----------- SCAN REPORT ----------- TimeStamp: Mon, 12 Jun 2017 01:04:54 +1000 (/usr/sbin/cxs --nobayes --clamdsock /tmp/clamd --defapache nobody --doptions Mv --exploitscan --nofallback --filemax 10000 --noforce --html --options mMOLfSGchexdnwZDRru --qoptions Mv --report /home/bluestream/public_html/scan.txt --sizemax 500000 --ssl --summary --sversionscan --timemax 30 --nounofficial --user bluestream --virusscan --www) Scanning /home/bluestream/public_html: '/home/bluestream/public_html/Rgjukj.php' # Known exploit = [Fingerprint Match] [PHP Exploit [P1332]] '/home/bluestream/public_html/hostdata4.php' # Known exploit = [Fingerprint Match] [PHP Exploit] '/home/bluestream/public_html/readme.php' # Universal decode regex match = [universal decoder] # (decoded file [advanced decoder: 14 (depth: 2)]) Known exploit = [Fingerprint Match] [PHP Shell Exploit [P0001]] '/home/bluestream/public_html/version.php' # Known exploit = [Fingerprint Match] [PHP Exploit] '/home/bluestream/public_html/images/62' # Known exploit = [Fingerprint Match] [PHP Exploit [P1315]] '/home/bluestream/public_html/images/7393' # Known exploit = [Fingerprint Match] [PHP Exploit [P1315]] '/home/bluestream/public_html/wp-includes/version.php' # Script version check [OLD] [Wordpress v2.9.2 < v4.8] ----------- SCAN SUMMARY ----------- Scanned directories: 221 Scanned files: 3020 Ignored items: 4 Suspicious matches: 8 Viruses found: 0 Fingerprint matches: 6 Data scanned: 39.62 MB Scan time/item: 0.004 sec Scan time: 11.583 sec