Web Shell Detector v1.66
(PHP Version: 5.6.40)

Please wait
Starting file scanner, please be patient file scanning can take some time.
Number of known shells in database is: 603
Files found:000000000001123354545454545454545454545757571431431431431431541581581581581581581581581612072152152252252252252252262262272282282822822822822822822822822822842962962962962982982982982982982982982982982982982982982982982982982982982982982982982982982982982982982982982982982982982982982982982982982982982982982982982982982982982982982982982982982982982982982982982982982982982982982982982982982982982992992992992992992992992992992992992992992992992992992992992992992992992992992992992992992992992992992992992992992992992992997907937937937937937937937937937937947947957967968488488488488488488488488518519609609609609799799899939939939939939939939939961042105010501059105910591059105910601060106110621062112211221122112211221122112211221122112411371137113711371137113711501150115011501152115211521152115211521152115211521152115211521152115211521152115211521152115211521152115211521152115211521152115211521152115211521152115211521152115211521152115211521152115211521152115211521152115211521152115211521152115211521152115211521152115211521152115211521152115211521152115211521152115211521152115311531153115311531153115311531153115311531153115311531153115311531153115311531153115311531153115411541154115411541154115411541154115411541154115411541154115411541154185918621862186218621862186218621862186318631864186518651917191719171917191719171917191719201920202920332033203320332033203320332033203620822090209021002100210021002100210121012102210321032163216321632163216321632163216321632165217821782178217821782178219121912191219121932193219321932193219321932193219321932193219321932193219321932193219321932193219321932193219321932193219321932193219321932193219321932193219321932193219321932193219321932193219321932193219321932193219321932193219321932193219321932193219321932193219321932193219321932193219321932193219321932193219321932194219421942194219421942194219421942194219421942194219421942194219421942194219421942194219421942195219521952195219521952195219521952195219521952195219521952195219521952859285929282931293129312931293129312931293129312931293129312931293129312931293129312932293229332934293429862986298629862986298629862986298929893074307430973097311631163126313031303130313031303130313031303133317931873187319731973197319731973198319831993200320032643264326432643264326432643264326432663279327932793279327932793292329232923292329432943294329432943294329432943294329432943294329432943294329432943294329432943294329432943294329432943294329432943294329432943294329432943294329432943294329432943294329432943294329432943294329432943294329432943294329432943294329432943294329432943294329432943294329432943294329432943294329432943294329432953295329532953295329532953295329532953295329532953295329532953295329532953295329532953295329532963296329632963296329632963296329632963296329632963296329632963296329640464049481048104820482048244824483248324832483248354881488148814881488148914951495149514951495149514951495149514953496649794979497949794979497949794979497949794979497949794979497949794979497949794979497949794979497949794979497949794979497949794979497949794979497949794979497949794979497949794979497949794979497949794979497949794979497949794979497949794979497949794979497949794979497949794979497949794979497949794979497949794979497949794980498049804980498049804980498049804980498049804980498049804980498049804980498049804980498049804980498049804981498149814981498149814981498149814981498149814981498149814981498149834983498349834984498449844984498449844985498649864986498649875100515251525152515251525152515251525155515551565156515651565156515651575158515851585158515851585158515851585158515851585158515851585158515851585158515951595160516151615213521352135213521352135213521352135213521352165216521652165218521852185218521852185218521852185218521852185218521852185218521852185218521852185218521852185218521852185218521852185218521852185218521852185218521852185218521852185218521852185218521852185218521852185218521852185218521852185218521852185218521852185218521852185218521852185218521852185218521852185218521852195219521952195219521952195219521952195219521952195219521952195219521952195219521952195219521952195219521952195219521952195219521952195219521952195219521952195219521953165316531653165320532053205320532053205320532053235369537753775386538653865386538653875387538853895389544854485448544854485448544854485448545054625462546254625462546254755475547554755477547754775477547754775477547754775477547754775477547754775477547754775477547754775477547754775477547754775477547754775477547754775477547754775477547754775477547754775477547754775477547754775477547754775477547754775477547754775477547754775477547754775477547754775477547754775477547754775477547754775477547854785478547854785478547854785478547854785478547854785478547854785478547854785478547854785478547954795479547954795479547954795479547954795479547954795479547954795479606360666066606660666066606660666066606660666066606660676067606860696069612161216121612161216121612161216124612462316231623162316235623562356235623562356235623562386284629262926301630163016301630163026302630363046304636463646364636463646364636463646364636663786378637863786378637863916391639163916393639363936393639363936393639363936393639363936393639363936393639363936393639363936393639363936393639363936393639363936393639363936393639363936393639363936393639363936393639363936393639363936393639363936393639363936393639363936393639363936393639363936393639363936393639363936393639363936393639363936393639463946394639463946394639463946394639463946394639463946394639463946394639463946394639463946394639563956395639563956395639563956395639563956395639563956395639563956395702270257025702570257784778477927792779277927795784178417841784178417851791379137913791379137913791379137913791579287941794179417941794179417941794179417941794179417941794179417941794179417941794179417941794179417941794179417941794179417941794179417941794179417941794179417941794179417941794179417941794179417941794179417941794179417941794179417941794179417941794179417941794179417941794179417941794179417941794179417941794179417941794279427942794279427942794279427942794279427942794279427942794279427942794279427942794279427942794279427942794379437943794379437943794379437943794379437943794379437943794379437945794579457945794679467946794679467946794779487948795080628114811481148114811481148114811481178117811881188118811881188118811981208120812081208120812081208120812088768876888488848884888488878933893389338933893389429004900490049004900490049004900490049006901990329032903290329032903290329032903290329032903290329032903290329032903290329032903290329032903290329032903290329032903290329032903290329032903290329032903290329032903290329032903290329032903290329032903290329032903290329032903290329032903290329032903290329032903290329032903290329032903290329032903290329032903290329033903390339033903390339033903390339033903390339033903390339033903390339033903390339033903390339033903390339034903490349034903490349034903490349034903490349034903490349034903490369036903690369037903790379037903790379038903990399040904090409152920492049204920492049204920492049207920792089208920892089208920892099210921092109210921092139213921392139213921392139213921392139213921392139213921392149214921592169216926892689268926892689268926892689268926892689271927192719271927392739273927392739273927392739273927392739273927392739273927392739273927392739273927392739273927392739273927392739273927392739273927392739273927392739273927392739273927392739273927392739273927392739273927392739273927392739273927392739273927392739273927392739273927392739273927392739273927392739273927392739274927492749274927492749274927492749274927492749274927492749274927492749274927492749274927492749274927492749274927492749274927492749274927492749274927492749274927492749373937393739373937793779377937793779377937793779380942694349434944394439443944394439444944494459446944695059505950595059505950595059505950595079519951995199519951995199532953295329532953495349534953495349534953495349534953495349534953495349534953495349534953495349534953495349534953495349534953495349534953495349534953495349534953495349534953495349534953495349534953495349534953495349534953495349534953495349534953495349534953495349534953495349534953495349534953495349534953495349534953495359535953595359535953595359535953595359535953595359535953595359535953595359535953595359535953595359535953595359535953595359535953595359535953595359535953595359535953510112101151011510115101151011510115101151011510115101151011510115101161011610117101181011810170101701017010170101701017010170101701017010170101701017310173101731017310175101751017510175101751017510175101751017510175101751017510175101751017510175101751017510175101751017510175101751017510175101751017510175101751017510175101751017510175101751017510175101751017510175101751017510175101751017510175101751017510175101751017510175101751017510175101751017510175101751017510175101751017510175101751017510175101751017510175101751017510175101751017510175101751017610176101761017610176101761017610176101761017610176101761017610176101761017610176101761017610176101761017610176101761017610176101761017610176101761017610176101761017610176101761017610176101761017610176101761027210272102721027210272102761027610276102761027610276102761027610279103251033310333103421034210342103421034210343103431034410345103451040210402104021040210402104021040210402104021040410416104161041610416104161041610429104291042910429104311043110431104311043110431104311043110431104311043110431104311043110431104311043110431104311043110431104311043110431104311043110431104311043110431104311043110431104311043110431104311043110431104311043110431104311043110431104311043110431104311043110431104311043110431104311043110431104311043110431104311043110431104311043110431104311043110431104311043110431104311043110431104311043210432104321043210432104321043210432104321043210432104321043210432104321043210432104321043210432104321043210432104321043210432104321043210432104321043210432104321043210432104321043210432104321043210432104321100211005110051100511005110051100511005110051100511005110051100511005110051100511005110051100511005110051100511005110051100511005110051100511005110051100511005110051100511005110051100511005110051100511005110051100511005110051100511005110051100511005110051100511005110051100511005110051100511005110051100511005110051100511005110051100511005110161101611016110161101611016110161101611016110161101611016110161101711017110181101911019110711107111071110711107111071110711107111074110741118311187111871118711187111871118711187111871119011236112441124411254112541125411254112541125511255112561125711257113171131711317113171131711317113171131711317113191133211332113321133211332113321134511345113451134511347113471134711347113471134711347113471134711347113471134711347113471134711347113471134711347113471134711347113471134711347113471134711347113471134711347113471134711347113471134711347113471134711347113471134711347113471134711347113471134711347113471134711347113471134711347113471134711347113471134711347113471134711347113471134711347113471134711347113471134711347113471134711347113481134811348113481134811348113481134811348113481134811348113481134811348113481134811348113481134811348113481134811348113491134911349113491134911349113491134911349113491134911349113491134911349113491134911349120381203812083120861208612086120861282912829128371283712837128371284012886128861288612886128861289612956129561295612956129561295612956129561295612958129711298412984129841298412984129841298412984129841298412984129841298412984129841298412984129841298412984129841298412984129841298412984129841298412984129841298412984129841298412984129841298412984129841298412984129841298412984129841298412984129841298412984129841298412984129841298412984129841298412984129841298412984129841298412984129841298412984129841298412984129841298412984129841298412984129841298412985129851298512985129851298512985129851298512985129851298512985129851298512985129851298512985129851298512985129851298512985129851298512986129861298612986129861298612986129861298612986129861298612986129861298612986129861298812988129881298812989129891298912989129891298912990129911299112991129911299213101131531315313153131531315313153131531315313156131561315713157131571315713157131571315813159131591315913159131591315913159131591315913159131591315913159131591315913159131591316013160131611316213162132141321413214132141321413214132141321413214132141321413217132171321713217132191321913219132191321913219132191321913219132191321913219132191321913219132191321913219132191321913219132191321913219132191321913219132191321913219132191321913219132191321913219132191321913219132191321913219132191321913219132191321913219132191321913219132191321913219132191321913219132191321913219132191321913219132191321913219132191321913219132191321913219132191321913219132191322013220132201322013220132201322013220132201322013220132201322013220132201322013220132201322013220132201322013220132201322013220132201322013220132201322013220132201322013220132201322013220132201322013220132201331413314133141331413314133311333113341133451334513345133451334513345133451334513348133941340213402134111341113411134111341113412134121341313414134141347113471134711347113471134711347113471134711347313485134851348513485134851348513498134981349813498135001350013500135001350013500135001350013500135001350013500135001350013500135001350013500135001350013500135001350013500135001350013500135001350013500135001350013500135001350013500135001350013500135001350013500135001350013500135001350013500135001350013500135001350013500135001350013500135001350013500135001350013500135001350013500135001350013500135001350013500135001350013500135001350113501135011350113501135011350113501135011350113501135011350113501135011350113501135011350113501135011350113501135011350113501135011350113501135011350113501135011350113501135011350113501135011350113501135011406114064140671406714845148451485514855148591485914867148671486714867148701491614916149161491614916149261498914989149891498914989149891498914989149891499115004150171501715017150171501715017150171501715017150171501715017150171501715017150171501715017150171501715017150171501715017150171501715017150171501715017150171501715017150171501715017150171501715017150171501715017150171501715017150171501715017150171501715017150171501715017150171501715017150171501715017150171501715017150171501715017150171501715017150171501715017150171501715017150171501715017150171501815018150181501815018150181501815018150181501815018150181501815018150181501815018150181501815018150181501815018150181501815018150181501915019150191501915019150191501915019150191501915019150191501915019150191501915019150211502115021150211502215022150221502215022150221502315024150241502415132151841518415184151841518415184151841518415187151871518815188151881518815188151881518915190151901519015190151901519015190151901519015190151901519015190151901519015191151911519215193151931524515245152451524515245152451524515245152481524815355153551535515355153591535915359153591535915359153591535915362154081541615416154251542515425154251542515426154261542715428154281548815488154881548815488154881548815488154881549015503155031550315503155031550315516155161551615516155181551815518155181551815518155181551815518155181551815518155181551815518155181551815518155181551815518155181551815518155181551815518155181551815518155181551815518155181551815518155181551815518155181551815518155181551815518155181551815518155181551815518155181551815518155181551815518155181551815518155181551815518155181551815518155181551815518155181551815518155181551815518155181551915519155191551915519155191551915519155191551915519155191551915519155191551915519155191551915519155191551915519155191552015520155201552015520155201552015520155201552015520155201552015520155201552015520155201620316206162061620616206162061620616206162061620616206162061620616207162071620816209162091626116261162611626116261162611626116261162641626416372163721637216372163761637616376163761637616376163761637616379164251643316433164421644216442164421644216443164431644416445164451650516505165051650516505165051650516505165051650716519165191651916519165191651916532165321653216532165341653416534165341653416534165341653416534165341653416534165341653416534165341653416534165341653416534165341653416534165341653416534165341653416534165341653416534165341653416534165341653416534165341653416534165341653416534165341653416534165341653416534165341653416534165341653416534165341653416534165341653416534165341653416534165341653416534165341653416534165341653416534165341653516535165351653516535165351653516535165351653516535165351653516535165351653516535165351653516535165351653516535165351653616536165361653616536165361653616536165361653616536165361653616536165361653616536165361722717230172301723017230172301723017230172301723017230172301723017231172311723217233172331728517285172851728517285172851728517285172881728817395173951739517395173991739917399173991739917399173991739917402174481745617456174651746517465174651746517466174661746717468174681752817528175281752817528175281752817528175281753017543175431754317543175431754317556175561755617556175581755817558175581755817558175581755817558175581755817558175581755817558175581755817558175581755817558175581755817558175581755817558175581755817558175581755817558175581755817558175581755817558175581755817558175581755817558175581755817558175581755817558175581755817558175581755817558175581755817558175581755817558175581755817558175581755817558175581755817558175581755817558175581755917559175591755917559175591755917559175591755917559175591755917559175591755917559175591755917559175591755917559175591756017560175601756017560175601756017560175601756017560175601756017560175601756017560175601822018223182231822318223182231822318223182231822318223182231822318224182241822518226182261827818278182781827818278182781827818278182811828118389183891838918389183891840818408184181842218422184221842218422184221842218422184251847118479184791848818488184881848818488184891848918490184911849118551185511855118551185511855118551185511855118553185661856618566185661856618566185791857918579185791858118581185811858118581185811858118581185811858118581185811858118581185811858118581185811858118581185811858118581185811858118581185811858118581185811858118581185811858118581185811858118581185811858118581185811858118581185811858118581185811858118581185811858118581185811858118581185811858118581185811858118581185811858118581185811858118581185811858118581185811858118581185811858118582185821858218582185821858218582185821858218582185821858218582185821858218582185821858218582185821858218582185821858218583185831858318583185831858318583185831858318583185831858318583185831858318583185831858319266192691926919269192691926919269192691926919269192691926919269192701927019271192721927219324193241932419324193241932419324193241932719327194351943919439194391943919439194391943919439194421948819496194961950519505195051950519505195061950619507195081950819568195681956819568195681956819568195681956819570195821958219582195821958219582195951959519595195951959719597195971959719597195971959719597195971959719597195971959719597195971959719597195971959719597195971959719597195971959719597195971959719597195971959719597195971959719597195971959719597195971959719597195971959719597195971959719597195971959719597195971959719597195971959719597195971959719597195971959719597195971959719597195971959719597195971959719597195971959719597195971959719598195981959819598195981959819598195981959819598195981959819598195981959819598195981959819598195981959819598195981959819599195991959919599195991959919599195991959919599195991959919599195991959919599195991959920288202912029120291202912029120291202912029120291202912029120291202922029220293202942029420346203462034620346203462034620346203462034920349204562045620456204562045620475204752048520489204892048920489204892048920489204892049220538205462054620555205552055520555205552055620556205572055820558206182061820618206182061820618206182061820618206202063320633206332063320633206332064620646206462064620648206482064820648206482064820648206482064820648206482064820648206482064820648206482064820648206482064820648206482064820648206482064820648206482064820648206482064820648206482064820648206482064820648206482064820648206482064820648206482064820648206482064820648206482064820648206482064820648206482064820648206482064820648206482064820648206482064820648206482064820648206482064820648206492064920649206492064920649206492064920649206492064920649206492064920649206492064920649206492064920649206492064920649206502065020650206502065020650206502065020650206502065020650206502065020650206502065020650213332133621336213362133621336213362133621336213362133621336213362133721337213382133921339213912139121391213912139121391213912139121394213942150221502215022150221502215212152121531215352153521535215352153521535215352153521538215842159221592216012160121601216012160121602216022160321604216042166421664216642166421664216642166421664216642166621679216792167921679216792167921692216922169221692216942169421694216942169421694216942169421694216942169421694216942169421694216942169421694216942169421694216942169421694216942169421694216942169421694216942169421694216942169421694216942169421694216942169421694216942169421694216942169421694216942169421694216942169421694216942169421694216942169421694216942169421694216942169421694216942169421694216942169421694216942169421694216942169521695216952169521695216952169521695216952169521695216952169521695216952169521695216952169521695216952169521695216952169621696216962169621696216962169621696216962169621696216962169621696216962169621696216962237922382223822238222382223822238222382223822238222382223822238222383223832238422385223852243722437224372243722437224372243722437224402244022548225482254822548225522255222552225522255222552225522255222555226012260922609226182261822618226182261822619226192262022621226212268122681226812268122681226812268122681226812268322696226962269622696226962269622709227092270922709227112271122711227112271122711227112271122711227112271122711227112271122711227112271122711227112271122711227112271122711227112271122711227112271122711227112271122711227112271122711227112271122711227112271122711227112271122711227112271122711227112271122711227112271122711227112271122711227112271122711227112271122711227112271122711227112271122711227112271122711227112271122711227112271222712227122271222712227122271222712227122271222712227122271222712227122271222712227122271222712227122271222712227122271322713227132271322713227132271322713227132271322713227132271322713227132271322713227132340323406234062340623406234062340623406234062340623406234062340623407234072340823409234092346123461234612346123461234612346123461234642346423572235762357623576235762357623576235762357623579236252363323633236422364223642236422364223643236432364423645236452370523705237052370523705237052370523705237052370723719237192371923719237192371923732237322373223732237342373423734237342373423734237342373423734237342373423734237342373423734237342373423734237342373423734237342373423734237342373423734237342373423734237342373423734237342373423734237342373423734237342373423734237342373423734237342373423734237342373423734237342373423734237342373423734237342373423734237342373423734237342373423734237342373423734237342373423734237342373423734237342373523735237352373523735237352373523735237352373523735237352373523735237352373523735237352373523735237352373523735237352373623736237362373623736237362373623736237362373623736237362373623736237362373623736237362442524425244252442824428244282442824428244282442824428244282442824428244282442924429244302443124431244822448224482244822448224482244822448224482244822448224485244852448524485244872448724487244872448724487244872448724487244872448724487244872448724487244872448724487244872448724487244872448724487244872448724487244872448724487244872448724487244872448724487244872448724487244872448724487244872448724487244872448724487244872448724487244872448724487244872448724487244872448724487244872448724487244872448724487244872448724487244872448724487244872448724487244872448824488244882448824488244882448824488244882448824488244882448824488244882448824488244882448824488244882448824488244882448824488244882448824488244882448824488244882448824488244882448824488244882448824488244882457624576245862459024590245902459024590245902459024590245932463924647246472465624656246562465624656246572465724658246592465924715247152471524715247152471524715247152471524717247292472924729247292472924729247422474224742247422474424744247442474424744247442474424744247442474424744247442474424744247442474424744247442474424744247442474424744247442474424744247442474424744247442474424744247442474424744247442474424744247442474424744247442474424744247442474424744247442474424744247442474424744247442474424744247442474424744247442474424744247442474424744247442474424744247442474424744247442474424744247442474424745247452474524745247452474524745247452474524745247452474524745247452474524745247452474524745247452474524745247452474524745247452474524745247452474524745247452474524745247452474524745247452474524745247452474525293252932529325296252962529625296252962529625296252962529625296252962529625297252972529825299252992535025350253502535025350253502535025350253502535025350253532535325353253532535525355253552535525355253552535525355253552535525355253552535525355253552535525355253552535525355253552535525355253552535525355253552535525355253552535525355253552535525355253552535525355253552535525355253552535525355253552535525355253552535525355253552535525355253552535525355253552535525355253552535525355253552535525355253552535525355253552535525355253552535525355253552535525356253562535625356253562535625356253562535625356253562535625356253562535625356253562535625356253562535625356253562535625356253562535625356253562535625356253562535625356253562535625356253562535625356253562535625445254452544525445254452545525459254592545925459254592545925459254592546225508255162551625525255252552525525255252552625526255272552825528255842558425584255842558425584255842558425584255862559825598255982559825598255982561125611256112561125613256132561325613256132561325613256132561325613256132561325613256132561325613256132561325613256132561325613256132561325613256132561325613256132561325613256132561325613256132561325613256132561325613256132561325613256132561325613256132561325613256132561325613256132561325613256132561325613256132561325613256132561325613256132561325613256132561325613256132561325613256132561325613256142561425614256142561425614256142561425614256142561425614256142561425614256142561425614256142561425614256142561425614256142561425614256142561425614256142561425614256142561425614256142561425614256142561425614261602616326163261632616326163261632616326163261632616426164261652616626166262182621826218262182621826218262182621826221262212633026330263302633026334263342633426334263342633426334263342633726383263912639126401264012640126401264012640226402264032640426404264642646426464264642646426464264642646426464264662647926479264792647926479264792649226492264922649226494264942649426494264942649426494264942649426494264942649426494264942649426494264942649426494264942649426494264942649426494264942649426494264942649426494264942649426494264942649426494264942649426494264942649426494264942649426494264942649426494264942649426494264942649426494264942649426494264942649426494264942649426494264942649426494264942649426494264942649426494264942649426494264952649526495264952649526495264952649526495264952649526495264952649526495264952649526495264952649526495264952649526495264962649626496264962649626496264962649626496264962649626496264962649626496264962649626496272252722827228272282722827228272282722827228272282722827228272282722827228272292722927230272312723127282272822728227282272822728227282272822728227282272822728527285272852728527287272872728727287272872728727287272872728727287272872728727287272872728727287272872728727287272872728727287272872728727287272872728727287272872728727287272872728727287272872728727287272872728727287272872728727287272872728727287272872728727287272872728727287272872728727287272872728727287272872728727287272872728727287272872728727287272872728727287272872728727287272872728727287272882728827288272882728827288272882728827288272882728827288272882728827288272882728827288272882728827288272882728827288272882728827288272882728827288272882728827288272882728827288272882728827288272882728827288273782737827378273782737827388273922739227392273922739227392273922739227395274412744927449274582745827458274582745827459274592746027461274612751727517275172751727517275172751727517275172751927531275312753127531275312753127544275442754427544275462754627546275462754627546275462754627546275462754627546275462754627546275462754627546275462754627546275462754627546275462754627546275462754627546275462754627546275462754627546275462754627546275462754627546275462754627546275462754627546275462754627546275462754627546275462754627546275462754627546275462754627546275462754627546275462754627546275462754627546275462754627546275462754727547275472754727547275472754727547275472754727547275472754727547275472754727547275472754727547275472754727547275472754727547275472754727547275472754727547275472754727547275472754727547275472754727547275472809128094280942809428094280942809428094280942809428094280952809528096280972809728149281492814928149281492814928149281492815228152282602826028260282602827928279282892829328293282932829328293282932829328293282962834228350283502835928359283592835928359283602836028361283622836228422284222842228422284222842228422284222842228424284372843728437284372843728437284502845028450284502845228452284522845228452284522845228452284522845228452284522845228452284522845228452284522845228452284522845228452284522845228452284522845228452284522845228452284522845228452284522845228452284522845228452284522845228452284522845228452284522845228452284522845228452284522845228452284522845228452284522845228452284522845228452284522845228452284522845228452284522845228452284522845228453284532845328453284532845328453284532845328453284532845328453284532845328453284532845328453284532845328453284532845328454284542845428454284542845428454284542845428454284542845428454284542845428454284542845429135291382913829138291382913829138291382913829138291392913929140291412914129193291932919329193291932919329193291932919629196293042930429304293042930829308293082930829308293082930829308293112935729365293652937429374293742937429374293752937529376293772937729437294372943729437294372943729437294372943729439294512945129451294512945129451294642946429464294642946629466294662946629466294662946629466294662946629466294662946629466294662946629466294662946629466294662946629466294662946629466294662946629466294662946629466294662946629466294662946629466294662946629466294662946629466294662946629466294662946629466294662946629466294662946629466294662946629466294662946629466294662946629466294662946629466294662946629466294662946629466294662946629467294672946729467294672946729467294672946729467294672946729467294672946729467294672946729467294672946729467294672946729468294682946829468294682946829468294682946829468294682946829468294682946829468294682946830159301623016230162301623016230162301623016230162301623016230162301623016230163301633016430165301653021730217302173021730217302173021730217302203022030317303173031730317303213032130321303213032130321303213032130324303703037830378303873038730387303873038730388303883038930390303903044930449304493044930449304493044930449304493045130463304633046330463304633046330476304763047630476304783047830478304783047830478304783047830478304783047830478304783047830478304783047830478304783047830478304783047830478304783047830478304783047830478304783047830478304783047830478304783047830478304783047830478304783047830478304783047830478304783047830478304783047830478304783047830478304783047830478304783047830478304783047830478304783047830478304783047830478304783047830478304783047930479304793047930479304793047930479304793047930479304793047930479304793047930479304793047930479304793047930479304793048030480304803048030480304803048030480304803048030480304803048030480304803048030480304803106431067310673106731067310673106731067310673106731067310673106731068310683106931070310703112231122311223112231122311223112231122311253112531226312263122631226312263123631240312403124031240312403124031240312403124331289312973129731306313063130631306313063130731307313083130931309313683136831368313683136831368313683136831368313703138231382313823138231382313823139531395313953139531397313973139731397313973139731397313973139731397313973139731397313973139731397313973139731397313973139731397313973139731397313973139731397313973139731397313973139731397313973139731397313973139731397313973139731397313973139731397313973139731397313973139731397313973139731397313973139731397313973139731397313973139731397313973139731397313973139731397313973139731397313973139731397313983139831398313983139831398313983139831398313983139831398313983139831398313983139831398313983139831398313983139831398313993139931399313993139931399313993139931399313993139931399313993139931399313993139931399320143201732017320173201732017320173201732017320173201732017320173201832018320193202032020320723207232072320723207232072320723207232075320753218332183321833218332187321873218732187321873218732187321873219032236322443224432253322533225332253322533225432254322553225632256323163231632316323163231632316323163231632316323183233032330323303233032330323303234332343323433234332345323453234532345323453234532345323453234532345323453234532345323453234532345323453234532345323453234532345323453234532345323453234532345323453234532345323453234532345323453234532345323453234532345323453234532345323453234532345323453234532345323453234532345323453234532345323453234532345323453234532345323453234532345323453234532345323453234532345323453234532345323453234532345323463234632346323463234632346323463234632346323463234632346323463234632346323463234632346323463234632346323463234632346323473234732347323473234732347323473234732347323473234732347323473234732347323473234732347330383304133041330413304133041330413304133041330413304133041330413304233042330433304433044330963309633096330963309633096330963309633099330993320633206332063320633210332103321033210332103321033210332103321333259332673326733276332763327633276332763327733277332783327933279333393333933339333393333933339333393333933339333413335433354333543335433354333543336733367333673336733369333693336933369333693336933369333693336933369333693336933369333693336933369333693336933369333693336933369333693336933369333693336933369333693336933369333693336933369333693336933369333693336933369333693336933369333693336933369333693336933369333693336933369333693336933369333693336933369333693336933369333693336933369333693336933369333693336933369333693336933369333693336933369333703337033370333703337033370333703337033370333703337033370333703337033370333703337033370333703337033370333703337033370333713337133371333713337133371333713337133371333713337133371333713337133371333713337133371340313403434034340343403434034340343403434034340343403434034340343403534035340363403734037340893408934089340893408934089340893408934092340923419634196341963419634196342153421534225342293422934229342293422934229342293422934232342783428634286342953429534295342953429534296342963429734298342983435834358343583435834358343583435834358343583436034372343723437234372343723437234385343853438534385343873438734387343873438734387343873438734387343873438734387343873438734387343873438734387343873438734387343873438734387343873438734387343873438734387343873438734387343873438734387343873438734387343873438734387343873438734387343873438734387343873438734387343873438734387343873438734387343873438734387343873438734387343873438734387343873438734387343873438734387343873438734387343873438834388343883438834388343883438834388343883438834388343883438834388343883438834388343883438834388343883438834388343883438934389343893438934389343893438934389343893438934389343893438934389343893438934389343893501535018350183501835018350183501835018350183501835018350183501835019350193502035021350213507235072350723507235072350723507235072350723507235072350753507535075350753507735077350773507735077350773507735077350773507735077350773507735077350773507735077350773507735077350773507735077350773507735077350773507735077350773507735077350773507735077350773507735077350773507735077350773507735077350773507735077350773507735077350773507735077350773507735077350773507735077350773507735077350773507735077350773507735077350773507735077350773507735077350773507735078350783507835078350783507835078350783507835078350783507835078350783507835078350783507835078350783507835078350783507835078350783507835078350783507835078350783507835078350783507835078350783507835078350783507835166351663516635166351663517635180351803518035180351803518035180351803518335229352373523735246352463524635246352463524735247352483524935249353053530535305353053530535305353053530535305353073531935319353193531935319353193533235332353323533235334353343533435334353343533435334353343533435334353343533435334353343533435334353343533435334353343533435334353343533435334353343533435334353343533435334353343533435334353343533435334353343533435334353343533435334353343533435334353343533435334353343533435334353343533435334353343533435334353343533435334353343533435334353343533435334353343533435334353343533435334353343533435334353353533535335353353533535335353353533535335353353533535335353353533535335353353533535335353353533535335353353533535335353353533535335353353533535335353353533535335353353533535335353353533535335353353533535335358823588535885358853588535885358853588535885358853588535886358863588735888358883594035940359403594035940359403594035940359433594336050360543605436054360543605436054360543605436057361033611136111361203612036120361203612036121361213612236123361233618336183361833618336183361833618336183361833618536198361983619836198361983619836211362113621136211362133621336213362133621336213362133621336213362133621336213362133621336213362133621336213362133621336213362133621336213362133621336213362133621336213362133621336213362133621336213362133621336213362133621336213362133621336213362133621336213362133621336213362133621336213362133621336213362133621336213362133621336213362133621336213362133621336213362133621336213362133621336213362133621436214362143621436214362143621436214362143621436214362143621436214362143621436214362143621436214362143621436214362143621536215362153621536215362153621536215362153621536215362153621536215362153621536215362153684536845368973690036900369003690036900369003690036900369003690036900369003690136901369023690336903369553695536955369553695536955369553695536955369553695536958369583695836958369603696036960369603696036960369603696036960369603696036960369603696036960369603696036960369603696036960369603696036960369603696036960369603696036960369603696036960369603696036960369603696036960369603696036960369603696036960369603696036960369603696036960369603696036960369603696036960369603696036960369603696036960369603696036960369603696036960369603696036960369603696036960369603696036961369613696136961369613696136961369613696136961369613696136961369613696136961369613696136961369613696136961369613696136961369613696136961369613696136961369613696136961369613696136961369613696136961369613696137061370613706137061370653706537065370653706537065370653706537068371143712237122371313713137131371313713137132371323713337134371343719137191371913719137191371913719137191371913719337205372053720537205372053720537218372183721837218372203722037220372203722037220372203722037220372203722037220372203722037220372203722037220372203722037220372203722037220372203722037220372203722037220372203722037220372203722037220372203722037220372203722037220372203722037220372203722037220372203722037220372203722037220372203722037220372203722037220372203722037220372203722037220372203722037220372203722037220372203722037220372203722137221372213722137221372213722137221372213722137221372213722137221372213722137221372213722137221372213722137221372213722137221372213722137221372213722137221372213722137221372213722137221372213722137221372213779537798377983779837798379103796237962379623796237962379623796237962379653796537966379663796637966379663796637967379683796837968379683796838703387033871138711387113871138714387603876038760387603876038770388303883038830388303883038830388303883038830388323884538858388583885838858388583885838858388583885838858388583885838858388583885838858388583885838858388583885838858388583885838858388583885838858388583885838858388583885838858388583885838858388583885838858388583885838858388583885838858388583885838858388583885838858388583885838858388583885838858388583885838858388583885838858388583885838858388583885838858388583885838858388583885838858388583885838858388593885938859388593885938859388593885938859388593885938859388593885938859388593885938859388593885938859388593885938859388593885938859388603886038860388603886038860388603886038860388603886038860388603886038860388603886038862388623886238862388633886338863388633886338863388643886538865388653886538869388693886938869388693886938869388693886938869388693886938869388703887038871388723887238923389233892338923389233892338923389233892338923389233892638926389263892638928389283892838928389283892838928389283892838928389283892838928389283892838928389283892838928389283892838928389283892838928389283892838928389283892838928389283892838928389283892838928389283892838928389283892838928389283892838928389283892838928389283892838928389283892838928389283892838928389283892838928389283892838928389283892838928389283892838928389283892838928389283892838928389293892938929389293892938929389293892938929389293892938929389293892938929389293892938929389293892938929389293892938929389293892938929389293892938929389293892938929389293892938929389293892938929389293892938929390193901939019390293902939029390333903339033390333903339033390333903339036390823909039090390993909939099390993909939100391003910139102391023915839158391583915839158391583915839158391583916039172391723917239172391723917239185391853918539185391873918739187391873918739187391873918739187391873918739187391873918739187391873918739187391873918739187391873918739187391873918739187391873918739187391873918739187391873918739187391873918739187391873918739187391873918739187391873918739187391873918739187391873918739187391873918739187391873918739187391873918739187391873918739187391873918739187391873918739187391873918739187391873918839188391883918839188391883918839188391883918839188391883918839188391883918839188391883918839188391883918839188391883918839188391883918839188391883918839188391883918839188391883918839188391883918839188391883969939733397363973639736397363973639736397363973639736397363973639736397373973739738397393973939791397913979139791397913979139791397913979439794399013990139901399013990139920399203993039934399343993439934399343993439934399343993739983399913999140000400004000040000400004000140001400024000340003400634006340063400634006340063400634006340063400654007840078400784007840078400784009140091400914009140093400934009340093400934009340093400934009340093400934009340093400934009340093400934009340093400934009340093400934009340093400934009340093400934009340093400934009340093400934009340093400934009340093400934009340093400934009340093400934009340093400934009340093400934009340093400934009340093400934009340093400934009340093400934009340093400934009340093400934009340093400934009340093400944009440094400944009440094400944009440094400944009440094400944009440094400944009440094400944009440094400944009440094400954009540095400954009540095400954009540095400954009540095400954009540095400954009540095407614076440764407644076440764407644076440764407644076440764407644076540765407664076740767408194081940819408194081940819408194081940822408224092240922409224092240926409264092640926409264092640926409264092940975409834098340992409924099240992409924099340993409944099540995410544105441054410544105441054410544105441054410564106841068410684106841068410684108141081410814108141083410834108341083410834108341083410834108341083410834108341083410834108341083410834108341083410834108341083410834108341083410834108341083410834108341083410834108341083410834108341083410834108341083410834108341083410834108341083410834108341083410834108341083410834108341083410834108341083410834108341083410834108341083410834108341083410834108341083410834108341083410834108341083410844108441084410844108441084410844108441084410844108441084410844108441084410844108441084410844108441084410844108441084410854108541085410854108541085410854108541085410854108541085410854108541085410854108541085416874169041690416904169041690416904169041690416904169041690416904169141691416924169341693417454174541745417454174541745417454174541748417484185041850418504185041854418544185441854418544185441854418544185741903419114191141920419204192041920419204192141921419224192341923419824198241982419824198241982419824198241982419844199641996419964199641996419964200942009420094200942011420114201142011420114201142011420114201142011420114201142011420114201142011420114201142011420114201142011420114201142011420114201142011420114201142011420114201142011420114201142011420114201142011420114201142011420114201142011420114201142011420114201142011420114201142011420114201142011420114201142011420114201142011420114201142011420114201142011420114201142011420114201142011420124201242012420124201242012420124201242012420124201242012420124201242012420124201242012420124201242012420124201242012420134201342013420134201342013420134201342013420134201342013420134201342013420134201342013426364263942646426464264642646426464264642646426464264642646426464264642646426464264742647426484264942649427014270142701427014270142701427014270142704427044280642806428064280642806428254282542835428354283942839428394283942839428394283942839428424288842896428964290542905429054290542905429064290642907429084290842967429674296742967429674296742967429674296742969429814298142981429814298142981429944299442994429944299642996429964299642996429964299642996429964299642996429964299642996429964299642996429964299642996429964299642996429964299642996429964299642996429964299642996429964299642996429964299642996429964299642996429964299642996429964299642996429964299642996429964299642996429964299642996429964299642996429964299642996429964299642996429964299642996429964299642996429964299642996429964299642997429974299742997429974299742997429974299742997429974299742997429974299742997429974299742997429974299742997429974299742998429984299842998429984299842998429984299842998429984299842998429984299842998429984299843615436184361843618436184361843618436184361843618436184361843618436194361943620436214362143673436734367343673436734367343673436734367643676437844378443784437844378843788437884378843788437884378843788437914383743845438454385443854438544385443854438554385543856438574385743917439174391743917439174391743917439174391743919439314393143931439314393143931439444394443944439444394643946439464394643946439464394643946439464394643946439464394643946439464394643946439464394643946439464394643946439464394643946439464394643946439464394643946439464394643946439464394643946439464394643946439464394643946439464394643946439464394643946439464394643946439464394643946439464394643946439464394643946439464394643946439464394643946439464394643946439464394643946439464394643947439474394743947439474394743947439474394743947439474394743947439474394743947439474394743947439474394743947439474394743948439484394843948439484394843948439484394843948439484394843948439484394843948439484394844639446424464244642446424464544645446454464544649446494464944649446494464944649446494465244698447064470644715447154471544715447154471644716447174471844718447754477544775447754477544775447754477544775447774478944789447894478944789447894480244802448024480244804448044480444804448044480444804448044480444804448044480444804448044480444804448044480444804448044480444804448044480444804448044480444804448044480444804448044480444804448044480444804448044480444804448044480444804448044480444804448044480444804448044480444804448044480444804448044480444804448044480444804448044480444804448044480444804448044480444804448044480444804448044480444804448054480544805448054480544805448054480544805448054480544805448054480544805448054480544805448054480544805448054480544805448054480544805448054480544805448054480544805448054480544805448054480544805448054480544805453734537345373453734537345373453734537345373453744537445375453764537645428454284542845428454284542845428454284542845428454284543145431454314543145433454334543345433454334543345433454334543345433454334543345433454334543345433454334543345433454334543345433454334543345433454334543345433454334543345433454334543345433454334543345433454334543345433454334543345433454334543345433454334543345433454334543345433454334543345433454334543345433454334543345433454334543345433454334543345433454334543345433454334543345433454334543345433454344543445434454344543445434454344543445434454344543445434454344543445434454344543445434454344543445434454344543445434454344543445434454344543445434454344543445434454344543445434454344543445434454344543445434455294630846308463184631846322463224633046330463304633046333463794637946379463794637946389464524645246452464524645246452464524645246452464544646746480464804648046480464804648046480464804648046480464804648046480464804648046480464804648046480464804648046480464804648046480464804648046480464804648046480464804648046480464804648046480464804648046480464804648046480464804648046480464804648046480464804648046480464804648046480464804648046480464804648046480464804648046480464804648046480464804648046480464804648046480464804648046480464804648046480464814648146481464814648146481464814648146481464814648146481464814648146481464814648146481464814648146481464814648146481464814648146481464824648246482464824648246482464824648246482464824648246482464824648246482464824648246484464844648446484464854648546485464854648546485464864648746487464874659546647466474664746647466474664746647466474665046650466514665146651466514665146651466524665346653466534665346653466534665347411474114742147421474254742547433474334743347433474364748247482474824748247482474924755247552475524755247552475524755247552475524755447567475804758047580475804758047580475804758047580475804758047580475804758047580475804758047580475804758047580475804758047580475804758047580475804758047580475804758047580475804758047580475804758047580475804758047580475804758047580475804758047580475804758047580475804758047580475804758047580475804758047580475804758047580475804758047580475804758047580475804758047580475804758047580475804758047580475804758147581475814758147581475814758147581475814758147581475814758147581475814758147581475814758147581475814758147581475814758147581475814758247582475824758247582475824758247582475824758247582475824758247582475824758247582475844758447584475844758547585475854758547585475854758647587475874758747587475884770147753477534775347753477534775347753477534775647756477574775747757477574775747757477584775947759477594775947759477624776247762477624776247762477624776247762477624776247763477634776447765477654781747817478174781747817478174781747817478204782047927479274792747931479314793147931479314793147931479314793447980479884798847997479974799747997479974799847998479994800048000480604806048060480604806048060480604806048060480624807548075480754807548075480754808848088480884808848090480904809048090480904809048090480904809048090480904809048090480904809048090480904809048090480904809048090480904809048090480904809048090480904809048090480904809048090480904809048090480904809048090480904809048090480904809048090480904809048090480904809048090480904809048090480904809048090480904809048090480904809048090480904809048090480904809048090480904809048090480904809048090480914809148091480914809148091480914809148091480914809148091480914809148091480914809148091480914809148091480914809148091480924809248092480924809248092480924809248092480924809248092480924809248092480924809248092487744877748777487774877748777487774877748777487774877748777487774877748778487784877948780487804883248832488324883248832488324883248832488354883548943489434894348943489434896248962489724897648976489764897648976489764897648976489794902549033490334904249042490424904249042490434904349044490454904549105491054910549105491054910549105491054910549107491204912049120491204912049120491334913349133491334913549135491354913549135491354913549135491354913549135491354913549135491354913549135491354913549135491354913549135491354913549135491354913549135491354913549135491354913549135491354913549135491354913549135491354913549135491354913549135491354913549135491354913549135491354913549135491354913549135491354913549135491354913549135491354913549135491354913549135491354913549135491354913549136491364913649136491364913649136491364913649136491364913649136491364913649136491364913649136491364913649136491364913649137491374913749137491374913749137491374913749137491374913749137491374913749137491374913749828498314983149831498314983149831498314983149831498314983149831498314983249832498334983449834498854988549885498854988549885498854988549885498854988549888498884988849888498904989049890498904989049890498904989049890498904989049890498904989049890498904989049890498904989049890498904989049890498904989049890498904989049890498904989049890498904989049890498904989049890498904989049890498904989049890498904989049890498904989049890498904989049890498904989049890498904989049890498904989049890498904989049890498904989049890498904989049890498904989049890498904989149891498914989149891498914989149891498914989149891498914989149891498914989149891498914989149891498914989149891498914989149891498914989149891498914989149891498914989149891498914989149891498914989149891498914998149981499814998149981499914999150001500055000550005500055000550005500055000550008500545006250062500715007150071500715007150072500725007350074500745013050130501305013050130501305013050130501305013250144501445014450144501445014450157501575015750157501595015950159501595015950159501595015950159501595015950159501595015950159501595015950159501595015950159501595015950159501595015950159501595015950159501595015950159501595015950159501595015950159501595015950159501595015950159501595015950159501595015950159501595015950159501595015950159501595015950159501595015950159501595015950159501595015950159501595015950159501595015950159501595016050160501605016050160501605016050160501605016050160501605016050160501605016050160501605016050160501605016050160501605016050160501605016050160501605016050160501605016050160501605016050160501605016050160501605070050703508195087150871508715087150871508715087150871508745087450875508755087550875508755087550876508775087750877508775087751635516355164551645516495164951657516575165751657516605170651706517065170651706517165177651776517765177651776517765177651776517765177851791518045180451804518045180451804518045180451804518045180451804518045180451804518045180451804518045180451804518045180451804518045180451804518045180451804518045180451804518045180451804518045180451804518045180451804518045180451804518045180451804518045180451804518045180451804518045180451804518045180451804518045180451804518045180451804518045180451804518045180451804518045180451804518045180451804518045180551805518055180551805518055180551805518055180551805518055180551805518055180551805518055180551805518055180551805518055180551805518055180651806518065180651806518065180651806518065180651806518065180651806518065180651806518085180851808518085180951809518095180951809518095181051811518115181151811518125181251812518125257252572525825258252586525865259452594525945259452597526435264352643526435264352653527135271352713527135271352713527135271352713527155272852741527415274152741527415274152741527415274152741527415274152741527415274152741527415274152741527415274152741527415274152741527415274152741527415274152741527415274152741527415274152741527415274152741527415274152741527415274152741527415274152741527415274152741527415274152741527415274152741527415274152741527415274152741527415274152741527415274152741527415274152741527415274152741527415274152741527425274252742527425274252742527425274252742527425274252742527425274252742527425274252742527425274252742527425274252742527425274252742527435274352743527435274352743527435274352743527435274352743527435274352743527435274352745527455274552745527465274652746527465274652746527475274852748527485274852750528625291452914529145291452914529145291452914529175291752918529185291852918529185291852919529205292052920529205292152921529215292152921529215292152921529215292152921529215292152921529215292252922529235292452924529765297652976529765297652976529765297652979529795308653086530865308653090530905309053090530905309053090530905309353139531475314753156531565315653156531565315753157531585315953159532195321953219532195321953219532195321953219532215323453234532345323453234532345324753247532475324753249532495324953249532495324953249532495324953249532495324953249532495324953249532495324953249532495324953249532495324953249532495324953249532495324953249532495324953249532495324953249532495324953249532495324953249532495324953249532495324953249532495324953249532495324953249532495324953249532495324953249532495324953249532495324953249532495324953249532495324953249532495324953249532505325053250532505325053250532505325053250532505325053250532505325053250532505325053250532505325053250532505325053250532515325153251532515325153251532515325153251532515325153251532515325153251532515325153251538895389254008540605406054060540605406054060540605406054063540635406454064540645406454064540645406554066540665406654066540665482454824548345483454838548385484654846548465484654849548955489554895548955489554905549655496554965549655496554965549655496554965549675498054993549935499354993549935499354993549935499354993549935499354993549935499354993549935499354993549935499354993549935499354993549935499354993549935499354993549935499354993549935499354993549935499354993549935499354993549935499354993549935499354993549935499354993549935499354993549935499354993549935499354993549935499354993549935499354993549935499354993549935499354993549935499354993549935499354993549945499454994549945499454994549945499454994549945499454994549945499454994549945499454994549945499454994549945499454994549945499454994549955499554995549955499554995549955499554995549955499554995549955499554995549955499554997549975499754997549985499854998549985499854998549995500055000550005500055001550015500155001550015500155001550015500155001550015500155001550015500155002550025500355004550045505655056550565505655056550565505655056550595505955168551685516855168551725517255172551725517255172551725517255175552215522955229552395523955239552395523955240552405524155242552425530255302553025530255302553025530255302553025530455317553175531755317553175531755330553305533055330553325533255332553325533255332553325533255332553325533255332553325533255332553325533255332553325533255332553325533255332553325533255332553325533255332553325533255332553325533255332553325533255332553325533255332553325533255332553325533255332553325533255332553325533255332553325533255332553325533255332553325533255332553325533255332553325533255332553325533255332553325533255332553325533355333553335533355333553335533355333553335533355333553335533355333553335533355333553335533355333553335533355333553335533455334553345533455334553345533455334553345533455334553345533455334553345533455334553345606656069568245682456832568325683256832568355688156881568815688156881568915695356953569535695356953569535695356953569535695556968569815698156981569815698156981569815698156981569815698156981569815698156981569815698156981569815698156981569815698156981569815698156981569815698156981569815698156981569815698156981569815698156981569815698156981569815698156981569815698156981569815698156981569815698156981569815698156981569815698156981569815698156981569815698156981569815698156981569815698156981569815698156981569815698156981569815698256982569825698256982569825698256982569825698256982569825698256982569825698256982569825698256982569825698256982569825698256982569825698356983569835698356983569835698356983569835698356983569835698356983569835698356983569855698556985569855698656986569865698656986569865698756988569885699156991569915709957151571515715157151571515715157151571515715457154571555715557155571555715557155571565715757157571575715757157571575715757157571575715757157571575715757157571575715757157571575715757158571585715957160571605721257212572125721257212572125721257212572155721557322573225732257322573265732657326573265732657326573265732657329573755738357383573925739257392573925739257393573935739457395573955745557455574555745557455574555745557455574555745757470574705747057470574705747057483574835748357483574855748557485574855748557485574855748557485574855748557485574855748557485574855748557485574855748557485574855748557485574855748557485574855748557485574855748557485574855748557485574855748557485574855748557485574855748557485574855748557485574855748557485574855748557485574855748557485574855748557485574855748557485574855748557485574855748557485574855748557485574855748557485574855748657486574865748657486574865748657486574865748657486574865748657486574865748657486574865748657486574865748657486574865748757487574875748757487574875748757487574875748757487574875748757487574875748757487574875816958172581725817558175581755817558175581755817558176581765817758178581785818958189581895818958189581895818958189581895819158198581985819858198581985819858209582095820958209582095822358225582265822758229582315823158231582335823358233582335823558235582355823558235582355823558235582355823558235582355823558235582355823558235582355823558235582355823558235582355823558235582355823558235582355823558235582355823558235582355823558235582355823558235582355823558235582355823558235582355823558235582355823558235582355823558235582355823558235582355823558235582355823558235582355823558235582355823558235582355823558235582355823558236582365823658236582365823658236582365823658236582365823658236582365823658236582365823658236582365823658236582365823658236582365823658236582365823658236582365823658236582365823658236582365823658236582365823658236582375824558311583115831558315583155831558315583155831558316583165831758318583185833058330583305833058330583305833058330583305833258340583405834058340583405834058351583515835158351583515836558367583685836958371583735837358373583755837558375583755837758377583775837758377583775837758377583775837758377583775837758377583775837758377583775837758377583775837758377583775837758377583775837758377583775837758377583775837758377583775837758377583775837758377583775837758377583775837758377583775837758377583775837758377583775837758377583775837758377583775837758377583775837758377583775837758377583775837758377583775837758377583775837758378583785837858378583785837858378583785837858378583785837858378583785837858378583785837858378583785837858378583785837858378583785837858378583785837858378583785837858378583785837858378583785837858378583785837858378583795838758458584585845858458584585845858458584585845858458584585845858459584595846058461584615851358513585135851358513585135851358513585165851658623586235862358623586275862758627586275862758627586275862758630586765868458684586935869358693586935869358694586945869558696586965875658756587565875658756587565875658756587565875858771587715877158771587715877158784587845878458784587865878658786587865878658786587865878658786587865878658786587865878658786587865878658786587865878658786587865878658786587865878658786587865878658786587865878658786587865878658786587865878658786587865878658786587865878658786587865878658786587865878658786587865878658786587865878658786587865878658786587865878658786587865878658786587865878658786587865878658786587865878658786587865878758787587875878758787587875878758787587875878758787587875878758787587875878758787587875878758787587875878758787587875878858788587885878858788587885878858788587885878858788587885878858788587885878858788587885947359476594765947659476594765947659476594765947659476594765947759477594785947959479595315953159531595315953159531595315953159534595345964359647596475964759647596475964759647596475965059696597045970459714597145971459714597145971559715597165971759717597775977759777597775977759777597775977759777597795979259792597925979259792597925980559805598055980559807598075980759807598075980759807598075980759807598075980759807598075980759807598075980759807598075980759807598075980759807598075980759807598075980759807598075980759807598075980759807598075980759807598075980759807598075980759807598075980759807598075980759807598075980759807598075980759807598075980759807598075980759807598075980759807598075980759807598075980759807598075980759807598085980859808598085980859808598085980859808598085980859808598085980859808598085980859808598085980859808598085980859808598095980959809598095980959809598095980959809598095980959809598095980959809598095980959809604946049460540605436054360543605436054360543605436054360543605436054360543605446054460545605466054660598605986059860598605986059860598605986060160601607086070860708607086071260712607126071260712607126071260712607156076160769607696077860778607786077860778607796077960780607816078160841608416084160841608416084160841608416084160843608566085660856608566085660856608696086960869608696087160871608716087160871608716087160871608716087160871608716087160871608716087160871608716087160871608716087160871608716087160871608716087160871608716087160871608716087160871608716087160871608716087160871608716087160871608716087160871608716087160871608716087160871608716087160871608716087160871608716087160871608716087160871608716087160871608716087160871608716087160871608716087160872608726087260872608726087260872608726087260872608726087260872608726087260872608726087260872608726087260872608726087260873608736087360873608736087360873608736087360873608736087360873608736087360873608736087361554615576230462304623126231262312623126231562361623616236162361623616237162432624326243262432624326243262432624326243262434624476246062460624606246062460624606246062460624606246062460624606246062460624606246062460624606246062460624606246062460624606246062460624606246062460624606246062460624606246062460624606246062460624606246062460624606246062460624606246062460624606246062460624606246062460624606246062460624606246062460624606246062460624606246062460624606246062460624606246062460624606246062460624606246062460624606246062461624616246162461624616246162461624616246162461624616246162461624616246162461624616246162461624616246162461624616246162461624616246162462624626246262462624626246262462624626246262462624626246262462624626246262462624626246462464624646246462465624656246562465624656246562466624676246762467624676246862581626336263362633626336263362633626336263362636626366263762637626376263762637626376263862639626396263962639626396263962639626396263962639626396263962639626396264062641626416264162641626416264162641626416264162642626426264262642626426264262642626426264262642626426264262642626426264262642626426264262642626426264262642626426264262642626426264262642626426264262642626426264262642626426264262642626426264262642626426264262642626426264262642626426264262642626426264262642626426264262642626426264262642626426264262642626426264262642626426264262642626426264262642626426264262643626436264362643626436264362643626436264362643626436264362643626436264362643626436264362643626436264362643626436264362643626436264362643626436264362643626436264362643626436264362643626436264362643626446264462644626446264462644626446264462644626456264662646626466264662646626466264662646626466264762647626476264762647626476264762647626476264762647626476264762647626476264762647626476264762647626476264762647626476264762647626476264762647626476264762647626476264762647626476264762647626476264762647626476264762647626476264762647626476264762647626476264762647626476264762647626476264762647626476264762647626476264762647626476264762647626476264762647626476264862648626486264862648626486264862648626486264862648626486264862648626486264862648626486264862648626486264862648626486264862648626486264862648626486264862648626486264862648626486264862648626486264862649626496264962649626496264962649626496264962649626496264962649626496264962649626496264962649626496264962649626496264962649626496264962649626496264962649626496264962649626496264962649626496264962649626506265062651626526265262704627046270462704627046270462704627046270762707628146281462814628146281462833628336284362847628476284762847628476284762847628476285062896629046290462913629136291362913629136291462914629156291662916629766297662976629766297662976629766297662976629786299162991629916299162991629916300463004630046300463006630066300663006630066300663006630066300663006630066300663006630066300663006630066300663006630066300663006630066300663006630066300663006630066300663006630066300663006630066300663006630066300663006630066300663006630066300663006630066300663006630066300663006630066300663006630066300663006630066300663006630066300663006630066300663006630066300663006630066300663006630066300663006630076300763007630076300763007630076300763007630076300763007630076300763007630076300763007630076300763007630076300763007630086300863008630086300863008630086300863008630086300863008630086300863008630086300863008636626366563665636656366563665636656366563665636656366563665636666366663667636686366863720637206372063720637206372063720637206372363723638306383063830638306383063849638496385963863638636386363863638636386363863638636386663912639206392063929639296392963929639296393063930639316393263932639926399263992639926399263992639926399263992639946400764007640076400764007640076402064020640206402064022640226402264022640226402264022640226402264022640226402264022640226402264022640226402264022640226402264022640226402264022640226402264022640226402264022640226402264022640226402264022640226402264022640226402264022640226402264022640226402264022640226402264022640226402264022640226402264022640226402264022640226402264022640226402264022640226402264022640226402264022640226402264022640236402364023640236402364023640236402364023640236402364023640236402364023640236402364023640236402364023640236402364023640246402464024640246402464024640246402464024640246402464024640246402464024640246402464024647046470764707647076470764707647076470764707647076470764707647076470864708647096471064710647626476264762647626476264762647626476264765647656487264872648726487264876648766487664876648766487664876648766487964925649336493364942649426494264942649426494364943649446494564945650056500565005650056500565005650056500565005650076502065020650206502065020650206503365033650336503365035650356503565035650356503565035650356503565035650356503565035650356503565035650356503565035650356503565035650356503565035650356503565035650356503565035650356503565035650356503565035650356503565035650356503565035650356503565035650356503565035650356503565035650356503565035650356503565035650356503565035650356503565035650356503565035650356503565035650356503565035650356503565035650366503665036650366503665036650366503665036650366503665036650366503665036650366503665036650366503665036650366503665036650376503765037650376503765037650376503765037650376503765037650376503765037650376503765037655656571765720657206572065720657206572065720657206572065720657206572065721657216572265723657236577565775657756577565775657756577565775657756577565775657786577865778657786578065780657806578065780657806578065780657806578065780657806578065780657806578065780657806578065780657806578065780657806578065780657806578065780657806578065780657806578065780657806578065780657806578065780657806578065780657806578065780657806578065780657806578065780657806578065780657806578065780657806578065780657806578065780657806578065780657806578065780657806578065780657806578065780657816578165781657816578165781657816578165781657816578165781657816578165781657816578165781657816578165781657816578165781657816578165781657816578165781657816578165781657816578165781657816578165781657816578165781658806588065880658806588065890658946589465894658946589465894658946589465897659436595165951659606596065960659606596065961659616596265963659636602266022660226602266022660226602266022660226602466036660366603666036660366603666049660496604966049660516605166051660516605166051660516605166051660516605166051660516605166051660516605166051660516605166051660516605166051660516605166051660516605166051660516605166051660516605166051660516605166051660516605166051660516605166051660516605166051660516605166051660516605166051660516605166051660516605166051660516605166051660516605166051660516605166051660516605166051660516605166051660516605266052660526605266052660526605266052660526605266052660526605266052660526605266052660526605266052660526605266052660526605266052660526605266052660526605266052660526605266052660526605266052660526605266052660526662866631666316663166631674076740767417674176742167421674296742967429674296743267478674786747867478674786748867550675506755067550675506755067550675506755067552675656757867578675786757867578675786757867578675786757867578675786757867578675786757867578675786757867578675786757867578675786757867578675786757867578675786757867578675786757867578675786757867578675786757867578675786757867578675786757867578675786757867578675786757867578675786757867578675786757867578675786757867578675786757867578675786757867578675786757867578675786757867578675786757867578675786757867579675796757967579675796757967579675796757967579675796757967579675796757967579675796757967579675796757967579675796757967579675796757967580675806758067580675806758067580675806758067580675806758067580675806758067580675806758267582675826758267583675836758367583675836758367584675856758567586675866758667586675866769867750677506775067750677506775067750677506775367753677546775467754677546775467754677556775667756677566775667756677566775667756677566775667756677566775667756677566775667756677606776067760677606776367809678176781767823678236782367823678236782367823678246782467825678266782667879678796787967879678796787967879678796787967881678906789067890678906789267892678926789267892678926789267892678926789267892678926789267892678926789267892678926789267892678926789267892678926789267892678926789267892678926789267892678926789267892678926789267892678926789267892678926789267892678926789267892678926789267892678926789267892678926789267892678926789267892678926789267892678926789267892678926789267892678926789267892678926789267892678926789267893678936789367893678936789367893678936789367893678936789367893678936789367893678936789367893678936789367893678936789367893678936789367893678936789367893678936789367893678936789367893678936789367893678936789367893681926819568195681956819568195681956819568195681956819568195681956819668196681976819868198682496824968249682496824968249682496824968253682536825368253682556825568255682556825568255682556825568255682556825568255682556825568255682556825568255682556825568255682556825568255682556825568255682556825568255682556825568255682556825568255682556825568255682556825568255682556825568255682556825568255682556825568255682556825568255682556825568255682556825568255682556825568255682556825568255682556825568255682556825568255682556825568255682556825668256682566825668256682566825668256682566825668256682566825668256682566825668256682566825668256682566825668256682566825668256682566825668256682566825668256682566825668256682566825668256682566825668256682566833468334683346833468334683446834868348683486834868351683976840568405684136841368413684136841368414684146841568416684166846968469684696846968469684696846968469684696847168485684856848568485684876848768487684876848768487684876848768487684876848768487684876848768487684876848768487684876848768487684876848768487684876848768487684876848768487684876848768487684876848768487684876848768487684876848768487684876848768487684876848768487684876848768487684876848768487684876848768487684876848768487684876848768487684876848768487684876848768487684876848768487684876848768487684876848868488684886848868488684886848868488684886848868488684886848868488684886848868488684886848868488684886848868488684886848868488684886848868488684886848868488684886848868488684886848868488684886848868488684886893868941689416894168941689416894168941689416894168941689416894168942689426894368944689446899568995689956899568995689956899568995689996899968999689996900169001690016900169001690016900169001690016900169001690016900169001690016900169001690016900169001690016900169001690016900169001690016900169001690016900169001690016900169001690016900169001690016900169001690016900169001690016900169001690016900169001690016900169001690016900169001690016900169001690016900169001690016900169001690016900169001690016900169001690016900169001690016900169002690026900269002690026900269002690026900269002690026900269002690026900269002690026900269002690026900269002690026900269002690026900269002690026900269002690026900269002690026900269002690026900269002690026900269080690806908069080690806909069094690946909469094690976914369151691516915969159691596915969159691606916069161691626916269215692156921569215692156921569215692156921569217692316923169231692316923369233692336923369233692336923369233692336923369233692336923369233692336923369233692336923369233692336923369233692336923369233692336923369233692336923369233692336923369233692336923369233692336923369233692336923369233692336923369233692336923369233692336923369233692336923369233692336923369233692336923369233692336923369233692336923369233692336923369233692336923369233692336923369234692346923469234692346923469234692346923469234692346923469234692346923469234692346923469234692346923469234692346923469234692346923469234692346923469234692346923469234692346923469234692346923469234692346923469691696946969469694696946969469694696946969469694696946969469694696956969569696696976969769749697496974969749697496974969749697496975269752698596985969859698596986369863698636986369863698636986369863698666991269920699206992969929699296992969929699306993069931699326993269992699926999269992699926999269992699926999269994700077000770007700077000770007700207002070020700207002270022700227002270022700227002270022700227002270022700227002270022700227002270022700227002270022700227002270022700227002270022700227002270022700227002270022700227002270022700227002270022700227002270022700227002270022700227002270022700227002270022700227002270022700227002270022700227002270022700227002270022700227002270022700227002270022700227002270022700227002270022700227002270023700237002370023700237002370023700237002370023700237002370023700237002370023700237002370023700237002370023700237002370024700247002470024700247002470024700247002470024700247002470024700247002470024700247002470719707227072270723707237072370723707237072370723707237072370723707247072470725707267072670777707777077770777707777077770777707807078070780707807078270782707827078270782707827078270782707827078270782707827078270782707827078270782707827078270782707827078270782707827078270782707827078270782707827078270782707827078270782707827078270782707827078270782707827078270782707827078270782707827078270782707827078270782707827078270782707827078270782707827078270782707827078270782707827078270782707827078270782707827078270782707827078270783707837078370783707837078370783707837078370783707837078370783707837078370783707837078370783707837078370783707837078370783707837078370783707837078370783707837078370783707837078370783707837078370783707837078370869708697086970869708697087970883708837088370883708867093270940709407095070950709507095070950709517095170952709537095371007710077100771007710077100771007710077100771009710217102171021710217102371023710237102371023710237102371023710237102371023710237102371023710237102371023710237102371023710237102371023710237102371023710237102371023710237102371023710237102371023710237102371023710237102371023710237102371023710237102371023710237102371023710237102371023710237102371023710237102371023710237102371023710237102371023710237102371023710237102371023710237102371023710237102371024710247102471024710247102471024710247102471024710247102471024710247102471024710247102471024710247102471024710247102471024710247102471024710247102471024710247102471024710247102471024710247102471024710247102471508715117151171511715117162371675716757167571675716757167571675716757167871678716797167971679716797167971679716807168171681716817168171681724177241772425724257242572425724287247472474724747247472474724847254472544725447254472544725447254472544725447254672558725717257172571725717257172571725717257172571725717257172571725717257172571725717257172571725717257172571725717257172571725717257172571725717257172571725717257172571725717257172571725717257172571725717257172571725717257172571725717257172571725717257172571725717257172571725717257172571725717257172571725717257172571725717257172571725717257172571725717257172571725717257172571725717257172571725717257272572725727257272572725727257272572725727257272572725727257272572725727257272572725727257272572725727257272572725727257272572725727257372573725737257372573725737257372573725737257372573725737257372573725737257372573725757257572575725757257672576725767257672576725767257772578725787258172581725817258172581725817258172581725817258172581725817258172582725827258372584725847263672636726367263672636726367263672636726397263972746727467274672746727507275072750727507275072750727507275072753727997280772807728167281672816728167281672817728177281872819728197287972879728797287972879728797287972879728797288172894728947289472894728947289472907729077290772907729097290972909729097290972909729097290972909729097290972909729097290972909729097290972909729097290972909729097290972909729097290972909729097290972909729097290972909729097290972909729097290972909729097290972909729097290972909729097290972909729097290972909729097290972909729097290972909729097290972909729097290972909729097290972909729097290972909729097290972909729097290972909729097291072910729107291072910729107291072910729107291072910729107291072910729107291072910729107291072910729107291072910729107291172911729117291172911729117291172911729117291172911729117291172911729117291172911729117359373596735967359673596735967359673596735967359673596735967359673597735977359873599735997365173651736517365173651736517365173651736547365473755737557375573755737597375973759737597375973759737597375973762738087381673816738257382573825738257382573826738267382773828738287388773887738877388773887738877388773887738877388973901739017390173901739017390173914739147391473914739167391673916739167391673916739167391673916739167391673916739167391673916739167391673916739167391673916739167391673916739167391673916739167391673916739167391673916739167391673916739167391673916739167391673916739167391673916739167391673916739167391673916739167391673916739167391673916739167391673916739167391673916739167391673916739167391673916739167391673916739167391673916739167391773917739177391773917739177391773917739177391773917739177391773917739177391773917739177391773917739177391773917739177391873918739187391873918739187391873918739187391873918739187391873918739187391873918739187453274535745357453674536745367453674536745367453674536745367453674537745377453874539745397459174591745917459174591745917459174591745947459474698746987469874698747027470274702747027470274702747027470274705747517475974759747687476874768747687476874769747697477074771747717483174831748317483174831748317483174831748317483374845748457484574845748457484574858748587485874858748607486074860748607486074860748607486074860748607486074860748607486074860748607486074860748607486074860748607486074860748607486074860748607486074860748607486074860748607486074860748607486074860748607486074860748607486074860748607486074860748607486074860748607486074860748607486074860748607486074860748607486074860748607486074860748607486074860748607486074860748607486074860748607486174861748617486174861748617486174861748617486174861748617486174861748617486174861748617486174861748617486174861748617486274862748627486274862748627486274862748627486274862748627486274862748627486274862748627548675489754897548975489754897548975489754897548975489754897548975490754907549175492754927554475544755447554475544755447554475544755447554475544755477554775547755477554975549755497554975549755497554975549755497554975549755497554975549755497554975549755497554975549755497554975549755497554975549755497554975549755497554975549755497554975549755497554975549755497554975549755497554975549755497554975549755497554975549755497554975549755497554975549755497554975549755497554975549755497554975549755497554975549755497554975549755497554975549755497554975549755507555075550755507555075550755507555075550755507555075550755507555075550755507555075550755507555075550755507555075550755507555075550755507555075550755507555075550755507555075550755507555075550755507555075550756497564975649756497565375653756537565375653756537565375653756567570275710757107571975719757197571975719757207572075721757227572275780757807578075780757807578075780757807578075782757947579475794757947579475794758077580775807758077580975809758097580975809758097580975809758097580975809758097580975809758097580975809758097580975809758097580975809758097580975809758097580975809758097580975809758097580975809758097580975809758097580975809758097580975809758097580975809758097580975809758097580975809758097580975809758097580975809758097580975809758097580975809758097580975809758097580975809758097580975809758097580975810758107581075810758107581075810758107581075810758107581075810758107581075810758107581075810758107581075810758107581075810758107581075810758107581075810758107581075810758107581075810758107581075810758107581076384763877638776387763877638776387763877638776387763877638776387763887638876389763907639076441764417644176441764417644176441764417644176441764417644476444764447644476446764467644676446764467644676446764467644676446764467644676446764467644676446764467644676446764467644676446764467644676446764467644676446764467644676446764467644676446764467644676446764467644676446764467644676446764467644676446764467644676446764467644676446764467644676446764467644676446764467644676446764467644676446764467644676446764467644676446764467644676446764467644676446764477644776447764477644776447764477644776447764477644776447764477644776447764477644776447764477644776447764477644776447764477644776447764477644776447764477644776447764477644776447764477644776447764477644776447765377653776537765377653776547765517655176551765517655176551765517655176554766007660876608766177661776617766177661776618766187661976620766207667676676766767667676676766767667676676766767667876690766907669076690766907669076703767037670376703767057670576705767057670576705767057670576705767057670576705767057670576705767057670576705767057670576705767057670576705767057670576705767057670576705767057670576705767057670576705767057670576705767057670576705767057670576705767057670576705767057670576705767057670576705767057670576705767057670576705767057670576705767057670576705767057670576705767057670576705767057670576705767057670676706767067670676706767067670676706767067670676706767067670676706767067670676706767067670676706767067670676706767067670676706767067670676706767067670676706767067670676706767067670676706767067670676706767067724677249772497724977249772497724977249772497724977249772497724977250772507725177252772527730477304773047730477304773047730477304773077730777415774157741577415774197741977419774197741977419774197741977422774687747677476774857748577485774857748577486774867748777488774887754877548775487754877548775487754877548775487755077562775627756277562775627756277575775757757577575775777757777577775777757777577775777757777577775777757777577775777757777577775777757777577775777757777577775777757777577775777757777577775777757777577775777757777577775777757777577775777757777577775777757777577775777757777577775777757777577775777757777577775777757777577775777757777577775777757777577775777757777577775777757777577775777757777577775777757777577775777757777577775777757877578775787757877578775787757877578775787757877578775787757877578775787757877578775787757877578775787757877578775787757977579775797757977579775797757977579775797757977579775797757977579775797757977579775797827078273782737827378273782737827378273782737827378273782737827378273782737827478274782757827678276783277832778327783277832778327783277832778330783307833078330783327833278332783327833278332783327833278332783327833278332783327833278332783327833278332783327833278332783327833278332783327833278332783327833278332783327833278332783327833278332783327833278332783327833278332783327833278332783327833278332783327833278332783327833278332783327833278332783327833278332783327833278332783327833278332783327833278332783327833278332783327833278332783327833378333783337833378333783337833378333783337833378333783337833378333783337833378333783337833378333783337833378333783337833378333783337833378333783337833378333783337833378333783337833378333783337833378333783337839678396783967839678400784007840078400784007840078400784007840078400784007840078400784007840078400784007840078400784007840078400784007840078400784007840078400784007840078400784037844978457784577846478464784647846478464784657846578466784677846778523785237852378523785237852378523785237852378525785367853678536785367853878538785387853878538785387853878538785387853878538785387853878538785387853878538785387853878538785387853878538785387853878538785387853878538785387853878538785387853878538785387853878538785387853878538785387853878538785387853878538785387853878538785387853878538785387853878538785387853878538785387853878538785387853878538785387853878538785387853878538785387853878538785387853878539785397853978539785397853978539785397853978539785397853978539785397853978539785397853978539785397853978539785397853978539785397853978539785397853978539785397853978539785397853978539785397853978539785397853978539789557895878958789587895878958789587895878958789587895878958789587895978959789607896178961790137901379013790137901379013790137901379016790167912579125791257912579129791297912979129791297912979129791297913279178791867918679196791967919679196791967919779197791987919979199792597925979259792597925979259792597925979259792617927479274792747927479274792747928779287792877928779289792897928979289792897928979289792897928979289792897928979289792897928979289792897928979289792897928979289792897928979289792897928979289792897928979289792897928979289792897928979289792897928979289792897928979289792897928979289792897928979289792897928979289792897928979289792897928979289792897928979289792897928979289792897928979289792897928979289792897928979289792897928979289792907929079290792907929079290792907929079290792907929079290792907929079290792907929079290792907929079290792907929079290792917929179291792917929179291792917929179291792917929179291792917929179291792917929179291800218002480024800248002480024800248002480024800248002480024800248002580025800268002780027800788007880078800788007880078800788007880081800818008180081800838008380083800838008380083800838008380083800838008380083800838008380083800838008380083800838008380083800838008380083800838008380083800838008380083800838008380083800838008380083800838008380083800838008380083800838008380083800838008380083800838008380083800838008380083800838008380083800838008380083800838008380083800838008380083800838008380083800838008380083800838008380083800838008480084800848008480084800848008480084800848008480084800848008480084800848008480084800848008480084800848008480084800848008480084800848008480084800848008480084800848008480084800848008480084800848008480084800848014780151801518015180151801548020080208802088021680216802168021680216802178021780218802198021980275802758027580275802758027580275802758027580277802888028880288802888029080290802908029080290802908029080290802908029080290802908029080290802908029080290802908029080290802908029080290802908029080290802908029080290802908029080290802908029080290802908029080290802908029080290802908029080290802908029080290802908029080290802908029080290802908029080290802908029080290802908029080290802908029080290802908029080290802908029080290802908029080290802908029080291802918029180291802918029180291802918029180291802918029180291802918029180291802918029180291802918029180291802918029180291802918029180291802918029180291802918029180291802918029180291802918029180291802918029180291806938069380705807088080880860808608086080860808608086080860808608086080860808608086380863808638086380863808638086380863808638086380863808638086380863808638086380863808638086380863808638086380863808638086380863808638086380863808638086380863808638086380863808638086380863808638086380863808638086380863808638086380863808638086380863808638086380863808638086380863808638086380863808638086380863808638086380863808638086380863808638086380863808638086380863808638086480864808648086480864808648086480864808648086480864808648086480864808648086480864808648086480864808648086480864808648086480864808648086480864808648086480864808648086480864808648086480864808648086480864808648086480864808668086680866808668086680866808678086780867808678086780867808688086980869808698145681456814648146481464814648146781513815138151381513815138152281581815818158181581815818158181581815818158181583815958160881608816088160881608816088160881608816088160881608816088160881608816088160881608816088160881608816088160881608816088160881608816088160881608816088160881608816088160881608816088160881608816088160881608816088160881608816088160881608816088160881608816088160881608816088160881608816088160881608816088160881608816088160881608816088160881608816088160881608816088160881608816088160881608816088160881609816098160981609816098160981609816098160981609816098160981609816098160981609816098160981609816098160981609816098160981609816098160981610816108161081610816108161081610816108161081610816108161081610816108161081610816108161281612816128161281613816138161381613816138161381614816158161581615816158161681616816168161681616816168161681616816168161681616816168161681616816168161781617816188161981619816718167181671816718167181671816718167181674816748178281782817828178281782818018180181811818158181581815818158181581815818158181581818818648187281872818818188181881818818188181882818828188381884818848194481944819448194481944819448194481944819448194681959819598195981959819598195981972819728197281972819748197481974819748197481974819748197481974819748197481974819748197481974819748197481974819748197481974819748197481974819748197481974819748197481974819748197481974819748197481974819748197481974819748197481974819748197481974819748197481974819748197481974819748197481974819748197481974819748197481974819748197481974819748197481974819748197481974819748197481974819748197481974819748197581975819758197581975819758197581975819758197581975819758197581975819758197581975819758197581975819758197581975819758197681976819768197681976819768197681976819768197681976819768197681976819768197681976819768265982662826628266282662826628266282663826638266482665826658272282722827228272282722827228272282722827258272582725827258272782727827278272782727827278272782727827278272782727827278272782727827278272782727827278272782727827278272782727827278272782727827278272782727827278272782727827278272782727827278272782727827278272782727827278272782727827278272782727827278272782727827278272782727827278272782727827278272782727827278272782727827278272782727827278272782727827278272782727827278272782727827278272782728827288272882728827288272882728827288272882728827288272882728827288272882728827288272882728827288272882728827288272882728827288272882728827288272882728827288272882728827288272882728827288272882728827288272882774827778278282782827828278282785828318283982839828488284882848828488284882849828498285082851828518290682906829068290682906829068290682906829068291782917829178291782917829178293082930829308293082932829328293282932829328293282932829328293282932829328293282932829328293282932829328293282932829328293282932829328293282932829328293282932829328293282932829328293282932829328293282932829328293282932829328293282932829328293282932829328293282932829328293282932829328293282932829328293282932829328293282932829328293282932829328293282932829328293282932829328293282932829328293282932829338293382933829338293382933829338293382933829338293382933829338293382933829338293382933829338293382933829338293382933829338293382933829338293382933829338293382933829338293382933829338293382933829338293382933829338293483232832718327183271832718327183271832718327183271832718327183271832718327183271832718327183271832718327183271832718327183271832718327183271832718327183271832718327183271832718327183271832718327183271832718327183271832718327183271832718327183271832718327183271832718327183271832718327183271832718327183271832718327183271832718327183275832758327583275832758327583275832758327583275832758327583276832768327783278832788333083330833308333083330833308333083330833338333383441834418344183441834458344583445834458344583445834458344583448834948350283502835118351183511835118351183512835128351383514835148357483574835748357483574835748357483574835748357683589835898358983589835898358983602836028360283602836048360483604836048360483604836048360483604836048360483604836048360483604836048360483604836048360483604836048360483604836048360483604836048360483604836048360483604836048360483604836048360483604836048360483604836048360483604836048360483604836048360483604836048360483604836048360483604836048360483604836048360483604836048360483604836048360483604836048360483604836048360483604836048360583605836058360583605836058360583605836058360583605836058360583605836058360583605836058360583605836058360583605836058360683606836068360683606836068360683606836068360683606836068360683606836068360683606836068429684299843038430384303843038430784307843078431484314843148431484314843158431584316843178431784371843718437184371843718437184371843718437184373843828438284382843828438484384843848438484384843848438484384843848438484384843848438484384843848438484384843848438484384843848438484384843848438484384843848438484384843848438484384843848438484384843848438484384843848438484384843848438484384843848438484384843848438484384843848438484384843848438484384843848438484384843848438484384843848438484384843848438484384843848438484384843848438484384843848438484385843858438584385843858438584385843858438584385843858438584385843858438584385843858438584385843858438584385843858438584385843858438584385843858438584385843858438584385843858438584385843858438584385843858438584385847078470784707847078546885468854788547885482854828549085490854908549085493855398553985539855398553985549856098560985609856098560985609856098560985609856118562485637856378563785637856378563785637856378563785637856378563785637856378563785637856378563785637856378563785637856378563785637856378563785637856378563785637856378563785637856378563785637856378563785637856378563785637856378563785637856378563785637856378563785637856378563785637856378563785637856378563785637856378563785637856378563785637856378563785637856378563785637856378563785637856378563785637856388563885638856388563885638856388563885638856388563885638856388563885638856388563885638856388563885638856388563885638856388563885638856398563985639856398563985639856398563985639856398563985639856398563985639856398563985641856418564185641856428564285642856428564285642856438564485644856448564485645857588581085810858108581085810858108581085810858138581385814858148581485814858148581485815858168581685816858168581685816858168581685816858168581685816858168581685816858168581685817858178581885819858198587185871858718587185871858718587185871858718587185871858748587485874858748587685876858768587685876858768587685876858768587685876858768587685876858768587685876858768587685876858768587685876858768587685876858768587685876858768587685876858768587685876858768587685876858768587685876858768587685876858768587685876858768587685876858768587685876858768587685876858768587685876858768587685876858768587685876858768587685876858768587685876858768587685876858768587685877858778587785877858778587785877858778587785877858778587785877858778587785877858778587785877858778587785877858778587785877858778587785877858778587785877858778587785877858778587785877858778587785877858778587785971859718597185971859718597185988859888599886002860028600286002860028600286002860028600586051860598605986068860688606886068860688606986069860708607186071861288612886128861288612886128861288612886128861308614286142861428614286142861428615586155861558615586157861578615786157861578615786157861578615786157861578615786157861578615786157861578615786157861578615786157861578615786157861578615786157861578615786157861578615786157861578615786157861578615786157861578615786157861578615786157861578615786157861578615786157861578615786157861578615786157861578615786157861578615786157861578615786157861578615786157861578615786157861578615786157861588615886158861588615886158861588615886158861588615886158861588615886158861588615886158861588615886158861588615886158861588615886158861588615886158861588615886158861588615886158861588615886158861588615886158867178672086720867208672086720867208672086720867208672086720867208672086721867218672286723867238677486774867748677486774867748677486774867748677486774867778677786777867778677986779867798677986779867798677986779867798677986779867798677986779867798677986779867798677986779867798677986779867798677986779867798677986779867798677986779867798677986779867798677986779867798677986779867798677986779867798677986779867798677986779867798677986779867798677986779867798677986779867798677986779867798677986779867798677986779867798677986779867798677986779867798677986780867808678086780867808678086780867808678086780867808678086780867808678086780867808678086780867808678086780867808678086780867808678086780867808678086780867808678086780867808678086780867808678086780867808678086869868698686986869868698687986883868838688386883868838688386883868838688686932869408694086949869498694986949869498695086950869518695286952870088700887008870088700887008870088700887008870108702287022870228702287022870228703587035870358703587037870378703787037870378703787037870378703787037870378703787037870378703787037870378703787037870378703787037870378703787037870378703787037870378703787037870378703787037870378703787037870378703787037870378703787037870378703787037870378703787037870378703787037870378703787037870378703787037870378703787037870378703787037870378703787037870378703787037870378703787037870378703787037870388703887038870388703887038870388703887038870388703887038870388703887038870388703887038870388703887038870388703887038870388703887038870388703887038870388703887038870388703887038870388703887038870388703887038875848758787587875878758787587875878758787587875878758787587875878758887588875898759087590876418764187641876418764187641876418764187641876418764187644876448764487644876468764687646876468764687646876468764687646876468764687646876468764687646876468764687646876468764687646876468764687646876468764687646876468764687646876468764687646876468764687646876468764687646876468764687646876468764687646876468764687646876468764687646876468764687646876468764687646876468764687646876468764687646876468764687646876468764687646876468764687646876468764687646876468764687647876478764787647876478764787647876478764787647876478764787647876478764787647876478764787647876478764787647876478764787647876478764787647876478764787647876478764787647876478764787647876478764787647876478764787736877368773687736877368773687746877508775087750877508775087750877508775087753877998780787807878168781687816878168781687817878178781887819878198787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787887878878788787987879878798787987879878798787987879878798787987879878798787987879878798787987879878798787987879878798787987879878798788187893878938789387893878938789387906879068790687906879088790887908879088790887908879088790887908879088790887908879088790887908879088790887908879088790887908879088790887908879088790887908879088790887908879088790887908879088790887908879088790887908879088790887908879088790887908879088790887908879088790887908879088790887908879088790887908879088790887908879088790887908879088790887908879088790887908879088790887908879088790887908879088790987909879098790987909879098790987909879098790987909879098790987909879098790987909879098790987909879098790987909879098791087910879108791087910879108791087910879108791087910879108791087910879108791087910879108851688519885198851988519885198851988519885198851988519885198851988520885208852188522885228857488574885748857488574885748857488574885778857788685886858868588685886898868988689886898868988689886898868988692887388874688746887558875588755887558875588756887568875788758887588881888818888188881888818888188881888818888188882088833888338883388833888338883388846888468884688846888488884888848888488884888848888488884888848888488884888848888488884888848888488884888848888488884888848888488884888848888488884888848888488884888848888488884888848888488884888848888488884888848888488884888848888488884888848888488884888848888488884888848888488884888848888488884888848888488884888848888488884888848888488884888848888488884888848888488884888848888488884888848888488884988849888498884988849888498884988849888498884988849888498884988849888498884988849888498884988849888498884988849888498885088850888508885088850888508885088850888508885088850888508885088850888508885088850888508954689549895498954989549895498954989549895498954989549895498954989553895538955389553895568960289610896108961689616896168961689616896168961689617896178961889619896198967389673896738967389673896738967389673896738967589684896848968489684896868968689686896868968689686896868968689686896868968689686896868968689686896868968689686896868968689686896868968689686896868968689686896868968689686896868968689686896868968689686896868968689686896868968689686896868968689686896868968689686896868968689686896868968689686896868968689686896868968689686896868968689686896868968689686896868968689686896868968689686896868968689686896868968789687896878968789687896878968789687896878968789687896878968789687896878968789687896878968789687896878968789687896878968789687896878968789687896878968789687896878968789687896878968789687896878968789687896878968789990899939075790757907679076790771907719077990779907799077990782908289082890828908289082890838908989089890898908989089890898908989089890898909009091390926909269092690926909269092690926909269092690926909269092690926909269092690926909269092690926909269092690926909269092690926909269092690926909269092690926909269092690926909269092690926909269092690926909269092690926909269092690926909269092690926909269092690926909269092690926909269092690926909269092690926909269092690926909269092690926909269092690926909269092690926909269092690926909269092690926909279092790927909279092790927909279092790927909279092790927909279092790927909279092790927909279092790927909279092790927909279092790927909289092890928909289092890928909289092890928909289092890928909289092890928909289092890930909309093090930909319093190931909319093190931909329093390933909339093390935910489110091100911009110091100911009110091100911039110391104911049110491104911049110491105911069110691106911069110691109911099110991109911099110991109911099110991109911099110991109911099111091110911119111291112911649116491164911649116491164911649116491164911649116491167911679116791167911699116991169911699116991169911699116991169911699116991169911699116991169911699116991169911699116991169911699116991169911699116991169911699116991169911699116991169911699116991169911699116991169911699116991169911699116991169911699116991169911699116991169911699116991169911699116991169911699116991169911699116991169911699116991169911699116991169911699116991169911699116991169911699116991170911709117091170911709117091170911709117091170911709117091170911709117091170911709117091170911709117091170911709117091170911709117091170911709117091170911709117091170911709117091170911709117091170911709117091269912699126991269912699127991283912839128391283912839128391283912839128691332913409134091349913499134991349913499135091350913519135291352914119141191411914119141191411914119141191411914139142591425914259142591425914259143891438914389143891440914409144091440914409144091440914409144091440914409144091440914409144091440914409144091440914409144091440914409144091440914409144091440914409144091440914409144091440914409144091440914409144091440914409144091440914409144091440914409144091440914409144091440914409144091440914409144091440914409144091440914409144091440914409144091440914409144091440914409144091440914409144091440914419144191441914419144191441914419144191441914419144191441914419144191441914419144191441914419144191441914419144191441914429144291442914429144291442914429144291442914429144291442914429144291442914429144291442920199202292022920229202292022920229202292022920229202292022920229202392023920249202592025920779207792077920779207792077920779207792077920779207792080920809208092080920829208292082920829208292082920829208292082920829208292082920829208292082920829208292082920829208292082920829208292082920829208292082920829208292082920829208292082920829208292082920829208292082920829208292082920829208292082920829208292082920829208292082920829208292082920829208292082920829208292082920829208292082920829208292082920829208292082920829208292082920829208292082920829208292083920839208392083920839208392083920839208392083920839208392083920839208392083920839208392083920839208392083920839208392083920839208392083920839208392083920839208392083920839208392083920839208392083920839208392182921829218292182921829219292196921969219692196921969219692196921969219992245922539225392262922629226292262922629226392263922649226592265923249232492324923249232492324923249232492324923269233892338923389233892338923389235192351923519235192353923539235392353923539235392353923539235392353923539235392353923539235392353923539235392353923539235392353923539235392353923539235392353923539235392353923539235392353923539235392353923539235392353923539235392353923539235392353923539235392353923539235392353923539235392353923539235392353923539235392353923539235392353923539235392353923539235392353923539235392353923539235392353923549235492354923549235492354923549235492354923549235492354923549235492354923549235492354923549235492354923549235492354923549235492354923549235492354923549235492354923549235492354923549235492354923549235492354929299293293443934549345893464934939351293520935209352693526935269352693529935779357793593936069360693606936069360693606936079360893608936729367793677936779367793677936779367793678936839369693710937109371093710937109371093722937229372393724937249372493724937249372493724937249372493724937249372493724937249372493724937249372493724937249372493724937249372493724937249372493724937249372493724937249372493724937249372493724937249372493724937249372493724937249372493724937249372493724937249372493724937249372493724937249372493724937249372493724937249372493724937249372493724937249372493724937249372493724937249372493724937259372593725937259372593725937259372593725937259372593725937259372593725937259372593725937259372593725937259372593725937269372693726937269372693726937269372693726937269372693726937269372693726937269372693726938859389093890938909389093969939759397593975939759397593975939769397793977940299402994029940299402994029940299402994032940369405694056940569405994175942279422794227942279422794227942279422794230942309423194231942319423194231942319423294233942339423394233942339499194991950019500195005950059501395013950139501395016950629506295062950629506295072951329513295132951329513295132951329513295132951349514795160951609516095160951609516095160951609516095160951609516095160951609516095160951609516095160951609516095160951609516095160951609516095160951609516095160951609516095160951609516095160951609516095160951609516095160951609516095160951609516095160951609516095160951609516095160951609516095160951609516095160951609516095160951609516095160951609516095160951609516095160951609516095160951609516095160951619516195161951619516195161951619516195161951619516195161951619516195161951619516195161951619516195161951619516195161951619516195161951629516295162951629516295162951629516295162951629516295162951629516295162951629516295164951649516495164951659516595165951659516595165951669516795167951679516795168951689516895168951729517295912959129592095920959209592095923959699596995969959699596995979960399603996039960399603996039960399603996039960419605496067960679606796067960679606796067960679606796067960679606796067960679606796067960679606796067960679606796067960679606796067960679606796067960679606796067960679606796067960679606796067960679606796067960679606796067960679606796067960679606796067960679606796067960679606796067960679606796067960679606796067960679606796067960679606796067960679606796067960679606796067960679606796067960679606796067960689606896068960689606896068960689606896068960689606896068960689606896068960689606896068960689606896068960689606896068960689606896068960699606996069960699606996069960699606996069960699606996069960699606996069960699606996071960719607196071960729607296072960729607296072960739607496074960749607496075961849623696236962369623696236962369623696236962399623996240962409624096240962409624096241962429624296242962429624296242963409634196341963419634196341963419634196341963419634196341963419634196341963419634196341963419634196341963419634196341963419634196341963419634596345963459634596345963459634596345963459634596345963459634596345963459634596345963459634596345963459634596345963459634596345963459634596345963459634596345963459634596345963459634596345963459634596345963459634596345963459634596345963459634596346963469634696346963469634696346963469634696346963469634696346963469634696346963469634696346963469634696346963469634696346963469634696346963469634696346963469634696346963469634696346963469634696346963469634696346963469634696346963469634696346963469634696346963469634696346963469634696346963469634696346963469634696346963469634696346963469634696347963479634796347963479634796347963479634796347963479634796347963479634796347963479634796347963479634796347963479634796347963479634796347963479634796347963479634796347963479634796347963479634796347963479634796347963479634796347963479634796347963479634796347963479634796347963479634796347963479634796347963479634796347963479634796347963479634796347963479634796347963479635196351963519635696356963569635796357963579635796357963579635796357963579635796357963579635796357963579635796357963579635796357963579635796357963579635796357963579635796361963619636196361963619636196361963619636196361963619636196361963619636196361963619636196361963619636196361963619636196361963619636196361963619636196361963619636196361963619636196361963619636196361963619636196361963619636196361963619636196361963619636196361963619636196361963619636196361963619636196361963619636196361963619636196361963619636196361963619636196361963619636196361963619636196361963619636196361963619636196361963619636196361963619636196361963619636196361963619636196361963619636196361963619636196361963619636196361963619636196361963619636196361963619636196361963619636196361963619636296362963629636296362963629636296362963629636296362963629636296362963629636296362963629636296362963629636296362963629636296362963629636296362963629636296362963629636296362963629636296362963639636396363963639636396363963639636396363963639636396363963639636396363963639636396363963639636396363963639636396363963639636396363963639636396363963639636396363963639636396462965779662996629966299662996629966299662996629966329663296633966339663396633966339663396634966359663596635966359663597391973919739997399973999739997402974489744897448974489744897457975199751997519975199751997519975199751997519975219753497547975479754797547975479754797547975479754797547975479754797547975479754797547975479754797547975479754797547975479754797547975479754797547975479754797547975479754797547975479754797547975479754797547975479754797547975479754797547975479754797547975479754797547975479754797547975479754797547975479754797547975479754797547975479754797547975479754797547975479754797547975479754797547975479754797547975489754897548975489754897548975489754897548975489754897548975489754897548975489754897548975489754897548975489754897548975489754897548975499754997549975499754997549975499754997549975499754997549975499754997549975499754997551975519755197551975529755297552975529755297552975539755497554975549755497555975559755597555983039830398311983119831198311983149836098360983609836098360983709843198431984319843198431984319843198431984319843398446984599845998459984599845998459984599845998459984599845998459984599845998459984599845998459984599845998459984599845998459984599845998459984599845998459984599845998459984599845998459984599845998459984599845998459984599845998459984599845998459984599845998459984599845998459984599845998459984599845998459984599845998459984599845998459984599845998459984599845998459984599845998459984599845998459984599846098460984609846098460984609846098460984609846098460984609846098460984609846098460984609846098460984609846098460984609846098460984609846198461984619846198461984619846198461984619846198461984619846198461984619846198461984639846398463984639846498464984649846498464984649846598466984669846698466984749858798639986399863998639986399863998639986399864298642986439864398643986439864398643986449864598645986459864598645986459864598645993939939399401994019940199401994049945099450994509945099450994599952099520995209952099520995209952099520995209952299535995489954899548995489954899548995489954899548995489954899548995489954899548995489954899548995489954899548995489954899548995489954899548995489954899548995489954899548995489954899548995489954899548995489954899548995489954899548995489954899548995489954899548995489954899548995489954899548995489954899548995489954899548995489954899548995489954899548995489954899548995489954899548995489954899548995489954999549995499954999549995499954999549995499954999549995499954999549995499954999549995499954999549995499954999549995499954999549995499955099550995509955099550995509955099550995509955099550995509955099550995509955099550995529955299552995529955399553995539955399553995539955499555995559955799557995579967099722997229972299722997229972299722997229972599725997259972599725997269972699726997269972699726997279972899728997289972899728997289984499896998969989699896998969989699896998969989999899999009990099900999009990099900999019990299902999029990299902100645100645100653100653100653100653100656100702100702100702100702100702100711100772100772100772100772100772100772100772100772100772100774100787100800100800100800100800100800100800100800100800100800100800100800100800100800100800100800100800100800100800100800100800100800100800100800100800100800100800100800100800100800100800100800100800100800100800100800100800100800100800100800100800100800100800100800100800100800100800100800100800100800100800100800100800100800100800100800100800100800100800100800100800100800100800100800100800100800100800100800100800100800100800100800100800100800100800100800100800100800100800100800100801100801100801100801100801100801100801100801100801100801100801100801100801100801100801100801100801100801100801100801100801100801100801100801100801100801100801100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100804100804100804100804100805100805100805100805100805100805100806100807100807100807100807100818100818100818100818100934100986100986100986100986100986100986100986100986100989100989100990100990100990100990100990100990100991100992100992100992100992100992101759101759101769101769101773101773101781101781101781101781101784101830101830101830101830101830101840101901101901101901101901101901101901101901101901101901101903101916101929101929101929101929101929101929101929101929101929101929101929101929101929101929101929101929101929101929101929101929101929101929101929101929101929101929101929101929101929101929101929101929101929101929101929101929101929101929101929101929101929101929101929101929101929101929101929101929101929101929101929101929101929101929101929101929101929101929101929101929101929101929101929101929101929101929101929101929101929101929101929101929101929101929101929101929101929101929101929101930101930101930101930101930101930101930101930101930101930101930101930101930101930101930101930101930101930101930101930101930101930101930101930101930101930101930101931101931101931101931101931101931101931101931101931101931101931101931101931101931101931101931101931101933101933101933101933101934101934101934101934101934101934101935101936101936101936101936101937101937102052102104102104102104102104102104102104102104102104102107102107102108102108102108102108102108102108102109102110102110102110102110102110102865102865102873102873102873102873102876102922102922102922102922102922102932102994102994102994102994102994102994102994102994102994102996103009103022103022103022103022103022103022103022103022103022103022103022103022103022103022103022103022103022103022103022103022103022103022103022103022103022103022103022103022103022103022103022103022103022103022103022103022103022103022103022103022103022103022103022103022103022103022103022103022103022103022103022103022103022103022103022103022103022103022103022103022103022103022103022103022103022103022103022103022103022103022103022103022103022103022103022103022103022103022103022103023103023103023103023103023103023103023103023103023103023103023103023103023103023103023103023103023103023103023103023103023103023103023103023103023103023103023103024103024103024103024103024103024103024103024103024103024103024103024103024103024103024103024103024103026103026103026103026103027103027103027103027103027103027103028103029103029103029103029103031103031103031103031103034103034103146103198103198103198103198103198103198103198103198103201103201103202103202103202103202103202103202103203103204103204103204103957103957103965103965103965103965103968104014104014104014104014104014104023104085104085104085104085104085104085104085104085104085104087104100104113104113104113104113104113104113104113104113104113104113104113104113104113104113104113104113104113104113104113104113104113104113104113104113104113104113104113104113104113104113104113104113104113104113104113104113104113104113104113104113104113104113104113104113104113104113104113104113104113104113104113104113104113104113104113104113104113104113104113104113104113104113104113104113104113104113104113104113104113104113104113104113104113104113104113104113104113104113104113104114104114104114104114104114104114104114104114104114104114104114104114104114104114104114104114104114104114104114104114104114104114104114104114104114104114104114104115104115104115104115104115104115104115104115104115104115104115104115104115104115104115104115104115104117104117104117104117104118104118104118104118104118104118104119104120104120104124104124104124104124104124104124104900104900104910104910104914104914104922104922104922104922104925104971104971104971104971104971104981105043105043105043105043105043105043105043105043105043105045105058105071105071105071105071105071105071105071105071105071105071105071105071105071105071105071105071105071105071105071105071105071105071105071105071105071105071105071105071105071105071105071105071105071105071105071105071105071105071105071105071105071105071105071105071105071105071105071105071105071105071105071105071105071105071105071105071105071105071105071105071105071105071105071105071105071105071105071105071105071105071105071105071105071105071105071105071105071105071105071105072105072105072105072105072105072105072105072105072105072105072105072105072105072105072105072105072105072105072105072105072105072105072105072105072105072105072105073105073105073105073105073105073105073105073105073105073105073105073105073105073105073105073105073105075105075105075105075105076105076105076105076105076105076105077105078105078105078105078105079105191105243105243105243105243105243105243105243105243105246105246105247105247105247105247105247105247105248105249105249105249105249105249105249105249105249106026106026106036106036106040106040106048106048106048106048106051106097106097106097106097106097106107106170106170106170106170106170106170106170106170106170106172106185106198106198106198106198106198106198106198106198106198106198106198106198106198106198106198106198106198106198106198106198106198106198106198106198106198106198106198106198106198106198106198106198106198106198106198106198106198106198106198106198106198106198106198106198106198106198106198106198106198106198106198106198106198106198106198106198106198106198106198106198106198106198106198106198106198106198106198106198106198106198106198106198106198106198106198106198106198106198106198106199106199106199106199106199106199106199106199106199106199106199106199106199106199106199106199106199106199106199106199106199106199106199106199106199106199106199106200106200106200106200106200106200106200106200106200106200106200106200106200106200106200106200106200106202106202106202106202106203106203106203106203106203106203106204106205106205106209106317106369106369106369106369106369106369106369106369106372106372106372106372106373106373106373106373106373106373106374106375106375106375106378106378106378106378107144107144107152107152107152107152107155107201107201107201107201107201107211107273107273107273107273107273107273107273107273107273107275107288107301107301107301107301107301107301107301107301107301107301107301107301107301107301107301107301107301107301107301107301107301107301107301107301107301107301107301107301107301107301107301107301107301107301107301107301107301107301107301107301107301107301107301107301107301107301107301107301107301107301107301107301107301107301107301107301107301107301107301107301107301107301107301107301107301107301107301107301107301107301107301107301107301107301107301107301107301107301107301107302107302107302107302107302107302107302107302107302107302107302107302107302107302107302107302107302107302107302107302107302107302107302107302107302107302107302107303107303107303107303107303107303107303107303107303107303107303107303107303107303107303107303107303107305107305107305107305107306107306107306107306107306107306107307107308107308107308107308107308107416107468107468107468107468107468107468107468107468107471107471107472107472107472107472107472107472107473107474107474107474107474107474107474107474107474107475107475107475107475107475107587107639107639107639107639107639107639107639107639107642107642107642107642107643107643107643107643107643107643107644107645107645107645108413108413108423108423108427108427108435108435108435108435108438108484108484108484108484108484108494108557108557108557108557108557108557108557108557108557108559108572108585108585108585108585108585108585108585108585108585108585108585108585108585108585108585108585108585108585108585108585108585108585108585108585108585108585108585108585108585108585108585108585108585108585108585108585108585108585108585108585108585108585108585108585108585108585108585108585108585108585108585108585108585108585108585108585108585108585108585108585108585108585108585108585108585108585108585108585108585108585108585108585108585108585108585108585108585108585108585108586108586108586108586108586108586108586108586108586108586108586108586108586108586108586108586108586108586108586108586108586108586108586108586108586108586108586108587108587108587108587108587108587108587108587108587108587108587108587108587108587108587108587108587108589108589108589108589108590108590108590108590108590108590108591108592108592108592108592108592108592108592108592109368109368109378109378109382109382109390109390109390109390109393109439109439109439109439109439109449109511109511109511109511109511109511109511109511109511109513109526109539109539109539109539109539109539109539109539109539109539109539109539109539109539109539109539109539109539109539109539109539109539109539109539109539109539109539109539109539109539109539109539109539109539109539109539109539109539109539109539109539109539109539109539109539109539109539109539109539109539109539109539109539109539109539109539109539109539109539109539109539109539109539109539109539109539109539109539109539109539109539109539109539109539109539109539109539109539109539109540109540109540109540109540109540109540109540109540109540109540109540109540109540109540109540109540109540109540109540109540109540109540109540109540109540109540109541109541109541109541109541109541109541109541109541109541109541109541109541109541109541109541109541109543109543109543109543109544109544109544109544109544109544109545109546109546109546109546109549109661109713109713109713109713109713109713109713109713109716109716109717109717109717109717109717109717109718109719109719109719109719109719109719109719109719109721109721109721109837109889109889109889109889109889109889109889109889109892109892109892109892109892109893109893109893109893109893109893109894109895109895109895110650110650110658110658110658110658110661110707110707110707110707110707110717110779110779110779110779110779110779110779110779110779110781110794110807110807110807110807110807110807110807110807110807110807110807110807110807110807110807110807110807110807110807110807110807110807110807110807110807110807110807110807110807110807110807110807110807110807110807110807110807110807110807110807110807110807110807110807110807110807110807110807110807110807110807110807110807110807110807110807110807110807110807110807110807110807110807110807110807110807110807110807110807110807110807110807110807110807110807110807110807110807110807110808110808110808110808110808110808110808110808110808110808110808110808110808110808110808110808110808110808110808110808110808110808110808110808110808110808110808110809110809110809110809110809110809110809110809110809110809110809110809110809110809110809110809110809110811110811110811110811110812110812110812110812110812110812110813110814110814110814110814110815110815110815110815110815110815110815110815110815110815110815110815110815110815110815110815110815110815110815110815110815110815110815110815110815110926110978110978110978110978110978110978110978110978110981110981110981110981110982110982110982110982110982110982110983110984110984110984111763111763111773111773111777111777111785111785111785111785111788111834111834111834111834111834111844111907111907111907111907111907111907111907111907111907111909111922111935111935111935111935111935111935111935111935111935111935111935111935111935111935111935111935111935111935111935111935111935111935111935111935111935111935111935111935111935111935111935111935111935111935111935111935111935111935111935111935111935111935111935111935111935111935111935111935111935111935111935111935111935111935111935111935111935111935111935111935111935111935111935111935111935111935111935111935111935111935111935111935111935111935111935111935111935111935111935111936111936111936111936111936111936111936111936111936111936111936111936111936111936111936111936111936111936111936111936111936111936111936111936111936111936111936111937111937111937111937111937111937111937111937111937111937111937111937111937111937111937111937111937111939111939111939111939111940111940111940111940111940111940111941111942111942111942111942111944111944111944111944111945
File scan done, we have: 111945 files to analize
Suspicious behavior found in: createpayment.php-
Full path:
4star/m/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:13 12/05/2025
Last modified:
18:46:08 14/04/2022
MD5 hash:
05132f436e56ff2164ecc165347219ae
Filesize:
1.71 KB
suspicious functions used:
curl_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
4star/m/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:13 12/05/2025
Last modified:
18:46:08 14/04/2022
MD5 hash:
9a3f22521ad987e86f84c4f5f688d5b7
Filesize:
713 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index.php-
Full path:
4star/m/index.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:02 12/05/2025
Last modified:
23:29:55 03/10/2023
MD5 hash:
41558736b037228ea93df03cae70eb87
Filesize:
4.31 KB
suspicious functions used:
curl_exec (line:70); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec.php-
Full path:
4star/m/login_exec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:13 12/05/2025
Last modified:
06:36:13 01/03/2024
MD5 hash:
546079435939a5715c5a59b858074401
Filesize:
3.39 KB
suspicious functions used:
curl_exec (line:45); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
4star/m/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:13 12/05/2025
Last modified:
18:46:12 14/04/2022
MD5 hash:
7d8e71ceda3ffb74623e0c4a814715af
Filesize:
1.53 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery.php-
Full path:
4star/m/PaymentOnlineQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:13 12/05/2025
Last modified:
18:46:11 14/04/2022
MD5 hash:
d432c6fc438ad1d1a3a6bb3bcc97e99a
Filesize:
13.91 KB
suspicious functions used:
curl_exec (line:240);curl_exec (line:335); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery2.php-
Full path:
4star/m/PaymentOnlineQuery2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:13 12/05/2025
Last modified:
18:46:12 14/04/2022
MD5 hash:
f35074cd0952073b9cd9a89625aa490d
Filesize:
15.21 KB
suspicious functions used:
curl_exec (line:40);curl_exec (line:252); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
4star/web/bkash/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:13 12/05/2025
Last modified:
18:49:33 14/04/2022
MD5 hash:
6175301f744b22b7db70ba598a991f8b
Filesize:
1.64 KB
suspicious functions used:
curl_exec (line:36); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
4star/web/bkash/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:13 12/05/2025
Last modified:
18:49:34 14/04/2022
MD5 hash:
19be365d26141eaecead7ef0ada0e75c
Filesize:
1.3 KB
suspicious functions used:
curl_exec (line:31); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: grant.php-
Full path:
4star/web/bkash/grant.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:13 12/05/2025
Last modified:
18:49:44 14/04/2022
MD5 hash:
da5499d260dc78ea4fcd71227cc6c484
Filesize:
2.01 KB
suspicious functions used:
curl_exec (line:41);curl_exec (line:63); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: query.php-
Full path:
4star/web/bkash/query.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:13 12/05/2025
Last modified:
18:49:44 14/04/2022
MD5 hash:
f3ed9045f3a073e2cdc8561d500bda89
Filesize:
1.65 KB
suspicious functions used:
curl_exec (line:33); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
4star/web/bkash/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:13 12/05/2025
Last modified:
18:49:44 14/04/2022
MD5 hash:
f50b33eeb31927b2c081195618d48b8d
Filesize:
1.88 KB
suspicious functions used:
curl_exec (line:48); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: trxID.php-
Full path:
4star/web/bkash/trxID.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:13 12/05/2025
Last modified:
18:49:44 14/04/2022
MD5 hash:
9bcb8e70728fd25807c4db8916166d74
Filesize:
1.44 KB
suspicious functions used:
curl_exec (line:31); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: class.phpmailer.php-
Full path:
4star/web/email/class.phpmailer.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:14 12/05/2025
Last modified:
16:54:22 27/06/2022
MD5 hash:
68468d69b47fffecc89df57e27c5a781
Filesize:
143.32 KB
suspicious functions used:
`$DKIM_private` (line:428);popen (line:1387);popen (line:1408);base64_decode (line:3410);`$mail->set('SMTPSecure', 'tls');` (line:3688);`$mail->SMTPSecure = 'tls';` (line:3690); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: class.smtp.php-
Full path:
4star/web/email/class.smtp.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:14 12/05/2025
Last modified:
16:54:22 27/06/2022
MD5 hash:
aa8478329268e5438a4469c268337a10
Filesize:
41.44 KB
suspicious functions used:
base64_decode (line:513);base64_decode (line:533); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: JSON.php-
Full path:
4star/web/inc/JSON.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:14 12/05/2025
Last modified:
18:50:26 14/04/2022
MD5 hash:
f5a34509e06231308becbe320ade9ff6
Filesize:
33.22 KB
suspicious functions used:
eval (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: jqgrid.php-
Full path:
4star/web/inc/jqgrid.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:15 12/05/2025
Last modified:
18:50:26 14/04/2022
MD5 hash:
71027a29e71e0626d8b57cbb631e6d98
Filesize:
23.92 KB
suspicious functions used:
eval (line:397); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: smsapicore.php-
Full path:
4star/web/include/smsapicore.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:15 12/05/2025
Last modified:
06:09:51 01/03/2024
MD5 hash:
8efc5fda3cc52645fff6522f882c7159
Filesize:
867 B
suspicious functions used:
curl_exec (line:13); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: telegramapicore.php-
Full path:
4star/web/include/telegramapicore.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:15 12/05/2025
Last modified:
18:50:26 14/04/2022
MD5 hash:
e14a2b69c8631bbd2f6bde8a3a2f2e86
Filesize:
2.29 KB
suspicious functions used:
curl_exec (line:51); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Changes.txt-
Full path:
4star/web/js/jqgrid/js/Changes.txt
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:15 12/05/2025
Last modified:
18:51:02 14/04/2022
MD5 hash:
c0a4adbc3f1c6d592cb4fa8433fee9ea
Filesize:
44.32 KB
suspicious functions used:
system (line:87); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: AutoActiveClientsCount1.php-
Full path:
4star/web/AutoActiveClientsCount1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:15 12/05/2025
Last modified:
07:56:20 03/11/2022
MD5 hash:
6f5377b6fff4cd80c856c4128799cb44
Filesize:
3.21 KB
suspicious functions used:
system (line:31); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Network.php-
Full path:
4star/web/Network.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:17 12/05/2025
Last modified:
18:49:08 14/04/2022
MD5 hash:
4a7af2139668235381fa59caa8f2c9d3
Filesize:
21.9 KB
suspicious functions used:
system (line:146);system (line:263); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkLoad.php-
Full path:
4star/web/NetworkLoad.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:17 12/05/2025
Last modified:
18:49:09 14/04/2022
MD5 hash:
e1632e66ee1b7394d3fb82751b924abe
Filesize:
2.83 KB
suspicious functions used:
system (line:81); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery.php-
Full path:
4star/web/PaymentOnlineQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:18 12/05/2025
Last modified:
18:49:10 14/04/2022
MD5 hash:
369d4a034371de125c5a10fffce87bab
Filesize:
13.91 KB
suspicious functions used:
curl_exec (line:240);curl_exec (line:335); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery2.php-
Full path:
4star/web/PaymentOnlineQuery2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:18 12/05/2025
Last modified:
18:49:10 14/04/2022
MD5 hash:
332b9632d145339d837fbef04cb19e7f
Filesize:
18.97 KB
suspicious functions used:
curl_exec (line:42);curl_exec (line:251); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentWebhook.php-
Full path:
4star/web/PaymentWebhook.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:18 12/05/2025
Last modified:
08:32:03 01/03/2024
MD5 hash:
a2f322c94787630ab1e0c8ca35fc5ba1
Filesize:
18.6 KB
suspicious functions used:
base64_decode (line:30);curl_exec (line:41);curl_exec (line:422); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMS.php-
Full path:
4star/web/SMS.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:18 12/05/2025
Last modified:
04:05:02 13/10/2023
MD5 hash:
e364be17fd02968644b55a3d6926f413
Filesize:
23.63 KB
suspicious functions used:
curl_exec (line:53); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMSAddSave.php-
Full path:
4star/web/SMSAddSave.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:18 12/05/2025
Last modified:
18:49:22 14/04/2022
MD5 hash:
5e8b43b3bc2febe3a611a5bd9aa8fc28
Filesize:
1.71 KB
suspicious functions used:
curl_exec (line:34); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index.php-
Full path:
4star/web/index.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:19 12/05/2025
Last modified:
23:30:16 03/10/2023
MD5 hash:
c91f45ea1f8d1d0008a37b0bf0526573
Filesize:
6.68 KB
suspicious functions used:
curl_exec (line:130); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
4star/web/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:19 12/05/2025
Last modified:
18:49:06 14/04/2022
MD5 hash:
c46a50905333286f45dfeacf010851ab
Filesize:
716 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: company_info.php-
Full path:
4star/web/company_info.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
18:05:56 11/05/2025
Last modified:
13:01:02 09/04/2024
MD5 hash:
e0fc10181a5e19eed1173cfa55387eb2
Filesize:
5.93 KB
suspicious functions used:
curl_exec (line:87); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
4star/web/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:19 12/05/2025
Last modified:
18:49:05 14/04/2022
MD5 hash:
c8a7ce9b69ebed3509cee2952c04cb0c
Filesize:
1.7 KB
suspicious functions used:
curl_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: sms_deliverey_report.php-
Full path:
4star/web/sms_deliverey_report.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:19 12/05/2025
Last modified:
18:49:23 14/04/2022
MD5 hash:
15eda78f2292f68b63aae44e6207e0d8
Filesize:
2.96 KB
suspicious functions used:
`api_id` != '' AND `delivery_report` != 'DELIVRD' AND `delivery_report` = '' or `delivery_report` = 'SENT' or `delivery_report` = 'PENDING' AND c_cell REGEXP '^-?[0-9]+$' ORDER BY ` (line:8);curl_exec (line:18);curl_exec (line:41); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: testttttt.php-
Full path:
4star/web/testttttt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:19 12/05/2025
Last modified:
10:27:23 04/10/2023
MD5 hash:
b1988a4be29e191ad935fb409a4174ee
Filesize:
2 KB
suspicious functions used:
curl_exec (line:47); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: emp_salary_advence_find.php-
Full path:
4star/web/emp_salary_advence_find.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:19 12/05/2025
Last modified:
18:49:06 14/04/2022
MD5 hash:
8cb12a79d5e1d31d92670d721dabb5aa
Filesize:
2.25 KB
suspicious functions used:
`expanse` WHERE `type` = '2' AND `status` = '2' AND ex_by = '$e_id' AND MONTH(`, `) = MONTH('$lastmonth') AND YEAR(`, `) = YEAR('$lastmonth') GROUP BY ` (line:8);`e_id` = '$e_id' AND ` (line:12); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tis-news.php-
Full path:
4star/web/tis-news.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:08 12/05/2025
Last modified:
07:54:35 09/04/2024
MD5 hash:
ed23ca98b77c5321b4485e85eb2ea64d
Filesize:
3.67 KB
suspicious functions used:
curl_exec (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
4star/web/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:19 12/05/2025
Last modified:
18:49:23 14/04/2022
MD5 hash:
7d8e71ceda3ffb74623e0c4a814715af
Filesize:
1.53 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ip-ping-checker.php-
Full path:
4star/web/ip-ping-checker.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:19 12/05/2025
Last modified:
18:49:07 14/04/2022
MD5 hash:
0d28f3053b73b3fe2885cf519ee17c12
Filesize:
2.64 KB
suspicious functions used:
curl_exec (line:81); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec.php-
Full path:
4star/web/login_exec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:08 12/05/2025
Last modified:
06:36:13 01/03/2024
MD5 hash:
d27302cfb6badc5c566765028e20bd11
Filesize:
3.59 KB
suspicious functions used:
curl_exec (line:50); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec1.php-
Full path:
4star/web/login_exec1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:19 12/05/2025
Last modified:
18:49:08 14/04/2022
MD5 hash:
4f75b914e1b47a355be8cbc73e4e1407
Filesize:
3.91 KB
suspicious functions used:
curl_exec (line:53); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook.php-
Full path:
4star/web/webhook.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:20 12/05/2025
Last modified:
09:21:20 01/03/2024
MD5 hash:
e1b6f4077699b0e0f301241fc82ec7d0
Filesize:
19.67 KB
suspicious functions used:
base64_decode (line:27);curl_exec (line:38);curl_exec (line:419); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-helper.php-
Full path:
7star/m/nagad-helper.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:20 12/05/2025
Last modified:
01:04:39 07/10/2024
MD5 hash:
2bb70c44d68202e0a0cd8ae1388f0b1b
Filesize:
6.74 KB
suspicious functions used:
curl_exec (line:61);base64_decode (line:97); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery2.php-
Full path:
7star/m/PaymentOnlineQuery2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:20 12/05/2025
Last modified:
01:04:40 07/10/2024
MD5 hash:
3660992067d5591fc79ce89d6dbb9274
Filesize:
19.08 KB
suspicious functions used:
curl_exec (line:41);curl_exec (line:254); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
7star/m/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:21 12/05/2025
Last modified:
01:04:41 07/10/2024
MD5 hash:
7d8e71ceda3ffb74623e0c4a814715af
Filesize:
1.53 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tagreeexpayment.php-
Full path:
7star/m/tagreeexpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:21 12/05/2025
Last modified:
01:04:41 07/10/2024
MD5 hash:
c95e3ee881752db67b4f3597bc58430a
Filesize:
2.46 KB
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ttoken.php-
Full path:
7star/m/ttoken.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:21 12/05/2025
Last modified:
01:04:41 07/10/2024
MD5 hash:
5f2c51c1db5b0defadfb67ce25c0098f
Filesize:
1.54 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
7star/m/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:21 12/05/2025
Last modified:
01:04:37 07/10/2024
MD5 hash:
849185f307be30eafb1bbef93616d8c3
Filesize:
1.71 KB
suspicious functions used:
curl_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: support-action.php-
Full path:
7star/m/support-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:21 12/05/2025
Last modified:
01:04:41 07/10/2024
MD5 hash:
2fc6fd844db911a5502a7a6ae383990f
Filesize:
10.31 KB
suspicious functions used:
curl_exec (line:99); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
7star/m/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:21 12/05/2025
Last modified:
01:04:37 07/10/2024
MD5 hash:
9a3f22521ad987e86f84c4f5f688d5b7
Filesize:
713 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index.php-
Full path:
7star/m/index.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:10 12/05/2025
Last modified:
01:04:37 07/10/2024
MD5 hash:
9a5dc16d9d603e4fe488b2349f6197a3
Filesize:
12.47 KB
suspicious functions used:
base64_decode (line:10);curl_exec (line:183); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery.php-
Full path:
7star/m/PaymentOnlineQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:21 12/05/2025
Last modified:
01:04:39 07/10/2024
MD5 hash:
f6ec1bb356cff5bce71ccc18bbc81b87
Filesize:
21.15 KB
suspicious functions used:
curl_exec (line:287);curl_exec (line:512); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreateagree.php-
Full path:
7star/m/tcreateagree.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:22 12/05/2025
Last modified:
01:04:41 07/10/2024
MD5 hash:
27a10adf4190edc7eceee8cf74a6b72b
Filesize:
999 B
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec.php-
Full path:
7star/m/login_exec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:22 12/05/2025
Last modified:
01:04:37 07/10/2024
MD5 hash:
1f800365ef270564df77d30c1bfd7ed3
Filesize:
5.4 KB
suspicious functions used:
curl_exec (line:66); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec1.php-
Full path:
7star/m/login_exec1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:22 12/05/2025
Last modified:
01:04:38 07/10/2024
MD5 hash:
46b08782f51ba75b23e27183e06370fe
Filesize:
4.28 KB
suspicious functions used:
curl_exec (line:61); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-merchant-callback.php-
Full path:
7star/m/nagad-merchant-callback.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:22 12/05/2025
Last modified:
01:04:39 07/10/2024
MD5 hash:
e48843f21f89612ef44c10150c547139
Filesize:
11.76 KB
suspicious functions used:
curl_exec (line:20); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreatepayment.php-
Full path:
7star/m/tcreatepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:22 12/05/2025
Last modified:
01:04:41 07/10/2024
MD5 hash:
e49de9a33f5164bc2c6b88e4770faaff
Filesize:
1.07 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-snmp-data.php-
Full path:
7star/m/netowrk-snmp-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:22 12/05/2025
Last modified:
01:04:39 07/10/2024
MD5 hash:
b56429056656f0de16982e31853f3304
Filesize:
20.26 KB
suspicious functions used:
shell_exec (line:93);shell_exec (line:102);shell_exec (line:112);shell_exec (line:131);shell_exec (line:141);shell_exec (line:157);shell_exec (line:177);shell_exec (line:187);shell_exec (line:192);shell_exec (line:200);shell_exec (line:220);shell_exec (line:236);`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:249);shell_exec (line:255);shell_exec (line:377); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: texecutepayment.php-
Full path:
7star/m/texecutepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:22 12/05/2025
Last modified:
01:04:41 07/10/2024
MD5 hash:
efbb63dfcfdacb52dec74bffc389bbb3
Filesize:
2.67 KB
suspicious functions used:
curl_exec (line:24); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: billpaycheck.php-
Full path:
7star/web/bkash/billpaycheck.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:22 12/05/2025
Last modified:
01:06:05 07/10/2024
MD5 hash:
38c46efc36b25628fa18bd92ae135af9
Filesize:
796 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
7star/web/bkash/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:22 12/05/2025
Last modified:
01:06:06 07/10/2024
MD5 hash:
6175301f744b22b7db70ba598a991f8b
Filesize:
1.64 KB
suspicious functions used:
curl_exec (line:36); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
7star/web/bkash/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:22 12/05/2025
Last modified:
01:06:06 07/10/2024
MD5 hash:
19be365d26141eaecead7ef0ada0e75c
Filesize:
1.3 KB
suspicious functions used:
curl_exec (line:31); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: grant.php-
Full path:
7star/web/bkash/grant.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:22 12/05/2025
Last modified:
01:06:07 07/10/2024
MD5 hash:
da5499d260dc78ea4fcd71227cc6c484
Filesize:
2.01 KB
suspicious functions used:
curl_exec (line:41);curl_exec (line:63); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: query.php-
Full path:
7star/web/bkash/query.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:22 12/05/2025
Last modified:
01:06:06 07/10/2024
MD5 hash:
f3ed9045f3a073e2cdc8561d500bda89
Filesize:
1.65 KB
suspicious functions used:
curl_exec (line:33); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tagreeexpayment.php-
Full path:
7star/web/bkash/tagreeexpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:22 12/05/2025
Last modified:
01:06:06 07/10/2024
MD5 hash:
a1ba7d36003f72e593615aa32e44acb9
Filesize:
1.58 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreateagree.php-
Full path:
7star/web/bkash/tcreateagree.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:22 12/05/2025
Last modified:
01:06:06 07/10/2024
MD5 hash:
8ae6bdc9f3d4b0cdcf651701a0d9ebab
Filesize:
1.2 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreatepayment.php-
Full path:
7star/web/bkash/tcreatepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:22 12/05/2025
Last modified:
01:06:06 07/10/2024
MD5 hash:
3c978def6cffa0a8db5e86ce127caae6
Filesize:
1.35 KB
suspicious functions used:
curl_exec (line:29); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: texecutepayment.php-
Full path:
7star/web/bkash/texecutepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:22 12/05/2025
Last modified:
01:06:06 07/10/2024
MD5 hash:
d8f24df64623da3cfc2baf48f184a3d1
Filesize:
1.21 KB
suspicious functions used:
curl_exec (line:25); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
7star/web/bkash/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:22 12/05/2025
Last modified:
01:06:06 07/10/2024
MD5 hash:
f50b33eeb31927b2c081195618d48b8d
Filesize:
1.88 KB
suspicious functions used:
curl_exec (line:48); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tokent.php-
Full path:
7star/web/bkash/tokent.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:22 12/05/2025
Last modified:
01:06:06 07/10/2024
MD5 hash:
890a9e9fb1be75f31a6daad8811c1ff9
Filesize:
1.9 KB
suspicious functions used:
curl_exec (line:48); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: trxID.php-
Full path:
7star/web/bkash/trxID.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:22 12/05/2025
Last modified:
01:06:06 07/10/2024
MD5 hash:
9bcb8e70728fd25807c4db8916166d74
Filesize:
1.44 KB
suspicious functions used:
curl_exec (line:31); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
7star/web/bkasht/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:22 12/05/2025
Last modified:
01:06:07 07/10/2024
MD5 hash:
a4ba6e7683f558dc3602dacd7ddeded2
Filesize:
1.36 KB
suspicious functions used:
curl_exec (line:29); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
7star/web/bkasht/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:22 12/05/2025
Last modified:
01:06:07 07/10/2024
MD5 hash:
aad462fbca9f9a36649a197d67403098
Filesize:
1.27 KB
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: grant.php-
Full path:
7star/web/bkasht/grant.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:22 12/05/2025
Last modified:
01:06:07 07/10/2024
MD5 hash:
da5499d260dc78ea4fcd71227cc6c484
Filesize:
2.01 KB
suspicious functions used:
curl_exec (line:41);curl_exec (line:63); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: query.php-
Full path:
7star/web/bkasht/query.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:22 12/05/2025
Last modified:
01:06:07 07/10/2024
MD5 hash:
f3ed9045f3a073e2cdc8561d500bda89
Filesize:
1.65 KB
suspicious functions used:
curl_exec (line:33); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
7star/web/bkasht/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:22 12/05/2025
Last modified:
01:06:07 07/10/2024
MD5 hash:
f50b33eeb31927b2c081195618d48b8d
Filesize:
1.88 KB
suspicious functions used:
curl_exec (line:48); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: trxID.php-
Full path:
7star/web/bkasht/trxID.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:22 12/05/2025
Last modified:
01:06:07 07/10/2024
MD5 hash:
9bcb8e70728fd25807c4db8916166d74
Filesize:
1.44 KB
suspicious functions used:
curl_exec (line:31); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: class.phpmailer.php-
Full path:
7star/web/email/class.phpmailer.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:22 12/05/2025
Last modified:
01:06:09 07/10/2024
MD5 hash:
68468d69b47fffecc89df57e27c5a781
Filesize:
143.32 KB
suspicious functions used:
`$DKIM_private` (line:428);popen (line:1387);popen (line:1408);base64_decode (line:3410);`$mail->set('SMTPSecure', 'tls');` (line:3688);`$mail->SMTPSecure = 'tls';` (line:3690); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: class.smtp.php-
Full path:
7star/web/email/class.smtp.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:22 12/05/2025
Last modified:
01:06:09 07/10/2024
MD5 hash:
aa8478329268e5438a4469c268337a10
Filesize:
41.44 KB
suspicious functions used:
base64_decode (line:513);base64_decode (line:533); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: JSON.php-
Full path:
7star/web/inc/JSON.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:23 12/05/2025
Last modified:
01:06:18 07/10/2024
MD5 hash:
f5a34509e06231308becbe320ade9ff6
Filesize:
33.22 KB
suspicious functions used:
eval (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: jqgrid.php-
Full path:
7star/web/inc/jqgrid.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:23 12/05/2025
Last modified:
01:06:18 07/10/2024
MD5 hash:
71027a29e71e0626d8b57cbb631e6d98
Filesize:
23.92 KB
suspicious functions used:
eval (line:397); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: smsapicore.php-
Full path:
7star/web/include/smsapicore.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:23 12/05/2025
Last modified:
01:06:19 07/10/2024
MD5 hash:
6b6257f892846565ef8dee38400afa15
Filesize:
1.24 KB
suspicious functions used:
curl_exec (line:36); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: telegramapicore.php-
Full path:
7star/web/include/telegramapicore.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:23 12/05/2025
Last modified:
01:06:19 07/10/2024
MD5 hash:
535fa7aac83b0e1ba56be7837348b6d9
Filesize:
2.9 KB
suspicious functions used:
curl_exec (line:63); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Changes.txt-
Full path:
7star/web/js/jqgrid/js/Changes.txt
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:23 12/05/2025
Last modified:
01:06:41 07/10/2024
MD5 hash:
c0a4adbc3f1c6d592cb4fa8433fee9ea
Filesize:
44.32 KB
suspicious functions used:
system (line:87); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ui.php-
Full path:
7star/web/js/tinymce/themes/advanced/skins/highcontrast/ui.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:23 12/05/2025
Last modified:
01:06:56 07/10/2024
MD5 hash:
3edaf67be8573b86686f46bbba4f058c
Filesize:
4.53 KB
suspicious functions used:
curl_exec (line:20);`bill_amount` = '0.00' WHERE bill_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY ` (line:53);`bill_amount` = '0.00', days = '0.00' WHERE entry_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY ` (line:54);`payment` WHERE `pay_date` < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND pay_amount != '0.00' ORDER BY ` (line:55);curl_exec (line:146);curl_exec (line:168); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: AutoActiveClientsCount1.php-
Full path:
7star/web/AutoActiveClientsCount1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:24 12/05/2025
Last modified:
01:04:58 07/10/2024
MD5 hash:
fb443f2f93781a8fffce803317592c41
Filesize:
6.12 KB
suspicious functions used:
system (line:56); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: AutoActiveClientsCount11.php-
Full path:
7star/web/AutoActiveClientsCount11.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:24 12/05/2025
Last modified:
01:04:58 07/10/2024
MD5 hash:
a0090e4a11dd59b955a6edd549b6ef2f
Filesize:
5.85 KB
suspicious functions used:
system (line:54); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ClientsOnMap.php-
Full path:
7star/web/ClientsOnMap.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:24 12/05/2025
Last modified:
01:05:13 07/10/2024
MD5 hash:
4015c065d9a58cec28fa277a6316b574
Filesize:
12.21 KB
suspicious functions used:
`${totalonline}` (line:97);`${totaloffline}` (line:98);`${results.rxPower}` (line:233);`${results.distance}` (line:234);`${results.supplyVoltage}` (line:235);`${results.temperature}` (line:236);`${results.txPower}` (line:237); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients.php-
Full path:
7star/web/Clients.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:25 12/05/2025
Last modified:
01:05:09 07/10/2024
MD5 hash:
cce70a16182131b7ddfd249d0a96e4b2
Filesize:
179.48 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:832); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients2.php-
Full path:
7star/web/Clients2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:26 12/05/2025
Last modified:
01:05:09 07/10/2024
MD5 hash:
18ecbde013099985817801da6dffb913
Filesize:
205.13 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:832); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients3.php-
Full path:
7star/web/Clients3.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:27 12/05/2025
Last modified:
01:05:10 07/10/2024
MD5 hash:
50ddc869b383ab76e009c7a2c17c99a3
Filesize:
175.31 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:832); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: InstrumentsStoreOutDetails.php-
Full path:
7star/web/InstrumentsStoreOutDetails.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:28 12/05/2025
Last modified:
01:05:19 07/10/2024
MD5 hash:
a60c19f766bfff1ccdccbeba6b39eb87
Filesize:
9.37 KB
suspicious functions used:
`update_date`, '%D-%b, %y') AS offdate, TIME_FORMAT(`update_time`, '%T') AS offtime FROM `con_sts_log` WHERE `c_id` = '{$row['c_id']}' AND con_sts = 'Inactive' ORDER BY ` (line:120); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkLoad.php-
Full path:
7star/web/NetworkLoad.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:28 12/05/2025
Last modified:
01:05:32 07/10/2024
MD5 hash:
e1632e66ee1b7394d3fb82751b924abe
Filesize:
2.83 KB
suspicious functions used:
system (line:81); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Network.php-
Full path:
7star/web/Network.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:28 12/05/2025
Last modified:
01:05:30 07/10/2024
MD5 hash:
95538a99be346cda228bc6d316a2c035
Filesize:
56.21 KB
suspicious functions used:
system (line:357);shell_exec (line:619); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Network1.php-
Full path:
7star/web/Network1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:28 12/05/2025
Last modified:
01:05:31 07/10/2024
MD5 hash:
0154c16125cee7431f537bf69c4ef811
Filesize:
44.04 KB
suspicious functions used:
system (line:295);shell_exec (line:590); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMS.php-
Full path:
7star/web/SMS.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:29 12/05/2025
Last modified:
01:05:51 07/10/2024
MD5 hash:
037ab9f404720089c7ea201af4c9ae5e
Filesize:
36.27 KB
suspicious functions used:
curl_exec (line:56); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMS1.php-
Full path:
7star/web/SMS1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:29 12/05/2025
Last modified:
01:05:52 07/10/2024
MD5 hash:
e4671dadf9ad575671fd3609a60030da
Filesize:
32.19 KB
suspicious functions used:
curl_exec (line:59); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkLoad1.php-
Full path:
7star/web/NetworkLoad1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:29 12/05/2025
Last modified:
01:05:32 07/10/2024
MD5 hash:
176bd6931be34d7ef351d22897accc65
Filesize:
759 B
suspicious functions used:
system (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltAddQuery.php-
Full path:
7star/web/NetworkOltAddQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:29 12/05/2025
Last modified:
01:05:32 07/10/2024
MD5 hash:
6a2bcd7cf57fcd926ee3551ec5d8ab3f
Filesize:
6.3 KB
suspicious functions used:
shell_exec (line:21); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltOnuStatus.php-
Full path:
7star/web/NetworkOltOnuStatus.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:29 12/05/2025
Last modified:
01:05:32 07/10/2024
MD5 hash:
a559ddf02b126f7a42e5192438c72844
Filesize:
55.83 KB
suspicious functions used:
shell_exec (line:42);shell_exec (line:100);shell_exec (line:520);shell_exec (line:635);shell_exec (line:748); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltOnuStatus2.php-
Full path:
7star/web/NetworkOltOnuStatus2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:29 12/05/2025
Last modified:
01:05:33 07/10/2024
MD5 hash:
c9a14797fa4353d05bbd9427b6079250
Filesize:
15.88 KB
suspicious functions used:
shell_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery.php-
Full path:
7star/web/PaymentOnlineQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:30 12/05/2025
Last modified:
01:05:42 07/10/2024
MD5 hash:
acba20210255ae397259ccbd9db4d639
Filesize:
28.5 KB
suspicious functions used:
curl_exec (line:456);curl_exec (line:688); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery2.php-
Full path:
7star/web/PaymentOnlineQuery2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:30 12/05/2025
Last modified:
01:05:43 07/10/2024
MD5 hash:
ccd315d11a60901b7b9029ff44f8351b
Filesize:
19.4 KB
suspicious functions used:
curl_exec (line:42);curl_exec (line:252); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentWebhook.php-
Full path:
7star/web/PaymentWebhook.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:30 12/05/2025
Last modified:
01:05:43 07/10/2024
MD5 hash:
a2f322c94787630ab1e0c8ca35fc5ba1
Filesize:
18.6 KB
suspicious functions used:
base64_decode (line:30);curl_exec (line:41);curl_exec (line:422); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeMap.php-
Full path:
7star/web/NetworkTreeMap.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:30 12/05/2025
Last modified:
01:05:35 07/10/2024
MD5 hash:
ad98830dbb79a94d0d9588b9c0e3f027
Filesize:
22.15 KB
suspicious functions used:
`${results.rxPower}` (line:230);`${results.distance}` (line:231);`${results.supplyVoltage}` (line:232);`${results.temperature}` (line:233);`${results.txPower}` (line:234); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeMap1.php-
Full path:
7star/web/NetworkTreeMap1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:30 12/05/2025
Last modified:
01:05:35 07/10/2024
MD5 hash:
7283b6f0717758b1824973b76acf4c04
Filesize:
10.58 KB
suspicious functions used:
`${totalonline}` (line:97);`${totaloffline}` (line:98); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SignUp1.php-
Full path:
7star/web/SignUp1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:31 12/05/2025
Last modified:
01:05:51 07/10/2024
MD5 hash:
3f7943dd155c8e0a383b7d02730f8c11
Filesize:
24.59 KB
suspicious functions used:
curl_exec (line:33);curl_exec (line:59); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMSAddSave.php-
Full path:
7star/web/SMSAddSave.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:31 12/05/2025
Last modified:
01:05:52 07/10/2024
MD5 hash:
1a6eaf13aa0ca959fe2dca885b7ffd8e
Filesize:
1.73 KB
suspicious functions used:
curl_exec (line:34); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-countt.php-
Full path:
7star/web/network-olt-client-onu-mac-countt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:32 12/05/2025
Last modified:
01:05:29 07/10/2024
MD5 hash:
d29b4e72c375f528b769bd3894f9f0e7
Filesize:
8.95 KB
suspicious functions used:
shell_exec (line:26);shell_exec (line:36);shell_exec (line:59);shell_exec (line:75);shell_exec (line:92);shell_exec (line:102);shell_exec (line:117);shell_exec (line:155);shell_exec (line:206);shell_exec (line:262);shell_exec (line:275);shell_exec (line:288); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: client-online-mbb.php-
Full path:
7star/web/client-online-mbb.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:33 12/05/2025
Last modified:
01:05:04 07/10/2024
MD5 hash:
69c51efb5b9017a07a7158b4a63f3826
Filesize:
14.32 KB
suspicious functions used:
curl_exec (line:90); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: clients-nots-action.php-
Full path:
7star/web/clients-nots-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:33 12/05/2025
Last modified:
01:05:07 07/10/2024
MD5 hash:
dff1bb495509427d098cb4588da553b9
Filesize:
5.89 KB
suspicious functions used:
curl_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: getclientuptime.php-
Full path:
7star/web/getclientuptime.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:33 12/05/2025
Last modified:
01:05:19 07/10/2024
MD5 hash:
bbc14cdd451c72b94d78c7d2d1af0b52
Filesize:
718 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: company_info.php-
Full path:
7star/web/company_info.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:21 12/05/2025
Last modified:
01:05:15 07/10/2024
MD5 hash:
e612d58aa2e38f5b49ba37c1bf620ece
Filesize:
8.38 KB
suspicious functions used:
curl_exec (line:130); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
7star/web/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:33 12/05/2025
Last modified:
01:05:15 07/10/2024
MD5 hash:
ba9747d0421fd091b998389469e72a0b
Filesize:
1.7 KB
suspicious functions used:
curl_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_all.php-
Full path:
7star/web/cron_all.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:33 12/05/2025
Last modified:
01:05:15 07/10/2024
MD5 hash:
967f1d654ae891609da26b9e0fdbd1ae
Filesize:
2.44 KB
suspicious functions used:
curl_exec (line:23);curl_exec (line:38);curl_exec (line:53); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_gen_bill.php-
Full path:
7star/web/cron_auto_gen_bill.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:33 12/05/2025
Last modified:
01:05:15 07/10/2024
MD5 hash:
f1056618cc4402968e50d1232d2c51c8
Filesize:
4.73 KB
suspicious functions used:
curl_exec (line:140);curl_exec (line:149); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: imagevwr.php-
Full path:
7star/web/imagevwr.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:33 12/05/2025
Last modified:
01:05:19 07/10/2024
MD5 hash:
47a223a13cc642d01dcfaaca542d396d
Filesize:
915 B
suspicious functions used:
curl_exec (line:15); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive.php-
Full path:
7star/web/cron_auto_inactive.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:33 12/05/2025
Last modified:
01:05:15 07/10/2024
MD5 hash:
7e0dc4dd9dae2bf0220516641b53c027
Filesize:
5.43 KB
suspicious functions used:
curl_exec (line:142); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive2.php-
Full path:
7star/web/cron_auto_inactive2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:33 12/05/2025
Last modified:
01:05:15 07/10/2024
MD5 hash:
440bc24f05b01eb395df63fff2f60de9
Filesize:
5.46 KB
suspicious functions used:
curl_exec (line:142); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: emp_salary_advence_find.php-
Full path:
7star/web/emp_salary_advence_find.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:33 12/05/2025
Last modified:
01:05:17 07/10/2024
MD5 hash:
74a7e2ffda0f7584611d7cbce6136c24
Filesize:
2.25 KB
suspicious functions used:
`expanse` WHERE `type` = '2' AND `status` = '2' AND ex_by = '$e_id' AND MONTH(`, `) = MONTH('$lastmonth') AND YEAR(`, `) = YEAR('$lastmonth') GROUP BY ` (line:8);`e_id` = '$e_id' AND ` (line:12); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive_termination.php-
Full path:
7star/web/cron_auto_inactive_termination.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:33 12/05/2025
Last modified:
01:05:15 07/10/2024
MD5 hash:
9f9c8ca9110c2304128646824bfb17db
Filesize:
12.16 KB
suspicious functions used:
curl_exec (line:241);curl_exec (line:253); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive_termination1.php-
Full path:
7star/web/cron_auto_inactive_termination1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:33 12/05/2025
Last modified:
01:05:15 07/10/2024
MD5 hash:
be76b964c93a2cb4fa7e632750ff3bc4
Filesize:
6.64 KB
suspicious functions used:
curl_exec (line:156);curl_exec (line:168); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_termination_remainder1.php-
Full path:
7star/web/cron_auto_termination_remainder1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:33 12/05/2025
Last modified:
01:05:15 07/10/2024
MD5 hash:
7765f9f820dbd402f1064fab9958ffaa
Filesize:
3.26 KB
suspicious functions used:
curl_exec (line:83); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
7star/web/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:33 12/05/2025
Last modified:
01:05:17 07/10/2024
MD5 hash:
c46a50905333286f45dfeacf010851ab
Filesize:
716 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_client_bandwidth_count.php-
Full path:
7star/web/cron_client_bandwidth_count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:33 12/05/2025
Last modified:
01:05:15 07/10/2024
MD5 hash:
8be5ba5d539d73a8f197195f7748e1cc
Filesize:
4.7 KB
suspicious functions used:
curl_exec (line:125); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_network.php-
Full path:
7star/web/cron_network.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:33 12/05/2025
Last modified:
01:05:15 07/10/2024
MD5 hash:
1a75ea6c2e0cc5b9263541dda62ab458
Filesize:
4.61 KB
suspicious functions used:
curl_exec (line:45);curl_exec (line:67); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_olt.php-
Full path:
7star/web/cron_olt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:33 12/05/2025
Last modified:
01:05:15 07/10/2024
MD5 hash:
d83092bb263aaa93da2bb8cddab2a0d1
Filesize:
3.7 KB
suspicious functions used:
shell_exec (line:44); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_olt_user.php-
Full path:
7star/web/cron_olt_user.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:33 12/05/2025
Last modified:
01:05:15 07/10/2024
MD5 hash:
67aa237639e3d1e6064e76079bb3cccc
Filesize:
1.97 KB
suspicious functions used:
curl_exec (line:19);curl_exec (line:46); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index.php-
Full path:
7star/web/index.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
01:57:17 12/05/2025
Last modified:
01:05:19 07/10/2024
MD5 hash:
f161ab23adf4527023a0ad582d478f89
Filesize:
12.45 KB
suspicious functions used:
base64_decode (line:10);curl_exec (line:183); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-count.php-
Full path:
7star/web/network-olt-client-onu-mac-count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:33 12/05/2025
Last modified:
01:05:29 07/10/2024
MD5 hash:
230b73ec563f5d0ae6c1f1c2750b9165
Filesize:
13.57 KB
suspicious functions used:
shell_exec (line:25);shell_exec (line:35);shell_exec (line:58);shell_exec (line:74);shell_exec (line:91);shell_exec (line:101);shell_exec (line:117);shell_exec (line:158);shell_exec (line:218);shell_exec (line:294);shell_exec (line:361);shell_exec (line:423);shell_exec (line:442);shell_exec (line:461); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-con-sts.php-
Full path:
7star/web/network-olt-con-sts.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:33 12/05/2025
Last modified:
01:05:29 07/10/2024
MD5 hash:
90f26ad5760637c0e00541724949a8ca
Filesize:
2.55 KB
suspicious functions used:
`olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:13);shell_exec (line:41); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ip-ping-checker.php-
Full path:
7star/web/ip-ping-checker.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:33 12/05/2025
Last modified:
01:05:21 07/10/2024
MD5 hash:
0d28f3053b73b3fe2885cf519ee17c12
Filesize:
2.64 KB
suspicious functions used:
curl_exec (line:81); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec.php-
Full path:
7star/web/login_exec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:33 12/05/2025
Last modified:
01:05:22 07/10/2024
MD5 hash:
9038a77a32a5db2c9affae1496473f3e
Filesize:
5.27 KB
suspicious functions used:
curl_exec (line:62); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: loginexec.php-
Full path:
7star/web/loginexec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:33 12/05/2025
Last modified:
01:05:22 07/10/2024
MD5 hash:
edb8017e7d0f8e037facbcacc94a383d
Filesize:
5.91 KB
suspicious functions used:
curl_exec (line:67); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-helper.php-
Full path:
7star/web/nagad-helper.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:33 12/05/2025
Last modified:
01:05:29 07/10/2024
MD5 hash:
2bb70c44d68202e0a0cd8ae1388f0b1b
Filesize:
6.74 KB
suspicious functions used:
curl_exec (line:61);base64_decode (line:97); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-merchant-callback.php-
Full path:
7star/web/nagad-merchant-callback.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:33 12/05/2025
Last modified:
01:05:29 07/10/2024
MD5 hash:
6e2beb96e88da50419677884ab75ddcf
Filesize:
16.92 KB
suspicious functions used:
curl_exec (line:20); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-load.php-
Full path:
7star/web/network-olt-load.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:33 12/05/2025
Last modified:
01:05:29 07/10/2024
MD5 hash:
f49d5153285c639ed91d4e806685ee56
Filesize:
1.33 KB
suspicious functions used:
shell_exec (line:22);shell_exec (line:25); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-snmp-data.php-
Full path:
7star/web/netowrk-snmp-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:33 12/05/2025
Last modified:
01:05:29 07/10/2024
MD5 hash:
5c2a24846ceedde7d40cf9ec2b8a5ac8
Filesize:
23.84 KB
suspicious functions used:
shell_exec (line:96);shell_exec (line:105);shell_exec (line:115);shell_exec (line:134);shell_exec (line:146);shell_exec (line:157);shell_exec (line:175);shell_exec (line:185);shell_exec (line:201);shell_exec (line:221);shell_exec (line:231);shell_exec (line:236);shell_exec (line:244);shell_exec (line:264);shell_exec (line:280);`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:293);shell_exec (line:299);shell_exec (line:434); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-oid-check.php-
Full path:
7star/web/network-olt-oid-check.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:33 12/05/2025
Last modified:
01:05:29 07/10/2024
MD5 hash:
5b7dc0ce1103fbfc895873c250b63141
Filesize:
1.88 KB
suspicious functions used:
shell_exec (line:33); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-old-onu-rx.php-
Full path:
7star/web/network-old-onu-rx.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:33 12/05/2025
Last modified:
01:05:29 07/10/2024
MD5 hash:
b4962c160c5ad68ccd8eed9c48d82a0f
Filesize:
6.94 KB
suspicious functions used:
shell_exec (line:76); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-count.php-
Full path:
7star/web/network-olt-onu-count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:33 12/05/2025
Last modified:
01:05:29 07/10/2024
MD5 hash:
f3abe7a3ec7f2cb1e82ba52e81149273
Filesize:
5.18 KB
suspicious functions used:
`olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:11);shell_exec (line:65); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-count-cdata.php-
Full path:
7star/web/network-olt-client-onu-mac-count-cdata.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:33 12/05/2025
Last modified:
01:05:29 07/10/2024
MD5 hash:
c378dbabf36066c335cfb8838a6e167d
Filesize:
4.58 KB
suspicious functions used:
shell_exec (line:25);shell_exec (line:35);shell_exec (line:56);shell_exec (line:103);shell_exec (line:115);shell_exec (line:126);shell_exec (line:140); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-list-data.php-
Full path:
7star/web/network-olt-onu-list-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:33 12/05/2025
Last modified:
01:05:29 07/10/2024
MD5 hash:
54cc9417c766c31317311c3722ce7d4b
Filesize:
9.48 KB
suspicious functions used:
shell_exec (line:24);shell_exec (line:38);shell_exec (line:64);shell_exec (line:85);shell_exec (line:104);shell_exec (line:125);shell_exec (line:143);shell_exec (line:153);shell_exec (line:165);shell_exec (line:185); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-clients-search.php-
Full path:
7star/web/network-olt-pon-clients-search.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:33 12/05/2025
Last modified:
01:05:29 07/10/2024
MD5 hash:
79d26fc66abdab6f173330588aa8b238
Filesize:
10.93 KB
suspicious functions used:
shell_exec (line:42);shell_exec (line:51);shell_exec (line:104);shell_exec (line:168); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search-bdcom.php-
Full path:
7star/web/network-olt-pon-onu-search-bdcom.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:33 12/05/2025
Last modified:
01:05:29 07/10/2024
MD5 hash:
87fa62ee6cd31d59445e54202126aae8
Filesize:
16.92 KB
suspicious functions used:
shell_exec (line:54);shell_exec (line:63);shell_exec (line:170); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search-bdcom1.php-
Full path:
7star/web/network-olt-pon-onu-search-bdcom1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:33 12/05/2025
Last modified:
01:05:30 07/10/2024
MD5 hash:
dd18677b1dcbf7f0bce2ac6912d98da0
Filesize:
9.6 KB
suspicious functions used:
shell_exec (line:42);shell_exec (line:51);shell_exec (line:129); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search.php-
Full path:
7star/web/network-olt-pon-onu-search.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:33 12/05/2025
Last modified:
01:05:30 07/10/2024
MD5 hash:
2852e806dcf69c0a3e2a021b86300289
Filesize:
8.75 KB
suspicious functions used:
shell_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook.php-
Full path:
7star/web/webhook.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:33 12/05/2025
Last modified:
01:06:03 07/10/2024
MD5 hash:
26e2059a39281031d28874b51b52d60c
Filesize:
21.23 KB
suspicious functions used:
base64_decode (line:27);curl_exec (line:38);curl_exec (line:454); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data-bdcom.php-
Full path:
7star/web/network-snmp-onu-status-data-bdcom.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:34 12/05/2025
Last modified:
01:05:30 07/10/2024
MD5 hash:
a6ba20417ea6d39db89d0ce19a5244e5
Filesize:
20.8 KB
suspicious functions used:
shell_exec (line:48);shell_exec (line:73);shell_exec (line:85);shell_exec (line:103);shell_exec (line:116);shell_exec (line:128);shell_exec (line:134);shell_exec (line:159);shell_exec (line:172);shell_exec (line:184);shell_exec (line:190); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tagreeexpayment.php-
Full path:
7star/web/tagreeexpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:34 12/05/2025
Last modified:
01:05:58 07/10/2024
MD5 hash:
029b4fba649a75c7c81d2f8931be8d63
Filesize:
2.86 KB
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data.php-
Full path:
7star/web/network-snmp-onu-status-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:34 12/05/2025
Last modified:
01:05:30 07/10/2024
MD5 hash:
0adfee384bf349b50f11036947fd2a74
Filesize:
30.37 KB
suspicious functions used:
shell_exec (line:38);`olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:42);shell_exec (line:81);shell_exec (line:95);shell_exec (line:109);shell_exec (line:122);shell_exec (line:208);shell_exec (line:429);shell_exec (line:441);shell_exec (line:448); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreateagree.php-
Full path:
7star/web/tcreateagree.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:34 12/05/2025
Last modified:
01:05:58 07/10/2024
MD5 hash:
27a10adf4190edc7eceee8cf74a6b72b
Filesize:
999 B
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data1.php-
Full path:
7star/web/network-snmp-onu-status-data1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:34 12/05/2025
Last modified:
01:05:30 07/10/2024
MD5 hash:
920bd1a592c36f7a1194b737642f8340
Filesize:
15.96 KB
suspicious functions used:
shell_exec (line:33);`olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:37);shell_exec (line:149); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook_cid.php-
Full path:
7star/web/webhook_cid.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:34 12/05/2025
Last modified:
01:06:03 07/10/2024
MD5 hash:
18c8353c99f0ca2645c68685e40c568b
Filesize:
21.1 KB
suspicious functions used:
base64_decode (line:28);curl_exec (line:39);curl_exec (line:429); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data_vsol2.php-
Full path:
7star/web/network-snmp-onu-status-data_vsol2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:34 12/05/2025
Last modified:
01:05:30 07/10/2024
MD5 hash:
f22d022ddc284f4d8e1de3660da91db8
Filesize:
15.61 KB
suspicious functions used:
shell_exec (line:34);shell_exec (line:113);shell_exec (line:126);shell_exec (line:132); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test6.php-
Full path:
7star/web/test6.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:34 12/05/2025
Last modified:
01:05:58 07/10/2024
MD5 hash:
f22d022ddc284f4d8e1de3660da91db8
Filesize:
15.61 KB
suspicious functions used:
shell_exec (line:34);shell_exec (line:113);shell_exec (line:126);shell_exec (line:132); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook_test.php-
Full path:
7star/web/webhook_test.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:34 12/05/2025
Last modified:
01:06:03 07/10/2024
MD5 hash:
74a7dcc262d7fe7f2bdc9e0595d03837
Filesize:
4.69 KB
suspicious functions used:
base64_decode (line:22);curl_exec (line:33);curl_exec (line:86);curl_exec (line:107); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: testttttt.php-
Full path:
7star/web/testttttt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:34 12/05/2025
Last modified:
01:05:59 07/10/2024
MD5 hash:
b1988a4be29e191ad935fb409a4174ee
Filesize:
2 KB
suspicious functions used:
curl_exec (line:47); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: texecutepayment.php-
Full path:
7star/web/texecutepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:34 12/05/2025
Last modified:
01:05:59 07/10/2024
MD5 hash:
623635fdf5c871391d3a5fe99ee8c543
Filesize:
2.91 KB
suspicious functions used:
curl_exec (line:24); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreatepayment.php-
Full path:
7star/web/tcreatepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:34 12/05/2025
Last modified:
01:05:58 07/10/2024
MD5 hash:
e49de9a33f5164bc2c6b88e4770faaff
Filesize:
1.07 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tis-news.php-
Full path:
7star/web/tis-news.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:34 12/05/2025
Last modified:
01:05:59 07/10/2024
MD5 hash:
ed23ca98b77c5321b4485e85eb2ea64d
Filesize:
3.67 KB
suspicious functions used:
curl_exec (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree-olt-onu-list-data.php-
Full path:
7star/web/networktree-olt-onu-list-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:34 12/05/2025
Last modified:
01:05:33 07/10/2024
MD5 hash:
af4221fefa9c9051846a063ac4135560
Filesize:
8.72 KB
suspicious functions used:
shell_exec (line:24);shell_exec (line:36);shell_exec (line:59);shell_exec (line:78);shell_exec (line:97);shell_exec (line:116);shell_exec (line:134);shell_exec (line:143);shell_exec (line:155);shell_exec (line:175); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test2.php-
Full path:
7star/web/test2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:34 12/05/2025
Last modified:
01:05:58 07/10/2024
MD5 hash:
6f91faae4c90c36b5fba91f12da5c7c7
Filesize:
7.18 KB
suspicious functions used:
shell_exec (line:51);shell_exec (line:62);shell_exec (line:68);shell_exec (line:80);shell_exec (line:93);shell_exec (line:133);curl_exec (line:175); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test3.php-
Full path:
7star/web/test3.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:34 12/05/2025
Last modified:
01:05:58 07/10/2024
MD5 hash:
47feeaa9a827160ac4e6faff04aa57cd
Filesize:
3.95 KB
suspicious functions used:
shell_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_pon_check.php-
Full path:
7star/web/networktree_device_pon_check.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:34 12/05/2025
Last modified:
01:05:35 07/10/2024
MD5 hash:
5f3a44ead0f078d43e65b05632303e32
Filesize:
576 B
suspicious functions used:
`pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '$olt_id' AND ` (line:5); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
7star/web/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:34 12/05/2025
Last modified:
01:05:59 07/10/2024
MD5 hash:
7d8e71ceda3ffb74623e0c4a814715af
Filesize:
1.53 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tt.php-
Full path:
7star/web/tt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:34 12/05/2025
Last modified:
01:06:00 07/10/2024
MD5 hash:
9c4ed141cb79fdc7e807b35923c91a20
Filesize:
1.56 KB
suspicious functions used:
curl_exec (line:30); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ttoken.php-
Full path:
7star/web/ttoken.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:34 12/05/2025
Last modified:
01:06:00 07/10/2024
MD5 hash:
5f2c51c1db5b0defadfb67ce25c0098f
Filesize:
1.54 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: sms-balance-check.php-
Full path:
7star/web/sms-balance-check.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:34 12/05/2025
Last modified:
01:05:51 07/10/2024
MD5 hash:
74ac3e963a0dc5bb7d4c980e594aa39b
Filesize:
854 B
suspicious functions used:
curl_exec (line:15); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: sms_deliverey_report.php-
Full path:
7star/web/sms_deliverey_report.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:34 12/05/2025
Last modified:
01:05:55 07/10/2024
MD5 hash:
03623943da7e9334e137b38c8577fc84
Filesize:
4.25 KB
suspicious functions used:
curl_exec (line:28);curl_exec (line:53);curl_exec (line:90); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: support-action.php-
Full path:
7star/web/support-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:34 12/05/2025
Last modified:
01:05:56 07/10/2024
MD5 hash:
c678659a705dae2c6d52289b0084a693
Filesize:
14.72 KB
suspicious functions used:
curl_exec (line:221); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-helper.php-
Full path:
7stars/m/nagad-helper.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:35 12/05/2025
Last modified:
13:46:28 03/11/2024
MD5 hash:
2bb70c44d68202e0a0cd8ae1388f0b1b
Filesize:
6.74 KB
suspicious functions used:
curl_exec (line:61);base64_decode (line:97); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery2.php-
Full path:
7stars/m/PaymentOnlineQuery2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:35 12/05/2025
Last modified:
13:46:28 03/11/2024
MD5 hash:
3660992067d5591fc79ce89d6dbb9274
Filesize:
19.08 KB
suspicious functions used:
curl_exec (line:41);curl_exec (line:254); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
7stars/m/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:35 12/05/2025
Last modified:
13:46:30 03/11/2024
MD5 hash:
7d8e71ceda3ffb74623e0c4a814715af
Filesize:
1.53 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tagreeexpayment.php-
Full path:
7stars/m/tagreeexpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:35 12/05/2025
Last modified:
13:46:30 03/11/2024
MD5 hash:
c95e3ee881752db67b4f3597bc58430a
Filesize:
2.46 KB
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ttoken.php-
Full path:
7stars/m/ttoken.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:35 12/05/2025
Last modified:
13:46:30 03/11/2024
MD5 hash:
5f2c51c1db5b0defadfb67ce25c0098f
Filesize:
1.54 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
7stars/m/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:36 12/05/2025
Last modified:
13:46:26 03/11/2024
MD5 hash:
849185f307be30eafb1bbef93616d8c3
Filesize:
1.71 KB
suspicious functions used:
curl_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: support-action.php-
Full path:
7stars/m/support-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:36 12/05/2025
Last modified:
13:46:30 03/11/2024
MD5 hash:
2fc6fd844db911a5502a7a6ae383990f
Filesize:
10.31 KB
suspicious functions used:
curl_exec (line:99); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
7stars/m/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:36 12/05/2025
Last modified:
13:46:26 03/11/2024
MD5 hash:
9a3f22521ad987e86f84c4f5f688d5b7
Filesize:
713 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index.php-
Full path:
7stars/m/index.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
17:22:35 11/05/2025
Last modified:
13:46:27 03/11/2024
MD5 hash:
f5d7e6787d44240324bf05e7bff53365
Filesize:
12.49 KB
suspicious functions used:
base64_decode (line:10);curl_exec (line:183); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery.php-
Full path:
7stars/m/PaymentOnlineQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:36 12/05/2025
Last modified:
13:46:28 03/11/2024
MD5 hash:
05d772ea15775c0640ac9d1ff7c7144c
Filesize:
21.13 KB
suspicious functions used:
curl_exec (line:287);curl_exec (line:512); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreateagree.php-
Full path:
7stars/m/tcreateagree.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:36 12/05/2025
Last modified:
13:46:30 03/11/2024
MD5 hash:
27a10adf4190edc7eceee8cf74a6b72b
Filesize:
999 B
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec.php-
Full path:
7stars/m/login_exec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:36 12/05/2025
Last modified:
13:46:27 03/11/2024
MD5 hash:
1f800365ef270564df77d30c1bfd7ed3
Filesize:
5.4 KB
suspicious functions used:
curl_exec (line:66); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec1.php-
Full path:
7stars/m/login_exec1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:36 12/05/2025
Last modified:
13:46:27 03/11/2024
MD5 hash:
46b08782f51ba75b23e27183e06370fe
Filesize:
4.28 KB
suspicious functions used:
curl_exec (line:61); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-merchant-callback.php-
Full path:
7stars/m/nagad-merchant-callback.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:36 12/05/2025
Last modified:
13:46:28 03/11/2024
MD5 hash:
0e6086c5260150c11249029f212ee481
Filesize:
11.36 KB
suspicious functions used:
curl_exec (line:20); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreatepayment.php-
Full path:
7stars/m/tcreatepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:36 12/05/2025
Last modified:
13:46:30 03/11/2024
MD5 hash:
e49de9a33f5164bc2c6b88e4770faaff
Filesize:
1.07 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-snmp-data.php-
Full path:
7stars/m/netowrk-snmp-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:37 12/05/2025
Last modified:
13:46:28 03/11/2024
MD5 hash:
45b774abc8d67efb3e4e87c93b1f618b
Filesize:
24.05 KB
suspicious functions used:
shell_exec (line:96);shell_exec (line:105);shell_exec (line:115);shell_exec (line:134);shell_exec (line:146);shell_exec (line:157);shell_exec (line:173);shell_exec (line:183);shell_exec (line:199);shell_exec (line:219);shell_exec (line:229);shell_exec (line:234);shell_exec (line:242);shell_exec (line:262);shell_exec (line:278);`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:291);shell_exec (line:297);shell_exec (line:432); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: texecutepayment.php-
Full path:
7stars/m/texecutepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:37 12/05/2025
Last modified:
13:46:30 03/11/2024
MD5 hash:
efbb63dfcfdacb52dec74bffc389bbb3
Filesize:
2.67 KB
suspicious functions used:
curl_exec (line:24); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: class.phpmailer.php-
Full path:
7stars/web/email/class.phpmailer.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:37 12/05/2025
Last modified:
13:47:32 03/11/2024
MD5 hash:
68468d69b47fffecc89df57e27c5a781
Filesize:
143.32 KB
suspicious functions used:
`$DKIM_private` (line:428);popen (line:1387);popen (line:1408);base64_decode (line:3410);`$mail->set('SMTPSecure', 'tls');` (line:3688);`$mail->SMTPSecure = 'tls';` (line:3690); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: class.smtp.php-
Full path:
7stars/web/email/class.smtp.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:37 12/05/2025
Last modified:
13:47:32 03/11/2024
MD5 hash:
aa8478329268e5438a4469c268337a10
Filesize:
41.44 KB
suspicious functions used:
base64_decode (line:513);base64_decode (line:533); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: JSON.php-
Full path:
7stars/web/inc/JSON.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:38 12/05/2025
Last modified:
13:47:40 03/11/2024
MD5 hash:
f5a34509e06231308becbe320ade9ff6
Filesize:
33.22 KB
suspicious functions used:
eval (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: jqgrid.php-
Full path:
7stars/web/inc/jqgrid.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:38 12/05/2025
Last modified:
13:47:40 03/11/2024
MD5 hash:
71027a29e71e0626d8b57cbb631e6d98
Filesize:
23.92 KB
suspicious functions used:
eval (line:397); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: smsapicore.php-
Full path:
7stars/web/include/smsapicore.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
13:35:33 11/05/2025
Last modified:
09:47:24 09/12/2024
MD5 hash:
7103bdf60713408b6f2952f288f27f2e
Filesize:
2.45 KB
suspicious functions used:
curl_exec (line:37); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: telegramapicore.php-
Full path:
7stars/web/include/telegramapicore.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:38 12/05/2025
Last modified:
13:47:41 03/11/2024
MD5 hash:
e1f2020f2a58e7b600312301697f9aca
Filesize:
3 KB
suspicious functions used:
curl_exec (line:65); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Changes.txt-
Full path:
7stars/web/js/jqgrid/js/Changes.txt
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:38 12/05/2025
Last modified:
13:47:53 03/11/2024
MD5 hash:
c0a4adbc3f1c6d592cb4fa8433fee9ea
Filesize:
44.32 KB
suspicious functions used:
system (line:87); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ui.php-
Full path:
7stars/web/js/tinymce/themes/advanced/skins/highcontrast/ui.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:20:38 12/05/2025
Last modified:
13:48:01 03/11/2024
MD5 hash:
3edaf67be8573b86686f46bbba4f058c
Filesize:
4.53 KB
suspicious functions used:
curl_exec (line:20);`bill_amount` = '0.00' WHERE bill_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY ` (line:53);`bill_amount` = '0.00', days = '0.00' WHERE entry_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY ` (line:54);`payment` WHERE `pay_date` < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND pay_amount != '0.00' ORDER BY ` (line:55);curl_exec (line:146);curl_exec (line:168); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: AutoActiveClientsCount1.php-
Full path:
7stars/web/AutoActiveClientsCount1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
04:00:58 12/05/2025
Last modified:
13:46:43 03/11/2024
MD5 hash:
3b3b6186ff2d9c5abd1772e5aa02ee33
Filesize:
6.4 KB
suspicious functions used:
system (line:58); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: AutoActiveClientsCount11.php-
Full path:
7stars/web/AutoActiveClientsCount11.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:28 12/05/2025
Last modified:
13:46:43 03/11/2024
MD5 hash:
a0090e4a11dd59b955a6edd549b6ef2f
Filesize:
5.85 KB
suspicious functions used:
system (line:54); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ClientsOnMap.php-
Full path:
7stars/web/ClientsOnMap.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:28 12/05/2025
Last modified:
13:46:56 03/11/2024
MD5 hash:
4015c065d9a58cec28fa277a6316b574
Filesize:
12.21 KB
suspicious functions used:
`${totalonline}` (line:97);`${totaloffline}` (line:98);`${results.rxPower}` (line:233);`${results.distance}` (line:234);`${results.supplyVoltage}` (line:235);`${results.temperature}` (line:236);`${results.txPower}` (line:237); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ClientView.php-
Full path:
7stars/web/ClientView.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
05:08:18 12/05/2025
Last modified:
13:46:56 03/11/2024
MD5 hash:
632106476588c1b6e090f78a90bc9534
Filesize:
110.58 KB
suspicious functions used:
`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:212); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients.php-
Full path:
7stars/web/Clients.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:29 12/05/2025
Last modified:
13:46:52 03/11/2024
MD5 hash:
edcecc2febd77bbf170a76efae960c89
Filesize:
212.41 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:844); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients1.php-
Full path:
7stars/web/Clients1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:29 12/05/2025
Last modified:
13:46:52 03/11/2024
MD5 hash:
a8db87dcc6beb97539ff152b767dadae
Filesize:
219.37 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:835); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients2.php-
Full path:
7stars/web/Clients2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:30 12/05/2025
Last modified:
13:46:54 03/11/2024
MD5 hash:
982d6411552113b0715fd17c26f50292
Filesize:
205.13 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:832); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients3.php-
Full path:
7stars/web/Clients3.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:30 12/05/2025
Last modified:
13:46:54 03/11/2024
MD5 hash:
50ddc869b383ab76e009c7a2c17c99a3
Filesize:
175.31 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:832); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: InstrumentsStoreOutDetails.php-
Full path:
7stars/web/InstrumentsStoreOutDetails.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:31 12/05/2025
Last modified:
13:47:01 03/11/2024
MD5 hash:
a60c19f766bfff1ccdccbeba6b39eb87
Filesize:
9.37 KB
suspicious functions used:
`update_date`, '%D-%b, %y') AS offdate, TIME_FORMAT(`update_time`, '%T') AS offtime FROM `con_sts_log` WHERE `c_id` = '{$row['c_id']}' AND con_sts = 'Inactive' ORDER BY ` (line:120); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Network.php-
Full path:
7stars/web/Network.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:32 12/05/2025
Last modified:
13:47:08 03/11/2024
MD5 hash:
a555bcd4afdc786ded6485ee9315887c
Filesize:
57.36 KB
suspicious functions used:
system (line:359);shell_exec (line:631); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Network1.php-
Full path:
7stars/web/Network1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:32 12/05/2025
Last modified:
13:47:08 03/11/2024
MD5 hash:
0154c16125cee7431f537bf69c4ef811
Filesize:
44.04 KB
suspicious functions used:
system (line:295);shell_exec (line:590); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeMap1.php-
Full path:
7stars/web/NetworkTreeMap1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:32 12/05/2025
Last modified:
13:47:12 03/11/2024
MD5 hash:
7283b6f0717758b1824973b76acf4c04
Filesize:
10.58 KB
suspicious functions used:
`${totalonline}` (line:97);`${totaloffline}` (line:98); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMS.php-
Full path:
7stars/web/SMS.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:32 12/05/2025
Last modified:
09:48:56 09/12/2024
MD5 hash:
c64696ecc1b0715751af3c8e9989ea80
Filesize:
36.6 KB
suspicious functions used:
curl_exec (line:56); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkLoad.php-
Full path:
7stars/web/NetworkLoad.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:33 12/05/2025
Last modified:
13:47:09 03/11/2024
MD5 hash:
e1632e66ee1b7394d3fb82751b924abe
Filesize:
2.83 KB
suspicious functions used:
system (line:81); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkLoad1.php-
Full path:
7stars/web/NetworkLoad1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:33 12/05/2025
Last modified:
13:47:09 03/11/2024
MD5 hash:
176bd6931be34d7ef351d22897accc65
Filesize:
759 B
suspicious functions used:
system (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltAddQuery.php-
Full path:
7stars/web/NetworkOltAddQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:33 12/05/2025
Last modified:
13:47:09 03/11/2024
MD5 hash:
c3c063a74b6c009f043ac820abd4f3f1
Filesize:
6.44 KB
suspicious functions used:
shell_exec (line:21); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltOnuStatus.php-
Full path:
7stars/web/NetworkOltOnuStatus.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:33 12/05/2025
Last modified:
13:47:10 03/11/2024
MD5 hash:
58b27721b794e6e5bd5f810aba2e7907
Filesize:
65.24 KB
suspicious functions used:
shell_exec (line:42);shell_exec (line:102);shell_exec (line:677);shell_exec (line:793);shell_exec (line:906); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltOnuStatus2.php-
Full path:
7stars/web/NetworkOltOnuStatus2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:33 12/05/2025
Last modified:
13:47:10 03/11/2024
MD5 hash:
c9a14797fa4353d05bbd9427b6079250
Filesize:
15.88 KB
suspicious functions used:
shell_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltSense.php-
Full path:
7stars/web/NetworkOltSense.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:33 12/05/2025
Last modified:
13:47:10 03/11/2024
MD5 hash:
2be664ae5006367f629ca437a6d507f8
Filesize:
18.26 KB
suspicious functions used:
`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, `last_synced`, `last_update`, `msg`, `full_msg`, ROUND((SELECT AVG(value) FROM olt_onu_history WHERE alarm_id = '$alarmId' AND value != ''), 2) AS average_value FROM `, ` WHERE `alarm_id` = '$alarmId' AND ` (line:123); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltSenseDetails.php-
Full path:
7stars/web/NetworkOltSenseDetails.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:33 12/05/2025
Last modified:
13:47:10 03/11/2024
MD5 hash:
440096c601fc10b819a1f0f8330928b0
Filesize:
14.17 KB
suspicious functions used:
`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:33);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:42);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:51);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:60); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltSync.php-
Full path:
7stars/web/NetworkOltSync.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:33 12/05/2025
Last modified:
13:47:10 03/11/2024
MD5 hash:
06633d4b65a14d677358170dd0a84424
Filesize:
1.87 KB
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMS1.php-
Full path:
7stars/web/SMS1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:33 12/05/2025
Last modified:
13:47:23 03/11/2024
MD5 hash:
e4671dadf9ad575671fd3609a60030da
Filesize:
32.19 KB
suspicious functions used:
curl_exec (line:59); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery.php-
Full path:
7stars/web/PaymentOnlineQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:33 12/05/2025
Last modified:
13:47:18 03/11/2024
MD5 hash:
201e1cf95b2d033897cab4bc2fd59e07
Filesize:
28.5 KB
suspicious functions used:
curl_exec (line:457);curl_exec (line:689); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery2.php-
Full path:
7stars/web/PaymentOnlineQuery2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:34 12/05/2025
Last modified:
13:47:18 03/11/2024
MD5 hash:
ccd315d11a60901b7b9029ff44f8351b
Filesize:
19.4 KB
suspicious functions used:
curl_exec (line:42);curl_exec (line:252); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeAddSave.php-
Full path:
7stars/web/NetworkTreeAddSave.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:34 12/05/2025
Last modified:
00:14:12 21/11/2024
MD5 hash:
a9dbc374394f257ef79f2d4f60f9771d
Filesize:
5.12 KB
suspicious functions used:
`network_tree` WHERE `olt_id` = '$olt_id' AND ` (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentWebhook.php-
Full path:
7stars/web/PaymentWebhook.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:34 12/05/2025
Last modified:
13:47:18 03/11/2024
MD5 hash:
a2f322c94787630ab1e0c8ca35fc5ba1
Filesize:
18.6 KB
suspicious functions used:
base64_decode (line:30);curl_exec (line:41);curl_exec (line:422); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeEdit1.php-
Full path:
7stars/web/NetworkTreeEdit1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:34 12/05/2025
Last modified:
13:47:12 03/11/2024
MD5 hash:
3396a6bdf9b5804bb208f38f37cc29a2
Filesize:
35.81 KB
suspicious functions used:
`olt_onu` WHERE olt_id = '$olt_id' AND ` (line:207); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeEditSave.php-
Full path:
7stars/web/NetworkTreeEditSave.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:34 12/05/2025
Last modified:
00:14:12 21/11/2024
MD5 hash:
6c0f94f3ddde2ee6a93db1fa98971907
Filesize:
12.41 KB
suspicious functions used:
`network_tree` WHERE `olt_id` = '$olt_id' AND ` (line:182); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeList.php-
Full path:
7stars/web/NetworkTreeList.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:34 12/05/2025
Last modified:
13:47:12 03/11/2024
MD5 hash:
7f697086943f78c922cabafa0f1f8cda
Filesize:
19.22 KB
suspicious functions used:
`pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '{$row['olt_id']}' AND ` (line:231); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeMap.php-
Full path:
7stars/web/NetworkTreeMap.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:34 12/05/2025
Last modified:
13:47:12 03/11/2024
MD5 hash:
584d02944bd9de5a190ec6dc320fc49e
Filesize:
24.24 KB
suspicious functions used:
`${results.rxPower}` (line:263);`${results.distance}` (line:264);`${results.supplyVoltage}` (line:265);`${results.temperature}` (line:266);`${results.txPower}` (line:267);`${results.rxPower}` (line:283);`${results.distance}` (line:284);`${results.supplyVoltage}` (line:285);`${results.temperature}` (line:286);`${results.txPower}` (line:287); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMSAddSave.php-
Full path:
7stars/web/SMSAddSave.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:35 12/05/2025
Last modified:
09:26:27 09/12/2024
MD5 hash:
18c49664e9a08d513b51e680f6201cb3
Filesize:
3.1 KB
suspicious functions used:
curl_exec (line:36); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SignUp1.php-
Full path:
7stars/web/SignUp1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:35 12/05/2025
Last modified:
13:47:22 03/11/2024
MD5 hash:
3f7943dd155c8e0a383b7d02730f8c11
Filesize:
24.59 KB
suspicious functions used:
curl_exec (line:33);curl_exec (line:59); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-countt.php-
Full path:
7stars/web/network-olt-client-onu-mac-countt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:36 12/05/2025
Last modified:
13:47:06 03/11/2024
MD5 hash:
d29b4e72c375f528b769bd3894f9f0e7
Filesize:
8.95 KB
suspicious functions used:
shell_exec (line:26);shell_exec (line:36);shell_exec (line:59);shell_exec (line:75);shell_exec (line:92);shell_exec (line:102);shell_exec (line:117);shell_exec (line:155);shell_exec (line:206);shell_exec (line:262);shell_exec (line:275);shell_exec (line:288); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: emp_salary_advence_find.php-
Full path:
7stars/web/emp_salary_advence_find.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:36 12/05/2025
Last modified:
13:46:58 03/11/2024
MD5 hash:
74a7e2ffda0f7584611d7cbce6136c24
Filesize:
2.25 KB
suspicious functions used:
`expanse` WHERE `type` = '2' AND `status` = '2' AND ex_by = '$e_id' AND MONTH(`, `) = MONTH('$lastmonth') AND YEAR(`, `) = YEAR('$lastmonth') GROUP BY ` (line:8);`e_id` = '$e_id' AND ` (line:12); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: imagevwr.php-
Full path:
7stars/web/imagevwr.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
05:08:19 12/05/2025
Last modified:
13:47:00 03/11/2024
MD5 hash:
47a223a13cc642d01dcfaaca542d396d
Filesize:
915 B
suspicious functions used:
curl_exec (line:15); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
7stars/web/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:36 12/05/2025
Last modified:
13:46:58 03/11/2024
MD5 hash:
c46a50905333286f45dfeacf010851ab
Filesize:
716 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: client-online-mbb.php-
Full path:
7stars/web/client-online-mbb.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:37 12/05/2025
Last modified:
13:46:48 03/11/2024
MD5 hash:
69c51efb5b9017a07a7158b4a63f3826
Filesize:
14.32 KB
suspicious functions used:
curl_exec (line:90); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_network.php-
Full path:
7stars/web/cron_network.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
16:40:10 11/05/2025
Last modified:
13:46:57 03/11/2024
MD5 hash:
db096f353e80027593ca3f9781a21ac8
Filesize:
4.93 KB
suspicious functions used:
curl_exec (line:45);curl_exec (line:67);curl_exec (line:127); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_olt.php-
Full path:
7stars/web/cron_olt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
15:30:18 11/05/2025
Last modified:
13:46:57 03/11/2024
MD5 hash:
6975951fdbf566164ba5fa5cfcd32ec7
Filesize:
4.27 KB
suspicious functions used:
shell_exec (line:48);curl_exec (line:127); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: clients-nots-action.php-
Full path:
7stars/web/clients-nots-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:37 12/05/2025
Last modified:
13:46:50 03/11/2024
MD5 hash:
dff1bb495509427d098cb4588da553b9
Filesize:
5.89 KB
suspicious functions used:
curl_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: company_info.php-
Full path:
7stars/web/company_info.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
08:40:10 12/05/2025
Last modified:
13:46:57 03/11/2024
MD5 hash:
e612d58aa2e38f5b49ba37c1bf620ece
Filesize:
8.38 KB
suspicious functions used:
curl_exec (line:130); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
7stars/web/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:37 12/05/2025
Last modified:
13:46:57 03/11/2024
MD5 hash:
ba9747d0421fd091b998389469e72a0b
Filesize:
1.7 KB
suspicious functions used:
curl_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_all.php-
Full path:
7stars/web/cron_all.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:37 12/05/2025
Last modified:
13:46:57 03/11/2024
MD5 hash:
967f1d654ae891609da26b9e0fdbd1ae
Filesize:
2.44 KB
suspicious functions used:
curl_exec (line:23);curl_exec (line:38);curl_exec (line:53); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_gen_bill.php-
Full path:
7stars/web/cron_auto_gen_bill.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:37 12/05/2025
Last modified:
13:46:57 03/11/2024
MD5 hash:
f1056618cc4402968e50d1232d2c51c8
Filesize:
4.73 KB
suspicious functions used:
curl_exec (line:140);curl_exec (line:149); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_olt_clients_catch.php-
Full path:
7stars/web/cron_olt_clients_catch.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:37 12/05/2025
Last modified:
13:46:57 03/11/2024
MD5 hash:
3b13c163ba3445b3d661c63adde1d985
Filesize:
1.12 KB
suspicious functions used:
curl_exec (line:23); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive.php-
Full path:
7stars/web/cron_auto_inactive.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
17:56:48 11/05/2025
Last modified:
03:28:47 10/12/2024
MD5 hash:
7e0dc4dd9dae2bf0220516641b53c027
Filesize:
5.43 KB
suspicious functions used:
curl_exec (line:142); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive2.php-
Full path:
7stars/web/cron_auto_inactive2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:37 12/05/2025
Last modified:
13:46:57 03/11/2024
MD5 hash:
440bc24f05b01eb395df63fff2f60de9
Filesize:
5.46 KB
suspicious functions used:
curl_exec (line:142); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_olt_user.php-
Full path:
7stars/web/cron_olt_user.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:37 12/05/2025
Last modified:
13:46:57 03/11/2024
MD5 hash:
67aa237639e3d1e6064e76079bb3cccc
Filesize:
1.97 KB
suspicious functions used:
curl_exec (line:19);curl_exec (line:46); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive_termination.php-
Full path:
7stars/web/cron_auto_inactive_termination.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
18:40:04 11/05/2025
Last modified:
13:46:57 03/11/2024
MD5 hash:
9f9c8ca9110c2304128646824bfb17db
Filesize:
12.16 KB
suspicious functions used:
curl_exec (line:241);curl_exec (line:253); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive_termination1.php-
Full path:
7stars/web/cron_auto_inactive_termination1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:37 12/05/2025
Last modified:
13:46:57 03/11/2024
MD5 hash:
be76b964c93a2cb4fa7e632750ff3bc4
Filesize:
6.64 KB
suspicious functions used:
curl_exec (line:156);curl_exec (line:168); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: getclientuptime.php-
Full path:
7stars/web/getclientuptime.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:37 12/05/2025
Last modified:
13:47:00 03/11/2024
MD5 hash:
bbc14cdd451c72b94d78c7d2d1af0b52
Filesize:
718 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_termination_remainder1.php-
Full path:
7stars/web/cron_auto_termination_remainder1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
03:05:16 12/05/2025
Last modified:
13:46:57 03/11/2024
MD5 hash:
7765f9f820dbd402f1064fab9958ffaa
Filesize:
3.26 KB
suspicious functions used:
curl_exec (line:83); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_client_bandwidth_count.php-
Full path:
7stars/web/cron_client_bandwidth_count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
09:53:04 12/05/2025
Last modified:
13:46:57 03/11/2024
MD5 hash:
1c71a3dd097275429ae845a85ced0438
Filesize:
5.33 KB
suspicious functions used:
curl_exec (line:124);curl_exec (line:134); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index.php-
Full path:
7stars/web/index.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
07:19:44 12/05/2025
Last modified:
13:47:00 03/11/2024
MD5 hash:
f161ab23adf4527023a0ad582d478f89
Filesize:
12.45 KB
suspicious functions used:
base64_decode (line:10);curl_exec (line:183); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-con-sts.php-
Full path:
7stars/web/network-olt-con-sts.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:37 12/05/2025
Last modified:
13:47:06 03/11/2024
MD5 hash:
a26b0a1c1567c34c9aa5e2e0254ff8a6
Filesize:
4 KB
suspicious functions used:
`olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:10);shell_exec (line:38);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, `last_synced`, `last_update`, `msg`, `full_msg`, ROUND((SELECT AVG(value) FROM olt_onu_history WHERE alarm_id = '$alarmId' AND value != ''), 2) AS average_value FROM `, ` WHERE `alarm_id` = '$alarmId' AND ` (line:82); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-oid-check.php-
Full path:
7stars/web/network-olt-oid-check.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:37 12/05/2025
Last modified:
13:47:07 03/11/2024
MD5 hash:
5b7dc0ce1103fbfc895873c250b63141
Filesize:
1.88 KB
suspicious functions used:
shell_exec (line:33); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ip-ping-checker.php-
Full path:
7stars/web/ip-ping-checker.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:37 12/05/2025
Last modified:
13:47:01 03/11/2024
MD5 hash:
0d28f3053b73b3fe2885cf519ee17c12
Filesize:
2.64 KB
suspicious functions used:
curl_exec (line:81); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-load.php-
Full path:
7stars/web/network-olt-load.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:37 12/05/2025
Last modified:
13:47:07 03/11/2024
MD5 hash:
f49d5153285c639ed91d4e806685ee56
Filesize:
1.33 KB
suspicious functions used:
shell_exec (line:22);shell_exec (line:25); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec.php-
Full path:
7stars/web/login_exec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
03:02:13 12/05/2025
Last modified:
13:47:02 03/11/2024
MD5 hash:
9038a77a32a5db2c9affae1496473f3e
Filesize:
5.27 KB
suspicious functions used:
curl_exec (line:62); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: loginexec.php-
Full path:
7stars/web/loginexec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:37 12/05/2025
Last modified:
13:47:02 03/11/2024
MD5 hash:
edb8017e7d0f8e037facbcacc94a383d
Filesize:
5.91 KB
suspicious functions used:
curl_exec (line:67); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-helper.php-
Full path:
7stars/web/nagad-helper.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:37 12/05/2025
Last modified:
13:47:06 03/11/2024
MD5 hash:
2bb70c44d68202e0a0cd8ae1388f0b1b
Filesize:
6.74 KB
suspicious functions used:
curl_exec (line:61);base64_decode (line:97); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-merchant-callback.php-
Full path:
7stars/web/nagad-merchant-callback.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:37 12/05/2025
Last modified:
13:47:06 03/11/2024
MD5 hash:
abc8d9e7aad4d9c622dcd97e701448bc
Filesize:
16.5 KB
suspicious functions used:
curl_exec (line:20); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-olt-all-mac-array.php-
Full path:
7stars/web/netowrk-olt-all-mac-array.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:37 12/05/2025
Last modified:
13:47:06 03/11/2024
MD5 hash:
b0168ce99145e2afe64357247d750dd6
Filesize:
4.62 KB
suspicious functions used:
shell_exec (line:33);shell_exec (line:47);shell_exec (line:61);shell_exec (line:76);shell_exec (line:93); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-snmp-data.php-
Full path:
7stars/web/netowrk-snmp-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
05:08:20 12/05/2025
Last modified:
13:47:06 03/11/2024
MD5 hash:
9badf5c53b260315a061e1bb6cd2378f
Filesize:
24.8 KB
suspicious functions used:
shell_exec (line:104);shell_exec (line:113);shell_exec (line:123);shell_exec (line:142);shell_exec (line:154);shell_exec (line:165);shell_exec (line:181);shell_exec (line:191);shell_exec (line:207);shell_exec (line:227);shell_exec (line:236);shell_exec (line:244);shell_exec (line:251);shell_exec (line:256);`pon_name` FROM `olt_pon` WHERE `olt_pon_id` = '$pon_id' AND ` (line:263);shell_exec (line:280);shell_exec (line:290);`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:303);shell_exec (line:309);shell_exec (line:444); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-old-onu-rx-map.php-
Full path:
7stars/web/network-old-onu-rx-map.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:37 12/05/2025
Last modified:
13:47:06 03/11/2024
MD5 hash:
b4962c160c5ad68ccd8eed9c48d82a0f
Filesize:
6.94 KB
suspicious functions used:
shell_exec (line:76); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-old-onu-rx.php-
Full path:
7stars/web/network-old-onu-rx.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:37 12/05/2025
Last modified:
13:47:06 03/11/2024
MD5 hash:
b4962c160c5ad68ccd8eed9c48d82a0f
Filesize:
6.94 KB
suspicious functions used:
shell_exec (line:76); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-count-cdata.php-
Full path:
7stars/web/network-olt-client-onu-mac-count-cdata.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:37 12/05/2025
Last modified:
13:47:06 03/11/2024
MD5 hash:
c378dbabf36066c335cfb8838a6e167d
Filesize:
4.58 KB
suspicious functions used:
shell_exec (line:25);shell_exec (line:35);shell_exec (line:56);shell_exec (line:103);shell_exec (line:115);shell_exec (line:126);shell_exec (line:140); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-count.php-
Full path:
7stars/web/network-olt-client-onu-mac-count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:37 12/05/2025
Last modified:
13:47:06 03/11/2024
MD5 hash:
300ca68aa5a7a32160838b9f2627d2aa
Filesize:
14.56 KB
suspicious functions used:
shell_exec (line:26);shell_exec (line:36);shell_exec (line:68);shell_exec (line:84);shell_exec (line:101);shell_exec (line:119);shell_exec (line:135);shell_exec (line:176);shell_exec (line:236);shell_exec (line:312);shell_exec (line:379);shell_exec (line:441);shell_exec (line:460);shell_exec (line:479); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook11.php-
Full path:
7stars/web/webhook11.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:37 12/05/2025
Last modified:
13:47:28 03/11/2024
MD5 hash:
26e2059a39281031d28874b51b52d60c
Filesize:
21.23 KB
suspicious functions used:
base64_decode (line:27);curl_exec (line:38);curl_exec (line:454); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-alarm-add.php-
Full path:
7stars/web/network-olt-onu-alarm-add.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:37 12/05/2025
Last modified:
13:47:07 03/11/2024
MD5 hash:
be6ba82c658419e1454f778e20e2d4c3
Filesize:
7.86 KB
suspicious functions used:
shell_exec (line:103); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-count.php-
Full path:
7stars/web/network-olt-onu-count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:37 12/05/2025
Last modified:
13:47:07 03/11/2024
MD5 hash:
67dd698e92e750fe16906b88b074cb88
Filesize:
5.18 KB
suspicious functions used:
`olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:11);shell_exec (line:65); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-list-data.php-
Full path:
7stars/web/network-olt-onu-list-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:38 12/05/2025
Last modified:
13:47:07 03/11/2024
MD5 hash:
54cc9417c766c31317311c3722ce7d4b
Filesize:
9.48 KB
suspicious functions used:
shell_exec (line:24);shell_exec (line:38);shell_exec (line:64);shell_exec (line:85);shell_exec (line:104);shell_exec (line:125);shell_exec (line:143);shell_exec (line:153);shell_exec (line:165);shell_exec (line:185); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tagreeexpayment.php-
Full path:
7stars/web/tagreeexpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:38 12/05/2025
Last modified:
13:47:26 03/11/2024
MD5 hash:
029b4fba649a75c7c81d2f8931be8d63
Filesize:
2.86 KB
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-power.php-
Full path:
7stars/web/network-olt-onu-power.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:38 12/05/2025
Last modified:
13:47:07 03/11/2024
MD5 hash:
2e064543b67b532bdf4e5b12d49c5052
Filesize:
7.54 KB
suspicious functions used:
shell_exec (line:97); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-clients-search.php-
Full path:
7stars/web/network-olt-pon-clients-search.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:38 12/05/2025
Last modified:
13:47:07 03/11/2024
MD5 hash:
79d26fc66abdab6f173330588aa8b238
Filesize:
10.93 KB
suspicious functions used:
shell_exec (line:42);shell_exec (line:51);shell_exec (line:104);shell_exec (line:168); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search-bdcom.php-
Full path:
7stars/web/network-olt-pon-onu-search-bdcom.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:38 12/05/2025
Last modified:
13:47:07 03/11/2024
MD5 hash:
c786fa8b69268c738b6ff976631798cd
Filesize:
27.74 KB
suspicious functions used:
shell_exec (line:60);shell_exec (line:69);shell_exec (line:383); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search-bdcom1.php-
Full path:
7stars/web/network-olt-pon-onu-search-bdcom1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:38 12/05/2025
Last modified:
13:47:07 03/11/2024
MD5 hash:
dd18677b1dcbf7f0bce2ac6912d98da0
Filesize:
9.6 KB
suspicious functions used:
shell_exec (line:42);shell_exec (line:51);shell_exec (line:129); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search.php-
Full path:
7stars/web/network-olt-pon-onu-search.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:38 12/05/2025
Last modified:
13:47:07 03/11/2024
MD5 hash:
dc183ecf77d0e1f56f672338fd09cfa5
Filesize:
21.62 KB
suspicious functions used:
shell_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreateagree.php-
Full path:
7stars/web/tcreateagree.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:38 12/05/2025
Last modified:
13:47:26 03/11/2024
MD5 hash:
27a10adf4190edc7eceee8cf74a6b72b
Filesize:
999 B
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tis-news.php-
Full path:
7stars/web/tis-news.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:38 12/05/2025
Last modified:
13:47:26 03/11/2024
MD5 hash:
ed23ca98b77c5321b4485e85eb2ea64d
Filesize:
3.67 KB
suspicious functions used:
curl_exec (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tt.php-
Full path:
7stars/web/tt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:38 12/05/2025
Last modified:
13:47:26 03/11/2024
MD5 hash:
9c4ed141cb79fdc7e807b35923c91a20
Filesize:
1.56 KB
suspicious functions used:
curl_exec (line:30); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data-bdcom.php-
Full path:
7stars/web/network-snmp-onu-status-data-bdcom.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:38 12/05/2025
Last modified:
13:47:07 03/11/2024
MD5 hash:
065f5e2b05932ee66d473135998580ac
Filesize:
23.53 KB
suspicious functions used:
shell_exec (line:48);shell_exec (line:73);shell_exec (line:85);shell_exec (line:103);shell_exec (line:116);shell_exec (line:128);shell_exec (line:134);shell_exec (line:159);shell_exec (line:172);shell_exec (line:184);shell_exec (line:190);shell_exec (line:217);shell_exec (line:233);shell_exec (line:239);shell_exec (line:244);shell_exec (line:248);`pon_name` FROM `olt_pon` WHERE `olt_pon_id` = '$ponn_id' AND ` (line:255);shell_exec (line:263); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data.php-
Full path:
7stars/web/network-snmp-onu-status-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:38 12/05/2025
Last modified:
13:47:07 03/11/2024
MD5 hash:
0adfee384bf349b50f11036947fd2a74
Filesize:
30.37 KB
suspicious functions used:
shell_exec (line:38);`olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:42);shell_exec (line:81);shell_exec (line:95);shell_exec (line:109);shell_exec (line:122);shell_exec (line:208);shell_exec (line:429);shell_exec (line:441);shell_exec (line:448); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data1.php-
Full path:
7stars/web/network-snmp-onu-status-data1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:38 12/05/2025
Last modified:
13:47:07 03/11/2024
MD5 hash:
920bd1a592c36f7a1194b737642f8340
Filesize:
15.96 KB
suspicious functions used:
shell_exec (line:33);`olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:37);shell_exec (line:149); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ttoken.php-
Full path:
7stars/web/ttoken.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:38 12/05/2025
Last modified:
13:47:26 03/11/2024
MD5 hash:
5f2c51c1db5b0defadfb67ce25c0098f
Filesize:
1.54 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data_vsol2.php-
Full path:
7stars/web/network-snmp-onu-status-data_vsol2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:38 12/05/2025
Last modified:
13:47:07 03/11/2024
MD5 hash:
f22d022ddc284f4d8e1de3660da91db8
Filesize:
15.61 KB
suspicious functions used:
shell_exec (line:34);shell_exec (line:113);shell_exec (line:126);shell_exec (line:132); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreatepayment.php-
Full path:
7stars/web/tcreatepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:38 12/05/2025
Last modified:
13:47:26 03/11/2024
MD5 hash:
e49de9a33f5164bc2c6b88e4770faaff
Filesize:
1.07 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
7stars/web/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:38 12/05/2025
Last modified:
13:47:26 03/11/2024
MD5 hash:
7d8e71ceda3ffb74623e0c4a814715af
Filesize:
1.53 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test2.php-
Full path:
7stars/web/test2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:38 12/05/2025
Last modified:
13:47:26 03/11/2024
MD5 hash:
ab80d92ede21b7da59bfefb325484297
Filesize:
13.76 KB
suspicious functions used:
shell_exec (line:59);shell_exec (line:70);shell_exec (line:76);shell_exec (line:88);shell_exec (line:101);shell_exec (line:141);curl_exec (line:187);curl_exec (line:212);curl_exec (line:354); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-tree-vartual-nodes.php-
Full path:
7stars/web/network-tree-vartual-nodes.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:38 12/05/2025
Last modified:
13:47:08 03/11/2024
MD5 hash:
3530b8bc3113544014b1746ecd67e834
Filesize:
10.64 KB
suspicious functions used:
shell_exec (line:76);shell_exec (line:111);shell_exec (line:145);shell_exec (line:181);shell_exec (line:188); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: sms-balance-check.php-
Full path:
7stars/web/sms-balance-check.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
04:00:58 12/05/2025
Last modified:
09:45:29 09/12/2024
MD5 hash:
177ddaf2af53d1a9ee52f66df641dae1
Filesize:
748 B
suspicious functions used:
curl_exec (line:15); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree-olt-onu-list-data.php-
Full path:
7stars/web/networktree-olt-onu-list-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:38 12/05/2025
Last modified:
13:47:10 03/11/2024
MD5 hash:
af4221fefa9c9051846a063ac4135560
Filesize:
8.72 KB
suspicious functions used:
shell_exec (line:24);shell_exec (line:36);shell_exec (line:59);shell_exec (line:78);shell_exec (line:97);shell_exec (line:116);shell_exec (line:134);shell_exec (line:143);shell_exec (line:155);shell_exec (line:175); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: sms_deliverey_report.php-
Full path:
7stars/web/sms_deliverey_report.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:38 12/05/2025
Last modified:
13:47:24 03/11/2024
MD5 hash:
03623943da7e9334e137b38c8577fc84
Filesize:
4.25 KB
suspicious functions used:
curl_exec (line:28);curl_exec (line:53);curl_exec (line:90); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_onu_list_add.php-
Full path:
7stars/web/networktree_device_onu_list_add.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:38 12/05/2025
Last modified:
13:47:13 03/11/2024
MD5 hash:
444ccf3c3e852a5a25cc4ccd3a5cf9ca
Filesize:
14.66 KB
suspicious functions used:
`network_tree` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND device_type = '5' AND ` (line:9);shell_exec (line:33);`network_tree` WHERE `onu_mac` = '$mac_address' AND ` (line:131);shell_exec (line:179);shell_exec (line:187);shell_exec (line:235);`network_tree` WHERE `onu_mac` = '$onuMac' AND ` (line:301); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_pon_check.php-
Full path:
7stars/web/networktree_device_pon_check.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:38 12/05/2025
Last modified:
13:47:13 03/11/2024
MD5 hash:
708a93aadcae96ecf0aaca52041fcf38
Filesize:
1.53 KB
suspicious functions used:
`pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '$olt_id' AND ` (line:8); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: support-action.php-
Full path:
7stars/web/support-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:38 12/05/2025
Last modified:
13:47:25 03/11/2024
MD5 hash:
58556808f93f52486b2ad06998142aa9
Filesize:
14.56 KB
suspicious functions used:
curl_exec (line:220); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_pon_list_add.php-
Full path:
7stars/web/networktree_device_pon_list_add.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:38 12/05/2025
Last modified:
13:47:13 03/11/2024
MD5 hash:
2ec03912801e4749c2e9cd361417ca5f
Filesize:
1.36 KB
suspicious functions used:
`olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:6);`olt_pon` WHERE `olt_id` = '$olt_id' AND ` (line:10);`network_tree` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND ` (line:17); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_pon_port_onu_list.php-
Full path:
7stars/web/networktree_device_pon_port_onu_list.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:38 12/05/2025
Last modified:
13:47:13 03/11/2024
MD5 hash:
9c63b3ac69996628f5eb2959a9eb4e15
Filesize:
8.65 KB
suspicious functions used:
`olt_pon` WHERE olt_id = '$olt_id' AND ` (line:25);shell_exec (line:32);shell_exec (line:45);`network_tree` WHERE onu_index_id = '$port_onu_index_id' AND ` (line:49);shell_exec (line:81);shell_exec (line:103);shell_exec (line:122);shell_exec (line:143);shell_exec (line:161);shell_exec (line:170);shell_exec (line:184); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_pon_port_sense_list.php-
Full path:
7stars/web/networktree_device_pon_port_sense_list.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:38 12/05/2025
Last modified:
13:47:13 03/11/2024
MD5 hash:
ee69cd5cc122f8aa37d8d8e5c74def6b
Filesize:
3.65 KB
suspicious functions used:
`network_tree` WHERE `onu_mac` = '$onu_mac' AND ` (line:26);`network_tree` WHERE `c_id` = '{$dfhbdxf}' AND ` (line:71); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_type.php-
Full path:
7stars/web/networktree_device_type.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:39 12/05/2025
Last modified:
00:14:12 21/11/2024
MD5 hash:
f1520732e5a3ef38564238a3278a1f63
Filesize:
11.43 KB
suspicious functions used:
`tree_id`) AS countolt FROM `network_tree` WHERE `olt_id` = '$olt_id_sure' AND ` (line:64); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test6.php-
Full path:
7stars/web/test6.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:39 12/05/2025
Last modified:
13:47:26 03/11/2024
MD5 hash:
f22d022ddc284f4d8e1de3660da91db8
Filesize:
15.61 KB
suspicious functions used:
shell_exec (line:34);shell_exec (line:113);shell_exec (line:126);shell_exec (line:132); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test7.php-
Full path:
7stars/web/test7.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:39 12/05/2025
Last modified:
13:47:26 03/11/2024
MD5 hash:
b11ccf951ce63a21ea0a7328316a0e5c
Filesize:
1.57 KB
suspicious functions used:
curl_exec (line:14); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: testttttt.php-
Full path:
7stars/web/testttttt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:39 12/05/2025
Last modified:
13:47:26 03/11/2024
MD5 hash:
b1988a4be29e191ad935fb409a4174ee
Filesize:
2 KB
suspicious functions used:
curl_exec (line:47); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: texecutepayment.php-
Full path:
7stars/web/texecutepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:39 12/05/2025
Last modified:
13:47:26 03/11/2024
MD5 hash:
623635fdf5c871391d3a5fe99ee8c543
Filesize:
2.91 KB
suspicious functions used:
curl_exec (line:24); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook2.php-
Full path:
7stars/web/webhook2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:39 12/05/2025
Last modified:
13:47:28 03/11/2024
MD5 hash:
74a7dcc262d7fe7f2bdc9e0595d03837
Filesize:
4.69 KB
suspicious functions used:
base64_decode (line:22);curl_exec (line:33);curl_exec (line:86);curl_exec (line:107); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook.php-
Full path:
7stars/web/webhook.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
14:11:50 11/05/2025
Last modified:
13:47:28 03/11/2024
MD5 hash:
18c8353c99f0ca2645c68685e40c568b
Filesize:
21.1 KB
suspicious functions used:
base64_decode (line:28);curl_exec (line:39);curl_exec (line:429); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery2.php-
Full path:
abi/m/PaymentOnlineQuery2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:39 12/05/2025
Last modified:
19:44:27 20/11/2024
MD5 hash:
3660992067d5591fc79ce89d6dbb9274
Filesize:
19.08 KB
suspicious functions used:
curl_exec (line:41);curl_exec (line:254); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
abi/m/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:39 12/05/2025
Last modified:
19:44:27 20/11/2024
MD5 hash:
7d8e71ceda3ffb74623e0c4a814715af
Filesize:
1.53 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tagreeexpayment.php-
Full path:
abi/m/tagreeexpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
04:39:41 12/05/2025
Last modified:
19:44:27 20/11/2024
MD5 hash:
c95e3ee881752db67b4f3597bc58430a
Filesize:
2.46 KB
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ttoken.php-
Full path:
abi/m/ttoken.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
13:27:45 11/05/2025
Last modified:
19:44:27 20/11/2024
MD5 hash:
5f2c51c1db5b0defadfb67ce25c0098f
Filesize:
1.54 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
abi/m/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:40 12/05/2025
Last modified:
19:44:26 20/11/2024
MD5 hash:
849185f307be30eafb1bbef93616d8c3
Filesize:
1.71 KB
suspicious functions used:
curl_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: support-action.php-
Full path:
abi/m/support-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:40 12/05/2025
Last modified:
13:26:59 13/03/2025
MD5 hash:
adb69d6d3e277ad4c464c4fd0c41b4ca
Filesize:
10.29 KB
suspicious functions used:
curl_exec (line:99); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
abi/m/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:40 12/05/2025
Last modified:
19:44:26 20/11/2024
MD5 hash:
9a3f22521ad987e86f84c4f5f688d5b7
Filesize:
713 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec.php-
Full path:
abi/m/login_exec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
04:41:34 12/05/2025
Last modified:
20:20:46 23/04/2025
MD5 hash:
c8b31379830b912ec08a7917166a4aeb
Filesize:
12.26 KB
suspicious functions used:
curl_exec (line:25);curl_exec (line:81);curl_exec (line:200);curl_exec (line:238); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery.php-
Full path:
abi/m/PaymentOnlineQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
04:14:31 12/05/2025
Last modified:
21:34:55 14/02/2025
MD5 hash:
6483645d440dd2f976cc1b29cb4021d5
Filesize:
20.95 KB
suspicious functions used:
curl_exec (line:287);curl_exec (line:492); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreateagree.php-
Full path:
abi/m/tcreateagree.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
04:38:02 12/05/2025
Last modified:
19:44:27 20/11/2024
MD5 hash:
27a10adf4190edc7eceee8cf74a6b72b
Filesize:
999 B
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-merchant-callback.php-
Full path:
abi/m/nagad-merchant-callback.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:40 12/05/2025
Last modified:
05:34:54 30/03/2025
MD5 hash:
3fcf93d3aec6449a76e27b14f01ada02
Filesize:
11.32 KB
suspicious functions used:
curl_exec (line:20); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreatepayment.php-
Full path:
abi/m/tcreatepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
13:28:44 11/05/2025
Last modified:
19:44:27 20/11/2024
MD5 hash:
e49de9a33f5164bc2c6b88e4770faaff
Filesize:
1.07 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-snmp-data.php-
Full path:
abi/m/netowrk-snmp-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:40 12/05/2025
Last modified:
10:15:44 29/04/2025
MD5 hash:
a0f9ff194951c18f7390ef750529f434
Filesize:
24.14 KB
suspicious functions used:
shell_exec (line:96);shell_exec (line:105);shell_exec (line:115);shell_exec (line:134);shell_exec (line:146);shell_exec (line:157);shell_exec (line:173);shell_exec (line:183);shell_exec (line:199);shell_exec (line:219);shell_exec (line:229);shell_exec (line:234);shell_exec (line:242);shell_exec (line:262);shell_exec (line:278);`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:291);shell_exec (line:297);shell_exec (line:430); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: texecutepayment.php-
Full path:
abi/m/texecutepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
13:28:59 11/05/2025
Last modified:
19:44:27 20/11/2024
MD5 hash:
efbb63dfcfdacb52dec74bffc389bbb3
Filesize:
2.67 KB
suspicious functions used:
curl_exec (line:24); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index.php-
Full path:
abi/m/index.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:56:35 12/05/2025
Last modified:
20:18:03 23/04/2025
MD5 hash:
5a9206eb2ef2835083705f01e81f5b41
Filesize:
16.41 KB
suspicious functions used:
curl_exec (line:282); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: LoginByPass.php-
Full path:
abi/m/LoginByPass.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:41 12/05/2025
Last modified:
09:07:53 19/04/2025
MD5 hash:
ce55a8f81ccab7d07744fd3914d6ee35
Filesize:
4.65 KB
suspicious functions used:
curl_exec (line:44);curl_exec (line:69); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: billpaycheck.php-
Full path:
abi/web/bkash/billpaycheck.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:41 12/05/2025
Last modified:
19:44:41 20/11/2024
MD5 hash:
38c46efc36b25628fa18bd92ae135af9
Filesize:
796 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
abi/web/bkash/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:41 12/05/2025
Last modified:
19:44:41 20/11/2024
MD5 hash:
6175301f744b22b7db70ba598a991f8b
Filesize:
1.64 KB
suspicious functions used:
curl_exec (line:36); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
abi/web/bkash/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:41 12/05/2025
Last modified:
19:44:41 20/11/2024
MD5 hash:
19be365d26141eaecead7ef0ada0e75c
Filesize:
1.3 KB
suspicious functions used:
curl_exec (line:31); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: grant.php-
Full path:
abi/web/bkash/grant.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:41 12/05/2025
Last modified:
19:44:41 20/11/2024
MD5 hash:
da5499d260dc78ea4fcd71227cc6c484
Filesize:
2.01 KB
suspicious functions used:
curl_exec (line:41);curl_exec (line:63); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: query.php-
Full path:
abi/web/bkash/query.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:41 12/05/2025
Last modified:
19:44:41 20/11/2024
MD5 hash:
f3ed9045f3a073e2cdc8561d500bda89
Filesize:
1.65 KB
suspicious functions used:
curl_exec (line:33); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tagreeexpayment.php-
Full path:
abi/web/bkash/tagreeexpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:41 12/05/2025
Last modified:
19:44:41 20/11/2024
MD5 hash:
a1ba7d36003f72e593615aa32e44acb9
Filesize:
1.58 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreateagree.php-
Full path:
abi/web/bkash/tcreateagree.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:41 12/05/2025
Last modified:
19:44:41 20/11/2024
MD5 hash:
8ae6bdc9f3d4b0cdcf651701a0d9ebab
Filesize:
1.2 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreatepayment.php-
Full path:
abi/web/bkash/tcreatepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:41 12/05/2025
Last modified:
19:44:41 20/11/2024
MD5 hash:
3c978def6cffa0a8db5e86ce127caae6
Filesize:
1.35 KB
suspicious functions used:
curl_exec (line:29); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: texecutepayment.php-
Full path:
abi/web/bkash/texecutepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:41 12/05/2025
Last modified:
19:44:41 20/11/2024
MD5 hash:
d8f24df64623da3cfc2baf48f184a3d1
Filesize:
1.21 KB
suspicious functions used:
curl_exec (line:25); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
abi/web/bkash/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:41 12/05/2025
Last modified:
19:44:41 20/11/2024
MD5 hash:
f50b33eeb31927b2c081195618d48b8d
Filesize:
1.88 KB
suspicious functions used:
curl_exec (line:48); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tokent.php-
Full path:
abi/web/bkash/tokent.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:41 12/05/2025
Last modified:
19:44:41 20/11/2024
MD5 hash:
890a9e9fb1be75f31a6daad8811c1ff9
Filesize:
1.9 KB
suspicious functions used:
curl_exec (line:48); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: trxID.php-
Full path:
abi/web/bkash/trxID.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:41 12/05/2025
Last modified:
19:44:41 20/11/2024
MD5 hash:
9bcb8e70728fd25807c4db8916166d74
Filesize:
1.44 KB
suspicious functions used:
curl_exec (line:31); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
abi/web/bkasht/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:41 12/05/2025
Last modified:
19:44:42 20/11/2024
MD5 hash:
a4ba6e7683f558dc3602dacd7ddeded2
Filesize:
1.36 KB
suspicious functions used:
curl_exec (line:29); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
abi/web/bkasht/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:41 12/05/2025
Last modified:
19:44:42 20/11/2024
MD5 hash:
aad462fbca9f9a36649a197d67403098
Filesize:
1.27 KB
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: grant.php-
Full path:
abi/web/bkasht/grant.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:41 12/05/2025
Last modified:
19:44:42 20/11/2024
MD5 hash:
da5499d260dc78ea4fcd71227cc6c484
Filesize:
2.01 KB
suspicious functions used:
curl_exec (line:41);curl_exec (line:63); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: query.php-
Full path:
abi/web/bkasht/query.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:41 12/05/2025
Last modified:
19:44:42 20/11/2024
MD5 hash:
f3ed9045f3a073e2cdc8561d500bda89
Filesize:
1.65 KB
suspicious functions used:
curl_exec (line:33); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
abi/web/bkasht/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:41 12/05/2025
Last modified:
19:44:42 20/11/2024
MD5 hash:
f50b33eeb31927b2c081195618d48b8d
Filesize:
1.88 KB
suspicious functions used:
curl_exec (line:48); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: trxID.php-
Full path:
abi/web/bkasht/trxID.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:41 12/05/2025
Last modified:
19:44:42 20/11/2024
MD5 hash:
9bcb8e70728fd25807c4db8916166d74
Filesize:
1.44 KB
suspicious functions used:
curl_exec (line:31); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: class.phpmailer.php-
Full path:
abi/web/email/class.phpmailer.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:41 12/05/2025
Last modified:
19:44:42 20/11/2024
MD5 hash:
68468d69b47fffecc89df57e27c5a781
Filesize:
143.32 KB
suspicious functions used:
`$DKIM_private` (line:428);popen (line:1387);popen (line:1408);base64_decode (line:3410);`$mail->set('SMTPSecure', 'tls');` (line:3688);`$mail->SMTPSecure = 'tls';` (line:3690); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: class.smtp.php-
Full path:
abi/web/email/class.smtp.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:41 12/05/2025
Last modified:
19:44:43 20/11/2024
MD5 hash:
aa8478329268e5438a4469c268337a10
Filesize:
41.44 KB
suspicious functions used:
base64_decode (line:513);base64_decode (line:533); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: JSON.php-
Full path:
abi/web/inc/JSON.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:42 12/05/2025
Last modified:
19:44:49 20/11/2024
MD5 hash:
f5a34509e06231308becbe320ade9ff6
Filesize:
33.22 KB
suspicious functions used:
eval (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: jqgrid.php-
Full path:
abi/web/inc/jqgrid.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:42 12/05/2025
Last modified:
19:44:49 20/11/2024
MD5 hash:
71027a29e71e0626d8b57cbb631e6d98
Filesize:
23.92 KB
suspicious functions used:
eval (line:397); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: smsapicore.php-
Full path:
abi/web/include/smsapicore.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
18:04:39 11/05/2025
Last modified:
01:51:14 05/02/2025
MD5 hash:
0494713963b7e9ead12abe06de2811a5
Filesize:
1.26 KB
suspicious functions used:
curl_exec (line:37); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: telegramapicore.php-
Full path:
abi/web/include/telegramapicore.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:45:31 12/05/2025
Last modified:
22:11:00 21/01/2025
MD5 hash:
511f56e6dfcf4e9e7a11259e023ca3ae
Filesize:
3.15 KB
suspicious functions used:
curl_exec (line:68); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Changes.txt-
Full path:
abi/web/js/jqgrid/js/Changes.txt
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:42 12/05/2025
Last modified:
19:44:55 20/11/2024
MD5 hash:
c0a4adbc3f1c6d592cb4fa8433fee9ea
Filesize:
44.32 KB
suspicious functions used:
system (line:87); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ui.php-
Full path:
abi/web/js/tinymce/themes/advanced/skins/highcontrast/ui.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:42 12/05/2025
Last modified:
19:45:01 20/11/2024
MD5 hash:
3edaf67be8573b86686f46bbba4f058c
Filesize:
4.53 KB
suspicious functions used:
curl_exec (line:20);`bill_amount` = '0.00' WHERE bill_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY ` (line:53);`bill_amount` = '0.00', days = '0.00' WHERE entry_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY ` (line:54);`payment` WHERE `pay_date` < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND pay_amount != '0.00' ORDER BY ` (line:55);curl_exec (line:146);curl_exec (line:168); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients3.php-
Full path:
abi/web/Clients3.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:42 12/05/2025
Last modified:
19:44:34 20/11/2024
MD5 hash:
50ddc869b383ab76e009c7a2c17c99a3
Filesize:
175.31 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:832); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: AutoActiveClientsCount1.php-
Full path:
abi/web/AutoActiveClientsCount1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
07:35:51 12/05/2025
Last modified:
03:22:57 24/03/2025
MD5 hash:
96ae95689b28aef52bd4eaab4bfea7cc
Filesize:
5.38 KB
suspicious functions used:
system (line:54); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: AutoActiveClientsCount11.php-
Full path:
abi/web/AutoActiveClientsCount11.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:43 12/05/2025
Last modified:
19:44:33 20/11/2024
MD5 hash:
a0090e4a11dd59b955a6edd549b6ef2f
Filesize:
5.85 KB
suspicious functions used:
system (line:54); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ClientsOnMap.php-
Full path:
abi/web/ClientsOnMap.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:44 12/05/2025
Last modified:
06:01:07 12/03/2025
MD5 hash:
09d892b9dfcb6450c18306f2676b795e
Filesize:
19.44 KB
suspicious functions used:
`${totalonline}` (line:173);`${totaloffline}` (line:174);`${results.rxPower}` (line:307);`${results.distance}` (line:308);`${results.supplyVoltage}` (line:309);`${results.temperature}` (line:310);`${results.txPower}` (line:311); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ClientView.php-
Full path:
abi/web/ClientView.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
18:42:35 11/05/2025
Last modified:
15:45:54 07/05/2025
MD5 hash:
9c72d4b1fab2538bed638947e9305788
Filesize:
112.57 KB
suspicious functions used:
`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:227); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients.php-
Full path:
abi/web/Clients.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
17:35:49 11/05/2025
Last modified:
16:33:01 07/05/2025
MD5 hash:
813f3342191ae66a98437696e5a413cf
Filesize:
197.66 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:761); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: EmployeeAdd.php-
Full path:
abi/web/EmployeeAdd.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:45 12/05/2025
Last modified:
04:15:31 15/02/2025
MD5 hash:
c12c85fa282eb15060ed68bad252f8e8
Filesize:
19.13 KB
suspicious functions used:
`Element with ID ${id} not found.` (line:36);`Non-numeric input detected in ${id}.` (line:38);`Element with ID ${id} not found.` (line:44);`Non-numeric input detected in ${id}.` (line:46); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients1.php-
Full path:
abi/web/Clients1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:45 12/05/2025
Last modified:
07:08:14 03/05/2025
MD5 hash:
ccec9015b85db7f5fd719dce1ddfd76d
Filesize:
197.59 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:759); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients2.php-
Full path:
abi/web/Clients2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:45 12/05/2025
Last modified:
19:44:34 20/11/2024
MD5 hash:
982d6411552113b0715fd17c26f50292
Filesize:
205.13 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:832); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: EmployeeEdit.php-
Full path:
abi/web/EmployeeEdit.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:46 12/05/2025
Last modified:
04:15:31 15/02/2025
MD5 hash:
55b4626339d566473f477e1a001dc8b4
Filesize:
17.73 KB
suspicious functions used:
`Element with ID ${id} not found.` (line:44);`Non-numeric input detected in ${id}.` (line:46);`Element with ID ${id} not found.` (line:52);`Non-numeric input detected in ${id}.` (line:54); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: MacResellerAdd.php-
Full path:
abi/web/MacResellerAdd.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:46 12/05/2025
Last modified:
22:02:20 23/04/2025
MD5 hash:
5fdbde3df3e96e845cc118cb3ae916a5
Filesize:
30.33 KB
suspicious functions used:
`input[name="${inputName}"]:checked` (line:799); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: MacResellerEdit.php-
Full path:
abi/web/MacResellerEdit.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
03:47:26 12/05/2025
Last modified:
22:01:56 23/04/2025
MD5 hash:
92ce35276f3eae45e866de3439baaa11
Filesize:
37.76 KB
suspicious functions used:
`input[name="${inputName}"]:checked` (line:640); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: InstrumentsStoreOutDetails.php-
Full path:
abi/web/InstrumentsStoreOutDetails.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:47 12/05/2025
Last modified:
19:44:35 20/11/2024
MD5 hash:
a60c19f766bfff1ccdccbeba6b39eb87
Filesize:
9.37 KB
suspicious functions used:
`update_date`, '%D-%b, %y') AS offdate, TIME_FORMAT(`update_time`, '%T') AS offtime FROM `con_sts_log` WHERE `c_id` = '{$row['c_id']}' AND con_sts = 'Inactive' ORDER BY ` (line:120); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkLoad.php-
Full path:
abi/web/NetworkLoad.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:47 12/05/2025
Last modified:
19:44:37 20/11/2024
MD5 hash:
e1632e66ee1b7394d3fb82751b924abe
Filesize:
2.83 KB
suspicious functions used:
system (line:81); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Network.php-
Full path:
abi/web/Network.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:47 12/05/2025
Last modified:
01:12:51 05/05/2025
MD5 hash:
85105512c59282e667cfe15bc67d73bb
Filesize:
69.44 KB
suspicious functions used:
system (line:371);shell_exec (line:654);`network_tree` WHERE `device_type` = '1' AND `olt_id` = '{$rowo['olt_id']}' AND sts = '0' AND ` (line:874); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkLoad1.php-
Full path:
abi/web/NetworkLoad1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:47 12/05/2025
Last modified:
19:44:37 20/11/2024
MD5 hash:
176bd6931be34d7ef351d22897accc65
Filesize:
759 B
suspicious functions used:
system (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Network1.php-
Full path:
abi/web/Network1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:47 12/05/2025
Last modified:
11:57:44 15/04/2025
MD5 hash:
154ba9f6e6603be92ddd48557fb118ce
Filesize:
65.34 KB
suspicious functions used:
system (line:369);shell_exec (line:652);`network_tree` WHERE `device_type` = '1' AND `olt_id` = '{$rowo['olt_id']}' AND sts = '0' AND ` (line:843); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-count-rcl.php-
Full path:
abi/web/network-olt-client-onu-mac-count-rcl.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:47 12/05/2025
Last modified:
23:51:27 24/03/2025
MD5 hash:
9372dfb2a63d9f4a28440f91d4866778
Filesize:
3.49 KB
suspicious functions used:
shell_exec (line:26);shell_exec (line:73);shell_exec (line:85);shell_exec (line:96);shell_exec (line:110); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMSAddSave.php-
Full path:
abi/web/SMSAddSave.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:47 12/05/2025
Last modified:
01:43:36 05/02/2025
MD5 hash:
0d2d0548df5f32e69264c4f2f1b1f76e
Filesize:
2.12 KB
suspicious functions used:
curl_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMS.php-
Full path:
abi/web/SMS.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:47 12/05/2025
Last modified:
01:38:29 29/04/2025
MD5 hash:
0ec0c15fe62659d41bfc76ba172f4a42
Filesize:
37.87 KB
suspicious functions used:
curl_exec (line:56); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltAddQuery.php-
Full path:
abi/web/NetworkOltAddQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:47 12/05/2025
Last modified:
21:08:55 29/03/2025
MD5 hash:
f2e8bbce7005fe948eab86e12f9e789f
Filesize:
7.96 KB
suspicious functions used:
shell_exec (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltOnuStatus.php-
Full path:
abi/web/NetworkOltOnuStatus.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:47 12/05/2025
Last modified:
10:14:59 29/04/2025
MD5 hash:
3389803b8d03cb46bbad2d648ffd0bd4
Filesize:
70.95 KB
suspicious functions used:
shell_exec (line:42);shell_exec (line:102);shell_exec (line:673);shell_exec (line:793);shell_exec (line:903);shell_exec (line:1013); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltOnuStatus2.php-
Full path:
abi/web/NetworkOltOnuStatus2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:48 12/05/2025
Last modified:
19:44:37 20/11/2024
MD5 hash:
c9a14797fa4353d05bbd9427b6079250
Filesize:
15.88 KB
suspicious functions used:
shell_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltSense.php-
Full path:
abi/web/NetworkOltSense.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:48 12/05/2025
Last modified:
19:44:37 20/11/2024
MD5 hash:
2be664ae5006367f629ca437a6d507f8
Filesize:
18.26 KB
suspicious functions used:
`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, `last_synced`, `last_update`, `msg`, `full_msg`, ROUND((SELECT AVG(value) FROM olt_onu_history WHERE alarm_id = '$alarmId' AND value != ''), 2) AS average_value FROM `, ` WHERE `alarm_id` = '$alarmId' AND ` (line:123); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltSenseDetails.php-
Full path:
abi/web/NetworkOltSenseDetails.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:48 12/05/2025
Last modified:
19:44:37 20/11/2024
MD5 hash:
440096c601fc10b819a1f0f8330928b0
Filesize:
14.17 KB
suspicious functions used:
`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:33);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:42);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:51);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:60); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltSync.php-
Full path:
abi/web/NetworkOltSync.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:48 12/05/2025
Last modified:
19:44:37 20/11/2024
MD5 hash:
06633d4b65a14d677358170dd0a84424
Filesize:
1.87 KB
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeAddSave.php-
Full path:
abi/web/NetworkTreeAddSave.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:48 12/05/2025
Last modified:
22:30:01 08/01/2025
MD5 hash:
93fdf1213fdb5d525641e2b625f1a91b
Filesize:
7.61 KB
suspicious functions used:
`network_tree` WHERE `olt_id` = '$olt_id' AND ` (line:107); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery.php-
Full path:
abi/web/PaymentOnlineQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
14:27:03 11/05/2025
Last modified:
23:21:15 14/02/2025
MD5 hash:
6a845f0e20c434c12eb30f42726f268d
Filesize:
28.37 KB
suspicious functions used:
curl_exec (line:457);curl_exec (line:669); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery2.php-
Full path:
abi/web/PaymentOnlineQuery2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:49 12/05/2025
Last modified:
19:44:38 20/11/2024
MD5 hash:
ccd315d11a60901b7b9029ff44f8351b
Filesize:
19.4 KB
suspicious functions used:
curl_exec (line:42);curl_exec (line:252); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeEdit1.php-
Full path:
abi/web/NetworkTreeEdit1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:49 12/05/2025
Last modified:
19:44:38 20/11/2024
MD5 hash:
3396a6bdf9b5804bb208f38f37cc29a2
Filesize:
35.81 KB
suspicious functions used:
`olt_onu` WHERE olt_id = '$olt_id' AND ` (line:207); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeEditSave.php-
Full path:
abi/web/NetworkTreeEditSave.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:49 12/05/2025
Last modified:
22:20:43 30/03/2025
MD5 hash:
75ca95ac9b0cf5e9709091d3a6ae5b6a
Filesize:
13.55 KB
suspicious functions used:
`olt_pon` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND ` (line:84);`network_tree` WHERE `olt_id` = '$olt_id' AND ` (line:196); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeList.php-
Full path:
abi/web/NetworkTreeList.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:49 12/05/2025
Last modified:
23:32:36 18/04/2025
MD5 hash:
2e75d2b5d8285321171467ca5c0afbe4
Filesize:
32 KB
suspicious functions used:
`pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '{$rowsedfg['olt_id']}' AND ` (line:455); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeMap.php-
Full path:
abi/web/NetworkTreeMap.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:49 12/05/2025
Last modified:
17:23:41 23/03/2025
MD5 hash:
9a2606558b5ebf04b77c89eeeb6df1c6
Filesize:
49.36 KB
suspicious functions used:
`${totalonline}` (line:121);`${totaloffline}` (line:122);`Failed to load data: ${error.message}` (line:788);`HTTP error! Status: ${response.status}` (line:803); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeMap1.php-
Full path:
abi/web/NetworkTreeMap1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:49 12/05/2025
Last modified:
15:36:05 19/03/2025
MD5 hash:
468cfbce8d08d577fb1fe05b51eb722f
Filesize:
48.69 KB
suspicious functions used:
`${totalonline}` (line:122);`${totaloffline}` (line:123);`Failed to load data: ${error.message}` (line:776);`HTTP error! Status: ${response.status}` (line:790); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentWebhook.php-
Full path:
abi/web/PaymentWebhook.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:49 12/05/2025
Last modified:
19:44:39 20/11/2024
MD5 hash:
a2f322c94787630ab1e0c8ca35fc5ba1
Filesize:
18.6 KB
suspicious functions used:
base64_decode (line:30);curl_exec (line:41);curl_exec (line:422); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMS1.php-
Full path:
abi/web/SMS1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:50 12/05/2025
Last modified:
19:44:39 20/11/2024
MD5 hash:
e4671dadf9ad575671fd3609a60030da
Filesize:
32.19 KB
suspicious functions used:
curl_exec (line:59); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SignUp1.php-
Full path:
abi/web/SignUp1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:50 12/05/2025
Last modified:
10:59:04 24/04/2025
MD5 hash:
22cdaf528a51aa44652f81cc911a85fa
Filesize:
26.63 KB
suspicious functions used:
curl_exec (line:53);curl_exec (line:75); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: UserAccess.php-
Full path:
abi/web/UserAccess.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:51 12/05/2025
Last modified:
01:57:46 08/03/2025
MD5 hash:
896b3f5a3c89a611b1b37bf80820cf7b
Filesize:
10.45 KB
suspicious functions used:
`.modulecheckboxx[data-group="${group}"]` (line:159); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: UserLoginReport.php-
Full path:
abi/web/UserLoginReport.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
11:36:01 12/05/2025
Last modified:
15:51:00 19/04/2025
MD5 hash:
43d95cc2a57279f23f52d11581c9427f
Filesize:
7.76 KB
suspicious functions used:
curl_exec (line:120); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-countt.php-
Full path:
abi/web/network-olt-client-onu-mac-countt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:51 12/05/2025
Last modified:
23:51:57 24/03/2025
MD5 hash:
6c684ef0e37eeb3400821b34d0d05fec
Filesize:
8.94 KB
suspicious functions used:
shell_exec (line:26);shell_exec (line:36);shell_exec (line:59);shell_exec (line:75);shell_exec (line:92);shell_exec (line:102);shell_exec (line:117);shell_exec (line:155);shell_exec (line:206);shell_exec (line:262);shell_exec (line:275);shell_exec (line:288); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: emp_salary_advence_find.php-
Full path:
abi/web/emp_salary_advence_find.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:51 12/05/2025
Last modified:
19:44:35 20/11/2024
MD5 hash:
74a7e2ffda0f7584611d7cbce6136c24
Filesize:
2.25 KB
suspicious functions used:
`expanse` WHERE `type` = '2' AND `status` = '2' AND ex_by = '$e_id' AND MONTH(`, `) = MONTH('$lastmonth') AND YEAR(`, `) = YEAR('$lastmonth') GROUP BY ` (line:8);`e_id` = '$e_id' AND ` (line:12); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: imagevwr.php-
Full path:
abi/web/imagevwr.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:51 12/05/2025
Last modified:
19:44:35 20/11/2024
MD5 hash:
47a223a13cc642d01dcfaaca542d396d
Filesize:
915 B
suspicious functions used:
curl_exec (line:15); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
abi/web/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:51 12/05/2025
Last modified:
19:44:35 20/11/2024
MD5 hash:
c46a50905333286f45dfeacf010851ab
Filesize:
716 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: client-online-mbb.php-
Full path:
abi/web/client-online-mbb.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:51 12/05/2025
Last modified:
12:19:30 15/04/2025
MD5 hash:
a1cef934dce8da065b0116b7915754af
Filesize:
16.36 KB
suspicious functions used:
curl_exec (line:88);curl_exec (line:288); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_network.php-
Full path:
abi/web/cron_network.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
08:43:38 12/05/2025
Last modified:
00:45:09 25/03/2025
MD5 hash:
36fe709ddc5062ba1fecfe1417fdff91
Filesize:
4 KB
suspicious functions used:
curl_exec (line:42);curl_exec (line:64); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_olt.php-
Full path:
abi/web/cron_olt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:01:23 12/05/2025
Last modified:
11:18:19 03/05/2025
MD5 hash:
f0248614baaea216d0f29e0ca584410b
Filesize:
4.46 KB
suspicious functions used:
shell_exec (line:51);curl_exec (line:106); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: clients-nots-action.php-
Full path:
abi/web/clients-nots-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:51 12/05/2025
Last modified:
19:44:34 20/11/2024
MD5 hash:
dff1bb495509427d098cb4588da553b9
Filesize:
5.89 KB
suspicious functions used:
curl_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: company_info.php-
Full path:
abi/web/company_info.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
20:05:11 11/05/2025
Last modified:
19:42:58 24/04/2025
MD5 hash:
406848ab0f21b6c2121abb5f5dcd2730
Filesize:
8.31 KB
suspicious functions used:
curl_exec (line:131); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
abi/web/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:51 12/05/2025
Last modified:
19:44:34 20/11/2024
MD5 hash:
ba9747d0421fd091b998389469e72a0b
Filesize:
1.7 KB
suspicious functions used:
curl_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_all.php-
Full path:
abi/web/cron_all.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:51 12/05/2025
Last modified:
19:44:34 20/11/2024
MD5 hash:
967f1d654ae891609da26b9e0fdbd1ae
Filesize:
2.44 KB
suspicious functions used:
curl_exec (line:23);curl_exec (line:38);curl_exec (line:53); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_gen_bill.php-
Full path:
abi/web/cron_auto_gen_bill.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:51 12/05/2025
Last modified:
19:44:34 20/11/2024
MD5 hash:
f1056618cc4402968e50d1232d2c51c8
Filesize:
4.73 KB
suspicious functions used:
curl_exec (line:140);curl_exec (line:149); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_olt_clients_catch.php-
Full path:
abi/web/cron_olt_clients_catch.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
13:09:48 11/05/2025
Last modified:
10:50:06 03/05/2025
MD5 hash:
f3775b14a4f3709bd1e20ac451a3bea1
Filesize:
2.05 KB
suspicious functions used:
curl_exec (line:55); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive.php-
Full path:
abi/web/cron_auto_inactive.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:51 12/05/2025
Last modified:
03:27:53 10/12/2024
MD5 hash:
7e0dc4dd9dae2bf0220516641b53c027
Filesize:
5.43 KB
suspicious functions used:
curl_exec (line:142); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive2.php-
Full path:
abi/web/cron_auto_inactive2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:51 12/05/2025
Last modified:
19:44:34 20/11/2024
MD5 hash:
440bc24f05b01eb395df63fff2f60de9
Filesize:
5.46 KB
suspicious functions used:
curl_exec (line:142); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_olt_user.php-
Full path:
abi/web/cron_olt_user.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:51 12/05/2025
Last modified:
19:44:34 20/11/2024
MD5 hash:
67aa237639e3d1e6064e76079bb3cccc
Filesize:
1.97 KB
suspicious functions used:
curl_exec (line:19);curl_exec (line:46); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive_termination.php-
Full path:
abi/web/cron_auto_inactive_termination.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:50:42 11/05/2025
Last modified:
19:33:32 03/05/2025
MD5 hash:
e84ce43e0a8cdfbf470223c874ed0ddd
Filesize:
13.01 KB
suspicious functions used:
curl_exec (line:232);curl_exec (line:244);curl_exec (line:286); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: getclientuptime.php-
Full path:
abi/web/getclientuptime.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:52 12/05/2025
Last modified:
19:44:35 20/11/2024
MD5 hash:
bbc14cdd451c72b94d78c7d2d1af0b52
Filesize:
718 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_termination_remainder1.php-
Full path:
abi/web/cron_auto_termination_remainder1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
03:06:33 12/05/2025
Last modified:
19:44:34 20/11/2024
MD5 hash:
7765f9f820dbd402f1064fab9958ffaa
Filesize:
3.26 KB
suspicious functions used:
curl_exec (line:83); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_client_bandwidth_count.php-
Full path:
abi/web/cron_client_bandwidth_count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
23:38:38 11/05/2025
Last modified:
23:02:43 14/04/2025
MD5 hash:
a1b43b5493187af5b23c7217aeec0cef
Filesize:
6.45 KB
suspicious functions used:
curl_exec (line:159); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-con-sts.php-
Full path:
abi/web/network-olt-con-sts.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:52 12/05/2025
Last modified:
23:47:11 24/03/2025
MD5 hash:
400a889537016067b55f97ac6d0a16a3
Filesize:
4.02 KB
suspicious functions used:
`olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:10);shell_exec (line:38);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, `last_synced`, `last_update`, `msg`, `full_msg`, ROUND((SELECT AVG(value) FROM olt_onu_history WHERE alarm_id = '$alarmId' AND value != ''), 2) AS average_value FROM `, ` WHERE `alarm_id` = '$alarmId' AND ` (line:82); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-oid-check.php-
Full path:
abi/web/network-olt-oid-check.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:52 12/05/2025
Last modified:
19:44:37 20/11/2024
MD5 hash:
5b7dc0ce1103fbfc895873c250b63141
Filesize:
1.88 KB
suspicious functions used:
shell_exec (line:33); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ip-ping-checker.php-
Full path:
abi/web/ip-ping-checker.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:52 12/05/2025
Last modified:
19:44:36 20/11/2024
MD5 hash:
0d28f3053b73b3fe2885cf519ee17c12
Filesize:
2.64 KB
suspicious functions used:
curl_exec (line:81); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-load.php-
Full path:
abi/web/network-olt-load.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:52 12/05/2025
Last modified:
19:44:37 20/11/2024
MD5 hash:
f49d5153285c639ed91d4e806685ee56
Filesize:
1.33 KB
suspicious functions used:
shell_exec (line:22);shell_exec (line:25); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-helper.php-
Full path:
abi/web/nagad-helper.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:52 12/05/2025
Last modified:
23:20:14 14/02/2025
MD5 hash:
114b90b978b842cd318391876ba454ab
Filesize:
2.84 KB
suspicious functions used:
curl_exec (line:46);base64_decode (line:77); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-merchant-callback.php-
Full path:
abi/web/nagad-merchant-callback.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:52 12/05/2025
Last modified:
05:35:21 30/03/2025
MD5 hash:
a782d367c638b8f47cb46738f54fa753
Filesize:
16.47 KB
suspicious functions used:
curl_exec (line:20); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-olt-all-mac-array.php-
Full path:
abi/web/netowrk-olt-all-mac-array.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:52 12/05/2025
Last modified:
19:44:37 20/11/2024
MD5 hash:
b0168ce99145e2afe64357247d750dd6
Filesize:
4.62 KB
suspicious functions used:
shell_exec (line:33);shell_exec (line:47);shell_exec (line:61);shell_exec (line:76);shell_exec (line:93); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-snmp-data.php-
Full path:
abi/web/netowrk-snmp-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
05:20:27 12/05/2025
Last modified:
10:14:59 29/04/2025
MD5 hash:
cebb238044a122cb2dc9038afac8ca43
Filesize:
24.93 KB
suspicious functions used:
shell_exec (line:104);shell_exec (line:113);shell_exec (line:123);shell_exec (line:142);shell_exec (line:154);shell_exec (line:165);shell_exec (line:181);shell_exec (line:191);shell_exec (line:207);shell_exec (line:227);shell_exec (line:236);shell_exec (line:244);shell_exec (line:251);shell_exec (line:256);`pon_name` FROM `olt_pon` WHERE `olt_pon_id` = '$pon_id' AND ` (line:263);shell_exec (line:280);shell_exec (line:290);`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:303);shell_exec (line:309);shell_exec (line:441); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-old-onu-rx-map.php-
Full path:
abi/web/network-old-onu-rx-map.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:52 12/05/2025
Last modified:
23:50:40 24/03/2025
MD5 hash:
bfa54cd4fcf2629316f30310fcc90b78
Filesize:
6.93 KB
suspicious functions used:
shell_exec (line:77); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-old-onu-rx.php-
Full path:
abi/web/network-old-onu-rx.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:52 12/05/2025
Last modified:
23:50:30 24/03/2025
MD5 hash:
a2555fb0203a78b0e1f41ae2d96f6f82
Filesize:
7.35 KB
suspicious functions used:
shell_exec (line:86); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook_test.php-
Full path:
abi/web/webhook_test.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:52 12/05/2025
Last modified:
19:44:41 20/11/2024
MD5 hash:
74a7dcc262d7fe7f2bdc9e0595d03837
Filesize:
4.69 KB
suspicious functions used:
base64_decode (line:22);curl_exec (line:33);curl_exec (line:86);curl_exec (line:107); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-count-cdata.php-
Full path:
abi/web/network-olt-client-onu-mac-count-cdata.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:52 12/05/2025
Last modified:
19:44:37 20/11/2024
MD5 hash:
c378dbabf36066c335cfb8838a6e167d
Filesize:
4.58 KB
suspicious functions used:
shell_exec (line:25);shell_exec (line:35);shell_exec (line:56);shell_exec (line:103);shell_exec (line:115);shell_exec (line:126);shell_exec (line:140); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-count.php-
Full path:
abi/web/network-olt-client-onu-mac-count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:52 12/05/2025
Last modified:
10:14:59 29/04/2025
MD5 hash:
80af84e49b42497813db916584cfa0f2
Filesize:
15.29 KB
suspicious functions used:
shell_exec (line:26);shell_exec (line:36);shell_exec (line:68);shell_exec (line:84);shell_exec (line:101);shell_exec (line:119);shell_exec (line:135);shell_exec (line:176);shell_exec (line:236);shell_exec (line:312);shell_exec (line:379);shell_exec (line:469);shell_exec (line:488);shell_exec (line:507); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec.php-
Full path:
abi/web/login_exec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:43:40 12/05/2025
Last modified:
20:20:44 23/04/2025
MD5 hash:
fe0ff14fc554949b87917caaf5d443f8
Filesize:
12.26 KB
suspicious functions used:
curl_exec (line:24);curl_exec (line:80);curl_exec (line:199);curl_exec (line:237); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: LoginByPass.php-
Full path:
abi/web/LoginByPass.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
05:43:02 12/05/2025
Last modified:
09:07:20 19/04/2025
MD5 hash:
1c6616dae30e9849d8f4fb0fe712a748
Filesize:
4.59 KB
suspicious functions used:
curl_exec (line:44);curl_exec (line:69); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: macreseller-news.php-
Full path:
abi/web/macreseller-news.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:52 12/05/2025
Last modified:
19:55:57 10/01/2025
MD5 hash:
ed23ca98b77c5321b4485e85eb2ea64d
Filesize:
3.67 KB
suspicious functions used:
curl_exec (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook.php-
Full path:
abi/web/webhook.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
04:03:42 12/05/2025
Last modified:
03:49:00 08/02/2025
MD5 hash:
69a88ae1be0ab3ab1c7c971c72c0b025
Filesize:
21.93 KB
suspicious functions used:
base64_decode (line:28);curl_exec (line:39);curl_exec (line:465); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-alarm-add.php-
Full path:
abi/web/network-olt-onu-alarm-add.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:52 12/05/2025
Last modified:
19:44:37 20/11/2024
MD5 hash:
be6ba82c658419e1454f778e20e2d4c3
Filesize:
7.86 KB
suspicious functions used:
shell_exec (line:103); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-count.php-
Full path:
abi/web/network-olt-onu-count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:52 12/05/2025
Last modified:
23:53:15 24/03/2025
MD5 hash:
cbfe569e079da8f569d07af1dec94de5
Filesize:
7.22 KB
suspicious functions used:
`olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:14);shell_exec (line:83); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-list-data.php-
Full path:
abi/web/network-olt-onu-list-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:53 12/05/2025
Last modified:
19:44:37 20/11/2024
MD5 hash:
54cc9417c766c31317311c3722ce7d4b
Filesize:
9.48 KB
suspicious functions used:
shell_exec (line:24);shell_exec (line:38);shell_exec (line:64);shell_exec (line:85);shell_exec (line:104);shell_exec (line:125);shell_exec (line:143);shell_exec (line:153);shell_exec (line:165);shell_exec (line:185); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tagreeexpayment.php-
Full path:
abi/web/tagreeexpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
14:26:47 11/05/2025
Last modified:
19:44:40 20/11/2024
MD5 hash:
029b4fba649a75c7c81d2f8931be8d63
Filesize:
2.86 KB
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-power.php-
Full path:
abi/web/network-olt-onu-power.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:53 12/05/2025
Last modified:
19:44:37 20/11/2024
MD5 hash:
2e064543b67b532bdf4e5b12d49c5052
Filesize:
7.54 KB
suspicious functions used:
shell_exec (line:97); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-clients-search.php-
Full path:
abi/web/network-olt-pon-clients-search.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:53 12/05/2025
Last modified:
19:44:37 20/11/2024
MD5 hash:
79d26fc66abdab6f173330588aa8b238
Filesize:
10.93 KB
suspicious functions used:
shell_exec (line:42);shell_exec (line:51);shell_exec (line:104);shell_exec (line:168); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search-bdcom.php-
Full path:
abi/web/network-olt-pon-onu-search-bdcom.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:53 12/05/2025
Last modified:
19:44:37 20/11/2024
MD5 hash:
c786fa8b69268c738b6ff976631798cd
Filesize:
27.74 KB
suspicious functions used:
shell_exec (line:60);shell_exec (line:69);shell_exec (line:383); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search-bdcom1.php-
Full path:
abi/web/network-olt-pon-onu-search-bdcom1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:53 12/05/2025
Last modified:
19:44:37 20/11/2024
MD5 hash:
dd18677b1dcbf7f0bce2ac6912d98da0
Filesize:
9.6 KB
suspicious functions used:
shell_exec (line:42);shell_exec (line:51);shell_exec (line:129); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search.php-
Full path:
abi/web/network-olt-pon-onu-search.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:53 12/05/2025
Last modified:
19:44:37 20/11/2024
MD5 hash:
dc183ecf77d0e1f56f672338fd09cfa5
Filesize:
21.62 KB
suspicious functions used:
shell_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreateagree.php-
Full path:
abi/web/tcreateagree.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
14:25:43 11/05/2025
Last modified:
19:44:40 20/11/2024
MD5 hash:
27a10adf4190edc7eceee8cf74a6b72b
Filesize:
999 B
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tis-news.php-
Full path:
abi/web/tis-news.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
05:19:41 12/05/2025
Last modified:
19:44:40 20/11/2024
MD5 hash:
ed23ca98b77c5321b4485e85eb2ea64d
Filesize:
3.67 KB
suspicious functions used:
curl_exec (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tt.php-
Full path:
abi/web/tt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:53 12/05/2025
Last modified:
19:44:40 20/11/2024
MD5 hash:
9c4ed141cb79fdc7e807b35923c91a20
Filesize:
1.56 KB
suspicious functions used:
curl_exec (line:30); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data-bdcom.php-
Full path:
abi/web/network-snmp-onu-status-data-bdcom.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:53 12/05/2025
Last modified:
10:05:49 15/04/2025
MD5 hash:
8e6c4057a9586f2e4cc65277a19854a3
Filesize:
23.58 KB
suspicious functions used:
shell_exec (line:49);shell_exec (line:74);shell_exec (line:86);shell_exec (line:104);shell_exec (line:117);shell_exec (line:129);shell_exec (line:135);shell_exec (line:160);shell_exec (line:173);shell_exec (line:185);shell_exec (line:191);shell_exec (line:218);shell_exec (line:231);shell_exec (line:237); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data1.php-
Full path:
abi/web/network-snmp-onu-status-data1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:53 12/05/2025
Last modified:
23:46:38 24/03/2025
MD5 hash:
21b4726e351c4b0fcb7d6f0959c0d888
Filesize:
15.98 KB
suspicious functions used:
shell_exec (line:34);`olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:38);shell_exec (line:150); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ttoken.php-
Full path:
abi/web/ttoken.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
14:25:40 11/05/2025
Last modified:
19:44:40 20/11/2024
MD5 hash:
5f2c51c1db5b0defadfb67ce25c0098f
Filesize:
1.54 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data_vsol2.php-
Full path:
abi/web/network-snmp-onu-status-data_vsol2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:53 12/05/2025
Last modified:
19:44:37 20/11/2024
MD5 hash:
f22d022ddc284f4d8e1de3660da91db8
Filesize:
15.61 KB
suspicious functions used:
shell_exec (line:34);shell_exec (line:113);shell_exec (line:126);shell_exec (line:132); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreatepayment.php-
Full path:
abi/web/tcreatepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
14:26:48 11/05/2025
Last modified:
19:44:40 20/11/2024
MD5 hash:
e49de9a33f5164bc2c6b88e4770faaff
Filesize:
1.07 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
abi/web/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:53 12/05/2025
Last modified:
19:44:40 20/11/2024
MD5 hash:
7d8e71ceda3ffb74623e0c4a814715af
Filesize:
1.53 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test2.php-
Full path:
abi/web/test2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:53 12/05/2025
Last modified:
19:44:40 20/11/2024
MD5 hash:
ab80d92ede21b7da59bfefb325484297
Filesize:
13.76 KB
suspicious functions used:
shell_exec (line:59);shell_exec (line:70);shell_exec (line:76);shell_exec (line:88);shell_exec (line:101);shell_exec (line:141);curl_exec (line:187);curl_exec (line:212);curl_exec (line:354); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index.php-
Full path:
abi/web/index.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
01:44:01 12/05/2025
Last modified:
20:18:02 23/04/2025
MD5 hash:
2e1798df24b219a66401b4936b812f43
Filesize:
16.11 KB
suspicious functions used:
curl_exec (line:282); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-tree-vartual-nodes.php-
Full path:
abi/web/network-tree-vartual-nodes.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:53 12/05/2025
Last modified:
03:57:25 08/03/2025
MD5 hash:
ef5de6634f62a12fd5139c800708aa30
Filesize:
10.49 KB
suspicious functions used:
shell_exec (line:76);shell_exec (line:111);shell_exec (line:145);shell_exec (line:181);shell_exec (line:188); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: sms-balance-check.php-
Full path:
abi/web/sms-balance-check.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
04:21:53 12/05/2025
Last modified:
22:55:26 18/04/2025
MD5 hash:
76d6e591039b8f16382220fec77cd3d7
Filesize:
984 B
suspicious functions used:
curl_exec (line:15); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree-olt-onu-list-data.php-
Full path:
abi/web/networktree-olt-onu-list-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:53 12/05/2025
Last modified:
19:44:37 20/11/2024
MD5 hash:
af4221fefa9c9051846a063ac4135560
Filesize:
8.72 KB
suspicious functions used:
shell_exec (line:24);shell_exec (line:36);shell_exec (line:59);shell_exec (line:78);shell_exec (line:97);shell_exec (line:116);shell_exec (line:134);shell_exec (line:143);shell_exec (line:155);shell_exec (line:175); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: sms_deliverey_report.php-
Full path:
abi/web/sms_deliverey_report.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
03:06:33 12/05/2025
Last modified:
19:44:40 20/11/2024
MD5 hash:
03623943da7e9334e137b38c8577fc84
Filesize:
4.25 KB
suspicious functions used:
curl_exec (line:28);curl_exec (line:53);curl_exec (line:90); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_onu_list_add.php-
Full path:
abi/web/networktree_device_onu_list_add.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:53 12/05/2025
Last modified:
22:39:32 30/03/2025
MD5 hash:
23aa4b30ff4514610497db10c8490003
Filesize:
16.07 KB
suspicious functions used:
shell_exec (line:31);`network_tree` WHERE `onu_mac` = '$mac_address' AND ` (line:129);`olt_pon` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND ` (line:163);shell_exec (line:198);shell_exec (line:221);shell_exec (line:238);`network_tree` WHERE `onu_mac` = '$onuMac' AND ` (line:276);shell_exec (line:302);shell_exec (line:308);shell_exec (line:319);`network_tree` WHERE `onu_mac` = '$onuMac' AND ` (line:355);`olt_pon` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND ` (line:391); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_pon_check.php-
Full path:
abi/web/networktree_device_pon_check.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:53 12/05/2025
Last modified:
23:18:50 18/03/2025
MD5 hash:
b7f8731e7d12665b418927d722340da4
Filesize:
1.58 KB
suspicious functions used:
`pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '$olt_id' AND ` (line:8); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: support-action.php-
Full path:
abi/web/support-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
03:40:47 12/05/2025
Last modified:
13:25:42 13/03/2025
MD5 hash:
b8c8c56826a0a8e027a23e6a365c70a0
Filesize:
14.54 KB
suspicious functions used:
curl_exec (line:220); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_pon_list_add.php-
Full path:
abi/web/networktree_device_pon_list_add.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:53 12/05/2025
Last modified:
23:18:04 18/03/2025
MD5 hash:
2cf70db6a91f4c5d1821b4b5fa178ebb
Filesize:
1.38 KB
suspicious functions used:
`olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:6);`olt_pon` WHERE `olt_id` = '$olt_id' AND ` (line:10);`network_tree` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND ` (line:17); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_pon_port_onu_list.php-
Full path:
abi/web/networktree_device_pon_port_onu_list.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:53 12/05/2025
Last modified:
22:39:32 30/03/2025
MD5 hash:
6578424616a5eefb751d5e3e155adba6
Filesize:
8.63 KB
suspicious functions used:
`olt_pon` WHERE olt_id = '$olt_id' AND ` (line:25);shell_exec (line:32);shell_exec (line:45);`network_tree` WHERE onu_index_id = '$port_onu_index_id' AND ` (line:49);shell_exec (line:81);shell_exec (line:104);shell_exec (line:123);shell_exec (line:144);shell_exec (line:162);shell_exec (line:171);shell_exec (line:185); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_pon_port_sense_list.php-
Full path:
abi/web/networktree_device_pon_port_sense_list.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:53 12/05/2025
Last modified:
22:20:42 30/03/2025
MD5 hash:
4d80475d2f31f38e21239a5a1a19285f
Filesize:
3.7 KB
suspicious functions used:
`network_tree` WHERE `onu_mac` = '$onu_mac' AND ` (line:26);`network_tree` WHERE `c_id` = '{$dfhbdxf}' AND ` (line:72); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_type.php-
Full path:
abi/web/networktree_device_type.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:53 12/05/2025
Last modified:
23:08:11 20/11/2024
MD5 hash:
f1520732e5a3ef38564238a3278a1f63
Filesize:
11.43 KB
suspicious functions used:
`tree_id`) AS countolt FROM `network_tree` WHERE `olt_id` = '$olt_id_sure' AND ` (line:64); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test6.php-
Full path:
abi/web/test6.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:53 12/05/2025
Last modified:
19:44:40 20/11/2024
MD5 hash:
f22d022ddc284f4d8e1de3660da91db8
Filesize:
15.61 KB
suspicious functions used:
shell_exec (line:34);shell_exec (line:113);shell_exec (line:126);shell_exec (line:132); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test7.php-
Full path:
abi/web/test7.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:53 12/05/2025
Last modified:
19:44:40 20/11/2024
MD5 hash:
b11ccf951ce63a21ea0a7328316a0e5c
Filesize:
1.57 KB
suspicious functions used:
curl_exec (line:14); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: testttttt.php-
Full path:
abi/web/testttttt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:53 12/05/2025
Last modified:
19:44:40 20/11/2024
MD5 hash:
b1988a4be29e191ad935fb409a4174ee
Filesize:
2 KB
suspicious functions used:
curl_exec (line:47); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: texecutepayment.php-
Full path:
abi/web/texecutepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
14:27:02 11/05/2025
Last modified:
19:44:40 20/11/2024
MD5 hash:
623635fdf5c871391d3a5fe99ee8c543
Filesize:
2.91 KB
suspicious functions used:
curl_exec (line:24); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook_cid.php-
Full path:
abi/web/webhook_cid.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:53 12/05/2025
Last modified:
03:53:20 08/02/2025
MD5 hash:
1a2672fc0dd81a9c831e3fa60ec860e1
Filesize:
21.52 KB
suspicious functions used:
base64_decode (line:29);curl_exec (line:40);curl_exec (line:439); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: time.php-
Full path:
abi/web/time.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:53 12/05/2025
Last modified:
05:27:42 20/03/2025
MD5 hash:
f72a880b38cb26f3d208bfe99eec1633
Filesize:
5.25 KB
suspicious functions used:
`${formatDistance(totalDistance)}` (line:121);`${Math.round(distance)} m`, `${(distance / 1000).toFixed(2)} km` (line:150); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search-rcl.php-
Full path:
abi/web/network-olt-pon-onu-search-rcl.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:53 12/05/2025
Last modified:
05:34:01 01/02/2025
MD5 hash:
565ff38d572bba4bc20721ab17484554
Filesize:
27.33 KB
suspicious functions used:
shell_exec (line:46);shell_exec (line:55);shell_exec (line:369); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-snmp-data-auto.php-
Full path:
abi/web/netowrk-snmp-data-auto.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:54 12/05/2025
Last modified:
23:50:52 24/03/2025
MD5 hash:
b30b86386b4d79a756cefdd86f070bd5
Filesize:
7.27 KB
suspicious functions used:
shell_exec (line:68);shell_exec (line:118); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: olt_all_onu_mac.php-
Full path:
abi/web/olt_all_onu_mac.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:54 12/05/2025
Last modified:
00:41:19 02/02/2025
MD5 hash:
bde00602b98fba3ce9f7669b0d6f0fa3
Filesize:
4.56 KB
suspicious functions used:
shell_exec (line:22);shell_exec (line:38);shell_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test9.php-
Full path:
abi/web/test9.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:54 12/05/2025
Last modified:
13:09:09 30/03/2025
MD5 hash:
87b5d5bf52fb36a8ccea006021ec8820
Filesize:
7.17 KB
suspicious functions used:
shell_exec (line:44);shell_exec (line:69);shell_exec (line:81);shell_exec (line:104);shell_exec (line:126);shell_exec (line:140);shell_exec (line:153);shell_exec (line:165);shell_exec (line:171); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test8.php-
Full path:
abi/web/test8.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:54 12/05/2025
Last modified:
12:14:11 15/02/2025
MD5 hash:
0da20f06359cae632ac4b808ab2eee77
Filesize:
3.65 KB
suspicious functions used:
shell_exec (line:48); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: AppSettings.php-
Full path:
abi/web/AppSettings.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
11:36:50 12/05/2025
Last modified:
04:23:39 03/05/2025
MD5 hash:
512b3e52141311ec6f69c2d46859b4ec
Filesize:
124.27 KB
suspicious functions used:
`input[name="${inputName}"]:checked` (line:2076); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ClientsOnMap1.php-
Full path:
abi/web/ClientsOnMap1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:54 12/05/2025
Last modified:
08:52:14 08/03/2025
MD5 hash:
ba0202f8bef3c634e895471057086953
Filesize:
13.14 KB
suspicious functions used:
`${totalonline}` (line:109);`${totaloffline}` (line:110);`${results.rxPower}` (line:243);`${results.distance}` (line:244);`${results.supplyVoltage}` (line:245);`${results.temperature}` (line:246);`${results.txPower}` (line:247); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeMap2.php-
Full path:
abi/web/NetworkTreeMap2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:54 12/05/2025
Last modified:
12:23:05 18/03/2025
MD5 hash:
6487967886178db61db1c1d6c4479af3
Filesize:
49.47 KB
suspicious functions used:
`${totalonline}` (line:122);`${totaloffline}` (line:123);`Failed to load data: ${error.message}` (line:769);`HTTP error! Status: ${response.status}` (line:783); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data-bdcom-online.php-
Full path:
abi/web/network-snmp-onu-status-data-bdcom-online.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
22:09:44 11/05/2025
Last modified:
09:02:46 03/05/2025
MD5 hash:
a63b8935b2897e257872145705a654a9
Filesize:
21.78 KB
suspicious functions used:
shell_exec (line:48);shell_exec (line:73);shell_exec (line:85);shell_exec (line:103);shell_exec (line:116);shell_exec (line:128);shell_exec (line:134);shell_exec (line:159);shell_exec (line:172);shell_exec (line:184);shell_exec (line:190);shell_exec (line:217);shell_exec (line:230);shell_exec (line:236); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data-online.php-
Full path:
abi/web/network-snmp-onu-status-data-online.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
13:08:23 11/05/2025
Last modified:
09:02:46 03/05/2025
MD5 hash:
0d8187961d76276c1aaaa369cdabf36b
Filesize:
27.73 KB
suspicious functions used:
shell_exec (line:35);`olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:41);shell_exec (line:80);shell_exec (line:94);shell_exec (line:108);shell_exec (line:121);shell_exec (line:196);shell_exec (line:429);shell_exec (line:441);shell_exec (line:448); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data.php-
Full path:
abi/web/network-snmp-onu-status-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:54 12/05/2025
Last modified:
10:17:30 15/04/2025
MD5 hash:
30cb65623c66c45bd502104b935d2c48
Filesize:
30.69 KB
suspicious functions used:
shell_exec (line:36);`olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:42);shell_exec (line:81);shell_exec (line:95);shell_exec (line:109);shell_exec (line:122);shell_exec (line:208);shell_exec (line:436);shell_exec (line:448);shell_exec (line:455); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: AutoActiveClientsCount1.php-
Full path:
his/web/AutoActiveClientsCount1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
07:08:36 12/05/2025
Last modified:
00:45:26 28/12/2024
MD5 hash:
3b3b6186ff2d9c5abd1772e5aa02ee33
Filesize:
6.4 KB
suspicious functions used:
system (line:58); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: AutoActiveClientsCount11.php-
Full path:
his/web/AutoActiveClientsCount11.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:54 12/05/2025
Last modified:
00:45:26 28/12/2024
MD5 hash:
a0090e4a11dd59b955a6edd549b6ef2f
Filesize:
5.85 KB
suspicious functions used:
system (line:54); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: client-online-mbb.php-
Full path:
his/web/client-online-mbb.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:55 12/05/2025
Last modified:
00:45:32 28/12/2024
MD5 hash:
e16c33ab6ddd7649ea56a7d5355365b6
Filesize:
16.46 KB
suspicious functions used:
curl_exec (line:90);curl_exec (line:289); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: clients-nots-action.php-
Full path:
his/web/clients-nots-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:56 12/05/2025
Last modified:
00:45:35 28/12/2024
MD5 hash:
dff1bb495509427d098cb4588da553b9
Filesize:
5.89 KB
suspicious functions used:
curl_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients.php-
Full path:
his/web/Clients.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:56 12/05/2025
Last modified:
00:45:36 28/12/2024
MD5 hash:
d59f33ca457016deee5f906de3f2ca83
Filesize:
212.42 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:844); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients1.php-
Full path:
his/web/Clients1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:56 12/05/2025
Last modified:
00:45:38 28/12/2024
MD5 hash:
a8db87dcc6beb97539ff152b767dadae
Filesize:
219.37 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:835); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients2.php-
Full path:
his/web/Clients2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:57 12/05/2025
Last modified:
00:45:38 28/12/2024
MD5 hash:
982d6411552113b0715fd17c26f50292
Filesize:
205.13 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:832); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients3.php-
Full path:
his/web/Clients3.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:57 12/05/2025
Last modified:
00:45:39 28/12/2024
MD5 hash:
50ddc869b383ab76e009c7a2c17c99a3
Filesize:
175.31 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:832); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ClientsOnMap.php-
Full path:
his/web/ClientsOnMap.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:58 12/05/2025
Last modified:
00:45:42 28/12/2024
MD5 hash:
4015c065d9a58cec28fa277a6316b574
Filesize:
12.21 KB
suspicious functions used:
`${totalonline}` (line:97);`${totaloffline}` (line:98);`${results.rxPower}` (line:233);`${results.distance}` (line:234);`${results.supplyVoltage}` (line:235);`${results.temperature}` (line:236);`${results.txPower}` (line:237); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ClientView.php-
Full path:
his/web/ClientView.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:58 12/05/2025
Last modified:
00:45:42 28/12/2024
MD5 hash:
fd3851e3989fa9ae1655ed1acb19eac9
Filesize:
112.28 KB
suspicious functions used:
`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:226); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: company_info.php-
Full path:
his/web/company_info.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:40:08 12/05/2025
Last modified:
00:45:43 28/12/2024
MD5 hash:
27dc5fc579e655fb4687d27ea9f151bf
Filesize:
8.49 KB
suspicious functions used:
curl_exec (line:132); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
his/web/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:58 12/05/2025
Last modified:
00:45:43 28/12/2024
MD5 hash:
ba9747d0421fd091b998389469e72a0b
Filesize:
1.7 KB
suspicious functions used:
curl_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_all.php-
Full path:
his/web/cron_all.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:58 12/05/2025
Last modified:
00:45:43 28/12/2024
MD5 hash:
967f1d654ae891609da26b9e0fdbd1ae
Filesize:
2.44 KB
suspicious functions used:
curl_exec (line:23);curl_exec (line:38);curl_exec (line:53); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_gen_bill.php-
Full path:
his/web/cron_auto_gen_bill.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:58 12/05/2025
Last modified:
00:45:43 28/12/2024
MD5 hash:
f1056618cc4402968e50d1232d2c51c8
Filesize:
4.73 KB
suspicious functions used:
curl_exec (line:140);curl_exec (line:149); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive.php-
Full path:
his/web/cron_auto_inactive.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:58 12/05/2025
Last modified:
00:45:43 28/12/2024
MD5 hash:
7e0dc4dd9dae2bf0220516641b53c027
Filesize:
5.43 KB
suspicious functions used:
curl_exec (line:142); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive2.php-
Full path:
his/web/cron_auto_inactive2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:58 12/05/2025
Last modified:
00:45:43 28/12/2024
MD5 hash:
440bc24f05b01eb395df63fff2f60de9
Filesize:
5.46 KB
suspicious functions used:
curl_exec (line:142); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive_termination.php-
Full path:
his/web/cron_auto_inactive_termination.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
18:40:03 11/05/2025
Last modified:
00:45:43 28/12/2024
MD5 hash:
9f9c8ca9110c2304128646824bfb17db
Filesize:
12.16 KB
suspicious functions used:
curl_exec (line:241);curl_exec (line:253); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive_termination1.php-
Full path:
his/web/cron_auto_inactive_termination1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:58 12/05/2025
Last modified:
00:45:43 28/12/2024
MD5 hash:
be76b964c93a2cb4fa7e632750ff3bc4
Filesize:
6.64 KB
suspicious functions used:
curl_exec (line:156);curl_exec (line:168); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_termination_remainder1.php-
Full path:
his/web/cron_auto_termination_remainder1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
03:05:13 12/05/2025
Last modified:
00:45:43 28/12/2024
MD5 hash:
7765f9f820dbd402f1064fab9958ffaa
Filesize:
3.26 KB
suspicious functions used:
curl_exec (line:83); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_client_bandwidth_count.php-
Full path:
his/web/cron_client_bandwidth_count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
11:03:04 12/05/2025
Last modified:
00:45:43 28/12/2024
MD5 hash:
1c71a3dd097275429ae845a85ced0438
Filesize:
5.33 KB
suspicious functions used:
curl_exec (line:124);curl_exec (line:134); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_network.php-
Full path:
his/web/cron_network.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
13:40:13 11/05/2025
Last modified:
00:45:43 28/12/2024
MD5 hash:
db096f353e80027593ca3f9781a21ac8
Filesize:
4.93 KB
suspicious functions used:
curl_exec (line:45);curl_exec (line:67);curl_exec (line:127); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_olt.php-
Full path:
his/web/cron_olt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:30:12 12/05/2025
Last modified:
00:45:43 28/12/2024
MD5 hash:
6975951fdbf566164ba5fa5cfcd32ec7
Filesize:
4.27 KB
suspicious functions used:
shell_exec (line:48);curl_exec (line:127); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_olt_clients_catch.php-
Full path:
his/web/cron_olt_clients_catch.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:58 12/05/2025
Last modified:
00:45:43 28/12/2024
MD5 hash:
3b13c163ba3445b3d661c63adde1d985
Filesize:
1.12 KB
suspicious functions used:
curl_exec (line:23); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_olt_user.php-
Full path:
his/web/cron_olt_user.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:58 12/05/2025
Last modified:
00:45:44 28/12/2024
MD5 hash:
67aa237639e3d1e6064e76079bb3cccc
Filesize:
1.97 KB
suspicious functions used:
curl_exec (line:19);curl_exec (line:46); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: emp_salary_advence_find.php-
Full path:
his/web/emp_salary_advence_find.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:58 12/05/2025
Last modified:
00:45:45 28/12/2024
MD5 hash:
74a7e2ffda0f7584611d7cbce6136c24
Filesize:
2.25 KB
suspicious functions used:
`expanse` WHERE `type` = '2' AND `status` = '2' AND ex_by = '$e_id' AND MONTH(`, `) = MONTH('$lastmonth') AND YEAR(`, `) = YEAR('$lastmonth') GROUP BY ` (line:8);`e_id` = '$e_id' AND ` (line:12); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
his/web/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:58 12/05/2025
Last modified:
00:45:45 28/12/2024
MD5 hash:
c46a50905333286f45dfeacf010851ab
Filesize:
716 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: getclientuptime.php-
Full path:
his/web/getclientuptime.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:59 12/05/2025
Last modified:
00:45:47 28/12/2024
MD5 hash:
bbc14cdd451c72b94d78c7d2d1af0b52
Filesize:
718 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: imagevwr.php-
Full path:
his/web/imagevwr.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:59 12/05/2025
Last modified:
00:45:47 28/12/2024
MD5 hash:
47a223a13cc642d01dcfaaca542d396d
Filesize:
915 B
suspicious functions used:
curl_exec (line:15); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index.php-
Full path:
his/web/index.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
10:19:38 12/05/2025
Last modified:
00:45:47 28/12/2024
MD5 hash:
a77b7724e20b929c7ecdd4ae2364f6ba
Filesize:
16.68 KB
suspicious functions used:
curl_exec (line:298); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index1.php-
Full path:
his/web/index1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:59 12/05/2025
Last modified:
00:45:47 28/12/2024
MD5 hash:
275982caaa4c6189f7295519da320d68
Filesize:
16.83 KB
suspicious functions used:
curl_exec (line:298); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index3.php-
Full path:
his/web/index3.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:59 12/05/2025
Last modified:
00:45:48 28/12/2024
MD5 hash:
f161ab23adf4527023a0ad582d478f89
Filesize:
12.45 KB
suspicious functions used:
base64_decode (line:10);curl_exec (line:183); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: InstrumentsStoreOutDetails.php-
Full path:
his/web/InstrumentsStoreOutDetails.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:59 12/05/2025
Last modified:
00:45:48 28/12/2024
MD5 hash:
a60c19f766bfff1ccdccbeba6b39eb87
Filesize:
9.37 KB
suspicious functions used:
`update_date`, '%D-%b, %y') AS offdate, TIME_FORMAT(`update_time`, '%T') AS offtime FROM `con_sts_log` WHERE `c_id` = '{$row['c_id']}' AND con_sts = 'Inactive' ORDER BY ` (line:120); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ip-ping-checker.php-
Full path:
his/web/ip-ping-checker.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:59 12/05/2025
Last modified:
00:45:48 28/12/2024
MD5 hash:
0d28f3053b73b3fe2885cf519ee17c12
Filesize:
2.64 KB
suspicious functions used:
curl_exec (line:81); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: LoginByPass.php-
Full path:
his/web/LoginByPass.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:59 12/05/2025
Last modified:
00:45:49 28/12/2024
MD5 hash:
a8f1789daadb34b0814aaecddfebe7c1
Filesize:
4.26 KB
suspicious functions used:
curl_exec (line:41); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: loginexec.php-
Full path:
his/web/loginexec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:59 12/05/2025
Last modified:
00:45:49 28/12/2024
MD5 hash:
edb8017e7d0f8e037facbcacc94a383d
Filesize:
5.91 KB
suspicious functions used:
curl_exec (line:67); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec.php-
Full path:
his/web/login_exec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:59 12/05/2025
Last modified:
00:45:49 28/12/2024
MD5 hash:
c323195dc62dec584fec86b3dbc7a90e
Filesize:
11.63 KB
suspicious functions used:
curl_exec (line:23);curl_exec (line:79);curl_exec (line:226); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec1.php-
Full path:
his/web/login_exec1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:59 12/05/2025
Last modified:
00:45:49 28/12/2024
MD5 hash:
02ba9b912a83fab5a78993048bf63f09
Filesize:
6.39 KB
suspicious functions used:
curl_exec (line:116); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec3.php-
Full path:
his/web/login_exec3.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:55:59 12/05/2025
Last modified:
00:45:49 28/12/2024
MD5 hash:
9038a77a32a5db2c9affae1496473f3e
Filesize:
5.27 KB
suspicious functions used:
curl_exec (line:62); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-helper.php-
Full path:
his/web/nagad-helper.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:00 12/05/2025
Last modified:
00:45:55 28/12/2024
MD5 hash:
2bb70c44d68202e0a0cd8ae1388f0b1b
Filesize:
6.74 KB
suspicious functions used:
curl_exec (line:61);base64_decode (line:97); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-merchant-callback.php-
Full path:
his/web/nagad-merchant-callback.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:00 12/05/2025
Last modified:
00:45:55 28/12/2024
MD5 hash:
abc8d9e7aad4d9c622dcd97e701448bc
Filesize:
16.5 KB
suspicious functions used:
curl_exec (line:20); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-olt-all-mac-array.php-
Full path:
his/web/netowrk-olt-all-mac-array.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:00 12/05/2025
Last modified:
00:45:55 28/12/2024
MD5 hash:
b0168ce99145e2afe64357247d750dd6
Filesize:
4.62 KB
suspicious functions used:
shell_exec (line:33);shell_exec (line:47);shell_exec (line:61);shell_exec (line:76);shell_exec (line:93); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-snmp-data.php-
Full path:
his/web/netowrk-snmp-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
06:49:31 12/05/2025
Last modified:
00:45:55 28/12/2024
MD5 hash:
9badf5c53b260315a061e1bb6cd2378f
Filesize:
24.8 KB
suspicious functions used:
shell_exec (line:104);shell_exec (line:113);shell_exec (line:123);shell_exec (line:142);shell_exec (line:154);shell_exec (line:165);shell_exec (line:181);shell_exec (line:191);shell_exec (line:207);shell_exec (line:227);shell_exec (line:236);shell_exec (line:244);shell_exec (line:251);shell_exec (line:256);`pon_name` FROM `olt_pon` WHERE `olt_pon_id` = '$pon_id' AND ` (line:263);shell_exec (line:280);shell_exec (line:290);`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:303);shell_exec (line:309);shell_exec (line:444); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-old-onu-rx-map.php-
Full path:
his/web/network-old-onu-rx-map.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:00 12/05/2025
Last modified:
00:45:55 28/12/2024
MD5 hash:
b4962c160c5ad68ccd8eed9c48d82a0f
Filesize:
6.94 KB
suspicious functions used:
shell_exec (line:76); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-old-onu-rx.php-
Full path:
his/web/network-old-onu-rx.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:00 12/05/2025
Last modified:
00:45:55 28/12/2024
MD5 hash:
b4962c160c5ad68ccd8eed9c48d82a0f
Filesize:
6.94 KB
suspicious functions used:
shell_exec (line:76); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-count-cdata.php-
Full path:
his/web/network-olt-client-onu-mac-count-cdata.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:00 12/05/2025
Last modified:
00:45:55 28/12/2024
MD5 hash:
c378dbabf36066c335cfb8838a6e167d
Filesize:
4.58 KB
suspicious functions used:
shell_exec (line:25);shell_exec (line:35);shell_exec (line:56);shell_exec (line:103);shell_exec (line:115);shell_exec (line:126);shell_exec (line:140); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-count.php-
Full path:
his/web/network-olt-client-onu-mac-count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:00 12/05/2025
Last modified:
00:45:55 28/12/2024
MD5 hash:
300ca68aa5a7a32160838b9f2627d2aa
Filesize:
14.56 KB
suspicious functions used:
shell_exec (line:26);shell_exec (line:36);shell_exec (line:68);shell_exec (line:84);shell_exec (line:101);shell_exec (line:119);shell_exec (line:135);shell_exec (line:176);shell_exec (line:236);shell_exec (line:312);shell_exec (line:379);shell_exec (line:441);shell_exec (line:460);shell_exec (line:479); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-countt.php-
Full path:
his/web/network-olt-client-onu-mac-countt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:00 12/05/2025
Last modified:
00:45:55 28/12/2024
MD5 hash:
d29b4e72c375f528b769bd3894f9f0e7
Filesize:
8.95 KB
suspicious functions used:
shell_exec (line:26);shell_exec (line:36);shell_exec (line:59);shell_exec (line:75);shell_exec (line:92);shell_exec (line:102);shell_exec (line:117);shell_exec (line:155);shell_exec (line:206);shell_exec (line:262);shell_exec (line:275);shell_exec (line:288); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-con-sts.php-
Full path:
his/web/network-olt-con-sts.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:00 12/05/2025
Last modified:
00:45:56 28/12/2024
MD5 hash:
a26b0a1c1567c34c9aa5e2e0254ff8a6
Filesize:
4 KB
suspicious functions used:
`olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:10);shell_exec (line:38);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, `last_synced`, `last_update`, `msg`, `full_msg`, ROUND((SELECT AVG(value) FROM olt_onu_history WHERE alarm_id = '$alarmId' AND value != ''), 2) AS average_value FROM `, ` WHERE `alarm_id` = '$alarmId' AND ` (line:82); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-load.php-
Full path:
his/web/network-olt-load.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:00 12/05/2025
Last modified:
00:45:56 28/12/2024
MD5 hash:
f49d5153285c639ed91d4e806685ee56
Filesize:
1.33 KB
suspicious functions used:
shell_exec (line:22);shell_exec (line:25); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-oid-check.php-
Full path:
his/web/network-olt-oid-check.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:00 12/05/2025
Last modified:
00:45:56 28/12/2024
MD5 hash:
5b7dc0ce1103fbfc895873c250b63141
Filesize:
1.88 KB
suspicious functions used:
shell_exec (line:33); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-alarm-add.php-
Full path:
his/web/network-olt-onu-alarm-add.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:00 12/05/2025
Last modified:
00:45:56 28/12/2024
MD5 hash:
be6ba82c658419e1454f778e20e2d4c3
Filesize:
7.86 KB
suspicious functions used:
shell_exec (line:103); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-count.php-
Full path:
his/web/network-olt-onu-count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:00 12/05/2025
Last modified:
00:45:56 28/12/2024
MD5 hash:
eed277fdd838fc119df53ba5ebda8a77
Filesize:
5.44 KB
suspicious functions used:
`olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:11);shell_exec (line:69); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-list-data.php-
Full path:
his/web/network-olt-onu-list-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:00 12/05/2025
Last modified:
00:45:56 28/12/2024
MD5 hash:
54cc9417c766c31317311c3722ce7d4b
Filesize:
9.48 KB
suspicious functions used:
shell_exec (line:24);shell_exec (line:38);shell_exec (line:64);shell_exec (line:85);shell_exec (line:104);shell_exec (line:125);shell_exec (line:143);shell_exec (line:153);shell_exec (line:165);shell_exec (line:185); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-power.php-
Full path:
his/web/network-olt-onu-power.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:00 12/05/2025
Last modified:
00:45:56 28/12/2024
MD5 hash:
2e064543b67b532bdf4e5b12d49c5052
Filesize:
7.54 KB
suspicious functions used:
shell_exec (line:97); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-clients-search.php-
Full path:
his/web/network-olt-pon-clients-search.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:00 12/05/2025
Last modified:
00:45:56 28/12/2024
MD5 hash:
79d26fc66abdab6f173330588aa8b238
Filesize:
10.93 KB
suspicious functions used:
shell_exec (line:42);shell_exec (line:51);shell_exec (line:104);shell_exec (line:168); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search-bdcom.php-
Full path:
his/web/network-olt-pon-onu-search-bdcom.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:00 12/05/2025
Last modified:
00:45:56 28/12/2024
MD5 hash:
c786fa8b69268c738b6ff976631798cd
Filesize:
27.74 KB
suspicious functions used:
shell_exec (line:60);shell_exec (line:69);shell_exec (line:383); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search-bdcom1.php-
Full path:
his/web/network-olt-pon-onu-search-bdcom1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:00 12/05/2025
Last modified:
00:45:56 28/12/2024
MD5 hash:
dd18677b1dcbf7f0bce2ac6912d98da0
Filesize:
9.6 KB
suspicious functions used:
shell_exec (line:42);shell_exec (line:51);shell_exec (line:129); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search.php-
Full path:
his/web/network-olt-pon-onu-search.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:00 12/05/2025
Last modified:
00:45:56 28/12/2024
MD5 hash:
dc183ecf77d0e1f56f672338fd09cfa5
Filesize:
21.62 KB
suspicious functions used:
shell_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data-bdcom.php-
Full path:
his/web/network-snmp-onu-status-data-bdcom.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:00 12/05/2025
Last modified:
00:45:57 28/12/2024
MD5 hash:
065f5e2b05932ee66d473135998580ac
Filesize:
23.53 KB
suspicious functions used:
shell_exec (line:48);shell_exec (line:73);shell_exec (line:85);shell_exec (line:103);shell_exec (line:116);shell_exec (line:128);shell_exec (line:134);shell_exec (line:159);shell_exec (line:172);shell_exec (line:184);shell_exec (line:190);shell_exec (line:217);shell_exec (line:233);shell_exec (line:239);shell_exec (line:244);shell_exec (line:248);`pon_name` FROM `olt_pon` WHERE `olt_pon_id` = '$ponn_id' AND ` (line:255);shell_exec (line:263); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data.php-
Full path:
his/web/network-snmp-onu-status-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:00 12/05/2025
Last modified:
00:45:57 28/12/2024
MD5 hash:
0adfee384bf349b50f11036947fd2a74
Filesize:
30.37 KB
suspicious functions used:
shell_exec (line:38);`olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:42);shell_exec (line:81);shell_exec (line:95);shell_exec (line:109);shell_exec (line:122);shell_exec (line:208);shell_exec (line:429);shell_exec (line:441);shell_exec (line:448); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data1.php-
Full path:
his/web/network-snmp-onu-status-data1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:00 12/05/2025
Last modified:
00:45:57 28/12/2024
MD5 hash:
920bd1a592c36f7a1194b737642f8340
Filesize:
15.96 KB
suspicious functions used:
shell_exec (line:33);`olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:37);shell_exec (line:149); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data_vsol2.php-
Full path:
his/web/network-snmp-onu-status-data_vsol2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:00 12/05/2025
Last modified:
00:45:57 28/12/2024
MD5 hash:
f22d022ddc284f4d8e1de3660da91db8
Filesize:
15.61 KB
suspicious functions used:
shell_exec (line:34);shell_exec (line:113);shell_exec (line:126);shell_exec (line:132); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-tree-vartual-nodes.php-
Full path:
his/web/network-tree-vartual-nodes.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:00 12/05/2025
Last modified:
00:45:57 28/12/2024
MD5 hash:
3530b8bc3113544014b1746ecd67e834
Filesize:
10.64 KB
suspicious functions used:
shell_exec (line:76);shell_exec (line:111);shell_exec (line:145);shell_exec (line:181);shell_exec (line:188); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Network.php-
Full path:
his/web/Network.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:00 12/05/2025
Last modified:
00:45:58 28/12/2024
MD5 hash:
d607c8f09f94a0c02106c793664556a9
Filesize:
62 KB
suspicious functions used:
system (line:371);shell_exec (line:657); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Network1.php-
Full path:
his/web/Network1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:01 12/05/2025
Last modified:
00:45:58 28/12/2024
MD5 hash:
1439ff5047e988cac3d6c62c99ed49a1
Filesize:
63.32 KB
suspicious functions used:
system (line:374);shell_exec (line:660); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkLoad.php-
Full path:
his/web/NetworkLoad.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:01 12/05/2025
Last modified:
00:45:59 28/12/2024
MD5 hash:
e1632e66ee1b7394d3fb82751b924abe
Filesize:
2.83 KB
suspicious functions used:
system (line:81); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkLoad1.php-
Full path:
his/web/NetworkLoad1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:01 12/05/2025
Last modified:
00:45:59 28/12/2024
MD5 hash:
176bd6931be34d7ef351d22897accc65
Filesize:
759 B
suspicious functions used:
system (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltAddQuery.php-
Full path:
his/web/NetworkOltAddQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:01 12/05/2025
Last modified:
00:45:59 28/12/2024
MD5 hash:
ffcc97d9effb18c5391103911b7d9464
Filesize:
6.6 KB
suspicious functions used:
shell_exec (line:21); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltOnuStatus.php-
Full path:
his/web/NetworkOltOnuStatus.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:01 12/05/2025
Last modified:
00:45:59 28/12/2024
MD5 hash:
7604d17efbb57bd0b4c3566aa2d27c36
Filesize:
65.16 KB
suspicious functions used:
shell_exec (line:42);shell_exec (line:102);shell_exec (line:677);shell_exec (line:793);shell_exec (line:906); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltOnuStatus2.php-
Full path:
his/web/NetworkOltOnuStatus2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:01 12/05/2025
Last modified:
00:46:00 28/12/2024
MD5 hash:
c9a14797fa4353d05bbd9427b6079250
Filesize:
15.88 KB
suspicious functions used:
shell_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltSense.php-
Full path:
his/web/NetworkOltSense.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:01 12/05/2025
Last modified:
00:46:00 28/12/2024
MD5 hash:
2be664ae5006367f629ca437a6d507f8
Filesize:
18.26 KB
suspicious functions used:
`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, `last_synced`, `last_update`, `msg`, `full_msg`, ROUND((SELECT AVG(value) FROM olt_onu_history WHERE alarm_id = '$alarmId' AND value != ''), 2) AS average_value FROM `, ` WHERE `alarm_id` = '$alarmId' AND ` (line:123); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltSenseDetails.php-
Full path:
his/web/NetworkOltSenseDetails.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:01 12/05/2025
Last modified:
00:46:00 28/12/2024
MD5 hash:
440096c601fc10b819a1f0f8330928b0
Filesize:
14.17 KB
suspicious functions used:
`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:33);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:42);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:51);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:60); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltSync.php-
Full path:
his/web/NetworkOltSync.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:01 12/05/2025
Last modified:
00:46:00 28/12/2024
MD5 hash:
06633d4b65a14d677358170dd0a84424
Filesize:
1.87 KB
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree-olt-onu-list-data.php-
Full path:
his/web/networktree-olt-onu-list-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:01 12/05/2025
Last modified:
00:46:00 28/12/2024
MD5 hash:
af4221fefa9c9051846a063ac4135560
Filesize:
8.72 KB
suspicious functions used:
shell_exec (line:24);shell_exec (line:36);shell_exec (line:59);shell_exec (line:78);shell_exec (line:97);shell_exec (line:116);shell_exec (line:134);shell_exec (line:143);shell_exec (line:155);shell_exec (line:175); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeAddSave.php-
Full path:
his/web/NetworkTreeAddSave.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:01 12/05/2025
Last modified:
00:46:01 28/12/2024
MD5 hash:
a9dbc374394f257ef79f2d4f60f9771d
Filesize:
5.12 KB
suspicious functions used:
`network_tree` WHERE `olt_id` = '$olt_id' AND ` (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeEdit1.php-
Full path:
his/web/NetworkTreeEdit1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:01 12/05/2025
Last modified:
00:46:02 28/12/2024
MD5 hash:
3396a6bdf9b5804bb208f38f37cc29a2
Filesize:
35.81 KB
suspicious functions used:
`olt_onu` WHERE olt_id = '$olt_id' AND ` (line:207); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeEditSave.php-
Full path:
his/web/NetworkTreeEditSave.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:01 12/05/2025
Last modified:
00:46:02 28/12/2024
MD5 hash:
6c0f94f3ddde2ee6a93db1fa98971907
Filesize:
12.41 KB
suspicious functions used:
`network_tree` WHERE `olt_id` = '$olt_id' AND ` (line:182); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeList.php-
Full path:
his/web/NetworkTreeList.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:02 12/05/2025
Last modified:
00:46:03 28/12/2024
MD5 hash:
acd468021993faf8575531952ae107f8
Filesize:
21.98 KB
suspicious functions used:
`pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '{$row['olt_id']}' AND ` (line:287); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeMap.php-
Full path:
his/web/NetworkTreeMap.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:02 12/05/2025
Last modified:
00:46:03 28/12/2024
MD5 hash:
584d02944bd9de5a190ec6dc320fc49e
Filesize:
24.24 KB
suspicious functions used:
`${results.rxPower}` (line:263);`${results.distance}` (line:264);`${results.supplyVoltage}` (line:265);`${results.temperature}` (line:266);`${results.txPower}` (line:267);`${results.rxPower}` (line:283);`${results.distance}` (line:284);`${results.supplyVoltage}` (line:285);`${results.temperature}` (line:286);`${results.txPower}` (line:287); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeMap1.php-
Full path:
his/web/NetworkTreeMap1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:02 12/05/2025
Last modified:
00:46:03 28/12/2024
MD5 hash:
31a3ae9bc0bdb18726ed860ec6e8ec97
Filesize:
36.43 KB
suspicious functions used:
`networktree_marker_data.php?tree_id=${markerId}` (line:231);`${results.rxPower}` (line:311);`${results.distance}` (line:312);`${results.supplyVoltage}` (line:313);`${results.temperature}` (line:314);`${results.txPower}` (line:315); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_onu_list_add.php-
Full path:
his/web/networktree_device_onu_list_add.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:02 12/05/2025
Last modified:
00:46:03 28/12/2024
MD5 hash:
444ccf3c3e852a5a25cc4ccd3a5cf9ca
Filesize:
14.66 KB
suspicious functions used:
`network_tree` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND device_type = '5' AND ` (line:9);shell_exec (line:33);`network_tree` WHERE `onu_mac` = '$mac_address' AND ` (line:131);shell_exec (line:179);shell_exec (line:187);shell_exec (line:235);`network_tree` WHERE `onu_mac` = '$onuMac' AND ` (line:301); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_pon_check.php-
Full path:
his/web/networktree_device_pon_check.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:02 12/05/2025
Last modified:
00:46:03 28/12/2024
MD5 hash:
708a93aadcae96ecf0aaca52041fcf38
Filesize:
1.53 KB
suspicious functions used:
`pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '$olt_id' AND ` (line:8); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_pon_list_add.php-
Full path:
his/web/networktree_device_pon_list_add.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:02 12/05/2025
Last modified:
00:46:03 28/12/2024
MD5 hash:
2ec03912801e4749c2e9cd361417ca5f
Filesize:
1.36 KB
suspicious functions used:
`olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:6);`olt_pon` WHERE `olt_id` = '$olt_id' AND ` (line:10);`network_tree` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND ` (line:17); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_pon_port_onu_list.php-
Full path:
his/web/networktree_device_pon_port_onu_list.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:02 12/05/2025
Last modified:
00:46:03 28/12/2024
MD5 hash:
9c63b3ac69996628f5eb2959a9eb4e15
Filesize:
8.65 KB
suspicious functions used:
`olt_pon` WHERE olt_id = '$olt_id' AND ` (line:25);shell_exec (line:32);shell_exec (line:45);`network_tree` WHERE onu_index_id = '$port_onu_index_id' AND ` (line:49);shell_exec (line:81);shell_exec (line:103);shell_exec (line:122);shell_exec (line:143);shell_exec (line:161);shell_exec (line:170);shell_exec (line:184); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_pon_port_sense_list.php-
Full path:
his/web/networktree_device_pon_port_sense_list.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:02 12/05/2025
Last modified:
00:46:03 28/12/2024
MD5 hash:
ee69cd5cc122f8aa37d8d8e5c74def6b
Filesize:
3.65 KB
suspicious functions used:
`network_tree` WHERE `onu_mac` = '$onu_mac' AND ` (line:26);`network_tree` WHERE `c_id` = '{$dfhbdxf}' AND ` (line:71); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_type.php-
Full path:
his/web/networktree_device_type.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:02 12/05/2025
Last modified:
00:46:03 28/12/2024
MD5 hash:
f1520732e5a3ef38564238a3278a1f63
Filesize:
11.43 KB
suspicious functions used:
`tree_id`) AS countolt FROM `network_tree` WHERE `olt_id` = '$olt_id_sure' AND ` (line:64); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery.php-
Full path:
his/web/PaymentOnlineQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:03 12/05/2025
Last modified:
00:46:08 28/12/2024
MD5 hash:
201e1cf95b2d033897cab4bc2fd59e07
Filesize:
28.5 KB
suspicious functions used:
curl_exec (line:457);curl_exec (line:689); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery2.php-
Full path:
his/web/PaymentOnlineQuery2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:03 12/05/2025
Last modified:
00:46:08 28/12/2024
MD5 hash:
ccd315d11a60901b7b9029ff44f8351b
Filesize:
19.4 KB
suspicious functions used:
curl_exec (line:42);curl_exec (line:252); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentWebhook.php-
Full path:
his/web/PaymentWebhook.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:03 12/05/2025
Last modified:
00:46:09 28/12/2024
MD5 hash:
a2f322c94787630ab1e0c8ca35fc5ba1
Filesize:
18.6 KB
suspicious functions used:
base64_decode (line:30);curl_exec (line:41);curl_exec (line:422); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SignUp1.php-
Full path:
his/web/SignUp1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:03 12/05/2025
Last modified:
00:46:14 28/12/2024
MD5 hash:
3f7943dd155c8e0a383b7d02730f8c11
Filesize:
24.59 KB
suspicious functions used:
curl_exec (line:33);curl_exec (line:59); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: sms-balance-check.php-
Full path:
his/web/sms-balance-check.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:04 12/05/2025
Last modified:
00:46:15 28/12/2024
MD5 hash:
74ac3e963a0dc5bb7d4c980e594aa39b
Filesize:
854 B
suspicious functions used:
curl_exec (line:15); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMS.php-
Full path:
his/web/SMS.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:04 12/05/2025
Last modified:
00:46:15 28/12/2024
MD5 hash:
6f4721f653e09f5f33f32c1ba56f9762
Filesize:
37.05 KB
suspicious functions used:
curl_exec (line:56); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMS1.php-
Full path:
his/web/SMS1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:04 12/05/2025
Last modified:
00:46:15 28/12/2024
MD5 hash:
e4671dadf9ad575671fd3609a60030da
Filesize:
32.19 KB
suspicious functions used:
curl_exec (line:59); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMSAddSave.php-
Full path:
his/web/SMSAddSave.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:04 12/05/2025
Last modified:
00:46:15 28/12/2024
MD5 hash:
1a6eaf13aa0ca959fe2dca885b7ffd8e
Filesize:
1.73 KB
suspicious functions used:
curl_exec (line:34); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: sms_deliverey_report.php-
Full path:
his/web/sms_deliverey_report.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:04 12/05/2025
Last modified:
00:46:17 28/12/2024
MD5 hash:
03623943da7e9334e137b38c8577fc84
Filesize:
4.25 KB
suspicious functions used:
curl_exec (line:28);curl_exec (line:53);curl_exec (line:90); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: support-action.php-
Full path:
his/web/support-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:04 12/05/2025
Last modified:
00:46:17 28/12/2024
MD5 hash:
58556808f93f52486b2ad06998142aa9
Filesize:
14.56 KB
suspicious functions used:
curl_exec (line:220); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tagreeexpayment.php-
Full path:
his/web/tagreeexpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:04 12/05/2025
Last modified:
00:46:18 28/12/2024
MD5 hash:
029b4fba649a75c7c81d2f8931be8d63
Filesize:
2.86 KB
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreateagree.php-
Full path:
his/web/tcreateagree.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:04 12/05/2025
Last modified:
00:46:18 28/12/2024
MD5 hash:
27a10adf4190edc7eceee8cf74a6b72b
Filesize:
999 B
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreatepayment.php-
Full path:
his/web/tcreatepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:04 12/05/2025
Last modified:
00:46:18 28/12/2024
MD5 hash:
e49de9a33f5164bc2c6b88e4770faaff
Filesize:
1.07 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test2.php-
Full path:
his/web/test2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:04 12/05/2025
Last modified:
00:46:18 28/12/2024
MD5 hash:
ab80d92ede21b7da59bfefb325484297
Filesize:
13.76 KB
suspicious functions used:
shell_exec (line:59);shell_exec (line:70);shell_exec (line:76);shell_exec (line:88);shell_exec (line:101);shell_exec (line:141);curl_exec (line:187);curl_exec (line:212);curl_exec (line:354); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test6.php-
Full path:
his/web/test6.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:04 12/05/2025
Last modified:
00:46:19 28/12/2024
MD5 hash:
f22d022ddc284f4d8e1de3660da91db8
Filesize:
15.61 KB
suspicious functions used:
shell_exec (line:34);shell_exec (line:113);shell_exec (line:126);shell_exec (line:132); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test7.php-
Full path:
his/web/test7.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:04 12/05/2025
Last modified:
00:46:19 28/12/2024
MD5 hash:
b11ccf951ce63a21ea0a7328316a0e5c
Filesize:
1.57 KB
suspicious functions used:
curl_exec (line:14); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: testttttt.php-
Full path:
his/web/testttttt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:04 12/05/2025
Last modified:
00:46:19 28/12/2024
MD5 hash:
b1988a4be29e191ad935fb409a4174ee
Filesize:
2 KB
suspicious functions used:
curl_exec (line:47); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: texecutepayment.php-
Full path:
his/web/texecutepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:04 12/05/2025
Last modified:
00:46:19 28/12/2024
MD5 hash:
623635fdf5c871391d3a5fe99ee8c543
Filesize:
2.91 KB
suspicious functions used:
curl_exec (line:24); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tis-news.php-
Full path:
his/web/tis-news.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:04 12/05/2025
Last modified:
00:46:19 28/12/2024
MD5 hash:
ed23ca98b77c5321b4485e85eb2ea64d
Filesize:
3.67 KB
suspicious functions used:
curl_exec (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
his/web/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:04 12/05/2025
Last modified:
00:46:19 28/12/2024
MD5 hash:
7d8e71ceda3ffb74623e0c4a814715af
Filesize:
1.53 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tt.php-
Full path:
his/web/tt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:04 12/05/2025
Last modified:
00:46:19 28/12/2024
MD5 hash:
9c4ed141cb79fdc7e807b35923c91a20
Filesize:
1.56 KB
suspicious functions used:
curl_exec (line:30); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ttoken.php-
Full path:
his/web/ttoken.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:04 12/05/2025
Last modified:
00:46:20 28/12/2024
MD5 hash:
5f2c51c1db5b0defadfb67ce25c0098f
Filesize:
1.54 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook.php-
Full path:
his/web/webhook.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:05 12/05/2025
Last modified:
00:46:22 28/12/2024
MD5 hash:
26e2059a39281031d28874b51b52d60c
Filesize:
21.23 KB
suspicious functions used:
base64_decode (line:27);curl_exec (line:38);curl_exec (line:454); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook_cid.php-
Full path:
his/web/webhook_cid.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:05 12/05/2025
Last modified:
00:46:22 28/12/2024
MD5 hash:
18c8353c99f0ca2645c68685e40c568b
Filesize:
21.1 KB
suspicious functions used:
base64_decode (line:28);curl_exec (line:39);curl_exec (line:429); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook_test.php-
Full path:
his/web/webhook_test.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:05 12/05/2025
Last modified:
00:46:22 28/12/2024
MD5 hash:
74a7dcc262d7fe7f2bdc9e0595d03837
Filesize:
4.69 KB
suspicious functions used:
base64_decode (line:22);curl_exec (line:33);curl_exec (line:86);curl_exec (line:107); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: billpaycheck.php-
Full path:
his/web/bkash/billpaycheck.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:05 12/05/2025
Last modified:
00:46:25 28/12/2024
MD5 hash:
38c46efc36b25628fa18bd92ae135af9
Filesize:
796 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
his/web/bkash/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:05 12/05/2025
Last modified:
00:46:25 28/12/2024
MD5 hash:
6175301f744b22b7db70ba598a991f8b
Filesize:
1.64 KB
suspicious functions used:
curl_exec (line:36); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
his/web/bkash/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:05 12/05/2025
Last modified:
00:46:25 28/12/2024
MD5 hash:
19be365d26141eaecead7ef0ada0e75c
Filesize:
1.3 KB
suspicious functions used:
curl_exec (line:31); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: grant.php-
Full path:
his/web/bkash/grant.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:05 12/05/2025
Last modified:
00:46:26 28/12/2024
MD5 hash:
da5499d260dc78ea4fcd71227cc6c484
Filesize:
2.01 KB
suspicious functions used:
curl_exec (line:41);curl_exec (line:63); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: query.php-
Full path:
his/web/bkash/query.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:05 12/05/2025
Last modified:
00:46:26 28/12/2024
MD5 hash:
f3ed9045f3a073e2cdc8561d500bda89
Filesize:
1.65 KB
suspicious functions used:
curl_exec (line:33); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tagreeexpayment.php-
Full path:
his/web/bkash/tagreeexpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:05 12/05/2025
Last modified:
00:46:26 28/12/2024
MD5 hash:
a1ba7d36003f72e593615aa32e44acb9
Filesize:
1.58 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreateagree.php-
Full path:
his/web/bkash/tcreateagree.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:05 12/05/2025
Last modified:
00:46:26 28/12/2024
MD5 hash:
8ae6bdc9f3d4b0cdcf651701a0d9ebab
Filesize:
1.2 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreatepayment.php-
Full path:
his/web/bkash/tcreatepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:05 12/05/2025
Last modified:
00:46:26 28/12/2024
MD5 hash:
3c978def6cffa0a8db5e86ce127caae6
Filesize:
1.35 KB
suspicious functions used:
curl_exec (line:29); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: texecutepayment.php-
Full path:
his/web/bkash/texecutepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:05 12/05/2025
Last modified:
00:46:26 28/12/2024
MD5 hash:
d8f24df64623da3cfc2baf48f184a3d1
Filesize:
1.21 KB
suspicious functions used:
curl_exec (line:25); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
his/web/bkash/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:05 12/05/2025
Last modified:
00:46:26 28/12/2024
MD5 hash:
f50b33eeb31927b2c081195618d48b8d
Filesize:
1.88 KB
suspicious functions used:
curl_exec (line:48); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tokent.php-
Full path:
his/web/bkash/tokent.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:05 12/05/2025
Last modified:
00:46:26 28/12/2024
MD5 hash:
890a9e9fb1be75f31a6daad8811c1ff9
Filesize:
1.9 KB
suspicious functions used:
curl_exec (line:48); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: trxID.php-
Full path:
his/web/bkash/trxID.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:05 12/05/2025
Last modified:
00:46:26 28/12/2024
MD5 hash:
9bcb8e70728fd25807c4db8916166d74
Filesize:
1.44 KB
suspicious functions used:
curl_exec (line:31); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
his/web/bkasht/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:05 12/05/2025
Last modified:
00:46:26 28/12/2024
MD5 hash:
a4ba6e7683f558dc3602dacd7ddeded2
Filesize:
1.36 KB
suspicious functions used:
curl_exec (line:29); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
his/web/bkasht/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:05 12/05/2025
Last modified:
00:46:26 28/12/2024
MD5 hash:
aad462fbca9f9a36649a197d67403098
Filesize:
1.27 KB
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: grant.php-
Full path:
his/web/bkasht/grant.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:05 12/05/2025
Last modified:
00:46:26 28/12/2024
MD5 hash:
da5499d260dc78ea4fcd71227cc6c484
Filesize:
2.01 KB
suspicious functions used:
curl_exec (line:41);curl_exec (line:63); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: query.php-
Full path:
his/web/bkasht/query.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:05 12/05/2025
Last modified:
00:46:26 28/12/2024
MD5 hash:
f3ed9045f3a073e2cdc8561d500bda89
Filesize:
1.65 KB
suspicious functions used:
curl_exec (line:33); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
his/web/bkasht/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:05 12/05/2025
Last modified:
00:46:26 28/12/2024
MD5 hash:
f50b33eeb31927b2c081195618d48b8d
Filesize:
1.88 KB
suspicious functions used:
curl_exec (line:48); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: trxID.php-
Full path:
his/web/bkasht/trxID.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:05 12/05/2025
Last modified:
00:46:26 28/12/2024
MD5 hash:
9bcb8e70728fd25807c4db8916166d74
Filesize:
1.44 KB
suspicious functions used:
curl_exec (line:31); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: class.phpmailer.php-
Full path:
his/web/email/class.phpmailer.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:05 12/05/2025
Last modified:
00:46:27 28/12/2024
MD5 hash:
68468d69b47fffecc89df57e27c5a781
Filesize:
143.32 KB
suspicious functions used:
`$DKIM_private` (line:428);popen (line:1387);popen (line:1408);base64_decode (line:3410);`$mail->set('SMTPSecure', 'tls');` (line:3688);`$mail->SMTPSecure = 'tls';` (line:3690); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: class.smtp.php-
Full path:
his/web/email/class.smtp.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:06 12/05/2025
Last modified:
00:46:28 28/12/2024
MD5 hash:
aa8478329268e5438a4469c268337a10
Filesize:
41.44 KB
suspicious functions used:
base64_decode (line:513);base64_decode (line:533); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: jqgrid.php-
Full path:
his/web/inc/jqgrid.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:07 12/05/2025
Last modified:
00:46:33 28/12/2024
MD5 hash:
71027a29e71e0626d8b57cbb631e6d98
Filesize:
23.92 KB
suspicious functions used:
eval (line:397); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: JSON.php-
Full path:
his/web/inc/JSON.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:07 12/05/2025
Last modified:
00:46:33 28/12/2024
MD5 hash:
f5a34509e06231308becbe320ade9ff6
Filesize:
33.22 KB
suspicious functions used:
eval (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: smsapicore.php-
Full path:
his/web/include/smsapicore.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:07 12/05/2025
Last modified:
00:46:33 28/12/2024
MD5 hash:
6b6257f892846565ef8dee38400afa15
Filesize:
1.24 KB
suspicious functions used:
curl_exec (line:36); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: telegramapicore.php-
Full path:
his/web/include/telegramapicore.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:07 12/05/2025
Last modified:
00:46:33 28/12/2024
MD5 hash:
e1f2020f2a58e7b600312301697f9aca
Filesize:
3 KB
suspicious functions used:
curl_exec (line:65); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ui.php-
Full path:
his/web/js/tinymce/themes/advanced/skins/highcontrast/ui.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:07 12/05/2025
Last modified:
00:46:56 28/12/2024
MD5 hash:
3edaf67be8573b86686f46bbba4f058c
Filesize:
4.53 KB
suspicious functions used:
curl_exec (line:20);`bill_amount` = '0.00' WHERE bill_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY ` (line:53);`bill_amount` = '0.00', days = '0.00' WHERE entry_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY ` (line:54);`payment` WHERE `pay_date` < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND pay_amount != '0.00' ORDER BY ` (line:55);curl_exec (line:146);curl_exec (line:168); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Changes.txt-
Full path:
his/web/js/jqgrid/js/Changes.txt
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:07 12/05/2025
Last modified:
00:46:46 28/12/2024
MD5 hash:
c0a4adbc3f1c6d592cb4fa8433fee9ea
Filesize:
44.32 KB
suspicious functions used:
system (line:87); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
his/m/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:07 12/05/2025
Last modified:
00:45:08 28/12/2024
MD5 hash:
849185f307be30eafb1bbef93616d8c3
Filesize:
1.71 KB
suspicious functions used:
curl_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
his/m/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:07 12/05/2025
Last modified:
00:45:08 28/12/2024
MD5 hash:
9a3f22521ad987e86f84c4f5f688d5b7
Filesize:
713 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index.php-
Full path:
his/m/index.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
20:43:47 11/05/2025
Last modified:
00:45:09 28/12/2024
MD5 hash:
95475438b8637bb8fa3fbb409a4fcbcc
Filesize:
16.96 KB
suspicious functions used:
curl_exec (line:298); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index1.php-
Full path:
his/m/index1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:07 12/05/2025
Last modified:
00:45:09 28/12/2024
MD5 hash:
dbd325386cd905b7a18b217dda2030f3
Filesize:
13.92 KB
suspicious functions used:
base64_decode (line:8);curl_exec (line:224); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index2.php-
Full path:
his/m/index2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:08 12/05/2025
Last modified:
00:45:09 28/12/2024
MD5 hash:
41558736b037228ea93df03cae70eb87
Filesize:
4.31 KB
suspicious functions used:
curl_exec (line:70); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: LoginByPass.php-
Full path:
his/m/LoginByPass.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:08 12/05/2025
Last modified:
00:45:09 28/12/2024
MD5 hash:
4deda2bef49c7e4552e5379c86858ddf
Filesize:
4.27 KB
suspicious functions used:
curl_exec (line:41); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec.php-
Full path:
his/m/login_exec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:08 12/05/2025
Last modified:
00:45:09 28/12/2024
MD5 hash:
760b107af2f5d6194f97c20ba3ffb86b
Filesize:
11.63 KB
suspicious functions used:
curl_exec (line:24);curl_exec (line:80);curl_exec (line:227); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec1.php-
Full path:
his/m/login_exec1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:08 12/05/2025
Last modified:
00:45:09 28/12/2024
MD5 hash:
b7a23f98b3d03b1ecc08218cf01b4aee
Filesize:
6.36 KB
suspicious functions used:
curl_exec (line:115); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec2.php-
Full path:
his/m/login_exec2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:08 12/05/2025
Last modified:
00:45:09 28/12/2024
MD5 hash:
46b08782f51ba75b23e27183e06370fe
Filesize:
4.28 KB
suspicious functions used:
curl_exec (line:61); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-helper.php-
Full path:
his/m/nagad-helper.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:08 12/05/2025
Last modified:
00:45:10 28/12/2024
MD5 hash:
2bb70c44d68202e0a0cd8ae1388f0b1b
Filesize:
6.74 KB
suspicious functions used:
curl_exec (line:61);base64_decode (line:97); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-merchant-callback.php-
Full path:
his/m/nagad-merchant-callback.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:08 12/05/2025
Last modified:
00:45:10 28/12/2024
MD5 hash:
0e6086c5260150c11249029f212ee481
Filesize:
11.36 KB
suspicious functions used:
curl_exec (line:20); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-snmp-data.php-
Full path:
his/m/netowrk-snmp-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:08 12/05/2025
Last modified:
00:45:10 28/12/2024
MD5 hash:
45b774abc8d67efb3e4e87c93b1f618b
Filesize:
24.05 KB
suspicious functions used:
shell_exec (line:96);shell_exec (line:105);shell_exec (line:115);shell_exec (line:134);shell_exec (line:146);shell_exec (line:157);shell_exec (line:173);shell_exec (line:183);shell_exec (line:199);shell_exec (line:219);shell_exec (line:229);shell_exec (line:234);shell_exec (line:242);shell_exec (line:262);shell_exec (line:278);`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:291);shell_exec (line:297);shell_exec (line:432); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery.php-
Full path:
his/m/PaymentOnlineQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:08 12/05/2025
Last modified:
00:45:11 28/12/2024
MD5 hash:
05d772ea15775c0640ac9d1ff7c7144c
Filesize:
21.13 KB
suspicious functions used:
curl_exec (line:287);curl_exec (line:512); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery2.php-
Full path:
his/m/PaymentOnlineQuery2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:08 12/05/2025
Last modified:
00:45:11 28/12/2024
MD5 hash:
3660992067d5591fc79ce89d6dbb9274
Filesize:
19.08 KB
suspicious functions used:
curl_exec (line:41);curl_exec (line:254); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: support-action.php-
Full path:
his/m/support-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:08 12/05/2025
Last modified:
00:45:12 28/12/2024
MD5 hash:
2fc6fd844db911a5502a7a6ae383990f
Filesize:
10.31 KB
suspicious functions used:
curl_exec (line:99); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tagreeexpayment.php-
Full path:
his/m/tagreeexpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:08 12/05/2025
Last modified:
00:45:13 28/12/2024
MD5 hash:
c95e3ee881752db67b4f3597bc58430a
Filesize:
2.46 KB
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreateagree.php-
Full path:
his/m/tcreateagree.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:08 12/05/2025
Last modified:
00:45:13 28/12/2024
MD5 hash:
27a10adf4190edc7eceee8cf74a6b72b
Filesize:
999 B
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreatepayment.php-
Full path:
his/m/tcreatepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:08 12/05/2025
Last modified:
00:45:13 28/12/2024
MD5 hash:
e49de9a33f5164bc2c6b88e4770faaff
Filesize:
1.07 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: texecutepayment.php-
Full path:
his/m/texecutepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:08 12/05/2025
Last modified:
00:45:13 28/12/2024
MD5 hash:
efbb63dfcfdacb52dec74bffc389bbb3
Filesize:
2.67 KB
suspicious functions used:
curl_exec (line:24); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
his/m/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:08 12/05/2025
Last modified:
00:45:13 28/12/2024
MD5 hash:
7d8e71ceda3ffb74623e0c4a814715af
Filesize:
1.53 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ttoken.php-
Full path:
his/m/ttoken.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:08 12/05/2025
Last modified:
00:45:13 28/12/2024
MD5 hash:
5f2c51c1db5b0defadfb67ce25c0098f
Filesize:
1.54 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Changes.txt-
Full path:
acn/m/js/jqgrid/js/Changes.txt
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:09 12/05/2025
Last modified:
01:14:42 26/09/2023
MD5 hash:
c0a4adbc3f1c6d592cb4fa8433fee9ea
Filesize:
44.32 KB
suspicious functions used:
system (line:87); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery.php-
Full path:
acn/m/PaymentOnlineQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:10 12/05/2025
Last modified:
01:13:53 26/09/2023
MD5 hash:
5e63b1f647ca3509509beda8102d5c40
Filesize:
16.65 KB
suspicious functions used:
curl_exec (line:287);curl_exec (line:382); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
acn/m/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:10 12/05/2025
Last modified:
01:13:51 26/09/2023
MD5 hash:
05132f436e56ff2164ecc165347219ae
Filesize:
1.71 KB
suspicious functions used:
curl_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
acn/m/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:10 12/05/2025
Last modified:
01:13:51 26/09/2023
MD5 hash:
9a3f22521ad987e86f84c4f5f688d5b7
Filesize:
713 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index.php-
Full path:
acn/m/index.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
04:40:08 12/05/2025
Last modified:
23:30:24 03/10/2023
MD5 hash:
488549d8551f66f872c47e45201ee5b7
Filesize:
11.85 KB
suspicious functions used:
base64_decode (line:10);curl_exec (line:206); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec.php-
Full path:
acn/m/login_exec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:42:18 12/05/2025
Last modified:
06:36:16 01/03/2024
MD5 hash:
1f800365ef270564df77d30c1bfd7ed3
Filesize:
5.4 KB
suspicious functions used:
curl_exec (line:66); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec1.php-
Full path:
acn/m/login_exec1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:10 12/05/2025
Last modified:
01:13:52 26/09/2023
MD5 hash:
4ab4155763d3c6a8ea772996a5765a94
Filesize:
4.28 KB
suspicious functions used:
curl_exec (line:61); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery2.php-
Full path:
acn/m/PaymentOnlineQuery2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:10 12/05/2025
Last modified:
01:13:53 26/09/2023
MD5 hash:
48588dfbb812b9e8102af40dc401032c
Filesize:
19.04 KB
suspicious functions used:
curl_exec (line:41);curl_exec (line:254); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tagreeexpayment.php-
Full path:
acn/m/tagreeexpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:10 12/05/2025
Last modified:
01:13:53 26/09/2023
MD5 hash:
c95e3ee881752db67b4f3597bc58430a
Filesize:
2.46 KB
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreateagree.php-
Full path:
acn/m/tcreateagree.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:10 12/05/2025
Last modified:
01:13:53 26/09/2023
MD5 hash:
27a10adf4190edc7eceee8cf74a6b72b
Filesize:
999 B
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreatepayment.php-
Full path:
acn/m/tcreatepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:10 12/05/2025
Last modified:
01:13:53 26/09/2023
MD5 hash:
e49de9a33f5164bc2c6b88e4770faaff
Filesize:
1.07 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: texecutepayment.php-
Full path:
acn/m/texecutepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:10 12/05/2025
Last modified:
01:13:53 26/09/2023
MD5 hash:
efbb63dfcfdacb52dec74bffc389bbb3
Filesize:
2.67 KB
suspicious functions used:
curl_exec (line:24); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
acn/m/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:11 12/05/2025
Last modified:
01:13:53 26/09/2023
MD5 hash:
7d8e71ceda3ffb74623e0c4a814715af
Filesize:
1.53 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ttoken.php-
Full path:
acn/m/ttoken.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:11 12/05/2025
Last modified:
01:13:53 26/09/2023
MD5 hash:
5f2c51c1db5b0defadfb67ce25c0098f
Filesize:
1.54 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: class.phpmailer.php-
Full path:
acn/web/email/class.phpmailer.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:11 12/05/2025
Last modified:
01:15:40 26/09/2023
MD5 hash:
68468d69b47fffecc89df57e27c5a781
Filesize:
143.32 KB
suspicious functions used:
`$DKIM_private` (line:428);popen (line:1387);popen (line:1408);base64_decode (line:3410);`$mail->set('SMTPSecure', 'tls');` (line:3688);`$mail->SMTPSecure = 'tls';` (line:3690); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: class.smtp.php-
Full path:
acn/web/email/class.smtp.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:11 12/05/2025
Last modified:
01:15:40 26/09/2023
MD5 hash:
aa8478329268e5438a4469c268337a10
Filesize:
41.44 KB
suspicious functions used:
base64_decode (line:513);base64_decode (line:533); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: JSON.php-
Full path:
acn/web/inc/JSON.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:12 12/05/2025
Last modified:
01:15:43 26/09/2023
MD5 hash:
f5a34509e06231308becbe320ade9ff6
Filesize:
33.22 KB
suspicious functions used:
eval (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: jqgrid.php-
Full path:
acn/web/inc/jqgrid.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:12 12/05/2025
Last modified:
01:15:43 26/09/2023
MD5 hash:
71027a29e71e0626d8b57cbb631e6d98
Filesize:
23.92 KB
suspicious functions used:
eval (line:397); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: smsapicore.php-
Full path:
acn/web/include/smsapicore.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:12 12/05/2025
Last modified:
06:09:55 01/03/2024
MD5 hash:
0afbabc581e2e88f2883e249f83847a4
Filesize:
891 B
suspicious functions used:
curl_exec (line:13); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: telegramapicore.php-
Full path:
acn/web/include/telegramapicore.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
17:49:33 11/05/2025
Last modified:
01:15:43 26/09/2023
MD5 hash:
c669b81806a80fae7f84959c253cc737
Filesize:
2.44 KB
suspicious functions used:
curl_exec (line:54); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Changes.txt-
Full path:
acn/web/js/jqgrid/js/Changes.txt
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:12 12/05/2025
Last modified:
01:15:51 26/09/2023
MD5 hash:
c0a4adbc3f1c6d592cb4fa8433fee9ea
Filesize:
44.32 KB
suspicious functions used:
system (line:87); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ui.php-
Full path:
acn/web/js/tinymce/themes/advanced/skins/highcontrast/ui.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:12 12/05/2025
Last modified:
01:15:57 26/09/2023
MD5 hash:
4c0401a6d1abd64eeb2781b0ac727ceb
Filesize:
3.94 KB
suspicious functions used:
curl_exec (line:20);curl_exec (line:37);curl_exec (line:132);curl_exec (line:149); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: AutoActiveClientsCount1.php-
Full path:
acn/web/AutoActiveClientsCount1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
10:11:15 12/05/2025
Last modified:
01:15:15 26/09/2023
MD5 hash:
a0090e4a11dd59b955a6edd549b6ef2f
Filesize:
5.85 KB
suspicious functions used:
system (line:54); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkLoad.php-
Full path:
acn/web/NetworkLoad.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:16 12/05/2025
Last modified:
01:15:28 26/09/2023
MD5 hash:
e1632e66ee1b7394d3fb82751b924abe
Filesize:
2.83 KB
suspicious functions used:
system (line:81); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: InstrumentsStoreOutDetails.php-
Full path:
acn/web/InstrumentsStoreOutDetails.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:16 12/05/2025
Last modified:
01:15:24 26/09/2023
MD5 hash:
ab68ab13bcfd51da15e72a3d4e9817e8
Filesize:
9.37 KB
suspicious functions used:
`update_date`, '%D-%b, %y') AS offdate, TIME_FORMAT(`update_time`, '%T') AS offtime FROM `con_sts_log` WHERE `c_id` = '{$row['c_id']}' AND con_sts = 'Inactive' ORDER BY ` (line:120); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Network.php-
Full path:
acn/web/Network.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:16 12/05/2025
Last modified:
01:15:27 26/09/2023
MD5 hash:
81fbd1a4bf9ecbb944ccd98ae719849b
Filesize:
22.92 KB
suspicious functions used:
system (line:209); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Network1.php-
Full path:
acn/web/Network1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:16 12/05/2025
Last modified:
01:15:27 26/09/2023
MD5 hash:
81fbd1a4bf9ecbb944ccd98ae719849b
Filesize:
22.92 KB
suspicious functions used:
system (line:209); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery.php-
Full path:
acn/web/PaymentOnlineQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:17 12/05/2025
Last modified:
01:15:31 26/09/2023
MD5 hash:
eb93c751e05e717a544d27f8dd6ef768
Filesize:
23.99 KB
suspicious functions used:
curl_exec (line:456);curl_exec (line:560); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery2.php-
Full path:
acn/web/PaymentOnlineQuery2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:17 12/05/2025
Last modified:
01:15:31 26/09/2023
MD5 hash:
138b87d49f0613b02cb61abace637606
Filesize:
19.39 KB
suspicious functions used:
curl_exec (line:43);curl_exec (line:253); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMS.php-
Full path:
acn/web/SMS.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:17 12/05/2025
Last modified:
04:05:02 13/10/2023
MD5 hash:
a8c609c9c9cec5324a708b373cec838c
Filesize:
30.62 KB
suspicious functions used:
curl_exec (line:53); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentWebhook.php-
Full path:
acn/web/PaymentWebhook.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:18 12/05/2025
Last modified:
08:32:04 01/03/2024
MD5 hash:
a2f322c94787630ab1e0c8ca35fc5ba1
Filesize:
18.6 KB
suspicious functions used:
base64_decode (line:30);curl_exec (line:41);curl_exec (line:422); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMS1.php-
Full path:
acn/web/SMS1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:18 12/05/2025
Last modified:
01:15:35 26/09/2023
MD5 hash:
00310c03f319d7c6845d0aef92328b13
Filesize:
32.19 KB
suspicious functions used:
curl_exec (line:59); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMSAddSave.php-
Full path:
acn/web/SMSAddSave.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:18 12/05/2025
Last modified:
01:15:35 26/09/2023
MD5 hash:
5e8b43b3bc2febe3a611a5bd9aa8fc28
Filesize:
1.71 KB
suspicious functions used:
curl_exec (line:34); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: emp_salary_advence_find.php-
Full path:
acn/web/emp_salary_advence_find.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:19 12/05/2025
Last modified:
01:15:22 26/09/2023
MD5 hash:
8cb12a79d5e1d31d92670d721dabb5aa
Filesize:
2.25 KB
suspicious functions used:
`expanse` WHERE `type` = '2' AND `status` = '2' AND ex_by = '$e_id' AND MONTH(`, `) = MONTH('$lastmonth') AND YEAR(`, `) = YEAR('$lastmonth') GROUP BY ` (line:8);`e_id` = '$e_id' AND ` (line:12); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: company_info.php-
Full path:
acn/web/company_info.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
18:05:02 11/05/2025
Last modified:
13:01:05 09/04/2024
MD5 hash:
c52ef7f55b7a46af9aa2b7c7b71a3834
Filesize:
7.74 KB
suspicious functions used:
curl_exec (line:123); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
acn/web/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:19 12/05/2025
Last modified:
01:15:21 26/09/2023
MD5 hash:
c8a7ce9b69ebed3509cee2952c04cb0c
Filesize:
1.7 KB
suspicious functions used:
curl_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_all.php-
Full path:
acn/web/cron_all.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:19 12/05/2025
Last modified:
08:04:16 01/03/2024
MD5 hash:
b19a08fef36584598cca299b7ecc5e6d
Filesize:
2.07 KB
suspicious functions used:
curl_exec (line:23);curl_exec (line:38);curl_exec (line:53); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_gen_bill.php-
Full path:
acn/web/cron_auto_gen_bill.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:19 12/05/2025
Last modified:
08:04:50 01/03/2024
MD5 hash:
eadec12eb6484d0069e5d0d320725a75
Filesize:
4.73 KB
suspicious functions used:
curl_exec (line:140);curl_exec (line:149); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive.php-
Full path:
acn/web/cron_auto_inactive.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:19 12/05/2025
Last modified:
08:05:48 01/03/2024
MD5 hash:
288e83bc1578b0992ae1ab75eb328bc2
Filesize:
5.75 KB
suspicious functions used:
curl_exec (line:151); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive2.php-
Full path:
acn/web/cron_auto_inactive2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:19 12/05/2025
Last modified:
01:15:21 26/09/2023
MD5 hash:
a6a713d414c4e0632f4fe69f68b77d53
Filesize:
6.28 KB
suspicious functions used:
curl_exec (line:158); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
acn/web/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:19 12/05/2025
Last modified:
01:15:22 26/09/2023
MD5 hash:
c46a50905333286f45dfeacf010851ab
Filesize:
716 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive_termination.php-
Full path:
acn/web/cron_auto_inactive_termination.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
18:05:02 11/05/2025
Last modified:
12:17:50 23/09/2024
MD5 hash:
64c9ff719cd52caa5d5589cf7fd5e460
Filesize:
6.81 KB
suspicious functions used:
curl_exec (line:124);curl_exec (line:142); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_termination_remainder1.php-
Full path:
acn/web/cron_auto_termination_remainder1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:19 12/05/2025
Last modified:
08:31:04 01/03/2024
MD5 hash:
7765f9f820dbd402f1064fab9958ffaa
Filesize:
3.26 KB
suspicious functions used:
curl_exec (line:83); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_client_bandwidth_count.php-
Full path:
acn/web/cron_client_bandwidth_count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
04:23:43 12/05/2025
Last modified:
01:15:21 26/09/2023
MD5 hash:
6b8058e3d36ab2407a01cf3091a88016
Filesize:
3.81 KB
suspicious functions used:
curl_exec (line:102); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_network.php-
Full path:
acn/web/cron_network.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
07:23:37 12/05/2025
Last modified:
01:15:21 26/09/2023
MD5 hash:
d7ae8ca3db81dce0960bb9840cb5aeee
Filesize:
4.14 KB
suspicious functions used:
curl_exec (line:41);curl_exec (line:59); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index.php-
Full path:
acn/web/index.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
23:54:44 11/05/2025
Last modified:
23:30:29 03/10/2023
MD5 hash:
618ca042b62304de35ff0b2a4abc061b
Filesize:
11.98 KB
suspicious functions used:
base64_decode (line:10);curl_exec (line:211); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: sms_deliverey_report.php-
Full path:
acn/web/sms_deliverey_report.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:19 12/05/2025
Last modified:
01:15:36 26/09/2023
MD5 hash:
b0c2b4c2bebe35fbe233cb298a952910
Filesize:
3.45 KB
suspicious functions used:
curl_exec (line:18);curl_exec (line:44); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ttoken.php-
Full path:
acn/web/ttoken.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:20 12/05/2025
Last modified:
01:15:37 26/09/2023
MD5 hash:
5f2c51c1db5b0defadfb67ce25c0098f
Filesize:
1.54 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ip-ping-checker.php-
Full path:
acn/web/ip-ping-checker.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:20 12/05/2025
Last modified:
01:15:24 26/09/2023
MD5 hash:
0d28f3053b73b3fe2885cf519ee17c12
Filesize:
2.64 KB
suspicious functions used:
curl_exec (line:81); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook.php-
Full path:
acn/web/webhook.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:20 12/05/2025
Last modified:
09:21:20 01/03/2024
MD5 hash:
6ea5abfa2b22d299ea68b666eaa57701
Filesize:
20.98 KB
suspicious functions used:
base64_decode (line:28);curl_exec (line:39);curl_exec (line:427); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook_test.php-
Full path:
acn/web/webhook_test.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:20 12/05/2025
Last modified:
01:15:38 26/09/2023
MD5 hash:
74a7dcc262d7fe7f2bdc9e0595d03837
Filesize:
4.69 KB
suspicious functions used:
base64_decode (line:22);curl_exec (line:33);curl_exec (line:86);curl_exec (line:107); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec.php-
Full path:
acn/web/login_exec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
10:05:45 12/05/2025
Last modified:
06:36:16 01/03/2024
MD5 hash:
8e5caeac6dd5efb18009f8718af713ce
Filesize:
5.39 KB
suspicious functions used:
curl_exec (line:66); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec1.php-
Full path:
acn/web/login_exec1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:20 12/05/2025
Last modified:
01:15:25 26/09/2023
MD5 hash:
4f75b914e1b47a355be8cbc73e4e1407
Filesize:
3.91 KB
suspicious functions used:
curl_exec (line:53); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tagreeexpayment.php-
Full path:
acn/web/tagreeexpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:20 12/05/2025
Last modified:
01:15:36 26/09/2023
MD5 hash:
029b4fba649a75c7c81d2f8931be8d63
Filesize:
2.86 KB
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreateagree.php-
Full path:
acn/web/tcreateagree.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:20 12/05/2025
Last modified:
01:15:36 26/09/2023
MD5 hash:
27a10adf4190edc7eceee8cf74a6b72b
Filesize:
999 B
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreatepayment.php-
Full path:
acn/web/tcreatepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:20 12/05/2025
Last modified:
01:15:36 26/09/2023
MD5 hash:
e49de9a33f5164bc2c6b88e4770faaff
Filesize:
1.07 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test3.php-
Full path:
acn/web/test3.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:20 12/05/2025
Last modified:
01:15:36 26/09/2023
MD5 hash:
73a48fe113b432b1786e7a15406cc14d
Filesize:
1.26 KB
suspicious functions used:
`Counter: ${seconds}s` (line:29); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: testttttt.php-
Full path:
acn/web/testttttt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:20 12/05/2025
Last modified:
10:27:24 04/10/2023
MD5 hash:
b1988a4be29e191ad935fb409a4174ee
Filesize:
2 KB
suspicious functions used:
curl_exec (line:47); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: texecutepayment.php-
Full path:
acn/web/texecutepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:20 12/05/2025
Last modified:
01:15:36 26/09/2023
MD5 hash:
623635fdf5c871391d3a5fe99ee8c543
Filesize:
2.91 KB
suspicious functions used:
curl_exec (line:24); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tis-news.php-
Full path:
acn/web/tis-news.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:20 12/05/2025
Last modified:
07:55:10 09/04/2024
MD5 hash:
ed23ca98b77c5321b4485e85eb2ea64d
Filesize:
3.67 KB
suspicious functions used:
curl_exec (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
acn/web/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:20 12/05/2025
Last modified:
01:15:37 26/09/2023
MD5 hash:
7d8e71ceda3ffb74623e0c4a814715af
Filesize:
1.53 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tagreeexpayment.php-
Full path:
airmax/m/tagreeexpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:21 12/05/2025
Last modified:
02:50:39 07/04/2024
MD5 hash:
c95e3ee881752db67b4f3597bc58430a
Filesize:
2.46 KB
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery.php-
Full path:
airmax/m/PaymentOnlineQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:21 12/05/2025
Last modified:
02:50:39 07/04/2024
MD5 hash:
c7aca21e5a61ded371d4b853710cf4b4
Filesize:
21.14 KB
suspicious functions used:
curl_exec (line:287);curl_exec (line:512); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: support-action.php-
Full path:
airmax/m/support-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:21 12/05/2025
Last modified:
02:50:39 07/04/2024
MD5 hash:
2fc6fd844db911a5502a7a6ae383990f
Filesize:
10.31 KB
suspicious functions used:
curl_exec (line:99); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
airmax/m/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:21 12/05/2025
Last modified:
02:50:38 07/04/2024
MD5 hash:
849185f307be30eafb1bbef93616d8c3
Filesize:
1.71 KB
suspicious functions used:
curl_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
airmax/m/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:22 12/05/2025
Last modified:
02:50:38 07/04/2024
MD5 hash:
9a3f22521ad987e86f84c4f5f688d5b7
Filesize:
713 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreateagree.php-
Full path:
airmax/m/tcreateagree.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:22 12/05/2025
Last modified:
02:50:39 07/04/2024
MD5 hash:
27a10adf4190edc7eceee8cf74a6b72b
Filesize:
999 B
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index.php-
Full path:
airmax/m/index.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
14:44:33 11/05/2025
Last modified:
02:50:38 07/04/2024
MD5 hash:
decb17fe39b65c67448bf9b3896a5d22
Filesize:
12.14 KB
suspicious functions used:
base64_decode (line:10);curl_exec (line:183); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
airmax/m/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:22 12/05/2025
Last modified:
02:50:39 07/04/2024
MD5 hash:
7d8e71ceda3ffb74623e0c4a814715af
Filesize:
1.53 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery2.php-
Full path:
airmax/m/PaymentOnlineQuery2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:22 12/05/2025
Last modified:
02:50:39 07/04/2024
MD5 hash:
37be1b3f51cac8d936abe043bc79ed4b
Filesize:
19.08 KB
suspicious functions used:
curl_exec (line:41);curl_exec (line:254); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreatepayment.php-
Full path:
airmax/m/tcreatepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:22 12/05/2025
Last modified:
02:50:39 07/04/2024
MD5 hash:
e49de9a33f5164bc2c6b88e4770faaff
Filesize:
1.07 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec.php-
Full path:
airmax/m/login_exec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
14:44:36 11/05/2025
Last modified:
02:50:38 07/04/2024
MD5 hash:
1f800365ef270564df77d30c1bfd7ed3
Filesize:
5.4 KB
suspicious functions used:
curl_exec (line:66); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec1.php-
Full path:
airmax/m/login_exec1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:22 12/05/2025
Last modified:
02:50:38 07/04/2024
MD5 hash:
46b08782f51ba75b23e27183e06370fe
Filesize:
4.28 KB
suspicious functions used:
curl_exec (line:61); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-merchant-callback.php-
Full path:
airmax/m/nagad-merchant-callback.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:22 12/05/2025
Last modified:
02:50:39 07/04/2024
MD5 hash:
1ca42269a7e5563f13a266d9c0ce5049
Filesize:
11.75 KB
suspicious functions used:
curl_exec (line:20); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ttoken.php-
Full path:
airmax/m/ttoken.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:22 12/05/2025
Last modified:
02:50:39 07/04/2024
MD5 hash:
5f2c51c1db5b0defadfb67ce25c0098f
Filesize:
1.54 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-helper.php-
Full path:
airmax/m/nagad-helper.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:22 12/05/2025
Last modified:
02:50:39 07/04/2024
MD5 hash:
2bb70c44d68202e0a0cd8ae1388f0b1b
Filesize:
6.74 KB
suspicious functions used:
curl_exec (line:61);base64_decode (line:97); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: texecutepayment.php-
Full path:
airmax/m/texecutepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:22 12/05/2025
Last modified:
02:50:39 07/04/2024
MD5 hash:
efbb63dfcfdacb52dec74bffc389bbb3
Filesize:
2.67 KB
suspicious functions used:
curl_exec (line:24); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: class.phpmailer.php-
Full path:
airmax/web/email/class.phpmailer.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:22 12/05/2025
Last modified:
02:50:53 07/04/2024
MD5 hash:
68468d69b47fffecc89df57e27c5a781
Filesize:
143.32 KB
suspicious functions used:
`$DKIM_private` (line:428);popen (line:1387);popen (line:1408);base64_decode (line:3410);`$mail->set('SMTPSecure', 'tls');` (line:3688);`$mail->SMTPSecure = 'tls';` (line:3690); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: class.smtp.php-
Full path:
airmax/web/email/class.smtp.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:23 12/05/2025
Last modified:
02:50:53 07/04/2024
MD5 hash:
aa8478329268e5438a4469c268337a10
Filesize:
41.44 KB
suspicious functions used:
base64_decode (line:513);base64_decode (line:533); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: JSON.php-
Full path:
airmax/web/inc/JSON.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:24 12/05/2025
Last modified:
02:50:55 07/04/2024
MD5 hash:
f5a34509e06231308becbe320ade9ff6
Filesize:
33.22 KB
suspicious functions used:
eval (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: jqgrid.php-
Full path:
airmax/web/inc/jqgrid.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:24 12/05/2025
Last modified:
02:50:55 07/04/2024
MD5 hash:
71027a29e71e0626d8b57cbb631e6d98
Filesize:
23.92 KB
suspicious functions used:
eval (line:397); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: smsapicore.php-
Full path:
airmax/web/include/smsapicore.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
05:46:55 12/05/2025
Last modified:
02:50:56 07/04/2024
MD5 hash:
f430c15cd3145be5a4641142f5fe2d65
Filesize:
918 B
suspicious functions used:
curl_exec (line:13); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: telegramapicore.php-
Full path:
airmax/web/include/telegramapicore.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:24 12/05/2025
Last modified:
02:50:56 07/04/2024
MD5 hash:
535fa7aac83b0e1ba56be7837348b6d9
Filesize:
2.9 KB
suspicious functions used:
curl_exec (line:63); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Changes.txt-
Full path:
airmax/web/js/jqgrid/js/Changes.txt
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:24 12/05/2025
Last modified:
02:51:04 07/04/2024
MD5 hash:
c0a4adbc3f1c6d592cb4fa8433fee9ea
Filesize:
44.32 KB
suspicious functions used:
system (line:87); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ui.php-
Full path:
airmax/web/js/tinymce/themes/advanced/skins/highcontrast/ui.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:24 12/05/2025
Last modified:
02:51:10 07/04/2024
MD5 hash:
3edaf67be8573b86686f46bbba4f058c
Filesize:
4.53 KB
suspicious functions used:
curl_exec (line:20);`bill_amount` = '0.00' WHERE bill_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY ` (line:53);`bill_amount` = '0.00', days = '0.00' WHERE entry_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY ` (line:54);`payment` WHERE `pay_date` < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND pay_amount != '0.00' ORDER BY ` (line:55);curl_exec (line:146);curl_exec (line:168); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: AutoActiveClientsCount1.php-
Full path:
airmax/web/AutoActiveClientsCount1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
08:03:51 12/05/2025
Last modified:
02:50:45 07/04/2024
MD5 hash:
fb443f2f93781a8fffce803317592c41
Filesize:
6.12 KB
suspicious functions used:
system (line:56); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: AutoActiveClientsCount11.php-
Full path:
airmax/web/AutoActiveClientsCount11.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:25 12/05/2025
Last modified:
02:50:45 07/04/2024
MD5 hash:
a0090e4a11dd59b955a6edd549b6ef2f
Filesize:
5.85 KB
suspicious functions used:
system (line:54); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: InstrumentsStoreOutDetails.php-
Full path:
airmax/web/InstrumentsStoreOutDetails.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:27 12/05/2025
Last modified:
02:50:47 07/04/2024
MD5 hash:
ab68ab13bcfd51da15e72a3d4e9817e8
Filesize:
9.37 KB
suspicious functions used:
`update_date`, '%D-%b, %y') AS offdate, TIME_FORMAT(`update_time`, '%T') AS offtime FROM `con_sts_log` WHERE `c_id` = '{$row['c_id']}' AND con_sts = 'Inactive' ORDER BY ` (line:120); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Network.php-
Full path:
airmax/web/Network.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:28 12/05/2025
Last modified:
02:50:49 07/04/2024
MD5 hash:
eef190061625bfa2d7ba43697eaeca82
Filesize:
26.67 KB
suspicious functions used:
system (line:216); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Network1.php-
Full path:
airmax/web/Network1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:28 12/05/2025
Last modified:
02:50:49 07/04/2024
MD5 hash:
81fbd1a4bf9ecbb944ccd98ae719849b
Filesize:
22.92 KB
suspicious functions used:
system (line:209); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkLoad.php-
Full path:
airmax/web/NetworkLoad.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:28 12/05/2025
Last modified:
02:50:49 07/04/2024
MD5 hash:
e1632e66ee1b7394d3fb82751b924abe
Filesize:
2.83 KB
suspicious functions used:
system (line:81); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMS.php-
Full path:
airmax/web/SMS.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:28 12/05/2025
Last modified:
02:50:50 07/04/2024
MD5 hash:
3fa15a1ba3c18afe9e6176dc8f526985
Filesize:
35.86 KB
suspicious functions used:
curl_exec (line:56); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMSAddSave.php-
Full path:
airmax/web/SMSAddSave.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:28 12/05/2025
Last modified:
02:50:50 07/04/2024
MD5 hash:
1a6eaf13aa0ca959fe2dca885b7ffd8e
Filesize:
1.73 KB
suspicious functions used:
curl_exec (line:34); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkLoad1.php-
Full path:
airmax/web/NetworkLoad1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:28 12/05/2025
Last modified:
02:50:49 07/04/2024
MD5 hash:
176bd6931be34d7ef351d22897accc65
Filesize:
759 B
suspicious functions used:
system (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMS1.php-
Full path:
airmax/web/SMS1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:29 12/05/2025
Last modified:
02:50:50 07/04/2024
MD5 hash:
40d55bbcfe09846560034ad6b6748670
Filesize:
32.19 KB
suspicious functions used:
curl_exec (line:59); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery.php-
Full path:
airmax/web/PaymentOnlineQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:29 12/05/2025
Last modified:
02:50:49 07/04/2024
MD5 hash:
e71855333c2ea0c43f2a87109898c283
Filesize:
28.5 KB
suspicious functions used:
curl_exec (line:456);curl_exec (line:688); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery2.php-
Full path:
airmax/web/PaymentOnlineQuery2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:29 12/05/2025
Last modified:
02:50:49 07/04/2024
MD5 hash:
700d8182abbbc0b80fe31beb1e717699
Filesize:
19.39 KB
suspicious functions used:
curl_exec (line:42);curl_exec (line:252); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentWebhook.php-
Full path:
airmax/web/PaymentWebhook.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:29 12/05/2025
Last modified:
02:50:49 07/04/2024
MD5 hash:
a2f322c94787630ab1e0c8ca35fc5ba1
Filesize:
18.6 KB
suspicious functions used:
base64_decode (line:30);curl_exec (line:41);curl_exec (line:422); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SignUp1.php-
Full path:
airmax/web/SignUp1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:31 12/05/2025
Last modified:
02:50:50 07/04/2024
MD5 hash:
3f7943dd155c8e0a383b7d02730f8c11
Filesize:
24.59 KB
suspicious functions used:
curl_exec (line:33);curl_exec (line:59); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: sms-balance-check.php-
Full path:
airmax/web/sms-balance-check.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
07:07:45 12/05/2025
Last modified:
02:50:50 07/04/2024
MD5 hash:
74ac3e963a0dc5bb7d4c980e594aa39b
Filesize:
854 B
suspicious functions used:
curl_exec (line:15); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive_termination.php-
Full path:
airmax/web/cron_auto_inactive_termination.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:05:11 11/05/2025
Last modified:
12:17:50 23/09/2024
MD5 hash:
9f9c8ca9110c2304128646824bfb17db
Filesize:
12.16 KB
suspicious functions used:
curl_exec (line:241);curl_exec (line:253); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: sms_deliverey_report.php-
Full path:
airmax/web/sms_deliverey_report.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
03:06:27 12/05/2025
Last modified:
02:50:51 07/04/2024
MD5 hash:
03623943da7e9334e137b38c8577fc84
Filesize:
4.25 KB
suspicious functions used:
curl_exec (line:28);curl_exec (line:53);curl_exec (line:90); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive_termination1.php-
Full path:
airmax/web/cron_auto_inactive_termination1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:31 12/05/2025
Last modified:
02:50:47 07/04/2024
MD5 hash:
be76b964c93a2cb4fa7e632750ff3bc4
Filesize:
6.64 KB
suspicious functions used:
curl_exec (line:156);curl_exec (line:168); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_termination_remainder1.php-
Full path:
airmax/web/cron_auto_termination_remainder1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
03:06:27 12/05/2025
Last modified:
02:50:47 07/04/2024
MD5 hash:
7765f9f820dbd402f1064fab9958ffaa
Filesize:
3.26 KB
suspicious functions used:
curl_exec (line:83); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_client_bandwidth_count.php-
Full path:
airmax/web/cron_client_bandwidth_count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
10:38:30 12/05/2025
Last modified:
02:50:47 07/04/2024
MD5 hash:
de3b1389261cf5411b7e7ca5c44f96b2
Filesize:
4.08 KB
suspicious functions used:
curl_exec (line:117); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_network.php-
Full path:
airmax/web/cron_network.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
00:02:21 12/05/2025
Last modified:
02:50:47 07/04/2024
MD5 hash:
1a75ea6c2e0cc5b9263541dda62ab458
Filesize:
4.61 KB
suspicious functions used:
curl_exec (line:45);curl_exec (line:67); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: client-online-mbb.php-
Full path:
airmax/web/client-online-mbb.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:31 12/05/2025
Last modified:
02:50:46 07/04/2024
MD5 hash:
69c51efb5b9017a07a7158b4a63f3826
Filesize:
14.32 KB
suspicious functions used:
curl_exec (line:90); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive.php-
Full path:
airmax/web/cron_auto_inactive.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
06:00:14 12/05/2025
Last modified:
02:50:47 07/04/2024
MD5 hash:
7e0dc4dd9dae2bf0220516641b53c027
Filesize:
5.43 KB
suspicious functions used:
curl_exec (line:142); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive2.php-
Full path:
airmax/web/cron_auto_inactive2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:31 12/05/2025
Last modified:
02:50:47 07/04/2024
MD5 hash:
440bc24f05b01eb395df63fff2f60de9
Filesize:
5.46 KB
suspicious functions used:
curl_exec (line:142); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: company_info.php-
Full path:
airmax/web/company_info.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
10:02:23 12/05/2025
Last modified:
13:01:05 09/04/2024
MD5 hash:
b4101deea24a74c779fd0c3d495014b2
Filesize:
8 KB
suspicious functions used:
curl_exec (line:126); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
airmax/web/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:31 12/05/2025
Last modified:
02:50:47 07/04/2024
MD5 hash:
ba9747d0421fd091b998389469e72a0b
Filesize:
1.7 KB
suspicious functions used:
curl_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_all.php-
Full path:
airmax/web/cron_all.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:31 12/05/2025
Last modified:
02:50:47 07/04/2024
MD5 hash:
b19a08fef36584598cca299b7ecc5e6d
Filesize:
2.07 KB
suspicious functions used:
curl_exec (line:23);curl_exec (line:38);curl_exec (line:53); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_gen_bill.php-
Full path:
airmax/web/cron_auto_gen_bill.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:31 12/05/2025
Last modified:
02:50:47 07/04/2024
MD5 hash:
f1056618cc4402968e50d1232d2c51c8
Filesize:
4.73 KB
suspicious functions used:
curl_exec (line:140);curl_exec (line:149); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec.php-
Full path:
airmax/web/login_exec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
08:03:49 12/05/2025
Last modified:
02:50:48 07/04/2024
MD5 hash:
9038a77a32a5db2c9affae1496473f3e
Filesize:
5.27 KB
suspicious functions used:
curl_exec (line:62); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec1.php-
Full path:
airmax/web/login_exec1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:31 12/05/2025
Last modified:
02:50:48 07/04/2024
MD5 hash:
58e0da1ccc2585f2f6f687360dc9e503
Filesize:
3.91 KB
suspicious functions used:
curl_exec (line:53); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: loginexec.php-
Full path:
airmax/web/loginexec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:31 12/05/2025
Last modified:
02:50:48 07/04/2024
MD5 hash:
edb8017e7d0f8e037facbcacc94a383d
Filesize:
5.91 KB
suspicious functions used:
curl_exec (line:67); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: emp_salary_advence_find.php-
Full path:
airmax/web/emp_salary_advence_find.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:31 12/05/2025
Last modified:
02:50:47 07/04/2024
MD5 hash:
74a7e2ffda0f7584611d7cbce6136c24
Filesize:
2.25 KB
suspicious functions used:
`expanse` WHERE `type` = '2' AND `status` = '2' AND ex_by = '$e_id' AND MONTH(`, `) = MONTH('$lastmonth') AND YEAR(`, `) = YEAR('$lastmonth') GROUP BY ` (line:8);`e_id` = '$e_id' AND ` (line:12); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
airmax/web/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:31 12/05/2025
Last modified:
02:50:47 07/04/2024
MD5 hash:
c46a50905333286f45dfeacf010851ab
Filesize:
716 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-helper.php-
Full path:
airmax/web/nagad-helper.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:31 12/05/2025
Last modified:
02:50:48 07/04/2024
MD5 hash:
2bb70c44d68202e0a0cd8ae1388f0b1b
Filesize:
6.74 KB
suspicious functions used:
curl_exec (line:61);base64_decode (line:97); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-merchant-callback.php-
Full path:
airmax/web/nagad-merchant-callback.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:32 12/05/2025
Last modified:
02:50:48 07/04/2024
MD5 hash:
9e7ba60bacff8c3a7792176f76b698ea
Filesize:
16.91 KB
suspicious functions used:
curl_exec (line:20); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: support-action.php-
Full path:
airmax/web/support-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:32 12/05/2025
Last modified:
02:50:51 07/04/2024
MD5 hash:
f88ecf97f2a5d073332e9e7cea59ccb4
Filesize:
10.09 KB
suspicious functions used:
curl_exec (line:95); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index.php-
Full path:
airmax/web/index.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:19:59 12/05/2025
Last modified:
02:50:47 07/04/2024
MD5 hash:
e3825a19a349b906bdf657d3e0e0752d
Filesize:
11 KB
suspicious functions used:
base64_decode (line:10);curl_exec (line:178); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ip-ping-checker.php-
Full path:
airmax/web/ip-ping-checker.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:32 12/05/2025
Last modified:
02:50:48 07/04/2024
MD5 hash:
0d28f3053b73b3fe2885cf519ee17c12
Filesize:
2.64 KB
suspicious functions used:
curl_exec (line:81); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tagreeexpayment.php-
Full path:
airmax/web/tagreeexpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:32 12/05/2025
Last modified:
02:50:51 07/04/2024
MD5 hash:
029b4fba649a75c7c81d2f8931be8d63
Filesize:
2.86 KB
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreateagree.php-
Full path:
airmax/web/tcreateagree.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:32 12/05/2025
Last modified:
02:50:51 07/04/2024
MD5 hash:
27a10adf4190edc7eceee8cf74a6b72b
Filesize:
999 B
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreatepayment.php-
Full path:
airmax/web/tcreatepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:32 12/05/2025
Last modified:
02:50:51 07/04/2024
MD5 hash:
e49de9a33f5164bc2c6b88e4770faaff
Filesize:
1.07 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test2.php-
Full path:
airmax/web/test2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:32 12/05/2025
Last modified:
02:50:51 07/04/2024
MD5 hash:
b9ef5733c4f9b84398b99fb11c41719e
Filesize:
6.17 KB
suspicious functions used:
`` (line:96); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test3.php-
Full path:
airmax/web/test3.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:32 12/05/2025
Last modified:
02:50:51 07/04/2024
MD5 hash:
dc4ac1bf476364535cb25439b264003b
Filesize:
1.71 KB
suspicious functions used:
system (line:20);system (line:21);system (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test6.php-
Full path:
airmax/web/test6.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:32 12/05/2025
Last modified:
02:50:51 07/04/2024
MD5 hash:
b81f996d42a831491ce9a6f64735e159
Filesize:
906 B
suspicious functions used:
curl_exec (line:8); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: testttttt.php-
Full path:
airmax/web/testttttt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:32 12/05/2025
Last modified:
02:50:51 07/04/2024
MD5 hash:
b1988a4be29e191ad935fb409a4174ee
Filesize:
2 KB
suspicious functions used:
curl_exec (line:47); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: texecutepayment.php-
Full path:
airmax/web/texecutepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:32 12/05/2025
Last modified:
02:50:51 07/04/2024
MD5 hash:
623635fdf5c871391d3a5fe99ee8c543
Filesize:
2.91 KB
suspicious functions used:
curl_exec (line:24); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: time1.php-
Full path:
airmax/web/time1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:32 12/05/2025
Last modified:
02:50:51 07/04/2024
MD5 hash:
d01faecde155f90d6483809f888a7562
Filesize:
551 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tis-news.php-
Full path:
airmax/web/tis-news.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
08:03:51 12/05/2025
Last modified:
07:55:15 09/04/2024
MD5 hash:
ed23ca98b77c5321b4485e85eb2ea64d
Filesize:
3.67 KB
suspicious functions used:
curl_exec (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
airmax/web/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:32 12/05/2025
Last modified:
02:50:51 07/04/2024
MD5 hash:
7d8e71ceda3ffb74623e0c4a814715af
Filesize:
1.53 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tt.php-
Full path:
airmax/web/tt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:32 12/05/2025
Last modified:
02:50:51 07/04/2024
MD5 hash:
9c4ed141cb79fdc7e807b35923c91a20
Filesize:
1.56 KB
suspicious functions used:
curl_exec (line:30); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ttoken.php-
Full path:
airmax/web/ttoken.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:32 12/05/2025
Last modified:
02:50:51 07/04/2024
MD5 hash:
5f2c51c1db5b0defadfb67ce25c0098f
Filesize:
1.54 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook.php-
Full path:
airmax/web/webhook.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
08:14:20 12/05/2025
Last modified:
02:16:53 01/11/2024
MD5 hash:
26e2059a39281031d28874b51b52d60c
Filesize:
21.23 KB
suspicious functions used:
base64_decode (line:27);curl_exec (line:38);curl_exec (line:454); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook111.php-
Full path:
airmax/web/webhook111.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:32 12/05/2025
Last modified:
02:50:52 07/04/2024
MD5 hash:
22bcd30caceb03ee300f42e7587119fa
Filesize:
20.98 KB
suspicious functions used:
base64_decode (line:28);curl_exec (line:39);curl_exec (line:427); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook_cid.php-
Full path:
airmax/web/webhook_cid.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:32 12/05/2025
Last modified:
02:50:52 07/04/2024
MD5 hash:
007f8fa5636da9e44a38526298f7e155
Filesize:
21.08 KB
suspicious functions used:
base64_decode (line:28);curl_exec (line:39);curl_exec (line:429); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook_comid.php-
Full path:
airmax/web/webhook_comid.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:32 12/05/2025
Last modified:
02:50:52 07/04/2024
MD5 hash:
787511edcbdc9d6c9b26eba2dee70a84
Filesize:
21.21 KB
suspicious functions used:
base64_decode (line:27);curl_exec (line:38);curl_exec (line:454); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: AppSettings.php-
Full path:
ajwah/web/AppSettings.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:33 12/05/2025
Last modified:
09:52:04 06/03/2025
MD5 hash:
7ed349c4b0217e5395c4cc9295f66f4a
Filesize:
123.71 KB
suspicious functions used:
`input[name="${inputName}"]:checked` (line:2066); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: AutoActiveClientsCount1.php-
Full path:
ajwah/web/AutoActiveClientsCount1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:33 12/05/2025
Last modified:
09:52:04 06/03/2025
MD5 hash:
3b3b6186ff2d9c5abd1772e5aa02ee33
Filesize:
6.4 KB
suspicious functions used:
system (line:58); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: AutoActiveClientsCount11.php-
Full path:
ajwah/web/AutoActiveClientsCount11.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:33 12/05/2025
Last modified:
09:52:04 06/03/2025
MD5 hash:
a0090e4a11dd59b955a6edd549b6ef2f
Filesize:
5.85 KB
suspicious functions used:
system (line:54); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: client-online-mbb.php-
Full path:
ajwah/web/client-online-mbb.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:34 12/05/2025
Last modified:
09:52:11 06/03/2025
MD5 hash:
e16c33ab6ddd7649ea56a7d5355365b6
Filesize:
16.46 KB
suspicious functions used:
curl_exec (line:90);curl_exec (line:289); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: clients-nots-action.php-
Full path:
ajwah/web/clients-nots-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
13:53:56 11/05/2025
Last modified:
09:52:15 06/03/2025
MD5 hash:
dff1bb495509427d098cb4588da553b9
Filesize:
5.89 KB
suspicious functions used:
curl_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients.php-
Full path:
ajwah/web/Clients.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
15:09:11 11/05/2025
Last modified:
10:26:47 06/03/2025
MD5 hash:
95c2c28384fd7b6a33afc844c109e785
Filesize:
209.92 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:878); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients1.php-
Full path:
ajwah/web/Clients1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:35 12/05/2025
Last modified:
09:52:18 06/03/2025
MD5 hash:
228d02141d96f75107f8cad1047b18de
Filesize:
208.78 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:844); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients2.php-
Full path:
ajwah/web/Clients2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:35 12/05/2025
Last modified:
09:52:19 06/03/2025
MD5 hash:
982d6411552113b0715fd17c26f50292
Filesize:
205.13 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:832); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients3.php-
Full path:
ajwah/web/Clients3.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:35 12/05/2025
Last modified:
09:52:20 06/03/2025
MD5 hash:
50ddc869b383ab76e009c7a2c17c99a3
Filesize:
175.31 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:832); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ClientsOnMap.php-
Full path:
ajwah/web/ClientsOnMap.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:36 12/05/2025
Last modified:
09:52:24 06/03/2025
MD5 hash:
c4f24f0dc36c09d6bbdfbfa9dab5f515
Filesize:
11.5 KB
suspicious functions used:
`${totalonline}` (line:98);`${totaloffline}` (line:99);`${results.rxPower}` (line:232);`${results.distance}` (line:233);`${results.supplyVoltage}` (line:234);`${results.temperature}` (line:235);`${results.txPower}` (line:236); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ClientView.php-
Full path:
ajwah/web/ClientView.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
05:56:14 12/05/2025
Last modified:
09:52:25 06/03/2025
MD5 hash:
ecd7171b944880ac4539623626dbf9d2
Filesize:
111.69 KB
suspicious functions used:
`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:227); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ClientView1.php-
Full path:
ajwah/web/ClientView1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:37 12/05/2025
Last modified:
09:52:25 06/03/2025
MD5 hash:
ecd7171b944880ac4539623626dbf9d2
Filesize:
111.69 KB
suspicious functions used:
`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:227); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: company_info.php-
Full path:
ajwah/web/company_info.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:09:49 12/05/2025
Last modified:
09:52:26 06/03/2025
MD5 hash:
2983755d925ee3aa49accefa47451c7d
Filesize:
8.62 KB
suspicious functions used:
curl_exec (line:134); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
ajwah/web/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:37 12/05/2025
Last modified:
09:52:26 06/03/2025
MD5 hash:
ba9747d0421fd091b998389469e72a0b
Filesize:
1.7 KB
suspicious functions used:
curl_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_all.php-
Full path:
ajwah/web/cron_all.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:37 12/05/2025
Last modified:
09:52:26 06/03/2025
MD5 hash:
967f1d654ae891609da26b9e0fdbd1ae
Filesize:
2.44 KB
suspicious functions used:
curl_exec (line:23);curl_exec (line:38);curl_exec (line:53); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_gen_bill.php-
Full path:
ajwah/web/cron_auto_gen_bill.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:37 12/05/2025
Last modified:
09:52:26 06/03/2025
MD5 hash:
f1056618cc4402968e50d1232d2c51c8
Filesize:
4.73 KB
suspicious functions used:
curl_exec (line:140);curl_exec (line:149); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive.php-
Full path:
ajwah/web/cron_auto_inactive.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:37 12/05/2025
Last modified:
09:52:26 06/03/2025
MD5 hash:
7e0dc4dd9dae2bf0220516641b53c027
Filesize:
5.43 KB
suspicious functions used:
curl_exec (line:142); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive2.php-
Full path:
ajwah/web/cron_auto_inactive2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:37 12/05/2025
Last modified:
09:52:26 06/03/2025
MD5 hash:
440bc24f05b01eb395df63fff2f60de9
Filesize:
5.46 KB
suspicious functions used:
curl_exec (line:142); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive_termination.php-
Full path:
ajwah/web/cron_auto_inactive_termination.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:05:13 11/05/2025
Last modified:
09:52:26 06/03/2025
MD5 hash:
49f9f022b288eb3a85139ac8c1afb13c
Filesize:
12.23 KB
suspicious functions used:
curl_exec (line:219);curl_exec (line:231);curl_exec (line:273); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_termination_remainder1.php-
Full path:
ajwah/web/cron_auto_termination_remainder1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
03:06:36 12/05/2025
Last modified:
09:52:26 06/03/2025
MD5 hash:
7765f9f820dbd402f1064fab9958ffaa
Filesize:
3.26 KB
suspicious functions used:
curl_exec (line:83); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_client_bandwidth_count.php-
Full path:
ajwah/web/cron_client_bandwidth_count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
13:53:47 11/05/2025
Last modified:
09:52:26 06/03/2025
MD5 hash:
1c71a3dd097275429ae845a85ced0438
Filesize:
5.33 KB
suspicious functions used:
curl_exec (line:124);curl_exec (line:134); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_network.php-
Full path:
ajwah/web/cron_network.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
20:23:32 11/05/2025
Last modified:
09:52:26 06/03/2025
MD5 hash:
db096f353e80027593ca3f9781a21ac8
Filesize:
4.93 KB
suspicious functions used:
curl_exec (line:45);curl_exec (line:67);curl_exec (line:127); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_olt.php-
Full path:
ajwah/web/cron_olt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
17:31:19 11/05/2025
Last modified:
09:52:26 06/03/2025
MD5 hash:
5edf51db84e11e807af66733348efbf5
Filesize:
4.19 KB
suspicious functions used:
shell_exec (line:48);curl_exec (line:126); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_olt_clients_catch.php-
Full path:
ajwah/web/cron_olt_clients_catch.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:37 12/05/2025
Last modified:
09:52:26 06/03/2025
MD5 hash:
3b13c163ba3445b3d661c63adde1d985
Filesize:
1.12 KB
suspicious functions used:
curl_exec (line:23); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_olt_user.php-
Full path:
ajwah/web/cron_olt_user.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:37 12/05/2025
Last modified:
09:52:26 06/03/2025
MD5 hash:
67aa237639e3d1e6064e76079bb3cccc
Filesize:
1.97 KB
suspicious functions used:
curl_exec (line:19);curl_exec (line:46); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: EmployeeAdd.php-
Full path:
ajwah/web/EmployeeAdd.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:37 12/05/2025
Last modified:
09:52:27 06/03/2025
MD5 hash:
c12c85fa282eb15060ed68bad252f8e8
Filesize:
19.13 KB
suspicious functions used:
`Element with ID ${id} not found.` (line:36);`Non-numeric input detected in ${id}.` (line:38);`Element with ID ${id} not found.` (line:44);`Non-numeric input detected in ${id}.` (line:46); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: EmployeeEdit.php-
Full path:
ajwah/web/EmployeeEdit.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:37 12/05/2025
Last modified:
09:52:27 06/03/2025
MD5 hash:
55b4626339d566473f477e1a001dc8b4
Filesize:
17.73 KB
suspicious functions used:
`Element with ID ${id} not found.` (line:44);`Non-numeric input detected in ${id}.` (line:46);`Element with ID ${id} not found.` (line:52);`Non-numeric input detected in ${id}.` (line:54); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: emp_salary_advence_find.php-
Full path:
ajwah/web/emp_salary_advence_find.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:37 12/05/2025
Last modified:
09:52:27 06/03/2025
MD5 hash:
74a7e2ffda0f7584611d7cbce6136c24
Filesize:
2.25 KB
suspicious functions used:
`expanse` WHERE `type` = '2' AND `status` = '2' AND ex_by = '$e_id' AND MONTH(`, `) = MONTH('$lastmonth') AND YEAR(`, `) = YEAR('$lastmonth') GROUP BY ` (line:8);`e_id` = '$e_id' AND ` (line:12); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
ajwah/web/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:37 12/05/2025
Last modified:
09:52:27 06/03/2025
MD5 hash:
c46a50905333286f45dfeacf010851ab
Filesize:
716 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: getclientuptime.php-
Full path:
ajwah/web/getclientuptime.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:37 12/05/2025
Last modified:
09:52:30 06/03/2025
MD5 hash:
bbc14cdd451c72b94d78c7d2d1af0b52
Filesize:
718 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: imagevwr.php-
Full path:
ajwah/web/imagevwr.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
11:00:39 12/05/2025
Last modified:
09:52:30 06/03/2025
MD5 hash:
47a223a13cc642d01dcfaaca542d396d
Filesize:
915 B
suspicious functions used:
curl_exec (line:15); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index.php-
Full path:
ajwah/web/index.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
15:03:30 11/05/2025
Last modified:
09:52:30 06/03/2025
MD5 hash:
3d1fa8a053cd084d6bcbc24765a91739
Filesize:
16.67 KB
suspicious functions used:
curl_exec (line:298); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: InstrumentsStoreOutDetails.php-
Full path:
ajwah/web/InstrumentsStoreOutDetails.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:37 12/05/2025
Last modified:
09:52:30 06/03/2025
MD5 hash:
a60c19f766bfff1ccdccbeba6b39eb87
Filesize:
9.37 KB
suspicious functions used:
`update_date`, '%D-%b, %y') AS offdate, TIME_FORMAT(`update_time`, '%T') AS offtime FROM `con_sts_log` WHERE `c_id` = '{$row['c_id']}' AND con_sts = 'Inactive' ORDER BY ` (line:120); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ip-ping-checker.php-
Full path:
ajwah/web/ip-ping-checker.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:37 12/05/2025
Last modified:
09:52:31 06/03/2025
MD5 hash:
0d28f3053b73b3fe2885cf519ee17c12
Filesize:
2.64 KB
suspicious functions used:
curl_exec (line:81); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: LoginByPass.php-
Full path:
ajwah/web/LoginByPass.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:38 12/05/2025
Last modified:
09:52:32 06/03/2025
MD5 hash:
a8f1789daadb34b0814aaecddfebe7c1
Filesize:
4.26 KB
suspicious functions used:
curl_exec (line:41); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: loginexec.php-
Full path:
ajwah/web/loginexec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:38 12/05/2025
Last modified:
09:52:32 06/03/2025
MD5 hash:
edb8017e7d0f8e037facbcacc94a383d
Filesize:
5.91 KB
suspicious functions used:
curl_exec (line:67); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec.php-
Full path:
ajwah/web/login_exec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
04:35:28 12/05/2025
Last modified:
14:50:38 12/03/2025
MD5 hash:
52c9e33276b889bbe1bd665c754a5860
Filesize:
12.1 KB
suspicious functions used:
curl_exec (line:24);curl_exec (line:74);curl_exec (line:199);curl_exec (line:239); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: macreseller-news.php-
Full path:
ajwah/web/macreseller-news.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:38 12/05/2025
Last modified:
09:52:33 06/03/2025
MD5 hash:
ed23ca98b77c5321b4485e85eb2ea64d
Filesize:
3.67 KB
suspicious functions used:
curl_exec (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: MacResellerAdd.php-
Full path:
ajwah/web/MacResellerAdd.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:38 12/05/2025
Last modified:
09:52:35 06/03/2025
MD5 hash:
5ac506fcafb554fb6326382737dce0df
Filesize:
29.89 KB
suspicious functions used:
`input[name="${inputName}"]:checked` (line:792); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: MacResellerEdit.php-
Full path:
ajwah/web/MacResellerEdit.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:38 12/05/2025
Last modified:
09:52:36 06/03/2025
MD5 hash:
60b4a4eac6e169f1bce50574c472cd2a
Filesize:
37.16 KB
suspicious functions used:
`input[name="${inputName}"]:checked` (line:634); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-helper.php-
Full path:
ajwah/web/nagad-helper.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:39 12/05/2025
Last modified:
09:52:38 06/03/2025
MD5 hash:
114b90b978b842cd318391876ba454ab
Filesize:
2.84 KB
suspicious functions used:
curl_exec (line:46);base64_decode (line:77); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-merchant-callback.php-
Full path:
ajwah/web/nagad-merchant-callback.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:39 12/05/2025
Last modified:
09:52:38 06/03/2025
MD5 hash:
b0ec1f203cb16bb39dc0dc5c587982ce
Filesize:
16.47 KB
suspicious functions used:
curl_exec (line:20); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-olt-all-mac-array.php-
Full path:
ajwah/web/netowrk-olt-all-mac-array.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:39 12/05/2025
Last modified:
09:52:38 06/03/2025
MD5 hash:
b0168ce99145e2afe64357247d750dd6
Filesize:
4.62 KB
suspicious functions used:
shell_exec (line:33);shell_exec (line:47);shell_exec (line:61);shell_exec (line:76);shell_exec (line:93); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-snmp-data-auto.php-
Full path:
ajwah/web/netowrk-snmp-data-auto.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:39 12/05/2025
Last modified:
09:52:38 06/03/2025
MD5 hash:
81e2685cc9d5a33d54a0764a0488b848
Filesize:
7.24 KB
suspicious functions used:
shell_exec (line:67);shell_exec (line:117); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-snmp-data.php-
Full path:
ajwah/web/netowrk-snmp-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:39 12/05/2025
Last modified:
09:52:38 06/03/2025
MD5 hash:
4d7f14139fba095fdbc348dce9136690
Filesize:
24.67 KB
suspicious functions used:
shell_exec (line:103);shell_exec (line:112);shell_exec (line:122);shell_exec (line:141);shell_exec (line:153);shell_exec (line:164);shell_exec (line:180);shell_exec (line:190);shell_exec (line:206);shell_exec (line:226);shell_exec (line:235);shell_exec (line:243);shell_exec (line:250);shell_exec (line:255);`pon_name` FROM `olt_pon` WHERE `olt_pon_id` = '$pon_id' AND ` (line:262);shell_exec (line:279);shell_exec (line:289);`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:302);shell_exec (line:308);shell_exec (line:440); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-old-onu-rx-map.php-
Full path:
ajwah/web/network-old-onu-rx-map.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:39 12/05/2025
Last modified:
09:52:38 06/03/2025
MD5 hash:
b4962c160c5ad68ccd8eed9c48d82a0f
Filesize:
6.94 KB
suspicious functions used:
shell_exec (line:76); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-old-onu-rx.php-
Full path:
ajwah/web/network-old-onu-rx.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:39 12/05/2025
Last modified:
09:52:38 06/03/2025
MD5 hash:
59ed3318f07d2280f47e67f3c2f2c935
Filesize:
7.35 KB
suspicious functions used:
shell_exec (line:85); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-count-cdata.php-
Full path:
ajwah/web/network-olt-client-onu-mac-count-cdata.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:39 12/05/2025
Last modified:
09:52:38 06/03/2025
MD5 hash:
c378dbabf36066c335cfb8838a6e167d
Filesize:
4.58 KB
suspicious functions used:
shell_exec (line:25);shell_exec (line:35);shell_exec (line:56);shell_exec (line:103);shell_exec (line:115);shell_exec (line:126);shell_exec (line:140); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-count-rcl.php-
Full path:
ajwah/web/network-olt-client-onu-mac-count-rcl.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:39 12/05/2025
Last modified:
09:52:38 06/03/2025
MD5 hash:
155290201f4342ad1f835e1411ef3e31
Filesize:
4.55 KB
suspicious functions used:
shell_exec (line:25);shell_exec (line:35);shell_exec (line:56);shell_exec (line:103);shell_exec (line:115);shell_exec (line:126);shell_exec (line:140); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-count.php-
Full path:
ajwah/web/network-olt-client-onu-mac-count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:39 12/05/2025
Last modified:
09:52:39 06/03/2025
MD5 hash:
22f7c5b1545279d2a65caf57b3cb5c5a
Filesize:
15.3 KB
suspicious functions used:
shell_exec (line:26);shell_exec (line:36);shell_exec (line:68);shell_exec (line:84);shell_exec (line:101);shell_exec (line:119);shell_exec (line:135);shell_exec (line:176);shell_exec (line:236);shell_exec (line:312);shell_exec (line:379);shell_exec (line:469);shell_exec (line:488);shell_exec (line:507); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-countt.php-
Full path:
ajwah/web/network-olt-client-onu-mac-countt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:39 12/05/2025
Last modified:
09:52:39 06/03/2025
MD5 hash:
d29b4e72c375f528b769bd3894f9f0e7
Filesize:
8.95 KB
suspicious functions used:
shell_exec (line:26);shell_exec (line:36);shell_exec (line:59);shell_exec (line:75);shell_exec (line:92);shell_exec (line:102);shell_exec (line:117);shell_exec (line:155);shell_exec (line:206);shell_exec (line:262);shell_exec (line:275);shell_exec (line:288); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-con-sts.php-
Full path:
ajwah/web/network-olt-con-sts.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:39 12/05/2025
Last modified:
09:52:39 06/03/2025
MD5 hash:
a26b0a1c1567c34c9aa5e2e0254ff8a6
Filesize:
4 KB
suspicious functions used:
`olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:10);shell_exec (line:38);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, `last_synced`, `last_update`, `msg`, `full_msg`, ROUND((SELECT AVG(value) FROM olt_onu_history WHERE alarm_id = '$alarmId' AND value != ''), 2) AS average_value FROM `, ` WHERE `alarm_id` = '$alarmId' AND ` (line:82); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-load.php-
Full path:
ajwah/web/network-olt-load.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:39 12/05/2025
Last modified:
09:52:39 06/03/2025
MD5 hash:
f49d5153285c639ed91d4e806685ee56
Filesize:
1.33 KB
suspicious functions used:
shell_exec (line:22);shell_exec (line:25); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-oid-check.php-
Full path:
ajwah/web/network-olt-oid-check.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:39 12/05/2025
Last modified:
09:52:39 06/03/2025
MD5 hash:
5b7dc0ce1103fbfc895873c250b63141
Filesize:
1.88 KB
suspicious functions used:
shell_exec (line:33); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-alarm-add.php-
Full path:
ajwah/web/network-olt-onu-alarm-add.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:39 12/05/2025
Last modified:
09:52:39 06/03/2025
MD5 hash:
be6ba82c658419e1454f778e20e2d4c3
Filesize:
7.86 KB
suspicious functions used:
shell_exec (line:103); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-count.php-
Full path:
ajwah/web/network-olt-onu-count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:39 12/05/2025
Last modified:
09:52:39 06/03/2025
MD5 hash:
6dc4bf46ac59065c0e0e7e3510aaf4d2
Filesize:
7.05 KB
suspicious functions used:
`olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:12);shell_exec (line:81); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-list-data.php-
Full path:
ajwah/web/network-olt-onu-list-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:39 12/05/2025
Last modified:
09:52:39 06/03/2025
MD5 hash:
54cc9417c766c31317311c3722ce7d4b
Filesize:
9.48 KB
suspicious functions used:
shell_exec (line:24);shell_exec (line:38);shell_exec (line:64);shell_exec (line:85);shell_exec (line:104);shell_exec (line:125);shell_exec (line:143);shell_exec (line:153);shell_exec (line:165);shell_exec (line:185); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-power.php-
Full path:
ajwah/web/network-olt-onu-power.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:39 12/05/2025
Last modified:
09:52:39 06/03/2025
MD5 hash:
2e064543b67b532bdf4e5b12d49c5052
Filesize:
7.54 KB
suspicious functions used:
shell_exec (line:97); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-clients-search.php-
Full path:
ajwah/web/network-olt-pon-clients-search.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:39 12/05/2025
Last modified:
09:52:39 06/03/2025
MD5 hash:
79d26fc66abdab6f173330588aa8b238
Filesize:
10.93 KB
suspicious functions used:
shell_exec (line:42);shell_exec (line:51);shell_exec (line:104);shell_exec (line:168); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search-bdcom.php-
Full path:
ajwah/web/network-olt-pon-onu-search-bdcom.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:39 12/05/2025
Last modified:
09:52:39 06/03/2025
MD5 hash:
c786fa8b69268c738b6ff976631798cd
Filesize:
27.74 KB
suspicious functions used:
shell_exec (line:60);shell_exec (line:69);shell_exec (line:383); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search-bdcom1.php-
Full path:
ajwah/web/network-olt-pon-onu-search-bdcom1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:39 12/05/2025
Last modified:
09:52:39 06/03/2025
MD5 hash:
dd18677b1dcbf7f0bce2ac6912d98da0
Filesize:
9.6 KB
suspicious functions used:
shell_exec (line:42);shell_exec (line:51);shell_exec (line:129); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search-rcl.php-
Full path:
ajwah/web/network-olt-pon-onu-search-rcl.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:39 12/05/2025
Last modified:
09:52:39 06/03/2025
MD5 hash:
565ff38d572bba4bc20721ab17484554
Filesize:
27.33 KB
suspicious functions used:
shell_exec (line:46);shell_exec (line:55);shell_exec (line:369); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search.php-
Full path:
ajwah/web/network-olt-pon-onu-search.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:39 12/05/2025
Last modified:
09:52:40 06/03/2025
MD5 hash:
dc183ecf77d0e1f56f672338fd09cfa5
Filesize:
21.62 KB
suspicious functions used:
shell_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data-bdcom.php-
Full path:
ajwah/web/network-snmp-onu-status-data-bdcom.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:39 12/05/2025
Last modified:
02:00:25 07/03/2025
MD5 hash:
97bdd52a7c2adee8fba0a4f7165605d0
Filesize:
23.35 KB
suspicious functions used:
shell_exec (line:48);shell_exec (line:73);shell_exec (line:85);shell_exec (line:103);shell_exec (line:116);shell_exec (line:128);shell_exec (line:134);shell_exec (line:159);shell_exec (line:172);shell_exec (line:184);shell_exec (line:190);shell_exec (line:217);shell_exec (line:230);shell_exec (line:236); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data.php-
Full path:
ajwah/web/network-snmp-onu-status-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:39 12/05/2025
Last modified:
09:52:40 06/03/2025
MD5 hash:
0adfee384bf349b50f11036947fd2a74
Filesize:
30.37 KB
suspicious functions used:
shell_exec (line:38);`olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:42);shell_exec (line:81);shell_exec (line:95);shell_exec (line:109);shell_exec (line:122);shell_exec (line:208);shell_exec (line:429);shell_exec (line:441);shell_exec (line:448); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data1.php-
Full path:
ajwah/web/network-snmp-onu-status-data1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:39 12/05/2025
Last modified:
09:52:40 06/03/2025
MD5 hash:
920bd1a592c36f7a1194b737642f8340
Filesize:
15.96 KB
suspicious functions used:
shell_exec (line:33);`olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:37);shell_exec (line:149); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data_vsol2.php-
Full path:
ajwah/web/network-snmp-onu-status-data_vsol2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:39 12/05/2025
Last modified:
09:52:40 06/03/2025
MD5 hash:
f22d022ddc284f4d8e1de3660da91db8
Filesize:
15.61 KB
suspicious functions used:
shell_exec (line:34);shell_exec (line:113);shell_exec (line:126);shell_exec (line:132); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-tree-vartual-nodes.php-
Full path:
ajwah/web/network-tree-vartual-nodes.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:39 12/05/2025
Last modified:
09:52:41 06/03/2025
MD5 hash:
3530b8bc3113544014b1746ecd67e834
Filesize:
10.64 KB
suspicious functions used:
shell_exec (line:76);shell_exec (line:111);shell_exec (line:145);shell_exec (line:181);shell_exec (line:188); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Network.php-
Full path:
ajwah/web/Network.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:39 12/05/2025
Last modified:
01:21:17 07/03/2025
MD5 hash:
2691f8988dee1a9fc89f0738b9f0b62f
Filesize:
64.28 KB
suspicious functions used:
system (line:370);shell_exec (line:653); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Network1.php-
Full path:
ajwah/web/Network1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:39 12/05/2025
Last modified:
09:52:41 06/03/2025
MD5 hash:
c72cb4810d5c70edd9da26884beba751
Filesize:
66.22 KB
suspicious functions used:
system (line:375);shell_exec (line:661); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkLoad.php-
Full path:
ajwah/web/NetworkLoad.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:40 12/05/2025
Last modified:
09:52:43 06/03/2025
MD5 hash:
e1632e66ee1b7394d3fb82751b924abe
Filesize:
2.83 KB
suspicious functions used:
system (line:81); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkLoad1.php-
Full path:
ajwah/web/NetworkLoad1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:40 12/05/2025
Last modified:
09:52:43 06/03/2025
MD5 hash:
176bd6931be34d7ef351d22897accc65
Filesize:
759 B
suspicious functions used:
system (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltAddQuery.php-
Full path:
ajwah/web/NetworkOltAddQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:40 12/05/2025
Last modified:
14:08:45 06/03/2025
MD5 hash:
4640f4cf95427dc577fe110f81a749ff
Filesize:
7.85 KB
suspicious functions used:
shell_exec (line:21); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltOnuStatus.php-
Full path:
ajwah/web/NetworkOltOnuStatus.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:40 12/05/2025
Last modified:
09:52:44 06/03/2025
MD5 hash:
31f74ac18fe0f3b0bec3b0d00b2556d5
Filesize:
70.53 KB
suspicious functions used:
shell_exec (line:42);shell_exec (line:102);shell_exec (line:673);shell_exec (line:786);shell_exec (line:896);shell_exec (line:1006); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltOnuStatus2.php-
Full path:
ajwah/web/NetworkOltOnuStatus2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:40 12/05/2025
Last modified:
09:52:44 06/03/2025
MD5 hash:
c9a14797fa4353d05bbd9427b6079250
Filesize:
15.88 KB
suspicious functions used:
shell_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltSense.php-
Full path:
ajwah/web/NetworkOltSense.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:40 12/05/2025
Last modified:
09:52:44 06/03/2025
MD5 hash:
2be664ae5006367f629ca437a6d507f8
Filesize:
18.26 KB
suspicious functions used:
`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, `last_synced`, `last_update`, `msg`, `full_msg`, ROUND((SELECT AVG(value) FROM olt_onu_history WHERE alarm_id = '$alarmId' AND value != ''), 2) AS average_value FROM `, ` WHERE `alarm_id` = '$alarmId' AND ` (line:123); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltSenseDetails.php-
Full path:
ajwah/web/NetworkOltSenseDetails.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:40 12/05/2025
Last modified:
09:52:44 06/03/2025
MD5 hash:
440096c601fc10b819a1f0f8330928b0
Filesize:
14.17 KB
suspicious functions used:
`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:33);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:42);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:51);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:60); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltSync.php-
Full path:
ajwah/web/NetworkOltSync.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:40 12/05/2025
Last modified:
09:52:44 06/03/2025
MD5 hash:
06633d4b65a14d677358170dd0a84424
Filesize:
1.87 KB
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree-olt-onu-list-data.php-
Full path:
ajwah/web/networktree-olt-onu-list-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:40 12/05/2025
Last modified:
09:52:45 06/03/2025
MD5 hash:
af4221fefa9c9051846a063ac4135560
Filesize:
8.72 KB
suspicious functions used:
shell_exec (line:24);shell_exec (line:36);shell_exec (line:59);shell_exec (line:78);shell_exec (line:97);shell_exec (line:116);shell_exec (line:134);shell_exec (line:143);shell_exec (line:155);shell_exec (line:175); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeAddSave.php-
Full path:
ajwah/web/NetworkTreeAddSave.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:40 12/05/2025
Last modified:
09:52:46 06/03/2025
MD5 hash:
93fdf1213fdb5d525641e2b625f1a91b
Filesize:
7.61 KB
suspicious functions used:
`network_tree` WHERE `olt_id` = '$olt_id' AND ` (line:107); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeEdit1.php-
Full path:
ajwah/web/NetworkTreeEdit1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:40 12/05/2025
Last modified:
09:52:48 06/03/2025
MD5 hash:
3396a6bdf9b5804bb208f38f37cc29a2
Filesize:
35.81 KB
suspicious functions used:
`olt_onu` WHERE olt_id = '$olt_id' AND ` (line:207); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeEditSave.php-
Full path:
ajwah/web/NetworkTreeEditSave.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:40 12/05/2025
Last modified:
09:52:48 06/03/2025
MD5 hash:
be82a23409ab88be3f57da95f8805d6c
Filesize:
12.83 KB
suspicious functions used:
`network_tree` WHERE `olt_id` = '$olt_id' AND ` (line:182); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeList.php-
Full path:
ajwah/web/NetworkTreeList.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:40 12/05/2025
Last modified:
09:52:48 06/03/2025
MD5 hash:
acd468021993faf8575531952ae107f8
Filesize:
21.98 KB
suspicious functions used:
`pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '{$row['olt_id']}' AND ` (line:287); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeMap.php-
Full path:
ajwah/web/NetworkTreeMap.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:40 12/05/2025
Last modified:
09:52:48 06/03/2025
MD5 hash:
893f2e3360b70dfbf4b65b4289eb1c58
Filesize:
24.46 KB
suspicious functions used:
`${results.rxPower}` (line:268);`${results.distance}` (line:269);`${results.supplyVoltage}` (line:270);`${results.temperature}` (line:271);`${results.txPower}` (line:272);`${results.rxPower}` (line:288);`${results.distance}` (line:289);`${results.supplyVoltage}` (line:290);`${results.temperature}` (line:291);`${results.txPower}` (line:292); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeMap1.php-
Full path:
ajwah/web/NetworkTreeMap1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:40 12/05/2025
Last modified:
09:52:48 06/03/2025
MD5 hash:
31a3ae9bc0bdb18726ed860ec6e8ec97
Filesize:
36.43 KB
suspicious functions used:
`networktree_marker_data.php?tree_id=${markerId}` (line:231);`${results.rxPower}` (line:311);`${results.distance}` (line:312);`${results.supplyVoltage}` (line:313);`${results.temperature}` (line:314);`${results.txPower}` (line:315); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_onu_list_add.php-
Full path:
ajwah/web/networktree_device_onu_list_add.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:40 12/05/2025
Last modified:
09:52:49 06/03/2025
MD5 hash:
ae5e1bd4b4619e068908177102626079
Filesize:
14.63 KB
suspicious functions used:
`network_tree` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND device_type = '5' AND ` (line:9);shell_exec (line:33);`network_tree` WHERE `onu_mac` = '$mac_address' AND ` (line:131);shell_exec (line:178);shell_exec (line:186);shell_exec (line:230);`network_tree` WHERE `onu_mac` = '$onuMac' AND ` (line:296); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_pon_check.php-
Full path:
ajwah/web/networktree_device_pon_check.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:40 12/05/2025
Last modified:
09:52:49 06/03/2025
MD5 hash:
708a93aadcae96ecf0aaca52041fcf38
Filesize:
1.53 KB
suspicious functions used:
`pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '$olt_id' AND ` (line:8); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_pon_list_add.php-
Full path:
ajwah/web/networktree_device_pon_list_add.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:40 12/05/2025
Last modified:
09:52:49 06/03/2025
MD5 hash:
2ec03912801e4749c2e9cd361417ca5f
Filesize:
1.36 KB
suspicious functions used:
`olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:6);`olt_pon` WHERE `olt_id` = '$olt_id' AND ` (line:10);`network_tree` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND ` (line:17); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_pon_port_onu_list.php-
Full path:
ajwah/web/networktree_device_pon_port_onu_list.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:40 12/05/2025
Last modified:
09:52:49 06/03/2025
MD5 hash:
9c63b3ac69996628f5eb2959a9eb4e15
Filesize:
8.65 KB
suspicious functions used:
`olt_pon` WHERE olt_id = '$olt_id' AND ` (line:25);shell_exec (line:32);shell_exec (line:45);`network_tree` WHERE onu_index_id = '$port_onu_index_id' AND ` (line:49);shell_exec (line:81);shell_exec (line:103);shell_exec (line:122);shell_exec (line:143);shell_exec (line:161);shell_exec (line:170);shell_exec (line:184); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_pon_port_sense_list.php-
Full path:
ajwah/web/networktree_device_pon_port_sense_list.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:40 12/05/2025
Last modified:
09:52:49 06/03/2025
MD5 hash:
ee69cd5cc122f8aa37d8d8e5c74def6b
Filesize:
3.65 KB
suspicious functions used:
`network_tree` WHERE `onu_mac` = '$onu_mac' AND ` (line:26);`network_tree` WHERE `c_id` = '{$dfhbdxf}' AND ` (line:71); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_type.php-
Full path:
ajwah/web/networktree_device_type.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:40 12/05/2025
Last modified:
09:52:49 06/03/2025
MD5 hash:
f1520732e5a3ef38564238a3278a1f63
Filesize:
11.43 KB
suspicious functions used:
`tree_id`) AS countolt FROM `network_tree` WHERE `olt_id` = '$olt_id_sure' AND ` (line:64); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: olt_all_onu_mac.php-
Full path:
ajwah/web/olt_all_onu_mac.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:41 12/05/2025
Last modified:
09:52:49 06/03/2025
MD5 hash:
bde00602b98fba3ce9f7669b0d6f0fa3
Filesize:
4.56 KB
suspicious functions used:
shell_exec (line:22);shell_exec (line:38);shell_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery.php-
Full path:
ajwah/web/PaymentOnlineQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:41 12/05/2025
Last modified:
09:52:56 06/03/2025
MD5 hash:
6a845f0e20c434c12eb30f42726f268d
Filesize:
28.37 KB
suspicious functions used:
curl_exec (line:457);curl_exec (line:669); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery2.php-
Full path:
ajwah/web/PaymentOnlineQuery2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:41 12/05/2025
Last modified:
09:52:56 06/03/2025
MD5 hash:
ccd315d11a60901b7b9029ff44f8351b
Filesize:
19.4 KB
suspicious functions used:
curl_exec (line:42);curl_exec (line:252); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentWebhook.php-
Full path:
ajwah/web/PaymentWebhook.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:42 12/05/2025
Last modified:
09:52:56 06/03/2025
MD5 hash:
a2f322c94787630ab1e0c8ca35fc5ba1
Filesize:
18.6 KB
suspicious functions used:
base64_decode (line:30);curl_exec (line:41);curl_exec (line:422); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SignUp1.php-
Full path:
ajwah/web/SignUp1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:42 12/05/2025
Last modified:
09:53:03 06/03/2025
MD5 hash:
3f7943dd155c8e0a383b7d02730f8c11
Filesize:
24.59 KB
suspicious functions used:
curl_exec (line:33);curl_exec (line:59); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: sms-balance-check.php-
Full path:
ajwah/web/sms-balance-check.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
06:23:30 12/05/2025
Last modified:
09:53:03 06/03/2025
MD5 hash:
c75f0373da76faa763dd32ea8b7ed085
Filesize:
825 B
suspicious functions used:
curl_exec (line:15); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMS.php-
Full path:
ajwah/web/SMS.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:42 12/05/2025
Last modified:
09:53:03 06/03/2025
MD5 hash:
25b5422d1cc92b4d2253417e72d9a658
Filesize:
37.37 KB
suspicious functions used:
curl_exec (line:56); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMS1.php-
Full path:
ajwah/web/SMS1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:42 12/05/2025
Last modified:
09:53:03 06/03/2025
MD5 hash:
e4671dadf9ad575671fd3609a60030da
Filesize:
32.19 KB
suspicious functions used:
curl_exec (line:59); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMSAddSave.php-
Full path:
ajwah/web/SMSAddSave.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:42 12/05/2025
Last modified:
09:53:04 06/03/2025
MD5 hash:
0d2d0548df5f32e69264c4f2f1b1f76e
Filesize:
2.12 KB
suspicious functions used:
curl_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: sms_deliverey_report.php-
Full path:
ajwah/web/sms_deliverey_report.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
03:06:36 12/05/2025
Last modified:
09:53:07 06/03/2025
MD5 hash:
03623943da7e9334e137b38c8577fc84
Filesize:
4.25 KB
suspicious functions used:
curl_exec (line:28);curl_exec (line:53);curl_exec (line:90); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: support-action.php-
Full path:
ajwah/web/support-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
17:05:44 11/05/2025
Last modified:
09:53:07 06/03/2025
MD5 hash:
58556808f93f52486b2ad06998142aa9
Filesize:
14.56 KB
suspicious functions used:
curl_exec (line:220); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tagreeexpayment.php-
Full path:
ajwah/web/tagreeexpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:43 12/05/2025
Last modified:
09:53:09 06/03/2025
MD5 hash:
029b4fba649a75c7c81d2f8931be8d63
Filesize:
2.86 KB
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreateagree.php-
Full path:
ajwah/web/tcreateagree.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:43 12/05/2025
Last modified:
09:53:09 06/03/2025
MD5 hash:
27a10adf4190edc7eceee8cf74a6b72b
Filesize:
999 B
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreatepayment.php-
Full path:
ajwah/web/tcreatepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:43 12/05/2025
Last modified:
09:53:09 06/03/2025
MD5 hash:
e49de9a33f5164bc2c6b88e4770faaff
Filesize:
1.07 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test2.php-
Full path:
ajwah/web/test2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:43 12/05/2025
Last modified:
09:53:09 06/03/2025
MD5 hash:
ab80d92ede21b7da59bfefb325484297
Filesize:
13.76 KB
suspicious functions used:
shell_exec (line:59);shell_exec (line:70);shell_exec (line:76);shell_exec (line:88);shell_exec (line:101);shell_exec (line:141);curl_exec (line:187);curl_exec (line:212);curl_exec (line:354); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test6.php-
Full path:
ajwah/web/test6.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:43 12/05/2025
Last modified:
09:53:09 06/03/2025
MD5 hash:
f22d022ddc284f4d8e1de3660da91db8
Filesize:
15.61 KB
suspicious functions used:
shell_exec (line:34);shell_exec (line:113);shell_exec (line:126);shell_exec (line:132); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test7.php-
Full path:
ajwah/web/test7.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:43 12/05/2025
Last modified:
09:53:09 06/03/2025
MD5 hash:
b11ccf951ce63a21ea0a7328316a0e5c
Filesize:
1.57 KB
suspicious functions used:
curl_exec (line:14); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test8.php-
Full path:
ajwah/web/test8.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:43 12/05/2025
Last modified:
09:53:09 06/03/2025
MD5 hash:
0da20f06359cae632ac4b808ab2eee77
Filesize:
3.65 KB
suspicious functions used:
shell_exec (line:48); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: testttttt.php-
Full path:
ajwah/web/testttttt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:43 12/05/2025
Last modified:
09:53:09 06/03/2025
MD5 hash:
b1988a4be29e191ad935fb409a4174ee
Filesize:
2 KB
suspicious functions used:
curl_exec (line:47); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: texecutepayment.php-
Full path:
ajwah/web/texecutepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:43 12/05/2025
Last modified:
09:53:09 06/03/2025
MD5 hash:
623635fdf5c871391d3a5fe99ee8c543
Filesize:
2.91 KB
suspicious functions used:
curl_exec (line:24); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tis-news.php-
Full path:
ajwah/web/tis-news.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
06:23:30 12/05/2025
Last modified:
09:53:09 06/03/2025
MD5 hash:
ed23ca98b77c5321b4485e85eb2ea64d
Filesize:
3.67 KB
suspicious functions used:
curl_exec (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
ajwah/web/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:43 12/05/2025
Last modified:
09:53:09 06/03/2025
MD5 hash:
7d8e71ceda3ffb74623e0c4a814715af
Filesize:
1.53 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tt.php-
Full path:
ajwah/web/tt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:43 12/05/2025
Last modified:
09:53:10 06/03/2025
MD5 hash:
9c4ed141cb79fdc7e807b35923c91a20
Filesize:
1.56 KB
suspicious functions used:
curl_exec (line:30); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ttoken.php-
Full path:
ajwah/web/ttoken.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
15:29:17 11/05/2025
Last modified:
09:53:10 06/03/2025
MD5 hash:
5f2c51c1db5b0defadfb67ce25c0098f
Filesize:
1.54 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: UserAccess.php-
Full path:
ajwah/web/UserAccess.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:43 12/05/2025
Last modified:
09:53:11 06/03/2025
MD5 hash:
69db4d4c504e7d0d4bed32eb8053b12f
Filesize:
10.4 KB
suspicious functions used:
`.modulecheckboxx[data-group="${group}"]` (line:158); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook.php-
Full path:
ajwah/web/webhook.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:44 12/05/2025
Last modified:
09:53:13 06/03/2025
MD5 hash:
69a88ae1be0ab3ab1c7c971c72c0b025
Filesize:
21.93 KB
suspicious functions used:
base64_decode (line:28);curl_exec (line:39);curl_exec (line:465); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook_cid.php-
Full path:
ajwah/web/webhook_cid.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:44 12/05/2025
Last modified:
09:53:13 06/03/2025
MD5 hash:
1a2672fc0dd81a9c831e3fa60ec860e1
Filesize:
21.52 KB
suspicious functions used:
base64_decode (line:29);curl_exec (line:40);curl_exec (line:439); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook_test.php-
Full path:
ajwah/web/webhook_test.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:44 12/05/2025
Last modified:
09:53:16 06/03/2025
MD5 hash:
74a7dcc262d7fe7f2bdc9e0595d03837
Filesize:
4.69 KB
suspicious functions used:
base64_decode (line:22);curl_exec (line:33);curl_exec (line:86);curl_exec (line:107); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: class.phpmailer.php-
Full path:
ajwah/web/email/class.phpmailer.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:44 12/05/2025
Last modified:
09:53:20 06/03/2025
MD5 hash:
68468d69b47fffecc89df57e27c5a781
Filesize:
143.32 KB
suspicious functions used:
`$DKIM_private` (line:428);popen (line:1387);popen (line:1408);base64_decode (line:3410);`$mail->set('SMTPSecure', 'tls');` (line:3688);`$mail->SMTPSecure = 'tls';` (line:3690); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: class.smtp.php-
Full path:
ajwah/web/email/class.smtp.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:44 12/05/2025
Last modified:
09:53:21 06/03/2025
MD5 hash:
aa8478329268e5438a4469c268337a10
Filesize:
41.44 KB
suspicious functions used:
base64_decode (line:513);base64_decode (line:533); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: jqgrid.php-
Full path:
ajwah/web/inc/jqgrid.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:46 12/05/2025
Last modified:
09:54:51 06/03/2025
MD5 hash:
71027a29e71e0626d8b57cbb631e6d98
Filesize:
23.92 KB
suspicious functions used:
eval (line:397); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: JSON.php-
Full path:
ajwah/web/inc/JSON.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:46 12/05/2025
Last modified:
09:54:51 06/03/2025
MD5 hash:
f5a34509e06231308becbe320ade9ff6
Filesize:
33.22 KB
suspicious functions used:
eval (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: smsapicore.php-
Full path:
ajwah/web/include/smsapicore.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
16:38:24 11/05/2025
Last modified:
09:54:52 06/03/2025
MD5 hash:
0494713963b7e9ead12abe06de2811a5
Filesize:
1.26 KB
suspicious functions used:
curl_exec (line:37); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: telegramapicore.php-
Full path:
ajwah/web/include/telegramapicore.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
16:38:22 11/05/2025
Last modified:
09:54:52 06/03/2025
MD5 hash:
511f56e6dfcf4e9e7a11259e023ca3ae
Filesize:
3.15 KB
suspicious functions used:
curl_exec (line:68); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ui.php-
Full path:
ajwah/web/js/tinymce/themes/advanced/skins/highcontrast/ui.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
14:50:01 11/05/2025
Last modified:
09:55:17 06/03/2025
MD5 hash:
3edaf67be8573b86686f46bbba4f058c
Filesize:
4.53 KB
suspicious functions used:
curl_exec (line:20);`bill_amount` = '0.00' WHERE bill_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY ` (line:53);`bill_amount` = '0.00', days = '0.00' WHERE entry_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY ` (line:54);`payment` WHERE `pay_date` < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND pay_amount != '0.00' ORDER BY ` (line:55);curl_exec (line:146);curl_exec (line:168); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Changes.txt-
Full path:
ajwah/web/js/jqgrid/js/Changes.txt
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:46 12/05/2025
Last modified:
09:55:07 06/03/2025
MD5 hash:
c0a4adbc3f1c6d592cb4fa8433fee9ea
Filesize:
44.32 KB
suspicious functions used:
system (line:87); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data-cdata.php-
Full path:
ajwah/web/network-snmp-onu-status-data-cdata.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:46 12/05/2025
Last modified:
16:56:03 06/03/2025
MD5 hash:
dbf50804352ccb95714869628862226e
Filesize:
16.27 KB
suspicious functions used:
shell_exec (line:42);shell_exec (line:58);shell_exec (line:64);shell_exec (line:69);shell_exec (line:73);`pon_name` FROM `olt_pon` WHERE `olt_pon_id` = '$ponn_id' AND ` (line:80);shell_exec (line:88); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
ajwah/m/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:46 12/05/2025
Last modified:
09:51:44 06/03/2025
MD5 hash:
849185f307be30eafb1bbef93616d8c3
Filesize:
1.71 KB
suspicious functions used:
curl_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
ajwah/m/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:46 12/05/2025
Last modified:
09:51:44 06/03/2025
MD5 hash:
9a3f22521ad987e86f84c4f5f688d5b7
Filesize:
713 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index.php-
Full path:
ajwah/m/index.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
21:16:37 11/05/2025
Last modified:
09:51:45 06/03/2025
MD5 hash:
55a13ede9e1d70f42857e9a7baa75741
Filesize:
16.95 KB
suspicious functions used:
curl_exec (line:298); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index1.php-
Full path:
ajwah/m/index1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:46 12/05/2025
Last modified:
09:51:45 06/03/2025
MD5 hash:
dbd325386cd905b7a18b217dda2030f3
Filesize:
13.92 KB
suspicious functions used:
base64_decode (line:8);curl_exec (line:224); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index2.php-
Full path:
ajwah/m/index2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:47 12/05/2025
Last modified:
09:51:45 06/03/2025
MD5 hash:
41558736b037228ea93df03cae70eb87
Filesize:
4.31 KB
suspicious functions used:
curl_exec (line:70); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: LoginByPass.php-
Full path:
ajwah/m/LoginByPass.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:47 12/05/2025
Last modified:
09:51:45 06/03/2025
MD5 hash:
4deda2bef49c7e4552e5379c86858ddf
Filesize:
4.27 KB
suspicious functions used:
curl_exec (line:41); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec.php-
Full path:
ajwah/m/login_exec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
08:15:59 12/05/2025
Last modified:
09:51:45 06/03/2025
MD5 hash:
760b107af2f5d6194f97c20ba3ffb86b
Filesize:
11.63 KB
suspicious functions used:
curl_exec (line:24);curl_exec (line:80);curl_exec (line:227); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec1.php-
Full path:
ajwah/m/login_exec1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:47 12/05/2025
Last modified:
09:51:45 06/03/2025
MD5 hash:
b7a23f98b3d03b1ecc08218cf01b4aee
Filesize:
6.36 KB
suspicious functions used:
curl_exec (line:115); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec2.php-
Full path:
ajwah/m/login_exec2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:47 12/05/2025
Last modified:
09:51:45 06/03/2025
MD5 hash:
46b08782f51ba75b23e27183e06370fe
Filesize:
4.28 KB
suspicious functions used:
curl_exec (line:61); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-merchant-callback.php-
Full path:
ajwah/m/nagad-merchant-callback.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:47 12/05/2025
Last modified:
09:51:46 06/03/2025
MD5 hash:
89c5042f878e9b301a177823cf822c7e
Filesize:
11.32 KB
suspicious functions used:
curl_exec (line:20); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-snmp-data.php-
Full path:
ajwah/m/netowrk-snmp-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:47 12/05/2025
Last modified:
09:51:46 06/03/2025
MD5 hash:
75622375b3ee37723d953e8a83735ef7
Filesize:
23.92 KB
suspicious functions used:
shell_exec (line:96);shell_exec (line:105);shell_exec (line:115);shell_exec (line:134);shell_exec (line:146);shell_exec (line:157);shell_exec (line:173);shell_exec (line:183);shell_exec (line:199);shell_exec (line:219);shell_exec (line:229);shell_exec (line:234);shell_exec (line:242);shell_exec (line:262);shell_exec (line:278);`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:291);shell_exec (line:297);shell_exec (line:430); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery.php-
Full path:
ajwah/m/PaymentOnlineQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:47 12/05/2025
Last modified:
09:51:47 06/03/2025
MD5 hash:
6483645d440dd2f976cc1b29cb4021d5
Filesize:
20.95 KB
suspicious functions used:
curl_exec (line:287);curl_exec (line:492); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery2.php-
Full path:
ajwah/m/PaymentOnlineQuery2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:47 12/05/2025
Last modified:
09:51:47 06/03/2025
MD5 hash:
3660992067d5591fc79ce89d6dbb9274
Filesize:
19.08 KB
suspicious functions used:
curl_exec (line:41);curl_exec (line:254); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: support-action.php-
Full path:
ajwah/m/support-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:47 12/05/2025
Last modified:
09:51:48 06/03/2025
MD5 hash:
2fc6fd844db911a5502a7a6ae383990f
Filesize:
10.31 KB
suspicious functions used:
curl_exec (line:99); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tagreeexpayment.php-
Full path:
ajwah/m/tagreeexpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:47 12/05/2025
Last modified:
09:51:49 06/03/2025
MD5 hash:
c95e3ee881752db67b4f3597bc58430a
Filesize:
2.46 KB
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreateagree.php-
Full path:
ajwah/m/tcreateagree.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:47 12/05/2025
Last modified:
09:51:49 06/03/2025
MD5 hash:
27a10adf4190edc7eceee8cf74a6b72b
Filesize:
999 B
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreatepayment.php-
Full path:
ajwah/m/tcreatepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:47 12/05/2025
Last modified:
09:51:49 06/03/2025
MD5 hash:
e49de9a33f5164bc2c6b88e4770faaff
Filesize:
1.07 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: texecutepayment.php-
Full path:
ajwah/m/texecutepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:47 12/05/2025
Last modified:
09:51:49 06/03/2025
MD5 hash:
efbb63dfcfdacb52dec74bffc389bbb3
Filesize:
2.67 KB
suspicious functions used:
curl_exec (line:24); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
ajwah/m/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:47 12/05/2025
Last modified:
09:51:49 06/03/2025
MD5 hash:
7d8e71ceda3ffb74623e0c4a814715af
Filesize:
1.53 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ttoken.php-
Full path:
ajwah/m/ttoken.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:47 12/05/2025
Last modified:
09:51:49 06/03/2025
MD5 hash:
5f2c51c1db5b0defadfb67ce25c0098f
Filesize:
1.54 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: AppSettings.php-
Full path:
akbhanga/web/AppSettings.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:48 12/05/2025
Last modified:
05:13:42 06/03/2025
MD5 hash:
7ed349c4b0217e5395c4cc9295f66f4a
Filesize:
123.71 KB
suspicious functions used:
`input[name="${inputName}"]:checked` (line:2066); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: AutoActiveClientsCount1.php-
Full path:
akbhanga/web/AutoActiveClientsCount1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:20:07 12/05/2025
Last modified:
05:13:42 06/03/2025
MD5 hash:
3b3b6186ff2d9c5abd1772e5aa02ee33
Filesize:
6.4 KB
suspicious functions used:
system (line:58); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: AutoActiveClientsCount11.php-
Full path:
akbhanga/web/AutoActiveClientsCount11.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:48 12/05/2025
Last modified:
05:13:42 06/03/2025
MD5 hash:
a0090e4a11dd59b955a6edd549b6ef2f
Filesize:
5.85 KB
suspicious functions used:
system (line:54); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: client-online-mbb.php-
Full path:
akbhanga/web/client-online-mbb.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:49 12/05/2025
Last modified:
05:13:43 06/03/2025
MD5 hash:
e16c33ab6ddd7649ea56a7d5355365b6
Filesize:
16.46 KB
suspicious functions used:
curl_exec (line:90);curl_exec (line:289); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: clients-nots-action.php-
Full path:
akbhanga/web/clients-nots-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:50 12/05/2025
Last modified:
05:13:43 06/03/2025
MD5 hash:
dff1bb495509427d098cb4588da553b9
Filesize:
5.89 KB
suspicious functions used:
curl_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients.php-
Full path:
akbhanga/web/Clients.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:36:05 12/05/2025
Last modified:
10:28:27 06/03/2025
MD5 hash:
95c2c28384fd7b6a33afc844c109e785
Filesize:
209.92 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:878); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients1.php-
Full path:
akbhanga/web/Clients1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:50 12/05/2025
Last modified:
05:13:43 06/03/2025
MD5 hash:
228d02141d96f75107f8cad1047b18de
Filesize:
208.78 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:844); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients2.php-
Full path:
akbhanga/web/Clients2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:50 12/05/2025
Last modified:
05:13:43 06/03/2025
MD5 hash:
982d6411552113b0715fd17c26f50292
Filesize:
205.13 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:832); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients3.php-
Full path:
akbhanga/web/Clients3.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:51 12/05/2025
Last modified:
05:13:43 06/03/2025
MD5 hash:
50ddc869b383ab76e009c7a2c17c99a3
Filesize:
175.31 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:832); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ClientsOnMap.php-
Full path:
akbhanga/web/ClientsOnMap.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:52 12/05/2025
Last modified:
05:13:44 06/03/2025
MD5 hash:
c4f24f0dc36c09d6bbdfbfa9dab5f515
Filesize:
11.5 KB
suspicious functions used:
`${totalonline}` (line:98);`${totaloffline}` (line:99);`${results.rxPower}` (line:232);`${results.distance}` (line:233);`${results.supplyVoltage}` (line:234);`${results.temperature}` (line:235);`${results.txPower}` (line:236); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ClientView.php-
Full path:
akbhanga/web/ClientView.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
05:20:24 12/05/2025
Last modified:
05:13:44 06/03/2025
MD5 hash:
ecd7171b944880ac4539623626dbf9d2
Filesize:
111.69 KB
suspicious functions used:
`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:227); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ClientView1.php-
Full path:
akbhanga/web/ClientView1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:52 12/05/2025
Last modified:
05:13:44 06/03/2025
MD5 hash:
ecd7171b944880ac4539623626dbf9d2
Filesize:
111.69 KB
suspicious functions used:
`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:227); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: company_info.php-
Full path:
akbhanga/web/company_info.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
06:35:15 12/05/2025
Last modified:
05:13:44 06/03/2025
MD5 hash:
2983755d925ee3aa49accefa47451c7d
Filesize:
8.62 KB
suspicious functions used:
curl_exec (line:134); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
akbhanga/web/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:52 12/05/2025
Last modified:
05:13:44 06/03/2025
MD5 hash:
ba9747d0421fd091b998389469e72a0b
Filesize:
1.7 KB
suspicious functions used:
curl_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_all.php-
Full path:
akbhanga/web/cron_all.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:52 12/05/2025
Last modified:
05:13:44 06/03/2025
MD5 hash:
967f1d654ae891609da26b9e0fdbd1ae
Filesize:
2.44 KB
suspicious functions used:
curl_exec (line:23);curl_exec (line:38);curl_exec (line:53); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_gen_bill.php-
Full path:
akbhanga/web/cron_auto_gen_bill.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:52 12/05/2025
Last modified:
05:13:44 06/03/2025
MD5 hash:
f1056618cc4402968e50d1232d2c51c8
Filesize:
4.73 KB
suspicious functions used:
curl_exec (line:140);curl_exec (line:149); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive.php-
Full path:
akbhanga/web/cron_auto_inactive.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:52 12/05/2025
Last modified:
05:13:44 06/03/2025
MD5 hash:
7e0dc4dd9dae2bf0220516641b53c027
Filesize:
5.43 KB
suspicious functions used:
curl_exec (line:142); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive2.php-
Full path:
akbhanga/web/cron_auto_inactive2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:52 12/05/2025
Last modified:
05:13:44 06/03/2025
MD5 hash:
440bc24f05b01eb395df63fff2f60de9
Filesize:
5.46 KB
suspicious functions used:
curl_exec (line:142); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive_termination.php-
Full path:
akbhanga/web/cron_auto_inactive_termination.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
18:50:18 11/05/2025
Last modified:
05:13:44 06/03/2025
MD5 hash:
49f9f022b288eb3a85139ac8c1afb13c
Filesize:
12.23 KB
suspicious functions used:
curl_exec (line:219);curl_exec (line:231);curl_exec (line:273); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_termination_remainder1.php-
Full path:
akbhanga/web/cron_auto_termination_remainder1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
03:06:10 12/05/2025
Last modified:
05:13:44 06/03/2025
MD5 hash:
7765f9f820dbd402f1064fab9958ffaa
Filesize:
3.26 KB
suspicious functions used:
curl_exec (line:83); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_client_bandwidth_count.php-
Full path:
akbhanga/web/cron_client_bandwidth_count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
08:48:36 12/05/2025
Last modified:
05:13:44 06/03/2025
MD5 hash:
1c71a3dd097275429ae845a85ced0438
Filesize:
5.33 KB
suspicious functions used:
curl_exec (line:124);curl_exec (line:134); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_network.php-
Full path:
akbhanga/web/cron_network.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
15:21:54 11/05/2025
Last modified:
05:13:44 06/03/2025
MD5 hash:
db096f353e80027593ca3f9781a21ac8
Filesize:
4.93 KB
suspicious functions used:
curl_exec (line:45);curl_exec (line:67);curl_exec (line:127); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_olt.php-
Full path:
akbhanga/web/cron_olt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:52 12/05/2025
Last modified:
05:13:44 06/03/2025
MD5 hash:
5edf51db84e11e807af66733348efbf5
Filesize:
4.19 KB
suspicious functions used:
shell_exec (line:48);curl_exec (line:126); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_olt_clients_catch.php-
Full path:
akbhanga/web/cron_olt_clients_catch.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:52 12/05/2025
Last modified:
05:13:44 06/03/2025
MD5 hash:
3b13c163ba3445b3d661c63adde1d985
Filesize:
1.12 KB
suspicious functions used:
curl_exec (line:23); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_olt_user.php-
Full path:
akbhanga/web/cron_olt_user.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:52 12/05/2025
Last modified:
05:13:44 06/03/2025
MD5 hash:
67aa237639e3d1e6064e76079bb3cccc
Filesize:
1.97 KB
suspicious functions used:
curl_exec (line:19);curl_exec (line:46); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: EmployeeAdd.php-
Full path:
akbhanga/web/EmployeeAdd.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:52 12/05/2025
Last modified:
05:13:45 06/03/2025
MD5 hash:
c12c85fa282eb15060ed68bad252f8e8
Filesize:
19.13 KB
suspicious functions used:
`Element with ID ${id} not found.` (line:36);`Non-numeric input detected in ${id}.` (line:38);`Element with ID ${id} not found.` (line:44);`Non-numeric input detected in ${id}.` (line:46); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: EmployeeEdit.php-
Full path:
akbhanga/web/EmployeeEdit.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:52 12/05/2025
Last modified:
05:13:45 06/03/2025
MD5 hash:
55b4626339d566473f477e1a001dc8b4
Filesize:
17.73 KB
suspicious functions used:
`Element with ID ${id} not found.` (line:44);`Non-numeric input detected in ${id}.` (line:46);`Element with ID ${id} not found.` (line:52);`Non-numeric input detected in ${id}.` (line:54); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: emp_salary_advence_find.php-
Full path:
akbhanga/web/emp_salary_advence_find.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:52 12/05/2025
Last modified:
05:13:45 06/03/2025
MD5 hash:
74a7e2ffda0f7584611d7cbce6136c24
Filesize:
2.25 KB
suspicious functions used:
`expanse` WHERE `type` = '2' AND `status` = '2' AND ex_by = '$e_id' AND MONTH(`, `) = MONTH('$lastmonth') AND YEAR(`, `) = YEAR('$lastmonth') GROUP BY ` (line:8);`e_id` = '$e_id' AND ` (line:12); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
akbhanga/web/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:52 12/05/2025
Last modified:
05:13:45 06/03/2025
MD5 hash:
c46a50905333286f45dfeacf010851ab
Filesize:
716 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: getclientuptime.php-
Full path:
akbhanga/web/getclientuptime.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:53 12/05/2025
Last modified:
05:13:46 06/03/2025
MD5 hash:
bbc14cdd451c72b94d78c7d2d1af0b52
Filesize:
718 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: imagevwr.php-
Full path:
akbhanga/web/imagevwr.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
03:42:38 12/05/2025
Last modified:
05:13:46 06/03/2025
MD5 hash:
47a223a13cc642d01dcfaaca542d396d
Filesize:
915 B
suspicious functions used:
curl_exec (line:15); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index.php-
Full path:
akbhanga/web/index.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
11:07:58 12/05/2025
Last modified:
05:13:46 06/03/2025
MD5 hash:
3d1fa8a053cd084d6bcbc24765a91739
Filesize:
16.67 KB
suspicious functions used:
curl_exec (line:298); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: InstrumentsStoreOutDetails.php-
Full path:
akbhanga/web/InstrumentsStoreOutDetails.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:53 12/05/2025
Last modified:
05:13:46 06/03/2025
MD5 hash:
a60c19f766bfff1ccdccbeba6b39eb87
Filesize:
9.37 KB
suspicious functions used:
`update_date`, '%D-%b, %y') AS offdate, TIME_FORMAT(`update_time`, '%T') AS offtime FROM `con_sts_log` WHERE `c_id` = '{$row['c_id']}' AND con_sts = 'Inactive' ORDER BY ` (line:120); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ip-ping-checker.php-
Full path:
akbhanga/web/ip-ping-checker.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:53 12/05/2025
Last modified:
05:13:46 06/03/2025
MD5 hash:
0d28f3053b73b3fe2885cf519ee17c12
Filesize:
2.64 KB
suspicious functions used:
curl_exec (line:81); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: LoginByPass.php-
Full path:
akbhanga/web/LoginByPass.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:53 12/05/2025
Last modified:
05:13:47 06/03/2025
MD5 hash:
a8f1789daadb34b0814aaecddfebe7c1
Filesize:
4.26 KB
suspicious functions used:
curl_exec (line:41); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: loginexec.php-
Full path:
akbhanga/web/loginexec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:53 12/05/2025
Last modified:
05:13:47 06/03/2025
MD5 hash:
edb8017e7d0f8e037facbcacc94a383d
Filesize:
5.91 KB
suspicious functions used:
curl_exec (line:67); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec.php-
Full path:
akbhanga/web/login_exec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
03:39:25 12/05/2025
Last modified:
14:50:37 12/03/2025
MD5 hash:
52c9e33276b889bbe1bd665c754a5860
Filesize:
12.1 KB
suspicious functions used:
curl_exec (line:24);curl_exec (line:74);curl_exec (line:199);curl_exec (line:239); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: macreseller-news.php-
Full path:
akbhanga/web/macreseller-news.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:53 12/05/2025
Last modified:
05:13:47 06/03/2025
MD5 hash:
ed23ca98b77c5321b4485e85eb2ea64d
Filesize:
3.67 KB
suspicious functions used:
curl_exec (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: MacResellerAdd.php-
Full path:
akbhanga/web/MacResellerAdd.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:53 12/05/2025
Last modified:
05:13:47 06/03/2025
MD5 hash:
5ac506fcafb554fb6326382737dce0df
Filesize:
29.89 KB
suspicious functions used:
`input[name="${inputName}"]:checked` (line:792); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: MacResellerEdit.php-
Full path:
akbhanga/web/MacResellerEdit.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:54 12/05/2025
Last modified:
05:13:48 06/03/2025
MD5 hash:
60b4a4eac6e169f1bce50574c472cd2a
Filesize:
37.16 KB
suspicious functions used:
`input[name="${inputName}"]:checked` (line:634); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-helper.php-
Full path:
akbhanga/web/nagad-helper.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:54 12/05/2025
Last modified:
05:13:48 06/03/2025
MD5 hash:
114b90b978b842cd318391876ba454ab
Filesize:
2.84 KB
suspicious functions used:
curl_exec (line:46);base64_decode (line:77); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-merchant-callback.php-
Full path:
akbhanga/web/nagad-merchant-callback.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:54 12/05/2025
Last modified:
05:13:48 06/03/2025
MD5 hash:
b0ec1f203cb16bb39dc0dc5c587982ce
Filesize:
16.47 KB
suspicious functions used:
curl_exec (line:20); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-olt-all-mac-array.php-
Full path:
akbhanga/web/netowrk-olt-all-mac-array.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:54 12/05/2025
Last modified:
05:13:48 06/03/2025
MD5 hash:
b0168ce99145e2afe64357247d750dd6
Filesize:
4.62 KB
suspicious functions used:
shell_exec (line:33);shell_exec (line:47);shell_exec (line:61);shell_exec (line:76);shell_exec (line:93); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-snmp-data-auto.php-
Full path:
akbhanga/web/netowrk-snmp-data-auto.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:54 12/05/2025
Last modified:
05:13:48 06/03/2025
MD5 hash:
81e2685cc9d5a33d54a0764a0488b848
Filesize:
7.24 KB
suspicious functions used:
shell_exec (line:67);shell_exec (line:117); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-snmp-data.php-
Full path:
akbhanga/web/netowrk-snmp-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
14:16:34 11/05/2025
Last modified:
05:13:48 06/03/2025
MD5 hash:
4d7f14139fba095fdbc348dce9136690
Filesize:
24.67 KB
suspicious functions used:
shell_exec (line:103);shell_exec (line:112);shell_exec (line:122);shell_exec (line:141);shell_exec (line:153);shell_exec (line:164);shell_exec (line:180);shell_exec (line:190);shell_exec (line:206);shell_exec (line:226);shell_exec (line:235);shell_exec (line:243);shell_exec (line:250);shell_exec (line:255);`pon_name` FROM `olt_pon` WHERE `olt_pon_id` = '$pon_id' AND ` (line:262);shell_exec (line:279);shell_exec (line:289);`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:302);shell_exec (line:308);shell_exec (line:440); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-old-onu-rx-map.php-
Full path:
akbhanga/web/network-old-onu-rx-map.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:54 12/05/2025
Last modified:
05:13:48 06/03/2025
MD5 hash:
b4962c160c5ad68ccd8eed9c48d82a0f
Filesize:
6.94 KB
suspicious functions used:
shell_exec (line:76); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-old-onu-rx.php-
Full path:
akbhanga/web/network-old-onu-rx.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:54 12/05/2025
Last modified:
05:13:48 06/03/2025
MD5 hash:
59ed3318f07d2280f47e67f3c2f2c935
Filesize:
7.35 KB
suspicious functions used:
shell_exec (line:85); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-count-cdata.php-
Full path:
akbhanga/web/network-olt-client-onu-mac-count-cdata.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:54 12/05/2025
Last modified:
05:13:48 06/03/2025
MD5 hash:
c378dbabf36066c335cfb8838a6e167d
Filesize:
4.58 KB
suspicious functions used:
shell_exec (line:25);shell_exec (line:35);shell_exec (line:56);shell_exec (line:103);shell_exec (line:115);shell_exec (line:126);shell_exec (line:140); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-count-rcl.php-
Full path:
akbhanga/web/network-olt-client-onu-mac-count-rcl.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:54 12/05/2025
Last modified:
05:13:48 06/03/2025
MD5 hash:
155290201f4342ad1f835e1411ef3e31
Filesize:
4.55 KB
suspicious functions used:
shell_exec (line:25);shell_exec (line:35);shell_exec (line:56);shell_exec (line:103);shell_exec (line:115);shell_exec (line:126);shell_exec (line:140); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-count.php-
Full path:
akbhanga/web/network-olt-client-onu-mac-count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:54 12/05/2025
Last modified:
05:13:49 06/03/2025
MD5 hash:
22f7c5b1545279d2a65caf57b3cb5c5a
Filesize:
15.3 KB
suspicious functions used:
shell_exec (line:26);shell_exec (line:36);shell_exec (line:68);shell_exec (line:84);shell_exec (line:101);shell_exec (line:119);shell_exec (line:135);shell_exec (line:176);shell_exec (line:236);shell_exec (line:312);shell_exec (line:379);shell_exec (line:469);shell_exec (line:488);shell_exec (line:507); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-countt.php-
Full path:
akbhanga/web/network-olt-client-onu-mac-countt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:54 12/05/2025
Last modified:
05:13:49 06/03/2025
MD5 hash:
d29b4e72c375f528b769bd3894f9f0e7
Filesize:
8.95 KB
suspicious functions used:
shell_exec (line:26);shell_exec (line:36);shell_exec (line:59);shell_exec (line:75);shell_exec (line:92);shell_exec (line:102);shell_exec (line:117);shell_exec (line:155);shell_exec (line:206);shell_exec (line:262);shell_exec (line:275);shell_exec (line:288); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-con-sts.php-
Full path:
akbhanga/web/network-olt-con-sts.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:54 12/05/2025
Last modified:
05:13:49 06/03/2025
MD5 hash:
a26b0a1c1567c34c9aa5e2e0254ff8a6
Filesize:
4 KB
suspicious functions used:
`olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:10);shell_exec (line:38);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, `last_synced`, `last_update`, `msg`, `full_msg`, ROUND((SELECT AVG(value) FROM olt_onu_history WHERE alarm_id = '$alarmId' AND value != ''), 2) AS average_value FROM `, ` WHERE `alarm_id` = '$alarmId' AND ` (line:82); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-load.php-
Full path:
akbhanga/web/network-olt-load.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:54 12/05/2025
Last modified:
05:13:49 06/03/2025
MD5 hash:
f49d5153285c639ed91d4e806685ee56
Filesize:
1.33 KB
suspicious functions used:
shell_exec (line:22);shell_exec (line:25); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-oid-check.php-
Full path:
akbhanga/web/network-olt-oid-check.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:54 12/05/2025
Last modified:
05:13:49 06/03/2025
MD5 hash:
5b7dc0ce1103fbfc895873c250b63141
Filesize:
1.88 KB
suspicious functions used:
shell_exec (line:33); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-alarm-add.php-
Full path:
akbhanga/web/network-olt-onu-alarm-add.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:54 12/05/2025
Last modified:
05:13:49 06/03/2025
MD5 hash:
be6ba82c658419e1454f778e20e2d4c3
Filesize:
7.86 KB
suspicious functions used:
shell_exec (line:103); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-count.php-
Full path:
akbhanga/web/network-olt-onu-count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:54 12/05/2025
Last modified:
05:13:49 06/03/2025
MD5 hash:
6dc4bf46ac59065c0e0e7e3510aaf4d2
Filesize:
7.05 KB
suspicious functions used:
`olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:12);shell_exec (line:81); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-list-data.php-
Full path:
akbhanga/web/network-olt-onu-list-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:54 12/05/2025
Last modified:
05:13:49 06/03/2025
MD5 hash:
54cc9417c766c31317311c3722ce7d4b
Filesize:
9.48 KB
suspicious functions used:
shell_exec (line:24);shell_exec (line:38);shell_exec (line:64);shell_exec (line:85);shell_exec (line:104);shell_exec (line:125);shell_exec (line:143);shell_exec (line:153);shell_exec (line:165);shell_exec (line:185); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-power.php-
Full path:
akbhanga/web/network-olt-onu-power.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:54 12/05/2025
Last modified:
05:13:49 06/03/2025
MD5 hash:
2e064543b67b532bdf4e5b12d49c5052
Filesize:
7.54 KB
suspicious functions used:
shell_exec (line:97); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-clients-search.php-
Full path:
akbhanga/web/network-olt-pon-clients-search.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:54 12/05/2025
Last modified:
05:13:49 06/03/2025
MD5 hash:
79d26fc66abdab6f173330588aa8b238
Filesize:
10.93 KB
suspicious functions used:
shell_exec (line:42);shell_exec (line:51);shell_exec (line:104);shell_exec (line:168); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search-bdcom.php-
Full path:
akbhanga/web/network-olt-pon-onu-search-bdcom.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:54 12/05/2025
Last modified:
05:13:49 06/03/2025
MD5 hash:
c786fa8b69268c738b6ff976631798cd
Filesize:
27.74 KB
suspicious functions used:
shell_exec (line:60);shell_exec (line:69);shell_exec (line:383); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search-bdcom1.php-
Full path:
akbhanga/web/network-olt-pon-onu-search-bdcom1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:54 12/05/2025
Last modified:
05:13:49 06/03/2025
MD5 hash:
dd18677b1dcbf7f0bce2ac6912d98da0
Filesize:
9.6 KB
suspicious functions used:
shell_exec (line:42);shell_exec (line:51);shell_exec (line:129); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search-rcl.php-
Full path:
akbhanga/web/network-olt-pon-onu-search-rcl.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:54 12/05/2025
Last modified:
05:13:49 06/03/2025
MD5 hash:
565ff38d572bba4bc20721ab17484554
Filesize:
27.33 KB
suspicious functions used:
shell_exec (line:46);shell_exec (line:55);shell_exec (line:369); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search.php-
Full path:
akbhanga/web/network-olt-pon-onu-search.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:54 12/05/2025
Last modified:
05:13:49 06/03/2025
MD5 hash:
dc183ecf77d0e1f56f672338fd09cfa5
Filesize:
21.62 KB
suspicious functions used:
shell_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data-bdcom.php-
Full path:
akbhanga/web/network-snmp-onu-status-data-bdcom.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:54 12/05/2025
Last modified:
02:20:46 07/03/2025
MD5 hash:
97bdd52a7c2adee8fba0a4f7165605d0
Filesize:
23.35 KB
suspicious functions used:
shell_exec (line:48);shell_exec (line:73);shell_exec (line:85);shell_exec (line:103);shell_exec (line:116);shell_exec (line:128);shell_exec (line:134);shell_exec (line:159);shell_exec (line:172);shell_exec (line:184);shell_exec (line:190);shell_exec (line:217);shell_exec (line:230);shell_exec (line:236); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data.php-
Full path:
akbhanga/web/network-snmp-onu-status-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:54 12/05/2025
Last modified:
05:13:49 06/03/2025
MD5 hash:
0adfee384bf349b50f11036947fd2a74
Filesize:
30.37 KB
suspicious functions used:
shell_exec (line:38);`olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:42);shell_exec (line:81);shell_exec (line:95);shell_exec (line:109);shell_exec (line:122);shell_exec (line:208);shell_exec (line:429);shell_exec (line:441);shell_exec (line:448); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data1.php-
Full path:
akbhanga/web/network-snmp-onu-status-data1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:54 12/05/2025
Last modified:
05:13:49 06/03/2025
MD5 hash:
920bd1a592c36f7a1194b737642f8340
Filesize:
15.96 KB
suspicious functions used:
shell_exec (line:33);`olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:37);shell_exec (line:149); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data_vsol2.php-
Full path:
akbhanga/web/network-snmp-onu-status-data_vsol2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:54 12/05/2025
Last modified:
05:13:49 06/03/2025
MD5 hash:
f22d022ddc284f4d8e1de3660da91db8
Filesize:
15.61 KB
suspicious functions used:
shell_exec (line:34);shell_exec (line:113);shell_exec (line:126);shell_exec (line:132); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-tree-vartual-nodes.php-
Full path:
akbhanga/web/network-tree-vartual-nodes.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:55 12/05/2025
Last modified:
05:13:49 06/03/2025
MD5 hash:
3530b8bc3113544014b1746ecd67e834
Filesize:
10.64 KB
suspicious functions used:
shell_exec (line:76);shell_exec (line:111);shell_exec (line:145);shell_exec (line:181);shell_exec (line:188); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Network.php-
Full path:
akbhanga/web/Network.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:55 12/05/2025
Last modified:
02:20:47 07/03/2025
MD5 hash:
2691f8988dee1a9fc89f0738b9f0b62f
Filesize:
64.28 KB
suspicious functions used:
system (line:370);shell_exec (line:653); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Network1.php-
Full path:
akbhanga/web/Network1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:55 12/05/2025
Last modified:
05:13:49 06/03/2025
MD5 hash:
c72cb4810d5c70edd9da26884beba751
Filesize:
66.22 KB
suspicious functions used:
system (line:375);shell_exec (line:661); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkLoad.php-
Full path:
akbhanga/web/NetworkLoad.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:55 12/05/2025
Last modified:
05:13:49 06/03/2025
MD5 hash:
e1632e66ee1b7394d3fb82751b924abe
Filesize:
2.83 KB
suspicious functions used:
system (line:81); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkLoad1.php-
Full path:
akbhanga/web/NetworkLoad1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:55 12/05/2025
Last modified:
05:13:49 06/03/2025
MD5 hash:
176bd6931be34d7ef351d22897accc65
Filesize:
759 B
suspicious functions used:
system (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltAddQuery.php-
Full path:
akbhanga/web/NetworkOltAddQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:55 12/05/2025
Last modified:
09:27:55 07/03/2025
MD5 hash:
364ecc96699a76cea445a021ed3b2b33
Filesize:
7.36 KB
suspicious functions used:
shell_exec (line:21); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltOnuStatus.php-
Full path:
akbhanga/web/NetworkOltOnuStatus.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:55 12/05/2025
Last modified:
05:13:50 06/03/2025
MD5 hash:
31f74ac18fe0f3b0bec3b0d00b2556d5
Filesize:
70.53 KB
suspicious functions used:
shell_exec (line:42);shell_exec (line:102);shell_exec (line:673);shell_exec (line:786);shell_exec (line:896);shell_exec (line:1006); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltOnuStatus2.php-
Full path:
akbhanga/web/NetworkOltOnuStatus2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:55 12/05/2025
Last modified:
05:13:50 06/03/2025
MD5 hash:
c9a14797fa4353d05bbd9427b6079250
Filesize:
15.88 KB
suspicious functions used:
shell_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltSense.php-
Full path:
akbhanga/web/NetworkOltSense.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:55 12/05/2025
Last modified:
05:13:50 06/03/2025
MD5 hash:
2be664ae5006367f629ca437a6d507f8
Filesize:
18.26 KB
suspicious functions used:
`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, `last_synced`, `last_update`, `msg`, `full_msg`, ROUND((SELECT AVG(value) FROM olt_onu_history WHERE alarm_id = '$alarmId' AND value != ''), 2) AS average_value FROM `, ` WHERE `alarm_id` = '$alarmId' AND ` (line:123); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltSenseDetails.php-
Full path:
akbhanga/web/NetworkOltSenseDetails.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:55 12/05/2025
Last modified:
05:13:50 06/03/2025
MD5 hash:
440096c601fc10b819a1f0f8330928b0
Filesize:
14.17 KB
suspicious functions used:
`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:33);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:42);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:51);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:60); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltSync.php-
Full path:
akbhanga/web/NetworkOltSync.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:55 12/05/2025
Last modified:
05:13:50 06/03/2025
MD5 hash:
06633d4b65a14d677358170dd0a84424
Filesize:
1.87 KB
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree-olt-onu-list-data.php-
Full path:
akbhanga/web/networktree-olt-onu-list-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:55 12/05/2025
Last modified:
05:13:50 06/03/2025
MD5 hash:
af4221fefa9c9051846a063ac4135560
Filesize:
8.72 KB
suspicious functions used:
shell_exec (line:24);shell_exec (line:36);shell_exec (line:59);shell_exec (line:78);shell_exec (line:97);shell_exec (line:116);shell_exec (line:134);shell_exec (line:143);shell_exec (line:155);shell_exec (line:175); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeAddSave.php-
Full path:
akbhanga/web/NetworkTreeAddSave.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:55 12/05/2025
Last modified:
05:13:50 06/03/2025
MD5 hash:
93fdf1213fdb5d525641e2b625f1a91b
Filesize:
7.61 KB
suspicious functions used:
`network_tree` WHERE `olt_id` = '$olt_id' AND ` (line:107); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeEdit1.php-
Full path:
akbhanga/web/NetworkTreeEdit1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:56 12/05/2025
Last modified:
05:13:50 06/03/2025
MD5 hash:
3396a6bdf9b5804bb208f38f37cc29a2
Filesize:
35.81 KB
suspicious functions used:
`olt_onu` WHERE olt_id = '$olt_id' AND ` (line:207); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeEditSave.php-
Full path:
akbhanga/web/NetworkTreeEditSave.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:56 12/05/2025
Last modified:
05:13:50 06/03/2025
MD5 hash:
be82a23409ab88be3f57da95f8805d6c
Filesize:
12.83 KB
suspicious functions used:
`network_tree` WHERE `olt_id` = '$olt_id' AND ` (line:182); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeList.php-
Full path:
akbhanga/web/NetworkTreeList.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:56 12/05/2025
Last modified:
05:13:50 06/03/2025
MD5 hash:
acd468021993faf8575531952ae107f8
Filesize:
21.98 KB
suspicious functions used:
`pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '{$row['olt_id']}' AND ` (line:287); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeMap.php-
Full path:
akbhanga/web/NetworkTreeMap.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:56 12/05/2025
Last modified:
05:13:50 06/03/2025
MD5 hash:
893f2e3360b70dfbf4b65b4289eb1c58
Filesize:
24.46 KB
suspicious functions used:
`${results.rxPower}` (line:268);`${results.distance}` (line:269);`${results.supplyVoltage}` (line:270);`${results.temperature}` (line:271);`${results.txPower}` (line:272);`${results.rxPower}` (line:288);`${results.distance}` (line:289);`${results.supplyVoltage}` (line:290);`${results.temperature}` (line:291);`${results.txPower}` (line:292); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeMap1.php-
Full path:
akbhanga/web/NetworkTreeMap1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:56 12/05/2025
Last modified:
05:13:50 06/03/2025
MD5 hash:
31a3ae9bc0bdb18726ed860ec6e8ec97
Filesize:
36.43 KB
suspicious functions used:
`networktree_marker_data.php?tree_id=${markerId}` (line:231);`${results.rxPower}` (line:311);`${results.distance}` (line:312);`${results.supplyVoltage}` (line:313);`${results.temperature}` (line:314);`${results.txPower}` (line:315); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_onu_list_add.php-
Full path:
akbhanga/web/networktree_device_onu_list_add.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:56 12/05/2025
Last modified:
05:13:50 06/03/2025
MD5 hash:
ae5e1bd4b4619e068908177102626079
Filesize:
14.63 KB
suspicious functions used:
`network_tree` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND device_type = '5' AND ` (line:9);shell_exec (line:33);`network_tree` WHERE `onu_mac` = '$mac_address' AND ` (line:131);shell_exec (line:178);shell_exec (line:186);shell_exec (line:230);`network_tree` WHERE `onu_mac` = '$onuMac' AND ` (line:296); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_pon_check.php-
Full path:
akbhanga/web/networktree_device_pon_check.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:56 12/05/2025
Last modified:
05:13:50 06/03/2025
MD5 hash:
708a93aadcae96ecf0aaca52041fcf38
Filesize:
1.53 KB
suspicious functions used:
`pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '$olt_id' AND ` (line:8); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_pon_list_add.php-
Full path:
akbhanga/web/networktree_device_pon_list_add.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:56 12/05/2025
Last modified:
05:13:50 06/03/2025
MD5 hash:
2ec03912801e4749c2e9cd361417ca5f
Filesize:
1.36 KB
suspicious functions used:
`olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:6);`olt_pon` WHERE `olt_id` = '$olt_id' AND ` (line:10);`network_tree` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND ` (line:17); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_pon_port_onu_list.php-
Full path:
akbhanga/web/networktree_device_pon_port_onu_list.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:56 12/05/2025
Last modified:
05:13:50 06/03/2025
MD5 hash:
9c63b3ac69996628f5eb2959a9eb4e15
Filesize:
8.65 KB
suspicious functions used:
`olt_pon` WHERE olt_id = '$olt_id' AND ` (line:25);shell_exec (line:32);shell_exec (line:45);`network_tree` WHERE onu_index_id = '$port_onu_index_id' AND ` (line:49);shell_exec (line:81);shell_exec (line:103);shell_exec (line:122);shell_exec (line:143);shell_exec (line:161);shell_exec (line:170);shell_exec (line:184); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_pon_port_sense_list.php-
Full path:
akbhanga/web/networktree_device_pon_port_sense_list.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:56 12/05/2025
Last modified:
05:13:50 06/03/2025
MD5 hash:
ee69cd5cc122f8aa37d8d8e5c74def6b
Filesize:
3.65 KB
suspicious functions used:
`network_tree` WHERE `onu_mac` = '$onu_mac' AND ` (line:26);`network_tree` WHERE `c_id` = '{$dfhbdxf}' AND ` (line:71); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_type.php-
Full path:
akbhanga/web/networktree_device_type.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:56 12/05/2025
Last modified:
05:13:50 06/03/2025
MD5 hash:
f1520732e5a3ef38564238a3278a1f63
Filesize:
11.43 KB
suspicious functions used:
`tree_id`) AS countolt FROM `network_tree` WHERE `olt_id` = '$olt_id_sure' AND ` (line:64); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: olt_all_onu_mac.php-
Full path:
akbhanga/web/olt_all_onu_mac.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:56 12/05/2025
Last modified:
05:13:51 06/03/2025
MD5 hash:
bde00602b98fba3ce9f7669b0d6f0fa3
Filesize:
4.56 KB
suspicious functions used:
shell_exec (line:22);shell_exec (line:38);shell_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery.php-
Full path:
akbhanga/web/PaymentOnlineQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
16:18:09 11/05/2025
Last modified:
05:13:52 06/03/2025
MD5 hash:
6a845f0e20c434c12eb30f42726f268d
Filesize:
28.37 KB
suspicious functions used:
curl_exec (line:457);curl_exec (line:669); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery2.php-
Full path:
akbhanga/web/PaymentOnlineQuery2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:57 12/05/2025
Last modified:
05:13:52 06/03/2025
MD5 hash:
ccd315d11a60901b7b9029ff44f8351b
Filesize:
19.4 KB
suspicious functions used:
curl_exec (line:42);curl_exec (line:252); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentWebhook.php-
Full path:
akbhanga/web/PaymentWebhook.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:57 12/05/2025
Last modified:
05:13:52 06/03/2025
MD5 hash:
a2f322c94787630ab1e0c8ca35fc5ba1
Filesize:
18.6 KB
suspicious functions used:
base64_decode (line:30);curl_exec (line:41);curl_exec (line:422); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SignUp1.php-
Full path:
akbhanga/web/SignUp1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:58 12/05/2025
Last modified:
05:13:54 06/03/2025
MD5 hash:
3f7943dd155c8e0a383b7d02730f8c11
Filesize:
24.59 KB
suspicious functions used:
curl_exec (line:33);curl_exec (line:59); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: sms-balance-check.php-
Full path:
akbhanga/web/sms-balance-check.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
10:05:54 12/05/2025
Last modified:
05:13:54 06/03/2025
MD5 hash:
c75f0373da76faa763dd32ea8b7ed085
Filesize:
825 B
suspicious functions used:
curl_exec (line:15); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMS.php-
Full path:
akbhanga/web/SMS.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:58 12/05/2025
Last modified:
05:13:54 06/03/2025
MD5 hash:
25b5422d1cc92b4d2253417e72d9a658
Filesize:
37.37 KB
suspicious functions used:
curl_exec (line:56); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMS1.php-
Full path:
akbhanga/web/SMS1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:58 12/05/2025
Last modified:
05:13:54 06/03/2025
MD5 hash:
e4671dadf9ad575671fd3609a60030da
Filesize:
32.19 KB
suspicious functions used:
curl_exec (line:59); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMSAddSave.php-
Full path:
akbhanga/web/SMSAddSave.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:58 12/05/2025
Last modified:
05:13:54 06/03/2025
MD5 hash:
0d2d0548df5f32e69264c4f2f1b1f76e
Filesize:
2.12 KB
suspicious functions used:
curl_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: sms_deliverey_report.php-
Full path:
akbhanga/web/sms_deliverey_report.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
03:06:10 12/05/2025
Last modified:
05:13:55 06/03/2025
MD5 hash:
03623943da7e9334e137b38c8577fc84
Filesize:
4.25 KB
suspicious functions used:
curl_exec (line:28);curl_exec (line:53);curl_exec (line:90); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: support-action.php-
Full path:
akbhanga/web/support-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:58 12/05/2025
Last modified:
05:13:55 06/03/2025
MD5 hash:
58556808f93f52486b2ad06998142aa9
Filesize:
14.56 KB
suspicious functions used:
curl_exec (line:220); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tagreeexpayment.php-
Full path:
akbhanga/web/tagreeexpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
13:39:18 11/05/2025
Last modified:
05:13:55 06/03/2025
MD5 hash:
029b4fba649a75c7c81d2f8931be8d63
Filesize:
2.86 KB
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreateagree.php-
Full path:
akbhanga/web/tcreateagree.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
13:38:37 11/05/2025
Last modified:
05:13:55 06/03/2025
MD5 hash:
27a10adf4190edc7eceee8cf74a6b72b
Filesize:
999 B
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreatepayment.php-
Full path:
akbhanga/web/tcreatepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
16:17:54 11/05/2025
Last modified:
05:13:55 06/03/2025
MD5 hash:
e49de9a33f5164bc2c6b88e4770faaff
Filesize:
1.07 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test2.php-
Full path:
akbhanga/web/test2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:58 12/05/2025
Last modified:
05:13:55 06/03/2025
MD5 hash:
ab80d92ede21b7da59bfefb325484297
Filesize:
13.76 KB
suspicious functions used:
shell_exec (line:59);shell_exec (line:70);shell_exec (line:76);shell_exec (line:88);shell_exec (line:101);shell_exec (line:141);curl_exec (line:187);curl_exec (line:212);curl_exec (line:354); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test6.php-
Full path:
akbhanga/web/test6.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:58 12/05/2025
Last modified:
05:13:55 06/03/2025
MD5 hash:
f22d022ddc284f4d8e1de3660da91db8
Filesize:
15.61 KB
suspicious functions used:
shell_exec (line:34);shell_exec (line:113);shell_exec (line:126);shell_exec (line:132); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test7.php-
Full path:
akbhanga/web/test7.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:59 12/05/2025
Last modified:
05:13:55 06/03/2025
MD5 hash:
b11ccf951ce63a21ea0a7328316a0e5c
Filesize:
1.57 KB
suspicious functions used:
curl_exec (line:14); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test8.php-
Full path:
akbhanga/web/test8.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:59 12/05/2025
Last modified:
05:13:55 06/03/2025
MD5 hash:
0da20f06359cae632ac4b808ab2eee77
Filesize:
3.65 KB
suspicious functions used:
shell_exec (line:48); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: testttttt.php-
Full path:
akbhanga/web/testttttt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:59 12/05/2025
Last modified:
05:13:56 06/03/2025
MD5 hash:
b1988a4be29e191ad935fb409a4174ee
Filesize:
2 KB
suspicious functions used:
curl_exec (line:47); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: texecutepayment.php-
Full path:
akbhanga/web/texecutepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
16:18:08 11/05/2025
Last modified:
05:13:56 06/03/2025
MD5 hash:
623635fdf5c871391d3a5fe99ee8c543
Filesize:
2.91 KB
suspicious functions used:
curl_exec (line:24); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tis-news.php-
Full path:
akbhanga/web/tis-news.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
10:05:54 12/05/2025
Last modified:
05:13:56 06/03/2025
MD5 hash:
ed23ca98b77c5321b4485e85eb2ea64d
Filesize:
3.67 KB
suspicious functions used:
curl_exec (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
akbhanga/web/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:59 12/05/2025
Last modified:
05:13:56 06/03/2025
MD5 hash:
7d8e71ceda3ffb74623e0c4a814715af
Filesize:
1.53 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tt.php-
Full path:
akbhanga/web/tt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:59 12/05/2025
Last modified:
05:13:56 06/03/2025
MD5 hash:
9c4ed141cb79fdc7e807b35923c91a20
Filesize:
1.56 KB
suspicious functions used:
curl_exec (line:30); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ttoken.php-
Full path:
akbhanga/web/ttoken.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
11:28:38 12/05/2025
Last modified:
05:13:56 06/03/2025
MD5 hash:
5f2c51c1db5b0defadfb67ce25c0098f
Filesize:
1.54 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: UserAccess.php-
Full path:
akbhanga/web/UserAccess.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:59 12/05/2025
Last modified:
05:13:56 06/03/2025
MD5 hash:
69db4d4c504e7d0d4bed32eb8053b12f
Filesize:
10.4 KB
suspicious functions used:
`.modulecheckboxx[data-group="${group}"]` (line:158); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook.php-
Full path:
akbhanga/web/webhook.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:59 12/05/2025
Last modified:
05:13:57 06/03/2025
MD5 hash:
69a88ae1be0ab3ab1c7c971c72c0b025
Filesize:
21.93 KB
suspicious functions used:
base64_decode (line:28);curl_exec (line:39);curl_exec (line:465); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook_cid.php-
Full path:
akbhanga/web/webhook_cid.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:59 12/05/2025
Last modified:
05:13:57 06/03/2025
MD5 hash:
1a2672fc0dd81a9c831e3fa60ec860e1
Filesize:
21.52 KB
suspicious functions used:
base64_decode (line:29);curl_exec (line:40);curl_exec (line:439); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook_test.php-
Full path:
akbhanga/web/webhook_test.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:56:59 12/05/2025
Last modified:
05:13:57 06/03/2025
MD5 hash:
74a7dcc262d7fe7f2bdc9e0595d03837
Filesize:
4.69 KB
suspicious functions used:
base64_decode (line:22);curl_exec (line:33);curl_exec (line:86);curl_exec (line:107); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: class.phpmailer.php-
Full path:
akbhanga/web/email/class.phpmailer.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:00 12/05/2025
Last modified:
05:13:59 06/03/2025
MD5 hash:
68468d69b47fffecc89df57e27c5a781
Filesize:
143.32 KB
suspicious functions used:
`$DKIM_private` (line:428);popen (line:1387);popen (line:1408);base64_decode (line:3410);`$mail->set('SMTPSecure', 'tls');` (line:3688);`$mail->SMTPSecure = 'tls';` (line:3690); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: class.smtp.php-
Full path:
akbhanga/web/email/class.smtp.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:00 12/05/2025
Last modified:
05:13:59 06/03/2025
MD5 hash:
aa8478329268e5438a4469c268337a10
Filesize:
41.44 KB
suspicious functions used:
base64_decode (line:513);base64_decode (line:533); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: jqgrid.php-
Full path:
akbhanga/web/inc/jqgrid.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:01 12/05/2025
Last modified:
05:15:29 06/03/2025
MD5 hash:
71027a29e71e0626d8b57cbb631e6d98
Filesize:
23.92 KB
suspicious functions used:
eval (line:397); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: JSON.php-
Full path:
akbhanga/web/inc/JSON.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:01 12/05/2025
Last modified:
05:15:29 06/03/2025
MD5 hash:
f5a34509e06231308becbe320ade9ff6
Filesize:
33.22 KB
suspicious functions used:
eval (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: smsapicore.php-
Full path:
akbhanga/web/include/smsapicore.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
16:18:10 11/05/2025
Last modified:
05:15:29 06/03/2025
MD5 hash:
0494713963b7e9ead12abe06de2811a5
Filesize:
1.26 KB
suspicious functions used:
curl_exec (line:37); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: telegramapicore.php-
Full path:
akbhanga/web/include/telegramapicore.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
17:56:05 11/05/2025
Last modified:
05:15:30 06/03/2025
MD5 hash:
511f56e6dfcf4e9e7a11259e023ca3ae
Filesize:
3.15 KB
suspicious functions used:
curl_exec (line:68); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ui.php-
Full path:
akbhanga/web/js/tinymce/themes/advanced/skins/highcontrast/ui.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:01 12/05/2025
Last modified:
05:15:49 06/03/2025
MD5 hash:
3edaf67be8573b86686f46bbba4f058c
Filesize:
4.53 KB
suspicious functions used:
curl_exec (line:20);`bill_amount` = '0.00' WHERE bill_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY ` (line:53);`bill_amount` = '0.00', days = '0.00' WHERE entry_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY ` (line:54);`payment` WHERE `pay_date` < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND pay_amount != '0.00' ORDER BY ` (line:55);curl_exec (line:146);curl_exec (line:168); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Changes.txt-
Full path:
akbhanga/web/js/jqgrid/js/Changes.txt
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:01 12/05/2025
Last modified:
05:15:41 06/03/2025
MD5 hash:
c0a4adbc3f1c6d592cb4fa8433fee9ea
Filesize:
44.32 KB
suspicious functions used:
system (line:87); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
akbhanga/m/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:02 12/05/2025
Last modified:
05:13:31 06/03/2025
MD5 hash:
849185f307be30eafb1bbef93616d8c3
Filesize:
1.71 KB
suspicious functions used:
curl_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
akbhanga/m/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:02 12/05/2025
Last modified:
05:13:31 06/03/2025
MD5 hash:
9a3f22521ad987e86f84c4f5f688d5b7
Filesize:
713 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index.php-
Full path:
akbhanga/m/index.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:02 12/05/2025
Last modified:
05:13:31 06/03/2025
MD5 hash:
55a13ede9e1d70f42857e9a7baa75741
Filesize:
16.95 KB
suspicious functions used:
curl_exec (line:298); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index1.php-
Full path:
akbhanga/m/index1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:02 12/05/2025
Last modified:
05:13:32 06/03/2025
MD5 hash:
dbd325386cd905b7a18b217dda2030f3
Filesize:
13.92 KB
suspicious functions used:
base64_decode (line:8);curl_exec (line:224); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index2.php-
Full path:
akbhanga/m/index2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:02 12/05/2025
Last modified:
05:13:32 06/03/2025
MD5 hash:
41558736b037228ea93df03cae70eb87
Filesize:
4.31 KB
suspicious functions used:
curl_exec (line:70); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: LoginByPass.php-
Full path:
akbhanga/m/LoginByPass.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:02 12/05/2025
Last modified:
05:13:32 06/03/2025
MD5 hash:
4deda2bef49c7e4552e5379c86858ddf
Filesize:
4.27 KB
suspicious functions used:
curl_exec (line:41); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec.php-
Full path:
akbhanga/m/login_exec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
18:03:09 11/05/2025
Last modified:
14:50:37 12/03/2025
MD5 hash:
7eff267b8f329713c83c3cddd380b782
Filesize:
12.1 KB
suspicious functions used:
curl_exec (line:24);curl_exec (line:74);curl_exec (line:199);curl_exec (line:239); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec1.php-
Full path:
akbhanga/m/login_exec1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:02 12/05/2025
Last modified:
05:13:32 06/03/2025
MD5 hash:
b7a23f98b3d03b1ecc08218cf01b4aee
Filesize:
6.36 KB
suspicious functions used:
curl_exec (line:115); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec2.php-
Full path:
akbhanga/m/login_exec2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:02 12/05/2025
Last modified:
05:13:32 06/03/2025
MD5 hash:
46b08782f51ba75b23e27183e06370fe
Filesize:
4.28 KB
suspicious functions used:
curl_exec (line:61); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-merchant-callback.php-
Full path:
akbhanga/m/nagad-merchant-callback.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:02 12/05/2025
Last modified:
05:13:32 06/03/2025
MD5 hash:
89c5042f878e9b301a177823cf822c7e
Filesize:
11.32 KB
suspicious functions used:
curl_exec (line:20); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-snmp-data.php-
Full path:
akbhanga/m/netowrk-snmp-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:02 12/05/2025
Last modified:
05:13:32 06/03/2025
MD5 hash:
75622375b3ee37723d953e8a83735ef7
Filesize:
23.92 KB
suspicious functions used:
shell_exec (line:96);shell_exec (line:105);shell_exec (line:115);shell_exec (line:134);shell_exec (line:146);shell_exec (line:157);shell_exec (line:173);shell_exec (line:183);shell_exec (line:199);shell_exec (line:219);shell_exec (line:229);shell_exec (line:234);shell_exec (line:242);shell_exec (line:262);shell_exec (line:278);`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:291);shell_exec (line:297);shell_exec (line:430); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery.php-
Full path:
akbhanga/m/PaymentOnlineQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
18:03:50 11/05/2025
Last modified:
05:13:32 06/03/2025
MD5 hash:
6483645d440dd2f976cc1b29cb4021d5
Filesize:
20.95 KB
suspicious functions used:
curl_exec (line:287);curl_exec (line:492); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery2.php-
Full path:
akbhanga/m/PaymentOnlineQuery2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:02 12/05/2025
Last modified:
05:13:32 06/03/2025
MD5 hash:
3660992067d5591fc79ce89d6dbb9274
Filesize:
19.08 KB
suspicious functions used:
curl_exec (line:41);curl_exec (line:254); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: support-action.php-
Full path:
akbhanga/m/support-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:03 12/05/2025
Last modified:
05:13:32 06/03/2025
MD5 hash:
2fc6fd844db911a5502a7a6ae383990f
Filesize:
10.31 KB
suspicious functions used:
curl_exec (line:99); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tagreeexpayment.php-
Full path:
akbhanga/m/tagreeexpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
14:26:46 11/05/2025
Last modified:
05:13:32 06/03/2025
MD5 hash:
c95e3ee881752db67b4f3597bc58430a
Filesize:
2.46 KB
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreateagree.php-
Full path:
akbhanga/m/tcreateagree.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
14:25:34 11/05/2025
Last modified:
05:13:32 06/03/2025
MD5 hash:
27a10adf4190edc7eceee8cf74a6b72b
Filesize:
999 B
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreatepayment.php-
Full path:
akbhanga/m/tcreatepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
14:25:40 11/05/2025
Last modified:
05:13:32 06/03/2025
MD5 hash:
e49de9a33f5164bc2c6b88e4770faaff
Filesize:
1.07 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: texecutepayment.php-
Full path:
akbhanga/m/texecutepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
18:03:50 11/05/2025
Last modified:
05:13:32 06/03/2025
MD5 hash:
efbb63dfcfdacb52dec74bffc389bbb3
Filesize:
2.67 KB
suspicious functions used:
curl_exec (line:24); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
akbhanga/m/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:03 12/05/2025
Last modified:
05:13:32 06/03/2025
MD5 hash:
7d8e71ceda3ffb74623e0c4a814715af
Filesize:
1.53 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ttoken.php-
Full path:
akbhanga/m/ttoken.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
14:25:29 11/05/2025
Last modified:
05:13:33 06/03/2025
MD5 hash:
5f2c51c1db5b0defadfb67ce25c0098f
Filesize:
1.54 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Changes.txt-
Full path:
an/m/js/jqgrid/js/Changes.txt
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:04 12/05/2025
Last modified:
02:12:58 27/08/2023
MD5 hash:
c0a4adbc3f1c6d592cb4fa8433fee9ea
Filesize:
44.32 KB
suspicious functions used:
system (line:87); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
an/m/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:04 12/05/2025
Last modified:
02:12:02 27/08/2023
MD5 hash:
7d8e71ceda3ffb74623e0c4a814715af
Filesize:
1.53 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery.php-
Full path:
an/m/PaymentOnlineQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:03:00 12/05/2025
Last modified:
02:12:01 27/08/2023
MD5 hash:
5e63b1f647ca3509509beda8102d5c40
Filesize:
16.65 KB
suspicious functions used:
curl_exec (line:287);curl_exec (line:382); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ttoken.php-
Full path:
an/m/ttoken.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:02:42 12/05/2025
Last modified:
02:12:02 27/08/2023
MD5 hash:
5f2c51c1db5b0defadfb67ce25c0098f
Filesize:
1.54 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
an/m/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:05 12/05/2025
Last modified:
02:12:00 27/08/2023
MD5 hash:
05132f436e56ff2164ecc165347219ae
Filesize:
1.71 KB
suspicious functions used:
curl_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
an/m/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:05 12/05/2025
Last modified:
02:12:00 27/08/2023
MD5 hash:
9a3f22521ad987e86f84c4f5f688d5b7
Filesize:
713 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index.php-
Full path:
an/m/index.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
03:56:39 12/05/2025
Last modified:
23:30:25 03/10/2023
MD5 hash:
488549d8551f66f872c47e45201ee5b7
Filesize:
11.85 KB
suspicious functions used:
base64_decode (line:10);curl_exec (line:206); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec.php-
Full path:
an/m/login_exec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
10:46:26 12/05/2025
Last modified:
06:36:19 01/03/2024
MD5 hash:
1f800365ef270564df77d30c1bfd7ed3
Filesize:
5.4 KB
suspicious functions used:
curl_exec (line:66); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec1.php-
Full path:
an/m/login_exec1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:05 12/05/2025
Last modified:
02:12:00 27/08/2023
MD5 hash:
4ab4155763d3c6a8ea772996a5765a94
Filesize:
4.28 KB
suspicious functions used:
curl_exec (line:61); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery2.php-
Full path:
an/m/PaymentOnlineQuery2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:05 12/05/2025
Last modified:
02:12:01 27/08/2023
MD5 hash:
48588dfbb812b9e8102af40dc401032c
Filesize:
19.04 KB
suspicious functions used:
curl_exec (line:41);curl_exec (line:254); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tagreeexpayment.php-
Full path:
an/m/tagreeexpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:05 12/05/2025
Last modified:
02:12:02 27/08/2023
MD5 hash:
c95e3ee881752db67b4f3597bc58430a
Filesize:
2.46 KB
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreateagree.php-
Full path:
an/m/tcreateagree.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:05 12/05/2025
Last modified:
02:12:02 27/08/2023
MD5 hash:
27a10adf4190edc7eceee8cf74a6b72b
Filesize:
999 B
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreatepayment.php-
Full path:
an/m/tcreatepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:02:45 12/05/2025
Last modified:
02:12:02 27/08/2023
MD5 hash:
e49de9a33f5164bc2c6b88e4770faaff
Filesize:
1.07 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: texecutepayment.php-
Full path:
an/m/texecutepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:02:58 12/05/2025
Last modified:
02:12:02 27/08/2023
MD5 hash:
efbb63dfcfdacb52dec74bffc389bbb3
Filesize:
2.67 KB
suspicious functions used:
curl_exec (line:24); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: class.phpmailer.php-
Full path:
an/web/email/class.phpmailer.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:06 12/05/2025
Last modified:
02:13:36 27/08/2023
MD5 hash:
68468d69b47fffecc89df57e27c5a781
Filesize:
143.32 KB
suspicious functions used:
`$DKIM_private` (line:428);popen (line:1387);popen (line:1408);base64_decode (line:3410);`$mail->set('SMTPSecure', 'tls');` (line:3688);`$mail->SMTPSecure = 'tls';` (line:3690); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: class.smtp.php-
Full path:
an/web/email/class.smtp.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:06 12/05/2025
Last modified:
02:13:36 27/08/2023
MD5 hash:
aa8478329268e5438a4469c268337a10
Filesize:
41.44 KB
suspicious functions used:
base64_decode (line:513);base64_decode (line:533); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: JSON.php-
Full path:
an/web/inc/JSON.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:07 12/05/2025
Last modified:
02:13:40 27/08/2023
MD5 hash:
f5a34509e06231308becbe320ade9ff6
Filesize:
33.22 KB
suspicious functions used:
eval (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: jqgrid.php-
Full path:
an/web/inc/jqgrid.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:07 12/05/2025
Last modified:
02:14:00 27/08/2023
MD5 hash:
71027a29e71e0626d8b57cbb631e6d98
Filesize:
23.92 KB
suspicious functions used:
eval (line:397); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: smsapicore.php-
Full path:
an/web/include/smsapicore.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
08:46:01 12/05/2025
Last modified:
06:09:56 01/03/2024
MD5 hash:
0afbabc581e2e88f2883e249f83847a4
Filesize:
891 B
suspicious functions used:
curl_exec (line:13); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: telegramapicore.php-
Full path:
an/web/include/telegramapicore.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
11:41:05 12/05/2025
Last modified:
02:13:40 27/08/2023
MD5 hash:
c669b81806a80fae7f84959c253cc737
Filesize:
2.44 KB
suspicious functions used:
curl_exec (line:54); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Changes.txt-
Full path:
an/web/js/jqgrid/js/Changes.txt
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:07 12/05/2025
Last modified:
02:13:55 27/08/2023
MD5 hash:
c0a4adbc3f1c6d592cb4fa8433fee9ea
Filesize:
44.32 KB
suspicious functions used:
system (line:87); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: AutoActiveClientsCount1.php-
Full path:
an/web/AutoActiveClientsCount1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
05:26:51 12/05/2025
Last modified:
00:47:49 01/11/2023
MD5 hash:
f0219eb658570bd65b6ba7a76957f471
Filesize:
4.36 KB
suspicious functions used:
system (line:52); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Network.php-
Full path:
an/web/Network.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:10 12/05/2025
Last modified:
02:13:23 27/08/2023
MD5 hash:
53a3aa3ebd6ffd1176e0bde0e6e254f0
Filesize:
22.76 KB
suspicious functions used:
system (line:208); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: InstrumentsStoreOutDetails.php-
Full path:
an/web/InstrumentsStoreOutDetails.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:10 12/05/2025
Last modified:
02:13:20 27/08/2023
MD5 hash:
ab68ab13bcfd51da15e72a3d4e9817e8
Filesize:
9.37 KB
suspicious functions used:
`update_date`, '%D-%b, %y') AS offdate, TIME_FORMAT(`update_time`, '%T') AS offtime FROM `con_sts_log` WHERE `c_id` = '{$row['c_id']}' AND con_sts = 'Inactive' ORDER BY ` (line:120); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkLoad.php-
Full path:
an/web/NetworkLoad.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:10 12/05/2025
Last modified:
02:13:24 27/08/2023
MD5 hash:
e1632e66ee1b7394d3fb82751b924abe
Filesize:
2.83 KB
suspicious functions used:
system (line:81); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentWebhook.php-
Full path:
an/web/PaymentWebhook.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:10 12/05/2025
Last modified:
08:32:04 01/03/2024
MD5 hash:
a2f322c94787630ab1e0c8ca35fc5ba1
Filesize:
18.6 KB
suspicious functions used:
base64_decode (line:30);curl_exec (line:41);curl_exec (line:422); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMS.php-
Full path:
an/web/SMS.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
07:48:12 12/05/2025
Last modified:
04:05:02 13/10/2023
MD5 hash:
bf70b20b52d2d20d1512a07ea29510d0
Filesize:
29 KB
suspicious functions used:
curl_exec (line:53); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery.php-
Full path:
an/web/PaymentOnlineQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
03:59:59 12/05/2025
Last modified:
02:13:26 27/08/2023
MD5 hash:
eb93c751e05e717a544d27f8dd6ef768
Filesize:
23.99 KB
suspicious functions used:
curl_exec (line:456);curl_exec (line:560); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery2.php-
Full path:
an/web/PaymentOnlineQuery2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:12 12/05/2025
Last modified:
02:13:26 27/08/2023
MD5 hash:
138b87d49f0613b02cb61abace637606
Filesize:
19.39 KB
suspicious functions used:
curl_exec (line:43);curl_exec (line:253); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMSAddSave.php-
Full path:
an/web/SMSAddSave.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:12 12/05/2025
Last modified:
02:13:30 27/08/2023
MD5 hash:
5e8b43b3bc2febe3a611a5bd9aa8fc28
Filesize:
1.71 KB
suspicious functions used:
curl_exec (line:34); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: emp_salary_advence_find.php-
Full path:
an/web/emp_salary_advence_find.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:13 12/05/2025
Last modified:
02:13:19 27/08/2023
MD5 hash:
8cb12a79d5e1d31d92670d721dabb5aa
Filesize:
2.25 KB
suspicious functions used:
`expanse` WHERE `type` = '2' AND `status` = '2' AND ex_by = '$e_id' AND MONTH(`, `) = MONTH('$lastmonth') AND YEAR(`, `) = YEAR('$lastmonth') GROUP BY ` (line:8);`e_id` = '$e_id' AND ` (line:12); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: company_info.php-
Full path:
an/web/company_info.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
08:29:47 12/05/2025
Last modified:
13:01:07 09/04/2024
MD5 hash:
6760a9ee088b4b5dfaad69ff7c1100e0
Filesize:
7.51 KB
suspicious functions used:
curl_exec (line:119); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
an/web/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:13 12/05/2025
Last modified:
02:13:18 27/08/2023
MD5 hash:
c8a7ce9b69ebed3509cee2952c04cb0c
Filesize:
1.7 KB
suspicious functions used:
curl_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_all.php-
Full path:
an/web/cron_all.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:13 12/05/2025
Last modified:
08:04:17 01/03/2024
MD5 hash:
b19a08fef36584598cca299b7ecc5e6d
Filesize:
2.07 KB
suspicious functions used:
curl_exec (line:23);curl_exec (line:38);curl_exec (line:53); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: imagevwr.php-
Full path:
an/web/imagevwr.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
11:39:56 12/05/2025
Last modified:
07:19:17 25/05/2024
MD5 hash:
47a223a13cc642d01dcfaaca542d396d
Filesize:
915 B
suspicious functions used:
curl_exec (line:15); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_gen_bill.php-
Full path:
an/web/cron_auto_gen_bill.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:13 12/05/2025
Last modified:
08:04:51 01/03/2024
MD5 hash:
eadec12eb6484d0069e5d0d320725a75
Filesize:
4.73 KB
suspicious functions used:
curl_exec (line:140);curl_exec (line:149); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive.php-
Full path:
an/web/cron_auto_inactive.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
04:15:02 12/05/2025
Last modified:
08:05:50 01/03/2024
MD5 hash:
288e83bc1578b0992ae1ab75eb328bc2
Filesize:
5.75 KB
suspicious functions used:
curl_exec (line:151); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive2.php-
Full path:
an/web/cron_auto_inactive2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:13 12/05/2025
Last modified:
02:13:19 27/08/2023
MD5 hash:
a6a713d414c4e0632f4fe69f68b77d53
Filesize:
6.28 KB
suspicious functions used:
curl_exec (line:158); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
an/web/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:13 12/05/2025
Last modified:
02:13:19 27/08/2023
MD5 hash:
c46a50905333286f45dfeacf010851ab
Filesize:
716 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive_termination.php-
Full path:
an/web/cron_auto_inactive_termination.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
18:12:01 11/05/2025
Last modified:
12:17:52 23/09/2024
MD5 hash:
ee38a77a78391fe4323d470248cff87d
Filesize:
6.81 KB
suspicious functions used:
curl_exec (line:124);curl_exec (line:142); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_termination_remainder1.php-
Full path:
an/web/cron_auto_termination_remainder1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:13 12/05/2025
Last modified:
08:31:04 01/03/2024
MD5 hash:
9fd6a3aa4bc5fc43cf8b40b9c4ff19b6
Filesize:
3.23 KB
suspicious functions used:
curl_exec (line:83); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_client_bandwidth_count.php-
Full path:
an/web/cron_client_bandwidth_count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
23:13:34 11/05/2025
Last modified:
22:13:58 01/04/2024
MD5 hash:
de3b1389261cf5411b7e7ca5c44f96b2
Filesize:
4.08 KB
suspicious functions used:
curl_exec (line:117); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_network.php-
Full path:
an/web/cron_network.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
07:02:50 12/05/2025
Last modified:
02:13:19 27/08/2023
MD5 hash:
d7ae8ca3db81dce0960bb9840cb5aeee
Filesize:
4.14 KB
suspicious functions used:
curl_exec (line:41);curl_exec (line:59); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index.php-
Full path:
an/web/index.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
08:17:57 12/05/2025
Last modified:
23:30:34 03/10/2023
MD5 hash:
b59de72043fddaa4207dc0d685fa5e87
Filesize:
12.01 KB
suspicious functions used:
base64_decode (line:10);curl_exec (line:211); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ttoken.php-
Full path:
an/web/ttoken.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
03:59:39 12/05/2025
Last modified:
02:13:32 27/08/2023
MD5 hash:
5f2c51c1db5b0defadfb67ce25c0098f
Filesize:
1.54 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook.php-
Full path:
an/web/webhook.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:13 12/05/2025
Last modified:
09:21:21 01/03/2024
MD5 hash:
6ea5abfa2b22d299ea68b666eaa57701
Filesize:
20.98 KB
suspicious functions used:
base64_decode (line:28);curl_exec (line:39);curl_exec (line:427); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook_test.php-
Full path:
an/web/webhook_test.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:13 12/05/2025
Last modified:
02:13:34 27/08/2023
MD5 hash:
74a7dcc262d7fe7f2bdc9e0595d03837
Filesize:
4.69 KB
suspicious functions used:
base64_decode (line:22);curl_exec (line:33);curl_exec (line:86);curl_exec (line:107); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ip-ping-checker.php-
Full path:
an/web/ip-ping-checker.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:13 12/05/2025
Last modified:
02:13:21 27/08/2023
MD5 hash:
0d28f3053b73b3fe2885cf519ee17c12
Filesize:
2.64 KB
suspicious functions used:
curl_exec (line:81); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec.php-
Full path:
an/web/login_exec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
06:03:36 12/05/2025
Last modified:
06:36:20 01/03/2024
MD5 hash:
8e5caeac6dd5efb18009f8718af713ce
Filesize:
5.39 KB
suspicious functions used:
curl_exec (line:66); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec1.php-
Full path:
an/web/login_exec1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:13 12/05/2025
Last modified:
02:13:21 27/08/2023
MD5 hash:
4f75b914e1b47a355be8cbc73e4e1407
Filesize:
3.91 KB
suspicious functions used:
curl_exec (line:53); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tagreeexpayment.php-
Full path:
an/web/tagreeexpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:13 12/05/2025
Last modified:
02:13:31 27/08/2023
MD5 hash:
029b4fba649a75c7c81d2f8931be8d63
Filesize:
2.86 KB
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreateagree.php-
Full path:
an/web/tcreateagree.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:13 12/05/2025
Last modified:
02:13:31 27/08/2023
MD5 hash:
27a10adf4190edc7eceee8cf74a6b72b
Filesize:
999 B
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreatepayment.php-
Full path:
an/web/tcreatepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
03:59:42 12/05/2025
Last modified:
02:13:31 27/08/2023
MD5 hash:
e49de9a33f5164bc2c6b88e4770faaff
Filesize:
1.07 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test3.php-
Full path:
an/web/test3.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:14 12/05/2025
Last modified:
02:13:32 27/08/2023
MD5 hash:
73a48fe113b432b1786e7a15406cc14d
Filesize:
1.26 KB
suspicious functions used:
`Counter: ${seconds}s` (line:29); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: testttttt.php-
Full path:
an/web/testttttt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:14 12/05/2025
Last modified:
10:27:25 04/10/2023
MD5 hash:
b1988a4be29e191ad935fb409a4174ee
Filesize:
2 KB
suspicious functions used:
curl_exec (line:47); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: texecutepayment.php-
Full path:
an/web/texecutepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
03:59:58 12/05/2025
Last modified:
02:13:32 27/08/2023
MD5 hash:
623635fdf5c871391d3a5fe99ee8c543
Filesize:
2.91 KB
suspicious functions used:
curl_exec (line:24); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tis-news.php-
Full path:
an/web/tis-news.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
05:31:17 12/05/2025
Last modified:
07:55:40 09/04/2024
MD5 hash:
ed23ca98b77c5321b4485e85eb2ea64d
Filesize:
3.67 KB
suspicious functions used:
curl_exec (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
an/web/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:14 12/05/2025
Last modified:
02:13:32 27/08/2023
MD5 hash:
7d8e71ceda3ffb74623e0c4a814715af
Filesize:
1.53 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: sms_deliverey_report.php-
Full path:
an/web/sms_deliverey_report.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
07:57:17 12/05/2025
Last modified:
02:13:31 27/08/2023
MD5 hash:
15eda78f2292f68b63aae44e6207e0d8
Filesize:
2.96 KB
suspicious functions used:
`api_id` != '' AND `delivery_report` != 'DELIVRD' AND `delivery_report` = '' or `delivery_report` = 'SENT' or `delivery_report` = 'PENDING' AND c_cell REGEXP '^-?[0-9]+$' ORDER BY ` (line:8);curl_exec (line:18);curl_exec (line:41); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Changes.txt-
Full path:
ap/m/js/jqgrid/js/Changes.txt
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:14 12/05/2025
Last modified:
23:44:59 10/05/2023
MD5 hash:
c0a4adbc3f1c6d592cb4fa8433fee9ea
Filesize:
44.32 KB
suspicious functions used:
system (line:87); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery2.php-
Full path:
ap/m/PaymentOnlineQuery2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:14 12/05/2025
Last modified:
23:44:47 10/05/2023
MD5 hash:
48588dfbb812b9e8102af40dc401032c
Filesize:
19.04 KB
suspicious functions used:
curl_exec (line:41);curl_exec (line:254); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: company_info.php-
Full path:
ap/m/company_info.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
05:01:20 12/05/2025
Last modified:
13:01:07 09/04/2024
MD5 hash:
44b4a58bc7240512ed9fb6341ab7d669
Filesize:
6.82 KB
suspicious functions used:
curl_exec (line:107); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
ap/m/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:15 12/05/2025
Last modified:
23:44:46 10/05/2023
MD5 hash:
05132f436e56ff2164ecc165347219ae
Filesize:
1.71 KB
suspicious functions used:
curl_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
ap/m/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:15 12/05/2025
Last modified:
23:44:46 10/05/2023
MD5 hash:
9a3f22521ad987e86f84c4f5f688d5b7
Filesize:
713 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index.php-
Full path:
ap/m/index.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
21:16:27 11/05/2025
Last modified:
23:30:08 03/10/2023
MD5 hash:
a0be5938c1104bf73db401976cc51a8b
Filesize:
4.32 KB
suspicious functions used:
curl_exec (line:70); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec.php-
Full path:
ap/m/login_exec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
05:27:21 12/05/2025
Last modified:
06:36:20 01/03/2024
MD5 hash:
2c3353643c30cff35602daed7a9112ba
Filesize:
4.11 KB
suspicious functions used:
curl_exec (line:53); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tagreeexpayment.php-
Full path:
ap/m/tagreeexpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:15 12/05/2025
Last modified:
23:44:47 10/05/2023
MD5 hash:
c95e3ee881752db67b4f3597bc58430a
Filesize:
2.46 KB
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreateagree.php-
Full path:
ap/m/tcreateagree.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:15 12/05/2025
Last modified:
23:44:47 10/05/2023
MD5 hash:
27a10adf4190edc7eceee8cf74a6b72b
Filesize:
999 B
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreatepayment.php-
Full path:
ap/m/tcreatepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:15 12/05/2025
Last modified:
23:44:47 10/05/2023
MD5 hash:
e49de9a33f5164bc2c6b88e4770faaff
Filesize:
1.07 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery.php-
Full path:
ap/m/PaymentOnlineQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:15 12/05/2025
Last modified:
23:44:47 10/05/2023
MD5 hash:
5e63b1f647ca3509509beda8102d5c40
Filesize:
16.65 KB
suspicious functions used:
curl_exec (line:287);curl_exec (line:382); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: texecutepayment.php-
Full path:
ap/m/texecutepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:15 12/05/2025
Last modified:
23:44:47 10/05/2023
MD5 hash:
efbb63dfcfdacb52dec74bffc389bbb3
Filesize:
2.67 KB
suspicious functions used:
curl_exec (line:24); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
ap/m/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:15 12/05/2025
Last modified:
23:44:47 10/05/2023
MD5 hash:
7d8e71ceda3ffb74623e0c4a814715af
Filesize:
1.53 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ttoken.php-
Full path:
ap/m/ttoken.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:15 12/05/2025
Last modified:
23:44:47 10/05/2023
MD5 hash:
5f2c51c1db5b0defadfb67ce25c0098f
Filesize:
1.54 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: class.phpmailer.php-
Full path:
ap/web/email/class.phpmailer.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:16 12/05/2025
Last modified:
22:26:53 10/05/2023
MD5 hash:
68468d69b47fffecc89df57e27c5a781
Filesize:
143.32 KB
suspicious functions used:
`$DKIM_private` (line:428);popen (line:1387);popen (line:1408);base64_decode (line:3410);`$mail->set('SMTPSecure', 'tls');` (line:3688);`$mail->SMTPSecure = 'tls';` (line:3690); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: class.smtp.php-
Full path:
ap/web/email/class.smtp.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:16 12/05/2025
Last modified:
22:26:53 10/05/2023
MD5 hash:
aa8478329268e5438a4469c268337a10
Filesize:
41.44 KB
suspicious functions used:
base64_decode (line:513);base64_decode (line:533); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: JSON.php-
Full path:
ap/web/inc/JSON.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:17 12/05/2025
Last modified:
22:26:58 10/05/2023
MD5 hash:
f5a34509e06231308becbe320ade9ff6
Filesize:
33.22 KB
suspicious functions used:
eval (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: jqgrid.php-
Full path:
ap/web/inc/jqgrid.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:17 12/05/2025
Last modified:
22:26:58 10/05/2023
MD5 hash:
71027a29e71e0626d8b57cbb631e6d98
Filesize:
23.92 KB
suspicious functions used:
eval (line:397); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: smsapicore.php-
Full path:
ap/web/include/smsapicore.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
04:05:06 12/05/2025
Last modified:
06:09:56 01/03/2024
MD5 hash:
0afbabc581e2e88f2883e249f83847a4
Filesize:
891 B
suspicious functions used:
curl_exec (line:13); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: telegramapicore.php-
Full path:
ap/web/include/telegramapicore.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
13:05:03 11/05/2025
Last modified:
22:26:58 10/05/2023
MD5 hash:
c669b81806a80fae7f84959c253cc737
Filesize:
2.44 KB
suspicious functions used:
curl_exec (line:54); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Changes.txt-
Full path:
ap/web/js/jqgrid/js/Changes.txt
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:17 12/05/2025
Last modified:
22:27:10 10/05/2023
MD5 hash:
c0a4adbc3f1c6d592cb4fa8433fee9ea
Filesize:
44.32 KB
suspicious functions used:
system (line:87); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: AutoActiveClientsCount1.php-
Full path:
ap/web/AutoActiveClientsCount1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
13:55:36 11/05/2025
Last modified:
22:26:30 10/05/2023
MD5 hash:
5728358b99d57c5c533760c05d59b734
Filesize:
3.5 KB
suspicious functions used:
system (line:46); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: InstrumentsStoreOutDetails.php-
Full path:
ap/web/InstrumentsStoreOutDetails.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:20 12/05/2025
Last modified:
22:26:32 10/05/2023
MD5 hash:
ab68ab13bcfd51da15e72a3d4e9817e8
Filesize:
9.37 KB
suspicious functions used:
`update_date`, '%D-%b, %y') AS offdate, TIME_FORMAT(`update_time`, '%T') AS offtime FROM `con_sts_log` WHERE `c_id` = '{$row['c_id']}' AND con_sts = 'Inactive' ORDER BY ` (line:120); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Network.php-
Full path:
ap/web/Network.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:20 12/05/2025
Last modified:
22:26:45 10/05/2023
MD5 hash:
7077cb60047c2816d526de616fb05a9d
Filesize:
21.27 KB
suspicious functions used:
system (line:171); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkLoad.php-
Full path:
ap/web/NetworkLoad.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:20 12/05/2025
Last modified:
22:26:45 10/05/2023
MD5 hash:
e1632e66ee1b7394d3fb82751b924abe
Filesize:
2.83 KB
suspicious functions used:
system (line:81); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMS.php-
Full path:
ap/web/SMS.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:21 12/05/2025
Last modified:
04:05:02 13/10/2023
MD5 hash:
b72892edbd33fe78068c01e568ff73af
Filesize:
28.37 KB
suspicious functions used:
curl_exec (line:53); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery.php-
Full path:
ap/web/PaymentOnlineQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:22 12/05/2025
Last modified:
22:26:46 10/05/2023
MD5 hash:
92c82342b06b342adf69ecb7339f7ca2
Filesize:
23.95 KB
suspicious functions used:
curl_exec (line:456);curl_exec (line:560); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery2.php-
Full path:
ap/web/PaymentOnlineQuery2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:22 12/05/2025
Last modified:
22:26:46 10/05/2023
MD5 hash:
ee62afe447c53bb82f54bb6ebda64f3b
Filesize:
19.37 KB
suspicious functions used:
curl_exec (line:43);curl_exec (line:253); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentWebhook.php-
Full path:
ap/web/PaymentWebhook.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:22 12/05/2025
Last modified:
08:32:04 01/03/2024
MD5 hash:
a2f322c94787630ab1e0c8ca35fc5ba1
Filesize:
18.6 KB
suspicious functions used:
base64_decode (line:30);curl_exec (line:41);curl_exec (line:422); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMSAddSave.php-
Full path:
ap/web/SMSAddSave.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:22 12/05/2025
Last modified:
22:26:49 10/05/2023
MD5 hash:
5e8b43b3bc2febe3a611a5bd9aa8fc28
Filesize:
1.71 KB
suspicious functions used:
curl_exec (line:34); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_all.php-
Full path:
ap/web/cron_all.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:23 12/05/2025
Last modified:
08:04:17 01/03/2024
MD5 hash:
b19a08fef36584598cca299b7ecc5e6d
Filesize:
2.07 KB
suspicious functions used:
curl_exec (line:23);curl_exec (line:38);curl_exec (line:53); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: company_info.php-
Full path:
ap/web/company_info.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
15:39:01 11/05/2025
Last modified:
13:01:07 09/04/2024
MD5 hash:
102ca1c90852fcb34039073acdf161ee
Filesize:
7.06 KB
suspicious functions used:
curl_exec (line:110); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
ap/web/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:23 12/05/2025
Last modified:
22:26:31 10/05/2023
MD5 hash:
c8a7ce9b69ebed3509cee2952c04cb0c
Filesize:
1.7 KB
suspicious functions used:
curl_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_gen_bill.php-
Full path:
ap/web/cron_auto_gen_bill.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:23 12/05/2025
Last modified:
08:04:51 01/03/2024
MD5 hash:
eadec12eb6484d0069e5d0d320725a75
Filesize:
4.73 KB
suspicious functions used:
curl_exec (line:140);curl_exec (line:149); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_termination_remainder1.php-
Full path:
ap/web/cron_auto_termination_remainder1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:23 12/05/2025
Last modified:
08:31:04 01/03/2024
MD5 hash:
deffce3f05fb206fbc21ff8c1231c618
Filesize:
3.15 KB
suspicious functions used:
curl_exec (line:83); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_client_bandwidth_count.php-
Full path:
ap/web/cron_client_bandwidth_count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:23 12/05/2025
Last modified:
22:26:31 10/05/2023
MD5 hash:
6311ee19088d30f49e33f926ae390d6e
Filesize:
1.44 KB
suspicious functions used:
curl_exec (line:34); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_network.php-
Full path:
ap/web/cron_network.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
23:23:55 11/05/2025
Last modified:
22:26:31 10/05/2023
MD5 hash:
d7ae8ca3db81dce0960bb9840cb5aeee
Filesize:
4.14 KB
suspicious functions used:
curl_exec (line:41);curl_exec (line:59); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: emp_salary_advence_find.php-
Full path:
ap/web/emp_salary_advence_find.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:23 12/05/2025
Last modified:
22:26:32 10/05/2023
MD5 hash:
8cb12a79d5e1d31d92670d721dabb5aa
Filesize:
2.25 KB
suspicious functions used:
`expanse` WHERE `type` = '2' AND `status` = '2' AND ex_by = '$e_id' AND MONTH(`, `) = MONTH('$lastmonth') AND YEAR(`, `) = YEAR('$lastmonth') GROUP BY ` (line:8);`e_id` = '$e_id' AND ` (line:12); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
ap/web/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:23 12/05/2025
Last modified:
22:26:32 10/05/2023
MD5 hash:
c46a50905333286f45dfeacf010851ab
Filesize:
716 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index.php-
Full path:
ap/web/index.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
13:55:31 11/05/2025
Last modified:
23:30:11 03/10/2023
MD5 hash:
12d5242be4e4f6c007f90ba3a58d83b1
Filesize:
6.65 KB
suspicious functions used:
curl_exec (line:126); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: sms_deliverey_report.php-
Full path:
ap/web/sms_deliverey_report.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:23 12/05/2025
Last modified:
22:26:51 10/05/2023
MD5 hash:
15eda78f2292f68b63aae44e6207e0d8
Filesize:
2.96 KB
suspicious functions used:
`api_id` != '' AND `delivery_report` != 'DELIVRD' AND `delivery_report` = '' or `delivery_report` = 'SENT' or `delivery_report` = 'PENDING' AND c_cell REGEXP '^-?[0-9]+$' ORDER BY ` (line:8);curl_exec (line:18);curl_exec (line:41); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ttoken.php-
Full path:
ap/web/ttoken.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:23 12/05/2025
Last modified:
22:26:51 10/05/2023
MD5 hash:
5f2c51c1db5b0defadfb67ce25c0098f
Filesize:
1.54 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook.php-
Full path:
ap/web/webhook.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:23 12/05/2025
Last modified:
09:21:21 01/03/2024
MD5 hash:
6ea5abfa2b22d299ea68b666eaa57701
Filesize:
20.98 KB
suspicious functions used:
base64_decode (line:28);curl_exec (line:39);curl_exec (line:427); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ip-ping-checker.php-
Full path:
ap/web/ip-ping-checker.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:23 12/05/2025
Last modified:
22:26:32 10/05/2023
MD5 hash:
0d28f3053b73b3fe2885cf519ee17c12
Filesize:
2.64 KB
suspicious functions used:
curl_exec (line:81); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook_test.php-
Full path:
ap/web/webhook_test.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:23 12/05/2025
Last modified:
22:26:52 10/05/2023
MD5 hash:
74a7dcc262d7fe7f2bdc9e0595d03837
Filesize:
4.69 KB
suspicious functions used:
base64_decode (line:22);curl_exec (line:33);curl_exec (line:86);curl_exec (line:107); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec.php-
Full path:
ap/web/login_exec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
04:31:11 12/05/2025
Last modified:
06:36:20 01/03/2024
MD5 hash:
4e416b5660a99a4e53f7f7fc864be174
Filesize:
4.1 KB
suspicious functions used:
curl_exec (line:53); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec1.php-
Full path:
ap/web/login_exec1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:24 12/05/2025
Last modified:
22:26:32 10/05/2023
MD5 hash:
4f75b914e1b47a355be8cbc73e4e1407
Filesize:
3.91 KB
suspicious functions used:
curl_exec (line:53); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tagreeexpayment.php-
Full path:
ap/web/tagreeexpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:24 12/05/2025
Last modified:
22:26:51 10/05/2023
MD5 hash:
029b4fba649a75c7c81d2f8931be8d63
Filesize:
2.86 KB
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreateagree.php-
Full path:
ap/web/tcreateagree.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:24 12/05/2025
Last modified:
22:26:51 10/05/2023
MD5 hash:
27a10adf4190edc7eceee8cf74a6b72b
Filesize:
999 B
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreatepayment.php-
Full path:
ap/web/tcreatepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:24 12/05/2025
Last modified:
22:26:51 10/05/2023
MD5 hash:
e49de9a33f5164bc2c6b88e4770faaff
Filesize:
1.07 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: testttttt.php-
Full path:
ap/web/testttttt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:24 12/05/2025
Last modified:
10:27:25 04/10/2023
MD5 hash:
b1988a4be29e191ad935fb409a4174ee
Filesize:
2 KB
suspicious functions used:
curl_exec (line:47); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: texecutepayment.php-
Full path:
ap/web/texecutepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:24 12/05/2025
Last modified:
22:26:51 10/05/2023
MD5 hash:
623635fdf5c871391d3a5fe99ee8c543
Filesize:
2.91 KB
suspicious functions used:
curl_exec (line:24); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tis-news.php-
Full path:
ap/web/tis-news.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
10:50:27 12/05/2025
Last modified:
07:55:47 09/04/2024
MD5 hash:
ed23ca98b77c5321b4485e85eb2ea64d
Filesize:
3.67 KB
suspicious functions used:
curl_exec (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
ap/web/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:24 12/05/2025
Last modified:
22:26:51 10/05/2023
MD5 hash:
7d8e71ceda3ffb74623e0c4a814715af
Filesize:
1.53 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: loginexec.php-
Full path:
apk/app/loginexec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:24 12/05/2025
Last modified:
00:31:25 11/05/2025
MD5 hash:
53cae2f9f868cb8a7678795819aa6c6f
Filesize:
7.02 KB
suspicious functions used:
curl_exec (line:22);curl_exec (line:77); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: get_menu.php-
Full path:
apk/app/get_menu.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:24 12/05/2025
Last modified:
04:58:34 11/05/2025
MD5 hash:
fb36d4a2bd8dbd6b14d3d9c1e1a8c2dd
Filesize:
667 B
suspicious functions used:
`module_name` FROM module AS m WHERE m.{$user_type} in (1,2) AND m.sts = '0' AND m.id != '1' AND m.apk_sts = '1' ORDER BY ` (line:8); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: MkOnlineClientsCount.php-
Full path:
apk/app/MkOnlineClientsCount.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:24 12/05/2025
Last modified:
06:27:05 11/05/2025
MD5 hash:
de2dbf392abd427613f33dda6d5ae6e0
Filesize:
3.3 KB
suspicious functions used:
system (line:58); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: config.php-
Full path:
apk/app/config.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:24 12/05/2025
Last modified:
06:10:40 11/05/2025
MD5 hash:
be2e7d9a92bcc85d4c45fb5ba7159f2f
Filesize:
3.66 KB
suspicious functions used:
curl_exec (line:16); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-helper.php-
Full path:
asb/m/nagad-helper.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:25 12/05/2025
Last modified:
02:35:28 20/11/2024
MD5 hash:
2bb70c44d68202e0a0cd8ae1388f0b1b
Filesize:
6.74 KB
suspicious functions used:
curl_exec (line:61);base64_decode (line:97); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery2.php-
Full path:
asb/m/PaymentOnlineQuery2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:25 12/05/2025
Last modified:
02:35:29 20/11/2024
MD5 hash:
3660992067d5591fc79ce89d6dbb9274
Filesize:
19.08 KB
suspicious functions used:
curl_exec (line:41);curl_exec (line:254); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
asb/m/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:25 12/05/2025
Last modified:
02:35:30 20/11/2024
MD5 hash:
7d8e71ceda3ffb74623e0c4a814715af
Filesize:
1.53 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tagreeexpayment.php-
Full path:
asb/m/tagreeexpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:25 12/05/2025
Last modified:
02:35:30 20/11/2024
MD5 hash:
c95e3ee881752db67b4f3597bc58430a
Filesize:
2.46 KB
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ttoken.php-
Full path:
asb/m/ttoken.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:25 12/05/2025
Last modified:
02:35:30 20/11/2024
MD5 hash:
5f2c51c1db5b0defadfb67ce25c0098f
Filesize:
1.54 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
asb/m/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:25 12/05/2025
Last modified:
02:35:27 20/11/2024
MD5 hash:
849185f307be30eafb1bbef93616d8c3
Filesize:
1.71 KB
suspicious functions used:
curl_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: support-action.php-
Full path:
asb/m/support-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:26 12/05/2025
Last modified:
02:35:30 20/11/2024
MD5 hash:
2fc6fd844db911a5502a7a6ae383990f
Filesize:
10.31 KB
suspicious functions used:
curl_exec (line:99); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
asb/m/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:26 12/05/2025
Last modified:
02:35:27 20/11/2024
MD5 hash:
9a3f22521ad987e86f84c4f5f688d5b7
Filesize:
713 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index.php-
Full path:
asb/m/index.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
13:05:34 11/05/2025
Last modified:
02:35:27 20/11/2024
MD5 hash:
f5d7e6787d44240324bf05e7bff53365
Filesize:
12.49 KB
suspicious functions used:
base64_decode (line:10);curl_exec (line:183); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery.php-
Full path:
asb/m/PaymentOnlineQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:26 12/05/2025
Last modified:
02:35:29 20/11/2024
MD5 hash:
05d772ea15775c0640ac9d1ff7c7144c
Filesize:
21.13 KB
suspicious functions used:
curl_exec (line:287);curl_exec (line:512); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreateagree.php-
Full path:
asb/m/tcreateagree.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:26 12/05/2025
Last modified:
02:35:30 20/11/2024
MD5 hash:
27a10adf4190edc7eceee8cf74a6b72b
Filesize:
999 B
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec.php-
Full path:
asb/m/login_exec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:26 12/05/2025
Last modified:
02:35:27 20/11/2024
MD5 hash:
1f800365ef270564df77d30c1bfd7ed3
Filesize:
5.4 KB
suspicious functions used:
curl_exec (line:66); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec1.php-
Full path:
asb/m/login_exec1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:26 12/05/2025
Last modified:
02:35:28 20/11/2024
MD5 hash:
46b08782f51ba75b23e27183e06370fe
Filesize:
4.28 KB
suspicious functions used:
curl_exec (line:61); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-merchant-callback.php-
Full path:
asb/m/nagad-merchant-callback.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:26 12/05/2025
Last modified:
02:35:28 20/11/2024
MD5 hash:
0e6086c5260150c11249029f212ee481
Filesize:
11.36 KB
suspicious functions used:
curl_exec (line:20); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreatepayment.php-
Full path:
asb/m/tcreatepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:26 12/05/2025
Last modified:
02:35:30 20/11/2024
MD5 hash:
e49de9a33f5164bc2c6b88e4770faaff
Filesize:
1.07 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-snmp-data.php-
Full path:
asb/m/netowrk-snmp-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:26 12/05/2025
Last modified:
02:35:28 20/11/2024
MD5 hash:
45b774abc8d67efb3e4e87c93b1f618b
Filesize:
24.05 KB
suspicious functions used:
shell_exec (line:96);shell_exec (line:105);shell_exec (line:115);shell_exec (line:134);shell_exec (line:146);shell_exec (line:157);shell_exec (line:173);shell_exec (line:183);shell_exec (line:199);shell_exec (line:219);shell_exec (line:229);shell_exec (line:234);shell_exec (line:242);shell_exec (line:262);shell_exec (line:278);`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:291);shell_exec (line:297);shell_exec (line:432); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: texecutepayment.php-
Full path:
asb/m/texecutepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:26 12/05/2025
Last modified:
02:35:30 20/11/2024
MD5 hash:
efbb63dfcfdacb52dec74bffc389bbb3
Filesize:
2.67 KB
suspicious functions used:
curl_exec (line:24); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: class.phpmailer.php-
Full path:
asb/web/email/class.phpmailer.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:26 12/05/2025
Last modified:
02:36:27 20/11/2024
MD5 hash:
68468d69b47fffecc89df57e27c5a781
Filesize:
143.32 KB
suspicious functions used:
`$DKIM_private` (line:428);popen (line:1387);popen (line:1408);base64_decode (line:3410);`$mail->set('SMTPSecure', 'tls');` (line:3688);`$mail->SMTPSecure = 'tls';` (line:3690); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: class.smtp.php-
Full path:
asb/web/email/class.smtp.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:26 12/05/2025
Last modified:
02:36:27 20/11/2024
MD5 hash:
aa8478329268e5438a4469c268337a10
Filesize:
41.44 KB
suspicious functions used:
base64_decode (line:513);base64_decode (line:533); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: JSON.php-
Full path:
asb/web/inc/JSON.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:27 12/05/2025
Last modified:
02:36:32 20/11/2024
MD5 hash:
f5a34509e06231308becbe320ade9ff6
Filesize:
33.22 KB
suspicious functions used:
eval (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: jqgrid.php-
Full path:
asb/web/inc/jqgrid.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:27 12/05/2025
Last modified:
02:36:32 20/11/2024
MD5 hash:
71027a29e71e0626d8b57cbb631e6d98
Filesize:
23.92 KB
suspicious functions used:
eval (line:397); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: smsapicore.php-
Full path:
asb/web/include/smsapicore.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:54:58 12/05/2025
Last modified:
07:22:48 04/12/2024
MD5 hash:
9dfa7b1599728b5ccb0d4927f23bb8e5
Filesize:
1.4 KB
suspicious functions used:
curl_exec (line:36); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: telegramapicore.php-
Full path:
asb/web/include/telegramapicore.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
18:24:26 11/05/2025
Last modified:
02:36:33 20/11/2024
MD5 hash:
e1f2020f2a58e7b600312301697f9aca
Filesize:
3 KB
suspicious functions used:
curl_exec (line:65); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Changes.txt-
Full path:
asb/web/js/jqgrid/js/Changes.txt
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:27 12/05/2025
Last modified:
02:36:43 20/11/2024
MD5 hash:
c0a4adbc3f1c6d592cb4fa8433fee9ea
Filesize:
44.32 KB
suspicious functions used:
system (line:87); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ui.php-
Full path:
asb/web/js/tinymce/themes/advanced/skins/highcontrast/ui.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
11:34:20 12/05/2025
Last modified:
02:36:49 20/11/2024
MD5 hash:
3edaf67be8573b86686f46bbba4f058c
Filesize:
4.53 KB
suspicious functions used:
curl_exec (line:20);`bill_amount` = '0.00' WHERE bill_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY ` (line:53);`bill_amount` = '0.00', days = '0.00' WHERE entry_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY ` (line:54);`payment` WHERE `pay_date` < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND pay_amount != '0.00' ORDER BY ` (line:55);curl_exec (line:146);curl_exec (line:168); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: AutoActiveClientsCount1.php-
Full path:
asb/web/AutoActiveClientsCount1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
06:26:14 12/05/2025
Last modified:
02:35:40 20/11/2024
MD5 hash:
3b3b6186ff2d9c5abd1772e5aa02ee33
Filesize:
6.4 KB
suspicious functions used:
system (line:58); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: AutoActiveClientsCount11.php-
Full path:
asb/web/AutoActiveClientsCount11.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:28 12/05/2025
Last modified:
02:35:40 20/11/2024
MD5 hash:
a0090e4a11dd59b955a6edd549b6ef2f
Filesize:
5.85 KB
suspicious functions used:
system (line:54); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ClientsOnMap.php-
Full path:
asb/web/ClientsOnMap.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:29 12/05/2025
Last modified:
02:35:52 20/11/2024
MD5 hash:
4015c065d9a58cec28fa277a6316b574
Filesize:
12.21 KB
suspicious functions used:
`${totalonline}` (line:97);`${totaloffline}` (line:98);`${results.rxPower}` (line:233);`${results.distance}` (line:234);`${results.supplyVoltage}` (line:235);`${results.temperature}` (line:236);`${results.txPower}` (line:237); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ClientView.php-
Full path:
asb/web/ClientView.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:53:59 12/05/2025
Last modified:
02:35:53 20/11/2024
MD5 hash:
c8fbfaee3749cd70d15e7fa381d841f4
Filesize:
111.18 KB
suspicious functions used:
`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:226); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients.php-
Full path:
asb/web/Clients.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
18:41:35 11/05/2025
Last modified:
02:35:48 20/11/2024
MD5 hash:
d59f33ca457016deee5f906de3f2ca83
Filesize:
212.42 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:844); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients1.php-
Full path:
asb/web/Clients1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:30 12/05/2025
Last modified:
02:35:49 20/11/2024
MD5 hash:
a8db87dcc6beb97539ff152b767dadae
Filesize:
219.37 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:835); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients2.php-
Full path:
asb/web/Clients2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:30 12/05/2025
Last modified:
02:35:50 20/11/2024
MD5 hash:
982d6411552113b0715fd17c26f50292
Filesize:
205.13 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:832); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients3.php-
Full path:
asb/web/Clients3.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:31 12/05/2025
Last modified:
02:35:50 20/11/2024
MD5 hash:
50ddc869b383ab76e009c7a2c17c99a3
Filesize:
175.31 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:832); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: InstrumentsStoreOutDetails.php-
Full path:
asb/web/InstrumentsStoreOutDetails.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:32 12/05/2025
Last modified:
02:35:57 20/11/2024
MD5 hash:
a60c19f766bfff1ccdccbeba6b39eb87
Filesize:
9.37 KB
suspicious functions used:
`update_date`, '%D-%b, %y') AS offdate, TIME_FORMAT(`update_time`, '%T') AS offtime FROM `con_sts_log` WHERE `c_id` = '{$row['c_id']}' AND con_sts = 'Inactive' ORDER BY ` (line:120); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Network.php-
Full path:
asb/web/Network.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:32 12/05/2025
Last modified:
02:36:04 20/11/2024
MD5 hash:
a555bcd4afdc786ded6485ee9315887c
Filesize:
57.36 KB
suspicious functions used:
system (line:359);shell_exec (line:631); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Network1.php-
Full path:
asb/web/Network1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:33 12/05/2025
Last modified:
02:36:04 20/11/2024
MD5 hash:
0154c16125cee7431f537bf69c4ef811
Filesize:
44.04 KB
suspicious functions used:
system (line:295);shell_exec (line:590); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeMap.php-
Full path:
asb/web/NetworkTreeMap.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:33 12/05/2025
Last modified:
02:36:09 20/11/2024
MD5 hash:
584d02944bd9de5a190ec6dc320fc49e
Filesize:
24.24 KB
suspicious functions used:
`${results.rxPower}` (line:263);`${results.distance}` (line:264);`${results.supplyVoltage}` (line:265);`${results.temperature}` (line:266);`${results.txPower}` (line:267);`${results.rxPower}` (line:283);`${results.distance}` (line:284);`${results.supplyVoltage}` (line:285);`${results.temperature}` (line:286);`${results.txPower}` (line:287); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMSAddSave.php-
Full path:
asb/web/SMSAddSave.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:33 12/05/2025
Last modified:
04:39:44 20/11/2024
MD5 hash:
3fe8fcd49062f9f5abd4a24a6b488ebf
Filesize:
2.08 KB
suspicious functions used:
curl_exec (line:36); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMS1.php-
Full path:
asb/web/SMS1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:33 12/05/2025
Last modified:
02:36:18 20/11/2024
MD5 hash:
e4671dadf9ad575671fd3609a60030da
Filesize:
32.19 KB
suspicious functions used:
curl_exec (line:59); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkLoad.php-
Full path:
asb/web/NetworkLoad.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:33 12/05/2025
Last modified:
02:36:06 20/11/2024
MD5 hash:
e1632e66ee1b7394d3fb82751b924abe
Filesize:
2.83 KB
suspicious functions used:
system (line:81); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkLoad1.php-
Full path:
asb/web/NetworkLoad1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:33 12/05/2025
Last modified:
02:36:06 20/11/2024
MD5 hash:
176bd6931be34d7ef351d22897accc65
Filesize:
759 B
suspicious functions used:
system (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltAddQuery.php-
Full path:
asb/web/NetworkOltAddQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:33 12/05/2025
Last modified:
10:23:43 20/11/2024
MD5 hash:
7d6641eaba35e48b4ee90b9a804ac93e
Filesize:
6.46 KB
suspicious functions used:
shell_exec (line:21); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltOnuStatus.php-
Full path:
asb/web/NetworkOltOnuStatus.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:33 12/05/2025
Last modified:
02:36:06 20/11/2024
MD5 hash:
7604d17efbb57bd0b4c3566aa2d27c36
Filesize:
65.16 KB
suspicious functions used:
shell_exec (line:42);shell_exec (line:102);shell_exec (line:677);shell_exec (line:793);shell_exec (line:906); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltOnuStatus2.php-
Full path:
asb/web/NetworkOltOnuStatus2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:34 12/05/2025
Last modified:
02:36:06 20/11/2024
MD5 hash:
c9a14797fa4353d05bbd9427b6079250
Filesize:
15.88 KB
suspicious functions used:
shell_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltSense.php-
Full path:
asb/web/NetworkOltSense.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:34 12/05/2025
Last modified:
02:36:06 20/11/2024
MD5 hash:
2be664ae5006367f629ca437a6d507f8
Filesize:
18.26 KB
suspicious functions used:
`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, `last_synced`, `last_update`, `msg`, `full_msg`, ROUND((SELECT AVG(value) FROM olt_onu_history WHERE alarm_id = '$alarmId' AND value != ''), 2) AS average_value FROM `, ` WHERE `alarm_id` = '$alarmId' AND ` (line:123); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltSenseDetails.php-
Full path:
asb/web/NetworkOltSenseDetails.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:34 12/05/2025
Last modified:
02:36:06 20/11/2024
MD5 hash:
440096c601fc10b819a1f0f8330928b0
Filesize:
14.17 KB
suspicious functions used:
`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:33);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:42);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:51);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:60); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltSync.php-
Full path:
asb/web/NetworkOltSync.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:34 12/05/2025
Last modified:
02:36:06 20/11/2024
MD5 hash:
06633d4b65a14d677358170dd0a84424
Filesize:
1.87 KB
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMS.php-
Full path:
asb/web/SMS.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:34 12/05/2025
Last modified:
04:30:03 20/11/2024
MD5 hash:
d69daa8149373e2d034612f9a4006250
Filesize:
35.69 KB
suspicious functions used:
curl_exec (line:56); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery.php-
Full path:
asb/web/PaymentOnlineQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:34 12/05/2025
Last modified:
02:36:13 20/11/2024
MD5 hash:
201e1cf95b2d033897cab4bc2fd59e07
Filesize:
28.5 KB
suspicious functions used:
curl_exec (line:457);curl_exec (line:689); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeAddSave.php-
Full path:
asb/web/NetworkTreeAddSave.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:34 12/05/2025
Last modified:
23:20:50 20/11/2024
MD5 hash:
a9dbc374394f257ef79f2d4f60f9771d
Filesize:
5.12 KB
suspicious functions used:
`network_tree` WHERE `olt_id` = '$olt_id' AND ` (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery2.php-
Full path:
asb/web/PaymentOnlineQuery2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:34 12/05/2025
Last modified:
02:36:13 20/11/2024
MD5 hash:
ccd315d11a60901b7b9029ff44f8351b
Filesize:
19.4 KB
suspicious functions used:
curl_exec (line:42);curl_exec (line:252); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentWebhook.php-
Full path:
asb/web/PaymentWebhook.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:35 12/05/2025
Last modified:
02:36:13 20/11/2024
MD5 hash:
a2f322c94787630ab1e0c8ca35fc5ba1
Filesize:
18.6 KB
suspicious functions used:
base64_decode (line:30);curl_exec (line:41);curl_exec (line:422); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeEdit1.php-
Full path:
asb/web/NetworkTreeEdit1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:35 12/05/2025
Last modified:
02:36:09 20/11/2024
MD5 hash:
3396a6bdf9b5804bb208f38f37cc29a2
Filesize:
35.81 KB
suspicious functions used:
`olt_onu` WHERE olt_id = '$olt_id' AND ` (line:207); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeEditSave.php-
Full path:
asb/web/NetworkTreeEditSave.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:35 12/05/2025
Last modified:
23:20:50 20/11/2024
MD5 hash:
6c0f94f3ddde2ee6a93db1fa98971907
Filesize:
12.41 KB
suspicious functions used:
`network_tree` WHERE `olt_id` = '$olt_id' AND ` (line:182); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeList.php-
Full path:
asb/web/NetworkTreeList.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:35 12/05/2025
Last modified:
02:36:09 20/11/2024
MD5 hash:
acd468021993faf8575531952ae107f8
Filesize:
21.98 KB
suspicious functions used:
`pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '{$row['olt_id']}' AND ` (line:287); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeMap1.php-
Full path:
asb/web/NetworkTreeMap1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:35 12/05/2025
Last modified:
02:36:09 20/11/2024
MD5 hash:
31a3ae9bc0bdb18726ed860ec6e8ec97
Filesize:
36.43 KB
suspicious functions used:
`networktree_marker_data.php?tree_id=${markerId}` (line:231);`${results.rxPower}` (line:311);`${results.distance}` (line:312);`${results.supplyVoltage}` (line:313);`${results.temperature}` (line:314);`${results.txPower}` (line:315); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SignUp1.php-
Full path:
asb/web/SignUp1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:35 12/05/2025
Last modified:
02:36:18 20/11/2024
MD5 hash:
3f7943dd155c8e0a383b7d02730f8c11
Filesize:
24.59 KB
suspicious functions used:
curl_exec (line:33);curl_exec (line:59); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_client_bandwidth_count.php-
Full path:
asb/web/cron_client_bandwidth_count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
00:03:41 12/05/2025
Last modified:
02:35:54 20/11/2024
MD5 hash:
1c71a3dd097275429ae845a85ced0438
Filesize:
5.33 KB
suspicious functions used:
curl_exec (line:124);curl_exec (line:134); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_olt.php-
Full path:
asb/web/cron_olt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
18:16:07 11/05/2025
Last modified:
02:35:54 20/11/2024
MD5 hash:
6975951fdbf566164ba5fa5cfcd32ec7
Filesize:
4.27 KB
suspicious functions used:
shell_exec (line:48);curl_exec (line:127); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: client-online-mbb.php-
Full path:
asb/web/client-online-mbb.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:37 12/05/2025
Last modified:
02:35:45 20/11/2024
MD5 hash:
69c51efb5b9017a07a7158b4a63f3826
Filesize:
14.32 KB
suspicious functions used:
curl_exec (line:90); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_network.php-
Full path:
asb/web/cron_network.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
08:42:38 12/05/2025
Last modified:
02:35:54 20/11/2024
MD5 hash:
db096f353e80027593ca3f9781a21ac8
Filesize:
4.93 KB
suspicious functions used:
curl_exec (line:45);curl_exec (line:67);curl_exec (line:127); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_olt_clients_catch.php-
Full path:
asb/web/cron_olt_clients_catch.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:37 12/05/2025
Last modified:
02:35:54 20/11/2024
MD5 hash:
3b13c163ba3445b3d661c63adde1d985
Filesize:
1.12 KB
suspicious functions used:
curl_exec (line:23); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: clients-nots-action.php-
Full path:
asb/web/clients-nots-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:37 12/05/2025
Last modified:
02:35:47 20/11/2024
MD5 hash:
dff1bb495509427d098cb4588da553b9
Filesize:
5.89 KB
suspicious functions used:
curl_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: company_info.php-
Full path:
asb/web/company_info.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
10:22:39 12/05/2025
Last modified:
02:35:53 20/11/2024
MD5 hash:
e612d58aa2e38f5b49ba37c1bf620ece
Filesize:
8.38 KB
suspicious functions used:
curl_exec (line:130); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
asb/web/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:37 12/05/2025
Last modified:
02:35:53 20/11/2024
MD5 hash:
ba9747d0421fd091b998389469e72a0b
Filesize:
1.7 KB
suspicious functions used:
curl_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_all.php-
Full path:
asb/web/cron_all.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:37 12/05/2025
Last modified:
02:35:53 20/11/2024
MD5 hash:
967f1d654ae891609da26b9e0fdbd1ae
Filesize:
2.44 KB
suspicious functions used:
curl_exec (line:23);curl_exec (line:38);curl_exec (line:53); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_gen_bill.php-
Full path:
asb/web/cron_auto_gen_bill.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:37 12/05/2025
Last modified:
02:35:53 20/11/2024
MD5 hash:
f1056618cc4402968e50d1232d2c51c8
Filesize:
4.73 KB
suspicious functions used:
curl_exec (line:140);curl_exec (line:149); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_olt_user.php-
Full path:
asb/web/cron_olt_user.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:37 12/05/2025
Last modified:
02:35:54 20/11/2024
MD5 hash:
67aa237639e3d1e6064e76079bb3cccc
Filesize:
1.97 KB
suspicious functions used:
curl_exec (line:19);curl_exec (line:46); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive.php-
Full path:
asb/web/cron_auto_inactive.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
17:40:01 11/05/2025
Last modified:
07:27:13 04/12/2024
MD5 hash:
cf3a14040de8d8b0fcfa84b39625357c
Filesize:
6.6 KB
suspicious functions used:
`id`) AS payment_count FROM `payment` WHERE `c_id` = '$c_idd' AND month(`, `) = month('$update_date') AND year(` (line:50);system (line:149);curl_exec (line:172); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive1.php-
Full path:
asb/web/cron_auto_inactive1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:37 12/05/2025
Last modified:
02:35:54 20/11/2024
MD5 hash:
9ecc7a4271348740944ba32deb869e96
Filesize:
5.71 KB
suspicious functions used:
`id`) AS payment_count FROM `payment` WHERE `c_id` = '$c_idd' AND month(`, `) = month('$update_date') AND year(` (line:49);curl_exec (line:144); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive_termination.php-
Full path:
asb/web/cron_auto_inactive_termination.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
18:20:14 11/05/2025
Last modified:
02:35:54 20/11/2024
MD5 hash:
9f9c8ca9110c2304128646824bfb17db
Filesize:
12.16 KB
suspicious functions used:
curl_exec (line:241);curl_exec (line:253); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive_termination1.php-
Full path:
asb/web/cron_auto_inactive_termination1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:37 12/05/2025
Last modified:
02:35:54 20/11/2024
MD5 hash:
be76b964c93a2cb4fa7e632750ff3bc4
Filesize:
6.64 KB
suspicious functions used:
curl_exec (line:156);curl_exec (line:168); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-olt-all-mac-array.php-
Full path:
asb/web/netowrk-olt-all-mac-array.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:37 12/05/2025
Last modified:
02:36:03 20/11/2024
MD5 hash:
b0168ce99145e2afe64357247d750dd6
Filesize:
4.62 KB
suspicious functions used:
shell_exec (line:33);shell_exec (line:47);shell_exec (line:61);shell_exec (line:76);shell_exec (line:93); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_termination_remainder1.php-
Full path:
asb/web/cron_auto_termination_remainder1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
03:06:30 12/05/2025
Last modified:
02:35:54 20/11/2024
MD5 hash:
7765f9f820dbd402f1064fab9958ffaa
Filesize:
3.26 KB
suspicious functions used:
curl_exec (line:83); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: testttttt.php-
Full path:
asb/web/testttttt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:37 12/05/2025
Last modified:
02:36:21 20/11/2024
MD5 hash:
b1988a4be29e191ad935fb409a4174ee
Filesize:
2 KB
suspicious functions used:
curl_exec (line:47); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: emp_salary_advence_find.php-
Full path:
asb/web/emp_salary_advence_find.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:37 12/05/2025
Last modified:
02:35:55 20/11/2024
MD5 hash:
74a7e2ffda0f7584611d7cbce6136c24
Filesize:
2.25 KB
suspicious functions used:
`expanse` WHERE `type` = '2' AND `status` = '2' AND ex_by = '$e_id' AND MONTH(`, `) = MONTH('$lastmonth') AND YEAR(`, `) = YEAR('$lastmonth') GROUP BY ` (line:8);`e_id` = '$e_id' AND ` (line:12); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
asb/web/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:37 12/05/2025
Last modified:
02:35:55 20/11/2024
MD5 hash:
c46a50905333286f45dfeacf010851ab
Filesize:
716 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-helper.php-
Full path:
asb/web/nagad-helper.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:37 12/05/2025
Last modified:
02:36:02 20/11/2024
MD5 hash:
2bb70c44d68202e0a0cd8ae1388f0b1b
Filesize:
6.74 KB
suspicious functions used:
curl_exec (line:61);base64_decode (line:97); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-merchant-callback.php-
Full path:
asb/web/nagad-merchant-callback.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:37 12/05/2025
Last modified:
02:36:03 20/11/2024
MD5 hash:
abc8d9e7aad4d9c622dcd97e701448bc
Filesize:
16.5 KB
suspicious functions used:
curl_exec (line:20); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: getclientuptime.php-
Full path:
asb/web/getclientuptime.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:37 12/05/2025
Last modified:
02:35:56 20/11/2024
MD5 hash:
bbc14cdd451c72b94d78c7d2d1af0b52
Filesize:
718 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-snmp-data.php-
Full path:
asb/web/netowrk-snmp-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
13:40:11 11/05/2025
Last modified:
02:36:03 20/11/2024
MD5 hash:
9badf5c53b260315a061e1bb6cd2378f
Filesize:
24.8 KB
suspicious functions used:
shell_exec (line:104);shell_exec (line:113);shell_exec (line:123);shell_exec (line:142);shell_exec (line:154);shell_exec (line:165);shell_exec (line:181);shell_exec (line:191);shell_exec (line:207);shell_exec (line:227);shell_exec (line:236);shell_exec (line:244);shell_exec (line:251);shell_exec (line:256);`pon_name` FROM `olt_pon` WHERE `olt_pon_id` = '$pon_id' AND ` (line:263);shell_exec (line:280);shell_exec (line:290);`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:303);shell_exec (line:309);shell_exec (line:444); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-old-onu-rx-map.php-
Full path:
asb/web/network-old-onu-rx-map.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:37 12/05/2025
Last modified:
02:36:03 20/11/2024
MD5 hash:
b4962c160c5ad68ccd8eed9c48d82a0f
Filesize:
6.94 KB
suspicious functions used:
shell_exec (line:76); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-old-onu-rx.php-
Full path:
asb/web/network-old-onu-rx.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:37 12/05/2025
Last modified:
02:36:03 20/11/2024
MD5 hash:
b4962c160c5ad68ccd8eed9c48d82a0f
Filesize:
6.94 KB
suspicious functions used:
shell_exec (line:76); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: imagevwr.php-
Full path:
asb/web/imagevwr.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
15:43:47 11/05/2025
Last modified:
02:35:57 20/11/2024
MD5 hash:
47a223a13cc642d01dcfaaca542d396d
Filesize:
915 B
suspicious functions used:
curl_exec (line:15); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: texecutepayment.php-
Full path:
asb/web/texecutepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:37 12/05/2025
Last modified:
02:36:21 20/11/2024
MD5 hash:
623635fdf5c871391d3a5fe99ee8c543
Filesize:
2.91 KB
suspicious functions used:
curl_exec (line:24); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index.php-
Full path:
asb/web/index.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
13:24:25 11/05/2025
Last modified:
02:35:57 20/11/2024
MD5 hash:
f161ab23adf4527023a0ad582d478f89
Filesize:
12.45 KB
suspicious functions used:
base64_decode (line:10);curl_exec (line:183); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ip-ping-checker.php-
Full path:
asb/web/ip-ping-checker.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:37 12/05/2025
Last modified:
02:35:58 20/11/2024
MD5 hash:
0d28f3053b73b3fe2885cf519ee17c12
Filesize:
2.64 KB
suspicious functions used:
curl_exec (line:81); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook_test.php-
Full path:
asb/web/webhook_test.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:37 12/05/2025
Last modified:
02:36:23 20/11/2024
MD5 hash:
74a7dcc262d7fe7f2bdc9e0595d03837
Filesize:
4.69 KB
suspicious functions used:
base64_decode (line:22);curl_exec (line:33);curl_exec (line:86);curl_exec (line:107); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec.php-
Full path:
asb/web/login_exec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
13:27:00 11/05/2025
Last modified:
02:35:58 20/11/2024
MD5 hash:
9038a77a32a5db2c9affae1496473f3e
Filesize:
5.27 KB
suspicious functions used:
curl_exec (line:62); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: loginexec.php-
Full path:
asb/web/loginexec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:37 12/05/2025
Last modified:
02:35:58 20/11/2024
MD5 hash:
edb8017e7d0f8e037facbcacc94a383d
Filesize:
5.91 KB
suspicious functions used:
curl_exec (line:67); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-count-cdata.php-
Full path:
asb/web/network-olt-client-onu-mac-count-cdata.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:38 12/05/2025
Last modified:
02:36:03 20/11/2024
MD5 hash:
c378dbabf36066c335cfb8838a6e167d
Filesize:
4.58 KB
suspicious functions used:
shell_exec (line:25);shell_exec (line:35);shell_exec (line:56);shell_exec (line:103);shell_exec (line:115);shell_exec (line:126);shell_exec (line:140); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test6.php-
Full path:
asb/web/test6.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:38 12/05/2025
Last modified:
02:36:21 20/11/2024
MD5 hash:
f22d022ddc284f4d8e1de3660da91db8
Filesize:
15.61 KB
suspicious functions used:
shell_exec (line:34);shell_exec (line:113);shell_exec (line:126);shell_exec (line:132); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-count.php-
Full path:
asb/web/network-olt-client-onu-mac-count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:38 12/05/2025
Last modified:
02:36:03 20/11/2024
MD5 hash:
300ca68aa5a7a32160838b9f2627d2aa
Filesize:
14.56 KB
suspicious functions used:
shell_exec (line:26);shell_exec (line:36);shell_exec (line:68);shell_exec (line:84);shell_exec (line:101);shell_exec (line:119);shell_exec (line:135);shell_exec (line:176);shell_exec (line:236);shell_exec (line:312);shell_exec (line:379);shell_exec (line:441);shell_exec (line:460);shell_exec (line:479); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tis-news.php-
Full path:
asb/web/tis-news.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:38 12/05/2025
Last modified:
02:36:21 20/11/2024
MD5 hash:
ed23ca98b77c5321b4485e85eb2ea64d
Filesize:
3.67 KB
suspicious functions used:
curl_exec (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-countt.php-
Full path:
asb/web/network-olt-client-onu-mac-countt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:38 12/05/2025
Last modified:
02:36:03 20/11/2024
MD5 hash:
d29b4e72c375f528b769bd3894f9f0e7
Filesize:
8.95 KB
suspicious functions used:
shell_exec (line:26);shell_exec (line:36);shell_exec (line:59);shell_exec (line:75);shell_exec (line:92);shell_exec (line:102);shell_exec (line:117);shell_exec (line:155);shell_exec (line:206);shell_exec (line:262);shell_exec (line:275);shell_exec (line:288); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
asb/web/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:38 12/05/2025
Last modified:
02:36:21 20/11/2024
MD5 hash:
7d8e71ceda3ffb74623e0c4a814715af
Filesize:
1.53 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-con-sts.php-
Full path:
asb/web/network-olt-con-sts.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:38 12/05/2025
Last modified:
02:36:03 20/11/2024
MD5 hash:
a26b0a1c1567c34c9aa5e2e0254ff8a6
Filesize:
4 KB
suspicious functions used:
`olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:10);shell_exec (line:38);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, `last_synced`, `last_update`, `msg`, `full_msg`, ROUND((SELECT AVG(value) FROM olt_onu_history WHERE alarm_id = '$alarmId' AND value != ''), 2) AS average_value FROM `, ` WHERE `alarm_id` = '$alarmId' AND ` (line:82); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test2.php-
Full path:
asb/web/test2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:38 12/05/2025
Last modified:
02:36:21 20/11/2024
MD5 hash:
ab80d92ede21b7da59bfefb325484297
Filesize:
13.76 KB
suspicious functions used:
shell_exec (line:59);shell_exec (line:70);shell_exec (line:76);shell_exec (line:88);shell_exec (line:101);shell_exec (line:141);curl_exec (line:187);curl_exec (line:212);curl_exec (line:354); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-load.php-
Full path:
asb/web/network-olt-load.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:38 12/05/2025
Last modified:
02:36:03 20/11/2024
MD5 hash:
f49d5153285c639ed91d4e806685ee56
Filesize:
1.33 KB
suspicious functions used:
shell_exec (line:22);shell_exec (line:25); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tt.php-
Full path:
asb/web/tt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:38 12/05/2025
Last modified:
02:36:21 20/11/2024
MD5 hash:
9c4ed141cb79fdc7e807b35923c91a20
Filesize:
1.56 KB
suspicious functions used:
curl_exec (line:30); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-oid-check.php-
Full path:
asb/web/network-olt-oid-check.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:38 12/05/2025
Last modified:
02:36:03 20/11/2024
MD5 hash:
5b7dc0ce1103fbfc895873c250b63141
Filesize:
1.88 KB
suspicious functions used:
shell_exec (line:33); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-alarm-add.php-
Full path:
asb/web/network-olt-onu-alarm-add.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:38 12/05/2025
Last modified:
02:36:03 20/11/2024
MD5 hash:
be6ba82c658419e1454f778e20e2d4c3
Filesize:
7.86 KB
suspicious functions used:
shell_exec (line:103); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: support-action.php-
Full path:
asb/web/support-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:38 12/05/2025
Last modified:
02:36:20 20/11/2024
MD5 hash:
58556808f93f52486b2ad06998142aa9
Filesize:
14.56 KB
suspicious functions used:
curl_exec (line:220); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-count.php-
Full path:
asb/web/network-olt-onu-count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:38 12/05/2025
Last modified:
02:36:03 20/11/2024
MD5 hash:
67dd698e92e750fe16906b88b074cb88
Filesize:
5.18 KB
suspicious functions used:
`olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:11);shell_exec (line:65); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ttoken.php-
Full path:
asb/web/ttoken.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:38 12/05/2025
Last modified:
02:36:21 20/11/2024
MD5 hash:
5f2c51c1db5b0defadfb67ce25c0098f
Filesize:
1.54 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-list-data.php-
Full path:
asb/web/network-olt-onu-list-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:38 12/05/2025
Last modified:
02:36:03 20/11/2024
MD5 hash:
54cc9417c766c31317311c3722ce7d4b
Filesize:
9.48 KB
suspicious functions used:
shell_exec (line:24);shell_exec (line:38);shell_exec (line:64);shell_exec (line:85);shell_exec (line:104);shell_exec (line:125);shell_exec (line:143);shell_exec (line:153);shell_exec (line:165);shell_exec (line:185); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-power.php-
Full path:
asb/web/network-olt-onu-power.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:38 12/05/2025
Last modified:
02:36:03 20/11/2024
MD5 hash:
2e064543b67b532bdf4e5b12d49c5052
Filesize:
7.54 KB
suspicious functions used:
shell_exec (line:97); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-clients-search.php-
Full path:
asb/web/network-olt-pon-clients-search.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:38 12/05/2025
Last modified:
02:36:03 20/11/2024
MD5 hash:
79d26fc66abdab6f173330588aa8b238
Filesize:
10.93 KB
suspicious functions used:
shell_exec (line:42);shell_exec (line:51);shell_exec (line:104);shell_exec (line:168); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook.php-
Full path:
asb/web/webhook.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
17:44:49 11/05/2025
Last modified:
02:36:23 20/11/2024
MD5 hash:
26e2059a39281031d28874b51b52d60c
Filesize:
21.23 KB
suspicious functions used:
base64_decode (line:27);curl_exec (line:38);curl_exec (line:454); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search-bdcom.php-
Full path:
asb/web/network-olt-pon-onu-search-bdcom.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:38 12/05/2025
Last modified:
02:36:03 20/11/2024
MD5 hash:
c786fa8b69268c738b6ff976631798cd
Filesize:
27.74 KB
suspicious functions used:
shell_exec (line:60);shell_exec (line:69);shell_exec (line:383); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_type.php-
Full path:
asb/web/networktree_device_type.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:38 12/05/2025
Last modified:
23:20:50 20/11/2024
MD5 hash:
f1520732e5a3ef38564238a3278a1f63
Filesize:
11.43 KB
suspicious functions used:
`tree_id`) AS countolt FROM `network_tree` WHERE `olt_id` = '$olt_id_sure' AND ` (line:64); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook2.php-
Full path:
asb/web/webhook2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:38 12/05/2025
Last modified:
02:36:23 20/11/2024
MD5 hash:
18c8353c99f0ca2645c68685e40c568b
Filesize:
21.1 KB
suspicious functions used:
base64_decode (line:28);curl_exec (line:39);curl_exec (line:429); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search-bdcom1.php-
Full path:
asb/web/network-olt-pon-onu-search-bdcom1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:38 12/05/2025
Last modified:
02:36:03 20/11/2024
MD5 hash:
dd18677b1dcbf7f0bce2ac6912d98da0
Filesize:
9.6 KB
suspicious functions used:
shell_exec (line:42);shell_exec (line:51);shell_exec (line:129); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search.php-
Full path:
asb/web/network-olt-pon-onu-search.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:38 12/05/2025
Last modified:
02:36:04 20/11/2024
MD5 hash:
dc183ecf77d0e1f56f672338fd09cfa5
Filesize:
21.62 KB
suspicious functions used:
shell_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data-bdcom.php-
Full path:
asb/web/network-snmp-onu-status-data-bdcom.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:38 12/05/2025
Last modified:
02:36:04 20/11/2024
MD5 hash:
065f5e2b05932ee66d473135998580ac
Filesize:
23.53 KB
suspicious functions used:
shell_exec (line:48);shell_exec (line:73);shell_exec (line:85);shell_exec (line:103);shell_exec (line:116);shell_exec (line:128);shell_exec (line:134);shell_exec (line:159);shell_exec (line:172);shell_exec (line:184);shell_exec (line:190);shell_exec (line:217);shell_exec (line:233);shell_exec (line:239);shell_exec (line:244);shell_exec (line:248);`pon_name` FROM `olt_pon` WHERE `olt_pon_id` = '$ponn_id' AND ` (line:255);shell_exec (line:263); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data.php-
Full path:
asb/web/network-snmp-onu-status-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:38 12/05/2025
Last modified:
02:36:04 20/11/2024
MD5 hash:
0adfee384bf349b50f11036947fd2a74
Filesize:
30.37 KB
suspicious functions used:
shell_exec (line:38);`olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:42);shell_exec (line:81);shell_exec (line:95);shell_exec (line:109);shell_exec (line:122);shell_exec (line:208);shell_exec (line:429);shell_exec (line:441);shell_exec (line:448); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data1.php-
Full path:
asb/web/network-snmp-onu-status-data1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:39 12/05/2025
Last modified:
02:36:04 20/11/2024
MD5 hash:
920bd1a592c36f7a1194b737642f8340
Filesize:
15.96 KB
suspicious functions used:
shell_exec (line:33);`olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:37);shell_exec (line:149); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data_vsol2.php-
Full path:
asb/web/network-snmp-onu-status-data_vsol2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:39 12/05/2025
Last modified:
02:36:04 20/11/2024
MD5 hash:
f22d022ddc284f4d8e1de3660da91db8
Filesize:
15.61 KB
suspicious functions used:
shell_exec (line:34);shell_exec (line:113);shell_exec (line:126);shell_exec (line:132); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tagreeexpayment.php-
Full path:
asb/web/tagreeexpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:39 12/05/2025
Last modified:
02:36:20 20/11/2024
MD5 hash:
029b4fba649a75c7c81d2f8931be8d63
Filesize:
2.86 KB
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreateagree.php-
Full path:
asb/web/tcreateagree.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:39 12/05/2025
Last modified:
02:36:20 20/11/2024
MD5 hash:
27a10adf4190edc7eceee8cf74a6b72b
Filesize:
999 B
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreatepayment.php-
Full path:
asb/web/tcreatepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:39 12/05/2025
Last modified:
02:36:20 20/11/2024
MD5 hash:
e49de9a33f5164bc2c6b88e4770faaff
Filesize:
1.07 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-tree-vartual-nodes.php-
Full path:
asb/web/network-tree-vartual-nodes.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:39 12/05/2025
Last modified:
02:36:04 20/11/2024
MD5 hash:
3530b8bc3113544014b1746ecd67e834
Filesize:
10.64 KB
suspicious functions used:
shell_exec (line:76);shell_exec (line:111);shell_exec (line:145);shell_exec (line:181);shell_exec (line:188); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test7.php-
Full path:
asb/web/test7.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:39 12/05/2025
Last modified:
02:36:21 20/11/2024
MD5 hash:
b11ccf951ce63a21ea0a7328316a0e5c
Filesize:
1.57 KB
suspicious functions used:
curl_exec (line:14); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree-olt-onu-list-data.php-
Full path:
asb/web/networktree-olt-onu-list-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:39 12/05/2025
Last modified:
02:36:07 20/11/2024
MD5 hash:
af4221fefa9c9051846a063ac4135560
Filesize:
8.72 KB
suspicious functions used:
shell_exec (line:24);shell_exec (line:36);shell_exec (line:59);shell_exec (line:78);shell_exec (line:97);shell_exec (line:116);shell_exec (line:134);shell_exec (line:143);shell_exec (line:155);shell_exec (line:175); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_onu_list_add.php-
Full path:
asb/web/networktree_device_onu_list_add.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:39 12/05/2025
Last modified:
02:36:09 20/11/2024
MD5 hash:
444ccf3c3e852a5a25cc4ccd3a5cf9ca
Filesize:
14.66 KB
suspicious functions used:
`network_tree` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND device_type = '5' AND ` (line:9);shell_exec (line:33);`network_tree` WHERE `onu_mac` = '$mac_address' AND ` (line:131);shell_exec (line:179);shell_exec (line:187);shell_exec (line:235);`network_tree` WHERE `onu_mac` = '$onuMac' AND ` (line:301); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: sms-balance-check.php-
Full path:
asb/web/sms-balance-check.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:39 12/05/2025
Last modified:
02:36:18 20/11/2024
MD5 hash:
74ac3e963a0dc5bb7d4c980e594aa39b
Filesize:
854 B
suspicious functions used:
curl_exec (line:15); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_pon_check.php-
Full path:
asb/web/networktree_device_pon_check.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:39 12/05/2025
Last modified:
02:36:09 20/11/2024
MD5 hash:
708a93aadcae96ecf0aaca52041fcf38
Filesize:
1.53 KB
suspicious functions used:
`pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '$olt_id' AND ` (line:8); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: sms_deliverey_report.php-
Full path:
asb/web/sms_deliverey_report.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:39 12/05/2025
Last modified:
02:36:19 20/11/2024
MD5 hash:
03623943da7e9334e137b38c8577fc84
Filesize:
4.25 KB
suspicious functions used:
curl_exec (line:28);curl_exec (line:53);curl_exec (line:90); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_pon_list_add.php-
Full path:
asb/web/networktree_device_pon_list_add.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:39 12/05/2025
Last modified:
02:36:09 20/11/2024
MD5 hash:
2ec03912801e4749c2e9cd361417ca5f
Filesize:
1.36 KB
suspicious functions used:
`olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:6);`olt_pon` WHERE `olt_id` = '$olt_id' AND ` (line:10);`network_tree` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND ` (line:17); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_pon_port_onu_list.php-
Full path:
asb/web/networktree_device_pon_port_onu_list.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:39 12/05/2025
Last modified:
02:36:09 20/11/2024
MD5 hash:
9c63b3ac69996628f5eb2959a9eb4e15
Filesize:
8.65 KB
suspicious functions used:
`olt_pon` WHERE olt_id = '$olt_id' AND ` (line:25);shell_exec (line:32);shell_exec (line:45);`network_tree` WHERE onu_index_id = '$port_onu_index_id' AND ` (line:49);shell_exec (line:81);shell_exec (line:103);shell_exec (line:122);shell_exec (line:143);shell_exec (line:161);shell_exec (line:170);shell_exec (line:184); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_pon_port_sense_list.php-
Full path:
asb/web/networktree_device_pon_port_sense_list.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:39 12/05/2025
Last modified:
02:36:09 20/11/2024
MD5 hash:
ee69cd5cc122f8aa37d8d8e5c74def6b
Filesize:
3.65 KB
suspicious functions used:
`network_tree` WHERE `onu_mac` = '$onu_mac' AND ` (line:26);`network_tree` WHERE `c_id` = '{$dfhbdxf}' AND ` (line:71); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: AutoActiveClientsCount1.php-
Full path:
at/web/AutoActiveClientsCount1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
14:03:47 11/05/2025
Last modified:
01:15:38 10/12/2024
MD5 hash:
3b3b6186ff2d9c5abd1772e5aa02ee33
Filesize:
6.4 KB
suspicious functions used:
system (line:58); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: AutoActiveClientsCount11.php-
Full path:
at/web/AutoActiveClientsCount11.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:39 12/05/2025
Last modified:
01:15:38 10/12/2024
MD5 hash:
a0090e4a11dd59b955a6edd549b6ef2f
Filesize:
5.85 KB
suspicious functions used:
system (line:54); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: client-online-mbb.php-
Full path:
at/web/client-online-mbb.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:40 12/05/2025
Last modified:
01:15:43 10/12/2024
MD5 hash:
e16c33ab6ddd7649ea56a7d5355365b6
Filesize:
16.46 KB
suspicious functions used:
curl_exec (line:90);curl_exec (line:289); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: clients-nots-action.php-
Full path:
at/web/clients-nots-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:41 12/05/2025
Last modified:
01:15:47 10/12/2024
MD5 hash:
dff1bb495509427d098cb4588da553b9
Filesize:
5.89 KB
suspicious functions used:
curl_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients.php-
Full path:
at/web/Clients.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
04:52:17 12/05/2025
Last modified:
01:15:48 10/12/2024
MD5 hash:
d59f33ca457016deee5f906de3f2ca83
Filesize:
212.42 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:844); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients1.php-
Full path:
at/web/Clients1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:41 12/05/2025
Last modified:
01:15:49 10/12/2024
MD5 hash:
a8db87dcc6beb97539ff152b767dadae
Filesize:
219.37 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:835); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients2.php-
Full path:
at/web/Clients2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:41 12/05/2025
Last modified:
01:15:51 10/12/2024
MD5 hash:
982d6411552113b0715fd17c26f50292
Filesize:
205.13 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:832); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients3.php-
Full path:
at/web/Clients3.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:42 12/05/2025
Last modified:
01:15:51 10/12/2024
MD5 hash:
50ddc869b383ab76e009c7a2c17c99a3
Filesize:
175.31 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:832); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ClientsOnMap.php-
Full path:
at/web/ClientsOnMap.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:42 12/05/2025
Last modified:
01:15:54 10/12/2024
MD5 hash:
4015c065d9a58cec28fa277a6316b574
Filesize:
12.21 KB
suspicious functions used:
`${totalonline}` (line:97);`${totaloffline}` (line:98);`${results.rxPower}` (line:233);`${results.distance}` (line:234);`${results.supplyVoltage}` (line:235);`${results.temperature}` (line:236);`${results.txPower}` (line:237); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ClientView.php-
Full path:
at/web/ClientView.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:26:04 12/05/2025
Last modified:
01:15:55 10/12/2024
MD5 hash:
fd3851e3989fa9ae1655ed1acb19eac9
Filesize:
112.28 KB
suspicious functions used:
`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:226); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: company_info.php-
Full path:
at/web/company_info.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
04:51:05 12/05/2025
Last modified:
01:15:56 10/12/2024
MD5 hash:
e612d58aa2e38f5b49ba37c1bf620ece
Filesize:
8.38 KB
suspicious functions used:
curl_exec (line:130); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
at/web/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:43 12/05/2025
Last modified:
01:15:56 10/12/2024
MD5 hash:
ba9747d0421fd091b998389469e72a0b
Filesize:
1.7 KB
suspicious functions used:
curl_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_all.php-
Full path:
at/web/cron_all.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:43 12/05/2025
Last modified:
01:15:56 10/12/2024
MD5 hash:
967f1d654ae891609da26b9e0fdbd1ae
Filesize:
2.44 KB
suspicious functions used:
curl_exec (line:23);curl_exec (line:38);curl_exec (line:53); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_gen_bill.php-
Full path:
at/web/cron_auto_gen_bill.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:43 12/05/2025
Last modified:
01:15:56 10/12/2024
MD5 hash:
f1056618cc4402968e50d1232d2c51c8
Filesize:
4.73 KB
suspicious functions used:
curl_exec (line:140);curl_exec (line:149); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive.php-
Full path:
at/web/cron_auto_inactive.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
05:00:02 12/05/2025
Last modified:
03:22:11 10/12/2024
MD5 hash:
7e0dc4dd9dae2bf0220516641b53c027
Filesize:
5.43 KB
suspicious functions used:
curl_exec (line:142); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive2.php-
Full path:
at/web/cron_auto_inactive2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:43 12/05/2025
Last modified:
01:15:56 10/12/2024
MD5 hash:
440bc24f05b01eb395df63fff2f60de9
Filesize:
5.46 KB
suspicious functions used:
curl_exec (line:142); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive_termination.php-
Full path:
at/web/cron_auto_inactive_termination.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
18:55:16 11/05/2025
Last modified:
01:15:56 10/12/2024
MD5 hash:
9f9c8ca9110c2304128646824bfb17db
Filesize:
12.16 KB
suspicious functions used:
curl_exec (line:241);curl_exec (line:253); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive_termination1.php-
Full path:
at/web/cron_auto_inactive_termination1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:43 12/05/2025
Last modified:
01:15:56 10/12/2024
MD5 hash:
be76b964c93a2cb4fa7e632750ff3bc4
Filesize:
6.64 KB
suspicious functions used:
curl_exec (line:156);curl_exec (line:168); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_termination_remainder1.php-
Full path:
at/web/cron_auto_termination_remainder1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
03:07:11 12/05/2025
Last modified:
01:15:56 10/12/2024
MD5 hash:
7765f9f820dbd402f1064fab9958ffaa
Filesize:
3.26 KB
suspicious functions used:
curl_exec (line:83); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_client_bandwidth_count.php-
Full path:
at/web/cron_client_bandwidth_count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:39:06 12/05/2025
Last modified:
01:15:56 10/12/2024
MD5 hash:
1c71a3dd097275429ae845a85ced0438
Filesize:
5.33 KB
suspicious functions used:
curl_exec (line:124);curl_exec (line:134); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_network.php-
Full path:
at/web/cron_network.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
18:24:33 11/05/2025
Last modified:
01:15:56 10/12/2024
MD5 hash:
db096f353e80027593ca3f9781a21ac8
Filesize:
4.93 KB
suspicious functions used:
curl_exec (line:45);curl_exec (line:67);curl_exec (line:127); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_olt.php-
Full path:
at/web/cron_olt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:43 12/05/2025
Last modified:
01:15:56 10/12/2024
MD5 hash:
6975951fdbf566164ba5fa5cfcd32ec7
Filesize:
4.27 KB
suspicious functions used:
shell_exec (line:48);curl_exec (line:127); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_olt_clients_catch.php-
Full path:
at/web/cron_olt_clients_catch.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:43 12/05/2025
Last modified:
01:15:56 10/12/2024
MD5 hash:
3b13c163ba3445b3d661c63adde1d985
Filesize:
1.12 KB
suspicious functions used:
curl_exec (line:23); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_olt_user.php-
Full path:
at/web/cron_olt_user.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:43 12/05/2025
Last modified:
01:15:56 10/12/2024
MD5 hash:
67aa237639e3d1e6064e76079bb3cccc
Filesize:
1.97 KB
suspicious functions used:
curl_exec (line:19);curl_exec (line:46); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: emp_salary_advence_find.php-
Full path:
at/web/emp_salary_advence_find.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:43 12/05/2025
Last modified:
01:15:57 10/12/2024
MD5 hash:
74a7e2ffda0f7584611d7cbce6136c24
Filesize:
2.25 KB
suspicious functions used:
`expanse` WHERE `type` = '2' AND `status` = '2' AND ex_by = '$e_id' AND MONTH(`, `) = MONTH('$lastmonth') AND YEAR(`, `) = YEAR('$lastmonth') GROUP BY ` (line:8);`e_id` = '$e_id' AND ` (line:12); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
at/web/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:43 12/05/2025
Last modified:
01:15:57 10/12/2024
MD5 hash:
c46a50905333286f45dfeacf010851ab
Filesize:
716 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: getclientuptime.php-
Full path:
at/web/getclientuptime.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:43 12/05/2025
Last modified:
01:16:00 10/12/2024
MD5 hash:
bbc14cdd451c72b94d78c7d2d1af0b52
Filesize:
718 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: imagevwr.php-
Full path:
at/web/imagevwr.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:43 12/05/2025
Last modified:
01:16:00 10/12/2024
MD5 hash:
47a223a13cc642d01dcfaaca542d396d
Filesize:
915 B
suspicious functions used:
curl_exec (line:15); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index.php-
Full path:
at/web/index.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
18:15:12 11/05/2025
Last modified:
06:28:59 11/12/2024
MD5 hash:
f161ab23adf4527023a0ad582d478f89
Filesize:
12.45 KB
suspicious functions used:
base64_decode (line:10);curl_exec (line:183); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index2.php-
Full path:
at/web/index2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:43 12/05/2025
Last modified:
01:16:00 10/12/2024
MD5 hash:
8a294c29885d611c0ef21d4b361af210
Filesize:
13.82 KB
suspicious functions used:
base64_decode (line:8);curl_exec (line:218); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: InstrumentsStoreOutDetails.php-
Full path:
at/web/InstrumentsStoreOutDetails.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:43 12/05/2025
Last modified:
01:16:00 10/12/2024
MD5 hash:
a60c19f766bfff1ccdccbeba6b39eb87
Filesize:
9.37 KB
suspicious functions used:
`update_date`, '%D-%b, %y') AS offdate, TIME_FORMAT(`update_time`, '%T') AS offtime FROM `con_sts_log` WHERE `c_id` = '{$row['c_id']}' AND con_sts = 'Inactive' ORDER BY ` (line:120); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ip-ping-checker.php-
Full path:
at/web/ip-ping-checker.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:44 12/05/2025
Last modified:
01:16:01 10/12/2024
MD5 hash:
0d28f3053b73b3fe2885cf519ee17c12
Filesize:
2.64 KB
suspicious functions used:
curl_exec (line:81); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: loginexec.php-
Full path:
at/web/loginexec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:44 12/05/2025
Last modified:
01:16:02 10/12/2024
MD5 hash:
edb8017e7d0f8e037facbcacc94a383d
Filesize:
5.91 KB
suspicious functions used:
curl_exec (line:67); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec.php-
Full path:
at/web/login_exec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
04:52:12 12/05/2025
Last modified:
12:11:59 10/12/2024
MD5 hash:
9038a77a32a5db2c9affae1496473f3e
Filesize:
5.27 KB
suspicious functions used:
curl_exec (line:62); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec2.php-
Full path:
at/web/login_exec2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:44 12/05/2025
Last modified:
01:16:02 10/12/2024
MD5 hash:
9038a77a32a5db2c9affae1496473f3e
Filesize:
5.27 KB
suspicious functions used:
curl_exec (line:62); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-helper.php-
Full path:
at/web/nagad-helper.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:45 12/05/2025
Last modified:
01:16:07 10/12/2024
MD5 hash:
2bb70c44d68202e0a0cd8ae1388f0b1b
Filesize:
6.74 KB
suspicious functions used:
curl_exec (line:61);base64_decode (line:97); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-merchant-callback.php-
Full path:
at/web/nagad-merchant-callback.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:45 12/05/2025
Last modified:
01:16:07 10/12/2024
MD5 hash:
abc8d9e7aad4d9c622dcd97e701448bc
Filesize:
16.5 KB
suspicious functions used:
curl_exec (line:20); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-olt-all-mac-array.php-
Full path:
at/web/netowrk-olt-all-mac-array.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:45 12/05/2025
Last modified:
01:16:07 10/12/2024
MD5 hash:
b0168ce99145e2afe64357247d750dd6
Filesize:
4.62 KB
suspicious functions used:
shell_exec (line:33);shell_exec (line:47);shell_exec (line:61);shell_exec (line:76);shell_exec (line:93); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-snmp-data.php-
Full path:
at/web/netowrk-snmp-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:45 12/05/2025
Last modified:
01:16:07 10/12/2024
MD5 hash:
9badf5c53b260315a061e1bb6cd2378f
Filesize:
24.8 KB
suspicious functions used:
shell_exec (line:104);shell_exec (line:113);shell_exec (line:123);shell_exec (line:142);shell_exec (line:154);shell_exec (line:165);shell_exec (line:181);shell_exec (line:191);shell_exec (line:207);shell_exec (line:227);shell_exec (line:236);shell_exec (line:244);shell_exec (line:251);shell_exec (line:256);`pon_name` FROM `olt_pon` WHERE `olt_pon_id` = '$pon_id' AND ` (line:263);shell_exec (line:280);shell_exec (line:290);`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:303);shell_exec (line:309);shell_exec (line:444); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-old-onu-rx-map.php-
Full path:
at/web/network-old-onu-rx-map.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:45 12/05/2025
Last modified:
01:16:07 10/12/2024
MD5 hash:
b4962c160c5ad68ccd8eed9c48d82a0f
Filesize:
6.94 KB
suspicious functions used:
shell_exec (line:76); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-old-onu-rx.php-
Full path:
at/web/network-old-onu-rx.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:45 12/05/2025
Last modified:
01:16:07 10/12/2024
MD5 hash:
b4962c160c5ad68ccd8eed9c48d82a0f
Filesize:
6.94 KB
suspicious functions used:
shell_exec (line:76); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-count-cdata.php-
Full path:
at/web/network-olt-client-onu-mac-count-cdata.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:45 12/05/2025
Last modified:
01:16:07 10/12/2024
MD5 hash:
c378dbabf36066c335cfb8838a6e167d
Filesize:
4.58 KB
suspicious functions used:
shell_exec (line:25);shell_exec (line:35);shell_exec (line:56);shell_exec (line:103);shell_exec (line:115);shell_exec (line:126);shell_exec (line:140); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-count.php-
Full path:
at/web/network-olt-client-onu-mac-count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:45 12/05/2025
Last modified:
01:16:07 10/12/2024
MD5 hash:
300ca68aa5a7a32160838b9f2627d2aa
Filesize:
14.56 KB
suspicious functions used:
shell_exec (line:26);shell_exec (line:36);shell_exec (line:68);shell_exec (line:84);shell_exec (line:101);shell_exec (line:119);shell_exec (line:135);shell_exec (line:176);shell_exec (line:236);shell_exec (line:312);shell_exec (line:379);shell_exec (line:441);shell_exec (line:460);shell_exec (line:479); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-countt.php-
Full path:
at/web/network-olt-client-onu-mac-countt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:45 12/05/2025
Last modified:
01:16:07 10/12/2024
MD5 hash:
d29b4e72c375f528b769bd3894f9f0e7
Filesize:
8.95 KB
suspicious functions used:
shell_exec (line:26);shell_exec (line:36);shell_exec (line:59);shell_exec (line:75);shell_exec (line:92);shell_exec (line:102);shell_exec (line:117);shell_exec (line:155);shell_exec (line:206);shell_exec (line:262);shell_exec (line:275);shell_exec (line:288); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-con-sts.php-
Full path:
at/web/network-olt-con-sts.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:45 12/05/2025
Last modified:
01:16:08 10/12/2024
MD5 hash:
a26b0a1c1567c34c9aa5e2e0254ff8a6
Filesize:
4 KB
suspicious functions used:
`olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:10);shell_exec (line:38);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, `last_synced`, `last_update`, `msg`, `full_msg`, ROUND((SELECT AVG(value) FROM olt_onu_history WHERE alarm_id = '$alarmId' AND value != ''), 2) AS average_value FROM `, ` WHERE `alarm_id` = '$alarmId' AND ` (line:82); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-load.php-
Full path:
at/web/network-olt-load.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:45 12/05/2025
Last modified:
01:16:08 10/12/2024
MD5 hash:
f49d5153285c639ed91d4e806685ee56
Filesize:
1.33 KB
suspicious functions used:
shell_exec (line:22);shell_exec (line:25); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-oid-check.php-
Full path:
at/web/network-olt-oid-check.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:45 12/05/2025
Last modified:
01:16:08 10/12/2024
MD5 hash:
5b7dc0ce1103fbfc895873c250b63141
Filesize:
1.88 KB
suspicious functions used:
shell_exec (line:33); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-alarm-add.php-
Full path:
at/web/network-olt-onu-alarm-add.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:45 12/05/2025
Last modified:
01:16:08 10/12/2024
MD5 hash:
be6ba82c658419e1454f778e20e2d4c3
Filesize:
7.86 KB
suspicious functions used:
shell_exec (line:103); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-count.php-
Full path:
at/web/network-olt-onu-count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:45 12/05/2025
Last modified:
01:16:08 10/12/2024
MD5 hash:
eed277fdd838fc119df53ba5ebda8a77
Filesize:
5.44 KB
suspicious functions used:
`olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:11);shell_exec (line:69); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-list-data.php-
Full path:
at/web/network-olt-onu-list-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:45 12/05/2025
Last modified:
01:16:08 10/12/2024
MD5 hash:
54cc9417c766c31317311c3722ce7d4b
Filesize:
9.48 KB
suspicious functions used:
shell_exec (line:24);shell_exec (line:38);shell_exec (line:64);shell_exec (line:85);shell_exec (line:104);shell_exec (line:125);shell_exec (line:143);shell_exec (line:153);shell_exec (line:165);shell_exec (line:185); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-power.php-
Full path:
at/web/network-olt-onu-power.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:45 12/05/2025
Last modified:
01:16:08 10/12/2024
MD5 hash:
2e064543b67b532bdf4e5b12d49c5052
Filesize:
7.54 KB
suspicious functions used:
shell_exec (line:97); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-clients-search.php-
Full path:
at/web/network-olt-pon-clients-search.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:45 12/05/2025
Last modified:
01:16:08 10/12/2024
MD5 hash:
79d26fc66abdab6f173330588aa8b238
Filesize:
10.93 KB
suspicious functions used:
shell_exec (line:42);shell_exec (line:51);shell_exec (line:104);shell_exec (line:168); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search-bdcom.php-
Full path:
at/web/network-olt-pon-onu-search-bdcom.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:45 12/05/2025
Last modified:
01:16:08 10/12/2024
MD5 hash:
c786fa8b69268c738b6ff976631798cd
Filesize:
27.74 KB
suspicious functions used:
shell_exec (line:60);shell_exec (line:69);shell_exec (line:383); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search-bdcom1.php-
Full path:
at/web/network-olt-pon-onu-search-bdcom1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:45 12/05/2025
Last modified:
01:16:08 10/12/2024
MD5 hash:
dd18677b1dcbf7f0bce2ac6912d98da0
Filesize:
9.6 KB
suspicious functions used:
shell_exec (line:42);shell_exec (line:51);shell_exec (line:129); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search.php-
Full path:
at/web/network-olt-pon-onu-search.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:45 12/05/2025
Last modified:
01:16:08 10/12/2024
MD5 hash:
dc183ecf77d0e1f56f672338fd09cfa5
Filesize:
21.62 KB
suspicious functions used:
shell_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data-bdcom.php-
Full path:
at/web/network-snmp-onu-status-data-bdcom.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:45 12/05/2025
Last modified:
01:16:09 10/12/2024
MD5 hash:
065f5e2b05932ee66d473135998580ac
Filesize:
23.53 KB
suspicious functions used:
shell_exec (line:48);shell_exec (line:73);shell_exec (line:85);shell_exec (line:103);shell_exec (line:116);shell_exec (line:128);shell_exec (line:134);shell_exec (line:159);shell_exec (line:172);shell_exec (line:184);shell_exec (line:190);shell_exec (line:217);shell_exec (line:233);shell_exec (line:239);shell_exec (line:244);shell_exec (line:248);`pon_name` FROM `olt_pon` WHERE `olt_pon_id` = '$ponn_id' AND ` (line:255);shell_exec (line:263); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data.php-
Full path:
at/web/network-snmp-onu-status-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:45 12/05/2025
Last modified:
01:16:09 10/12/2024
MD5 hash:
0adfee384bf349b50f11036947fd2a74
Filesize:
30.37 KB
suspicious functions used:
shell_exec (line:38);`olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:42);shell_exec (line:81);shell_exec (line:95);shell_exec (line:109);shell_exec (line:122);shell_exec (line:208);shell_exec (line:429);shell_exec (line:441);shell_exec (line:448); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data1.php-
Full path:
at/web/network-snmp-onu-status-data1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:45 12/05/2025
Last modified:
01:16:09 10/12/2024
MD5 hash:
920bd1a592c36f7a1194b737642f8340
Filesize:
15.96 KB
suspicious functions used:
shell_exec (line:33);`olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:37);shell_exec (line:149); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data_vsol2.php-
Full path:
at/web/network-snmp-onu-status-data_vsol2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:45 12/05/2025
Last modified:
01:16:09 10/12/2024
MD5 hash:
f22d022ddc284f4d8e1de3660da91db8
Filesize:
15.61 KB
suspicious functions used:
shell_exec (line:34);shell_exec (line:113);shell_exec (line:126);shell_exec (line:132); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-tree-vartual-nodes.php-
Full path:
at/web/network-tree-vartual-nodes.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:45 12/05/2025
Last modified:
01:16:09 10/12/2024
MD5 hash:
3530b8bc3113544014b1746ecd67e834
Filesize:
10.64 KB
suspicious functions used:
shell_exec (line:76);shell_exec (line:111);shell_exec (line:145);shell_exec (line:181);shell_exec (line:188); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Network.php-
Full path:
at/web/Network.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:45 12/05/2025
Last modified:
13:54:53 10/12/2024
MD5 hash:
5cad04b92cb3a82af73389d4c0c23c05
Filesize:
57.88 KB
suspicious functions used:
system (line:359);shell_exec (line:631); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Network1.php-
Full path:
at/web/Network1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:45 12/05/2025
Last modified:
01:16:10 10/12/2024
MD5 hash:
0154c16125cee7431f537bf69c4ef811
Filesize:
44.04 KB
suspicious functions used:
system (line:295);shell_exec (line:590); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkLoad.php-
Full path:
at/web/NetworkLoad.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:46 12/05/2025
Last modified:
01:16:11 10/12/2024
MD5 hash:
e1632e66ee1b7394d3fb82751b924abe
Filesize:
2.83 KB
suspicious functions used:
system (line:81); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkLoad1.php-
Full path:
at/web/NetworkLoad1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:46 12/05/2025
Last modified:
01:16:11 10/12/2024
MD5 hash:
176bd6931be34d7ef351d22897accc65
Filesize:
759 B
suspicious functions used:
system (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltAddQuery.php-
Full path:
at/web/NetworkOltAddQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:46 12/05/2025
Last modified:
13:42:23 10/12/2024
MD5 hash:
695cd7eaea6d8343ca41b11f5a852e90
Filesize:
6.6 KB
suspicious functions used:
shell_exec (line:21); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltOnuStatus.php-
Full path:
at/web/NetworkOltOnuStatus.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:46 12/05/2025
Last modified:
01:16:11 10/12/2024
MD5 hash:
7604d17efbb57bd0b4c3566aa2d27c36
Filesize:
65.16 KB
suspicious functions used:
shell_exec (line:42);shell_exec (line:102);shell_exec (line:677);shell_exec (line:793);shell_exec (line:906); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltOnuStatus2.php-
Full path:
at/web/NetworkOltOnuStatus2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:46 12/05/2025
Last modified:
01:16:11 10/12/2024
MD5 hash:
c9a14797fa4353d05bbd9427b6079250
Filesize:
15.88 KB
suspicious functions used:
shell_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltSense.php-
Full path:
at/web/NetworkOltSense.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:46 12/05/2025
Last modified:
01:16:12 10/12/2024
MD5 hash:
2be664ae5006367f629ca437a6d507f8
Filesize:
18.26 KB
suspicious functions used:
`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, `last_synced`, `last_update`, `msg`, `full_msg`, ROUND((SELECT AVG(value) FROM olt_onu_history WHERE alarm_id = '$alarmId' AND value != ''), 2) AS average_value FROM `, ` WHERE `alarm_id` = '$alarmId' AND ` (line:123); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltSenseDetails.php-
Full path:
at/web/NetworkOltSenseDetails.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:46 12/05/2025
Last modified:
01:16:12 10/12/2024
MD5 hash:
440096c601fc10b819a1f0f8330928b0
Filesize:
14.17 KB
suspicious functions used:
`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:33);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:42);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:51);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:60); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltSync.php-
Full path:
at/web/NetworkOltSync.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:46 12/05/2025
Last modified:
01:16:12 10/12/2024
MD5 hash:
06633d4b65a14d677358170dd0a84424
Filesize:
1.87 KB
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree-olt-onu-list-data.php-
Full path:
at/web/networktree-olt-onu-list-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:46 12/05/2025
Last modified:
01:16:12 10/12/2024
MD5 hash:
af4221fefa9c9051846a063ac4135560
Filesize:
8.72 KB
suspicious functions used:
shell_exec (line:24);shell_exec (line:36);shell_exec (line:59);shell_exec (line:78);shell_exec (line:97);shell_exec (line:116);shell_exec (line:134);shell_exec (line:143);shell_exec (line:155);shell_exec (line:175); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeAddSave.php-
Full path:
at/web/NetworkTreeAddSave.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:46 12/05/2025
Last modified:
01:16:13 10/12/2024
MD5 hash:
a9dbc374394f257ef79f2d4f60f9771d
Filesize:
5.12 KB
suspicious functions used:
`network_tree` WHERE `olt_id` = '$olt_id' AND ` (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeEdit1.php-
Full path:
at/web/NetworkTreeEdit1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:46 12/05/2025
Last modified:
01:16:14 10/12/2024
MD5 hash:
3396a6bdf9b5804bb208f38f37cc29a2
Filesize:
35.81 KB
suspicious functions used:
`olt_onu` WHERE olt_id = '$olt_id' AND ` (line:207); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeEditSave.php-
Full path:
at/web/NetworkTreeEditSave.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:46 12/05/2025
Last modified:
01:16:14 10/12/2024
MD5 hash:
6c0f94f3ddde2ee6a93db1fa98971907
Filesize:
12.41 KB
suspicious functions used:
`network_tree` WHERE `olt_id` = '$olt_id' AND ` (line:182); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeList.php-
Full path:
at/web/NetworkTreeList.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:46 12/05/2025
Last modified:
01:16:15 10/12/2024
MD5 hash:
acd468021993faf8575531952ae107f8
Filesize:
21.98 KB
suspicious functions used:
`pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '{$row['olt_id']}' AND ` (line:287); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeMap.php-
Full path:
at/web/NetworkTreeMap.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:46 12/05/2025
Last modified:
01:16:15 10/12/2024
MD5 hash:
584d02944bd9de5a190ec6dc320fc49e
Filesize:
24.24 KB
suspicious functions used:
`${results.rxPower}` (line:263);`${results.distance}` (line:264);`${results.supplyVoltage}` (line:265);`${results.temperature}` (line:266);`${results.txPower}` (line:267);`${results.rxPower}` (line:283);`${results.distance}` (line:284);`${results.supplyVoltage}` (line:285);`${results.temperature}` (line:286);`${results.txPower}` (line:287); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeMap1.php-
Full path:
at/web/NetworkTreeMap1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:46 12/05/2025
Last modified:
01:16:15 10/12/2024
MD5 hash:
31a3ae9bc0bdb18726ed860ec6e8ec97
Filesize:
36.43 KB
suspicious functions used:
`networktree_marker_data.php?tree_id=${markerId}` (line:231);`${results.rxPower}` (line:311);`${results.distance}` (line:312);`${results.supplyVoltage}` (line:313);`${results.temperature}` (line:314);`${results.txPower}` (line:315); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_onu_list_add.php-
Full path:
at/web/networktree_device_onu_list_add.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:47 12/05/2025
Last modified:
01:16:15 10/12/2024
MD5 hash:
444ccf3c3e852a5a25cc4ccd3a5cf9ca
Filesize:
14.66 KB
suspicious functions used:
`network_tree` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND device_type = '5' AND ` (line:9);shell_exec (line:33);`network_tree` WHERE `onu_mac` = '$mac_address' AND ` (line:131);shell_exec (line:179);shell_exec (line:187);shell_exec (line:235);`network_tree` WHERE `onu_mac` = '$onuMac' AND ` (line:301); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_pon_check.php-
Full path:
at/web/networktree_device_pon_check.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:47 12/05/2025
Last modified:
01:16:15 10/12/2024
MD5 hash:
708a93aadcae96ecf0aaca52041fcf38
Filesize:
1.53 KB
suspicious functions used:
`pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '$olt_id' AND ` (line:8); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_pon_list_add.php-
Full path:
at/web/networktree_device_pon_list_add.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:47 12/05/2025
Last modified:
01:16:15 10/12/2024
MD5 hash:
2ec03912801e4749c2e9cd361417ca5f
Filesize:
1.36 KB
suspicious functions used:
`olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:6);`olt_pon` WHERE `olt_id` = '$olt_id' AND ` (line:10);`network_tree` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND ` (line:17); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_pon_port_onu_list.php-
Full path:
at/web/networktree_device_pon_port_onu_list.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:47 12/05/2025
Last modified:
01:16:15 10/12/2024
MD5 hash:
9c63b3ac69996628f5eb2959a9eb4e15
Filesize:
8.65 KB
suspicious functions used:
`olt_pon` WHERE olt_id = '$olt_id' AND ` (line:25);shell_exec (line:32);shell_exec (line:45);`network_tree` WHERE onu_index_id = '$port_onu_index_id' AND ` (line:49);shell_exec (line:81);shell_exec (line:103);shell_exec (line:122);shell_exec (line:143);shell_exec (line:161);shell_exec (line:170);shell_exec (line:184); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_pon_port_sense_list.php-
Full path:
at/web/networktree_device_pon_port_sense_list.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:47 12/05/2025
Last modified:
01:16:15 10/12/2024
MD5 hash:
ee69cd5cc122f8aa37d8d8e5c74def6b
Filesize:
3.65 KB
suspicious functions used:
`network_tree` WHERE `onu_mac` = '$onu_mac' AND ` (line:26);`network_tree` WHERE `c_id` = '{$dfhbdxf}' AND ` (line:71); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_type.php-
Full path:
at/web/networktree_device_type.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:47 12/05/2025
Last modified:
01:16:15 10/12/2024
MD5 hash:
f1520732e5a3ef38564238a3278a1f63
Filesize:
11.43 KB
suspicious functions used:
`tree_id`) AS countolt FROM `network_tree` WHERE `olt_id` = '$olt_id_sure' AND ` (line:64); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery.php-
Full path:
at/web/PaymentOnlineQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:39:59 12/05/2025
Last modified:
01:16:21 10/12/2024
MD5 hash:
201e1cf95b2d033897cab4bc2fd59e07
Filesize:
28.5 KB
suspicious functions used:
curl_exec (line:457);curl_exec (line:689); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery2.php-
Full path:
at/web/PaymentOnlineQuery2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:48 12/05/2025
Last modified:
01:16:21 10/12/2024
MD5 hash:
ccd315d11a60901b7b9029ff44f8351b
Filesize:
19.4 KB
suspicious functions used:
curl_exec (line:42);curl_exec (line:252); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentWebhook.php-
Full path:
at/web/PaymentWebhook.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:48 12/05/2025
Last modified:
01:16:21 10/12/2024
MD5 hash:
a2f322c94787630ab1e0c8ca35fc5ba1
Filesize:
18.6 KB
suspicious functions used:
base64_decode (line:30);curl_exec (line:41);curl_exec (line:422); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SignUp1.php-
Full path:
at/web/SignUp1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:49 12/05/2025
Last modified:
01:16:27 10/12/2024
MD5 hash:
3f7943dd155c8e0a383b7d02730f8c11
Filesize:
24.59 KB
suspicious functions used:
curl_exec (line:33);curl_exec (line:59); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: sms-balance-check.php-
Full path:
at/web/sms-balance-check.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
14:20:12 11/05/2025
Last modified:
01:16:27 10/12/2024
MD5 hash:
74ac3e963a0dc5bb7d4c980e594aa39b
Filesize:
854 B
suspicious functions used:
curl_exec (line:15); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMS.php-
Full path:
at/web/SMS.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:49 12/05/2025
Last modified:
01:16:27 10/12/2024
MD5 hash:
256a239cc69fc8bfa9305d2d4af31d14
Filesize:
36.41 KB
suspicious functions used:
curl_exec (line:56); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMS1.php-
Full path:
at/web/SMS1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:49 12/05/2025
Last modified:
01:16:28 10/12/2024
MD5 hash:
e4671dadf9ad575671fd3609a60030da
Filesize:
32.19 KB
suspicious functions used:
curl_exec (line:59); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMSAddSave.php-
Full path:
at/web/SMSAddSave.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:49 12/05/2025
Last modified:
01:16:28 10/12/2024
MD5 hash:
1a6eaf13aa0ca959fe2dca885b7ffd8e
Filesize:
1.73 KB
suspicious functions used:
curl_exec (line:34); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: sms_deliverey_report.php-
Full path:
at/web/sms_deliverey_report.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:49 12/05/2025
Last modified:
01:16:29 10/12/2024
MD5 hash:
03623943da7e9334e137b38c8577fc84
Filesize:
4.25 KB
suspicious functions used:
curl_exec (line:28);curl_exec (line:53);curl_exec (line:90); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: support-action.php-
Full path:
at/web/support-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:49 12/05/2025
Last modified:
01:16:29 10/12/2024
MD5 hash:
58556808f93f52486b2ad06998142aa9
Filesize:
14.56 KB
suspicious functions used:
curl_exec (line:220); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tagreeexpayment.php-
Full path:
at/web/tagreeexpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:39:46 12/05/2025
Last modified:
01:16:31 10/12/2024
MD5 hash:
029b4fba649a75c7c81d2f8931be8d63
Filesize:
2.86 KB
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreateagree.php-
Full path:
at/web/tcreateagree.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:39:03 12/05/2025
Last modified:
01:16:31 10/12/2024
MD5 hash:
27a10adf4190edc7eceee8cf74a6b72b
Filesize:
999 B
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreatepayment.php-
Full path:
at/web/tcreatepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:39:46 12/05/2025
Last modified:
01:16:31 10/12/2024
MD5 hash:
e49de9a33f5164bc2c6b88e4770faaff
Filesize:
1.07 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test2.php-
Full path:
at/web/test2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:50 12/05/2025
Last modified:
01:16:31 10/12/2024
MD5 hash:
ab80d92ede21b7da59bfefb325484297
Filesize:
13.76 KB
suspicious functions used:
shell_exec (line:59);shell_exec (line:70);shell_exec (line:76);shell_exec (line:88);shell_exec (line:101);shell_exec (line:141);curl_exec (line:187);curl_exec (line:212);curl_exec (line:354); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test6.php-
Full path:
at/web/test6.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:50 12/05/2025
Last modified:
01:16:31 10/12/2024
MD5 hash:
f22d022ddc284f4d8e1de3660da91db8
Filesize:
15.61 KB
suspicious functions used:
shell_exec (line:34);shell_exec (line:113);shell_exec (line:126);shell_exec (line:132); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test7.php-
Full path:
at/web/test7.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:50 12/05/2025
Last modified:
01:16:31 10/12/2024
MD5 hash:
b11ccf951ce63a21ea0a7328316a0e5c
Filesize:
1.57 KB
suspicious functions used:
curl_exec (line:14); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: testttttt.php-
Full path:
at/web/testttttt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:50 12/05/2025
Last modified:
01:16:31 10/12/2024
MD5 hash:
b1988a4be29e191ad935fb409a4174ee
Filesize:
2 KB
suspicious functions used:
curl_exec (line:47); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: texecutepayment.php-
Full path:
at/web/texecutepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:39:58 12/05/2025
Last modified:
01:16:31 10/12/2024
MD5 hash:
623635fdf5c871391d3a5fe99ee8c543
Filesize:
2.91 KB
suspicious functions used:
curl_exec (line:24); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tis-news.php-
Full path:
at/web/tis-news.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
13:08:11 11/05/2025
Last modified:
01:16:31 10/12/2024
MD5 hash:
ed23ca98b77c5321b4485e85eb2ea64d
Filesize:
3.67 KB
suspicious functions used:
curl_exec (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
at/web/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:50 12/05/2025
Last modified:
01:16:31 10/12/2024
MD5 hash:
7d8e71ceda3ffb74623e0c4a814715af
Filesize:
1.53 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tt.php-
Full path:
at/web/tt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:50 12/05/2025
Last modified:
01:16:32 10/12/2024
MD5 hash:
9c4ed141cb79fdc7e807b35923c91a20
Filesize:
1.56 KB
suspicious functions used:
curl_exec (line:30); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ttoken.php-
Full path:
at/web/ttoken.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:38:54 12/05/2025
Last modified:
01:16:32 10/12/2024
MD5 hash:
5f2c51c1db5b0defadfb67ce25c0098f
Filesize:
1.54 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook.php-
Full path:
at/web/webhook.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:50 12/05/2025
Last modified:
01:16:34 10/12/2024
MD5 hash:
26e2059a39281031d28874b51b52d60c
Filesize:
21.23 KB
suspicious functions used:
base64_decode (line:27);curl_exec (line:38);curl_exec (line:454); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook_cid.php-
Full path:
at/web/webhook_cid.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:50 12/05/2025
Last modified:
01:16:34 10/12/2024
MD5 hash:
18c8353c99f0ca2645c68685e40c568b
Filesize:
21.1 KB
suspicious functions used:
base64_decode (line:28);curl_exec (line:39);curl_exec (line:429); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook_test.php-
Full path:
at/web/webhook_test.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:50 12/05/2025
Last modified:
01:16:34 10/12/2024
MD5 hash:
74a7dcc262d7fe7f2bdc9e0595d03837
Filesize:
4.69 KB
suspicious functions used:
base64_decode (line:22);curl_exec (line:33);curl_exec (line:86);curl_exec (line:107); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: class.phpmailer.php-
Full path:
at/web/email/class.phpmailer.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:51 12/05/2025
Last modified:
01:16:39 10/12/2024
MD5 hash:
68468d69b47fffecc89df57e27c5a781
Filesize:
143.32 KB
suspicious functions used:
`$DKIM_private` (line:428);popen (line:1387);popen (line:1408);base64_decode (line:3410);`$mail->set('SMTPSecure', 'tls');` (line:3688);`$mail->SMTPSecure = 'tls';` (line:3690); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: class.smtp.php-
Full path:
at/web/email/class.smtp.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:51 12/05/2025
Last modified:
01:16:39 10/12/2024
MD5 hash:
aa8478329268e5438a4469c268337a10
Filesize:
41.44 KB
suspicious functions used:
base64_decode (line:513);base64_decode (line:533); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: jqgrid.php-
Full path:
at/web/inc/jqgrid.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:52 12/05/2025
Last modified:
01:16:44 10/12/2024
MD5 hash:
71027a29e71e0626d8b57cbb631e6d98
Filesize:
23.92 KB
suspicious functions used:
eval (line:397); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: JSON.php-
Full path:
at/web/inc/JSON.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:52 12/05/2025
Last modified:
01:16:44 10/12/2024
MD5 hash:
f5a34509e06231308becbe320ade9ff6
Filesize:
33.22 KB
suspicious functions used:
eval (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: smsapicore.php-
Full path:
at/web/include/smsapicore.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:52 12/05/2025
Last modified:
03:32:27 10/12/2024
MD5 hash:
6b6257f892846565ef8dee38400afa15
Filesize:
1.24 KB
suspicious functions used:
curl_exec (line:36); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: telegramapicore.php-
Full path:
at/web/include/telegramapicore.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
06:19:09 12/05/2025
Last modified:
01:16:45 10/12/2024
MD5 hash:
e1f2020f2a58e7b600312301697f9aca
Filesize:
3 KB
suspicious functions used:
curl_exec (line:65); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ui.php-
Full path:
at/web/js/tinymce/themes/advanced/skins/highcontrast/ui.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:53 12/05/2025
Last modified:
01:17:07 10/12/2024
MD5 hash:
3edaf67be8573b86686f46bbba4f058c
Filesize:
4.53 KB
suspicious functions used:
curl_exec (line:20);`bill_amount` = '0.00' WHERE bill_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY ` (line:53);`bill_amount` = '0.00', days = '0.00' WHERE entry_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY ` (line:54);`payment` WHERE `pay_date` < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND pay_amount != '0.00' ORDER BY ` (line:55);curl_exec (line:146);curl_exec (line:168); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Changes.txt-
Full path:
at/web/js/jqgrid/js/Changes.txt
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:53 12/05/2025
Last modified:
01:16:58 10/12/2024
MD5 hash:
c0a4adbc3f1c6d592cb4fa8433fee9ea
Filesize:
44.32 KB
suspicious functions used:
system (line:87); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
at/m/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:53 12/05/2025
Last modified:
01:15:21 10/12/2024
MD5 hash:
849185f307be30eafb1bbef93616d8c3
Filesize:
1.71 KB
suspicious functions used:
curl_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
at/m/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:53 12/05/2025
Last modified:
01:15:21 10/12/2024
MD5 hash:
9a3f22521ad987e86f84c4f5f688d5b7
Filesize:
713 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index.php-
Full path:
at/m/index.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:53 12/05/2025
Last modified:
12:13:02 10/12/2024
MD5 hash:
41558736b037228ea93df03cae70eb87
Filesize:
4.31 KB
suspicious functions used:
curl_exec (line:70); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec.php-
Full path:
at/m/login_exec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:53 12/05/2025
Last modified:
12:13:02 10/12/2024
MD5 hash:
46b08782f51ba75b23e27183e06370fe
Filesize:
4.28 KB
suspicious functions used:
curl_exec (line:61); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec1.php-
Full path:
at/m/login_exec1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:53 12/05/2025
Last modified:
01:15:22 10/12/2024
MD5 hash:
46b08782f51ba75b23e27183e06370fe
Filesize:
4.28 KB
suspicious functions used:
curl_exec (line:61); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-helper.php-
Full path:
at/m/nagad-helper.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:54 12/05/2025
Last modified:
01:15:23 10/12/2024
MD5 hash:
2bb70c44d68202e0a0cd8ae1388f0b1b
Filesize:
6.74 KB
suspicious functions used:
curl_exec (line:61);base64_decode (line:97); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-merchant-callback.php-
Full path:
at/m/nagad-merchant-callback.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:54 12/05/2025
Last modified:
01:15:23 10/12/2024
MD5 hash:
0e6086c5260150c11249029f212ee481
Filesize:
11.36 KB
suspicious functions used:
curl_exec (line:20); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-snmp-data.php-
Full path:
at/m/netowrk-snmp-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:54 12/05/2025
Last modified:
01:15:23 10/12/2024
MD5 hash:
45b774abc8d67efb3e4e87c93b1f618b
Filesize:
24.05 KB
suspicious functions used:
shell_exec (line:96);shell_exec (line:105);shell_exec (line:115);shell_exec (line:134);shell_exec (line:146);shell_exec (line:157);shell_exec (line:173);shell_exec (line:183);shell_exec (line:199);shell_exec (line:219);shell_exec (line:229);shell_exec (line:234);shell_exec (line:242);shell_exec (line:262);shell_exec (line:278);`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:291);shell_exec (line:297);shell_exec (line:432); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery.php-
Full path:
at/m/PaymentOnlineQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:54 12/05/2025
Last modified:
01:15:23 10/12/2024
MD5 hash:
05d772ea15775c0640ac9d1ff7c7144c
Filesize:
21.13 KB
suspicious functions used:
curl_exec (line:287);curl_exec (line:512); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery2.php-
Full path:
at/m/PaymentOnlineQuery2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:54 12/05/2025
Last modified:
01:15:23 10/12/2024
MD5 hash:
3660992067d5591fc79ce89d6dbb9274
Filesize:
19.08 KB
suspicious functions used:
curl_exec (line:41);curl_exec (line:254); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: support-action.php-
Full path:
at/m/support-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:54 12/05/2025
Last modified:
01:15:25 10/12/2024
MD5 hash:
2fc6fd844db911a5502a7a6ae383990f
Filesize:
10.31 KB
suspicious functions used:
curl_exec (line:99); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tagreeexpayment.php-
Full path:
at/m/tagreeexpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:54 12/05/2025
Last modified:
01:15:25 10/12/2024
MD5 hash:
c95e3ee881752db67b4f3597bc58430a
Filesize:
2.46 KB
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreateagree.php-
Full path:
at/m/tcreateagree.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:54 12/05/2025
Last modified:
01:15:25 10/12/2024
MD5 hash:
27a10adf4190edc7eceee8cf74a6b72b
Filesize:
999 B
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreatepayment.php-
Full path:
at/m/tcreatepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:54 12/05/2025
Last modified:
01:15:25 10/12/2024
MD5 hash:
e49de9a33f5164bc2c6b88e4770faaff
Filesize:
1.07 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: texecutepayment.php-
Full path:
at/m/texecutepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:54 12/05/2025
Last modified:
01:15:25 10/12/2024
MD5 hash:
efbb63dfcfdacb52dec74bffc389bbb3
Filesize:
2.67 KB
suspicious functions used:
curl_exec (line:24); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
at/m/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:54 12/05/2025
Last modified:
01:15:25 10/12/2024
MD5 hash:
7d8e71ceda3ffb74623e0c4a814715af
Filesize:
1.53 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ttoken.php-
Full path:
at/m/ttoken.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:54 12/05/2025
Last modified:
01:15:25 10/12/2024
MD5 hash:
5f2c51c1db5b0defadfb67ce25c0098f
Filesize:
1.54 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Changes.txt-
Full path:
axn/m/js/jqgrid/js/Changes.txt
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:56 12/05/2025
Last modified:
14:31:19 17/02/2023
MD5 hash:
c0a4adbc3f1c6d592cb4fa8433fee9ea
Filesize:
44.32 KB
suspicious functions used:
system (line:87); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
axn/m/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:56 12/05/2025
Last modified:
14:30:49 17/02/2023
MD5 hash:
05132f436e56ff2164ecc165347219ae
Filesize:
1.71 KB
suspicious functions used:
curl_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery2.php-
Full path:
axn/m/PaymentOnlineQuery2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:56 12/05/2025
Last modified:
14:30:50 17/02/2023
MD5 hash:
48588dfbb812b9e8102af40dc401032c
Filesize:
19.04 KB
suspicious functions used:
curl_exec (line:41);curl_exec (line:254); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
axn/m/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:56 12/05/2025
Last modified:
14:30:49 17/02/2023
MD5 hash:
9a3f22521ad987e86f84c4f5f688d5b7
Filesize:
713 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index.php-
Full path:
axn/m/index.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
11:42:51 12/05/2025
Last modified:
23:29:56 03/10/2023
MD5 hash:
41558736b037228ea93df03cae70eb87
Filesize:
4.31 KB
suspicious functions used:
curl_exec (line:70); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec.php-
Full path:
axn/m/login_exec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:33:36 11/05/2025
Last modified:
06:36:21 01/03/2024
MD5 hash:
94e70afe10b4c97056174c85675e203f
Filesize:
4.12 KB
suspicious functions used:
curl_exec (line:53); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tagreeexpayment.php-
Full path:
axn/m/tagreeexpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:57 12/05/2025
Last modified:
14:30:50 17/02/2023
MD5 hash:
c95e3ee881752db67b4f3597bc58430a
Filesize:
2.46 KB
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreateagree.php-
Full path:
axn/m/tcreateagree.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:57 12/05/2025
Last modified:
14:30:50 17/02/2023
MD5 hash:
27a10adf4190edc7eceee8cf74a6b72b
Filesize:
999 B
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreatepayment.php-
Full path:
axn/m/tcreatepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:57 12/05/2025
Last modified:
14:30:50 17/02/2023
MD5 hash:
e49de9a33f5164bc2c6b88e4770faaff
Filesize:
1.07 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: texecutepayment.php-
Full path:
axn/m/texecutepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:57 12/05/2025
Last modified:
14:30:50 17/02/2023
MD5 hash:
efbb63dfcfdacb52dec74bffc389bbb3
Filesize:
2.67 KB
suspicious functions used:
curl_exec (line:24); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
axn/m/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:57 12/05/2025
Last modified:
14:30:50 17/02/2023
MD5 hash:
7d8e71ceda3ffb74623e0c4a814715af
Filesize:
1.53 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery.php-
Full path:
axn/m/PaymentOnlineQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:57 12/05/2025
Last modified:
14:30:50 17/02/2023
MD5 hash:
5e63b1f647ca3509509beda8102d5c40
Filesize:
16.65 KB
suspicious functions used:
curl_exec (line:287);curl_exec (line:382); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ttoken.php-
Full path:
axn/m/ttoken.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:57 12/05/2025
Last modified:
14:30:50 17/02/2023
MD5 hash:
5f2c51c1db5b0defadfb67ce25c0098f
Filesize:
1.54 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: billpaycheck.php-
Full path:
axn/web/bkash/billpaycheck.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:57 12/05/2025
Last modified:
14:32:47 17/02/2023
MD5 hash:
38c46efc36b25628fa18bd92ae135af9
Filesize:
796 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
axn/web/bkash/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:57 12/05/2025
Last modified:
14:32:47 17/02/2023
MD5 hash:
6175301f744b22b7db70ba598a991f8b
Filesize:
1.64 KB
suspicious functions used:
curl_exec (line:36); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
axn/web/bkash/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:57 12/05/2025
Last modified:
14:32:47 17/02/2023
MD5 hash:
19be365d26141eaecead7ef0ada0e75c
Filesize:
1.3 KB
suspicious functions used:
curl_exec (line:31); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: grant.php-
Full path:
axn/web/bkash/grant.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:57 12/05/2025
Last modified:
14:32:47 17/02/2023
MD5 hash:
da5499d260dc78ea4fcd71227cc6c484
Filesize:
2.01 KB
suspicious functions used:
curl_exec (line:41);curl_exec (line:63); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: query.php-
Full path:
axn/web/bkash/query.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:57 12/05/2025
Last modified:
14:32:47 17/02/2023
MD5 hash:
f3ed9045f3a073e2cdc8561d500bda89
Filesize:
1.65 KB
suspicious functions used:
curl_exec (line:33); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tagreeexpayment.php-
Full path:
axn/web/bkash/tagreeexpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:57 12/05/2025
Last modified:
14:32:47 17/02/2023
MD5 hash:
a1ba7d36003f72e593615aa32e44acb9
Filesize:
1.58 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreateagree.php-
Full path:
axn/web/bkash/tcreateagree.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:57 12/05/2025
Last modified:
14:32:48 17/02/2023
MD5 hash:
8ae6bdc9f3d4b0cdcf651701a0d9ebab
Filesize:
1.2 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreatepayment.php-
Full path:
axn/web/bkash/tcreatepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:57 12/05/2025
Last modified:
14:32:48 17/02/2023
MD5 hash:
3c978def6cffa0a8db5e86ce127caae6
Filesize:
1.35 KB
suspicious functions used:
curl_exec (line:29); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: texecutepayment.php-
Full path:
axn/web/bkash/texecutepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:57 12/05/2025
Last modified:
14:32:48 17/02/2023
MD5 hash:
d8f24df64623da3cfc2baf48f184a3d1
Filesize:
1.21 KB
suspicious functions used:
curl_exec (line:25); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
axn/web/bkash/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:57 12/05/2025
Last modified:
14:32:48 17/02/2023
MD5 hash:
f50b33eeb31927b2c081195618d48b8d
Filesize:
1.88 KB
suspicious functions used:
curl_exec (line:48); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tokent.php-
Full path:
axn/web/bkash/tokent.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:57 12/05/2025
Last modified:
14:32:48 17/02/2023
MD5 hash:
890a9e9fb1be75f31a6daad8811c1ff9
Filesize:
1.9 KB
suspicious functions used:
curl_exec (line:48); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: trxID.php-
Full path:
axn/web/bkash/trxID.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:57 12/05/2025
Last modified:
14:32:48 17/02/2023
MD5 hash:
9bcb8e70728fd25807c4db8916166d74
Filesize:
1.44 KB
suspicious functions used:
curl_exec (line:31); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
axn/web/bkasht/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:57 12/05/2025
Last modified:
14:32:48 17/02/2023
MD5 hash:
a4ba6e7683f558dc3602dacd7ddeded2
Filesize:
1.36 KB
suspicious functions used:
curl_exec (line:29); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
axn/web/bkasht/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:57 12/05/2025
Last modified:
14:32:48 17/02/2023
MD5 hash:
aad462fbca9f9a36649a197d67403098
Filesize:
1.27 KB
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: grant.php-
Full path:
axn/web/bkasht/grant.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:57 12/05/2025
Last modified:
14:32:48 17/02/2023
MD5 hash:
da5499d260dc78ea4fcd71227cc6c484
Filesize:
2.01 KB
suspicious functions used:
curl_exec (line:41);curl_exec (line:63); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: query.php-
Full path:
axn/web/bkasht/query.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:57 12/05/2025
Last modified:
14:32:48 17/02/2023
MD5 hash:
f3ed9045f3a073e2cdc8561d500bda89
Filesize:
1.65 KB
suspicious functions used:
curl_exec (line:33); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
axn/web/bkasht/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:57 12/05/2025
Last modified:
14:32:49 17/02/2023
MD5 hash:
f50b33eeb31927b2c081195618d48b8d
Filesize:
1.88 KB
suspicious functions used:
curl_exec (line:48); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: trxID.php-
Full path:
axn/web/bkasht/trxID.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:57 12/05/2025
Last modified:
14:32:49 17/02/2023
MD5 hash:
9bcb8e70728fd25807c4db8916166d74
Filesize:
1.44 KB
suspicious functions used:
curl_exec (line:31); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: class.phpmailer.php-
Full path:
axn/web/email/class.phpmailer.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:57 12/05/2025
Last modified:
14:32:50 17/02/2023
MD5 hash:
68468d69b47fffecc89df57e27c5a781
Filesize:
143.32 KB
suspicious functions used:
`$DKIM_private` (line:428);popen (line:1387);popen (line:1408);base64_decode (line:3410);`$mail->set('SMTPSecure', 'tls');` (line:3688);`$mail->SMTPSecure = 'tls';` (line:3690); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: class.smtp.php-
Full path:
axn/web/email/class.smtp.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:58 12/05/2025
Last modified:
14:32:51 17/02/2023
MD5 hash:
aa8478329268e5438a4469c268337a10
Filesize:
41.44 KB
suspicious functions used:
base64_decode (line:513);base64_decode (line:533); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: JSON.php-
Full path:
axn/web/inc/JSON.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:59 12/05/2025
Last modified:
14:33:17 17/02/2023
MD5 hash:
f5a34509e06231308becbe320ade9ff6
Filesize:
33.22 KB
suspicious functions used:
eval (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: jqgrid.php-
Full path:
axn/web/inc/jqgrid.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:59 12/05/2025
Last modified:
14:33:17 17/02/2023
MD5 hash:
71027a29e71e0626d8b57cbb631e6d98
Filesize:
23.92 KB
suspicious functions used:
eval (line:397); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: smsapicore.php-
Full path:
axn/web/include/smsapicore.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
05:07:12 12/05/2025
Last modified:
06:09:57 01/03/2024
MD5 hash:
8efc5fda3cc52645fff6522f882c7159
Filesize:
867 B
suspicious functions used:
curl_exec (line:13); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: telegramapicore.php-
Full path:
axn/web/include/telegramapicore.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
10:47:33 12/05/2025
Last modified:
14:33:17 17/02/2023
MD5 hash:
c669b81806a80fae7f84959c253cc737
Filesize:
2.44 KB
suspicious functions used:
curl_exec (line:54); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Changes.txt-
Full path:
axn/web/js/jqgrid/js/Changes.txt
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:57:59 12/05/2025
Last modified:
14:34:13 17/02/2023
MD5 hash:
c0a4adbc3f1c6d592cb4fa8433fee9ea
Filesize:
44.32 KB
suspicious functions used:
system (line:87); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: AutoActiveClientsCount1.php-
Full path:
axn/web/AutoActiveClientsCount1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:00 12/05/2025
Last modified:
14:31:50 17/02/2023
MD5 hash:
5728358b99d57c5c533760c05d59b734
Filesize:
3.5 KB
suspicious functions used:
system (line:46); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Network.php-
Full path:
axn/web/Network.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:02 12/05/2025
Last modified:
14:32:22 17/02/2023
MD5 hash:
7077cb60047c2816d526de616fb05a9d
Filesize:
21.27 KB
suspicious functions used:
system (line:171); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: InstrumentsStoreOutDetails.php-
Full path:
axn/web/InstrumentsStoreOutDetails.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:02 12/05/2025
Last modified:
14:32:17 17/02/2023
MD5 hash:
ab68ab13bcfd51da15e72a3d4e9817e8
Filesize:
9.37 KB
suspicious functions used:
`update_date`, '%D-%b, %y') AS offdate, TIME_FORMAT(`update_time`, '%T') AS offtime FROM `con_sts_log` WHERE `c_id` = '{$row['c_id']}' AND con_sts = 'Inactive' ORDER BY ` (line:120); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkLoad.php-
Full path:
axn/web/NetworkLoad.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:03 12/05/2025
Last modified:
14:32:22 17/02/2023
MD5 hash:
e1632e66ee1b7394d3fb82751b924abe
Filesize:
2.83 KB
suspicious functions used:
system (line:81); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery.php-
Full path:
axn/web/PaymentOnlineQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
15:26:53 11/05/2025
Last modified:
14:32:25 17/02/2023
MD5 hash:
92c82342b06b342adf69ecb7339f7ca2
Filesize:
23.95 KB
suspicious functions used:
curl_exec (line:456);curl_exec (line:560); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery2.php-
Full path:
axn/web/PaymentOnlineQuery2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:04 12/05/2025
Last modified:
14:32:25 17/02/2023
MD5 hash:
ee62afe447c53bb82f54bb6ebda64f3b
Filesize:
19.37 KB
suspicious functions used:
curl_exec (line:43);curl_exec (line:253); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentWebhook.php-
Full path:
axn/web/PaymentWebhook.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:04 12/05/2025
Last modified:
08:32:05 01/03/2024
MD5 hash:
a2f322c94787630ab1e0c8ca35fc5ba1
Filesize:
18.6 KB
suspicious functions used:
base64_decode (line:30);curl_exec (line:41);curl_exec (line:422); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMS.php-
Full path:
axn/web/SMS.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:05 12/05/2025
Last modified:
04:05:02 13/10/2023
MD5 hash:
b72892edbd33fe78068c01e568ff73af
Filesize:
28.37 KB
suspicious functions used:
curl_exec (line:53); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMSAddSave.php-
Full path:
axn/web/SMSAddSave.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:05 12/05/2025
Last modified:
14:32:43 17/02/2023
MD5 hash:
5e8b43b3bc2febe3a611a5bd9aa8fc28
Filesize:
1.71 KB
suspicious functions used:
curl_exec (line:34); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: company_info.php-
Full path:
axn/web/company_info.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:35:21 12/05/2025
Last modified:
13:01:07 09/04/2024
MD5 hash:
44b4a58bc7240512ed9fb6341ab7d669
Filesize:
6.82 KB
suspicious functions used:
curl_exec (line:107); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
axn/web/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:06 12/05/2025
Last modified:
14:32:12 17/02/2023
MD5 hash:
c8a7ce9b69ebed3509cee2952c04cb0c
Filesize:
1.7 KB
suspicious functions used:
curl_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_all.php-
Full path:
axn/web/cron_all.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:06 12/05/2025
Last modified:
08:04:18 01/03/2024
MD5 hash:
b19a08fef36584598cca299b7ecc5e6d
Filesize:
2.07 KB
suspicious functions used:
curl_exec (line:23);curl_exec (line:38);curl_exec (line:53); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_gen_bill.php-
Full path:
axn/web/cron_auto_gen_bill.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:06 12/05/2025
Last modified:
08:04:51 01/03/2024
MD5 hash:
eadec12eb6484d0069e5d0d320725a75
Filesize:
4.73 KB
suspicious functions used:
curl_exec (line:140);curl_exec (line:149); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_termination_remainder1.php-
Full path:
axn/web/cron_auto_termination_remainder1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:06 12/05/2025
Last modified:
08:31:05 01/03/2024
MD5 hash:
deffce3f05fb206fbc21ff8c1231c618
Filesize:
3.15 KB
suspicious functions used:
curl_exec (line:83); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_network.php-
Full path:
axn/web/cron_network.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
01:01:11 12/05/2025
Last modified:
14:32:12 17/02/2023
MD5 hash:
d7ae8ca3db81dce0960bb9840cb5aeee
Filesize:
4.14 KB
suspicious functions used:
curl_exec (line:41);curl_exec (line:59); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: emp_salary_advence_find.php-
Full path:
axn/web/emp_salary_advence_find.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:06 12/05/2025
Last modified:
14:32:12 17/02/2023
MD5 hash:
8cb12a79d5e1d31d92670d721dabb5aa
Filesize:
2.25 KB
suspicious functions used:
`expanse` WHERE `type` = '2' AND `status` = '2' AND ex_by = '$e_id' AND MONTH(`, `) = MONTH('$lastmonth') AND YEAR(`, `) = YEAR('$lastmonth') GROUP BY ` (line:8);`e_id` = '$e_id' AND ` (line:12); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
axn/web/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:06 12/05/2025
Last modified:
14:32:12 17/02/2023
MD5 hash:
c46a50905333286f45dfeacf010851ab
Filesize:
716 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index.php-
Full path:
axn/web/index.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:40:15 12/05/2025
Last modified:
23:30:11 03/10/2023
MD5 hash:
04c31834b0707de22ca55641d9181145
Filesize:
6.65 KB
suspicious functions used:
curl_exec (line:126); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook.php-
Full path:
axn/web/webhook.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
10:58:35 12/05/2025
Last modified:
09:21:22 01/03/2024
MD5 hash:
d010494352344cb156c8815c2dbe9eb4
Filesize:
20.64 KB
suspicious functions used:
base64_decode (line:27);curl_exec (line:38);curl_exec (line:423); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook_test.php-
Full path:
axn/web/webhook_test.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:06 12/05/2025
Last modified:
14:32:46 17/02/2023
MD5 hash:
74a7dcc262d7fe7f2bdc9e0595d03837
Filesize:
4.69 KB
suspicious functions used:
base64_decode (line:22);curl_exec (line:33);curl_exec (line:86);curl_exec (line:107); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ip-ping-checker.php-
Full path:
axn/web/ip-ping-checker.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:06 12/05/2025
Last modified:
14:32:20 17/02/2023
MD5 hash:
0d28f3053b73b3fe2885cf519ee17c12
Filesize:
2.64 KB
suspicious functions used:
curl_exec (line:81); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tagreeexpayment.php-
Full path:
axn/web/tagreeexpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
05:19:52 12/05/2025
Last modified:
14:32:44 17/02/2023
MD5 hash:
029b4fba649a75c7c81d2f8931be8d63
Filesize:
2.86 KB
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec.php-
Full path:
axn/web/login_exec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
18:31:23 11/05/2025
Last modified:
06:36:21 01/03/2024
MD5 hash:
4e416b5660a99a4e53f7f7fc864be174
Filesize:
4.1 KB
suspicious functions used:
curl_exec (line:53); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec1.php-
Full path:
axn/web/login_exec1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:06 12/05/2025
Last modified:
14:32:20 17/02/2023
MD5 hash:
4f75b914e1b47a355be8cbc73e4e1407
Filesize:
3.91 KB
suspicious functions used:
curl_exec (line:53); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: sms_deliverey_report.php-
Full path:
axn/web/sms_deliverey_report.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:07 12/05/2025
Last modified:
03:30:38 03/09/2023
MD5 hash:
b0c2b4c2bebe35fbe233cb298a952910
Filesize:
3.45 KB
suspicious functions used:
curl_exec (line:18);curl_exec (line:44); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreateagree.php-
Full path:
axn/web/tcreateagree.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
05:19:19 12/05/2025
Last modified:
14:32:44 17/02/2023
MD5 hash:
27a10adf4190edc7eceee8cf74a6b72b
Filesize:
999 B
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreatepayment.php-
Full path:
axn/web/tcreatepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
15:26:33 11/05/2025
Last modified:
14:32:44 17/02/2023
MD5 hash:
e49de9a33f5164bc2c6b88e4770faaff
Filesize:
1.07 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: testttttt.php-
Full path:
axn/web/testttttt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:07 12/05/2025
Last modified:
10:27:26 04/10/2023
MD5 hash:
b1988a4be29e191ad935fb409a4174ee
Filesize:
2 KB
suspicious functions used:
curl_exec (line:47); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: texecutepayment.php-
Full path:
axn/web/texecutepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
15:26:53 11/05/2025
Last modified:
14:32:44 17/02/2023
MD5 hash:
623635fdf5c871391d3a5fe99ee8c543
Filesize:
2.91 KB
suspicious functions used:
curl_exec (line:24); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tis-news.php-
Full path:
axn/web/tis-news.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
14:53:33 11/05/2025
Last modified:
07:56:03 09/04/2024
MD5 hash:
ed23ca98b77c5321b4485e85eb2ea64d
Filesize:
3.67 KB
suspicious functions used:
curl_exec (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
axn/web/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:07 12/05/2025
Last modified:
14:32:45 17/02/2023
MD5 hash:
7d8e71ceda3ffb74623e0c4a814715af
Filesize:
1.53 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ttoken.php-
Full path:
axn/web/ttoken.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
15:26:30 11/05/2025
Last modified:
14:32:45 17/02/2023
MD5 hash:
5f2c51c1db5b0defadfb67ce25c0098f
Filesize:
1.54 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: AppSettings.php-
Full path:
bns/web/AppSettings.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:07 12/05/2025
Last modified:
08:35:03 14/04/2025
MD5 hash:
77cb3febd74fdb81fab98e05a71f1ae0
Filesize:
124.08 KB
suspicious functions used:
`input[name="${inputName}"]:checked` (line:2069); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: AutoActiveClientsCount1.php-
Full path:
bns/web/AutoActiveClientsCount1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
09:54:52 12/05/2025
Last modified:
08:35:03 14/04/2025
MD5 hash:
96ae95689b28aef52bd4eaab4bfea7cc
Filesize:
5.38 KB
suspicious functions used:
system (line:54); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: AutoActiveClientsCount11.php-
Full path:
bns/web/AutoActiveClientsCount11.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:07 12/05/2025
Last modified:
08:35:03 14/04/2025
MD5 hash:
a0090e4a11dd59b955a6edd549b6ef2f
Filesize:
5.85 KB
suspicious functions used:
system (line:54); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: client-online-mbb.php-
Full path:
bns/web/client-online-mbb.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:09 12/05/2025
Last modified:
08:35:11 14/04/2025
MD5 hash:
f9961c87922ba8ab0a2ce936569ac691
Filesize:
16.35 KB
suspicious functions used:
curl_exec (line:88);curl_exec (line:287); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: clients-nots-action.php-
Full path:
bns/web/clients-nots-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:09 12/05/2025
Last modified:
08:35:16 14/04/2025
MD5 hash:
dff1bb495509427d098cb4588da553b9
Filesize:
5.89 KB
suspicious functions used:
curl_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients.php-
Full path:
bns/web/Clients.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
08:36:51 12/05/2025
Last modified:
08:35:17 14/04/2025
MD5 hash:
76521095e5cca4898a7789967f197b85
Filesize:
197.89 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:760); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients1.php-
Full path:
bns/web/Clients1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:10 12/05/2025
Last modified:
08:35:18 14/04/2025
MD5 hash:
9e5a881159a04b6aa273ad6507a63f85
Filesize:
197.81 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:764); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients2.php-
Full path:
bns/web/Clients2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:10 12/05/2025
Last modified:
08:35:20 14/04/2025
MD5 hash:
982d6411552113b0715fd17c26f50292
Filesize:
205.13 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:832); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients3.php-
Full path:
bns/web/Clients3.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:10 12/05/2025
Last modified:
08:35:21 14/04/2025
MD5 hash:
50ddc869b383ab76e009c7a2c17c99a3
Filesize:
175.31 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:832); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ClientsOnMap.php-
Full path:
bns/web/ClientsOnMap.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:11 12/05/2025
Last modified:
08:35:25 14/04/2025
MD5 hash:
09d892b9dfcb6450c18306f2676b795e
Filesize:
19.44 KB
suspicious functions used:
`${totalonline}` (line:173);`${totaloffline}` (line:174);`${results.rxPower}` (line:307);`${results.distance}` (line:308);`${results.supplyVoltage}` (line:309);`${results.temperature}` (line:310);`${results.txPower}` (line:311); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ClientsOnMap1.php-
Full path:
bns/web/ClientsOnMap1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:11 12/05/2025
Last modified:
08:35:25 14/04/2025
MD5 hash:
ba0202f8bef3c634e895471057086953
Filesize:
13.14 KB
suspicious functions used:
`${totalonline}` (line:109);`${totaloffline}` (line:110);`${results.rxPower}` (line:243);`${results.distance}` (line:244);`${results.supplyVoltage}` (line:245);`${results.temperature}` (line:246);`${results.txPower}` (line:247); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ClientView.php-
Full path:
bns/web/ClientView.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
08:21:58 12/05/2025
Last modified:
14:19:48 14/04/2025
MD5 hash:
c1027117f22f1c52501b0bfc613fa4e7
Filesize:
111.73 KB
suspicious functions used:
`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:227); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ClientView1.php-
Full path:
bns/web/ClientView1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:11 12/05/2025
Last modified:
08:35:26 14/04/2025
MD5 hash:
ecd7171b944880ac4539623626dbf9d2
Filesize:
111.69 KB
suspicious functions used:
`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:227); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: company_info.php-
Full path:
bns/web/company_info.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
10:30:48 12/05/2025
Last modified:
08:35:27 14/04/2025
MD5 hash:
c8b5ba385f067d33a48369b26ffb4ecc
Filesize:
8.66 KB
suspicious functions used:
curl_exec (line:134); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
bns/web/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:12 12/05/2025
Last modified:
08:35:27 14/04/2025
MD5 hash:
ba9747d0421fd091b998389469e72a0b
Filesize:
1.7 KB
suspicious functions used:
curl_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_all.php-
Full path:
bns/web/cron_all.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:12 12/05/2025
Last modified:
08:35:27 14/04/2025
MD5 hash:
967f1d654ae891609da26b9e0fdbd1ae
Filesize:
2.44 KB
suspicious functions used:
curl_exec (line:23);curl_exec (line:38);curl_exec (line:53); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_gen_bill.php-
Full path:
bns/web/cron_auto_gen_bill.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:12 12/05/2025
Last modified:
08:35:27 14/04/2025
MD5 hash:
f1056618cc4402968e50d1232d2c51c8
Filesize:
4.73 KB
suspicious functions used:
curl_exec (line:140);curl_exec (line:149); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive.php-
Full path:
bns/web/cron_auto_inactive.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:12 12/05/2025
Last modified:
08:35:27 14/04/2025
MD5 hash:
7e0dc4dd9dae2bf0220516641b53c027
Filesize:
5.43 KB
suspicious functions used:
curl_exec (line:142); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive2.php-
Full path:
bns/web/cron_auto_inactive2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:12 12/05/2025
Last modified:
08:35:27 14/04/2025
MD5 hash:
440bc24f05b01eb395df63fff2f60de9
Filesize:
5.46 KB
suspicious functions used:
curl_exec (line:142); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive_termination.php-
Full path:
bns/web/cron_auto_inactive_termination.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:05:12 11/05/2025
Last modified:
08:35:27 14/04/2025
MD5 hash:
49f9f022b288eb3a85139ac8c1afb13c
Filesize:
12.23 KB
suspicious functions used:
curl_exec (line:219);curl_exec (line:231);curl_exec (line:273); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_termination_remainder1.php-
Full path:
bns/web/cron_auto_termination_remainder1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
03:06:33 12/05/2025
Last modified:
08:35:27 14/04/2025
MD5 hash:
7765f9f820dbd402f1064fab9958ffaa
Filesize:
3.26 KB
suspicious functions used:
curl_exec (line:83); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_client_bandwidth_count.php-
Full path:
bns/web/cron_client_bandwidth_count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:35:32 12/05/2025
Last modified:
12:05:18 15/04/2025
MD5 hash:
a1b43b5493187af5b23c7217aeec0cef
Filesize:
6.45 KB
suspicious functions used:
curl_exec (line:159); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_network.php-
Full path:
bns/web/cron_network.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
13:23:51 11/05/2025
Last modified:
08:35:28 14/04/2025
MD5 hash:
36fe709ddc5062ba1fecfe1417fdff91
Filesize:
4 KB
suspicious functions used:
curl_exec (line:42);curl_exec (line:64); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_olt.php-
Full path:
bns/web/cron_olt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
13:08:23 11/05/2025
Last modified:
08:35:28 14/04/2025
MD5 hash:
d91e9626c92e5c3b1128b35cbc4d49fe
Filesize:
3.57 KB
suspicious functions used:
shell_exec (line:46); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_olt_clients_catch.php-
Full path:
bns/web/cron_olt_clients_catch.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:12 12/05/2025
Last modified:
08:35:28 14/04/2025
MD5 hash:
3b13c163ba3445b3d661c63adde1d985
Filesize:
1.12 KB
suspicious functions used:
curl_exec (line:23); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_olt_user.php-
Full path:
bns/web/cron_olt_user.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:12 12/05/2025
Last modified:
08:35:28 14/04/2025
MD5 hash:
67aa237639e3d1e6064e76079bb3cccc
Filesize:
1.97 KB
suspicious functions used:
curl_exec (line:19);curl_exec (line:46); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: EmployeeAdd.php-
Full path:
bns/web/EmployeeAdd.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:12 12/05/2025
Last modified:
08:35:28 14/04/2025
MD5 hash:
c12c85fa282eb15060ed68bad252f8e8
Filesize:
19.13 KB
suspicious functions used:
`Element with ID ${id} not found.` (line:36);`Non-numeric input detected in ${id}.` (line:38);`Element with ID ${id} not found.` (line:44);`Non-numeric input detected in ${id}.` (line:46); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: EmployeeEdit.php-
Full path:
bns/web/EmployeeEdit.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:12 12/05/2025
Last modified:
08:35:29 14/04/2025
MD5 hash:
55b4626339d566473f477e1a001dc8b4
Filesize:
17.73 KB
suspicious functions used:
`Element with ID ${id} not found.` (line:44);`Non-numeric input detected in ${id}.` (line:46);`Element with ID ${id} not found.` (line:52);`Non-numeric input detected in ${id}.` (line:54); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: emp_salary_advence_find.php-
Full path:
bns/web/emp_salary_advence_find.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:12 12/05/2025
Last modified:
08:35:29 14/04/2025
MD5 hash:
74a7e2ffda0f7584611d7cbce6136c24
Filesize:
2.25 KB
suspicious functions used:
`expanse` WHERE `type` = '2' AND `status` = '2' AND ex_by = '$e_id' AND MONTH(`, `) = MONTH('$lastmonth') AND YEAR(`, `) = YEAR('$lastmonth') GROUP BY ` (line:8);`e_id` = '$e_id' AND ` (line:12); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
bns/web/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:12 12/05/2025
Last modified:
08:35:29 14/04/2025
MD5 hash:
c46a50905333286f45dfeacf010851ab
Filesize:
716 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: imagevwr.php-
Full path:
bns/web/imagevwr.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:12 12/05/2025
Last modified:
08:35:33 14/04/2025
MD5 hash:
47a223a13cc642d01dcfaaca542d396d
Filesize:
915 B
suspicious functions used:
curl_exec (line:15); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: getclientuptime.php-
Full path:
bns/web/getclientuptime.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:12 12/05/2025
Last modified:
08:35:33 14/04/2025
MD5 hash:
bbc14cdd451c72b94d78c7d2d1af0b52
Filesize:
718 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index.php-
Full path:
bns/web/index.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
15:51:23 11/05/2025
Last modified:
08:35:33 14/04/2025
MD5 hash:
7d34709a8b60bd4b5fcbd60dc051fb57
Filesize:
16.24 KB
suspicious functions used:
curl_exec (line:287); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: InstrumentsStoreOutDetails.php-
Full path:
bns/web/InstrumentsStoreOutDetails.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:12 12/05/2025
Last modified:
08:35:34 14/04/2025
MD5 hash:
a60c19f766bfff1ccdccbeba6b39eb87
Filesize:
9.37 KB
suspicious functions used:
`update_date`, '%D-%b, %y') AS offdate, TIME_FORMAT(`update_time`, '%T') AS offtime FROM `con_sts_log` WHERE `c_id` = '{$row['c_id']}' AND con_sts = 'Inactive' ORDER BY ` (line:120); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ip-ping-checker.php-
Full path:
bns/web/ip-ping-checker.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:12 12/05/2025
Last modified:
08:35:34 14/04/2025
MD5 hash:
0d28f3053b73b3fe2885cf519ee17c12
Filesize:
2.64 KB
suspicious functions used:
curl_exec (line:81); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: LoginByPass.php-
Full path:
bns/web/LoginByPass.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:12 12/05/2025
Last modified:
08:35:35 14/04/2025
MD5 hash:
62dfe4671985a1f75e62ecbfeef2d034
Filesize:
4.27 KB
suspicious functions used:
curl_exec (line:41); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec.php-
Full path:
bns/web/login_exec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
15:51:23 11/05/2025
Last modified:
08:35:35 14/04/2025
MD5 hash:
15f59b3ba9507a007cf2590c8034ce49
Filesize:
12.6 KB
suspicious functions used:
curl_exec (line:23);curl_exec (line:79);curl_exec (line:209);curl_exec (line:247); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: macreseller-news.php-
Full path:
bns/web/macreseller-news.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:13 12/05/2025
Last modified:
08:35:37 14/04/2025
MD5 hash:
ed23ca98b77c5321b4485e85eb2ea64d
Filesize:
3.67 KB
suspicious functions used:
curl_exec (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: MacResellerAdd.php-
Full path:
bns/web/MacResellerAdd.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:13 12/05/2025
Last modified:
08:35:39 14/04/2025
MD5 hash:
5ac506fcafb554fb6326382737dce0df
Filesize:
29.89 KB
suspicious functions used:
`input[name="${inputName}"]:checked` (line:792); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: MacResellerEdit.php-
Full path:
bns/web/MacResellerEdit.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:13 12/05/2025
Last modified:
08:35:40 14/04/2025
MD5 hash:
60b4a4eac6e169f1bce50574c472cd2a
Filesize:
37.16 KB
suspicious functions used:
`input[name="${inputName}"]:checked` (line:634); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-helper.php-
Full path:
bns/web/nagad-helper.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:13 12/05/2025
Last modified:
08:35:43 14/04/2025
MD5 hash:
114b90b978b842cd318391876ba454ab
Filesize:
2.84 KB
suspicious functions used:
curl_exec (line:46);base64_decode (line:77); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-merchant-callback.php-
Full path:
bns/web/nagad-merchant-callback.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:13 12/05/2025
Last modified:
08:35:43 14/04/2025
MD5 hash:
a782d367c638b8f47cb46738f54fa753
Filesize:
16.47 KB
suspicious functions used:
curl_exec (line:20); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-olt-all-mac-array.php-
Full path:
bns/web/netowrk-olt-all-mac-array.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:14 12/05/2025
Last modified:
08:35:43 14/04/2025
MD5 hash:
b0168ce99145e2afe64357247d750dd6
Filesize:
4.62 KB
suspicious functions used:
shell_exec (line:33);shell_exec (line:47);shell_exec (line:61);shell_exec (line:76);shell_exec (line:93); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-snmp-data-auto.php-
Full path:
bns/web/netowrk-snmp-data-auto.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:14 12/05/2025
Last modified:
08:35:43 14/04/2025
MD5 hash:
b30b86386b4d79a756cefdd86f070bd5
Filesize:
7.27 KB
suspicious functions used:
shell_exec (line:68);shell_exec (line:118); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-snmp-data.php-
Full path:
bns/web/netowrk-snmp-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
09:56:37 12/05/2025
Last modified:
08:35:43 14/04/2025
MD5 hash:
0b1770decbf3e64cf04fffc78339d884
Filesize:
24.7 KB
suspicious functions used:
shell_exec (line:104);shell_exec (line:113);shell_exec (line:123);shell_exec (line:142);shell_exec (line:154);shell_exec (line:165);shell_exec (line:181);shell_exec (line:191);shell_exec (line:207);shell_exec (line:227);shell_exec (line:236);shell_exec (line:244);shell_exec (line:251);shell_exec (line:256);`pon_name` FROM `olt_pon` WHERE `olt_pon_id` = '$pon_id' AND ` (line:263);shell_exec (line:280);shell_exec (line:290);`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:303);shell_exec (line:309);shell_exec (line:441); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-old-onu-rx-map.php-
Full path:
bns/web/network-old-onu-rx-map.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:14 12/05/2025
Last modified:
08:35:43 14/04/2025
MD5 hash:
bfa54cd4fcf2629316f30310fcc90b78
Filesize:
6.93 KB
suspicious functions used:
shell_exec (line:77); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-old-onu-rx.php-
Full path:
bns/web/network-old-onu-rx.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:14 12/05/2025
Last modified:
08:35:43 14/04/2025
MD5 hash:
a2555fb0203a78b0e1f41ae2d96f6f82
Filesize:
7.35 KB
suspicious functions used:
shell_exec (line:86); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-count-cdata.php-
Full path:
bns/web/network-olt-client-onu-mac-count-cdata.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:14 12/05/2025
Last modified:
08:35:43 14/04/2025
MD5 hash:
c378dbabf36066c335cfb8838a6e167d
Filesize:
4.58 KB
suspicious functions used:
shell_exec (line:25);shell_exec (line:35);shell_exec (line:56);shell_exec (line:103);shell_exec (line:115);shell_exec (line:126);shell_exec (line:140); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-count-rcl.php-
Full path:
bns/web/network-olt-client-onu-mac-count-rcl.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:14 12/05/2025
Last modified:
08:35:43 14/04/2025
MD5 hash:
9372dfb2a63d9f4a28440f91d4866778
Filesize:
3.49 KB
suspicious functions used:
shell_exec (line:26);shell_exec (line:73);shell_exec (line:85);shell_exec (line:96);shell_exec (line:110); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-count.php-
Full path:
bns/web/network-olt-client-onu-mac-count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:14 12/05/2025
Last modified:
08:35:43 14/04/2025
MD5 hash:
d30f484c2966e0953d342eb2b8ea0b4a
Filesize:
15.29 KB
suspicious functions used:
shell_exec (line:26);shell_exec (line:36);shell_exec (line:68);shell_exec (line:84);shell_exec (line:101);shell_exec (line:119);shell_exec (line:135);shell_exec (line:176);shell_exec (line:236);shell_exec (line:312);shell_exec (line:379);shell_exec (line:469);shell_exec (line:488);shell_exec (line:507); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-countt.php-
Full path:
bns/web/network-olt-client-onu-mac-countt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:14 12/05/2025
Last modified:
08:35:43 14/04/2025
MD5 hash:
6c684ef0e37eeb3400821b34d0d05fec
Filesize:
8.94 KB
suspicious functions used:
shell_exec (line:26);shell_exec (line:36);shell_exec (line:59);shell_exec (line:75);shell_exec (line:92);shell_exec (line:102);shell_exec (line:117);shell_exec (line:155);shell_exec (line:206);shell_exec (line:262);shell_exec (line:275);shell_exec (line:288); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-con-sts.php-
Full path:
bns/web/network-olt-con-sts.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:14 12/05/2025
Last modified:
08:35:43 14/04/2025
MD5 hash:
400a889537016067b55f97ac6d0a16a3
Filesize:
4.02 KB
suspicious functions used:
`olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:10);shell_exec (line:38);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, `last_synced`, `last_update`, `msg`, `full_msg`, ROUND((SELECT AVG(value) FROM olt_onu_history WHERE alarm_id = '$alarmId' AND value != ''), 2) AS average_value FROM `, ` WHERE `alarm_id` = '$alarmId' AND ` (line:82); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-load.php-
Full path:
bns/web/network-olt-load.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:14 12/05/2025
Last modified:
08:35:43 14/04/2025
MD5 hash:
f49d5153285c639ed91d4e806685ee56
Filesize:
1.33 KB
suspicious functions used:
shell_exec (line:22);shell_exec (line:25); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-oid-check.php-
Full path:
bns/web/network-olt-oid-check.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:14 12/05/2025
Last modified:
08:35:43 14/04/2025
MD5 hash:
5b7dc0ce1103fbfc895873c250b63141
Filesize:
1.88 KB
suspicious functions used:
shell_exec (line:33); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-alarm-add.php-
Full path:
bns/web/network-olt-onu-alarm-add.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:14 12/05/2025
Last modified:
08:35:43 14/04/2025
MD5 hash:
be6ba82c658419e1454f778e20e2d4c3
Filesize:
7.86 KB
suspicious functions used:
shell_exec (line:103); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-count.php-
Full path:
bns/web/network-olt-onu-count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:14 12/05/2025
Last modified:
08:35:44 14/04/2025
MD5 hash:
cbfe569e079da8f569d07af1dec94de5
Filesize:
7.22 KB
suspicious functions used:
`olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:14);shell_exec (line:83); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-list-data.php-
Full path:
bns/web/network-olt-onu-list-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:14 12/05/2025
Last modified:
08:35:44 14/04/2025
MD5 hash:
54cc9417c766c31317311c3722ce7d4b
Filesize:
9.48 KB
suspicious functions used:
shell_exec (line:24);shell_exec (line:38);shell_exec (line:64);shell_exec (line:85);shell_exec (line:104);shell_exec (line:125);shell_exec (line:143);shell_exec (line:153);shell_exec (line:165);shell_exec (line:185); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-power.php-
Full path:
bns/web/network-olt-onu-power.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:14 12/05/2025
Last modified:
08:35:44 14/04/2025
MD5 hash:
2e064543b67b532bdf4e5b12d49c5052
Filesize:
7.54 KB
suspicious functions used:
shell_exec (line:97); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-clients-search.php-
Full path:
bns/web/network-olt-pon-clients-search.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:14 12/05/2025
Last modified:
08:35:44 14/04/2025
MD5 hash:
79d26fc66abdab6f173330588aa8b238
Filesize:
10.93 KB
suspicious functions used:
shell_exec (line:42);shell_exec (line:51);shell_exec (line:104);shell_exec (line:168); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search-bdcom.php-
Full path:
bns/web/network-olt-pon-onu-search-bdcom.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:14 12/05/2025
Last modified:
08:35:44 14/04/2025
MD5 hash:
c786fa8b69268c738b6ff976631798cd
Filesize:
27.74 KB
suspicious functions used:
shell_exec (line:60);shell_exec (line:69);shell_exec (line:383); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search-bdcom1.php-
Full path:
bns/web/network-olt-pon-onu-search-bdcom1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:14 12/05/2025
Last modified:
08:35:44 14/04/2025
MD5 hash:
dd18677b1dcbf7f0bce2ac6912d98da0
Filesize:
9.6 KB
suspicious functions used:
shell_exec (line:42);shell_exec (line:51);shell_exec (line:129); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search-rcl.php-
Full path:
bns/web/network-olt-pon-onu-search-rcl.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:14 12/05/2025
Last modified:
08:35:44 14/04/2025
MD5 hash:
565ff38d572bba4bc20721ab17484554
Filesize:
27.33 KB
suspicious functions used:
shell_exec (line:46);shell_exec (line:55);shell_exec (line:369); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search.php-
Full path:
bns/web/network-olt-pon-onu-search.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:14 12/05/2025
Last modified:
08:35:44 14/04/2025
MD5 hash:
dc183ecf77d0e1f56f672338fd09cfa5
Filesize:
21.62 KB
suspicious functions used:
shell_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data-bdcom-online.php-
Full path:
bns/web/network-snmp-onu-status-data-bdcom-online.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:14 12/05/2025
Last modified:
12:05:18 15/04/2025
MD5 hash:
a07bf06e57c88f5a4e7451d31af1f6f2
Filesize:
21.76 KB
suspicious functions used:
shell_exec (line:48);shell_exec (line:73);shell_exec (line:85);shell_exec (line:103);shell_exec (line:116);shell_exec (line:128);shell_exec (line:134);shell_exec (line:159);shell_exec (line:172);shell_exec (line:184);shell_exec (line:190);shell_exec (line:217);shell_exec (line:230);shell_exec (line:236); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data-bdcom.php-
Full path:
bns/web/network-snmp-onu-status-data-bdcom.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:14 12/05/2025
Last modified:
12:05:19 15/04/2025
MD5 hash:
8e6c4057a9586f2e4cc65277a19854a3
Filesize:
23.58 KB
suspicious functions used:
shell_exec (line:49);shell_exec (line:74);shell_exec (line:86);shell_exec (line:104);shell_exec (line:117);shell_exec (line:129);shell_exec (line:135);shell_exec (line:160);shell_exec (line:173);shell_exec (line:185);shell_exec (line:191);shell_exec (line:218);shell_exec (line:231);shell_exec (line:237); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data-online.php-
Full path:
bns/web/network-snmp-onu-status-data-online.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:14 12/05/2025
Last modified:
12:05:19 15/04/2025
MD5 hash:
eb6748fb3b78c064986e194a8e1666dd
Filesize:
27.71 KB
suspicious functions used:
shell_exec (line:35);`olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:41);shell_exec (line:80);shell_exec (line:94);shell_exec (line:108);shell_exec (line:121);shell_exec (line:196);shell_exec (line:429);shell_exec (line:441);shell_exec (line:448); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data.php-
Full path:
bns/web/network-snmp-onu-status-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:14 12/05/2025
Last modified:
12:05:19 15/04/2025
MD5 hash:
30cb65623c66c45bd502104b935d2c48
Filesize:
30.69 KB
suspicious functions used:
shell_exec (line:36);`olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:42);shell_exec (line:81);shell_exec (line:95);shell_exec (line:109);shell_exec (line:122);shell_exec (line:208);shell_exec (line:436);shell_exec (line:448);shell_exec (line:455); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data1.php-
Full path:
bns/web/network-snmp-onu-status-data1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:14 12/05/2025
Last modified:
08:35:45 14/04/2025
MD5 hash:
21b4726e351c4b0fcb7d6f0959c0d888
Filesize:
15.98 KB
suspicious functions used:
shell_exec (line:34);`olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:38);shell_exec (line:150); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data_vsol2.php-
Full path:
bns/web/network-snmp-onu-status-data_vsol2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:14 12/05/2025
Last modified:
08:35:45 14/04/2025
MD5 hash:
f22d022ddc284f4d8e1de3660da91db8
Filesize:
15.61 KB
suspicious functions used:
shell_exec (line:34);shell_exec (line:113);shell_exec (line:126);shell_exec (line:132); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-tree-vartual-nodes.php-
Full path:
bns/web/network-tree-vartual-nodes.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:14 12/05/2025
Last modified:
08:35:46 14/04/2025
MD5 hash:
ef5de6634f62a12fd5139c800708aa30
Filesize:
10.49 KB
suspicious functions used:
shell_exec (line:76);shell_exec (line:111);shell_exec (line:145);shell_exec (line:181);shell_exec (line:188); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Network.php-
Full path:
bns/web/Network.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:14 12/05/2025
Last modified:
12:05:19 15/04/2025
MD5 hash:
409106e5db394c17f15c282527826d71
Filesize:
69.28 KB
suspicious functions used:
system (line:371);shell_exec (line:654);`network_tree` WHERE `device_type` = '1' AND `olt_id` = '{$rowo['olt_id']}' AND sts = '0' AND ` (line:874); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Network1.php-
Full path:
bns/web/Network1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:14 12/05/2025
Last modified:
08:35:46 14/04/2025
MD5 hash:
c72cb4810d5c70edd9da26884beba751
Filesize:
66.22 KB
suspicious functions used:
system (line:375);shell_exec (line:661); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkLoad.php-
Full path:
bns/web/NetworkLoad.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:15 12/05/2025
Last modified:
08:35:48 14/04/2025
MD5 hash:
e1632e66ee1b7394d3fb82751b924abe
Filesize:
2.83 KB
suspicious functions used:
system (line:81); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkLoad1.php-
Full path:
bns/web/NetworkLoad1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:15 12/05/2025
Last modified:
08:35:48 14/04/2025
MD5 hash:
176bd6931be34d7ef351d22897accc65
Filesize:
759 B
suspicious functions used:
system (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltAddQuery.php-
Full path:
bns/web/NetworkOltAddQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:15 12/05/2025
Last modified:
08:35:48 14/04/2025
MD5 hash:
f2e8bbce7005fe948eab86e12f9e789f
Filesize:
7.96 KB
suspicious functions used:
shell_exec (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltOnuStatus.php-
Full path:
bns/web/NetworkOltOnuStatus.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:15 12/05/2025
Last modified:
08:35:48 14/04/2025
MD5 hash:
d784ec322d1c26ff42aa0530d2a75ad2
Filesize:
70.77 KB
suspicious functions used:
shell_exec (line:42);shell_exec (line:102);shell_exec (line:673);shell_exec (line:786);shell_exec (line:896);shell_exec (line:1006); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltOnuStatus2.php-
Full path:
bns/web/NetworkOltOnuStatus2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:15 12/05/2025
Last modified:
08:35:49 14/04/2025
MD5 hash:
c9a14797fa4353d05bbd9427b6079250
Filesize:
15.88 KB
suspicious functions used:
shell_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltSense.php-
Full path:
bns/web/NetworkOltSense.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:15 12/05/2025
Last modified:
08:35:49 14/04/2025
MD5 hash:
2be664ae5006367f629ca437a6d507f8
Filesize:
18.26 KB
suspicious functions used:
`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, `last_synced`, `last_update`, `msg`, `full_msg`, ROUND((SELECT AVG(value) FROM olt_onu_history WHERE alarm_id = '$alarmId' AND value != ''), 2) AS average_value FROM `, ` WHERE `alarm_id` = '$alarmId' AND ` (line:123); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltSenseDetails.php-
Full path:
bns/web/NetworkOltSenseDetails.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:15 12/05/2025
Last modified:
08:35:49 14/04/2025
MD5 hash:
440096c601fc10b819a1f0f8330928b0
Filesize:
14.17 KB
suspicious functions used:
`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:33);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:42);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:51);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:60); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltSync.php-
Full path:
bns/web/NetworkOltSync.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:15 12/05/2025
Last modified:
08:35:49 14/04/2025
MD5 hash:
06633d4b65a14d677358170dd0a84424
Filesize:
1.87 KB
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree-olt-onu-list-data.php-
Full path:
bns/web/networktree-olt-onu-list-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:15 12/05/2025
Last modified:
08:35:50 14/04/2025
MD5 hash:
af4221fefa9c9051846a063ac4135560
Filesize:
8.72 KB
suspicious functions used:
shell_exec (line:24);shell_exec (line:36);shell_exec (line:59);shell_exec (line:78);shell_exec (line:97);shell_exec (line:116);shell_exec (line:134);shell_exec (line:143);shell_exec (line:155);shell_exec (line:175); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeAddSave.php-
Full path:
bns/web/NetworkTreeAddSave.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:15 12/05/2025
Last modified:
08:35:51 14/04/2025
MD5 hash:
93fdf1213fdb5d525641e2b625f1a91b
Filesize:
7.61 KB
suspicious functions used:
`network_tree` WHERE `olt_id` = '$olt_id' AND ` (line:107); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeEdit1.php-
Full path:
bns/web/NetworkTreeEdit1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:15 12/05/2025
Last modified:
08:35:53 14/04/2025
MD5 hash:
3396a6bdf9b5804bb208f38f37cc29a2
Filesize:
35.81 KB
suspicious functions used:
`olt_onu` WHERE olt_id = '$olt_id' AND ` (line:207); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeEditSave.php-
Full path:
bns/web/NetworkTreeEditSave.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:15 12/05/2025
Last modified:
08:35:53 14/04/2025
MD5 hash:
75ca95ac9b0cf5e9709091d3a6ae5b6a
Filesize:
13.55 KB
suspicious functions used:
`olt_pon` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND ` (line:84);`network_tree` WHERE `olt_id` = '$olt_id' AND ` (line:196); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeList.php-
Full path:
bns/web/NetworkTreeList.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:15 12/05/2025
Last modified:
08:35:53 14/04/2025
MD5 hash:
b201389d88b3bf6e0fbf755647a219c0
Filesize:
31.97 KB
suspicious functions used:
`pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '{$rowsedfg['olt_id']}' AND ` (line:455); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeMap.php-
Full path:
bns/web/NetworkTreeMap.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:15 12/05/2025
Last modified:
08:35:53 14/04/2025
MD5 hash:
9a2606558b5ebf04b77c89eeeb6df1c6
Filesize:
49.36 KB
suspicious functions used:
`${totalonline}` (line:121);`${totaloffline}` (line:122);`Failed to load data: ${error.message}` (line:788);`HTTP error! Status: ${response.status}` (line:803); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeMap1.php-
Full path:
bns/web/NetworkTreeMap1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:15 12/05/2025
Last modified:
08:35:53 14/04/2025
MD5 hash:
468cfbce8d08d577fb1fe05b51eb722f
Filesize:
48.69 KB
suspicious functions used:
`${totalonline}` (line:122);`${totaloffline}` (line:123);`Failed to load data: ${error.message}` (line:776);`HTTP error! Status: ${response.status}` (line:790); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeMap2.php-
Full path:
bns/web/NetworkTreeMap2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:16 12/05/2025
Last modified:
08:35:54 14/04/2025
MD5 hash:
6487967886178db61db1c1d6c4479af3
Filesize:
49.47 KB
suspicious functions used:
`${totalonline}` (line:122);`${totaloffline}` (line:123);`Failed to load data: ${error.message}` (line:769);`HTTP error! Status: ${response.status}` (line:783); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_onu_list_add.php-
Full path:
bns/web/networktree_device_onu_list_add.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:16 12/05/2025
Last modified:
08:35:54 14/04/2025
MD5 hash:
23aa4b30ff4514610497db10c8490003
Filesize:
16.07 KB
suspicious functions used:
shell_exec (line:31);`network_tree` WHERE `onu_mac` = '$mac_address' AND ` (line:129);`olt_pon` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND ` (line:163);shell_exec (line:198);shell_exec (line:221);shell_exec (line:238);`network_tree` WHERE `onu_mac` = '$onuMac' AND ` (line:276);shell_exec (line:302);shell_exec (line:308);shell_exec (line:319);`network_tree` WHERE `onu_mac` = '$onuMac' AND ` (line:355);`olt_pon` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND ` (line:391); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_pon_check.php-
Full path:
bns/web/networktree_device_pon_check.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:16 12/05/2025
Last modified:
08:35:54 14/04/2025
MD5 hash:
b7f8731e7d12665b418927d722340da4
Filesize:
1.58 KB
suspicious functions used:
`pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '$olt_id' AND ` (line:8); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_pon_list_add.php-
Full path:
bns/web/networktree_device_pon_list_add.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:16 12/05/2025
Last modified:
08:35:54 14/04/2025
MD5 hash:
2cf70db6a91f4c5d1821b4b5fa178ebb
Filesize:
1.38 KB
suspicious functions used:
`olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:6);`olt_pon` WHERE `olt_id` = '$olt_id' AND ` (line:10);`network_tree` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND ` (line:17); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_pon_port_onu_list.php-
Full path:
bns/web/networktree_device_pon_port_onu_list.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:16 12/05/2025
Last modified:
08:35:55 14/04/2025
MD5 hash:
6578424616a5eefb751d5e3e155adba6
Filesize:
8.63 KB
suspicious functions used:
`olt_pon` WHERE olt_id = '$olt_id' AND ` (line:25);shell_exec (line:32);shell_exec (line:45);`network_tree` WHERE onu_index_id = '$port_onu_index_id' AND ` (line:49);shell_exec (line:81);shell_exec (line:104);shell_exec (line:123);shell_exec (line:144);shell_exec (line:162);shell_exec (line:171);shell_exec (line:185); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_pon_port_sense_list.php-
Full path:
bns/web/networktree_device_pon_port_sense_list.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:16 12/05/2025
Last modified:
08:35:55 14/04/2025
MD5 hash:
4d80475d2f31f38e21239a5a1a19285f
Filesize:
3.7 KB
suspicious functions used:
`network_tree` WHERE `onu_mac` = '$onu_mac' AND ` (line:26);`network_tree` WHERE `c_id` = '{$dfhbdxf}' AND ` (line:72); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_type.php-
Full path:
bns/web/networktree_device_type.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:16 12/05/2025
Last modified:
08:35:55 14/04/2025
MD5 hash:
f1520732e5a3ef38564238a3278a1f63
Filesize:
11.43 KB
suspicious functions used:
`tree_id`) AS countolt FROM `network_tree` WHERE `olt_id` = '$olt_id_sure' AND ` (line:64); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: olt_all_onu_mac.php-
Full path:
bns/web/olt_all_onu_mac.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:16 12/05/2025
Last modified:
08:35:55 14/04/2025
MD5 hash:
bde00602b98fba3ce9f7669b0d6f0fa3
Filesize:
4.56 KB
suspicious functions used:
shell_exec (line:22);shell_exec (line:38);shell_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery.php-
Full path:
bns/web/PaymentOnlineQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
13:09:11 11/05/2025
Last modified:
08:36:02 14/04/2025
MD5 hash:
6a845f0e20c434c12eb30f42726f268d
Filesize:
28.37 KB
suspicious functions used:
curl_exec (line:457);curl_exec (line:669); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery2.php-
Full path:
bns/web/PaymentOnlineQuery2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:17 12/05/2025
Last modified:
08:36:02 14/04/2025
MD5 hash:
ccd315d11a60901b7b9029ff44f8351b
Filesize:
19.4 KB
suspicious functions used:
curl_exec (line:42);curl_exec (line:252); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentWebhook.php-
Full path:
bns/web/PaymentWebhook.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:17 12/05/2025
Last modified:
08:36:03 14/04/2025
MD5 hash:
a2f322c94787630ab1e0c8ca35fc5ba1
Filesize:
18.6 KB
suspicious functions used:
base64_decode (line:30);curl_exec (line:41);curl_exec (line:422); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SignUp1.php-
Full path:
bns/web/SignUp1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:18 12/05/2025
Last modified:
08:36:11 14/04/2025
MD5 hash:
3f7943dd155c8e0a383b7d02730f8c11
Filesize:
24.59 KB
suspicious functions used:
curl_exec (line:33);curl_exec (line:59); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: sms-balance-check.php-
Full path:
bns/web/sms-balance-check.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
15:13:16 11/05/2025
Last modified:
08:36:12 14/04/2025
MD5 hash:
7e43f03d032c8b48bff16403d08c7950
Filesize:
850 B
suspicious functions used:
curl_exec (line:15); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMS.php-
Full path:
bns/web/SMS.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
13:10:44 11/05/2025
Last modified:
08:36:12 14/04/2025
MD5 hash:
25b5422d1cc92b4d2253417e72d9a658
Filesize:
37.37 KB
suspicious functions used:
curl_exec (line:56); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMS1.php-
Full path:
bns/web/SMS1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:18 12/05/2025
Last modified:
08:36:12 14/04/2025
MD5 hash:
e4671dadf9ad575671fd3609a60030da
Filesize:
32.19 KB
suspicious functions used:
curl_exec (line:59); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMSAddSave.php-
Full path:
bns/web/SMSAddSave.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:18 12/05/2025
Last modified:
08:36:12 14/04/2025
MD5 hash:
0d2d0548df5f32e69264c4f2f1b1f76e
Filesize:
2.12 KB
suspicious functions used:
curl_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: sms_deliverey_report.php-
Full path:
bns/web/sms_deliverey_report.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
03:06:33 12/05/2025
Last modified:
08:36:15 14/04/2025
MD5 hash:
03623943da7e9334e137b38c8577fc84
Filesize:
4.25 KB
suspicious functions used:
curl_exec (line:28);curl_exec (line:53);curl_exec (line:90); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: support-action.php-
Full path:
bns/web/support-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:19 12/05/2025
Last modified:
08:36:15 14/04/2025
MD5 hash:
b8c8c56826a0a8e027a23e6a365c70a0
Filesize:
14.54 KB
suspicious functions used:
curl_exec (line:220); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tagreeexpayment.php-
Full path:
bns/web/tagreeexpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
13:08:57 11/05/2025
Last modified:
08:36:17 14/04/2025
MD5 hash:
029b4fba649a75c7c81d2f8931be8d63
Filesize:
2.86 KB
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreateagree.php-
Full path:
bns/web/tcreateagree.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
13:08:22 11/05/2025
Last modified:
08:36:17 14/04/2025
MD5 hash:
27a10adf4190edc7eceee8cf74a6b72b
Filesize:
999 B
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreatepayment.php-
Full path:
bns/web/tcreatepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
13:08:57 11/05/2025
Last modified:
08:36:17 14/04/2025
MD5 hash:
e49de9a33f5164bc2c6b88e4770faaff
Filesize:
1.07 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test2.php-
Full path:
bns/web/test2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:19 12/05/2025
Last modified:
08:36:17 14/04/2025
MD5 hash:
ab80d92ede21b7da59bfefb325484297
Filesize:
13.76 KB
suspicious functions used:
shell_exec (line:59);shell_exec (line:70);shell_exec (line:76);shell_exec (line:88);shell_exec (line:101);shell_exec (line:141);curl_exec (line:187);curl_exec (line:212);curl_exec (line:354); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test6.php-
Full path:
bns/web/test6.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:19 12/05/2025
Last modified:
08:36:17 14/04/2025
MD5 hash:
f22d022ddc284f4d8e1de3660da91db8
Filesize:
15.61 KB
suspicious functions used:
shell_exec (line:34);shell_exec (line:113);shell_exec (line:126);shell_exec (line:132); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test7.php-
Full path:
bns/web/test7.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:19 12/05/2025
Last modified:
08:36:17 14/04/2025
MD5 hash:
b11ccf951ce63a21ea0a7328316a0e5c
Filesize:
1.57 KB
suspicious functions used:
curl_exec (line:14); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test8.php-
Full path:
bns/web/test8.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:19 12/05/2025
Last modified:
08:36:17 14/04/2025
MD5 hash:
0da20f06359cae632ac4b808ab2eee77
Filesize:
3.65 KB
suspicious functions used:
shell_exec (line:48); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test9.php-
Full path:
bns/web/test9.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:19 12/05/2025
Last modified:
08:36:17 14/04/2025
MD5 hash:
87b5d5bf52fb36a8ccea006021ec8820
Filesize:
7.17 KB
suspicious functions used:
shell_exec (line:44);shell_exec (line:69);shell_exec (line:81);shell_exec (line:104);shell_exec (line:126);shell_exec (line:140);shell_exec (line:153);shell_exec (line:165);shell_exec (line:171); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: testttttt.php-
Full path:
bns/web/testttttt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:19 12/05/2025
Last modified:
08:36:17 14/04/2025
MD5 hash:
b1988a4be29e191ad935fb409a4174ee
Filesize:
2 KB
suspicious functions used:
curl_exec (line:47); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: texecutepayment.php-
Full path:
bns/web/texecutepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
13:09:11 11/05/2025
Last modified:
08:36:17 14/04/2025
MD5 hash:
623635fdf5c871391d3a5fe99ee8c543
Filesize:
2.91 KB
suspicious functions used:
curl_exec (line:24); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: time.php-
Full path:
bns/web/time.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:19 12/05/2025
Last modified:
08:36:17 14/04/2025
MD5 hash:
f72a880b38cb26f3d208bfe99eec1633
Filesize:
5.25 KB
suspicious functions used:
`${formatDistance(totalDistance)}` (line:121);`${Math.round(distance)} m`, `${(distance / 1000).toFixed(2)} km` (line:150); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tis-news.php-
Full path:
bns/web/tis-news.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
09:56:49 12/05/2025
Last modified:
08:36:18 14/04/2025
MD5 hash:
ed23ca98b77c5321b4485e85eb2ea64d
Filesize:
3.67 KB
suspicious functions used:
curl_exec (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
bns/web/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:19 12/05/2025
Last modified:
08:36:18 14/04/2025
MD5 hash:
7d8e71ceda3ffb74623e0c4a814715af
Filesize:
1.53 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tt.php-
Full path:
bns/web/tt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:19 12/05/2025
Last modified:
08:36:19 14/04/2025
MD5 hash:
9c4ed141cb79fdc7e807b35923c91a20
Filesize:
1.56 KB
suspicious functions used:
curl_exec (line:30); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ttoken.php-
Full path:
bns/web/ttoken.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:19 12/05/2025
Last modified:
08:36:19 14/04/2025
MD5 hash:
5f2c51c1db5b0defadfb67ce25c0098f
Filesize:
1.54 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: UserAccess.php-
Full path:
bns/web/UserAccess.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:19 12/05/2025
Last modified:
08:36:20 14/04/2025
MD5 hash:
896b3f5a3c89a611b1b37bf80820cf7b
Filesize:
10.45 KB
suspicious functions used:
`.modulecheckboxx[data-group="${group}"]` (line:159); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook.php-
Full path:
bns/web/webhook.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:20 12/05/2025
Last modified:
08:36:22 14/04/2025
MD5 hash:
69a88ae1be0ab3ab1c7c971c72c0b025
Filesize:
21.93 KB
suspicious functions used:
base64_decode (line:28);curl_exec (line:39);curl_exec (line:465); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook_cid.php-
Full path:
bns/web/webhook_cid.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:20 12/05/2025
Last modified:
08:36:22 14/04/2025
MD5 hash:
1a2672fc0dd81a9c831e3fa60ec860e1
Filesize:
21.52 KB
suspicious functions used:
base64_decode (line:29);curl_exec (line:40);curl_exec (line:439); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook_test.php-
Full path:
bns/web/webhook_test.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:20 12/05/2025
Last modified:
08:36:22 14/04/2025
MD5 hash:
74a7dcc262d7fe7f2bdc9e0595d03837
Filesize:
4.69 KB
suspicious functions used:
base64_decode (line:22);curl_exec (line:33);curl_exec (line:86);curl_exec (line:107); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: billpaycheck.php-
Full path:
bns/web/bkash/billpaycheck.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:20 12/05/2025
Last modified:
08:36:27 14/04/2025
MD5 hash:
38c46efc36b25628fa18bd92ae135af9
Filesize:
796 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
bns/web/bkash/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:21 12/05/2025
Last modified:
08:36:28 14/04/2025
MD5 hash:
6175301f744b22b7db70ba598a991f8b
Filesize:
1.64 KB
suspicious functions used:
curl_exec (line:36); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
bns/web/bkash/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:21 12/05/2025
Last modified:
08:36:28 14/04/2025
MD5 hash:
19be365d26141eaecead7ef0ada0e75c
Filesize:
1.3 KB
suspicious functions used:
curl_exec (line:31); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: grant.php-
Full path:
bns/web/bkash/grant.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:21 12/05/2025
Last modified:
08:36:28 14/04/2025
MD5 hash:
da5499d260dc78ea4fcd71227cc6c484
Filesize:
2.01 KB
suspicious functions used:
curl_exec (line:41);curl_exec (line:63); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: query.php-
Full path:
bns/web/bkash/query.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:21 12/05/2025
Last modified:
08:36:28 14/04/2025
MD5 hash:
f3ed9045f3a073e2cdc8561d500bda89
Filesize:
1.65 KB
suspicious functions used:
curl_exec (line:33); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tagreeexpayment.php-
Full path:
bns/web/bkash/tagreeexpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:21 12/05/2025
Last modified:
08:36:28 14/04/2025
MD5 hash:
a1ba7d36003f72e593615aa32e44acb9
Filesize:
1.58 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreateagree.php-
Full path:
bns/web/bkash/tcreateagree.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:21 12/05/2025
Last modified:
08:36:28 14/04/2025
MD5 hash:
8ae6bdc9f3d4b0cdcf651701a0d9ebab
Filesize:
1.2 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreatepayment.php-
Full path:
bns/web/bkash/tcreatepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:21 12/05/2025
Last modified:
08:36:28 14/04/2025
MD5 hash:
3c978def6cffa0a8db5e86ce127caae6
Filesize:
1.35 KB
suspicious functions used:
curl_exec (line:29); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: texecutepayment.php-
Full path:
bns/web/bkash/texecutepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:21 12/05/2025
Last modified:
08:36:28 14/04/2025
MD5 hash:
d8f24df64623da3cfc2baf48f184a3d1
Filesize:
1.21 KB
suspicious functions used:
curl_exec (line:25); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
bns/web/bkash/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:21 12/05/2025
Last modified:
08:36:28 14/04/2025
MD5 hash:
f50b33eeb31927b2c081195618d48b8d
Filesize:
1.88 KB
suspicious functions used:
curl_exec (line:48); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tokent.php-
Full path:
bns/web/bkash/tokent.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:21 12/05/2025
Last modified:
08:36:28 14/04/2025
MD5 hash:
890a9e9fb1be75f31a6daad8811c1ff9
Filesize:
1.9 KB
suspicious functions used:
curl_exec (line:48); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: trxID.php-
Full path:
bns/web/bkash/trxID.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:21 12/05/2025
Last modified:
08:36:28 14/04/2025
MD5 hash:
9bcb8e70728fd25807c4db8916166d74
Filesize:
1.44 KB
suspicious functions used:
curl_exec (line:31); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
bns/web/bkasht/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:21 12/05/2025
Last modified:
08:36:29 14/04/2025
MD5 hash:
a4ba6e7683f558dc3602dacd7ddeded2
Filesize:
1.36 KB
suspicious functions used:
curl_exec (line:29); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
bns/web/bkasht/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:21 12/05/2025
Last modified:
08:36:29 14/04/2025
MD5 hash:
aad462fbca9f9a36649a197d67403098
Filesize:
1.27 KB
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: grant.php-
Full path:
bns/web/bkasht/grant.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:21 12/05/2025
Last modified:
08:36:29 14/04/2025
MD5 hash:
da5499d260dc78ea4fcd71227cc6c484
Filesize:
2.01 KB
suspicious functions used:
curl_exec (line:41);curl_exec (line:63); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: query.php-
Full path:
bns/web/bkasht/query.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:21 12/05/2025
Last modified:
08:36:29 14/04/2025
MD5 hash:
f3ed9045f3a073e2cdc8561d500bda89
Filesize:
1.65 KB
suspicious functions used:
curl_exec (line:33); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
bns/web/bkasht/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:21 12/05/2025
Last modified:
08:36:29 14/04/2025
MD5 hash:
f50b33eeb31927b2c081195618d48b8d
Filesize:
1.88 KB
suspicious functions used:
curl_exec (line:48); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: trxID.php-
Full path:
bns/web/bkasht/trxID.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:21 12/05/2025
Last modified:
08:36:29 14/04/2025
MD5 hash:
9bcb8e70728fd25807c4db8916166d74
Filesize:
1.44 KB
suspicious functions used:
curl_exec (line:31); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: class.phpmailer.php-
Full path:
bns/web/email/class.phpmailer.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:21 12/05/2025
Last modified:
08:36:30 14/04/2025
MD5 hash:
68468d69b47fffecc89df57e27c5a781
Filesize:
143.32 KB
suspicious functions used:
`$DKIM_private` (line:428);popen (line:1387);popen (line:1408);base64_decode (line:3410);`$mail->set('SMTPSecure', 'tls');` (line:3688);`$mail->SMTPSecure = 'tls';` (line:3690); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: class.smtp.php-
Full path:
bns/web/email/class.smtp.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:21 12/05/2025
Last modified:
08:36:30 14/04/2025
MD5 hash:
aa8478329268e5438a4469c268337a10
Filesize:
41.44 KB
suspicious functions used:
base64_decode (line:513);base64_decode (line:533); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: jqgrid.php-
Full path:
bns/web/inc/jqgrid.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:22 12/05/2025
Last modified:
08:36:36 14/04/2025
MD5 hash:
71027a29e71e0626d8b57cbb631e6d98
Filesize:
23.92 KB
suspicious functions used:
eval (line:397); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: JSON.php-
Full path:
bns/web/inc/JSON.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:22 12/05/2025
Last modified:
08:36:36 14/04/2025
MD5 hash:
f5a34509e06231308becbe320ade9ff6
Filesize:
33.22 KB
suspicious functions used:
eval (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: smsapicore.php-
Full path:
bns/web/include/smsapicore.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
13:09:12 11/05/2025
Last modified:
08:36:38 14/04/2025
MD5 hash:
0494713963b7e9ead12abe06de2811a5
Filesize:
1.26 KB
suspicious functions used:
curl_exec (line:37); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: telegramapicore.php-
Full path:
bns/web/include/telegramapicore.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
15:26:52 11/05/2025
Last modified:
08:36:38 14/04/2025
MD5 hash:
511f56e6dfcf4e9e7a11259e023ca3ae
Filesize:
3.15 KB
suspicious functions used:
curl_exec (line:68); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ui.php-
Full path:
bns/web/js/tinymce/themes/advanced/skins/highcontrast/ui.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
09:56:22 12/05/2025
Last modified:
08:37:01 14/04/2025
MD5 hash:
3edaf67be8573b86686f46bbba4f058c
Filesize:
4.53 KB
suspicious functions used:
curl_exec (line:20);`bill_amount` = '0.00' WHERE bill_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY ` (line:53);`bill_amount` = '0.00', days = '0.00' WHERE entry_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY ` (line:54);`payment` WHERE `pay_date` < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND pay_amount != '0.00' ORDER BY ` (line:55);curl_exec (line:146);curl_exec (line:168); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Changes.txt-
Full path:
bns/web/js/jqgrid/js/Changes.txt
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:22 12/05/2025
Last modified:
08:36:51 14/04/2025
MD5 hash:
c0a4adbc3f1c6d592cb4fa8433fee9ea
Filesize:
44.32 KB
suspicious functions used:
system (line:87); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
bns/m/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:23 12/05/2025
Last modified:
08:34:44 14/04/2025
MD5 hash:
849185f307be30eafb1bbef93616d8c3
Filesize:
1.71 KB
suspicious functions used:
curl_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
bns/m/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:23 12/05/2025
Last modified:
08:34:45 14/04/2025
MD5 hash:
9a3f22521ad987e86f84c4f5f688d5b7
Filesize:
713 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index.php-
Full path:
bns/m/index.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
03:54:55 12/05/2025
Last modified:
08:34:45 14/04/2025
MD5 hash:
3de6e058906d8b532231a98b01be945f
Filesize:
16.58 KB
suspicious functions used:
curl_exec (line:287); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: LoginByPass.php-
Full path:
bns/m/LoginByPass.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:23 12/05/2025
Last modified:
08:34:45 14/04/2025
MD5 hash:
78857bab4dd47ed878669236631eb1c9
Filesize:
4.27 KB
suspicious functions used:
curl_exec (line:41); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec.php-
Full path:
bns/m/login_exec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:23 12/05/2025
Last modified:
08:34:45 14/04/2025
MD5 hash:
f6c982c68b180c2222a746a90789a357
Filesize:
12.61 KB
suspicious functions used:
curl_exec (line:24);curl_exec (line:80);curl_exec (line:210);curl_exec (line:248); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-merchant-callback.php-
Full path:
bns/m/nagad-merchant-callback.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:23 12/05/2025
Last modified:
08:34:46 14/04/2025
MD5 hash:
3fcf93d3aec6449a76e27b14f01ada02
Filesize:
11.32 KB
suspicious functions used:
curl_exec (line:20); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-snmp-data.php-
Full path:
bns/m/netowrk-snmp-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:23 12/05/2025
Last modified:
08:34:46 14/04/2025
MD5 hash:
75622375b3ee37723d953e8a83735ef7
Filesize:
23.92 KB
suspicious functions used:
shell_exec (line:96);shell_exec (line:105);shell_exec (line:115);shell_exec (line:134);shell_exec (line:146);shell_exec (line:157);shell_exec (line:173);shell_exec (line:183);shell_exec (line:199);shell_exec (line:219);shell_exec (line:229);shell_exec (line:234);shell_exec (line:242);shell_exec (line:262);shell_exec (line:278);`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:291);shell_exec (line:297);shell_exec (line:430); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery.php-
Full path:
bns/m/PaymentOnlineQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:24 12/05/2025
Last modified:
08:34:47 14/04/2025
MD5 hash:
6483645d440dd2f976cc1b29cb4021d5
Filesize:
20.95 KB
suspicious functions used:
curl_exec (line:287);curl_exec (line:492); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery2.php-
Full path:
bns/m/PaymentOnlineQuery2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:24 12/05/2025
Last modified:
08:34:47 14/04/2025
MD5 hash:
3660992067d5591fc79ce89d6dbb9274
Filesize:
19.08 KB
suspicious functions used:
curl_exec (line:41);curl_exec (line:254); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: support-action.php-
Full path:
bns/m/support-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:24 12/05/2025
Last modified:
08:34:48 14/04/2025
MD5 hash:
adb69d6d3e277ad4c464c4fd0c41b4ca
Filesize:
10.29 KB
suspicious functions used:
curl_exec (line:99); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tagreeexpayment.php-
Full path:
bns/m/tagreeexpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:24 12/05/2025
Last modified:
08:34:49 14/04/2025
MD5 hash:
c95e3ee881752db67b4f3597bc58430a
Filesize:
2.46 KB
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreateagree.php-
Full path:
bns/m/tcreateagree.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:24 12/05/2025
Last modified:
08:34:49 14/04/2025
MD5 hash:
27a10adf4190edc7eceee8cf74a6b72b
Filesize:
999 B
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreatepayment.php-
Full path:
bns/m/tcreatepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:24 12/05/2025
Last modified:
08:34:49 14/04/2025
MD5 hash:
e49de9a33f5164bc2c6b88e4770faaff
Filesize:
1.07 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: texecutepayment.php-
Full path:
bns/m/texecutepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:24 12/05/2025
Last modified:
08:34:49 14/04/2025
MD5 hash:
efbb63dfcfdacb52dec74bffc389bbb3
Filesize:
2.67 KB
suspicious functions used:
curl_exec (line:24); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
bns/m/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:24 12/05/2025
Last modified:
08:34:49 14/04/2025
MD5 hash:
7d8e71ceda3ffb74623e0c4a814715af
Filesize:
1.53 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ttoken.php-
Full path:
bns/m/ttoken.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:24 12/05/2025
Last modified:
08:34:49 14/04/2025
MD5 hash:
5f2c51c1db5b0defadfb67ce25c0098f
Filesize:
1.54 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-helper.php-
Full path:
bo/m/nagad-helper.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:25 12/05/2025
Last modified:
23:13:04 30/08/2024
MD5 hash:
2bb70c44d68202e0a0cd8ae1388f0b1b
Filesize:
6.74 KB
suspicious functions used:
curl_exec (line:61);base64_decode (line:97); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tagreeexpayment.php-
Full path:
bo/m/tagreeexpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:25 12/05/2025
Last modified:
23:13:05 30/08/2024
MD5 hash:
c95e3ee881752db67b4f3597bc58430a
Filesize:
2.46 KB
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
bo/m/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:25 12/05/2025
Last modified:
23:13:05 30/08/2024
MD5 hash:
7d8e71ceda3ffb74623e0c4a814715af
Filesize:
1.53 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: support-action.php-
Full path:
bo/m/support-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:26 12/05/2025
Last modified:
23:13:05 30/08/2024
MD5 hash:
2fc6fd844db911a5502a7a6ae383990f
Filesize:
10.31 KB
suspicious functions used:
curl_exec (line:99); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
bo/m/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:26 12/05/2025
Last modified:
23:12:44 30/08/2024
MD5 hash:
849185f307be30eafb1bbef93616d8c3
Filesize:
1.71 KB
suspicious functions used:
curl_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreateagree.php-
Full path:
bo/m/tcreateagree.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:26 12/05/2025
Last modified:
23:13:05 30/08/2024
MD5 hash:
27a10adf4190edc7eceee8cf74a6b72b
Filesize:
999 B
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
bo/m/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:26 12/05/2025
Last modified:
23:12:44 30/08/2024
MD5 hash:
9a3f22521ad987e86f84c4f5f688d5b7
Filesize:
713 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index.php-
Full path:
bo/m/index.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
18:40:28 11/05/2025
Last modified:
23:13:04 30/08/2024
MD5 hash:
9a5dc16d9d603e4fe488b2349f6197a3
Filesize:
12.47 KB
suspicious functions used:
base64_decode (line:10);curl_exec (line:183); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery.php-
Full path:
bo/m/PaymentOnlineQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:26 12/05/2025
Last modified:
23:13:04 30/08/2024
MD5 hash:
c7aca21e5a61ded371d4b853710cf4b4
Filesize:
21.14 KB
suspicious functions used:
curl_exec (line:287);curl_exec (line:512); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery2.php-
Full path:
bo/m/PaymentOnlineQuery2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:26 12/05/2025
Last modified:
23:13:04 30/08/2024
MD5 hash:
37be1b3f51cac8d936abe043bc79ed4b
Filesize:
19.08 KB
suspicious functions used:
curl_exec (line:41);curl_exec (line:254); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreatepayment.php-
Full path:
bo/m/tcreatepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:27 12/05/2025
Last modified:
23:13:05 30/08/2024
MD5 hash:
e49de9a33f5164bc2c6b88e4770faaff
Filesize:
1.07 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec.php-
Full path:
bo/m/login_exec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:27 12/05/2025
Last modified:
23:13:04 30/08/2024
MD5 hash:
1f800365ef270564df77d30c1bfd7ed3
Filesize:
5.4 KB
suspicious functions used:
curl_exec (line:66); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec1.php-
Full path:
bo/m/login_exec1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:27 12/05/2025
Last modified:
23:13:04 30/08/2024
MD5 hash:
46b08782f51ba75b23e27183e06370fe
Filesize:
4.28 KB
suspicious functions used:
curl_exec (line:61); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ttoken.php-
Full path:
bo/m/ttoken.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:27 12/05/2025
Last modified:
23:13:05 30/08/2024
MD5 hash:
5f2c51c1db5b0defadfb67ce25c0098f
Filesize:
1.54 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-merchant-callback.php-
Full path:
bo/m/nagad-merchant-callback.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:27 12/05/2025
Last modified:
23:13:04 30/08/2024
MD5 hash:
1ca42269a7e5563f13a266d9c0ce5049
Filesize:
11.75 KB
suspicious functions used:
curl_exec (line:20); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: texecutepayment.php-
Full path:
bo/m/texecutepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:27 12/05/2025
Last modified:
23:13:05 30/08/2024
MD5 hash:
efbb63dfcfdacb52dec74bffc389bbb3
Filesize:
2.67 KB
suspicious functions used:
curl_exec (line:24); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: class.phpmailer.php-
Full path:
bo/web/email/class.phpmailer.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:27 12/05/2025
Last modified:
23:13:15 30/08/2024
MD5 hash:
68468d69b47fffecc89df57e27c5a781
Filesize:
143.32 KB
suspicious functions used:
`$DKIM_private` (line:428);popen (line:1387);popen (line:1408);base64_decode (line:3410);`$mail->set('SMTPSecure', 'tls');` (line:3688);`$mail->SMTPSecure = 'tls';` (line:3690); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: class.smtp.php-
Full path:
bo/web/email/class.smtp.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:27 12/05/2025
Last modified:
23:13:15 30/08/2024
MD5 hash:
aa8478329268e5438a4469c268337a10
Filesize:
41.44 KB
suspicious functions used:
base64_decode (line:513);base64_decode (line:533); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: JSON.php-
Full path:
bo/web/inc/JSON.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:28 12/05/2025
Last modified:
23:13:35 30/08/2024
MD5 hash:
f5a34509e06231308becbe320ade9ff6
Filesize:
33.22 KB
suspicious functions used:
eval (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: jqgrid.php-
Full path:
bo/web/inc/jqgrid.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:28 12/05/2025
Last modified:
23:13:35 30/08/2024
MD5 hash:
71027a29e71e0626d8b57cbb631e6d98
Filesize:
23.92 KB
suspicious functions used:
eval (line:397); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: smsapicore.php-
Full path:
bo/web/include/smsapicore.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:30:18 12/05/2025
Last modified:
23:57:02 30/08/2024
MD5 hash:
2333f3a58bd3496021a263071ee920eb
Filesize:
1.25 KB
suspicious functions used:
curl_exec (line:36); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: telegramapicore.php-
Full path:
bo/web/include/telegramapicore.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
10:22:49 12/05/2025
Last modified:
23:13:36 30/08/2024
MD5 hash:
535fa7aac83b0e1ba56be7837348b6d9
Filesize:
2.9 KB
suspicious functions used:
curl_exec (line:63); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Changes.txt-
Full path:
bo/web/js/jqgrid/js/Changes.txt
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:28 12/05/2025
Last modified:
23:13:45 30/08/2024
MD5 hash:
c0a4adbc3f1c6d592cb4fa8433fee9ea
Filesize:
44.32 KB
suspicious functions used:
system (line:87); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ui.php-
Full path:
bo/web/js/tinymce/themes/advanced/skins/highcontrast/ui.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:29 12/05/2025
Last modified:
23:13:52 30/08/2024
MD5 hash:
3edaf67be8573b86686f46bbba4f058c
Filesize:
4.53 KB
suspicious functions used:
curl_exec (line:20);`bill_amount` = '0.00' WHERE bill_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY ` (line:53);`bill_amount` = '0.00', days = '0.00' WHERE entry_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY ` (line:54);`payment` WHERE `pay_date` < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND pay_amount != '0.00' ORDER BY ` (line:55);curl_exec (line:146);curl_exec (line:168); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: AutoActiveClientsCount1.php-
Full path:
bo/web/AutoActiveClientsCount1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:30 12/05/2025
Last modified:
23:13:09 30/08/2024
MD5 hash:
fb443f2f93781a8fffce803317592c41
Filesize:
6.12 KB
suspicious functions used:
system (line:56); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: AutoActiveClientsCount11.php-
Full path:
bo/web/AutoActiveClientsCount11.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:30 12/05/2025
Last modified:
23:13:09 30/08/2024
MD5 hash:
a0090e4a11dd59b955a6edd549b6ef2f
Filesize:
5.85 KB
suspicious functions used:
system (line:54); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ClientsOnMap.php-
Full path:
bo/web/ClientsOnMap.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:30 12/05/2025
Last modified:
23:13:10 30/08/2024
MD5 hash:
c215e99f04430155ff97c6d82aa6994d
Filesize:
10.59 KB
suspicious functions used:
`${totalonline}` (line:97);`${totaloffline}` (line:98); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients.php-
Full path:
bo/web/Clients.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
04:57:13 12/05/2025
Last modified:
05:02:27 02/09/2024
MD5 hash:
3f8a2ea36b7ad48c12a741590c217c20
Filesize:
175.21 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:832); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients2.php-
Full path:
bo/web/Clients2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:32 12/05/2025
Last modified:
23:13:10 30/08/2024
MD5 hash:
4d7acc879510998b2909318d8638d804
Filesize:
168.05 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:816); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients3.php-
Full path:
bo/web/Clients3.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:32 12/05/2025
Last modified:
23:13:10 30/08/2024
MD5 hash:
7b4a7d07d9658aa7c159cd59ebae283a
Filesize:
175.3 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:832); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: InstrumentsStoreOutDetails.php-
Full path:
bo/web/InstrumentsStoreOutDetails.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:34 12/05/2025
Last modified:
23:13:11 30/08/2024
MD5 hash:
ab68ab13bcfd51da15e72a3d4e9817e8
Filesize:
9.37 KB
suspicious functions used:
`update_date`, '%D-%b, %y') AS offdate, TIME_FORMAT(`update_time`, '%T') AS offtime FROM `con_sts_log` WHERE `c_id` = '{$row['c_id']}' AND con_sts = 'Inactive' ORDER BY ` (line:120); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Network.php-
Full path:
bo/web/Network.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:34 12/05/2025
Last modified:
14:50:53 25/09/2024
MD5 hash:
c49d6e7b6f15eb198050622343c25e88
Filesize:
55.23 KB
suspicious functions used:
system (line:358);shell_exec (line:654); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Network1.php-
Full path:
bo/web/Network1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:34 12/05/2025
Last modified:
05:02:27 02/09/2024
MD5 hash:
95f9922e23cb36ebd65d603a48d22c4b
Filesize:
44.04 KB
suspicious functions used:
system (line:295);shell_exec (line:590); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMS.php-
Full path:
bo/web/SMS.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:35 12/05/2025
Last modified:
23:57:57 30/08/2024
MD5 hash:
5aeaec1adc7c294edbbd46a2520a22d0
Filesize:
35.94 KB
suspicious functions used:
curl_exec (line:56); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery.php-
Full path:
bo/web/PaymentOnlineQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:54:22 12/05/2025
Last modified:
23:13:13 30/08/2024
MD5 hash:
e71855333c2ea0c43f2a87109898c283
Filesize:
28.5 KB
suspicious functions used:
curl_exec (line:456);curl_exec (line:688); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery2.php-
Full path:
bo/web/PaymentOnlineQuery2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:35 12/05/2025
Last modified:
23:13:13 30/08/2024
MD5 hash:
700d8182abbbc0b80fe31beb1e717699
Filesize:
19.39 KB
suspicious functions used:
curl_exec (line:42);curl_exec (line:252); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkLoad.php-
Full path:
bo/web/NetworkLoad.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:35 12/05/2025
Last modified:
23:13:12 30/08/2024
MD5 hash:
e1632e66ee1b7394d3fb82751b924abe
Filesize:
2.83 KB
suspicious functions used:
system (line:81); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkLoad1.php-
Full path:
bo/web/NetworkLoad1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:35 12/05/2025
Last modified:
23:13:12 30/08/2024
MD5 hash:
176bd6931be34d7ef351d22897accc65
Filesize:
759 B
suspicious functions used:
system (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltAddQuery.php-
Full path:
bo/web/NetworkOltAddQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:35 12/05/2025
Last modified:
01:39:10 04/09/2024
MD5 hash:
b14dd824d3ac47473bc0311a79d451fb
Filesize:
6.33 KB
suspicious functions used:
shell_exec (line:21); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltOnuStatus.php-
Full path:
bo/web/NetworkOltOnuStatus.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:35 12/05/2025
Last modified:
01:39:10 04/09/2024
MD5 hash:
a09d8bbc820f5b9ac61a788f58afcdd8
Filesize:
39.94 KB
suspicious functions used:
shell_exec (line:41);shell_exec (line:344);shell_exec (line:460); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltOnuStatus2.php-
Full path:
bo/web/NetworkOltOnuStatus2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:35 12/05/2025
Last modified:
23:13:12 30/08/2024
MD5 hash:
f112b225c20188bc03c92e63dac90efa
Filesize:
15.88 KB
suspicious functions used:
shell_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMS1.php-
Full path:
bo/web/SMS1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:36 12/05/2025
Last modified:
23:13:14 30/08/2024
MD5 hash:
40d55bbcfe09846560034ad6b6748670
Filesize:
32.19 KB
suspicious functions used:
curl_exec (line:59); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentWebhook.php-
Full path:
bo/web/PaymentWebhook.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:36 12/05/2025
Last modified:
23:13:13 30/08/2024
MD5 hash:
a2f322c94787630ab1e0c8ca35fc5ba1
Filesize:
18.6 KB
suspicious functions used:
base64_decode (line:30);curl_exec (line:41);curl_exec (line:422); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeMap.php-
Full path:
bo/web/NetworkTreeMap.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:36 12/05/2025
Last modified:
01:39:10 04/09/2024
MD5 hash:
8a349ddf24835f1fd034f536098c8665
Filesize:
22.58 KB
suspicious functions used:
`${results.rxPower}` (line:235);`${results.distance}` (line:236);`${results.supplyVoltage}` (line:237);`${results.temperature}` (line:238);`${results.txPower}` (line:239); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeMap1.php-
Full path:
bo/web/NetworkTreeMap1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:36 12/05/2025
Last modified:
23:13:12 30/08/2024
MD5 hash:
3483a4b939ab44a513c3614c31444179
Filesize:
10.57 KB
suspicious functions used:
`${totalonline}` (line:97);`${totaloffline}` (line:98); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SignUp1.php-
Full path:
bo/web/SignUp1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:37 12/05/2025
Last modified:
23:13:14 30/08/2024
MD5 hash:
3f7943dd155c8e0a383b7d02730f8c11
Filesize:
24.59 KB
suspicious functions used:
curl_exec (line:33);curl_exec (line:59); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMSAddSave.php-
Full path:
bo/web/SMSAddSave.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:38 12/05/2025
Last modified:
23:57:26 30/08/2024
MD5 hash:
74b3c92d17d435371a5f7e9c323912d6
Filesize:
1.71 KB
suspicious functions used:
curl_exec (line:34); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: client-online-mbb.php-
Full path:
bo/web/client-online-mbb.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:38 12/05/2025
Last modified:
23:13:10 30/08/2024
MD5 hash:
69c51efb5b9017a07a7158b4a63f3826
Filesize:
14.32 KB
suspicious functions used:
curl_exec (line:90); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook_test.php-
Full path:
bo/web/webhook_test.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:38 12/05/2025
Last modified:
23:13:15 30/08/2024
MD5 hash:
74a7dcc262d7fe7f2bdc9e0595d03837
Filesize:
4.69 KB
suspicious functions used:
base64_decode (line:22);curl_exec (line:33);curl_exec (line:86);curl_exec (line:107); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhookkk.php-
Full path:
bo/web/webhookkk.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:38 12/05/2025
Last modified:
23:13:15 30/08/2024
MD5 hash:
787511edcbdc9d6c9b26eba2dee70a84
Filesize:
21.21 KB
suspicious functions used:
base64_decode (line:27);curl_exec (line:38);curl_exec (line:454); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook.php-
Full path:
bo/web/webhook.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
18:22:11 11/05/2025
Last modified:
23:13:15 30/08/2024
MD5 hash:
007f8fa5636da9e44a38526298f7e155
Filesize:
21.08 KB
suspicious functions used:
base64_decode (line:28);curl_exec (line:39);curl_exec (line:429); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: imagevwr.php-
Full path:
bo/web/imagevwr.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
06:19:50 12/05/2025
Last modified:
23:13:11 30/08/2024
MD5 hash:
47a223a13cc642d01dcfaaca542d396d
Filesize:
915 B
suspicious functions used:
curl_exec (line:15); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: clients-nots-action.php-
Full path:
bo/web/clients-nots-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:39 12/05/2025
Last modified:
23:13:10 30/08/2024
MD5 hash:
dff1bb495509427d098cb4588da553b9
Filesize:
5.89 KB
suspicious functions used:
curl_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec.php-
Full path:
bo/web/login_exec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
05:05:16 12/05/2025
Last modified:
23:13:11 30/08/2024
MD5 hash:
9038a77a32a5db2c9affae1496473f3e
Filesize:
5.27 KB
suspicious functions used:
curl_exec (line:62); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: company_info.php-
Full path:
bo/web/company_info.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
08:40:35 12/05/2025
Last modified:
23:13:10 30/08/2024
MD5 hash:
e612d58aa2e38f5b49ba37c1bf620ece
Filesize:
8.38 KB
suspicious functions used:
curl_exec (line:130); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
bo/web/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:53:58 12/05/2025
Last modified:
21:25:36 03/09/2024
MD5 hash:
ba9747d0421fd091b998389469e72a0b
Filesize:
1.7 KB
suspicious functions used:
curl_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tt.php-
Full path:
bo/web/tt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:39 12/05/2025
Last modified:
23:13:14 30/08/2024
MD5 hash:
9c4ed141cb79fdc7e807b35923c91a20
Filesize:
1.56 KB
suspicious functions used:
curl_exec (line:30); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_all.php-
Full path:
bo/web/cron_all.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:39 12/05/2025
Last modified:
23:13:10 30/08/2024
MD5 hash:
b19a08fef36584598cca299b7ecc5e6d
Filesize:
2.07 KB
suspicious functions used:
curl_exec (line:23);curl_exec (line:38);curl_exec (line:53); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index.php-
Full path:
bo/web/index.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
17:33:44 11/05/2025
Last modified:
23:42:06 30/08/2024
MD5 hash:
dad4de5c11367ab0d49b07173060974f
Filesize:
12.47 KB
suspicious functions used:
base64_decode (line:10);curl_exec (line:183); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_gen_bill.php-
Full path:
bo/web/cron_auto_gen_bill.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:39 12/05/2025
Last modified:
23:13:10 30/08/2024
MD5 hash:
f1056618cc4402968e50d1232d2c51c8
Filesize:
4.73 KB
suspicious functions used:
curl_exec (line:140);curl_exec (line:149); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive.php-
Full path:
bo/web/cron_auto_inactive.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:30:07 12/05/2025
Last modified:
23:13:10 30/08/2024
MD5 hash:
7e0dc4dd9dae2bf0220516641b53c027
Filesize:
5.43 KB
suspicious functions used:
curl_exec (line:142); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive2.php-
Full path:
bo/web/cron_auto_inactive2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:39 12/05/2025
Last modified:
23:13:10 30/08/2024
MD5 hash:
440bc24f05b01eb395df63fff2f60de9
Filesize:
5.46 KB
suspicious functions used:
curl_exec (line:142); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive_termination.php-
Full path:
bo/web/cron_auto_inactive_termination.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
18:45:06 11/05/2025
Last modified:
12:17:52 23/09/2024
MD5 hash:
9f9c8ca9110c2304128646824bfb17db
Filesize:
12.16 KB
suspicious functions used:
curl_exec (line:241);curl_exec (line:253); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive_termination1.php-
Full path:
bo/web/cron_auto_inactive_termination1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:39 12/05/2025
Last modified:
23:13:10 30/08/2024
MD5 hash:
be76b964c93a2cb4fa7e632750ff3bc4
Filesize:
6.64 KB
suspicious functions used:
curl_exec (line:156);curl_exec (line:168); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_termination_remainder1.php-
Full path:
bo/web/cron_auto_termination_remainder1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
03:05:29 12/05/2025
Last modified:
23:13:10 30/08/2024
MD5 hash:
7765f9f820dbd402f1064fab9958ffaa
Filesize:
3.26 KB
suspicious functions used:
curl_exec (line:83); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: getclientuptime.php-
Full path:
bo/web/getclientuptime.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:39 12/05/2025
Last modified:
23:13:11 30/08/2024
MD5 hash:
bbc14cdd451c72b94d78c7d2d1af0b52
Filesize:
718 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_client_bandwidth_count.php-
Full path:
bo/web/cron_client_bandwidth_count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:39 12/05/2025
Last modified:
23:13:10 30/08/2024
MD5 hash:
8be5ba5d539d73a8f197195f7748e1cc
Filesize:
4.7 KB
suspicious functions used:
curl_exec (line:125); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: loginexec.php-
Full path:
bo/web/loginexec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:39 12/05/2025
Last modified:
23:13:11 30/08/2024
MD5 hash:
edb8017e7d0f8e037facbcacc94a383d
Filesize:
5.91 KB
suspicious functions used:
curl_exec (line:67); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_network.php-
Full path:
bo/web/cron_network.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
14:40:36 11/05/2025
Last modified:
23:13:10 30/08/2024
MD5 hash:
1a75ea6c2e0cc5b9263541dda62ab458
Filesize:
4.61 KB
suspicious functions used:
curl_exec (line:45);curl_exec (line:67); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ttoken.php-
Full path:
bo/web/ttoken.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:39 12/05/2025
Last modified:
23:13:14 30/08/2024
MD5 hash:
5f2c51c1db5b0defadfb67ce25c0098f
Filesize:
1.54 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_olt.php-
Full path:
bo/web/cron_olt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
16:00:24 11/05/2025
Last modified:
06:31:32 09/09/2024
MD5 hash:
d83092bb263aaa93da2bb8cddab2a0d1
Filesize:
3.7 KB
suspicious functions used:
shell_exec (line:44); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_olt_clients_catch.php-
Full path:
bo/web/cron_olt_clients_catch.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:39 12/05/2025
Last modified:
10:53:50 17/10/2024
MD5 hash:
3b13c163ba3445b3d661c63adde1d985
Filesize:
1.12 KB
suspicious functions used:
curl_exec (line:23); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test6.php-
Full path:
bo/web/test6.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:39 12/05/2025
Last modified:
23:13:14 30/08/2024
MD5 hash:
0edc703b008a5e3cae5d241fc2cf717b
Filesize:
4.76 KB
suspicious functions used:
shell_exec (line:46);shell_exec (line:70);shell_exec (line:92); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_olt_user.php-
Full path:
bo/web/cron_olt_user.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:39 12/05/2025
Last modified:
06:31:32 09/09/2024
MD5 hash:
67aa237639e3d1e6064e76079bb3cccc
Filesize:
1.97 KB
suspicious functions used:
curl_exec (line:19);curl_exec (line:46); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test5.php-
Full path:
bo/web/test5.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:39 12/05/2025
Last modified:
23:13:14 30/08/2024
MD5 hash:
814ac3ddd93a194f067dc492a2530c65
Filesize:
2.34 KB
suspicious functions used:
curl_exec (line:48); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ip-ping-checker.php-
Full path:
bo/web/ip-ping-checker.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:39 12/05/2025
Last modified:
23:13:11 30/08/2024
MD5 hash:
0d28f3053b73b3fe2885cf519ee17c12
Filesize:
2.64 KB
suspicious functions used:
curl_exec (line:81); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test7.php-
Full path:
bo/web/test7.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:39 12/05/2025
Last modified:
05:02:28 02/09/2024
MD5 hash:
aaaa4b5051d422195907d0167771a67f
Filesize:
2.03 KB
suspicious functions used:
shell_exec (line:4); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: emp_salary_advence_find.php-
Full path:
bo/web/emp_salary_advence_find.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:39 12/05/2025
Last modified:
23:13:11 30/08/2024
MD5 hash:
74a7e2ffda0f7584611d7cbce6136c24
Filesize:
2.25 KB
suspicious functions used:
`expanse` WHERE `type` = '2' AND `status` = '2' AND ex_by = '$e_id' AND MONTH(`, `) = MONTH('$lastmonth') AND YEAR(`, `) = YEAR('$lastmonth') GROUP BY ` (line:8);`e_id` = '$e_id' AND ` (line:12); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: texecutepayment.php-
Full path:
bo/web/texecutepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:39 12/05/2025
Last modified:
23:13:14 30/08/2024
MD5 hash:
623635fdf5c871391d3a5fe99ee8c543
Filesize:
2.91 KB
suspicious functions used:
curl_exec (line:24); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tis-news.php-
Full path:
bo/web/tis-news.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:39 12/05/2025
Last modified:
23:13:14 30/08/2024
MD5 hash:
ed23ca98b77c5321b4485e85eb2ea64d
Filesize:
3.67 KB
suspicious functions used:
curl_exec (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
bo/web/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:54:21 12/05/2025
Last modified:
23:13:11 30/08/2024
MD5 hash:
c46a50905333286f45dfeacf010851ab
Filesize:
716 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
bo/web/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:39 12/05/2025
Last modified:
23:13:14 30/08/2024
MD5 hash:
7d8e71ceda3ffb74623e0c4a814715af
Filesize:
1.53 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data.php-
Full path:
bo/web/network-snmp-onu-status-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:39 12/05/2025
Last modified:
02:48:39 09/09/2024
MD5 hash:
45212980991a8334627f27b8b97ba0d4
Filesize:
27.53 KB
suspicious functions used:
shell_exec (line:35);`olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:39);shell_exec (line:78);shell_exec (line:172);shell_exec (line:372);shell_exec (line:385);shell_exec (line:391); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data1.php-
Full path:
bo/web/network-snmp-onu-status-data1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:39 12/05/2025
Last modified:
01:39:10 04/09/2024
MD5 hash:
dfc6e23448be165d8c7879ecdac3f737
Filesize:
14.88 KB
suspicious functions used:
shell_exec (line:119);shell_exec (line:135);shell_exec (line:151);shell_exec (line:157);shell_exec (line:346); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreateagree.php-
Full path:
bo/web/tcreateagree.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:40 12/05/2025
Last modified:
23:13:14 30/08/2024
MD5 hash:
27a10adf4190edc7eceee8cf74a6b72b
Filesize:
999 B
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: sms_deliverey_report.php-
Full path:
bo/web/sms_deliverey_report.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:40 12/05/2025
Last modified:
23:13:14 30/08/2024
MD5 hash:
03623943da7e9334e137b38c8577fc84
Filesize:
4.25 KB
suspicious functions used:
curl_exec (line:28);curl_exec (line:53);curl_exec (line:90); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test3.php-
Full path:
bo/web/test3.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:40 12/05/2025
Last modified:
23:13:14 30/08/2024
MD5 hash:
47feeaa9a827160ac4e6faff04aa57cd
Filesize:
3.95 KB
suspicious functions used:
shell_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tagreeexpayment.php-
Full path:
bo/web/tagreeexpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:40 12/05/2025
Last modified:
23:13:14 30/08/2024
MD5 hash:
029b4fba649a75c7c81d2f8931be8d63
Filesize:
2.86 KB
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreatepayment.php-
Full path:
bo/web/tcreatepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:40 12/05/2025
Last modified:
23:13:14 30/08/2024
MD5 hash:
e49de9a33f5164bc2c6b88e4770faaff
Filesize:
1.07 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: testttttt.php-
Full path:
bo/web/testttttt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:40 12/05/2025
Last modified:
23:13:14 30/08/2024
MD5 hash:
b1988a4be29e191ad935fb409a4174ee
Filesize:
2 KB
suspicious functions used:
curl_exec (line:47); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-helper.php-
Full path:
bo/web/nagad-helper.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:40 12/05/2025
Last modified:
23:13:12 30/08/2024
MD5 hash:
2bb70c44d68202e0a0cd8ae1388f0b1b
Filesize:
6.74 KB
suspicious functions used:
curl_exec (line:61);base64_decode (line:97); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-merchant-callback.php-
Full path:
bo/web/nagad-merchant-callback.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:40 12/05/2025
Last modified:
23:13:12 30/08/2024
MD5 hash:
9e7ba60bacff8c3a7792176f76b698ea
Filesize:
16.91 KB
suspicious functions used:
curl_exec (line:20); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-snmp-data.php-
Full path:
bo/web/netowrk-snmp-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:40 12/05/2025
Last modified:
01:39:10 04/09/2024
MD5 hash:
e09a072d71693f9e7767738221e9b755
Filesize:
20.33 KB
suspicious functions used:
shell_exec (line:93);shell_exec (line:102);shell_exec (line:112);shell_exec (line:131);shell_exec (line:141);shell_exec (line:157);shell_exec (line:177);shell_exec (line:187);shell_exec (line:192);shell_exec (line:200);shell_exec (line:220);shell_exec (line:236);`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:249);shell_exec (line:255);shell_exec (line:377); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-snmp-data2.php-
Full path:
bo/web/netowrk-snmp-data2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:40 12/05/2025
Last modified:
09:06:49 01/09/2024
MD5 hash:
8eea607c303f1b0b5aad5898f6b95492
Filesize:
20.14 KB
suspicious functions used:
shell_exec (line:96);shell_exec (line:105);shell_exec (line:115);shell_exec (line:134);shell_exec (line:144);shell_exec (line:160);shell_exec (line:180);shell_exec (line:190);shell_exec (line:195);shell_exec (line:203);shell_exec (line:223);shell_exec (line:239);`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:252);shell_exec (line:258);shell_exec (line:380); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-snmp-data3.php-
Full path:
bo/web/netowrk-snmp-data3.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:40 12/05/2025
Last modified:
23:13:12 30/08/2024
MD5 hash:
5d5944402bfa06ab7e62a63de5340f18
Filesize:
16.15 KB
suspicious functions used:
shell_exec (line:74);shell_exec (line:83);shell_exec (line:93);shell_exec (line:112);shell_exec (line:122);shell_exec (line:138);shell_exec (line:158);shell_exec (line:168);shell_exec (line:173);shell_exec (line:181);shell_exec (line:201);shell_exec (line:310); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-old-onu-rx.php-
Full path:
bo/web/network-old-onu-rx.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:40 12/05/2025
Last modified:
01:39:10 04/09/2024
MD5 hash:
ac18d2f76662bea7bce9364c460245ec
Filesize:
5.79 KB
suspicious functions used:
shell_exec (line:67); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-count.php-
Full path:
bo/web/network-olt-client-onu-mac-count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:40 12/05/2025
Last modified:
01:39:10 04/09/2024
MD5 hash:
5bb99b279804116640875e00caf9e713
Filesize:
12.52 KB
suspicious functions used:
shell_exec (line:25);shell_exec (line:35);shell_exec (line:58);shell_exec (line:74);shell_exec (line:91);shell_exec (line:101);shell_exec (line:117);shell_exec (line:158);shell_exec (line:201);shell_exec (line:277);shell_exec (line:343);shell_exec (line:405);shell_exec (line:424);shell_exec (line:443); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search.php-
Full path:
bo/web/network-olt-pon-onu-search.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:40 12/05/2025
Last modified:
01:39:10 04/09/2024
MD5 hash:
2852e806dcf69c0a3e2a021b86300289
Filesize:
8.75 KB
suspicious functions used:
shell_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-countt.php-
Full path:
bo/web/network-olt-client-onu-mac-countt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:40 12/05/2025
Last modified:
01:39:10 04/09/2024
MD5 hash:
d29b4e72c375f528b769bd3894f9f0e7
Filesize:
8.95 KB
suspicious functions used:
shell_exec (line:26);shell_exec (line:36);shell_exec (line:59);shell_exec (line:75);shell_exec (line:92);shell_exec (line:102);shell_exec (line:117);shell_exec (line:155);shell_exec (line:206);shell_exec (line:262);shell_exec (line:275);shell_exec (line:288); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: support-action.php-
Full path:
bo/web/support-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:40 12/05/2025
Last modified:
05:02:28 02/09/2024
MD5 hash:
c678659a705dae2c6d52289b0084a693
Filesize:
14.72 KB
suspicious functions used:
curl_exec (line:221); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-oid-check.php-
Full path:
bo/web/network-olt-oid-check.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:40 12/05/2025
Last modified:
23:13:12 30/08/2024
MD5 hash:
5b7dc0ce1103fbfc895873c250b63141
Filesize:
1.88 KB
suspicious functions used:
shell_exec (line:33); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-count.php-
Full path:
bo/web/network-olt-onu-count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:40 12/05/2025
Last modified:
01:39:10 04/09/2024
MD5 hash:
bc2815c42348f750b1c1f532b9eca3c4
Filesize:
5.35 KB
suspicious functions used:
`olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:11);shell_exec (line:66); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-list-data.php-
Full path:
bo/web/network-olt-onu-list-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:40 12/05/2025
Last modified:
01:39:10 04/09/2024
MD5 hash:
0cd0c64a0f60d2d9c7ce36d1832bc4a0
Filesize:
6.84 KB
suspicious functions used:
shell_exec (line:24);shell_exec (line:38);shell_exec (line:64);shell_exec (line:85);shell_exec (line:104);shell_exec (line:125); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-clients-search.php-
Full path:
bo/web/network-olt-pon-clients-search.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:40 12/05/2025
Last modified:
01:39:10 04/09/2024
MD5 hash:
79d26fc66abdab6f173330588aa8b238
Filesize:
10.93 KB
suspicious functions used:
shell_exec (line:42);shell_exec (line:51);shell_exec (line:104);shell_exec (line:168); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search-bdcom.php-
Full path:
bo/web/network-olt-pon-onu-search-bdcom.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:40 12/05/2025
Last modified:
01:39:10 04/09/2024
MD5 hash:
77296ecad089f4851e4f753825c3f304
Filesize:
15.93 KB
suspicious functions used:
shell_exec (line:54);shell_exec (line:63);shell_exec (line:170); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data-bdcom.php-
Full path:
bo/web/network-snmp-onu-status-data-bdcom.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:40 12/05/2025
Last modified:
02:48:39 09/09/2024
MD5 hash:
282e6c4c9f9583ce286c7108c9a739f9
Filesize:
20.39 KB
suspicious functions used:
shell_exec (line:47);shell_exec (line:72);shell_exec (line:84);shell_exec (line:102);shell_exec (line:115);shell_exec (line:127);shell_exec (line:133);shell_exec (line:158);shell_exec (line:171);shell_exec (line:183);shell_exec (line:189); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search-bdcom1.php-
Full path:
bo/web/network-olt-pon-onu-search-bdcom1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:40 12/05/2025
Last modified:
01:39:10 04/09/2024
MD5 hash:
dd18677b1dcbf7f0bce2ac6912d98da0
Filesize:
9.6 KB
suspicious functions used:
shell_exec (line:42);shell_exec (line:51);shell_exec (line:129); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: sms-balance-check.php-
Full path:
bo/web/sms-balance-check.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:40 12/05/2025
Last modified:
23:13:14 30/08/2024
MD5 hash:
74ac3e963a0dc5bb7d4c980e594aa39b
Filesize:
854 B
suspicious functions used:
curl_exec (line:15); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-helper.php-
Full path:
bz/m/nagad-helper.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:41 12/05/2025
Last modified:
02:09:55 20/09/2024
MD5 hash:
2bb70c44d68202e0a0cd8ae1388f0b1b
Filesize:
6.74 KB
suspicious functions used:
curl_exec (line:61);base64_decode (line:97); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tagreeexpayment.php-
Full path:
bz/m/tagreeexpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:41 12/05/2025
Last modified:
02:09:56 20/09/2024
MD5 hash:
c95e3ee881752db67b4f3597bc58430a
Filesize:
2.46 KB
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
bz/m/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:41 12/05/2025
Last modified:
02:09:56 20/09/2024
MD5 hash:
7d8e71ceda3ffb74623e0c4a814715af
Filesize:
1.53 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: support-action.php-
Full path:
bz/m/support-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:41 12/05/2025
Last modified:
02:09:56 20/09/2024
MD5 hash:
2fc6fd844db911a5502a7a6ae383990f
Filesize:
10.31 KB
suspicious functions used:
curl_exec (line:99); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
bz/m/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:41 12/05/2025
Last modified:
02:09:55 20/09/2024
MD5 hash:
849185f307be30eafb1bbef93616d8c3
Filesize:
1.71 KB
suspicious functions used:
curl_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreateagree.php-
Full path:
bz/m/tcreateagree.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:42 12/05/2025
Last modified:
02:09:56 20/09/2024
MD5 hash:
27a10adf4190edc7eceee8cf74a6b72b
Filesize:
999 B
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
bz/m/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:42 12/05/2025
Last modified:
02:09:55 20/09/2024
MD5 hash:
9a3f22521ad987e86f84c4f5f688d5b7
Filesize:
713 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index.php-
Full path:
bz/m/index.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:42 12/05/2025
Last modified:
02:09:55 20/09/2024
MD5 hash:
9a5dc16d9d603e4fe488b2349f6197a3
Filesize:
12.47 KB
suspicious functions used:
base64_decode (line:10);curl_exec (line:183); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery.php-
Full path:
bz/m/PaymentOnlineQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:42 12/05/2025
Last modified:
02:09:56 20/09/2024
MD5 hash:
c7aca21e5a61ded371d4b853710cf4b4
Filesize:
21.14 KB
suspicious functions used:
curl_exec (line:287);curl_exec (line:512); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery2.php-
Full path:
bz/m/PaymentOnlineQuery2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:42 12/05/2025
Last modified:
02:09:56 20/09/2024
MD5 hash:
37be1b3f51cac8d936abe043bc79ed4b
Filesize:
19.08 KB
suspicious functions used:
curl_exec (line:41);curl_exec (line:254); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreatepayment.php-
Full path:
bz/m/tcreatepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:42 12/05/2025
Last modified:
02:09:56 20/09/2024
MD5 hash:
e49de9a33f5164bc2c6b88e4770faaff
Filesize:
1.07 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec.php-
Full path:
bz/m/login_exec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:42 12/05/2025
Last modified:
02:09:55 20/09/2024
MD5 hash:
1f800365ef270564df77d30c1bfd7ed3
Filesize:
5.4 KB
suspicious functions used:
curl_exec (line:66); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec1.php-
Full path:
bz/m/login_exec1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:42 12/05/2025
Last modified:
02:09:55 20/09/2024
MD5 hash:
46b08782f51ba75b23e27183e06370fe
Filesize:
4.28 KB
suspicious functions used:
curl_exec (line:61); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ttoken.php-
Full path:
bz/m/ttoken.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:42 12/05/2025
Last modified:
02:09:56 20/09/2024
MD5 hash:
5f2c51c1db5b0defadfb67ce25c0098f
Filesize:
1.54 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-merchant-callback.php-
Full path:
bz/m/nagad-merchant-callback.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:42 12/05/2025
Last modified:
02:09:55 20/09/2024
MD5 hash:
1ca42269a7e5563f13a266d9c0ce5049
Filesize:
11.75 KB
suspicious functions used:
curl_exec (line:20); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: texecutepayment.php-
Full path:
bz/m/texecutepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:42 12/05/2025
Last modified:
02:09:56 20/09/2024
MD5 hash:
efbb63dfcfdacb52dec74bffc389bbb3
Filesize:
2.67 KB
suspicious functions used:
curl_exec (line:24); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-snmp-data.php-
Full path:
bz/m/netowrk-snmp-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:42 12/05/2025
Last modified:
02:09:56 20/09/2024
MD5 hash:
b56429056656f0de16982e31853f3304
Filesize:
20.26 KB
suspicious functions used:
shell_exec (line:93);shell_exec (line:102);shell_exec (line:112);shell_exec (line:131);shell_exec (line:141);shell_exec (line:157);shell_exec (line:177);shell_exec (line:187);shell_exec (line:192);shell_exec (line:200);shell_exec (line:220);shell_exec (line:236);`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:249);shell_exec (line:255);shell_exec (line:377); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: class.phpmailer.php-
Full path:
bz/web/email/class.phpmailer.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:42 12/05/2025
Last modified:
02:10:09 20/09/2024
MD5 hash:
68468d69b47fffecc89df57e27c5a781
Filesize:
143.32 KB
suspicious functions used:
`$DKIM_private` (line:428);popen (line:1387);popen (line:1408);base64_decode (line:3410);`$mail->set('SMTPSecure', 'tls');` (line:3688);`$mail->SMTPSecure = 'tls';` (line:3690); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: class.smtp.php-
Full path:
bz/web/email/class.smtp.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:43 12/05/2025
Last modified:
02:10:09 20/09/2024
MD5 hash:
aa8478329268e5438a4469c268337a10
Filesize:
41.44 KB
suspicious functions used:
base64_decode (line:513);base64_decode (line:533); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: JSON.php-
Full path:
bz/web/inc/JSON.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:43 12/05/2025
Last modified:
02:10:16 20/09/2024
MD5 hash:
f5a34509e06231308becbe320ade9ff6
Filesize:
33.22 KB
suspicious functions used:
eval (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: jqgrid.php-
Full path:
bz/web/inc/jqgrid.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:43 12/05/2025
Last modified:
02:10:16 20/09/2024
MD5 hash:
71027a29e71e0626d8b57cbb631e6d98
Filesize:
23.92 KB
suspicious functions used:
eval (line:397); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: smsapicore.php-
Full path:
bz/web/include/smsapicore.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
04:00:02 12/05/2025
Last modified:
02:10:16 20/09/2024
MD5 hash:
6b6257f892846565ef8dee38400afa15
Filesize:
1.24 KB
suspicious functions used:
curl_exec (line:36); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: telegramapicore.php-
Full path:
bz/web/include/telegramapicore.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:43:46 12/05/2025
Last modified:
02:10:16 20/09/2024
MD5 hash:
535fa7aac83b0e1ba56be7837348b6d9
Filesize:
2.9 KB
suspicious functions used:
curl_exec (line:63); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Changes.txt-
Full path:
bz/web/js/jqgrid/js/Changes.txt
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:44 12/05/2025
Last modified:
02:10:23 20/09/2024
MD5 hash:
c0a4adbc3f1c6d592cb4fa8433fee9ea
Filesize:
44.32 KB
suspicious functions used:
system (line:87); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ui.php-
Full path:
bz/web/js/tinymce/themes/advanced/skins/highcontrast/ui.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
06:56:02 12/05/2025
Last modified:
02:10:29 20/09/2024
MD5 hash:
3edaf67be8573b86686f46bbba4f058c
Filesize:
4.53 KB
suspicious functions used:
curl_exec (line:20);`bill_amount` = '0.00' WHERE bill_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY ` (line:53);`bill_amount` = '0.00', days = '0.00' WHERE entry_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY ` (line:54);`payment` WHERE `pay_date` < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND pay_amount != '0.00' ORDER BY ` (line:55);curl_exec (line:146);curl_exec (line:168); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: AutoActiveClientsCount1.php-
Full path:
bz/web/AutoActiveClientsCount1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:45 12/05/2025
Last modified:
02:10:01 20/09/2024
MD5 hash:
fb443f2f93781a8fffce803317592c41
Filesize:
6.12 KB
suspicious functions used:
system (line:56); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: AutoActiveClientsCount11.php-
Full path:
bz/web/AutoActiveClientsCount11.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:45 12/05/2025
Last modified:
02:10:01 20/09/2024
MD5 hash:
a0090e4a11dd59b955a6edd549b6ef2f
Filesize:
5.85 KB
suspicious functions used:
system (line:54); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ClientsOnMap.php-
Full path:
bz/web/ClientsOnMap.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:45 12/05/2025
Last modified:
02:10:02 20/09/2024
MD5 hash:
41db12dda8643b42f3d756d7b441ed33
Filesize:
12.21 KB
suspicious functions used:
`${totalonline}` (line:97);`${totaloffline}` (line:98);`${results.rxPower}` (line:233);`${results.distance}` (line:234);`${results.supplyVoltage}` (line:235);`${results.temperature}` (line:236);`${results.txPower}` (line:237); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients.php-
Full path:
bz/web/Clients.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
18:25:48 11/05/2025
Last modified:
02:10:02 20/09/2024
MD5 hash:
42540e032b92be9d4484a9f9f78dd610
Filesize:
175.25 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:832); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients2.php-
Full path:
bz/web/Clients2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:46 12/05/2025
Last modified:
02:10:02 20/09/2024
MD5 hash:
4d7acc879510998b2909318d8638d804
Filesize:
168.05 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:816); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients3.php-
Full path:
bz/web/Clients3.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:47 12/05/2025
Last modified:
02:10:02 20/09/2024
MD5 hash:
7b4a7d07d9658aa7c159cd59ebae283a
Filesize:
175.3 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:832); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: InstrumentsStoreOutDetails.php-
Full path:
bz/web/InstrumentsStoreOutDetails.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:48 12/05/2025
Last modified:
02:10:03 20/09/2024
MD5 hash:
ab68ab13bcfd51da15e72a3d4e9817e8
Filesize:
9.37 KB
suspicious functions used:
`update_date`, '%D-%b, %y') AS offdate, TIME_FORMAT(`update_time`, '%T') AS offtime FROM `con_sts_log` WHERE `c_id` = '{$row['c_id']}' AND con_sts = 'Inactive' ORDER BY ` (line:120); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Network.php-
Full path:
bz/web/Network.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:48 12/05/2025
Last modified:
14:50:54 25/09/2024
MD5 hash:
deeb6ea61b3c11dd663d2992de130a80
Filesize:
55.59 KB
suspicious functions used:
system (line:358);shell_exec (line:658); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Network1.php-
Full path:
bz/web/Network1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:48 12/05/2025
Last modified:
02:10:05 20/09/2024
MD5 hash:
95f9922e23cb36ebd65d603a48d22c4b
Filesize:
44.04 KB
suspicious functions used:
system (line:295);shell_exec (line:590); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMS.php-
Full path:
bz/web/SMS.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:49 12/05/2025
Last modified:
02:10:07 20/09/2024
MD5 hash:
d8f9df0a2192c1b58a3b5c7887f46b87
Filesize:
36.26 KB
suspicious functions used:
curl_exec (line:56); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMS1.php-
Full path:
bz/web/SMS1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:49 12/05/2025
Last modified:
02:10:07 20/09/2024
MD5 hash:
40d55bbcfe09846560034ad6b6748670
Filesize:
32.19 KB
suspicious functions used:
curl_exec (line:59); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkLoad.php-
Full path:
bz/web/NetworkLoad.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:49 12/05/2025
Last modified:
02:10:05 20/09/2024
MD5 hash:
e1632e66ee1b7394d3fb82751b924abe
Filesize:
2.83 KB
suspicious functions used:
system (line:81); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkLoad1.php-
Full path:
bz/web/NetworkLoad1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:49 12/05/2025
Last modified:
02:10:05 20/09/2024
MD5 hash:
176bd6931be34d7ef351d22897accc65
Filesize:
759 B
suspicious functions used:
system (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltAddQuery.php-
Full path:
bz/web/NetworkOltAddQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:49 12/05/2025
Last modified:
02:10:05 20/09/2024
MD5 hash:
b14dd824d3ac47473bc0311a79d451fb
Filesize:
6.33 KB
suspicious functions used:
shell_exec (line:21); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltOnuStatus.php-
Full path:
bz/web/NetworkOltOnuStatus.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:49 12/05/2025
Last modified:
02:10:05 20/09/2024
MD5 hash:
63bc6ce09683d02cf57f08b60790538e
Filesize:
47.14 KB
suspicious functions used:
shell_exec (line:42);shell_exec (line:100);shell_exec (line:396);shell_exec (line:511);shell_exec (line:624); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltOnuStatus2.php-
Full path:
bz/web/NetworkOltOnuStatus2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:49 12/05/2025
Last modified:
02:10:05 20/09/2024
MD5 hash:
f112b225c20188bc03c92e63dac90efa
Filesize:
15.88 KB
suspicious functions used:
shell_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery.php-
Full path:
bz/web/PaymentOnlineQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:49 12/05/2025
Last modified:
02:10:06 20/09/2024
MD5 hash:
e71855333c2ea0c43f2a87109898c283
Filesize:
28.5 KB
suspicious functions used:
curl_exec (line:456);curl_exec (line:688); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery2.php-
Full path:
bz/web/PaymentOnlineQuery2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:50 12/05/2025
Last modified:
02:10:06 20/09/2024
MD5 hash:
700d8182abbbc0b80fe31beb1e717699
Filesize:
19.39 KB
suspicious functions used:
curl_exec (line:42);curl_exec (line:252); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentWebhook.php-
Full path:
bz/web/PaymentWebhook.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:50 12/05/2025
Last modified:
02:10:06 20/09/2024
MD5 hash:
a2f322c94787630ab1e0c8ca35fc5ba1
Filesize:
18.6 KB
suspicious functions used:
base64_decode (line:30);curl_exec (line:41);curl_exec (line:422); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeMap.php-
Full path:
bz/web/NetworkTreeMap.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:50 12/05/2025
Last modified:
02:10:05 20/09/2024
MD5 hash:
a40d6787a72f97303b8bfcad318b0f4f
Filesize:
22.12 KB
suspicious functions used:
`${results.rxPower}` (line:230);`${results.distance}` (line:231);`${results.supplyVoltage}` (line:232);`${results.temperature}` (line:233);`${results.txPower}` (line:234); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeMap1.php-
Full path:
bz/web/NetworkTreeMap1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:50 12/05/2025
Last modified:
02:10:05 20/09/2024
MD5 hash:
3483a4b939ab44a513c3614c31444179
Filesize:
10.57 KB
suspicious functions used:
`${totalonline}` (line:97);`${totaloffline}` (line:98); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SignUp1.php-
Full path:
bz/web/SignUp1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:51 12/05/2025
Last modified:
02:10:07 20/09/2024
MD5 hash:
3f7943dd155c8e0a383b7d02730f8c11
Filesize:
24.59 KB
suspicious functions used:
curl_exec (line:33);curl_exec (line:59); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMSAddSave.php-
Full path:
bz/web/SMSAddSave.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:51 12/05/2025
Last modified:
02:10:07 20/09/2024
MD5 hash:
1a6eaf13aa0ca959fe2dca885b7ffd8e
Filesize:
1.73 KB
suspicious functions used:
curl_exec (line:34); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: client-online-mbb.php-
Full path:
bz/web/client-online-mbb.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:52 12/05/2025
Last modified:
02:10:02 20/09/2024
MD5 hash:
69c51efb5b9017a07a7158b4a63f3826
Filesize:
14.32 KB
suspicious functions used:
curl_exec (line:90); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: clients-nots-action.php-
Full path:
bz/web/clients-nots-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:52 12/05/2025
Last modified:
02:10:02 20/09/2024
MD5 hash:
dff1bb495509427d098cb4588da553b9
Filesize:
5.89 KB
suspicious functions used:
curl_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index.php-
Full path:
bz/web/index.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
15:14:21 11/05/2025
Last modified:
02:10:03 20/09/2024
MD5 hash:
f161ab23adf4527023a0ad582d478f89
Filesize:
12.45 KB
suspicious functions used:
base64_decode (line:10);curl_exec (line:183); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec.php-
Full path:
bz/web/login_exec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
07:53:33 12/05/2025
Last modified:
02:10:04 20/09/2024
MD5 hash:
9038a77a32a5db2c9affae1496473f3e
Filesize:
5.27 KB
suspicious functions used:
curl_exec (line:62); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: company_info.php-
Full path:
bz/web/company_info.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
10:28:05 12/05/2025
Last modified:
02:10:03 20/09/2024
MD5 hash:
e612d58aa2e38f5b49ba37c1bf620ece
Filesize:
8.38 KB
suspicious functions used:
curl_exec (line:130); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
bz/web/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:52 12/05/2025
Last modified:
02:10:03 20/09/2024
MD5 hash:
ba9747d0421fd091b998389469e72a0b
Filesize:
1.7 KB
suspicious functions used:
curl_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_all.php-
Full path:
bz/web/cron_all.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:52 12/05/2025
Last modified:
02:10:03 20/09/2024
MD5 hash:
b19a08fef36584598cca299b7ecc5e6d
Filesize:
2.07 KB
suspicious functions used:
curl_exec (line:23);curl_exec (line:38);curl_exec (line:53); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_gen_bill.php-
Full path:
bz/web/cron_auto_gen_bill.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:52 12/05/2025
Last modified:
02:10:03 20/09/2024
MD5 hash:
f1056618cc4402968e50d1232d2c51c8
Filesize:
4.73 KB
suspicious functions used:
curl_exec (line:140);curl_exec (line:149); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive.php-
Full path:
bz/web/cron_auto_inactive.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:52 12/05/2025
Last modified:
02:10:03 20/09/2024
MD5 hash:
7e0dc4dd9dae2bf0220516641b53c027
Filesize:
5.43 KB
suspicious functions used:
curl_exec (line:142); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive2.php-
Full path:
bz/web/cron_auto_inactive2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:52 12/05/2025
Last modified:
02:10:03 20/09/2024
MD5 hash:
440bc24f05b01eb395df63fff2f60de9
Filesize:
5.46 KB
suspicious functions used:
curl_exec (line:142); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive_termination.php-
Full path:
bz/web/cron_auto_inactive_termination.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
18:55:17 11/05/2025
Last modified:
12:17:52 23/09/2024
MD5 hash:
9f9c8ca9110c2304128646824bfb17db
Filesize:
12.16 KB
suspicious functions used:
curl_exec (line:241);curl_exec (line:253); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive_termination1.php-
Full path:
bz/web/cron_auto_inactive_termination1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:52 12/05/2025
Last modified:
02:10:03 20/09/2024
MD5 hash:
be76b964c93a2cb4fa7e632750ff3bc4
Filesize:
6.64 KB
suspicious functions used:
curl_exec (line:156);curl_exec (line:168); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: getclientuptime.php-
Full path:
bz/web/getclientuptime.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:52 12/05/2025
Last modified:
02:10:03 20/09/2024
MD5 hash:
bbc14cdd451c72b94d78c7d2d1af0b52
Filesize:
718 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_termination_remainder1.php-
Full path:
bz/web/cron_auto_termination_remainder1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
03:07:14 12/05/2025
Last modified:
02:10:03 20/09/2024
MD5 hash:
7765f9f820dbd402f1064fab9958ffaa
Filesize:
3.26 KB
suspicious functions used:
curl_exec (line:83); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_client_bandwidth_count.php-
Full path:
bz/web/cron_client_bandwidth_count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
00:18:59 12/05/2025
Last modified:
02:10:03 20/09/2024
MD5 hash:
8be5ba5d539d73a8f197195f7748e1cc
Filesize:
4.7 KB
suspicious functions used:
curl_exec (line:125); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: loginexec.php-
Full path:
bz/web/loginexec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:52 12/05/2025
Last modified:
02:10:04 20/09/2024
MD5 hash:
edb8017e7d0f8e037facbcacc94a383d
Filesize:
5.91 KB
suspicious functions used:
curl_exec (line:67); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_network.php-
Full path:
bz/web/cron_network.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
23:24:24 11/05/2025
Last modified:
02:10:03 20/09/2024
MD5 hash:
1a75ea6c2e0cc5b9263541dda62ab458
Filesize:
4.61 KB
suspicious functions used:
curl_exec (line:45);curl_exec (line:67); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_olt.php-
Full path:
bz/web/cron_olt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:32:18 11/05/2025
Last modified:
02:10:03 20/09/2024
MD5 hash:
d83092bb263aaa93da2bb8cddab2a0d1
Filesize:
3.7 KB
suspicious functions used:
shell_exec (line:44); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_olt_user.php-
Full path:
bz/web/cron_olt_user.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:52 12/05/2025
Last modified:
02:10:03 20/09/2024
MD5 hash:
67aa237639e3d1e6064e76079bb3cccc
Filesize:
1.97 KB
suspicious functions used:
curl_exec (line:19);curl_exec (line:46); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ip-ping-checker.php-
Full path:
bz/web/ip-ping-checker.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:52 12/05/2025
Last modified:
02:10:04 20/09/2024
MD5 hash:
0d28f3053b73b3fe2885cf519ee17c12
Filesize:
2.64 KB
suspicious functions used:
curl_exec (line:81); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: emp_salary_advence_find.php-
Full path:
bz/web/emp_salary_advence_find.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:52 12/05/2025
Last modified:
02:10:03 20/09/2024
MD5 hash:
74a7e2ffda0f7584611d7cbce6136c24
Filesize:
2.25 KB
suspicious functions used:
`expanse` WHERE `type` = '2' AND `status` = '2' AND ex_by = '$e_id' AND MONTH(`, `) = MONTH('$lastmonth') AND YEAR(`, `) = YEAR('$lastmonth') GROUP BY ` (line:8);`e_id` = '$e_id' AND ` (line:12); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
bz/web/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:52 12/05/2025
Last modified:
02:10:03 20/09/2024
MD5 hash:
c46a50905333286f45dfeacf010851ab
Filesize:
716 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: imagevwr.php-
Full path:
bz/web/imagevwr.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:52 12/05/2025
Last modified:
02:10:03 20/09/2024
MD5 hash:
47a223a13cc642d01dcfaaca542d396d
Filesize:
915 B
suspicious functions used:
curl_exec (line:15); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search.php-
Full path:
bz/web/network-olt-pon-onu-search.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:52 12/05/2025
Last modified:
02:10:05 20/09/2024
MD5 hash:
2852e806dcf69c0a3e2a021b86300289
Filesize:
8.75 KB
suspicious functions used:
shell_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data-bdcom.php-
Full path:
bz/web/network-snmp-onu-status-data-bdcom.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:52 12/05/2025
Last modified:
15:01:41 24/09/2024
MD5 hash:
a6ba20417ea6d39db89d0ce19a5244e5
Filesize:
20.8 KB
suspicious functions used:
shell_exec (line:48);shell_exec (line:73);shell_exec (line:85);shell_exec (line:103);shell_exec (line:116);shell_exec (line:128);shell_exec (line:134);shell_exec (line:159);shell_exec (line:172);shell_exec (line:184);shell_exec (line:190); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data.php-
Full path:
bz/web/network-snmp-onu-status-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:52 12/05/2025
Last modified:
07:52:25 20/09/2024
MD5 hash:
0adfee384bf349b50f11036947fd2a74
Filesize:
30.37 KB
suspicious functions used:
shell_exec (line:38);`olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:42);shell_exec (line:81);shell_exec (line:95);shell_exec (line:109);shell_exec (line:122);shell_exec (line:208);shell_exec (line:429);shell_exec (line:441);shell_exec (line:448); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data1.php-
Full path:
bz/web/network-snmp-onu-status-data1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:53 12/05/2025
Last modified:
02:10:05 20/09/2024
MD5 hash:
920bd1a592c36f7a1194b737642f8340
Filesize:
15.96 KB
suspicious functions used:
shell_exec (line:33);`olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:37);shell_exec (line:149); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data_vsol2.php-
Full path:
bz/web/network-snmp-onu-status-data_vsol2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:53 12/05/2025
Last modified:
02:10:05 20/09/2024
MD5 hash:
f22d022ddc284f4d8e1de3660da91db8
Filesize:
15.61 KB
suspicious functions used:
shell_exec (line:34);shell_exec (line:113);shell_exec (line:126);shell_exec (line:132); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: support-action.php-
Full path:
bz/web/support-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:53 12/05/2025
Last modified:
02:10:07 20/09/2024
MD5 hash:
c678659a705dae2c6d52289b0084a693
Filesize:
14.72 KB
suspicious functions used:
curl_exec (line:221); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: sms-balance-check.php-
Full path:
bz/web/sms-balance-check.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
06:55:34 12/05/2025
Last modified:
02:10:07 20/09/2024
MD5 hash:
74ac3e963a0dc5bb7d4c980e594aa39b
Filesize:
854 B
suspicious functions used:
curl_exec (line:15); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-helper.php-
Full path:
bz/web/nagad-helper.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:53 12/05/2025
Last modified:
02:10:04 20/09/2024
MD5 hash:
2bb70c44d68202e0a0cd8ae1388f0b1b
Filesize:
6.74 KB
suspicious functions used:
curl_exec (line:61);base64_decode (line:97); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-merchant-callback.php-
Full path:
bz/web/nagad-merchant-callback.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:53 12/05/2025
Last modified:
02:10:04 20/09/2024
MD5 hash:
9e7ba60bacff8c3a7792176f76b698ea
Filesize:
16.91 KB
suspicious functions used:
curl_exec (line:20); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-snmp-data.php-
Full path:
bz/web/netowrk-snmp-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:53 12/05/2025
Last modified:
02:10:05 20/09/2024
MD5 hash:
18cf050f3938ec48ea2e59854c07d199
Filesize:
23.5 KB
suspicious functions used:
shell_exec (line:96);shell_exec (line:105);shell_exec (line:115);shell_exec (line:134);shell_exec (line:146);shell_exec (line:157);shell_exec (line:175);shell_exec (line:185);shell_exec (line:201);shell_exec (line:221);shell_exec (line:231);shell_exec (line:236);shell_exec (line:244);shell_exec (line:264);shell_exec (line:280);`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:293);shell_exec (line:299);shell_exec (line:434); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-old-onu-rx.php-
Full path:
bz/web/network-old-onu-rx.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:53 12/05/2025
Last modified:
02:10:05 20/09/2024
MD5 hash:
eeb2f02cc4a73abd6864b41ef53d5c9e
Filesize:
6.97 KB
suspicious functions used:
shell_exec (line:76); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search-bdcom.php-
Full path:
bz/web/network-olt-pon-onu-search-bdcom.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:53 12/05/2025
Last modified:
02:10:05 20/09/2024
MD5 hash:
77296ecad089f4851e4f753825c3f304
Filesize:
15.93 KB
suspicious functions used:
shell_exec (line:54);shell_exec (line:63);shell_exec (line:170); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-count-cdata.php-
Full path:
bz/web/network-olt-client-onu-mac-count-cdata.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:53 12/05/2025
Last modified:
02:10:05 20/09/2024
MD5 hash:
c378dbabf36066c335cfb8838a6e167d
Filesize:
4.58 KB
suspicious functions used:
shell_exec (line:25);shell_exec (line:35);shell_exec (line:56);shell_exec (line:103);shell_exec (line:115);shell_exec (line:126);shell_exec (line:140); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-count.php-
Full path:
bz/web/network-olt-client-onu-mac-count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:53 12/05/2025
Last modified:
02:10:05 20/09/2024
MD5 hash:
5bb99b279804116640875e00caf9e713
Filesize:
12.52 KB
suspicious functions used:
shell_exec (line:25);shell_exec (line:35);shell_exec (line:58);shell_exec (line:74);shell_exec (line:91);shell_exec (line:101);shell_exec (line:117);shell_exec (line:158);shell_exec (line:201);shell_exec (line:277);shell_exec (line:343);shell_exec (line:405);shell_exec (line:424);shell_exec (line:443); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search-bdcom1.php-
Full path:
bz/web/network-olt-pon-onu-search-bdcom1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:53 12/05/2025
Last modified:
02:10:05 20/09/2024
MD5 hash:
dd18677b1dcbf7f0bce2ac6912d98da0
Filesize:
9.6 KB
suspicious functions used:
shell_exec (line:42);shell_exec (line:51);shell_exec (line:129); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-countt.php-
Full path:
bz/web/network-olt-client-onu-mac-countt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:53 12/05/2025
Last modified:
02:10:05 20/09/2024
MD5 hash:
d29b4e72c375f528b769bd3894f9f0e7
Filesize:
8.95 KB
suspicious functions used:
shell_exec (line:26);shell_exec (line:36);shell_exec (line:59);shell_exec (line:75);shell_exec (line:92);shell_exec (line:102);shell_exec (line:117);shell_exec (line:155);shell_exec (line:206);shell_exec (line:262);shell_exec (line:275);shell_exec (line:288); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: sms_deliverey_report.php-
Full path:
bz/web/sms_deliverey_report.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
03:07:14 12/05/2025
Last modified:
02:10:07 20/09/2024
MD5 hash:
03623943da7e9334e137b38c8577fc84
Filesize:
4.25 KB
suspicious functions used:
curl_exec (line:28);curl_exec (line:53);curl_exec (line:90); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-load.php-
Full path:
bz/web/network-olt-load.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:53 12/05/2025
Last modified:
02:10:05 20/09/2024
MD5 hash:
f49d5153285c639ed91d4e806685ee56
Filesize:
1.33 KB
suspicious functions used:
shell_exec (line:22);shell_exec (line:25); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-oid-check.php-
Full path:
bz/web/network-olt-oid-check.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:53 12/05/2025
Last modified:
02:10:05 20/09/2024
MD5 hash:
5b7dc0ce1103fbfc895873c250b63141
Filesize:
1.88 KB
suspicious functions used:
shell_exec (line:33); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-count.php-
Full path:
bz/web/network-olt-onu-count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:53 12/05/2025
Last modified:
02:10:05 20/09/2024
MD5 hash:
f3abe7a3ec7f2cb1e82ba52e81149273
Filesize:
5.18 KB
suspicious functions used:
`olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:11);shell_exec (line:65); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-list-data.php-
Full path:
bz/web/network-olt-onu-list-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:53 12/05/2025
Last modified:
02:10:05 20/09/2024
MD5 hash:
54cc9417c766c31317311c3722ce7d4b
Filesize:
9.48 KB
suspicious functions used:
shell_exec (line:24);shell_exec (line:38);shell_exec (line:64);shell_exec (line:85);shell_exec (line:104);shell_exec (line:125);shell_exec (line:143);shell_exec (line:153);shell_exec (line:165);shell_exec (line:185); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-clients-search.php-
Full path:
bz/web/network-olt-pon-clients-search.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:53 12/05/2025
Last modified:
02:10:05 20/09/2024
MD5 hash:
79d26fc66abdab6f173330588aa8b238
Filesize:
10.93 KB
suspicious functions used:
shell_exec (line:42);shell_exec (line:51);shell_exec (line:104);shell_exec (line:168); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tagreeexpayment.php-
Full path:
bz/web/tagreeexpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:53 12/05/2025
Last modified:
02:10:07 20/09/2024
MD5 hash:
029b4fba649a75c7c81d2f8931be8d63
Filesize:
2.86 KB
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreateagree.php-
Full path:
bz/web/tcreateagree.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:53 12/05/2025
Last modified:
02:10:07 20/09/2024
MD5 hash:
27a10adf4190edc7eceee8cf74a6b72b
Filesize:
999 B
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreatepayment.php-
Full path:
bz/web/tcreatepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:53 12/05/2025
Last modified:
02:10:07 20/09/2024
MD5 hash:
e49de9a33f5164bc2c6b88e4770faaff
Filesize:
1.07 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test3.php-
Full path:
bz/web/test3.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:53 12/05/2025
Last modified:
02:10:07 20/09/2024
MD5 hash:
47feeaa9a827160ac4e6faff04aa57cd
Filesize:
3.95 KB
suspicious functions used:
shell_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test5.php-
Full path:
bz/web/test5.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:53 12/05/2025
Last modified:
02:10:07 20/09/2024
MD5 hash:
814ac3ddd93a194f067dc492a2530c65
Filesize:
2.34 KB
suspicious functions used:
curl_exec (line:48); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test6.php-
Full path:
bz/web/test6.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:53 12/05/2025
Last modified:
02:10:07 20/09/2024
MD5 hash:
f22d022ddc284f4d8e1de3660da91db8
Filesize:
15.61 KB
suspicious functions used:
shell_exec (line:34);shell_exec (line:113);shell_exec (line:126);shell_exec (line:132); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: testttttt.php-
Full path:
bz/web/testttttt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:53 12/05/2025
Last modified:
02:10:08 20/09/2024
MD5 hash:
b1988a4be29e191ad935fb409a4174ee
Filesize:
2 KB
suspicious functions used:
curl_exec (line:47); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: texecutepayment.php-
Full path:
bz/web/texecutepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:53 12/05/2025
Last modified:
02:10:08 20/09/2024
MD5 hash:
623635fdf5c871391d3a5fe99ee8c543
Filesize:
2.91 KB
suspicious functions used:
curl_exec (line:24); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tis-news.php-
Full path:
bz/web/tis-news.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
07:12:16 12/05/2025
Last modified:
02:10:08 20/09/2024
MD5 hash:
ed23ca98b77c5321b4485e85eb2ea64d
Filesize:
3.67 KB
suspicious functions used:
curl_exec (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
bz/web/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:53 12/05/2025
Last modified:
02:10:08 20/09/2024
MD5 hash:
7d8e71ceda3ffb74623e0c4a814715af
Filesize:
1.53 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tt.php-
Full path:
bz/web/tt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:53 12/05/2025
Last modified:
02:10:08 20/09/2024
MD5 hash:
9c4ed141cb79fdc7e807b35923c91a20
Filesize:
1.56 KB
suspicious functions used:
curl_exec (line:30); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ttoken.php-
Full path:
bz/web/ttoken.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:53 12/05/2025
Last modified:
02:10:08 20/09/2024
MD5 hash:
5f2c51c1db5b0defadfb67ce25c0098f
Filesize:
1.54 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook_cid.php-
Full path:
bz/web/webhook_cid.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:53 12/05/2025
Last modified:
02:10:08 20/09/2024
MD5 hash:
007f8fa5636da9e44a38526298f7e155
Filesize:
21.08 KB
suspicious functions used:
base64_decode (line:28);curl_exec (line:39);curl_exec (line:429); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook_off.php-
Full path:
bz/web/webhook_off.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:53 12/05/2025
Last modified:
02:10:08 20/09/2024
MD5 hash:
787511edcbdc9d6c9b26eba2dee70a84
Filesize:
21.21 KB
suspicious functions used:
base64_decode (line:27);curl_exec (line:38);curl_exec (line:454); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook_test.php-
Full path:
bz/web/webhook_test.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:53 12/05/2025
Last modified:
02:10:08 20/09/2024
MD5 hash:
74a7dcc262d7fe7f2bdc9e0595d03837
Filesize:
4.69 KB
suspicious functions used:
base64_decode (line:22);curl_exec (line:33);curl_exec (line:86);curl_exec (line:107); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-helper.php-
Full path:
cn/m/nagad-helper.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:54 12/05/2025
Last modified:
15:41:19 01/06/2024
MD5 hash:
2bb70c44d68202e0a0cd8ae1388f0b1b
Filesize:
6.74 KB
suspicious functions used:
curl_exec (line:61);base64_decode (line:97); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tagreeexpayment.php-
Full path:
cn/m/tagreeexpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:54 12/05/2025
Last modified:
15:41:19 01/06/2024
MD5 hash:
c95e3ee881752db67b4f3597bc58430a
Filesize:
2.46 KB
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
cn/m/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:54 12/05/2025
Last modified:
15:41:19 01/06/2024
MD5 hash:
7d8e71ceda3ffb74623e0c4a814715af
Filesize:
1.53 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: support-action.php-
Full path:
cn/m/support-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:55 12/05/2025
Last modified:
15:41:19 01/06/2024
MD5 hash:
2fc6fd844db911a5502a7a6ae383990f
Filesize:
10.31 KB
suspicious functions used:
curl_exec (line:99); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
cn/m/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:55 12/05/2025
Last modified:
15:41:18 01/06/2024
MD5 hash:
849185f307be30eafb1bbef93616d8c3
Filesize:
1.71 KB
suspicious functions used:
curl_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreateagree.php-
Full path:
cn/m/tcreateagree.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:55 12/05/2025
Last modified:
15:41:19 01/06/2024
MD5 hash:
27a10adf4190edc7eceee8cf74a6b72b
Filesize:
999 B
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
cn/m/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:55 12/05/2025
Last modified:
15:41:18 01/06/2024
MD5 hash:
9a3f22521ad987e86f84c4f5f688d5b7
Filesize:
713 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index.php-
Full path:
cn/m/index.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
17:16:54 11/05/2025
Last modified:
15:41:18 01/06/2024
MD5 hash:
decb17fe39b65c67448bf9b3896a5d22
Filesize:
12.14 KB
suspicious functions used:
base64_decode (line:10);curl_exec (line:183); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery.php-
Full path:
cn/m/PaymentOnlineQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:55 12/05/2025
Last modified:
15:41:19 01/06/2024
MD5 hash:
c7aca21e5a61ded371d4b853710cf4b4
Filesize:
21.14 KB
suspicious functions used:
curl_exec (line:287);curl_exec (line:512); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery2.php-
Full path:
cn/m/PaymentOnlineQuery2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:55 12/05/2025
Last modified:
15:41:19 01/06/2024
MD5 hash:
37be1b3f51cac8d936abe043bc79ed4b
Filesize:
19.08 KB
suspicious functions used:
curl_exec (line:41);curl_exec (line:254); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreatepayment.php-
Full path:
cn/m/tcreatepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:55 12/05/2025
Last modified:
15:41:19 01/06/2024
MD5 hash:
e49de9a33f5164bc2c6b88e4770faaff
Filesize:
1.07 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec.php-
Full path:
cn/m/login_exec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:55 12/05/2025
Last modified:
15:41:19 01/06/2024
MD5 hash:
1f800365ef270564df77d30c1bfd7ed3
Filesize:
5.4 KB
suspicious functions used:
curl_exec (line:66); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec1.php-
Full path:
cn/m/login_exec1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:55 12/05/2025
Last modified:
15:41:19 01/06/2024
MD5 hash:
46b08782f51ba75b23e27183e06370fe
Filesize:
4.28 KB
suspicious functions used:
curl_exec (line:61); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ttoken.php-
Full path:
cn/m/ttoken.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
13:28:55 11/05/2025
Last modified:
15:41:19 01/06/2024
MD5 hash:
5f2c51c1db5b0defadfb67ce25c0098f
Filesize:
1.54 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-merchant-callback.php-
Full path:
cn/m/nagad-merchant-callback.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:55 12/05/2025
Last modified:
15:41:19 01/06/2024
MD5 hash:
1ca42269a7e5563f13a266d9c0ce5049
Filesize:
11.75 KB
suspicious functions used:
curl_exec (line:20); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: texecutepayment.php-
Full path:
cn/m/texecutepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:55 12/05/2025
Last modified:
15:41:19 01/06/2024
MD5 hash:
efbb63dfcfdacb52dec74bffc389bbb3
Filesize:
2.67 KB
suspicious functions used:
curl_exec (line:24); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: class.phpmailer.php-
Full path:
cn/web/email/class.phpmailer.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:56 12/05/2025
Last modified:
15:41:32 01/06/2024
MD5 hash:
68468d69b47fffecc89df57e27c5a781
Filesize:
143.32 KB
suspicious functions used:
`$DKIM_private` (line:428);popen (line:1387);popen (line:1408);base64_decode (line:3410);`$mail->set('SMTPSecure', 'tls');` (line:3688);`$mail->SMTPSecure = 'tls';` (line:3690); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: class.smtp.php-
Full path:
cn/web/email/class.smtp.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:56 12/05/2025
Last modified:
15:41:32 01/06/2024
MD5 hash:
aa8478329268e5438a4469c268337a10
Filesize:
41.44 KB
suspicious functions used:
base64_decode (line:513);base64_decode (line:533); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: JSON.php-
Full path:
cn/web/inc/JSON.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:57 12/05/2025
Last modified:
15:41:34 01/06/2024
MD5 hash:
f5a34509e06231308becbe320ade9ff6
Filesize:
33.22 KB
suspicious functions used:
eval (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: jqgrid.php-
Full path:
cn/web/inc/jqgrid.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:57 12/05/2025
Last modified:
15:41:34 01/06/2024
MD5 hash:
71027a29e71e0626d8b57cbb631e6d98
Filesize:
23.92 KB
suspicious functions used:
eval (line:397); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: smsapicore.php-
Full path:
cn/web/include/smsapicore.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
17:03:59 11/05/2025
Last modified:
15:41:34 01/06/2024
MD5 hash:
6b6257f892846565ef8dee38400afa15
Filesize:
1.24 KB
suspicious functions used:
curl_exec (line:36); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: telegramapicore.php-
Full path:
cn/web/include/telegramapicore.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
14:05:24 11/05/2025
Last modified:
15:41:34 01/06/2024
MD5 hash:
535fa7aac83b0e1ba56be7837348b6d9
Filesize:
2.9 KB
suspicious functions used:
curl_exec (line:63); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Changes.txt-
Full path:
cn/web/js/jqgrid/js/Changes.txt
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:57 12/05/2025
Last modified:
15:41:40 01/06/2024
MD5 hash:
c0a4adbc3f1c6d592cb4fa8433fee9ea
Filesize:
44.32 KB
suspicious functions used:
system (line:87); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ui.php-
Full path:
cn/web/js/tinymce/themes/advanced/skins/highcontrast/ui.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:57 12/05/2025
Last modified:
15:41:44 01/06/2024
MD5 hash:
3edaf67be8573b86686f46bbba4f058c
Filesize:
4.53 KB
suspicious functions used:
curl_exec (line:20);`bill_amount` = '0.00' WHERE bill_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY ` (line:53);`bill_amount` = '0.00', days = '0.00' WHERE entry_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY ` (line:54);`payment` WHERE `pay_date` < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND pay_amount != '0.00' ORDER BY ` (line:55);curl_exec (line:146);curl_exec (line:168); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ClientsOnMap.php-
Full path:
cn/web/ClientsOnMap.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:57 12/05/2025
Last modified:
15:41:25 01/06/2024
MD5 hash:
c215e99f04430155ff97c6d82aa6994d
Filesize:
10.59 KB
suspicious functions used:
`${totalonline}` (line:97);`${totaloffline}` (line:98); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: AutoActiveClientsCount1.php-
Full path:
cn/web/AutoActiveClientsCount1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
17:20:52 11/05/2025
Last modified:
15:41:25 01/06/2024
MD5 hash:
fb443f2f93781a8fffce803317592c41
Filesize:
6.12 KB
suspicious functions used:
system (line:56); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: AutoActiveClientsCount11.php-
Full path:
cn/web/AutoActiveClientsCount11.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:58:58 12/05/2025
Last modified:
15:41:25 01/06/2024
MD5 hash:
a0090e4a11dd59b955a6edd549b6ef2f
Filesize:
5.85 KB
suspicious functions used:
system (line:54); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: InstrumentsStoreOutDetails.php-
Full path:
cn/web/InstrumentsStoreOutDetails.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:01 12/05/2025
Last modified:
15:41:27 01/06/2024
MD5 hash:
ab68ab13bcfd51da15e72a3d4e9817e8
Filesize:
9.37 KB
suspicious functions used:
`update_date`, '%D-%b, %y') AS offdate, TIME_FORMAT(`update_time`, '%T') AS offtime FROM `con_sts_log` WHERE `c_id` = '{$row['c_id']}' AND con_sts = 'Inactive' ORDER BY ` (line:120); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Network.php-
Full path:
cn/web/Network.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:01 12/05/2025
Last modified:
14:50:54 25/09/2024
MD5 hash:
34b3f1babd032fe12b9d10d13e002bd6
Filesize:
36.29 KB
suspicious functions used:
system (line:276);shell_exec (line:554); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Network1.php-
Full path:
cn/web/Network1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:01 12/05/2025
Last modified:
15:41:28 01/06/2024
MD5 hash:
81fbd1a4bf9ecbb944ccd98ae719849b
Filesize:
22.92 KB
suspicious functions used:
system (line:209); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkLoad.php-
Full path:
cn/web/NetworkLoad.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:01 12/05/2025
Last modified:
15:41:28 01/06/2024
MD5 hash:
e1632e66ee1b7394d3fb82751b924abe
Filesize:
2.83 KB
suspicious functions used:
system (line:81); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkLoad1.php-
Full path:
cn/web/NetworkLoad1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:01 12/05/2025
Last modified:
15:41:28 01/06/2024
MD5 hash:
176bd6931be34d7ef351d22897accc65
Filesize:
759 B
suspicious functions used:
system (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltAddQuery.php-
Full path:
cn/web/NetworkOltAddQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:01 12/05/2025
Last modified:
15:41:28 01/06/2024
MD5 hash:
8782eab364b29fbbc487fcf8d8167e6a
Filesize:
3.46 KB
suspicious functions used:
shell_exec (line:7); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltOnuStatus.php-
Full path:
cn/web/NetworkOltOnuStatus.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:01 12/05/2025
Last modified:
15:41:28 01/06/2024
MD5 hash:
f112b225c20188bc03c92e63dac90efa
Filesize:
15.88 KB
suspicious functions used:
shell_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeMap1.php-
Full path:
cn/web/NetworkTreeMap1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:02 12/05/2025
Last modified:
15:41:29 01/06/2024
MD5 hash:
3483a4b939ab44a513c3614c31444179
Filesize:
10.57 KB
suspicious functions used:
`${totalonline}` (line:97);`${totaloffline}` (line:98); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentWebhook.php-
Full path:
cn/web/PaymentWebhook.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:02 12/05/2025
Last modified:
15:41:29 01/06/2024
MD5 hash:
a2f322c94787630ab1e0c8ca35fc5ba1
Filesize:
18.6 KB
suspicious functions used:
base64_decode (line:30);curl_exec (line:41);curl_exec (line:422); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery.php-
Full path:
cn/web/PaymentOnlineQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
15:36:31 11/05/2025
Last modified:
15:41:29 01/06/2024
MD5 hash:
e71855333c2ea0c43f2a87109898c283
Filesize:
28.5 KB
suspicious functions used:
curl_exec (line:456);curl_exec (line:688); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery2.php-
Full path:
cn/web/PaymentOnlineQuery2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:03 12/05/2025
Last modified:
15:41:29 01/06/2024
MD5 hash:
700d8182abbbc0b80fe31beb1e717699
Filesize:
19.39 KB
suspicious functions used:
curl_exec (line:42);curl_exec (line:252); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMS.php-
Full path:
cn/web/SMS.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:03 12/05/2025
Last modified:
15:41:30 01/06/2024
MD5 hash:
dc652091a826cbf0b32424c38bcd42fa
Filesize:
36.06 KB
suspicious functions used:
curl_exec (line:56); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMS1.php-
Full path:
cn/web/SMS1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:03 12/05/2025
Last modified:
15:41:30 01/06/2024
MD5 hash:
40d55bbcfe09846560034ad6b6748670
Filesize:
32.19 KB
suspicious functions used:
curl_exec (line:59); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMSAddSave.php-
Full path:
cn/web/SMSAddSave.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:03 12/05/2025
Last modified:
15:41:30 01/06/2024
MD5 hash:
1a6eaf13aa0ca959fe2dca885b7ffd8e
Filesize:
1.73 KB
suspicious functions used:
curl_exec (line:34); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SignUp1.php-
Full path:
cn/web/SignUp1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:03 12/05/2025
Last modified:
15:41:30 01/06/2024
MD5 hash:
3f7943dd155c8e0a383b7d02730f8c11
Filesize:
24.59 KB
suspicious functions used:
curl_exec (line:33);curl_exec (line:59); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: client-online-mbb.php-
Full path:
cn/web/client-online-mbb.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:04 12/05/2025
Last modified:
15:41:25 01/06/2024
MD5 hash:
69c51efb5b9017a07a7158b4a63f3826
Filesize:
14.32 KB
suspicious functions used:
curl_exec (line:90); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: texecutepayment.php-
Full path:
cn/web/texecutepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
15:36:30 11/05/2025
Last modified:
15:41:31 01/06/2024
MD5 hash:
623635fdf5c871391d3a5fe99ee8c543
Filesize:
2.91 KB
suspicious functions used:
curl_exec (line:24); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tis-news.php-
Full path:
cn/web/tis-news.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
17:20:52 11/05/2025
Last modified:
15:41:31 01/06/2024
MD5 hash:
ed23ca98b77c5321b4485e85eb2ea64d
Filesize:
3.67 KB
suspicious functions used:
curl_exec (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: clients-nots-action.php-
Full path:
cn/web/clients-nots-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:04 12/05/2025
Last modified:
15:41:25 01/06/2024
MD5 hash:
dff1bb495509427d098cb4588da553b9
Filesize:
5.89 KB
suspicious functions used:
curl_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
cn/web/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:04 12/05/2025
Last modified:
15:41:31 01/06/2024
MD5 hash:
7d8e71ceda3ffb74623e0c4a814715af
Filesize:
1.53 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: company_info.php-
Full path:
cn/web/company_info.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
11:02:32 12/05/2025
Last modified:
15:41:26 01/06/2024
MD5 hash:
e612d58aa2e38f5b49ba37c1bf620ece
Filesize:
8.38 KB
suspicious functions used:
curl_exec (line:130); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
cn/web/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:05 12/05/2025
Last modified:
15:41:26 01/06/2024
MD5 hash:
ba9747d0421fd091b998389469e72a0b
Filesize:
1.7 KB
suspicious functions used:
curl_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_all.php-
Full path:
cn/web/cron_all.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:05 12/05/2025
Last modified:
15:41:26 01/06/2024
MD5 hash:
b19a08fef36584598cca299b7ecc5e6d
Filesize:
2.07 KB
suspicious functions used:
curl_exec (line:23);curl_exec (line:38);curl_exec (line:53); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_gen_bill.php-
Full path:
cn/web/cron_auto_gen_bill.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:05 12/05/2025
Last modified:
15:41:26 01/06/2024
MD5 hash:
f1056618cc4402968e50d1232d2c51c8
Filesize:
4.73 KB
suspicious functions used:
curl_exec (line:140);curl_exec (line:149); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tt.php-
Full path:
cn/web/tt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:05 12/05/2025
Last modified:
15:41:31 01/06/2024
MD5 hash:
9c4ed141cb79fdc7e807b35923c91a20
Filesize:
1.56 KB
suspicious functions used:
curl_exec (line:30); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ttoken.php-
Full path:
cn/web/ttoken.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
15:35:34 11/05/2025
Last modified:
15:41:31 01/06/2024
MD5 hash:
5f2c51c1db5b0defadfb67ce25c0098f
Filesize:
1.54 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive.php-
Full path:
cn/web/cron_auto_inactive.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:05 12/05/2025
Last modified:
15:41:27 01/06/2024
MD5 hash:
7e0dc4dd9dae2bf0220516641b53c027
Filesize:
5.43 KB
suspicious functions used:
curl_exec (line:142); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive2.php-
Full path:
cn/web/cron_auto_inactive2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:05 12/05/2025
Last modified:
15:41:26 01/06/2024
MD5 hash:
440bc24f05b01eb395df63fff2f60de9
Filesize:
5.46 KB
suspicious functions used:
curl_exec (line:142); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: getclientuptime.php-
Full path:
cn/web/getclientuptime.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:05 12/05/2025
Last modified:
15:41:27 01/06/2024
MD5 hash:
bbc14cdd451c72b94d78c7d2d1af0b52
Filesize:
718 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive_termination.php-
Full path:
cn/web/cron_auto_inactive_termination.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
18:40:29 11/05/2025
Last modified:
12:17:53 23/09/2024
MD5 hash:
9f9c8ca9110c2304128646824bfb17db
Filesize:
12.16 KB
suspicious functions used:
curl_exec (line:241);curl_exec (line:253); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive_termination1.php-
Full path:
cn/web/cron_auto_inactive_termination1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:05 12/05/2025
Last modified:
15:41:26 01/06/2024
MD5 hash:
be76b964c93a2cb4fa7e632750ff3bc4
Filesize:
6.64 KB
suspicious functions used:
curl_exec (line:156);curl_exec (line:168); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_termination_remainder1.php-
Full path:
cn/web/cron_auto_termination_remainder1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
03:06:26 12/05/2025
Last modified:
15:41:26 01/06/2024
MD5 hash:
7765f9f820dbd402f1064fab9958ffaa
Filesize:
3.26 KB
suspicious functions used:
curl_exec (line:83); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: imagevwr.php-
Full path:
cn/web/imagevwr.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:05 12/05/2025
Last modified:
15:41:27 01/06/2024
MD5 hash:
47a223a13cc642d01dcfaaca542d396d
Filesize:
915 B
suspicious functions used:
curl_exec (line:15); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_client_bandwidth_count.php-
Full path:
cn/web/cron_client_bandwidth_count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
23:48:32 11/05/2025
Last modified:
15:41:26 01/06/2024
MD5 hash:
de3b1389261cf5411b7e7ca5c44f96b2
Filesize:
4.08 KB
suspicious functions used:
curl_exec (line:117); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_network.php-
Full path:
cn/web/cron_network.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
00:02:21 12/05/2025
Last modified:
15:41:26 01/06/2024
MD5 hash:
1a75ea6c2e0cc5b9263541dda62ab458
Filesize:
4.61 KB
suspicious functions used:
curl_exec (line:45);curl_exec (line:67); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook.php-
Full path:
cn/web/webhook.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:07 12/05/2025
Last modified:
15:41:31 01/06/2024
MD5 hash:
787511edcbdc9d6c9b26eba2dee70a84
Filesize:
21.21 KB
suspicious functions used:
base64_decode (line:27);curl_exec (line:38);curl_exec (line:454); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook_cid.php-
Full path:
cn/web/webhook_cid.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:07 12/05/2025
Last modified:
15:41:31 01/06/2024
MD5 hash:
007f8fa5636da9e44a38526298f7e155
Filesize:
21.08 KB
suspicious functions used:
base64_decode (line:28);curl_exec (line:39);curl_exec (line:429); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook_test.php-
Full path:
cn/web/webhook_test.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:07 12/05/2025
Last modified:
15:41:31 01/06/2024
MD5 hash:
74a7dcc262d7fe7f2bdc9e0595d03837
Filesize:
4.69 KB
suspicious functions used:
base64_decode (line:22);curl_exec (line:33);curl_exec (line:86);curl_exec (line:107); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: emp_salary_advence_find.php-
Full path:
cn/web/emp_salary_advence_find.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:07 12/05/2025
Last modified:
15:41:26 01/06/2024
MD5 hash:
74a7e2ffda0f7584611d7cbce6136c24
Filesize:
2.25 KB
suspicious functions used:
`expanse` WHERE `type` = '2' AND `status` = '2' AND ex_by = '$e_id' AND MONTH(`, `) = MONTH('$lastmonth') AND YEAR(`, `) = YEAR('$lastmonth') GROUP BY ` (line:8);`e_id` = '$e_id' AND ` (line:12); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
cn/web/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:07 12/05/2025
Last modified:
15:41:26 01/06/2024
MD5 hash:
c46a50905333286f45dfeacf010851ab
Filesize:
716 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreateagree.php-
Full path:
cn/web/tcreateagree.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:07 12/05/2025
Last modified:
15:41:30 01/06/2024
MD5 hash:
27a10adf4190edc7eceee8cf74a6b72b
Filesize:
999 B
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index.php-
Full path:
cn/web/index.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
14:29:16 11/05/2025
Last modified:
15:41:27 01/06/2024
MD5 hash:
84313f84ac7a41057213c1b0703d622c
Filesize:
11.02 KB
suspicious functions used:
base64_decode (line:10);curl_exec (line:178); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ip-ping-checker.php-
Full path:
cn/web/ip-ping-checker.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:07 12/05/2025
Last modified:
15:41:27 01/06/2024
MD5 hash:
0d28f3053b73b3fe2885cf519ee17c12
Filesize:
2.64 KB
suspicious functions used:
curl_exec (line:81); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec.php-
Full path:
cn/web/login_exec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
07:49:59 12/05/2025
Last modified:
15:41:27 01/06/2024
MD5 hash:
9038a77a32a5db2c9affae1496473f3e
Filesize:
5.27 KB
suspicious functions used:
curl_exec (line:62); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: sms-balance-check.php-
Full path:
cn/web/sms-balance-check.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
17:20:52 11/05/2025
Last modified:
15:41:30 01/06/2024
MD5 hash:
74ac3e963a0dc5bb7d4c980e594aa39b
Filesize:
854 B
suspicious functions used:
curl_exec (line:15); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: loginexec.php-
Full path:
cn/web/loginexec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:07 12/05/2025
Last modified:
15:41:27 01/06/2024
MD5 hash:
edb8017e7d0f8e037facbcacc94a383d
Filesize:
5.91 KB
suspicious functions used:
curl_exec (line:67); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-snmp-data.php-
Full path:
cn/web/netowrk-snmp-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:07 12/05/2025
Last modified:
15:41:28 01/06/2024
MD5 hash:
1cce6eab0568ea3ca79dbf074af8436c
Filesize:
5.87 KB
suspicious functions used:
shell_exec (line:54);shell_exec (line:81);shell_exec (line:90);shell_exec (line:115); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-old-onu-rx.php-
Full path:
cn/web/network-old-onu-rx.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:07 12/05/2025
Last modified:
15:41:28 01/06/2024
MD5 hash:
05d7a516398202d1108542e66fcb2d9d
Filesize:
2.33 KB
suspicious functions used:
shell_exec (line:34); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test4.php-
Full path:
cn/web/test4.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:07 12/05/2025
Last modified:
15:41:31 01/06/2024
MD5 hash:
bee27c876728208c36ba6d0dcb9241f6
Filesize:
7.35 KB
suspicious functions used:
shell_exec (line:30);shell_exec (line:43); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-oid-check.php-
Full path:
cn/web/network-olt-oid-check.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:07 12/05/2025
Last modified:
15:41:28 01/06/2024
MD5 hash:
5b7dc0ce1103fbfc895873c250b63141
Filesize:
1.88 KB
suspicious functions used:
shell_exec (line:33); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-merchant-callback.php-
Full path:
cn/web/nagad-merchant-callback.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:07 12/05/2025
Last modified:
15:41:28 01/06/2024
MD5 hash:
9e7ba60bacff8c3a7792176f76b698ea
Filesize:
16.91 KB
suspicious functions used:
curl_exec (line:20); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test5.php-
Full path:
cn/web/test5.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:07 12/05/2025
Last modified:
15:41:31 01/06/2024
MD5 hash:
abb0c9a5ecfe07bafa3e12fbb8262d0c
Filesize:
2.85 KB
suspicious functions used:
shell_exec (line:5);shell_exec (line:13); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tagreeexpayment.php-
Full path:
cn/web/tagreeexpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:07 12/05/2025
Last modified:
15:41:30 01/06/2024
MD5 hash:
029b4fba649a75c7c81d2f8931be8d63
Filesize:
2.86 KB
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: sms_deliverey_report.php-
Full path:
cn/web/sms_deliverey_report.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
03:06:26 12/05/2025
Last modified:
15:41:30 01/06/2024
MD5 hash:
03623943da7e9334e137b38c8577fc84
Filesize:
4.25 KB
suspicious functions used:
curl_exec (line:28);curl_exec (line:53);curl_exec (line:90); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: support-action.php-
Full path:
cn/web/support-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:07 12/05/2025
Last modified:
15:41:30 01/06/2024
MD5 hash:
1d989800aaa10974829eb98e501fb6d6
Filesize:
12.6 KB
suspicious functions used:
curl_exec (line:162); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test6.php-
Full path:
cn/web/test6.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:08 12/05/2025
Last modified:
15:41:31 01/06/2024
MD5 hash:
0edc703b008a5e3cae5d241fc2cf717b
Filesize:
4.76 KB
suspicious functions used:
shell_exec (line:46);shell_exec (line:70);shell_exec (line:92); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreatepayment.php-
Full path:
cn/web/tcreatepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
15:36:18 11/05/2025
Last modified:
15:41:30 01/06/2024
MD5 hash:
e49de9a33f5164bc2c6b88e4770faaff
Filesize:
1.07 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test3.php-
Full path:
cn/web/test3.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:08 12/05/2025
Last modified:
15:41:31 01/06/2024
MD5 hash:
47feeaa9a827160ac4e6faff04aa57cd
Filesize:
3.95 KB
suspicious functions used:
shell_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test1.php-
Full path:
cn/web/test1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:08 12/05/2025
Last modified:
15:41:31 01/06/2024
MD5 hash:
8167d684011dd66d3f07c55c39dc7c8c
Filesize:
2.54 KB
suspicious functions used:
shell_exec (line:10);shell_exec (line:43); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-helper.php-
Full path:
cn/web/nagad-helper.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:08 12/05/2025
Last modified:
15:41:28 01/06/2024
MD5 hash:
2bb70c44d68202e0a0cd8ae1388f0b1b
Filesize:
6.74 KB
suspicious functions used:
curl_exec (line:61);base64_decode (line:97); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: testttttt.php-
Full path:
cn/web/testttttt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:08 12/05/2025
Last modified:
15:41:31 01/06/2024
MD5 hash:
b1988a4be29e191ad935fb409a4174ee
Filesize:
2 KB
suspicious functions used:
curl_exec (line:47); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-helper.php-
Full path:
cpo/m/nagad-helper.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:08 12/05/2025
Last modified:
01:14:59 05/09/2024
MD5 hash:
2bb70c44d68202e0a0cd8ae1388f0b1b
Filesize:
6.74 KB
suspicious functions used:
curl_exec (line:61);base64_decode (line:97); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tagreeexpayment.php-
Full path:
cpo/m/tagreeexpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:08 12/05/2025
Last modified:
01:15:00 05/09/2024
MD5 hash:
c95e3ee881752db67b4f3597bc58430a
Filesize:
2.46 KB
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
cpo/m/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:08 12/05/2025
Last modified:
01:15:00 05/09/2024
MD5 hash:
7d8e71ceda3ffb74623e0c4a814715af
Filesize:
1.53 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: support-action.php-
Full path:
cpo/m/support-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:09 12/05/2025
Last modified:
01:15:00 05/09/2024
MD5 hash:
2fc6fd844db911a5502a7a6ae383990f
Filesize:
10.31 KB
suspicious functions used:
curl_exec (line:99); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
cpo/m/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:09 12/05/2025
Last modified:
01:14:59 05/09/2024
MD5 hash:
849185f307be30eafb1bbef93616d8c3
Filesize:
1.71 KB
suspicious functions used:
curl_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreateagree.php-
Full path:
cpo/m/tcreateagree.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:09 12/05/2025
Last modified:
01:15:00 05/09/2024
MD5 hash:
27a10adf4190edc7eceee8cf74a6b72b
Filesize:
999 B
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
cpo/m/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:09 12/05/2025
Last modified:
01:14:59 05/09/2024
MD5 hash:
9a3f22521ad987e86f84c4f5f688d5b7
Filesize:
713 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index.php-
Full path:
cpo/m/index.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
07:42:11 12/05/2025
Last modified:
01:14:59 05/09/2024
MD5 hash:
9a5dc16d9d603e4fe488b2349f6197a3
Filesize:
12.47 KB
suspicious functions used:
base64_decode (line:10);curl_exec (line:183); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery.php-
Full path:
cpo/m/PaymentOnlineQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:09 12/05/2025
Last modified:
01:14:59 05/09/2024
MD5 hash:
c7aca21e5a61ded371d4b853710cf4b4
Filesize:
21.14 KB
suspicious functions used:
curl_exec (line:287);curl_exec (line:512); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery2.php-
Full path:
cpo/m/PaymentOnlineQuery2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:09 12/05/2025
Last modified:
01:14:59 05/09/2024
MD5 hash:
37be1b3f51cac8d936abe043bc79ed4b
Filesize:
19.08 KB
suspicious functions used:
curl_exec (line:41);curl_exec (line:254); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreatepayment.php-
Full path:
cpo/m/tcreatepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:09 12/05/2025
Last modified:
01:15:00 05/09/2024
MD5 hash:
e49de9a33f5164bc2c6b88e4770faaff
Filesize:
1.07 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec.php-
Full path:
cpo/m/login_exec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:09 12/05/2025
Last modified:
01:14:59 05/09/2024
MD5 hash:
1f800365ef270564df77d30c1bfd7ed3
Filesize:
5.4 KB
suspicious functions used:
curl_exec (line:66); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec1.php-
Full path:
cpo/m/login_exec1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:09 12/05/2025
Last modified:
01:14:59 05/09/2024
MD5 hash:
46b08782f51ba75b23e27183e06370fe
Filesize:
4.28 KB
suspicious functions used:
curl_exec (line:61); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ttoken.php-
Full path:
cpo/m/ttoken.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:10 12/05/2025
Last modified:
01:15:00 05/09/2024
MD5 hash:
5f2c51c1db5b0defadfb67ce25c0098f
Filesize:
1.54 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-merchant-callback.php-
Full path:
cpo/m/nagad-merchant-callback.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:10 12/05/2025
Last modified:
01:14:59 05/09/2024
MD5 hash:
1ca42269a7e5563f13a266d9c0ce5049
Filesize:
11.75 KB
suspicious functions used:
curl_exec (line:20); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: texecutepayment.php-
Full path:
cpo/m/texecutepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:10 12/05/2025
Last modified:
01:15:00 05/09/2024
MD5 hash:
efbb63dfcfdacb52dec74bffc389bbb3
Filesize:
2.67 KB
suspicious functions used:
curl_exec (line:24); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-snmp-data.php-
Full path:
cpo/m/netowrk-snmp-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:10 12/05/2025
Last modified:
01:14:59 05/09/2024
MD5 hash:
b56429056656f0de16982e31853f3304
Filesize:
20.26 KB
suspicious functions used:
shell_exec (line:93);shell_exec (line:102);shell_exec (line:112);shell_exec (line:131);shell_exec (line:141);shell_exec (line:157);shell_exec (line:177);shell_exec (line:187);shell_exec (line:192);shell_exec (line:200);shell_exec (line:220);shell_exec (line:236);`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:249);shell_exec (line:255);shell_exec (line:377); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: billpaycheck.php-
Full path:
cpo/web/bkash/billpaycheck.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:10 12/05/2025
Last modified:
01:15:11 05/09/2024
MD5 hash:
38c46efc36b25628fa18bd92ae135af9
Filesize:
796 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
cpo/web/bkash/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:10 12/05/2025
Last modified:
01:15:11 05/09/2024
MD5 hash:
6175301f744b22b7db70ba598a991f8b
Filesize:
1.64 KB
suspicious functions used:
curl_exec (line:36); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
cpo/web/bkash/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:10 12/05/2025
Last modified:
01:15:11 05/09/2024
MD5 hash:
19be365d26141eaecead7ef0ada0e75c
Filesize:
1.3 KB
suspicious functions used:
curl_exec (line:31); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: grant.php-
Full path:
cpo/web/bkash/grant.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:10 12/05/2025
Last modified:
01:15:11 05/09/2024
MD5 hash:
da5499d260dc78ea4fcd71227cc6c484
Filesize:
2.01 KB
suspicious functions used:
curl_exec (line:41);curl_exec (line:63); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: query.php-
Full path:
cpo/web/bkash/query.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:10 12/05/2025
Last modified:
01:15:11 05/09/2024
MD5 hash:
f3ed9045f3a073e2cdc8561d500bda89
Filesize:
1.65 KB
suspicious functions used:
curl_exec (line:33); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tagreeexpayment.php-
Full path:
cpo/web/bkash/tagreeexpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:10 12/05/2025
Last modified:
01:15:11 05/09/2024
MD5 hash:
a1ba7d36003f72e593615aa32e44acb9
Filesize:
1.58 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreateagree.php-
Full path:
cpo/web/bkash/tcreateagree.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:10 12/05/2025
Last modified:
01:15:11 05/09/2024
MD5 hash:
8ae6bdc9f3d4b0cdcf651701a0d9ebab
Filesize:
1.2 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreatepayment.php-
Full path:
cpo/web/bkash/tcreatepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:10 12/05/2025
Last modified:
01:15:11 05/09/2024
MD5 hash:
3c978def6cffa0a8db5e86ce127caae6
Filesize:
1.35 KB
suspicious functions used:
curl_exec (line:29); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: texecutepayment.php-
Full path:
cpo/web/bkash/texecutepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:10 12/05/2025
Last modified:
01:15:11 05/09/2024
MD5 hash:
d8f24df64623da3cfc2baf48f184a3d1
Filesize:
1.21 KB
suspicious functions used:
curl_exec (line:25); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
cpo/web/bkash/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:10 12/05/2025
Last modified:
01:15:11 05/09/2024
MD5 hash:
f50b33eeb31927b2c081195618d48b8d
Filesize:
1.88 KB
suspicious functions used:
curl_exec (line:48); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tokent.php-
Full path:
cpo/web/bkash/tokent.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:10 12/05/2025
Last modified:
01:15:11 05/09/2024
MD5 hash:
890a9e9fb1be75f31a6daad8811c1ff9
Filesize:
1.9 KB
suspicious functions used:
curl_exec (line:48); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: trxID.php-
Full path:
cpo/web/bkash/trxID.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:10 12/05/2025
Last modified:
01:15:11 05/09/2024
MD5 hash:
9bcb8e70728fd25807c4db8916166d74
Filesize:
1.44 KB
suspicious functions used:
curl_exec (line:31); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
cpo/web/bkasht/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:10 12/05/2025
Last modified:
01:15:12 05/09/2024
MD5 hash:
a4ba6e7683f558dc3602dacd7ddeded2
Filesize:
1.36 KB
suspicious functions used:
curl_exec (line:29); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
cpo/web/bkasht/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:10 12/05/2025
Last modified:
01:15:12 05/09/2024
MD5 hash:
aad462fbca9f9a36649a197d67403098
Filesize:
1.27 KB
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: grant.php-
Full path:
cpo/web/bkasht/grant.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:10 12/05/2025
Last modified:
01:15:12 05/09/2024
MD5 hash:
da5499d260dc78ea4fcd71227cc6c484
Filesize:
2.01 KB
suspicious functions used:
curl_exec (line:41);curl_exec (line:63); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: query.php-
Full path:
cpo/web/bkasht/query.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:10 12/05/2025
Last modified:
01:15:12 05/09/2024
MD5 hash:
f3ed9045f3a073e2cdc8561d500bda89
Filesize:
1.65 KB
suspicious functions used:
curl_exec (line:33); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
cpo/web/bkasht/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:10 12/05/2025
Last modified:
01:15:12 05/09/2024
MD5 hash:
f50b33eeb31927b2c081195618d48b8d
Filesize:
1.88 KB
suspicious functions used:
curl_exec (line:48); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: trxID.php-
Full path:
cpo/web/bkasht/trxID.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:10 12/05/2025
Last modified:
01:15:12 05/09/2024
MD5 hash:
9bcb8e70728fd25807c4db8916166d74
Filesize:
1.44 KB
suspicious functions used:
curl_exec (line:31); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: class.phpmailer.php-
Full path:
cpo/web/email/class.phpmailer.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:10 12/05/2025
Last modified:
01:15:12 05/09/2024
MD5 hash:
68468d69b47fffecc89df57e27c5a781
Filesize:
143.32 KB
suspicious functions used:
`$DKIM_private` (line:428);popen (line:1387);popen (line:1408);base64_decode (line:3410);`$mail->set('SMTPSecure', 'tls');` (line:3688);`$mail->SMTPSecure = 'tls';` (line:3690); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: class.smtp.php-
Full path:
cpo/web/email/class.smtp.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:10 12/05/2025
Last modified:
01:15:12 05/09/2024
MD5 hash:
aa8478329268e5438a4469c268337a10
Filesize:
41.44 KB
suspicious functions used:
base64_decode (line:513);base64_decode (line:533); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: JSON.php-
Full path:
cpo/web/inc/JSON.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:11 12/05/2025
Last modified:
01:15:19 05/09/2024
MD5 hash:
f5a34509e06231308becbe320ade9ff6
Filesize:
33.22 KB
suspicious functions used:
eval (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: jqgrid.php-
Full path:
cpo/web/inc/jqgrid.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:11 12/05/2025
Last modified:
01:15:19 05/09/2024
MD5 hash:
71027a29e71e0626d8b57cbb631e6d98
Filesize:
23.92 KB
suspicious functions used:
eval (line:397); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: smsapicore.php-
Full path:
cpo/web/include/smsapicore.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:11 12/05/2025
Last modified:
01:15:19 05/09/2024
MD5 hash:
6b6257f892846565ef8dee38400afa15
Filesize:
1.24 KB
suspicious functions used:
curl_exec (line:36); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: telegramapicore.php-
Full path:
cpo/web/include/telegramapicore.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:11 12/05/2025
Last modified:
01:15:19 05/09/2024
MD5 hash:
535fa7aac83b0e1ba56be7837348b6d9
Filesize:
2.9 KB
suspicious functions used:
curl_exec (line:63); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Changes.txt-
Full path:
cpo/web/js/jqgrid/js/Changes.txt
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:11 12/05/2025
Last modified:
01:15:25 05/09/2024
MD5 hash:
c0a4adbc3f1c6d592cb4fa8433fee9ea
Filesize:
44.32 KB
suspicious functions used:
system (line:87); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ui.php-
Full path:
cpo/web/js/tinymce/themes/advanced/skins/highcontrast/ui.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:11 12/05/2025
Last modified:
01:15:29 05/09/2024
MD5 hash:
3edaf67be8573b86686f46bbba4f058c
Filesize:
4.53 KB
suspicious functions used:
curl_exec (line:20);`bill_amount` = '0.00' WHERE bill_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY ` (line:53);`bill_amount` = '0.00', days = '0.00' WHERE entry_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY ` (line:54);`payment` WHERE `pay_date` < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND pay_amount != '0.00' ORDER BY ` (line:55);curl_exec (line:146);curl_exec (line:168); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: AutoActiveClientsCount1.php-
Full path:
cpo/web/AutoActiveClientsCount1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:48:23 12/05/2025
Last modified:
01:15:05 05/09/2024
MD5 hash:
fb443f2f93781a8fffce803317592c41
Filesize:
6.12 KB
suspicious functions used:
system (line:56); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: AutoActiveClientsCount11.php-
Full path:
cpo/web/AutoActiveClientsCount11.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:12 12/05/2025
Last modified:
01:15:05 05/09/2024
MD5 hash:
a0090e4a11dd59b955a6edd549b6ef2f
Filesize:
5.85 KB
suspicious functions used:
system (line:54); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ClientsOnMap.php-
Full path:
cpo/web/ClientsOnMap.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:12 12/05/2025
Last modified:
01:15:06 05/09/2024
MD5 hash:
41db12dda8643b42f3d756d7b441ed33
Filesize:
12.21 KB
suspicious functions used:
`${totalonline}` (line:97);`${totaloffline}` (line:98);`${results.rxPower}` (line:233);`${results.distance}` (line:234);`${results.supplyVoltage}` (line:235);`${results.temperature}` (line:236);`${results.txPower}` (line:237); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients.php-
Full path:
cpo/web/Clients.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
09:30:54 12/05/2025
Last modified:
01:15:05 05/09/2024
MD5 hash:
42540e032b92be9d4484a9f9f78dd610
Filesize:
175.25 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:832); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients2.php-
Full path:
cpo/web/Clients2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:14 12/05/2025
Last modified:
01:15:05 05/09/2024
MD5 hash:
4d7acc879510998b2909318d8638d804
Filesize:
168.05 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:816); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients3.php-
Full path:
cpo/web/Clients3.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:15 12/05/2025
Last modified:
01:15:06 05/09/2024
MD5 hash:
7b4a7d07d9658aa7c159cd59ebae283a
Filesize:
175.3 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:832); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: InstrumentsStoreOutDetails.php-
Full path:
cpo/web/InstrumentsStoreOutDetails.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:16 12/05/2025
Last modified:
01:15:07 05/09/2024
MD5 hash:
ab68ab13bcfd51da15e72a3d4e9817e8
Filesize:
9.37 KB
suspicious functions used:
`update_date`, '%D-%b, %y') AS offdate, TIME_FORMAT(`update_time`, '%T') AS offtime FROM `con_sts_log` WHERE `c_id` = '{$row['c_id']}' AND con_sts = 'Inactive' ORDER BY ` (line:120); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkLoad.php-
Full path:
cpo/web/NetworkLoad.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:16 12/05/2025
Last modified:
01:15:08 05/09/2024
MD5 hash:
e1632e66ee1b7394d3fb82751b924abe
Filesize:
2.83 KB
suspicious functions used:
system (line:81); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Network.php-
Full path:
cpo/web/Network.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:16 12/05/2025
Last modified:
14:50:54 25/09/2024
MD5 hash:
450c41be5bee69bf5f756f28873f0cf7
Filesize:
55.23 KB
suspicious functions used:
system (line:358);shell_exec (line:654); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Network1.php-
Full path:
cpo/web/Network1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:16 12/05/2025
Last modified:
01:15:08 05/09/2024
MD5 hash:
95f9922e23cb36ebd65d603a48d22c4b
Filesize:
44.04 KB
suspicious functions used:
system (line:295);shell_exec (line:590); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMSAddSave.php-
Full path:
cpo/web/SMSAddSave.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:17 12/05/2025
Last modified:
01:15:10 05/09/2024
MD5 hash:
1a6eaf13aa0ca959fe2dca885b7ffd8e
Filesize:
1.73 KB
suspicious functions used:
curl_exec (line:34); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMS1.php-
Full path:
cpo/web/SMS1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:17 12/05/2025
Last modified:
01:15:10 05/09/2024
MD5 hash:
40d55bbcfe09846560034ad6b6748670
Filesize:
32.19 KB
suspicious functions used:
curl_exec (line:59); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkLoad1.php-
Full path:
cpo/web/NetworkLoad1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:17 12/05/2025
Last modified:
01:15:08 05/09/2024
MD5 hash:
176bd6931be34d7ef351d22897accc65
Filesize:
759 B
suspicious functions used:
system (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltAddQuery.php-
Full path:
cpo/web/NetworkOltAddQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:17 12/05/2025
Last modified:
01:15:08 05/09/2024
MD5 hash:
b14dd824d3ac47473bc0311a79d451fb
Filesize:
6.33 KB
suspicious functions used:
shell_exec (line:21); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltOnuStatus.php-
Full path:
cpo/web/NetworkOltOnuStatus.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:17 12/05/2025
Last modified:
01:15:08 05/09/2024
MD5 hash:
af4bfcb571c821970ba15de0a72c118d
Filesize:
45.04 KB
suspicious functions used:
shell_exec (line:41);shell_exec (line:337);shell_exec (line:452);shell_exec (line:565); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltOnuStatus2.php-
Full path:
cpo/web/NetworkOltOnuStatus2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:17 12/05/2025
Last modified:
01:15:08 05/09/2024
MD5 hash:
f112b225c20188bc03c92e63dac90efa
Filesize:
15.88 KB
suspicious functions used:
shell_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery.php-
Full path:
cpo/web/PaymentOnlineQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:17 12/05/2025
Last modified:
01:15:09 05/09/2024
MD5 hash:
e71855333c2ea0c43f2a87109898c283
Filesize:
28.5 KB
suspicious functions used:
curl_exec (line:456);curl_exec (line:688); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMS.php-
Full path:
cpo/web/SMS.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:17 12/05/2025
Last modified:
01:15:10 05/09/2024
MD5 hash:
d8f9df0a2192c1b58a3b5c7887f46b87
Filesize:
36.26 KB
suspicious functions used:
curl_exec (line:56); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery2.php-
Full path:
cpo/web/PaymentOnlineQuery2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:17 12/05/2025
Last modified:
01:15:09 05/09/2024
MD5 hash:
700d8182abbbc0b80fe31beb1e717699
Filesize:
19.39 KB
suspicious functions used:
curl_exec (line:42);curl_exec (line:252); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentWebhook.php-
Full path:
cpo/web/PaymentWebhook.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:17 12/05/2025
Last modified:
01:15:09 05/09/2024
MD5 hash:
a2f322c94787630ab1e0c8ca35fc5ba1
Filesize:
18.6 KB
suspicious functions used:
base64_decode (line:30);curl_exec (line:41);curl_exec (line:422); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeMap.php-
Full path:
cpo/web/NetworkTreeMap.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:17 12/05/2025
Last modified:
01:15:08 05/09/2024
MD5 hash:
a40d6787a72f97303b8bfcad318b0f4f
Filesize:
22.12 KB
suspicious functions used:
`${results.rxPower}` (line:230);`${results.distance}` (line:231);`${results.supplyVoltage}` (line:232);`${results.temperature}` (line:233);`${results.txPower}` (line:234); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeMap1.php-
Full path:
cpo/web/NetworkTreeMap1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:17 12/05/2025
Last modified:
01:15:08 05/09/2024
MD5 hash:
3483a4b939ab44a513c3614c31444179
Filesize:
10.57 KB
suspicious functions used:
`${totalonline}` (line:97);`${totaloffline}` (line:98); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SignUp1.php-
Full path:
cpo/web/SignUp1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:19 12/05/2025
Last modified:
01:15:10 05/09/2024
MD5 hash:
3f7943dd155c8e0a383b7d02730f8c11
Filesize:
24.59 KB
suspicious functions used:
curl_exec (line:33);curl_exec (line:59); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_gen_bill.php-
Full path:
cpo/web/cron_auto_gen_bill.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:19 12/05/2025
Last modified:
01:15:06 05/09/2024
MD5 hash:
f1056618cc4402968e50d1232d2c51c8
Filesize:
4.73 KB
suspicious functions used:
curl_exec (line:140);curl_exec (line:149); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: client-online-mbb.php-
Full path:
cpo/web/client-online-mbb.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
14:31:33 11/05/2025
Last modified:
01:15:05 05/09/2024
MD5 hash:
69c51efb5b9017a07a7158b4a63f3826
Filesize:
14.32 KB
suspicious functions used:
curl_exec (line:90); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: clients-nots-action.php-
Full path:
cpo/web/clients-nots-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:20 12/05/2025
Last modified:
01:15:05 05/09/2024
MD5 hash:
dff1bb495509427d098cb4588da553b9
Filesize:
5.89 KB
suspicious functions used:
curl_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: company_info.php-
Full path:
cpo/web/company_info.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
10:41:14 12/05/2025
Last modified:
01:15:06 05/09/2024
MD5 hash:
e612d58aa2e38f5b49ba37c1bf620ece
Filesize:
8.38 KB
suspicious functions used:
curl_exec (line:130); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
cpo/web/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:20 12/05/2025
Last modified:
01:15:06 05/09/2024
MD5 hash:
ba9747d0421fd091b998389469e72a0b
Filesize:
1.7 KB
suspicious functions used:
curl_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_all.php-
Full path:
cpo/web/cron_all.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:20 12/05/2025
Last modified:
01:15:06 05/09/2024
MD5 hash:
b19a08fef36584598cca299b7ecc5e6d
Filesize:
2.07 KB
suspicious functions used:
curl_exec (line:23);curl_exec (line:38);curl_exec (line:53); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ip-ping-checker.php-
Full path:
cpo/web/ip-ping-checker.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:20 12/05/2025
Last modified:
01:15:07 05/09/2024
MD5 hash:
0d28f3053b73b3fe2885cf519ee17c12
Filesize:
2.64 KB
suspicious functions used:
curl_exec (line:81); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive.php-
Full path:
cpo/web/cron_auto_inactive.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:20 12/05/2025
Last modified:
01:15:06 05/09/2024
MD5 hash:
7e0dc4dd9dae2bf0220516641b53c027
Filesize:
5.43 KB
suspicious functions used:
curl_exec (line:142); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive2.php-
Full path:
cpo/web/cron_auto_inactive2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:20 12/05/2025
Last modified:
01:15:06 05/09/2024
MD5 hash:
440bc24f05b01eb395df63fff2f60de9
Filesize:
5.46 KB
suspicious functions used:
curl_exec (line:142); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index.php-
Full path:
cpo/web/index.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
15:52:51 11/05/2025
Last modified:
01:23:59 05/09/2024
MD5 hash:
3a5fa08070c595bc38693458c9d6aed4
Filesize:
12.45 KB
suspicious functions used:
base64_decode (line:10);curl_exec (line:183); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive_termination.php-
Full path:
cpo/web/cron_auto_inactive_termination.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
18:40:16 11/05/2025
Last modified:
12:17:53 23/09/2024
MD5 hash:
9f9c8ca9110c2304128646824bfb17db
Filesize:
12.16 KB
suspicious functions used:
curl_exec (line:241);curl_exec (line:253); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive_termination1.php-
Full path:
cpo/web/cron_auto_inactive_termination1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:20 12/05/2025
Last modified:
01:15:06 05/09/2024
MD5 hash:
be76b964c93a2cb4fa7e632750ff3bc4
Filesize:
6.64 KB
suspicious functions used:
curl_exec (line:156);curl_exec (line:168); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_termination_remainder1.php-
Full path:
cpo/web/cron_auto_termination_remainder1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
03:06:04 12/05/2025
Last modified:
01:15:06 05/09/2024
MD5 hash:
7765f9f820dbd402f1064fab9958ffaa
Filesize:
3.26 KB
suspicious functions used:
curl_exec (line:83); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_client_bandwidth_count.php-
Full path:
cpo/web/cron_client_bandwidth_count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
14:33:21 11/05/2025
Last modified:
01:15:06 05/09/2024
MD5 hash:
8be5ba5d539d73a8f197195f7748e1cc
Filesize:
4.7 KB
suspicious functions used:
curl_exec (line:125); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test7.php-
Full path:
cpo/web/test7.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:20 12/05/2025
Last modified:
01:15:10 05/09/2024
MD5 hash:
374d68487e54a5d4368699a202ae5a92
Filesize:
890 B
suspicious functions used:
shell_exec (line:4);shell_exec (line:10); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: texecutepayment.php-
Full path:
cpo/web/texecutepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:20 12/05/2025
Last modified:
01:15:10 05/09/2024
MD5 hash:
623635fdf5c871391d3a5fe99ee8c543
Filesize:
2.91 KB
suspicious functions used:
curl_exec (line:24); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_network.php-
Full path:
cpo/web/cron_network.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
06:01:16 12/05/2025
Last modified:
01:15:06 05/09/2024
MD5 hash:
1a75ea6c2e0cc5b9263541dda62ab458
Filesize:
4.61 KB
suspicious functions used:
curl_exec (line:45);curl_exec (line:67); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_olt.php-
Full path:
cpo/web/cron_olt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:20 12/05/2025
Last modified:
06:32:53 09/09/2024
MD5 hash:
d83092bb263aaa93da2bb8cddab2a0d1
Filesize:
3.7 KB
suspicious functions used:
shell_exec (line:44); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_olt_user.php-
Full path:
cpo/web/cron_olt_user.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:20 12/05/2025
Last modified:
06:32:53 09/09/2024
MD5 hash:
67aa237639e3d1e6064e76079bb3cccc
Filesize:
1.97 KB
suspicious functions used:
curl_exec (line:19);curl_exec (line:46); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tis-news.php-
Full path:
cpo/web/tis-news.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:20 12/05/2025
Last modified:
01:15:10 05/09/2024
MD5 hash:
ed23ca98b77c5321b4485e85eb2ea64d
Filesize:
3.67 KB
suspicious functions used:
curl_exec (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test6.php-
Full path:
cpo/web/test6.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:20 12/05/2025
Last modified:
01:15:10 05/09/2024
MD5 hash:
0edc703b008a5e3cae5d241fc2cf717b
Filesize:
4.76 KB
suspicious functions used:
shell_exec (line:46);shell_exec (line:70);shell_exec (line:92); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec.php-
Full path:
cpo/web/login_exec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
09:29:56 12/05/2025
Last modified:
01:15:07 05/09/2024
MD5 hash:
9038a77a32a5db2c9affae1496473f3e
Filesize:
5.27 KB
suspicious functions used:
curl_exec (line:62); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
cpo/web/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:20 12/05/2025
Last modified:
01:15:10 05/09/2024
MD5 hash:
7d8e71ceda3ffb74623e0c4a814715af
Filesize:
1.53 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: loginexec.php-
Full path:
cpo/web/loginexec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:20 12/05/2025
Last modified:
01:15:07 05/09/2024
MD5 hash:
edb8017e7d0f8e037facbcacc94a383d
Filesize:
5.91 KB
suspicious functions used:
curl_exec (line:67); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: emp_salary_advence_find.php-
Full path:
cpo/web/emp_salary_advence_find.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:20 12/05/2025
Last modified:
01:15:06 05/09/2024
MD5 hash:
74a7e2ffda0f7584611d7cbce6136c24
Filesize:
2.25 KB
suspicious functions used:
`expanse` WHERE `type` = '2' AND `status` = '2' AND ex_by = '$e_id' AND MONTH(`, `) = MONTH('$lastmonth') AND YEAR(`, `) = YEAR('$lastmonth') GROUP BY ` (line:8);`e_id` = '$e_id' AND ` (line:12); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tt.php-
Full path:
cpo/web/tt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:20 12/05/2025
Last modified:
01:15:10 05/09/2024
MD5 hash:
9c4ed141cb79fdc7e807b35923c91a20
Filesize:
1.56 KB
suspicious functions used:
curl_exec (line:30); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ttoken.php-
Full path:
cpo/web/ttoken.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:20 12/05/2025
Last modified:
01:15:10 05/09/2024
MD5 hash:
5f2c51c1db5b0defadfb67ce25c0098f
Filesize:
1.54 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
cpo/web/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:20 12/05/2025
Last modified:
01:15:06 05/09/2024
MD5 hash:
c46a50905333286f45dfeacf010851ab
Filesize:
716 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook_cid.php-
Full path:
cpo/web/webhook_cid.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:20 12/05/2025
Last modified:
01:15:11 05/09/2024
MD5 hash:
007f8fa5636da9e44a38526298f7e155
Filesize:
21.08 KB
suspicious functions used:
base64_decode (line:28);curl_exec (line:39);curl_exec (line:429); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook_off.php-
Full path:
cpo/web/webhook_off.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:20 12/05/2025
Last modified:
01:15:11 05/09/2024
MD5 hash:
787511edcbdc9d6c9b26eba2dee70a84
Filesize:
21.21 KB
suspicious functions used:
base64_decode (line:27);curl_exec (line:38);curl_exec (line:454); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook_test.php-
Full path:
cpo/web/webhook_test.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:20 12/05/2025
Last modified:
01:15:11 05/09/2024
MD5 hash:
74a7dcc262d7fe7f2bdc9e0595d03837
Filesize:
4.69 KB
suspicious functions used:
base64_decode (line:22);curl_exec (line:33);curl_exec (line:86);curl_exec (line:107); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: getclientuptime.php-
Full path:
cpo/web/getclientuptime.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:21 12/05/2025
Last modified:
01:15:07 05/09/2024
MD5 hash:
bbc14cdd451c72b94d78c7d2d1af0b52
Filesize:
718 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: imagevwr.php-
Full path:
cpo/web/imagevwr.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:21 12/05/2025
Last modified:
01:15:07 05/09/2024
MD5 hash:
47a223a13cc642d01dcfaaca542d396d
Filesize:
915 B
suspicious functions used:
curl_exec (line:15); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data1.php-
Full path:
cpo/web/network-snmp-onu-status-data1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:21 12/05/2025
Last modified:
01:15:08 05/09/2024
MD5 hash:
dfc6e23448be165d8c7879ecdac3f737
Filesize:
14.88 KB
suspicious functions used:
shell_exec (line:119);shell_exec (line:135);shell_exec (line:151);shell_exec (line:157);shell_exec (line:346); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: sms_deliverey_report.php-
Full path:
cpo/web/sms_deliverey_report.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:21 12/05/2025
Last modified:
01:15:10 05/09/2024
MD5 hash:
03623943da7e9334e137b38c8577fc84
Filesize:
4.25 KB
suspicious functions used:
curl_exec (line:28);curl_exec (line:53);curl_exec (line:90); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test3.php-
Full path:
cpo/web/test3.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:21 12/05/2025
Last modified:
01:15:10 05/09/2024
MD5 hash:
47feeaa9a827160ac4e6faff04aa57cd
Filesize:
3.95 KB
suspicious functions used:
shell_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tagreeexpayment.php-
Full path:
cpo/web/tagreeexpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:21 12/05/2025
Last modified:
01:15:10 05/09/2024
MD5 hash:
029b4fba649a75c7c81d2f8931be8d63
Filesize:
2.86 KB
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreateagree.php-
Full path:
cpo/web/tcreateagree.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:21 12/05/2025
Last modified:
01:15:10 05/09/2024
MD5 hash:
27a10adf4190edc7eceee8cf74a6b72b
Filesize:
999 B
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: support-action.php-
Full path:
cpo/web/support-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:21 12/05/2025
Last modified:
01:15:10 05/09/2024
MD5 hash:
c678659a705dae2c6d52289b0084a693
Filesize:
14.72 KB
suspicious functions used:
curl_exec (line:221); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-helper.php-
Full path:
cpo/web/nagad-helper.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:21 12/05/2025
Last modified:
01:15:08 05/09/2024
MD5 hash:
2bb70c44d68202e0a0cd8ae1388f0b1b
Filesize:
6.74 KB
suspicious functions used:
curl_exec (line:61);base64_decode (line:97); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-merchant-callback.php-
Full path:
cpo/web/nagad-merchant-callback.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:21 12/05/2025
Last modified:
01:15:08 05/09/2024
MD5 hash:
9e7ba60bacff8c3a7792176f76b698ea
Filesize:
16.91 KB
suspicious functions used:
curl_exec (line:20); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-snmp-data.php-
Full path:
cpo/web/netowrk-snmp-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:21 12/05/2025
Last modified:
01:15:08 05/09/2024
MD5 hash:
e09a072d71693f9e7767738221e9b755
Filesize:
20.33 KB
suspicious functions used:
shell_exec (line:93);shell_exec (line:102);shell_exec (line:112);shell_exec (line:131);shell_exec (line:141);shell_exec (line:157);shell_exec (line:177);shell_exec (line:187);shell_exec (line:192);shell_exec (line:200);shell_exec (line:220);shell_exec (line:236);`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:249);shell_exec (line:255);shell_exec (line:377); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-snmp-data2.php-
Full path:
cpo/web/netowrk-snmp-data2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:59:21 12/05/2025
Last modified:
01:15:08 05/09/2024
MD5 hash:
8eea607c303f1b0b5aad5898f6b95492
Filesize:
20.14 KB
suspicious functions used:
shell_exec (line:96);shell_exec (line:105);shell_exec (line:115);shell_exec (line:134);shell_exec (line:144);shell_exec (line:160);shell_exec (line:180);shell_exec (line:190);shell_exec (line:195);shell_exec (line:203);shell_exec (line:223);shell_exec (line:239);`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:252);shell_exec (