File: /home/clientsoftwares/public_html/multistore.clientsoftwares.com/ynz.PhP7
<?php
session_start();
$index = $_SERVER['DOCUMENT_ROOT'].'/index.php';
chmod ($index , 0644);
echo '<!DOCTYPE html>';
echo '<html>';
echo '';
echo '<head>';
echo '<meta charset="utf-8" />';
echo '';
echo '<title>';
echo $_SERVER['HTTP_HOST'].'--'.'WSO YANZ ENC BYPASS';
echo '</title>';
echo '';
echo '<!-- add icon link -->';
echo '<link rel="icon" href=';
echo '"https://raw.githubusercontent.com/xyndicategaming/wpfile/main/logo24cr2.png"';
echo 'type="image/x-icon">';
echo '';
echo '</head>';
echo '';
echo '<body>';
echo '</body>';
echo '';
echo '</html>';
?>
<?php
/**
* Note: This file may contain artifacts of previous malicious infection.
* However, the dangerous code has been removed, and the file is now safe to use.
*/
curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
?>