/aws-crt-php/ext/stream.c' # Suspicious file type [application/x-c] (56) devhub, Scanning /home/devhub/public_html: '/home/devhub/public_html/102market/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect571k1.php' # Universal decode regex match = [universal decoder] '/home/devhub/public_html/102market/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect571r1.php' # Universal decode regex match = [universal decoder] '/home/devhub/public_html/102market/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] '/home/devhub/public_html/activecommerce/vendor/aws/aws-sdk-php/src/GuardDuty/index.php' # Known exploit = [Fingerprint Match (fp)] [Hacker Sig Exploit [P2246]] '/home/devhub/public_html/activecommerce/vendor/league/commonmark/src/Extension/Footnote/Node/index.php' # Known exploit = [Fingerprint Match (fp)] [Hacker Sig Exploit [P2246]] '/home/devhub/public_html/activecommerce/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect571k1.php' # Universal decode regex match = [universal decoder] '/home/devhub/public_html/activecommerce/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect571r1.php' # Universal decode regex match = [universal decoder] '/home/devhub/public_html/activecommerce/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] '/home/devhub/public_html/backend-lunchthymecatering/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] '/home/devhub/public_html/calender-laravel/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] '/home/devhub/public_html/exteriorsmartlighting/node_modules/@esbuild/win32-x64/esbuild.exe' # MS Windows Binary/Executable [application/x-winexec] '/home/devhub/public_html/exteriorsmartlighting/node_modules/@rollup/rollup-win32-x64-msvc/rollup.win32-x64-msvc.node' # MS Windows Binary/Executable [application/x-winexec] '/home/devhub/public_html/gdplayer/download.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/embed.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/embed2.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/index.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/defined.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/functions.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/isAdmin.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/isUser.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/plugins.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/settings.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/AADecoder.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Ajax.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/AntiCaptcha.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Conn.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/CoreHelper.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/FileStream.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Filmstrip.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/GoogleDriveHelper.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/GoogleDriveRestAPI.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/HLS.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/HTML.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/HeadlessChrome.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Helper.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/InstanceCache.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Login.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/MPD.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Mailer.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Minify.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Model.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/ModelHelper.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Plugins.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Proxy.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/ServerInfo.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/SimpleImage.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/StreamHelper.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/StreamMaster.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Subscene.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/SubtitleConverter.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/UUID.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/UpStreamGroupParser.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Update.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/VideoPlayer.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Views.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Widget.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/XVFSParser.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/YetiShare.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Ajax/Dashboard.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Ajax/GDriveAccount.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Ajax/GDriveFile.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Ajax/GDriveMirror.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Ajax/GDriveQueue.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Ajax/LoadBalancer.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Ajax/Plugin.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Ajax/PrivateAjax.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Ajax/PublicAjax.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Ajax/Session.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Ajax/Setting.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Ajax/Subtitle.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Ajax/User.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Ajax/Video.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/amazon.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/aparat.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/archive.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/blogger.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/cloudmailru.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/cyberfile.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/dailymotion.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/darkibox.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/direct.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/dood.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/dropbox.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/dropden.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/dzen.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/ecast123.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/embedrise.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/europeup.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/facebook.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/filelions.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/filemail.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/filemoon.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/filesfm.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/fireload.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/freedl.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/gdrive.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/gofile.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/goodstream.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/googlephotos.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/hexupload.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/hxfile.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/iceyfile.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/indishare.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/krakenfiles.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/lulustream.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/mediacm.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/mediafire.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/mixdropto.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/mp4upload.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/mstream.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/mymailru.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/navertv.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/okru.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/onedrive.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/pcloud.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/racaty.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/rumble.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/sendvid.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/sibnet.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/soundcloud.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/streamable.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/streamff.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/streamruby.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/streamtape.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/supervideo.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/terabox.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/tiktok.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/turboviplay.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/udrop.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/uploady.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/upstream.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/uptomega.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/uqload.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/userscloud.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/vidio.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/vidlook.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/vidmoly.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/vidoza.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/vidpro.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/vidtube.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/vidyard.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/vimeo.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/viu.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/vk.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/voe.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/vudeo.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/wolfstream.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/xvs.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/yadisk.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/yourupload.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Hosting/youtube.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Model/GDriveAuth.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Model/GDriveDuplicate.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Model/GDriveMirror.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Model/GDriveQueue.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Model/LoadBalancer.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Model/Plugin.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Model/Session.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Model/Setting.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Model/Stat.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Model/StatUA.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Model/Subtitle.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Model/SubtitleManager.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Model/User.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Model/Video.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Model/VideoAlternative.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Model/VideoHash.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Model/VideoShort.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/classes/Model/VideoSource.class.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/401.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/403.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/404.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/admin-api.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/ads.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/ajax.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/api.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/changelog.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/cron-proxy.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/download.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/embed.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/embed2.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/filmstrip.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/hls.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/hxfile.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/mpd.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/pl.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/poster.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/seg.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/sharer.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/sitemap.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/subtitle.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/ts.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/vid.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/backend/401.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/backend/403.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/backend/404.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/backend/dashboard.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/backend/dmca.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/backend/login.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/backend/profile.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/backend/register.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/backend/reset-password.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/backend/ajax/dashboard.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/backend/ajax/gdrive-accounts-list.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/backend/ajax/gdrive-accounts.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/backend/ajax/gdrive-backup-files-list.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/backend/ajax/gdrive-backup-files.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/backend/ajax/gdrive-backup-queue-list.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/backend/ajax/gdrive-backup-queue.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/backend/ajax/gdrive-files-list.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/backend/ajax/gdrive-files.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/backend/ajax/load-balancers-list.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/backend/ajax/load-balancers.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/backend/ajax/profile.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/backend/ajax/public.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/backend/ajax/sessions-list.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/backend/ajax/sessions.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/backend/ajax/settings.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/backend/ajax/subtitles-list.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/backend/ajax/subtitles.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/backend/ajax/users-list.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/backend/ajax/users.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/backend/ajax/videos-list.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/backend/ajax/videos.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/backend/gdrive/backup-files.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/backend/gdrive/backup-queue.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/backend/gdrive/edit.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/backend/gdrive/files.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/backend/gdrive/list.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/backend/gdrive/new.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/backend/plugins/list.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/backend/settings/ads.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/backend/settings/cookies.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/backend/settings/general.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/backend/settings/misc.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/backend/settings/public.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/backend/settings/reset.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/backend/settings/shortlink.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/backend/settings/smtp.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/backend/settings/video.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/backend/settings/web.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/backend/settings/load-balancers/edit.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/backend/settings/load-balancers/list.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/backend/settings/load-balancers/new.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/backend/users/edit.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/backend/users/list.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/backend/users/new.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/backend/users/sessions.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/backend/videos/edit.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/backend/videos/list.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/backend/videos/new.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/includes/views/backend/videos/subtitles.php' # Known exploit = [Fingerprint Match (fp)] [PHP OBF Exploit [P2256]] '/home/devhub/public_html/gdplayer/vendor/maxmind-db/reader/ext/maxminddb.c' # Suspicious file type [application/x-c] '/home/devhub/public_html/gdplayer/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect571k1.php' # Universal decode regex match = [universal decoder] '/home/devhub/public_html/gdplayer/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect571r1.php' # Universal decode regex match = [universal decoder] '/home/devhub/public_html/heatmap/assets/modules/codemirror/mode/clike/index.html' # Suspicious file type [application/x-c] '/home/devhub/public_html/heatmap/vendor/aws/aws-crt-php/ext/awscrt.c' # Suspicious file type [application/x-c] '/home/devhub/public_html/heatmap/vendor/aws/aws-crt-php/ext/crc.c' # Suspicious file type [application/x-c] '/home/devhub/public_html/heatmap/vendor/aws/aws-crt-php/ext/credentials.c' # Suspicious file type [application/x-c] '/home/devhub/public_html/heatmap/vendor/aws/aws-crt-php/ext/crt.c' # Suspicious file type [application/x-c] '/home/devhub/public_html/heatmap/vendor/aws/aws-crt-php/ext/event_loop.c' # Suspicious file type [application/x-c] '/home/devhub/public_html/heatmap/vendor/aws/aws-crt-php/ext/http.c' # Suspicious file type [application/x-c] '/home/devhub/public_html/heatmap/vendor/aws/aws-crt-php/ext/logging.c' # Suspicious file type [application/x-c] '/home/devhub/public_html/heatmap/vendor/aws/aws-crt-php/ext/php_util.c' # Suspicious file type [application/x-c] '/home/devhub/public_html/heatmap/vendor/aws/aws-crt-php/ext/signing.c' # Suspicious file type [application/x-c] '/home/devhub/public_html/heatmap/vendor/aws/aws-crt-php/ext/stream.c' # Suspicious file type [application/x-c] '/home/devhub/public_html/heatmap/vendor/mercadopago/dx-php/.phpdoc/cache/descriptors/-' # Suspicious directory '/home/devhub/public_html/heatmap/vendor/srmklive/paypal/tests/Mocks/Responses/Identity.php' # Universal decode regex match = [universal decoder] '/home/devhub/public_html/heatmap/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] '/home/devhub/public_html/kbsresort-custom/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] '/home/devhub/public_html/mybattlepics-laravel/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] '/home/devhub/public_html/ontimetaxi/public/database.php' # Regular expression match = [Adminer - Compact database management] # (decoded file [depth: 0]) Regular expression match = [Adminer - Compact database management] '/home/devhub/public_html/ontimetaxi/public/assets/plugins/jquery-steps-master/nuget/NuGet.exe' # MS Windows Binary/Executable [application/x-winexec] '/home/devhub/public_html/ontimetaxi/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (56) devhub, Scanning /home/devhub/regaltraditions.devhub.digtalsdesigns.com: '/home/devhub/regaltraditions.devhub.digtalsdesigns.com/reagal-tradition/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] '/home/devhub/regaltraditions.devhub.digtalsdesigns.com/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (56) devhub, Scanning /home/devhub/rocksal.devhub.digtalsdesigns.com: # Scan Timeout (30 secs) while processing: '/home/devhub/rocksal.devhub.digtalsdesigns.com/theme.zip' '/home/devhub/rocksal.devhub.digtalsdesigns.com/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (56) devhub, Scanning /home/devhub/rocrita.devhub.digtalsdesigns.com: '/home/devhub/rocrita.devhub.digtalsdesigns.com/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (56) devhub, Scanning /home/devhub/rumbletelevision.devhub.digtalsdesigns.com: (56) devhub, Scanning /home/devhub/sharkfin.devhub.digtalsdesigns.com: '/home/devhub/sharkfin.devhub.digtalsdesigns.com/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (56) devhub, Scanning /home/devhub/smokyhillbaseball.devhub.digtalsdesigns.com: '/home/devhub/smokyhillbaseball.devhub.digtalsdesigns.com/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (56) devhub, Scanning /home/devhub/southcity.devhub.digtalsdesigns.com: (56) devhub, Scanning /home/devhub/splitline.devhub.digtalsdesigns.com: (56) devhub, Scanning /home/devhub/talentvare.devhub.digtalsdesigns.com: (56) devhub, Scanning /home/devhub/terra.devhub.digtalsdesigns.com: '/home/devhub/terra.devhub.digtalsdesigns.com/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (56) devhub, Scanning /home/devhub/thatreads.devhub.digtalsdesigns.com: (56) devhub, Scanning /home/devhub/thatreadsnew.devhub.digtalsdesigns.com: (56) devhub, Scanning /home/devhub/txmunitions.devhub.digtalsdesigns.com: '/home/devhub/txmunitions.devhub.digtalsdesigns.com/node_modules/node-notifier/vendor/notifu/notifu.exe' # MS Windows Binary/Executable [application/x-winexec] '/home/devhub/txmunitions.devhub.digtalsdesigns.com/node_modules/node-notifier/vendor/notifu/notifu64.exe' # MS Windows Binary/Executable [application/x-winexec] '/home/devhub/txmunitions.devhub.digtalsdesigns.com/node_modules/node-notifier/vendor/snoreToast/SnoreToast.exe' # MS Windows Binary/Executable [application/x-winexec] '/home/devhub/txmunitions.devhub.digtalsdesigns.com/storage/framework' # World writeable directory '/home/devhub/txmunitions.devhub.digtalsdesigns.com/storage/framework/cache' # World writeable directory '/home/devhub/txmunitions.devhub.digtalsdesigns.com/storage/framework/cache/data' # World writeable directory '/home/devhub/txmunitions.devhub.digtalsdesigns.com/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (56) devhub, Scanning /home/devhub/urenders.devhub.digtalsdesigns.com: '/home/devhub/urenders.devhub.digtalsdesigns.com/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (56) devhub, Scanning /home/devhub/xenon.devhub.digtalsdesigns.com: '/home/devhub/xenon.devhub.digtalsdesigns.com/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (55) devspace, Scanning /home/devspace/frazinascustomprintsnew.devspace.digtalsdesigns.com: (55) devspace, Scanning /home/devspace/public_html: (54) dollhousemedical, Scanning /home/dollhousemedical/public_html: (53) earlyliteracylea, Scanning /home/earlyliteracylea/demo.earlyliteracylearning.com: '/home/earlyliteracylea/demo.earlyliteracylearning.com/.phpintel' # World writeable directory '/home/earlyliteracylea/demo.earlyliteracylearning.com/.well-known' # World writeable directory '/home/earlyliteracylea/demo.earlyliteracylearning.com/app' # World writeable directory '/home/earlyliteracylea/demo.earlyliteracylearning.com/bootstrap' # World writeable directory '/home/earlyliteracylea/demo.earlyliteracylearning.com/cgi-bin' # World writeable directory '/home/earlyliteracylea/demo.earlyliteracylearning.com/config' # World writeable directory '/home/earlyliteracylea/demo.earlyliteracylearning.com/database' # World writeable directory '/home/earlyliteracylea/demo.earlyliteracylearning.com/public' # World writeable directory '/home/earlyliteracylea/demo.earlyliteracylearning.com/resources' # World writeable directory '/home/earlyliteracylea/demo.earlyliteracylearning.com/routes' # World writeable directory '/home/earlyliteracylea/demo.earlyliteracylearning.com/storage' # World writeable directory '/home/earlyliteracylea/demo.earlyliteracylearning.com/storage/logs' # World writeable directory '/home/earlyliteracylea/demo.earlyliteracylearning.com/tests' # World writeable directory '/home/earlyliteracylea/demo.earlyliteracylearning.com/upload' # World writeable directory '/home/earlyliteracylea/demo.earlyliteracylearning.com/vendor' # World writeable directory (53) earlyliteracylea, Scanning /home/earlyliteracylea/public_html: '/home/earlyliteracylea/public_html/.phpintel' # World writeable directory '/home/earlyliteracylea/public_html/.well-known' # World writeable directory '/home/earlyliteracylea/public_html/app' # World writeable directory '/home/earlyliteracylea/public_html/bootstrap' # World writeable directory '/home/earlyliteracylea/public_html/cgi-bin' # World writeable directory '/home/earlyliteracylea/public_html/config' # World writeable directory '/home/earlyliteracylea/public_html/database' # World writeable directory '/home/earlyliteracylea/public_html/public' # World writeable directory '/home/earlyliteracylea/public_html/resources' # World writeable directory '/home/earlyliteracylea/public_html/routes' # World writeable directory '/home/earlyliteracylea/public_html/storage' # World writeable directory '/home/earlyliteracylea/public_html/storage/logs' # World writeable directory '/home/earlyliteracylea/public_html/tests' # World writeable directory '/home/earlyliteracylea/public_html/upload' # World writeable directory '/home/earlyliteracylea/public_html/vendor' # World writeable directory (52) ecom, Scanning /home/ecom/102bid.com: '/home/ecom/102bid.com/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (52) ecom, Scanning /home/ecom/102market.com: '/home/ecom/102market.com/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (52) ecom, Scanning /home/ecom/public_html: (51) eraas, Scanning /home/eraas/public_html: '/home/eraas/public_html/file.php' # Regular expression match = [eval\s*\(\s*urldecode\s*\(] # Decode regex match = [decode regex: 1] '/home/eraas/public_html/wp-extends.php' # Known exploit = [Fingerprint Match (fp)] [Hacker Sig Exploit [P2264]] '/home/eraas/public_html/.phpintel/557199/index.php' # Regular expression match = [eval\s*\(\s*urldecode\s*\(] # Decode regex match = [decode regex: 1] '/home/eraas/public_html/.well-known/acme-challenge/852554/index.php' # Regular expression match = [eval\s*\(\s*urldecode\s*\(] # Decode regex match = [decode regex: 1] '/home/eraas/public_html/app/Entity/Meta/about.php' # Universal decode regex match = [universal decoder] # (decoded file [depth: 1]) Decode regex match = [decode regex: 1] # Decode regex match = [decode regex: 1] # (decoded file [depth: 1]) Decode regex match = [decode regex: 1] '/home/eraas/public_html/database/seeds/576181/index.php' # Regular expression match = [eval\s*\(\s*urldecode\s*\(] # Decode regex match = [decode regex: 1] '/home/eraas/public_html/public/uploads/profile/17363599942.jpg' # Suspicious image file (hidden script file) '/home/eraas/public_html/public/uploads/profile/17363600082.php' # Suspicious image file (hidden script file) '/home/eraas/public_html/resources/language/class-t.api.php' # Suspicious image file (hidden script file) # Known exploit = [Fingerprint Match (fp)] [PHP Exploit [P2189]] '/home/eraas/public_html/resources/views/theme/default/456245/index.php' # Regular expression match = [eval\s*\(\s*urldecode\s*\(] # Decode regex match = [decode regex: 1] '/home/eraas/public_html/routes/207338/index.php' # Regular expression match = [eval\s*\(\s*urldecode\s*\(] # Decode regex match = [decode regex: 1] '/home/eraas/public_html/storage/framework/views/794956/index.php' # Regular expression match = [eval\s*\(\s*urldecode\s*\(] # Decode regex match = [decode regex: 1] '/home/eraas/public_html/tests/Feature/695916/index.php' # Regular expression match = [eval\s*\(\s*urldecode\s*\(] # Decode regex match = [decode regex: 1] '/home/eraas/public_html/vendor/symfony/process/Pipes/290893/index.php' # Regular expression match = [eval\s*\(\s*urldecode\s*\(] # Decode regex match = [decode regex: 1] (50) fdrengg, Scanning /home/fdrengg/public_html: (49) fglawn, Scanning /home/fglawn/public_html: (48) flawlessinterior, Scanning /home/flawlessinterior/public_html: (47) fleetshield, Scanning /home/fleetshield/public_html: '/home/fleetshield/public_html/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (46) formsevenglos, Scanning /home/formsevenglos/admin.forms-evenglos.devopdigital.com: (46) formsevenglos, Scanning /home/formsevenglos/booking.forms-evenglos.devopdigital.com: (46) formsevenglos, Scanning /home/formsevenglos/public_html: (45) frazinascustompr, Scanning /home/frazinascustompr/customizer.frazinascustomprints.com: (45) frazinascustompr, Scanning /home/frazinascustompr/public_html: (44) frugaltire, Scanning /home/frugaltire/public_html: '/home/frugaltire/public_html/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (43) full90performanc, Scanning /home/full90performanc/public_html: '/home/full90performanc/public_html/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (42) gmfdbrwc, Scanning /home/gmfdbrwc/public_html: (41) goldentub, Scanning /home/goldentub/public_html: (40) graphicsbygreen, Scanning /home/graphicsbygreen/public_html: '/home/graphicsbygreen/public_html/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (39) homesbymollard, Scanning /home/homesbymollard/public_html: '/home/homesbymollard/public_html/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (38) hrmdigtalsdesign, Scanning /home/hrmdigtalsdesign/live.hrm.digtalsdesigns.com: (38) hrmdigtalsdesign, Scanning /home/hrmdigtalsdesign/public_html: (37) icrtechnologies, Scanning /home/icrtechnologies/public_html: '/home/icrtechnologies/public_html/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (36) ip3things, Scanning /home/ip3things/public_html: '/home/ip3things/public_html/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (35) jdpics, Scanning /home/jdpics/public_html: '/home/jdpics/public_html/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (34) kothariandcompan, Scanning /home/kothariandcompan/public_html: '/home/kothariandcompan/public_html/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (33) lerumbatax, Scanning /home/lerumbatax/public_html: '/home/lerumbatax/public_html/wp-extends.php' # Known exploit = [Fingerprint Match (fp)] [Hacker Sig Exploit [P2264]] '/home/lerumbatax/public_html/cgi-bin/24-2-2024/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] '/home/lerumbatax/public_html/storage/app/uploads/records_ss_card_677eccf0ee7bc_2.php74' # Suspicious image file (hidden script file) '/home/lerumbatax/public_html/storage/app/uploads/records_ss_card_677ecd5357452_2.php.' # Suspicious image file (hidden script file) '/home/lerumbatax/public_html/storage/app/uploads/records_ss_card_677ecd6187221_2.php.' # Suspicious image file (hidden script file) '/home/lerumbatax/public_html/storage/app/uploads/records_ss_card_677ecd82cd048_2.php' # Suspicious image file (hidden script file) '/home/lerumbatax/public_html/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (32) letgorental, Scanning /home/letgorental/public_html: '/home/letgorental/public_html/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (31) longtondmcco, Scanning /home/longtondmcco/public_html: '/home/longtondmcco/public_html/administrator/components/com_akeeba/backup' # World writeable directory '/home/longtondmcco/public_html/administrator/manifests/packages/pkg_akeeba.xml' # Script version check [OLD] [Akeeba Backup v8.3.3 < v9.7.1] '/home/longtondmcco/public_html/administrator/manifests/packages/pkg_jce.xml' # Script version check [OLD] [JCE v2.9.55 < v2.9.71] '/home/longtondmcco/public_html/administrator/manifests/packages/pkg_modals.xml' # Script version check [OLD] [Modals v12.6.1 < v14.0.12] '/home/longtondmcco/public_html/administrator/manifests/packages/pkg_sourcerer.xml' # Script version check [OLD] [Sourcerer v9.8.0 < v10.1.1] '/home/longtondmcco/public_html/libraries/fof30/Cli/wrong_php.php' # Universal decode regex match = [universal decoder] '/home/longtondmcco/public_html/libraries/fof40/Cli/wrong_php.php' # Universal decode regex match = [universal decoder] # Scan Timeout (30 secs) while processing: '/home/longtondmcco/public_html/tmp/Joomla_3.9.14-Stable-Update_Package.zip' '/home/longtondmcco/public_html/tmp/install_5e1f0462a9865/com_osmembership/pkg_osmembership.xml' # Script version check [OLD] [Membership Pro v2.18.2 < v3.6.1] '/home/longtondmcco/public_html/tmp/install_5e206e7304d5a/packages/plg_system_modals/modals.xml' # Script version check [OLD] [Modals v11.5.7 < v14.0.12] '/home/longtondmcco/public_html/tmp/install_5e2702805f939/com_osmembership/pkg_osmembership.xml' # Script version check [OLD] [Membership Pro v2.18.2 < v3.6.1] '/home/longtondmcco/public_html/tmp/install_61f2ac9117037/pkg_dpcalendar.xml' # Script version check [OLD] [DPCalendar Lite v8.2.3 < v8.15.0] (30) manxv2genesiswsc, Scanning /home/manxv2genesiswsc/public_html: '/home/manxv2genesiswsc/public_html/administrator/manifests/packages/pkg_akeeba.xml' # Script version check [OLD] [Akeeba Backup v8.3.3 < v9.7.1] '/home/manxv2genesiswsc/public_html/administrator/manifests/packages/pkg_jce.xml' # Script version check [OLD] [JCE v2.9.55 < v2.9.71] '/home/manxv2genesiswsc/public_html/administrator/manifests/packages/pkg_sourcerer.xml' # Script version check [OLD] [Sourcerer v9.4.0 < v10.1.1] '/home/manxv2genesiswsc/public_html/libraries/fof30/Cli/wrong_php.php' # Universal decode regex match = [universal decoder] '/home/manxv2genesiswsc/public_html/libraries/fof40/Cli/wrong_php.php' # Universal decode regex match = [universal decoder] (29) mikeswashing, Scanning /home/mikeswashing/public_html: '/home/mikeswashing/public_html/wp-content/plugins/akismet/akismet.php' # Script version check [OLD] [Akismet Anti-Spam v5.0.1 < v5.3.2] '/home/mikeswashing/public_html/wp-content/plugins/all-in-one-wp-migration/all-in-one-wp-migration.php' # Script version check [OLD] [All-in-One WP Migration v7.76 < v7.81] '/home/mikeswashing/public_html/wp-content/plugins/duplicate-page/duplicatepage.php' # Script version check [OLD] [Duplicate Page v4.5.2 < v4.5.3] '/home/mikeswashing/public_html/wp-content/plugins/elementor/elementor.php' # Script version check [OLD] [Elementor v3.14.0 < v3.21.5] '/home/mikeswashing/public_html/wp-content/themes/astra/admin/includes/class-astra-menu.php' # Universal decode regex match = [universal decoder] (28) mooneyedco, Scanning /home/mooneyedco/public_html: '/home/mooneyedco/public_html/node_modules/node-notifier/vendor/notifu/notifu.exe' # MS Windows Binary/Executable [application/x-winexec] '/home/mooneyedco/public_html/node_modules/node-notifier/vendor/notifu/notifu64.exe' # MS Windows Binary/Executable [application/x-winexec] '/home/mooneyedco/public_html/node_modules/node-notifier/vendor/snoreToast/snoretoast-x64.exe' # MS Windows Binary/Executable [application/x-winexec] '/home/mooneyedco/public_html/node_modules/node-notifier/vendor/snoreToast/snoretoast-x86.exe' # MS Windows Binary/Executable [application/x-winexec] '/home/mooneyedco/public_html/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (27) musictocalotodo, Scanning /home/musictocalotodo/public_html: (26) overlycraftinate, Scanning /home/overlycraftinate/public_html: '/home/overlycraftinate/public_html/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (25) pembinaroots, Scanning /home/pembinaroots/public_html: '/home/pembinaroots/public_html/node_modules/node-notifier/vendor/notifu/notifu.exe' # MS Windows Binary/Executable [application/x-winexec] '/home/pembinaroots/public_html/node_modules/node-notifier/vendor/notifu/notifu64.exe' # MS Windows Binary/Executable [application/x-winexec] '/home/pembinaroots/public_html/node_modules/node-notifier/vendor/snoreToast/snoretoast-x64.exe' # MS Windows Binary/Executable [application/x-winexec] '/home/pembinaroots/public_html/node_modules/node-notifier/vendor/snoreToast/snoretoast-x86.exe' # MS Windows Binary/Executable [application/x-winexec] '/home/pembinaroots/public_html/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (24) phase4research, Scanning /home/phase4research/public_html: '/home/phase4research/public_html/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (23) pixelmarketing, Scanning /home/pixelmarketing/public_html: '/home/pixelmarketing/public_html/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (22) plgautomation, Scanning /home/plgautomation/public_html: '/home/plgautomation/public_html/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (21) protofy, Scanning /home/protofy/allcarrierinfo.protofy.amgdigitalagency.com: '/home/protofy/allcarrierinfo.protofy.amgdigitalagency.com/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (21) protofy, Scanning /home/protofy/backend.bolt-corp.protofy.amgdigitalagency.com: '/home/protofy/backend.bolt-corp.protofy.amgdigitalagency.com/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (21) protofy, Scanning /home/protofy/baycolorlab.protofy.amgdigitalagency.com: '/home/protofy/baycolorlab.protofy.amgdigitalagency.com/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (21) protofy, Scanning /home/protofy/bigappleimprints.protofy.amgdigitalagency.com: '/home/protofy/bigappleimprints.protofy.amgdigitalagency.com/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (21) protofy, Scanning /home/protofy/bolt-corp.protofy.amgdigitalagency.com: (21) protofy, Scanning /home/protofy/buy4wheels.protofy.amgdigitalagency.com: '/home/protofy/buy4wheels.protofy.amgdigitalagency.com/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (21) protofy, Scanning /home/protofy/cabme.protofy.amgdigitalagency.com: '/home/protofy/cabme.protofy.amgdigitalagency.com/public/database.php' # Regular expression match = [Adminer - Compact database management] # (decoded file [depth: 0]) Regular expression match = [Adminer - Compact database management] '/home/protofy/cabme.protofy.amgdigitalagency.com/public/assets/plugins/jquery-steps-master/nuget/NuGet.exe' # MS Windows Binary/Executable [application/x-winexec] '/home/protofy/cabme.protofy.amgdigitalagency.com/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect571k1.php' # Universal decode regex match = [universal decoder] '/home/protofy/cabme.protofy.amgdigitalagency.com/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect571r1.php' # Universal decode regex match = [universal decoder] '/home/protofy/cabme.protofy.amgdigitalagency.com/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (21) protofy, Scanning /home/protofy/diy-home.protofy.amgdigitalagency.com: '/home/protofy/diy-home.protofy.amgdigitalagency.com/storage/framework/views/3ee108980a68827fd778a779a45db5637edb383f.php' # Universal decode regex match = [universal decoder] '/home/protofy/diy-home.protofy.amgdigitalagency.com/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (21) protofy, Scanning /home/protofy/expert-neuro-md.protofy.amgdigitalagency.com: '/home/protofy/expert-neuro-md.protofy.amgdigitalagency.com/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (21) protofy, Scanning /home/protofy/gabbiesfreezedried.protofy.amgdigitalagency.com: (21) protofy, Scanning /home/protofy/public_html: '/home/protofy/public_html/bigappleimprints/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] '/home/protofy/public_html/calender-laravel/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (20) providerdevopdig, Scanning /home/providerdevopdig/public_html: (19) rocrita, Scanning /home/rocrita/public_html: '/home/rocrita/public_html/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (18) rwrealtync, Scanning /home/rwrealtync/public_html: '/home/rwrealtync/public_html/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (17) saintsaccessorie, Scanning /home/saintsaccessorie/public_html: '/home/saintsaccessorie/public_html/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (16) sdsmed, Scanning /home/sdsmed/public_html: (16) sdsmed, Scanning /home/sdsmed/test.sdsmed.com: (15) shoreproservices, Scanning /home/shoreproservices/public_html: (14) skippackbranding, Scanning /home/skippackbranding/public_html: (13) smokyhillbasebal, Scanning /home/smokyhillbasebal/public_html: '/home/smokyhillbasebal/public_html/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (12) southcityrealtyt, Scanning /home/southcityrealtyt/public_html: (11) southshoremd, Scanning /home/southshoremd/public_html: (10) thehealway, Scanning /home/thehealway/public_html: (9) thehomeawave, Scanning /home/thehomeawave/public_html: '/home/thehomeawave/public_html/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (8) thevpssecurity, Scanning /home/thevpssecurity/public_html: # Scan Timeout (30 secs) while processing: '/home/thevpssecurity/public_html/www.vpsserver.com.zip' (7) tiresuppliesonli, Scanning /home/tiresuppliesonli/public_html: '/home/tiresuppliesonli/public_html/Old/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] '/home/tiresuppliesonli/public_html/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect571k1.php' # Universal decode regex match = [universal decoder] '/home/tiresuppliesonli/public_html/vendor/phpseclib/phpseclib/phpseclib/Crypt/EC/Curves/sect571r1.php' # Universal decode regex match = [universal decoder] '/home/tiresuppliesonli/public_html/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (6) uploadingbaycolo, Scanning /home/uploadingbaycolo/public_html: '/home/uploadingbaycolo/public_html/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (5) ustradetest, Scanning /home/ustradetest/public_html: '/home/ustradetest/public_html/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (4) vestrahealth, Scanning /home/vestrahealth/public_html: '/home/vestrahealth/public_html/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (3) visionary, Scanning /home/visionary/exterior.lightning.visionary.digtalsdesigns.com: (3) visionary, Scanning /home/visionary/public_html: (2) webdemo, Scanning /home/webdemo/absvaccines.webdemo.digtalsdesigns.com: '/home/webdemo/absvaccines.webdemo.digtalsdesigns.com/tests/Feature/Feature/HQGCwkWYblF.m4v' # Known exploit = [Fingerprint Match (fp)] [PHP Shell Exploit [P2189]] '/home/webdemo/absvaccines.webdemo.digtalsdesigns.com/vendor/laravel/framework/src/Illuminate/Validation/Rules/iwvsnm/mariju.php' # Regular expression match = [eval\s*\(\s*urldecode\s*\(] # Decode regex match = [decode regex: 1] '/home/webdemo/absvaccines.webdemo.digtalsdesigns.com/vendor/sebastian/global-state/tests/_fixture/et3ag8/webdb.php' # Known exploit = [Fingerprint Match (fp)] [PHP Shell Exploit [P2220]] (2) webdemo, Scanning /home/webdemo/admin.theautopaint.webdemo.digtalsdesigns.com: (2) webdemo, Scanning /home/webdemo/adu4u2.webdemo.digtalsdesigns.com: '/home/webdemo/adu4u2.webdemo.digtalsdesigns.com/adu4new/adu4new/QY.png' # Suspicious image file (hidden script file) # Known exploit = [Fingerprint Match (fp)] [PHP Exploit [P2202]] '/home/webdemo/adu4u2.webdemo.digtalsdesigns.com/vendor/league/commonmark/src/Extension/DisallowedRawHtml/pjiw81/mariju.php' # Regular expression match = [eval\s*\(\s*urldecode\s*\(] # Decode regex match = [decode regex: 1] '/home/webdemo/adu4u2.webdemo.digtalsdesigns.com/vendor/stripe/stripe-php/lib/Service/Apps/ac5b74/webdb.php' # Known exploit = [Fingerprint Match (fp)] [PHP Shell Exploit [P2220]] (2) webdemo, Scanning /home/webdemo/aifinance.webdemo.digtalsdesigns.com: '/home/webdemo/aifinance.webdemo.digtalsdesigns.com/24-2-2024/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] '/home/webdemo/aifinance.webdemo.digtalsdesigns.com/24-2-2024/vendor/symfony/http-kernel/Controller/ArgumentResolver/u4h5r6/mariju.php' # Regular expression match = [eval\s*\(\s*urldecode\s*\(] # Decode regex match = [decode regex: 1] '/home/webdemo/aifinance.webdemo.digtalsdesigns.com/bootstrap/cache/cache/cache/rREVfhWHSYql.jpeg' # Suspicious image file (hidden script file) # Known exploit = [Fingerprint Match (fp)] [PHP Exploit [P2202]] '/home/webdemo/aifinance.webdemo.digtalsdesigns.com/resources/views/backend/customer/modal/modal/gBMbsjYERzwhVan.flv' # Known exploit = [Fingerprint Match (fp)] [PHP Exploit [P2202]] '/home/webdemo/aifinance.webdemo.digtalsdesigns.com/storage/framework/cache/data/a0/78/jyuef7/webdb.php' # Known exploit = [Fingerprint Match (fp)] [PHP Shell Exploit [P2220]] '/home/webdemo/aifinance.webdemo.digtalsdesigns.com/storage/framework/cache/data/c7/c7/SARJZfNismyUEX.jpg' # Suspicious image file (hidden script file) '/home/webdemo/aifinance.webdemo.digtalsdesigns.com/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (2) webdemo, Scanning /home/webdemo/backendmirrorframing.webdemo.digtalsdesigns.com: '/home/webdemo/backendmirrorframing.webdemo.digtalsdesigns.com/vendor/laravel/framework/src/Illuminate/Auth/Passwords/nh1uq6/webdb.php' # Known exploit = [Fingerprint Match (fp)] [PHP Shell Exploit [P2220]] '/home/webdemo/backendmirrorframing.webdemo.digtalsdesigns.com/vendor/maximebf/debugbar/src/03cu5i/mariju.php' # Regular expression match = [eval\s*\(\s*urldecode\s*\(] # Decode regex match = [decode regex: 1] '/home/webdemo/backendmirrorframing.webdemo.digtalsdesigns.com/vendor/sebastian/code-unit-reverse-lookup/tests/cmgl0q/webdb.php' # Known exploit = [Fingerprint Match (fp)] [PHP Shell Exploit [P2220]] '/home/webdemo/backendmirrorframing.webdemo.digtalsdesigns.com/vendor/sebastian/diff/tests/Output/7jsf1l/mariju.php' # Regular expression match = [eval\s*\(\s*urldecode\s*\(] # Decode regex match = [decode regex: 1] '/home/webdemo/backendmirrorframing.webdemo.digtalsdesigns.com/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (2) webdemo, Scanning /home/webdemo/cosmoutd.webdemo.digtalsdesigns.com: '/home/webdemo/cosmoutd.webdemo.digtalsdesigns.com/cgi-bin/cgi-bin/cgi-bin/NSTQgrPKY.gif' # Suspicious image file (hidden script file) # Known exploit = [Fingerprint Match (fp)] [PHP Exploit [P2195]] '/home/webdemo/cosmoutd.webdemo.digtalsdesigns.com/images/images/images/KuGMEVFfzWlYneh.png' # Suspicious image file (hidden script file) '/home/webdemo/cosmoutd.webdemo.digtalsdesigns.com/public/Uploads/imagetable/d9d2ec63102bd027f4f4c2a35db959ec/pxg7e8/mariju.php' # Regular expression match = [eval\s*\(\s*urldecode\s*\(] # Decode regex match = [decode regex: 1] '/home/webdemo/cosmoutd.webdemo.digtalsdesigns.com/public/Uploads/pictures/463556145639/f592yc/webdb.php' # Known exploit = [Fingerprint Match (fp)] [PHP Shell Exploit [P2220]] '/home/webdemo/cosmoutd.webdemo.digtalsdesigns.com/vendor/hamcrest/hamcrest-php/hamcrest/Hamcrest/Number/tbn3kv/webdb.php' # Known exploit = [Fingerprint Match (fp)] [PHP Shell Exploit [P2220]] '/home/webdemo/cosmoutd.webdemo.digtalsdesigns.com/vendor/laravel/framework/src/Illuminate/Routing/Contracts/i743bd/mariju.php' # Regular expression match = [eval\s*\(\s*urldecode\s*\(] # Decode regex match = [decode regex: 1] (2) webdemo, Scanning /home/webdemo/frazinasnew.webdemo.digtalsdesigns.com: (2) webdemo, Scanning /home/webdemo/front.datland.webdemo.digtalsdesigns.com: (2) webdemo, Scanning /home/webdemo/interiordecorconsult.webdemo.digtalsdesigns.com: '/home/webdemo/interiordecorconsult.webdemo.digtalsdesigns.com/images/images/images/RVpFC.tiff' # Suspicious image file (hidden script file) '/home/webdemo/interiordecorconsult.webdemo.digtalsdesigns.com/vendor/phpunit/phpunit/src/Util/Annotation/6wm0o8/webdb.php' # Known exploit = [Fingerprint Match (fp)] [PHP Shell Exploit [P2220]] '/home/webdemo/interiordecorconsult.webdemo.digtalsdesigns.com/vendor/sebastian/version/uh8916/mariju.php' # Regular expression match = [eval\s*\(\s*urldecode\s*\(] # Decode regex match = [decode regex: 1] (2) webdemo, Scanning /home/webdemo/omg.webdemo.digtalsdesigns.com: '/home/webdemo/omg.webdemo.digtalsdesigns.com/public/backend/plugins/tinymce/plugins/hr/tmlh4j/webdb.php' # Known exploit = [Fingerprint Match (fp)] [PHP Shell Exploit [P2220]] '/home/webdemo/omg.webdemo.digtalsdesigns.com/vendor/facade/flare-client-php/src/ea2dg3/mariju.php' # Regular expression match = [eval\s*\(\s*urldecode\s*\(] # Decode regex match = [decode regex: 1] '/home/webdemo/omg.webdemo.digtalsdesigns.com/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (2) webdemo, Scanning /home/webdemo/public_html: (2) webdemo, Scanning /home/webdemo/sn-enterprise.webdemo.digtalsdesigns.com: '/home/webdemo/sn-enterprise.webdemo.digtalsdesigns.com/public/theme/snenterprise/css/.css.php' # Regular expression match = [r57shell] # Regular expression match = [r57shell] '/home/webdemo/sn-enterprise.webdemo.digtalsdesigns.com/public/theme/snenterprise/fonts/.fonts.php' # Regular expression match = [r57shell] # Regular expression match = [r57shell] '/home/webdemo/sn-enterprise.webdemo.digtalsdesigns.com/public/theme/snenterprise/images/.images.php' # Regular expression match = [r57shell] # Regular expression match = [r57shell] '/home/webdemo/sn-enterprise.webdemo.digtalsdesigns.com/public/theme/snenterprise/js/.js.php' # Regular expression match = [r57shell] # Regular expression match = [r57shell] '/home/webdemo/sn-enterprise.webdemo.digtalsdesigns.com/storage/framework/cache/data/42/4d/cayzn0/mariju.php' # Regular expression match = [eval\s*\(\s*urldecode\s*\(] # Decode regex match = [decode regex: 1] '/home/webdemo/sn-enterprise.webdemo.digtalsdesigns.com/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] '/home/webdemo/sn-enterprise.webdemo.digtalsdesigns.com/vendor/symfony/polyfill-intl-grapheme/h21tru/webdb.php' # Known exploit = [Fingerprint Match (fp)] [PHP Shell Exploit [P2220]] (2) webdemo, Scanning /home/webdemo/ustrade.webdemo.digtalsdesigns.com: '/home/webdemo/ustrade.webdemo.digtalsdesigns.com/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec] (1) worxdtf, Scanning /home/worxdtf/public_html: '/home/worxdtf/public_html/vendor/symfony/console/Resources/bin/hiddeninput.exe' # MS Windows Binary/Executable [application/x-winexec]