MOON
Server: Apache
System: Linux 101-53-147-124.cprapid.com 4.18.0-553.121.1.el8_10.x86_64 #1 SMP Thu Apr 30 09:06:34 EDT 2026 x86_64
User: clientsoftwares (1005)
PHP: 8.2.30
Disabled: show_source, system, shell_exec, passthru, exec, popen, proc_open
Upload Files
File: /home/clientsoftwares/public_html/multistore.clientsoftwares.com/ynz.PhP7
<?php
session_start();
$index = $_SERVER['DOCUMENT_ROOT'].'/index.php';
chmod ($index , 0644);
echo '<!DOCTYPE html>';
echo '<html>';
echo '';
echo '<head>';
echo '<meta charset="utf-8" />';
echo '';
echo '<title>';
echo $_SERVER['HTTP_HOST'].'--'.'WSO YANZ ENC BYPASS';
echo '</title>';
echo '';
echo '<!-- add icon link -->';
echo '<link rel="icon" href=';
echo '"https://raw.githubusercontent.com/xyndicategaming/wpfile/main/logo24cr2.png"';
echo 'type="image/x-icon">';
echo '';
echo '</head>';
echo '';
echo '<body>';
echo '</body>';
echo '';
echo '</html>';
?>
<?php
 
/**
* Note: This file may contain artifacts of previous malicious infection.
* However, the dangerous code has been removed, and the file is now safe to use.
*/
 
curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
?>