Starting file scanner, please be patient file scanning can take some time.
Number of known shells in database is: 603
Files found:00000000000112335555555555555555585816616616616616618518519519919919919919919919919920224825625626526526526526526626626726826832832832832832832832832832833034334334334334334335635635635635835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835935935935935935935935935935935935935935935935935935935935935935935935936036036036036036036036036036036036036036036036036036094510431046104610461046104610461046104610461046104610461047104710481049104911001100110011001100110011001100110011001100110311031103118911891189118911891200120412041204120412041204120412041207125312611261127112711271127112711272127212731274127413281328132813281328132813281328132813301342134213421342134413441344134413441344134413441344134413441344134413441344134413441344134413441344134413441344134413441344134413441344134413441344134413441344134413441344134413441344134413441344134413441344134413441344134413441344134413441344134413441344134413441344134413441344134413441344134413441344134413441344134413451345134513451345134513451345134513451345134513451345134513451345134513451345134513451345134513451345134513451345134513451345134513451345134513451345134513451345134518361839258725872595259525952595259826442644264426442644265327142714271427142714271427142714271427162729274227422742274227422742274227422742274227422742274227422742274227422742274227422742274227422742274227422742274227422742274227422742274227422742274227422742274227422742274227422742274227422742274227422742274227422742274227422742274227422742274227422742274227422742274227422742274227422742274227422742274227422742274227432743274327432743274327432743274327432743274327432743274327432743274327432743274327432743274327432743274327442744274427442744274427442744274427442744274427442744274427442744274627462746274627472747274727472747274727482749274927512751275128642916291629162916291629162916291629192919291929192919292029202920292029202920292129222922292229222922292229222922292229222922292229222922292229232923292429252925297729772977297729772977297729772980298030893089308930893108310831183122312231223122312231223122312231253171317931793188318831883188318831893189319031913191325132513251325132513251325132513251325332663266326632663266326632793279327932793281328132813281328132813281328132813281328132813281328132813281328132813281328132813281328132813281328132813281328132813281328132813281328132813281328132813281328132813281328132813281328132813281328132813281328132813281328132813281328132813281328132813281328132813281328132813281328132813281328132813281328232823282328232823282328232823282328232823282328232823282328232823282328232823282328232823282328332833283328332833283328332833283328332833283328332833283328332833283398839913991399139913991399139913991399239923993399439944046404640464046404640464046404640494049415841624162416241624162416241624162416542114219421942294229422942294229423042304231423242324292429242924292429242924292429242924294430743074307430743074307432043204320432043224322432243224322432243224322432243224322432243224322432243224322432243224322432243224322432243224322432243224322432243224322432243224322432243224322432243224322432243224322432243224322432243224322432243224322432243224322432243224322432243224322432243224322432243224322432243224322432243224322432243224323432343234323432343234323432343234323432343234323432343234323432343234323432343234323432343234324432443244324432443244324432443244324432443244324432443244324432443244988498850575060506050605060506050605063508250825092509650965096509650965096509650965099514551535153516451645164516451645165516551665167516752315231523152315231523152315231523152335246524652465246524652465259525952595259526152615261526152615261526152615261526152615261526152615261526152615261526152615261526152615261526152615261526152615261526152615261526152615261526152615261526152615261526152615261526152615261526152615261526152615261526152615261526152615261526152615261526152615261526152615261526152615261526152615261526152625262526252625262526252625262526252625262526252625262526252625262526252625262526252625262526252635263526352635263526352635263526352635263526352635263526352635263526360136013602360236023602360236023602460246025602660266078607860786078607860786078607860816081616761676190699469986998700670067006700670097055705570557055705570657128712871287128712871287128712871287130714571587158715871587158715871587158715871587158715871587158715871587158715871587158715871587158715871587158715871587158715871587158715871587158715871587158715871587158715871587158715871587158715871587158715871587158715871587158715871587158715871587158715871587158715871587158715871587158715871587158715871587158715871587159715971597159715971597159715971597159715971597159715971597159715971597159715971597159715971597159715971597160716071607160716071607160716071607160716071607160716071607160716071627162716271627163716371637163716371637164716571657165727473267326732673267326732673267326732973297329732973307330733073307330733073317332733273327332809380938103810381078107811581158115811581188164816481648164816481748234823482348234823482348234823482348236824982628262826282628262826282628262826282628262826282628262826282628262826282628262826282628262826282628262826282628262826282628262826282628262826282628262826282628262826282628262826282628262826282628262826282628262826282628262826282628262826282628262826282628262826282628262826282628262826282628262826282628262826282628263826382638263826382638263826382638263826382638263826382638263826382638263826382638263826382638263826382638264826482648264826482648264826482648264826482648264826482648264826482668266826682668267826782678267826782678268826982698269826982708383843584358435843584358435843584358438843884398439843984398439843984408441844184418441844184418441844184418441844184418441844184418441844184418441844284428443844484448496849684968496849684968496849684968496849684998499849984998501850185018501850185018501850185018501850185018501850185018501850185018501850185018501850185018501850185018501850185018501850185018501850185018501850185018501850185018501850185018501850185018501850185018501850185018501850185018501850185018501850185018501850185018501850185018501850185018501850185018501850185028502850285028502850285028502850285028502850285028502850285028502850285028502850285028502850285028502850285028502850285028502850285028502850285028502850285028502850285998599859985998603860386038603860386038603860386068652866086608669866986698669866986708670867186728672873187318731873187318731873187318731873387458745874587458745874587588758875887588760876087608760876087608760876087608760876087608760876087608760876087608760876087608760876087608760876087608760876087608760876087608760876087608760876087608760876087608760876087608760876087608760876087608760876087608760876087608760876087608760876087608760876087608760876087608760876087608760876087608760876187618761876187618761876187618761876187618761876187618761876187618761876187618761876187618761876287628762876287628762876287628762876287628762876287628762876287628762934693499349934993499349934993499349934993499349934993509350935193529352940494049404940494049404940494049407940795149514951495149518951895189518951895189518951895219567957595759584958495849584958495859585958695879587964796479647964796479647964796479647964996619661966196619661966196749674967496749676967696769676967696769676967696769676967696769676967696769676967696769676967696769676967696769676967696769676967696769676967696769676967696769676967696769676967696769676967696769676967696769676967696769676967696769676967696769676967696769676967696769676967696769676967696769676967696769676967696769676967796779677967796779677967796779677967796779677967796779677967796779677967796779677967796779677967896789678967896789678967896789678967896789678967896789678967896789678103051030510308103081030810308110661106611074110741107411074110771112311123111231112311123111331119511195111951119511195111951119511195111951119711210112231122311223112231122311223112231122311223112231122311223112231122311223112231122311223112231122311223112231122311223112231122311223112231122311223112231122311223112231122311223112231122311223112231122311223112231122311223112231122311223112231122311223112231122311223112231122311223112231122311223112231122311223112231122311223112231122311223112231122311223112231122311223112231122311223112231122411224112241122411224112241122411224112241122411224112241122411224112241122411224112241122411224112241122411224112241122411224112241122511225112251122511225112251122511225112251122511225112251122511225112251122511225112271122711227112271122811228112281122811228112281122911230112301123211232112341134611398113981139811398113981139811398113981140111401114021140211402114021140211402114031140411404114041140411404114041140411404114041216012160121681216812168121681217112217122171221712217122171222612288122881228812288122881228812288122881228812290123031231612316123161231612316123161231612316123161231612316123161231612316123161231612316123161231612316123161231612316123161231612316123161231612316123161231612316123161231612316123161231612316123161231612316123161231612316123161231612316123161231612316123161231612316123161231612316123161231612316123161231612316123161231612316123161231612316123161231612316123161231612316123161231612316123161231612317123171231712317123171231712317123171231712317123171231712317123171231712317123171231712317123171231712317123171231712317123171231712318123181231812318123181231812318123181231812318123181231812318123181231812318123181232012320123201232012321123211232112321123211232112322123231232312324123241232412436124881248812488124881248812488124881248812491124911249212492124921249212492124921249312494124941249412494124941249712608126601266012660126601266012660126601266012663126631266312663126641266412664126641266412664126651266612666126671342713427134311343113439134391343913439134421348813488134881348813488134981356113561135611356113561135611356113561135611356313576135891358913589135891358913589135891358913589135891358913589135891358913589135891358913589135891358913589135891358913589135891358913589135891358913589135891358913589135891358913589135891358913589135891358913589135891358913589135891358913589135891358913589135891358913589135891358913589135891358913589135891358913589135891358913589135891358913589135891358913589135891358913589135891358913589135891359013590135901359013590135901359013590135901359013590135901359013590135901359013590135901359013590135901359013590135901359013590135901359113591135911359113591135911359113591135911359113591135911359113591135911359113591135931359313593135931359413594135941359413594135941359513596135961359613596135971359713597135971359713597135971359713597135971359713597135971359713597135981359813599136001360013652136521365213652136521365213652136521365213652136521365513655136551365513657136571365713657136571365713657136571365713657136571365713657136571365713657136571365713657136571365713657136571365713657136571365713657136571365713657136571365713657136571365713657136571365713657136571365713657136571365713657136571365713657136571365713657136571365713657136571365713657136571365713657136571365713657136571365713657136571365713657136571365713657136571365713657136571365813658136581365813658136581365813658136581365813658136581365813658136581365813658136581365813658136581365813658136581365813658136581365813658136581365813658136581365813658136581365813658136581365813658136581375713757137571375713761137611376113761137611376113761137611376413810138181381813827138271382713827138271382813828138291383013830138891388913889138891388913889138891388913889138911390313903139031390313903139031391613916139161391613918139181391813918139181391813918139181391813918139181391813918139181391813918139181391813918139181391813918139181391813918139181391813918139181391813918139181391813918139181391813918139181391813918139181391813918139181391813918139181391813918139181391813918139181391813918139181391813918139181391813918139181391813918139181391813918139181391813918139181391813918139181391813918139191391913919139191391913919139191391913919139191391913919139191391913919139191391913919139191391913919139191391913919139191391913919139191391913919139191391913919139191391913919139191391913919139191391913919144961449914499144991449914499144991449914499144991449914499144991449914499144991449914499144991449914499144991449914499144991449914499144991449914499144991449914499144991449914499144991449914499144991449914499144991449914499144991449914499144991449914499144991449914499144991449914499144991449914499144991449914499144991449914499144991449914540145401454014542145441458414584145841458614587146281462814628146301463414678146781467814680146811472414725147251472714727147721477214772147741477414819148191481914821148211486614866148661486814868148681486814868148681486814868148681486814868148681486814868148691486914870148711487114923149231492314923149231492314923149231492614926150351503915039150391503915039150391503915039150421508815096150961510615106151061510615106151071510715108151091510915169151691516915169151691516915169151691516915171151841518415184151841518415184151971519715197151971519915199151991519915199151991519915199151991519915199151991519915199151991519915199151991519915199151991519915199151991519915199151991519915199151991519915199151991519915199151991519915199151991519915199151991519915199151991519915199151991519915199151991519915199151991519915199151991519915199151991519915199151991519915199151991519915199151991519915199151991519915199151991519915200152001520015200152001520015200152001520015200152001520015200152001520015200152001520015200152001520015200152001520015201152011520115201152011520115201152011520115201152011520115201152011520115201152011520115890158901593515938159381593815938166811668116689166891668916689166921673816738167381673816738167481680816808168081680816808168081680816808168081681016823168361683616836168361683616836168361683616836168361683616836168361683616836168361683616836168361683616836168361683616836168361683616836168361683616836168361683616836168361683616836168361683616836168361683616836168361683616836168361683616836168361683616836168361683616836168361683616836168361683616836168361683616836168361683616836168361683616836168361683616836168361683616836168361683616836168361683716837168371683716837168371683716837168371683716837168371683716837168371683716837168371683716837168371683716837168371683716837168371683816838168381683816838168381683816838168381683816838168381683816838168381683816838168401684016840168401684116841168411684116841168411684216843168431684316843168441695317005170051700517005170051700517005170051700817008170091700917009170091700917009170101701117011170111701117011170111701117011170111701117011170111701117011170111701117011170121701217013170141701417066170661706617066170661706617066170661706617066170661706917069170691706917071170711707117071170711707117071170711707117071170711707117071170711707117071170711707117071170711707117071170711707117071170711707117071170711707117071170711707117071170711707117071170711707117071170711707117071170711707117071170711707117071170711707117071170711707117071170711707117071170711707117071170711707117071170711707117071170711707117071170711707117071170711707117071170721707217072170721707217072170721707217072170721707217072170721707217072170721707217072170721707217072170721707217072170721707217072170721707217072170721707217072170721707217072170721707217072170721707217072171661716617166171661716617183171831719317197171971719717197171971719717197171971720017246172541725417263172631726317263172631726417264172651726617266173231732317323173231732317323173231732317323173251733717337173371733717337173371735017350173501735017352173521735217352173521735217352173521735217352173521735217352173521735217352173521735217352173521735217352173521735217352173521735217352173521735217352173521735217352173521735217352173521735217352173521735217352173521735217352173521735217352173521735217352173521735217352173521735217352173521735217352173521735217352173521735217352173521735217352173521735217352173521735217352173531735317353173531735317353173531735317353173531735317353173531735317353173531735317353173531735317353173531735317353173531735317353173531735317353173531735317353173531735317353173531735317353173531735317353179131791617919179191869418694187041870418708187081871618716187161871618719187651876518765187651876518775188381883818838188381883818838188381883818838188401885318866188661886618866188661886618866188661886618866188661886618866188661886618866188661886618866188661886618866188661886618866188661886618866188661886618866188661886618866188661886618866188661886618866188661886618866188661886618866188661886618866188661886618866188661886618866188661886618866188661886618866188661886618866188661886618866188661886618866188661886618866188661886618866188661886618866188671886718867188671886718867188671886718867188671886718867188671886718867188671886718867188671886718867188671886718867188671886718867188681886818868188681886818868188681886818868188681886818868188681886818868188681886818870188701887018870188711887118871188711887118871188721887318873188731887318876189841903619036190361903619036190361903619036190391903919040190401904019040190401904019041190421904219042190421904219844198481984819856198561985619856198591990519905199051990519905199151997819978199781997819978199781997819978199781998019995200082000820008200082000820008200082000820008200082000820008200082000820008200082000820008200082000820008200082000820008200082000820008200082000820008200082000820008200082000820008200082000820008200082000820008200082000820008200082000820008200082000820008200082000820008200082000820008200082000820008200082000820008200082000820008200082000820008200082000820008200082000820008200082000820008200082000920009200092000920009200092000920009200092000920009200092000920009200092000920009200092000920009200092000920009200092000920009200092001020010200102001020010200102001020010200102001020010200102001020010200102001020010200122001220012200122001320013200132001320013200132001420015200152001720126201782017820178201782017820178201782017820181201812018120181201822018220182201822018220182201832018420184201842018420184201842018420184201842018420184201842018420184201842018520185201862018720187202392023920239202392023920239202392023920242202422034920349203492034920353203532035320353203532035320353203532035620402204102041020419204192041920419204192042020420204212042220422204822048220482204822048220482204822048220482204842049720497204972049720497204972051020510205102051020512205122051220512205122051220512205122051220512205122051220512205122051220512205122051220512205122051220512205122051220512205122051220512205122051220512205122051220512205122051220512205122051220512205122051220512205122051220512205122051220512205122051220512205122051220512205122051220512205122051220512205122051220512205122051220512205122051220512205122051220512205122051220512205132051320513205132051320513205132051320513205132051320513205132051320513205132051320513205132051320513205132051320513205142051420514205142051420514205142051420514205142051420514205142051420514205142051420514211972120021200212002120021200212002120021200212002120021200212002120121201212022120321203212552125521255212552125521255212552125521258212582136621366213662136621370213702137021370213702137021370213702137321419214272142721436214362143621436214362143721437214382143921439214992149921499214992149921499214992149921499215012151321513215132151321513215132152621526215262152621528215282152821528215282152821528215282152821528215282152821528215282152821528215282152821528215282152821528215282152821528215282152821528215282152821528215282152821528215282152821528215282152821528215282152821528215282152821528215282152821528215282152821528215282152821528215282152821528215282152821528215282152821528215282152821528215282152821528215282152821528215282152821528215292152921529215292152921529215292152921529215292152921529215292152921529215292152921529215292152921529215292152921529215302153021530215302153021530215302153021530215302153021530215302153021530215302153021530222212222422224222242222422224222242222422224222242222422224222242222522225222262222722227222792227922279222792227922279222792227922282222822238922389223892238922393223932239322393223932239322393223932239622442224502245022459224592245922459224592246022460224612246222462225222252222522225222252222522225222252222522225242253722537225372253722537225372255022550225502255022552225522255222552225522255222552225522255222552225522255222552225522255222552225522255222552225522255222552225522255222552225522255222552225522255222552225522255222552225522255222552225522255222552225522255222552225522255222552225522255222552225522255222552225522255222552225522255222552225522255222552225522255222552225522255222552225522255222552225522255222552225522255222552225532255322553225532255322553225532255322553225532255322553225532255322553225532255322553225532255322553225532255322553225542255422554225542255422554225542255422554225542255422554225542255422554225542255422554232142321723217232172321723217232172321723217232172321723217232172321823218232192322023220232722327223272232722327223272232722327223275232752338323383233832338323383234022340223412234162341623416234162341623416234162341623419234652347323473234822348223482234822348223483234832348423485234852354523545235452354523545235452354523545235452354723560235602356023560235602356023573235732357323573235752357523575235752357523575235752357523575235752357523575235752357523575235752357523575235752357523575235752357523575235752357523575235752357523575235752357523575235752357523575235752357523575235752357523575235752357523575235752357523575235752357523575235752357523575235752357523575235752357523575235752357523575235752357523575235752357523575235752357523575235752357523575235752357623576235762357623576235762357623576235762357623576235762357623576235762357623576235762357623576235762357623576235762357723577235772357723577235772357723577235772357723577235772357723577235772357723577235772426024263243752442724427244272442724427244272442724427244302443024431244312443124431244312443124432244332443324433244332443325232252512525125261252612526525265252732527325273252732527625322253222532225322253222533225395253952539525395253952539525395253952539525397254122542525425254252542525425254252542525425254252542525425254252542525425254252542525425254252542525425254252542525425254252542525425254252542525425254252542525425254252542525425254252542525425254252542525425254252542525425254252542525425254252542525425254252542525425254252542525425254252542525425254252542525425254252542525425254252542525425254252542525425254252542525425254252542525425254252542525426254262542625426254262542625426254262542625426254262542625426254262542625426254262542625426254262542625426254262542625426254262542625427254272542725427254272542725427254272542725427254272542725427254272542725427254272542925429254292542925430254302543025430254302543025431254322543225432254322543225432254322543225432254322543225432254322543225432254322543225432254322543325433254342543525435254872548725487254872548725487254872548725490254902559725597255972559725597256162561625626256302563025630256302563025630256302563025633256792568725687256962569625696256962569625697256972569825699256992575925759257592575925759257592575925759257592576125774257742577425774257742577425787257872578725787257892578925789257892578925789257892578925789257892578925789257892578925789257892578925789257892578925789257892578925789257892578925789257892578925789257892578925789257892578925789257892578925789257892578925789257892578925789257892578925789257892578925789257892578925789257892578925789257892578925789257892578925789257892578925789257892578925789257892578925789257892578925789257892579025790257902579025790257902579025790257902579025790257902579025790257902579025790257902579025790257902579025790257902579125791257912579125791257912579125791257912579125791257912579125791257912579125791257912637726475264782647826478264782647826478264782647826478264782647826478264792647926480264812648126533265332653326533265332653326533265332653626536266442664426644266442664826648266482664826648266482664826648266512669726705267052671426714267142671426714267152671526716267172671726777267772677726777267772677726777267772677726779267922679226792267922679226792268052680526805268052680726807268072680726807268072680726807268072680726807268072680726807268072680726807268072680726807268072680726807268072680726807268072680726807268072680726807268072680726807268072680726807268072680726807268072680726807268072680726807268072680726807268072680726807268072680726807268072680726807268072680726807268072680726807268072680726807268072680726807268072680726807268072680726808268082680826808268082680826808268082680826808268082680826808268082680826808268082680826808268082680826808268082680826809268092680926809268092680926809268092680926809268092680926809268092680926809268092680927499275022750227502275022750227502275022750227502275022750227502275032750327504275052750527556275562755627556275562755627556275562755627556275562755927559275592755927561275612756127561275612756127561275612756127561275612756127561275612756127561275612756127561275612756127561275612756127561275612756127561275612756127561275612756127561275612756127561275612756127561275612756127561275612756127561275612756127561275612756127561275612756127561275612756127561275612756127561275612756127561275612756127561275612756127561275612756127561275612756127561275622756227562275622756227562275622756227562275622756227562275622756227562275622756227562275622756227562275622756227562275622756227562275622756227562275622756227562275622756227562275622756227562275622756227562276502765027660276642766427664276642766427664276642766427667277132772127721277302773027730277302773027731277312773227733277332778927789277892778927789277892778927789277892779127803278032780327803278032780327816278162781627816278182781827818278182781827818278182781827818278182781827818278182781827818278182781827818278182781827818278182781827818278182781827818278182781827818278182781827818278182781827818278182781827818278182781827818278182781827818278182781827818278182781827818278182781827818278182781827818278182781827818278182781827818278182781827818278182781827818278182781827818278182781827818278182781927819278192781927819278192781927819278192781927819278192781927819278192781927819278192781927819278192781927819278192781927819278192781927819278192781927819278192781927819278192781927819278192781927819278192836728367283672837028370283702837028370283702837028370283702837028370283702837128371283722837328373284242842428424284242842428424284242842428424284242842428427284272842728427284292842928429284292842928429284292842928429284292842928429284292842928429284292842928429284292842928429284292842928429284292842928429284292842928429284292842928429284292842928429284292842928429284292842928429284292842928429284292842928429284292842928429284292842928429284292842928429284292842928429284292842928429284292842928429284292842928429284292842928429284292842928429284292843028430284302843028430284302843028430284302843028430284302843028430284302843028430284302843028430284302843028430284302843028430284302843028430284302843028430284302843028430284302843028430284302843028430284302851928519285192851928519285292853328533285332853328533285332853328533285362858228590285902859928599285992859928599286002860028601286022860228658286582865828658286582865828658286582865828660286722867228672286722867228672286852868528685286852868728687286872868728687286872868728687286872868728687286872868728687286872868728687286872868728687286872868728687286872868728687286872868728687286872868728687286872868728687286872868728687286872868728687286872868728687286872868728687286872868728687286872868728687286872868728687286872868728687286872868728687286872868728687286872868728687286872868728687286872868728687286872868728688286882868828688286882868828688286882868828688286882868828688286882868828688286882868828688286882868828688286882868828688286882868828688286882868828688286882868828688286882868828688286882868828688286882868829234292372923729237292372923729237292372923729237292382923829239292402924029292292922929229292292922929229292292922929529295294042940429404294042940829408294082940829408294082940829408294112945729465294652947529475294752947529475294762947629477294782947829538295382953829538295382953829538295382953829540295532955329553295532955329553295662956629566295662956829568295682956829568295682956829568295682956829568295682956829568295682956829568295682956829568295682956829568295682956829568295682956829568295682956829568295682956829568295682956829568295682956829568295682956829568295682956829568295682956829568295682956829568295682956829568295682956829568295682956829568295682956829568295682956829568295682956829568295682956829568295682956829569295692956929569295692956929569295692956929569295692956929569295692956929569295692956929569295692956929569295692956929570295702957029570295702957029570295702957029570295702957029570295702957029570295702957030299303023030230302303023030230302303023030230302303023030230302303023030230303303033030430305303053035730357303573035730357303573035730357303603036030468304683046830468304723047230472304723047230472304723047230475305213052930529305383053830538305383053830539305393054030541305413060130601306013060130601306013060130601306013060330615306153061530615306153061530628306283062830628306303063030630306303063030630306303063030630306303063030630306303063030630306303063030630306303063030630306303063030630306303063030630306303063030630306303063030630306303063030630306303063030630306303063030630306303063030630306303063030630306303063030630306303063030630306303063030630306303063030630306303063030630306303063030630306303063030630306303063030630306303063030630306303063130631306313063130631306313063130631306313063130631306313063130631306313063130631306313063130631306313063130631306313063230632306323063230632306323063230632306323063230632306323063230632306323063230632306323132331326313263132631326313263132631326313263132631326313263132631326313263132731327313283132931329313813138131381313813138131381313813138131384313843148131481314813148131485314853148531485314853148531485314853148831534315423154231551315513155131551315513155231552315533155431554316133161331613316133161331613316133161331613316153162731627316273162731627316273164031640316403164031642316423164231642316423164231642316423164231642316423164231642316423164231642316423164231642316423164231642316423164231642316423164231642316423164231642316423164231642316423164231642316423164231642316423164231642316423164231642316423164231642316423164231642316423164231642316423164231642316423164231642316423164231642316423164231642316423164231642316423164231642316423164231642316433164331643316433164331643316433164331643316433164331643316433164331643316433164331643316433164331643316433164331643316443164431644316443164431644316443164431644316443164431644316443164431644316443164431644322283223132231322313223132231322313223132231322313223132231322313223232232322333223432234322863228632286322863228632286322863228632289322893239032390323903239032390324003240432404324043240432404324043240432404324073245332461324613247032470324703247032470324713247132472324733247332532325323253232532325323253232532325323253232534325463254632546325463254632546325593255932559325593256132561325613256132561325613256132561325613256132561325613256132561325613256132561325613256132561325613256132561325613256132561325613256132561325613256132561325613256132561325613256132561325613256132561325613256132561325613256132561325613256132561325613256132561325613256132561325613256132561325613256132561325613256132561325613256132561325613256132561325613256132561325613256132562325623256232562325623256232562325623256232562325623256232562325623256232562325623256232562325623256232562325623256232563325633256332563325633256332563325633256332563325633256332563325633256332563325633256333178331813318133181331813318133181331813318133181331813318133181331823318233183331843318433236332363323633236332363323633236332363323933239333473334733347333473335133351333513335133351333513335133351333543340033408334083341733417334173341733417334183341833419334203342033480334803348033480334803348033480334803348033482334943349433494334943349433494335073350733507335073350933509335093350933509335093350933509335093350933509335093350933509335093350933509335093350933509335093350933509335093350933509335093350933509335093350933509335093350933509335093350933509335093350933509335093350933509335093350933509335093350933509335093350933509335093350933509335093350933509335093350933509335093350933509335093350933509335093350933509335093350933509335093350933510335103351033510335103351033510335103351033510335103351033510335103351033510335103351033510335103351033510335103351033511335113351133511335113351133511335113351133511335113351133511335113351133511335113351134202342023420534205342053420534205342053420534205342053420534205342053420634206342073420834208342603426034260342603426034260342603426034263342633437034370343703437034374343743437434374343743437434374343743437734423344313443134440344403444034440344403444134441344423444334443345033450334503345033450334503345033450334503345053451834518345183451834518345183453134531345313453134533345333453334533345333453334533345333453334533345333453334533345333453334533345333453334533345333453334533345333453334533345333453334533345333453334533345333453334533345333453334533345333453334533345333453334533345333453334533345333453334533345333453334533345333453334533345333453334533345333453334533345333453334533345333453334533345333453334533345333453334533345333453334533345343453434534345343453434534345343453434534345343453434534345343453434534345343453434534345343453434534345343453434534345353453534535345353453534535345353453534535345353453534535345353453534535345353453534535351953519835198351983519835198351983519835198351983519835198351983519935199352003520135201352533525335253352533525335253352533525335256352563536035360353603536035360353793537935389353933539335393353933539335393353933539335396354423545035450354593545935459354593545935460354603546135462354623552235522355223552235522355223552235522355223552435536355363553635536355363553635549355493554935549355513555135551355513555135551355513555135551355513555135551355513555135551355513555135551355513555135551355513555135551355513555135551355513555135551355513555135551355513555135551355513555135551355513555135551355513555135551355513555135551355513555135551355513555135551355513555135551355513555135551355513555135551355513555135551355513555135551355513555135551355513555135551355513555235552355523555235552355523555235552355523555235552355523555235552355523555235552355523555235552355523555235552355523555335553355533555335553355533555335553355533555335553355533555335553355533555335553355533617936182361823618236182361823618236182361823618236182361823618236183361833618436185361853623636236362363623636236362363623636236362363623636236362393623936239362393624136241362413624136241362413624136241362413624136241362413624136241362413624136241362413624136241362413624136241362413624136241362413624136241362413624136241362413624136241362413624136241362413624136241362413624136241362413624136241362413624136241362413624136241362413624136241362413624136241362413624136241362413624136241362413624136241362413624136241362413624136241362413624136242362423624236242362423624236242362423624236242362423624236242362423624236242362423624236242362423624236242362423624236242362423624236242362423624236242362423624236242362423624236242362423624236242362423624236330363303633036330363303634036344363443634436344363443634436344363443634736393364013640136410364103641036410364103641136411364123641336413364693646936469364693646936469364693646936469364713648336483364833648336483364833649636496364963649636498364983649836498364983649836498364983649836498364983649836498364983649836498364983649836498364983649836498364983649836498364983649836498364983649836498364983649836498364983649836498364983649836498364983649836498364983649836498364983649836498364983649836498364983649836498364983649836498364983649836498364983649836498364983649836498364983649836498364983649836498364983649836498364993649936499364993649936499364993649936499364993649936499364993649936499364993649936499364993649936499364993649936499364993649936499364993649936499364993649936499364993649936499364993649936499364993649936499370463704937831378313783537835378433784337843378433784637892378923789237892378923790237965379653796537965379653796537965379653796537967379813799437994379943799437994379943799437994379943799437994379943799437994379943799437994379943799437994379943799437994379943799437994379943799437994379943799437994379943799437994379943799437994379943799437994379943799437994379943799437994379943799437994379943799437994379943799437994379943799437994379943799437994379943799437994379943799437994379943799437994379943799437994379943799437994379943799437995379953799537995379953799537995379953799537995379953799537995379953799537995379953799537995379953799537995379953799537995379953799537996379963799637996379963799637996379963799637996379963799637996379963799637996379963799837998379983799837999379993799937999379993799938000380013800138002381113816338163381633816338163381633816338163381663816638166381663816738167381673816738167381673816838169381693816938169381693816938169381693816938169381693816938169381693816938169381693817038170381713817238172382243822438224382243822438224382243822438224382243822438227382273822738227382293822938229382293822938229382293822938229382293822938229382293822938229382293822938229382293822938229382293822938229382293822938229382293822938229382293822938229382293822938229382293822938229382293822938229382293822938229382293822938229382293822938229382293822938229382293822938229382293822938229382293822938229382293822938229382293822938229382293822938229382293822938229382293822938230382303823038230382303823038230382303823038230382303823038230382303823038230382303823038230382303823038230382303823038230382303823038230382303823038230382303823038230382303823038230382303823038230382303823038330383303833038330383343833438334383343833438334383343833438337383833839138391384003840038400384003840038401384013840238403384033846038460384603846038460384603846038460384603846238474384743847438474384743847438487384873848738487384893848938489384893848938489384893848938489384893848938489384893848938489384893848938489384893848938489384893848938489384893848938489384893848938489384893848938489384893848938489384893848938489384893848938489384893848938489384893848938489384893848938489384893848938489384893848938489384893848938489384893848938489384893848938489384893848938489384893848938489384893848938489384893849038490384903849038490384903849038490384903849038490384903849038490384903849038490384903849038490384903849038490384903849038490384903849038490384903849038490384903849038490384903849038490384903849038490384903906439067390673906739067391793923139231392313923139231392313923139231392343923439235392353923539235392353923539236392373923739237392373923739972399723998039980399803998039983400294002940029400294002940039400994009940099400994009940099400994009940099401014011440127401274012740127401274012740127401274012740127401274012740127401274012740127401274012740127401274012740127401274012740127401274012740127401274012740127401274012740127401274012740127401274012740127401274012740127401274012740127401274012740127401274012740127401274012740127401274012740127401274012740127401274012740127401274012740127401274012740127401274012740127401274012740127401274012740127401284012840128401284012840128401284012840128401284012840128401284012840128401284012840128401284012840128401284012840128401284012840128401294012940129401294012940129401294012940129401294012940129401294012940129401294012940131401314013140131401324013240132401324013240132401334013440134401344013440138401384013840138401384013840138401384013840138401384013840138401394013940140401414014140193401934019340193401934019340193401934019640196403034030340303403034030340322403224033240336403364033640336403364033640336403364033940385403934039340402404024040240402404024040340403404044040540405404654046540465404654046540465404654046540465404674048040480404804048040480404804049340493404934049340495404954049540495404954049540495404954049540495404954049540495404954049540495404954049540495404954049540495404954049540495404954049540495404954049540495404954049540495404954049540495404954049540495404954049540495404954049540495404954049540495404954049540495404954049540495404954049540495404954049540495404954049540495404954049540495404954049540495404954049540495404954049540495404964049640496404964049640496404964049640496404964049640496404964049640496404964049640496404964049640496404964049640496404974049740497404974049740497404974049740497404974049740497404974049740497404974049740497411634116641166411664116641166411664116641166411664116641166411664116741167411684116941169412214122141221412214122141221412214122141224412244132641326413264132641330413304133041330413304133041330413304133341379413874138741396413964139641396413964139741397413984139941399414584145841458414584145841458414584145841458414604147241472414724147241472414724148541485414854148541487414874148741487414874148741487414874148741487414874148741487414874148741487414874148741487414874148741487414874148741487414874148741487414874148741487414874148741487414874148741487414874148741487414874148741487414874148741487414874148741487414874148741487414874148741487414874148741487414874148741487414874148741487414874148741487414874148741487414874148741487414874148741487414884148841488414884148841488414884148841488414884148841488414884148841488414884148841488414884148841488414884148841488414894148941489414894148941489414894148941489414894148941489414894148941489414894148941489421124211542122421224212242122421224212242122421224212242122421224212242122421224212342123421244212542125421774217742177421774217742177421774217742180421804228242282422824228242282423014230142311423114231542315423154231542315423154231542315423184236442372423724238142381423814238142381423824238242383423844238442443424434244342443424434244342443424434244342445424574245742457424574245742457424704247042470424704247242472424724247242472424724247242472424724247242472424724247242472424724247242472424724247242472424724247242472424724247242472424724247242472424724247242472424724247242472424724247242472424724247242472424724247242472424724247242472424724247242472424724247242472424724247242472424724247242472424724247242472424724247242472424724247242472424724247242472424724247242472424724247242473424734247342473424734247342473424734247342473424734247342473424734247342473424734247342473424734247342473424734247342474424744247442474424744247442474424744247442474424744247442474424744247442474424744247443091430944309443094430944309443094430944309443094430944309443094430954309543096430974309743149431494314943149431494314943149431494315243152432604326043260432604326443264432644326443264432644326443264432674331343321433214333043330433304333043330433314333143332433334333343393433934339343393433934339343393433934339343395434074340743407434074340743407434204342043420434204342243422434224342243422434224342243422434224342243422434224342243422434224342243422434224342243422434224342243422434224342243422434224342243422434224342243422434224342243422434224342243422434224342243422434224342243422434224342243422434224342243422434224342243422434224342243422434224342243422434224342243422434224342243422434224342243422434224342243422434224342243422434224342243423434234342343423434234342343423434234342343423434234342343423434234342343423434234342343423434234342343423434234342343424434244342443424434244342443424434244342443424434244342443424434244342443424434244342444115441184411844118441184411844118448764487644886448864489044890448984489844898448984490144947449474494744947449474495745017450174501745017450174501745017450174501745019450324504545045450454504545045450454504545045450454504545045450454504545045450454504545045450454504545045450454504545045450454504545045450454504545045450454504545045450454504545045450454504545045450454504545045450454504545045450454504545045450454504545045450454504545045450454504545045450454504545045450454504545045450454504545045450454504545045450454504545045450454504545045450454504545045450454504545046450464504645046450464504645046450464504645046450464504645046450464504645046450464504645046450464504645046450464504645046450464504645047450474504745047450474504745047450474504745047450474504745047450474504745047450474504945049450494504945050450504505045050450504505045051450524505245052450524505345166452184521845218452184521845218452184521845221452214522245222452224522245222452224522345224452244522445224452244522745227453394539145391453914539145391453914539145391453944539445395453954539545395453954539545396453974539745397453974539746193461934620346203462074620746215462154621546215462184626446264462644626446264462744633746337463374633746337463374633746337463374633946353463664636646366463664636646366463664636646366463664636646366463664636646366463664636646366463664636646366463664636646366463664636646366463664636646366463664636646366463664636646366463664636646366463664636646366463664636646366463664636646366463664636646366463664636646366463664636646366463664636646366463664636646366463664636646366463664636646366463664636646366463664636646366463664636646366463664636746367463674636746367463674636746367463674636746367463674636746367463674636746367463674636746367463674636746367463674636746367463674636846368463684636846368463684636846368463684636846368463684636846368463684636846368463704637046370463704637146371463714637146371463714637246373463734637546375463754637546375463754637546378463784637846378463784637846378463784637846378463784637846379463794638046381463814643346433464334643346433464334643346433464364643646544465444654446544465444656346563465734657746577465774657746577465774657746577465804662646634466344664346643466434664346643466444664446645466464664646706467064670646706467064670646706467064670646708467214672146721467214672146721467344673446734467344673646736467364673646736467364673646736467364673646736467364673646736467364673646736467364673646736467364673646736467364673646736467364673646736467364673646736467364673646736467364673646736467364673646736467364673646736467364673646736467364673646736467364673646736467364673646736467364673646736467364673646736467364673646736467364673646736467364673646736467364673646736467364673646737467374673746737467374673746737467374673746737467374673746737467374673746737467374673746737467374673746737467374673746738467384673846738467384673846738467384673846738467384673846738467384673846738467384673847428474314743147431474314743147431474314743147431474314743147431474314743247432474334743447434474854748547485474854748547485474854748547485474854748547488474884748847488474904749047490474904749047490474904749047490474904749047490474904749047490474904749047490474904749047490474904749047490474904749047490474904749047490474904749047490474904749047490474904749047490474904749047490474904749047490474904749047490474904749047490474904749047490474904749047490474904749047490474904749047490474904749047490474904749047490474904749047490474904749047490474904749147491474914749147491474914749147491474914749147491474914749147491474914749147491474914749147491474914749147491474914749147491474914749147491474914749147491474914749147491474914749147491474914749147491474914758147581475814758147581475914759147601476054760547605476054760547605476054760547608476544766247662476714767147671476714767147672476724767347674476744773047730477304773047730477304773047730477304773247744477444774447744477444774447757477574775747757477594775947759477594775947759477594775947759477594775947759477594775947759477594775947759477594775947759477594775947759477594775947759477594775947759477594775947759477594775947759477594775947759477594775947759477594775947759477594775947759477594775947759477594775947759477594775947759477594775947759477594775947759477594775947759477594775947759477594775947759477594775947759477594776047760477604776047760477604776047760477604776047760477604776047760477604776047760477604776047760477604776047760477604776047760477604776047760477604776047760477604776047760477604776047760477604776047760477604830048303484194847148471484714847148471484714847148471484744847448475484754847548475484754847548476484774847748477484774847749235492354924549245492494924949257492574925749257492604930649306493064930649306493164937649376493764937649376493764937649376493764937849391494044940449404494044940449404494044940449404494044940449404494044940449404494044940449404494044940449404494044940449404494044940449404494044940449404494044940449404494044940449404494044940449404494044940449404494044940449404494044940449404494044940449404494044940449404494044940449404494044940449404494044940449404494044940449404494044940449404494044940449404494044940449404494044940449404494044940549405494054940549405494054940549405494054940549405494054940549405494054940549405494054940549405494054940549405494054940549405494054940649406494064940649406494064940649406494064940649406494064940649406494064940649406494084940849408494084940949409494094940949409494094941049411494114941149411494124941249412494125017250172501825018250186501865019450194501945019450197502435024350243502435024350253503135031350313503135031350313503135031350313503155032850341503415034150341503415034150341503415034150341503415034150341503415034150341503415034150341503415034150341503415034150341503415034150341503415034150341503415034150341503415034150341503415034150341503415034150341503415034150341503415034150341503415034150341503415034150341503415034150341503415034150341503415034150341503415034150341503415034150341503415034150341503415034150341503415034150341503425034250342503425034250342503425034250342503425034250342503425034250342503425034250342503425034250342503425034250342503425034250342503435034350343503435034350343503435034350343503435034350343503435034350343503435034350345503455034550345503465034650346503465034650346503475034850348503485034850350504625051450514505145051450514505145051450514505175051750518505185051850518505185051850519505205052050520505205052150521505215052150521505215052150521505215052150521505215052150521505215052250522505235052450524505765057650576505765057650576505765057650579505795068650686506865068650690506905069050690506905069050690506905069350739507475074750756507565075650756507565075750757507585075950759508195081950819508195081950819508195081950819508215083450834508345083450834508345084750847508475084750849508495084950849508495084950849508495084950849508495084950849508495084950849508495084950849508495084950849508495084950849508495084950849508495084950849508495084950849508495084950849508495084950849508495084950849508495084950849508495084950849508495084950849508495084950849508495084950849508495084950849508495084950849508495084950849508495084950849508495084950849508495084950849508505085050850508505085050850508505085050850508505085050850508505085050850508505085050850508505085050850508505085050850508515085150851508515085150851508515085150851508515085150851508515085150851508515085150851514895149251492514925149251492514925149251492514925149251492514925149351493514945149551495515475154751547515475154751547515475154751550515505165951659516595165951663516635166351663516635166351663516635166651712517205172051730517305173051730517305173151731517325173351733517935179351793517935179351793517935179351793517955180851808518085180851808518085182151821518215182151823518235182351823518235182351823518235182351823518235182351823518235182351823518235182351823518235182351823518235182351823518235182351823518235182351823518235182351823518235182351823518235182351823518235182351823518235182351823518235182351823518235182351823518235182351823518235182351823518235182351823518235182351823518235182351823518235182351823518235182351823518235182351823518245182451824518245182451824518245182451824518245182451824518245182451824518245182451824518245182451824518245182451824518255182551825518255182551825518255182551825518255182551825518255182551825518255182551825525575256052672527245272452724527245272452724527245272452727527275272852728527285272852728527285272952730527305273052730527305350553505535155351553519535195352753527535275352753530535765357653576535765357653586535865358653586535865358653586535865358653588536035361653616536165361653616536165361653616536165361653616536165361653616536165361653616536165361653616536165361653616536165361653616536165361653616536165361653616536165361653616536165361653616536165361653616536165361653616536165361653616536165361653616536165361653616536165361653616536165361653616536165361653616536165361653616536165361653616536165361653616536165361653616536165361653616536165361653617536175361753617536175361753617536175361753617536175361753617536175361753617536175361753617536175361753617536175361753617536175361753618536185361853618536185361853618536185361853618536185361853618536185361853618536185362053620536205362053621536215362153621536215362153622536235362353692537125371253712537345373453734537345373453734537345373753737537375374153741537415374153741537415374153741537445379053798537985380753807538075380753807538085380853809538105381053870538705387053870538705387053870538705387053872538855388553885538855388553885538985389853898538985390053900539005390053900539005390053900539005390053900539005390053900539005390053900539005390053900539005390053900539005390053900539005390053900539005390053900539005390053900539005390053900539005390053900539005390053900539005390053900539005390053900539005390053900539005390053900539005390053900539005390053900539005390053900539005390053900539005390053900539005390053900539005390053901539015390153901539015390153901539015390153901539015390153901539015390153901539015390153901539015390153901539015390153902539025390253902539025390253902539025390253902539025390253902539025390253902539025390254584545845458454584545845458454584545845458454585545855458654587545875463954639546395463954639546395463954639546425464254749548585491054910549105491054910549105491054910549135491354914549145491454914549145491454915549165491654916549165491655718557225572255730557305573055730557335577955779557795577955779557895585255852558525585255852558525585255852558525585455869558825588255882558825588255882558825588255882558825588255882558825588255882558825588255882558825588255882558825588255882558825588255882558825588255882558825588255882558825588255882558825588255882558825588255882558825588255882558825588255882558825588255882558825588255882558825588255882558825588255882558825588255882558825588255882558825588255882558825588255882558825588255882558825588255882558825588355883558835588355883558835588355883558835588355883558835588355883558835588355883558835588355883558835588355883558835588355883558835588455884558845588455884558845588455884558845588455884558845588455884558845588455884558865588655886558865588755887558875588755887558875588855889558895589055890558905589055890558905589055890558905589055890558905589055890558905589155891558925589355893559455594555945559455594555945559455594555948559485604856048560485604856052560525605256052560525605256052560525605556101561095610956118561185611856118561185611956119561205612156121561805618056180561805618056180561805618056180561825619456194561945619456194561945620756207562075620756209562095620956209562095620956209562095620956209562095620956209562095620956209562095620956209562095620956209562095620956209562095620956209562095620956209562095620956209562095620956209562095620956209562095620956209562095620956209562095620956209562095620956209562095620956209562095620956209562095620956209562095620956209562095620956209562095620956209562095620956209562095620956209562105621056210562105621056210562105621056210562105621056210562105621056210562105621056210562105621056210562105621056210562115621156211562115621156211562115621156211562115621156211562115621156211562115621156211568135681656816568195681956819568195681956819568195682056820568215682256822568335683356833568335683356833568335683356833568355684256842568425684256842568425685356853568535685356853568675686956870568715687356875568755687556877568775687756877568795687956879568795687956879568795687956879568795687956879568795687956879568795687956879568795687956879568795687956879568795687956879568795687956879568795687956879568795687956879568795687956879568795687956879568795687956879568795687956879568795687956879568795687956879568795687956879568795687956879568795687956879568795687956879568795687956879568795687956879568795687956879568795688056880568805688056880568805688056880568805688056880568805688056880568805688056880568805688056880568805688056880568805688056880568805688056880568805688056880568805688056880568805688056880568805688056880568805688056881568895695556955569595695956959569595695956959569595696056960569615696256962569745697456974569745697456974569745697456974569765698456984569845698456984569845699556995569955699556995570095701157012570135701557017570175701757019570195701957019570215702157021570215702157021570215702157021570215702157021570215702157021570215702157021570215702157021570215702157021570215702157021570215702157021570215702157021570215702157021570215702157021570215702157021570215702157021570215702157021570215702157021570215702157021570215702157021570215702157021570215702157021570215702157021570215702157021570215702157021570215702157021570215702257022570225702257022570225702257022570225702257022570225702257022570225702257022570225702257022570225702257022570225702257022570225702257022570225702257022570225702257022570225702257022570225702257022570225702257023570315710257102571025710257102571025710257102571025710257102571025710357103571045710557105571575715757157571575715757157571575715757160571605726757267572675726757271572715727157271572715727157271572715727457320573285732857337573375733757337573375733857338573395734057340574005740057400574005740057400574005740057400574025741557415574155741557415574155742857428574285742857430574305743057430574305743057430574305743057430574305743057430574305743057430574305743057430574305743057430574305743057430574305743057430574305743057430574305743057430574305743057430574305743057430574305743057430574305743057430574305743057430574305743057430574305743057430574305743057430574305743057430574305743057430574305743057430574305743057430574305743057430574305743057430574315743157431574315743157431574315743157431574315743157431574315743157431574315743157431574315743157431574315743157431574325743257432574325743257432574325743257432574325743257432574325743257432574325743257432581175812058120581205812058120581205812058120581205812058120581215812158122581235812358175581755817558175581755817558175581755817858178582875829158291582915829158291582915829158291582945834058348583485835858358583585835858358583595835958360583615836158421584215842158421584215842158421584215842158423584365843658436584365843658436584495844958449584495845158451584515845158451584515845158451584515845158451584515845158451584515845158451584515845158451584515845158451584515845158451584515845158451584515845158451584515845158451584515845158451584515845158451584515845158451584515845158451584515845158451584515845158451584515845158451584515845158451584515845158451584515845158451584515845158451584515845158451584515845158451584515845158452584525845258452584525845258452584525845258452584525845258452584525845258452584525845258452584525845258452584525845258453584535845358453584535845358453584535845358453584535845358453584535845358453584535845359138591385918459187591875918759187591875918759187591875918759187591875918759188591885918959190591905924259242592425924259242592425924259242592455924559352593525935259352593565935659356593565935659356593565935659359594055941359413594225942259422594225942259423594235942459425594255948559485594855948559485594855948559485594855948759500595005950059500595005950059513595135951359513595155951559515595155951559515595155951559515595155951559515595155951559515595155951559515595155951559515595155951559515595155951559515595155951559515595155951559515595155951559515595155951559515595155951559515595155951559515595155951559515595155951559515595155951559515595155951559515595155951559515595155951559515595155951559515595155951559515595155951559515595155951559515595155951659516595165951659516595165951659516595165951659516595165951659516595165951659516595165951659516595165951659516595165951759517595175951759517595175951759517595175951759517595175951759517595175951759517595176019860201602046020461004610106101061018610186101861018610216106761067610676106761067610776114061140611406114061140611406114061140611406114261157611706117061170611706117061170611706117061170611706117061170611706117061170611706117061170611706117061170611706117061170611706117061170611706117061170611706117061170611706117061170611706117061170611706117061170611706117061170611706117061170611706117061170611706117061170611706117061170611706117061170611706117061170611706117061170611706117061170611706117061170611706117061170611706117061170611706117161171611716117161171611716117161171611716117161171611716117161171611716117161171611716117161171611716117161171611716117161171611716117161171611726117261172611726117261172611726117261172611726117261172611726117261172611736117461174611746117561175611756117561175611756117661177611776117861178611786128761339613396133961339613396133961339613396134261342613436134361343613436134361343613446134561345613456134561345613456134561345613456134561346613476134761347613476134761347613476134761347613486134861348613486134861348613486134861348613486134861348613486134861348613486134861348613486134861348613486134861348613486134861348613486134861348613486134861348613486134861348613486134861348613486134861348613486134861348613486134861348613486134861348613486134861348613486134861348613486134861348613486134861348613486134861348613486134861348613486134861348613496134961349613496134961349613496134961349613496134961349613496134961349613496134961349613496134961349613496134961349613496134961349613496134961349613496134961349613496134961349613496134961349613496135061350613506135061350613506135061350613506135161352613526135261352613526135261352613526135261353613536135361353613536135361353613536135361353613536135361353613536135361353613536135361353613536135361353613536135361353613536135361353613536135361353613536135361353613536135361353613536135361353613536135361353613536135361353613536135361353613536135361353613536135361353613536135361353613536135361353613536135361353613536135361353613536135361353613536135361354613546135461354613546135461354613546135461354613546135461354613546135461354613546135461354613546135461354613546135461354613546135461354613546135461354613546135461354613546135461354613546135461354613556135561355613556135561355613556135561355613556135561355613556135561355613556135561355613556135561355613556135561355613556135561355613556135561355613556135561355613556135561355613556135561355613556135661356613576135861358614106141061410614106141061410614106141061413614136152061520615206152061520615396153961549615536155361553615536155361553615536155361556616026161061610616196161961619616196161961620616206162161622616226168261682616826168261682616826168261682616826168461697616976169761697616976169761710617106171061710617126171261712617126171261712617126171261712617126171261712617126171261712617126171261712617126171261712617126171261712617126171261712617126171261712617126171261712617126171261712617126171261712617126171261712617126171261712617126171261712617126171261712617126171261712617126171261712617126171261712617126171261712617126171261712617126171261712617126171261712617126171261712617126171361713617136171361713617136171361713617136171361713617136171361713617136171361713617136171361713617136171361713617136171461714617146171461714617146171461714617146171461714617146171461714617146171461714617146236862371623716237162371630366303663036630366303663036630376303863038631796317963189631896319363193632016320163201632016320463250632506325063250632506326063323633236332363323633236332363323633236332363325633396335263352633526335263352633526335263352633526335263352633526335263352633526335263352633526335263352633526335263352633526335263352633526335263352633526335263352633526335263352633526335263352633526335263352633526335263352633526335263352633526335263352633526335263352633526335263352633526335263352633526335263352633526335263352633526335263352633526335263352633526335263352633526335263352633526335263353633536335363353633536335363353633536335363353633536335363353633536335363353633536335363353633536335363353633536335363353633536335363354633546335463354633546335463354633546335463354633546335463354633546335463354633546335663356633566335663356633566335663465635176351763517635176351763517635176351763520635206352163521635216352163521635216352263523635236352363523635236432764331643316433964339643396433964342643886438864388643886438864398644616446164461644616446164461644616446164461644636447864491644916449164491644916449164491644916449164491644916449164491644916449164491644916449164491644916449164491644916449164491644916449164491644916449164491644916449164491644916449164491644916449164491644916449164491644916449164491644916449164491644916449164491644916449164491644916449164491644916449164491644916449164491644916449164491644916449164491644916449164491644916449164491644916449164491644926449264492644926449264492644926449264492644926449264492644926449264492644926449264492644926449264492644926449264492644926449264492644936449364493644936449364493644936449364493644936449364493644936449364493644936449364495644956449564495644966449664496644966449664496644976449864498644986460764659646596465964659646596465964659646596466264662646626466264663646636466364663646636466364664646656466564665646656466764667646676466764667646676466764667646686466864668646686466864668646686466864668646686466864668646686466864670646706467164671646726467264672646726467264672646726467264672646726467264672646726467264673646736467464675646756472764727647276472764727647276472764727647306473064837648376483764837648416484164841648416484164841648416484164844648906489864898649076490764907649076490764908649086490964910649106497064970649706497064970649706497064970649706497264985649856498564985649856498564998649986499864998650006500065000650006500065000650006500065000650006500065000650006500065000650006500065000650006500065000650006500065000650006500065000650006500065000650006500065000650006500065000650006500065000650006500065000650006500065000650006500065000650006500065000650006500065000650006500065000650006500065000650006500065000650006500065000650006500065000650006500065000650006500065000650006500165001650016500165001650016500165001650016500165001650016500165001650016500165001650016500165001650016500165001650016500265002650026500265002650026500265002650026500265002650026500265002650026500265002650026553065682656856568565685656856568565685656856568565685656856568565685656866568665687656886568865740657406574065740657406574065740657406574065740657406574365743657436574365745657456574565745657456574565745657456574565745657456574565745657456574565745657456574565745657456574565745657456574565745657456574565745657456574565745657456574565745657456574565745657456574565745657456574565745657456574565745657456574565745657456574565745657456574565745657456574565745657456574565745657456574565745657456574565745657456574565745657456574565745657456574565745657456574665746657466574665746657466574665746657466574665746657466574665746657466574665746657466574665746657466574665746657466574665746657466574665746657466574665746657466574665746657466574665746657466574665746657466584565845658456584565845658556585965859658596585965859658596585965859658626590865916659166592565925659256592565925659266592665927659286592865987659876598765987659876598765987659876598765989660016600166001660016600166001660146601466014660146601666016660166601666016660166601666016660166601666016660166601666016660166601666016660166601666016660166601666016660166601666016660166601666016660166601666016660166601666016660166601666016660166601666016660166601666016660166601666016660166601666016660166601666016660166601666016660166601666016660166601666016660166601666016660166601666016660166601666016660166601666016660166601666017660176601766017660176601766017660176601766017660176601766017660176601766017660176601766017660176601766017660176601766017660176601766017660176601766017660176601766017660176601766017660176601766017660176601766593665966659666596665966659666596665966659666596665966659666596665966659666596665966659666596665966659666596665966659666600666006660066600666036664966657666576666366663666636666366663666636666366664666646666566666666666671966719667196671966719667196671966719667196672166730667306673066730667326673266732667326673266732667326673266732667326673266732667326673266732667326673266732667326673266732667326673266732667326673266732667326673266732667326673266732667326673266732667326673266732667326673266732667326673266732667326673266732667326673266732667326673266732667326673266732667326673266732667326673266732667326673266732667326673266732667326673266732667326673266732667326673366733667336673366733667336673366733667336673366733667336673366733667336673366733667336673366733667336673366733667336673366733667336673366733667336673366733667336673366733667336673366733667336673366733667336673367032670356703567035670356703567035670356703567035670356703567035670366703667037670386703867089670896708967089670896708967089670896709367093670936709367095670956709567095670956709567095670956709567095670956709567095670956709567095670956709567095670956709567095670956709567095670956709567095670956709567095670956709567095670956709567095670956709567095670956709567095670956709567095670956709567095670956709567095670956709567095670956709567095670956709567095670956709567095670956709567095670956709567095670956709567095670956709567095670966709667096670966709667096670966709667096670966709667096670966709667096670966709667096670966709667096670966709667096670966709667096670966709667096670966709667096670966709667096670966709667096670966709667096671746717467174671746717467184671886718867188671886719167237672456724567253672536725367253672536725467254672556725667256673096730967309673096730967309673096730967309673116732567325673256732567327673276732767327673276732767327673276732767327673276732767327673276732767327673276732767327673276732767327673276732767327673276732767327673276732767327673276732767327673276732767327673276732767327673276732767327673276732767327673276732767327673276732767327673276732767327673276732767327673276732767327673276732767327673276732767327673276732767327673276732767327673276732767327673286732867328673286732867328673286732867328673286732867328673286732867328673286732867328673286732867328673286732867328673286732867328673286732867328673286732867328673286732867328673286732867328673286732867328677786778167781677816778167781677816778167781677816778167781677816778267782677836778467784678356783567835678356783567835678356783567839678396783967839678416784167841678416784167841678416784167841678416784167841678416784167841678416784167841678416784167841678416784167841678416784167841678416784167841678416784167841678416784167841678416784167841678416784167841678416784167841678416784167841678416784167841678416784167841678416784167841678416784167841678416784167841678416784167841678416784167841678416784167841678416784167841678416784267842678426784267842678426784267842678426784267842678426784267842678426784267842678426784267842678426784267842678426784267842678426784267842678426784267842678426784267842678426784267842678426784267842678426792067920679206792067920679306793467934679346793467937679836799167991679996799967999679996799968000680006800168002680026805568055680556805568055680556805568055680556805768071680716807168071680736807368073680736807368073680736807368073680736807368073680736807368073680736807368073680736807368073680736807368073680736807368073680736807368073680736807368073680736807368073680736807368073680736807368073680736807368073680736807368073680736807368073680736807368073680736807368073680736807368073680736807368073680736807368073680736807368073680736807368073680736807368073680736807468074680746807468074680746807468074680746807468074680746807468074680746807468074680746807468074680746807468074680746807468074680746807468074680746807468074680746807468074680746807468074680746807468074680746853168534685346853568535685356853568535685356853568535685356853568536685366853768538685386858968589685896858968589685896858968592685926859268592685946859468594685946859468594685946859468594685946859468594685946859468594685946859468594685946859468594685946859468594685946859468594685946859468594685946859468594685946859468594685946859468594685946859468594685946859468594685946859468594685946859468594685946859468594685946859468594685946859468594685946859468594685946859468594685946859468594685946859468594685946859468594685946859568595685956859568595685956859568595685956859568595685956859568595685956859568595685956859568595685956859568595685956859568595685956859568595685956859568595685956859568595685956859568595685956859568595685956868168681686816868168681686916869568695686956869568698687446875268752687626876268762687626876268763687636876468765687656881968819688196881968819688196881968819688196882168833688336883368833688356883568835688356883568835688356883568835688356883568835688356883568835688356883568835688356883568835688356883568835688356883568835688356883568835688356883568835688356883568835688356883568835688356883568835688356883568835688356883568835688356883568835688356883568835688356883568835688356883568835688356883568835688356883568835688356883568835688356883568835688356883568835688356883668836688366883668836688366883668836688366883668836688366883668836688366883668836688366883668836688366883668836688366883668836688366883668836688366883668836688366883668836688366883668836688366883668836688366932069323693236932369323693266932669326693306933069330693306933069330693306933069333693796938769387693966939669396693966939669397693976939869399693996945969459694596945969459694596945969459694596946169474694746947469474694746947469487694876948769487694896948969489694896948969489694896948969489694896948969489694896948969489694896948969489694896948969489694896948969489694896948969489694896948969489694896948969489694896948969489694896948969489694896948969489694896948969489694896948969489694896948969489694896948969489694896948969489694896948969489694896948969489694896948969489694896948969489694896948969489694896948969489694896949069490694906949069490694906949069490694906949069490694906949069490694906949069490694906949069490694906949069490694906949169491694916949169491694916949169491694916949169491694916949169491694916949169491694917017370173701737017370173701737017370173701737017470174701757017670176702287022870228702287022870228702287022870231702317033870446704997049970499704997049970499704997049970502705027050370503705037050370503705037050470505705057050570505705057130671311713117131971319713197131971322713687136871368713687136871378714417144171441714417144171441714417144171441714437145871471714717147171471714717147171471714717147171471714717147171471714717147171471714717147171471714717147171471714717147171471714717147171471714717147171471714717147171471714717147171471714717147171471714717147171471714717147171471714717147171471714717147171471714717147171471714717147171471714717147171471714717147171471714717147171471714717147171471714717147171471714717147171471714717147171471714727147271472714727147271472714727147271472714727147271472714727147271472714727147271472714727147271472714727147271472714727147271472714737147371473714737147371473714737147371473714737147371473714737147371473714737147371475714757147571475714767147671476714767147671476714777147871478714787147871478714787147871478714787147871478714787147871478714787147871478714797147971480714817148171533715337153371533715337153371533715337153671536716377163771637716377164171641716417164171641716417164171641716447169071698716987170771707717077170771707717087170871709717107171071769717697176971769717697176971769717697176971771717837178371783717837178371783717967179671796717967179871798717987179871798717987179871798717987179871798717987179871798717987179871798717987179871798717987179871798717987179871798717987179871798717987179871798717987179871798717987179871798717987179871798717987179871798717987179871798717987179871798717987179871798717987179871798717987179871798717987179871798717987179871798717987179871798717987179871798717987179871798717987179871799717997179971799717997179971799717997179971799717997179971799717997179971799717997179971799717997179971799717997179971800718007180071800718007180071800718007180071800718007180071800718007180071800718007180072414724177241772418724187241872418724187241872418724187241872418724197241972420724217242172473724737247372473724737247372473724737247672476725807258072580725807258472584725847258472584725847258472584725877263372641726417265072650726507265072650726517265172652726537265372713727137271372713727137271372713727137271372715727277272772727727277272772727727407274072740727407274272742727427274272742727427274272742727427274272742727427274272742727427274272742727427274272742727427274272742727427274272742727427274272742727427274272742727427274272742727427274272742727427274272742727427274272742727427274272742727427274272742727427274272742727427274272742727427274272742727427274272742727427274272742727427274272742727427274272742727427274272742727427274272743727437274372743727437274372743727437274372743727437274372743727437274372743727437274372743727437274372743727437274372744727447274472744727447274472744727447274472744727447274472744727447274472744727447274473368733717337173371733717337173371733717337173371733717337173371733727337273373733747337473425734257342573425734257342573425734257342573425734257342873428734287342873430734307343073430734307343073430734307343073430734307343073430734307343073430734307343073430734307343073430734307343073430734307343073430734307343073430734307343073430734307343073430734307343073430734307343073430734307343073430734307343073430734307343073430734307343073430734307343073430734307343073430734307343073430734307343073430734307343073430734307343073430734307343073430734317343173431734317343173431734317343173431734317343173431734317343173431734317343173431734317343173431734317343173431734317343173431734317343173431734317343173431734317343173431734317343173431734317343173431735217352173521735217352173531735357353573535735357353573535735357353573538735847359273592736017360173601736017360173602736027360373604736047366073660736607366073660736607366073660736607366273674736747367473674736747367473687736877368773687736897368973689736897368973689736897368973689736897368973689736897368973689736897368973689736897368973689736897368973689736897368973689736897368973689736897368973689736897368973689736897368973689736897368973689736897368973689736897368973689736897368973689736897368973689736897368973689736897368973689736897368973689736897368973689736897368973689736897368973689736897368973689736897369073690736907369073690736907369073690736907369073690736907369073690736907369073690736907369073690736907369073690736907369073690736907369073690736907369073690736907369073690736907369073690736907369073690736907423074233742337423374233742337423374233742337423374233742337423374234742347423574236742367428874288742887428874288742887428874288742917429174399743997439974399744037440374403744037440374403744037440374406744527446074460744697446974469744697446974470744707447174472744727453274532745327453274532745327453274532745327453474546745467454674546745467454674559745597455974559745617456174561745617456174561745617456174561745617456174561745617456174561745617456174561745617456174561745617456174561745617456174561745617456174561745617456174561745617456174561745617456174561745617456174561745617456174561745617456174561745617456174561745617456174561745617456174561745617456174561745617456174561745617456174561745617456174561745617456174561745617456174561745617456274562745627456274562745627456274562745627456274562745627456274562745627456274562745627456274562745627456274562745627456374563745637456374563745637456374563745637456374563745637456374563745637456374563745637525475257752577525775257752577525775257752577525775257752577525775257752577525875258752597526075260753117531175311753117531175311753117531175314753147531475314753167531675316753167531675316753167531675316753167531675316753167531675316753167531675316753167531675316753167531675316753167531675316753167531675316753167531675316753167531675316753167531675316753167531675316753167531675316753167531675316753167531675316753167531675316753167531675316753167531675316753167531675316753167531675316753167531675316753167531675316753167531675316753167531775317753177531775317753177531775317753177531775317753177531775317753177531775317753177531775317753177531775317753177531775317753177531775317753177531775317753177531775317753177531775317753177531775317753177538075380753807538075384753847538475384753847538475384753847538475384753847538475384753847538475384753847538475384753847538475384753847538475384753847538475384753847538475384753877543375441754417544875448754487544875448754497544975450754517545175507755077550775507755077550775507755077550775509755207552075520755207552275522755227552275522755227552275522755227552275522755227552275522755227552275522755227552275522755227552275522755227552275522755227552275522755227552275522755227552275522755227552275522755227552275522755227552275522755227552275522755227552275522755227552275522755227552275522755227552275522755227552275522755227552275522755227552275522755227552275522755227552275522755227552275523755237552375523755237552375523755237552375523755237552375523755237552375523755237552375523755237552375523755237552375523755237552375523755237552375523755237552375523755237552375523755237552375523755237552375523759397594275942759427594275942759427594275942759427594275942759427594375943759447594575945759977599775997759977599775997759977599776000760007610976109761097610976113761137611376113761137611376113761137611676162761707617076180761807618076180761807618176181761827618376183762437624376243762437624376243762437624376243762457625876258762587625876258762587627176271762717627176273762737627376273762737627376273762737627376273762737627376273762737627376273762737627376273762737627376273762737627376273762737627376273762737627376273762737627376273762737627376273762737627376273762737627376273762737627376273762737627376273762737627376273762737627376273762737627376273762737627376273762737627376273762737627376273762737627376273762737627376273762737627376273762747627476274762747627476274762747627476274762747627476274762747627476274762747627476274762747627476274762747627476274762757627576275762757627576275762757627576275762757627576275762757627576275762757627576275770057700877084770847708477084770887708877088770887708877090770907709077090770907709077090770907709077090770907709077090770907709077090770907709477094770947720677258772587725877258772587725877258772587726177261772627726277262772627726277262772637726477264772647726477264780627806278072780727807678076780847808478084780847808778133781337813378133781337814378206782067820678206782067820678206782067820678208782227823578235782357823578235782357823578235782357823578235782357823578235782357823578235782357823578235782357823578235782357823578235782357823578235782357823578235782357823578235782357823578235782357823578235782357823578235782357823578235782357823578235782357823578235782357823578235782357823578235782357823578235782357823578235782357823578235782357823578235782357823578235782357823578235782357823578236782367823678236782367823678236782367823678236782367823678236782367823678236782367823678236782367823678236782367823678236782367823678237782377823778237782377823778237782377823778237782377823778237782377823778237782377823978239782397823978240782407824078240782407824078241782427824278242782427824278242782427824278242782427824278242782427824278242782427824278242782427824378243782447824578245782977829778297782977829778297782977829778300783007840878408784087840878408784277842778437784417844178441784417844178441784417844178444784907849878498785077850778507785077850778508785087850978510785107857078570785707857078570785707857078570785707857278585785857858578585785857858578598785987859878598786007860078600786007860078600786007860078600786007860078600786007860078600786007860078600786007860078600786007860078600786007860078600786007860078600786007860078600786007860078600786007860078600786007860078600786007860078600786007860078600786007860078600786007860078600786007860078600786007860078600786007860078600786007860078600786007860078600786007860078600786007860078600786007860178601786017860178601786017860178601786017860178601786017860178601786017860178601786017860178601786017860178601786017860278602786027860278602786027860278602786027860278602786027860278602786027860278602786027928779290792907929079290792907929079291792917929279293792937935079350793507935079350793507935079350793537935379353793537935579355793557935579355793557935579355793557935579355793557935579355793557935579355793557935579355793557935579355793557935579355793557935579355793557935579355793557935579355793557935579355793557935579355793557935579355793557935579355793557935579355793557935579355793557935579355793557935579355793557935579355793557935579355793557935579355793557935579355793557935579355793557935579356793567935679356793567935679356793567935679356793567935679356793567935679356793567935679356793567935679356793567935679356793567935679356793567935679356793567935679356793567935679356793567935679356793567935679356793567940279405794107941079410794107941379459794677946779476794767947679476794767947779477794787947979479795347953479534795347953479534795347953479534795457954579545795457954579545795587955879558795587956079560795607956079560795607956079560795607956079560795607956079560795607956079560795607956079560795607956079560795607956079560795607956079560795607956079560795607956079560795607956079560795607956079560795607956079560795607956079560795607956079560795607956079560795607956079560795607956079560795607956079560795607956079560795607956079560795607956079560795607956079560795607956079561795617956179561795617956179561795617956179561795617956179561795617956179561795617956179561795617956179561795617956179561795617956179561795617956179561795617956179561795617956179561795617956179561795617956179561795627985979897798977990379903799037990379913799137991379913799137991379913799137991379913799137991379913799137991379913799137991379913799137991379913799137991379913799137991379913799137991379913799137991379913799137991379913799137991379913799137991379913799137991379913799137991379913799137991879918800308008280082800828008280082800828008280082800858008580086800868008680086800868008680087800888008880088800888008880874808748088480884808888088880896808968089680896808998094580945809458094580945809558101881018810188101881018810188101881018810188102081033810468104681046810468104681046810468104681046810468104681046810468104681046810468104681046810468104681046810468104681046810468104681046810468104681046810468104681046810468104681046810468104681046810468104681046810468104681046810468104681046810468104681046810468104681046810468104681046810468104681046810468104681046810468104681046810468104681046810468104681046810468104681046810468104681046810468104781047810478104781047810478104781047810478104781047810478104781047810478104781047810478104781047810478104781047810478104781047810478104881048810488104881048810488104881048810488104881048810488104881048810488104881048810508105081050810508105181051810518105181051810518105281053810538105381053810538105381053810538105381053810538105381053810538105381053810538105381053810538105381053810538105381061810618106181061810618106181061810618106181061810618106181061810618106281062810638106481064811168111681116811168111681116811168111681119811198122781227812278122781231812318123181231812318123181231812318123481280812888128881297812978129781297812978129881298812998130081300813608136081360813608136081360813608136081360813628137581375813758137581375813758138881388813888138881390813908139081390813908139081390813908139081390813908139081390813908139081390813908139081390813908139081390813908139081390813908139081390813908139081390813908139081390813908139081390813908139081390813908139081390813908139081390813908139081390813908139081390813908139081390813908139081390813908139081390813908139081390813908139081390813908139081390813908139081390813908139081390813918139181391813918139181391813918139181391813918139181391813918139181391813918139181391813918139181391813918139181391813928139281392813928139281392813928139281392813928139281392813928139281392813928139281392820828208582089820898208982089820938209382093821008210082100821008210082101821018210282103821038215782157821578215782157821578215782157821578215982168821688216882168821708217082170821708217082170821708217082170821708217082170821708217082170821708217082170821708217082170821708217082170821708217082170821708217082170821708217082170821708217082170821708217082170821708217082170821708217082170821708217082170821708217082170821708217082170821708217082170821708217082170821708217082170821708217082170821708217082170821708217082170821708217082170821708217182171821718217182171821718217182171821718217182171821718217182171821718217182171821718217182171821718217182171821718217182171821718217182171821718217182171821718217182171821718217182171821718217182171821718217182493824938249382493832548325483264832648326883268832768327683276832768327983325833258332583325833258333583395833958339583395833958339583395833958339583397834108342383423834238342383423834238342383423834238342383423834238342383423834238342383423834238342383423834238342383423834238342383423834238342383423834238342383423834238342383423834238342383423834238342383423834238342383423834238342383423834238342383423834238342383423834238342383423834238342383423834238342383423834238342383423834238342383423834238342383423834238342383423834238342383423834238342383424834248342483424834248342483424834248342483424834248342483424834248342483424834248342483424834248342483424834248342483424834248342483425834258342583425834258342583425834258342583425834258342583425834258342583425834258342783427834278342783428834288342883428834288342883429834308343083430834308343183544835968359683596835968359683596835968359683599835998360083600836008360083600836008360183602836028360283602836028360283602836028360283602836028360283602836028360283602836028360383603836048360583605836578365783657836578365783657836578365783657836578365783660836608366083660836628366283662836628366283662836628366283662836628366283662836628366283662836628366283662836628366283662836628366283662836628366283662836628366283662836628366283662836628366283662836628366283662836628366283662836628366283662836628366283662836628366283662836628366283662836628366283662836628366283662836628366283662836628366283662836628366283662836628366283662836628366283662836628366383663836638366383663836638366383663836638366383663836638366383663836638366383663836638366383663836638366383663836638366383663836638366383663836638366383663836638366383663836638366383663836638366383663836638375783757837578375783757837578377483774837848378883788837888378883788837888378883788837918383783845838458385483854838548385483854838558385583856838578385783914839148391483914839148391483914839148391483916839288392883928839288392883928839418394183941839418394383943839438394383943839438394383943839438394383943839438394383943839438394383943839438394383943839438394383943839438394383943839438394383943839438394383943839438394383943839438394383943839438394383943839438394383943839438394383943839438394383943839438394383943839438394383943839438394383943839438394383943839438394383943839438394383943839438394383943839438394383943839438394383944839448394483944839448394483944839448394483944839448394483944839448394483944839448394483944839448394483944839448394483944839448394483944839448394483944839448394483944839448394483944839448394483944839448394484503845068450684506845068450684506845068450684506845068450684506845068450784507845088450984509845608456084560845608456084560845608456084560845608456084563845638456384563845658456584565845658456584565845658456584565845658456584565845658456584565845658456584565845658456584565845658456584565845658456584565845658456584565845658456584565845658456584565845658456584565845658456584565845658456584565845658456584565845658456584565845658456584565845658456584565845658456584565845658456584565845658456584565845658456584565845658456584565845658456584565845658456684566845668456684566845668456684566845668456684566845668456684566845668456684566845668456684566845668456684566845668456684566845668456684566845668456684566845668456684566845668456684566845668456684566845668465584655846558465584655846658466984669846698466984669846698466984669846728471884726847268473584735847358473584735847368473684737847388473884794847948479484794847948479484794847948479484796848088480884808848088480884808848218482184821848218482384823848238482384823848238482384823848238482384823848238482384823848238482384823848238482384823848238482384823848238482384823848238482384823848238482384823848238482384823848238482384823848238482384823848238482384823848238482384823848238482384823848238482384823848238482384823848238482384823848238482384823848238482384823848238482384823848238482384823848238482384823848238482384824848248482484824848248482484824848248482484824848248482484824848248482484824848248482484824848248482484824848248482484824848248482484824848248482484824848248482484824848248482484824848248482484824848248482485370853738537385373853738537385373853738537385373853738537385373853748537485375853768537685427854278542785427854278542785427854278542785427854278543085430854308543085432854328543285432854328543285432854328543285432854328543285432854328543285432854328543285432854328543285432854328543285432854328543285432854328543285432854328543285432854328543285432854328543285432854328543285432854328543285432854328543285432854328543285432854328543285432854328543285432854328543285432854328543285432854328543285432854328543285432854328543285432854328543285432854328543385433854338543385433854338543385433854338543385433854338543385433854338543385433854338543385433854338543385433854338543385433854338543385433854338543385433854338543385433854338543385433854338543385433854338552285522855228552285522855228553285536855368553685536855368553685536855368553985585855938559385602856028560285602856028560385603856048560585605856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856658566585665856658566585665856658566585665856658566585665856658566585665856658566585665856658566585665856658566585665856678567985679856798567985679856798569285692856928569285694856948569485694856948569485694856948569485694856948569485694856948569485694856948569485694856948569485694856948569485694856948569485694856948569485694856948569485694856948569485694856948569485694856948569485694856948569485694856948569485694856948569485694856948569485694856948569485694856948569485694856948569485694856948569485694856948569485694856948569485694856948569485694856958569585695856958569585695856958569585695856958569585695856958569585695856958569585695856958569585695856958569585695856968569685696856968569685696856968569685696856968569685696856968569685696856968569685696863028630586305863058630586305863058630586305863058630586305863058630686306863078630886308863608636086360863608636086360863608636086363863638647186471864718647186475864758647586475864758647586475864758647886524865328653286541865418654186541865418654286542865438654486544866048660486604866048660486604866048660486604866068661986619866198661986619866198663286632866328663286634866348663486634866348663486634866348663486634866348663486634866348663486634866348663486634866348663486634866348663486634866348663486634866348663486634866348663486634866348663486634866348663486634866348663486634866348663486634866348663486634866348663486634866348663486634866348663486634866348663486634866348663486634866348663486634866348663486634866348663486634866348663486634866358663586635866358663586635866358663586635866358663586635866358663586635866358663586635866358663586635866358663586635866368663686636866368663686636866368663686636866368663686636866368663686636866368663686636873328733587335873358733587335873358733587335873358733587335873358733987339873398733987342873888739687396874028740287402874028740287402874028740387403874048740587405874598745987459874598745987459874598745987459874618747087470874708747087472874728747287472874728747287472874728747287472874728747287472874728747287472874728747287472874728747287472874728747287472874728747287472874728747287472874728747287472874728747287472874728747287472874728747287472874728747287472874728747287472874728747287472874728747287472874728747287472874728747287472874728747287472874728747287472874728747287472874728747287472874728747287472874738747387473874738747387473874738747387473874738747387473874738747387473874738747387473874738747387473874738747387473874738747387473874738747387473874738747387473874738747387473874738747387473874738747387473874738777687779885438854388553885538855788557885658856588565885658856888614886148861488614886148862488684886848868488684886848868488684886848868488686886998871288712887128871288712887128871288712887128871288712887128871288712887128871288712887128871288712887128871288712887128871288712887128871288712887128871288712887128871288712887128871288712887128871288712887128871288712887128871288712887128871288712887128871288712887128871288712887128871288712887128871288712887128871288712887128871288712887128871288712887128871288712887128871288712887128871288713887138871388713887138871388713887138871388713887138871388713887138871388713887138871388713887138871388713887138871388713887138871388714887148871488714887148871488714887148871488714887148871488714887148871488714887148871688716887168871688717887178871788717887178871788718887198871988719887198872188721888348888688886888868888688886888868888688886888898888988890888908889088890888908889088891888928889288892888928889288895888958889588895888958889588895888958889588895888958889588895888958889688896888978889888898889508895088950889508895088950889508895088950889508895088953889538895388953889558895588955889558895588955889558895588955889558895588955889558895588955889558895588955889558895588955889558895588955889558895588955889558895588955889558895588955889558895588955889558895588955889558895588955889558895588955889558895588955889558895588955889558895588955889558895588955889558895588955889558895588955889558895588955889558895588955889558895588955889558895588955889558895588956889568895688956889568895688956889568895688956889568895688956889568895688956889568895688956889568895688956889568895688956889568895688956889568895688956889568895688956889568895688956889568895688956889568895689055890558905589055890558906589069890698906989069890698906989069890698907289118891268912689135891358913589135891358913689136891378913889138891978919789197891978919789197891978919789197891998921189211892118921189211892118922489224892248922489226892268922689226892268922689226892268922689226892268922689226892268922689226892268922689226892268922689226892268922689226892268922689226892268922689226892268922689226892268922689226892268922689226892268922689226892268922689226892268922689226892268922689226892268922689226892268922689226892268922689226892268922689226892268922689226892268922689226892268922689226892268922689226892278922789227892278922789227892278922789227892278922789227892278922789227892278922789227892278922789227892278922789227892288922889228892288922889228892288922889228892288922889228892288922889228892288922889228898058980889808898088980889808898088980889808898088980889808898088980989809898108981189811898638986389863898638986389863898638986389863898638986389866898668986689866898688986889868898688986889868898688986889868898688986889868898688986889868898688986889868898688986889868898688986889868898688986889868898688986889868898688986889868898688986889868898688986889868898688986889868898688986889868898688986889868898688986889868898688986889868898688986889868898688986889868898688986889868898688986889868898688986889868898688986889868898688986889868898688986889869898698986989869898698986989869898698986989869898698986989869898698986989869898698986989869898698986989869898698986989869898698986989869898698986989869898698986989869898698986989869898698986989869898698986989968899688996889968899688997889982899828998289982899828998289982899828998590031900399003990048900489004890048900489004990049900509005190051901109011090110901109011090110901109011090110901129012490124901249012490124901249013790137901379013790139901399013990139901399013990139901399013990139901399013990139901399013990139901399013990139901399013990139901399013990139901399013990139901399013990139901399013990139901399013990139901399013990139901399013990139901399013990139901399013990139901399013990139901399013990139901399013990139901399013990139901399013990139901399013990139901399013990139901399013990139901399013990139901409014090140901409014090140901409014090140901409014090140901409014090140901409014090140901409014090140901409014090140901409014090140901409014090140901409014090140901409014090140901409014090140901409014090140907159071891229912409124491250912799129891306913069131291312913129131291315913639136391379913929139291392913929139291392913939139491394914589146391463914639146391463914639146391464914699148291496914969149691496914969149691508915089150991510915109151091510915109151091510915109151091510915109151091510915109151091510915109151091510915109151091510915109151091510915109151091510915109151091510915109151091510915109151091510915109151091510915109151091510915109151091510915109151091510915109151091510915109151091510915109151091510915109151091510915109151091510915109151091510915109151091510915109151091510915109151091510915119151191511915119151191511915119151191511915119151191511915119151191511915119151191511915119151191511915119151191511915129151291512915129151291512915129151291512915129151291512915129151291512915129151291512916719167691676916769167691676916769175591761917619176191761917619176191762917639176391815918159181591815918159181591815918159181891822918429184291842918459195792009920099200992009920099200992009920099201292012920139201392013920139201392013920149201592015920159201592015928139281392823928239282792827928359283592835928359283892884928849288492884928849289492894928949289492894928949289492894928949289692910929239292392923929239292392923929239292392923929239292392923929239292392923929239292392923929239292392923929239292392923929239292392923929239292392923929239292392923929239292392923929239292392923929239292392923929239292392923929239292392923929239292392923929239292392923929239292392923929239292392923929239292392923929239292392923929239292392923929239292392923929239292392923929239292392923929239292492924929249292492924929249292492924929249292492924929249292492924929249292492924929249292492924929249292492924929249292492924929249292592925929259292592925929259292592925929259292592925929259292592925929259292592925929279292792927929279292892928929289292892928929289292992930929309299392993929939299392993929939299392993929939299392993929939299392993929939299392993929939299392994929949299592996929969304893048930489304893048930489304893048930519305193159931639316393163931639316393163931639316393166932129322093220932299322993229932299322993230932309323193232932329329293292932929329293292932929329293292932929329493306933069330693306933069330693319933199331993319933219332193321933219332193321933219332193321933219332193321933219332193321933219332193321933219332193321933219332193321933219332193321933219332193321933219332193321933219332193321933219332193321933219332193321933219332193321933219332193321933219332193321933219332193321933219332193321933219332193321933219332193321933219332193321933219332193321933219332193321933219332193321933219332293322933229332293322933229332293322933229332293322933229332293322933229332293322933229332293322933229332293322933229332393323933239332393323933239332393323933239332393323933239332393323933239332393323933239401294012940129401594018940189476894768947789477894782947829479094790947909479094793948399483994839948399483994849949099490994909949099490994909949099490994909949119492494937949379493794937949379493794937949379493794937949379493794937949379493794937949379493794937949379493794937949379493794937949379493794937949379493794937949379493794937949379493794937949379493794937949379493794937949379493794937949379493794937949379493794937949379493794937949379493794937949379493794937949379493794937949379493794937949379493794937949379493794937949379493794937949379493794937949389493894938949389493894938949389493894938949389493894938949389493894938949389493894938949389493894938949389493894938949389493894938949399493994939949399493994939949399493994939949399493994939949399493994939949399493994941949419494194941949429494294942949429494294942949439494494944949449494494958950719512395123951239512395123951239512395123951269512695127951279512795127951279512795128951299512995129951299512995922959269592695934959349593495934959379598395983959839598395983959939605696056960569605696056960569605696056960569605896073960869608696086960869608696086960869608696086960869608696086960869608696086960869608696086960869608696086960869608696086960869608696086960869608696086960869608696086960869608696086960869608696086960869608696086960869608696086960869608696086960869608696086960869608696086960869608696086960869608696086960869608696086960869608696086960869608696086960869608696086960869608696086960869608696086960869608796087960879608796087960879608796087960879608796087960879608796087960879608796087960879608796087960879608796087960879608796087960879608896088960889608896088960889608896088960889608896088960889608896088960889608896088960909609096090960909609196091960919609196091960919609296093960939609396202962549625496254962549625496254962549625496257962579625796257962589625896258962589625896258962599626096260962609626096264962649700497004970129701297012970129701597061970619706197061970619707197131971319713197131971319713197131971319713197133971469715997159971599715997159971599715997159971599715997159971599715997159971599715997159971599715997159971599715997159971599715997159971599715997159971599715997159971599715997159971599715997159971599715997159971599715997159971599715997159971599715997159971599715997159971599715997159971599715997159971599715997159971599715997159971599715997159971599715997159971599715997159971599715997159971599715997160971609716097160971609716097160971609716097160971609716097160971609716097160971609716097160971609716097160971609716097160971609716097161971619716197161971619716197161971619716197161971619716197161971619716197161971619716397163971639716397164971649716497164971649716497165971669716697166971669716797276973289732897328973289732897328973289732897331973319733297332973329733297332973329733397334973349733497334973349733497334973349733498116981169812698126981309813098138981389813898138981419818798187981879818798187981979826098260982609826098260982609826098260982609826298275982889828898288982889828898288982889828898288982889828898288982889828898288982889828898288982889828898288982889828898288982889828898288982889828898288982889828898288982889828898288982889828898288982889828898288982889828898288982889828898288982889828898288982889828898288982889828898288982889828898288982889828898288982889828898288982889828898288982889828898288982889828898288982889828898288982889828998289982899828998289982899828998289982899828998289982899828998289982899828998289982899828998289982899828998289982899828998289982899829098290982909829098290982909829098290982909829098290982909829098290982909829098290982929829298292982929829398293982939829398293982939829498295982959829598295982969840498456984569845698456984569845698456984569845998459984609846098460984609846098460984619846298462984629846298462984629856098561985619856198561985619856198561985619856198561985619856198561985619856198561985619856198561985619856198561985619856198561985619856198565985659856598565985659856598565985659856598565985659856598565985659856598565985659856598565985659856598565985659856598565985659856598565985659856598565985659856598565985659856598565985659856598565985659856598565985659856598565985659856598565985669856698566985669856698566985669856698566985669856698566985669856698566985669856698566985669856698566985669856698566985669856698566985669856698566985669856698566985669856698566985669856698566985669856698566985669856698566985669856698566985669856698566985669856698566985669856698566985669856698566985669856698566985669856698566985669856698566985679856798567985679856798567985679856798567985679856798567985679856798567985679856798567985679856798567985679856798567985679856798567985679856798567985679856798567985679856798567985679856798567985679856798567985679856798567985679856798567985679856798567985679856798567985679856798567985679856798567985679856798567985679856798567985679856798567985679856798567985679856798571985719857199374993749938499384993889938899396993969939699396993999944599445994459944599445994559951899518995189951899518995189951899518995189952099534995479954799547995479954799547995479954799547995479954799547995479954799547995479954799547995479954799547995479954799547995479954799547995479954799547995479954799547995479954799547995479954799547995479954799547995479954799547995479954799547995479954799547995479954799547995479954799547995479954799547995479954799547995479954799547995479954799547995479954799547995479954799547995479954799547995479954899548995489954899548995489954899548995489954899548995489954899548995489954899548995489954899548995489954899548995489954899548995489954999549995499954999549995499954999549995499954999549995499954999549995499954999549995519955199551995519955299552995529955299552995529955399554995549955499554995549966399715997159971599715997159971599715997159971899718997189971899719997199971999719997199971999720997219972199721997219983299884998849988499884998849988499884998849988799887998879988799888998889988899888998889988899889998909989099890100644100644100652100652100652100652100655100701100701100701100701100701100711100774100774100774100774100774100774100774100774100774100776100789100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100803100803100803100803100803100803100803100803100803100803100803100803100803100803100803100803100803100803100803100803100803100803100803100803100803100803100803100804100804100804100804100804100804100804100804100804100804100804100804100804100804100804100804100804100806100806100806100806100807100807100807100807100807100807100808100809100809100809100809100809100809100809100809100809100809100809100809100809100809100809100809100809100809100809100810100810100811100812100812100864100864100864100864100864100864100864100864100867100867100975100979100979100979100979100979100979100979100979100982101028101036101036101045101045101045101045101045101046101046101047101048101048101108101108101108101108101108101108101108101108101108101110101122101122101122101122101122101122101135101135101135101135101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101138101138101138101138101138101138101138101138101138101138101138101138101138101138101138101138101138101138101138101138101138101138101138101138101139101139101139101139101139101139101139101139101139101139101139101139101139101139101139101139101139101139101828101828101828101831102579102579102587102587102587102587102590102636102636102636102636102636102646102707102707102707102707102707102707102707102707102707102709102722102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102736102736102736102736102736102736102736102736102736102736102736102736102736102736102736102736102736102736102736102736102736102736102736102736102736102736102736102737102737102737102737102737102737102737102737102737102737102737102737102737102737102737102737102737102739102739102739102739102740102740102740102740102740102740102741102742102742102742102742102750102863102915102915102915102915102915102915102915102915102918102918102919102919102919102919102919102919102920102921102921102921102921102921102921102921102921103037103089103089103089103089103089103089103089103089103092103092103093103093103093103093103093103093103094103095103095103095103095103095103838103838103846103846103846103846103849103895103895103895103895103895103904103965103965103965103965103965103965103965103965103965103967103980103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103994103994103994103994103994103994103994103994103994103994103994103994103994103994103994103994103994103994103994103994103994103994103994103994103994103994103994103995103995103995103995103995103995103995103995103995103995103995103995103995103995103995103995103995103997103997103997103997103998103998103998103998103998103998103999104000104000104000104000104011104011104011104011104127104179104179104179104179104179104179104179104179104182104182104183104183104183104183104183104183104184104185104185104185104185104185104952104952104962104962104966104966104974104974104974104974104977105023105023105023105023105023105033105094105094105094105094105094105094105094105094105094105096105109105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105123105123105123105123105123105123105123105123105123105123105123105123105123105123105123105123105123105123105123105123105123105123105123105123105123105123105123105124105124105124105124105124105124105124105124105124105124105124105124105124105124105124105124105124105126105126105126105126105127105127105127105127105127105127105128105129105129105129105129105130105130105130105130105242105294105294105294105294105294105294105294105294105297105297105298105298105298105298105298105298105299105300105300105300105300105300106075106075106083106083106083106083106086106132106132106132106132106132106142106205106205106205106205106205106205106205106205106205106207106221106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106235106235106235106235106235106235106235106235106235106235106235106235106235106235106235106235106235106235106235106235106235106235106235106235106235106235106235106236106236106236106236106236106236106236106236106236106236106236106236106236106236106236106236106236106238106238106238106238106239106239106239106239106239106239106240106241106241106241106241106251106251106251106251106251106251106366106418106418106418106418106418106418106418106418106421106421106422106422106422106422106422106422106423106424106424106424106424106424107179107179107187107187107187107187107190107236107236107236107236107236107246107308107308107308107308107308107308107308107308107308107310107323107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107337107337107337107337107337107337107337107337107337107337107337107337107337107337107337107337107337107337107337107337107337107337107337107337107337107337107337107338107338107338107338107338107338107338107338107338107338107338107338107338107338107338107338107338107340107340107340107340107341107341107341107341107341107341107342107343107343107343107343107345107345107345107345107345107348107348107460107512107512107512107512107512107512107512107512107515107515107516107516107516107516107516107516107517107518107518107518108271108271108279108279108279108279108282108328108328108328108328108328108337108399108399108399108399108399108399108399108399108399108401108414108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108428108428108428108428108428108428108428108428108428108428108428108428108428108428108428108428108428108428108428108428108428108428108428108428108428108428108428108429108429108429108429108429108429108429108429108429108429108429108429108429108429108429108429108429108431108431108431108431108432108432108432108432108432108432108433108434108434108438108438108438108438108438108438109214109214109224109224109228109228109236109236109236109236109239109285109285109285109285109285109295109357109357109357109357109357109357109357109357109357109359109372109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109386109386109386109386109386109386109386109386109386109386109386109386109386109386109386109386109386109386109386109386109386109386109386109386109386109386109386109387109387109387109387109387109387109387109387109387109387109387109387109387109387109387109387109387109389109389109389109389109390109390109390109390109390109390109391109392109392109392109392109393109505109557109557109557109557109557109557109557109557109560109560109561109561109561109561109561109561109562109563109563109563109563109563109563109563109563110341110341110351110351110355110355110363110363110363110363110366110412110412110412110412110412110422110485110485110485110485110485110485110485110485110485110487110500110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110514110514110514110514110514110514110514110514110514110514110514110514110514110514110514110514110514110514110514110514110514110514110514110514110514110514110514110515110515110515110515110515110515110515110515110515110515110515110515110515110515110515110515110515110517110517110517110517110518110518110518110518110518110518110519110520110520110524110524110524110632110684110684110684110684110684110684110684110684110687110687110687110687110688110688110688110688110688110688110689110690110690110690110693110693110693110693110693110693111459111459111467111467111467111467111470111516111516111516111516111516111526111588111588111588111588111588111588111588111588111588111590111603111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111617111617111617111617111617111617111617111617111617111617111617111617111617111617111617111617111617111617111617111617111617111617111617111617111617111617111617111618111618111618111618111618111618111618111618111618111618111618111618111618111618111618111618111618111620111620111620111620111621111621111621111621111621111621111622111623111623111623111623111623111731111783111783111783111783111783111783111783111783111786111786111787111787111787111787111787111787111788111789111789111789111789111789111789111789111789111790111790111790111790111790111902111954111954111954111954111954111954111954111954111957111957111957111957111958111958111958111958111958111958111959111960111960111960112728112728112738112738112742112742112750112750112750112750112753112799112799112799112799112799112810112873112873112873112873112873112873112873112873112873112875112888112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112902112902112902112902112902112902112902112902112902112902112902112902112902112902112902112902112902112902112902112902112902112902112902112902112902112902112902112903112903112903112903112903112903112903112903112903112903112903112903112903112903112903112903112903112905112905112905112905112906112906112906112906112906112906112907112908112908112908112908112908112908112908112908112908112908112908113684113684113694113694113698113698113706113706113706113706113709113755113755113755113755113755113765113827113827113827113827113827113827113827113827113827113829113842113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113856113856113856113856113856113856113856113856113856113856113856113856113856113856113856113856113856113856113856113856113856113856113856113856113856113856113856113857113857113857113857113857113857113857113857113857113857113857113857113857113857113857113857113857113859113859113859113859113860113860113860113860113860113860113861113862113862113863113863113863113863113863113975114027114027114027114027114027114027114027114027114030114030114031114031114031114031114031114031114032114033114033114033114033114040114041114041114041114158114210114210114210114210114210114210114210114210114213114213114214114214114214114214114214114214114215114216114216114216114216114216114972114972114980114980114980114980114983115029115029115029115029115029115038115100115100115100115100115100115100115100115100115100115102115115115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115129115129115129115129115129115129115129115129115129115129115129115129115129115129115129115129115129115129115129115129115129115129115129115129115129115129115129115130115130115130115130115130115130115130115130115130115130115130115130115130115130115130115130115130115132115132115132115132115133115133115133115133115133115133115134115135115135115135115135115136115136115136115136115248115300115300115300115300115300115300115300115300115303115303115303115303115304115304115304115304115304115304115305115306115306115306116096116096116106116106116110116110116118116118116118116118116121116167116167116167116167116167116177116240116240116240116240116240116240116240116240116240116242116256116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116270116270116270116270116270116270116270116270116270116270116270116270116270116270116270116270116270116270116270116270116270116270116270116270116270116270116270116271116271116271116271116271116271116271116271116271116271116271116271116271116271116271116271116271116273116273116273116273116274116274116274116274116274116274116275116276116276116276116276116276116276116276116276116277116277116277116277116277116277116277116277116277116277116277116278116278116279116280116280116331116331116331116331116331116331116331116331116331116331116331116334116334116334116334116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116337116337116337116337116337116337116337116337116337116337116337116337116337116337116337116337116337116337116337116337116337116337116337116337116337116337116337116337116337116337116337116337116337116337116337116337116337116337116337116337116337116337116427116427116427116437116437116437116441116441116441116441116441116441116441116441116444116490116498116498116507116507116507116507116507116508116508116509116510116510116566116566116566116566116566116566116566116566116566116568116580116580116580116580116580116580116593116593116593116593116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116596116596116596116596116596116596116596116596116596116596116596116596116596116596116596116596116596116596116596116596116596116596116596116596116596116596116596116596116596116596116596116596116596116596116596116596116596116596116596116596116596116596117107117141117144117256117308117308117308117308117308117308117308117308117311117311117311117311117312117312117312117312117312117312117313117314117314117314117858117972117972117972117972117972117972117972118097118116118116118126118126118130118130118138118138118138118138118141118187118187118187118187118187118197118260118262118276118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118290118290118290118290118290118290118290118290118290118290118290118290118290118290118290118290118290118290118290118290118290118290118290118290118290118290118290118291118291118291118291118291118291118291118291118291118291118291118291118291118291118291118291118291118293118293118293118293118294118294118294118294118294118294118295118296118296118296118296118304118304118304118304118304118304118304118304118304118304118304118304118304118304118304118304118416118468118468118468118468118468118468118468118468118471118471118472118472118472118472118472118472118473118474118474118474118474118474119277119296119296119306119306119310119310119318119318119318119318119321119367119367119367119367119367119377119440119440119440119440119440119440119440119440119440119442119457119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119471119471119471119471119471119471119471119471119471119471119471119471119471119471119471119471119471119471119471119471119471119471119471119471119471119471119471119472119472119472119472119472119472119472119472119472119472119472119472119472119472119472119472119472119474119474119474119474119474119474119475119475119475119475119475119475119476119477119477119477119477119477119477119477119477119477119477119477119477119477119477119477119478119478119478119478119478119478119478119478119478119479119479119480119481119481119533119533119533119533119533119533119533119533119536119536119644119644119644119644119663119663119673119677119677119677119677119677119677119677119677119680119726119734119734119743119743119743119743119743119744119744119745119746119746119806119806119806119806119806119806119806119806119806119808119821119821119821119821119821119821119834119834119834119834119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119837119837119837119837119837119837119837119837119837119837119837119837119837119837119837119837119837119837119837119837119837119837119837119837119838119838119838119838119838119838119838119838119838119838119838119838119838119838119838119838119838119838120519120522120522
File scan done, we have: 120522 files to analize
- Suspicious behavior found in: nagad-helper.php-
- Full path:
- db555/m/nagad-helper.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:46 12/12/2025
- Last modified:
- 01:42:03 05/09/2024
- MD5 hash:
- 2bb70c44d68202e0a0cd8ae1388f0b1b
- Filesize:
- 6.74 KB
- suspicious functions used:
- curl_exec (line:61);base64_decode (line:97);
$resultData = curl_exec($url);openssl_private_decrypt(base64_decode($cryptText), $plain_text, $private_key); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tagreeexpayment.php-
- Full path:
- db555/m/tagreeexpayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:46 12/12/2025
- Last modified:
- 01:42:04 05/09/2024
- MD5 hash:
- c95e3ee881752db67b4f3597bc58430a
- Filesize:
- 2.46 KB
- suspicious functions used:
- curl_exec (line:26);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: token.php-
- Full path:
- db555/m/token.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:47 12/12/2025
- Last modified:
- 01:42:04 05/09/2024
- MD5 hash:
- 7d8e71ceda3ffb74623e0c4a814715af
- Filesize:
- 1.53 KB
- suspicious functions used:
- curl_exec (line:42);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: support-action.php-
- Full path:
- db555/m/support-action.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:47 12/12/2025
- Last modified:
- 01:42:04 05/09/2024
- MD5 hash:
- 2fc6fd844db911a5502a7a6ae383990f
- Filesize:
- 10.31 KB
- suspicious functions used:
- curl_exec (line:99);
$jsona = curl_exec($ch10); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: createpayment.php-
- Full path:
- db555/m/createpayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:47 12/12/2025
- Last modified:
- 01:42:03 05/09/2024
- MD5 hash:
- 849185f307be30eafb1bbef93616d8c3
- Filesize:
- 1.71 KB
- suspicious functions used:
- curl_exec (line:57);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tcreateagree.php-
- Full path:
- db555/m/tcreateagree.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:47 12/12/2025
- Last modified:
- 01:42:04 05/09/2024
- MD5 hash:
- 27a10adf4190edc7eceee8cf74a6b72b
- Filesize:
- 999 B
- suspicious functions used:
- curl_exec (line:26);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: executepayment.php-
- Full path:
- db555/m/executepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:47 12/12/2025
- Last modified:
- 01:42:03 05/09/2024
- MD5 hash:
- 9a3f22521ad987e86f84c4f5f688d5b7
- Filesize:
- 713 B
- suspicious functions used:
- curl_exec (line:18);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: index.php-
- Full path:
- db555/m/index.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:47 12/12/2025
- Last modified:
- 01:42:03 05/09/2024
- MD5 hash:
- 9a5dc16d9d603e4fe488b2349f6197a3
- Filesize:
- 12.47 KB
- suspicious functions used:
- base64_decode (line:10);curl_exec (line:183);
list($encrypted_data,$iv,$key) = explode('::',base64_decode($ciphertext));$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentOnlineQuery.php-
- Full path:
- db555/m/PaymentOnlineQuery.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:47 12/12/2025
- Last modified:
- 01:42:03 05/09/2024
- MD5 hash:
- c7aca21e5a61ded371d4b853710cf4b4
- Filesize:
- 21.14 KB
- suspicious functions used:
- curl_exec (line:287);curl_exec (line:512);
$resultdata=curl_exec($url);$content = curl_exec($handle ); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentOnlineQuery2.php-
- Full path:
- db555/m/PaymentOnlineQuery2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:47 12/12/2025
- Last modified:
- 01:42:03 05/09/2024
- MD5 hash:
- 37be1b3f51cac8d936abe043bc79ed4b
- Filesize:
- 19.08 KB
- suspicious functions used:
- curl_exec (line:41);curl_exec (line:254);
$resultdatax=curl_exec($url);$result = curl_exec($handle); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tcreatepayment.php-
- Full path:
- db555/m/tcreatepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:48 12/12/2025
- Last modified:
- 01:42:04 05/09/2024
- MD5 hash:
- e49de9a33f5164bc2c6b88e4770faaff
- Filesize:
- 1.07 KB
- suspicious functions used:
- curl_exec (line:27);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: login_exec.php-
- Full path:
- db555/m/login_exec.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:48 12/12/2025
- Last modified:
- 01:42:03 05/09/2024
- MD5 hash:
- 1f800365ef270564df77d30c1bfd7ed3
- Filesize:
- 5.4 KB
- suspicious functions used:
- curl_exec (line:66);
$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: login_exec1.php-
- Full path:
- db555/m/login_exec1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:48 12/12/2025
- Last modified:
- 01:42:03 05/09/2024
- MD5 hash:
- 46b08782f51ba75b23e27183e06370fe
- Filesize:
- 4.28 KB
- suspicious functions used:
- curl_exec (line:61);
$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ttoken.php-
- Full path:
- db555/m/ttoken.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:48 12/12/2025
- Last modified:
- 01:42:04 05/09/2024
- MD5 hash:
- 5f2c51c1db5b0defadfb67ce25c0098f
- Filesize:
- 1.54 KB
- suspicious functions used:
- curl_exec (line:42);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: nagad-merchant-callback.php-
- Full path:
- db555/m/nagad-merchant-callback.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:48 12/12/2025
- Last modified:
- 01:42:03 05/09/2024
- MD5 hash:
- 1ca42269a7e5563f13a266d9c0ce5049
- Filesize:
- 11.75 KB
- suspicious functions used:
- curl_exec (line:20);
$file_contents = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: texecutepayment.php-
- Full path:
- db555/m/texecutepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:48 12/12/2025
- Last modified:
- 01:42:04 05/09/2024
- MD5 hash:
- efbb63dfcfdacb52dec74bffc389bbb3
- Filesize:
- 2.67 KB
- suspicious functions used:
- curl_exec (line:24);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: netowrk-snmp-data.php-
- Full path:
- db555/m/netowrk-snmp-data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:48 12/12/2025
- Last modified:
- 01:42:03 05/09/2024
- MD5 hash:
- b56429056656f0de16982e31853f3304
- Filesize:
- 20.26 KB
- suspicious functions used:
- shell_exec (line:93);shell_exec (line:102);
$output = shell_exec($command . " 2>&1");shell_exec (line:112);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:131);$output_port = shell_exec($commandd . " 2>&1");shell_exec (line:141);$output_oid_bdcom = shell_exec($command_oid_bdcom . " 2>&1");shell_exec (line:157);$outputs = shell_exec($commanda);shell_exec (line:177);$output_port = shell_exec($commandd_bdcom);shell_exec (line:187);$output_oid_cdata = shell_exec($command_oid_cdata . " 2>&1");shell_exec (line:192);$outputs = shell_exec($commanda);shell_exec (line:200);$outs = shell_exec($canda);shell_exec (line:220);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:236);$outpdut_port = shell_exec($commandd_cdata);`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:249);$output_oid_gcom = shell_exec($command_oid_gcom . " 2>&1");shell_exec (line:255);$querydd = mysqli_query($con, "SELECT `olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND `olt_id` = '$olt_id' AND sts = '0'");shell_exec (line:377);$output_vlan = shell_exec($command_vlan . " 2>&1");$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: billpaycheck.php-
- Full path:
- db555/web/bkash/billpaycheck.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:48 12/12/2025
- Last modified:
- 01:42:14 05/09/2024
- MD5 hash:
- 38c46efc36b25628fa18bd92ae135af9
- Filesize:
- 796 B
- suspicious functions used:
- curl_exec (line:18);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: createpayment.php-
- Full path:
- db555/web/bkash/createpayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:48 12/12/2025
- Last modified:
- 01:42:14 05/09/2024
- MD5 hash:
- 6175301f744b22b7db70ba598a991f8b
- Filesize:
- 1.64 KB
- suspicious functions used:
- curl_exec (line:36);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: executepayment.php-
- Full path:
- db555/web/bkash/executepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:48 12/12/2025
- Last modified:
- 01:42:14 05/09/2024
- MD5 hash:
- 19be365d26141eaecead7ef0ada0e75c
- Filesize:
- 1.3 KB
- suspicious functions used:
- curl_exec (line:31);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: grant.php-
- Full path:
- db555/web/bkash/grant.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:48 12/12/2025
- Last modified:
- 01:42:14 05/09/2024
- MD5 hash:
- da5499d260dc78ea4fcd71227cc6c484
- Filesize:
- 2.01 KB
- suspicious functions used:
- curl_exec (line:41);curl_exec (line:63);
$resultdata=curl_exec($url);$response = curl_exec($curl); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: query.php-
- Full path:
- db555/web/bkash/query.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:48 12/12/2025
- Last modified:
- 01:42:14 05/09/2024
- MD5 hash:
- f3ed9045f3a073e2cdc8561d500bda89
- Filesize:
- 1.65 KB
- suspicious functions used:
- curl_exec (line:33);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tagreeexpayment.php-
- Full path:
- db555/web/bkash/tagreeexpayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:48 12/12/2025
- Last modified:
- 01:42:15 05/09/2024
- MD5 hash:
- a1ba7d36003f72e593615aa32e44acb9
- Filesize:
- 1.58 KB
- suspicious functions used:
- curl_exec (line:27);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tcreateagree.php-
- Full path:
- db555/web/bkash/tcreateagree.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:48 12/12/2025
- Last modified:
- 01:42:15 05/09/2024
- MD5 hash:
- 8ae6bdc9f3d4b0cdcf651701a0d9ebab
- Filesize:
- 1.2 KB
- suspicious functions used:
- curl_exec (line:27);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tcreatepayment.php-
- Full path:
- db555/web/bkash/tcreatepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:48 12/12/2025
- Last modified:
- 01:42:15 05/09/2024
- MD5 hash:
- 3c978def6cffa0a8db5e86ce127caae6
- Filesize:
- 1.35 KB
- suspicious functions used:
- curl_exec (line:29);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: texecutepayment.php-
- Full path:
- db555/web/bkash/texecutepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:48 12/12/2025
- Last modified:
- 01:42:15 05/09/2024
- MD5 hash:
- d8f24df64623da3cfc2baf48f184a3d1
- Filesize:
- 1.21 KB
- suspicious functions used:
- curl_exec (line:25);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: token.php-
- Full path:
- db555/web/bkash/token.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:48 12/12/2025
- Last modified:
- 01:42:15 05/09/2024
- MD5 hash:
- f50b33eeb31927b2c081195618d48b8d
- Filesize:
- 1.88 KB
- suspicious functions used:
- curl_exec (line:48);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tokent.php-
- Full path:
- db555/web/bkash/tokent.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:48 12/12/2025
- Last modified:
- 01:42:15 05/09/2024
- MD5 hash:
- 890a9e9fb1be75f31a6daad8811c1ff9
- Filesize:
- 1.9 KB
- suspicious functions used:
- curl_exec (line:48);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: trxID.php-
- Full path:
- db555/web/bkash/trxID.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:48 12/12/2025
- Last modified:
- 01:42:15 05/09/2024
- MD5 hash:
- 9bcb8e70728fd25807c4db8916166d74
- Filesize:
- 1.44 KB
- suspicious functions used:
- curl_exec (line:31);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: createpayment.php-
- Full path:
- db555/web/bkasht/createpayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:48 12/12/2025
- Last modified:
- 01:42:15 05/09/2024
- MD5 hash:
- a4ba6e7683f558dc3602dacd7ddeded2
- Filesize:
- 1.36 KB
- suspicious functions used:
- curl_exec (line:29);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: executepayment.php-
- Full path:
- db555/web/bkasht/executepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:48 12/12/2025
- Last modified:
- 01:42:15 05/09/2024
- MD5 hash:
- aad462fbca9f9a36649a197d67403098
- Filesize:
- 1.27 KB
- suspicious functions used:
- curl_exec (line:26);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: grant.php-
- Full path:
- db555/web/bkasht/grant.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:48 12/12/2025
- Last modified:
- 01:42:15 05/09/2024
- MD5 hash:
- da5499d260dc78ea4fcd71227cc6c484
- Filesize:
- 2.01 KB
- suspicious functions used:
- curl_exec (line:41);curl_exec (line:63);
$resultdata=curl_exec($url);$response = curl_exec($curl); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: query.php-
- Full path:
- db555/web/bkasht/query.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:48 12/12/2025
- Last modified:
- 01:42:15 05/09/2024
- MD5 hash:
- f3ed9045f3a073e2cdc8561d500bda89
- Filesize:
- 1.65 KB
- suspicious functions used:
- curl_exec (line:33);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: token.php-
- Full path:
- db555/web/bkasht/token.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:48 12/12/2025
- Last modified:
- 01:42:15 05/09/2024
- MD5 hash:
- f50b33eeb31927b2c081195618d48b8d
- Filesize:
- 1.88 KB
- suspicious functions used:
- curl_exec (line:48);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: trxID.php-
- Full path:
- db555/web/bkasht/trxID.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:48 12/12/2025
- Last modified:
- 01:42:15 05/09/2024
- MD5 hash:
- 9bcb8e70728fd25807c4db8916166d74
- Filesize:
- 1.44 KB
- suspicious functions used:
- curl_exec (line:31);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: class.phpmailer.php-
- Full path:
- db555/web/email/class.phpmailer.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:48 12/12/2025
- Last modified:
- 01:42:15 05/09/2024
- MD5 hash:
- 68468d69b47fffecc89df57e27c5a781
- Filesize:
- 143.32 KB
- suspicious functions used:
- `$DKIM_private` (line:428);popen (line:1387);
* If set, takes precedence over `$DKIM_private`.popen (line:1408);if (!@$mail = popen($sendmail, 'w')) {base64_decode (line:3410);if (!@$mail = popen($sendmail, 'w')) {`$mail->set('SMTPSecure', 'tls');` (line:3688);$data = base64_decode($data);`$mail->SMTPSecure = 'tls';` (line:3690);* `$mail->set('SMTPSecure', 'tls');`* `$mail->SMTPSecure = 'tls';` - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: class.smtp.php-
- Full path:
- db555/web/email/class.smtp.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:48 12/12/2025
- Last modified:
- 01:42:16 05/09/2024
- MD5 hash:
- aa8478329268e5438a4469c268337a10
- Filesize:
- 41.44 KB
- suspicious functions used:
- base64_decode (line:513);base64_decode (line:533);
$challenge = base64_decode($challenge);$challenge = base64_decode(substr($this->last_reply, 4)); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: JSON.php-
- Full path:
- db555/web/inc/JSON.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:49 12/12/2025
- Last modified:
- 01:42:21 05/09/2024
- MD5 hash:
- f5a34509e06231308becbe320ade9ff6
- Filesize:
- 33.22 KB
- suspicious functions used:
- eval (line:22);
* Javascript, and can be directly eval()'ed with no further parsing - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: jqgrid.php-
- Full path:
- db555/web/inc/jqgrid.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:49 12/12/2025
- Last modified:
- 01:42:21 05/09/2024
- MD5 hash:
- 71027a29e71e0626d8b57cbb631e6d98
- Filesize:
- 23.92 KB
- suspicious functions used:
- eval (line:397);
if (!empty($V4a8a08f0["condition"])) eval("\$V4b43b0ae = ".$V4a8a08f0["condition"].";"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: smsapicore.php-
- Full path:
- db555/web/include/smsapicore.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:49 12/12/2025
- Last modified:
- 02:03:47 05/09/2024
- MD5 hash:
- 1f580215986ab61cb0d47e79a1a2b457
- Filesize:
- 1.16 KB
- suspicious functions used:
- curl_exec (line:36);
$result = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: telegramapicore.php-
- Full path:
- db555/web/include/telegramapicore.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:49 12/12/2025
- Last modified:
- 01:42:22 05/09/2024
- MD5 hash:
- 535fa7aac83b0e1ba56be7837348b6d9
- Filesize:
- 2.9 KB
- suspicious functions used:
- curl_exec (line:63);
$result11 = curl_exec($ch3); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Changes.txt-
- Full path:
- db555/web/js/jqgrid/js/Changes.txt
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:49 12/12/2025
- Last modified:
- 01:42:28 05/09/2024
- MD5 hash:
- c0a4adbc3f1c6d592cb4fa8433fee9ea
- Filesize:
- 44.32 KB
- suspicious functions used:
- system (line:87);
* Add a ant based build system which allow us to minify the JS code - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ui.php-
- Full path:
- db555/web/js/tinymce/themes/advanced/skins/highcontrast/ui.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:49 12/12/2025
- Last modified:
- 01:42:32 05/09/2024
- MD5 hash:
- 3edaf67be8573b86686f46bbba4f058c
- Filesize:
- 4.53 KB
- suspicious functions used:
- curl_exec (line:20);`bill_amount` = '0.00' WHERE bill_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY ` (line:53);
$alldataa = curl_exec($chxchhh);`bill_amount` = '0.00', days = '0.00' WHERE entry_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY ` (line:54);$queryss = mysql_query("UPDATE billing SET `bill_amount` = '0.00' WHERE bill_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY `id` DESC LIMIT 5");`payment` WHERE `pay_date` < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND pay_amount != '0.00' ORDER BY ` (line:55);$sqlqmss = mysql_query("UPDATE billing_mac SET `bill_amount` = '0.00', days = '0.00' WHERE entry_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY `id` DESC LIMIT 5");curl_exec (line:146);$sqlqmsp = mysql_query("DELETE FROM `payment` WHERE `pay_date` < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND pay_amount != '0.00' ORDER BY `id` ASC LIMIT 5");curl_exec (line:168);$responsed = curl_exec($curld);$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: AutoActiveClientsCount1.php-
- Full path:
- db555/web/AutoActiveClientsCount1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:50 12/12/2025
- Last modified:
- 01:42:08 05/09/2024
- MD5 hash:
- fb443f2f93781a8fffce803317592c41
- Filesize:
- 6.12 KB
- suspicious functions used:
- system (line:56);
$ARRAY = $API->comm("/system/resource/print"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: AutoActiveClientsCount11.php-
- Full path:
- db555/web/AutoActiveClientsCount11.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:50 12/12/2025
- Last modified:
- 01:42:08 05/09/2024
- MD5 hash:
- a0090e4a11dd59b955a6edd549b6ef2f
- Filesize:
- 5.85 KB
- suspicious functions used:
- system (line:54);
$ARRAY = $API->comm("/system/resource/print"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ClientsOnMap.php-
- Full path:
- db555/web/ClientsOnMap.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:50 12/12/2025
- Last modified:
- 06:02:59 10/11/2025
- MD5 hash:
- d43635c1bb2f7953c0a9d51d744957a5
- Filesize:
- 12.25 KB
- suspicious functions used:
- `${totalonline}` (line:97);`${totaloffline}` (line:98);
document.getElementById('totalonline').textContent = `${totalonline}`;`${results.rxPower}` (line:233);document.getElementById('totaloffline').textContent = `${totaloffline}`;`${results.distance}` (line:234);var rxPower = `${results.rxPower}`;`${results.supplyVoltage}` (line:235);var distance = `${results.distance}`;`${results.temperature}` (line:236);var supplyVoltage = `${results.supplyVoltage}`;`${results.txPower}` (line:237);var temperature = `${results.temperature}`;var txPower = `${results.txPower}`; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Clients.php-
- Full path:
- db555/web/Clients.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:51 12/12/2025
- Last modified:
- 01:42:09 05/09/2024
- MD5 hash:
- 42540e032b92be9d4484a9f9f78dd610
- Filesize:
- 175.25 KB
- suspicious functions used:
- `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:832);
$result1rd=mysql_query("SELECT `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND `sts` = '0' order by b_name ASC"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Clients2.php-
- Full path:
- db555/web/Clients2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:52 12/12/2025
- Last modified:
- 01:42:09 05/09/2024
- MD5 hash:
- 4d7acc879510998b2909318d8638d804
- Filesize:
- 168.05 KB
- suspicious functions used:
- `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:816);
$result1rd=mysql_query("SELECT `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND `sts` = '0' order by b_name ASC"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Clients3.php-
- Full path:
- db555/web/Clients3.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:52 12/12/2025
- Last modified:
- 01:42:09 05/09/2024
- MD5 hash:
- 7b4a7d07d9658aa7c159cd59ebae283a
- Filesize:
- 175.3 KB
- suspicious functions used:
- `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:832);
$result1rd=mysql_query("SELECT `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND `sts` = '0' order by b_name ASC"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: InstrumentsStoreOutDetails.php-
- Full path:
- db555/web/InstrumentsStoreOutDetails.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:53 12/12/2025
- Last modified:
- 01:42:10 05/09/2024
- MD5 hash:
- ab68ab13bcfd51da15e72a3d4e9817e8
- Filesize:
- 9.37 KB
- suspicious functions used:
- `update_date`, '%D-%b, %y') AS offdate, TIME_FORMAT(`update_time`, '%T') AS offtime FROM `con_sts_log` WHERE `c_id` = '{$row['c_id']}' AND con_sts = 'Inactive' ORDER BY ` (line:120);
$resultwwdd=mysql_query("SELECT DATE_FORMAT(`update_date`, '%D-%b, %y') AS offdate, TIME_FORMAT(`update_time`, '%T') AS offtime FROM `con_sts_log` WHERE `c_id` = '{$row['c_id']}' AND con_sts = 'Inactive' ORDER BY `update_date_time` DESC LIMIT 1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkLoad.php-
- Full path:
- db555/web/NetworkLoad.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:54 12/12/2025
- Last modified:
- 01:42:12 05/09/2024
- MD5 hash:
- e1632e66ee1b7394d3fb82751b924abe
- Filesize:
- 2.83 KB
- suspicious functions used:
- system (line:81);
$ARRAY = $API->comm("/system/resource/print"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Network.php-
- Full path:
- db555/web/Network.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:54 12/12/2025
- Last modified:
- 14:50:55 25/09/2024
- MD5 hash:
- 450c41be5bee69bf5f756f28873f0cf7
- Filesize:
- 55.23 KB
- suspicious functions used:
- system (line:358);shell_exec (line:654);
$ARRAY = $API->comm("/system/resource/print");$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Network1.php-
- Full path:
- db555/web/Network1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:54 12/12/2025
- Last modified:
- 01:42:12 05/09/2024
- MD5 hash:
- 95f9922e23cb36ebd65d603a48d22c4b
- Filesize:
- 44.04 KB
- suspicious functions used:
- system (line:295);shell_exec (line:590);
$ARRAY = $API->comm("/system/resource/print");$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: SMSAddSave.php-
- Full path:
- db555/web/SMSAddSave.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:54 12/12/2025
- Last modified:
- 02:04:19 05/09/2024
- MD5 hash:
- d7944d313bfd78b30995671c17fea533
- Filesize:
- 1.76 KB
- suspicious functions used:
- curl_exec (line:35);
$result = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: SMS1.php-
- Full path:
- db555/web/SMS1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:54 12/12/2025
- Last modified:
- 01:42:13 05/09/2024
- MD5 hash:
- 40d55bbcfe09846560034ad6b6748670
- Filesize:
- 32.19 KB
- suspicious functions used:
- curl_exec (line:59);
$balance = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkLoad1.php-
- Full path:
- db555/web/NetworkLoad1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:54 12/12/2025
- Last modified:
- 01:42:12 05/09/2024
- MD5 hash:
- 176bd6931be34d7ef351d22897accc65
- Filesize:
- 759 B
- suspicious functions used:
- system (line:18);
$ARRAY = $API->comm("/system/resource/print"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkOltAddQuery.php-
- Full path:
- db555/web/NetworkOltAddQuery.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:54 12/12/2025
- Last modified:
- 01:42:12 05/09/2024
- MD5 hash:
- b14dd824d3ac47473bc0311a79d451fb
- Filesize:
- 6.33 KB
- suspicious functions used:
- shell_exec (line:21);
$output = shell_exec($command . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkOltOnuStatus.php-
- Full path:
- db555/web/NetworkOltOnuStatus.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:54 12/12/2025
- Last modified:
- 01:42:12 05/09/2024
- MD5 hash:
- af4bfcb571c821970ba15de0a72c118d
- Filesize:
- 45.04 KB
- suspicious functions used:
- shell_exec (line:41);shell_exec (line:337);
$output = shell_exec($command . " 2>&1");shell_exec (line:452);$oddutpdut = shell_exec($cmandd . " 2>&1");shell_exec (line:565);$oddutpdut = shell_exec($cmandd . " 2>&1");$oddutpdut = shell_exec($cmandd . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkOltOnuStatus2.php-
- Full path:
- db555/web/NetworkOltOnuStatus2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:54 12/12/2025
- Last modified:
- 01:42:12 05/09/2024
- MD5 hash:
- f112b225c20188bc03c92e63dac90efa
- Filesize:
- 15.88 KB
- suspicious functions used:
- shell_exec (line:35);
$output = shell_exec($command . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentOnlineQuery.php-
- Full path:
- db555/web/PaymentOnlineQuery.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:54 12/12/2025
- Last modified:
- 01:42:12 05/09/2024
- MD5 hash:
- e71855333c2ea0c43f2a87109898c283
- Filesize:
- 28.5 KB
- suspicious functions used:
- curl_exec (line:456);curl_exec (line:688);
$resultdata=curl_exec($url);$content = curl_exec($handle ); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: SMS.php-
- Full path:
- db555/web/SMS.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:54 12/12/2025
- Last modified:
- 02:10:36 05/09/2024
- MD5 hash:
- 990048cb34dc753e8878c1ac208df9e2
- Filesize:
- 35.71 KB
- suspicious functions used:
- curl_exec (line:57);
$balance = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentOnlineQuery2.php-
- Full path:
- db555/web/PaymentOnlineQuery2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:54 12/12/2025
- Last modified:
- 01:42:12 05/09/2024
- MD5 hash:
- 700d8182abbbc0b80fe31beb1e717699
- Filesize:
- 19.39 KB
- suspicious functions used:
- curl_exec (line:42);curl_exec (line:252);
$resultdatax=curl_exec($url);$result = curl_exec($handle); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentWebhook.php-
- Full path:
- db555/web/PaymentWebhook.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:55 12/12/2025
- Last modified:
- 01:42:12 05/09/2024
- MD5 hash:
- a2f322c94787630ab1e0c8ca35fc5ba1
- Filesize:
- 18.6 KB
- suspicious functions used:
- base64_decode (line:30);curl_exec (line:41);
$signatureDecoded = base64_decode($signature);curl_exec (line:422);curl_exec($url);$data = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkTreeMap.php-
- Full path:
- db555/web/NetworkTreeMap.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:55 12/12/2025
- Last modified:
- 01:42:12 05/09/2024
- MD5 hash:
- a40d6787a72f97303b8bfcad318b0f4f
- Filesize:
- 22.12 KB
- suspicious functions used:
- `${results.rxPower}` (line:230);`${results.distance}` (line:231);
var rxPower = `${results.rxPower}`;`${results.supplyVoltage}` (line:232);var distance = `${results.distance}`;`${results.temperature}` (line:233);var supplyVoltage = `${results.supplyVoltage}`;`${results.txPower}` (line:234);var temperature = `${results.temperature}`;var txPower = `${results.txPower}`; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkTreeMap1.php-
- Full path:
- db555/web/NetworkTreeMap1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:55 12/12/2025
- Last modified:
- 01:42:12 05/09/2024
- MD5 hash:
- 3483a4b939ab44a513c3614c31444179
- Filesize:
- 10.57 KB
- suspicious functions used:
- `${totalonline}` (line:97);`${totaloffline}` (line:98);
document.getElementById('totalonline').textContent = `${totalonline}`;document.getElementById('totaloffline').textContent = `${totaloffline}`; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: SignUp1.php-
- Full path:
- db555/web/SignUp1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:56 12/12/2025
- Last modified:
- 01:42:13 05/09/2024
- MD5 hash:
- 3f7943dd155c8e0a383b7d02730f8c11
- Filesize:
- 24.59 KB
- suspicious functions used:
- curl_exec (line:33);curl_exec (line:59);
$jsona = curl_exec($ch10);$resdfwedf = curl_exec($ch1s); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_gen_bill.php-
- Full path:
- db555/web/cron_auto_gen_bill.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:57 12/12/2025
- Last modified:
- 01:42:09 05/09/2024
- MD5 hash:
- f1056618cc4402968e50d1232d2c51c8
- Filesize:
- 4.73 KB
- suspicious functions used:
- curl_exec (line:140);curl_exec (line:149);
$respd = curl_exec($curl);$resp = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: client-online-mbb.php-
- Full path:
- db555/web/client-online-mbb.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:57 12/12/2025
- Last modified:
- 01:42:09 05/09/2024
- MD5 hash:
- 69c51efb5b9017a07a7158b4a63f3826
- Filesize:
- 14.32 KB
- suspicious functions used:
- curl_exec (line:90);
$resp = curl_exec($curlss); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: clients-nots-action.php-
- Full path:
- db555/web/clients-nots-action.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:57 12/12/2025
- Last modified:
- 01:42:09 05/09/2024
- MD5 hash:
- dff1bb495509427d098cb4588da553b9
- Filesize:
- 5.89 KB
- suspicious functions used:
- curl_exec (line:35);
$jsona = curl_exec($ch10); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: company_info.php-
- Full path:
- db555/web/company_info.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:57 12/12/2025
- Last modified:
- 01:42:09 05/09/2024
- MD5 hash:
- e612d58aa2e38f5b49ba37c1bf620ece
- Filesize:
- 8.38 KB
- suspicious functions used:
- curl_exec (line:130);
$alldata = curl_exec($chhhh); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: createpayment.php-
- Full path:
- db555/web/createpayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:57 12/12/2025
- Last modified:
- 01:42:09 05/09/2024
- MD5 hash:
- ba9747d0421fd091b998389469e72a0b
- Filesize:
- 1.7 KB
- suspicious functions used:
- curl_exec (line:57);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_all.php-
- Full path:
- db555/web/cron_all.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:57 12/12/2025
- Last modified:
- 01:42:09 05/09/2024
- MD5 hash:
- b19a08fef36584598cca299b7ecc5e6d
- Filesize:
- 2.07 KB
- suspicious functions used:
- curl_exec (line:23);curl_exec (line:38);
$result1 = curl_exec($ch1);curl_exec (line:53);$result1d = curl_exec($ch11);$result1d2 = curl_exec($ch112); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ip-ping-checker.php-
- Full path:
- db555/web/ip-ping-checker.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:57 12/12/2025
- Last modified:
- 01:42:10 05/09/2024
- MD5 hash:
- 0d28f3053b73b3fe2885cf519ee17c12
- Filesize:
- 2.64 KB
- suspicious functions used:
- curl_exec (line:81);
$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_inactive.php-
- Full path:
- db555/web/cron_auto_inactive.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:57 12/12/2025
- Last modified:
- 01:42:10 05/09/2024
- MD5 hash:
- 7e0dc4dd9dae2bf0220516641b53c027
- Filesize:
- 5.43 KB
- suspicious functions used:
- curl_exec (line:142);
$respw = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_inactive2.php-
- Full path:
- db555/web/cron_auto_inactive2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:57 12/12/2025
- Last modified:
- 01:42:10 05/09/2024
- MD5 hash:
- 440bc24f05b01eb395df63fff2f60de9
- Filesize:
- 5.46 KB
- suspicious functions used:
- curl_exec (line:142);
$respw = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: index.php-
- Full path:
- db555/web/index.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:57 12/12/2025
- Last modified:
- 01:42:10 05/09/2024
- MD5 hash:
- f161ab23adf4527023a0ad582d478f89
- Filesize:
- 12.45 KB
- suspicious functions used:
- base64_decode (line:10);curl_exec (line:183);
list($encrypted_data,$iv,$key) = explode('::',base64_decode($ciphertext));$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_inactive_termination.php-
- Full path:
- db555/web/cron_auto_inactive_termination.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:57 12/12/2025
- Last modified:
- 12:17:54 23/09/2024
- MD5 hash:
- 9f9c8ca9110c2304128646824bfb17db
- Filesize:
- 12.16 KB
- suspicious functions used:
- curl_exec (line:241);curl_exec (line:253);
$resp = curl_exec($curlss);$respw = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_inactive_termination1.php-
- Full path:
- db555/web/cron_auto_inactive_termination1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:57 12/12/2025
- Last modified:
- 01:42:10 05/09/2024
- MD5 hash:
- be76b964c93a2cb4fa7e632750ff3bc4
- Filesize:
- 6.64 KB
- suspicious functions used:
- curl_exec (line:156);curl_exec (line:168);
$resp = curl_exec($curlss);$respw = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_termination_remainder1.php-
- Full path:
- db555/web/cron_auto_termination_remainder1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:57 12/12/2025
- Last modified:
- 01:42:10 05/09/2024
- MD5 hash:
- 7765f9f820dbd402f1064fab9958ffaa
- Filesize:
- 3.26 KB
- suspicious functions used:
- curl_exec (line:83);
$respw = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_client_bandwidth_count.php-
- Full path:
- db555/web/cron_client_bandwidth_count.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:57 12/12/2025
- Last modified:
- 01:42:10 05/09/2024
- MD5 hash:
- 8be5ba5d539d73a8f197195f7748e1cc
- Filesize:
- 4.7 KB
- suspicious functions used:
- curl_exec (line:125);
$result = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: test7.php-
- Full path:
- db555/web/test7.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:57 12/12/2025
- Last modified:
- 01:42:14 05/09/2024
- MD5 hash:
- 374d68487e54a5d4368699a202ae5a92
- Filesize:
- 890 B
- suspicious functions used:
- shell_exec (line:4);shell_exec (line:10);
$od_vdlan = shell_exec($coddvlan . " 2>&1");$od_vdland = shell_exec($coddvland . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: texecutepayment.php-
- Full path:
- db555/web/texecutepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:57 12/12/2025
- Last modified:
- 01:42:14 05/09/2024
- MD5 hash:
- 623635fdf5c871391d3a5fe99ee8c543
- Filesize:
- 2.91 KB
- suspicious functions used:
- curl_exec (line:24);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_network.php-
- Full path:
- db555/web/cron_network.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:57 12/12/2025
- Last modified:
- 01:42:10 05/09/2024
- MD5 hash:
- 1a75ea6c2e0cc5b9263541dda62ab458
- Filesize:
- 4.61 KB
- suspicious functions used:
- curl_exec (line:45);curl_exec (line:67);
$result1d = curl_exec($ch11);$result1dd = curl_exec($ch111); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_olt.php-
- Full path:
- db555/web/cron_olt.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:57 12/12/2025
- Last modified:
- 06:32:45 09/09/2024
- MD5 hash:
- d83092bb263aaa93da2bb8cddab2a0d1
- Filesize:
- 3.7 KB
- suspicious functions used:
- shell_exec (line:44);
$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_olt_user.php-
- Full path:
- db555/web/cron_olt_user.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:57 12/12/2025
- Last modified:
- 06:32:45 09/09/2024
- MD5 hash:
- 67aa237639e3d1e6064e76079bb3cccc
- Filesize:
- 1.97 KB
- suspicious functions used:
- curl_exec (line:19);curl_exec (line:46);
$resultd1d = curl_exec($ch110);$result1d = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tis-news.php-
- Full path:
- db555/web/tis-news.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:57 12/12/2025
- Last modified:
- 01:42:14 05/09/2024
- MD5 hash:
- ed23ca98b77c5321b4485e85eb2ea64d
- Filesize:
- 3.67 KB
- suspicious functions used:
- curl_exec (line:22);
$alldata1 = curl_exec($chhhh1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: test6.php-
- Full path:
- db555/web/test6.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:57 12/12/2025
- Last modified:
- 01:42:14 05/09/2024
- MD5 hash:
- 0edc703b008a5e3cae5d241fc2cf717b
- Filesize:
- 4.76 KB
- suspicious functions used:
- shell_exec (line:46);shell_exec (line:70);
$findoncomd = shell_exec($findoncomdd);shell_exec (line:92);$oncomd = shell_exec($oncomdd);$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: login_exec.php-
- Full path:
- db555/web/login_exec.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:57 12/12/2025
- Last modified:
- 01:42:11 05/09/2024
- MD5 hash:
- 9038a77a32a5db2c9affae1496473f3e
- Filesize:
- 5.27 KB
- suspicious functions used:
- curl_exec (line:62);
$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: token.php-
- Full path:
- db555/web/token.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:57 12/12/2025
- Last modified:
- 01:42:14 05/09/2024
- MD5 hash:
- 7d8e71ceda3ffb74623e0c4a814715af
- Filesize:
- 1.53 KB
- suspicious functions used:
- curl_exec (line:42);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: loginexec.php-
- Full path:
- db555/web/loginexec.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:57 12/12/2025
- Last modified:
- 01:42:11 05/09/2024
- MD5 hash:
- edb8017e7d0f8e037facbcacc94a383d
- Filesize:
- 5.91 KB
- suspicious functions used:
- curl_exec (line:67);
$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: emp_salary_advence_find.php-
- Full path:
- db555/web/emp_salary_advence_find.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:57 12/12/2025
- Last modified:
- 01:42:10 05/09/2024
- MD5 hash:
- 74a7e2ffda0f7584611d7cbce6136c24
- Filesize:
- 2.25 KB
- suspicious functions used:
- `expanse` WHERE `type` = '2' AND `status` = '2' AND ex_by = '$e_id' AND MONTH(`, `) = MONTH('$lastmonth') AND YEAR(`, `) = YEAR('$lastmonth') GROUP BY ` (line:8);`e_id` = '$e_id' AND ` (line:12);
$vendorrr = mysql_query("SELECT SUM(amount) AS salary_advance FROM `expanse` WHERE `type` = '2' AND `status` = '2' AND ex_by = '$e_id' AND MONTH(`check_date`) = MONTH('$lastmonth') AND YEAR(`check_date`) = YEAR('$lastmonth') GROUP BY `ex_by`");$empppp = mysql_query("SELECT gross_total AS gross_total FROM emp_info WHERE `e_id` = '$e_id' AND `status` = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tt.php-
- Full path:
- db555/web/tt.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:57 12/12/2025
- Last modified:
- 01:42:14 05/09/2024
- MD5 hash:
- 9c4ed141cb79fdc7e807b35923c91a20
- Filesize:
- 1.56 KB
- suspicious functions used:
- curl_exec (line:30);
$response = curl_exec($curl); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ttoken.php-
- Full path:
- db555/web/ttoken.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:57 12/12/2025
- Last modified:
- 01:42:14 05/09/2024
- MD5 hash:
- 5f2c51c1db5b0defadfb67ce25c0098f
- Filesize:
- 1.54 KB
- suspicious functions used:
- curl_exec (line:42);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: executepayment.php-
- Full path:
- db555/web/executepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:57 12/12/2025
- Last modified:
- 01:42:10 05/09/2024
- MD5 hash:
- c46a50905333286f45dfeacf010851ab
- Filesize:
- 716 B
- suspicious functions used:
- curl_exec (line:18);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: webhook_cid.php-
- Full path:
- db555/web/webhook_cid.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:57 12/12/2025
- Last modified:
- 01:42:14 05/09/2024
- MD5 hash:
- 007f8fa5636da9e44a38526298f7e155
- Filesize:
- 21.08 KB
- suspicious functions used:
- base64_decode (line:28);curl_exec (line:39);
$signatureDecoded = base64_decode($signature);curl_exec (line:429);curl_exec($url);$data = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: webhook_off.php-
- Full path:
- db555/web/webhook_off.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:57 12/12/2025
- Last modified:
- 01:42:14 05/09/2024
- MD5 hash:
- 787511edcbdc9d6c9b26eba2dee70a84
- Filesize:
- 21.21 KB
- suspicious functions used:
- base64_decode (line:27);curl_exec (line:38);
$signatureDecoded = base64_decode($signature);curl_exec (line:454);curl_exec($url);$data = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: webhook_test.php-
- Full path:
- db555/web/webhook_test.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:57 12/12/2025
- Last modified:
- 01:42:14 05/09/2024
- MD5 hash:
- 74a7dcc262d7fe7f2bdc9e0595d03837
- Filesize:
- 4.69 KB
- suspicious functions used:
- base64_decode (line:22);curl_exec (line:33);
$signatureDecoded = base64_decode($signature);curl_exec (line:86);curl_exec($url);curl_exec (line:107);$result = curl_exec($ch);$data = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: getclientuptime.php-
- Full path:
- db555/web/getclientuptime.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:58 12/12/2025
- Last modified:
- 01:42:10 05/09/2024
- MD5 hash:
- bbc14cdd451c72b94d78c7d2d1af0b52
- Filesize:
- 718 B
- suspicious functions used:
- curl_exec (line:18);
$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: imagevwr.php-
- Full path:
- db555/web/imagevwr.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:58 12/12/2025
- Last modified:
- 01:42:10 05/09/2024
- MD5 hash:
- 47a223a13cc642d01dcfaaca542d396d
- Filesize:
- 915 B
- suspicious functions used:
- curl_exec (line:15);
$image_data = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-snmp-onu-status-data1.php-
- Full path:
- db555/web/network-snmp-onu-status-data1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:58 12/12/2025
- Last modified:
- 01:42:11 05/09/2024
- MD5 hash:
- dfc6e23448be165d8c7879ecdac3f737
- Filesize:
- 14.88 KB
- suspicious functions used:
- shell_exec (line:119);shell_exec (line:135);
$output = shell_exec($command . " 2>&1");shell_exec (line:151);$output_mac = shell_exec($commandd . " 2>&1");shell_exec (line:157);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:346);$outputd = shell_exec($commandds);$output = shell_exec($command . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: sms_deliverey_report.php-
- Full path:
- db555/web/sms_deliverey_report.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:58 12/12/2025
- Last modified:
- 01:42:13 05/09/2024
- MD5 hash:
- 03623943da7e9334e137b38c8577fc84
- Filesize:
- 4.25 KB
- suspicious functions used:
- curl_exec (line:28);curl_exec (line:53);
$result11 = curl_exec($ch1);curl_exec (line:90);$resultdd = curl_exec($ch);$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: test3.php-
- Full path:
- db555/web/test3.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:58 12/12/2025
- Last modified:
- 01:42:14 05/09/2024
- MD5 hash:
- 47feeaa9a827160ac4e6faff04aa57cd
- Filesize:
- 3.95 KB
- suspicious functions used:
- shell_exec (line:18);
$output = shell_exec($command . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tagreeexpayment.php-
- Full path:
- db555/web/tagreeexpayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:58 12/12/2025
- Last modified:
- 01:42:14 05/09/2024
- MD5 hash:
- 029b4fba649a75c7c81d2f8931be8d63
- Filesize:
- 2.86 KB
- suspicious functions used:
- curl_exec (line:26);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tcreateagree.php-
- Full path:
- db555/web/tcreateagree.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:58 12/12/2025
- Last modified:
- 01:42:14 05/09/2024
- MD5 hash:
- 27a10adf4190edc7eceee8cf74a6b72b
- Filesize:
- 999 B
- suspicious functions used:
- curl_exec (line:26);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: support-action.php-
- Full path:
- db555/web/support-action.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:58 12/12/2025
- Last modified:
- 01:42:13 05/09/2024
- MD5 hash:
- c678659a705dae2c6d52289b0084a693
- Filesize:
- 14.72 KB
- suspicious functions used:
- curl_exec (line:221);
$jsona = curl_exec($ch10); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: nagad-helper.php-
- Full path:
- db555/web/nagad-helper.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:58 12/12/2025
- Last modified:
- 01:42:11 05/09/2024
- MD5 hash:
- 2bb70c44d68202e0a0cd8ae1388f0b1b
- Filesize:
- 6.74 KB
- suspicious functions used:
- curl_exec (line:61);base64_decode (line:97);
$resultData = curl_exec($url);openssl_private_decrypt(base64_decode($cryptText), $plain_text, $private_key); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: nagad-merchant-callback.php-
- Full path:
- db555/web/nagad-merchant-callback.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:58 12/12/2025
- Last modified:
- 01:42:11 05/09/2024
- MD5 hash:
- 9e7ba60bacff8c3a7792176f76b698ea
- Filesize:
- 16.91 KB
- suspicious functions used:
- curl_exec (line:20);
$file_contents = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: netowrk-snmp-data.php-
- Full path:
- db555/web/netowrk-snmp-data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:58 12/12/2025
- Last modified:
- 01:42:11 05/09/2024
- MD5 hash:
- e09a072d71693f9e7767738221e9b755
- Filesize:
- 20.33 KB
- suspicious functions used:
- shell_exec (line:93);shell_exec (line:102);
$output = shell_exec($command . " 2>&1");shell_exec (line:112);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:131);$output_port = shell_exec($commandd . " 2>&1");shell_exec (line:141);$output_oid_bdcom = shell_exec($command_oid_bdcom . " 2>&1");shell_exec (line:157);$outputs = shell_exec($commanda);shell_exec (line:177);$output_port = shell_exec($commandd_bdcom);shell_exec (line:187);$output_oid_cdata = shell_exec($command_oid_cdata . " 2>&1");shell_exec (line:192);$outputs = shell_exec($commanda);shell_exec (line:200);$outs = shell_exec($canda);shell_exec (line:220);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:236);$outpdut_port = shell_exec($commandd_cdata);`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:249);$output_oid_gcom = shell_exec($command_oid_gcom . " 2>&1");shell_exec (line:255);$querydd = mysqli_query($con, "SELECT `olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND `olt_id` = '$olt_id' AND sts = '0'");shell_exec (line:377);$output_vlan = shell_exec($command_vlan . " 2>&1");$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: netowrk-snmp-data2.php-
- Full path:
- db555/web/netowrk-snmp-data2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:58 12/12/2025
- Last modified:
- 01:42:11 05/09/2024
- MD5 hash:
- 8eea607c303f1b0b5aad5898f6b95492
- Filesize:
- 20.14 KB
- suspicious functions used:
- shell_exec (line:96);shell_exec (line:105);
$output = shell_exec($command . " 2>&1");shell_exec (line:115);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:134);$output_port = shell_exec($commandd . " 2>&1");shell_exec (line:144);$output_oid_bdcom = shell_exec($command_oid_bdcom . " 2>&1");shell_exec (line:160);$outputs = shell_exec($commanda);shell_exec (line:180);$output_port = shell_exec($commandd_bdcom);shell_exec (line:190);$output_oid_cdata = shell_exec($command_oid_cdata . " 2>&1");shell_exec (line:195);$outputs = shell_exec($commanda);shell_exec (line:203);$outs = shell_exec($canda);shell_exec (line:223);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:239);$outpdut_port = shell_exec($commandd_cdata);`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:252);$output_oid_gcom = shell_exec($command_oid_gcom . " 2>&1");shell_exec (line:258);$querydd = mysqli_query($con, "SELECT `olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND `olt_id` = '$olt_id' AND sts = '0'");shell_exec (line:380);$output_vlan = shell_exec($command_vlan . " 2>&1");$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: netowrk-snmp-data3.php-
- Full path:
- db555/web/netowrk-snmp-data3.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:58 12/12/2025
- Last modified:
- 01:42:11 05/09/2024
- MD5 hash:
- 5d5944402bfa06ab7e62a63de5340f18
- Filesize:
- 16.15 KB
- suspicious functions used:
- shell_exec (line:74);shell_exec (line:83);
$output = shell_exec($command . " 2>&1");shell_exec (line:93);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:112);$output_port = shell_exec($commandd . " 2>&1");shell_exec (line:122);$output_oid_bdcom = shell_exec($command_oid_bdcom . " 2>&1");shell_exec (line:138);$outputs = shell_exec($commanda);shell_exec (line:158);$output_port = shell_exec($commandd_bdcom);shell_exec (line:168);$output_oid_cdata = shell_exec($command_oid_cdata . " 2>&1");shell_exec (line:173);$outputs = shell_exec($commanda);shell_exec (line:181);$outs = shell_exec($canda);shell_exec (line:201);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:310);$outpdut_port = shell_exec($commandd_cdata);$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-old-onu-rx.php-
- Full path:
- db555/web/network-old-onu-rx.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:58 12/12/2025
- Last modified:
- 01:42:11 05/09/2024
- MD5 hash:
- eeb2f02cc4a73abd6864b41ef53d5c9e
- Filesize:
- 6.97 KB
- suspicious functions used:
- shell_exec (line:76);
$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-snmp-onu-status-data.php-
- Full path:
- db555/web/network-snmp-onu-status-data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:58 12/12/2025
- Last modified:
- 01:42:11 05/09/2024
- MD5 hash:
- 4edf64f1b023178a6a92e9323d8c1f13
- Filesize:
- 15.77 KB
- suspicious functions used:
- shell_exec (line:33);`olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:37);
$outputs = shell_exec($snmpCommand);shell_exec (line:146);$re11=mysql_query("SELECT `olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND `olt_pon_id` = '$check_pon_name'");$outputsmac = shell_exec($snmpCommandmac); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-client-onu-mac-count-cdata.php-
- Full path:
- db555/web/network-olt-client-onu-mac-count-cdata.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:58 12/12/2025
- Last modified:
- 01:42:11 05/09/2024
- MD5 hash:
- c378dbabf36066c335cfb8838a6e167d
- Filesize:
- 4.58 KB
- suspicious functions used:
- shell_exec (line:25);shell_exec (line:35);
$od_vddlan = shell_exec($codmn . " 2>&1");shell_exec (line:56);$od_vddlan = shell_exec($codmn . " 2>&1");shell_exec (line:103);$output_vdlan = shell_exec($command_dvlan . " 2>&1");shell_exec (line:115);$od_vdlan = shell_exec($coddvlan . " 2>&1");shell_exec (line:126);$output_port = shell_exec($commandd_bdcom);shell_exec (line:140);$od_vddlan = shell_exec($codmn . " 2>&1");$od_vdddlan = shell_exec($codmdn . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-client-onu-mac-count.php-
- Full path:
- db555/web/network-olt-client-onu-mac-count.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:58 12/12/2025
- Last modified:
- 01:42:11 05/09/2024
- MD5 hash:
- 5bb99b279804116640875e00caf9e713
- Filesize:
- 12.52 KB
- suspicious functions used:
- shell_exec (line:25);shell_exec (line:35);
$od_vddlan = shell_exec($codmn . " 2>&1");shell_exec (line:58);$od_vddlan = shell_exec($codmn . " 2>&1");shell_exec (line:74);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:91);$outpudt_vlan = shell_exec($commadnd_vlan . " 2>&1");shell_exec (line:101);$output_port = shell_exec($commandd_bdcom);shell_exec (line:117);$output_vdlan = shell_exec($command_vdlan . " 2>&1");shell_exec (line:158);$outpdut_vdlan = shell_exec($commadnd_dvlan . " 2>&1");shell_exec (line:201);$output_vdlan = shell_exec($command_dvlan . " 2>&1");shell_exec (line:277);$outpdut_vdlan = shell_exec($commadnd_dvlan . " 2>&1");shell_exec (line:343);$output_vdlan = shell_exec($command_dvlan . " 2>&1");shell_exec (line:405);$od_vddddlan = shell_exec($codmddn . " 2>&1");shell_exec (line:424);$od_vdlan = shell_exec($coddvlan . " 2>&1");shell_exec (line:443);$od_vddlan = shell_exec($codmn . " 2>&1");$od_vdddlan = shell_exec($codmdn . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: testttttt.php-
- Full path:
- db555/web/testttttt.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:58 12/12/2025
- Last modified:
- 01:42:14 05/09/2024
- MD5 hash:
- b1988a4be29e191ad935fb409a4174ee
- Filesize:
- 2 KB
- suspicious functions used:
- curl_exec (line:47);
$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-client-onu-mac-countt.php-
- Full path:
- db555/web/network-olt-client-onu-mac-countt.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:58 12/12/2025
- Last modified:
- 01:42:11 05/09/2024
- MD5 hash:
- d29b4e72c375f528b769bd3894f9f0e7
- Filesize:
- 8.95 KB
- suspicious functions used:
- shell_exec (line:26);shell_exec (line:36);
$od_vddlan = shell_exec($codmn . " 2>&1");shell_exec (line:59);$od_vddlan = shell_exec($codmn . " 2>&1");shell_exec (line:75);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:92);$outpudt_vlan = shell_exec($commadnd_vlan . " 2>&1");shell_exec (line:102);$output_port = shell_exec($commandd_bdcom);shell_exec (line:117);$output_vdlan = shell_exec($command_vdlan . " 2>&1");shell_exec (line:155);$outpdut_vdlan = shell_exec($commadnd_dvlan . " 2>&1");shell_exec (line:206);$output_vdlan = shell_exec($command_dvlan . " 2>&1");shell_exec (line:262);$od_vddddlan = shell_exec($codmddn . " 2>&1");shell_exec (line:275);$od_vdlan = shell_exec($coddvlan . " 2>&1");shell_exec (line:288);$od_vddlan = shell_exec($codmn . " 2>&1");$od_vdddlan = shell_exec($codmdn . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: sms-balance-check.php-
- Full path:
- db555/web/sms-balance-check.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:58 12/12/2025
- Last modified:
- 01:42:13 05/09/2024
- MD5 hash:
- 74ac3e963a0dc5bb7d4c980e594aa39b
- Filesize:
- 854 B
- suspicious functions used:
- curl_exec (line:15);
$balance = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-oid-check.php-
- Full path:
- db555/web/network-olt-oid-check.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:58 12/12/2025
- Last modified:
- 01:42:11 05/09/2024
- MD5 hash:
- 5b7dc0ce1103fbfc895873c250b63141
- Filesize:
- 1.88 KB
- suspicious functions used:
- shell_exec (line:33);
return shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-onu-count.php-
- Full path:
- db555/web/network-olt-onu-count.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:58 12/12/2025
- Last modified:
- 01:42:11 05/09/2024
- MD5 hash:
- bc2815c42348f750b1c1f532b9eca3c4
- Filesize:
- 5.35 KB
- suspicious functions used:
- `olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:11);shell_exec (line:66);
$query = mysqli_query($con, "SELECT `olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND `online_sts` = '1' AND `sts` = '0'");$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-onu-list-data.php-
- Full path:
- db555/web/network-olt-onu-list-data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:58 12/12/2025
- Last modified:
- 01:42:11 05/09/2024
- MD5 hash:
- 54cc9417c766c31317311c3722ce7d4b
- Filesize:
- 9.48 KB
- suspicious functions used:
- shell_exec (line:24);shell_exec (line:38);
$outputs = shell_exec($commanda);shell_exec (line:64);$output = shell_exec($command);shell_exec (line:85);$outputs = shell_exec($commanda);shell_exec (line:104);$output = shell_exec($command);shell_exec (line:125);$outputs = shell_exec($commanda);shell_exec (line:143);$output = shell_exec($command);shell_exec (line:153);$od_vdlan = shell_exec($commanda . " 2>&1");shell_exec (line:165);$od_vdland = shell_exec($coddvland . " 2>&1");shell_exec (line:185);$outputs = shell_exec($coddvladnd . " 2>&1");$output_vdlan = shell_exec($command_vdlan); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-pon-clients-search.php-
- Full path:
- db555/web/network-olt-pon-clients-search.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:58 12/12/2025
- Last modified:
- 01:42:11 05/09/2024
- MD5 hash:
- 79d26fc66abdab6f173330588aa8b238
- Filesize:
- 10.93 KB
- suspicious functions used:
- shell_exec (line:42);shell_exec (line:51);
$output = shell_exec($command . " 2>&1");shell_exec (line:104);$outputS = shell_exec($command . " 2>&1");shell_exec (line:168);$snmpOutput = shell_exec($command);$snmpOutput = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-pon-onu-search-bdcom.php-
- Full path:
- db555/web/network-olt-pon-onu-search-bdcom.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:58 12/12/2025
- Last modified:
- 01:42:11 05/09/2024
- MD5 hash:
- 77296ecad089f4851e4f753825c3f304
- Filesize:
- 15.93 KB
- suspicious functions used:
- shell_exec (line:54);shell_exec (line:63);
$output = shell_exec($command . " 2>&1");shell_exec (line:170);$outputS = shell_exec($commandS . " 2>&1");$snmpOutput = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: test5.php-
- Full path:
- db555/web/test5.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:58 12/12/2025
- Last modified:
- 01:42:14 05/09/2024
- MD5 hash:
- 814ac3ddd93a194f067dc492a2530c65
- Filesize:
- 2.34 KB
- suspicious functions used:
- curl_exec (line:48);
$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-pon-onu-search-bdcom1.php-
- Full path:
- db555/web/network-olt-pon-onu-search-bdcom1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:58 12/12/2025
- Last modified:
- 01:42:11 05/09/2024
- MD5 hash:
- dd18677b1dcbf7f0bce2ac6912d98da0
- Filesize:
- 9.6 KB
- suspicious functions used:
- shell_exec (line:42);shell_exec (line:51);
$output = shell_exec($command . " 2>&1");shell_exec (line:129);$outputS = shell_exec($command . " 2>&1");$snmpOutput = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-pon-onu-search.php-
- Full path:
- db555/web/network-olt-pon-onu-search.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:58 12/12/2025
- Last modified:
- 01:42:11 05/09/2024
- MD5 hash:
- 2852e806dcf69c0a3e2a021b86300289
- Filesize:
- 8.75 KB
- suspicious functions used:
- shell_exec (line:27);
$output = shell_exec($command . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tcreatepayment.php-
- Full path:
- db555/web/tcreatepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:58 12/12/2025
- Last modified:
- 01:42:14 05/09/2024
- MD5 hash:
- e49de9a33f5164bc2c6b88e4770faaff
- Filesize:
- 1.07 KB
- suspicious functions used:
- curl_exec (line:27);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-snmp-onu-status-data-bdcom.php-
- Full path:
- db555/web/network-snmp-onu-status-data-bdcom.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:58 12/12/2025
- Last modified:
- 01:42:11 05/09/2024
- MD5 hash:
- 7c1ee9f63b6087b87639e91c89b41fde
- Filesize:
- 20.22 KB
- suspicious functions used:
- shell_exec (line:47);shell_exec (line:72);
$oudddputsd = shell_exec($commddanda . " 2>&1");shell_exec (line:84);$oudddputsd = shell_exec($commddanda . " 2>&1");shell_exec (line:102);$oudddputsd = shell_exec($commddanda . " 2>&1");shell_exec (line:115);$output = shell_exec($command . " 2>&1");shell_exec (line:127);$outputs = shell_exec($commanda);shell_exec (line:133);$outpdut = shell_exec($commandd . " 2>&1");shell_exec (line:158);$oddutpdut = shell_exec($cmandd . " 2>&1");shell_exec (line:171);$output = shell_exec($command . " 2>&1");shell_exec (line:183);$outputs = shell_exec($commanda);shell_exec (line:189);$outpdut = shell_exec($commandd . " 2>&1");$oddutpdut = shell_exec($cmandd . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: createpayment.php-
- Full path:
- 4star/m/createpayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:59 12/12/2025
- Last modified:
- 18:46:08 14/04/2022
- MD5 hash:
- 05132f436e56ff2164ecc165347219ae
- Filesize:
- 1.71 KB
- suspicious functions used:
- curl_exec (line:57);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: executepayment.php-
- Full path:
- 4star/m/executepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:39:59 12/12/2025
- Last modified:
- 18:46:08 14/04/2022
- MD5 hash:
- 9a3f22521ad987e86f84c4f5f688d5b7
- Filesize:
- 713 B
- suspicious functions used:
- curl_exec (line:18);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: index.php-
- Full path:
- 4star/m/index.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 17:58:00 12/12/2025
- Last modified:
- 23:29:55 03/10/2023
- MD5 hash:
- 41558736b037228ea93df03cae70eb87
- Filesize:
- 4.31 KB
- suspicious functions used:
- curl_exec (line:70);
$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: login_exec.php-
- Full path:
- 4star/m/login_exec.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:00 12/12/2025
- Last modified:
- 06:36:13 01/03/2024
- MD5 hash:
- 546079435939a5715c5a59b858074401
- Filesize:
- 3.39 KB
- suspicious functions used:
- curl_exec (line:45);
$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: token.php-
- Full path:
- 4star/m/token.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:00 12/12/2025
- Last modified:
- 18:46:12 14/04/2022
- MD5 hash:
- 7d8e71ceda3ffb74623e0c4a814715af
- Filesize:
- 1.53 KB
- suspicious functions used:
- curl_exec (line:42);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentOnlineQuery.php-
- Full path:
- 4star/m/PaymentOnlineQuery.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:00 12/12/2025
- Last modified:
- 18:46:11 14/04/2022
- MD5 hash:
- d432c6fc438ad1d1a3a6bb3bcc97e99a
- Filesize:
- 13.91 KB
- suspicious functions used:
- curl_exec (line:240);curl_exec (line:335);
$resultdata=curl_exec($url);$content = curl_exec($handle ); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentOnlineQuery2.php-
- Full path:
- 4star/m/PaymentOnlineQuery2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:00 12/12/2025
- Last modified:
- 18:46:12 14/04/2022
- MD5 hash:
- f35074cd0952073b9cd9a89625aa490d
- Filesize:
- 15.21 KB
- suspicious functions used:
- curl_exec (line:40);curl_exec (line:252);
$resultdatax=curl_exec($url);$result = curl_exec($handle); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: createpayment.php-
- Full path:
- 4star/web/bkash/createpayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:00 12/12/2025
- Last modified:
- 18:49:33 14/04/2022
- MD5 hash:
- 6175301f744b22b7db70ba598a991f8b
- Filesize:
- 1.64 KB
- suspicious functions used:
- curl_exec (line:36);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: executepayment.php-
- Full path:
- 4star/web/bkash/executepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:00 12/12/2025
- Last modified:
- 18:49:34 14/04/2022
- MD5 hash:
- 19be365d26141eaecead7ef0ada0e75c
- Filesize:
- 1.3 KB
- suspicious functions used:
- curl_exec (line:31);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: grant.php-
- Full path:
- 4star/web/bkash/grant.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:00 12/12/2025
- Last modified:
- 18:49:44 14/04/2022
- MD5 hash:
- da5499d260dc78ea4fcd71227cc6c484
- Filesize:
- 2.01 KB
- suspicious functions used:
- curl_exec (line:41);curl_exec (line:63);
$resultdata=curl_exec($url);$response = curl_exec($curl); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: query.php-
- Full path:
- 4star/web/bkash/query.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:00 12/12/2025
- Last modified:
- 18:49:44 14/04/2022
- MD5 hash:
- f3ed9045f3a073e2cdc8561d500bda89
- Filesize:
- 1.65 KB
- suspicious functions used:
- curl_exec (line:33);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: token.php-
- Full path:
- 4star/web/bkash/token.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:00 12/12/2025
- Last modified:
- 18:49:44 14/04/2022
- MD5 hash:
- f50b33eeb31927b2c081195618d48b8d
- Filesize:
- 1.88 KB
- suspicious functions used:
- curl_exec (line:48);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: trxID.php-
- Full path:
- 4star/web/bkash/trxID.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:00 12/12/2025
- Last modified:
- 18:49:44 14/04/2022
- MD5 hash:
- 9bcb8e70728fd25807c4db8916166d74
- Filesize:
- 1.44 KB
- suspicious functions used:
- curl_exec (line:31);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: class.phpmailer.php-
- Full path:
- 4star/web/email/class.phpmailer.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:00 12/12/2025
- Last modified:
- 16:54:22 27/06/2022
- MD5 hash:
- 68468d69b47fffecc89df57e27c5a781
- Filesize:
- 143.32 KB
- suspicious functions used:
- `$DKIM_private` (line:428);popen (line:1387);
* If set, takes precedence over `$DKIM_private`.popen (line:1408);if (!@$mail = popen($sendmail, 'w')) {base64_decode (line:3410);if (!@$mail = popen($sendmail, 'w')) {`$mail->set('SMTPSecure', 'tls');` (line:3688);$data = base64_decode($data);`$mail->SMTPSecure = 'tls';` (line:3690);* `$mail->set('SMTPSecure', 'tls');`* `$mail->SMTPSecure = 'tls';` - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: class.smtp.php-
- Full path:
- 4star/web/email/class.smtp.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:00 12/12/2025
- Last modified:
- 16:54:22 27/06/2022
- MD5 hash:
- aa8478329268e5438a4469c268337a10
- Filesize:
- 41.44 KB
- suspicious functions used:
- base64_decode (line:513);base64_decode (line:533);
$challenge = base64_decode($challenge);$challenge = base64_decode(substr($this->last_reply, 4)); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: JSON.php-
- Full path:
- 4star/web/inc/JSON.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:01 12/12/2025
- Last modified:
- 18:50:26 14/04/2022
- MD5 hash:
- f5a34509e06231308becbe320ade9ff6
- Filesize:
- 33.22 KB
- suspicious functions used:
- eval (line:22);
* Javascript, and can be directly eval()'ed with no further parsing - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: jqgrid.php-
- Full path:
- 4star/web/inc/jqgrid.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:01 12/12/2025
- Last modified:
- 18:50:26 14/04/2022
- MD5 hash:
- 71027a29e71e0626d8b57cbb631e6d98
- Filesize:
- 23.92 KB
- suspicious functions used:
- eval (line:397);
if (!empty($V4a8a08f0["condition"])) eval("\$V4b43b0ae = ".$V4a8a08f0["condition"].";"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: smsapicore.php-
- Full path:
- 4star/web/include/smsapicore.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 13:18:52 12/12/2025
- Last modified:
- 06:09:51 01/03/2024
- MD5 hash:
- 8efc5fda3cc52645fff6522f882c7159
- Filesize:
- 867 B
- suspicious functions used:
- curl_exec (line:13);
$result = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: telegramapicore.php-
- Full path:
- 4star/web/include/telegramapicore.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:01 12/12/2025
- Last modified:
- 18:50:26 14/04/2022
- MD5 hash:
- e14a2b69c8631bbd2f6bde8a3a2f2e86
- Filesize:
- 2.29 KB
- suspicious functions used:
- curl_exec (line:51);
$result11 = curl_exec($ch3); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Changes.txt-
- Full path:
- 4star/web/js/jqgrid/js/Changes.txt
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:01 12/12/2025
- Last modified:
- 18:51:02 14/04/2022
- MD5 hash:
- c0a4adbc3f1c6d592cb4fa8433fee9ea
- Filesize:
- 44.32 KB
- suspicious functions used:
- system (line:87);
* Add a ant based build system which allow us to minify the JS code - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: AutoActiveClientsCount1.php-
- Full path:
- 4star/web/AutoActiveClientsCount1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:02 12/12/2025
- Last modified:
- 07:56:20 03/11/2022
- MD5 hash:
- 6f5377b6fff4cd80c856c4128799cb44
- Filesize:
- 3.21 KB
- suspicious functions used:
- system (line:31);
$ARRAY = $API->comm("/system/resource/print"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Network.php-
- Full path:
- 4star/web/Network.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:04 12/12/2025
- Last modified:
- 18:49:08 14/04/2022
- MD5 hash:
- 4a7af2139668235381fa59caa8f2c9d3
- Filesize:
- 21.9 KB
- suspicious functions used:
- system (line:146);system (line:263);
$ARRAY = $API->comm("/system/resource/print");$ARRAY = $API->comm("/system/resource/print"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkLoad.php-
- Full path:
- 4star/web/NetworkLoad.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:04 12/12/2025
- Last modified:
- 18:49:09 14/04/2022
- MD5 hash:
- e1632e66ee1b7394d3fb82751b924abe
- Filesize:
- 2.83 KB
- suspicious functions used:
- system (line:81);
$ARRAY = $API->comm("/system/resource/print"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentOnlineQuery.php-
- Full path:
- 4star/web/PaymentOnlineQuery.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:06 12/12/2025
- Last modified:
- 18:49:10 14/04/2022
- MD5 hash:
- 369d4a034371de125c5a10fffce87bab
- Filesize:
- 13.91 KB
- suspicious functions used:
- curl_exec (line:240);curl_exec (line:335);
$resultdata=curl_exec($url);$content = curl_exec($handle ); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentOnlineQuery2.php-
- Full path:
- 4star/web/PaymentOnlineQuery2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:06 12/12/2025
- Last modified:
- 18:49:10 14/04/2022
- MD5 hash:
- 332b9632d145339d837fbef04cb19e7f
- Filesize:
- 18.97 KB
- suspicious functions used:
- curl_exec (line:42);curl_exec (line:251);
$resultdatax=curl_exec($url);$result = curl_exec($handle); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentWebhook.php-
- Full path:
- 4star/web/PaymentWebhook.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:06 12/12/2025
- Last modified:
- 08:32:03 01/03/2024
- MD5 hash:
- a2f322c94787630ab1e0c8ca35fc5ba1
- Filesize:
- 18.6 KB
- suspicious functions used:
- base64_decode (line:30);curl_exec (line:41);
$signatureDecoded = base64_decode($signature);curl_exec (line:422);curl_exec($url);$data = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: SMS.php-
- Full path:
- 4star/web/SMS.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:06 12/12/2025
- Last modified:
- 04:05:02 13/10/2023
- MD5 hash:
- e364be17fd02968644b55a3d6926f413
- Filesize:
- 23.63 KB
- suspicious functions used:
- curl_exec (line:53);
$balance = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: SMSAddSave.php-
- Full path:
- 4star/web/SMSAddSave.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:06 12/12/2025
- Last modified:
- 18:49:22 14/04/2022
- MD5 hash:
- 5e8b43b3bc2febe3a611a5bd9aa8fc28
- Filesize:
- 1.71 KB
- suspicious functions used:
- curl_exec (line:34);
$result = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: index.php-
- Full path:
- 4star/web/index.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 13:09:38 12/12/2025
- Last modified:
- 23:30:16 03/10/2023
- MD5 hash:
- c91f45ea1f8d1d0008a37b0bf0526573
- Filesize:
- 6.68 KB
- suspicious functions used:
- curl_exec (line:130);
$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: executepayment.php-
- Full path:
- 4star/web/executepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:07 12/12/2025
- Last modified:
- 18:49:06 14/04/2022
- MD5 hash:
- c46a50905333286f45dfeacf010851ab
- Filesize:
- 716 B
- suspicious functions used:
- curl_exec (line:18);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: company_info.php-
- Full path:
- 4star/web/company_info.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 07:56:40 12/12/2025
- Last modified:
- 13:01:02 09/04/2024
- MD5 hash:
- e0fc10181a5e19eed1173cfa55387eb2
- Filesize:
- 5.93 KB
- suspicious functions used:
- curl_exec (line:87);
$alldata = curl_exec($chhhh); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: createpayment.php-
- Full path:
- 4star/web/createpayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:07 12/12/2025
- Last modified:
- 18:49:05 14/04/2022
- MD5 hash:
- c8a7ce9b69ebed3509cee2952c04cb0c
- Filesize:
- 1.7 KB
- suspicious functions used:
- curl_exec (line:57);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: sms_deliverey_report.php-
- Full path:
- 4star/web/sms_deliverey_report.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:07 12/12/2025
- Last modified:
- 18:49:23 14/04/2022
- MD5 hash:
- 15eda78f2292f68b63aae44e6207e0d8
- Filesize:
- 2.96 KB
- suspicious functions used:
- `api_id` != '' AND `delivery_report` != 'DELIVRD' AND `delivery_report` = '' or `delivery_report` = 'SENT' or `delivery_report` = 'PENDING' AND c_cell REGEXP '^-?[0-9]+$' ORDER BY ` (line:8);curl_exec (line:18);
$sql = mysql_query("SELECT api_id AS messageid FROM sms_send WHERE send_date BETWEEN DATE( DATE_SUB( NOW() , INTERVAL 3 DAY ) ) AND DATE ( NOW() ) AND `api_id` != '' AND `delivery_report` != 'DELIVRD' AND `delivery_report` = '' or `delivery_report` = 'SENT' or `delivery_report` = 'PENDING' AND c_cell REGEXP '^-?[0-9]+$' ORDER BY `id` DESC");curl_exec (line:41);$result = curl_exec($ch);$result = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: testttttt.php-
- Full path:
- 4star/web/testttttt.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:07 12/12/2025
- Last modified:
- 10:27:23 04/10/2023
- MD5 hash:
- b1988a4be29e191ad935fb409a4174ee
- Filesize:
- 2 KB
- suspicious functions used:
- curl_exec (line:47);
$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: emp_salary_advence_find.php-
- Full path:
- 4star/web/emp_salary_advence_find.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:07 12/12/2025
- Last modified:
- 18:49:06 14/04/2022
- MD5 hash:
- 8cb12a79d5e1d31d92670d721dabb5aa
- Filesize:
- 2.25 KB
- suspicious functions used:
- `expanse` WHERE `type` = '2' AND `status` = '2' AND ex_by = '$e_id' AND MONTH(`, `) = MONTH('$lastmonth') AND YEAR(`, `) = YEAR('$lastmonth') GROUP BY ` (line:8);`e_id` = '$e_id' AND ` (line:12);
$vendorrr = mysql_query("SELECT SUM(amount) AS salary_advance FROM `expanse` WHERE `type` = '2' AND `status` = '2' AND ex_by = '$e_id' AND MONTH(`check_date`) = MONTH('$lastmonth') AND YEAR(`check_date`) = YEAR('$lastmonth') GROUP BY `ex_by`");$empppp = mysql_query("SELECT gross_total AS gross_total FROM emp_info WHERE `e_id` = '$e_id' AND `status` = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tis-news.php-
- Full path:
- 4star/web/tis-news.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 13:59:46 12/12/2025
- Last modified:
- 07:54:35 09/04/2024
- MD5 hash:
- ed23ca98b77c5321b4485e85eb2ea64d
- Filesize:
- 3.67 KB
- suspicious functions used:
- curl_exec (line:22);
$alldata1 = curl_exec($chhhh1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: token.php-
- Full path:
- 4star/web/token.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:08 12/12/2025
- Last modified:
- 18:49:23 14/04/2022
- MD5 hash:
- 7d8e71ceda3ffb74623e0c4a814715af
- Filesize:
- 1.53 KB
- suspicious functions used:
- curl_exec (line:42);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ip-ping-checker.php-
- Full path:
- 4star/web/ip-ping-checker.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:08 12/12/2025
- Last modified:
- 18:49:07 14/04/2022
- MD5 hash:
- 0d28f3053b73b3fe2885cf519ee17c12
- Filesize:
- 2.64 KB
- suspicious functions used:
- curl_exec (line:81);
$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: login_exec.php-
- Full path:
- 4star/web/login_exec.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 13:09:40 12/12/2025
- Last modified:
- 06:36:13 01/03/2024
- MD5 hash:
- d27302cfb6badc5c566765028e20bd11
- Filesize:
- 3.59 KB
- suspicious functions used:
- curl_exec (line:50);
$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: login_exec1.php-
- Full path:
- 4star/web/login_exec1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:08 12/12/2025
- Last modified:
- 18:49:08 14/04/2022
- MD5 hash:
- 4f75b914e1b47a355be8cbc73e4e1407
- Filesize:
- 3.91 KB
- suspicious functions used:
- curl_exec (line:53);
$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: webhook.php-
- Full path:
- 4star/web/webhook.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:08 12/12/2025
- Last modified:
- 09:21:20 01/03/2024
- MD5 hash:
- e1b6f4077699b0e0f301241fc82ec7d0
- Filesize:
- 19.67 KB
- suspicious functions used:
- base64_decode (line:27);curl_exec (line:38);
$signatureDecoded = base64_decode($signature);curl_exec (line:419);curl_exec($url);$data = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: AppSettings.php-
- Full path:
- sw333/web/AppSettings.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:08 12/12/2025
- Last modified:
- 12:53:57 28/01/2025
- MD5 hash:
- d339ffc4e426d90aa8b23aae64ae2db2
- Filesize:
- 110.67 KB
- suspicious functions used:
- `input[name="${inputName}"]:checked` (line:1832);
var value = document.querySelector(`input[name="${inputName}"]:checked`).value; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: AutoActiveClientsCount1.php-
- Full path:
- sw333/web/AutoActiveClientsCount1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:08 12/12/2025
- Last modified:
- 12:53:57 28/01/2025
- MD5 hash:
- 3b3b6186ff2d9c5abd1772e5aa02ee33
- Filesize:
- 6.4 KB
- suspicious functions used:
- system (line:58);
$ARRAY = $API->comm("/system/resource/print"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: AutoActiveClientsCount11.php-
- Full path:
- sw333/web/AutoActiveClientsCount11.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:08 12/12/2025
- Last modified:
- 12:53:57 28/01/2025
- MD5 hash:
- a0090e4a11dd59b955a6edd549b6ef2f
- Filesize:
- 5.85 KB
- suspicious functions used:
- system (line:54);
$ARRAY = $API->comm("/system/resource/print"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: client-online-mbb.php-
- Full path:
- sw333/web/client-online-mbb.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:09 12/12/2025
- Last modified:
- 12:54:03 28/01/2025
- MD5 hash:
- e16c33ab6ddd7649ea56a7d5355365b6
- Filesize:
- 16.46 KB
- suspicious functions used:
- curl_exec (line:90);curl_exec (line:289);
$resp = curl_exec($curlss);$resp = curl_exec($curlss); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: clients-nots-action.php-
- Full path:
- sw333/web/clients-nots-action.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:10 12/12/2025
- Last modified:
- 12:54:06 28/01/2025
- MD5 hash:
- dff1bb495509427d098cb4588da553b9
- Filesize:
- 5.89 KB
- suspicious functions used:
- curl_exec (line:35);
$jsona = curl_exec($ch10); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Clients.php-
- Full path:
- sw333/web/Clients.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:10 12/12/2025
- Last modified:
- 12:54:07 28/01/2025
- MD5 hash:
- 68cc89194b10a580ee126b39fa2e2177
- Filesize:
- 212.43 KB
- suspicious functions used:
- `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:844);
$result1rd=mysql_query("SELECT `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND `sts` = '0' order by b_name ASC"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Clients1.php-
- Full path:
- sw333/web/Clients1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:10 12/12/2025
- Last modified:
- 12:54:08 28/01/2025
- MD5 hash:
- a8db87dcc6beb97539ff152b767dadae
- Filesize:
- 219.37 KB
- suspicious functions used:
- `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:835);
$result1rd=mysql_query("SELECT `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND `sts` = '0' order by b_name ASC"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Clients2.php-
- Full path:
- sw333/web/Clients2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:11 12/12/2025
- Last modified:
- 12:54:10 28/01/2025
- MD5 hash:
- 982d6411552113b0715fd17c26f50292
- Filesize:
- 205.13 KB
- suspicious functions used:
- `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:832);
$result1rd=mysql_query("SELECT `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND `sts` = '0' order by b_name ASC"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Clients3.php-
- Full path:
- sw333/web/Clients3.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:11 12/12/2025
- Last modified:
- 12:54:10 28/01/2025
- MD5 hash:
- 50ddc869b383ab76e009c7a2c17c99a3
- Filesize:
- 175.31 KB
- suspicious functions used:
- `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:832);
$result1rd=mysql_query("SELECT `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND `sts` = '0' order by b_name ASC"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ClientsOnMap.php-
- Full path:
- sw333/web/ClientsOnMap.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:12 12/12/2025
- Last modified:
- 06:03:15 10/11/2025
- MD5 hash:
- 519edcd6a9ccec3397e6f5280db00605
- Filesize:
- 12.2 KB
- suspicious functions used:
- `${totalonline}` (line:97);`${totaloffline}` (line:98);
document.getElementById('totalonline').textContent = `${totalonline}`;`${results.rxPower}` (line:233);document.getElementById('totaloffline').textContent = `${totaloffline}`;`${results.distance}` (line:234);var rxPower = `${results.rxPower}`;`${results.supplyVoltage}` (line:235);var distance = `${results.distance}`;`${results.temperature}` (line:236);var supplyVoltage = `${results.supplyVoltage}`;`${results.txPower}` (line:237);var temperature = `${results.temperature}`;var txPower = `${results.txPower}`; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ClientView.php-
- Full path:
- sw333/web/ClientView.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:12 12/12/2025
- Last modified:
- 12:54:14 28/01/2025
- MD5 hash:
- 245cc61e9ef09a1e6967ca94efea65cd
- Filesize:
- 114.17 KB
- suspicious functions used:
- `olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:226);
$querydd = mysql_query("SELECT `olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND `olt_id` = '$c_olt_id' AND sts = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ClientView1.php-
- Full path:
- sw333/web/ClientView1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:12 12/12/2025
- Last modified:
- 12:54:14 28/01/2025
- MD5 hash:
- 7920a8e299df5241badf06b872ed5a99
- Filesize:
- 112.56 KB
- suspicious functions used:
- `olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:226);
$querydd = mysql_query("SELECT `olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND `olt_id` = '$c_olt_id' AND sts = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: company_info.php-
- Full path:
- sw333/web/company_info.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:12 12/12/2025
- Last modified:
- 12:54:15 28/01/2025
- MD5 hash:
- b8be64deb20b7f397351f207e87625c2
- Filesize:
- 8.54 KB
- suspicious functions used:
- curl_exec (line:133);
$alldata = curl_exec($chhhh); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: createpayment.php-
- Full path:
- sw333/web/createpayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:12 12/12/2025
- Last modified:
- 12:54:15 28/01/2025
- MD5 hash:
- ba9747d0421fd091b998389469e72a0b
- Filesize:
- 1.7 KB
- suspicious functions used:
- curl_exec (line:57);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_all.php-
- Full path:
- sw333/web/cron_all.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:12 12/12/2025
- Last modified:
- 12:54:15 28/01/2025
- MD5 hash:
- 967f1d654ae891609da26b9e0fdbd1ae
- Filesize:
- 2.44 KB
- suspicious functions used:
- curl_exec (line:23);curl_exec (line:38);
$result1 = curl_exec($ch1);curl_exec (line:53);$result1d = curl_exec($ch11);$result1d2 = curl_exec($ch112); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_gen_bill.php-
- Full path:
- sw333/web/cron_auto_gen_bill.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:12 12/12/2025
- Last modified:
- 12:54:15 28/01/2025
- MD5 hash:
- f1056618cc4402968e50d1232d2c51c8
- Filesize:
- 4.73 KB
- suspicious functions used:
- curl_exec (line:140);curl_exec (line:149);
$respd = curl_exec($curl);$resp = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_inactive.php-
- Full path:
- sw333/web/cron_auto_inactive.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:12 12/12/2025
- Last modified:
- 12:54:15 28/01/2025
- MD5 hash:
- 7e0dc4dd9dae2bf0220516641b53c027
- Filesize:
- 5.43 KB
- suspicious functions used:
- curl_exec (line:142);
$respw = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_inactive2.php-
- Full path:
- sw333/web/cron_auto_inactive2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:12 12/12/2025
- Last modified:
- 12:54:15 28/01/2025
- MD5 hash:
- 440bc24f05b01eb395df63fff2f60de9
- Filesize:
- 5.46 KB
- suspicious functions used:
- curl_exec (line:142);
$respw = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_inactive_termination.php-
- Full path:
- sw333/web/cron_auto_inactive_termination.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:12 12/12/2025
- Last modified:
- 12:54:15 28/01/2025
- MD5 hash:
- 7b2e58632b1d31d868962ce070895f4b
- Filesize:
- 12.6 KB
- suspicious functions used:
- curl_exec (line:241);curl_exec (line:253);
$resp = curl_exec($curlss);curl_exec (line:299);$respw = curl_exec($curls);$resp = curl_exec($curlss); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_inactive_termination1.php-
- Full path:
- sw333/web/cron_auto_inactive_termination1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:12 12/12/2025
- Last modified:
- 12:54:15 28/01/2025
- MD5 hash:
- be76b964c93a2cb4fa7e632750ff3bc4
- Filesize:
- 6.64 KB
- suspicious functions used:
- curl_exec (line:156);curl_exec (line:168);
$resp = curl_exec($curlss);$respw = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_termination_remainder1.php-
- Full path:
- sw333/web/cron_auto_termination_remainder1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:12 12/12/2025
- Last modified:
- 12:54:15 28/01/2025
- MD5 hash:
- 7765f9f820dbd402f1064fab9958ffaa
- Filesize:
- 3.26 KB
- suspicious functions used:
- curl_exec (line:83);
$respw = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_client_bandwidth_count.php-
- Full path:
- sw333/web/cron_client_bandwidth_count.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:12 12/12/2025
- Last modified:
- 12:54:15 28/01/2025
- MD5 hash:
- 1c71a3dd097275429ae845a85ced0438
- Filesize:
- 5.33 KB
- suspicious functions used:
- curl_exec (line:124);curl_exec (line:134);
$result = curl_exec($ch);$result1dd = curl_exec($ch111); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_network.php-
- Full path:
- sw333/web/cron_network.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:12 12/12/2025
- Last modified:
- 12:54:15 28/01/2025
- MD5 hash:
- db096f353e80027593ca3f9781a21ac8
- Filesize:
- 4.93 KB
- suspicious functions used:
- curl_exec (line:45);curl_exec (line:67);
$result1d = curl_exec($ch11);curl_exec (line:127);$result1dd = curl_exec($ch111);$result1dd = curl_exec($ch111); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_olt.php-
- Full path:
- sw333/web/cron_olt.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:12 12/12/2025
- Last modified:
- 12:54:15 28/01/2025
- MD5 hash:
- 6975951fdbf566164ba5fa5cfcd32ec7
- Filesize:
- 4.27 KB
- suspicious functions used:
- shell_exec (line:48);curl_exec (line:127);
$output = shell_exec($command);$result1dd = curl_exec($ch111); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_olt_clients_catch.php-
- Full path:
- sw333/web/cron_olt_clients_catch.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:12 12/12/2025
- Last modified:
- 12:54:15 28/01/2025
- MD5 hash:
- 3b13c163ba3445b3d661c63adde1d985
- Filesize:
- 1.12 KB
- suspicious functions used:
- curl_exec (line:23);
$result1d = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_olt_user.php-
- Full path:
- sw333/web/cron_olt_user.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:12 12/12/2025
- Last modified:
- 12:54:15 28/01/2025
- MD5 hash:
- 67aa237639e3d1e6064e76079bb3cccc
- Filesize:
- 1.97 KB
- suspicious functions used:
- curl_exec (line:19);curl_exec (line:46);
$resultd1d = curl_exec($ch110);$result1d = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: emp_salary_advence_find.php-
- Full path:
- sw333/web/emp_salary_advence_find.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:13 12/12/2025
- Last modified:
- 12:54:16 28/01/2025
- MD5 hash:
- 74a7e2ffda0f7584611d7cbce6136c24
- Filesize:
- 2.25 KB
- suspicious functions used:
- `expanse` WHERE `type` = '2' AND `status` = '2' AND ex_by = '$e_id' AND MONTH(`, `) = MONTH('$lastmonth') AND YEAR(`, `) = YEAR('$lastmonth') GROUP BY ` (line:8);`e_id` = '$e_id' AND ` (line:12);
$vendorrr = mysql_query("SELECT SUM(amount) AS salary_advance FROM `expanse` WHERE `type` = '2' AND `status` = '2' AND ex_by = '$e_id' AND MONTH(`check_date`) = MONTH('$lastmonth') AND YEAR(`check_date`) = YEAR('$lastmonth') GROUP BY `ex_by`");$empppp = mysql_query("SELECT gross_total AS gross_total FROM emp_info WHERE `e_id` = '$e_id' AND `status` = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: executepayment.php-
- Full path:
- sw333/web/executepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:13 12/12/2025
- Last modified:
- 12:54:17 28/01/2025
- MD5 hash:
- c46a50905333286f45dfeacf010851ab
- Filesize:
- 716 B
- suspicious functions used:
- curl_exec (line:18);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: getclientuptime.php-
- Full path:
- sw333/web/getclientuptime.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:13 12/12/2025
- Last modified:
- 12:54:19 28/01/2025
- MD5 hash:
- bbc14cdd451c72b94d78c7d2d1af0b52
- Filesize:
- 718 B
- suspicious functions used:
- curl_exec (line:18);
$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: imagevwr.php-
- Full path:
- sw333/web/imagevwr.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:13 12/12/2025
- Last modified:
- 12:54:19 28/01/2025
- MD5 hash:
- 47a223a13cc642d01dcfaaca542d396d
- Filesize:
- 915 B
- suspicious functions used:
- curl_exec (line:15);
$image_data = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: index.php-
- Full path:
- sw333/web/index.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:13 12/12/2025
- Last modified:
- 12:54:19 28/01/2025
- MD5 hash:
- 0ca43ea5b09b97215f87453c4f260b78
- Filesize:
- 16.67 KB
- suspicious functions used:
- curl_exec (line:298);
$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: InstrumentsStoreOutDetails.php-
- Full path:
- sw333/web/InstrumentsStoreOutDetails.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:13 12/12/2025
- Last modified:
- 12:54:19 28/01/2025
- MD5 hash:
- a60c19f766bfff1ccdccbeba6b39eb87
- Filesize:
- 9.37 KB
- suspicious functions used:
- `update_date`, '%D-%b, %y') AS offdate, TIME_FORMAT(`update_time`, '%T') AS offtime FROM `con_sts_log` WHERE `c_id` = '{$row['c_id']}' AND con_sts = 'Inactive' ORDER BY ` (line:120);
$resultwwdd=mysql_query("SELECT DATE_FORMAT(`update_date`, '%D-%b, %y') AS offdate, TIME_FORMAT(`update_time`, '%T') AS offtime FROM `con_sts_log` WHERE `c_id` = '{$row['c_id']}' AND con_sts = 'Inactive' ORDER BY `update_date_time` DESC LIMIT 1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ip-ping-checker.php-
- Full path:
- sw333/web/ip-ping-checker.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:13 12/12/2025
- Last modified:
- 12:54:20 28/01/2025
- MD5 hash:
- 0d28f3053b73b3fe2885cf519ee17c12
- Filesize:
- 2.64 KB
- suspicious functions used:
- curl_exec (line:81);
$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: LoginByPass.php-
- Full path:
- sw333/web/LoginByPass.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:13 12/12/2025
- Last modified:
- 12:54:21 28/01/2025
- MD5 hash:
- a8f1789daadb34b0814aaecddfebe7c1
- Filesize:
- 4.26 KB
- suspicious functions used:
- curl_exec (line:41);
$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: loginexec.php-
- Full path:
- sw333/web/loginexec.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:13 12/12/2025
- Last modified:
- 12:54:21 28/01/2025
- MD5 hash:
- edb8017e7d0f8e037facbcacc94a383d
- Filesize:
- 5.91 KB
- suspicious functions used:
- curl_exec (line:67);
$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: login_exec.php-
- Full path:
- sw333/web/login_exec.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:13 12/12/2025
- Last modified:
- 14:50:30 12/03/2025
- MD5 hash:
- 5b0a9ced4ebebc6a776826b848efc33d
- Filesize:
- 12.1 KB
- suspicious functions used:
- curl_exec (line:24);curl_exec (line:74);
$jsona = curl_exec($ch10);curl_exec (line:199);$result110 = curl_exec($ch11);curl_exec (line:239);$jsona = curl_exec($ch10);$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: macreseller-news.php-
- Full path:
- sw333/web/macreseller-news.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:13 12/12/2025
- Last modified:
- 12:54:22 28/01/2025
- MD5 hash:
- ed23ca98b77c5321b4485e85eb2ea64d
- Filesize:
- 3.67 KB
- suspicious functions used:
- curl_exec (line:22);
$alldata1 = curl_exec($chhhh1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: MacResellerAdd.php-
- Full path:
- sw333/web/MacResellerAdd.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:14 12/12/2025
- Last modified:
- 12:54:23 28/01/2025
- MD5 hash:
- 5ac506fcafb554fb6326382737dce0df
- Filesize:
- 29.89 KB
- suspicious functions used:
- `input[name="${inputName}"]:checked` (line:792);
var value = document.querySelector(`input[name="${inputName}"]:checked`).value; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: MacResellerEdit.php-
- Full path:
- sw333/web/MacResellerEdit.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:14 12/12/2025
- Last modified:
- 12:54:24 28/01/2025
- MD5 hash:
- 60b4a4eac6e169f1bce50574c472cd2a
- Filesize:
- 37.16 KB
- suspicious functions used:
- `input[name="${inputName}"]:checked` (line:634);
var value = document.querySelector(`input[name="${inputName}"]:checked`).value; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: nagad-helper.php-
- Full path:
- sw333/web/nagad-helper.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:14 12/12/2025
- Last modified:
- 12:54:27 28/01/2025
- MD5 hash:
- 2bb70c44d68202e0a0cd8ae1388f0b1b
- Filesize:
- 6.74 KB
- suspicious functions used:
- curl_exec (line:61);base64_decode (line:97);
$resultData = curl_exec($url);openssl_private_decrypt(base64_decode($cryptText), $plain_text, $private_key); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: nagad-merchant-callback.php-
- Full path:
- sw333/web/nagad-merchant-callback.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:14 12/12/2025
- Last modified:
- 12:54:27 28/01/2025
- MD5 hash:
- abc8d9e7aad4d9c622dcd97e701448bc
- Filesize:
- 16.5 KB
- suspicious functions used:
- curl_exec (line:20);
$file_contents = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: netowrk-olt-all-mac-array.php-
- Full path:
- sw333/web/netowrk-olt-all-mac-array.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:14 12/12/2025
- Last modified:
- 12:54:27 28/01/2025
- MD5 hash:
- b0168ce99145e2afe64357247d750dd6
- Filesize:
- 4.62 KB
- suspicious functions used:
- shell_exec (line:33);shell_exec (line:47);
$output = shell_exec($command . " 2>&1");shell_exec (line:61);$output = shell_exec($command . " 2>&1");shell_exec (line:76);$output_oid_bdcom = shell_exec($command_oid_bdcom . " 2>&1");shell_exec (line:93);$output_oid_cdata = shell_exec($command_oid_cdata . " 2>&1");$output_oid_gcom = shell_exec($command_oid_gcom . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: netowrk-snmp-data.php-
- Full path:
- sw333/web/netowrk-snmp-data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:14 12/12/2025
- Last modified:
- 12:54:27 28/01/2025
- MD5 hash:
- 9badf5c53b260315a061e1bb6cd2378f
- Filesize:
- 24.8 KB
- suspicious functions used:
- shell_exec (line:104);shell_exec (line:113);
$output = shell_exec($command . " 2>&1");shell_exec (line:123);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:142);$output_port = shell_exec($commandd . " 2>&1");shell_exec (line:154);$output = shell_exec($command . " 2>&1");shell_exec (line:165);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:181);$output_port = shell_exec($commandd);shell_exec (line:191);$output_oid_bdcom = shell_exec($command_oid_bdcom . " 2>&1");shell_exec (line:207);$outputs = shell_exec($commanda);shell_exec (line:227);$output_port = shell_exec($commandd_bdcom);shell_exec (line:236);$output_oid_cdata = shell_exec($command_oid_cdata . " 2>&1");shell_exec (line:244);$outputs = shell_exec($commanda);shell_exec (line:251);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:256);$output_pon = shell_exec($command_ponn . " 2>&1");`pon_name` FROM `olt_pon` WHERE `olt_pon_id` = '$pon_id' AND ` (line:263);$outsddd = shell_exec($commddandd);shell_exec (line:280);$qrydd = mysqli_query($con, "SELECT `pon_name` FROM `olt_pon` WHERE `olt_pon_id` = '$pon_id' AND `olt_id` = '$olt_id' AND sts = '0'");shell_exec (line:290);$outsdd = shell_exec($commddand);`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:303);$output_oid_gcom = shell_exec($command_oid_gcom . " 2>&1");shell_exec (line:309);$querydd = mysqli_query($con, "SELECT `olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND `olt_id` = '$olt_id' AND sts = '0'");shell_exec (line:444);$output_vlan = shell_exec($command_vlan . " 2>&1");$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-old-onu-rx-map.php-
- Full path:
- sw333/web/network-old-onu-rx-map.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:14 12/12/2025
- Last modified:
- 12:54:27 28/01/2025
- MD5 hash:
- b4962c160c5ad68ccd8eed9c48d82a0f
- Filesize:
- 6.94 KB
- suspicious functions used:
- shell_exec (line:76);
$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-old-onu-rx.php-
- Full path:
- sw333/web/network-old-onu-rx.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:14 12/12/2025
- Last modified:
- 12:54:27 28/01/2025
- MD5 hash:
- b4962c160c5ad68ccd8eed9c48d82a0f
- Filesize:
- 6.94 KB
- suspicious functions used:
- shell_exec (line:76);
$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-client-onu-mac-count-cdata.php-
- Full path:
- sw333/web/network-olt-client-onu-mac-count-cdata.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:14 12/12/2025
- Last modified:
- 12:54:27 28/01/2025
- MD5 hash:
- c378dbabf36066c335cfb8838a6e167d
- Filesize:
- 4.58 KB
- suspicious functions used:
- shell_exec (line:25);shell_exec (line:35);
$od_vddlan = shell_exec($codmn . " 2>&1");shell_exec (line:56);$od_vddlan = shell_exec($codmn . " 2>&1");shell_exec (line:103);$output_vdlan = shell_exec($command_dvlan . " 2>&1");shell_exec (line:115);$od_vdlan = shell_exec($coddvlan . " 2>&1");shell_exec (line:126);$output_port = shell_exec($commandd_bdcom);shell_exec (line:140);$od_vddlan = shell_exec($codmn . " 2>&1");$od_vdddlan = shell_exec($codmdn . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-client-onu-mac-count.php-
- Full path:
- sw333/web/network-olt-client-onu-mac-count.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:14 12/12/2025
- Last modified:
- 12:54:27 28/01/2025
- MD5 hash:
- 20be243dd1bdf6e7af8e7e33c01a34c9
- Filesize:
- 15.76 KB
- suspicious functions used:
- shell_exec (line:26);shell_exec (line:36);
$od_vddlan = shell_exec($codmn . " 2>&1");shell_exec (line:68);$od_vddlan = shell_exec($codmn . " 2>&1");shell_exec (line:84);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:101);$outpudt_vlan = shell_exec($commadnd_vlan . " 2>&1");shell_exec (line:119);$output_port = shell_exec($commandd_bdcom);shell_exec (line:135);$output_vdlan = shell_exec($command_vdlan . " 2>&1");shell_exec (line:176);$outpdut_vdlan = shell_exec($commadnd_dvlan . " 2>&1");shell_exec (line:236);$output_vdlan = shell_exec($command_dvlan . " 2>&1");shell_exec (line:312);$outpdut_vdlan = shell_exec($commadnd_dvlan . " 2>&1");shell_exec (line:379);$output_vdlan = shell_exec($command_dvlan . " 2>&1");shell_exec (line:484);$od_vddddlan = shell_exec($codmddn . " 2>&1");shell_exec (line:503);$od_vdlan = shell_exec($coddvlan . " 2>&1");shell_exec (line:522);$od_vddlan = shell_exec($codmn . " 2>&1");$od_vdddlan = shell_exec($codmdn . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-client-onu-mac-countt.php-
- Full path:
- sw333/web/network-olt-client-onu-mac-countt.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:14 12/12/2025
- Last modified:
- 12:54:27 28/01/2025
- MD5 hash:
- d29b4e72c375f528b769bd3894f9f0e7
- Filesize:
- 8.95 KB
- suspicious functions used:
- shell_exec (line:26);shell_exec (line:36);
$od_vddlan = shell_exec($codmn . " 2>&1");shell_exec (line:59);$od_vddlan = shell_exec($codmn . " 2>&1");shell_exec (line:75);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:92);$outpudt_vlan = shell_exec($commadnd_vlan . " 2>&1");shell_exec (line:102);$output_port = shell_exec($commandd_bdcom);shell_exec (line:117);$output_vdlan = shell_exec($command_vdlan . " 2>&1");shell_exec (line:155);$outpdut_vdlan = shell_exec($commadnd_dvlan . " 2>&1");shell_exec (line:206);$output_vdlan = shell_exec($command_dvlan . " 2>&1");shell_exec (line:262);$od_vddddlan = shell_exec($codmddn . " 2>&1");shell_exec (line:275);$od_vdlan = shell_exec($coddvlan . " 2>&1");shell_exec (line:288);$od_vddlan = shell_exec($codmn . " 2>&1");$od_vdddlan = shell_exec($codmdn . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-con-sts.php-
- Full path:
- sw333/web/network-olt-con-sts.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:14 12/12/2025
- Last modified:
- 12:54:27 28/01/2025
- MD5 hash:
- a26b0a1c1567c34c9aa5e2e0254ff8a6
- Filesize:
- 4 KB
- suspicious functions used:
- `olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:10);shell_exec (line:38);
$query = mysqli_query($con, "SELECT `olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND `sts` = '0'");`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, `last_synced`, `last_update`, `msg`, `full_msg`, ROUND((SELECT AVG(value) FROM olt_onu_history WHERE alarm_id = '$alarmId' AND value != ''), 2) AS average_value FROM `, ` WHERE `alarm_id` = '$alarmId' AND ` (line:82);$output = shell_exec($command);$query = mysqli_query($con, "SELECT `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, `last_synced`, `last_update`, `msg`, `full_msg`, ROUND((SELECT AVG(value) FROM olt_onu_history WHERE alarm_id = '$alarmId' AND value != ''), 2) AS average_value FROM `olt_onu_history` WHERE `alarm_id` = '$alarmId' AND `value` != ''"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-load.php-
- Full path:
- sw333/web/network-olt-load.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:14 12/12/2025
- Last modified:
- 12:54:27 28/01/2025
- MD5 hash:
- f49d5153285c639ed91d4e806685ee56
- Filesize:
- 1.33 KB
- suspicious functions used:
- shell_exec (line:22);shell_exec (line:25);
$output = shell_exec($command . " 2>&1");$output1 = shell_exec($command1 . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-oid-check.php-
- Full path:
- sw333/web/network-olt-oid-check.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:14 12/12/2025
- Last modified:
- 12:54:27 28/01/2025
- MD5 hash:
- 5b7dc0ce1103fbfc895873c250b63141
- Filesize:
- 1.88 KB
- suspicious functions used:
- shell_exec (line:33);
return shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-onu-alarm-add.php-
- Full path:
- sw333/web/network-olt-onu-alarm-add.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:14 12/12/2025
- Last modified:
- 12:54:27 28/01/2025
- MD5 hash:
- be6ba82c658419e1454f778e20e2d4c3
- Filesize:
- 7.86 KB
- suspicious functions used:
- shell_exec (line:103);
$output = shell_exec($command . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-onu-count.php-
- Full path:
- sw333/web/network-olt-onu-count.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:14 12/12/2025
- Last modified:
- 12:54:27 28/01/2025
- MD5 hash:
- 7adff5f1e805e721e1a1285e40861a92
- Filesize:
- 6.84 KB
- suspicious functions used:
- `olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:12);shell_exec (line:81);
$query = mysqli_query($con, "SELECT `olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND `online_sts` = '1' AND `sts` = '0'");$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-onu-list-data.php-
- Full path:
- sw333/web/network-olt-onu-list-data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:14 12/12/2025
- Last modified:
- 12:54:27 28/01/2025
- MD5 hash:
- 54cc9417c766c31317311c3722ce7d4b
- Filesize:
- 9.48 KB
- suspicious functions used:
- shell_exec (line:24);shell_exec (line:38);
$outputs = shell_exec($commanda);shell_exec (line:64);$output = shell_exec($command);shell_exec (line:85);$outputs = shell_exec($commanda);shell_exec (line:104);$output = shell_exec($command);shell_exec (line:125);$outputs = shell_exec($commanda);shell_exec (line:143);$output = shell_exec($command);shell_exec (line:153);$od_vdlan = shell_exec($commanda . " 2>&1");shell_exec (line:165);$od_vdland = shell_exec($coddvland . " 2>&1");shell_exec (line:185);$outputs = shell_exec($coddvladnd . " 2>&1");$output_vdlan = shell_exec($command_vdlan); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-onu-power.php-
- Full path:
- sw333/web/network-olt-onu-power.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:14 12/12/2025
- Last modified:
- 12:54:27 28/01/2025
- MD5 hash:
- 2e064543b67b532bdf4e5b12d49c5052
- Filesize:
- 7.54 KB
- suspicious functions used:
- shell_exec (line:97);
$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-pon-clients-search.php-
- Full path:
- sw333/web/network-olt-pon-clients-search.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:14 12/12/2025
- Last modified:
- 12:54:27 28/01/2025
- MD5 hash:
- 79d26fc66abdab6f173330588aa8b238
- Filesize:
- 10.93 KB
- suspicious functions used:
- shell_exec (line:42);shell_exec (line:51);
$output = shell_exec($command . " 2>&1");shell_exec (line:104);$outputS = shell_exec($command . " 2>&1");shell_exec (line:168);$snmpOutput = shell_exec($command);$snmpOutput = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-pon-onu-search-bdcom.php-
- Full path:
- sw333/web/network-olt-pon-onu-search-bdcom.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:15 12/12/2025
- Last modified:
- 12:54:27 28/01/2025
- MD5 hash:
- c786fa8b69268c738b6ff976631798cd
- Filesize:
- 27.74 KB
- suspicious functions used:
- shell_exec (line:60);shell_exec (line:69);
$output = shell_exec($command . " 2>&1");shell_exec (line:383);$outputS = shell_exec($commandS . " 2>&1");$snmpOutput = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-pon-onu-search-bdcom1.php-
- Full path:
- sw333/web/network-olt-pon-onu-search-bdcom1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:15 12/12/2025
- Last modified:
- 12:54:27 28/01/2025
- MD5 hash:
- dd18677b1dcbf7f0bce2ac6912d98da0
- Filesize:
- 9.6 KB
- suspicious functions used:
- shell_exec (line:42);shell_exec (line:51);
$output = shell_exec($command . " 2>&1");shell_exec (line:129);$outputS = shell_exec($command . " 2>&1");$snmpOutput = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-pon-onu-search.php-
- Full path:
- sw333/web/network-olt-pon-onu-search.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:15 12/12/2025
- Last modified:
- 12:54:27 28/01/2025
- MD5 hash:
- dc183ecf77d0e1f56f672338fd09cfa5
- Filesize:
- 21.62 KB
- suspicious functions used:
- shell_exec (line:35);
$output = shell_exec($command . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-snmp-onu-status-data-bdcom.php-
- Full path:
- sw333/web/network-snmp-onu-status-data-bdcom.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:15 12/12/2025
- Last modified:
- 12:54:28 28/01/2025
- MD5 hash:
- 065f5e2b05932ee66d473135998580ac
- Filesize:
- 23.53 KB
- suspicious functions used:
- shell_exec (line:48);shell_exec (line:73);
$oudddputsd = shell_exec($commddanda . " 2>&1");shell_exec (line:85);$oudddputsd = shell_exec($commddanda . " 2>&1");shell_exec (line:103);$oudddputsd = shell_exec($commddanda . " 2>&1");shell_exec (line:116);$output = shell_exec($command . " 2>&1");shell_exec (line:128);$outputs = shell_exec($commanda);shell_exec (line:134);$outpdut = shell_exec($commandd . " 2>&1");shell_exec (line:159);$oddutpdut = shell_exec($cmandd . " 2>&1");shell_exec (line:172);$output = shell_exec($command . " 2>&1");shell_exec (line:184);$outputs = shell_exec($commanda);shell_exec (line:190);$outpdut = shell_exec($commandd . " 2>&1");shell_exec (line:217);$oddutpdut = shell_exec($cmandd . " 2>&1");shell_exec (line:233);$output_oid_cdata = shell_exec($command_oid_cdata . " 2>&1");shell_exec (line:239);$outputs = shell_exec($commanda);shell_exec (line:244);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:248);$output_pon = shell_exec($command_ponn . " 2>&1");`pon_name` FROM `olt_pon` WHERE `olt_pon_id` = '$ponn_id' AND ` (line:255);$outsddd = shell_exec($commddandd);shell_exec (line:263);$qrydd = mysqli_query($con, "SELECT `pon_name` FROM `olt_pon` WHERE `olt_pon_id` = '$ponn_id' AND `olt_id` = '$olt_id' AND sts = '0'");$oddutpdut = shell_exec($cmandd . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-snmp-onu-status-data.php-
- Full path:
- sw333/web/network-snmp-onu-status-data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:15 12/12/2025
- Last modified:
- 12:54:28 28/01/2025
- MD5 hash:
- 0adfee384bf349b50f11036947fd2a74
- Filesize:
- 30.37 KB
- suspicious functions used:
- shell_exec (line:38);`olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:42);
$outputs = shell_exec($snmpCommand);shell_exec (line:81);$re11=mysql_query("SELECT `olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND `olt_pon_id` = '$check_pon_name'");shell_exec (line:95);$outputs = shell_exec($snmpCommand);shell_exec (line:109);$outpdduts = shell_exec($sand);shell_exec (line:122);$outputs = shell_exec($snmpCommand);shell_exec (line:208);$outpdduts = shell_exec($sand);shell_exec (line:429);$outputsmac = shell_exec($snmpCommandmac);shell_exec (line:441);$outputsmac = shell_exec($snmpCommandmac);shell_exec (line:448);$outputsmac = shell_exec($snmpCommandmac);$output_vlan = shell_exec($command_vlan . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-snmp-onu-status-data1.php-
- Full path:
- sw333/web/network-snmp-onu-status-data1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:15 12/12/2025
- Last modified:
- 12:54:28 28/01/2025
- MD5 hash:
- 920bd1a592c36f7a1194b737642f8340
- Filesize:
- 15.96 KB
- suspicious functions used:
- shell_exec (line:33);`olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:37);
$outputs = shell_exec($snmpCommand);shell_exec (line:149);$re11=mysql_query("SELECT `olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND `olt_pon_id` = '$check_pon_name'");$outputsmac = shell_exec($snmpCommandmac); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-snmp-onu-status-data_vsol2.php-
- Full path:
- sw333/web/network-snmp-onu-status-data_vsol2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:15 12/12/2025
- Last modified:
- 12:54:28 28/01/2025
- MD5 hash:
- f22d022ddc284f4d8e1de3660da91db8
- Filesize:
- 15.61 KB
- suspicious functions used:
- shell_exec (line:34);shell_exec (line:113);
$outputs = shell_exec($snmpCommand);shell_exec (line:126);$outpdduts = shell_exec($sand);shell_exec (line:132);$outputsmac = shell_exec($snmpCommandmac);$output_vlan = shell_exec($command_vlan . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-tree-vartual-nodes.php-
- Full path:
- sw333/web/network-tree-vartual-nodes.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:15 12/12/2025
- Last modified:
- 12:54:29 28/01/2025
- MD5 hash:
- 3530b8bc3113544014b1746ecd67e834
- Filesize:
- 10.64 KB
- suspicious functions used:
- shell_exec (line:76);shell_exec (line:111);
$outputs = shell_exec($commanda);shell_exec (line:145);$outputs = shell_exec($commanda);shell_exec (line:181);$outputs = shell_exec($commanda);shell_exec (line:188);$od_vdlan = shell_exec($commanda . " 2>&1");$od_vdland = shell_exec($coddvland . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Network.php-
- Full path:
- sw333/web/Network.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:15 12/12/2025
- Last modified:
- 12:54:29 28/01/2025
- MD5 hash:
- fda05c071d32b31263955c049e2b4b43
- Filesize:
- 62.6 KB
- suspicious functions used:
- system (line:371);shell_exec (line:657);
$ARRAY = $API->comm("/system/resource/print");$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Network1.php-
- Full path:
- sw333/web/Network1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:15 12/12/2025
- Last modified:
- 12:54:29 28/01/2025
- MD5 hash:
- c72cb4810d5c70edd9da26884beba751
- Filesize:
- 66.22 KB
- suspicious functions used:
- system (line:375);shell_exec (line:661);
$ARRAY = $API->comm("/system/resource/print");$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkLoad.php-
- Full path:
- sw333/web/NetworkLoad.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:15 12/12/2025
- Last modified:
- 12:54:31 28/01/2025
- MD5 hash:
- e1632e66ee1b7394d3fb82751b924abe
- Filesize:
- 2.83 KB
- suspicious functions used:
- system (line:81);
$ARRAY = $API->comm("/system/resource/print"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkLoad1.php-
- Full path:
- sw333/web/NetworkLoad1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:15 12/12/2025
- Last modified:
- 12:54:31 28/01/2025
- MD5 hash:
- 176bd6931be34d7ef351d22897accc65
- Filesize:
- 759 B
- suspicious functions used:
- system (line:18);
$ARRAY = $API->comm("/system/resource/print"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkOltAddQuery.php-
- Full path:
- sw333/web/NetworkOltAddQuery.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:15 12/12/2025
- Last modified:
- 12:54:31 28/01/2025
- MD5 hash:
- 29cb8b80d9a49410b20adef42764fb16
- Filesize:
- 7.34 KB
- suspicious functions used:
- shell_exec (line:21);
$output = shell_exec($command . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkOltOnuStatus.php-
- Full path:
- sw333/web/NetworkOltOnuStatus.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:15 12/12/2025
- Last modified:
- 12:54:31 28/01/2025
- MD5 hash:
- 77fca1ce958c811693c7b16bc5a5f9df
- Filesize:
- 65 KB
- suspicious functions used:
- shell_exec (line:42);shell_exec (line:102);
$output = shell_exec($command . " 2>&1");shell_exec (line:673);$output = shell_exec($command . " 2>&1");shell_exec (line:786);$oddutpdut = shell_exec($cmandd . " 2>&1");shell_exec (line:896);$oddutpdut = shell_exec($cmandd . " 2>&1");$oddutpdut = shell_exec($cmandd . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkOltOnuStatus2.php-
- Full path:
- sw333/web/NetworkOltOnuStatus2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:15 12/12/2025
- Last modified:
- 12:54:31 28/01/2025
- MD5 hash:
- c9a14797fa4353d05bbd9427b6079250
- Filesize:
- 15.88 KB
- suspicious functions used:
- shell_exec (line:35);
$output = shell_exec($command . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkOltSense.php-
- Full path:
- sw333/web/NetworkOltSense.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:15 12/12/2025
- Last modified:
- 12:54:31 28/01/2025
- MD5 hash:
- 2be664ae5006367f629ca437a6d507f8
- Filesize:
- 18.26 KB
- suspicious functions used:
- `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, `last_synced`, `last_update`, `msg`, `full_msg`, ROUND((SELECT AVG(value) FROM olt_onu_history WHERE alarm_id = '$alarmId' AND value != ''), 2) AS average_value FROM `, ` WHERE `alarm_id` = '$alarmId' AND ` (line:123);
$querddy = mysql_query("SELECT `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, `last_synced`, `last_update`, `msg`, `full_msg`, ROUND((SELECT AVG(value) FROM olt_onu_history WHERE alarm_id = '$alarmId' AND value != ''), 2) AS average_value FROM `olt_onu_history` WHERE `alarm_id` = '$alarmId' AND `value` != ''"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkOltSenseDetails.php-
- Full path:
- sw333/web/NetworkOltSenseDetails.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:15 12/12/2025
- Last modified:
- 12:54:31 28/01/2025
- MD5 hash:
- 440096c601fc10b819a1f0f8330928b0
- Filesize:
- 14.17 KB
- suspicious functions used:
- `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:33);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:42);
$sql = mysql_query("SELECT `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND `value` != '' ORDER BY id DESC");`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:51);$sql = mysql_query("SELECT `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND `value` != '' ORDER BY id DESC");`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:60);$sql = mysql_query("SELECT `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND `value` != '' ORDER BY id DESC");$sql = mysql_query("SELECT `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND `value` != '' ORDER BY id DESC"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkOltSync.php-
- Full path:
- sw333/web/NetworkOltSync.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:15 12/12/2025
- Last modified:
- 12:54:31 28/01/2025
- MD5 hash:
- 06633d4b65a14d677358170dd0a84424
- Filesize:
- 1.87 KB
- suspicious functions used:
- curl_exec (line:18);
$result1dd = curl_exec($ch111); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: networktree-olt-onu-list-data.php-
- Full path:
- sw333/web/networktree-olt-onu-list-data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:16 12/12/2025
- Last modified:
- 12:54:32 28/01/2025
- MD5 hash:
- af4221fefa9c9051846a063ac4135560
- Filesize:
- 8.72 KB
- suspicious functions used:
- shell_exec (line:24);shell_exec (line:36);
$outputs = shell_exec($commanda);shell_exec (line:59);$output = shell_exec($command);shell_exec (line:78);$outputs = shell_exec($commanda);shell_exec (line:97);$output = shell_exec($command);shell_exec (line:116);$outputs = shell_exec($commanda);shell_exec (line:134);$output = shell_exec($command);shell_exec (line:143);$od_vdlan = shell_exec($commanda . " 2>&1");shell_exec (line:155);$od_vdland = shell_exec($coddvland . " 2>&1");shell_exec (line:175);$outputs = shell_exec($coddvladnd . " 2>&1");$output_vdlan = shell_exec($command_vdlan); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkTreeAddSave.php-
- Full path:
- sw333/web/NetworkTreeAddSave.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:16 12/12/2025
- Last modified:
- 12:54:33 28/01/2025
- MD5 hash:
- 93fdf1213fdb5d525641e2b625f1a91b
- Filesize:
- 7.61 KB
- suspicious functions used:
- `network_tree` WHERE `olt_id` = '$olt_id' AND ` (line:107);
$resu11 = $con->query("SELECT tree_id AS pon_parent_id FROM `network_tree` WHERE `olt_id` = '$olt_id' AND `device_type` = '1' AND sts = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkTreeEdit1.php-
- Full path:
- sw333/web/NetworkTreeEdit1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:16 12/12/2025
- Last modified:
- 12:54:34 28/01/2025
- MD5 hash:
- 3396a6bdf9b5804bb208f38f37cc29a2
- Filesize:
- 35.81 KB
- suspicious functions used:
- `olt_onu` WHERE olt_id = '$olt_id' AND ` (line:207);
<?php $resultoff11d=mysql_query("SELECT id AS alarm_id, alarm_name FROM `olt_onu` WHERE olt_id = '$olt_id' AND `onu_name` LIKE '$pon_name1' ORDER BY id DESC"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkTreeEditSave.php-
- Full path:
- sw333/web/NetworkTreeEditSave.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:16 12/12/2025
- Last modified:
- 14:05:54 28/01/2025
- MD5 hash:
- be82a23409ab88be3f57da95f8805d6c
- Filesize:
- 12.83 KB
- suspicious functions used:
- `network_tree` WHERE `olt_id` = '$olt_id' AND ` (line:182);
$resu11 = $con->query("SELECT tree_id AS pon_parent_id FROM `network_tree` WHERE `olt_id` = '$olt_id' AND `device_type` = '1' AND sts = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkTreeList.php-
- Full path:
- sw333/web/NetworkTreeList.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:16 12/12/2025
- Last modified:
- 12:54:34 28/01/2025
- MD5 hash:
- acd468021993faf8575531952ae107f8
- Filesize:
- 21.98 KB
- suspicious functions used:
- `pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '{$row['olt_id']}' AND ` (line:287);
$result11=mysql_query("SELECT count(`pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '{$row['olt_id']}' AND `sts` = '0';"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkTreeMap.php-
- Full path:
- sw333/web/NetworkTreeMap.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:16 12/12/2025
- Last modified:
- 12:54:34 28/01/2025
- MD5 hash:
- 584d02944bd9de5a190ec6dc320fc49e
- Filesize:
- 24.24 KB
- suspicious functions used:
- `${results.rxPower}` (line:263);`${results.distance}` (line:264);
var rxPower = `${results.rxPower}`;`${results.supplyVoltage}` (line:265);var distance = `${results.distance}`;`${results.temperature}` (line:266);var supplyVoltage = `${results.supplyVoltage}`;`${results.txPower}` (line:267);var temperature = `${results.temperature}`;`${results.rxPower}` (line:283);var txPower = `${results.txPower}`;`${results.distance}` (line:284);var rxPower = `${results.rxPower}`;`${results.supplyVoltage}` (line:285);var distance = `${results.distance}`;`${results.temperature}` (line:286);var supplyVoltage = `${results.supplyVoltage}`;`${results.txPower}` (line:287);var temperature = `${results.temperature}`;var txPower = `${results.txPower}`; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkTreeMap1.php-
- Full path:
- sw333/web/NetworkTreeMap1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:16 12/12/2025
- Last modified:
- 12:54:35 28/01/2025
- MD5 hash:
- 31a3ae9bc0bdb18726ed860ec6e8ec97
- Filesize:
- 36.43 KB
- suspicious functions used:
- `networktree_marker_data.php?tree_id=${markerId}` (line:231);`${results.rxPower}` (line:311);
fetch(`networktree_marker_data.php?tree_id=${markerId}`)`${results.distance}` (line:312);var rxPower = `${results.rxPower}`;`${results.supplyVoltage}` (line:313);var distance = `${results.distance}`;`${results.temperature}` (line:314);var supplyVoltage = `${results.supplyVoltage}`;`${results.txPower}` (line:315);var temperature = `${results.temperature}`;var txPower = `${results.txPower}`; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: networktree_device_onu_list_add.php-
- Full path:
- sw333/web/networktree_device_onu_list_add.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:16 12/12/2025
- Last modified:
- 12:54:35 28/01/2025
- MD5 hash:
- 444ccf3c3e852a5a25cc4ccd3a5cf9ca
- Filesize:
- 14.66 KB
- suspicious functions used:
- `network_tree` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND device_type = '5' AND ` (line:9);shell_exec (line:33);
$resu11=mysql_query("SELECT pon_index_id FROM `network_tree` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND device_type = '5' AND `sts` = '0'");`network_tree` WHERE `onu_mac` = '$mac_address' AND ` (line:131);$output = shell_exec($command . " 2>&1");shell_exec (line:179);$reu11=mysql_query("SELECT count(tree_id) AS onucount FROM `network_tree` WHERE `onu_mac` = '$mac_address' AND `sts` = '0'");shell_exec (line:187);$output = shell_exec($command . " 2>&1");shell_exec (line:235);$outputS = shell_exec($commandS . " 2>&1");`network_tree` WHERE `onu_mac` = '$onuMac' AND ` (line:301);$snmpOutput = shell_exec($command);$reu11=mysql_query("SELECT count(tree_id) AS onucount FROM `network_tree` WHERE `onu_mac` = '$onuMac' AND `sts` = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: networktree_device_pon_check.php-
- Full path:
- sw333/web/networktree_device_pon_check.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:16 12/12/2025
- Last modified:
- 12:54:35 28/01/2025
- MD5 hash:
- 708a93aadcae96ecf0aaca52041fcf38
- Filesize:
- 1.53 KB
- suspicious functions used:
- `pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '$olt_id' AND ` (line:8);
$result11=mysql_query("SELECT count(`pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '$olt_id' AND `sts` = '0';"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: networktree_device_pon_list_add.php-
- Full path:
- sw333/web/networktree_device_pon_list_add.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:16 12/12/2025
- Last modified:
- 12:54:35 28/01/2025
- MD5 hash:
- 2ec03912801e4749c2e9cd361417ca5f
- Filesize:
- 1.36 KB
- suspicious functions used:
- `olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:6);`olt_pon` WHERE `olt_id` = '$olt_id' AND ` (line:10);
$resu11=mysql_query("SELECT olt_name FROM `olt_con` WHERE `olt_id` = '$olt_id' AND `sts` = '0'");`network_tree` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND ` (line:17);$result11=mysql_query("SELECT pon_id, olt_pon_id, pon_name FROM `olt_pon` WHERE `olt_id` = '$olt_id' AND `sts` = '0'");$rehu11=mysql_query("SELECT count(tree_id) AS poncount FROM `network_tree` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND `sts` = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: networktree_device_pon_port_onu_list.php-
- Full path:
- sw333/web/networktree_device_pon_port_onu_list.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:16 12/12/2025
- Last modified:
- 12:54:35 28/01/2025
- MD5 hash:
- 9c63b3ac69996628f5eb2959a9eb4e15
- Filesize:
- 8.65 KB
- suspicious functions used:
- `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:25);shell_exec (line:32);
$rff11=mysqli_query($con, "SELECT olt_pon_id AS pon_port FROM `olt_pon` WHERE olt_id = '$olt_id' AND `pon_name` LIKE '$pon_portt'");shell_exec (line:45);$outputs = shell_exec($commanda);`network_tree` WHERE onu_index_id = '$port_onu_index_id' AND ` (line:49);$output = shell_exec($command);shell_exec (line:81);$rff11d=mysqli_query($con, "SELECT onu_name, onu_index, onu_index_id, onu_mac FROM `network_tree` WHERE onu_index_id = '$port_onu_index_id' AND `olt_id` = '$olt_id'");shell_exec (line:103);$outputs = shell_exec($commanda);shell_exec (line:122);$output = shell_exec($command);shell_exec (line:143);$outputs = shell_exec($commanda);shell_exec (line:161);$output = shell_exec($command);shell_exec (line:170);$od_vdlan = shell_exec($commanda . " 2>&1");shell_exec (line:184);$od_vdland = shell_exec($coddvland . " 2>&1");$outputs = shell_exec($coddvladnd . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: networktree_device_pon_port_sense_list.php-
- Full path:
- sw333/web/networktree_device_pon_port_sense_list.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:16 12/12/2025
- Last modified:
- 12:54:35 28/01/2025
- MD5 hash:
- ee69cd5cc122f8aa37d8d8e5c74def6b
- Filesize:
- 3.65 KB
- suspicious functions used:
- `network_tree` WHERE `onu_mac` = '$onu_mac' AND ` (line:26);`network_tree` WHERE `c_id` = '{$dfhbdxf}' AND ` (line:71);
$reu1d1=mysqli_query($con, "SELECT tree_id AS router_parant_id FROM `network_tree` WHERE `onu_mac` = '$onu_mac' AND `sts` = '0'");$reu11=mysqli_query($con, "SELECT count(c_id) AS client_count FROM `network_tree` WHERE `c_id` = '{$dfhbdxf}' AND `sts` = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: networktree_device_type.php-
- Full path:
- sw333/web/networktree_device_type.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:16 12/12/2025
- Last modified:
- 12:54:35 28/01/2025
- MD5 hash:
- f1520732e5a3ef38564238a3278a1f63
- Filesize:
- 11.43 KB
- suspicious functions used:
- `tree_id`) AS countolt FROM `network_tree` WHERE `olt_id` = '$olt_id_sure' AND ` (line:64);
$resu11=mysql_query("SELECT COUNT(`tree_id`) AS countolt FROM `network_tree` WHERE `olt_id` = '$olt_id_sure' AND `device_type` = '1' AND sts = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentOnlineQuery.php-
- Full path:
- sw333/web/PaymentOnlineQuery.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:17 12/12/2025
- Last modified:
- 12:54:41 28/01/2025
- MD5 hash:
- 201e1cf95b2d033897cab4bc2fd59e07
- Filesize:
- 28.5 KB
- suspicious functions used:
- curl_exec (line:457);curl_exec (line:689);
$resultdata=curl_exec($url);$content = curl_exec($handle ); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentOnlineQuery2.php-
- Full path:
- sw333/web/PaymentOnlineQuery2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:17 12/12/2025
- Last modified:
- 12:54:41 28/01/2025
- MD5 hash:
- ccd315d11a60901b7b9029ff44f8351b
- Filesize:
- 19.4 KB
- suspicious functions used:
- curl_exec (line:42);curl_exec (line:252);
$resultdatax=curl_exec($url);$result = curl_exec($handle); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentWebhook.php-
- Full path:
- sw333/web/PaymentWebhook.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:17 12/12/2025
- Last modified:
- 12:54:41 28/01/2025
- MD5 hash:
- a2f322c94787630ab1e0c8ca35fc5ba1
- Filesize:
- 18.6 KB
- suspicious functions used:
- base64_decode (line:30);curl_exec (line:41);
$signatureDecoded = base64_decode($signature);curl_exec (line:422);curl_exec($url);$data = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: SignUp1.php-
- Full path:
- sw333/web/SignUp1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:18 12/12/2025
- Last modified:
- 12:54:47 28/01/2025
- MD5 hash:
- 3f7943dd155c8e0a383b7d02730f8c11
- Filesize:
- 24.59 KB
- suspicious functions used:
- curl_exec (line:33);curl_exec (line:59);
$jsona = curl_exec($ch10);$resdfwedf = curl_exec($ch1s); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: sms-balance-check.php-
- Full path:
- sw333/web/sms-balance-check.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:18 12/12/2025
- Last modified:
- 12:54:48 28/01/2025
- MD5 hash:
- 74ac3e963a0dc5bb7d4c980e594aa39b
- Filesize:
- 854 B
- suspicious functions used:
- curl_exec (line:15);
$balance = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: SMS.php-
- Full path:
- sw333/web/SMS.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:18 12/12/2025
- Last modified:
- 12:54:48 28/01/2025
- MD5 hash:
- 317f1e2c91c81e6c57f02184d4e2dc6e
- Filesize:
- 36.84 KB
- suspicious functions used:
- curl_exec (line:56);
$balance = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: SMS1.php-
- Full path:
- sw333/web/SMS1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:18 12/12/2025
- Last modified:
- 12:54:48 28/01/2025
- MD5 hash:
- e4671dadf9ad575671fd3609a60030da
- Filesize:
- 32.19 KB
- suspicious functions used:
- curl_exec (line:59);
$balance = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: SMSAddSave.php-
- Full path:
- sw333/web/SMSAddSave.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:18 12/12/2025
- Last modified:
- 12:54:48 28/01/2025
- MD5 hash:
- 1a6eaf13aa0ca959fe2dca885b7ffd8e
- Filesize:
- 1.73 KB
- suspicious functions used:
- curl_exec (line:34);
$result = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: sms_deliverey_report.php-
- Full path:
- sw333/web/sms_deliverey_report.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:19 12/12/2025
- Last modified:
- 12:54:50 28/01/2025
- MD5 hash:
- 03623943da7e9334e137b38c8577fc84
- Filesize:
- 4.25 KB
- suspicious functions used:
- curl_exec (line:28);curl_exec (line:53);
$result11 = curl_exec($ch1);curl_exec (line:90);$resultdd = curl_exec($ch);$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: support-action.php-
- Full path:
- sw333/web/support-action.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:19 12/12/2025
- Last modified:
- 12:54:50 28/01/2025
- MD5 hash:
- 58556808f93f52486b2ad06998142aa9
- Filesize:
- 14.56 KB
- suspicious functions used:
- curl_exec (line:220);
$jsona = curl_exec($ch10); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tagreeexpayment.php-
- Full path:
- sw333/web/tagreeexpayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:19 12/12/2025
- Last modified:
- 12:54:51 28/01/2025
- MD5 hash:
- 029b4fba649a75c7c81d2f8931be8d63
- Filesize:
- 2.86 KB
- suspicious functions used:
- curl_exec (line:26);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tcreateagree.php-
- Full path:
- sw333/web/tcreateagree.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:19 12/12/2025
- Last modified:
- 12:54:51 28/01/2025
- MD5 hash:
- 27a10adf4190edc7eceee8cf74a6b72b
- Filesize:
- 999 B
- suspicious functions used:
- curl_exec (line:26);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tcreatepayment.php-
- Full path:
- sw333/web/tcreatepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:19 12/12/2025
- Last modified:
- 12:54:51 28/01/2025
- MD5 hash:
- e49de9a33f5164bc2c6b88e4770faaff
- Filesize:
- 1.07 KB
- suspicious functions used:
- curl_exec (line:27);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: test2.php-
- Full path:
- sw333/web/test2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:19 12/12/2025
- Last modified:
- 12:54:51 28/01/2025
- MD5 hash:
- ab80d92ede21b7da59bfefb325484297
- Filesize:
- 13.76 KB
- suspicious functions used:
- shell_exec (line:59);shell_exec (line:70);
$output = shell_exec($command);shell_exec (line:76);$output1 = shell_exec($command1);shell_exec (line:88);$output2 = shell_exec($command2);shell_exec (line:101);$output_vdlan = shell_exec($command_dvlan . " 2>&1");shell_exec (line:141);$output_vdlan = shell_exec($command_dvlan . " 2>&1");curl_exec (line:187);$output_vdlanf = shell_exec($command_dvlan . " 2>&1");curl_exec (line:212);$result11 = curl_exec($ch3);curl_exec (line:354);$response = curl_exec($ch);$result11 = curl_exec($ch3); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: test6.php-
- Full path:
- sw333/web/test6.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:19 12/12/2025
- Last modified:
- 12:54:52 28/01/2025
- MD5 hash:
- f22d022ddc284f4d8e1de3660da91db8
- Filesize:
- 15.61 KB
- suspicious functions used:
- shell_exec (line:34);shell_exec (line:113);
$outputs = shell_exec($snmpCommand);shell_exec (line:126);$outpdduts = shell_exec($sand);shell_exec (line:132);$outputsmac = shell_exec($snmpCommandmac);$output_vlan = shell_exec($command_vlan . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: test7.php-
- Full path:
- sw333/web/test7.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:19 12/12/2025
- Last modified:
- 12:54:52 28/01/2025
- MD5 hash:
- b11ccf951ce63a21ea0a7328316a0e5c
- Filesize:
- 1.57 KB
- suspicious functions used:
- curl_exec (line:14);
$result1dd = curl_exec($ch111); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: testttttt.php-
- Full path:
- sw333/web/testttttt.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:19 12/12/2025
- Last modified:
- 12:54:52 28/01/2025
- MD5 hash:
- b1988a4be29e191ad935fb409a4174ee
- Filesize:
- 2 KB
- suspicious functions used:
- curl_exec (line:47);
$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: texecutepayment.php-
- Full path:
- sw333/web/texecutepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:19 12/12/2025
- Last modified:
- 12:54:52 28/01/2025
- MD5 hash:
- 623635fdf5c871391d3a5fe99ee8c543
- Filesize:
- 2.91 KB
- suspicious functions used:
- curl_exec (line:24);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tis-news.php-
- Full path:
- sw333/web/tis-news.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:19 12/12/2025
- Last modified:
- 12:54:52 28/01/2025
- MD5 hash:
- ed23ca98b77c5321b4485e85eb2ea64d
- Filesize:
- 3.67 KB
- suspicious functions used:
- curl_exec (line:22);
$alldata1 = curl_exec($chhhh1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: token.php-
- Full path:
- sw333/web/token.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:19 12/12/2025
- Last modified:
- 12:54:52 28/01/2025
- MD5 hash:
- 7d8e71ceda3ffb74623e0c4a814715af
- Filesize:
- 1.53 KB
- suspicious functions used:
- curl_exec (line:42);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tt.php-
- Full path:
- sw333/web/tt.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:19 12/12/2025
- Last modified:
- 12:54:53 28/01/2025
- MD5 hash:
- 9c4ed141cb79fdc7e807b35923c91a20
- Filesize:
- 1.56 KB
- suspicious functions used:
- curl_exec (line:30);
$response = curl_exec($curl); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ttoken.php-
- Full path:
- sw333/web/ttoken.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:19 12/12/2025
- Last modified:
- 12:54:53 28/01/2025
- MD5 hash:
- 5f2c51c1db5b0defadfb67ce25c0098f
- Filesize:
- 1.54 KB
- suspicious functions used:
- curl_exec (line:42);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: webhook.php-
- Full path:
- sw333/web/webhook.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:20 12/12/2025
- Last modified:
- 12:54:55 28/01/2025
- MD5 hash:
- 26e2059a39281031d28874b51b52d60c
- Filesize:
- 21.23 KB
- suspicious functions used:
- base64_decode (line:27);curl_exec (line:38);
$signatureDecoded = base64_decode($signature);curl_exec (line:454);curl_exec($url);$data = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: webhook_cid.php-
- Full path:
- sw333/web/webhook_cid.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:20 12/12/2025
- Last modified:
- 12:54:55 28/01/2025
- MD5 hash:
- 18c8353c99f0ca2645c68685e40c568b
- Filesize:
- 21.1 KB
- suspicious functions used:
- base64_decode (line:28);curl_exec (line:39);
$signatureDecoded = base64_decode($signature);curl_exec (line:429);curl_exec($url);$data = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: webhook_test.php-
- Full path:
- sw333/web/webhook_test.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:20 12/12/2025
- Last modified:
- 12:54:55 28/01/2025
- MD5 hash:
- 74a7dcc262d7fe7f2bdc9e0595d03837
- Filesize:
- 4.69 KB
- suspicious functions used:
- base64_decode (line:22);curl_exec (line:33);
$signatureDecoded = base64_decode($signature);curl_exec (line:86);curl_exec($url);curl_exec (line:107);$result = curl_exec($ch);$data = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: class.phpmailer.php-
- Full path:
- sw333/web/email/class.phpmailer.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:20 12/12/2025
- Last modified:
- 12:55:00 28/01/2025
- MD5 hash:
- 68468d69b47fffecc89df57e27c5a781
- Filesize:
- 143.32 KB
- suspicious functions used:
- `$DKIM_private` (line:428);popen (line:1387);
* If set, takes precedence over `$DKIM_private`.popen (line:1408);if (!@$mail = popen($sendmail, 'w')) {base64_decode (line:3410);if (!@$mail = popen($sendmail, 'w')) {`$mail->set('SMTPSecure', 'tls');` (line:3688);$data = base64_decode($data);`$mail->SMTPSecure = 'tls';` (line:3690);* `$mail->set('SMTPSecure', 'tls');`* `$mail->SMTPSecure = 'tls';` - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: class.smtp.php-
- Full path:
- sw333/web/email/class.smtp.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:20 12/12/2025
- Last modified:
- 12:55:00 28/01/2025
- MD5 hash:
- aa8478329268e5438a4469c268337a10
- Filesize:
- 41.44 KB
- suspicious functions used:
- base64_decode (line:513);base64_decode (line:533);
$challenge = base64_decode($challenge);$challenge = base64_decode(substr($this->last_reply, 4)); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: jqgrid.php-
- Full path:
- sw333/web/inc/jqgrid.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:21 12/12/2025
- Last modified:
- 12:55:11 28/01/2025
- MD5 hash:
- 71027a29e71e0626d8b57cbb631e6d98
- Filesize:
- 23.92 KB
- suspicious functions used:
- eval (line:397);
if (!empty($V4a8a08f0["condition"])) eval("\$V4b43b0ae = ".$V4a8a08f0["condition"].";"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: JSON.php-
- Full path:
- sw333/web/inc/JSON.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:21 12/12/2025
- Last modified:
- 12:55:11 28/01/2025
- MD5 hash:
- f5a34509e06231308becbe320ade9ff6
- Filesize:
- 33.22 KB
- suspicious functions used:
- eval (line:22);
* Javascript, and can be directly eval()'ed with no further parsing - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: smsapicore.php-
- Full path:
- sw333/web/include/smsapicore.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:22 12/12/2025
- Last modified:
- 12:55:12 28/01/2025
- MD5 hash:
- 6b6257f892846565ef8dee38400afa15
- Filesize:
- 1.24 KB
- suspicious functions used:
- curl_exec (line:36);
$resultdgfb = curl_exec($chg); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: telegramapicore.php-
- Full path:
- sw333/web/include/telegramapicore.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:22 12/12/2025
- Last modified:
- 12:55:12 28/01/2025
- MD5 hash:
- 511f56e6dfcf4e9e7a11259e023ca3ae
- Filesize:
- 3.15 KB
- suspicious functions used:
- curl_exec (line:68);
$result11 = curl_exec($ch3); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ui.php-
- Full path:
- sw333/web/js/tinymce/themes/advanced/skins/highcontrast/ui.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:22 12/12/2025
- Last modified:
- 12:55:35 28/01/2025
- MD5 hash:
- 3edaf67be8573b86686f46bbba4f058c
- Filesize:
- 4.53 KB
- suspicious functions used:
- curl_exec (line:20);`bill_amount` = '0.00' WHERE bill_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY ` (line:53);
$alldataa = curl_exec($chxchhh);`bill_amount` = '0.00', days = '0.00' WHERE entry_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY ` (line:54);$queryss = mysql_query("UPDATE billing SET `bill_amount` = '0.00' WHERE bill_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY `id` DESC LIMIT 5");`payment` WHERE `pay_date` < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND pay_amount != '0.00' ORDER BY ` (line:55);$sqlqmss = mysql_query("UPDATE billing_mac SET `bill_amount` = '0.00', days = '0.00' WHERE entry_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY `id` DESC LIMIT 5");curl_exec (line:146);$sqlqmsp = mysql_query("DELETE FROM `payment` WHERE `pay_date` < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND pay_amount != '0.00' ORDER BY `id` ASC LIMIT 5");curl_exec (line:168);$responsed = curl_exec($curld);$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Changes.txt-
- Full path:
- sw333/web/js/jqgrid/js/Changes.txt
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:22 12/12/2025
- Last modified:
- 12:55:25 28/01/2025
- MD5 hash:
- c0a4adbc3f1c6d592cb4fa8433fee9ea
- Filesize:
- 44.32 KB
- suspicious functions used:
- system (line:87);
* Add a ant based build system which allow us to minify the JS code - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: createpayment.php-
- Full path:
- sw333/m/createpayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:22 12/12/2025
- Last modified:
- 12:53:38 28/01/2025
- MD5 hash:
- 849185f307be30eafb1bbef93616d8c3
- Filesize:
- 1.71 KB
- suspicious functions used:
- curl_exec (line:57);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: executepayment.php-
- Full path:
- sw333/m/executepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:22 12/12/2025
- Last modified:
- 12:53:38 28/01/2025
- MD5 hash:
- 9a3f22521ad987e86f84c4f5f688d5b7
- Filesize:
- 713 B
- suspicious functions used:
- curl_exec (line:18);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: index.php-
- Full path:
- sw333/m/index.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:22 12/12/2025
- Last modified:
- 13:23:14 28/01/2025
- MD5 hash:
- fb31139cde48e593eb1008692e0d5de7
- Filesize:
- 16.95 KB
- suspicious functions used:
- curl_exec (line:298);
$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: index1.php-
- Full path:
- sw333/m/index1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:22 12/12/2025
- Last modified:
- 12:53:39 28/01/2025
- MD5 hash:
- dbd325386cd905b7a18b217dda2030f3
- Filesize:
- 13.92 KB
- suspicious functions used:
- base64_decode (line:8);curl_exec (line:224);
list($encrypted_data, $iv, $key) = explode('::', base64_decode($ciphertext));$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: index2.php-
- Full path:
- sw333/m/index2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:22 12/12/2025
- Last modified:
- 12:53:39 28/01/2025
- MD5 hash:
- 41558736b037228ea93df03cae70eb87
- Filesize:
- 4.31 KB
- suspicious functions used:
- curl_exec (line:70);
$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: LoginByPass.php-
- Full path:
- sw333/m/LoginByPass.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:22 12/12/2025
- Last modified:
- 12:53:39 28/01/2025
- MD5 hash:
- 4deda2bef49c7e4552e5379c86858ddf
- Filesize:
- 4.27 KB
- suspicious functions used:
- curl_exec (line:41);
$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: login_exec.php-
- Full path:
- sw333/m/login_exec.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:22 12/12/2025
- Last modified:
- 12:53:39 28/01/2025
- MD5 hash:
- 760b107af2f5d6194f97c20ba3ffb86b
- Filesize:
- 11.63 KB
- suspicious functions used:
- curl_exec (line:24);curl_exec (line:80);
$jsona = curl_exec($ch10);curl_exec (line:227);$result110 = curl_exec($ch11);$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: login_exec1.php-
- Full path:
- sw333/m/login_exec1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:22 12/12/2025
- Last modified:
- 12:53:39 28/01/2025
- MD5 hash:
- b7a23f98b3d03b1ecc08218cf01b4aee
- Filesize:
- 6.36 KB
- suspicious functions used:
- curl_exec (line:115);
$result110 = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: login_exec2.php-
- Full path:
- sw333/m/login_exec2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:22 12/12/2025
- Last modified:
- 12:53:39 28/01/2025
- MD5 hash:
- 46b08782f51ba75b23e27183e06370fe
- Filesize:
- 4.28 KB
- suspicious functions used:
- curl_exec (line:61);
$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: nagad-helper.php-
- Full path:
- sw333/m/nagad-helper.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:23 12/12/2025
- Last modified:
- 12:53:40 28/01/2025
- MD5 hash:
- 2bb70c44d68202e0a0cd8ae1388f0b1b
- Filesize:
- 6.74 KB
- suspicious functions used:
- curl_exec (line:61);base64_decode (line:97);
$resultData = curl_exec($url);openssl_private_decrypt(base64_decode($cryptText), $plain_text, $private_key); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: nagad-merchant-callback.php-
- Full path:
- sw333/m/nagad-merchant-callback.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:23 12/12/2025
- Last modified:
- 12:53:40 28/01/2025
- MD5 hash:
- 0e6086c5260150c11249029f212ee481
- Filesize:
- 11.36 KB
- suspicious functions used:
- curl_exec (line:20);
$file_contents = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: netowrk-snmp-data.php-
- Full path:
- sw333/m/netowrk-snmp-data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:23 12/12/2025
- Last modified:
- 12:53:40 28/01/2025
- MD5 hash:
- 45b774abc8d67efb3e4e87c93b1f618b
- Filesize:
- 24.05 KB
- suspicious functions used:
- shell_exec (line:96);shell_exec (line:105);
$output = shell_exec($command . " 2>&1");shell_exec (line:115);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:134);$output_port = shell_exec($commandd . " 2>&1");shell_exec (line:146);$output = shell_exec($command . " 2>&1");shell_exec (line:157);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:173);$output_port = shell_exec($commandd);shell_exec (line:183);$output_oid_bdcom = shell_exec($command_oid_bdcom . " 2>&1");shell_exec (line:199);$outputs = shell_exec($commanda);shell_exec (line:219);$output_port = shell_exec($commandd_bdcom);shell_exec (line:229);$output_oid_cdata = shell_exec($command_oid_cdata . " 2>&1");shell_exec (line:234);$outputs = shell_exec($commanda);shell_exec (line:242);$outs = shell_exec($canda);shell_exec (line:262);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:278);$outpdut_port = shell_exec($commandd_cdata);`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:291);$output_oid_gcom = shell_exec($command_oid_gcom . " 2>&1");shell_exec (line:297);$querydd = mysqli_query($con, "SELECT `olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND `olt_id` = '$olt_id' AND sts = '0'");shell_exec (line:432);$output_vlan = shell_exec($command_vlan . " 2>&1");$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentOnlineQuery.php-
- Full path:
- sw333/m/PaymentOnlineQuery.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:23 12/12/2025
- Last modified:
- 12:53:41 28/01/2025
- MD5 hash:
- 05d772ea15775c0640ac9d1ff7c7144c
- Filesize:
- 21.13 KB
- suspicious functions used:
- curl_exec (line:287);curl_exec (line:512);
$resultdata=curl_exec($url);$content = curl_exec($handle ); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentOnlineQuery2.php-
- Full path:
- sw333/m/PaymentOnlineQuery2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:23 12/12/2025
- Last modified:
- 12:53:41 28/01/2025
- MD5 hash:
- 3660992067d5591fc79ce89d6dbb9274
- Filesize:
- 19.08 KB
- suspicious functions used:
- curl_exec (line:41);curl_exec (line:254);
$resultdatax=curl_exec($url);$result = curl_exec($handle); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: support-action.php-
- Full path:
- sw333/m/support-action.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:23 12/12/2025
- Last modified:
- 12:53:42 28/01/2025
- MD5 hash:
- 2fc6fd844db911a5502a7a6ae383990f
- Filesize:
- 10.31 KB
- suspicious functions used:
- curl_exec (line:99);
$jsona = curl_exec($ch10); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tagreeexpayment.php-
- Full path:
- sw333/m/tagreeexpayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:23 12/12/2025
- Last modified:
- 12:53:43 28/01/2025
- MD5 hash:
- c95e3ee881752db67b4f3597bc58430a
- Filesize:
- 2.46 KB
- suspicious functions used:
- curl_exec (line:26);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tcreateagree.php-
- Full path:
- sw333/m/tcreateagree.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:23 12/12/2025
- Last modified:
- 12:53:43 28/01/2025
- MD5 hash:
- 27a10adf4190edc7eceee8cf74a6b72b
- Filesize:
- 999 B
- suspicious functions used:
- curl_exec (line:26);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tcreatepayment.php-
- Full path:
- sw333/m/tcreatepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:23 12/12/2025
- Last modified:
- 12:53:43 28/01/2025
- MD5 hash:
- e49de9a33f5164bc2c6b88e4770faaff
- Filesize:
- 1.07 KB
- suspicious functions used:
- curl_exec (line:27);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: texecutepayment.php-
- Full path:
- sw333/m/texecutepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:23 12/12/2025
- Last modified:
- 12:53:43 28/01/2025
- MD5 hash:
- efbb63dfcfdacb52dec74bffc389bbb3
- Filesize:
- 2.67 KB
- suspicious functions used:
- curl_exec (line:24);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: token.php-
- Full path:
- sw333/m/token.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:23 12/12/2025
- Last modified:
- 12:53:43 28/01/2025
- MD5 hash:
- 7d8e71ceda3ffb74623e0c4a814715af
- Filesize:
- 1.53 KB
- suspicious functions used:
- curl_exec (line:42);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ttoken.php-
- Full path:
- sw333/m/ttoken.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:23 12/12/2025
- Last modified:
- 12:53:43 28/01/2025
- MD5 hash:
- 5f2c51c1db5b0defadfb67ce25c0098f
- Filesize:
- 1.54 KB
- suspicious functions used:
- curl_exec (line:42);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: nagad-helper.php-
- Full path:
- 7star/m/nagad-helper.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:24 12/12/2025
- Last modified:
- 01:04:39 07/10/2024
- MD5 hash:
- 2bb70c44d68202e0a0cd8ae1388f0b1b
- Filesize:
- 6.74 KB
- suspicious functions used:
- curl_exec (line:61);base64_decode (line:97);
$resultData = curl_exec($url);openssl_private_decrypt(base64_decode($cryptText), $plain_text, $private_key); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentOnlineQuery2.php-
- Full path:
- 7star/m/PaymentOnlineQuery2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:24 12/12/2025
- Last modified:
- 01:04:40 07/10/2024
- MD5 hash:
- 3660992067d5591fc79ce89d6dbb9274
- Filesize:
- 19.08 KB
- suspicious functions used:
- curl_exec (line:41);curl_exec (line:254);
$resultdatax=curl_exec($url);$result = curl_exec($handle); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: token.php-
- Full path:
- 7star/m/token.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:24 12/12/2025
- Last modified:
- 01:04:41 07/10/2024
- MD5 hash:
- 7d8e71ceda3ffb74623e0c4a814715af
- Filesize:
- 1.53 KB
- suspicious functions used:
- curl_exec (line:42);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tagreeexpayment.php-
- Full path:
- 7star/m/tagreeexpayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:24 12/12/2025
- Last modified:
- 01:04:41 07/10/2024
- MD5 hash:
- c95e3ee881752db67b4f3597bc58430a
- Filesize:
- 2.46 KB
- suspicious functions used:
- curl_exec (line:26);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ttoken.php-
- Full path:
- 7star/m/ttoken.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:25 12/12/2025
- Last modified:
- 01:04:41 07/10/2024
- MD5 hash:
- 5f2c51c1db5b0defadfb67ce25c0098f
- Filesize:
- 1.54 KB
- suspicious functions used:
- curl_exec (line:42);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: createpayment.php-
- Full path:
- 7star/m/createpayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:25 12/12/2025
- Last modified:
- 01:04:37 07/10/2024
- MD5 hash:
- 849185f307be30eafb1bbef93616d8c3
- Filesize:
- 1.71 KB
- suspicious functions used:
- curl_exec (line:57);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: support-action.php-
- Full path:
- 7star/m/support-action.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:25 12/12/2025
- Last modified:
- 01:04:41 07/10/2024
- MD5 hash:
- 2fc6fd844db911a5502a7a6ae383990f
- Filesize:
- 10.31 KB
- suspicious functions used:
- curl_exec (line:99);
$jsona = curl_exec($ch10); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: executepayment.php-
- Full path:
- 7star/m/executepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:25 12/12/2025
- Last modified:
- 01:04:37 07/10/2024
- MD5 hash:
- 9a3f22521ad987e86f84c4f5f688d5b7
- Filesize:
- 713 B
- suspicious functions used:
- curl_exec (line:18);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: index.php-
- Full path:
- 7star/m/index.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 00:13:16 12/12/2025
- Last modified:
- 01:04:37 07/10/2024
- MD5 hash:
- 9a5dc16d9d603e4fe488b2349f6197a3
- Filesize:
- 12.47 KB
- suspicious functions used:
- base64_decode (line:10);curl_exec (line:183);
list($encrypted_data,$iv,$key) = explode('::',base64_decode($ciphertext));$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentOnlineQuery.php-
- Full path:
- 7star/m/PaymentOnlineQuery.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:25 12/12/2025
- Last modified:
- 01:04:39 07/10/2024
- MD5 hash:
- f6ec1bb356cff5bce71ccc18bbc81b87
- Filesize:
- 21.15 KB
- suspicious functions used:
- curl_exec (line:287);curl_exec (line:512);
$resultdata=curl_exec($url);$content = curl_exec($handle ); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tcreateagree.php-
- Full path:
- 7star/m/tcreateagree.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:25 12/12/2025
- Last modified:
- 01:04:41 07/10/2024
- MD5 hash:
- 27a10adf4190edc7eceee8cf74a6b72b
- Filesize:
- 999 B
- suspicious functions used:
- curl_exec (line:26);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: login_exec.php-
- Full path:
- 7star/m/login_exec.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:25 12/12/2025
- Last modified:
- 01:04:37 07/10/2024
- MD5 hash:
- 1f800365ef270564df77d30c1bfd7ed3
- Filesize:
- 5.4 KB
- suspicious functions used:
- curl_exec (line:66);
$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: login_exec1.php-
- Full path:
- 7star/m/login_exec1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:25 12/12/2025
- Last modified:
- 01:04:38 07/10/2024
- MD5 hash:
- 46b08782f51ba75b23e27183e06370fe
- Filesize:
- 4.28 KB
- suspicious functions used:
- curl_exec (line:61);
$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: nagad-merchant-callback.php-
- Full path:
- 7star/m/nagad-merchant-callback.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:26 12/12/2025
- Last modified:
- 01:04:39 07/10/2024
- MD5 hash:
- e48843f21f89612ef44c10150c547139
- Filesize:
- 11.76 KB
- suspicious functions used:
- curl_exec (line:20);
$file_contents = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tcreatepayment.php-
- Full path:
- 7star/m/tcreatepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:26 12/12/2025
- Last modified:
- 01:04:41 07/10/2024
- MD5 hash:
- e49de9a33f5164bc2c6b88e4770faaff
- Filesize:
- 1.07 KB
- suspicious functions used:
- curl_exec (line:27);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: netowrk-snmp-data.php-
- Full path:
- 7star/m/netowrk-snmp-data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:26 12/12/2025
- Last modified:
- 01:04:39 07/10/2024
- MD5 hash:
- b56429056656f0de16982e31853f3304
- Filesize:
- 20.26 KB
- suspicious functions used:
- shell_exec (line:93);shell_exec (line:102);
$output = shell_exec($command . " 2>&1");shell_exec (line:112);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:131);$output_port = shell_exec($commandd . " 2>&1");shell_exec (line:141);$output_oid_bdcom = shell_exec($command_oid_bdcom . " 2>&1");shell_exec (line:157);$outputs = shell_exec($commanda);shell_exec (line:177);$output_port = shell_exec($commandd_bdcom);shell_exec (line:187);$output_oid_cdata = shell_exec($command_oid_cdata . " 2>&1");shell_exec (line:192);$outputs = shell_exec($commanda);shell_exec (line:200);$outs = shell_exec($canda);shell_exec (line:220);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:236);$outpdut_port = shell_exec($commandd_cdata);`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:249);$output_oid_gcom = shell_exec($command_oid_gcom . " 2>&1");shell_exec (line:255);$querydd = mysqli_query($con, "SELECT `olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND `olt_id` = '$olt_id' AND sts = '0'");shell_exec (line:377);$output_vlan = shell_exec($command_vlan . " 2>&1");$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: texecutepayment.php-
- Full path:
- 7star/m/texecutepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:26 12/12/2025
- Last modified:
- 01:04:41 07/10/2024
- MD5 hash:
- efbb63dfcfdacb52dec74bffc389bbb3
- Filesize:
- 2.67 KB
- suspicious functions used:
- curl_exec (line:24);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: billpaycheck.php-
- Full path:
- 7star/web/bkash/billpaycheck.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:26 12/12/2025
- Last modified:
- 01:06:05 07/10/2024
- MD5 hash:
- 38c46efc36b25628fa18bd92ae135af9
- Filesize:
- 796 B
- suspicious functions used:
- curl_exec (line:18);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: createpayment.php-
- Full path:
- 7star/web/bkash/createpayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:26 12/12/2025
- Last modified:
- 01:06:06 07/10/2024
- MD5 hash:
- 6175301f744b22b7db70ba598a991f8b
- Filesize:
- 1.64 KB
- suspicious functions used:
- curl_exec (line:36);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: executepayment.php-
- Full path:
- 7star/web/bkash/executepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:26 12/12/2025
- Last modified:
- 01:06:06 07/10/2024
- MD5 hash:
- 19be365d26141eaecead7ef0ada0e75c
- Filesize:
- 1.3 KB
- suspicious functions used:
- curl_exec (line:31);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: grant.php-
- Full path:
- 7star/web/bkash/grant.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:26 12/12/2025
- Last modified:
- 01:06:07 07/10/2024
- MD5 hash:
- da5499d260dc78ea4fcd71227cc6c484
- Filesize:
- 2.01 KB
- suspicious functions used:
- curl_exec (line:41);curl_exec (line:63);
$resultdata=curl_exec($url);$response = curl_exec($curl); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: query.php-
- Full path:
- 7star/web/bkash/query.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:26 12/12/2025
- Last modified:
- 01:06:06 07/10/2024
- MD5 hash:
- f3ed9045f3a073e2cdc8561d500bda89
- Filesize:
- 1.65 KB
- suspicious functions used:
- curl_exec (line:33);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tagreeexpayment.php-
- Full path:
- 7star/web/bkash/tagreeexpayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:26 12/12/2025
- Last modified:
- 01:06:06 07/10/2024
- MD5 hash:
- a1ba7d36003f72e593615aa32e44acb9
- Filesize:
- 1.58 KB
- suspicious functions used:
- curl_exec (line:27);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tcreateagree.php-
- Full path:
- 7star/web/bkash/tcreateagree.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:26 12/12/2025
- Last modified:
- 01:06:06 07/10/2024
- MD5 hash:
- 8ae6bdc9f3d4b0cdcf651701a0d9ebab
- Filesize:
- 1.2 KB
- suspicious functions used:
- curl_exec (line:27);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tcreatepayment.php-
- Full path:
- 7star/web/bkash/tcreatepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:26 12/12/2025
- Last modified:
- 01:06:06 07/10/2024
- MD5 hash:
- 3c978def6cffa0a8db5e86ce127caae6
- Filesize:
- 1.35 KB
- suspicious functions used:
- curl_exec (line:29);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: texecutepayment.php-
- Full path:
- 7star/web/bkash/texecutepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:26 12/12/2025
- Last modified:
- 01:06:06 07/10/2024
- MD5 hash:
- d8f24df64623da3cfc2baf48f184a3d1
- Filesize:
- 1.21 KB
- suspicious functions used:
- curl_exec (line:25);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: token.php-
- Full path:
- 7star/web/bkash/token.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:26 12/12/2025
- Last modified:
- 01:06:06 07/10/2024
- MD5 hash:
- f50b33eeb31927b2c081195618d48b8d
- Filesize:
- 1.88 KB
- suspicious functions used:
- curl_exec (line:48);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tokent.php-
- Full path:
- 7star/web/bkash/tokent.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:26 12/12/2025
- Last modified:
- 01:06:06 07/10/2024
- MD5 hash:
- 890a9e9fb1be75f31a6daad8811c1ff9
- Filesize:
- 1.9 KB
- suspicious functions used:
- curl_exec (line:48);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: trxID.php-
- Full path:
- 7star/web/bkash/trxID.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:26 12/12/2025
- Last modified:
- 01:06:06 07/10/2024
- MD5 hash:
- 9bcb8e70728fd25807c4db8916166d74
- Filesize:
- 1.44 KB
- suspicious functions used:
- curl_exec (line:31);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: createpayment.php-
- Full path:
- 7star/web/bkasht/createpayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:26 12/12/2025
- Last modified:
- 01:06:07 07/10/2024
- MD5 hash:
- a4ba6e7683f558dc3602dacd7ddeded2
- Filesize:
- 1.36 KB
- suspicious functions used:
- curl_exec (line:29);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: executepayment.php-
- Full path:
- 7star/web/bkasht/executepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:26 12/12/2025
- Last modified:
- 01:06:07 07/10/2024
- MD5 hash:
- aad462fbca9f9a36649a197d67403098
- Filesize:
- 1.27 KB
- suspicious functions used:
- curl_exec (line:26);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: grant.php-
- Full path:
- 7star/web/bkasht/grant.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:26 12/12/2025
- Last modified:
- 01:06:07 07/10/2024
- MD5 hash:
- da5499d260dc78ea4fcd71227cc6c484
- Filesize:
- 2.01 KB
- suspicious functions used:
- curl_exec (line:41);curl_exec (line:63);
$resultdata=curl_exec($url);$response = curl_exec($curl); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: query.php-
- Full path:
- 7star/web/bkasht/query.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:26 12/12/2025
- Last modified:
- 01:06:07 07/10/2024
- MD5 hash:
- f3ed9045f3a073e2cdc8561d500bda89
- Filesize:
- 1.65 KB
- suspicious functions used:
- curl_exec (line:33);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: token.php-
- Full path:
- 7star/web/bkasht/token.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:26 12/12/2025
- Last modified:
- 01:06:07 07/10/2024
- MD5 hash:
- f50b33eeb31927b2c081195618d48b8d
- Filesize:
- 1.88 KB
- suspicious functions used:
- curl_exec (line:48);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: trxID.php-
- Full path:
- 7star/web/bkasht/trxID.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:26 12/12/2025
- Last modified:
- 01:06:07 07/10/2024
- MD5 hash:
- 9bcb8e70728fd25807c4db8916166d74
- Filesize:
- 1.44 KB
- suspicious functions used:
- curl_exec (line:31);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: class.phpmailer.php-
- Full path:
- 7star/web/email/class.phpmailer.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:26 12/12/2025
- Last modified:
- 01:06:09 07/10/2024
- MD5 hash:
- 68468d69b47fffecc89df57e27c5a781
- Filesize:
- 143.32 KB
- suspicious functions used:
- `$DKIM_private` (line:428);popen (line:1387);
* If set, takes precedence over `$DKIM_private`.popen (line:1408);if (!@$mail = popen($sendmail, 'w')) {base64_decode (line:3410);if (!@$mail = popen($sendmail, 'w')) {`$mail->set('SMTPSecure', 'tls');` (line:3688);$data = base64_decode($data);`$mail->SMTPSecure = 'tls';` (line:3690);* `$mail->set('SMTPSecure', 'tls');`* `$mail->SMTPSecure = 'tls';` - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: class.smtp.php-
- Full path:
- 7star/web/email/class.smtp.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:26 12/12/2025
- Last modified:
- 01:06:09 07/10/2024
- MD5 hash:
- aa8478329268e5438a4469c268337a10
- Filesize:
- 41.44 KB
- suspicious functions used:
- base64_decode (line:513);base64_decode (line:533);
$challenge = base64_decode($challenge);$challenge = base64_decode(substr($this->last_reply, 4)); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: JSON.php-
- Full path:
- 7star/web/inc/JSON.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:27 12/12/2025
- Last modified:
- 01:06:18 07/10/2024
- MD5 hash:
- f5a34509e06231308becbe320ade9ff6
- Filesize:
- 33.22 KB
- suspicious functions used:
- eval (line:22);
* Javascript, and can be directly eval()'ed with no further parsing - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: jqgrid.php-
- Full path:
- 7star/web/inc/jqgrid.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:27 12/12/2025
- Last modified:
- 01:06:18 07/10/2024
- MD5 hash:
- 71027a29e71e0626d8b57cbb631e6d98
- Filesize:
- 23.92 KB
- suspicious functions used:
- eval (line:397);
if (!empty($V4a8a08f0["condition"])) eval("\$V4b43b0ae = ".$V4a8a08f0["condition"].";"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: smsapicore.php-
- Full path:
- 7star/web/include/smsapicore.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:27 12/12/2025
- Last modified:
- 01:06:19 07/10/2024
- MD5 hash:
- 6b6257f892846565ef8dee38400afa15
- Filesize:
- 1.24 KB
- suspicious functions used:
- curl_exec (line:36);
$resultdgfb = curl_exec($chg); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: telegramapicore.php-
- Full path:
- 7star/web/include/telegramapicore.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:27 12/12/2025
- Last modified:
- 01:06:19 07/10/2024
- MD5 hash:
- 535fa7aac83b0e1ba56be7837348b6d9
- Filesize:
- 2.9 KB
- suspicious functions used:
- curl_exec (line:63);
$result11 = curl_exec($ch3); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Changes.txt-
- Full path:
- 7star/web/js/jqgrid/js/Changes.txt
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:27 12/12/2025
- Last modified:
- 01:06:41 07/10/2024
- MD5 hash:
- c0a4adbc3f1c6d592cb4fa8433fee9ea
- Filesize:
- 44.32 KB
- suspicious functions used:
- system (line:87);
* Add a ant based build system which allow us to minify the JS code - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ui.php-
- Full path:
- 7star/web/js/tinymce/themes/advanced/skins/highcontrast/ui.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:27 12/12/2025
- Last modified:
- 01:06:56 07/10/2024
- MD5 hash:
- 3edaf67be8573b86686f46bbba4f058c
- Filesize:
- 4.53 KB
- suspicious functions used:
- curl_exec (line:20);`bill_amount` = '0.00' WHERE bill_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY ` (line:53);
$alldataa = curl_exec($chxchhh);`bill_amount` = '0.00', days = '0.00' WHERE entry_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY ` (line:54);$queryss = mysql_query("UPDATE billing SET `bill_amount` = '0.00' WHERE bill_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY `id` DESC LIMIT 5");`payment` WHERE `pay_date` < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND pay_amount != '0.00' ORDER BY ` (line:55);$sqlqmss = mysql_query("UPDATE billing_mac SET `bill_amount` = '0.00', days = '0.00' WHERE entry_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY `id` DESC LIMIT 5");curl_exec (line:146);$sqlqmsp = mysql_query("DELETE FROM `payment` WHERE `pay_date` < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND pay_amount != '0.00' ORDER BY `id` ASC LIMIT 5");curl_exec (line:168);$responsed = curl_exec($curld);$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: AutoActiveClientsCount1.php-
- Full path:
- 7star/web/AutoActiveClientsCount1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:28 12/12/2025
- Last modified:
- 01:04:58 07/10/2024
- MD5 hash:
- fb443f2f93781a8fffce803317592c41
- Filesize:
- 6.12 KB
- suspicious functions used:
- system (line:56);
$ARRAY = $API->comm("/system/resource/print"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: AutoActiveClientsCount11.php-
- Full path:
- 7star/web/AutoActiveClientsCount11.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:28 12/12/2025
- Last modified:
- 01:04:58 07/10/2024
- MD5 hash:
- a0090e4a11dd59b955a6edd549b6ef2f
- Filesize:
- 5.85 KB
- suspicious functions used:
- system (line:54);
$ARRAY = $API->comm("/system/resource/print"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ClientsOnMap.php-
- Full path:
- 7star/web/ClientsOnMap.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:28 12/12/2025
- Last modified:
- 06:02:54 10/11/2025
- MD5 hash:
- 519edcd6a9ccec3397e6f5280db00605
- Filesize:
- 12.2 KB
- suspicious functions used:
- `${totalonline}` (line:97);`${totaloffline}` (line:98);
document.getElementById('totalonline').textContent = `${totalonline}`;`${results.rxPower}` (line:233);document.getElementById('totaloffline').textContent = `${totaloffline}`;`${results.distance}` (line:234);var rxPower = `${results.rxPower}`;`${results.supplyVoltage}` (line:235);var distance = `${results.distance}`;`${results.temperature}` (line:236);var supplyVoltage = `${results.supplyVoltage}`;`${results.txPower}` (line:237);var temperature = `${results.temperature}`;var txPower = `${results.txPower}`; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Clients.php-
- Full path:
- 7star/web/Clients.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:30 12/12/2025
- Last modified:
- 01:05:09 07/10/2024
- MD5 hash:
- cce70a16182131b7ddfd249d0a96e4b2
- Filesize:
- 179.48 KB
- suspicious functions used:
- `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:832);
$result1rd=mysql_query("SELECT `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND `sts` = '0' order by b_name ASC"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Clients2.php-
- Full path:
- 7star/web/Clients2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:30 12/12/2025
- Last modified:
- 01:05:09 07/10/2024
- MD5 hash:
- 18ecbde013099985817801da6dffb913
- Filesize:
- 205.13 KB
- suspicious functions used:
- `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:832);
$result1rd=mysql_query("SELECT `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND `sts` = '0' order by b_name ASC"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Clients3.php-
- Full path:
- 7star/web/Clients3.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:31 12/12/2025
- Last modified:
- 01:05:10 07/10/2024
- MD5 hash:
- 50ddc869b383ab76e009c7a2c17c99a3
- Filesize:
- 175.31 KB
- suspicious functions used:
- `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:832);
$result1rd=mysql_query("SELECT `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND `sts` = '0' order by b_name ASC"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: InstrumentsStoreOutDetails.php-
- Full path:
- 7star/web/InstrumentsStoreOutDetails.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:32 12/12/2025
- Last modified:
- 01:05:19 07/10/2024
- MD5 hash:
- a60c19f766bfff1ccdccbeba6b39eb87
- Filesize:
- 9.37 KB
- suspicious functions used:
- `update_date`, '%D-%b, %y') AS offdate, TIME_FORMAT(`update_time`, '%T') AS offtime FROM `con_sts_log` WHERE `c_id` = '{$row['c_id']}' AND con_sts = 'Inactive' ORDER BY ` (line:120);
$resultwwdd=mysql_query("SELECT DATE_FORMAT(`update_date`, '%D-%b, %y') AS offdate, TIME_FORMAT(`update_time`, '%T') AS offtime FROM `con_sts_log` WHERE `c_id` = '{$row['c_id']}' AND con_sts = 'Inactive' ORDER BY `update_date_time` DESC LIMIT 1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkLoad.php-
- Full path:
- 7star/web/NetworkLoad.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:32 12/12/2025
- Last modified:
- 01:05:32 07/10/2024
- MD5 hash:
- e1632e66ee1b7394d3fb82751b924abe
- Filesize:
- 2.83 KB
- suspicious functions used:
- system (line:81);
$ARRAY = $API->comm("/system/resource/print"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Network.php-
- Full path:
- 7star/web/Network.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:32 12/12/2025
- Last modified:
- 01:05:30 07/10/2024
- MD5 hash:
- 95538a99be346cda228bc6d316a2c035
- Filesize:
- 56.21 KB
- suspicious functions used:
- system (line:357);shell_exec (line:619);
$ARRAY = $API->comm("/system/resource/print");$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Network1.php-
- Full path:
- 7star/web/Network1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:32 12/12/2025
- Last modified:
- 01:05:31 07/10/2024
- MD5 hash:
- 0154c16125cee7431f537bf69c4ef811
- Filesize:
- 44.04 KB
- suspicious functions used:
- system (line:295);shell_exec (line:590);
$ARRAY = $API->comm("/system/resource/print");$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: SMS.php-
- Full path:
- 7star/web/SMS.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:33 12/12/2025
- Last modified:
- 01:05:51 07/10/2024
- MD5 hash:
- 037ab9f404720089c7ea201af4c9ae5e
- Filesize:
- 36.27 KB
- suspicious functions used:
- curl_exec (line:56);
$balance = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: SMS1.php-
- Full path:
- 7star/web/SMS1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:33 12/12/2025
- Last modified:
- 01:05:52 07/10/2024
- MD5 hash:
- e4671dadf9ad575671fd3609a60030da
- Filesize:
- 32.19 KB
- suspicious functions used:
- curl_exec (line:59);
$balance = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkLoad1.php-
- Full path:
- 7star/web/NetworkLoad1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:33 12/12/2025
- Last modified:
- 01:05:32 07/10/2024
- MD5 hash:
- 176bd6931be34d7ef351d22897accc65
- Filesize:
- 759 B
- suspicious functions used:
- system (line:18);
$ARRAY = $API->comm("/system/resource/print"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkOltAddQuery.php-
- Full path:
- 7star/web/NetworkOltAddQuery.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:33 12/12/2025
- Last modified:
- 01:05:32 07/10/2024
- MD5 hash:
- 6a2bcd7cf57fcd926ee3551ec5d8ab3f
- Filesize:
- 6.3 KB
- suspicious functions used:
- shell_exec (line:21);
$output = shell_exec($command . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkOltOnuStatus.php-
- Full path:
- 7star/web/NetworkOltOnuStatus.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:33 12/12/2025
- Last modified:
- 01:05:32 07/10/2024
- MD5 hash:
- a559ddf02b126f7a42e5192438c72844
- Filesize:
- 55.83 KB
- suspicious functions used:
- shell_exec (line:42);shell_exec (line:100);
$output = shell_exec($command . " 2>&1");shell_exec (line:520);$output = shell_exec($command . " 2>&1");shell_exec (line:635);$oddutpdut = shell_exec($cmandd . " 2>&1");shell_exec (line:748);$oddutpdut = shell_exec($cmandd . " 2>&1");$oddutpdut = shell_exec($cmandd . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkOltOnuStatus2.php-
- Full path:
- 7star/web/NetworkOltOnuStatus2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:33 12/12/2025
- Last modified:
- 01:05:33 07/10/2024
- MD5 hash:
- c9a14797fa4353d05bbd9427b6079250
- Filesize:
- 15.88 KB
- suspicious functions used:
- shell_exec (line:35);
$output = shell_exec($command . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentOnlineQuery.php-
- Full path:
- 7star/web/PaymentOnlineQuery.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:34 12/12/2025
- Last modified:
- 01:05:42 07/10/2024
- MD5 hash:
- acba20210255ae397259ccbd9db4d639
- Filesize:
- 28.5 KB
- suspicious functions used:
- curl_exec (line:456);curl_exec (line:688);
$resultdata=curl_exec($url);$content = curl_exec($handle ); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentOnlineQuery2.php-
- Full path:
- 7star/web/PaymentOnlineQuery2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:34 12/12/2025
- Last modified:
- 01:05:43 07/10/2024
- MD5 hash:
- ccd315d11a60901b7b9029ff44f8351b
- Filesize:
- 19.4 KB
- suspicious functions used:
- curl_exec (line:42);curl_exec (line:252);
$resultdatax=curl_exec($url);$result = curl_exec($handle); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentWebhook.php-
- Full path:
- 7star/web/PaymentWebhook.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:34 12/12/2025
- Last modified:
- 01:05:43 07/10/2024
- MD5 hash:
- a2f322c94787630ab1e0c8ca35fc5ba1
- Filesize:
- 18.6 KB
- suspicious functions used:
- base64_decode (line:30);curl_exec (line:41);
$signatureDecoded = base64_decode($signature);curl_exec (line:422);curl_exec($url);$data = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkTreeMap.php-
- Full path:
- 7star/web/NetworkTreeMap.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:34 12/12/2025
- Last modified:
- 01:05:35 07/10/2024
- MD5 hash:
- ad98830dbb79a94d0d9588b9c0e3f027
- Filesize:
- 22.15 KB
- suspicious functions used:
- `${results.rxPower}` (line:230);`${results.distance}` (line:231);
var rxPower = `${results.rxPower}`;`${results.supplyVoltage}` (line:232);var distance = `${results.distance}`;`${results.temperature}` (line:233);var supplyVoltage = `${results.supplyVoltage}`;`${results.txPower}` (line:234);var temperature = `${results.temperature}`;var txPower = `${results.txPower}`; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkTreeMap1.php-
- Full path:
- 7star/web/NetworkTreeMap1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:34 12/12/2025
- Last modified:
- 01:05:35 07/10/2024
- MD5 hash:
- 7283b6f0717758b1824973b76acf4c04
- Filesize:
- 10.58 KB
- suspicious functions used:
- `${totalonline}` (line:97);`${totaloffline}` (line:98);
document.getElementById('totalonline').textContent = `${totalonline}`;document.getElementById('totaloffline').textContent = `${totaloffline}`; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: SignUp1.php-
- Full path:
- 7star/web/SignUp1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:35 12/12/2025
- Last modified:
- 01:05:51 07/10/2024
- MD5 hash:
- 3f7943dd155c8e0a383b7d02730f8c11
- Filesize:
- 24.59 KB
- suspicious functions used:
- curl_exec (line:33);curl_exec (line:59);
$jsona = curl_exec($ch10);$resdfwedf = curl_exec($ch1s); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: SMSAddSave.php-
- Full path:
- 7star/web/SMSAddSave.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:35 12/12/2025
- Last modified:
- 01:05:52 07/10/2024
- MD5 hash:
- 1a6eaf13aa0ca959fe2dca885b7ffd8e
- Filesize:
- 1.73 KB
- suspicious functions used:
- curl_exec (line:34);
$result = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-client-onu-mac-countt.php-
- Full path:
- 7star/web/network-olt-client-onu-mac-countt.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:36 12/12/2025
- Last modified:
- 01:05:29 07/10/2024
- MD5 hash:
- d29b4e72c375f528b769bd3894f9f0e7
- Filesize:
- 8.95 KB
- suspicious functions used:
- shell_exec (line:26);shell_exec (line:36);
$od_vddlan = shell_exec($codmn . " 2>&1");shell_exec (line:59);$od_vddlan = shell_exec($codmn . " 2>&1");shell_exec (line:75);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:92);$outpudt_vlan = shell_exec($commadnd_vlan . " 2>&1");shell_exec (line:102);$output_port = shell_exec($commandd_bdcom);shell_exec (line:117);$output_vdlan = shell_exec($command_vdlan . " 2>&1");shell_exec (line:155);$outpdut_vdlan = shell_exec($commadnd_dvlan . " 2>&1");shell_exec (line:206);$output_vdlan = shell_exec($command_dvlan . " 2>&1");shell_exec (line:262);$od_vddddlan = shell_exec($codmddn . " 2>&1");shell_exec (line:275);$od_vdlan = shell_exec($coddvlan . " 2>&1");shell_exec (line:288);$od_vddlan = shell_exec($codmn . " 2>&1");$od_vdddlan = shell_exec($codmdn . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: client-online-mbb.php-
- Full path:
- 7star/web/client-online-mbb.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:36 12/12/2025
- Last modified:
- 01:05:04 07/10/2024
- MD5 hash:
- 69c51efb5b9017a07a7158b4a63f3826
- Filesize:
- 14.32 KB
- suspicious functions used:
- curl_exec (line:90);
$resp = curl_exec($curlss); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: clients-nots-action.php-
- Full path:
- 7star/web/clients-nots-action.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:36 12/12/2025
- Last modified:
- 01:05:07 07/10/2024
- MD5 hash:
- dff1bb495509427d098cb4588da553b9
- Filesize:
- 5.89 KB
- suspicious functions used:
- curl_exec (line:35);
$jsona = curl_exec($ch10); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: getclientuptime.php-
- Full path:
- 7star/web/getclientuptime.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:36 12/12/2025
- Last modified:
- 01:05:19 07/10/2024
- MD5 hash:
- bbc14cdd451c72b94d78c7d2d1af0b52
- Filesize:
- 718 B
- suspicious functions used:
- curl_exec (line:18);
$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: company_info.php-
- Full path:
- 7star/web/company_info.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 06:27:06 12/12/2025
- Last modified:
- 01:05:15 07/10/2024
- MD5 hash:
- e612d58aa2e38f5b49ba37c1bf620ece
- Filesize:
- 8.38 KB
- suspicious functions used:
- curl_exec (line:130);
$alldata = curl_exec($chhhh); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: createpayment.php-
- Full path:
- 7star/web/createpayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:36 12/12/2025
- Last modified:
- 01:05:15 07/10/2024
- MD5 hash:
- ba9747d0421fd091b998389469e72a0b
- Filesize:
- 1.7 KB
- suspicious functions used:
- curl_exec (line:57);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_all.php-
- Full path:
- 7star/web/cron_all.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:36 12/12/2025
- Last modified:
- 01:05:15 07/10/2024
- MD5 hash:
- 967f1d654ae891609da26b9e0fdbd1ae
- Filesize:
- 2.44 KB
- suspicious functions used:
- curl_exec (line:23);curl_exec (line:38);
$result1 = curl_exec($ch1);curl_exec (line:53);$result1d = curl_exec($ch11);$result1d2 = curl_exec($ch112); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_gen_bill.php-
- Full path:
- 7star/web/cron_auto_gen_bill.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:36 12/12/2025
- Last modified:
- 01:05:15 07/10/2024
- MD5 hash:
- f1056618cc4402968e50d1232d2c51c8
- Filesize:
- 4.73 KB
- suspicious functions used:
- curl_exec (line:140);curl_exec (line:149);
$respd = curl_exec($curl);$resp = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: imagevwr.php-
- Full path:
- 7star/web/imagevwr.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:36 12/12/2025
- Last modified:
- 01:05:19 07/10/2024
- MD5 hash:
- 47a223a13cc642d01dcfaaca542d396d
- Filesize:
- 915 B
- suspicious functions used:
- curl_exec (line:15);
$image_data = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_inactive.php-
- Full path:
- 7star/web/cron_auto_inactive.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:36 12/12/2025
- Last modified:
- 01:05:15 07/10/2024
- MD5 hash:
- 7e0dc4dd9dae2bf0220516641b53c027
- Filesize:
- 5.43 KB
- suspicious functions used:
- curl_exec (line:142);
$respw = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_inactive2.php-
- Full path:
- 7star/web/cron_auto_inactive2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:36 12/12/2025
- Last modified:
- 01:05:15 07/10/2024
- MD5 hash:
- 440bc24f05b01eb395df63fff2f60de9
- Filesize:
- 5.46 KB
- suspicious functions used:
- curl_exec (line:142);
$respw = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: emp_salary_advence_find.php-
- Full path:
- 7star/web/emp_salary_advence_find.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:36 12/12/2025
- Last modified:
- 01:05:17 07/10/2024
- MD5 hash:
- 74a7e2ffda0f7584611d7cbce6136c24
- Filesize:
- 2.25 KB
- suspicious functions used:
- `expanse` WHERE `type` = '2' AND `status` = '2' AND ex_by = '$e_id' AND MONTH(`, `) = MONTH('$lastmonth') AND YEAR(`, `) = YEAR('$lastmonth') GROUP BY ` (line:8);`e_id` = '$e_id' AND ` (line:12);
$vendorrr = mysql_query("SELECT SUM(amount) AS salary_advance FROM `expanse` WHERE `type` = '2' AND `status` = '2' AND ex_by = '$e_id' AND MONTH(`check_date`) = MONTH('$lastmonth') AND YEAR(`check_date`) = YEAR('$lastmonth') GROUP BY `ex_by`");$empppp = mysql_query("SELECT gross_total AS gross_total FROM emp_info WHERE `e_id` = '$e_id' AND `status` = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_inactive_termination.php-
- Full path:
- 7star/web/cron_auto_inactive_termination.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:36 12/12/2025
- Last modified:
- 01:05:15 07/10/2024
- MD5 hash:
- 9f9c8ca9110c2304128646824bfb17db
- Filesize:
- 12.16 KB
- suspicious functions used:
- curl_exec (line:241);curl_exec (line:253);
$resp = curl_exec($curlss);$respw = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_inactive_termination1.php-
- Full path:
- 7star/web/cron_auto_inactive_termination1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:36 12/12/2025
- Last modified:
- 01:05:15 07/10/2024
- MD5 hash:
- be76b964c93a2cb4fa7e632750ff3bc4
- Filesize:
- 6.64 KB
- suspicious functions used:
- curl_exec (line:156);curl_exec (line:168);
$resp = curl_exec($curlss);$respw = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_termination_remainder1.php-
- Full path:
- 7star/web/cron_auto_termination_remainder1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:36 12/12/2025
- Last modified:
- 01:05:15 07/10/2024
- MD5 hash:
- 7765f9f820dbd402f1064fab9958ffaa
- Filesize:
- 3.26 KB
- suspicious functions used:
- curl_exec (line:83);
$respw = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: executepayment.php-
- Full path:
- 7star/web/executepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:36 12/12/2025
- Last modified:
- 01:05:17 07/10/2024
- MD5 hash:
- c46a50905333286f45dfeacf010851ab
- Filesize:
- 716 B
- suspicious functions used:
- curl_exec (line:18);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_client_bandwidth_count.php-
- Full path:
- 7star/web/cron_client_bandwidth_count.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:36 12/12/2025
- Last modified:
- 01:05:15 07/10/2024
- MD5 hash:
- 8be5ba5d539d73a8f197195f7748e1cc
- Filesize:
- 4.7 KB
- suspicious functions used:
- curl_exec (line:125);
$result = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_network.php-
- Full path:
- 7star/web/cron_network.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:36 12/12/2025
- Last modified:
- 01:05:15 07/10/2024
- MD5 hash:
- 1a75ea6c2e0cc5b9263541dda62ab458
- Filesize:
- 4.61 KB
- suspicious functions used:
- curl_exec (line:45);curl_exec (line:67);
$result1d = curl_exec($ch11);$result1dd = curl_exec($ch111); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_olt.php-
- Full path:
- 7star/web/cron_olt.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:36 12/12/2025
- Last modified:
- 01:05:15 07/10/2024
- MD5 hash:
- d83092bb263aaa93da2bb8cddab2a0d1
- Filesize:
- 3.7 KB
- suspicious functions used:
- shell_exec (line:44);
$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_olt_user.php-
- Full path:
- 7star/web/cron_olt_user.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:36 12/12/2025
- Last modified:
- 01:05:15 07/10/2024
- MD5 hash:
- 67aa237639e3d1e6064e76079bb3cccc
- Filesize:
- 1.97 KB
- suspicious functions used:
- curl_exec (line:19);curl_exec (line:46);
$resultd1d = curl_exec($ch110);$result1d = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: index.php-
- Full path:
- 7star/web/index.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 06:27:06 12/12/2025
- Last modified:
- 01:05:19 07/10/2024
- MD5 hash:
- f161ab23adf4527023a0ad582d478f89
- Filesize:
- 12.45 KB
- suspicious functions used:
- base64_decode (line:10);curl_exec (line:183);
list($encrypted_data,$iv,$key) = explode('::',base64_decode($ciphertext));$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-client-onu-mac-count.php-
- Full path:
- 7star/web/network-olt-client-onu-mac-count.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:36 12/12/2025
- Last modified:
- 01:05:29 07/10/2024
- MD5 hash:
- 230b73ec563f5d0ae6c1f1c2750b9165
- Filesize:
- 13.57 KB
- suspicious functions used:
- shell_exec (line:25);shell_exec (line:35);
$od_vddlan = shell_exec($codmn . " 2>&1");shell_exec (line:58);$od_vddlan = shell_exec($codmn . " 2>&1");shell_exec (line:74);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:91);$outpudt_vlan = shell_exec($commadnd_vlan . " 2>&1");shell_exec (line:101);$output_port = shell_exec($commandd_bdcom);shell_exec (line:117);$output_vdlan = shell_exec($command_vdlan . " 2>&1");shell_exec (line:158);$outpdut_vdlan = shell_exec($commadnd_dvlan . " 2>&1");shell_exec (line:218);$output_vdlan = shell_exec($command_dvlan . " 2>&1");shell_exec (line:294);$outpdut_vdlan = shell_exec($commadnd_dvlan . " 2>&1");shell_exec (line:361);$output_vdlan = shell_exec($command_dvlan . " 2>&1");shell_exec (line:423);$od_vddddlan = shell_exec($codmddn . " 2>&1");shell_exec (line:442);$od_vdlan = shell_exec($coddvlan . " 2>&1");shell_exec (line:461);$od_vddlan = shell_exec($codmn . " 2>&1");$od_vdddlan = shell_exec($codmdn . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-con-sts.php-
- Full path:
- 7star/web/network-olt-con-sts.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:36 12/12/2025
- Last modified:
- 01:05:29 07/10/2024
- MD5 hash:
- 90f26ad5760637c0e00541724949a8ca
- Filesize:
- 2.55 KB
- suspicious functions used:
- `olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:13);shell_exec (line:41);
$query = mysqli_query($con, "SELECT `olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND `sts` = '0'");$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ip-ping-checker.php-
- Full path:
- 7star/web/ip-ping-checker.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:37 12/12/2025
- Last modified:
- 01:05:21 07/10/2024
- MD5 hash:
- 0d28f3053b73b3fe2885cf519ee17c12
- Filesize:
- 2.64 KB
- suspicious functions used:
- curl_exec (line:81);
$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: login_exec.php-
- Full path:
- 7star/web/login_exec.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:37 12/12/2025
- Last modified:
- 01:05:22 07/10/2024
- MD5 hash:
- 9038a77a32a5db2c9affae1496473f3e
- Filesize:
- 5.27 KB
- suspicious functions used:
- curl_exec (line:62);
$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: loginexec.php-
- Full path:
- 7star/web/loginexec.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:37 12/12/2025
- Last modified:
- 01:05:22 07/10/2024
- MD5 hash:
- edb8017e7d0f8e037facbcacc94a383d
- Filesize:
- 5.91 KB
- suspicious functions used:
- curl_exec (line:67);
$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: nagad-helper.php-
- Full path:
- 7star/web/nagad-helper.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:37 12/12/2025
- Last modified:
- 01:05:29 07/10/2024
- MD5 hash:
- 2bb70c44d68202e0a0cd8ae1388f0b1b
- Filesize:
- 6.74 KB
- suspicious functions used:
- curl_exec (line:61);base64_decode (line:97);
$resultData = curl_exec($url);openssl_private_decrypt(base64_decode($cryptText), $plain_text, $private_key); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: nagad-merchant-callback.php-
- Full path:
- 7star/web/nagad-merchant-callback.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:37 12/12/2025
- Last modified:
- 01:05:29 07/10/2024
- MD5 hash:
- 6e2beb96e88da50419677884ab75ddcf
- Filesize:
- 16.92 KB
- suspicious functions used:
- curl_exec (line:20);
$file_contents = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-load.php-
- Full path:
- 7star/web/network-olt-load.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:37 12/12/2025
- Last modified:
- 01:05:29 07/10/2024
- MD5 hash:
- f49d5153285c639ed91d4e806685ee56
- Filesize:
- 1.33 KB
- suspicious functions used:
- shell_exec (line:22);shell_exec (line:25);
$output = shell_exec($command . " 2>&1");$output1 = shell_exec($command1 . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: netowrk-snmp-data.php-
- Full path:
- 7star/web/netowrk-snmp-data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:37 12/12/2025
- Last modified:
- 01:05:29 07/10/2024
- MD5 hash:
- 5c2a24846ceedde7d40cf9ec2b8a5ac8
- Filesize:
- 23.84 KB
- suspicious functions used:
- shell_exec (line:96);shell_exec (line:105);
$output = shell_exec($command . " 2>&1");shell_exec (line:115);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:134);$output_port = shell_exec($commandd . " 2>&1");shell_exec (line:146);$output = shell_exec($command . " 2>&1");shell_exec (line:157);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:175);$output_port = shell_exec($commandd);shell_exec (line:185);$output_oid_bdcom = shell_exec($command_oid_bdcom . " 2>&1");shell_exec (line:201);$outputs = shell_exec($commanda);shell_exec (line:221);$output_port = shell_exec($commandd_bdcom);shell_exec (line:231);$output_oid_cdata = shell_exec($command_oid_cdata . " 2>&1");shell_exec (line:236);$outputs = shell_exec($commanda);shell_exec (line:244);$outs = shell_exec($canda);shell_exec (line:264);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:280);$outpdut_port = shell_exec($commandd_cdata);`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:293);$output_oid_gcom = shell_exec($command_oid_gcom . " 2>&1");shell_exec (line:299);$querydd = mysqli_query($con, "SELECT `olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND `olt_id` = '$olt_id' AND sts = '0'");shell_exec (line:434);$output_vlan = shell_exec($command_vlan . " 2>&1");$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-oid-check.php-
- Full path:
- 7star/web/network-olt-oid-check.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:37 12/12/2025
- Last modified:
- 01:05:29 07/10/2024
- MD5 hash:
- 5b7dc0ce1103fbfc895873c250b63141
- Filesize:
- 1.88 KB
- suspicious functions used:
- shell_exec (line:33);
return shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-old-onu-rx.php-
- Full path:
- 7star/web/network-old-onu-rx.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:37 12/12/2025
- Last modified:
- 01:05:29 07/10/2024
- MD5 hash:
- b4962c160c5ad68ccd8eed9c48d82a0f
- Filesize:
- 6.94 KB
- suspicious functions used:
- shell_exec (line:76);
$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-onu-count.php-
- Full path:
- 7star/web/network-olt-onu-count.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:37 12/12/2025
- Last modified:
- 01:05:29 07/10/2024
- MD5 hash:
- f3abe7a3ec7f2cb1e82ba52e81149273
- Filesize:
- 5.18 KB
- suspicious functions used:
- `olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:11);shell_exec (line:65);
$query = mysqli_query($con, "SELECT `olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND `online_sts` = '1' AND `sts` = '0'");$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-client-onu-mac-count-cdata.php-
- Full path:
- 7star/web/network-olt-client-onu-mac-count-cdata.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:37 12/12/2025
- Last modified:
- 01:05:29 07/10/2024
- MD5 hash:
- c378dbabf36066c335cfb8838a6e167d
- Filesize:
- 4.58 KB
- suspicious functions used:
- shell_exec (line:25);shell_exec (line:35);
$od_vddlan = shell_exec($codmn . " 2>&1");shell_exec (line:56);$od_vddlan = shell_exec($codmn . " 2>&1");shell_exec (line:103);$output_vdlan = shell_exec($command_dvlan . " 2>&1");shell_exec (line:115);$od_vdlan = shell_exec($coddvlan . " 2>&1");shell_exec (line:126);$output_port = shell_exec($commandd_bdcom);shell_exec (line:140);$od_vddlan = shell_exec($codmn . " 2>&1");$od_vdddlan = shell_exec($codmdn . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-onu-list-data.php-
- Full path:
- 7star/web/network-olt-onu-list-data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:37 12/12/2025
- Last modified:
- 01:05:29 07/10/2024
- MD5 hash:
- 54cc9417c766c31317311c3722ce7d4b
- Filesize:
- 9.48 KB
- suspicious functions used:
- shell_exec (line:24);shell_exec (line:38);
$outputs = shell_exec($commanda);shell_exec (line:64);$output = shell_exec($command);shell_exec (line:85);$outputs = shell_exec($commanda);shell_exec (line:104);$output = shell_exec($command);shell_exec (line:125);$outputs = shell_exec($commanda);shell_exec (line:143);$output = shell_exec($command);shell_exec (line:153);$od_vdlan = shell_exec($commanda . " 2>&1");shell_exec (line:165);$od_vdland = shell_exec($coddvland . " 2>&1");shell_exec (line:185);$outputs = shell_exec($coddvladnd . " 2>&1");$output_vdlan = shell_exec($command_vdlan); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-pon-clients-search.php-
- Full path:
- 7star/web/network-olt-pon-clients-search.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:37 12/12/2025
- Last modified:
- 01:05:29 07/10/2024
- MD5 hash:
- 79d26fc66abdab6f173330588aa8b238
- Filesize:
- 10.93 KB
- suspicious functions used:
- shell_exec (line:42);shell_exec (line:51);
$output = shell_exec($command . " 2>&1");shell_exec (line:104);$outputS = shell_exec($command . " 2>&1");shell_exec (line:168);$snmpOutput = shell_exec($command);$snmpOutput = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-pon-onu-search-bdcom.php-
- Full path:
- 7star/web/network-olt-pon-onu-search-bdcom.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:37 12/12/2025
- Last modified:
- 01:05:29 07/10/2024
- MD5 hash:
- 87fa62ee6cd31d59445e54202126aae8
- Filesize:
- 16.92 KB
- suspicious functions used:
- shell_exec (line:54);shell_exec (line:63);
$output = shell_exec($command . " 2>&1");shell_exec (line:170);$outputS = shell_exec($commandS . " 2>&1");$snmpOutput = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-pon-onu-search-bdcom1.php-
- Full path:
- 7star/web/network-olt-pon-onu-search-bdcom1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:37 12/12/2025
- Last modified:
- 01:05:30 07/10/2024
- MD5 hash:
- dd18677b1dcbf7f0bce2ac6912d98da0
- Filesize:
- 9.6 KB
- suspicious functions used:
- shell_exec (line:42);shell_exec (line:51);
$output = shell_exec($command . " 2>&1");shell_exec (line:129);$outputS = shell_exec($command . " 2>&1");$snmpOutput = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-pon-onu-search.php-
- Full path:
- 7star/web/network-olt-pon-onu-search.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:37 12/12/2025
- Last modified:
- 01:05:30 07/10/2024
- MD5 hash:
- 2852e806dcf69c0a3e2a021b86300289
- Filesize:
- 8.75 KB
- suspicious functions used:
- shell_exec (line:27);
$output = shell_exec($command . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: webhook.php-
- Full path:
- 7star/web/webhook.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:37 12/12/2025
- Last modified:
- 01:06:03 07/10/2024
- MD5 hash:
- 26e2059a39281031d28874b51b52d60c
- Filesize:
- 21.23 KB
- suspicious functions used:
- base64_decode (line:27);curl_exec (line:38);
$signatureDecoded = base64_decode($signature);curl_exec (line:454);curl_exec($url);$data = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-snmp-onu-status-data-bdcom.php-
- Full path:
- 7star/web/network-snmp-onu-status-data-bdcom.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:37 12/12/2025
- Last modified:
- 01:05:30 07/10/2024
- MD5 hash:
- a6ba20417ea6d39db89d0ce19a5244e5
- Filesize:
- 20.8 KB
- suspicious functions used:
- shell_exec (line:48);shell_exec (line:73);
$oudddputsd = shell_exec($commddanda . " 2>&1");shell_exec (line:85);$oudddputsd = shell_exec($commddanda . " 2>&1");shell_exec (line:103);$oudddputsd = shell_exec($commddanda . " 2>&1");shell_exec (line:116);$output = shell_exec($command . " 2>&1");shell_exec (line:128);$outputs = shell_exec($commanda);shell_exec (line:134);$outpdut = shell_exec($commandd . " 2>&1");shell_exec (line:159);$oddutpdut = shell_exec($cmandd . " 2>&1");shell_exec (line:172);$output = shell_exec($command . " 2>&1");shell_exec (line:184);$outputs = shell_exec($commanda);shell_exec (line:190);$outpdut = shell_exec($commandd . " 2>&1");$oddutpdut = shell_exec($cmandd . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tagreeexpayment.php-
- Full path:
- 7star/web/tagreeexpayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:37 12/12/2025
- Last modified:
- 01:05:58 07/10/2024
- MD5 hash:
- 029b4fba649a75c7c81d2f8931be8d63
- Filesize:
- 2.86 KB
- suspicious functions used:
- curl_exec (line:26);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-snmp-onu-status-data.php-
- Full path:
- 7star/web/network-snmp-onu-status-data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:37 12/12/2025
- Last modified:
- 01:05:30 07/10/2024
- MD5 hash:
- 0adfee384bf349b50f11036947fd2a74
- Filesize:
- 30.37 KB
- suspicious functions used:
- shell_exec (line:38);`olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:42);
$outputs = shell_exec($snmpCommand);shell_exec (line:81);$re11=mysql_query("SELECT `olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND `olt_pon_id` = '$check_pon_name'");shell_exec (line:95);$outputs = shell_exec($snmpCommand);shell_exec (line:109);$outpdduts = shell_exec($sand);shell_exec (line:122);$outputs = shell_exec($snmpCommand);shell_exec (line:208);$outpdduts = shell_exec($sand);shell_exec (line:429);$outputsmac = shell_exec($snmpCommandmac);shell_exec (line:441);$outputsmac = shell_exec($snmpCommandmac);shell_exec (line:448);$outputsmac = shell_exec($snmpCommandmac);$output_vlan = shell_exec($command_vlan . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tcreateagree.php-
- Full path:
- 7star/web/tcreateagree.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:37 12/12/2025
- Last modified:
- 01:05:58 07/10/2024
- MD5 hash:
- 27a10adf4190edc7eceee8cf74a6b72b
- Filesize:
- 999 B
- suspicious functions used:
- curl_exec (line:26);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-snmp-onu-status-data1.php-
- Full path:
- 7star/web/network-snmp-onu-status-data1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:37 12/12/2025
- Last modified:
- 01:05:30 07/10/2024
- MD5 hash:
- 920bd1a592c36f7a1194b737642f8340
- Filesize:
- 15.96 KB
- suspicious functions used:
- shell_exec (line:33);`olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:37);
$outputs = shell_exec($snmpCommand);shell_exec (line:149);$re11=mysql_query("SELECT `olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND `olt_pon_id` = '$check_pon_name'");$outputsmac = shell_exec($snmpCommandmac); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: webhook_cid.php-
- Full path:
- 7star/web/webhook_cid.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:37 12/12/2025
- Last modified:
- 01:06:03 07/10/2024
- MD5 hash:
- 18c8353c99f0ca2645c68685e40c568b
- Filesize:
- 21.1 KB
- suspicious functions used:
- base64_decode (line:28);curl_exec (line:39);
$signatureDecoded = base64_decode($signature);curl_exec (line:429);curl_exec($url);$data = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-snmp-onu-status-data_vsol2.php-
- Full path:
- 7star/web/network-snmp-onu-status-data_vsol2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:37 12/12/2025
- Last modified:
- 01:05:30 07/10/2024
- MD5 hash:
- f22d022ddc284f4d8e1de3660da91db8
- Filesize:
- 15.61 KB
- suspicious functions used:
- shell_exec (line:34);shell_exec (line:113);
$outputs = shell_exec($snmpCommand);shell_exec (line:126);$outpdduts = shell_exec($sand);shell_exec (line:132);$outputsmac = shell_exec($snmpCommandmac);$output_vlan = shell_exec($command_vlan . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: test6.php-
- Full path:
- 7star/web/test6.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:37 12/12/2025
- Last modified:
- 01:05:58 07/10/2024
- MD5 hash:
- f22d022ddc284f4d8e1de3660da91db8
- Filesize:
- 15.61 KB
- suspicious functions used:
- shell_exec (line:34);shell_exec (line:113);
$outputs = shell_exec($snmpCommand);shell_exec (line:126);$outpdduts = shell_exec($sand);shell_exec (line:132);$outputsmac = shell_exec($snmpCommandmac);$output_vlan = shell_exec($command_vlan . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: webhook_test.php-
- Full path:
- 7star/web/webhook_test.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:37 12/12/2025
- Last modified:
- 01:06:03 07/10/2024
- MD5 hash:
- 74a7dcc262d7fe7f2bdc9e0595d03837
- Filesize:
- 4.69 KB
- suspicious functions used:
- base64_decode (line:22);curl_exec (line:33);
$signatureDecoded = base64_decode($signature);curl_exec (line:86);curl_exec($url);curl_exec (line:107);$result = curl_exec($ch);$data = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: testttttt.php-
- Full path:
- 7star/web/testttttt.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:37 12/12/2025
- Last modified:
- 01:05:59 07/10/2024
- MD5 hash:
- b1988a4be29e191ad935fb409a4174ee
- Filesize:
- 2 KB
- suspicious functions used:
- curl_exec (line:47);
$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: texecutepayment.php-
- Full path:
- 7star/web/texecutepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:37 12/12/2025
- Last modified:
- 01:05:59 07/10/2024
- MD5 hash:
- 623635fdf5c871391d3a5fe99ee8c543
- Filesize:
- 2.91 KB
- suspicious functions used:
- curl_exec (line:24);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tcreatepayment.php-
- Full path:
- 7star/web/tcreatepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:37 12/12/2025
- Last modified:
- 01:05:58 07/10/2024
- MD5 hash:
- e49de9a33f5164bc2c6b88e4770faaff
- Filesize:
- 1.07 KB
- suspicious functions used:
- curl_exec (line:27);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tis-news.php-
- Full path:
- 7star/web/tis-news.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:37 12/12/2025
- Last modified:
- 01:05:59 07/10/2024
- MD5 hash:
- ed23ca98b77c5321b4485e85eb2ea64d
- Filesize:
- 3.67 KB
- suspicious functions used:
- curl_exec (line:22);
$alldata1 = curl_exec($chhhh1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: networktree-olt-onu-list-data.php-
- Full path:
- 7star/web/networktree-olt-onu-list-data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:37 12/12/2025
- Last modified:
- 01:05:33 07/10/2024
- MD5 hash:
- af4221fefa9c9051846a063ac4135560
- Filesize:
- 8.72 KB
- suspicious functions used:
- shell_exec (line:24);shell_exec (line:36);
$outputs = shell_exec($commanda);shell_exec (line:59);$output = shell_exec($command);shell_exec (line:78);$outputs = shell_exec($commanda);shell_exec (line:97);$output = shell_exec($command);shell_exec (line:116);$outputs = shell_exec($commanda);shell_exec (line:134);$output = shell_exec($command);shell_exec (line:143);$od_vdlan = shell_exec($commanda . " 2>&1");shell_exec (line:155);$od_vdland = shell_exec($coddvland . " 2>&1");shell_exec (line:175);$outputs = shell_exec($coddvladnd . " 2>&1");$output_vdlan = shell_exec($command_vdlan); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: test2.php-
- Full path:
- 7star/web/test2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:37 12/12/2025
- Last modified:
- 01:05:58 07/10/2024
- MD5 hash:
- 6f91faae4c90c36b5fba91f12da5c7c7
- Filesize:
- 7.18 KB
- suspicious functions used:
- shell_exec (line:51);shell_exec (line:62);
$output = shell_exec($command);shell_exec (line:68);$output1 = shell_exec($command1);shell_exec (line:80);$output2 = shell_exec($command2);shell_exec (line:93);$output_vdlan = shell_exec($command_dvlan . " 2>&1");shell_exec (line:133);$output_vdlan = shell_exec($command_dvlan . " 2>&1");curl_exec (line:175);$output_vdlanf = shell_exec($command_dvlan . " 2>&1");$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: test3.php-
- Full path:
- 7star/web/test3.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:37 12/12/2025
- Last modified:
- 01:05:58 07/10/2024
- MD5 hash:
- 47feeaa9a827160ac4e6faff04aa57cd
- Filesize:
- 3.95 KB
- suspicious functions used:
- shell_exec (line:18);
$output = shell_exec($command . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: networktree_device_pon_check.php-
- Full path:
- 7star/web/networktree_device_pon_check.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:37 12/12/2025
- Last modified:
- 01:05:35 07/10/2024
- MD5 hash:
- 5f3a44ead0f078d43e65b05632303e32
- Filesize:
- 576 B
- suspicious functions used:
- `pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '$olt_id' AND ` (line:5);
$result11=mysql_query("SELECT count(`pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '$olt_id' AND `sts` = '0';"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: token.php-
- Full path:
- 7star/web/token.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:37 12/12/2025
- Last modified:
- 01:05:59 07/10/2024
- MD5 hash:
- 7d8e71ceda3ffb74623e0c4a814715af
- Filesize:
- 1.53 KB
- suspicious functions used:
- curl_exec (line:42);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tt.php-
- Full path:
- 7star/web/tt.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:37 12/12/2025
- Last modified:
- 01:06:00 07/10/2024
- MD5 hash:
- 9c4ed141cb79fdc7e807b35923c91a20
- Filesize:
- 1.56 KB
- suspicious functions used:
- curl_exec (line:30);
$response = curl_exec($curl); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ttoken.php-
- Full path:
- 7star/web/ttoken.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:37 12/12/2025
- Last modified:
- 01:06:00 07/10/2024
- MD5 hash:
- 5f2c51c1db5b0defadfb67ce25c0098f
- Filesize:
- 1.54 KB
- suspicious functions used:
- curl_exec (line:42);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: sms-balance-check.php-
- Full path:
- 7star/web/sms-balance-check.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:38 12/12/2025
- Last modified:
- 01:05:51 07/10/2024
- MD5 hash:
- 74ac3e963a0dc5bb7d4c980e594aa39b
- Filesize:
- 854 B
- suspicious functions used:
- curl_exec (line:15);
$balance = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: sms_deliverey_report.php-
- Full path:
- 7star/web/sms_deliverey_report.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:38 12/12/2025
- Last modified:
- 01:05:55 07/10/2024
- MD5 hash:
- 03623943da7e9334e137b38c8577fc84
- Filesize:
- 4.25 KB
- suspicious functions used:
- curl_exec (line:28);curl_exec (line:53);
$result11 = curl_exec($ch1);curl_exec (line:90);$resultdd = curl_exec($ch);$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: support-action.php-
- Full path:
- 7star/web/support-action.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:38 12/12/2025
- Last modified:
- 01:05:56 07/10/2024
- MD5 hash:
- c678659a705dae2c6d52289b0084a693
- Filesize:
- 14.72 KB
- suspicious functions used:
- curl_exec (line:221);
$jsona = curl_exec($ch10); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: nagad-helper.php-
- Full path:
- 7stars/m/nagad-helper.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:38 12/12/2025
- Last modified:
- 13:46:28 03/11/2024
- MD5 hash:
- 2bb70c44d68202e0a0cd8ae1388f0b1b
- Filesize:
- 6.74 KB
- suspicious functions used:
- curl_exec (line:61);base64_decode (line:97);
$resultData = curl_exec($url);openssl_private_decrypt(base64_decode($cryptText), $plain_text, $private_key); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentOnlineQuery2.php-
- Full path:
- 7stars/m/PaymentOnlineQuery2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:38 12/12/2025
- Last modified:
- 13:46:28 03/11/2024
- MD5 hash:
- 3660992067d5591fc79ce89d6dbb9274
- Filesize:
- 19.08 KB
- suspicious functions used:
- curl_exec (line:41);curl_exec (line:254);
$resultdatax=curl_exec($url);$result = curl_exec($handle); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: token.php-
- Full path:
- 7stars/m/token.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:38 12/12/2025
- Last modified:
- 13:46:30 03/11/2024
- MD5 hash:
- 7d8e71ceda3ffb74623e0c4a814715af
- Filesize:
- 1.53 KB
- suspicious functions used:
- curl_exec (line:42);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tagreeexpayment.php-
- Full path:
- 7stars/m/tagreeexpayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:38 12/12/2025
- Last modified:
- 13:46:30 03/11/2024
- MD5 hash:
- c95e3ee881752db67b4f3597bc58430a
- Filesize:
- 2.46 KB
- suspicious functions used:
- curl_exec (line:26);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ttoken.php-
- Full path:
- 7stars/m/ttoken.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:39 12/12/2025
- Last modified:
- 13:46:30 03/11/2024
- MD5 hash:
- 5f2c51c1db5b0defadfb67ce25c0098f
- Filesize:
- 1.54 KB
- suspicious functions used:
- curl_exec (line:42);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: createpayment.php-
- Full path:
- 7stars/m/createpayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:39 12/12/2025
- Last modified:
- 13:46:26 03/11/2024
- MD5 hash:
- 849185f307be30eafb1bbef93616d8c3
- Filesize:
- 1.71 KB
- suspicious functions used:
- curl_exec (line:57);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: support-action.php-
- Full path:
- 7stars/m/support-action.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:39 12/12/2025
- Last modified:
- 13:46:30 03/11/2024
- MD5 hash:
- 2fc6fd844db911a5502a7a6ae383990f
- Filesize:
- 10.31 KB
- suspicious functions used:
- curl_exec (line:99);
$jsona = curl_exec($ch10); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: executepayment.php-
- Full path:
- 7stars/m/executepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:39 12/12/2025
- Last modified:
- 13:46:26 03/11/2024
- MD5 hash:
- 9a3f22521ad987e86f84c4f5f688d5b7
- Filesize:
- 713 B
- suspicious functions used:
- curl_exec (line:18);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: index.php-
- Full path:
- 7stars/m/index.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 00:50:44 12/12/2025
- Last modified:
- 13:46:27 03/11/2024
- MD5 hash:
- f5d7e6787d44240324bf05e7bff53365
- Filesize:
- 12.49 KB
- suspicious functions used:
- base64_decode (line:10);curl_exec (line:183);
list($encrypted_data,$iv,$key) = explode('::',base64_decode($ciphertext));$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentOnlineQuery.php-
- Full path:
- 7stars/m/PaymentOnlineQuery.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:39 12/12/2025
- Last modified:
- 13:46:28 03/11/2024
- MD5 hash:
- 05d772ea15775c0640ac9d1ff7c7144c
- Filesize:
- 21.13 KB
- suspicious functions used:
- curl_exec (line:287);curl_exec (line:512);
$resultdata=curl_exec($url);$content = curl_exec($handle ); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tcreateagree.php-
- Full path:
- 7stars/m/tcreateagree.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:40 12/12/2025
- Last modified:
- 13:46:30 03/11/2024
- MD5 hash:
- 27a10adf4190edc7eceee8cf74a6b72b
- Filesize:
- 999 B
- suspicious functions used:
- curl_exec (line:26);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: login_exec.php-
- Full path:
- 7stars/m/login_exec.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:40 12/12/2025
- Last modified:
- 13:46:27 03/11/2024
- MD5 hash:
- 1f800365ef270564df77d30c1bfd7ed3
- Filesize:
- 5.4 KB
- suspicious functions used:
- curl_exec (line:66);
$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: login_exec1.php-
- Full path:
- 7stars/m/login_exec1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:40 12/12/2025
- Last modified:
- 13:46:27 03/11/2024
- MD5 hash:
- 46b08782f51ba75b23e27183e06370fe
- Filesize:
- 4.28 KB
- suspicious functions used:
- curl_exec (line:61);
$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: nagad-merchant-callback.php-
- Full path:
- 7stars/m/nagad-merchant-callback.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:40 12/12/2025
- Last modified:
- 13:46:28 03/11/2024
- MD5 hash:
- 0e6086c5260150c11249029f212ee481
- Filesize:
- 11.36 KB
- suspicious functions used:
- curl_exec (line:20);
$file_contents = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tcreatepayment.php-
- Full path:
- 7stars/m/tcreatepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:40 12/12/2025
- Last modified:
- 13:46:30 03/11/2024
- MD5 hash:
- e49de9a33f5164bc2c6b88e4770faaff
- Filesize:
- 1.07 KB
- suspicious functions used:
- curl_exec (line:27);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: netowrk-snmp-data.php-
- Full path:
- 7stars/m/netowrk-snmp-data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:40 12/12/2025
- Last modified:
- 13:46:28 03/11/2024
- MD5 hash:
- 45b774abc8d67efb3e4e87c93b1f618b
- Filesize:
- 24.05 KB
- suspicious functions used:
- shell_exec (line:96);shell_exec (line:105);
$output = shell_exec($command . " 2>&1");shell_exec (line:115);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:134);$output_port = shell_exec($commandd . " 2>&1");shell_exec (line:146);$output = shell_exec($command . " 2>&1");shell_exec (line:157);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:173);$output_port = shell_exec($commandd);shell_exec (line:183);$output_oid_bdcom = shell_exec($command_oid_bdcom . " 2>&1");shell_exec (line:199);$outputs = shell_exec($commanda);shell_exec (line:219);$output_port = shell_exec($commandd_bdcom);shell_exec (line:229);$output_oid_cdata = shell_exec($command_oid_cdata . " 2>&1");shell_exec (line:234);$outputs = shell_exec($commanda);shell_exec (line:242);$outs = shell_exec($canda);shell_exec (line:262);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:278);$outpdut_port = shell_exec($commandd_cdata);`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:291);$output_oid_gcom = shell_exec($command_oid_gcom . " 2>&1");shell_exec (line:297);$querydd = mysqli_query($con, "SELECT `olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND `olt_id` = '$olt_id' AND sts = '0'");shell_exec (line:432);$output_vlan = shell_exec($command_vlan . " 2>&1");$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: texecutepayment.php-
- Full path:
- 7stars/m/texecutepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:40 12/12/2025
- Last modified:
- 13:46:30 03/11/2024
- MD5 hash:
- efbb63dfcfdacb52dec74bffc389bbb3
- Filesize:
- 2.67 KB
- suspicious functions used:
- curl_exec (line:24);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: class.phpmailer.php-
- Full path:
- 7stars/web/email/class.phpmailer.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:40 12/12/2025
- Last modified:
- 13:47:32 03/11/2024
- MD5 hash:
- 68468d69b47fffecc89df57e27c5a781
- Filesize:
- 143.32 KB
- suspicious functions used:
- `$DKIM_private` (line:428);popen (line:1387);
* If set, takes precedence over `$DKIM_private`.popen (line:1408);if (!@$mail = popen($sendmail, 'w')) {base64_decode (line:3410);if (!@$mail = popen($sendmail, 'w')) {`$mail->set('SMTPSecure', 'tls');` (line:3688);$data = base64_decode($data);`$mail->SMTPSecure = 'tls';` (line:3690);* `$mail->set('SMTPSecure', 'tls');`* `$mail->SMTPSecure = 'tls';` - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: class.smtp.php-
- Full path:
- 7stars/web/email/class.smtp.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:40 12/12/2025
- Last modified:
- 13:47:32 03/11/2024
- MD5 hash:
- aa8478329268e5438a4469c268337a10
- Filesize:
- 41.44 KB
- suspicious functions used:
- base64_decode (line:513);base64_decode (line:533);
$challenge = base64_decode($challenge);$challenge = base64_decode(substr($this->last_reply, 4)); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: JSON.php-
- Full path:
- 7stars/web/inc/JSON.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:41 12/12/2025
- Last modified:
- 13:47:40 03/11/2024
- MD5 hash:
- f5a34509e06231308becbe320ade9ff6
- Filesize:
- 33.22 KB
- suspicious functions used:
- eval (line:22);
* Javascript, and can be directly eval()'ed with no further parsing - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: jqgrid.php-
- Full path:
- 7stars/web/inc/jqgrid.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:41 12/12/2025
- Last modified:
- 13:47:40 03/11/2024
- MD5 hash:
- 71027a29e71e0626d8b57cbb631e6d98
- Filesize:
- 23.92 KB
- suspicious functions used:
- eval (line:397);
if (!empty($V4a8a08f0["condition"])) eval("\$V4b43b0ae = ".$V4a8a08f0["condition"].";"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: smsapicore.php-
- Full path:
- 7stars/web/include/smsapicore.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:41 12/12/2025
- Last modified:
- 09:47:24 09/12/2024
- MD5 hash:
- 7103bdf60713408b6f2952f288f27f2e
- Filesize:
- 2.45 KB
- suspicious functions used:
- curl_exec (line:37);
$resultttt = curl_exec($chg); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: telegramapicore.php-
- Full path:
- 7stars/web/include/telegramapicore.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 05:57:18 12/12/2025
- Last modified:
- 13:47:41 03/11/2024
- MD5 hash:
- e1f2020f2a58e7b600312301697f9aca
- Filesize:
- 3 KB
- suspicious functions used:
- curl_exec (line:65);
$result11 = curl_exec($ch3); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Changes.txt-
- Full path:
- 7stars/web/js/jqgrid/js/Changes.txt
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:41 12/12/2025
- Last modified:
- 13:47:53 03/11/2024
- MD5 hash:
- c0a4adbc3f1c6d592cb4fa8433fee9ea
- Filesize:
- 44.32 KB
- suspicious functions used:
- system (line:87);
* Add a ant based build system which allow us to minify the JS code - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ui.php-
- Full path:
- 7stars/web/js/tinymce/themes/advanced/skins/highcontrast/ui.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:42 12/12/2025
- Last modified:
- 13:48:01 03/11/2024
- MD5 hash:
- 3edaf67be8573b86686f46bbba4f058c
- Filesize:
- 4.53 KB
- suspicious functions used:
- curl_exec (line:20);`bill_amount` = '0.00' WHERE bill_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY ` (line:53);
$alldataa = curl_exec($chxchhh);`bill_amount` = '0.00', days = '0.00' WHERE entry_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY ` (line:54);$queryss = mysql_query("UPDATE billing SET `bill_amount` = '0.00' WHERE bill_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY `id` DESC LIMIT 5");`payment` WHERE `pay_date` < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND pay_amount != '0.00' ORDER BY ` (line:55);$sqlqmss = mysql_query("UPDATE billing_mac SET `bill_amount` = '0.00', days = '0.00' WHERE entry_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY `id` DESC LIMIT 5");curl_exec (line:146);$sqlqmsp = mysql_query("DELETE FROM `payment` WHERE `pay_date` < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND pay_amount != '0.00' ORDER BY `id` ASC LIMIT 5");curl_exec (line:168);$responsed = curl_exec($curld);$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: AutoActiveClientsCount1.php-
- Full path:
- 7stars/web/AutoActiveClientsCount1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 04:22:21 12/12/2025
- Last modified:
- 13:46:43 03/11/2024
- MD5 hash:
- 3b3b6186ff2d9c5abd1772e5aa02ee33
- Filesize:
- 6.4 KB
- suspicious functions used:
- system (line:58);
$ARRAY = $API->comm("/system/resource/print"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: AutoActiveClientsCount11.php-
- Full path:
- 7stars/web/AutoActiveClientsCount11.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:42 12/12/2025
- Last modified:
- 13:46:43 03/11/2024
- MD5 hash:
- a0090e4a11dd59b955a6edd549b6ef2f
- Filesize:
- 5.85 KB
- suspicious functions used:
- system (line:54);
$ARRAY = $API->comm("/system/resource/print"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ClientsOnMap.php-
- Full path:
- 7stars/web/ClientsOnMap.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:43 12/12/2025
- Last modified:
- 06:02:54 10/11/2025
- MD5 hash:
- 519edcd6a9ccec3397e6f5280db00605
- Filesize:
- 12.2 KB
- suspicious functions used:
- `${totalonline}` (line:97);`${totaloffline}` (line:98);
document.getElementById('totalonline').textContent = `${totalonline}`;`${results.rxPower}` (line:233);document.getElementById('totaloffline').textContent = `${totaloffline}`;`${results.distance}` (line:234);var rxPower = `${results.rxPower}`;`${results.supplyVoltage}` (line:235);var distance = `${results.distance}`;`${results.temperature}` (line:236);var supplyVoltage = `${results.supplyVoltage}`;`${results.txPower}` (line:237);var temperature = `${results.temperature}`;var txPower = `${results.txPower}`; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ClientView.php-
- Full path:
- 7stars/web/ClientView.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 02:03:31 12/12/2025
- Last modified:
- 13:46:56 03/11/2024
- MD5 hash:
- 632106476588c1b6e090f78a90bc9534
- Filesize:
- 110.58 KB
- suspicious functions used:
- `olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:212);
$querydd = mysql_query("SELECT `olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND `olt_id` = '$c_olt_id' AND sts = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Clients.php-
- Full path:
- 7stars/web/Clients.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 09:16:34 12/12/2025
- Last modified:
- 13:46:52 03/11/2024
- MD5 hash:
- edcecc2febd77bbf170a76efae960c89
- Filesize:
- 212.41 KB
- suspicious functions used:
- `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:844);
$result1rd=mysql_query("SELECT `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND `sts` = '0' order by b_name ASC"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Clients1.php-
- Full path:
- 7stars/web/Clients1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:44 12/12/2025
- Last modified:
- 13:46:52 03/11/2024
- MD5 hash:
- a8db87dcc6beb97539ff152b767dadae
- Filesize:
- 219.37 KB
- suspicious functions used:
- `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:835);
$result1rd=mysql_query("SELECT `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND `sts` = '0' order by b_name ASC"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Clients2.php-
- Full path:
- 7stars/web/Clients2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:44 12/12/2025
- Last modified:
- 13:46:54 03/11/2024
- MD5 hash:
- 982d6411552113b0715fd17c26f50292
- Filesize:
- 205.13 KB
- suspicious functions used:
- `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:832);
$result1rd=mysql_query("SELECT `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND `sts` = '0' order by b_name ASC"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Clients3.php-
- Full path:
- 7stars/web/Clients3.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:45 12/12/2025
- Last modified:
- 13:46:54 03/11/2024
- MD5 hash:
- 50ddc869b383ab76e009c7a2c17c99a3
- Filesize:
- 175.31 KB
- suspicious functions used:
- `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:832);
$result1rd=mysql_query("SELECT `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND `sts` = '0' order by b_name ASC"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: InstrumentsStoreOutDetails.php-
- Full path:
- 7stars/web/InstrumentsStoreOutDetails.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:46 12/12/2025
- Last modified:
- 13:47:01 03/11/2024
- MD5 hash:
- a60c19f766bfff1ccdccbeba6b39eb87
- Filesize:
- 9.37 KB
- suspicious functions used:
- `update_date`, '%D-%b, %y') AS offdate, TIME_FORMAT(`update_time`, '%T') AS offtime FROM `con_sts_log` WHERE `c_id` = '{$row['c_id']}' AND con_sts = 'Inactive' ORDER BY ` (line:120);
$resultwwdd=mysql_query("SELECT DATE_FORMAT(`update_date`, '%D-%b, %y') AS offdate, TIME_FORMAT(`update_time`, '%T') AS offtime FROM `con_sts_log` WHERE `c_id` = '{$row['c_id']}' AND con_sts = 'Inactive' ORDER BY `update_date_time` DESC LIMIT 1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Network.php-
- Full path:
- 7stars/web/Network.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:47 12/12/2025
- Last modified:
- 13:47:08 03/11/2024
- MD5 hash:
- a555bcd4afdc786ded6485ee9315887c
- Filesize:
- 57.36 KB
- suspicious functions used:
- system (line:359);shell_exec (line:631);
$ARRAY = $API->comm("/system/resource/print");$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Network1.php-
- Full path:
- 7stars/web/Network1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:47 12/12/2025
- Last modified:
- 13:47:08 03/11/2024
- MD5 hash:
- 0154c16125cee7431f537bf69c4ef811
- Filesize:
- 44.04 KB
- suspicious functions used:
- system (line:295);shell_exec (line:590);
$ARRAY = $API->comm("/system/resource/print");$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkTreeMap1.php-
- Full path:
- 7stars/web/NetworkTreeMap1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:47 12/12/2025
- Last modified:
- 13:47:12 03/11/2024
- MD5 hash:
- 7283b6f0717758b1824973b76acf4c04
- Filesize:
- 10.58 KB
- suspicious functions used:
- `${totalonline}` (line:97);`${totaloffline}` (line:98);
document.getElementById('totalonline').textContent = `${totalonline}`;document.getElementById('totaloffline').textContent = `${totaloffline}`; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: SMS.php-
- Full path:
- 7stars/web/SMS.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:47 12/12/2025
- Last modified:
- 09:48:56 09/12/2024
- MD5 hash:
- c64696ecc1b0715751af3c8e9989ea80
- Filesize:
- 36.6 KB
- suspicious functions used:
- curl_exec (line:56);
$balance = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkLoad.php-
- Full path:
- 7stars/web/NetworkLoad.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:47 12/12/2025
- Last modified:
- 13:47:09 03/11/2024
- MD5 hash:
- e1632e66ee1b7394d3fb82751b924abe
- Filesize:
- 2.83 KB
- suspicious functions used:
- system (line:81);
$ARRAY = $API->comm("/system/resource/print"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkLoad1.php-
- Full path:
- 7stars/web/NetworkLoad1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:47 12/12/2025
- Last modified:
- 13:47:09 03/11/2024
- MD5 hash:
- 176bd6931be34d7ef351d22897accc65
- Filesize:
- 759 B
- suspicious functions used:
- system (line:18);
$ARRAY = $API->comm("/system/resource/print"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkOltAddQuery.php-
- Full path:
- 7stars/web/NetworkOltAddQuery.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:47 12/12/2025
- Last modified:
- 13:47:09 03/11/2024
- MD5 hash:
- c3c063a74b6c009f043ac820abd4f3f1
- Filesize:
- 6.44 KB
- suspicious functions used:
- shell_exec (line:21);
$output = shell_exec($command . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkOltOnuStatus.php-
- Full path:
- 7stars/web/NetworkOltOnuStatus.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:48 12/12/2025
- Last modified:
- 13:47:10 03/11/2024
- MD5 hash:
- 58b27721b794e6e5bd5f810aba2e7907
- Filesize:
- 65.24 KB
- suspicious functions used:
- shell_exec (line:42);shell_exec (line:102);
$output = shell_exec($command . " 2>&1");shell_exec (line:677);$output = shell_exec($command . " 2>&1");shell_exec (line:793);$oddutpdut = shell_exec($cmandd . " 2>&1");shell_exec (line:906);$oddutpdut = shell_exec($cmandd . " 2>&1");$oddutpdut = shell_exec($cmandd . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkOltOnuStatus2.php-
- Full path:
- 7stars/web/NetworkOltOnuStatus2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:48 12/12/2025
- Last modified:
- 13:47:10 03/11/2024
- MD5 hash:
- c9a14797fa4353d05bbd9427b6079250
- Filesize:
- 15.88 KB
- suspicious functions used:
- shell_exec (line:35);
$output = shell_exec($command . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkOltSense.php-
- Full path:
- 7stars/web/NetworkOltSense.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:48 12/12/2025
- Last modified:
- 13:47:10 03/11/2024
- MD5 hash:
- 2be664ae5006367f629ca437a6d507f8
- Filesize:
- 18.26 KB
- suspicious functions used:
- `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, `last_synced`, `last_update`, `msg`, `full_msg`, ROUND((SELECT AVG(value) FROM olt_onu_history WHERE alarm_id = '$alarmId' AND value != ''), 2) AS average_value FROM `, ` WHERE `alarm_id` = '$alarmId' AND ` (line:123);
$querddy = mysql_query("SELECT `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, `last_synced`, `last_update`, `msg`, `full_msg`, ROUND((SELECT AVG(value) FROM olt_onu_history WHERE alarm_id = '$alarmId' AND value != ''), 2) AS average_value FROM `olt_onu_history` WHERE `alarm_id` = '$alarmId' AND `value` != ''"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkOltSenseDetails.php-
- Full path:
- 7stars/web/NetworkOltSenseDetails.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:48 12/12/2025
- Last modified:
- 13:47:10 03/11/2024
- MD5 hash:
- 440096c601fc10b819a1f0f8330928b0
- Filesize:
- 14.17 KB
- suspicious functions used:
- `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:33);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:42);
$sql = mysql_query("SELECT `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND `value` != '' ORDER BY id DESC");`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:51);$sql = mysql_query("SELECT `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND `value` != '' ORDER BY id DESC");`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:60);$sql = mysql_query("SELECT `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND `value` != '' ORDER BY id DESC");$sql = mysql_query("SELECT `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND `value` != '' ORDER BY id DESC"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkOltSync.php-
- Full path:
- 7stars/web/NetworkOltSync.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:48 12/12/2025
- Last modified:
- 13:47:10 03/11/2024
- MD5 hash:
- 06633d4b65a14d677358170dd0a84424
- Filesize:
- 1.87 KB
- suspicious functions used:
- curl_exec (line:18);
$result1dd = curl_exec($ch111); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: SMS1.php-
- Full path:
- 7stars/web/SMS1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:48 12/12/2025
- Last modified:
- 13:47:23 03/11/2024
- MD5 hash:
- e4671dadf9ad575671fd3609a60030da
- Filesize:
- 32.19 KB
- suspicious functions used:
- curl_exec (line:59);
$balance = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentOnlineQuery.php-
- Full path:
- 7stars/web/PaymentOnlineQuery.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:48 12/12/2025
- Last modified:
- 13:47:18 03/11/2024
- MD5 hash:
- 201e1cf95b2d033897cab4bc2fd59e07
- Filesize:
- 28.5 KB
- suspicious functions used:
- curl_exec (line:457);curl_exec (line:689);
$resultdata=curl_exec($url);$content = curl_exec($handle ); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentOnlineQuery2.php-
- Full path:
- 7stars/web/PaymentOnlineQuery2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:48 12/12/2025
- Last modified:
- 13:47:18 03/11/2024
- MD5 hash:
- ccd315d11a60901b7b9029ff44f8351b
- Filesize:
- 19.4 KB
- suspicious functions used:
- curl_exec (line:42);curl_exec (line:252);
$resultdatax=curl_exec($url);$result = curl_exec($handle); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkTreeAddSave.php-
- Full path:
- 7stars/web/NetworkTreeAddSave.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:49 12/12/2025
- Last modified:
- 00:14:12 21/11/2024
- MD5 hash:
- a9dbc374394f257ef79f2d4f60f9771d
- Filesize:
- 5.12 KB
- suspicious functions used:
- `network_tree` WHERE `olt_id` = '$olt_id' AND ` (line:57);
$resu11 = $con->query("SELECT tree_id AS pon_parent_id FROM `network_tree` WHERE `olt_id` = '$olt_id' AND `device_type` = '1' AND sts = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentWebhook.php-
- Full path:
- 7stars/web/PaymentWebhook.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:49 12/12/2025
- Last modified:
- 13:47:18 03/11/2024
- MD5 hash:
- a2f322c94787630ab1e0c8ca35fc5ba1
- Filesize:
- 18.6 KB
- suspicious functions used:
- base64_decode (line:30);curl_exec (line:41);
$signatureDecoded = base64_decode($signature);curl_exec (line:422);curl_exec($url);$data = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkTreeEdit1.php-
- Full path:
- 7stars/web/NetworkTreeEdit1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:49 12/12/2025
- Last modified:
- 13:47:12 03/11/2024
- MD5 hash:
- 3396a6bdf9b5804bb208f38f37cc29a2
- Filesize:
- 35.81 KB
- suspicious functions used:
- `olt_onu` WHERE olt_id = '$olt_id' AND ` (line:207);
<?php $resultoff11d=mysql_query("SELECT id AS alarm_id, alarm_name FROM `olt_onu` WHERE olt_id = '$olt_id' AND `onu_name` LIKE '$pon_name1' ORDER BY id DESC"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkTreeEditSave.php-
- Full path:
- 7stars/web/NetworkTreeEditSave.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:49 12/12/2025
- Last modified:
- 00:14:12 21/11/2024
- MD5 hash:
- 6c0f94f3ddde2ee6a93db1fa98971907
- Filesize:
- 12.41 KB
- suspicious functions used:
- `network_tree` WHERE `olt_id` = '$olt_id' AND ` (line:182);
$resu11 = $con->query("SELECT tree_id AS pon_parent_id FROM `network_tree` WHERE `olt_id` = '$olt_id' AND `device_type` = '1' AND sts = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkTreeList.php-
- Full path:
- 7stars/web/NetworkTreeList.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:49 12/12/2025
- Last modified:
- 13:47:12 03/11/2024
- MD5 hash:
- 7f697086943f78c922cabafa0f1f8cda
- Filesize:
- 19.22 KB
- suspicious functions used:
- `pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '{$row['olt_id']}' AND ` (line:231);
$result11=mysql_query("SELECT count(`pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '{$row['olt_id']}' AND `sts` = '0';"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkTreeMap.php-
- Full path:
- 7stars/web/NetworkTreeMap.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:49 12/12/2025
- Last modified:
- 13:47:12 03/11/2024
- MD5 hash:
- 584d02944bd9de5a190ec6dc320fc49e
- Filesize:
- 24.24 KB
- suspicious functions used:
- `${results.rxPower}` (line:263);`${results.distance}` (line:264);
var rxPower = `${results.rxPower}`;`${results.supplyVoltage}` (line:265);var distance = `${results.distance}`;`${results.temperature}` (line:266);var supplyVoltage = `${results.supplyVoltage}`;`${results.txPower}` (line:267);var temperature = `${results.temperature}`;`${results.rxPower}` (line:283);var txPower = `${results.txPower}`;`${results.distance}` (line:284);var rxPower = `${results.rxPower}`;`${results.supplyVoltage}` (line:285);var distance = `${results.distance}`;`${results.temperature}` (line:286);var supplyVoltage = `${results.supplyVoltage}`;`${results.txPower}` (line:287);var temperature = `${results.temperature}`;var txPower = `${results.txPower}`; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: SMSAddSave.php-
- Full path:
- 7stars/web/SMSAddSave.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:50 12/12/2025
- Last modified:
- 09:26:27 09/12/2024
- MD5 hash:
- 18c49664e9a08d513b51e680f6201cb3
- Filesize:
- 3.1 KB
- suspicious functions used:
- curl_exec (line:36);
$resultttt = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: SignUp1.php-
- Full path:
- 7stars/web/SignUp1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:50 12/12/2025
- Last modified:
- 13:47:22 03/11/2024
- MD5 hash:
- 3f7943dd155c8e0a383b7d02730f8c11
- Filesize:
- 24.59 KB
- suspicious functions used:
- curl_exec (line:33);curl_exec (line:59);
$jsona = curl_exec($ch10);$resdfwedf = curl_exec($ch1s); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-client-onu-mac-countt.php-
- Full path:
- 7stars/web/network-olt-client-onu-mac-countt.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:51 12/12/2025
- Last modified:
- 13:47:06 03/11/2024
- MD5 hash:
- d29b4e72c375f528b769bd3894f9f0e7
- Filesize:
- 8.95 KB
- suspicious functions used:
- shell_exec (line:26);shell_exec (line:36);
$od_vddlan = shell_exec($codmn . " 2>&1");shell_exec (line:59);$od_vddlan = shell_exec($codmn . " 2>&1");shell_exec (line:75);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:92);$outpudt_vlan = shell_exec($commadnd_vlan . " 2>&1");shell_exec (line:102);$output_port = shell_exec($commandd_bdcom);shell_exec (line:117);$output_vdlan = shell_exec($command_vdlan . " 2>&1");shell_exec (line:155);$outpdut_vdlan = shell_exec($commadnd_dvlan . " 2>&1");shell_exec (line:206);$output_vdlan = shell_exec($command_dvlan . " 2>&1");shell_exec (line:262);$od_vddddlan = shell_exec($codmddn . " 2>&1");shell_exec (line:275);$od_vdlan = shell_exec($coddvlan . " 2>&1");shell_exec (line:288);$od_vddlan = shell_exec($codmn . " 2>&1");$od_vdddlan = shell_exec($codmdn . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: emp_salary_advence_find.php-
- Full path:
- 7stars/web/emp_salary_advence_find.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:51 12/12/2025
- Last modified:
- 13:46:58 03/11/2024
- MD5 hash:
- 74a7e2ffda0f7584611d7cbce6136c24
- Filesize:
- 2.25 KB
- suspicious functions used:
- `expanse` WHERE `type` = '2' AND `status` = '2' AND ex_by = '$e_id' AND MONTH(`, `) = MONTH('$lastmonth') AND YEAR(`, `) = YEAR('$lastmonth') GROUP BY ` (line:8);`e_id` = '$e_id' AND ` (line:12);
$vendorrr = mysql_query("SELECT SUM(amount) AS salary_advance FROM `expanse` WHERE `type` = '2' AND `status` = '2' AND ex_by = '$e_id' AND MONTH(`check_date`) = MONTH('$lastmonth') AND YEAR(`check_date`) = YEAR('$lastmonth') GROUP BY `ex_by`");$empppp = mysql_query("SELECT gross_total AS gross_total FROM emp_info WHERE `e_id` = '$e_id' AND `status` = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: imagevwr.php-
- Full path:
- 7stars/web/imagevwr.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 02:03:32 12/12/2025
- Last modified:
- 13:47:00 03/11/2024
- MD5 hash:
- 47a223a13cc642d01dcfaaca542d396d
- Filesize:
- 915 B
- suspicious functions used:
- curl_exec (line:15);
$image_data = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: executepayment.php-
- Full path:
- 7stars/web/executepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:51 12/12/2025
- Last modified:
- 13:46:58 03/11/2024
- MD5 hash:
- c46a50905333286f45dfeacf010851ab
- Filesize:
- 716 B
- suspicious functions used:
- curl_exec (line:18);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: client-online-mbb.php-
- Full path:
- 7stars/web/client-online-mbb.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 02:54:46 12/12/2025
- Last modified:
- 13:46:48 03/11/2024
- MD5 hash:
- 69c51efb5b9017a07a7158b4a63f3826
- Filesize:
- 14.32 KB
- suspicious functions used:
- curl_exec (line:90);
$resp = curl_exec($curlss); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_network.php-
- Full path:
- 7stars/web/cron_network.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:42 12/12/2025
- Last modified:
- 13:46:57 03/11/2024
- MD5 hash:
- db096f353e80027593ca3f9781a21ac8
- Filesize:
- 4.93 KB
- suspicious functions used:
- curl_exec (line:45);curl_exec (line:67);
$result1d = curl_exec($ch11);curl_exec (line:127);$result1dd = curl_exec($ch111);$result1dd = curl_exec($ch111); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_olt.php-
- Full path:
- 7stars/web/cron_olt.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:51 12/12/2025
- Last modified:
- 13:46:57 03/11/2024
- MD5 hash:
- 6975951fdbf566164ba5fa5cfcd32ec7
- Filesize:
- 4.27 KB
- suspicious functions used:
- shell_exec (line:48);curl_exec (line:127);
$output = shell_exec($command);$result1dd = curl_exec($ch111); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: clients-nots-action.php-
- Full path:
- 7stars/web/clients-nots-action.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:51 12/12/2025
- Last modified:
- 13:46:50 03/11/2024
- MD5 hash:
- dff1bb495509427d098cb4588da553b9
- Filesize:
- 5.89 KB
- suspicious functions used:
- curl_exec (line:35);
$jsona = curl_exec($ch10); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: company_info.php-
- Full path:
- 7stars/web/company_info.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:25:06 12/12/2025
- Last modified:
- 13:46:57 03/11/2024
- MD5 hash:
- e612d58aa2e38f5b49ba37c1bf620ece
- Filesize:
- 8.38 KB
- suspicious functions used:
- curl_exec (line:130);
$alldata = curl_exec($chhhh); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: createpayment.php-
- Full path:
- 7stars/web/createpayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:51 12/12/2025
- Last modified:
- 13:46:57 03/11/2024
- MD5 hash:
- ba9747d0421fd091b998389469e72a0b
- Filesize:
- 1.7 KB
- suspicious functions used:
- curl_exec (line:57);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_all.php-
- Full path:
- 7stars/web/cron_all.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:51 12/12/2025
- Last modified:
- 13:46:57 03/11/2024
- MD5 hash:
- 967f1d654ae891609da26b9e0fdbd1ae
- Filesize:
- 2.44 KB
- suspicious functions used:
- curl_exec (line:23);curl_exec (line:38);
$result1 = curl_exec($ch1);curl_exec (line:53);$result1d = curl_exec($ch11);$result1d2 = curl_exec($ch112); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_gen_bill.php-
- Full path:
- 7stars/web/cron_auto_gen_bill.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:51 12/12/2025
- Last modified:
- 13:46:57 03/11/2024
- MD5 hash:
- f1056618cc4402968e50d1232d2c51c8
- Filesize:
- 4.73 KB
- suspicious functions used:
- curl_exec (line:140);curl_exec (line:149);
$respd = curl_exec($curl);$resp = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_olt_clients_catch.php-
- Full path:
- 7stars/web/cron_olt_clients_catch.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:51 12/12/2025
- Last modified:
- 13:46:57 03/11/2024
- MD5 hash:
- 3b13c163ba3445b3d661c63adde1d985
- Filesize:
- 1.12 KB
- suspicious functions used:
- curl_exec (line:23);
$result1d = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_inactive.php-
- Full path:
- 7stars/web/cron_auto_inactive.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 17:55:01 12/12/2025
- Last modified:
- 03:28:47 10/12/2024
- MD5 hash:
- 7e0dc4dd9dae2bf0220516641b53c027
- Filesize:
- 5.43 KB
- suspicious functions used:
- curl_exec (line:142);
$respw = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_inactive2.php-
- Full path:
- 7stars/web/cron_auto_inactive2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:51 12/12/2025
- Last modified:
- 13:46:57 03/11/2024
- MD5 hash:
- 440bc24f05b01eb395df63fff2f60de9
- Filesize:
- 5.46 KB
- suspicious functions used:
- curl_exec (line:142);
$respw = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_olt_user.php-
- Full path:
- 7stars/web/cron_olt_user.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:51 12/12/2025
- Last modified:
- 13:46:57 03/11/2024
- MD5 hash:
- 67aa237639e3d1e6064e76079bb3cccc
- Filesize:
- 1.97 KB
- suspicious functions used:
- curl_exec (line:19);curl_exec (line:46);
$resultd1d = curl_exec($ch110);$result1d = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_inactive_termination.php-
- Full path:
- 7stars/web/cron_auto_inactive_termination.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 01:55:06 12/12/2025
- Last modified:
- 13:46:57 03/11/2024
- MD5 hash:
- 9f9c8ca9110c2304128646824bfb17db
- Filesize:
- 12.16 KB
- suspicious functions used:
- curl_exec (line:241);curl_exec (line:253);
$resp = curl_exec($curlss);$respw = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_inactive_termination1.php-
- Full path:
- 7stars/web/cron_auto_inactive_termination1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:51 12/12/2025
- Last modified:
- 13:46:57 03/11/2024
- MD5 hash:
- be76b964c93a2cb4fa7e632750ff3bc4
- Filesize:
- 6.64 KB
- suspicious functions used:
- curl_exec (line:156);curl_exec (line:168);
$resp = curl_exec($curlss);$respw = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: getclientuptime.php-
- Full path:
- 7stars/web/getclientuptime.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:51 12/12/2025
- Last modified:
- 13:47:00 03/11/2024
- MD5 hash:
- bbc14cdd451c72b94d78c7d2d1af0b52
- Filesize:
- 718 B
- suspicious functions used:
- curl_exec (line:18);
$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_termination_remainder1.php-
- Full path:
- 7stars/web/cron_auto_termination_remainder1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 03:05:29 12/12/2025
- Last modified:
- 13:46:57 03/11/2024
- MD5 hash:
- 7765f9f820dbd402f1064fab9958ffaa
- Filesize:
- 3.26 KB
- suspicious functions used:
- curl_exec (line:83);
$respw = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_client_bandwidth_count.php-
- Full path:
- 7stars/web/cron_client_bandwidth_count.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 17:53:16 12/12/2025
- Last modified:
- 13:46:57 03/11/2024
- MD5 hash:
- 1c71a3dd097275429ae845a85ced0438
- Filesize:
- 5.33 KB
- suspicious functions used:
- curl_exec (line:124);curl_exec (line:134);
$result = curl_exec($ch);$result1dd = curl_exec($ch111); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: index.php-
- Full path:
- 7stars/web/index.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 09:16:27 12/12/2025
- Last modified:
- 13:47:00 03/11/2024
- MD5 hash:
- f161ab23adf4527023a0ad582d478f89
- Filesize:
- 12.45 KB
- suspicious functions used:
- base64_decode (line:10);curl_exec (line:183);
list($encrypted_data,$iv,$key) = explode('::',base64_decode($ciphertext));$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-con-sts.php-
- Full path:
- 7stars/web/network-olt-con-sts.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:51 12/12/2025
- Last modified:
- 13:47:06 03/11/2024
- MD5 hash:
- a26b0a1c1567c34c9aa5e2e0254ff8a6
- Filesize:
- 4 KB
- suspicious functions used:
- `olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:10);shell_exec (line:38);
$query = mysqli_query($con, "SELECT `olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND `sts` = '0'");`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, `last_synced`, `last_update`, `msg`, `full_msg`, ROUND((SELECT AVG(value) FROM olt_onu_history WHERE alarm_id = '$alarmId' AND value != ''), 2) AS average_value FROM `, ` WHERE `alarm_id` = '$alarmId' AND ` (line:82);$output = shell_exec($command);$query = mysqli_query($con, "SELECT `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, `last_synced`, `last_update`, `msg`, `full_msg`, ROUND((SELECT AVG(value) FROM olt_onu_history WHERE alarm_id = '$alarmId' AND value != ''), 2) AS average_value FROM `olt_onu_history` WHERE `alarm_id` = '$alarmId' AND `value` != ''"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-oid-check.php-
- Full path:
- 7stars/web/network-olt-oid-check.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:51 12/12/2025
- Last modified:
- 13:47:07 03/11/2024
- MD5 hash:
- 5b7dc0ce1103fbfc895873c250b63141
- Filesize:
- 1.88 KB
- suspicious functions used:
- shell_exec (line:33);
return shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ip-ping-checker.php-
- Full path:
- 7stars/web/ip-ping-checker.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:51 12/12/2025
- Last modified:
- 13:47:01 03/11/2024
- MD5 hash:
- 0d28f3053b73b3fe2885cf519ee17c12
- Filesize:
- 2.64 KB
- suspicious functions used:
- curl_exec (line:81);
$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-load.php-
- Full path:
- 7stars/web/network-olt-load.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:51 12/12/2025
- Last modified:
- 13:47:07 03/11/2024
- MD5 hash:
- f49d5153285c639ed91d4e806685ee56
- Filesize:
- 1.33 KB
- suspicious functions used:
- shell_exec (line:22);shell_exec (line:25);
$output = shell_exec($command . " 2>&1");$output1 = shell_exec($command1 . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: login_exec.php-
- Full path:
- 7stars/web/login_exec.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 12:31:56 12/12/2025
- Last modified:
- 13:47:02 03/11/2024
- MD5 hash:
- 9038a77a32a5db2c9affae1496473f3e
- Filesize:
- 5.27 KB
- suspicious functions used:
- curl_exec (line:62);
$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: loginexec.php-
- Full path:
- 7stars/web/loginexec.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:52 12/12/2025
- Last modified:
- 13:47:02 03/11/2024
- MD5 hash:
- edb8017e7d0f8e037facbcacc94a383d
- Filesize:
- 5.91 KB
- suspicious functions used:
- curl_exec (line:67);
$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: nagad-helper.php-
- Full path:
- 7stars/web/nagad-helper.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:52 12/12/2025
- Last modified:
- 13:47:06 03/11/2024
- MD5 hash:
- 2bb70c44d68202e0a0cd8ae1388f0b1b
- Filesize:
- 6.74 KB
- suspicious functions used:
- curl_exec (line:61);base64_decode (line:97);
$resultData = curl_exec($url);openssl_private_decrypt(base64_decode($cryptText), $plain_text, $private_key); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: nagad-merchant-callback.php-
- Full path:
- 7stars/web/nagad-merchant-callback.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:52 12/12/2025
- Last modified:
- 13:47:06 03/11/2024
- MD5 hash:
- abc8d9e7aad4d9c622dcd97e701448bc
- Filesize:
- 16.5 KB
- suspicious functions used:
- curl_exec (line:20);
$file_contents = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: netowrk-olt-all-mac-array.php-
- Full path:
- 7stars/web/netowrk-olt-all-mac-array.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:52 12/12/2025
- Last modified:
- 13:47:06 03/11/2024
- MD5 hash:
- b0168ce99145e2afe64357247d750dd6
- Filesize:
- 4.62 KB
- suspicious functions used:
- shell_exec (line:33);shell_exec (line:47);
$output = shell_exec($command . " 2>&1");shell_exec (line:61);$output = shell_exec($command . " 2>&1");shell_exec (line:76);$output_oid_bdcom = shell_exec($command_oid_bdcom . " 2>&1");shell_exec (line:93);$output_oid_cdata = shell_exec($command_oid_cdata . " 2>&1");$output_oid_gcom = shell_exec($command_oid_gcom . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: netowrk-snmp-data.php-
- Full path:
- 7stars/web/netowrk-snmp-data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:52 12/12/2025
- Last modified:
- 13:47:06 03/11/2024
- MD5 hash:
- 9badf5c53b260315a061e1bb6cd2378f
- Filesize:
- 24.8 KB
- suspicious functions used:
- shell_exec (line:104);shell_exec (line:113);
$output = shell_exec($command . " 2>&1");shell_exec (line:123);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:142);$output_port = shell_exec($commandd . " 2>&1");shell_exec (line:154);$output = shell_exec($command . " 2>&1");shell_exec (line:165);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:181);$output_port = shell_exec($commandd);shell_exec (line:191);$output_oid_bdcom = shell_exec($command_oid_bdcom . " 2>&1");shell_exec (line:207);$outputs = shell_exec($commanda);shell_exec (line:227);$output_port = shell_exec($commandd_bdcom);shell_exec (line:236);$output_oid_cdata = shell_exec($command_oid_cdata . " 2>&1");shell_exec (line:244);$outputs = shell_exec($commanda);shell_exec (line:251);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:256);$output_pon = shell_exec($command_ponn . " 2>&1");`pon_name` FROM `olt_pon` WHERE `olt_pon_id` = '$pon_id' AND ` (line:263);$outsddd = shell_exec($commddandd);shell_exec (line:280);$qrydd = mysqli_query($con, "SELECT `pon_name` FROM `olt_pon` WHERE `olt_pon_id` = '$pon_id' AND `olt_id` = '$olt_id' AND sts = '0'");shell_exec (line:290);$outsdd = shell_exec($commddand);`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:303);$output_oid_gcom = shell_exec($command_oid_gcom . " 2>&1");shell_exec (line:309);$querydd = mysqli_query($con, "SELECT `olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND `olt_id` = '$olt_id' AND sts = '0'");shell_exec (line:444);$output_vlan = shell_exec($command_vlan . " 2>&1");$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-old-onu-rx-map.php-
- Full path:
- 7stars/web/network-old-onu-rx-map.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:52 12/12/2025
- Last modified:
- 13:47:06 03/11/2024
- MD5 hash:
- b4962c160c5ad68ccd8eed9c48d82a0f
- Filesize:
- 6.94 KB
- suspicious functions used:
- shell_exec (line:76);
$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-old-onu-rx.php-
- Full path:
- 7stars/web/network-old-onu-rx.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:52 12/12/2025
- Last modified:
- 13:47:06 03/11/2024
- MD5 hash:
- b4962c160c5ad68ccd8eed9c48d82a0f
- Filesize:
- 6.94 KB
- suspicious functions used:
- shell_exec (line:76);
$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-client-onu-mac-count-cdata.php-
- Full path:
- 7stars/web/network-olt-client-onu-mac-count-cdata.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:52 12/12/2025
- Last modified:
- 13:47:06 03/11/2024
- MD5 hash:
- c378dbabf36066c335cfb8838a6e167d
- Filesize:
- 4.58 KB
- suspicious functions used:
- shell_exec (line:25);shell_exec (line:35);
$od_vddlan = shell_exec($codmn . " 2>&1");shell_exec (line:56);$od_vddlan = shell_exec($codmn . " 2>&1");shell_exec (line:103);$output_vdlan = shell_exec($command_dvlan . " 2>&1");shell_exec (line:115);$od_vdlan = shell_exec($coddvlan . " 2>&1");shell_exec (line:126);$output_port = shell_exec($commandd_bdcom);shell_exec (line:140);$od_vddlan = shell_exec($codmn . " 2>&1");$od_vdddlan = shell_exec($codmdn . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-client-onu-mac-count.php-
- Full path:
- 7stars/web/network-olt-client-onu-mac-count.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:52 12/12/2025
- Last modified:
- 13:47:06 03/11/2024
- MD5 hash:
- 300ca68aa5a7a32160838b9f2627d2aa
- Filesize:
- 14.56 KB
- suspicious functions used:
- shell_exec (line:26);shell_exec (line:36);
$od_vddlan = shell_exec($codmn . " 2>&1");shell_exec (line:68);$od_vddlan = shell_exec($codmn . " 2>&1");shell_exec (line:84);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:101);$outpudt_vlan = shell_exec($commadnd_vlan . " 2>&1");shell_exec (line:119);$output_port = shell_exec($commandd_bdcom);shell_exec (line:135);$output_vdlan = shell_exec($command_vdlan . " 2>&1");shell_exec (line:176);$outpdut_vdlan = shell_exec($commadnd_dvlan . " 2>&1");shell_exec (line:236);$output_vdlan = shell_exec($command_dvlan . " 2>&1");shell_exec (line:312);$outpdut_vdlan = shell_exec($commadnd_dvlan . " 2>&1");shell_exec (line:379);$output_vdlan = shell_exec($command_dvlan . " 2>&1");shell_exec (line:441);$od_vddddlan = shell_exec($codmddn . " 2>&1");shell_exec (line:460);$od_vdlan = shell_exec($coddvlan . " 2>&1");shell_exec (line:479);$od_vddlan = shell_exec($codmn . " 2>&1");$od_vdddlan = shell_exec($codmdn . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: webhook11.php-
- Full path:
- 7stars/web/webhook11.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:52 12/12/2025
- Last modified:
- 13:47:28 03/11/2024
- MD5 hash:
- 26e2059a39281031d28874b51b52d60c
- Filesize:
- 21.23 KB
- suspicious functions used:
- base64_decode (line:27);curl_exec (line:38);
$signatureDecoded = base64_decode($signature);curl_exec (line:454);curl_exec($url);$data = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-onu-alarm-add.php-
- Full path:
- 7stars/web/network-olt-onu-alarm-add.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:52 12/12/2025
- Last modified:
- 13:47:07 03/11/2024
- MD5 hash:
- be6ba82c658419e1454f778e20e2d4c3
- Filesize:
- 7.86 KB
- suspicious functions used:
- shell_exec (line:103);
$output = shell_exec($command . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-onu-count.php-
- Full path:
- 7stars/web/network-olt-onu-count.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:52 12/12/2025
- Last modified:
- 13:47:07 03/11/2024
- MD5 hash:
- 67dd698e92e750fe16906b88b074cb88
- Filesize:
- 5.18 KB
- suspicious functions used:
- `olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:11);shell_exec (line:65);
$query = mysqli_query($con, "SELECT `olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND `online_sts` = '1' AND `sts` = '0'");$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-onu-list-data.php-
- Full path:
- 7stars/web/network-olt-onu-list-data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:52 12/12/2025
- Last modified:
- 13:47:07 03/11/2024
- MD5 hash:
- 54cc9417c766c31317311c3722ce7d4b
- Filesize:
- 9.48 KB
- suspicious functions used:
- shell_exec (line:24);shell_exec (line:38);
$outputs = shell_exec($commanda);shell_exec (line:64);$output = shell_exec($command);shell_exec (line:85);$outputs = shell_exec($commanda);shell_exec (line:104);$output = shell_exec($command);shell_exec (line:125);$outputs = shell_exec($commanda);shell_exec (line:143);$output = shell_exec($command);shell_exec (line:153);$od_vdlan = shell_exec($commanda . " 2>&1");shell_exec (line:165);$od_vdland = shell_exec($coddvland . " 2>&1");shell_exec (line:185);$outputs = shell_exec($coddvladnd . " 2>&1");$output_vdlan = shell_exec($command_vdlan); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tagreeexpayment.php-
- Full path:
- 7stars/web/tagreeexpayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 03:55:06 12/12/2025
- Last modified:
- 13:47:26 03/11/2024
- MD5 hash:
- 029b4fba649a75c7c81d2f8931be8d63
- Filesize:
- 2.86 KB
- suspicious functions used:
- curl_exec (line:26);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-onu-power.php-
- Full path:
- 7stars/web/network-olt-onu-power.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:52 12/12/2025
- Last modified:
- 13:47:07 03/11/2024
- MD5 hash:
- 2e064543b67b532bdf4e5b12d49c5052
- Filesize:
- 7.54 KB
- suspicious functions used:
- shell_exec (line:97);
$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-pon-clients-search.php-
- Full path:
- 7stars/web/network-olt-pon-clients-search.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:52 12/12/2025
- Last modified:
- 13:47:07 03/11/2024
- MD5 hash:
- 79d26fc66abdab6f173330588aa8b238
- Filesize:
- 10.93 KB
- suspicious functions used:
- shell_exec (line:42);shell_exec (line:51);
$output = shell_exec($command . " 2>&1");shell_exec (line:104);$outputS = shell_exec($command . " 2>&1");shell_exec (line:168);$snmpOutput = shell_exec($command);$snmpOutput = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-pon-onu-search-bdcom.php-
- Full path:
- 7stars/web/network-olt-pon-onu-search-bdcom.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:52 12/12/2025
- Last modified:
- 13:47:07 03/11/2024
- MD5 hash:
- c786fa8b69268c738b6ff976631798cd
- Filesize:
- 27.74 KB
- suspicious functions used:
- shell_exec (line:60);shell_exec (line:69);
$output = shell_exec($command . " 2>&1");shell_exec (line:383);$outputS = shell_exec($commandS . " 2>&1");$snmpOutput = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-pon-onu-search-bdcom1.php-
- Full path:
- 7stars/web/network-olt-pon-onu-search-bdcom1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:53 12/12/2025
- Last modified:
- 13:47:07 03/11/2024
- MD5 hash:
- dd18677b1dcbf7f0bce2ac6912d98da0
- Filesize:
- 9.6 KB
- suspicious functions used:
- shell_exec (line:42);shell_exec (line:51);
$output = shell_exec($command . " 2>&1");shell_exec (line:129);$outputS = shell_exec($command . " 2>&1");$snmpOutput = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-pon-onu-search.php-
- Full path:
- 7stars/web/network-olt-pon-onu-search.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:53 12/12/2025
- Last modified:
- 13:47:07 03/11/2024
- MD5 hash:
- dc183ecf77d0e1f56f672338fd09cfa5
- Filesize:
- 21.62 KB
- suspicious functions used:
- shell_exec (line:35);
$output = shell_exec($command . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tcreateagree.php-
- Full path:
- 7stars/web/tcreateagree.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 03:54:41 12/12/2025
- Last modified:
- 13:47:26 03/11/2024
- MD5 hash:
- 27a10adf4190edc7eceee8cf74a6b72b
- Filesize:
- 999 B
- suspicious functions used:
- curl_exec (line:26);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tis-news.php-
- Full path:
- 7stars/web/tis-news.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 14:40:05 12/12/2025
- Last modified:
- 13:47:26 03/11/2024
- MD5 hash:
- ed23ca98b77c5321b4485e85eb2ea64d
- Filesize:
- 3.67 KB
- suspicious functions used:
- curl_exec (line:22);
$alldata1 = curl_exec($chhhh1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tt.php-
- Full path:
- 7stars/web/tt.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:53 12/12/2025
- Last modified:
- 13:47:26 03/11/2024
- MD5 hash:
- 9c4ed141cb79fdc7e807b35923c91a20
- Filesize:
- 1.56 KB
- suspicious functions used:
- curl_exec (line:30);
$response = curl_exec($curl); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-snmp-onu-status-data-bdcom.php-
- Full path:
- 7stars/web/network-snmp-onu-status-data-bdcom.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:53 12/12/2025
- Last modified:
- 13:47:07 03/11/2024
- MD5 hash:
- 065f5e2b05932ee66d473135998580ac
- Filesize:
- 23.53 KB
- suspicious functions used:
- shell_exec (line:48);shell_exec (line:73);
$oudddputsd = shell_exec($commddanda . " 2>&1");shell_exec (line:85);$oudddputsd = shell_exec($commddanda . " 2>&1");shell_exec (line:103);$oudddputsd = shell_exec($commddanda . " 2>&1");shell_exec (line:116);$output = shell_exec($command . " 2>&1");shell_exec (line:128);$outputs = shell_exec($commanda);shell_exec (line:134);$outpdut = shell_exec($commandd . " 2>&1");shell_exec (line:159);$oddutpdut = shell_exec($cmandd . " 2>&1");shell_exec (line:172);$output = shell_exec($command . " 2>&1");shell_exec (line:184);$outputs = shell_exec($commanda);shell_exec (line:190);$outpdut = shell_exec($commandd . " 2>&1");shell_exec (line:217);$oddutpdut = shell_exec($cmandd . " 2>&1");shell_exec (line:233);$output_oid_cdata = shell_exec($command_oid_cdata . " 2>&1");shell_exec (line:239);$outputs = shell_exec($commanda);shell_exec (line:244);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:248);$output_pon = shell_exec($command_ponn . " 2>&1");`pon_name` FROM `olt_pon` WHERE `olt_pon_id` = '$ponn_id' AND ` (line:255);$outsddd = shell_exec($commddandd);shell_exec (line:263);$qrydd = mysqli_query($con, "SELECT `pon_name` FROM `olt_pon` WHERE `olt_pon_id` = '$ponn_id' AND `olt_id` = '$olt_id' AND sts = '0'");$oddutpdut = shell_exec($cmandd . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-snmp-onu-status-data.php-
- Full path:
- 7stars/web/network-snmp-onu-status-data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:53 12/12/2025
- Last modified:
- 13:47:07 03/11/2024
- MD5 hash:
- 0adfee384bf349b50f11036947fd2a74
- Filesize:
- 30.37 KB
- suspicious functions used:
- shell_exec (line:38);`olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:42);
$outputs = shell_exec($snmpCommand);shell_exec (line:81);$re11=mysql_query("SELECT `olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND `olt_pon_id` = '$check_pon_name'");shell_exec (line:95);$outputs = shell_exec($snmpCommand);shell_exec (line:109);$outpdduts = shell_exec($sand);shell_exec (line:122);$outputs = shell_exec($snmpCommand);shell_exec (line:208);$outpdduts = shell_exec($sand);shell_exec (line:429);$outputsmac = shell_exec($snmpCommandmac);shell_exec (line:441);$outputsmac = shell_exec($snmpCommandmac);shell_exec (line:448);$outputsmac = shell_exec($snmpCommandmac);$output_vlan = shell_exec($command_vlan . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-snmp-onu-status-data1.php-
- Full path:
- 7stars/web/network-snmp-onu-status-data1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:53 12/12/2025
- Last modified:
- 13:47:07 03/11/2024
- MD5 hash:
- 920bd1a592c36f7a1194b737642f8340
- Filesize:
- 15.96 KB
- suspicious functions used:
- shell_exec (line:33);`olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:37);
$outputs = shell_exec($snmpCommand);shell_exec (line:149);$re11=mysql_query("SELECT `olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND `olt_pon_id` = '$check_pon_name'");$outputsmac = shell_exec($snmpCommandmac); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ttoken.php-
- Full path:
- 7stars/web/ttoken.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:53 12/12/2025
- Last modified:
- 13:47:26 03/11/2024
- MD5 hash:
- 5f2c51c1db5b0defadfb67ce25c0098f
- Filesize:
- 1.54 KB
- suspicious functions used:
- curl_exec (line:42);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-snmp-onu-status-data_vsol2.php-
- Full path:
- 7stars/web/network-snmp-onu-status-data_vsol2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:53 12/12/2025
- Last modified:
- 13:47:07 03/11/2024
- MD5 hash:
- f22d022ddc284f4d8e1de3660da91db8
- Filesize:
- 15.61 KB
- suspicious functions used:
- shell_exec (line:34);shell_exec (line:113);
$outputs = shell_exec($snmpCommand);shell_exec (line:126);$outpdduts = shell_exec($sand);shell_exec (line:132);$outputsmac = shell_exec($snmpCommandmac);$output_vlan = shell_exec($command_vlan . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tcreatepayment.php-
- Full path:
- 7stars/web/tcreatepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:53 12/12/2025
- Last modified:
- 13:47:26 03/11/2024
- MD5 hash:
- e49de9a33f5164bc2c6b88e4770faaff
- Filesize:
- 1.07 KB
- suspicious functions used:
- curl_exec (line:27);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: token.php-
- Full path:
- 7stars/web/token.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:53 12/12/2025
- Last modified:
- 13:47:26 03/11/2024
- MD5 hash:
- 7d8e71ceda3ffb74623e0c4a814715af
- Filesize:
- 1.53 KB
- suspicious functions used:
- curl_exec (line:42);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: test2.php-
- Full path:
- 7stars/web/test2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:53 12/12/2025
- Last modified:
- 13:47:26 03/11/2024
- MD5 hash:
- ab80d92ede21b7da59bfefb325484297
- Filesize:
- 13.76 KB
- suspicious functions used:
- shell_exec (line:59);shell_exec (line:70);
$output = shell_exec($command);shell_exec (line:76);$output1 = shell_exec($command1);shell_exec (line:88);$output2 = shell_exec($command2);shell_exec (line:101);$output_vdlan = shell_exec($command_dvlan . " 2>&1");shell_exec (line:141);$output_vdlan = shell_exec($command_dvlan . " 2>&1");curl_exec (line:187);$output_vdlanf = shell_exec($command_dvlan . " 2>&1");curl_exec (line:212);$result11 = curl_exec($ch3);curl_exec (line:354);$response = curl_exec($ch);$result11 = curl_exec($ch3); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-tree-vartual-nodes.php-
- Full path:
- 7stars/web/network-tree-vartual-nodes.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:53 12/12/2025
- Last modified:
- 13:47:08 03/11/2024
- MD5 hash:
- 3530b8bc3113544014b1746ecd67e834
- Filesize:
- 10.64 KB
- suspicious functions used:
- shell_exec (line:76);shell_exec (line:111);
$outputs = shell_exec($commanda);shell_exec (line:145);$outputs = shell_exec($commanda);shell_exec (line:181);$outputs = shell_exec($commanda);shell_exec (line:188);$od_vdlan = shell_exec($commanda . " 2>&1");$od_vdland = shell_exec($coddvland . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: sms-balance-check.php-
- Full path:
- 7stars/web/sms-balance-check.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 14:40:05 12/12/2025
- Last modified:
- 09:45:29 09/12/2024
- MD5 hash:
- 177ddaf2af53d1a9ee52f66df641dae1
- Filesize:
- 748 B
- suspicious functions used:
- curl_exec (line:15);
$balance = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: networktree-olt-onu-list-data.php-
- Full path:
- 7stars/web/networktree-olt-onu-list-data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:53 12/12/2025
- Last modified:
- 13:47:10 03/11/2024
- MD5 hash:
- af4221fefa9c9051846a063ac4135560
- Filesize:
- 8.72 KB
- suspicious functions used:
- shell_exec (line:24);shell_exec (line:36);
$outputs = shell_exec($commanda);shell_exec (line:59);$output = shell_exec($command);shell_exec (line:78);$outputs = shell_exec($commanda);shell_exec (line:97);$output = shell_exec($command);shell_exec (line:116);$outputs = shell_exec($commanda);shell_exec (line:134);$output = shell_exec($command);shell_exec (line:143);$od_vdlan = shell_exec($commanda . " 2>&1");shell_exec (line:155);$od_vdland = shell_exec($coddvland . " 2>&1");shell_exec (line:175);$outputs = shell_exec($coddvladnd . " 2>&1");$output_vdlan = shell_exec($command_vdlan); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: sms_deliverey_report.php-
- Full path:
- 7stars/web/sms_deliverey_report.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:53 12/12/2025
- Last modified:
- 13:47:24 03/11/2024
- MD5 hash:
- 03623943da7e9334e137b38c8577fc84
- Filesize:
- 4.25 KB
- suspicious functions used:
- curl_exec (line:28);curl_exec (line:53);
$result11 = curl_exec($ch1);curl_exec (line:90);$resultdd = curl_exec($ch);$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: networktree_device_onu_list_add.php-
- Full path:
- 7stars/web/networktree_device_onu_list_add.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:53 12/12/2025
- Last modified:
- 13:47:13 03/11/2024
- MD5 hash:
- 444ccf3c3e852a5a25cc4ccd3a5cf9ca
- Filesize:
- 14.66 KB
- suspicious functions used:
- `network_tree` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND device_type = '5' AND ` (line:9);shell_exec (line:33);
$resu11=mysql_query("SELECT pon_index_id FROM `network_tree` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND device_type = '5' AND `sts` = '0'");`network_tree` WHERE `onu_mac` = '$mac_address' AND ` (line:131);$output = shell_exec($command . " 2>&1");shell_exec (line:179);$reu11=mysql_query("SELECT count(tree_id) AS onucount FROM `network_tree` WHERE `onu_mac` = '$mac_address' AND `sts` = '0'");shell_exec (line:187);$output = shell_exec($command . " 2>&1");shell_exec (line:235);$outputS = shell_exec($commandS . " 2>&1");`network_tree` WHERE `onu_mac` = '$onuMac' AND ` (line:301);$snmpOutput = shell_exec($command);$reu11=mysql_query("SELECT count(tree_id) AS onucount FROM `network_tree` WHERE `onu_mac` = '$onuMac' AND `sts` = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: networktree_device_pon_check.php-
- Full path:
- 7stars/web/networktree_device_pon_check.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:53 12/12/2025
- Last modified:
- 13:47:13 03/11/2024
- MD5 hash:
- 708a93aadcae96ecf0aaca52041fcf38
- Filesize:
- 1.53 KB
- suspicious functions used:
- `pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '$olt_id' AND ` (line:8);
$result11=mysql_query("SELECT count(`pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '$olt_id' AND `sts` = '0';"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: support-action.php-
- Full path:
- 7stars/web/support-action.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:53 12/12/2025
- Last modified:
- 13:47:25 03/11/2024
- MD5 hash:
- 58556808f93f52486b2ad06998142aa9
- Filesize:
- 14.56 KB
- suspicious functions used:
- curl_exec (line:220);
$jsona = curl_exec($ch10); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: networktree_device_pon_list_add.php-
- Full path:
- 7stars/web/networktree_device_pon_list_add.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:53 12/12/2025
- Last modified:
- 13:47:13 03/11/2024
- MD5 hash:
- 2ec03912801e4749c2e9cd361417ca5f
- Filesize:
- 1.36 KB
- suspicious functions used:
- `olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:6);`olt_pon` WHERE `olt_id` = '$olt_id' AND ` (line:10);
$resu11=mysql_query("SELECT olt_name FROM `olt_con` WHERE `olt_id` = '$olt_id' AND `sts` = '0'");`network_tree` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND ` (line:17);$result11=mysql_query("SELECT pon_id, olt_pon_id, pon_name FROM `olt_pon` WHERE `olt_id` = '$olt_id' AND `sts` = '0'");$rehu11=mysql_query("SELECT count(tree_id) AS poncount FROM `network_tree` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND `sts` = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: networktree_device_pon_port_onu_list.php-
- Full path:
- 7stars/web/networktree_device_pon_port_onu_list.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:53 12/12/2025
- Last modified:
- 13:47:13 03/11/2024
- MD5 hash:
- 9c63b3ac69996628f5eb2959a9eb4e15
- Filesize:
- 8.65 KB
- suspicious functions used:
- `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:25);shell_exec (line:32);
$rff11=mysqli_query($con, "SELECT olt_pon_id AS pon_port FROM `olt_pon` WHERE olt_id = '$olt_id' AND `pon_name` LIKE '$pon_portt'");shell_exec (line:45);$outputs = shell_exec($commanda);`network_tree` WHERE onu_index_id = '$port_onu_index_id' AND ` (line:49);$output = shell_exec($command);shell_exec (line:81);$rff11d=mysqli_query($con, "SELECT onu_name, onu_index, onu_index_id, onu_mac FROM `network_tree` WHERE onu_index_id = '$port_onu_index_id' AND `olt_id` = '$olt_id'");shell_exec (line:103);$outputs = shell_exec($commanda);shell_exec (line:122);$output = shell_exec($command);shell_exec (line:143);$outputs = shell_exec($commanda);shell_exec (line:161);$output = shell_exec($command);shell_exec (line:170);$od_vdlan = shell_exec($commanda . " 2>&1");shell_exec (line:184);$od_vdland = shell_exec($coddvland . " 2>&1");$outputs = shell_exec($coddvladnd . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: networktree_device_pon_port_sense_list.php-
- Full path:
- 7stars/web/networktree_device_pon_port_sense_list.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:53 12/12/2025
- Last modified:
- 13:47:13 03/11/2024
- MD5 hash:
- ee69cd5cc122f8aa37d8d8e5c74def6b
- Filesize:
- 3.65 KB
- suspicious functions used:
- `network_tree` WHERE `onu_mac` = '$onu_mac' AND ` (line:26);`network_tree` WHERE `c_id` = '{$dfhbdxf}' AND ` (line:71);
$reu1d1=mysqli_query($con, "SELECT tree_id AS router_parant_id FROM `network_tree` WHERE `onu_mac` = '$onu_mac' AND `sts` = '0'");$reu11=mysqli_query($con, "SELECT count(c_id) AS client_count FROM `network_tree` WHERE `c_id` = '{$dfhbdxf}' AND `sts` = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: networktree_device_type.php-
- Full path:
- 7stars/web/networktree_device_type.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:53 12/12/2025
- Last modified:
- 00:14:12 21/11/2024
- MD5 hash:
- f1520732e5a3ef38564238a3278a1f63
- Filesize:
- 11.43 KB
- suspicious functions used:
- `tree_id`) AS countolt FROM `network_tree` WHERE `olt_id` = '$olt_id_sure' AND ` (line:64);
$resu11=mysql_query("SELECT COUNT(`tree_id`) AS countolt FROM `network_tree` WHERE `olt_id` = '$olt_id_sure' AND `device_type` = '1' AND sts = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: test6.php-
- Full path:
- 7stars/web/test6.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:53 12/12/2025
- Last modified:
- 13:47:26 03/11/2024
- MD5 hash:
- f22d022ddc284f4d8e1de3660da91db8
- Filesize:
- 15.61 KB
- suspicious functions used:
- shell_exec (line:34);shell_exec (line:113);
$outputs = shell_exec($snmpCommand);shell_exec (line:126);$outpdduts = shell_exec($sand);shell_exec (line:132);$outputsmac = shell_exec($snmpCommandmac);$output_vlan = shell_exec($command_vlan . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: test7.php-
- Full path:
- 7stars/web/test7.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:53 12/12/2025
- Last modified:
- 13:47:26 03/11/2024
- MD5 hash:
- b11ccf951ce63a21ea0a7328316a0e5c
- Filesize:
- 1.57 KB
- suspicious functions used:
- curl_exec (line:14);
$result1dd = curl_exec($ch111); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: testttttt.php-
- Full path:
- 7stars/web/testttttt.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:53 12/12/2025
- Last modified:
- 13:47:26 03/11/2024
- MD5 hash:
- b1988a4be29e191ad935fb409a4174ee
- Filesize:
- 2 KB
- suspicious functions used:
- curl_exec (line:47);
$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: texecutepayment.php-
- Full path:
- 7stars/web/texecutepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:53 12/12/2025
- Last modified:
- 13:47:26 03/11/2024
- MD5 hash:
- 623635fdf5c871391d3a5fe99ee8c543
- Filesize:
- 2.91 KB
- suspicious functions used:
- curl_exec (line:24);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: webhook2.php-
- Full path:
- 7stars/web/webhook2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:53 12/12/2025
- Last modified:
- 13:47:28 03/11/2024
- MD5 hash:
- 74a7dcc262d7fe7f2bdc9e0595d03837
- Filesize:
- 4.69 KB
- suspicious functions used:
- base64_decode (line:22);curl_exec (line:33);
$signatureDecoded = base64_decode($signature);curl_exec (line:86);curl_exec($url);curl_exec (line:107);$result = curl_exec($ch);$data = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: webhook.php-
- Full path:
- 7stars/web/webhook.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 12:16:06 12/12/2025
- Last modified:
- 13:47:28 03/11/2024
- MD5 hash:
- 18c8353c99f0ca2645c68685e40c568b
- Filesize:
- 21.1 KB
- suspicious functions used:
- base64_decode (line:28);curl_exec (line:39);
$signatureDecoded = base64_decode($signature);curl_exec (line:429);curl_exec($url);$data = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: billpaycheck.php-
- Full path:
- abi/web2/bkash/billpaycheck.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:53 12/12/2025
- Last modified:
- 19:44:41 20/11/2024
- MD5 hash:
- 38c46efc36b25628fa18bd92ae135af9
- Filesize:
- 796 B
- suspicious functions used:
- curl_exec (line:18);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: createpayment.php-
- Full path:
- abi/web2/bkash/createpayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:53 12/12/2025
- Last modified:
- 19:44:41 20/11/2024
- MD5 hash:
- 6175301f744b22b7db70ba598a991f8b
- Filesize:
- 1.64 KB
- suspicious functions used:
- curl_exec (line:36);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: executepayment.php-
- Full path:
- abi/web2/bkash/executepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:53 12/12/2025
- Last modified:
- 19:44:41 20/11/2024
- MD5 hash:
- 19be365d26141eaecead7ef0ada0e75c
- Filesize:
- 1.3 KB
- suspicious functions used:
- curl_exec (line:31);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: grant.php-
- Full path:
- abi/web2/bkash/grant.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:53 12/12/2025
- Last modified:
- 19:44:41 20/11/2024
- MD5 hash:
- da5499d260dc78ea4fcd71227cc6c484
- Filesize:
- 2.01 KB
- suspicious functions used:
- curl_exec (line:41);curl_exec (line:63);
$resultdata=curl_exec($url);$response = curl_exec($curl); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: query.php-
- Full path:
- abi/web2/bkash/query.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:53 12/12/2025
- Last modified:
- 19:44:41 20/11/2024
- MD5 hash:
- f3ed9045f3a073e2cdc8561d500bda89
- Filesize:
- 1.65 KB
- suspicious functions used:
- curl_exec (line:33);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tagreeexpayment.php-
- Full path:
- abi/web2/bkash/tagreeexpayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:53 12/12/2025
- Last modified:
- 19:44:41 20/11/2024
- MD5 hash:
- a1ba7d36003f72e593615aa32e44acb9
- Filesize:
- 1.58 KB
- suspicious functions used:
- curl_exec (line:27);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tcreateagree.php-
- Full path:
- abi/web2/bkash/tcreateagree.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:53 12/12/2025
- Last modified:
- 19:44:41 20/11/2024
- MD5 hash:
- 8ae6bdc9f3d4b0cdcf651701a0d9ebab
- Filesize:
- 1.2 KB
- suspicious functions used:
- curl_exec (line:27);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tcreatepayment.php-
- Full path:
- abi/web2/bkash/tcreatepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:53 12/12/2025
- Last modified:
- 19:44:41 20/11/2024
- MD5 hash:
- 3c978def6cffa0a8db5e86ce127caae6
- Filesize:
- 1.35 KB
- suspicious functions used:
- curl_exec (line:29);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: texecutepayment.php-
- Full path:
- abi/web2/bkash/texecutepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:53 12/12/2025
- Last modified:
- 19:44:41 20/11/2024
- MD5 hash:
- d8f24df64623da3cfc2baf48f184a3d1
- Filesize:
- 1.21 KB
- suspicious functions used:
- curl_exec (line:25);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: token.php-
- Full path:
- abi/web2/bkash/token.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:53 12/12/2025
- Last modified:
- 19:44:41 20/11/2024
- MD5 hash:
- f50b33eeb31927b2c081195618d48b8d
- Filesize:
- 1.88 KB
- suspicious functions used:
- curl_exec (line:48);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tokent.php-
- Full path:
- abi/web2/bkash/tokent.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:53 12/12/2025
- Last modified:
- 19:44:41 20/11/2024
- MD5 hash:
- 890a9e9fb1be75f31a6daad8811c1ff9
- Filesize:
- 1.9 KB
- suspicious functions used:
- curl_exec (line:48);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: trxID.php-
- Full path:
- abi/web2/bkash/trxID.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:53 12/12/2025
- Last modified:
- 19:44:41 20/11/2024
- MD5 hash:
- 9bcb8e70728fd25807c4db8916166d74
- Filesize:
- 1.44 KB
- suspicious functions used:
- curl_exec (line:31);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: createpayment.php-
- Full path:
- abi/web2/bkasht/createpayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:53 12/12/2025
- Last modified:
- 19:44:42 20/11/2024
- MD5 hash:
- a4ba6e7683f558dc3602dacd7ddeded2
- Filesize:
- 1.36 KB
- suspicious functions used:
- curl_exec (line:29);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: executepayment.php-
- Full path:
- abi/web2/bkasht/executepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:53 12/12/2025
- Last modified:
- 19:44:42 20/11/2024
- MD5 hash:
- aad462fbca9f9a36649a197d67403098
- Filesize:
- 1.27 KB
- suspicious functions used:
- curl_exec (line:26);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: grant.php-
- Full path:
- abi/web2/bkasht/grant.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:53 12/12/2025
- Last modified:
- 19:44:42 20/11/2024
- MD5 hash:
- da5499d260dc78ea4fcd71227cc6c484
- Filesize:
- 2.01 KB
- suspicious functions used:
- curl_exec (line:41);curl_exec (line:63);
$resultdata=curl_exec($url);$response = curl_exec($curl); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: query.php-
- Full path:
- abi/web2/bkasht/query.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:53 12/12/2025
- Last modified:
- 19:44:42 20/11/2024
- MD5 hash:
- f3ed9045f3a073e2cdc8561d500bda89
- Filesize:
- 1.65 KB
- suspicious functions used:
- curl_exec (line:33);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: token.php-
- Full path:
- abi/web2/bkasht/token.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:53 12/12/2025
- Last modified:
- 19:44:42 20/11/2024
- MD5 hash:
- f50b33eeb31927b2c081195618d48b8d
- Filesize:
- 1.88 KB
- suspicious functions used:
- curl_exec (line:48);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: trxID.php-
- Full path:
- abi/web2/bkasht/trxID.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:53 12/12/2025
- Last modified:
- 19:44:42 20/11/2024
- MD5 hash:
- 9bcb8e70728fd25807c4db8916166d74
- Filesize:
- 1.44 KB
- suspicious functions used:
- curl_exec (line:31);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: class.phpmailer.php-
- Full path:
- abi/web2/email/class.phpmailer.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:54 12/12/2025
- Last modified:
- 19:44:42 20/11/2024
- MD5 hash:
- 68468d69b47fffecc89df57e27c5a781
- Filesize:
- 143.32 KB
- suspicious functions used:
- `$DKIM_private` (line:428);popen (line:1387);
* If set, takes precedence over `$DKIM_private`.popen (line:1408);if (!@$mail = popen($sendmail, 'w')) {base64_decode (line:3410);if (!@$mail = popen($sendmail, 'w')) {`$mail->set('SMTPSecure', 'tls');` (line:3688);$data = base64_decode($data);`$mail->SMTPSecure = 'tls';` (line:3690);* `$mail->set('SMTPSecure', 'tls');`* `$mail->SMTPSecure = 'tls';` - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: class.smtp.php-
- Full path:
- abi/web2/email/class.smtp.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:54 12/12/2025
- Last modified:
- 19:44:43 20/11/2024
- MD5 hash:
- aa8478329268e5438a4469c268337a10
- Filesize:
- 41.44 KB
- suspicious functions used:
- base64_decode (line:513);base64_decode (line:533);
$challenge = base64_decode($challenge);$challenge = base64_decode(substr($this->last_reply, 4)); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: JSON.php-
- Full path:
- abi/web2/inc/JSON.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:55 12/12/2025
- Last modified:
- 19:44:49 20/11/2024
- MD5 hash:
- f5a34509e06231308becbe320ade9ff6
- Filesize:
- 33.22 KB
- suspicious functions used:
- eval (line:22);
* Javascript, and can be directly eval()'ed with no further parsing - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: jqgrid.php-
- Full path:
- abi/web2/inc/jqgrid.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:55 12/12/2025
- Last modified:
- 19:44:49 20/11/2024
- MD5 hash:
- 71027a29e71e0626d8b57cbb631e6d98
- Filesize:
- 23.92 KB
- suspicious functions used:
- eval (line:397);
if (!empty($V4a8a08f0["condition"])) eval("\$V4b43b0ae = ".$V4a8a08f0["condition"].";"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: smsapicore.php-
- Full path:
- abi/web2/include/smsapicore.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:55 12/12/2025
- Last modified:
- 01:51:14 05/02/2025
- MD5 hash:
- 0494713963b7e9ead12abe06de2811a5
- Filesize:
- 1.26 KB
- suspicious functions used:
- curl_exec (line:37);
$resultdgfb = curl_exec($chg); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: telegramapicore.php-
- Full path:
- abi/web2/include/telegramapicore.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:55 12/12/2025
- Last modified:
- 22:11:00 21/01/2025
- MD5 hash:
- 511f56e6dfcf4e9e7a11259e023ca3ae
- Filesize:
- 3.15 KB
- suspicious functions used:
- curl_exec (line:68);
$result11 = curl_exec($ch3); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Changes.txt-
- Full path:
- abi/web2/js/jqgrid/js/Changes.txt
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:55 12/12/2025
- Last modified:
- 19:44:55 20/11/2024
- MD5 hash:
- c0a4adbc3f1c6d592cb4fa8433fee9ea
- Filesize:
- 44.32 KB
- suspicious functions used:
- system (line:87);
* Add a ant based build system which allow us to minify the JS code - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ui.php-
- Full path:
- abi/web2/js/tinymce/themes/advanced/skins/highcontrast/ui.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:55 12/12/2025
- Last modified:
- 19:45:01 20/11/2024
- MD5 hash:
- 3edaf67be8573b86686f46bbba4f058c
- Filesize:
- 4.53 KB
- suspicious functions used:
- curl_exec (line:20);`bill_amount` = '0.00' WHERE bill_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY ` (line:53);
$alldataa = curl_exec($chxchhh);`bill_amount` = '0.00', days = '0.00' WHERE entry_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY ` (line:54);$queryss = mysql_query("UPDATE billing SET `bill_amount` = '0.00' WHERE bill_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY `id` DESC LIMIT 5");`payment` WHERE `pay_date` < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND pay_amount != '0.00' ORDER BY ` (line:55);$sqlqmss = mysql_query("UPDATE billing_mac SET `bill_amount` = '0.00', days = '0.00' WHERE entry_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY `id` DESC LIMIT 5");curl_exec (line:146);$sqlqmsp = mysql_query("DELETE FROM `payment` WHERE `pay_date` < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND pay_amount != '0.00' ORDER BY `id` ASC LIMIT 5");curl_exec (line:168);$responsed = curl_exec($curld);$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Clients3.php-
- Full path:
- abi/web2/Clients3.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:55 12/12/2025
- Last modified:
- 19:44:34 20/11/2024
- MD5 hash:
- 50ddc869b383ab76e009c7a2c17c99a3
- Filesize:
- 175.31 KB
- suspicious functions used:
- `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:832);
$result1rd=mysql_query("SELECT `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND `sts` = '0' order by b_name ASC"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: AutoActiveClientsCount1.php-
- Full path:
- abi/web2/AutoActiveClientsCount1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:56 12/12/2025
- Last modified:
- 03:22:57 24/03/2025
- MD5 hash:
- 96ae95689b28aef52bd4eaab4bfea7cc
- Filesize:
- 5.38 KB
- suspicious functions used:
- system (line:54);
$ARRAY = $API->comm("/system/resource/print"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: AutoActiveClientsCount11.php-
- Full path:
- abi/web2/AutoActiveClientsCount11.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:56 12/12/2025
- Last modified:
- 19:44:33 20/11/2024
- MD5 hash:
- a0090e4a11dd59b955a6edd549b6ef2f
- Filesize:
- 5.85 KB
- suspicious functions used:
- system (line:54);
$ARRAY = $API->comm("/system/resource/print"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ClientsOnMap.php-
- Full path:
- abi/web2/ClientsOnMap.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:56 12/12/2025
- Last modified:
- 06:02:55 10/11/2025
- MD5 hash:
- e853e4393e2183f104b30d6284d8a51c
- Filesize:
- 19.47 KB
- suspicious functions used:
- `${totalonline}` (line:173);`${totaloffline}` (line:174);
document.getElementById('totalonline').textContent = `${totalonline}`;`${results.rxPower}` (line:307);document.getElementById('totaloffline').textContent = `${totaloffline}`;`${results.distance}` (line:308);var rxPower = `${results.rxPower}`;`${results.supplyVoltage}` (line:309);var distance = `${results.distance}`;`${results.temperature}` (line:310);var supplyVoltage = `${results.supplyVoltage}`;`${results.txPower}` (line:311);var temperature = `${results.temperature}`;var txPower = `${results.txPower}`; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ClientView.php-
- Full path:
- abi/web2/ClientView.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:56 12/12/2025
- Last modified:
- 03:12:52 07/06/2025
- MD5 hash:
- 756221c89eb1163a8735f450f7a9d263
- Filesize:
- 112.89 KB
- suspicious functions used:
- `olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:227);
$querydd = mysql_query("SELECT `olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND `olt_id` = '$c_olt_id' AND sts = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Clients.php-
- Full path:
- abi/web2/Clients.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:57 12/12/2025
- Last modified:
- 22:49:29 08/09/2025
- MD5 hash:
- 813f3342191ae66a98437696e5a413cf
- Filesize:
- 197.66 KB
- suspicious functions used:
- `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:761);
$result1rd=mysql_query("SELECT `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND `sts` = '0' order by b_name ASC"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: EmployeeAdd.php-
- Full path:
- abi/web2/EmployeeAdd.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:57 12/12/2025
- Last modified:
- 04:15:31 15/02/2025
- MD5 hash:
- c12c85fa282eb15060ed68bad252f8e8
- Filesize:
- 19.13 KB
- suspicious functions used:
- `Element with ID ${id} not found.` (line:36);`Non-numeric input detected in ${id}.` (line:38);
if (!element) throw `Element with ID ${id} not found.`;`Element with ID ${id} not found.` (line:44);if (isNaN(value)) throw `Non-numeric input detected in ${id}.`;`Non-numeric input detected in ${id}.` (line:46);if (!element) throw `Element with ID ${id} not found.`;if (isNaN(value)) throw `Non-numeric input detected in ${id}.`; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Clients1.php-
- Full path:
- abi/web2/Clients1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:57 12/12/2025
- Last modified:
- 07:08:14 03/05/2025
- MD5 hash:
- ccec9015b85db7f5fd719dce1ddfd76d
- Filesize:
- 197.59 KB
- suspicious functions used:
- `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:759);
$result1rd=mysql_query("SELECT `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND `sts` = '0' order by b_name ASC"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Clients2.php-
- Full path:
- abi/web2/Clients2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:58 12/12/2025
- Last modified:
- 19:44:34 20/11/2024
- MD5 hash:
- 982d6411552113b0715fd17c26f50292
- Filesize:
- 205.13 KB
- suspicious functions used:
- `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:832);
$result1rd=mysql_query("SELECT `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND `sts` = '0' order by b_name ASC"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: EmployeeEdit.php-
- Full path:
- abi/web2/EmployeeEdit.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:58 12/12/2025
- Last modified:
- 04:15:31 15/02/2025
- MD5 hash:
- 55b4626339d566473f477e1a001dc8b4
- Filesize:
- 17.73 KB
- suspicious functions used:
- `Element with ID ${id} not found.` (line:44);`Non-numeric input detected in ${id}.` (line:46);
if (!element) throw `Element with ID ${id} not found.`;`Element with ID ${id} not found.` (line:52);if (isNaN(value)) throw `Non-numeric input detected in ${id}.`;`Non-numeric input detected in ${id}.` (line:54);if (!element) throw `Element with ID ${id} not found.`;if (isNaN(value)) throw `Non-numeric input detected in ${id}.`; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: MacResellerAdd.php-
- Full path:
- abi/web2/MacResellerAdd.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:58 12/12/2025
- Last modified:
- 22:02:20 23/04/2025
- MD5 hash:
- 5fdbde3df3e96e845cc118cb3ae916a5
- Filesize:
- 30.33 KB
- suspicious functions used:
- `input[name="${inputName}"]:checked` (line:799);
var value = document.querySelector(`input[name="${inputName}"]:checked`).value; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: MacResellerEdit.php-
- Full path:
- abi/web2/MacResellerEdit.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:59 12/12/2025
- Last modified:
- 22:01:56 23/04/2025
- MD5 hash:
- 92ce35276f3eae45e866de3439baaa11
- Filesize:
- 37.76 KB
- suspicious functions used:
- `input[name="${inputName}"]:checked` (line:640);
var value = document.querySelector(`input[name="${inputName}"]:checked`).value; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: InstrumentsStoreOutDetails.php-
- Full path:
- abi/web2/InstrumentsStoreOutDetails.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:59 12/12/2025
- Last modified:
- 19:44:35 20/11/2024
- MD5 hash:
- a60c19f766bfff1ccdccbeba6b39eb87
- Filesize:
- 9.37 KB
- suspicious functions used:
- `update_date`, '%D-%b, %y') AS offdate, TIME_FORMAT(`update_time`, '%T') AS offtime FROM `con_sts_log` WHERE `c_id` = '{$row['c_id']}' AND con_sts = 'Inactive' ORDER BY ` (line:120);
$resultwwdd=mysql_query("SELECT DATE_FORMAT(`update_date`, '%D-%b, %y') AS offdate, TIME_FORMAT(`update_time`, '%T') AS offtime FROM `con_sts_log` WHERE `c_id` = '{$row['c_id']}' AND con_sts = 'Inactive' ORDER BY `update_date_time` DESC LIMIT 1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkLoad.php-
- Full path:
- abi/web2/NetworkLoad.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:59 12/12/2025
- Last modified:
- 19:44:37 20/11/2024
- MD5 hash:
- e1632e66ee1b7394d3fb82751b924abe
- Filesize:
- 2.83 KB
- suspicious functions used:
- system (line:81);
$ARRAY = $API->comm("/system/resource/print"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Network.php-
- Full path:
- abi/web2/Network.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:59 12/12/2025
- Last modified:
- 01:12:51 05/05/2025
- MD5 hash:
- 85105512c59282e667cfe15bc67d73bb
- Filesize:
- 69.44 KB
- suspicious functions used:
- system (line:371);shell_exec (line:654);
$ARRAY = $API->comm("/system/resource/print");`network_tree` WHERE `device_type` = '1' AND `olt_id` = '{$rowo['olt_id']}' AND sts = '0' AND ` (line:874);$output = shell_exec($command);$querytree = "SELECT tree_id FROM `network_tree` WHERE `device_type` = '1' AND `olt_id` = '{$rowo['olt_id']}' AND sts = '0' AND `latitude` != '' AND `longitude` != ''"; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkLoad1.php-
- Full path:
- abi/web2/NetworkLoad1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:59 12/12/2025
- Last modified:
- 19:44:37 20/11/2024
- MD5 hash:
- 176bd6931be34d7ef351d22897accc65
- Filesize:
- 759 B
- suspicious functions used:
- system (line:18);
$ARRAY = $API->comm("/system/resource/print"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Network1.php-
- Full path:
- abi/web2/Network1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:59 12/12/2025
- Last modified:
- 11:57:44 15/04/2025
- MD5 hash:
- 154ba9f6e6603be92ddd48557fb118ce
- Filesize:
- 65.34 KB
- suspicious functions used:
- system (line:369);shell_exec (line:652);
$ARRAY = $API->comm("/system/resource/print");`network_tree` WHERE `device_type` = '1' AND `olt_id` = '{$rowo['olt_id']}' AND sts = '0' AND ` (line:843);$output = shell_exec($command);$querytree = "SELECT tree_id FROM `network_tree` WHERE `device_type` = '1' AND `olt_id` = '{$rowo['olt_id']}' AND sts = '0' AND `latitude` != '' AND `longitude` != ''"; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-client-onu-mac-count-rcl.php-
- Full path:
- abi/web2/network-olt-client-onu-mac-count-rcl.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:40:59 12/12/2025
- Last modified:
- 23:51:27 24/03/2025
- MD5 hash:
- 9372dfb2a63d9f4a28440f91d4866778
- Filesize:
- 3.49 KB
- suspicious functions used:
- shell_exec (line:26);shell_exec (line:73);
$output_vdlan = shell_exec($command_dvlan . " 2>&1");shell_exec (line:85);$od_vdlan = shell_exec($coddvlan . " 2>&1");shell_exec (line:96);$output_port = shell_exec($commandd_bdcom);shell_exec (line:110);$od_vddlan = shell_exec($codmn . " 2>&1");$od_vdddlan = shell_exec($codmdn . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: SMSAddSave.php-
- Full path:
- abi/web2/SMSAddSave.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:00 12/12/2025
- Last modified:
- 01:43:36 05/02/2025
- MD5 hash:
- 0d2d0548df5f32e69264c4f2f1b1f76e
- Filesize:
- 2.12 KB
- suspicious functions used:
- curl_exec (line:35);
$result = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: SMS.php-
- Full path:
- abi/web2/SMS.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:00 12/12/2025
- Last modified:
- 01:38:29 29/04/2025
- MD5 hash:
- 0ec0c15fe62659d41bfc76ba172f4a42
- Filesize:
- 37.87 KB
- suspicious functions used:
- curl_exec (line:56);
$balance = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkOltAddQuery.php-
- Full path:
- abi/web2/NetworkOltAddQuery.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:00 12/12/2025
- Last modified:
- 21:08:55 29/03/2025
- MD5 hash:
- f2e8bbce7005fe948eab86e12f9e789f
- Filesize:
- 7.96 KB
- suspicious functions used:
- shell_exec (line:22);
$output = shell_exec($command . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkOltOnuStatus.php-
- Full path:
- abi/web2/NetworkOltOnuStatus.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:00 12/12/2025
- Last modified:
- 10:14:59 29/04/2025
- MD5 hash:
- 3389803b8d03cb46bbad2d648ffd0bd4
- Filesize:
- 70.95 KB
- suspicious functions used:
- shell_exec (line:42);shell_exec (line:102);
$output = shell_exec($command . " 2>&1");shell_exec (line:673);$output = shell_exec($command . " 2>&1");shell_exec (line:793);$oddutpdut = shell_exec($cmandd . " 2>&1");shell_exec (line:903);$oddutpdut = shell_exec($cmandd . " 2>&1");shell_exec (line:1013);$oddutpdut = shell_exec($cmandd . " 2>&1");$oddutpdut = shell_exec($cmandd . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkOltOnuStatus2.php-
- Full path:
- abi/web2/NetworkOltOnuStatus2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:00 12/12/2025
- Last modified:
- 19:44:37 20/11/2024
- MD5 hash:
- c9a14797fa4353d05bbd9427b6079250
- Filesize:
- 15.88 KB
- suspicious functions used:
- shell_exec (line:35);
$output = shell_exec($command . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkOltSense.php-
- Full path:
- abi/web2/NetworkOltSense.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:00 12/12/2025
- Last modified:
- 19:44:37 20/11/2024
- MD5 hash:
- 2be664ae5006367f629ca437a6d507f8
- Filesize:
- 18.26 KB
- suspicious functions used:
- `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, `last_synced`, `last_update`, `msg`, `full_msg`, ROUND((SELECT AVG(value) FROM olt_onu_history WHERE alarm_id = '$alarmId' AND value != ''), 2) AS average_value FROM `, ` WHERE `alarm_id` = '$alarmId' AND ` (line:123);
$querddy = mysql_query("SELECT `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, `last_synced`, `last_update`, `msg`, `full_msg`, ROUND((SELECT AVG(value) FROM olt_onu_history WHERE alarm_id = '$alarmId' AND value != ''), 2) AS average_value FROM `olt_onu_history` WHERE `alarm_id` = '$alarmId' AND `value` != ''"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkOltSenseDetails.php-
- Full path:
- abi/web2/NetworkOltSenseDetails.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:00 12/12/2025
- Last modified:
- 19:44:37 20/11/2024
- MD5 hash:
- 440096c601fc10b819a1f0f8330928b0
- Filesize:
- 14.17 KB
- suspicious functions used:
- `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:33);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:42);
$sql = mysql_query("SELECT `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND `value` != '' ORDER BY id DESC");`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:51);$sql = mysql_query("SELECT `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND `value` != '' ORDER BY id DESC");`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:60);$sql = mysql_query("SELECT `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND `value` != '' ORDER BY id DESC");$sql = mysql_query("SELECT `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND `value` != '' ORDER BY id DESC"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkOltSync.php-
- Full path:
- abi/web2/NetworkOltSync.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:00 12/12/2025
- Last modified:
- 19:44:37 20/11/2024
- MD5 hash:
- 06633d4b65a14d677358170dd0a84424
- Filesize:
- 1.87 KB
- suspicious functions used:
- curl_exec (line:18);
$result1dd = curl_exec($ch111); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkTreeAddSave.php-
- Full path:
- abi/web2/NetworkTreeAddSave.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:01 12/12/2025
- Last modified:
- 22:30:01 08/01/2025
- MD5 hash:
- 93fdf1213fdb5d525641e2b625f1a91b
- Filesize:
- 7.61 KB
- suspicious functions used:
- `network_tree` WHERE `olt_id` = '$olt_id' AND ` (line:107);
$resu11 = $con->query("SELECT tree_id AS pon_parent_id FROM `network_tree` WHERE `olt_id` = '$olt_id' AND `device_type` = '1' AND sts = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentOnlineQuery.php-
- Full path:
- abi/web2/PaymentOnlineQuery.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:01 12/12/2025
- Last modified:
- 23:21:15 14/02/2025
- MD5 hash:
- 6a845f0e20c434c12eb30f42726f268d
- Filesize:
- 28.37 KB
- suspicious functions used:
- curl_exec (line:457);curl_exec (line:669);
$resultdata=curl_exec($url);$content = curl_exec($handle ); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentOnlineQuery2.php-
- Full path:
- abi/web2/PaymentOnlineQuery2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:01 12/12/2025
- Last modified:
- 19:44:38 20/11/2024
- MD5 hash:
- ccd315d11a60901b7b9029ff44f8351b
- Filesize:
- 19.4 KB
- suspicious functions used:
- curl_exec (line:42);curl_exec (line:252);
$resultdatax=curl_exec($url);$result = curl_exec($handle); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkTreeEdit1.php-
- Full path:
- abi/web2/NetworkTreeEdit1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:01 12/12/2025
- Last modified:
- 19:44:38 20/11/2024
- MD5 hash:
- 3396a6bdf9b5804bb208f38f37cc29a2
- Filesize:
- 35.81 KB
- suspicious functions used:
- `olt_onu` WHERE olt_id = '$olt_id' AND ` (line:207);
<?php $resultoff11d=mysql_query("SELECT id AS alarm_id, alarm_name FROM `olt_onu` WHERE olt_id = '$olt_id' AND `onu_name` LIKE '$pon_name1' ORDER BY id DESC"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkTreeEditSave.php-
- Full path:
- abi/web2/NetworkTreeEditSave.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:01 12/12/2025
- Last modified:
- 22:20:43 30/03/2025
- MD5 hash:
- 75ca95ac9b0cf5e9709091d3a6ae5b6a
- Filesize:
- 13.55 KB
- suspicious functions used:
- `olt_pon` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND ` (line:84);`network_tree` WHERE `olt_id` = '$olt_id' AND ` (line:196);
$resu11=mysqli_query($con, "SELECT olt_pon_id AS pon_index_id FROM `olt_pon` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND `sts` = '0'");$resu11 = $con->query("SELECT tree_id AS pon_parent_id FROM `network_tree` WHERE `olt_id` = '$olt_id' AND `device_type` = '1' AND sts = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkTreeList.php-
- Full path:
- abi/web2/NetworkTreeList.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:01 12/12/2025
- Last modified:
- 23:32:36 18/04/2025
- MD5 hash:
- 2e75d2b5d8285321171467ca5c0afbe4
- Filesize:
- 32 KB
- suspicious functions used:
- `pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '{$rowsedfg['olt_id']}' AND ` (line:455);
$result11=mysql_query("SELECT count(`pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '{$rowsedfg['olt_id']}' AND `sts` = '0';"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkTreeMap.php-
- Full path:
- abi/web2/NetworkTreeMap.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:01 12/12/2025
- Last modified:
- 17:23:41 23/03/2025
- MD5 hash:
- 9a2606558b5ebf04b77c89eeeb6df1c6
- Filesize:
- 49.36 KB
- suspicious functions used:
- `${totalonline}` (line:121);`${totaloffline}` (line:122);
document.getElementById('totalonline').textContent = `${totalonline}`;`Failed to load data: ${error.message}` (line:788);document.getElementById('totaloffline').textContent = `${totaloffline}`;`HTTP error! Status: ${response.status}` (line:803);updateElement('resultt1-' + treeid, `<span>Failed to load data: ${error.message}</span>`);throw new Error(`HTTP error! Status: ${response.status}`); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkTreeMap1.php-
- Full path:
- abi/web2/NetworkTreeMap1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:01 12/12/2025
- Last modified:
- 15:36:05 19/03/2025
- MD5 hash:
- 468cfbce8d08d577fb1fe05b51eb722f
- Filesize:
- 48.69 KB
- suspicious functions used:
- `${totalonline}` (line:122);`${totaloffline}` (line:123);
document.getElementById('totalonline').textContent = `${totalonline}`;`Failed to load data: ${error.message}` (line:776);document.getElementById('totaloffline').textContent = `${totaloffline}`;`HTTP error! Status: ${response.status}` (line:790);updateElement('resultt1-' + treeid, `<span>Failed to load data: ${error.message}</span>`);throw new Error(`HTTP error! Status: ${response.status}`); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentWebhook.php-
- Full path:
- abi/web2/PaymentWebhook.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:02 12/12/2025
- Last modified:
- 19:44:39 20/11/2024
- MD5 hash:
- a2f322c94787630ab1e0c8ca35fc5ba1
- Filesize:
- 18.6 KB
- suspicious functions used:
- base64_decode (line:30);curl_exec (line:41);
$signatureDecoded = base64_decode($signature);curl_exec (line:422);curl_exec($url);$data = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: SMS1.php-
- Full path:
- abi/web2/SMS1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:02 12/12/2025
- Last modified:
- 19:44:39 20/11/2024
- MD5 hash:
- e4671dadf9ad575671fd3609a60030da
- Filesize:
- 32.19 KB
- suspicious functions used:
- curl_exec (line:59);
$balance = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: SignUp1.php-
- Full path:
- abi/web2/SignUp1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:03 12/12/2025
- Last modified:
- 10:59:04 24/04/2025
- MD5 hash:
- 22cdaf528a51aa44652f81cc911a85fa
- Filesize:
- 26.63 KB
- suspicious functions used:
- curl_exec (line:53);curl_exec (line:75);
$jsona = curl_exec($ch10);$resdfwedf = curl_exec($ch1s); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: UserAccess.php-
- Full path:
- abi/web2/UserAccess.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:03 12/12/2025
- Last modified:
- 02:15:48 01/06/2025
- MD5 hash:
- a3c12b17bcb2c8035cfa045807797ae6
- Filesize:
- 10.45 KB
- suspicious functions used:
- `.modulecheckboxx[data-group="${group}"]` (line:159);
document.querySelectorAll(`.modulecheckboxx[data-group="${group}"]`).forEach(box => { - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: UserLoginReport.php-
- Full path:
- abi/web2/UserLoginReport.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:03 12/12/2025
- Last modified:
- 15:51:00 19/04/2025
- MD5 hash:
- 43d95cc2a57279f23f52d11581c9427f
- Filesize:
- 7.76 KB
- suspicious functions used:
- curl_exec (line:120);
$foundornot = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-client-onu-mac-countt.php-
- Full path:
- abi/web2/network-olt-client-onu-mac-countt.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:04 12/12/2025
- Last modified:
- 23:51:57 24/03/2025
- MD5 hash:
- 6c684ef0e37eeb3400821b34d0d05fec
- Filesize:
- 8.94 KB
- suspicious functions used:
- shell_exec (line:26);shell_exec (line:36);
$od_vddlan = shell_exec($codmn . " 2>&1");shell_exec (line:59);$od_vddlan = shell_exec($codmn . " 2>&1");shell_exec (line:75);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:92);$outpudt_vlan = shell_exec($commadnd_vlan . " 2>&1");shell_exec (line:102);$output_port = shell_exec($commandd_bdcom);shell_exec (line:117);$output_vdlan = shell_exec($command_vdlan . " 2>&1");shell_exec (line:155);$outpdut_vdlan = shell_exec($commadnd_dvlan . " 2>&1");shell_exec (line:206);$output_vdlan = shell_exec($command_dvlan . " 2>&1");shell_exec (line:262);$od_vddddlan = shell_exec($codmddn . " 2>&1");shell_exec (line:275);$od_vdlan = shell_exec($coddvlan . " 2>&1");shell_exec (line:288);$od_vddlan = shell_exec($codmn . " 2>&1");$od_vdddlan = shell_exec($codmdn . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: emp_salary_advence_find.php-
- Full path:
- abi/web2/emp_salary_advence_find.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:04 12/12/2025
- Last modified:
- 19:44:35 20/11/2024
- MD5 hash:
- 74a7e2ffda0f7584611d7cbce6136c24
- Filesize:
- 2.25 KB
- suspicious functions used:
- `expanse` WHERE `type` = '2' AND `status` = '2' AND ex_by = '$e_id' AND MONTH(`, `) = MONTH('$lastmonth') AND YEAR(`, `) = YEAR('$lastmonth') GROUP BY ` (line:8);`e_id` = '$e_id' AND ` (line:12);
$vendorrr = mysql_query("SELECT SUM(amount) AS salary_advance FROM `expanse` WHERE `type` = '2' AND `status` = '2' AND ex_by = '$e_id' AND MONTH(`check_date`) = MONTH('$lastmonth') AND YEAR(`check_date`) = YEAR('$lastmonth') GROUP BY `ex_by`");$empppp = mysql_query("SELECT gross_total AS gross_total FROM emp_info WHERE `e_id` = '$e_id' AND `status` = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: imagevwr.php-
- Full path:
- abi/web2/imagevwr.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:04 12/12/2025
- Last modified:
- 19:44:35 20/11/2024
- MD5 hash:
- 47a223a13cc642d01dcfaaca542d396d
- Filesize:
- 915 B
- suspicious functions used:
- curl_exec (line:15);
$image_data = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: executepayment.php-
- Full path:
- abi/web2/executepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:04 12/12/2025
- Last modified:
- 19:44:35 20/11/2024
- MD5 hash:
- c46a50905333286f45dfeacf010851ab
- Filesize:
- 716 B
- suspicious functions used:
- curl_exec (line:18);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: client-online-mbb.php-
- Full path:
- abi/web2/client-online-mbb.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:04 12/12/2025
- Last modified:
- 12:19:30 15/04/2025
- MD5 hash:
- a1cef934dce8da065b0116b7915754af
- Filesize:
- 16.36 KB
- suspicious functions used:
- curl_exec (line:88);curl_exec (line:288);
$resp = curl_exec($curlss);$resp = curl_exec($curlss); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_network.php-
- Full path:
- abi/web2/cron_network.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:04 12/12/2025
- Last modified:
- 00:45:09 25/03/2025
- MD5 hash:
- 36fe709ddc5062ba1fecfe1417fdff91
- Filesize:
- 4 KB
- suspicious functions used:
- curl_exec (line:42);curl_exec (line:64);
$result1d = curl_exec($ch11);$result1dd = curl_exec($ch111); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_olt.php-
- Full path:
- abi/web2/cron_olt.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:04 12/12/2025
- Last modified:
- 11:18:19 03/05/2025
- MD5 hash:
- f0248614baaea216d0f29e0ca584410b
- Filesize:
- 4.46 KB
- suspicious functions used:
- shell_exec (line:51);curl_exec (line:106);
$output = shell_exec($command);$result1d = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: clients-nots-action.php-
- Full path:
- abi/web2/clients-nots-action.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:04 12/12/2025
- Last modified:
- 19:44:34 20/11/2024
- MD5 hash:
- dff1bb495509427d098cb4588da553b9
- Filesize:
- 5.89 KB
- suspicious functions used:
- curl_exec (line:35);
$jsona = curl_exec($ch10); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: company_info.php-
- Full path:
- abi/web2/company_info.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:04 12/12/2025
- Last modified:
- 20:00:12 10/06/2025
- MD5 hash:
- 848ec6ca3eaee7396ae9e4e9db5970fe
- Filesize:
- 8.34 KB
- suspicious functions used:
- curl_exec (line:131);
$alldata = curl_exec($chhhh); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: createpayment.php-
- Full path:
- abi/web2/createpayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:04 12/12/2025
- Last modified:
- 19:44:34 20/11/2024
- MD5 hash:
- ba9747d0421fd091b998389469e72a0b
- Filesize:
- 1.7 KB
- suspicious functions used:
- curl_exec (line:57);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_all.php-
- Full path:
- abi/web2/cron_all.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:04 12/12/2025
- Last modified:
- 19:44:34 20/11/2024
- MD5 hash:
- 967f1d654ae891609da26b9e0fdbd1ae
- Filesize:
- 2.44 KB
- suspicious functions used:
- curl_exec (line:23);curl_exec (line:38);
$result1 = curl_exec($ch1);curl_exec (line:53);$result1d = curl_exec($ch11);$result1d2 = curl_exec($ch112); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_gen_bill.php-
- Full path:
- abi/web2/cron_auto_gen_bill.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:04 12/12/2025
- Last modified:
- 19:44:34 20/11/2024
- MD5 hash:
- f1056618cc4402968e50d1232d2c51c8
- Filesize:
- 4.73 KB
- suspicious functions used:
- curl_exec (line:140);curl_exec (line:149);
$respd = curl_exec($curl);$resp = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_olt_clients_catch.php-
- Full path:
- abi/web2/cron_olt_clients_catch.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:04 12/12/2025
- Last modified:
- 10:50:06 03/05/2025
- MD5 hash:
- f3775b14a4f3709bd1e20ac451a3bea1
- Filesize:
- 2.05 KB
- suspicious functions used:
- curl_exec (line:55);
$result1d = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_inactive.php-
- Full path:
- abi/web2/cron_auto_inactive.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:04 12/12/2025
- Last modified:
- 03:27:53 10/12/2024
- MD5 hash:
- 7e0dc4dd9dae2bf0220516641b53c027
- Filesize:
- 5.43 KB
- suspicious functions used:
- curl_exec (line:142);
$respw = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_inactive2.php-
- Full path:
- abi/web2/cron_auto_inactive2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:04 12/12/2025
- Last modified:
- 19:44:34 20/11/2024
- MD5 hash:
- 440bc24f05b01eb395df63fff2f60de9
- Filesize:
- 5.46 KB
- suspicious functions used:
- curl_exec (line:142);
$respw = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_olt_user.php-
- Full path:
- abi/web2/cron_olt_user.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:04 12/12/2025
- Last modified:
- 19:44:34 20/11/2024
- MD5 hash:
- 67aa237639e3d1e6064e76079bb3cccc
- Filesize:
- 1.97 KB
- suspicious functions used:
- curl_exec (line:19);curl_exec (line:46);
$resultd1d = curl_exec($ch110);$result1d = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_inactive_termination.php-
- Full path:
- abi/web2/cron_auto_inactive_termination.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:04 12/12/2025
- Last modified:
- 16:19:53 19/06/2025
- MD5 hash:
- 00219337ca3acfa1c8ed5b25b0d195e9
- Filesize:
- 12.89 KB
- suspicious functions used:
- curl_exec (line:232);curl_exec (line:244);
$resp = curl_exec($curlss);curl_exec (line:284);$respw = curl_exec($curls);$resp = curl_exec($curlss); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: getclientuptime.php-
- Full path:
- abi/web2/getclientuptime.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:04 12/12/2025
- Last modified:
- 19:44:35 20/11/2024
- MD5 hash:
- bbc14cdd451c72b94d78c7d2d1af0b52
- Filesize:
- 718 B
- suspicious functions used:
- curl_exec (line:18);
$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_termination_remainder1.php-
- Full path:
- abi/web2/cron_auto_termination_remainder1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:04 12/12/2025
- Last modified:
- 19:44:34 20/11/2024
- MD5 hash:
- 7765f9f820dbd402f1064fab9958ffaa
- Filesize:
- 3.26 KB
- suspicious functions used:
- curl_exec (line:83);
$respw = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_client_bandwidth_count.php-
- Full path:
- abi/web2/cron_client_bandwidth_count.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:04 12/12/2025
- Last modified:
- 23:57:39 27/06/2025
- MD5 hash:
- 86a11e3249fc7373c635fd7dea912c09
- Filesize:
- 5.71 KB
- suspicious functions used:
- curl_exec (line:157);
$result = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-con-sts.php-
- Full path:
- abi/web2/network-olt-con-sts.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:04 12/12/2025
- Last modified:
- 23:47:11 24/03/2025
- MD5 hash:
- 400a889537016067b55f97ac6d0a16a3
- Filesize:
- 4.02 KB
- suspicious functions used:
- `olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:10);shell_exec (line:38);
$query = mysqli_query($con, "SELECT `olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND `sts` = '0'");`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, `last_synced`, `last_update`, `msg`, `full_msg`, ROUND((SELECT AVG(value) FROM olt_onu_history WHERE alarm_id = '$alarmId' AND value != ''), 2) AS average_value FROM `, ` WHERE `alarm_id` = '$alarmId' AND ` (line:82);$output = shell_exec($command);$query = mysqli_query($con, "SELECT `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, `last_synced`, `last_update`, `msg`, `full_msg`, ROUND((SELECT AVG(value) FROM olt_onu_history WHERE alarm_id = '$alarmId' AND value != ''), 2) AS average_value FROM `olt_onu_history` WHERE `alarm_id` = '$alarmId' AND `value` != ''"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-oid-check.php-
- Full path:
- abi/web2/network-olt-oid-check.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:04 12/12/2025
- Last modified:
- 19:44:37 20/11/2024
- MD5 hash:
- 5b7dc0ce1103fbfc895873c250b63141
- Filesize:
- 1.88 KB
- suspicious functions used:
- shell_exec (line:33);
return shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ip-ping-checker.php-
- Full path:
- abi/web2/ip-ping-checker.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:04 12/12/2025
- Last modified:
- 19:44:36 20/11/2024
- MD5 hash:
- 0d28f3053b73b3fe2885cf519ee17c12
- Filesize:
- 2.64 KB
- suspicious functions used:
- curl_exec (line:81);
$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-load.php-
- Full path:
- abi/web2/network-olt-load.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:04 12/12/2025
- Last modified:
- 19:44:37 20/11/2024
- MD5 hash:
- f49d5153285c639ed91d4e806685ee56
- Filesize:
- 1.33 KB
- suspicious functions used:
- shell_exec (line:22);shell_exec (line:25);
$output = shell_exec($command . " 2>&1");$output1 = shell_exec($command1 . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: nagad-helper.php-
- Full path:
- abi/web2/nagad-helper.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:04 12/12/2025
- Last modified:
- 23:20:14 14/02/2025
- MD5 hash:
- 114b90b978b842cd318391876ba454ab
- Filesize:
- 2.84 KB
- suspicious functions used:
- curl_exec (line:46);base64_decode (line:77);
$resultData = curl_exec($url);openssl_private_decrypt(base64_decode($cryptText), $plain_text, $private_key); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: nagad-merchant-callback.php-
- Full path:
- abi/web2/nagad-merchant-callback.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:04 12/12/2025
- Last modified:
- 05:35:21 30/03/2025
- MD5 hash:
- a782d367c638b8f47cb46738f54fa753
- Filesize:
- 16.47 KB
- suspicious functions used:
- curl_exec (line:20);
$file_contents = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: netowrk-olt-all-mac-array.php-
- Full path:
- abi/web2/netowrk-olt-all-mac-array.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:04 12/12/2025
- Last modified:
- 19:44:37 20/11/2024
- MD5 hash:
- b0168ce99145e2afe64357247d750dd6
- Filesize:
- 4.62 KB
- suspicious functions used:
- shell_exec (line:33);shell_exec (line:47);
$output = shell_exec($command . " 2>&1");shell_exec (line:61);$output = shell_exec($command . " 2>&1");shell_exec (line:76);$output_oid_bdcom = shell_exec($command_oid_bdcom . " 2>&1");shell_exec (line:93);$output_oid_cdata = shell_exec($command_oid_cdata . " 2>&1");$output_oid_gcom = shell_exec($command_oid_gcom . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: netowrk-snmp-data.php-
- Full path:
- abi/web2/netowrk-snmp-data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:04 12/12/2025
- Last modified:
- 10:14:59 29/04/2025
- MD5 hash:
- cebb238044a122cb2dc9038afac8ca43
- Filesize:
- 24.93 KB
- suspicious functions used:
- shell_exec (line:104);shell_exec (line:113);
$output = shell_exec($command . " 2>&1");shell_exec (line:123);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:142);$output_port = shell_exec($commandd . " 2>&1");shell_exec (line:154);$output = shell_exec($command . " 2>&1");shell_exec (line:165);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:181);$output_port = shell_exec($commandd);shell_exec (line:191);$output_oid_bdcom = shell_exec($command_oid_bdcom . " 2>&1");shell_exec (line:207);$outputs = shell_exec($commanda);shell_exec (line:227);$output_port = shell_exec($commandd_bdcom);shell_exec (line:236);$output_oid_cdata = shell_exec($command_oid_cdata . " 2>&1");shell_exec (line:244);$outputs = shell_exec($commanda);shell_exec (line:251);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:256);$output_pon = shell_exec($command_ponn . " 2>&1");`pon_name` FROM `olt_pon` WHERE `olt_pon_id` = '$pon_id' AND ` (line:263);$outsddd = shell_exec($commddandd);shell_exec (line:280);$qrydd = mysqli_query($con, "SELECT `pon_name` FROM `olt_pon` WHERE `olt_pon_id` = '$pon_id' AND `olt_id` = '$olt_id' AND sts = '0'");shell_exec (line:290);$outsdd = shell_exec($commddand);`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:303);$output_oid_gcom = shell_exec($command_oid_gcom . " 2>&1");shell_exec (line:309);$querydd = mysqli_query($con, "SELECT `olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND `olt_id` = '$olt_id' AND sts = '0'");shell_exec (line:441);$output_vlan = shell_exec($command_vlan . " 2>&1");$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-old-onu-rx-map.php-
- Full path:
- abi/web2/network-old-onu-rx-map.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:05 12/12/2025
- Last modified:
- 23:50:40 24/03/2025
- MD5 hash:
- bfa54cd4fcf2629316f30310fcc90b78
- Filesize:
- 6.93 KB
- suspicious functions used:
- shell_exec (line:77);
$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-old-onu-rx.php-
- Full path:
- abi/web2/network-old-onu-rx.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:05 12/12/2025
- Last modified:
- 23:50:30 24/03/2025
- MD5 hash:
- a2555fb0203a78b0e1f41ae2d96f6f82
- Filesize:
- 7.35 KB
- suspicious functions used:
- shell_exec (line:86);
$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: webhook_test.php-
- Full path:
- abi/web2/webhook_test.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:05 12/12/2025
- Last modified:
- 19:44:41 20/11/2024
- MD5 hash:
- 74a7dcc262d7fe7f2bdc9e0595d03837
- Filesize:
- 4.69 KB
- suspicious functions used:
- base64_decode (line:22);curl_exec (line:33);
$signatureDecoded = base64_decode($signature);curl_exec (line:86);curl_exec($url);curl_exec (line:107);$result = curl_exec($ch);$data = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-client-onu-mac-count-cdata.php-
- Full path:
- abi/web2/network-olt-client-onu-mac-count-cdata.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:05 12/12/2025
- Last modified:
- 19:44:37 20/11/2024
- MD5 hash:
- c378dbabf36066c335cfb8838a6e167d
- Filesize:
- 4.58 KB
- suspicious functions used:
- shell_exec (line:25);shell_exec (line:35);
$od_vddlan = shell_exec($codmn . " 2>&1");shell_exec (line:56);$od_vddlan = shell_exec($codmn . " 2>&1");shell_exec (line:103);$output_vdlan = shell_exec($command_dvlan . " 2>&1");shell_exec (line:115);$od_vdlan = shell_exec($coddvlan . " 2>&1");shell_exec (line:126);$output_port = shell_exec($commandd_bdcom);shell_exec (line:140);$od_vddlan = shell_exec($codmn . " 2>&1");$od_vdddlan = shell_exec($codmdn . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-client-onu-mac-count.php-
- Full path:
- abi/web2/network-olt-client-onu-mac-count.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:05 12/12/2025
- Last modified:
- 10:14:59 29/04/2025
- MD5 hash:
- 80af84e49b42497813db916584cfa0f2
- Filesize:
- 15.29 KB
- suspicious functions used:
- shell_exec (line:26);shell_exec (line:36);
$od_vddlan = shell_exec($codmn . " 2>&1");shell_exec (line:68);$od_vddlan = shell_exec($codmn . " 2>&1");shell_exec (line:84);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:101);$outpudt_vlan = shell_exec($commadnd_vlan . " 2>&1");shell_exec (line:119);$output_port = shell_exec($commandd_bdcom);shell_exec (line:135);$output_vdlan = shell_exec($command_vdlan . " 2>&1");shell_exec (line:176);$outpdut_vdlan = shell_exec($commadnd_dvlan . " 2>&1");shell_exec (line:236);$output_vdlan = shell_exec($command_dvlan . " 2>&1");shell_exec (line:312);$outpdut_vdlan = shell_exec($commadnd_dvlan . " 2>&1");shell_exec (line:379);$output_vdlan = shell_exec($command_dvlan . " 2>&1");shell_exec (line:469);$od_vddddlan = shell_exec($codmddn . " 2>&1");shell_exec (line:488);$od_vdlan = shell_exec($coddvlan . " 2>&1");shell_exec (line:507);$od_vddlan = shell_exec($codmn . " 2>&1");$od_vdddlan = shell_exec($codmdn . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: login_exec.php-
- Full path:
- abi/web2/login_exec.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:05 12/12/2025
- Last modified:
- 20:20:44 23/04/2025
- MD5 hash:
- fe0ff14fc554949b87917caaf5d443f8
- Filesize:
- 12.26 KB
- suspicious functions used:
- curl_exec (line:24);curl_exec (line:80);
$jsona = curl_exec($ch10);curl_exec (line:199);$result110 = curl_exec($ch11);curl_exec (line:237);$jsona = curl_exec($ch10);$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: LoginByPass.php-
- Full path:
- abi/web2/LoginByPass.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:05 12/12/2025
- Last modified:
- 09:07:20 19/04/2025
- MD5 hash:
- 1c6616dae30e9849d8f4fb0fe712a748
- Filesize:
- 4.59 KB
- suspicious functions used:
- curl_exec (line:44);curl_exec (line:69);
$jsona = curl_exec($ch10);$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: macreseller-news.php-
- Full path:
- abi/web2/macreseller-news.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:05 12/12/2025
- Last modified:
- 19:55:57 10/01/2025
- MD5 hash:
- ed23ca98b77c5321b4485e85eb2ea64d
- Filesize:
- 3.67 KB
- suspicious functions used:
- curl_exec (line:22);
$alldata1 = curl_exec($chhhh1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: webhook.php-
- Full path:
- abi/web2/webhook.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:05 12/12/2025
- Last modified:
- 03:49:00 08/02/2025
- MD5 hash:
- 69a88ae1be0ab3ab1c7c971c72c0b025
- Filesize:
- 21.93 KB
- suspicious functions used:
- base64_decode (line:28);curl_exec (line:39);
$signatureDecoded = base64_decode($signature);curl_exec (line:465);curl_exec($url);$data = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-onu-alarm-add.php-
- Full path:
- abi/web2/network-olt-onu-alarm-add.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:05 12/12/2025
- Last modified:
- 19:44:37 20/11/2024
- MD5 hash:
- be6ba82c658419e1454f778e20e2d4c3
- Filesize:
- 7.86 KB
- suspicious functions used:
- shell_exec (line:103);
$output = shell_exec($command . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-onu-count.php-
- Full path:
- abi/web2/network-olt-onu-count.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:05 12/12/2025
- Last modified:
- 23:53:15 24/03/2025
- MD5 hash:
- cbfe569e079da8f569d07af1dec94de5
- Filesize:
- 7.22 KB
- suspicious functions used:
- `olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:14);shell_exec (line:83);
$query = mysqli_query($con, "SELECT `olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND `online_sts` = '1' AND `sts` = '0'");$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-onu-list-data.php-
- Full path:
- abi/web2/network-olt-onu-list-data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:05 12/12/2025
- Last modified:
- 19:44:37 20/11/2024
- MD5 hash:
- 54cc9417c766c31317311c3722ce7d4b
- Filesize:
- 9.48 KB
- suspicious functions used:
- shell_exec (line:24);shell_exec (line:38);
$outputs = shell_exec($commanda);shell_exec (line:64);$output = shell_exec($command);shell_exec (line:85);$outputs = shell_exec($commanda);shell_exec (line:104);$output = shell_exec($command);shell_exec (line:125);$outputs = shell_exec($commanda);shell_exec (line:143);$output = shell_exec($command);shell_exec (line:153);$od_vdlan = shell_exec($commanda . " 2>&1");shell_exec (line:165);$od_vdland = shell_exec($coddvland . " 2>&1");shell_exec (line:185);$outputs = shell_exec($coddvladnd . " 2>&1");$output_vdlan = shell_exec($command_vdlan); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tagreeexpayment.php-
- Full path:
- abi/web2/tagreeexpayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:05 12/12/2025
- Last modified:
- 19:44:40 20/11/2024
- MD5 hash:
- 029b4fba649a75c7c81d2f8931be8d63
- Filesize:
- 2.86 KB
- suspicious functions used:
- curl_exec (line:26);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-onu-power.php-
- Full path:
- abi/web2/network-olt-onu-power.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:05 12/12/2025
- Last modified:
- 19:44:37 20/11/2024
- MD5 hash:
- 2e064543b67b532bdf4e5b12d49c5052
- Filesize:
- 7.54 KB
- suspicious functions used:
- shell_exec (line:97);
$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-pon-clients-search.php-
- Full path:
- abi/web2/network-olt-pon-clients-search.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:05 12/12/2025
- Last modified:
- 19:44:37 20/11/2024
- MD5 hash:
- 79d26fc66abdab6f173330588aa8b238
- Filesize:
- 10.93 KB
- suspicious functions used:
- shell_exec (line:42);shell_exec (line:51);
$output = shell_exec($command . " 2>&1");shell_exec (line:104);$outputS = shell_exec($command . " 2>&1");shell_exec (line:168);$snmpOutput = shell_exec($command);$snmpOutput = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-pon-onu-search-bdcom.php-
- Full path:
- abi/web2/network-olt-pon-onu-search-bdcom.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:05 12/12/2025
- Last modified:
- 19:44:37 20/11/2024
- MD5 hash:
- c786fa8b69268c738b6ff976631798cd
- Filesize:
- 27.74 KB
- suspicious functions used:
- shell_exec (line:60);shell_exec (line:69);
$output = shell_exec($command . " 2>&1");shell_exec (line:383);$outputS = shell_exec($commandS . " 2>&1");$snmpOutput = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-pon-onu-search-bdcom1.php-
- Full path:
- abi/web2/network-olt-pon-onu-search-bdcom1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:05 12/12/2025
- Last modified:
- 19:44:37 20/11/2024
- MD5 hash:
- dd18677b1dcbf7f0bce2ac6912d98da0
- Filesize:
- 9.6 KB
- suspicious functions used:
- shell_exec (line:42);shell_exec (line:51);
$output = shell_exec($command . " 2>&1");shell_exec (line:129);$outputS = shell_exec($command . " 2>&1");$snmpOutput = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-pon-onu-search.php-
- Full path:
- abi/web2/network-olt-pon-onu-search.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:05 12/12/2025
- Last modified:
- 19:44:37 20/11/2024
- MD5 hash:
- dc183ecf77d0e1f56f672338fd09cfa5
- Filesize:
- 21.62 KB
- suspicious functions used:
- shell_exec (line:35);
$output = shell_exec($command . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tcreateagree.php-
- Full path:
- abi/web2/tcreateagree.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:06 12/12/2025
- Last modified:
- 19:44:40 20/11/2024
- MD5 hash:
- 27a10adf4190edc7eceee8cf74a6b72b
- Filesize:
- 999 B
- suspicious functions used:
- curl_exec (line:26);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tis-news.php-
- Full path:
- abi/web2/tis-news.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:06 12/12/2025
- Last modified:
- 19:44:40 20/11/2024
- MD5 hash:
- ed23ca98b77c5321b4485e85eb2ea64d
- Filesize:
- 3.67 KB
- suspicious functions used:
- curl_exec (line:22);
$alldata1 = curl_exec($chhhh1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tt.php-
- Full path:
- abi/web2/tt.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:06 12/12/2025
- Last modified:
- 19:44:40 20/11/2024
- MD5 hash:
- 9c4ed141cb79fdc7e807b35923c91a20
- Filesize:
- 1.56 KB
- suspicious functions used:
- curl_exec (line:30);
$response = curl_exec($curl); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-snmp-onu-status-data-bdcom.php-
- Full path:
- abi/web2/network-snmp-onu-status-data-bdcom.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:06 12/12/2025
- Last modified:
- 10:05:49 15/04/2025
- MD5 hash:
- 8e6c4057a9586f2e4cc65277a19854a3
- Filesize:
- 23.58 KB
- suspicious functions used:
- shell_exec (line:49);shell_exec (line:74);
$oudddputsd = shell_exec($commddanda . " 2>&1");shell_exec (line:86);$oudddputsd = shell_exec($commddanda . " 2>&1");shell_exec (line:104);$oudddputsd = shell_exec($commddanda . " 2>&1");shell_exec (line:117);$output = shell_exec($command . " 2>&1");shell_exec (line:129);$outputs = shell_exec($commanda);shell_exec (line:135);$outpdut = shell_exec($commandd . " 2>&1");shell_exec (line:160);$oddutpdut = shell_exec($cmandd . " 2>&1");shell_exec (line:173);$output = shell_exec($command . " 2>&1");shell_exec (line:185);$outputs = shell_exec($commanda);shell_exec (line:191);$outpdut = shell_exec($commandd . " 2>&1");shell_exec (line:218);$oddutpdut = shell_exec($cmandd . " 2>&1");shell_exec (line:231);$output_oid_cdata = shell_exec($command_oid_cdata . " 2>&1");shell_exec (line:237);$outputs = shell_exec($commanda);$oddutpdut = shell_exec($cmandd . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-snmp-onu-status-data1.php-
- Full path:
- abi/web2/network-snmp-onu-status-data1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:06 12/12/2025
- Last modified:
- 23:46:38 24/03/2025
- MD5 hash:
- 21b4726e351c4b0fcb7d6f0959c0d888
- Filesize:
- 15.98 KB
- suspicious functions used:
- shell_exec (line:34);`olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:38);
$outputs = shell_exec($snmpCommand);shell_exec (line:150);$re11=mysql_query("SELECT `olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND `olt_pon_id` = '$check_pon_name'");$outputsmac = shell_exec($snmpCommandmac); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ttoken.php-
- Full path:
- abi/web2/ttoken.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:06 12/12/2025
- Last modified:
- 19:44:40 20/11/2024
- MD5 hash:
- 5f2c51c1db5b0defadfb67ce25c0098f
- Filesize:
- 1.54 KB
- suspicious functions used:
- curl_exec (line:42);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-snmp-onu-status-data_vsol2.php-
- Full path:
- abi/web2/network-snmp-onu-status-data_vsol2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:06 12/12/2025
- Last modified:
- 19:44:37 20/11/2024
- MD5 hash:
- f22d022ddc284f4d8e1de3660da91db8
- Filesize:
- 15.61 KB
- suspicious functions used:
- shell_exec (line:34);shell_exec (line:113);
$outputs = shell_exec($snmpCommand);shell_exec (line:126);$outpdduts = shell_exec($sand);shell_exec (line:132);$outputsmac = shell_exec($snmpCommandmac);$output_vlan = shell_exec($command_vlan . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tcreatepayment.php-
- Full path:
- abi/web2/tcreatepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:06 12/12/2025
- Last modified:
- 19:44:40 20/11/2024
- MD5 hash:
- e49de9a33f5164bc2c6b88e4770faaff
- Filesize:
- 1.07 KB
- suspicious functions used:
- curl_exec (line:27);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: token.php-
- Full path:
- abi/web2/token.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:06 12/12/2025
- Last modified:
- 19:44:40 20/11/2024
- MD5 hash:
- 7d8e71ceda3ffb74623e0c4a814715af
- Filesize:
- 1.53 KB
- suspicious functions used:
- curl_exec (line:42);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: test2.php-
- Full path:
- abi/web2/test2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:06 12/12/2025
- Last modified:
- 01:31:16 13/07/2025
- MD5 hash:
- c6958a9bbfdcdbd216e5112c797c48db
- Filesize:
- 16.55 KB
- suspicious functions used:
- curl_exec (line:67);shell_exec (line:129);
$response = curl_exec($ch);shell_exec (line:140);$output = shell_exec($command);shell_exec (line:146);$output1 = shell_exec($command1);shell_exec (line:158);$output2 = shell_exec($command2);shell_exec (line:171);$output_vdlan = shell_exec($command_dvlan . " 2>&1");shell_exec (line:211);$output_vdlan = shell_exec($command_dvlan . " 2>&1");curl_exec (line:257);$output_vdlanf = shell_exec($command_dvlan . " 2>&1");curl_exec (line:282);$result11 = curl_exec($ch3);curl_exec (line:424);$response = curl_exec($ch);$result11 = curl_exec($ch3); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: index.php-
- Full path:
- abi/web2/index.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:06 12/12/2025
- Last modified:
- 20:18:02 23/04/2025
- MD5 hash:
- 2e1798df24b219a66401b4936b812f43
- Filesize:
- 16.11 KB
- suspicious functions used:
- curl_exec (line:282);
$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-tree-vartual-nodes.php-
- Full path:
- abi/web2/network-tree-vartual-nodes.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:06 12/12/2025
- Last modified:
- 03:57:25 08/03/2025
- MD5 hash:
- ef5de6634f62a12fd5139c800708aa30
- Filesize:
- 10.49 KB
- suspicious functions used:
- shell_exec (line:76);shell_exec (line:111);
$outputs = shell_exec($commanda);shell_exec (line:145);$outputs = shell_exec($commanda);shell_exec (line:181);$outputs = shell_exec($commanda);shell_exec (line:188);$od_vdlan = shell_exec($commanda . " 2>&1");$od_vdland = shell_exec($coddvland . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: sms-balance-check.php-
- Full path:
- abi/web2/sms-balance-check.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:06 12/12/2025
- Last modified:
- 22:55:26 18/04/2025
- MD5 hash:
- 76d6e591039b8f16382220fec77cd3d7
- Filesize:
- 984 B
- suspicious functions used:
- curl_exec (line:15);
$balance = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: networktree-olt-onu-list-data.php-
- Full path:
- abi/web2/networktree-olt-onu-list-data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:06 12/12/2025
- Last modified:
- 19:44:37 20/11/2024
- MD5 hash:
- af4221fefa9c9051846a063ac4135560
- Filesize:
- 8.72 KB
- suspicious functions used:
- shell_exec (line:24);shell_exec (line:36);
$outputs = shell_exec($commanda);shell_exec (line:59);$output = shell_exec($command);shell_exec (line:78);$outputs = shell_exec($commanda);shell_exec (line:97);$output = shell_exec($command);shell_exec (line:116);$outputs = shell_exec($commanda);shell_exec (line:134);$output = shell_exec($command);shell_exec (line:143);$od_vdlan = shell_exec($commanda . " 2>&1");shell_exec (line:155);$od_vdland = shell_exec($coddvland . " 2>&1");shell_exec (line:175);$outputs = shell_exec($coddvladnd . " 2>&1");$output_vdlan = shell_exec($command_vdlan); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: sms_deliverey_report.php-
- Full path:
- abi/web2/sms_deliverey_report.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:06 12/12/2025
- Last modified:
- 19:44:40 20/11/2024
- MD5 hash:
- 03623943da7e9334e137b38c8577fc84
- Filesize:
- 4.25 KB
- suspicious functions used:
- curl_exec (line:28);curl_exec (line:53);
$result11 = curl_exec($ch1);curl_exec (line:90);$resultdd = curl_exec($ch);$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: networktree_device_onu_list_add.php-
- Full path:
- abi/web2/networktree_device_onu_list_add.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:06 12/12/2025
- Last modified:
- 22:39:32 30/03/2025
- MD5 hash:
- 23aa4b30ff4514610497db10c8490003
- Filesize:
- 16.07 KB
- suspicious functions used:
- shell_exec (line:31);`network_tree` WHERE `onu_mac` = '$mac_address' AND ` (line:129);
$output = shell_exec($command . " 2>&1");`olt_pon` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND ` (line:163);$reu11=mysql_query("SELECT count(tree_id) AS onucount FROM `network_tree` WHERE `onu_mac` = '$mac_address' AND `sts` = '0'");shell_exec (line:198);$resu11=mysql_query("SELECT olt_pon_id AS pon_index_id FROM `olt_pon` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND `sts` = '0'");shell_exec (line:221);$outputS = shell_exec($commandS . " 2>&1");shell_exec (line:238);$output = shell_exec($command . " 2>&1");`network_tree` WHERE `onu_mac` = '$onuMac' AND ` (line:276);$snmpOutput = shell_exec($commandtghj);shell_exec (line:302);$reu11=mysql_query("SELECT count(tree_id) AS onucount FROM `network_tree` WHERE `onu_mac` = '$onuMac' AND `sts` = '0'");shell_exec (line:308);$snmpOutputdd = shell_exec($cmandd);shell_exec (line:319);$output_port = shell_exec($commandd_bdcom);`network_tree` WHERE `onu_mac` = '$onuMac' AND ` (line:355);$output_vdlan = shell_exec($command_dvlan . " 2>&1");`olt_pon` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND ` (line:391);$reu11=mysql_query("SELECT count(tree_id) AS onucount FROM `network_tree` WHERE `onu_mac` = '$onuMac' AND `sts` = '0'");$resu11=mysql_query("SELECT olt_pon_id AS pon_index_id FROM `olt_pon` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND `sts` = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: networktree_device_pon_check.php-
- Full path:
- abi/web2/networktree_device_pon_check.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:06 12/12/2025
- Last modified:
- 23:18:50 18/03/2025
- MD5 hash:
- b7f8731e7d12665b418927d722340da4
- Filesize:
- 1.58 KB
- suspicious functions used:
- `pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '$olt_id' AND ` (line:8);
$result11=mysql_query("SELECT count(`pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '$olt_id' AND `sts` = '0';"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: support-action.php-
- Full path:
- abi/web2/support-action.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:06 12/12/2025
- Last modified:
- 13:25:42 13/03/2025
- MD5 hash:
- b8c8c56826a0a8e027a23e6a365c70a0
- Filesize:
- 14.54 KB
- suspicious functions used:
- curl_exec (line:220);
$jsona = curl_exec($ch10); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: networktree_device_pon_list_add.php-
- Full path:
- abi/web2/networktree_device_pon_list_add.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:06 12/12/2025
- Last modified:
- 23:18:04 18/03/2025
- MD5 hash:
- 2cf70db6a91f4c5d1821b4b5fa178ebb
- Filesize:
- 1.38 KB
- suspicious functions used:
- `olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:6);`olt_pon` WHERE `olt_id` = '$olt_id' AND ` (line:10);
$resu11=mysql_query("SELECT olt_name FROM `olt_con` WHERE `olt_id` = '$olt_id' AND `sts` = '0'");`network_tree` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND ` (line:17);$result11=mysql_query("SELECT pon_id, olt_pon_id, pon_name FROM `olt_pon` WHERE `olt_id` = '$olt_id' AND `sts` = '0'");$rehu11=mysql_query("SELECT count(tree_id) AS poncount FROM `network_tree` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND `sts` = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: networktree_device_pon_port_onu_list.php-
- Full path:
- abi/web2/networktree_device_pon_port_onu_list.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:06 12/12/2025
- Last modified:
- 22:39:32 30/03/2025
- MD5 hash:
- 6578424616a5eefb751d5e3e155adba6
- Filesize:
- 8.63 KB
- suspicious functions used:
- `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:25);shell_exec (line:32);
$rff11=mysqli_query($con, "SELECT olt_pon_id AS pon_port FROM `olt_pon` WHERE olt_id = '$olt_id' AND `pon_name` LIKE '$pon_portt'");shell_exec (line:45);$outputs = shell_exec($commanda);`network_tree` WHERE onu_index_id = '$port_onu_index_id' AND ` (line:49);$output = shell_exec($command);shell_exec (line:81);$rff11d=mysqli_query($con, "SELECT onu_name, onu_index, onu_index_id, onu_mac FROM `network_tree` WHERE onu_index_id = '$port_onu_index_id' AND `olt_id` = '$olt_id'");shell_exec (line:104);$outputs = shell_exec($commanda);shell_exec (line:123);$output = shell_exec($command);shell_exec (line:144);$outputs = shell_exec($commanda);shell_exec (line:162);$output = shell_exec($command);shell_exec (line:171);$od_vdlan = shell_exec($commanda . " 2>&1");shell_exec (line:185);$od_vdland = shell_exec($coddvland . " 2>&1");$outputs = shell_exec($coddvladnd . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: networktree_device_pon_port_sense_list.php-
- Full path:
- abi/web2/networktree_device_pon_port_sense_list.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:06 12/12/2025
- Last modified:
- 22:20:42 30/03/2025
- MD5 hash:
- 4d80475d2f31f38e21239a5a1a19285f
- Filesize:
- 3.7 KB
- suspicious functions used:
- `network_tree` WHERE `onu_mac` = '$onu_mac' AND ` (line:26);`network_tree` WHERE `c_id` = '{$dfhbdxf}' AND ` (line:72);
$reu1d1=mysqli_query($con, "SELECT tree_id AS router_parant_id FROM `network_tree` WHERE `onu_mac` = '$onu_mac' AND `sts` = '0'");$reu11=mysqli_query($con, "SELECT count(c_id) AS client_count FROM `network_tree` WHERE `c_id` = '{$dfhbdxf}' AND `sts` = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: networktree_device_type.php-
- Full path:
- abi/web2/networktree_device_type.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:06 12/12/2025
- Last modified:
- 23:08:11 20/11/2024
- MD5 hash:
- f1520732e5a3ef38564238a3278a1f63
- Filesize:
- 11.43 KB
- suspicious functions used:
- `tree_id`) AS countolt FROM `network_tree` WHERE `olt_id` = '$olt_id_sure' AND ` (line:64);
$resu11=mysql_query("SELECT COUNT(`tree_id`) AS countolt FROM `network_tree` WHERE `olt_id` = '$olt_id_sure' AND `device_type` = '1' AND sts = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: test6.php-
- Full path:
- abi/web2/test6.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:06 12/12/2025
- Last modified:
- 19:44:40 20/11/2024
- MD5 hash:
- f22d022ddc284f4d8e1de3660da91db8
- Filesize:
- 15.61 KB
- suspicious functions used:
- shell_exec (line:34);shell_exec (line:113);
$outputs = shell_exec($snmpCommand);shell_exec (line:126);$outpdduts = shell_exec($sand);shell_exec (line:132);$outputsmac = shell_exec($snmpCommandmac);$output_vlan = shell_exec($command_vlan . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: test7.php-
- Full path:
- abi/web2/test7.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:06 12/12/2025
- Last modified:
- 19:44:40 20/11/2024
- MD5 hash:
- b11ccf951ce63a21ea0a7328316a0e5c
- Filesize:
- 1.57 KB
- suspicious functions used:
- curl_exec (line:14);
$result1dd = curl_exec($ch111); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: testttttt.php-
- Full path:
- abi/web2/testttttt.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:06 12/12/2025
- Last modified:
- 19:44:40 20/11/2024
- MD5 hash:
- b1988a4be29e191ad935fb409a4174ee
- Filesize:
- 2 KB
- suspicious functions used:
- curl_exec (line:47);
$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: texecutepayment.php-
- Full path:
- abi/web2/texecutepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:06 12/12/2025
- Last modified:
- 19:44:40 20/11/2024
- MD5 hash:
- 623635fdf5c871391d3a5fe99ee8c543
- Filesize:
- 2.91 KB
- suspicious functions used:
- curl_exec (line:24);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: webhook_cid.php-
- Full path:
- abi/web2/webhook_cid.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:06 12/12/2025
- Last modified:
- 03:53:20 08/02/2025
- MD5 hash:
- 1a2672fc0dd81a9c831e3fa60ec860e1
- Filesize:
- 21.52 KB
- suspicious functions used:
- base64_decode (line:29);curl_exec (line:40);
$signatureDecoded = base64_decode($signature);curl_exec (line:439);curl_exec($url);$data = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: time.php-
- Full path:
- abi/web2/time.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:06 12/12/2025
- Last modified:
- 05:27:42 20/03/2025
- MD5 hash:
- f72a880b38cb26f3d208bfe99eec1633
- Filesize:
- 5.25 KB
- suspicious functions used:
- `${formatDistance(totalDistance)}` (line:121);`${Math.round(distance)} m`, `${(distance / 1000).toFixed(2)} km` (line:150);
text: `${formatDistance(totalDistance)}`,return distance < 1000 ? `${Math.round(distance)} m` : `${(distance / 1000).toFixed(2)} km`; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-pon-onu-search-rcl.php-
- Full path:
- abi/web2/network-olt-pon-onu-search-rcl.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:06 12/12/2025
- Last modified:
- 05:34:01 01/02/2025
- MD5 hash:
- 565ff38d572bba4bc20721ab17484554
- Filesize:
- 27.33 KB
- suspicious functions used:
- shell_exec (line:46);shell_exec (line:55);
$output = shell_exec($command . " 2>&1");shell_exec (line:369);$outputS = shell_exec($commandS . " 2>&1");$snmpOutput = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: netowrk-snmp-data-auto.php-
- Full path:
- abi/web2/netowrk-snmp-data-auto.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:06 12/12/2025
- Last modified:
- 23:50:52 24/03/2025
- MD5 hash:
- b30b86386b4d79a756cefdd86f070bd5
- Filesize:
- 7.27 KB
- suspicious functions used:
- shell_exec (line:68);shell_exec (line:118);
$output = shell_exec($command);$vlanoutput = shell_exec($vlancommand); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: olt_all_onu_mac.php-
- Full path:
- abi/web2/olt_all_onu_mac.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:06 12/12/2025
- Last modified:
- 00:41:19 02/02/2025
- MD5 hash:
- bde00602b98fba3ce9f7669b0d6f0fa3
- Filesize:
- 4.56 KB
- suspicious functions used:
- shell_exec (line:22);shell_exec (line:38);
$oddutpdut = shell_exec($cmandd . " 2>&1");shell_exec (line:57);$output_port = shell_exec($commandd_bdcom);$output = shell_exec($command . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: test9.php-
- Full path:
- abi/web2/test9.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:06 12/12/2025
- Last modified:
- 13:09:09 30/03/2025
- MD5 hash:
- 87b5d5bf52fb36a8ccea006021ec8820
- Filesize:
- 7.17 KB
- suspicious functions used:
- shell_exec (line:44);shell_exec (line:69);
$oudddputsd = shell_exec($commddanda . " 2>&1");shell_exec (line:81);$oudddputsd = shell_exec($commddanda . " 2>&1");shell_exec (line:104);$oudddputsd = shell_exec($commddanda . " 2>&1");shell_exec (line:126);$outputS = shell_exec($commandS . " 2>&1");shell_exec (line:140);$output = shell_exec($command);shell_exec (line:153);$output = shell_exec($command . " 2>&1");shell_exec (line:165);$outputs = shell_exec($commanda);shell_exec (line:171);$outpdut = shell_exec($commandd . " 2>&1");$oddutpdut = shell_exec($cmandd . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: test8.php-
- Full path:
- abi/web2/test8.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:06 12/12/2025
- Last modified:
- 12:14:11 15/02/2025
- MD5 hash:
- 0da20f06359cae632ac4b808ab2eee77
- Filesize:
- 3.65 KB
- suspicious functions used:
- shell_exec (line:48);
$output = shell_exec($snmpCommand); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: AppSettings.php-
- Full path:
- abi/web2/AppSettings.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:06 12/12/2025
- Last modified:
- 04:23:39 03/05/2025
- MD5 hash:
- 512b3e52141311ec6f69c2d46859b4ec
- Filesize:
- 124.27 KB
- suspicious functions used:
- `input[name="${inputName}"]:checked` (line:2076);
var value = document.querySelector(`input[name="${inputName}"]:checked`).value; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ClientsOnMap1.php-
- Full path:
- abi/web2/ClientsOnMap1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:06 12/12/2025
- Last modified:
- 08:52:14 08/03/2025
- MD5 hash:
- ba0202f8bef3c634e895471057086953
- Filesize:
- 13.14 KB
- suspicious functions used:
- `${totalonline}` (line:109);`${totaloffline}` (line:110);
document.getElementById('totalonline').textContent = `${totalonline}`;`${results.rxPower}` (line:243);document.getElementById('totaloffline').textContent = `${totaloffline}`;`${results.distance}` (line:244);var rxPower = `${results.rxPower}`;`${results.supplyVoltage}` (line:245);var distance = `${results.distance}`;`${results.temperature}` (line:246);var supplyVoltage = `${results.supplyVoltage}`;`${results.txPower}` (line:247);var temperature = `${results.temperature}`;var txPower = `${results.txPower}`; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkTreeMap2.php-
- Full path:
- abi/web2/NetworkTreeMap2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:07 12/12/2025
- Last modified:
- 12:23:05 18/03/2025
- MD5 hash:
- 6487967886178db61db1c1d6c4479af3
- Filesize:
- 49.47 KB
- suspicious functions used:
- `${totalonline}` (line:122);`${totaloffline}` (line:123);
document.getElementById('totalonline').textContent = `${totalonline}`;`Failed to load data: ${error.message}` (line:769);document.getElementById('totaloffline').textContent = `${totaloffline}`;`HTTP error! Status: ${response.status}` (line:783);updateElement('resultt1-' + treeid, `<span>Failed to load data: ${error.message}</span>`);throw new Error(`HTTP error! Status: ${response.status}`); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-snmp-onu-status-data-bdcom-online.php-
- Full path:
- abi/web2/network-snmp-onu-status-data-bdcom-online.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:07 12/12/2025
- Last modified:
- 09:02:46 03/05/2025
- MD5 hash:
- a63b8935b2897e257872145705a654a9
- Filesize:
- 21.78 KB
- suspicious functions used:
- shell_exec (line:48);shell_exec (line:73);
$oudddputsd = shell_exec($commddanda . " 2>&1");shell_exec (line:85);$oudddputsd = shell_exec($commddanda . " 2>&1");shell_exec (line:103);$oudddputsd = shell_exec($commddanda . " 2>&1");shell_exec (line:116);$output = shell_exec($command . " 2>&1");shell_exec (line:128);$outputs = shell_exec($commanda);shell_exec (line:134);$outpdut = shell_exec($commandd . " 2>&1");shell_exec (line:159);$oddutpdut = shell_exec($cmandd . " 2>&1");shell_exec (line:172);$output = shell_exec($command . " 2>&1");shell_exec (line:184);$outputs = shell_exec($commanda);shell_exec (line:190);$outpdut = shell_exec($commandd . " 2>&1");shell_exec (line:217);$oddutpdut = shell_exec($cmandd . " 2>&1");shell_exec (line:230);$output_oid_cdata = shell_exec($command_oid_cdata . " 2>&1");shell_exec (line:236);$outputs = shell_exec($commanda);$oddutpdut = shell_exec($cmandd . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-snmp-onu-status-data-online.php-
- Full path:
- abi/web2/network-snmp-onu-status-data-online.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:07 12/12/2025
- Last modified:
- 09:02:46 03/05/2025
- MD5 hash:
- 0d8187961d76276c1aaaa369cdabf36b
- Filesize:
- 27.73 KB
- suspicious functions used:
- shell_exec (line:35);`olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:41);
$outputs11 = shell_exec($snmpCommandss);shell_exec (line:80);$re11=mysql_query("SELECT `olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND `olt_pon_id` = '$check_pon_name'");shell_exec (line:94);$outputs = shell_exec($snmpCommand);shell_exec (line:108);$outpdduts = shell_exec($sand);shell_exec (line:121);$outputs = shell_exec($snmpCommand);shell_exec (line:196);$outpdduts = shell_exec($sand);shell_exec (line:429);$outputsmac = shell_exec($snmpCommandmac);shell_exec (line:441);$outputsmac = shell_exec($snmpCommandmac);shell_exec (line:448);$outputsmac = shell_exec($snmpCommandmac);$output_vlan = shell_exec($command_vlan . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-snmp-onu-status-data.php-
- Full path:
- abi/web2/network-snmp-onu-status-data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:07 12/12/2025
- Last modified:
- 10:17:30 15/04/2025
- MD5 hash:
- 30cb65623c66c45bd502104b935d2c48
- Filesize:
- 30.69 KB
- suspicious functions used:
- shell_exec (line:36);`olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:42);
$outputs11 = shell_exec($snmpCommandss);shell_exec (line:81);$re11=mysql_query("SELECT `olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND `olt_pon_id` = '$check_pon_name'");shell_exec (line:95);$outputs = shell_exec($snmpCommand);shell_exec (line:109);$outpdduts = shell_exec($sand);shell_exec (line:122);$outputs = shell_exec($snmpCommand);shell_exec (line:208);$outpdduts = shell_exec($sand);shell_exec (line:436);$outputsmac = shell_exec($snmpCommandmac);shell_exec (line:448);$outputsmac = shell_exec($snmpCommandmac);shell_exec (line:455);$outputsmac = shell_exec($snmpCommandmac);$output_vlan = shell_exec($command_vlan . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: test11.php-
- Full path:
- abi/web2/test11.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:07 12/12/2025
- Last modified:
- 05:06:13 07/06/2025
- MD5 hash:
- 3b08c2f634e0f79dbb7a9c7d6e6c276d
- Filesize:
- 1.49 KB
- suspicious functions used:
- curl_exec (line:52);
$response = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentOnlineQuery2.php-
- Full path:
- abi/m2/PaymentOnlineQuery2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:08 12/12/2025
- Last modified:
- 19:44:27 20/11/2024
- MD5 hash:
- 3660992067d5591fc79ce89d6dbb9274
- Filesize:
- 19.08 KB
- suspicious functions used:
- curl_exec (line:41);curl_exec (line:254);
$resultdatax=curl_exec($url);$result = curl_exec($handle); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: token.php-
- Full path:
- abi/m2/token.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:08 12/12/2025
- Last modified:
- 19:44:27 20/11/2024
- MD5 hash:
- 7d8e71ceda3ffb74623e0c4a814715af
- Filesize:
- 1.53 KB
- suspicious functions used:
- curl_exec (line:42);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tagreeexpayment.php-
- Full path:
- abi/m2/tagreeexpayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:08 12/12/2025
- Last modified:
- 19:44:27 20/11/2024
- MD5 hash:
- c95e3ee881752db67b4f3597bc58430a
- Filesize:
- 2.46 KB
- suspicious functions used:
- curl_exec (line:26);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ttoken.php-
- Full path:
- abi/m2/ttoken.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:08 12/12/2025
- Last modified:
- 19:44:27 20/11/2024
- MD5 hash:
- 5f2c51c1db5b0defadfb67ce25c0098f
- Filesize:
- 1.54 KB
- suspicious functions used:
- curl_exec (line:42);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: createpayment.php-
- Full path:
- abi/m2/createpayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:08 12/12/2025
- Last modified:
- 19:44:26 20/11/2024
- MD5 hash:
- 849185f307be30eafb1bbef93616d8c3
- Filesize:
- 1.71 KB
- suspicious functions used:
- curl_exec (line:57);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: support-action.php-
- Full path:
- abi/m2/support-action.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:08 12/12/2025
- Last modified:
- 13:26:59 13/03/2025
- MD5 hash:
- adb69d6d3e277ad4c464c4fd0c41b4ca
- Filesize:
- 10.29 KB
- suspicious functions used:
- curl_exec (line:99);
$jsona = curl_exec($ch10); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: executepayment.php-
- Full path:
- abi/m2/executepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:08 12/12/2025
- Last modified:
- 19:44:26 20/11/2024
- MD5 hash:
- 9a3f22521ad987e86f84c4f5f688d5b7
- Filesize:
- 713 B
- suspicious functions used:
- curl_exec (line:18);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: login_exec.php-
- Full path:
- abi/m2/login_exec.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:08 12/12/2025
- Last modified:
- 20:20:46 23/04/2025
- MD5 hash:
- c8b31379830b912ec08a7917166a4aeb
- Filesize:
- 12.26 KB
- suspicious functions used:
- curl_exec (line:25);curl_exec (line:81);
$jsona = curl_exec($ch10);curl_exec (line:200);$result110 = curl_exec($ch11);curl_exec (line:238);$jsona = curl_exec($ch10);$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentOnlineQuery.php-
- Full path:
- abi/m2/PaymentOnlineQuery.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:08 12/12/2025
- Last modified:
- 21:34:55 14/02/2025
- MD5 hash:
- 6483645d440dd2f976cc1b29cb4021d5
- Filesize:
- 20.95 KB
- suspicious functions used:
- curl_exec (line:287);curl_exec (line:492);
$resultdata=curl_exec($url);$content = curl_exec($handle ); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tcreateagree.php-
- Full path:
- abi/m2/tcreateagree.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:09 12/12/2025
- Last modified:
- 19:44:27 20/11/2024
- MD5 hash:
- 27a10adf4190edc7eceee8cf74a6b72b
- Filesize:
- 999 B
- suspicious functions used:
- curl_exec (line:26);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: nagad-merchant-callback.php-
- Full path:
- abi/m2/nagad-merchant-callback.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:09 12/12/2025
- Last modified:
- 05:34:54 30/03/2025
- MD5 hash:
- 3fcf93d3aec6449a76e27b14f01ada02
- Filesize:
- 11.32 KB
- suspicious functions used:
- curl_exec (line:20);
$file_contents = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tcreatepayment.php-
- Full path:
- abi/m2/tcreatepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:09 12/12/2025
- Last modified:
- 19:44:27 20/11/2024
- MD5 hash:
- e49de9a33f5164bc2c6b88e4770faaff
- Filesize:
- 1.07 KB
- suspicious functions used:
- curl_exec (line:27);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: netowrk-snmp-data.php-
- Full path:
- abi/m2/netowrk-snmp-data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:09 12/12/2025
- Last modified:
- 10:15:44 29/04/2025
- MD5 hash:
- a0f9ff194951c18f7390ef750529f434
- Filesize:
- 24.14 KB
- suspicious functions used:
- shell_exec (line:96);shell_exec (line:105);
$output = shell_exec($command . " 2>&1");shell_exec (line:115);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:134);$output_port = shell_exec($commandd . " 2>&1");shell_exec (line:146);$output = shell_exec($command . " 2>&1");shell_exec (line:157);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:173);$output_port = shell_exec($commandd);shell_exec (line:183);$output_oid_bdcom = shell_exec($command_oid_bdcom . " 2>&1");shell_exec (line:199);$outputs = shell_exec($commanda);shell_exec (line:219);$output_port = shell_exec($commandd_bdcom);shell_exec (line:229);$output_oid_cdata = shell_exec($command_oid_cdata . " 2>&1");shell_exec (line:234);$outputs = shell_exec($commanda);shell_exec (line:242);$outs = shell_exec($canda);shell_exec (line:262);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:278);$outpdut_port = shell_exec($commandd_cdata);`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:291);$output_oid_gcom = shell_exec($command_oid_gcom . " 2>&1");shell_exec (line:297);$querydd = mysqli_query($con, "SELECT `olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND `olt_id` = '$olt_id' AND sts = '0'");shell_exec (line:430);$output_vlan = shell_exec($command_vlan . " 2>&1");$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: texecutepayment.php-
- Full path:
- abi/m2/texecutepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:09 12/12/2025
- Last modified:
- 19:44:27 20/11/2024
- MD5 hash:
- efbb63dfcfdacb52dec74bffc389bbb3
- Filesize:
- 2.67 KB
- suspicious functions used:
- curl_exec (line:24);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: index.php-
- Full path:
- abi/m2/index.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:09 12/12/2025
- Last modified:
- 20:18:03 23/04/2025
- MD5 hash:
- 5a9206eb2ef2835083705f01e81f5b41
- Filesize:
- 16.41 KB
- suspicious functions used:
- curl_exec (line:282);
$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: LoginByPass.php-
- Full path:
- abi/m2/LoginByPass.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:09 12/12/2025
- Last modified:
- 09:07:53 19/04/2025
- MD5 hash:
- ce55a8f81ccab7d07744fd3914d6ee35
- Filesize:
- 4.65 KB
- suspicious functions used:
- curl_exec (line:44);curl_exec (line:69);
$jsona = curl_exec($ch10);$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: AppSettings.php-
- Full path:
- abi/web/AppSettings.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:09 12/12/2025
- Last modified:
- 23:21:45 10/12/2025
- MD5 hash:
- ea581b6261397133be9a4dd80bd6f3f0
- Filesize:
- 124.15 KB
- suspicious functions used:
- `input[name="${inputName}"]:checked` (line:2074);
var value = document.querySelector(`input[name="${inputName}"]:checked`).value; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: AutoActiveClientsCount1.php-
- Full path:
- abi/web/AutoActiveClientsCount1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 04:49:58 12/12/2025
- Last modified:
- 23:21:45 10/12/2025
- MD5 hash:
- 96ae95689b28aef52bd4eaab4bfea7cc
- Filesize:
- 5.38 KB
- suspicious functions used:
- system (line:54);
$ARRAY = $API->comm("/system/resource/print"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: AutoActiveClientsCount11.php-
- Full path:
- abi/web/AutoActiveClientsCount11.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:09 12/12/2025
- Last modified:
- 23:21:45 10/12/2025
- MD5 hash:
- a0090e4a11dd59b955a6edd549b6ef2f
- Filesize:
- 5.85 KB
- suspicious functions used:
- system (line:54);
$ARRAY = $API->comm("/system/resource/print"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: client-online-mbb.php-
- Full path:
- abi/web/client-online-mbb.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 12:53:48 12/12/2025
- Last modified:
- 23:21:46 10/12/2025
- MD5 hash:
- a1cef934dce8da065b0116b7915754af
- Filesize:
- 16.36 KB
- suspicious functions used:
- curl_exec (line:88);curl_exec (line:288);
$resp = curl_exec($curlss);$resp = curl_exec($curlss); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: clients-nots-action.php-
- Full path:
- abi/web/clients-nots-action.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:10 12/12/2025
- Last modified:
- 23:21:46 10/12/2025
- MD5 hash:
- 2bca93a54b0b7e0d68b3246ee340ed86
- Filesize:
- 6.11 KB
- suspicious functions used:
- curl_exec (line:45);
$jsona = curl_exec($ch10); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Clients.php-
- Full path:
- abi/web/Clients.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 03:05:34 12/12/2025
- Last modified:
- 23:21:46 10/12/2025
- MD5 hash:
- 7357585e2015b123461f9b80f46e0165
- Filesize:
- 197.72 KB
- suspicious functions used:
- `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:761);
$result1rd=mysql_query("SELECT `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND `sts` = '0' order by b_name ASC"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Clients1.php-
- Full path:
- abi/web/Clients1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:11 12/12/2025
- Last modified:
- 23:21:46 10/12/2025
- MD5 hash:
- ccec9015b85db7f5fd719dce1ddfd76d
- Filesize:
- 197.59 KB
- suspicious functions used:
- `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:759);
$result1rd=mysql_query("SELECT `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND `sts` = '0' order by b_name ASC"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Clients2.php-
- Full path:
- abi/web/Clients2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:11 12/12/2025
- Last modified:
- 23:21:46 10/12/2025
- MD5 hash:
- 982d6411552113b0715fd17c26f50292
- Filesize:
- 205.13 KB
- suspicious functions used:
- `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:832);
$result1rd=mysql_query("SELECT `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND `sts` = '0' order by b_name ASC"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Clients3.php-
- Full path:
- abi/web/Clients3.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:12 12/12/2025
- Last modified:
- 23:21:46 10/12/2025
- MD5 hash:
- 50ddc869b383ab76e009c7a2c17c99a3
- Filesize:
- 175.31 KB
- suspicious functions used:
- `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:832);
$result1rd=mysql_query("SELECT `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND `sts` = '0' order by b_name ASC"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ClientsOnMap.php-
- Full path:
- abi/web/ClientsOnMap.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:12 12/12/2025
- Last modified:
- 23:21:46 10/12/2025
- MD5 hash:
- 7b8f5e0ae3a6480ccb98e508068088e1
- Filesize:
- 19.51 KB
- suspicious functions used:
- `${totalonline}` (line:173);`${totaloffline}` (line:174);
document.getElementById('totalonline').textContent = `${totalonline}`;`${results.rxPower}` (line:307);document.getElementById('totaloffline').textContent = `${totaloffline}`;`${results.distance}` (line:308);var rxPower = `${results.rxPower}`;`${results.supplyVoltage}` (line:309);var distance = `${results.distance}`;`${results.temperature}` (line:310);var supplyVoltage = `${results.supplyVoltage}`;`${results.txPower}` (line:311);var temperature = `${results.temperature}`;var txPower = `${results.txPower}`; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ClientsOnMap1.php-
- Full path:
- abi/web/ClientsOnMap1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:13 12/12/2025
- Last modified:
- 23:21:46 10/12/2025
- MD5 hash:
- ba0202f8bef3c634e895471057086953
- Filesize:
- 13.14 KB
- suspicious functions used:
- `${totalonline}` (line:109);`${totaloffline}` (line:110);
document.getElementById('totalonline').textContent = `${totalonline}`;`${results.rxPower}` (line:243);document.getElementById('totaloffline').textContent = `${totaloffline}`;`${results.distance}` (line:244);var rxPower = `${results.rxPower}`;`${results.supplyVoltage}` (line:245);var distance = `${results.distance}`;`${results.temperature}` (line:246);var supplyVoltage = `${results.supplyVoltage}`;`${results.txPower}` (line:247);var temperature = `${results.temperature}`;var txPower = `${results.txPower}`; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ClientView.php-
- Full path:
- abi/web/ClientView.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 03:42:31 12/12/2025
- Last modified:
- 23:21:47 10/12/2025
- MD5 hash:
- a5f03ace761a5f2f6462591923f8de8e
- Filesize:
- 112.97 KB
- suspicious functions used:
- `olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:227);
$querydd = mysql_query("SELECT `olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND `olt_id` = '$c_olt_id' AND sts = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: company_info.php-
- Full path:
- abi/web/company_info.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 02:40:49 12/12/2025
- Last modified:
- 23:21:47 10/12/2025
- MD5 hash:
- c3091548aa54603ba84d42a8560b5032
- Filesize:
- 11.8 KB
- suspicious functions used:
- curl_exec (line:149);
$alldata = curl_exec($chhhh); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: company_info11.php-
- Full path:
- abi/web/company_info11.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:13 12/12/2025
- Last modified:
- 23:21:47 10/12/2025
- MD5 hash:
- fdc5bd8e767b7ddc1245c6d7d0946cb1
- Filesize:
- 10.14 KB
- suspicious functions used:
- curl_exec (line:143);
$alldata = curl_exec($chhhh); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: createpayment.php-
- Full path:
- abi/web/createpayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:13 12/12/2025
- Last modified:
- 23:21:47 10/12/2025
- MD5 hash:
- ba9747d0421fd091b998389469e72a0b
- Filesize:
- 1.7 KB
- suspicious functions used:
- curl_exec (line:57);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_all.php-
- Full path:
- abi/web/cron_all.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:13 12/12/2025
- Last modified:
- 23:21:47 10/12/2025
- MD5 hash:
- 967f1d654ae891609da26b9e0fdbd1ae
- Filesize:
- 2.44 KB
- suspicious functions used:
- curl_exec (line:23);curl_exec (line:38);
$result1 = curl_exec($ch1);curl_exec (line:53);$result1d = curl_exec($ch11);$result1d2 = curl_exec($ch112); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_apk_notifications.php-
- Full path:
- abi/web/cron_apk_notifications.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 02:39:02 12/12/2025
- Last modified:
- 23:21:47 10/12/2025
- MD5 hash:
- 6c611340a09653ebfc11204610ec9f24
- Filesize:
- 7.21 KB
- suspicious functions used:
- curl_exec (line:114);
$response = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_gen_bill.php-
- Full path:
- abi/web/cron_auto_gen_bill.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:13 12/12/2025
- Last modified:
- 23:21:47 10/12/2025
- MD5 hash:
- f1056618cc4402968e50d1232d2c51c8
- Filesize:
- 4.73 KB
- suspicious functions used:
- curl_exec (line:140);curl_exec (line:149);
$respd = curl_exec($curl);$resp = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_inactive.php-
- Full path:
- abi/web/cron_auto_inactive.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 17:50:01 12/12/2025
- Last modified:
- 23:21:47 10/12/2025
- MD5 hash:
- da6db021fa0a2873f39f7e57d90f2192
- Filesize:
- 6.79 KB
- suspicious functions used:
- curl_exec (line:186);
$respw = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_inactive2.php-
- Full path:
- abi/web/cron_auto_inactive2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:13 12/12/2025
- Last modified:
- 23:21:47 10/12/2025
- MD5 hash:
- 440bc24f05b01eb395df63fff2f60de9
- Filesize:
- 5.46 KB
- suspicious functions used:
- curl_exec (line:142);
$respw = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_inactive_termination.php-
- Full path:
- abi/web/cron_auto_inactive_termination.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 02:40:49 12/12/2025
- Last modified:
- 23:21:47 10/12/2025
- MD5 hash:
- 9b3af0263bfcd9e990c70aaf583d2224
- Filesize:
- 15 KB
- suspicious functions used:
- curl_exec (line:278);curl_exec (line:290);
$resp = curl_exec($curlss);curl_exec (line:359);$respw = curl_exec($curls);$resp = curl_exec($curlss); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_termination_remainder1.php-
- Full path:
- abi/web/cron_auto_termination_remainder1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:13 12/12/2025
- Last modified:
- 23:21:47 10/12/2025
- MD5 hash:
- 7765f9f820dbd402f1064fab9958ffaa
- Filesize:
- 3.26 KB
- suspicious functions used:
- curl_exec (line:83);
$respw = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_client_bandwidth_count.php-
- Full path:
- abi/web/cron_client_bandwidth_count.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 02:43:05 12/12/2025
- Last modified:
- 23:21:47 10/12/2025
- MD5 hash:
- 2dc99fea4918a5bd4989aec22970dfdb
- Filesize:
- 5.43 KB
- suspicious functions used:
- curl_exec (line:151);
$result = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_network.php-
- Full path:
- abi/web/cron_network.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 02:43:35 12/12/2025
- Last modified:
- 23:21:47 10/12/2025
- MD5 hash:
- 5cd028583972ec9c714405b2924ce3b3
- Filesize:
- 4.44 KB
- suspicious functions used:
- curl_exec (line:42);curl_exec (line:64);
$result1d = curl_exec($ch11);$result1dd = curl_exec($ch111); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_olt.php-
- Full path:
- abi/web/cron_olt.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 02:45:59 12/12/2025
- Last modified:
- 23:21:47 10/12/2025
- MD5 hash:
- f0248614baaea216d0f29e0ca584410b
- Filesize:
- 4.46 KB
- suspicious functions used:
- shell_exec (line:51);curl_exec (line:106);
$output = shell_exec($command);$result1d = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_olt_clients_catch.php-
- Full path:
- abi/web/cron_olt_clients_catch.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:13 12/12/2025
- Last modified:
- 23:21:47 10/12/2025
- MD5 hash:
- f3775b14a4f3709bd1e20ac451a3bea1
- Filesize:
- 2.05 KB
- suspicious functions used:
- curl_exec (line:55);
$result1d = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_olt_user.php-
- Full path:
- abi/web/cron_olt_user.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:13 12/12/2025
- Last modified:
- 23:21:47 10/12/2025
- MD5 hash:
- 67aa237639e3d1e6064e76079bb3cccc
- Filesize:
- 1.97 KB
- suspicious functions used:
- curl_exec (line:19);curl_exec (line:46);
$resultd1d = curl_exec($ch110);$result1d = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_onu_alarm.php-
- Full path:
- abi/web/cron_onu_alarm.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:13 12/12/2025
- Last modified:
- 23:21:47 10/12/2025
- MD5 hash:
- b6e893a39389d57724e9cde8f0c5a955
- Filesize:
- 14.37 KB
- suspicious functions used:
- shell_exec (line:59);shell_exec (line:70);
$output = shell_exec($command);shell_exec (line:76);$output1 = shell_exec($command1);shell_exec (line:88);$output2 = shell_exec($command2);shell_exec (line:101);$output_vdlan = shell_exec($command_dvlan . " 2>&1");shell_exec (line:141);$output_vdlan = shell_exec($command_dvlan . " 2>&1");curl_exec (line:187);$output_vdlanf = shell_exec($command_dvlan . " 2>&1");curl_exec (line:212);$result11 = curl_exec($ch3);curl_exec (line:354);$response = curl_exec($ch);$result11 = curl_exec($ch3); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: EmployeeAdd.php-
- Full path:
- abi/web/EmployeeAdd.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:13 12/12/2025
- Last modified:
- 23:21:47 10/12/2025
- MD5 hash:
- c12c85fa282eb15060ed68bad252f8e8
- Filesize:
- 19.13 KB
- suspicious functions used:
- `Element with ID ${id} not found.` (line:36);`Non-numeric input detected in ${id}.` (line:38);
if (!element) throw `Element with ID ${id} not found.`;`Element with ID ${id} not found.` (line:44);if (isNaN(value)) throw `Non-numeric input detected in ${id}.`;`Non-numeric input detected in ${id}.` (line:46);if (!element) throw `Element with ID ${id} not found.`;if (isNaN(value)) throw `Non-numeric input detected in ${id}.`; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: EmployeeEdit.php-
- Full path:
- abi/web/EmployeeEdit.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:13 12/12/2025
- Last modified:
- 23:21:47 10/12/2025
- MD5 hash:
- 55b4626339d566473f477e1a001dc8b4
- Filesize:
- 17.73 KB
- suspicious functions used:
- `Element with ID ${id} not found.` (line:44);`Non-numeric input detected in ${id}.` (line:46);
if (!element) throw `Element with ID ${id} not found.`;`Element with ID ${id} not found.` (line:52);if (isNaN(value)) throw `Non-numeric input detected in ${id}.`;`Non-numeric input detected in ${id}.` (line:54);if (!element) throw `Element with ID ${id} not found.`;if (isNaN(value)) throw `Non-numeric input detected in ${id}.`; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: emp_salary_advence_find.php-
- Full path:
- abi/web/emp_salary_advence_find.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:13 12/12/2025
- Last modified:
- 23:21:47 10/12/2025
- MD5 hash:
- 74a7e2ffda0f7584611d7cbce6136c24
- Filesize:
- 2.25 KB
- suspicious functions used:
- `expanse` WHERE `type` = '2' AND `status` = '2' AND ex_by = '$e_id' AND MONTH(`, `) = MONTH('$lastmonth') AND YEAR(`, `) = YEAR('$lastmonth') GROUP BY ` (line:8);`e_id` = '$e_id' AND ` (line:12);
$vendorrr = mysql_query("SELECT SUM(amount) AS salary_advance FROM `expanse` WHERE `type` = '2' AND `status` = '2' AND ex_by = '$e_id' AND MONTH(`check_date`) = MONTH('$lastmonth') AND YEAR(`check_date`) = YEAR('$lastmonth') GROUP BY `ex_by`");$empppp = mysql_query("SELECT gross_total AS gross_total FROM emp_info WHERE `e_id` = '$e_id' AND `status` = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: executepayment.php-
- Full path:
- abi/web/executepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:13 12/12/2025
- Last modified:
- 23:21:47 10/12/2025
- MD5 hash:
- c46a50905333286f45dfeacf010851ab
- Filesize:
- 716 B
- suspicious functions used:
- curl_exec (line:18);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: getclientuptime.php-
- Full path:
- abi/web/getclientuptime.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:14 12/12/2025
- Last modified:
- 23:21:48 10/12/2025
- MD5 hash:
- bbc14cdd451c72b94d78c7d2d1af0b52
- Filesize:
- 718 B
- suspicious functions used:
- curl_exec (line:18);
$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: imagevwr.php-
- Full path:
- abi/web/imagevwr.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:14 12/12/2025
- Last modified:
- 23:21:48 10/12/2025
- MD5 hash:
- 47a223a13cc642d01dcfaaca542d396d
- Filesize:
- 915 B
- suspicious functions used:
- curl_exec (line:15);
$image_data = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: index.php-
- Full path:
- abi/web/index.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 02:44:09 12/12/2025
- Last modified:
- 23:21:48 10/12/2025
- MD5 hash:
- 767998dfb3a5d0bb3de564a0625d3bc8
- Filesize:
- 16.17 KB
- suspicious functions used:
- curl_exec (line:282);
$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: InstrumentsStoreOutDetails.php-
- Full path:
- abi/web/InstrumentsStoreOutDetails.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:14 12/12/2025
- Last modified:
- 23:21:48 10/12/2025
- MD5 hash:
- a60c19f766bfff1ccdccbeba6b39eb87
- Filesize:
- 9.37 KB
- suspicious functions used:
- `update_date`, '%D-%b, %y') AS offdate, TIME_FORMAT(`update_time`, '%T') AS offtime FROM `con_sts_log` WHERE `c_id` = '{$row['c_id']}' AND con_sts = 'Inactive' ORDER BY ` (line:120);
$resultwwdd=mysql_query("SELECT DATE_FORMAT(`update_date`, '%D-%b, %y') AS offdate, TIME_FORMAT(`update_time`, '%T') AS offtime FROM `con_sts_log` WHERE `c_id` = '{$row['c_id']}' AND con_sts = 'Inactive' ORDER BY `update_date_time` DESC LIMIT 1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ip-ping-checker.php-
- Full path:
- abi/web/ip-ping-checker.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:14 12/12/2025
- Last modified:
- 23:21:49 10/12/2025
- MD5 hash:
- 0d28f3053b73b3fe2885cf519ee17c12
- Filesize:
- 2.64 KB
- suspicious functions used:
- curl_exec (line:81);
$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: LoginByPass.php-
- Full path:
- abi/web/LoginByPass.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 04:50:28 12/12/2025
- Last modified:
- 23:21:49 10/12/2025
- MD5 hash:
- 1c6616dae30e9849d8f4fb0fe712a748
- Filesize:
- 4.59 KB
- suspicious functions used:
- curl_exec (line:44);curl_exec (line:69);
$jsona = curl_exec($ch10);$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: login_exec.php-
- Full path:
- abi/web/login_exec.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 03:05:35 12/12/2025
- Last modified:
- 23:21:49 10/12/2025
- MD5 hash:
- 64dcc4818e71fd5832206ad5c06b1c67
- Filesize:
- 12.3 KB
- suspicious functions used:
- curl_exec (line:24);curl_exec (line:80);
$jsona = curl_exec($ch10);curl_exec (line:199);$result110 = curl_exec($ch11);curl_exec (line:237);$jsona = curl_exec($ch10);$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: macreseller-news.php-
- Full path:
- abi/web/macreseller-news.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:14 12/12/2025
- Last modified:
- 23:21:49 10/12/2025
- MD5 hash:
- ed23ca98b77c5321b4485e85eb2ea64d
- Filesize:
- 3.67 KB
- suspicious functions used:
- curl_exec (line:22);
$alldata1 = curl_exec($chhhh1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: MacResellerAdd.php-
- Full path:
- abi/web/MacResellerAdd.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:14 12/12/2025
- Last modified:
- 23:21:49 10/12/2025
- MD5 hash:
- 5fdbde3df3e96e845cc118cb3ae916a5
- Filesize:
- 30.33 KB
- suspicious functions used:
- `input[name="${inputName}"]:checked` (line:799);
var value = document.querySelector(`input[name="${inputName}"]:checked`).value; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: MacResellerEdit.php-
- Full path:
- abi/web/MacResellerEdit.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:14 12/12/2025
- Last modified:
- 23:21:50 10/12/2025
- MD5 hash:
- 92ce35276f3eae45e866de3439baaa11
- Filesize:
- 37.76 KB
- suspicious functions used:
- `input[name="${inputName}"]:checked` (line:640);
var value = document.querySelector(`input[name="${inputName}"]:checked`).value; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: nagad-helper.php-
- Full path:
- abi/web/nagad-helper.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:15 12/12/2025
- Last modified:
- 23:21:50 10/12/2025
- MD5 hash:
- 0591a733279907504b515192f3a96bb6
- Filesize:
- 6.74 KB
- suspicious functions used:
- curl_exec (line:61);base64_decode (line:97);
$resultData = curl_exec($url);openssl_private_decrypt(base64_decode($cryptText), $plain_text, $private_key); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: nagad-merchant-callback.php-
- Full path:
- abi/web/nagad-merchant-callback.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:15 12/12/2025
- Last modified:
- 23:21:50 10/12/2025
- MD5 hash:
- 886d89b1c785c3100ba5f198ff3befeb
- Filesize:
- 16.79 KB
- suspicious functions used:
- curl_exec (line:20);
$file_contents = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: netowrk-olt-all-mac-array.php-
- Full path:
- abi/web/netowrk-olt-all-mac-array.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:15 12/12/2025
- Last modified:
- 23:21:50 10/12/2025
- MD5 hash:
- b0168ce99145e2afe64357247d750dd6
- Filesize:
- 4.62 KB
- suspicious functions used:
- shell_exec (line:33);shell_exec (line:47);
$output = shell_exec($command . " 2>&1");shell_exec (line:61);$output = shell_exec($command . " 2>&1");shell_exec (line:76);$output_oid_bdcom = shell_exec($command_oid_bdcom . " 2>&1");shell_exec (line:93);$output_oid_cdata = shell_exec($command_oid_cdata . " 2>&1");$output_oid_gcom = shell_exec($command_oid_gcom . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: netowrk-snmp-data-auto.php-
- Full path:
- abi/web/netowrk-snmp-data-auto.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:15 12/12/2025
- Last modified:
- 23:21:50 10/12/2025
- MD5 hash:
- c1854a95d6a1ac78b28410a0757cd435
- Filesize:
- 12.02 KB
- suspicious functions used:
- shell_exec (line:93);shell_exec (line:248);
$output = shell_exec($command);$vlanoutput = shell_exec($vlancommand); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: netowrk-snmp-data.php-
- Full path:
- abi/web/netowrk-snmp-data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 04:08:14 12/12/2025
- Last modified:
- 23:21:50 10/12/2025
- MD5 hash:
- d5c56a194b588691a62f6444ee046900
- Filesize:
- 25.51 KB
- suspicious functions used:
- shell_exec (line:104);shell_exec (line:113);
$output = shell_exec($command . " 2>&1");shell_exec (line:123);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:142);$output_port = shell_exec($commandd . " 2>&1");shell_exec (line:154);$output = shell_exec($command . " 2>&1");shell_exec (line:165);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:181);$output_port = shell_exec($commandd);shell_exec (line:191);$output_oid_bdcom = shell_exec($command_oid_bdcom . " 2>&1");shell_exec (line:207);$outputs = shell_exec($commanda);shell_exec (line:227);$output_port = shell_exec($commandd_bdcom);shell_exec (line:236);$output_oid_cdata = shell_exec($command_oid_cdata . " 2>&1");shell_exec (line:244);$outputs = shell_exec($commanda);shell_exec (line:251);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:256);$output_pon = shell_exec($command_ponn . " 2>&1");`pon_name` FROM `olt_pon` WHERE `olt_pon_id` = '$pon_id' AND ` (line:263);$outsddd = shell_exec($commddandd);shell_exec (line:280);$qrydd = mysqli_query($con, "SELECT `pon_name` FROM `olt_pon` WHERE `olt_pon_id` = '$pon_id' AND `olt_id` = '$olt_id' AND sts = '0'");shell_exec (line:290);$outsdd = shell_exec($commddand);`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:303);$output_oid_gcom = shell_exec($command_oid_gcom . " 2>&1");shell_exec (line:309);$querydd = mysqli_query($con, "SELECT `olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND `olt_id` = '$olt_id' AND sts = '0'");shell_exec (line:452);$output_vlan = shell_exec($command_vlan . " 2>&1");$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-old-onu-rx-map.php-
- Full path:
- abi/web/network-old-onu-rx-map.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:15 12/12/2025
- Last modified:
- 23:21:50 10/12/2025
- MD5 hash:
- 3dbb34a2a64625d04dc5fadeb7aff7c7
- Filesize:
- 8.86 KB
- suspicious functions used:
- shell_exec (line:88);
$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-old-onu-rx.php-
- Full path:
- abi/web/network-old-onu-rx.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 16:59:02 12/12/2025
- Last modified:
- 23:21:50 10/12/2025
- MD5 hash:
- 997a761c4ade8702893cc4b74f7d09ac
- Filesize:
- 9.28 KB
- suspicious functions used:
- shell_exec (line:97);
$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-client-onu-mac-count-cdata.php-
- Full path:
- abi/web/network-olt-client-onu-mac-count-cdata.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:15 12/12/2025
- Last modified:
- 23:21:50 10/12/2025
- MD5 hash:
- 6c5143b192a488221c658fe110e87f15
- Filesize:
- 7.91 KB
- suspicious functions used:
- shell_exec (line:28);shell_exec (line:57);
$macOutput = shell_exec($macCmd . " 2>&1");shell_exec (line:70);$output_vdlan = shell_exec($command_dvlan . " 2>&1");shell_exec (line:96);$reasonOutput = shell_exec($reasonCmd . " 2>&1");shell_exec (line:117);$macOutput = shell_exec($macCmd . " 2>&1");shell_exec (line:123);$descOutput = shell_exec($descCmd . " 2>&1");shell_exec (line:132);$distOutput = shell_exec($distCmd . " 2>&1");shell_exec (line:174);$modOutput = shell_exec($modCmd . " 2>&1");shell_exec (line:186);$od_vdlan = shell_exec($coddvlan . " 2>&1");shell_exec (line:197);$output_port = shell_exec($commandd_bdcom);shell_exec (line:211);$od_vddlan = shell_exec($codmn . " 2>&1");$od_vdddlan = shell_exec($codmdn . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-client-onu-mac-count-cdata2.php-
- Full path:
- abi/web/network-olt-client-onu-mac-count-cdata2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:15 12/12/2025
- Last modified:
- 23:21:50 10/12/2025
- MD5 hash:
- 7cd9883ecb096828973d08682e8d0fe6
- Filesize:
- 4.07 KB
- suspicious functions used:
- shell_exec (line:26);shell_exec (line:85);
$output_vdlan = shell_exec($command_dvlan . " 2>&1");shell_exec (line:97);$od_vdlan = shell_exec($coddvlan . " 2>&1");shell_exec (line:108);$output_port = shell_exec($commandd_bdcom);shell_exec (line:122);$od_vddlan = shell_exec($codmn . " 2>&1");$od_vdddlan = shell_exec($codmdn . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-client-onu-mac-count-huawei.php-
- Full path:
- abi/web/network-olt-client-onu-mac-count-huawei.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:15 12/12/2025
- Last modified:
- 23:21:50 10/12/2025
- MD5 hash:
- 563c435683983dce5caac25e19683954
- Filesize:
- 22.12 KB
- suspicious functions used:
- shell_exec (line:60);shell_exec (line:65);
return shell_exec($command . " 2>&1");return shell_exec($command . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-client-onu-mac-count-rcl.php-
- Full path:
- abi/web/network-olt-client-onu-mac-count-rcl.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:15 12/12/2025
- Last modified:
- 23:21:50 10/12/2025
- MD5 hash:
- 9372dfb2a63d9f4a28440f91d4866778
- Filesize:
- 3.49 KB
- suspicious functions used:
- shell_exec (line:26);shell_exec (line:73);
$output_vdlan = shell_exec($command_dvlan . " 2>&1");shell_exec (line:85);$od_vdlan = shell_exec($coddvlan . " 2>&1");shell_exec (line:96);$output_port = shell_exec($commandd_bdcom);shell_exec (line:110);$od_vddlan = shell_exec($codmn . " 2>&1");$od_vdddlan = shell_exec($codmdn . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-client-onu-mac-count.php-
- Full path:
- abi/web/network-olt-client-onu-mac-count.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:15 12/12/2025
- Last modified:
- 23:21:50 10/12/2025
- MD5 hash:
- 678f73812a2d80cc03fc4cb771d82c3b
- Filesize:
- 15.52 KB
- suspicious functions used:
- shell_exec (line:26);shell_exec (line:36);
$od_vddlan = shell_exec($codmn . " 2>&1");shell_exec (line:68);$od_vddlan = shell_exec($codmn . " 2>&1");shell_exec (line:84);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:101);$outpudt_vlan = shell_exec($commadnd_vlan . " 2>&1");shell_exec (line:119);$output_port = shell_exec($commandd_bdcom);shell_exec (line:135);$output_vdlan = shell_exec($command_vdlan . " 2>&1");shell_exec (line:176);$outpdut_vdlan = shell_exec($commadnd_dvlan . " 2>&1");shell_exec (line:238);$output_vdlan = shell_exec($command_dvlan . " 2>&1");shell_exec (line:314);$outpdut_vdlan = shell_exec($commadnd_dvlan . " 2>&1");shell_exec (line:381);$output_vdlan = shell_exec($command_dvlan . " 2>&1");shell_exec (line:471);$od_vddddlan = shell_exec($codmddn . " 2>&1");shell_exec (line:490);$od_vdlan = shell_exec($coddvlan . " 2>&1");shell_exec (line:509);$od_vddlan = shell_exec($codmn . " 2>&1");$od_vdddlan = shell_exec($codmdn . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-client-onu-mac-countt.php-
- Full path:
- abi/web/network-olt-client-onu-mac-countt.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:15 12/12/2025
- Last modified:
- 23:21:50 10/12/2025
- MD5 hash:
- 6c684ef0e37eeb3400821b34d0d05fec
- Filesize:
- 8.94 KB
- suspicious functions used:
- shell_exec (line:26);shell_exec (line:36);
$od_vddlan = shell_exec($codmn . " 2>&1");shell_exec (line:59);$od_vddlan = shell_exec($codmn . " 2>&1");shell_exec (line:75);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:92);$outpudt_vlan = shell_exec($commadnd_vlan . " 2>&1");shell_exec (line:102);$output_port = shell_exec($commandd_bdcom);shell_exec (line:117);$output_vdlan = shell_exec($command_vdlan . " 2>&1");shell_exec (line:155);$outpdut_vdlan = shell_exec($commadnd_dvlan . " 2>&1");shell_exec (line:206);$output_vdlan = shell_exec($command_dvlan . " 2>&1");shell_exec (line:262);$od_vddddlan = shell_exec($codmddn . " 2>&1");shell_exec (line:275);$od_vdlan = shell_exec($coddvlan . " 2>&1");shell_exec (line:288);$od_vddlan = shell_exec($codmn . " 2>&1");$od_vdddlan = shell_exec($codmdn . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-con-sts.php-
- Full path:
- abi/web/network-olt-con-sts.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:15 12/12/2025
- Last modified:
- 23:21:51 10/12/2025
- MD5 hash:
- 400a889537016067b55f97ac6d0a16a3
- Filesize:
- 4.02 KB
- suspicious functions used:
- `olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:10);shell_exec (line:38);
$query = mysqli_query($con, "SELECT `olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND `sts` = '0'");`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, `last_synced`, `last_update`, `msg`, `full_msg`, ROUND((SELECT AVG(value) FROM olt_onu_history WHERE alarm_id = '$alarmId' AND value != ''), 2) AS average_value FROM `, ` WHERE `alarm_id` = '$alarmId' AND ` (line:82);$output = shell_exec($command);$query = mysqli_query($con, "SELECT `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, `last_synced`, `last_update`, `msg`, `full_msg`, ROUND((SELECT AVG(value) FROM olt_onu_history WHERE alarm_id = '$alarmId' AND value != ''), 2) AS average_value FROM `olt_onu_history` WHERE `alarm_id` = '$alarmId' AND `value` != ''"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-huawei-bulk.php-
- Full path:
- abi/web/network-olt-huawei-bulk.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:15 12/12/2025
- Last modified:
- 23:21:51 10/12/2025
- MD5 hash:
- b6dc2bcc7e7a7a4b914a01a10b628472
- Filesize:
- 4.45 KB
- suspicious functions used:
- `ip_address`, `community`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:26);shell_exec (line:42);
$query = mysqli_query($con, "SELECT `ip_address`, `community`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND `online_sts` = '1' AND `sts` = '0'");shell_exec (line:65);$output = shell_exec($cmd . " 2>&1");shell_exec (line:76);$output = shell_exec($cmd . " 2>&1");shell_exec (line:88);$output = shell_exec($cmd . " 2>&1");shell_exec (line:99);$output = shell_exec($cmd . " 2>&1");$output = shell_exec($cmd . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-load.php-
- Full path:
- abi/web/network-olt-load.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:15 12/12/2025
- Last modified:
- 23:21:51 10/12/2025
- MD5 hash:
- f49d5153285c639ed91d4e806685ee56
- Filesize:
- 1.33 KB
- suspicious functions used:
- shell_exec (line:22);shell_exec (line:25);
$output = shell_exec($command . " 2>&1");$output1 = shell_exec($command1 . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-oid-check.php-
- Full path:
- abi/web/network-olt-oid-check.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:15 12/12/2025
- Last modified:
- 23:21:51 10/12/2025
- MD5 hash:
- 5b7dc0ce1103fbfc895873c250b63141
- Filesize:
- 1.88 KB
- suspicious functions used:
- shell_exec (line:33);
return shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-onu-alarm-add.php-
- Full path:
- abi/web/network-olt-onu-alarm-add.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:15 12/12/2025
- Last modified:
- 23:21:51 10/12/2025
- MD5 hash:
- be6ba82c658419e1454f778e20e2d4c3
- Filesize:
- 7.86 KB
- suspicious functions used:
- shell_exec (line:103);
$output = shell_exec($command . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-onu-count.php-
- Full path:
- abi/web/network-olt-onu-count.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:15 12/12/2025
- Last modified:
- 23:21:51 10/12/2025
- MD5 hash:
- dc4f00a8eaa7feb0b6fe62ab4ec1717a
- Filesize:
- 11.83 KB
- suspicious functions used:
- `olt_id` = '$olt_id' AND ` (line:20);shell_exec (line:85);
WHERE `olt_id` = '$olt_id' AND `online_sts` = '1' AND `sts` = '0'");$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-onu-list-data.php-
- Full path:
- abi/web/network-olt-onu-list-data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:15 12/12/2025
- Last modified:
- 23:21:51 10/12/2025
- MD5 hash:
- 82158b6b9589f1ce3be73c1a585ef4e4
- Filesize:
- 8.97 KB
- suspicious functions used:
- shell_exec (line:24);shell_exec (line:38);
$outputs = shell_exec($commanda);shell_exec (line:64);$output = shell_exec($command);shell_exec (line:85);$outputs = shell_exec($commanda);shell_exec (line:104);$output = shell_exec($command);shell_exec (line:125);$outputs = shell_exec($commanda);shell_exec (line:155);$output = shell_exec($command);$onu_mac_output = shell_exec($cmandd_all . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-pon-clients-search.php-
- Full path:
- abi/web/network-olt-pon-clients-search.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:15 12/12/2025
- Last modified:
- 23:21:51 10/12/2025
- MD5 hash:
- 79d26fc66abdab6f173330588aa8b238
- Filesize:
- 10.93 KB
- suspicious functions used:
- shell_exec (line:42);shell_exec (line:51);
$output = shell_exec($command . " 2>&1");shell_exec (line:104);$outputS = shell_exec($command . " 2>&1");shell_exec (line:168);$snmpOutput = shell_exec($command);$snmpOutput = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-pon-onu-search-bdcom.php-
- Full path:
- abi/web/network-olt-pon-onu-search-bdcom.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:15 12/12/2025
- Last modified:
- 23:21:51 10/12/2025
- MD5 hash:
- 3aa5d68e88dfe371dad0f4540977ac23
- Filesize:
- 32.49 KB
- suspicious functions used:
- shell_exec (line:61);shell_exec (line:70);
$output = shell_exec($command . " 2>&1");shell_exec (line:384);$outputS = shell_exec($commandS . " 2>&1");shell_exec (line:587);$snmpOutput = shell_exec($command);$cdata_onu_output = shell_exec($cdata_onu_cmd . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-pon-onu-search-bdcom1.php-
- Full path:
- abi/web/network-olt-pon-onu-search-bdcom1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:15 12/12/2025
- Last modified:
- 23:21:51 10/12/2025
- MD5 hash:
- dd18677b1dcbf7f0bce2ac6912d98da0
- Filesize:
- 9.6 KB
- suspicious functions used:
- shell_exec (line:42);shell_exec (line:51);
$output = shell_exec($command . " 2>&1");shell_exec (line:129);$outputS = shell_exec($command . " 2>&1");$snmpOutput = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-pon-onu-search-hwi.php-
- Full path:
- abi/web/network-olt-pon-onu-search-hwi.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:15 12/12/2025
- Last modified:
- 23:21:51 10/12/2025
- MD5 hash:
- f649db9e4ef3fdfa499d6fb4afd8d50f
- Filesize:
- 23.06 KB
- suspicious functions used:
- shell_exec (line:46);
$output = shell_exec($command . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-pon-onu-search-rcl.php-
- Full path:
- abi/web/network-olt-pon-onu-search-rcl.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:15 12/12/2025
- Last modified:
- 23:21:51 10/12/2025
- MD5 hash:
- 565ff38d572bba4bc20721ab17484554
- Filesize:
- 27.33 KB
- suspicious functions used:
- shell_exec (line:46);shell_exec (line:55);
$output = shell_exec($command . " 2>&1");shell_exec (line:369);$outputS = shell_exec($commandS . " 2>&1");$snmpOutput = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-pon-onu-search.php-
- Full path:
- abi/web/network-olt-pon-onu-search.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:15 12/12/2025
- Last modified:
- 23:21:51 10/12/2025
- MD5 hash:
- dc183ecf77d0e1f56f672338fd09cfa5
- Filesize:
- 21.62 KB
- suspicious functions used:
- shell_exec (line:35);
$output = shell_exec($command . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-onu-power.php-
- Full path:
- abi/web/network-olt-onu-power.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:15 12/12/2025
- Last modified:
- 23:21:51 10/12/2025
- MD5 hash:
- 2e064543b67b532bdf4e5b12d49c5052
- Filesize:
- 7.54 KB
- suspicious functions used:
- shell_exec (line:97);
$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-snmp-onu-status-data-bdcom-online.php-
- Full path:
- abi/web/network-snmp-onu-status-data-bdcom-online.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:15 12/12/2025
- Last modified:
- 23:21:51 10/12/2025
- MD5 hash:
- 1cf2743830dd3355f66bcfd80bc372ae
- Filesize:
- 26.1 KB
- suspicious functions used:
- shell_exec (line:48);shell_exec (line:73);
$oudddputsd = shell_exec($commddanda . " 2>&1");shell_exec (line:85);$oudddputsd = shell_exec($commddanda . " 2>&1");shell_exec (line:103);$oudddputsd = shell_exec($commddanda . " 2>&1");shell_exec (line:116);$output = shell_exec($command . " 2>&1");shell_exec (line:128);$outputs = shell_exec($commanda);shell_exec (line:134);$outpdut = shell_exec($commandd . " 2>&1");shell_exec (line:159);$oddutpdut = shell_exec($cmandd . " 2>&1");shell_exec (line:172);$output = shell_exec($command . " 2>&1");shell_exec (line:184);$outputs = shell_exec($commanda);shell_exec (line:190);$outpdut = shell_exec($commandd . " 2>&1");shell_exec (line:226);$oddutpdut = shell_exec($cmandd . " 2>&1");shell_exec (line:241);$onu_mac_output = shell_exec($cmandd_all . " 2>&1");$fdb_output = shell_exec($fdb_command . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-snmp-onu-status-data-bdcom.php-
- Full path:
- abi/web/network-snmp-onu-status-data-bdcom.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:15 12/12/2025
- Last modified:
- 23:21:51 10/12/2025
- MD5 hash:
- 5e9be916b6c74cabc588838e6c9df590
- Filesize:
- 27.33 KB
- suspicious functions used:
- shell_exec (line:49);shell_exec (line:74);
$oudddputsd = shell_exec($commddanda . " 2>&1");shell_exec (line:86);$oudddputsd = shell_exec($commddanda . " 2>&1");shell_exec (line:104);$oudddputsd = shell_exec($commddanda . " 2>&1");shell_exec (line:117);$output = shell_exec($command . " 2>&1");shell_exec (line:129);$outputs = shell_exec($commanda);shell_exec (line:135);$outpdut = shell_exec($commandd . " 2>&1");shell_exec (line:160);$oddutpdut = shell_exec($cmandd . " 2>&1");shell_exec (line:173);$output = shell_exec($command . " 2>&1");shell_exec (line:185);$outputs = shell_exec($commanda);shell_exec (line:191);$outpdut = shell_exec($commandd . " 2>&1");shell_exec (line:226);$oddutpdut = shell_exec($cmandd . " 2>&1");shell_exec (line:239);$onu_mac_output = shell_exec($cmandd_all . " 2>&1");$fdb_output = shell_exec($fdb_command . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-snmp-onu-status-data-online.php-
- Full path:
- abi/web/network-snmp-onu-status-data-online.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:15 12/12/2025
- Last modified:
- 23:21:51 10/12/2025
- MD5 hash:
- 0d8187961d76276c1aaaa369cdabf36b
- Filesize:
- 27.73 KB
- suspicious functions used:
- shell_exec (line:35);`olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:41);
$outputs11 = shell_exec($snmpCommandss);shell_exec (line:80);$re11=mysql_query("SELECT `olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND `olt_pon_id` = '$check_pon_name'");shell_exec (line:94);$outputs = shell_exec($snmpCommand);shell_exec (line:108);$outpdduts = shell_exec($sand);shell_exec (line:121);$outputs = shell_exec($snmpCommand);shell_exec (line:196);$outpdduts = shell_exec($sand);shell_exec (line:429);$outputsmac = shell_exec($snmpCommandmac);shell_exec (line:441);$outputsmac = shell_exec($snmpCommandmac);shell_exec (line:448);$outputsmac = shell_exec($snmpCommandmac);$output_vlan = shell_exec($command_vlan . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-snmp-onu-status-data.php-
- Full path:
- abi/web/network-snmp-onu-status-data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:15 12/12/2025
- Last modified:
- 23:21:51 10/12/2025
- MD5 hash:
- 30cb65623c66c45bd502104b935d2c48
- Filesize:
- 30.69 KB
- suspicious functions used:
- shell_exec (line:36);`olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:42);
$outputs11 = shell_exec($snmpCommandss);shell_exec (line:81);$re11=mysql_query("SELECT `olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND `olt_pon_id` = '$check_pon_name'");shell_exec (line:95);$outputs = shell_exec($snmpCommand);shell_exec (line:109);$outpdduts = shell_exec($sand);shell_exec (line:122);$outputs = shell_exec($snmpCommand);shell_exec (line:208);$outpdduts = shell_exec($sand);shell_exec (line:436);$outputsmac = shell_exec($snmpCommandmac);shell_exec (line:448);$outputsmac = shell_exec($snmpCommandmac);shell_exec (line:455);$outputsmac = shell_exec($snmpCommandmac);$output_vlan = shell_exec($command_vlan . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-snmp-onu-status-data1.php-
- Full path:
- abi/web/network-snmp-onu-status-data1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:15 12/12/2025
- Last modified:
- 23:21:51 10/12/2025
- MD5 hash:
- 21b4726e351c4b0fcb7d6f0959c0d888
- Filesize:
- 15.98 KB
- suspicious functions used:
- shell_exec (line:34);`olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:38);
$outputs = shell_exec($snmpCommand);shell_exec (line:150);$re11=mysql_query("SELECT `olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND `olt_pon_id` = '$check_pon_name'");$outputsmac = shell_exec($snmpCommandmac); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-snmp-onu-status-data_vsol2.php-
- Full path:
- abi/web/network-snmp-onu-status-data_vsol2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:15 12/12/2025
- Last modified:
- 23:21:51 10/12/2025
- MD5 hash:
- f22d022ddc284f4d8e1de3660da91db8
- Filesize:
- 15.61 KB
- suspicious functions used:
- shell_exec (line:34);shell_exec (line:113);
$outputs = shell_exec($snmpCommand);shell_exec (line:126);$outpdduts = shell_exec($sand);shell_exec (line:132);$outputsmac = shell_exec($snmpCommandmac);$output_vlan = shell_exec($command_vlan . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-tree-vartual-nodes.php-
- Full path:
- abi/web/network-tree-vartual-nodes.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:15 12/12/2025
- Last modified:
- 23:21:51 10/12/2025
- MD5 hash:
- ef5de6634f62a12fd5139c800708aa30
- Filesize:
- 10.49 KB
- suspicious functions used:
- shell_exec (line:76);shell_exec (line:111);
$outputs = shell_exec($commanda);shell_exec (line:145);$outputs = shell_exec($commanda);shell_exec (line:181);$outputs = shell_exec($commanda);shell_exec (line:188);$od_vdlan = shell_exec($commanda . " 2>&1");$od_vdland = shell_exec($coddvland . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Network.php-
- Full path:
- abi/web/Network.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:16 12/12/2025
- Last modified:
- 23:21:51 10/12/2025
- MD5 hash:
- 2eed7e3ac1a2dc7a30092353d076186f
- Filesize:
- 69.75 KB
- suspicious functions used:
- system (line:371);shell_exec (line:654);
$ARRAY = $API->comm("/system/resource/print");`network_tree` WHERE `device_type` = '1' AND `olt_id` = '{$rowo['olt_id']}' AND sts = '0' AND ` (line:882);$output = shell_exec($command);$querytree = "SELECT tree_id FROM `network_tree` WHERE `device_type` = '1' AND `olt_id` = '{$rowo['olt_id']}' AND sts = '0' AND `latitude` != '' AND `longitude` != ''"; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Network1.php-
- Full path:
- abi/web/Network1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:16 12/12/2025
- Last modified:
- 23:21:51 10/12/2025
- MD5 hash:
- 154ba9f6e6603be92ddd48557fb118ce
- Filesize:
- 65.34 KB
- suspicious functions used:
- system (line:369);shell_exec (line:652);
$ARRAY = $API->comm("/system/resource/print");`network_tree` WHERE `device_type` = '1' AND `olt_id` = '{$rowo['olt_id']}' AND sts = '0' AND ` (line:843);$output = shell_exec($command);$querytree = "SELECT tree_id FROM `network_tree` WHERE `device_type` = '1' AND `olt_id` = '{$rowo['olt_id']}' AND sts = '0' AND `latitude` != '' AND `longitude` != ''"; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkLoad.php-
- Full path:
- abi/web/NetworkLoad.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:16 12/12/2025
- Last modified:
- 23:21:51 10/12/2025
- MD5 hash:
- e1632e66ee1b7394d3fb82751b924abe
- Filesize:
- 2.83 KB
- suspicious functions used:
- system (line:81);
$ARRAY = $API->comm("/system/resource/print"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkLoad1.php-
- Full path:
- abi/web/NetworkLoad1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:16 12/12/2025
- Last modified:
- 23:21:52 10/12/2025
- MD5 hash:
- 176bd6931be34d7ef351d22897accc65
- Filesize:
- 759 B
- suspicious functions used:
- system (line:18);
$ARRAY = $API->comm("/system/resource/print"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkOltAddQuery.php-
- Full path:
- abi/web/NetworkOltAddQuery.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:16 12/12/2025
- Last modified:
- 23:21:52 10/12/2025
- MD5 hash:
- f947f34b95c8c6f9b374dece2d460dcf
- Filesize:
- 11.64 KB
- suspicious functions used:
- shell_exec (line:22);
$output = shell_exec($command . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkOltOnuStatus.php-
- Full path:
- abi/web/NetworkOltOnuStatus.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 15:54:43 12/12/2025
- Last modified:
- 23:21:52 10/12/2025
- MD5 hash:
- 77803b593c28f193f35d2009fa66f268
- Filesize:
- 82.39 KB
- suspicious functions used:
- shell_exec (line:42);shell_exec (line:102);
$output = shell_exec($command . " 2>&1");shell_exec (line:674);$output = shell_exec($command . " 2>&1");shell_exec (line:795);$oddutpdut = shell_exec($cmandd . " 2>&1");shell_exec (line:920);$oddutpdut = shell_exec($cmandd . " 2>&1");shell_exec (line:1033);$oddutpdut = shell_exec($cmandd . " 2>&1");shell_exec (line:1143);$oddutpdut = shell_exec($cmandd . " 2>&1");shell_exec (line:1253);$oddutpdut = shell_exec($cmandd . " 2>&1");$oddutpdut = shell_exec($cmandd . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkOltOnuStatus2.php-
- Full path:
- abi/web/NetworkOltOnuStatus2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:16 12/12/2025
- Last modified:
- 23:21:52 10/12/2025
- MD5 hash:
- c9a14797fa4353d05bbd9427b6079250
- Filesize:
- 15.88 KB
- suspicious functions used:
- shell_exec (line:35);
$output = shell_exec($command . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkOltSense.php-
- Full path:
- abi/web/NetworkOltSense.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:16 12/12/2025
- Last modified:
- 23:21:52 10/12/2025
- MD5 hash:
- 2be664ae5006367f629ca437a6d507f8
- Filesize:
- 18.26 KB
- suspicious functions used:
- `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, `last_synced`, `last_update`, `msg`, `full_msg`, ROUND((SELECT AVG(value) FROM olt_onu_history WHERE alarm_id = '$alarmId' AND value != ''), 2) AS average_value FROM `, ` WHERE `alarm_id` = '$alarmId' AND ` (line:123);
$querddy = mysql_query("SELECT `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, `last_synced`, `last_update`, `msg`, `full_msg`, ROUND((SELECT AVG(value) FROM olt_onu_history WHERE alarm_id = '$alarmId' AND value != ''), 2) AS average_value FROM `olt_onu_history` WHERE `alarm_id` = '$alarmId' AND `value` != ''"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkOltSenseDetails.php-
- Full path:
- abi/web/NetworkOltSenseDetails.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:16 12/12/2025
- Last modified:
- 23:21:52 10/12/2025
- MD5 hash:
- 440096c601fc10b819a1f0f8330928b0
- Filesize:
- 14.17 KB
- suspicious functions used:
- `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:33);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:42);
$sql = mysql_query("SELECT `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND `value` != '' ORDER BY id DESC");`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:51);$sql = mysql_query("SELECT `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND `value` != '' ORDER BY id DESC");`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:60);$sql = mysql_query("SELECT `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND `value` != '' ORDER BY id DESC");$sql = mysql_query("SELECT `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND `value` != '' ORDER BY id DESC"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkOltSync.php-
- Full path:
- abi/web/NetworkOltSync.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:16 12/12/2025
- Last modified:
- 23:21:52 10/12/2025
- MD5 hash:
- 06633d4b65a14d677358170dd0a84424
- Filesize:
- 1.87 KB
- suspicious functions used:
- curl_exec (line:18);
$result1dd = curl_exec($ch111); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: networktree-olt-onu-list-data.php-
- Full path:
- abi/web/networktree-olt-onu-list-data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:16 12/12/2025
- Last modified:
- 23:21:52 10/12/2025
- MD5 hash:
- af4221fefa9c9051846a063ac4135560
- Filesize:
- 8.72 KB
- suspicious functions used:
- shell_exec (line:24);shell_exec (line:36);
$outputs = shell_exec($commanda);shell_exec (line:59);$output = shell_exec($command);shell_exec (line:78);$outputs = shell_exec($commanda);shell_exec (line:97);$output = shell_exec($command);shell_exec (line:116);$outputs = shell_exec($commanda);shell_exec (line:134);$output = shell_exec($command);shell_exec (line:143);$od_vdlan = shell_exec($commanda . " 2>&1");shell_exec (line:155);$od_vdland = shell_exec($coddvland . " 2>&1");shell_exec (line:175);$outputs = shell_exec($coddvladnd . " 2>&1");$output_vdlan = shell_exec($command_vdlan); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkTreeAddSave.php-
- Full path:
- abi/web/NetworkTreeAddSave.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:16 12/12/2025
- Last modified:
- 23:21:52 10/12/2025
- MD5 hash:
- 93fdf1213fdb5d525641e2b625f1a91b
- Filesize:
- 7.61 KB
- suspicious functions used:
- `network_tree` WHERE `olt_id` = '$olt_id' AND ` (line:107);
$resu11 = $con->query("SELECT tree_id AS pon_parent_id FROM `network_tree` WHERE `olt_id` = '$olt_id' AND `device_type` = '1' AND sts = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkTreeEdit1.php-
- Full path:
- abi/web/NetworkTreeEdit1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:17 12/12/2025
- Last modified:
- 23:21:52 10/12/2025
- MD5 hash:
- 3396a6bdf9b5804bb208f38f37cc29a2
- Filesize:
- 35.81 KB
- suspicious functions used:
- `olt_onu` WHERE olt_id = '$olt_id' AND ` (line:207);
<?php $resultoff11d=mysql_query("SELECT id AS alarm_id, alarm_name FROM `olt_onu` WHERE olt_id = '$olt_id' AND `onu_name` LIKE '$pon_name1' ORDER BY id DESC"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkTreeEditSave.php-
- Full path:
- abi/web/NetworkTreeEditSave.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:17 12/12/2025
- Last modified:
- 23:21:52 10/12/2025
- MD5 hash:
- 75ca95ac9b0cf5e9709091d3a6ae5b6a
- Filesize:
- 13.55 KB
- suspicious functions used:
- `olt_pon` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND ` (line:84);`network_tree` WHERE `olt_id` = '$olt_id' AND ` (line:196);
$resu11=mysqli_query($con, "SELECT olt_pon_id AS pon_index_id FROM `olt_pon` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND `sts` = '0'");$resu11 = $con->query("SELECT tree_id AS pon_parent_id FROM `network_tree` WHERE `olt_id` = '$olt_id' AND `device_type` = '1' AND sts = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkTreeList.php-
- Full path:
- abi/web/NetworkTreeList.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:17 12/12/2025
- Last modified:
- 23:21:52 10/12/2025
- MD5 hash:
- 17e728e8656912d8cc50af8be8d75085
- Filesize:
- 32.22 KB
- suspicious functions used:
- `pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '{$rowsedfg['olt_id']}' AND ` (line:460);
$result11=mysql_query("SELECT count(`pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '{$rowsedfg['olt_id']}' AND `sts` = '0';"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkTreeMap.php-
- Full path:
- abi/web/NetworkTreeMap.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:17 12/12/2025
- Last modified:
- 23:21:52 10/12/2025
- MD5 hash:
- ac3639d5b3976ee434d4b5968090f07b
- Filesize:
- 49.4 KB
- suspicious functions used:
- `${totalonline}` (line:121);`${totaloffline}` (line:122);
document.getElementById('totalonline').textContent = `${totalonline}`;`Failed to load data: ${error.message}` (line:788);document.getElementById('totaloffline').textContent = `${totaloffline}`;`HTTP error! Status: ${response.status}` (line:803);updateElement('resultt1-' + treeid, `<span>Failed to load data: ${error.message}</span>`);throw new Error(`HTTP error! Status: ${response.status}`); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: networktree_device_onu_list_add.php-
- Full path:
- abi/web/networktree_device_onu_list_add.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:17 12/12/2025
- Last modified:
- 23:21:52 10/12/2025
- MD5 hash:
- 23aa4b30ff4514610497db10c8490003
- Filesize:
- 16.07 KB
- suspicious functions used:
- shell_exec (line:31);`network_tree` WHERE `onu_mac` = '$mac_address' AND ` (line:129);
$output = shell_exec($command . " 2>&1");`olt_pon` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND ` (line:163);$reu11=mysql_query("SELECT count(tree_id) AS onucount FROM `network_tree` WHERE `onu_mac` = '$mac_address' AND `sts` = '0'");shell_exec (line:198);$resu11=mysql_query("SELECT olt_pon_id AS pon_index_id FROM `olt_pon` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND `sts` = '0'");shell_exec (line:221);$outputS = shell_exec($commandS . " 2>&1");shell_exec (line:238);$output = shell_exec($command . " 2>&1");`network_tree` WHERE `onu_mac` = '$onuMac' AND ` (line:276);$snmpOutput = shell_exec($commandtghj);shell_exec (line:302);$reu11=mysql_query("SELECT count(tree_id) AS onucount FROM `network_tree` WHERE `onu_mac` = '$onuMac' AND `sts` = '0'");shell_exec (line:308);$snmpOutputdd = shell_exec($cmandd);shell_exec (line:319);$output_port = shell_exec($commandd_bdcom);`network_tree` WHERE `onu_mac` = '$onuMac' AND ` (line:355);$output_vdlan = shell_exec($command_dvlan . " 2>&1");`olt_pon` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND ` (line:391);$reu11=mysql_query("SELECT count(tree_id) AS onucount FROM `network_tree` WHERE `onu_mac` = '$onuMac' AND `sts` = '0'");$resu11=mysql_query("SELECT olt_pon_id AS pon_index_id FROM `olt_pon` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND `sts` = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: networktree_device_pon_check.php-
- Full path:
- abi/web/networktree_device_pon_check.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:17 12/12/2025
- Last modified:
- 23:21:52 10/12/2025
- MD5 hash:
- b7f8731e7d12665b418927d722340da4
- Filesize:
- 1.58 KB
- suspicious functions used:
- `pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '$olt_id' AND ` (line:8);
$result11=mysql_query("SELECT count(`pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '$olt_id' AND `sts` = '0';"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: networktree_device_pon_list_add.php-
- Full path:
- abi/web/networktree_device_pon_list_add.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:17 12/12/2025
- Last modified:
- 23:21:52 10/12/2025
- MD5 hash:
- 2cf70db6a91f4c5d1821b4b5fa178ebb
- Filesize:
- 1.38 KB
- suspicious functions used:
- `olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:6);`olt_pon` WHERE `olt_id` = '$olt_id' AND ` (line:10);
$resu11=mysql_query("SELECT olt_name FROM `olt_con` WHERE `olt_id` = '$olt_id' AND `sts` = '0'");`network_tree` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND ` (line:17);$result11=mysql_query("SELECT pon_id, olt_pon_id, pon_name FROM `olt_pon` WHERE `olt_id` = '$olt_id' AND `sts` = '0'");$rehu11=mysql_query("SELECT count(tree_id) AS poncount FROM `network_tree` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND `sts` = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: networktree_device_pon_port_onu_list.php-
- Full path:
- abi/web/networktree_device_pon_port_onu_list.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:17 12/12/2025
- Last modified:
- 23:21:52 10/12/2025
- MD5 hash:
- 6578424616a5eefb751d5e3e155adba6
- Filesize:
- 8.63 KB
- suspicious functions used:
- `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:25);shell_exec (line:32);
$rff11=mysqli_query($con, "SELECT olt_pon_id AS pon_port FROM `olt_pon` WHERE olt_id = '$olt_id' AND `pon_name` LIKE '$pon_portt'");shell_exec (line:45);$outputs = shell_exec($commanda);`network_tree` WHERE onu_index_id = '$port_onu_index_id' AND ` (line:49);$output = shell_exec($command);shell_exec (line:81);$rff11d=mysqli_query($con, "SELECT onu_name, onu_index, onu_index_id, onu_mac FROM `network_tree` WHERE onu_index_id = '$port_onu_index_id' AND `olt_id` = '$olt_id'");shell_exec (line:104);$outputs = shell_exec($commanda);shell_exec (line:123);$output = shell_exec($command);shell_exec (line:144);$outputs = shell_exec($commanda);shell_exec (line:162);$output = shell_exec($command);shell_exec (line:171);$od_vdlan = shell_exec($commanda . " 2>&1");shell_exec (line:185);$od_vdland = shell_exec($coddvland . " 2>&1");$outputs = shell_exec($coddvladnd . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: networktree_device_pon_port_sense_list.php-
- Full path:
- abi/web/networktree_device_pon_port_sense_list.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:17 12/12/2025
- Last modified:
- 23:21:52 10/12/2025
- MD5 hash:
- 4d80475d2f31f38e21239a5a1a19285f
- Filesize:
- 3.7 KB
- suspicious functions used:
- `network_tree` WHERE `onu_mac` = '$onu_mac' AND ` (line:26);`network_tree` WHERE `c_id` = '{$dfhbdxf}' AND ` (line:72);
$reu1d1=mysqli_query($con, "SELECT tree_id AS router_parant_id FROM `network_tree` WHERE `onu_mac` = '$onu_mac' AND `sts` = '0'");$reu11=mysqli_query($con, "SELECT count(c_id) AS client_count FROM `network_tree` WHERE `c_id` = '{$dfhbdxf}' AND `sts` = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: networktree_device_type.php-
- Full path:
- abi/web/networktree_device_type.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:17 12/12/2025
- Last modified:
- 23:21:52 10/12/2025
- MD5 hash:
- f1520732e5a3ef38564238a3278a1f63
- Filesize:
- 11.43 KB
- suspicious functions used:
- `tree_id`) AS countolt FROM `network_tree` WHERE `olt_id` = '$olt_id_sure' AND ` (line:64);
$resu11=mysql_query("SELECT COUNT(`tree_id`) AS countolt FROM `network_tree` WHERE `olt_id` = '$olt_id_sure' AND `device_type` = '1' AND sts = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: olt_all_onu_mac.php-
- Full path:
- abi/web/olt_all_onu_mac.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:17 12/12/2025
- Last modified:
- 23:21:52 10/12/2025
- MD5 hash:
- 3c9e4213da81cfacdc5b31170cc2dd46
- Filesize:
- 13.31 KB
- suspicious functions used:
- shell_exec (line:22);shell_exec (line:38);
$oddutpdut = shell_exec($cmandd . " 2>&1");shell_exec (line:57);$output_port = shell_exec($commandd_bdcom);shell_exec (line:90);$oddutpdut = shell_exec($cmandd . " 2>&1");shell_exec (line:116);$output_mac = shell_exec($cmd_mac . " 2>&1");shell_exec (line:134);$oddutpdut = shell_exec($cmandd . " 2>&1");shell_exec (line:169);$output_porta = shell_exec($commandd_bdcoma);shell_exec (line:204);$output_mac = shell_exec($cmd_mac . " 2>&1");shell_exec (line:208);$output_desc = shell_exec($cmd_desc . " 2>&1");shell_exec (line:247);$output_mac = shell_exec($cmd_mac . " 2>&1");$output = shell_exec($command . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentOnlineQuery.php-
- Full path:
- abi/web/PaymentOnlineQuery.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 10:02:06 12/12/2025
- Last modified:
- 07:54:02 11/12/2025
- MD5 hash:
- 864457d667cda4a43b414af6422514bb
- Filesize:
- 28.7 KB
- suspicious functions used:
- curl_exec (line:461);curl_exec (line:673);
$resultdata=curl_exec($url);$content = curl_exec($handle ); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentOnlineQuery2.php-
- Full path:
- abi/web/PaymentOnlineQuery2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:18 12/12/2025
- Last modified:
- 23:21:53 10/12/2025
- MD5 hash:
- ccd315d11a60901b7b9029ff44f8351b
- Filesize:
- 19.4 KB
- suspicious functions used:
- curl_exec (line:42);curl_exec (line:252);
$resultdatax=curl_exec($url);$result = curl_exec($handle); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentOnlineQuery_apk.php-
- Full path:
- abi/web/PaymentOnlineQuery_apk.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:18 12/12/2025
- Last modified:
- 08:45:11 11/12/2025
- MD5 hash:
- cff01ceb48bf2e18c2200a733d01d647
- Filesize:
- 29.37 KB
- suspicious functions used:
- curl_exec (line:490);curl_exec (line:709);
$resultdata=curl_exec($url);$content = curl_exec($handle ); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentWebhook.php-
- Full path:
- abi/web/PaymentWebhook.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:18 12/12/2025
- Last modified:
- 23:21:53 10/12/2025
- MD5 hash:
- a2f322c94787630ab1e0c8ca35fc5ba1
- Filesize:
- 18.6 KB
- suspicious functions used:
- base64_decode (line:30);curl_exec (line:41);
$signatureDecoded = base64_decode($signature);curl_exec (line:422);curl_exec($url);$data = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: SignUp1.php-
- Full path:
- abi/web/SignUp1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:19 12/12/2025
- Last modified:
- 23:21:54 10/12/2025
- MD5 hash:
- 22cdaf528a51aa44652f81cc911a85fa
- Filesize:
- 26.63 KB
- suspicious functions used:
- curl_exec (line:53);curl_exec (line:75);
$jsona = curl_exec($ch10);$resdfwedf = curl_exec($ch1s); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: sms-balance-check.php-
- Full path:
- abi/web/sms-balance-check.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 04:49:59 12/12/2025
- Last modified:
- 23:21:54 10/12/2025
- MD5 hash:
- 76d6e591039b8f16382220fec77cd3d7
- Filesize:
- 984 B
- suspicious functions used:
- curl_exec (line:15);
$balance = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: SMS.php-
- Full path:
- abi/web/SMS.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:19 12/12/2025
- Last modified:
- 23:21:54 10/12/2025
- MD5 hash:
- 40c71ca257cc7a64f7c4bed68a0b9503
- Filesize:
- 39.83 KB
- suspicious functions used:
- curl_exec (line:56);
$balance = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: SMS1.php-
- Full path:
- abi/web/SMS1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:19 12/12/2025
- Last modified:
- 23:21:54 10/12/2025
- MD5 hash:
- e4671dadf9ad575671fd3609a60030da
- Filesize:
- 32.19 KB
- suspicious functions used:
- curl_exec (line:59);
$balance = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: SMSAddSave.php-
- Full path:
- abi/web/SMSAddSave.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:19 12/12/2025
- Last modified:
- 23:21:54 10/12/2025
- MD5 hash:
- 0d2d0548df5f32e69264c4f2f1b1f76e
- Filesize:
- 2.12 KB
- suspicious functions used:
- curl_exec (line:35);
$result = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: sms_ai.php-
- Full path:
- abi/web/sms_ai.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:20 12/12/2025
- Last modified:
- 23:21:55 10/12/2025
- MD5 hash:
- 58cf266bd7bbe7522b198788620be84c
- Filesize:
- 2.62 KB
- suspicious functions used:
- system (line:25);curl_exec (line:51);
"role" => "system",$response = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: sms_deliverey_report.php-
- Full path:
- abi/web/sms_deliverey_report.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:20 12/12/2025
- Last modified:
- 23:21:55 10/12/2025
- MD5 hash:
- 03623943da7e9334e137b38c8577fc84
- Filesize:
- 4.25 KB
- suspicious functions used:
- curl_exec (line:28);curl_exec (line:53);
$result11 = curl_exec($ch1);curl_exec (line:90);$resultdd = curl_exec($ch);$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: support-action.php-
- Full path:
- abi/web/support-action.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:20 12/12/2025
- Last modified:
- 23:21:55 10/12/2025
- MD5 hash:
- aaeb0483c3be7cf165aadbeafe89ca94
- Filesize:
- 14.56 KB
- suspicious functions used:
- curl_exec (line:221);
$jsona = curl_exec($ch10); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: support-action_apk.php-
- Full path:
- abi/web/support-action_apk.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:20 12/12/2025
- Last modified:
- 23:21:55 10/12/2025
- MD5 hash:
- eea97e70e134f019edfa0a723a9d012f
- Filesize:
- 14.74 KB
- suspicious functions used:
- curl_exec (line:229);
$jsona = curl_exec($ch10); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tagreeexpayment.php-
- Full path:
- abi/web/tagreeexpayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 10:21:45 12/12/2025
- Last modified:
- 23:21:55 10/12/2025
- MD5 hash:
- 2cf8a160dbd1595bcca2faf135b53c0f
- Filesize:
- 3 KB
- suspicious functions used:
- curl_exec (line:26);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tcreateagree.php-
- Full path:
- abi/web/tcreateagree.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 10:21:01 12/12/2025
- Last modified:
- 23:21:55 10/12/2025
- MD5 hash:
- 27a10adf4190edc7eceee8cf74a6b72b
- Filesize:
- 999 B
- suspicious functions used:
- curl_exec (line:26);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tcreatepayment.php-
- Full path:
- abi/web/tcreatepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 04:47:55 12/12/2025
- Last modified:
- 23:21:55 10/12/2025
- MD5 hash:
- e49de9a33f5164bc2c6b88e4770faaff
- Filesize:
- 1.07 KB
- suspicious functions used:
- curl_exec (line:27);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: test10.php-
- Full path:
- abi/web/test10.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:20 12/12/2025
- Last modified:
- 23:21:55 10/12/2025
- MD5 hash:
- 25a7502a2c7ba51f67744931f91a4376
- Filesize:
- 1.18 KB
- suspicious functions used:
- shell_exec (line:26);
$snmpResult = shell_exec($cmd . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: test11.php-
- Full path:
- abi/web/test11.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:20 12/12/2025
- Last modified:
- 23:21:55 10/12/2025
- MD5 hash:
- 7074fb7f6526fbd42b1ce38d6c5d2ef7
- Filesize:
- 1.57 KB
- suspicious functions used:
- curl_exec (line:52);
$response = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: test12.php-
- Full path:
- abi/web/test12.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:20 12/12/2025
- Last modified:
- 23:21:55 10/12/2025
- MD5 hash:
- 4227a76da13a2468238d0715025fabdb
- Filesize:
- 23 KB
- suspicious functions used:
- shell_exec (line:108);shell_exec (line:130);
$output1 = shell_exec($cmd1);shell_exec (line:141);$output2 = shell_exec($cmd2);shell_exec (line:299);$output3 = shell_exec($cmd3);shell_exec (line:316);$output_onu_lists = shell_exec("snmpwalk -v2c -c $community -Cc -t 3 -r 2 udp:$host:$port $base_oid_onu_list 2>&1");shell_exec (line:321);$output_macs = shell_exec("snmpwalk -v2c -c $community -Cc -t 3 -r 2 udp:$host:$port $base_mac 2>&1");shell_exec (line:356);$output_descs = shell_exec("snmpwalk -v2c -c $community -Cc -t 3 -r 2 udp:$host:$port $base_desc 2>&1");shell_exec (line:371);$output_onu_lists = shell_exec("snmpwalk -v2c -c $community -Cc -t 3 -r 2 udp:$host:$port $base_oid_onu_list 2>&1");shell_exec (line:375);$output_macs = shell_exec("snmpwalk -v2c -c $community -Cc -t 3 -r 2 udp:$host:$port $base_mac 2>&1");$output_descs = shell_exec("snmpwalk -v2c -c $community -Cc -t 3 -r 2 udp:$host:$port $base_desc 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: test13.php-
- Full path:
- abi/web/test13.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:20 12/12/2025
- Last modified:
- 23:21:55 10/12/2025
- MD5 hash:
- 7db809589028c30524187fd234eba91f
- Filesize:
- 275 B
- suspicious functions used:
- shell_exec (line:8);
echo shell_exec($cmd . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: test2.php-
- Full path:
- abi/web/test2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:20 12/12/2025
- Last modified:
- 23:21:55 10/12/2025
- MD5 hash:
- d370084cb1aec2a8e57ea3d7f4e9272e
- Filesize:
- 14.37 KB
- suspicious functions used:
- shell_exec (line:59);shell_exec (line:70);
$output = shell_exec($command);shell_exec (line:76);$output1 = shell_exec($command1);shell_exec (line:88);$output2 = shell_exec($command2);shell_exec (line:101);$output_vdlan = shell_exec($command_dvlan . " 2>&1");shell_exec (line:141);$output_vdlan = shell_exec($command_dvlan . " 2>&1");curl_exec (line:187);$output_vdlanf = shell_exec($command_dvlan . " 2>&1");curl_exec (line:212);$result11 = curl_exec($ch3);curl_exec (line:354);$response = curl_exec($ch);$result11 = curl_exec($ch3); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: test6.php-
- Full path:
- abi/web/test6.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:20 12/12/2025
- Last modified:
- 23:21:55 10/12/2025
- MD5 hash:
- 08bb56be5ac9f35560ec8eccd435cc1b
- Filesize:
- 4.68 KB
- suspicious functions used:
- curl_exec (line:73);
$response = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: test7.php-
- Full path:
- abi/web/test7.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:20 12/12/2025
- Last modified:
- 23:21:55 10/12/2025
- MD5 hash:
- b11ccf951ce63a21ea0a7328316a0e5c
- Filesize:
- 1.57 KB
- suspicious functions used:
- curl_exec (line:14);
$result1dd = curl_exec($ch111); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: test8.php-
- Full path:
- abi/web/test8.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:20 12/12/2025
- Last modified:
- 23:21:55 10/12/2025
- MD5 hash:
- 0da20f06359cae632ac4b808ab2eee77
- Filesize:
- 3.65 KB
- suspicious functions used:
- shell_exec (line:48);
$output = shell_exec($snmpCommand); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: test9.php-
- Full path:
- abi/web/test9.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:20 12/12/2025
- Last modified:
- 23:21:55 10/12/2025
- MD5 hash:
- 87b5d5bf52fb36a8ccea006021ec8820
- Filesize:
- 7.17 KB
- suspicious functions used:
- shell_exec (line:44);shell_exec (line:69);
$oudddputsd = shell_exec($commddanda . " 2>&1");shell_exec (line:81);$oudddputsd = shell_exec($commddanda . " 2>&1");shell_exec (line:104);$oudddputsd = shell_exec($commddanda . " 2>&1");shell_exec (line:126);$outputS = shell_exec($commandS . " 2>&1");shell_exec (line:140);$output = shell_exec($command);shell_exec (line:153);$output = shell_exec($command . " 2>&1");shell_exec (line:165);$outputs = shell_exec($commanda);shell_exec (line:171);$outpdut = shell_exec($commandd . " 2>&1");$oddutpdut = shell_exec($cmandd . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: testttttt.php-
- Full path:
- abi/web/testttttt.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:20 12/12/2025
- Last modified:
- 23:21:55 10/12/2025
- MD5 hash:
- b1988a4be29e191ad935fb409a4174ee
- Filesize:
- 2 KB
- suspicious functions used:
- curl_exec (line:47);
$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: texecutepayment.php-
- Full path:
- abi/web/texecutepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 10:02:05 12/12/2025
- Last modified:
- 08:41:35 11/12/2025
- MD5 hash:
- 6e522d36ca2a898a60f206f434dee247
- Filesize:
- 3.26 KB
- suspicious functions used:
- curl_exec (line:24);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: time.php-
- Full path:
- abi/web/time.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:20 12/12/2025
- Last modified:
- 23:21:55 10/12/2025
- MD5 hash:
- f72a880b38cb26f3d208bfe99eec1633
- Filesize:
- 5.25 KB
- suspicious functions used:
- `${formatDistance(totalDistance)}` (line:121);`${Math.round(distance)} m`, `${(distance / 1000).toFixed(2)} km` (line:150);
text: `${formatDistance(totalDistance)}`,return distance < 1000 ? `${Math.round(distance)} m` : `${(distance / 1000).toFixed(2)} km`; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tis-news.php-
- Full path:
- abi/web/tis-news.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 04:49:58 12/12/2025
- Last modified:
- 23:21:55 10/12/2025
- MD5 hash:
- ed23ca98b77c5321b4485e85eb2ea64d
- Filesize:
- 3.67 KB
- suspicious functions used:
- curl_exec (line:22);
$alldata1 = curl_exec($chhhh1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: token.php-
- Full path:
- abi/web/token.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:20 12/12/2025
- Last modified:
- 23:21:55 10/12/2025
- MD5 hash:
- 7d8e71ceda3ffb74623e0c4a814715af
- Filesize:
- 1.53 KB
- suspicious functions used:
- curl_exec (line:42);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tt.php-
- Full path:
- abi/web/tt.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:20 12/12/2025
- Last modified:
- 23:21:55 10/12/2025
- MD5 hash:
- 8733d239c14b3fa7c4abf94fb7354381
- Filesize:
- 1.36 KB
- suspicious functions used:
- shell_exec (line:7);
$oddutpdut = shell_exec($cmandd . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ttoken.php-
- Full path:
- abi/web/ttoken.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 04:47:45 12/12/2025
- Last modified:
- 23:21:55 10/12/2025
- MD5 hash:
- f60bc87ff074225a12dfc37f8fca853b
- Filesize:
- 1.56 KB
- suspicious functions used:
- curl_exec (line:42);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: update_user_data_apk.php-
- Full path:
- abi/web/update_user_data_apk.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 08:15:33 12/12/2025
- Last modified:
- 23:21:55 10/12/2025
- MD5 hash:
- e24e8007a8e4cf89643f5c78b653a129
- Filesize:
- 6.1 KB
- suspicious functions used:
- base64_decode (line:46);base64_decode (line:60);
$decoded = base64_decode($image);base64_decode (line:72);$decoded1 = base64_decode($nid_front_image);$decoded2 = base64_decode($nid_back_image); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: UserAccess.php-
- Full path:
- abi/web/UserAccess.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:20 12/12/2025
- Last modified:
- 23:21:55 10/12/2025
- MD5 hash:
- a3c12b17bcb2c8035cfa045807797ae6
- Filesize:
- 10.45 KB
- suspicious functions used:
- `.modulecheckboxx[data-group="${group}"]` (line:159);
document.querySelectorAll(`.modulecheckboxx[data-group="${group}"]`).forEach(box => { - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: UserLoginReport.php-
- Full path:
- abi/web/UserLoginReport.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:21 12/12/2025
- Last modified:
- 23:21:56 10/12/2025
- MD5 hash:
- 43d95cc2a57279f23f52d11581c9427f
- Filesize:
- 7.76 KB
- suspicious functions used:
- curl_exec (line:120);
$foundornot = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: UsersOnLiveMap.php-
- Full path:
- abi/web/UsersOnLiveMap.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:21 12/12/2025
- Last modified:
- 23:21:56 10/12/2025
- MD5 hash:
- 3eb9d4d760112ee6bf2598407e75ea33
- Filesize:
- 8.73 KB
- suspicious functions used:
- `${sec} sec` (line:75);`${Math.floor(sec/60)} min ${sec%60} sec` (line:76);
if (sec < 60) return `${sec} sec`;`Name: ${user.userfullname}return `${Math.floor(sec/60)} min ${sec%60} sec`;
ID: ${user.e_id}
Start Time: ${startTime}` (line:150);`Name: ${user.userfullname}content: `<b>Name:</b> ${user.userfullname}<br><b>ID:</b> ${user.e_id}<br><b>Start Time:</b> ${startTime}`
ID: ${user.e_id}
End Time: ${endTime}` (line:172);content: `<b>Name:</b> ${user.userfullname}<br><b>ID:</b> ${user.e_id}<br><b>End Time:</b> ${endTime}` - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: webhook.php-
- Full path:
- abi/web/webhook.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 02:33:15 12/12/2025
- Last modified:
- 23:21:56 10/12/2025
- MD5 hash:
- 74d27be6074265b500c082281a5b5f90
- Filesize:
- 22.04 KB
- suspicious functions used:
- base64_decode (line:30);curl_exec (line:41);
$signatureDecoded = base64_decode($signature);curl_exec (line:467);curl_exec($url);$data = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: webhook_cid.php-
- Full path:
- abi/web/webhook_cid.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:21 12/12/2025
- Last modified:
- 23:21:56 10/12/2025
- MD5 hash:
- 1a2672fc0dd81a9c831e3fa60ec860e1
- Filesize:
- 21.52 KB
- suspicious functions used:
- base64_decode (line:29);curl_exec (line:40);
$signatureDecoded = base64_decode($signature);curl_exec (line:439);curl_exec($url);$data = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: webhook_test.php-
- Full path:
- abi/web/webhook_test.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:21 12/12/2025
- Last modified:
- 23:21:56 10/12/2025
- MD5 hash:
- 74a7dcc262d7fe7f2bdc9e0595d03837
- Filesize:
- 4.69 KB
- suspicious functions used:
- base64_decode (line:22);curl_exec (line:33);
$signatureDecoded = base64_decode($signature);curl_exec (line:86);curl_exec($url);curl_exec (line:107);$result = curl_exec($ch);$data = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: class.phpmailer.php-
- Full path:
- abi/web/email/class.phpmailer.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:21 12/12/2025
- Last modified:
- 23:21:57 10/12/2025
- MD5 hash:
- 68468d69b47fffecc89df57e27c5a781
- Filesize:
- 143.32 KB
- suspicious functions used:
- `$DKIM_private` (line:428);popen (line:1387);
* If set, takes precedence over `$DKIM_private`.popen (line:1408);if (!@$mail = popen($sendmail, 'w')) {base64_decode (line:3410);if (!@$mail = popen($sendmail, 'w')) {`$mail->set('SMTPSecure', 'tls');` (line:3688);$data = base64_decode($data);`$mail->SMTPSecure = 'tls';` (line:3690);* `$mail->set('SMTPSecure', 'tls');`* `$mail->SMTPSecure = 'tls';` - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: class.smtp.php-
- Full path:
- abi/web/email/class.smtp.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:21 12/12/2025
- Last modified:
- 23:21:57 10/12/2025
- MD5 hash:
- aa8478329268e5438a4469c268337a10
- Filesize:
- 41.44 KB
- suspicious functions used:
- base64_decode (line:513);base64_decode (line:533);
$challenge = base64_decode($challenge);$challenge = base64_decode(substr($this->last_reply, 4)); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: jqgrid.php-
- Full path:
- abi/web/inc/jqgrid.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:22 12/12/2025
- Last modified:
- 23:22:18 10/12/2025
- MD5 hash:
- 71027a29e71e0626d8b57cbb631e6d98
- Filesize:
- 23.92 KB
- suspicious functions used:
- eval (line:397);
if (!empty($V4a8a08f0["condition"])) eval("\$V4b43b0ae = ".$V4a8a08f0["condition"].";"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: JSON.php-
- Full path:
- abi/web/inc/JSON.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:22 12/12/2025
- Last modified:
- 23:22:18 10/12/2025
- MD5 hash:
- f5a34509e06231308becbe320ade9ff6
- Filesize:
- 33.22 KB
- suspicious functions used:
- eval (line:22);
* Javascript, and can be directly eval()'ed with no further parsing - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NotificationHelper.php-
- Full path:
- abi/web/include/NotificationHelper.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 04:24:00 12/12/2025
- Last modified:
- 23:22:19 10/12/2025
- MD5 hash:
- c970c468aa49f2b9a4393b9abb47b0c3
- Filesize:
- 8.56 KB
- suspicious functions used:
- curl_exec (line:133);
$response = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NotificationSingleHelper.php-
- Full path:
- abi/web/include/NotificationSingleHelper.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:23 12/12/2025
- Last modified:
- 23:22:19 10/12/2025
- MD5 hash:
- ae5a5993da8e787e0b769448fb919db9
- Filesize:
- 8.56 KB
- suspicious functions used:
- curl_exec (line:129);
$response = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: smsapicore.php-
- Full path:
- abi/web/include/smsapicore.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 04:48:11 12/12/2025
- Last modified:
- 23:22:19 10/12/2025
- MD5 hash:
- 0494713963b7e9ead12abe06de2811a5
- Filesize:
- 1.26 KB
- suspicious functions used:
- curl_exec (line:37);
$resultdgfb = curl_exec($chg); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: telegramapicore.php-
- Full path:
- abi/web/include/telegramapicore.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 03:55:07 12/12/2025
- Last modified:
- 23:22:19 10/12/2025
- MD5 hash:
- 511f56e6dfcf4e9e7a11259e023ca3ae
- Filesize:
- 3.15 KB
- suspicious functions used:
- curl_exec (line:68);
$result11 = curl_exec($ch3); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ui.php-
- Full path:
- abi/web/js/tinymce/themes/advanced/skins/highcontrast/ui.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 17:23:45 12/12/2025
- Last modified:
- 23:22:37 10/12/2025
- MD5 hash:
- 3edaf67be8573b86686f46bbba4f058c
- Filesize:
- 4.53 KB
- suspicious functions used:
- curl_exec (line:20);`bill_amount` = '0.00' WHERE bill_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY ` (line:53);
$alldataa = curl_exec($chxchhh);`bill_amount` = '0.00', days = '0.00' WHERE entry_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY ` (line:54);$queryss = mysql_query("UPDATE billing SET `bill_amount` = '0.00' WHERE bill_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY `id` DESC LIMIT 5");`payment` WHERE `pay_date` < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND pay_amount != '0.00' ORDER BY ` (line:55);$sqlqmss = mysql_query("UPDATE billing_mac SET `bill_amount` = '0.00', days = '0.00' WHERE entry_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY `id` DESC LIMIT 5");curl_exec (line:146);$sqlqmsp = mysql_query("DELETE FROM `payment` WHERE `pay_date` < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND pay_amount != '0.00' ORDER BY `id` ASC LIMIT 5");curl_exec (line:168);$responsed = curl_exec($curld);$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Changes.txt-
- Full path:
- abi/web/js/jqgrid/js/Changes.txt
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:23 12/12/2025
- Last modified:
- 23:22:29 10/12/2025
- MD5 hash:
- c0a4adbc3f1c6d592cb4fa8433fee9ea
- Filesize:
- 44.32 KB
- suspicious functions used:
- system (line:87);
* Add a ant based build system which allow us to minify the JS code - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: createpayment.php-
- Full path:
- abi/m/createpayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:23 12/12/2025
- Last modified:
- 23:21:36 10/12/2025
- MD5 hash:
- 849185f307be30eafb1bbef93616d8c3
- Filesize:
- 1.71 KB
- suspicious functions used:
- curl_exec (line:57);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: executepayment.php-
- Full path:
- abi/m/executepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:23 12/12/2025
- Last modified:
- 23:21:36 10/12/2025
- MD5 hash:
- 9a3f22521ad987e86f84c4f5f688d5b7
- Filesize:
- 713 B
- suspicious functions used:
- curl_exec (line:18);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: index.php-
- Full path:
- abi/m/index.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 03:22:38 12/12/2025
- Last modified:
- 23:21:36 10/12/2025
- MD5 hash:
- bf40aac4eeeba3896473bc8e38387d44
- Filesize:
- 16.47 KB
- suspicious functions used:
- curl_exec (line:282);
$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: LoginByPass.php-
- Full path:
- abi/m/LoginByPass.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:23 12/12/2025
- Last modified:
- 23:21:36 10/12/2025
- MD5 hash:
- ce55a8f81ccab7d07744fd3914d6ee35
- Filesize:
- 4.65 KB
- suspicious functions used:
- curl_exec (line:44);curl_exec (line:69);
$jsona = curl_exec($ch10);$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: login_exec.php-
- Full path:
- abi/m/login_exec.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 03:22:38 12/12/2025
- Last modified:
- 23:21:36 10/12/2025
- MD5 hash:
- 535239423beafff9771c5e5e9f24a68b
- Filesize:
- 12.3 KB
- suspicious functions used:
- curl_exec (line:25);curl_exec (line:81);
$jsona = curl_exec($ch10);curl_exec (line:200);$result110 = curl_exec($ch11);curl_exec (line:238);$jsona = curl_exec($ch10);$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: nagad-merchant-callback.php-
- Full path:
- abi/m/nagad-merchant-callback.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:23 12/12/2025
- Last modified:
- 23:21:36 10/12/2025
- MD5 hash:
- 3fcf93d3aec6449a76e27b14f01ada02
- Filesize:
- 11.32 KB
- suspicious functions used:
- curl_exec (line:20);
$file_contents = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: netowrk-snmp-data.php-
- Full path:
- abi/m/netowrk-snmp-data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 11:54:08 12/12/2025
- Last modified:
- 23:21:36 10/12/2025
- MD5 hash:
- a0f9ff194951c18f7390ef750529f434
- Filesize:
- 24.14 KB
- suspicious functions used:
- shell_exec (line:96);shell_exec (line:105);
$output = shell_exec($command . " 2>&1");shell_exec (line:115);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:134);$output_port = shell_exec($commandd . " 2>&1");shell_exec (line:146);$output = shell_exec($command . " 2>&1");shell_exec (line:157);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:173);$output_port = shell_exec($commandd);shell_exec (line:183);$output_oid_bdcom = shell_exec($command_oid_bdcom . " 2>&1");shell_exec (line:199);$outputs = shell_exec($commanda);shell_exec (line:219);$output_port = shell_exec($commandd_bdcom);shell_exec (line:229);$output_oid_cdata = shell_exec($command_oid_cdata . " 2>&1");shell_exec (line:234);$outputs = shell_exec($commanda);shell_exec (line:242);$outs = shell_exec($canda);shell_exec (line:262);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:278);$outpdut_port = shell_exec($commandd_cdata);`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:291);$output_oid_gcom = shell_exec($command_oid_gcom . " 2>&1");shell_exec (line:297);$querydd = mysqli_query($con, "SELECT `olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND `olt_id` = '$olt_id' AND sts = '0'");shell_exec (line:430);$output_vlan = shell_exec($command_vlan . " 2>&1");$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentOnlineQuery.php-
- Full path:
- abi/m/PaymentOnlineQuery.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 11:22:46 12/12/2025
- Last modified:
- 23:21:37 10/12/2025
- MD5 hash:
- 6483645d440dd2f976cc1b29cb4021d5
- Filesize:
- 20.95 KB
- suspicious functions used:
- curl_exec (line:287);curl_exec (line:492);
$resultdata=curl_exec($url);$content = curl_exec($handle ); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentOnlineQuery2.php-
- Full path:
- abi/m/PaymentOnlineQuery2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:24 12/12/2025
- Last modified:
- 23:21:37 10/12/2025
- MD5 hash:
- 3660992067d5591fc79ce89d6dbb9274
- Filesize:
- 19.08 KB
- suspicious functions used:
- curl_exec (line:41);curl_exec (line:254);
$resultdatax=curl_exec($url);$result = curl_exec($handle); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: support-action.php-
- Full path:
- abi/m/support-action.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:24 12/12/2025
- Last modified:
- 23:21:37 10/12/2025
- MD5 hash:
- adb69d6d3e277ad4c464c4fd0c41b4ca
- Filesize:
- 10.29 KB
- suspicious functions used:
- curl_exec (line:99);
$jsona = curl_exec($ch10); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tagreeexpayment.php-
- Full path:
- abi/m/tagreeexpayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:24 12/12/2025
- Last modified:
- 23:21:37 10/12/2025
- MD5 hash:
- c95e3ee881752db67b4f3597bc58430a
- Filesize:
- 2.46 KB
- suspicious functions used:
- curl_exec (line:26);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tcreateagree.php-
- Full path:
- abi/m/tcreateagree.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:24 12/12/2025
- Last modified:
- 23:21:37 10/12/2025
- MD5 hash:
- 27a10adf4190edc7eceee8cf74a6b72b
- Filesize:
- 999 B
- suspicious functions used:
- curl_exec (line:26);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tcreatepayment.php-
- Full path:
- abi/m/tcreatepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 11:22:34 12/12/2025
- Last modified:
- 23:21:37 10/12/2025
- MD5 hash:
- e49de9a33f5164bc2c6b88e4770faaff
- Filesize:
- 1.07 KB
- suspicious functions used:
- curl_exec (line:27);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: texecutepayment.php-
- Full path:
- abi/m/texecutepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 11:22:45 12/12/2025
- Last modified:
- 23:21:37 10/12/2025
- MD5 hash:
- efbb63dfcfdacb52dec74bffc389bbb3
- Filesize:
- 2.67 KB
- suspicious functions used:
- curl_exec (line:24);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: token.php-
- Full path:
- abi/m/token.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:24 12/12/2025
- Last modified:
- 23:21:37 10/12/2025
- MD5 hash:
- 7d8e71ceda3ffb74623e0c4a814715af
- Filesize:
- 1.53 KB
- suspicious functions used:
- curl_exec (line:42);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ttoken.php-
- Full path:
- abi/m/ttoken.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 11:22:21 12/12/2025
- Last modified:
- 23:21:37 10/12/2025
- MD5 hash:
- 5f2c51c1db5b0defadfb67ce25c0098f
- Filesize:
- 1.54 KB
- suspicious functions used:
- curl_exec (line:42);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: AutoActiveClientsCount1.php-
- Full path:
- his/web/AutoActiveClientsCount1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 13:31:05 12/12/2025
- Last modified:
- 00:45:26 28/12/2024
- MD5 hash:
- 3b3b6186ff2d9c5abd1772e5aa02ee33
- Filesize:
- 6.4 KB
- suspicious functions used:
- system (line:58);
$ARRAY = $API->comm("/system/resource/print"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: AutoActiveClientsCount11.php-
- Full path:
- his/web/AutoActiveClientsCount11.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:25 12/12/2025
- Last modified:
- 00:45:26 28/12/2024
- MD5 hash:
- a0090e4a11dd59b955a6edd549b6ef2f
- Filesize:
- 5.85 KB
- suspicious functions used:
- system (line:54);
$ARRAY = $API->comm("/system/resource/print"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: client-online-mbb.php-
- Full path:
- his/web/client-online-mbb.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:26 12/12/2025
- Last modified:
- 00:45:32 28/12/2024
- MD5 hash:
- e16c33ab6ddd7649ea56a7d5355365b6
- Filesize:
- 16.46 KB
- suspicious functions used:
- curl_exec (line:90);curl_exec (line:289);
$resp = curl_exec($curlss);$resp = curl_exec($curlss); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: clients-nots-action.php-
- Full path:
- his/web/clients-nots-action.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:26 12/12/2025
- Last modified:
- 00:45:35 28/12/2024
- MD5 hash:
- dff1bb495509427d098cb4588da553b9
- Filesize:
- 5.89 KB
- suspicious functions used:
- curl_exec (line:35);
$jsona = curl_exec($ch10); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Clients.php-
- Full path:
- his/web/Clients.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 17:04:15 12/12/2025
- Last modified:
- 00:45:36 28/12/2024
- MD5 hash:
- d59f33ca457016deee5f906de3f2ca83
- Filesize:
- 212.42 KB
- suspicious functions used:
- `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:844);
$result1rd=mysql_query("SELECT `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND `sts` = '0' order by b_name ASC"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Clients1.php-
- Full path:
- his/web/Clients1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:27 12/12/2025
- Last modified:
- 00:45:38 28/12/2024
- MD5 hash:
- a8db87dcc6beb97539ff152b767dadae
- Filesize:
- 219.37 KB
- suspicious functions used:
- `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:835);
$result1rd=mysql_query("SELECT `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND `sts` = '0' order by b_name ASC"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Clients2.php-
- Full path:
- his/web/Clients2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:27 12/12/2025
- Last modified:
- 00:45:38 28/12/2024
- MD5 hash:
- 982d6411552113b0715fd17c26f50292
- Filesize:
- 205.13 KB
- suspicious functions used:
- `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:832);
$result1rd=mysql_query("SELECT `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND `sts` = '0' order by b_name ASC"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Clients3.php-
- Full path:
- his/web/Clients3.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:27 12/12/2025
- Last modified:
- 00:45:39 28/12/2024
- MD5 hash:
- 50ddc869b383ab76e009c7a2c17c99a3
- Filesize:
- 175.31 KB
- suspicious functions used:
- `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:832);
$result1rd=mysql_query("SELECT `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND `sts` = '0' order by b_name ASC"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ClientsOnMap.php-
- Full path:
- his/web/ClientsOnMap.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:28 12/12/2025
- Last modified:
- 06:03:03 10/11/2025
- MD5 hash:
- 519edcd6a9ccec3397e6f5280db00605
- Filesize:
- 12.2 KB
- suspicious functions used:
- `${totalonline}` (line:97);`${totaloffline}` (line:98);
document.getElementById('totalonline').textContent = `${totalonline}`;`${results.rxPower}` (line:233);document.getElementById('totaloffline').textContent = `${totaloffline}`;`${results.distance}` (line:234);var rxPower = `${results.rxPower}`;`${results.supplyVoltage}` (line:235);var distance = `${results.distance}`;`${results.temperature}` (line:236);var supplyVoltage = `${results.supplyVoltage}`;`${results.txPower}` (line:237);var temperature = `${results.temperature}`;var txPower = `${results.txPower}`; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ClientView.php-
- Full path:
- his/web/ClientView.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:28 12/12/2025
- Last modified:
- 02:54:54 10/06/2025
- MD5 hash:
- e4d718675d4ae1c83d19f5b2dd21be36
- Filesize:
- 112.26 KB
- suspicious functions used:
- `olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:226);
$querydd = mysql_query("SELECT `olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND `olt_id` = '$c_olt_id' AND sts = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: company_info.php-
- Full path:
- his/web/company_info.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 16:20:38 12/12/2025
- Last modified:
- 00:45:43 28/12/2024
- MD5 hash:
- 27dc5fc579e655fb4687d27ea9f151bf
- Filesize:
- 8.49 KB
- suspicious functions used:
- curl_exec (line:132);
$alldata = curl_exec($chhhh); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: createpayment.php-
- Full path:
- his/web/createpayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:28 12/12/2025
- Last modified:
- 00:45:43 28/12/2024
- MD5 hash:
- ba9747d0421fd091b998389469e72a0b
- Filesize:
- 1.7 KB
- suspicious functions used:
- curl_exec (line:57);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_all.php-
- Full path:
- his/web/cron_all.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:28 12/12/2025
- Last modified:
- 00:45:43 28/12/2024
- MD5 hash:
- 967f1d654ae891609da26b9e0fdbd1ae
- Filesize:
- 2.44 KB
- suspicious functions used:
- curl_exec (line:23);curl_exec (line:38);
$result1 = curl_exec($ch1);curl_exec (line:53);$result1d = curl_exec($ch11);$result1d2 = curl_exec($ch112); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_gen_bill.php-
- Full path:
- his/web/cron_auto_gen_bill.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:28 12/12/2025
- Last modified:
- 00:45:43 28/12/2024
- MD5 hash:
- f1056618cc4402968e50d1232d2c51c8
- Filesize:
- 4.73 KB
- suspicious functions used:
- curl_exec (line:140);curl_exec (line:149);
$respd = curl_exec($curl);$resp = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_inactive.php-
- Full path:
- his/web/cron_auto_inactive.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:28 12/12/2025
- Last modified:
- 00:45:43 28/12/2024
- MD5 hash:
- 7e0dc4dd9dae2bf0220516641b53c027
- Filesize:
- 5.43 KB
- suspicious functions used:
- curl_exec (line:142);
$respw = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_inactive2.php-
- Full path:
- his/web/cron_auto_inactive2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:28 12/12/2025
- Last modified:
- 00:45:43 28/12/2024
- MD5 hash:
- 440bc24f05b01eb395df63fff2f60de9
- Filesize:
- 5.46 KB
- suspicious functions used:
- curl_exec (line:142);
$respw = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_inactive_termination.php-
- Full path:
- his/web/cron_auto_inactive_termination.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 20:55:06 11/12/2025
- Last modified:
- 00:45:43 28/12/2024
- MD5 hash:
- 9f9c8ca9110c2304128646824bfb17db
- Filesize:
- 12.16 KB
- suspicious functions used:
- curl_exec (line:241);curl_exec (line:253);
$resp = curl_exec($curlss);$respw = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_inactive_termination1.php-
- Full path:
- his/web/cron_auto_inactive_termination1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:28 12/12/2025
- Last modified:
- 00:45:43 28/12/2024
- MD5 hash:
- be76b964c93a2cb4fa7e632750ff3bc4
- Filesize:
- 6.64 KB
- suspicious functions used:
- curl_exec (line:156);curl_exec (line:168);
$resp = curl_exec($curlss);$respw = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_termination_remainder1.php-
- Full path:
- his/web/cron_auto_termination_remainder1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 03:05:23 12/12/2025
- Last modified:
- 00:45:43 28/12/2024
- MD5 hash:
- 7765f9f820dbd402f1064fab9958ffaa
- Filesize:
- 3.26 KB
- suspicious functions used:
- curl_exec (line:83);
$respw = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_client_bandwidth_count.php-
- Full path:
- his/web/cron_client_bandwidth_count.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:23:14 12/12/2025
- Last modified:
- 00:45:43 28/12/2024
- MD5 hash:
- 1c71a3dd097275429ae845a85ced0438
- Filesize:
- 5.33 KB
- suspicious functions used:
- curl_exec (line:124);curl_exec (line:134);
$result = curl_exec($ch);$result1dd = curl_exec($ch111); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_network.php-
- Full path:
- his/web/cron_network.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 00:00:37 12/12/2025
- Last modified:
- 00:45:43 28/12/2024
- MD5 hash:
- db096f353e80027593ca3f9781a21ac8
- Filesize:
- 4.93 KB
- suspicious functions used:
- curl_exec (line:45);curl_exec (line:67);
$result1d = curl_exec($ch11);curl_exec (line:127);$result1dd = curl_exec($ch111);$result1dd = curl_exec($ch111); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_olt.php-
- Full path:
- his/web/cron_olt.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 21:15:14 11/12/2025
- Last modified:
- 00:45:43 28/12/2024
- MD5 hash:
- 6975951fdbf566164ba5fa5cfcd32ec7
- Filesize:
- 4.27 KB
- suspicious functions used:
- shell_exec (line:48);curl_exec (line:127);
$output = shell_exec($command);$result1dd = curl_exec($ch111); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_olt_clients_catch.php-
- Full path:
- his/web/cron_olt_clients_catch.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:28 12/12/2025
- Last modified:
- 00:45:43 28/12/2024
- MD5 hash:
- 3b13c163ba3445b3d661c63adde1d985
- Filesize:
- 1.12 KB
- suspicious functions used:
- curl_exec (line:23);
$result1d = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_olt_user.php-
- Full path:
- his/web/cron_olt_user.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:28 12/12/2025
- Last modified:
- 00:45:44 28/12/2024
- MD5 hash:
- 67aa237639e3d1e6064e76079bb3cccc
- Filesize:
- 1.97 KB
- suspicious functions used:
- curl_exec (line:19);curl_exec (line:46);
$resultd1d = curl_exec($ch110);$result1d = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: emp_salary_advence_find.php-
- Full path:
- his/web/emp_salary_advence_find.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:29 12/12/2025
- Last modified:
- 00:45:45 28/12/2024
- MD5 hash:
- 74a7e2ffda0f7584611d7cbce6136c24
- Filesize:
- 2.25 KB
- suspicious functions used:
- `expanse` WHERE `type` = '2' AND `status` = '2' AND ex_by = '$e_id' AND MONTH(`, `) = MONTH('$lastmonth') AND YEAR(`, `) = YEAR('$lastmonth') GROUP BY ` (line:8);`e_id` = '$e_id' AND ` (line:12);
$vendorrr = mysql_query("SELECT SUM(amount) AS salary_advance FROM `expanse` WHERE `type` = '2' AND `status` = '2' AND ex_by = '$e_id' AND MONTH(`check_date`) = MONTH('$lastmonth') AND YEAR(`check_date`) = YEAR('$lastmonth') GROUP BY `ex_by`");$empppp = mysql_query("SELECT gross_total AS gross_total FROM emp_info WHERE `e_id` = '$e_id' AND `status` = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: executepayment.php-
- Full path:
- his/web/executepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:29 12/12/2025
- Last modified:
- 00:45:45 28/12/2024
- MD5 hash:
- c46a50905333286f45dfeacf010851ab
- Filesize:
- 716 B
- suspicious functions used:
- curl_exec (line:18);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: getclientuptime.php-
- Full path:
- his/web/getclientuptime.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:29 12/12/2025
- Last modified:
- 00:45:47 28/12/2024
- MD5 hash:
- bbc14cdd451c72b94d78c7d2d1af0b52
- Filesize:
- 718 B
- suspicious functions used:
- curl_exec (line:18);
$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: imagevwr.php-
- Full path:
- his/web/imagevwr.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:29 12/12/2025
- Last modified:
- 00:45:47 28/12/2024
- MD5 hash:
- 47a223a13cc642d01dcfaaca542d396d
- Filesize:
- 915 B
- suspicious functions used:
- curl_exec (line:15);
$image_data = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: index.php-
- Full path:
- his/web/index.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 18:47:44 12/12/2025
- Last modified:
- 18:50:35 11/08/2025
- MD5 hash:
- 3a6751fa085868f414ad6355760df168
- Filesize:
- 16.68 KB
- suspicious functions used:
- curl_exec (line:298);
$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: index1.php-
- Full path:
- his/web/index1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:29 12/12/2025
- Last modified:
- 00:45:47 28/12/2024
- MD5 hash:
- 275982caaa4c6189f7295519da320d68
- Filesize:
- 16.83 KB
- suspicious functions used:
- curl_exec (line:298);
$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: index3.php-
- Full path:
- his/web/index3.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:29 12/12/2025
- Last modified:
- 00:45:48 28/12/2024
- MD5 hash:
- f161ab23adf4527023a0ad582d478f89
- Filesize:
- 12.45 KB
- suspicious functions used:
- base64_decode (line:10);curl_exec (line:183);
list($encrypted_data,$iv,$key) = explode('::',base64_decode($ciphertext));$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: InstrumentsStoreOutDetails.php-
- Full path:
- his/web/InstrumentsStoreOutDetails.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:29 12/12/2025
- Last modified:
- 00:45:48 28/12/2024
- MD5 hash:
- a60c19f766bfff1ccdccbeba6b39eb87
- Filesize:
- 9.37 KB
- suspicious functions used:
- `update_date`, '%D-%b, %y') AS offdate, TIME_FORMAT(`update_time`, '%T') AS offtime FROM `con_sts_log` WHERE `c_id` = '{$row['c_id']}' AND con_sts = 'Inactive' ORDER BY ` (line:120);
$resultwwdd=mysql_query("SELECT DATE_FORMAT(`update_date`, '%D-%b, %y') AS offdate, TIME_FORMAT(`update_time`, '%T') AS offtime FROM `con_sts_log` WHERE `c_id` = '{$row['c_id']}' AND con_sts = 'Inactive' ORDER BY `update_date_time` DESC LIMIT 1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ip-ping-checker.php-
- Full path:
- his/web/ip-ping-checker.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:29 12/12/2025
- Last modified:
- 00:45:48 28/12/2024
- MD5 hash:
- 0d28f3053b73b3fe2885cf519ee17c12
- Filesize:
- 2.64 KB
- suspicious functions used:
- curl_exec (line:81);
$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: LoginByPass.php-
- Full path:
- his/web/LoginByPass.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 13:37:17 12/12/2025
- Last modified:
- 00:45:49 28/12/2024
- MD5 hash:
- a8f1789daadb34b0814aaecddfebe7c1
- Filesize:
- 4.26 KB
- suspicious functions used:
- curl_exec (line:41);
$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: loginexec.php-
- Full path:
- his/web/loginexec.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:29 12/12/2025
- Last modified:
- 00:45:49 28/12/2024
- MD5 hash:
- edb8017e7d0f8e037facbcacc94a383d
- Filesize:
- 5.91 KB
- suspicious functions used:
- curl_exec (line:67);
$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: login_exec.php-
- Full path:
- his/web/login_exec.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 08:19:29 12/12/2025
- Last modified:
- 00:45:49 28/12/2024
- MD5 hash:
- c323195dc62dec584fec86b3dbc7a90e
- Filesize:
- 11.63 KB
- suspicious functions used:
- curl_exec (line:23);curl_exec (line:79);
$jsona = curl_exec($ch10);curl_exec (line:226);$result110 = curl_exec($ch11);$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: login_exec1.php-
- Full path:
- his/web/login_exec1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:29 12/12/2025
- Last modified:
- 00:45:49 28/12/2024
- MD5 hash:
- 02ba9b912a83fab5a78993048bf63f09
- Filesize:
- 6.39 KB
- suspicious functions used:
- curl_exec (line:116);
$result110 = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: login_exec3.php-
- Full path:
- his/web/login_exec3.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:29 12/12/2025
- Last modified:
- 00:45:49 28/12/2024
- MD5 hash:
- 9038a77a32a5db2c9affae1496473f3e
- Filesize:
- 5.27 KB
- suspicious functions used:
- curl_exec (line:62);
$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: nagad-helper.php-
- Full path:
- his/web/nagad-helper.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:30 12/12/2025
- Last modified:
- 00:45:55 28/12/2024
- MD5 hash:
- 2bb70c44d68202e0a0cd8ae1388f0b1b
- Filesize:
- 6.74 KB
- suspicious functions used:
- curl_exec (line:61);base64_decode (line:97);
$resultData = curl_exec($url);openssl_private_decrypt(base64_decode($cryptText), $plain_text, $private_key); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: nagad-merchant-callback.php-
- Full path:
- his/web/nagad-merchant-callback.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:30 12/12/2025
- Last modified:
- 00:45:55 28/12/2024
- MD5 hash:
- abc8d9e7aad4d9c622dcd97e701448bc
- Filesize:
- 16.5 KB
- suspicious functions used:
- curl_exec (line:20);
$file_contents = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: netowrk-olt-all-mac-array.php-
- Full path:
- his/web/netowrk-olt-all-mac-array.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:30 12/12/2025
- Last modified:
- 00:45:55 28/12/2024
- MD5 hash:
- b0168ce99145e2afe64357247d750dd6
- Filesize:
- 4.62 KB
- suspicious functions used:
- shell_exec (line:33);shell_exec (line:47);
$output = shell_exec($command . " 2>&1");shell_exec (line:61);$output = shell_exec($command . " 2>&1");shell_exec (line:76);$output_oid_bdcom = shell_exec($command_oid_bdcom . " 2>&1");shell_exec (line:93);$output_oid_cdata = shell_exec($command_oid_cdata . " 2>&1");$output_oid_gcom = shell_exec($command_oid_gcom . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: netowrk-snmp-data.php-
- Full path:
- his/web/netowrk-snmp-data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:30 12/12/2025
- Last modified:
- 00:45:55 28/12/2024
- MD5 hash:
- 9badf5c53b260315a061e1bb6cd2378f
- Filesize:
- 24.8 KB
- suspicious functions used:
- shell_exec (line:104);shell_exec (line:113);
$output = shell_exec($command . " 2>&1");shell_exec (line:123);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:142);$output_port = shell_exec($commandd . " 2>&1");shell_exec (line:154);$output = shell_exec($command . " 2>&1");shell_exec (line:165);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:181);$output_port = shell_exec($commandd);shell_exec (line:191);$output_oid_bdcom = shell_exec($command_oid_bdcom . " 2>&1");shell_exec (line:207);$outputs = shell_exec($commanda);shell_exec (line:227);$output_port = shell_exec($commandd_bdcom);shell_exec (line:236);$output_oid_cdata = shell_exec($command_oid_cdata . " 2>&1");shell_exec (line:244);$outputs = shell_exec($commanda);shell_exec (line:251);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:256);$output_pon = shell_exec($command_ponn . " 2>&1");`pon_name` FROM `olt_pon` WHERE `olt_pon_id` = '$pon_id' AND ` (line:263);$outsddd = shell_exec($commddandd);shell_exec (line:280);$qrydd = mysqli_query($con, "SELECT `pon_name` FROM `olt_pon` WHERE `olt_pon_id` = '$pon_id' AND `olt_id` = '$olt_id' AND sts = '0'");shell_exec (line:290);$outsdd = shell_exec($commddand);`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:303);$output_oid_gcom = shell_exec($command_oid_gcom . " 2>&1");shell_exec (line:309);$querydd = mysqli_query($con, "SELECT `olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND `olt_id` = '$olt_id' AND sts = '0'");shell_exec (line:444);$output_vlan = shell_exec($command_vlan . " 2>&1");$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-old-onu-rx-map.php-
- Full path:
- his/web/network-old-onu-rx-map.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:30 12/12/2025
- Last modified:
- 00:45:55 28/12/2024
- MD5 hash:
- b4962c160c5ad68ccd8eed9c48d82a0f
- Filesize:
- 6.94 KB
- suspicious functions used:
- shell_exec (line:76);
$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-old-onu-rx.php-
- Full path:
- his/web/network-old-onu-rx.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:30 12/12/2025
- Last modified:
- 00:45:55 28/12/2024
- MD5 hash:
- b4962c160c5ad68ccd8eed9c48d82a0f
- Filesize:
- 6.94 KB
- suspicious functions used:
- shell_exec (line:76);
$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-client-onu-mac-count-cdata.php-
- Full path:
- his/web/network-olt-client-onu-mac-count-cdata.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:30 12/12/2025
- Last modified:
- 00:45:55 28/12/2024
- MD5 hash:
- c378dbabf36066c335cfb8838a6e167d
- Filesize:
- 4.58 KB
- suspicious functions used:
- shell_exec (line:25);shell_exec (line:35);
$od_vddlan = shell_exec($codmn . " 2>&1");shell_exec (line:56);$od_vddlan = shell_exec($codmn . " 2>&1");shell_exec (line:103);$output_vdlan = shell_exec($command_dvlan . " 2>&1");shell_exec (line:115);$od_vdlan = shell_exec($coddvlan . " 2>&1");shell_exec (line:126);$output_port = shell_exec($commandd_bdcom);shell_exec (line:140);$od_vddlan = shell_exec($codmn . " 2>&1");$od_vdddlan = shell_exec($codmdn . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-client-onu-mac-count.php-
- Full path:
- his/web/network-olt-client-onu-mac-count.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:30 12/12/2025
- Last modified:
- 00:45:55 28/12/2024
- MD5 hash:
- 300ca68aa5a7a32160838b9f2627d2aa
- Filesize:
- 14.56 KB
- suspicious functions used:
- shell_exec (line:26);shell_exec (line:36);
$od_vddlan = shell_exec($codmn . " 2>&1");shell_exec (line:68);$od_vddlan = shell_exec($codmn . " 2>&1");shell_exec (line:84);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:101);$outpudt_vlan = shell_exec($commadnd_vlan . " 2>&1");shell_exec (line:119);$output_port = shell_exec($commandd_bdcom);shell_exec (line:135);$output_vdlan = shell_exec($command_vdlan . " 2>&1");shell_exec (line:176);$outpdut_vdlan = shell_exec($commadnd_dvlan . " 2>&1");shell_exec (line:236);$output_vdlan = shell_exec($command_dvlan . " 2>&1");shell_exec (line:312);$outpdut_vdlan = shell_exec($commadnd_dvlan . " 2>&1");shell_exec (line:379);$output_vdlan = shell_exec($command_dvlan . " 2>&1");shell_exec (line:441);$od_vddddlan = shell_exec($codmddn . " 2>&1");shell_exec (line:460);$od_vdlan = shell_exec($coddvlan . " 2>&1");shell_exec (line:479);$od_vddlan = shell_exec($codmn . " 2>&1");$od_vdddlan = shell_exec($codmdn . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-client-onu-mac-countt.php-
- Full path:
- his/web/network-olt-client-onu-mac-countt.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:30 12/12/2025
- Last modified:
- 00:45:55 28/12/2024
- MD5 hash:
- d29b4e72c375f528b769bd3894f9f0e7
- Filesize:
- 8.95 KB
- suspicious functions used:
- shell_exec (line:26);shell_exec (line:36);
$od_vddlan = shell_exec($codmn . " 2>&1");shell_exec (line:59);$od_vddlan = shell_exec($codmn . " 2>&1");shell_exec (line:75);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:92);$outpudt_vlan = shell_exec($commadnd_vlan . " 2>&1");shell_exec (line:102);$output_port = shell_exec($commandd_bdcom);shell_exec (line:117);$output_vdlan = shell_exec($command_vdlan . " 2>&1");shell_exec (line:155);$outpdut_vdlan = shell_exec($commadnd_dvlan . " 2>&1");shell_exec (line:206);$output_vdlan = shell_exec($command_dvlan . " 2>&1");shell_exec (line:262);$od_vddddlan = shell_exec($codmddn . " 2>&1");shell_exec (line:275);$od_vdlan = shell_exec($coddvlan . " 2>&1");shell_exec (line:288);$od_vddlan = shell_exec($codmn . " 2>&1");$od_vdddlan = shell_exec($codmdn . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-con-sts.php-
- Full path:
- his/web/network-olt-con-sts.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:30 12/12/2025
- Last modified:
- 00:45:56 28/12/2024
- MD5 hash:
- a26b0a1c1567c34c9aa5e2e0254ff8a6
- Filesize:
- 4 KB
- suspicious functions used:
- `olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:10);shell_exec (line:38);
$query = mysqli_query($con, "SELECT `olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND `sts` = '0'");`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, `last_synced`, `last_update`, `msg`, `full_msg`, ROUND((SELECT AVG(value) FROM olt_onu_history WHERE alarm_id = '$alarmId' AND value != ''), 2) AS average_value FROM `, ` WHERE `alarm_id` = '$alarmId' AND ` (line:82);$output = shell_exec($command);$query = mysqli_query($con, "SELECT `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, `last_synced`, `last_update`, `msg`, `full_msg`, ROUND((SELECT AVG(value) FROM olt_onu_history WHERE alarm_id = '$alarmId' AND value != ''), 2) AS average_value FROM `olt_onu_history` WHERE `alarm_id` = '$alarmId' AND `value` != ''"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-load.php-
- Full path:
- his/web/network-olt-load.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:30 12/12/2025
- Last modified:
- 00:45:56 28/12/2024
- MD5 hash:
- f49d5153285c639ed91d4e806685ee56
- Filesize:
- 1.33 KB
- suspicious functions used:
- shell_exec (line:22);shell_exec (line:25);
$output = shell_exec($command . " 2>&1");$output1 = shell_exec($command1 . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-oid-check.php-
- Full path:
- his/web/network-olt-oid-check.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:30 12/12/2025
- Last modified:
- 00:45:56 28/12/2024
- MD5 hash:
- 5b7dc0ce1103fbfc895873c250b63141
- Filesize:
- 1.88 KB
- suspicious functions used:
- shell_exec (line:33);
return shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-onu-alarm-add.php-
- Full path:
- his/web/network-olt-onu-alarm-add.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:30 12/12/2025
- Last modified:
- 00:45:56 28/12/2024
- MD5 hash:
- be6ba82c658419e1454f778e20e2d4c3
- Filesize:
- 7.86 KB
- suspicious functions used:
- shell_exec (line:103);
$output = shell_exec($command . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-onu-count.php-
- Full path:
- his/web/network-olt-onu-count.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:30 12/12/2025
- Last modified:
- 00:45:56 28/12/2024
- MD5 hash:
- eed277fdd838fc119df53ba5ebda8a77
- Filesize:
- 5.44 KB
- suspicious functions used:
- `olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:11);shell_exec (line:69);
$query = mysqli_query($con, "SELECT `olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND `online_sts` = '1' AND `sts` = '0'");$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-onu-list-data.php-
- Full path:
- his/web/network-olt-onu-list-data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:30 12/12/2025
- Last modified:
- 00:45:56 28/12/2024
- MD5 hash:
- 54cc9417c766c31317311c3722ce7d4b
- Filesize:
- 9.48 KB
- suspicious functions used:
- shell_exec (line:24);shell_exec (line:38);
$outputs = shell_exec($commanda);shell_exec (line:64);$output = shell_exec($command);shell_exec (line:85);$outputs = shell_exec($commanda);shell_exec (line:104);$output = shell_exec($command);shell_exec (line:125);$outputs = shell_exec($commanda);shell_exec (line:143);$output = shell_exec($command);shell_exec (line:153);$od_vdlan = shell_exec($commanda . " 2>&1");shell_exec (line:165);$od_vdland = shell_exec($coddvland . " 2>&1");shell_exec (line:185);$outputs = shell_exec($coddvladnd . " 2>&1");$output_vdlan = shell_exec($command_vdlan); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-onu-power.php-
- Full path:
- his/web/network-olt-onu-power.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:30 12/12/2025
- Last modified:
- 00:45:56 28/12/2024
- MD5 hash:
- 2e064543b67b532bdf4e5b12d49c5052
- Filesize:
- 7.54 KB
- suspicious functions used:
- shell_exec (line:97);
$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-pon-clients-search.php-
- Full path:
- his/web/network-olt-pon-clients-search.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:30 12/12/2025
- Last modified:
- 00:45:56 28/12/2024
- MD5 hash:
- 79d26fc66abdab6f173330588aa8b238
- Filesize:
- 10.93 KB
- suspicious functions used:
- shell_exec (line:42);shell_exec (line:51);
$output = shell_exec($command . " 2>&1");shell_exec (line:104);$outputS = shell_exec($command . " 2>&1");shell_exec (line:168);$snmpOutput = shell_exec($command);$snmpOutput = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-pon-onu-search-bdcom.php-
- Full path:
- his/web/network-olt-pon-onu-search-bdcom.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:30 12/12/2025
- Last modified:
- 00:45:56 28/12/2024
- MD5 hash:
- c786fa8b69268c738b6ff976631798cd
- Filesize:
- 27.74 KB
- suspicious functions used:
- shell_exec (line:60);shell_exec (line:69);
$output = shell_exec($command . " 2>&1");shell_exec (line:383);$outputS = shell_exec($commandS . " 2>&1");$snmpOutput = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-pon-onu-search-bdcom1.php-
- Full path:
- his/web/network-olt-pon-onu-search-bdcom1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:30 12/12/2025
- Last modified:
- 00:45:56 28/12/2024
- MD5 hash:
- dd18677b1dcbf7f0bce2ac6912d98da0
- Filesize:
- 9.6 KB
- suspicious functions used:
- shell_exec (line:42);shell_exec (line:51);
$output = shell_exec($command . " 2>&1");shell_exec (line:129);$outputS = shell_exec($command . " 2>&1");$snmpOutput = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-pon-onu-search.php-
- Full path:
- his/web/network-olt-pon-onu-search.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:30 12/12/2025
- Last modified:
- 00:45:56 28/12/2024
- MD5 hash:
- dc183ecf77d0e1f56f672338fd09cfa5
- Filesize:
- 21.62 KB
- suspicious functions used:
- shell_exec (line:35);
$output = shell_exec($command . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-snmp-onu-status-data-bdcom.php-
- Full path:
- his/web/network-snmp-onu-status-data-bdcom.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:30 12/12/2025
- Last modified:
- 00:45:57 28/12/2024
- MD5 hash:
- 065f5e2b05932ee66d473135998580ac
- Filesize:
- 23.53 KB
- suspicious functions used:
- shell_exec (line:48);shell_exec (line:73);
$oudddputsd = shell_exec($commddanda . " 2>&1");shell_exec (line:85);$oudddputsd = shell_exec($commddanda . " 2>&1");shell_exec (line:103);$oudddputsd = shell_exec($commddanda . " 2>&1");shell_exec (line:116);$output = shell_exec($command . " 2>&1");shell_exec (line:128);$outputs = shell_exec($commanda);shell_exec (line:134);$outpdut = shell_exec($commandd . " 2>&1");shell_exec (line:159);$oddutpdut = shell_exec($cmandd . " 2>&1");shell_exec (line:172);$output = shell_exec($command . " 2>&1");shell_exec (line:184);$outputs = shell_exec($commanda);shell_exec (line:190);$outpdut = shell_exec($commandd . " 2>&1");shell_exec (line:217);$oddutpdut = shell_exec($cmandd . " 2>&1");shell_exec (line:233);$output_oid_cdata = shell_exec($command_oid_cdata . " 2>&1");shell_exec (line:239);$outputs = shell_exec($commanda);shell_exec (line:244);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:248);$output_pon = shell_exec($command_ponn . " 2>&1");`pon_name` FROM `olt_pon` WHERE `olt_pon_id` = '$ponn_id' AND ` (line:255);$outsddd = shell_exec($commddandd);shell_exec (line:263);$qrydd = mysqli_query($con, "SELECT `pon_name` FROM `olt_pon` WHERE `olt_pon_id` = '$ponn_id' AND `olt_id` = '$olt_id' AND sts = '0'");$oddutpdut = shell_exec($cmandd . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-snmp-onu-status-data.php-
- Full path:
- his/web/network-snmp-onu-status-data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:30 12/12/2025
- Last modified:
- 00:45:57 28/12/2024
- MD5 hash:
- 0adfee384bf349b50f11036947fd2a74
- Filesize:
- 30.37 KB
- suspicious functions used:
- shell_exec (line:38);`olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:42);
$outputs = shell_exec($snmpCommand);shell_exec (line:81);$re11=mysql_query("SELECT `olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND `olt_pon_id` = '$check_pon_name'");shell_exec (line:95);$outputs = shell_exec($snmpCommand);shell_exec (line:109);$outpdduts = shell_exec($sand);shell_exec (line:122);$outputs = shell_exec($snmpCommand);shell_exec (line:208);$outpdduts = shell_exec($sand);shell_exec (line:429);$outputsmac = shell_exec($snmpCommandmac);shell_exec (line:441);$outputsmac = shell_exec($snmpCommandmac);shell_exec (line:448);$outputsmac = shell_exec($snmpCommandmac);$output_vlan = shell_exec($command_vlan . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-snmp-onu-status-data1.php-
- Full path:
- his/web/network-snmp-onu-status-data1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:30 12/12/2025
- Last modified:
- 00:45:57 28/12/2024
- MD5 hash:
- 920bd1a592c36f7a1194b737642f8340
- Filesize:
- 15.96 KB
- suspicious functions used:
- shell_exec (line:33);`olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:37);
$outputs = shell_exec($snmpCommand);shell_exec (line:149);$re11=mysql_query("SELECT `olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND `olt_pon_id` = '$check_pon_name'");$outputsmac = shell_exec($snmpCommandmac); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-snmp-onu-status-data_vsol2.php-
- Full path:
- his/web/network-snmp-onu-status-data_vsol2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:30 12/12/2025
- Last modified:
- 00:45:57 28/12/2024
- MD5 hash:
- f22d022ddc284f4d8e1de3660da91db8
- Filesize:
- 15.61 KB
- suspicious functions used:
- shell_exec (line:34);shell_exec (line:113);
$outputs = shell_exec($snmpCommand);shell_exec (line:126);$outpdduts = shell_exec($sand);shell_exec (line:132);$outputsmac = shell_exec($snmpCommandmac);$output_vlan = shell_exec($command_vlan . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-tree-vartual-nodes.php-
- Full path:
- his/web/network-tree-vartual-nodes.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:30 12/12/2025
- Last modified:
- 00:45:57 28/12/2024
- MD5 hash:
- 3530b8bc3113544014b1746ecd67e834
- Filesize:
- 10.64 KB
- suspicious functions used:
- shell_exec (line:76);shell_exec (line:111);
$outputs = shell_exec($commanda);shell_exec (line:145);$outputs = shell_exec($commanda);shell_exec (line:181);$outputs = shell_exec($commanda);shell_exec (line:188);$od_vdlan = shell_exec($commanda . " 2>&1");$od_vdland = shell_exec($coddvland . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Network.php-
- Full path:
- his/web/Network.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:31 12/12/2025
- Last modified:
- 00:45:58 28/12/2024
- MD5 hash:
- d607c8f09f94a0c02106c793664556a9
- Filesize:
- 62 KB
- suspicious functions used:
- system (line:371);shell_exec (line:657);
$ARRAY = $API->comm("/system/resource/print");$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Network1.php-
- Full path:
- his/web/Network1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:31 12/12/2025
- Last modified:
- 00:45:58 28/12/2024
- MD5 hash:
- 1439ff5047e988cac3d6c62c99ed49a1
- Filesize:
- 63.32 KB
- suspicious functions used:
- system (line:374);shell_exec (line:660);
$ARRAY = $API->comm("/system/resource/print");$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkLoad.php-
- Full path:
- his/web/NetworkLoad.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:31 12/12/2025
- Last modified:
- 00:45:59 28/12/2024
- MD5 hash:
- e1632e66ee1b7394d3fb82751b924abe
- Filesize:
- 2.83 KB
- suspicious functions used:
- system (line:81);
$ARRAY = $API->comm("/system/resource/print"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkLoad1.php-
- Full path:
- his/web/NetworkLoad1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:31 12/12/2025
- Last modified:
- 00:45:59 28/12/2024
- MD5 hash:
- 176bd6931be34d7ef351d22897accc65
- Filesize:
- 759 B
- suspicious functions used:
- system (line:18);
$ARRAY = $API->comm("/system/resource/print"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkOltAddQuery.php-
- Full path:
- his/web/NetworkOltAddQuery.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:31 12/12/2025
- Last modified:
- 00:45:59 28/12/2024
- MD5 hash:
- ffcc97d9effb18c5391103911b7d9464
- Filesize:
- 6.6 KB
- suspicious functions used:
- shell_exec (line:21);
$output = shell_exec($command . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkOltOnuStatus.php-
- Full path:
- his/web/NetworkOltOnuStatus.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:31 12/12/2025
- Last modified:
- 00:45:59 28/12/2024
- MD5 hash:
- 7604d17efbb57bd0b4c3566aa2d27c36
- Filesize:
- 65.16 KB
- suspicious functions used:
- shell_exec (line:42);shell_exec (line:102);
$output = shell_exec($command . " 2>&1");shell_exec (line:677);$output = shell_exec($command . " 2>&1");shell_exec (line:793);$oddutpdut = shell_exec($cmandd . " 2>&1");shell_exec (line:906);$oddutpdut = shell_exec($cmandd . " 2>&1");$oddutpdut = shell_exec($cmandd . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkOltOnuStatus2.php-
- Full path:
- his/web/NetworkOltOnuStatus2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:31 12/12/2025
- Last modified:
- 00:46:00 28/12/2024
- MD5 hash:
- c9a14797fa4353d05bbd9427b6079250
- Filesize:
- 15.88 KB
- suspicious functions used:
- shell_exec (line:35);
$output = shell_exec($command . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkOltSense.php-
- Full path:
- his/web/NetworkOltSense.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:31 12/12/2025
- Last modified:
- 00:46:00 28/12/2024
- MD5 hash:
- 2be664ae5006367f629ca437a6d507f8
- Filesize:
- 18.26 KB
- suspicious functions used:
- `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, `last_synced`, `last_update`, `msg`, `full_msg`, ROUND((SELECT AVG(value) FROM olt_onu_history WHERE alarm_id = '$alarmId' AND value != ''), 2) AS average_value FROM `, ` WHERE `alarm_id` = '$alarmId' AND ` (line:123);
$querddy = mysql_query("SELECT `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, `last_synced`, `last_update`, `msg`, `full_msg`, ROUND((SELECT AVG(value) FROM olt_onu_history WHERE alarm_id = '$alarmId' AND value != ''), 2) AS average_value FROM `olt_onu_history` WHERE `alarm_id` = '$alarmId' AND `value` != ''"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkOltSenseDetails.php-
- Full path:
- his/web/NetworkOltSenseDetails.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:31 12/12/2025
- Last modified:
- 00:46:00 28/12/2024
- MD5 hash:
- 440096c601fc10b819a1f0f8330928b0
- Filesize:
- 14.17 KB
- suspicious functions used:
- `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:33);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:42);
$sql = mysql_query("SELECT `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND `value` != '' ORDER BY id DESC");`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:51);$sql = mysql_query("SELECT `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND `value` != '' ORDER BY id DESC");`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:60);$sql = mysql_query("SELECT `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND `value` != '' ORDER BY id DESC");$sql = mysql_query("SELECT `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND `value` != '' ORDER BY id DESC"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkOltSync.php-
- Full path:
- his/web/NetworkOltSync.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:31 12/12/2025
- Last modified:
- 00:46:00 28/12/2024
- MD5 hash:
- 06633d4b65a14d677358170dd0a84424
- Filesize:
- 1.87 KB
- suspicious functions used:
- curl_exec (line:18);
$result1dd = curl_exec($ch111); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: networktree-olt-onu-list-data.php-
- Full path:
- his/web/networktree-olt-onu-list-data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:31 12/12/2025
- Last modified:
- 00:46:00 28/12/2024
- MD5 hash:
- af4221fefa9c9051846a063ac4135560
- Filesize:
- 8.72 KB
- suspicious functions used:
- shell_exec (line:24);shell_exec (line:36);
$outputs = shell_exec($commanda);shell_exec (line:59);$output = shell_exec($command);shell_exec (line:78);$outputs = shell_exec($commanda);shell_exec (line:97);$output = shell_exec($command);shell_exec (line:116);$outputs = shell_exec($commanda);shell_exec (line:134);$output = shell_exec($command);shell_exec (line:143);$od_vdlan = shell_exec($commanda . " 2>&1");shell_exec (line:155);$od_vdland = shell_exec($coddvland . " 2>&1");shell_exec (line:175);$outputs = shell_exec($coddvladnd . " 2>&1");$output_vdlan = shell_exec($command_vdlan); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkTreeAddSave.php-
- Full path:
- his/web/NetworkTreeAddSave.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:31 12/12/2025
- Last modified:
- 00:46:01 28/12/2024
- MD5 hash:
- a9dbc374394f257ef79f2d4f60f9771d
- Filesize:
- 5.12 KB
- suspicious functions used:
- `network_tree` WHERE `olt_id` = '$olt_id' AND ` (line:57);
$resu11 = $con->query("SELECT tree_id AS pon_parent_id FROM `network_tree` WHERE `olt_id` = '$olt_id' AND `device_type` = '1' AND sts = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkTreeEdit1.php-
- Full path:
- his/web/NetworkTreeEdit1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:31 12/12/2025
- Last modified:
- 00:46:02 28/12/2024
- MD5 hash:
- 3396a6bdf9b5804bb208f38f37cc29a2
- Filesize:
- 35.81 KB
- suspicious functions used:
- `olt_onu` WHERE olt_id = '$olt_id' AND ` (line:207);
<?php $resultoff11d=mysql_query("SELECT id AS alarm_id, alarm_name FROM `olt_onu` WHERE olt_id = '$olt_id' AND `onu_name` LIKE '$pon_name1' ORDER BY id DESC"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkTreeEditSave.php-
- Full path:
- his/web/NetworkTreeEditSave.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:31 12/12/2025
- Last modified:
- 00:46:02 28/12/2024
- MD5 hash:
- 6c0f94f3ddde2ee6a93db1fa98971907
- Filesize:
- 12.41 KB
- suspicious functions used:
- `network_tree` WHERE `olt_id` = '$olt_id' AND ` (line:182);
$resu11 = $con->query("SELECT tree_id AS pon_parent_id FROM `network_tree` WHERE `olt_id` = '$olt_id' AND `device_type` = '1' AND sts = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkTreeList.php-
- Full path:
- his/web/NetworkTreeList.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:31 12/12/2025
- Last modified:
- 00:46:03 28/12/2024
- MD5 hash:
- acd468021993faf8575531952ae107f8
- Filesize:
- 21.98 KB
- suspicious functions used:
- `pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '{$row['olt_id']}' AND ` (line:287);
$result11=mysql_query("SELECT count(`pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '{$row['olt_id']}' AND `sts` = '0';"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkTreeMap.php-
- Full path:
- his/web/NetworkTreeMap.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:32 12/12/2025
- Last modified:
- 00:46:03 28/12/2024
- MD5 hash:
- 584d02944bd9de5a190ec6dc320fc49e
- Filesize:
- 24.24 KB
- suspicious functions used:
- `${results.rxPower}` (line:263);`${results.distance}` (line:264);
var rxPower = `${results.rxPower}`;`${results.supplyVoltage}` (line:265);var distance = `${results.distance}`;`${results.temperature}` (line:266);var supplyVoltage = `${results.supplyVoltage}`;`${results.txPower}` (line:267);var temperature = `${results.temperature}`;`${results.rxPower}` (line:283);var txPower = `${results.txPower}`;`${results.distance}` (line:284);var rxPower = `${results.rxPower}`;`${results.supplyVoltage}` (line:285);var distance = `${results.distance}`;`${results.temperature}` (line:286);var supplyVoltage = `${results.supplyVoltage}`;`${results.txPower}` (line:287);var temperature = `${results.temperature}`;var txPower = `${results.txPower}`; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkTreeMap1.php-
- Full path:
- his/web/NetworkTreeMap1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:32 12/12/2025
- Last modified:
- 00:46:03 28/12/2024
- MD5 hash:
- 31a3ae9bc0bdb18726ed860ec6e8ec97
- Filesize:
- 36.43 KB
- suspicious functions used:
- `networktree_marker_data.php?tree_id=${markerId}` (line:231);`${results.rxPower}` (line:311);
fetch(`networktree_marker_data.php?tree_id=${markerId}`)`${results.distance}` (line:312);var rxPower = `${results.rxPower}`;`${results.supplyVoltage}` (line:313);var distance = `${results.distance}`;`${results.temperature}` (line:314);var supplyVoltage = `${results.supplyVoltage}`;`${results.txPower}` (line:315);var temperature = `${results.temperature}`;var txPower = `${results.txPower}`; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: networktree_device_onu_list_add.php-
- Full path:
- his/web/networktree_device_onu_list_add.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:32 12/12/2025
- Last modified:
- 00:46:03 28/12/2024
- MD5 hash:
- 444ccf3c3e852a5a25cc4ccd3a5cf9ca
- Filesize:
- 14.66 KB
- suspicious functions used:
- `network_tree` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND device_type = '5' AND ` (line:9);shell_exec (line:33);
$resu11=mysql_query("SELECT pon_index_id FROM `network_tree` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND device_type = '5' AND `sts` = '0'");`network_tree` WHERE `onu_mac` = '$mac_address' AND ` (line:131);$output = shell_exec($command . " 2>&1");shell_exec (line:179);$reu11=mysql_query("SELECT count(tree_id) AS onucount FROM `network_tree` WHERE `onu_mac` = '$mac_address' AND `sts` = '0'");shell_exec (line:187);$output = shell_exec($command . " 2>&1");shell_exec (line:235);$outputS = shell_exec($commandS . " 2>&1");`network_tree` WHERE `onu_mac` = '$onuMac' AND ` (line:301);$snmpOutput = shell_exec($command);$reu11=mysql_query("SELECT count(tree_id) AS onucount FROM `network_tree` WHERE `onu_mac` = '$onuMac' AND `sts` = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: networktree_device_pon_check.php-
- Full path:
- his/web/networktree_device_pon_check.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:32 12/12/2025
- Last modified:
- 00:46:03 28/12/2024
- MD5 hash:
- 708a93aadcae96ecf0aaca52041fcf38
- Filesize:
- 1.53 KB
- suspicious functions used:
- `pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '$olt_id' AND ` (line:8);
$result11=mysql_query("SELECT count(`pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '$olt_id' AND `sts` = '0';"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: networktree_device_pon_list_add.php-
- Full path:
- his/web/networktree_device_pon_list_add.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:32 12/12/2025
- Last modified:
- 00:46:03 28/12/2024
- MD5 hash:
- 2ec03912801e4749c2e9cd361417ca5f
- Filesize:
- 1.36 KB
- suspicious functions used:
- `olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:6);`olt_pon` WHERE `olt_id` = '$olt_id' AND ` (line:10);
$resu11=mysql_query("SELECT olt_name FROM `olt_con` WHERE `olt_id` = '$olt_id' AND `sts` = '0'");`network_tree` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND ` (line:17);$result11=mysql_query("SELECT pon_id, olt_pon_id, pon_name FROM `olt_pon` WHERE `olt_id` = '$olt_id' AND `sts` = '0'");$rehu11=mysql_query("SELECT count(tree_id) AS poncount FROM `network_tree` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND `sts` = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: networktree_device_pon_port_onu_list.php-
- Full path:
- his/web/networktree_device_pon_port_onu_list.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:32 12/12/2025
- Last modified:
- 00:46:03 28/12/2024
- MD5 hash:
- 9c63b3ac69996628f5eb2959a9eb4e15
- Filesize:
- 8.65 KB
- suspicious functions used:
- `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:25);shell_exec (line:32);
$rff11=mysqli_query($con, "SELECT olt_pon_id AS pon_port FROM `olt_pon` WHERE olt_id = '$olt_id' AND `pon_name` LIKE '$pon_portt'");shell_exec (line:45);$outputs = shell_exec($commanda);`network_tree` WHERE onu_index_id = '$port_onu_index_id' AND ` (line:49);$output = shell_exec($command);shell_exec (line:81);$rff11d=mysqli_query($con, "SELECT onu_name, onu_index, onu_index_id, onu_mac FROM `network_tree` WHERE onu_index_id = '$port_onu_index_id' AND `olt_id` = '$olt_id'");shell_exec (line:103);$outputs = shell_exec($commanda);shell_exec (line:122);$output = shell_exec($command);shell_exec (line:143);$outputs = shell_exec($commanda);shell_exec (line:161);$output = shell_exec($command);shell_exec (line:170);$od_vdlan = shell_exec($commanda . " 2>&1");shell_exec (line:184);$od_vdland = shell_exec($coddvland . " 2>&1");$outputs = shell_exec($coddvladnd . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: networktree_device_pon_port_sense_list.php-
- Full path:
- his/web/networktree_device_pon_port_sense_list.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:32 12/12/2025
- Last modified:
- 00:46:03 28/12/2024
- MD5 hash:
- ee69cd5cc122f8aa37d8d8e5c74def6b
- Filesize:
- 3.65 KB
- suspicious functions used:
- `network_tree` WHERE `onu_mac` = '$onu_mac' AND ` (line:26);`network_tree` WHERE `c_id` = '{$dfhbdxf}' AND ` (line:71);
$reu1d1=mysqli_query($con, "SELECT tree_id AS router_parant_id FROM `network_tree` WHERE `onu_mac` = '$onu_mac' AND `sts` = '0'");$reu11=mysqli_query($con, "SELECT count(c_id) AS client_count FROM `network_tree` WHERE `c_id` = '{$dfhbdxf}' AND `sts` = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: networktree_device_type.php-
- Full path:
- his/web/networktree_device_type.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:32 12/12/2025
- Last modified:
- 00:46:03 28/12/2024
- MD5 hash:
- f1520732e5a3ef38564238a3278a1f63
- Filesize:
- 11.43 KB
- suspicious functions used:
- `tree_id`) AS countolt FROM `network_tree` WHERE `olt_id` = '$olt_id_sure' AND ` (line:64);
$resu11=mysql_query("SELECT COUNT(`tree_id`) AS countolt FROM `network_tree` WHERE `olt_id` = '$olt_id_sure' AND `device_type` = '1' AND sts = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentOnlineQuery.php-
- Full path:
- his/web/PaymentOnlineQuery.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:33 12/12/2025
- Last modified:
- 00:46:08 28/12/2024
- MD5 hash:
- 201e1cf95b2d033897cab4bc2fd59e07
- Filesize:
- 28.5 KB
- suspicious functions used:
- curl_exec (line:457);curl_exec (line:689);
$resultdata=curl_exec($url);$content = curl_exec($handle ); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentOnlineQuery2.php-
- Full path:
- his/web/PaymentOnlineQuery2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:33 12/12/2025
- Last modified:
- 00:46:08 28/12/2024
- MD5 hash:
- ccd315d11a60901b7b9029ff44f8351b
- Filesize:
- 19.4 KB
- suspicious functions used:
- curl_exec (line:42);curl_exec (line:252);
$resultdatax=curl_exec($url);$result = curl_exec($handle); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentWebhook.php-
- Full path:
- his/web/PaymentWebhook.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:33 12/12/2025
- Last modified:
- 00:46:09 28/12/2024
- MD5 hash:
- a2f322c94787630ab1e0c8ca35fc5ba1
- Filesize:
- 18.6 KB
- suspicious functions used:
- base64_decode (line:30);curl_exec (line:41);
$signatureDecoded = base64_decode($signature);curl_exec (line:422);curl_exec($url);$data = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: SignUp1.php-
- Full path:
- his/web/SignUp1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:33 12/12/2025
- Last modified:
- 00:46:14 28/12/2024
- MD5 hash:
- 3f7943dd155c8e0a383b7d02730f8c11
- Filesize:
- 24.59 KB
- suspicious functions used:
- curl_exec (line:33);curl_exec (line:59);
$jsona = curl_exec($ch10);$resdfwedf = curl_exec($ch1s); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: sms-balance-check.php-
- Full path:
- his/web/sms-balance-check.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 13:31:05 12/12/2025
- Last modified:
- 00:46:15 28/12/2024
- MD5 hash:
- 74ac3e963a0dc5bb7d4c980e594aa39b
- Filesize:
- 854 B
- suspicious functions used:
- curl_exec (line:15);
$balance = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: SMS.php-
- Full path:
- his/web/SMS.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:33 12/12/2025
- Last modified:
- 00:46:15 28/12/2024
- MD5 hash:
- 6f4721f653e09f5f33f32c1ba56f9762
- Filesize:
- 37.05 KB
- suspicious functions used:
- curl_exec (line:56);
$balance = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: SMS1.php-
- Full path:
- his/web/SMS1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:33 12/12/2025
- Last modified:
- 00:46:15 28/12/2024
- MD5 hash:
- e4671dadf9ad575671fd3609a60030da
- Filesize:
- 32.19 KB
- suspicious functions used:
- curl_exec (line:59);
$balance = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: SMSAddSave.php-
- Full path:
- his/web/SMSAddSave.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:34 12/12/2025
- Last modified:
- 00:46:15 28/12/2024
- MD5 hash:
- 1a6eaf13aa0ca959fe2dca885b7ffd8e
- Filesize:
- 1.73 KB
- suspicious functions used:
- curl_exec (line:34);
$result = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: sms_deliverey_report.php-
- Full path:
- his/web/sms_deliverey_report.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:34 12/12/2025
- Last modified:
- 00:46:17 28/12/2024
- MD5 hash:
- 03623943da7e9334e137b38c8577fc84
- Filesize:
- 4.25 KB
- suspicious functions used:
- curl_exec (line:28);curl_exec (line:53);
$result11 = curl_exec($ch1);curl_exec (line:90);$resultdd = curl_exec($ch);$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: support-action.php-
- Full path:
- his/web/support-action.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:34 12/12/2025
- Last modified:
- 00:46:17 28/12/2024
- MD5 hash:
- 58556808f93f52486b2ad06998142aa9
- Filesize:
- 14.56 KB
- suspicious functions used:
- curl_exec (line:220);
$jsona = curl_exec($ch10); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tagreeexpayment.php-
- Full path:
- his/web/tagreeexpayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:34 12/12/2025
- Last modified:
- 00:46:18 28/12/2024
- MD5 hash:
- 029b4fba649a75c7c81d2f8931be8d63
- Filesize:
- 2.86 KB
- suspicious functions used:
- curl_exec (line:26);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tcreateagree.php-
- Full path:
- his/web/tcreateagree.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:34 12/12/2025
- Last modified:
- 00:46:18 28/12/2024
- MD5 hash:
- 27a10adf4190edc7eceee8cf74a6b72b
- Filesize:
- 999 B
- suspicious functions used:
- curl_exec (line:26);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tcreatepayment.php-
- Full path:
- his/web/tcreatepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:34 12/12/2025
- Last modified:
- 00:46:18 28/12/2024
- MD5 hash:
- e49de9a33f5164bc2c6b88e4770faaff
- Filesize:
- 1.07 KB
- suspicious functions used:
- curl_exec (line:27);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: test2.php-
- Full path:
- his/web/test2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:34 12/12/2025
- Last modified:
- 00:46:18 28/12/2024
- MD5 hash:
- ab80d92ede21b7da59bfefb325484297
- Filesize:
- 13.76 KB
- suspicious functions used:
- shell_exec (line:59);shell_exec (line:70);
$output = shell_exec($command);shell_exec (line:76);$output1 = shell_exec($command1);shell_exec (line:88);$output2 = shell_exec($command2);shell_exec (line:101);$output_vdlan = shell_exec($command_dvlan . " 2>&1");shell_exec (line:141);$output_vdlan = shell_exec($command_dvlan . " 2>&1");curl_exec (line:187);$output_vdlanf = shell_exec($command_dvlan . " 2>&1");curl_exec (line:212);$result11 = curl_exec($ch3);curl_exec (line:354);$response = curl_exec($ch);$result11 = curl_exec($ch3); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: test6.php-
- Full path:
- his/web/test6.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:34 12/12/2025
- Last modified:
- 00:46:19 28/12/2024
- MD5 hash:
- f22d022ddc284f4d8e1de3660da91db8
- Filesize:
- 15.61 KB
- suspicious functions used:
- shell_exec (line:34);shell_exec (line:113);
$outputs = shell_exec($snmpCommand);shell_exec (line:126);$outpdduts = shell_exec($sand);shell_exec (line:132);$outputsmac = shell_exec($snmpCommandmac);$output_vlan = shell_exec($command_vlan . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: test7.php-
- Full path:
- his/web/test7.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:34 12/12/2025
- Last modified:
- 00:46:19 28/12/2024
- MD5 hash:
- b11ccf951ce63a21ea0a7328316a0e5c
- Filesize:
- 1.57 KB
- suspicious functions used:
- curl_exec (line:14);
$result1dd = curl_exec($ch111); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: testttttt.php-
- Full path:
- his/web/testttttt.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:34 12/12/2025
- Last modified:
- 00:46:19 28/12/2024
- MD5 hash:
- b1988a4be29e191ad935fb409a4174ee
- Filesize:
- 2 KB
- suspicious functions used:
- curl_exec (line:47);
$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: texecutepayment.php-
- Full path:
- his/web/texecutepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:34 12/12/2025
- Last modified:
- 00:46:19 28/12/2024
- MD5 hash:
- 623635fdf5c871391d3a5fe99ee8c543
- Filesize:
- 2.91 KB
- suspicious functions used:
- curl_exec (line:24);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tis-news.php-
- Full path:
- his/web/tis-news.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 13:31:05 12/12/2025
- Last modified:
- 00:46:19 28/12/2024
- MD5 hash:
- ed23ca98b77c5321b4485e85eb2ea64d
- Filesize:
- 3.67 KB
- suspicious functions used:
- curl_exec (line:22);
$alldata1 = curl_exec($chhhh1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: token.php-
- Full path:
- his/web/token.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:34 12/12/2025
- Last modified:
- 00:46:19 28/12/2024
- MD5 hash:
- 7d8e71ceda3ffb74623e0c4a814715af
- Filesize:
- 1.53 KB
- suspicious functions used:
- curl_exec (line:42);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tt.php-
- Full path:
- his/web/tt.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:34 12/12/2025
- Last modified:
- 00:46:19 28/12/2024
- MD5 hash:
- 9c4ed141cb79fdc7e807b35923c91a20
- Filesize:
- 1.56 KB
- suspicious functions used:
- curl_exec (line:30);
$response = curl_exec($curl); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ttoken.php-
- Full path:
- his/web/ttoken.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:34 12/12/2025
- Last modified:
- 00:46:20 28/12/2024
- MD5 hash:
- 5f2c51c1db5b0defadfb67ce25c0098f
- Filesize:
- 1.54 KB
- suspicious functions used:
- curl_exec (line:42);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: webhook.php-
- Full path:
- his/web/webhook.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:35 12/12/2025
- Last modified:
- 00:46:22 28/12/2024
- MD5 hash:
- 26e2059a39281031d28874b51b52d60c
- Filesize:
- 21.23 KB
- suspicious functions used:
- base64_decode (line:27);curl_exec (line:38);
$signatureDecoded = base64_decode($signature);curl_exec (line:454);curl_exec($url);$data = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: webhook_cid.php-
- Full path:
- his/web/webhook_cid.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:35 12/12/2025
- Last modified:
- 00:46:22 28/12/2024
- MD5 hash:
- 18c8353c99f0ca2645c68685e40c568b
- Filesize:
- 21.1 KB
- suspicious functions used:
- base64_decode (line:28);curl_exec (line:39);
$signatureDecoded = base64_decode($signature);curl_exec (line:429);curl_exec($url);$data = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: webhook_test.php-
- Full path:
- his/web/webhook_test.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:35 12/12/2025
- Last modified:
- 00:46:22 28/12/2024
- MD5 hash:
- 74a7dcc262d7fe7f2bdc9e0595d03837
- Filesize:
- 4.69 KB
- suspicious functions used:
- base64_decode (line:22);curl_exec (line:33);
$signatureDecoded = base64_decode($signature);curl_exec (line:86);curl_exec($url);curl_exec (line:107);$result = curl_exec($ch);$data = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: billpaycheck.php-
- Full path:
- his/web/bkash/billpaycheck.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:35 12/12/2025
- Last modified:
- 00:46:25 28/12/2024
- MD5 hash:
- 38c46efc36b25628fa18bd92ae135af9
- Filesize:
- 796 B
- suspicious functions used:
- curl_exec (line:18);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: createpayment.php-
- Full path:
- his/web/bkash/createpayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:35 12/12/2025
- Last modified:
- 00:46:25 28/12/2024
- MD5 hash:
- 6175301f744b22b7db70ba598a991f8b
- Filesize:
- 1.64 KB
- suspicious functions used:
- curl_exec (line:36);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: executepayment.php-
- Full path:
- his/web/bkash/executepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:35 12/12/2025
- Last modified:
- 00:46:25 28/12/2024
- MD5 hash:
- 19be365d26141eaecead7ef0ada0e75c
- Filesize:
- 1.3 KB
- suspicious functions used:
- curl_exec (line:31);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: grant.php-
- Full path:
- his/web/bkash/grant.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:35 12/12/2025
- Last modified:
- 00:46:26 28/12/2024
- MD5 hash:
- da5499d260dc78ea4fcd71227cc6c484
- Filesize:
- 2.01 KB
- suspicious functions used:
- curl_exec (line:41);curl_exec (line:63);
$resultdata=curl_exec($url);$response = curl_exec($curl); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: query.php-
- Full path:
- his/web/bkash/query.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:35 12/12/2025
- Last modified:
- 00:46:26 28/12/2024
- MD5 hash:
- f3ed9045f3a073e2cdc8561d500bda89
- Filesize:
- 1.65 KB
- suspicious functions used:
- curl_exec (line:33);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tagreeexpayment.php-
- Full path:
- his/web/bkash/tagreeexpayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:35 12/12/2025
- Last modified:
- 00:46:26 28/12/2024
- MD5 hash:
- a1ba7d36003f72e593615aa32e44acb9
- Filesize:
- 1.58 KB
- suspicious functions used:
- curl_exec (line:27);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tcreateagree.php-
- Full path:
- his/web/bkash/tcreateagree.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:35 12/12/2025
- Last modified:
- 00:46:26 28/12/2024
- MD5 hash:
- 8ae6bdc9f3d4b0cdcf651701a0d9ebab
- Filesize:
- 1.2 KB
- suspicious functions used:
- curl_exec (line:27);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tcreatepayment.php-
- Full path:
- his/web/bkash/tcreatepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:35 12/12/2025
- Last modified:
- 00:46:26 28/12/2024
- MD5 hash:
- 3c978def6cffa0a8db5e86ce127caae6
- Filesize:
- 1.35 KB
- suspicious functions used:
- curl_exec (line:29);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: texecutepayment.php-
- Full path:
- his/web/bkash/texecutepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:35 12/12/2025
- Last modified:
- 00:46:26 28/12/2024
- MD5 hash:
- d8f24df64623da3cfc2baf48f184a3d1
- Filesize:
- 1.21 KB
- suspicious functions used:
- curl_exec (line:25);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: token.php-
- Full path:
- his/web/bkash/token.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:35 12/12/2025
- Last modified:
- 00:46:26 28/12/2024
- MD5 hash:
- f50b33eeb31927b2c081195618d48b8d
- Filesize:
- 1.88 KB
- suspicious functions used:
- curl_exec (line:48);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tokent.php-
- Full path:
- his/web/bkash/tokent.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:35 12/12/2025
- Last modified:
- 00:46:26 28/12/2024
- MD5 hash:
- 890a9e9fb1be75f31a6daad8811c1ff9
- Filesize:
- 1.9 KB
- suspicious functions used:
- curl_exec (line:48);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: trxID.php-
- Full path:
- his/web/bkash/trxID.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:35 12/12/2025
- Last modified:
- 00:46:26 28/12/2024
- MD5 hash:
- 9bcb8e70728fd25807c4db8916166d74
- Filesize:
- 1.44 KB
- suspicious functions used:
- curl_exec (line:31);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: createpayment.php-
- Full path:
- his/web/bkasht/createpayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:35 12/12/2025
- Last modified:
- 00:46:26 28/12/2024
- MD5 hash:
- a4ba6e7683f558dc3602dacd7ddeded2
- Filesize:
- 1.36 KB
- suspicious functions used:
- curl_exec (line:29);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: executepayment.php-
- Full path:
- his/web/bkasht/executepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:35 12/12/2025
- Last modified:
- 00:46:26 28/12/2024
- MD5 hash:
- aad462fbca9f9a36649a197d67403098
- Filesize:
- 1.27 KB
- suspicious functions used:
- curl_exec (line:26);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: grant.php-
- Full path:
- his/web/bkasht/grant.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:35 12/12/2025
- Last modified:
- 00:46:26 28/12/2024
- MD5 hash:
- da5499d260dc78ea4fcd71227cc6c484
- Filesize:
- 2.01 KB
- suspicious functions used:
- curl_exec (line:41);curl_exec (line:63);
$resultdata=curl_exec($url);$response = curl_exec($curl); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: query.php-
- Full path:
- his/web/bkasht/query.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:35 12/12/2025
- Last modified:
- 00:46:26 28/12/2024
- MD5 hash:
- f3ed9045f3a073e2cdc8561d500bda89
- Filesize:
- 1.65 KB
- suspicious functions used:
- curl_exec (line:33);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: token.php-
- Full path:
- his/web/bkasht/token.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:35 12/12/2025
- Last modified:
- 00:46:26 28/12/2024
- MD5 hash:
- f50b33eeb31927b2c081195618d48b8d
- Filesize:
- 1.88 KB
- suspicious functions used:
- curl_exec (line:48);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: trxID.php-
- Full path:
- his/web/bkasht/trxID.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:35 12/12/2025
- Last modified:
- 00:46:26 28/12/2024
- MD5 hash:
- 9bcb8e70728fd25807c4db8916166d74
- Filesize:
- 1.44 KB
- suspicious functions used:
- curl_exec (line:31);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: class.phpmailer.php-
- Full path:
- his/web/email/class.phpmailer.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:35 12/12/2025
- Last modified:
- 00:46:27 28/12/2024
- MD5 hash:
- 68468d69b47fffecc89df57e27c5a781
- Filesize:
- 143.32 KB
- suspicious functions used:
- `$DKIM_private` (line:428);popen (line:1387);
* If set, takes precedence over `$DKIM_private`.popen (line:1408);if (!@$mail = popen($sendmail, 'w')) {base64_decode (line:3410);if (!@$mail = popen($sendmail, 'w')) {`$mail->set('SMTPSecure', 'tls');` (line:3688);$data = base64_decode($data);`$mail->SMTPSecure = 'tls';` (line:3690);* `$mail->set('SMTPSecure', 'tls');`* `$mail->SMTPSecure = 'tls';` - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: class.smtp.php-
- Full path:
- his/web/email/class.smtp.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:36 12/12/2025
- Last modified:
- 00:46:28 28/12/2024
- MD5 hash:
- aa8478329268e5438a4469c268337a10
- Filesize:
- 41.44 KB
- suspicious functions used:
- base64_decode (line:513);base64_decode (line:533);
$challenge = base64_decode($challenge);$challenge = base64_decode(substr($this->last_reply, 4)); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: jqgrid.php-
- Full path:
- his/web/inc/jqgrid.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:37 12/12/2025
- Last modified:
- 00:46:33 28/12/2024
- MD5 hash:
- 71027a29e71e0626d8b57cbb631e6d98
- Filesize:
- 23.92 KB
- suspicious functions used:
- eval (line:397);
if (!empty($V4a8a08f0["condition"])) eval("\$V4b43b0ae = ".$V4a8a08f0["condition"].";"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: JSON.php-
- Full path:
- his/web/inc/JSON.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:37 12/12/2025
- Last modified:
- 00:46:33 28/12/2024
- MD5 hash:
- f5a34509e06231308becbe320ade9ff6
- Filesize:
- 33.22 KB
- suspicious functions used:
- eval (line:22);
* Javascript, and can be directly eval()'ed with no further parsing - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: smsapicore.php-
- Full path:
- his/web/include/smsapicore.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:37 12/12/2025
- Last modified:
- 00:46:33 28/12/2024
- MD5 hash:
- 6b6257f892846565ef8dee38400afa15
- Filesize:
- 1.24 KB
- suspicious functions used:
- curl_exec (line:36);
$resultdgfb = curl_exec($chg); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: telegramapicore.php-
- Full path:
- his/web/include/telegramapicore.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:37 12/12/2025
- Last modified:
- 00:46:33 28/12/2024
- MD5 hash:
- e1f2020f2a58e7b600312301697f9aca
- Filesize:
- 3 KB
- suspicious functions used:
- curl_exec (line:65);
$result11 = curl_exec($ch3); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ui.php-
- Full path:
- his/web/js/tinymce/themes/advanced/skins/highcontrast/ui.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:37 12/12/2025
- Last modified:
- 00:46:56 28/12/2024
- MD5 hash:
- 3edaf67be8573b86686f46bbba4f058c
- Filesize:
- 4.53 KB
- suspicious functions used:
- curl_exec (line:20);`bill_amount` = '0.00' WHERE bill_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY ` (line:53);
$alldataa = curl_exec($chxchhh);`bill_amount` = '0.00', days = '0.00' WHERE entry_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY ` (line:54);$queryss = mysql_query("UPDATE billing SET `bill_amount` = '0.00' WHERE bill_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY `id` DESC LIMIT 5");`payment` WHERE `pay_date` < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND pay_amount != '0.00' ORDER BY ` (line:55);$sqlqmss = mysql_query("UPDATE billing_mac SET `bill_amount` = '0.00', days = '0.00' WHERE entry_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY `id` DESC LIMIT 5");curl_exec (line:146);$sqlqmsp = mysql_query("DELETE FROM `payment` WHERE `pay_date` < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND pay_amount != '0.00' ORDER BY `id` ASC LIMIT 5");curl_exec (line:168);$responsed = curl_exec($curld);$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Changes.txt-
- Full path:
- his/web/js/jqgrid/js/Changes.txt
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:37 12/12/2025
- Last modified:
- 00:46:46 28/12/2024
- MD5 hash:
- c0a4adbc3f1c6d592cb4fa8433fee9ea
- Filesize:
- 44.32 KB
- suspicious functions used:
- system (line:87);
* Add a ant based build system which allow us to minify the JS code - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: createpayment.php-
- Full path:
- his/m/createpayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:37 12/12/2025
- Last modified:
- 00:45:08 28/12/2024
- MD5 hash:
- 849185f307be30eafb1bbef93616d8c3
- Filesize:
- 1.71 KB
- suspicious functions used:
- curl_exec (line:57);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: executepayment.php-
- Full path:
- his/m/executepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:37 12/12/2025
- Last modified:
- 00:45:08 28/12/2024
- MD5 hash:
- 9a3f22521ad987e86f84c4f5f688d5b7
- Filesize:
- 713 B
- suspicious functions used:
- curl_exec (line:18);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: index.php-
- Full path:
- his/m/index.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 01:00:02 12/12/2025
- Last modified:
- 00:45:09 28/12/2024
- MD5 hash:
- 95475438b8637bb8fa3fbb409a4fcbcc
- Filesize:
- 16.96 KB
- suspicious functions used:
- curl_exec (line:298);
$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: index1.php-
- Full path:
- his/m/index1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:38 12/12/2025
- Last modified:
- 00:45:09 28/12/2024
- MD5 hash:
- dbd325386cd905b7a18b217dda2030f3
- Filesize:
- 13.92 KB
- suspicious functions used:
- base64_decode (line:8);curl_exec (line:224);
list($encrypted_data, $iv, $key) = explode('::', base64_decode($ciphertext));$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: index2.php-
- Full path:
- his/m/index2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:38 12/12/2025
- Last modified:
- 00:45:09 28/12/2024
- MD5 hash:
- 41558736b037228ea93df03cae70eb87
- Filesize:
- 4.31 KB
- suspicious functions used:
- curl_exec (line:70);
$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: LoginByPass.php-
- Full path:
- his/m/LoginByPass.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:38 12/12/2025
- Last modified:
- 00:45:09 28/12/2024
- MD5 hash:
- 4deda2bef49c7e4552e5379c86858ddf
- Filesize:
- 4.27 KB
- suspicious functions used:
- curl_exec (line:41);
$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: login_exec.php-
- Full path:
- his/m/login_exec.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:38 12/12/2025
- Last modified:
- 00:45:09 28/12/2024
- MD5 hash:
- 760b107af2f5d6194f97c20ba3ffb86b
- Filesize:
- 11.63 KB
- suspicious functions used:
- curl_exec (line:24);curl_exec (line:80);
$jsona = curl_exec($ch10);curl_exec (line:227);$result110 = curl_exec($ch11);$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: login_exec1.php-
- Full path:
- his/m/login_exec1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:38 12/12/2025
- Last modified:
- 00:45:09 28/12/2024
- MD5 hash:
- b7a23f98b3d03b1ecc08218cf01b4aee
- Filesize:
- 6.36 KB
- suspicious functions used:
- curl_exec (line:115);
$result110 = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: login_exec2.php-
- Full path:
- his/m/login_exec2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:38 12/12/2025
- Last modified:
- 00:45:09 28/12/2024
- MD5 hash:
- 46b08782f51ba75b23e27183e06370fe
- Filesize:
- 4.28 KB
- suspicious functions used:
- curl_exec (line:61);
$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: nagad-helper.php-
- Full path:
- his/m/nagad-helper.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:38 12/12/2025
- Last modified:
- 00:45:10 28/12/2024
- MD5 hash:
- 2bb70c44d68202e0a0cd8ae1388f0b1b
- Filesize:
- 6.74 KB
- suspicious functions used:
- curl_exec (line:61);base64_decode (line:97);
$resultData = curl_exec($url);openssl_private_decrypt(base64_decode($cryptText), $plain_text, $private_key); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: nagad-merchant-callback.php-
- Full path:
- his/m/nagad-merchant-callback.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:38 12/12/2025
- Last modified:
- 00:45:10 28/12/2024
- MD5 hash:
- 0e6086c5260150c11249029f212ee481
- Filesize:
- 11.36 KB
- suspicious functions used:
- curl_exec (line:20);
$file_contents = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: netowrk-snmp-data.php-
- Full path:
- his/m/netowrk-snmp-data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:38 12/12/2025
- Last modified:
- 00:45:10 28/12/2024
- MD5 hash:
- 45b774abc8d67efb3e4e87c93b1f618b
- Filesize:
- 24.05 KB
- suspicious functions used:
- shell_exec (line:96);shell_exec (line:105);
$output = shell_exec($command . " 2>&1");shell_exec (line:115);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:134);$output_port = shell_exec($commandd . " 2>&1");shell_exec (line:146);$output = shell_exec($command . " 2>&1");shell_exec (line:157);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:173);$output_port = shell_exec($commandd);shell_exec (line:183);$output_oid_bdcom = shell_exec($command_oid_bdcom . " 2>&1");shell_exec (line:199);$outputs = shell_exec($commanda);shell_exec (line:219);$output_port = shell_exec($commandd_bdcom);shell_exec (line:229);$output_oid_cdata = shell_exec($command_oid_cdata . " 2>&1");shell_exec (line:234);$outputs = shell_exec($commanda);shell_exec (line:242);$outs = shell_exec($canda);shell_exec (line:262);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:278);$outpdut_port = shell_exec($commandd_cdata);`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:291);$output_oid_gcom = shell_exec($command_oid_gcom . " 2>&1");shell_exec (line:297);$querydd = mysqli_query($con, "SELECT `olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND `olt_id` = '$olt_id' AND sts = '0'");shell_exec (line:432);$output_vlan = shell_exec($command_vlan . " 2>&1");$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentOnlineQuery.php-
- Full path:
- his/m/PaymentOnlineQuery.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:38 12/12/2025
- Last modified:
- 00:45:11 28/12/2024
- MD5 hash:
- 05d772ea15775c0640ac9d1ff7c7144c
- Filesize:
- 21.13 KB
- suspicious functions used:
- curl_exec (line:287);curl_exec (line:512);
$resultdata=curl_exec($url);$content = curl_exec($handle ); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentOnlineQuery2.php-
- Full path:
- his/m/PaymentOnlineQuery2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:38 12/12/2025
- Last modified:
- 00:45:11 28/12/2024
- MD5 hash:
- 3660992067d5591fc79ce89d6dbb9274
- Filesize:
- 19.08 KB
- suspicious functions used:
- curl_exec (line:41);curl_exec (line:254);
$resultdatax=curl_exec($url);$result = curl_exec($handle); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: support-action.php-
- Full path:
- his/m/support-action.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:38 12/12/2025
- Last modified:
- 00:45:12 28/12/2024
- MD5 hash:
- 2fc6fd844db911a5502a7a6ae383990f
- Filesize:
- 10.31 KB
- suspicious functions used:
- curl_exec (line:99);
$jsona = curl_exec($ch10); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tagreeexpayment.php-
- Full path:
- his/m/tagreeexpayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:38 12/12/2025
- Last modified:
- 00:45:13 28/12/2024
- MD5 hash:
- c95e3ee881752db67b4f3597bc58430a
- Filesize:
- 2.46 KB
- suspicious functions used:
- curl_exec (line:26);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tcreateagree.php-
- Full path:
- his/m/tcreateagree.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:38 12/12/2025
- Last modified:
- 00:45:13 28/12/2024
- MD5 hash:
- 27a10adf4190edc7eceee8cf74a6b72b
- Filesize:
- 999 B
- suspicious functions used:
- curl_exec (line:26);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tcreatepayment.php-
- Full path:
- his/m/tcreatepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:38 12/12/2025
- Last modified:
- 00:45:13 28/12/2024
- MD5 hash:
- e49de9a33f5164bc2c6b88e4770faaff
- Filesize:
- 1.07 KB
- suspicious functions used:
- curl_exec (line:27);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: texecutepayment.php-
- Full path:
- his/m/texecutepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:38 12/12/2025
- Last modified:
- 00:45:13 28/12/2024
- MD5 hash:
- efbb63dfcfdacb52dec74bffc389bbb3
- Filesize:
- 2.67 KB
- suspicious functions used:
- curl_exec (line:24);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: token.php-
- Full path:
- his/m/token.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:38 12/12/2025
- Last modified:
- 00:45:13 28/12/2024
- MD5 hash:
- 7d8e71ceda3ffb74623e0c4a814715af
- Filesize:
- 1.53 KB
- suspicious functions used:
- curl_exec (line:42);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ttoken.php-
- Full path:
- his/m/ttoken.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:38 12/12/2025
- Last modified:
- 00:45:13 28/12/2024
- MD5 hash:
- 5f2c51c1db5b0defadfb67ce25c0098f
- Filesize:
- 1.54 KB
- suspicious functions used:
- curl_exec (line:42);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Changes.txt-
- Full path:
- acn/m/js/jqgrid/js/Changes.txt
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:39 12/12/2025
- Last modified:
- 01:14:42 26/09/2023
- MD5 hash:
- c0a4adbc3f1c6d592cb4fa8433fee9ea
- Filesize:
- 44.32 KB
- suspicious functions used:
- system (line:87);
* Add a ant based build system which allow us to minify the JS code - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentOnlineQuery.php-
- Full path:
- acn/m/PaymentOnlineQuery.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:39 12/12/2025
- Last modified:
- 01:13:53 26/09/2023
- MD5 hash:
- 5e63b1f647ca3509509beda8102d5c40
- Filesize:
- 16.65 KB
- suspicious functions used:
- curl_exec (line:287);curl_exec (line:382);
$resultdata=curl_exec($url);$content = curl_exec($handle ); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: createpayment.php-
- Full path:
- acn/m/createpayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:40 12/12/2025
- Last modified:
- 01:13:51 26/09/2023
- MD5 hash:
- 05132f436e56ff2164ecc165347219ae
- Filesize:
- 1.71 KB
- suspicious functions used:
- curl_exec (line:57);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: executepayment.php-
- Full path:
- acn/m/executepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:40 12/12/2025
- Last modified:
- 01:13:51 26/09/2023
- MD5 hash:
- 9a3f22521ad987e86f84c4f5f688d5b7
- Filesize:
- 713 B
- suspicious functions used:
- curl_exec (line:18);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: index.php-
- Full path:
- acn/m/index.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 09:54:54 12/12/2025
- Last modified:
- 23:30:24 03/10/2023
- MD5 hash:
- 488549d8551f66f872c47e45201ee5b7
- Filesize:
- 11.85 KB
- suspicious functions used:
- base64_decode (line:10);curl_exec (line:206);
list($encrypted_data,$iv,$key) = explode('::',base64_decode($ciphertext));$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: login_exec.php-
- Full path:
- acn/m/login_exec.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:40 12/12/2025
- Last modified:
- 06:36:16 01/03/2024
- MD5 hash:
- 1f800365ef270564df77d30c1bfd7ed3
- Filesize:
- 5.4 KB
- suspicious functions used:
- curl_exec (line:66);
$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: login_exec1.php-
- Full path:
- acn/m/login_exec1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:40 12/12/2025
- Last modified:
- 01:13:52 26/09/2023
- MD5 hash:
- 4ab4155763d3c6a8ea772996a5765a94
- Filesize:
- 4.28 KB
- suspicious functions used:
- curl_exec (line:61);
$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentOnlineQuery2.php-
- Full path:
- acn/m/PaymentOnlineQuery2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:40 12/12/2025
- Last modified:
- 01:13:53 26/09/2023
- MD5 hash:
- 48588dfbb812b9e8102af40dc401032c
- Filesize:
- 19.04 KB
- suspicious functions used:
- curl_exec (line:41);curl_exec (line:254);
$resultdatax=curl_exec($url);$result = curl_exec($handle); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tagreeexpayment.php-
- Full path:
- acn/m/tagreeexpayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:40 12/12/2025
- Last modified:
- 01:13:53 26/09/2023
- MD5 hash:
- c95e3ee881752db67b4f3597bc58430a
- Filesize:
- 2.46 KB
- suspicious functions used:
- curl_exec (line:26);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tcreateagree.php-
- Full path:
- acn/m/tcreateagree.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:40 12/12/2025
- Last modified:
- 01:13:53 26/09/2023
- MD5 hash:
- 27a10adf4190edc7eceee8cf74a6b72b
- Filesize:
- 999 B
- suspicious functions used:
- curl_exec (line:26);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tcreatepayment.php-
- Full path:
- acn/m/tcreatepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:40 12/12/2025
- Last modified:
- 01:13:53 26/09/2023
- MD5 hash:
- e49de9a33f5164bc2c6b88e4770faaff
- Filesize:
- 1.07 KB
- suspicious functions used:
- curl_exec (line:27);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: texecutepayment.php-
- Full path:
- acn/m/texecutepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:40 12/12/2025
- Last modified:
- 01:13:53 26/09/2023
- MD5 hash:
- efbb63dfcfdacb52dec74bffc389bbb3
- Filesize:
- 2.67 KB
- suspicious functions used:
- curl_exec (line:24);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: token.php-
- Full path:
- acn/m/token.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:40 12/12/2025
- Last modified:
- 01:13:53 26/09/2023
- MD5 hash:
- 7d8e71ceda3ffb74623e0c4a814715af
- Filesize:
- 1.53 KB
- suspicious functions used:
- curl_exec (line:42);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ttoken.php-
- Full path:
- acn/m/ttoken.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:40 12/12/2025
- Last modified:
- 01:13:53 26/09/2023
- MD5 hash:
- 5f2c51c1db5b0defadfb67ce25c0098f
- Filesize:
- 1.54 KB
- suspicious functions used:
- curl_exec (line:42);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: class.phpmailer.php-
- Full path:
- acn/web/email/class.phpmailer.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:41 12/12/2025
- Last modified:
- 01:15:40 26/09/2023
- MD5 hash:
- 68468d69b47fffecc89df57e27c5a781
- Filesize:
- 143.32 KB
- suspicious functions used:
- `$DKIM_private` (line:428);popen (line:1387);
* If set, takes precedence over `$DKIM_private`.popen (line:1408);if (!@$mail = popen($sendmail, 'w')) {base64_decode (line:3410);if (!@$mail = popen($sendmail, 'w')) {`$mail->set('SMTPSecure', 'tls');` (line:3688);$data = base64_decode($data);`$mail->SMTPSecure = 'tls';` (line:3690);* `$mail->set('SMTPSecure', 'tls');`* `$mail->SMTPSecure = 'tls';` - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: class.smtp.php-
- Full path:
- acn/web/email/class.smtp.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:41 12/12/2025
- Last modified:
- 01:15:40 26/09/2023
- MD5 hash:
- aa8478329268e5438a4469c268337a10
- Filesize:
- 41.44 KB
- suspicious functions used:
- base64_decode (line:513);base64_decode (line:533);
$challenge = base64_decode($challenge);$challenge = base64_decode(substr($this->last_reply, 4)); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: JSON.php-
- Full path:
- acn/web/inc/JSON.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:42 12/12/2025
- Last modified:
- 01:15:43 26/09/2023
- MD5 hash:
- f5a34509e06231308becbe320ade9ff6
- Filesize:
- 33.22 KB
- suspicious functions used:
- eval (line:22);
* Javascript, and can be directly eval()'ed with no further parsing - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: jqgrid.php-
- Full path:
- acn/web/inc/jqgrid.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:42 12/12/2025
- Last modified:
- 01:15:43 26/09/2023
- MD5 hash:
- 71027a29e71e0626d8b57cbb631e6d98
- Filesize:
- 23.92 KB
- suspicious functions used:
- eval (line:397);
if (!empty($V4a8a08f0["condition"])) eval("\$V4b43b0ae = ".$V4a8a08f0["condition"].";"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: smsapicore.php-
- Full path:
- acn/web/include/smsapicore.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:42 12/12/2025
- Last modified:
- 06:09:55 01/03/2024
- MD5 hash:
- 0afbabc581e2e88f2883e249f83847a4
- Filesize:
- 891 B
- suspicious functions used:
- curl_exec (line:13);
$resultdgfb = curl_exec($chg); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: telegramapicore.php-
- Full path:
- acn/web/include/telegramapicore.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:42 12/12/2025
- Last modified:
- 01:15:43 26/09/2023
- MD5 hash:
- c669b81806a80fae7f84959c253cc737
- Filesize:
- 2.44 KB
- suspicious functions used:
- curl_exec (line:54);
$result11 = curl_exec($ch3); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Changes.txt-
- Full path:
- acn/web/js/jqgrid/js/Changes.txt
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:42 12/12/2025
- Last modified:
- 01:15:51 26/09/2023
- MD5 hash:
- c0a4adbc3f1c6d592cb4fa8433fee9ea
- Filesize:
- 44.32 KB
- suspicious functions used:
- system (line:87);
* Add a ant based build system which allow us to minify the JS code - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ui.php-
- Full path:
- acn/web/js/tinymce/themes/advanced/skins/highcontrast/ui.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:42 12/12/2025
- Last modified:
- 01:15:57 26/09/2023
- MD5 hash:
- 4c0401a6d1abd64eeb2781b0ac727ceb
- Filesize:
- 3.94 KB
- suspicious functions used:
- curl_exec (line:20);curl_exec (line:37);
$alldataa = curl_exec($chxchhh);curl_exec (line:132);$alldataa = curl_exec($chxchhh);curl_exec (line:149);$responsed = curl_exec($curld);$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: AutoActiveClientsCount1.php-
- Full path:
- acn/web/AutoActiveClientsCount1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:43 12/12/2025
- Last modified:
- 01:15:15 26/09/2023
- MD5 hash:
- a0090e4a11dd59b955a6edd549b6ef2f
- Filesize:
- 5.85 KB
- suspicious functions used:
- system (line:54);
$ARRAY = $API->comm("/system/resource/print"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkLoad.php-
- Full path:
- acn/web/NetworkLoad.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:45 12/12/2025
- Last modified:
- 01:15:28 26/09/2023
- MD5 hash:
- e1632e66ee1b7394d3fb82751b924abe
- Filesize:
- 2.83 KB
- suspicious functions used:
- system (line:81);
$ARRAY = $API->comm("/system/resource/print"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: InstrumentsStoreOutDetails.php-
- Full path:
- acn/web/InstrumentsStoreOutDetails.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:45 12/12/2025
- Last modified:
- 01:15:24 26/09/2023
- MD5 hash:
- ab68ab13bcfd51da15e72a3d4e9817e8
- Filesize:
- 9.37 KB
- suspicious functions used:
- `update_date`, '%D-%b, %y') AS offdate, TIME_FORMAT(`update_time`, '%T') AS offtime FROM `con_sts_log` WHERE `c_id` = '{$row['c_id']}' AND con_sts = 'Inactive' ORDER BY ` (line:120);
$resultwwdd=mysql_query("SELECT DATE_FORMAT(`update_date`, '%D-%b, %y') AS offdate, TIME_FORMAT(`update_time`, '%T') AS offtime FROM `con_sts_log` WHERE `c_id` = '{$row['c_id']}' AND con_sts = 'Inactive' ORDER BY `update_date_time` DESC LIMIT 1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Network.php-
- Full path:
- acn/web/Network.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:45 12/12/2025
- Last modified:
- 01:15:27 26/09/2023
- MD5 hash:
- 81fbd1a4bf9ecbb944ccd98ae719849b
- Filesize:
- 22.92 KB
- suspicious functions used:
- system (line:209);
$ARRAY = $API->comm("/system/resource/print"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Network1.php-
- Full path:
- acn/web/Network1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:45 12/12/2025
- Last modified:
- 01:15:27 26/09/2023
- MD5 hash:
- 81fbd1a4bf9ecbb944ccd98ae719849b
- Filesize:
- 22.92 KB
- suspicious functions used:
- system (line:209);
$ARRAY = $API->comm("/system/resource/print"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentOnlineQuery.php-
- Full path:
- acn/web/PaymentOnlineQuery.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:46 12/12/2025
- Last modified:
- 01:15:31 26/09/2023
- MD5 hash:
- eb93c751e05e717a544d27f8dd6ef768
- Filesize:
- 23.99 KB
- suspicious functions used:
- curl_exec (line:456);curl_exec (line:560);
$resultdata=curl_exec($url);$content = curl_exec($handle ); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentOnlineQuery2.php-
- Full path:
- acn/web/PaymentOnlineQuery2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:46 12/12/2025
- Last modified:
- 01:15:31 26/09/2023
- MD5 hash:
- 138b87d49f0613b02cb61abace637606
- Filesize:
- 19.39 KB
- suspicious functions used:
- curl_exec (line:43);curl_exec (line:253);
$resultdatax=curl_exec($url);$result = curl_exec($handle); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: SMS.php-
- Full path:
- acn/web/SMS.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:46 12/12/2025
- Last modified:
- 04:05:02 13/10/2023
- MD5 hash:
- a8c609c9c9cec5324a708b373cec838c
- Filesize:
- 30.62 KB
- suspicious functions used:
- curl_exec (line:53);
$balance = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentWebhook.php-
- Full path:
- acn/web/PaymentWebhook.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:47 12/12/2025
- Last modified:
- 08:32:04 01/03/2024
- MD5 hash:
- a2f322c94787630ab1e0c8ca35fc5ba1
- Filesize:
- 18.6 KB
- suspicious functions used:
- base64_decode (line:30);curl_exec (line:41);
$signatureDecoded = base64_decode($signature);curl_exec (line:422);curl_exec($url);$data = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: SMS1.php-
- Full path:
- acn/web/SMS1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:47 12/12/2025
- Last modified:
- 01:15:35 26/09/2023
- MD5 hash:
- 00310c03f319d7c6845d0aef92328b13
- Filesize:
- 32.19 KB
- suspicious functions used:
- curl_exec (line:59);
$balance = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: SMSAddSave.php-
- Full path:
- acn/web/SMSAddSave.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:47 12/12/2025
- Last modified:
- 01:15:35 26/09/2023
- MD5 hash:
- 5e8b43b3bc2febe3a611a5bd9aa8fc28
- Filesize:
- 1.71 KB
- suspicious functions used:
- curl_exec (line:34);
$result = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: emp_salary_advence_find.php-
- Full path:
- acn/web/emp_salary_advence_find.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:48 12/12/2025
- Last modified:
- 01:15:22 26/09/2023
- MD5 hash:
- 8cb12a79d5e1d31d92670d721dabb5aa
- Filesize:
- 2.25 KB
- suspicious functions used:
- `expanse` WHERE `type` = '2' AND `status` = '2' AND ex_by = '$e_id' AND MONTH(`, `) = MONTH('$lastmonth') AND YEAR(`, `) = YEAR('$lastmonth') GROUP BY ` (line:8);`e_id` = '$e_id' AND ` (line:12);
$vendorrr = mysql_query("SELECT SUM(amount) AS salary_advance FROM `expanse` WHERE `type` = '2' AND `status` = '2' AND ex_by = '$e_id' AND MONTH(`check_date`) = MONTH('$lastmonth') AND YEAR(`check_date`) = YEAR('$lastmonth') GROUP BY `ex_by`");$empppp = mysql_query("SELECT gross_total AS gross_total FROM emp_info WHERE `e_id` = '$e_id' AND `status` = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: company_info.php-
- Full path:
- acn/web/company_info.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 21:03:32 11/12/2025
- Last modified:
- 13:01:05 09/04/2024
- MD5 hash:
- c52ef7f55b7a46af9aa2b7c7b71a3834
- Filesize:
- 7.74 KB
- suspicious functions used:
- curl_exec (line:123);
$alldata = curl_exec($chhhh); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: createpayment.php-
- Full path:
- acn/web/createpayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:48 12/12/2025
- Last modified:
- 01:15:21 26/09/2023
- MD5 hash:
- c8a7ce9b69ebed3509cee2952c04cb0c
- Filesize:
- 1.7 KB
- suspicious functions used:
- curl_exec (line:57);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_all.php-
- Full path:
- acn/web/cron_all.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:48 12/12/2025
- Last modified:
- 08:04:16 01/03/2024
- MD5 hash:
- b19a08fef36584598cca299b7ecc5e6d
- Filesize:
- 2.07 KB
- suspicious functions used:
- curl_exec (line:23);curl_exec (line:38);
$result1 = curl_exec($ch1);curl_exec (line:53);$result1d = curl_exec($ch11);$result1d2 = curl_exec($ch112); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_gen_bill.php-
- Full path:
- acn/web/cron_auto_gen_bill.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:48 12/12/2025
- Last modified:
- 08:04:50 01/03/2024
- MD5 hash:
- eadec12eb6484d0069e5d0d320725a75
- Filesize:
- 4.73 KB
- suspicious functions used:
- curl_exec (line:140);curl_exec (line:149);
$respd = curl_exec($curl);$resp = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_inactive.php-
- Full path:
- acn/web/cron_auto_inactive.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:48 12/12/2025
- Last modified:
- 08:05:48 01/03/2024
- MD5 hash:
- 288e83bc1578b0992ae1ab75eb328bc2
- Filesize:
- 5.75 KB
- suspicious functions used:
- curl_exec (line:151);
$respw = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_inactive2.php-
- Full path:
- acn/web/cron_auto_inactive2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:48 12/12/2025
- Last modified:
- 01:15:21 26/09/2023
- MD5 hash:
- a6a713d414c4e0632f4fe69f68b77d53
- Filesize:
- 6.28 KB
- suspicious functions used:
- curl_exec (line:158);
$respw = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: executepayment.php-
- Full path:
- acn/web/executepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:48 12/12/2025
- Last modified:
- 01:15:22 26/09/2023
- MD5 hash:
- c46a50905333286f45dfeacf010851ab
- Filesize:
- 716 B
- suspicious functions used:
- curl_exec (line:18);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_inactive_termination.php-
- Full path:
- acn/web/cron_auto_inactive_termination.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 18:05:01 12/12/2025
- Last modified:
- 12:17:50 23/09/2024
- MD5 hash:
- 64c9ff719cd52caa5d5589cf7fd5e460
- Filesize:
- 6.81 KB
- suspicious functions used:
- curl_exec (line:124);curl_exec (line:142);
$resp = curl_exec($curlss);$respw = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_termination_remainder1.php-
- Full path:
- acn/web/cron_auto_termination_remainder1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:48 12/12/2025
- Last modified:
- 08:31:04 01/03/2024
- MD5 hash:
- 7765f9f820dbd402f1064fab9958ffaa
- Filesize:
- 3.26 KB
- suspicious functions used:
- curl_exec (line:83);
$respw = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_client_bandwidth_count.php-
- Full path:
- acn/web/cron_client_bandwidth_count.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 14:34:57 12/12/2025
- Last modified:
- 01:15:21 26/09/2023
- MD5 hash:
- 6b8058e3d36ab2407a01cf3091a88016
- Filesize:
- 3.81 KB
- suspicious functions used:
- curl_exec (line:102);
$result = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_network.php-
- Full path:
- acn/web/cron_network.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 23:03:36 11/12/2025
- Last modified:
- 01:15:21 26/09/2023
- MD5 hash:
- d7ae8ca3db81dce0960bb9840cb5aeee
- Filesize:
- 4.14 KB
- suspicious functions used:
- curl_exec (line:41);curl_exec (line:59);
$result1d = curl_exec($ch11);$result1dd = curl_exec($ch111); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: index.php-
- Full path:
- acn/web/index.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 05:36:38 12/12/2025
- Last modified:
- 23:30:29 03/10/2023
- MD5 hash:
- 618ca042b62304de35ff0b2a4abc061b
- Filesize:
- 11.98 KB
- suspicious functions used:
- base64_decode (line:10);curl_exec (line:211);
list($encrypted_data,$iv,$key) = explode('::',base64_decode($ciphertext));$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: sms_deliverey_report.php-
- Full path:
- acn/web/sms_deliverey_report.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:49 12/12/2025
- Last modified:
- 01:15:36 26/09/2023
- MD5 hash:
- b0c2b4c2bebe35fbe233cb298a952910
- Filesize:
- 3.45 KB
- suspicious functions used:
- curl_exec (line:18);curl_exec (line:44);
$result = curl_exec($ch);$result = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ttoken.php-
- Full path:
- acn/web/ttoken.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:49 12/12/2025
- Last modified:
- 01:15:37 26/09/2023
- MD5 hash:
- 5f2c51c1db5b0defadfb67ce25c0098f
- Filesize:
- 1.54 KB
- suspicious functions used:
- curl_exec (line:42);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ip-ping-checker.php-
- Full path:
- acn/web/ip-ping-checker.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:49 12/12/2025
- Last modified:
- 01:15:24 26/09/2023
- MD5 hash:
- 0d28f3053b73b3fe2885cf519ee17c12
- Filesize:
- 2.64 KB
- suspicious functions used:
- curl_exec (line:81);
$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: webhook.php-
- Full path:
- acn/web/webhook.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:49 12/12/2025
- Last modified:
- 09:21:20 01/03/2024
- MD5 hash:
- 6ea5abfa2b22d299ea68b666eaa57701
- Filesize:
- 20.98 KB
- suspicious functions used:
- base64_decode (line:28);curl_exec (line:39);
$signatureDecoded = base64_decode($signature);curl_exec (line:427);curl_exec($url);$data = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: webhook_test.php-
- Full path:
- acn/web/webhook_test.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:49 12/12/2025
- Last modified:
- 01:15:38 26/09/2023
- MD5 hash:
- 74a7dcc262d7fe7f2bdc9e0595d03837
- Filesize:
- 4.69 KB
- suspicious functions used:
- base64_decode (line:22);curl_exec (line:33);
$signatureDecoded = base64_decode($signature);curl_exec (line:86);curl_exec($url);curl_exec (line:107);$result = curl_exec($ch);$data = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: login_exec.php-
- Full path:
- acn/web/login_exec.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 12:21:02 12/12/2025
- Last modified:
- 06:36:16 01/03/2024
- MD5 hash:
- 8e5caeac6dd5efb18009f8718af713ce
- Filesize:
- 5.39 KB
- suspicious functions used:
- curl_exec (line:66);
$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: login_exec1.php-
- Full path:
- acn/web/login_exec1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:49 12/12/2025
- Last modified:
- 01:15:25 26/09/2023
- MD5 hash:
- 4f75b914e1b47a355be8cbc73e4e1407
- Filesize:
- 3.91 KB
- suspicious functions used:
- curl_exec (line:53);
$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tagreeexpayment.php-
- Full path:
- acn/web/tagreeexpayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:49 12/12/2025
- Last modified:
- 01:15:36 26/09/2023
- MD5 hash:
- 029b4fba649a75c7c81d2f8931be8d63
- Filesize:
- 2.86 KB
- suspicious functions used:
- curl_exec (line:26);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tcreateagree.php-
- Full path:
- acn/web/tcreateagree.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:49 12/12/2025
- Last modified:
- 01:15:36 26/09/2023
- MD5 hash:
- 27a10adf4190edc7eceee8cf74a6b72b
- Filesize:
- 999 B
- suspicious functions used:
- curl_exec (line:26);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tcreatepayment.php-
- Full path:
- acn/web/tcreatepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:49 12/12/2025
- Last modified:
- 01:15:36 26/09/2023
- MD5 hash:
- e49de9a33f5164bc2c6b88e4770faaff
- Filesize:
- 1.07 KB
- suspicious functions used:
- curl_exec (line:27);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: test3.php-
- Full path:
- acn/web/test3.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:49 12/12/2025
- Last modified:
- 01:15:36 26/09/2023
- MD5 hash:
- 73a48fe113b432b1786e7a15406cc14d
- Filesize:
- 1.26 KB
- suspicious functions used:
- `Counter: ${seconds}s` (line:29);
counterDiv.textContent = `Counter: ${seconds}s`; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: testttttt.php-
- Full path:
- acn/web/testttttt.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:49 12/12/2025
- Last modified:
- 10:27:24 04/10/2023
- MD5 hash:
- b1988a4be29e191ad935fb409a4174ee
- Filesize:
- 2 KB
- suspicious functions used:
- curl_exec (line:47);
$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: texecutepayment.php-
- Full path:
- acn/web/texecutepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:49 12/12/2025
- Last modified:
- 01:15:36 26/09/2023
- MD5 hash:
- 623635fdf5c871391d3a5fe99ee8c543
- Filesize:
- 2.91 KB
- suspicious functions used:
- curl_exec (line:24);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tis-news.php-
- Full path:
- acn/web/tis-news.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:49 12/12/2025
- Last modified:
- 07:55:10 09/04/2024
- MD5 hash:
- ed23ca98b77c5321b4485e85eb2ea64d
- Filesize:
- 3.67 KB
- suspicious functions used:
- curl_exec (line:22);
$alldata1 = curl_exec($chhhh1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: token.php-
- Full path:
- acn/web/token.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:49 12/12/2025
- Last modified:
- 01:15:37 26/09/2023
- MD5 hash:
- 7d8e71ceda3ffb74623e0c4a814715af
- Filesize:
- 1.53 KB
- suspicious functions used:
- curl_exec (line:42);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tagreeexpayment.php-
- Full path:
- airmax/m/tagreeexpayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:50 12/12/2025
- Last modified:
- 02:50:39 07/04/2024
- MD5 hash:
- c95e3ee881752db67b4f3597bc58430a
- Filesize:
- 2.46 KB
- suspicious functions used:
- curl_exec (line:26);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentOnlineQuery.php-
- Full path:
- airmax/m/PaymentOnlineQuery.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:50 12/12/2025
- Last modified:
- 02:50:39 07/04/2024
- MD5 hash:
- c7aca21e5a61ded371d4b853710cf4b4
- Filesize:
- 21.14 KB
- suspicious functions used:
- curl_exec (line:287);curl_exec (line:512);
$resultdata=curl_exec($url);$content = curl_exec($handle ); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: support-action.php-
- Full path:
- airmax/m/support-action.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:50 12/12/2025
- Last modified:
- 02:50:39 07/04/2024
- MD5 hash:
- 2fc6fd844db911a5502a7a6ae383990f
- Filesize:
- 10.31 KB
- suspicious functions used:
- curl_exec (line:99);
$jsona = curl_exec($ch10); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: createpayment.php-
- Full path:
- airmax/m/createpayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:50 12/12/2025
- Last modified:
- 02:50:38 07/04/2024
- MD5 hash:
- 849185f307be30eafb1bbef93616d8c3
- Filesize:
- 1.71 KB
- suspicious functions used:
- curl_exec (line:57);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: executepayment.php-
- Full path:
- airmax/m/executepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:50 12/12/2025
- Last modified:
- 02:50:38 07/04/2024
- MD5 hash:
- 9a3f22521ad987e86f84c4f5f688d5b7
- Filesize:
- 713 B
- suspicious functions used:
- curl_exec (line:18);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tcreateagree.php-
- Full path:
- airmax/m/tcreateagree.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:50 12/12/2025
- Last modified:
- 02:50:39 07/04/2024
- MD5 hash:
- 27a10adf4190edc7eceee8cf74a6b72b
- Filesize:
- 999 B
- suspicious functions used:
- curl_exec (line:26);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: index.php-
- Full path:
- airmax/m/index.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 05:15:09 12/12/2025
- Last modified:
- 02:50:38 07/04/2024
- MD5 hash:
- decb17fe39b65c67448bf9b3896a5d22
- Filesize:
- 12.14 KB
- suspicious functions used:
- base64_decode (line:10);curl_exec (line:183);
list($encrypted_data,$iv,$key) = explode('::',base64_decode($ciphertext));$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: token.php-
- Full path:
- airmax/m/token.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:50 12/12/2025
- Last modified:
- 02:50:39 07/04/2024
- MD5 hash:
- 7d8e71ceda3ffb74623e0c4a814715af
- Filesize:
- 1.53 KB
- suspicious functions used:
- curl_exec (line:42);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentOnlineQuery2.php-
- Full path:
- airmax/m/PaymentOnlineQuery2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:50 12/12/2025
- Last modified:
- 02:50:39 07/04/2024
- MD5 hash:
- 37be1b3f51cac8d936abe043bc79ed4b
- Filesize:
- 19.08 KB
- suspicious functions used:
- curl_exec (line:41);curl_exec (line:254);
$resultdatax=curl_exec($url);$result = curl_exec($handle); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tcreatepayment.php-
- Full path:
- airmax/m/tcreatepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:51 12/12/2025
- Last modified:
- 02:50:39 07/04/2024
- MD5 hash:
- e49de9a33f5164bc2c6b88e4770faaff
- Filesize:
- 1.07 KB
- suspicious functions used:
- curl_exec (line:27);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: login_exec.php-
- Full path:
- airmax/m/login_exec.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 05:15:12 12/12/2025
- Last modified:
- 02:50:38 07/04/2024
- MD5 hash:
- 1f800365ef270564df77d30c1bfd7ed3
- Filesize:
- 5.4 KB
- suspicious functions used:
- curl_exec (line:66);
$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: login_exec1.php-
- Full path:
- airmax/m/login_exec1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:51 12/12/2025
- Last modified:
- 02:50:38 07/04/2024
- MD5 hash:
- 46b08782f51ba75b23e27183e06370fe
- Filesize:
- 4.28 KB
- suspicious functions used:
- curl_exec (line:61);
$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: nagad-merchant-callback.php-
- Full path:
- airmax/m/nagad-merchant-callback.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:51 12/12/2025
- Last modified:
- 02:50:39 07/04/2024
- MD5 hash:
- 1ca42269a7e5563f13a266d9c0ce5049
- Filesize:
- 11.75 KB
- suspicious functions used:
- curl_exec (line:20);
$file_contents = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ttoken.php-
- Full path:
- airmax/m/ttoken.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:51 12/12/2025
- Last modified:
- 02:50:39 07/04/2024
- MD5 hash:
- 5f2c51c1db5b0defadfb67ce25c0098f
- Filesize:
- 1.54 KB
- suspicious functions used:
- curl_exec (line:42);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: nagad-helper.php-
- Full path:
- airmax/m/nagad-helper.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:51 12/12/2025
- Last modified:
- 02:50:39 07/04/2024
- MD5 hash:
- 2bb70c44d68202e0a0cd8ae1388f0b1b
- Filesize:
- 6.74 KB
- suspicious functions used:
- curl_exec (line:61);base64_decode (line:97);
$resultData = curl_exec($url);openssl_private_decrypt(base64_decode($cryptText), $plain_text, $private_key); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: texecutepayment.php-
- Full path:
- airmax/m/texecutepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:51 12/12/2025
- Last modified:
- 02:50:39 07/04/2024
- MD5 hash:
- efbb63dfcfdacb52dec74bffc389bbb3
- Filesize:
- 2.67 KB
- suspicious functions used:
- curl_exec (line:24);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: class.phpmailer.php-
- Full path:
- airmax/web/email/class.phpmailer.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:51 12/12/2025
- Last modified:
- 02:50:53 07/04/2024
- MD5 hash:
- 68468d69b47fffecc89df57e27c5a781
- Filesize:
- 143.32 KB
- suspicious functions used:
- `$DKIM_private` (line:428);popen (line:1387);
* If set, takes precedence over `$DKIM_private`.popen (line:1408);if (!@$mail = popen($sendmail, 'w')) {base64_decode (line:3410);if (!@$mail = popen($sendmail, 'w')) {`$mail->set('SMTPSecure', 'tls');` (line:3688);$data = base64_decode($data);`$mail->SMTPSecure = 'tls';` (line:3690);* `$mail->set('SMTPSecure', 'tls');`* `$mail->SMTPSecure = 'tls';` - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: class.smtp.php-
- Full path:
- airmax/web/email/class.smtp.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:51 12/12/2025
- Last modified:
- 02:50:53 07/04/2024
- MD5 hash:
- aa8478329268e5438a4469c268337a10
- Filesize:
- 41.44 KB
- suspicious functions used:
- base64_decode (line:513);base64_decode (line:533);
$challenge = base64_decode($challenge);$challenge = base64_decode(substr($this->last_reply, 4)); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: JSON.php-
- Full path:
- airmax/web/inc/JSON.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:52 12/12/2025
- Last modified:
- 02:50:55 07/04/2024
- MD5 hash:
- f5a34509e06231308becbe320ade9ff6
- Filesize:
- 33.22 KB
- suspicious functions used:
- eval (line:22);
* Javascript, and can be directly eval()'ed with no further parsing - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: jqgrid.php-
- Full path:
- airmax/web/inc/jqgrid.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:52 12/12/2025
- Last modified:
- 02:50:55 07/04/2024
- MD5 hash:
- 71027a29e71e0626d8b57cbb631e6d98
- Filesize:
- 23.92 KB
- suspicious functions used:
- eval (line:397);
if (!empty($V4a8a08f0["condition"])) eval("\$V4b43b0ae = ".$V4a8a08f0["condition"].";"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: smsapicore.php-
- Full path:
- airmax/web/include/smsapicore.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 09:07:46 12/12/2025
- Last modified:
- 02:50:56 07/04/2024
- MD5 hash:
- f430c15cd3145be5a4641142f5fe2d65
- Filesize:
- 918 B
- suspicious functions used:
- curl_exec (line:13);
$resultdgfb = curl_exec($chg); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: telegramapicore.php-
- Full path:
- airmax/web/include/telegramapicore.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:52 12/12/2025
- Last modified:
- 02:50:56 07/04/2024
- MD5 hash:
- 535fa7aac83b0e1ba56be7837348b6d9
- Filesize:
- 2.9 KB
- suspicious functions used:
- curl_exec (line:63);
$result11 = curl_exec($ch3); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Changes.txt-
- Full path:
- airmax/web/js/jqgrid/js/Changes.txt
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:52 12/12/2025
- Last modified:
- 02:51:04 07/04/2024
- MD5 hash:
- c0a4adbc3f1c6d592cb4fa8433fee9ea
- Filesize:
- 44.32 KB
- suspicious functions used:
- system (line:87);
* Add a ant based build system which allow us to minify the JS code - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ui.php-
- Full path:
- airmax/web/js/tinymce/themes/advanced/skins/highcontrast/ui.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:52 12/12/2025
- Last modified:
- 02:51:10 07/04/2024
- MD5 hash:
- 3edaf67be8573b86686f46bbba4f058c
- Filesize:
- 4.53 KB
- suspicious functions used:
- curl_exec (line:20);`bill_amount` = '0.00' WHERE bill_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY ` (line:53);
$alldataa = curl_exec($chxchhh);`bill_amount` = '0.00', days = '0.00' WHERE entry_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY ` (line:54);$queryss = mysql_query("UPDATE billing SET `bill_amount` = '0.00' WHERE bill_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY `id` DESC LIMIT 5");`payment` WHERE `pay_date` < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND pay_amount != '0.00' ORDER BY ` (line:55);$sqlqmss = mysql_query("UPDATE billing_mac SET `bill_amount` = '0.00', days = '0.00' WHERE entry_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY `id` DESC LIMIT 5");curl_exec (line:146);$sqlqmsp = mysql_query("DELETE FROM `payment` WHERE `pay_date` < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND pay_amount != '0.00' ORDER BY `id` ASC LIMIT 5");curl_exec (line:168);$responsed = curl_exec($curld);$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: AutoActiveClientsCount1.php-
- Full path:
- airmax/web/AutoActiveClientsCount1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 13:41:23 12/12/2025
- Last modified:
- 02:50:45 07/04/2024
- MD5 hash:
- fb443f2f93781a8fffce803317592c41
- Filesize:
- 6.12 KB
- suspicious functions used:
- system (line:56);
$ARRAY = $API->comm("/system/resource/print"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: AutoActiveClientsCount11.php-
- Full path:
- airmax/web/AutoActiveClientsCount11.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:53 12/12/2025
- Last modified:
- 02:50:45 07/04/2024
- MD5 hash:
- a0090e4a11dd59b955a6edd549b6ef2f
- Filesize:
- 5.85 KB
- suspicious functions used:
- system (line:54);
$ARRAY = $API->comm("/system/resource/print"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: InstrumentsStoreOutDetails.php-
- Full path:
- airmax/web/InstrumentsStoreOutDetails.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:55 12/12/2025
- Last modified:
- 02:50:47 07/04/2024
- MD5 hash:
- ab68ab13bcfd51da15e72a3d4e9817e8
- Filesize:
- 9.37 KB
- suspicious functions used:
- `update_date`, '%D-%b, %y') AS offdate, TIME_FORMAT(`update_time`, '%T') AS offtime FROM `con_sts_log` WHERE `c_id` = '{$row['c_id']}' AND con_sts = 'Inactive' ORDER BY ` (line:120);
$resultwwdd=mysql_query("SELECT DATE_FORMAT(`update_date`, '%D-%b, %y') AS offdate, TIME_FORMAT(`update_time`, '%T') AS offtime FROM `con_sts_log` WHERE `c_id` = '{$row['c_id']}' AND con_sts = 'Inactive' ORDER BY `update_date_time` DESC LIMIT 1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Network.php-
- Full path:
- airmax/web/Network.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 14:33:11 12/12/2025
- Last modified:
- 02:50:49 07/04/2024
- MD5 hash:
- eef190061625bfa2d7ba43697eaeca82
- Filesize:
- 26.67 KB
- suspicious functions used:
- system (line:216);
$ARRAY = $API->comm("/system/resource/print"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Network1.php-
- Full path:
- airmax/web/Network1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:56 12/12/2025
- Last modified:
- 02:50:49 07/04/2024
- MD5 hash:
- 81fbd1a4bf9ecbb944ccd98ae719849b
- Filesize:
- 22.92 KB
- suspicious functions used:
- system (line:209);
$ARRAY = $API->comm("/system/resource/print"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkLoad.php-
- Full path:
- airmax/web/NetworkLoad.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 14:33:12 12/12/2025
- Last modified:
- 02:50:49 07/04/2024
- MD5 hash:
- e1632e66ee1b7394d3fb82751b924abe
- Filesize:
- 2.83 KB
- suspicious functions used:
- system (line:81);
$ARRAY = $API->comm("/system/resource/print"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: SMS.php-
- Full path:
- airmax/web/SMS.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:56 12/12/2025
- Last modified:
- 02:50:50 07/04/2024
- MD5 hash:
- 3fa15a1ba3c18afe9e6176dc8f526985
- Filesize:
- 35.86 KB
- suspicious functions used:
- curl_exec (line:56);
$balance = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: SMSAddSave.php-
- Full path:
- airmax/web/SMSAddSave.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:56 12/12/2025
- Last modified:
- 02:50:50 07/04/2024
- MD5 hash:
- 1a6eaf13aa0ca959fe2dca885b7ffd8e
- Filesize:
- 1.73 KB
- suspicious functions used:
- curl_exec (line:34);
$result = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkLoad1.php-
- Full path:
- airmax/web/NetworkLoad1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:56 12/12/2025
- Last modified:
- 02:50:49 07/04/2024
- MD5 hash:
- 176bd6931be34d7ef351d22897accc65
- Filesize:
- 759 B
- suspicious functions used:
- system (line:18);
$ARRAY = $API->comm("/system/resource/print"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: SMS1.php-
- Full path:
- airmax/web/SMS1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:56 12/12/2025
- Last modified:
- 02:50:50 07/04/2024
- MD5 hash:
- 40d55bbcfe09846560034ad6b6748670
- Filesize:
- 32.19 KB
- suspicious functions used:
- curl_exec (line:59);
$balance = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentOnlineQuery.php-
- Full path:
- airmax/web/PaymentOnlineQuery.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:57 12/12/2025
- Last modified:
- 02:50:49 07/04/2024
- MD5 hash:
- e71855333c2ea0c43f2a87109898c283
- Filesize:
- 28.5 KB
- suspicious functions used:
- curl_exec (line:456);curl_exec (line:688);
$resultdata=curl_exec($url);$content = curl_exec($handle ); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentOnlineQuery2.php-
- Full path:
- airmax/web/PaymentOnlineQuery2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:57 12/12/2025
- Last modified:
- 02:50:49 07/04/2024
- MD5 hash:
- 700d8182abbbc0b80fe31beb1e717699
- Filesize:
- 19.39 KB
- suspicious functions used:
- curl_exec (line:42);curl_exec (line:252);
$resultdatax=curl_exec($url);$result = curl_exec($handle); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentWebhook.php-
- Full path:
- airmax/web/PaymentWebhook.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:57 12/12/2025
- Last modified:
- 02:50:49 07/04/2024
- MD5 hash:
- a2f322c94787630ab1e0c8ca35fc5ba1
- Filesize:
- 18.6 KB
- suspicious functions used:
- base64_decode (line:30);curl_exec (line:41);
$signatureDecoded = base64_decode($signature);curl_exec (line:422);curl_exec($url);$data = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: SignUp1.php-
- Full path:
- airmax/web/SignUp1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:59 12/12/2025
- Last modified:
- 02:50:50 07/04/2024
- MD5 hash:
- 3f7943dd155c8e0a383b7d02730f8c11
- Filesize:
- 24.59 KB
- suspicious functions used:
- curl_exec (line:33);curl_exec (line:59);
$jsona = curl_exec($ch10);$resdfwedf = curl_exec($ch1s); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: sms-balance-check.php-
- Full path:
- airmax/web/sms-balance-check.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 15:22:11 12/12/2025
- Last modified:
- 02:50:50 07/04/2024
- MD5 hash:
- 74ac3e963a0dc5bb7d4c980e594aa39b
- Filesize:
- 854 B
- suspicious functions used:
- curl_exec (line:15);
$balance = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_inactive_termination.php-
- Full path:
- airmax/web/cron_auto_inactive_termination.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 01:55:16 12/12/2025
- Last modified:
- 12:17:50 23/09/2024
- MD5 hash:
- 9f9c8ca9110c2304128646824bfb17db
- Filesize:
- 12.16 KB
- suspicious functions used:
- curl_exec (line:241);curl_exec (line:253);
$resp = curl_exec($curlss);$respw = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: sms_deliverey_report.php-
- Full path:
- airmax/web/sms_deliverey_report.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 03:06:27 12/12/2025
- Last modified:
- 02:50:51 07/04/2024
- MD5 hash:
- 03623943da7e9334e137b38c8577fc84
- Filesize:
- 4.25 KB
- suspicious functions used:
- curl_exec (line:28);curl_exec (line:53);
$result11 = curl_exec($ch1);curl_exec (line:90);$resultdd = curl_exec($ch);$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_inactive_termination1.php-
- Full path:
- airmax/web/cron_auto_inactive_termination1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:59 12/12/2025
- Last modified:
- 02:50:47 07/04/2024
- MD5 hash:
- be76b964c93a2cb4fa7e632750ff3bc4
- Filesize:
- 6.64 KB
- suspicious functions used:
- curl_exec (line:156);curl_exec (line:168);
$resp = curl_exec($curlss);$respw = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_termination_remainder1.php-
- Full path:
- airmax/web/cron_auto_termination_remainder1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 03:06:26 12/12/2025
- Last modified:
- 02:50:47 07/04/2024
- MD5 hash:
- 7765f9f820dbd402f1064fab9958ffaa
- Filesize:
- 3.26 KB
- suspicious functions used:
- curl_exec (line:83);
$respw = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_client_bandwidth_count.php-
- Full path:
- airmax/web/cron_client_bandwidth_count.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 22:13:45 11/12/2025
- Last modified:
- 02:50:47 07/04/2024
- MD5 hash:
- de3b1389261cf5411b7e7ca5c44f96b2
- Filesize:
- 4.08 KB
- suspicious functions used:
- curl_exec (line:117);
$result = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_network.php-
- Full path:
- airmax/web/cron_network.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 14:03:21 12/12/2025
- Last modified:
- 02:50:47 07/04/2024
- MD5 hash:
- 1a75ea6c2e0cc5b9263541dda62ab458
- Filesize:
- 4.61 KB
- suspicious functions used:
- curl_exec (line:45);curl_exec (line:67);
$result1d = curl_exec($ch11);$result1dd = curl_exec($ch111); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: client-online-mbb.php-
- Full path:
- airmax/web/client-online-mbb.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:59 12/12/2025
- Last modified:
- 02:50:46 07/04/2024
- MD5 hash:
- 69c51efb5b9017a07a7158b4a63f3826
- Filesize:
- 14.32 KB
- suspicious functions used:
- curl_exec (line:90);
$resp = curl_exec($curlss); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_inactive.php-
- Full path:
- airmax/web/cron_auto_inactive.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 06:00:02 12/12/2025
- Last modified:
- 02:50:47 07/04/2024
- MD5 hash:
- 7e0dc4dd9dae2bf0220516641b53c027
- Filesize:
- 5.43 KB
- suspicious functions used:
- curl_exec (line:142);
$respw = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_inactive2.php-
- Full path:
- airmax/web/cron_auto_inactive2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:59 12/12/2025
- Last modified:
- 02:50:47 07/04/2024
- MD5 hash:
- 440bc24f05b01eb395df63fff2f60de9
- Filesize:
- 5.46 KB
- suspicious functions used:
- curl_exec (line:142);
$respw = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: company_info.php-
- Full path:
- airmax/web/company_info.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 22:23:05 11/12/2025
- Last modified:
- 13:01:05 09/04/2024
- MD5 hash:
- b4101deea24a74c779fd0c3d495014b2
- Filesize:
- 8 KB
- suspicious functions used:
- curl_exec (line:126);
$alldata = curl_exec($chhhh); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: createpayment.php-
- Full path:
- airmax/web/createpayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:59 12/12/2025
- Last modified:
- 02:50:47 07/04/2024
- MD5 hash:
- ba9747d0421fd091b998389469e72a0b
- Filesize:
- 1.7 KB
- suspicious functions used:
- curl_exec (line:57);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_all.php-
- Full path:
- airmax/web/cron_all.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:59 12/12/2025
- Last modified:
- 02:50:47 07/04/2024
- MD5 hash:
- b19a08fef36584598cca299b7ecc5e6d
- Filesize:
- 2.07 KB
- suspicious functions used:
- curl_exec (line:23);curl_exec (line:38);
$result1 = curl_exec($ch1);curl_exec (line:53);$result1d = curl_exec($ch11);$result1d2 = curl_exec($ch112); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_gen_bill.php-
- Full path:
- airmax/web/cron_auto_gen_bill.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:59 12/12/2025
- Last modified:
- 02:50:47 07/04/2024
- MD5 hash:
- f1056618cc4402968e50d1232d2c51c8
- Filesize:
- 4.73 KB
- suspicious functions used:
- curl_exec (line:140);curl_exec (line:149);
$respd = curl_exec($curl);$resp = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: login_exec.php-
- Full path:
- airmax/web/login_exec.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 13:41:22 12/12/2025
- Last modified:
- 02:50:48 07/04/2024
- MD5 hash:
- 9038a77a32a5db2c9affae1496473f3e
- Filesize:
- 5.27 KB
- suspicious functions used:
- curl_exec (line:62);
$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: login_exec1.php-
- Full path:
- airmax/web/login_exec1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:59 12/12/2025
- Last modified:
- 02:50:48 07/04/2024
- MD5 hash:
- 58e0da1ccc2585f2f6f687360dc9e503
- Filesize:
- 3.91 KB
- suspicious functions used:
- curl_exec (line:53);
$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: loginexec.php-
- Full path:
- airmax/web/loginexec.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:59 12/12/2025
- Last modified:
- 02:50:48 07/04/2024
- MD5 hash:
- edb8017e7d0f8e037facbcacc94a383d
- Filesize:
- 5.91 KB
- suspicious functions used:
- curl_exec (line:67);
$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: emp_salary_advence_find.php-
- Full path:
- airmax/web/emp_salary_advence_find.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:59 12/12/2025
- Last modified:
- 02:50:47 07/04/2024
- MD5 hash:
- 74a7e2ffda0f7584611d7cbce6136c24
- Filesize:
- 2.25 KB
- suspicious functions used:
- `expanse` WHERE `type` = '2' AND `status` = '2' AND ex_by = '$e_id' AND MONTH(`, `) = MONTH('$lastmonth') AND YEAR(`, `) = YEAR('$lastmonth') GROUP BY ` (line:8);`e_id` = '$e_id' AND ` (line:12);
$vendorrr = mysql_query("SELECT SUM(amount) AS salary_advance FROM `expanse` WHERE `type` = '2' AND `status` = '2' AND ex_by = '$e_id' AND MONTH(`check_date`) = MONTH('$lastmonth') AND YEAR(`check_date`) = YEAR('$lastmonth') GROUP BY `ex_by`");$empppp = mysql_query("SELECT gross_total AS gross_total FROM emp_info WHERE `e_id` = '$e_id' AND `status` = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: executepayment.php-
- Full path:
- airmax/web/executepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:59 12/12/2025
- Last modified:
- 02:50:47 07/04/2024
- MD5 hash:
- c46a50905333286f45dfeacf010851ab
- Filesize:
- 716 B
- suspicious functions used:
- curl_exec (line:18);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: nagad-helper.php-
- Full path:
- airmax/web/nagad-helper.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:59 12/12/2025
- Last modified:
- 02:50:48 07/04/2024
- MD5 hash:
- 2bb70c44d68202e0a0cd8ae1388f0b1b
- Filesize:
- 6.74 KB
- suspicious functions used:
- curl_exec (line:61);base64_decode (line:97);
$resultData = curl_exec($url);openssl_private_decrypt(base64_decode($cryptText), $plain_text, $private_key); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: nagad-merchant-callback.php-
- Full path:
- airmax/web/nagad-merchant-callback.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:59 12/12/2025
- Last modified:
- 02:50:48 07/04/2024
- MD5 hash:
- 9e7ba60bacff8c3a7792176f76b698ea
- Filesize:
- 16.91 KB
- suspicious functions used:
- curl_exec (line:20);
$file_contents = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: support-action.php-
- Full path:
- airmax/web/support-action.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:59 12/12/2025
- Last modified:
- 02:50:51 07/04/2024
- MD5 hash:
- f88ecf97f2a5d073332e9e7cea59ccb4
- Filesize:
- 10.09 KB
- suspicious functions used:
- curl_exec (line:95);
$jsona = curl_exec($ch10); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: index.php-
- Full path:
- airmax/web/index.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 17:23:03 12/12/2025
- Last modified:
- 02:50:47 07/04/2024
- MD5 hash:
- e3825a19a349b906bdf657d3e0e0752d
- Filesize:
- 11 KB
- suspicious functions used:
- base64_decode (line:10);curl_exec (line:178);
list($encrypted_data,$iv,$key) = explode('::',base64_decode($ciphertext));$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ip-ping-checker.php-
- Full path:
- airmax/web/ip-ping-checker.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:41:59 12/12/2025
- Last modified:
- 02:50:48 07/04/2024
- MD5 hash:
- 0d28f3053b73b3fe2885cf519ee17c12
- Filesize:
- 2.64 KB
- suspicious functions used:
- curl_exec (line:81);
$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tagreeexpayment.php-
- Full path:
- airmax/web/tagreeexpayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:00 12/12/2025
- Last modified:
- 02:50:51 07/04/2024
- MD5 hash:
- 029b4fba649a75c7c81d2f8931be8d63
- Filesize:
- 2.86 KB
- suspicious functions used:
- curl_exec (line:26);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tcreateagree.php-
- Full path:
- airmax/web/tcreateagree.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:00 12/12/2025
- Last modified:
- 02:50:51 07/04/2024
- MD5 hash:
- 27a10adf4190edc7eceee8cf74a6b72b
- Filesize:
- 999 B
- suspicious functions used:
- curl_exec (line:26);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tcreatepayment.php-
- Full path:
- airmax/web/tcreatepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:00 12/12/2025
- Last modified:
- 02:50:51 07/04/2024
- MD5 hash:
- e49de9a33f5164bc2c6b88e4770faaff
- Filesize:
- 1.07 KB
- suspicious functions used:
- curl_exec (line:27);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: test2.php-
- Full path:
- airmax/web/test2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:00 12/12/2025
- Last modified:
- 02:50:51 07/04/2024
- MD5 hash:
- b9ef5733c4f9b84398b99fb11c41719e
- Filesize:
- 6.17 KB
- suspicious functions used:
- `` (line:96);
`<i class="fa fa-${series.options.custom.icon}"></i>`, - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: test3.php-
- Full path:
- airmax/web/test3.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:00 12/12/2025
- Last modified:
- 02:50:51 07/04/2024
- MD5 hash:
- dc4ac1bf476364535cb25439b264003b
- Filesize:
- 1.71 KB
- suspicious functions used:
- system (line:20);system (line:21);
$systemDescription = fsnmpget($host, $community, "system.sysDescr.0");system (line:22);$systemLocation = fsnmpget($host, $community, "system.sysLocation.0");$systemName = fsnmpget($host, $community, "system.sysName.0"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: test6.php-
- Full path:
- airmax/web/test6.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:00 12/12/2025
- Last modified:
- 02:50:51 07/04/2024
- MD5 hash:
- b81f996d42a831491ce9a6f64735e159
- Filesize:
- 906 B
- suspicious functions used:
- curl_exec (line:8);
$response = curl_exec($handle); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: testttttt.php-
- Full path:
- airmax/web/testttttt.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:00 12/12/2025
- Last modified:
- 02:50:51 07/04/2024
- MD5 hash:
- b1988a4be29e191ad935fb409a4174ee
- Filesize:
- 2 KB
- suspicious functions used:
- curl_exec (line:47);
$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: texecutepayment.php-
- Full path:
- airmax/web/texecutepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:00 12/12/2025
- Last modified:
- 02:50:51 07/04/2024
- MD5 hash:
- 623635fdf5c871391d3a5fe99ee8c543
- Filesize:
- 2.91 KB
- suspicious functions used:
- curl_exec (line:24);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: time1.php-
- Full path:
- airmax/web/time1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:00 12/12/2025
- Last modified:
- 02:50:51 07/04/2024
- MD5 hash:
- d01faecde155f90d6483809f888a7562
- Filesize:
- 551 B
- suspicious functions used:
- curl_exec (line:18);
$response = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tis-news.php-
- Full path:
- airmax/web/tis-news.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 15:22:16 12/12/2025
- Last modified:
- 07:55:15 09/04/2024
- MD5 hash:
- ed23ca98b77c5321b4485e85eb2ea64d
- Filesize:
- 3.67 KB
- suspicious functions used:
- curl_exec (line:22);
$alldata1 = curl_exec($chhhh1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: token.php-
- Full path:
- airmax/web/token.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:00 12/12/2025
- Last modified:
- 02:50:51 07/04/2024
- MD5 hash:
- 7d8e71ceda3ffb74623e0c4a814715af
- Filesize:
- 1.53 KB
- suspicious functions used:
- curl_exec (line:42);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tt.php-
- Full path:
- airmax/web/tt.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:00 12/12/2025
- Last modified:
- 02:50:51 07/04/2024
- MD5 hash:
- 9c4ed141cb79fdc7e807b35923c91a20
- Filesize:
- 1.56 KB
- suspicious functions used:
- curl_exec (line:30);
$response = curl_exec($curl); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ttoken.php-
- Full path:
- airmax/web/ttoken.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:00 12/12/2025
- Last modified:
- 02:50:51 07/04/2024
- MD5 hash:
- 5f2c51c1db5b0defadfb67ce25c0098f
- Filesize:
- 1.54 KB
- suspicious functions used:
- curl_exec (line:42);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: webhook.php-
- Full path:
- airmax/web/webhook.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 03:57:46 12/12/2025
- Last modified:
- 02:16:53 01/11/2024
- MD5 hash:
- 26e2059a39281031d28874b51b52d60c
- Filesize:
- 21.23 KB
- suspicious functions used:
- base64_decode (line:27);curl_exec (line:38);
$signatureDecoded = base64_decode($signature);curl_exec (line:454);curl_exec($url);$data = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: webhook111.php-
- Full path:
- airmax/web/webhook111.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:00 12/12/2025
- Last modified:
- 02:50:52 07/04/2024
- MD5 hash:
- 22bcd30caceb03ee300f42e7587119fa
- Filesize:
- 20.98 KB
- suspicious functions used:
- base64_decode (line:28);curl_exec (line:39);
$signatureDecoded = base64_decode($signature);curl_exec (line:427);curl_exec($url);$data = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: webhook_cid.php-
- Full path:
- airmax/web/webhook_cid.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:00 12/12/2025
- Last modified:
- 02:50:52 07/04/2024
- MD5 hash:
- 007f8fa5636da9e44a38526298f7e155
- Filesize:
- 21.08 KB
- suspicious functions used:
- base64_decode (line:28);curl_exec (line:39);
$signatureDecoded = base64_decode($signature);curl_exec (line:429);curl_exec($url);$data = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: webhook_comid.php-
- Full path:
- airmax/web/webhook_comid.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:00 12/12/2025
- Last modified:
- 02:50:52 07/04/2024
- MD5 hash:
- 787511edcbdc9d6c9b26eba2dee70a84
- Filesize:
- 21.21 KB
- suspicious functions used:
- base64_decode (line:27);curl_exec (line:38);
$signatureDecoded = base64_decode($signature);curl_exec (line:454);curl_exec($url);$data = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: AppSettings.php-
- Full path:
- ajwah/web/AppSettings.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:00 12/12/2025
- Last modified:
- 09:52:04 06/03/2025
- MD5 hash:
- 7ed349c4b0217e5395c4cc9295f66f4a
- Filesize:
- 123.71 KB
- suspicious functions used:
- `input[name="${inputName}"]:checked` (line:2066);
var value = document.querySelector(`input[name="${inputName}"]:checked`).value; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: AutoActiveClientsCount1.php-
- Full path:
- ajwah/web/AutoActiveClientsCount1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 13:07:34 12/12/2025
- Last modified:
- 09:52:04 06/03/2025
- MD5 hash:
- 3b3b6186ff2d9c5abd1772e5aa02ee33
- Filesize:
- 6.4 KB
- suspicious functions used:
- system (line:58);
$ARRAY = $API->comm("/system/resource/print"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: AutoActiveClientsCount11.php-
- Full path:
- ajwah/web/AutoActiveClientsCount11.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:01 12/12/2025
- Last modified:
- 09:52:04 06/03/2025
- MD5 hash:
- a0090e4a11dd59b955a6edd549b6ef2f
- Filesize:
- 5.85 KB
- suspicious functions used:
- system (line:54);
$ARRAY = $API->comm("/system/resource/print"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: client-online-mbb.php-
- Full path:
- ajwah/web/client-online-mbb.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:02 12/12/2025
- Last modified:
- 09:52:11 06/03/2025
- MD5 hash:
- e16c33ab6ddd7649ea56a7d5355365b6
- Filesize:
- 16.46 KB
- suspicious functions used:
- curl_exec (line:90);curl_exec (line:289);
$resp = curl_exec($curlss);$resp = curl_exec($curlss); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: clients-nots-action.php-
- Full path:
- ajwah/web/clients-nots-action.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 13:18:28 12/12/2025
- Last modified:
- 09:52:15 06/03/2025
- MD5 hash:
- dff1bb495509427d098cb4588da553b9
- Filesize:
- 5.89 KB
- suspicious functions used:
- curl_exec (line:35);
$jsona = curl_exec($ch10); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Clients.php-
- Full path:
- ajwah/web/Clients.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 11:40:52 12/12/2025
- Last modified:
- 10:26:47 06/03/2025
- MD5 hash:
- 95c2c28384fd7b6a33afc844c109e785
- Filesize:
- 209.92 KB
- suspicious functions used:
- `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:878);
$result1rd=mysql_query("SELECT `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND `sts` = '0' order by b_name ASC"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Clients1.php-
- Full path:
- ajwah/web/Clients1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:02 12/12/2025
- Last modified:
- 09:52:18 06/03/2025
- MD5 hash:
- 228d02141d96f75107f8cad1047b18de
- Filesize:
- 208.78 KB
- suspicious functions used:
- `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:844);
$result1rd=mysql_query("SELECT `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND `sts` = '0' order by b_name ASC"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Clients2.php-
- Full path:
- ajwah/web/Clients2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:03 12/12/2025
- Last modified:
- 09:52:19 06/03/2025
- MD5 hash:
- 982d6411552113b0715fd17c26f50292
- Filesize:
- 205.13 KB
- suspicious functions used:
- `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:832);
$result1rd=mysql_query("SELECT `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND `sts` = '0' order by b_name ASC"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Clients3.php-
- Full path:
- ajwah/web/Clients3.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:03 12/12/2025
- Last modified:
- 09:52:20 06/03/2025
- MD5 hash:
- 50ddc869b383ab76e009c7a2c17c99a3
- Filesize:
- 175.31 KB
- suspicious functions used:
- `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:832);
$result1rd=mysql_query("SELECT `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND `sts` = '0' order by b_name ASC"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ClientsOnMap.php-
- Full path:
- ajwah/web/ClientsOnMap.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:04 12/12/2025
- Last modified:
- 06:02:55 10/11/2025
- MD5 hash:
- 64ef22e5741bcb6332ba80d27017ca49
- Filesize:
- 11.5 KB
- suspicious functions used:
- `${totalonline}` (line:98);`${totaloffline}` (line:99);
document.getElementById('totalonline').textContent = `${totalonline}`;`${results.rxPower}` (line:232);document.getElementById('totaloffline').textContent = `${totaloffline}`;`${results.distance}` (line:233);var rxPower = `${results.rxPower}`;`${results.supplyVoltage}` (line:234);var distance = `${results.distance}`;`${results.temperature}` (line:235);var supplyVoltage = `${results.supplyVoltage}`;`${results.txPower}` (line:236);var temperature = `${results.temperature}`;var txPower = `${results.txPower}`; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ClientView.php-
- Full path:
- ajwah/web/ClientView.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 16:53:23 12/12/2025
- Last modified:
- 09:52:25 06/03/2025
- MD5 hash:
- ecd7171b944880ac4539623626dbf9d2
- Filesize:
- 111.69 KB
- suspicious functions used:
- `olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:227);
$querydd = mysql_query("SELECT `olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND `olt_id` = '$c_olt_id' AND sts = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ClientView1.php-
- Full path:
- ajwah/web/ClientView1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:04 12/12/2025
- Last modified:
- 09:52:25 06/03/2025
- MD5 hash:
- ecd7171b944880ac4539623626dbf9d2
- Filesize:
- 111.69 KB
- suspicious functions used:
- `olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:227);
$querydd = mysql_query("SELECT `olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND `olt_id` = '$c_olt_id' AND sts = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: company_info.php-
- Full path:
- ajwah/web/company_info.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:50:51 11/12/2025
- Last modified:
- 09:52:26 06/03/2025
- MD5 hash:
- 2983755d925ee3aa49accefa47451c7d
- Filesize:
- 8.62 KB
- suspicious functions used:
- curl_exec (line:134);
$alldata = curl_exec($chhhh); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: createpayment.php-
- Full path:
- ajwah/web/createpayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:04 12/12/2025
- Last modified:
- 09:52:26 06/03/2025
- MD5 hash:
- ba9747d0421fd091b998389469e72a0b
- Filesize:
- 1.7 KB
- suspicious functions used:
- curl_exec (line:57);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_all.php-
- Full path:
- ajwah/web/cron_all.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:04 12/12/2025
- Last modified:
- 09:52:26 06/03/2025
- MD5 hash:
- 967f1d654ae891609da26b9e0fdbd1ae
- Filesize:
- 2.44 KB
- suspicious functions used:
- curl_exec (line:23);curl_exec (line:38);
$result1 = curl_exec($ch1);curl_exec (line:53);$result1d = curl_exec($ch11);$result1d2 = curl_exec($ch112); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_gen_bill.php-
- Full path:
- ajwah/web/cron_auto_gen_bill.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:04 12/12/2025
- Last modified:
- 09:52:26 06/03/2025
- MD5 hash:
- f1056618cc4402968e50d1232d2c51c8
- Filesize:
- 4.73 KB
- suspicious functions used:
- curl_exec (line:140);curl_exec (line:149);
$respd = curl_exec($curl);$resp = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_inactive.php-
- Full path:
- ajwah/web/cron_auto_inactive.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:04 12/12/2025
- Last modified:
- 09:52:26 06/03/2025
- MD5 hash:
- 7e0dc4dd9dae2bf0220516641b53c027
- Filesize:
- 5.43 KB
- suspicious functions used:
- curl_exec (line:142);
$respw = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_inactive2.php-
- Full path:
- ajwah/web/cron_auto_inactive2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:04 12/12/2025
- Last modified:
- 09:52:26 06/03/2025
- MD5 hash:
- 440bc24f05b01eb395df63fff2f60de9
- Filesize:
- 5.46 KB
- suspicious functions used:
- curl_exec (line:142);
$respw = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_inactive_termination.php-
- Full path:
- ajwah/web/cron_auto_inactive_termination.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 01:00:25 12/12/2025
- Last modified:
- 09:52:26 06/03/2025
- MD5 hash:
- 49f9f022b288eb3a85139ac8c1afb13c
- Filesize:
- 12.23 KB
- suspicious functions used:
- curl_exec (line:219);curl_exec (line:231);
$resp = curl_exec($curlss);curl_exec (line:273);$respw = curl_exec($curls);$resp = curl_exec($curlss); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_termination_remainder1.php-
- Full path:
- ajwah/web/cron_auto_termination_remainder1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 03:06:48 12/12/2025
- Last modified:
- 09:52:26 06/03/2025
- MD5 hash:
- 7765f9f820dbd402f1064fab9958ffaa
- Filesize:
- 3.26 KB
- suspicious functions used:
- curl_exec (line:83);
$respw = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_client_bandwidth_count.php-
- Full path:
- ajwah/web/cron_client_bandwidth_count.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 00:23:51 12/12/2025
- Last modified:
- 09:52:26 06/03/2025
- MD5 hash:
- 1c71a3dd097275429ae845a85ced0438
- Filesize:
- 5.33 KB
- suspicious functions used:
- curl_exec (line:124);curl_exec (line:134);
$result = curl_exec($ch);$result1dd = curl_exec($ch111); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_network.php-
- Full path:
- ajwah/web/cron_network.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 10:03:50 12/12/2025
- Last modified:
- 09:52:26 06/03/2025
- MD5 hash:
- db096f353e80027593ca3f9781a21ac8
- Filesize:
- 4.93 KB
- suspicious functions used:
- curl_exec (line:45);curl_exec (line:67);
$result1d = curl_exec($ch11);curl_exec (line:127);$result1dd = curl_exec($ch111);$result1dd = curl_exec($ch111); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_olt.php-
- Full path:
- ajwah/web/cron_olt.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:16:02 12/12/2025
- Last modified:
- 09:52:26 06/03/2025
- MD5 hash:
- 5edf51db84e11e807af66733348efbf5
- Filesize:
- 4.19 KB
- suspicious functions used:
- shell_exec (line:48);curl_exec (line:126);
$output = shell_exec($command);$result1dd = curl_exec($ch111); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_olt_clients_catch.php-
- Full path:
- ajwah/web/cron_olt_clients_catch.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:05 12/12/2025
- Last modified:
- 09:52:26 06/03/2025
- MD5 hash:
- 3b13c163ba3445b3d661c63adde1d985
- Filesize:
- 1.12 KB
- suspicious functions used:
- curl_exec (line:23);
$result1d = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_olt_user.php-
- Full path:
- ajwah/web/cron_olt_user.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:05 12/12/2025
- Last modified:
- 09:52:26 06/03/2025
- MD5 hash:
- 67aa237639e3d1e6064e76079bb3cccc
- Filesize:
- 1.97 KB
- suspicious functions used:
- curl_exec (line:19);curl_exec (line:46);
$resultd1d = curl_exec($ch110);$result1d = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: EmployeeAdd.php-
- Full path:
- ajwah/web/EmployeeAdd.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:05 12/12/2025
- Last modified:
- 09:52:27 06/03/2025
- MD5 hash:
- c12c85fa282eb15060ed68bad252f8e8
- Filesize:
- 19.13 KB
- suspicious functions used:
- `Element with ID ${id} not found.` (line:36);`Non-numeric input detected in ${id}.` (line:38);
if (!element) throw `Element with ID ${id} not found.`;`Element with ID ${id} not found.` (line:44);if (isNaN(value)) throw `Non-numeric input detected in ${id}.`;`Non-numeric input detected in ${id}.` (line:46);if (!element) throw `Element with ID ${id} not found.`;if (isNaN(value)) throw `Non-numeric input detected in ${id}.`; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: EmployeeEdit.php-
- Full path:
- ajwah/web/EmployeeEdit.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:05 12/12/2025
- Last modified:
- 09:52:27 06/03/2025
- MD5 hash:
- 55b4626339d566473f477e1a001dc8b4
- Filesize:
- 17.73 KB
- suspicious functions used:
- `Element with ID ${id} not found.` (line:44);`Non-numeric input detected in ${id}.` (line:46);
if (!element) throw `Element with ID ${id} not found.`;`Element with ID ${id} not found.` (line:52);if (isNaN(value)) throw `Non-numeric input detected in ${id}.`;`Non-numeric input detected in ${id}.` (line:54);if (!element) throw `Element with ID ${id} not found.`;if (isNaN(value)) throw `Non-numeric input detected in ${id}.`; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: emp_salary_advence_find.php-
- Full path:
- ajwah/web/emp_salary_advence_find.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:05 12/12/2025
- Last modified:
- 09:52:27 06/03/2025
- MD5 hash:
- 74a7e2ffda0f7584611d7cbce6136c24
- Filesize:
- 2.25 KB
- suspicious functions used:
- `expanse` WHERE `type` = '2' AND `status` = '2' AND ex_by = '$e_id' AND MONTH(`, `) = MONTH('$lastmonth') AND YEAR(`, `) = YEAR('$lastmonth') GROUP BY ` (line:8);`e_id` = '$e_id' AND ` (line:12);
$vendorrr = mysql_query("SELECT SUM(amount) AS salary_advance FROM `expanse` WHERE `type` = '2' AND `status` = '2' AND ex_by = '$e_id' AND MONTH(`check_date`) = MONTH('$lastmonth') AND YEAR(`check_date`) = YEAR('$lastmonth') GROUP BY `ex_by`");$empppp = mysql_query("SELECT gross_total AS gross_total FROM emp_info WHERE `e_id` = '$e_id' AND `status` = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: executepayment.php-
- Full path:
- ajwah/web/executepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:05 12/12/2025
- Last modified:
- 09:52:27 06/03/2025
- MD5 hash:
- c46a50905333286f45dfeacf010851ab
- Filesize:
- 716 B
- suspicious functions used:
- curl_exec (line:18);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: getclientuptime.php-
- Full path:
- ajwah/web/getclientuptime.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:05 12/12/2025
- Last modified:
- 09:52:30 06/03/2025
- MD5 hash:
- bbc14cdd451c72b94d78c7d2d1af0b52
- Filesize:
- 718 B
- suspicious functions used:
- curl_exec (line:18);
$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: imagevwr.php-
- Full path:
- ajwah/web/imagevwr.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 08:04:45 12/12/2025
- Last modified:
- 09:52:30 06/03/2025
- MD5 hash:
- 47a223a13cc642d01dcfaaca542d396d
- Filesize:
- 915 B
- suspicious functions used:
- curl_exec (line:15);
$image_data = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: index.php-
- Full path:
- ajwah/web/index.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 12:27:00 12/12/2025
- Last modified:
- 09:52:30 06/03/2025
- MD5 hash:
- 3d1fa8a053cd084d6bcbc24765a91739
- Filesize:
- 16.67 KB
- suspicious functions used:
- curl_exec (line:298);
$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: InstrumentsStoreOutDetails.php-
- Full path:
- ajwah/web/InstrumentsStoreOutDetails.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:05 12/12/2025
- Last modified:
- 09:52:30 06/03/2025
- MD5 hash:
- a60c19f766bfff1ccdccbeba6b39eb87
- Filesize:
- 9.37 KB
- suspicious functions used:
- `update_date`, '%D-%b, %y') AS offdate, TIME_FORMAT(`update_time`, '%T') AS offtime FROM `con_sts_log` WHERE `c_id` = '{$row['c_id']}' AND con_sts = 'Inactive' ORDER BY ` (line:120);
$resultwwdd=mysql_query("SELECT DATE_FORMAT(`update_date`, '%D-%b, %y') AS offdate, TIME_FORMAT(`update_time`, '%T') AS offtime FROM `con_sts_log` WHERE `c_id` = '{$row['c_id']}' AND con_sts = 'Inactive' ORDER BY `update_date_time` DESC LIMIT 1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ip-ping-checker.php-
- Full path:
- ajwah/web/ip-ping-checker.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:05 12/12/2025
- Last modified:
- 09:52:31 06/03/2025
- MD5 hash:
- 0d28f3053b73b3fe2885cf519ee17c12
- Filesize:
- 2.64 KB
- suspicious functions used:
- curl_exec (line:81);
$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: LoginByPass.php-
- Full path:
- ajwah/web/LoginByPass.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:05 12/12/2025
- Last modified:
- 09:52:32 06/03/2025
- MD5 hash:
- a8f1789daadb34b0814aaecddfebe7c1
- Filesize:
- 4.26 KB
- suspicious functions used:
- curl_exec (line:41);
$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: loginexec.php-
- Full path:
- ajwah/web/loginexec.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:05 12/12/2025
- Last modified:
- 09:52:32 06/03/2025
- MD5 hash:
- edb8017e7d0f8e037facbcacc94a383d
- Filesize:
- 5.91 KB
- suspicious functions used:
- curl_exec (line:67);
$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: login_exec.php-
- Full path:
- ajwah/web/login_exec.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 05:52:46 12/12/2025
- Last modified:
- 14:50:38 12/03/2025
- MD5 hash:
- 52c9e33276b889bbe1bd665c754a5860
- Filesize:
- 12.1 KB
- suspicious functions used:
- curl_exec (line:24);curl_exec (line:74);
$jsona = curl_exec($ch10);curl_exec (line:199);$result110 = curl_exec($ch11);curl_exec (line:239);$jsona = curl_exec($ch10);$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: macreseller-news.php-
- Full path:
- ajwah/web/macreseller-news.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:05 12/12/2025
- Last modified:
- 09:52:33 06/03/2025
- MD5 hash:
- ed23ca98b77c5321b4485e85eb2ea64d
- Filesize:
- 3.67 KB
- suspicious functions used:
- curl_exec (line:22);
$alldata1 = curl_exec($chhhh1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: MacResellerAdd.php-
- Full path:
- ajwah/web/MacResellerAdd.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:06 12/12/2025
- Last modified:
- 09:52:35 06/03/2025
- MD5 hash:
- 5ac506fcafb554fb6326382737dce0df
- Filesize:
- 29.89 KB
- suspicious functions used:
- `input[name="${inputName}"]:checked` (line:792);
var value = document.querySelector(`input[name="${inputName}"]:checked`).value; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: MacResellerEdit.php-
- Full path:
- ajwah/web/MacResellerEdit.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:06 12/12/2025
- Last modified:
- 09:52:36 06/03/2025
- MD5 hash:
- 60b4a4eac6e169f1bce50574c472cd2a
- Filesize:
- 37.16 KB
- suspicious functions used:
- `input[name="${inputName}"]:checked` (line:634);
var value = document.querySelector(`input[name="${inputName}"]:checked`).value; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: nagad-helper.php-
- Full path:
- ajwah/web/nagad-helper.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:06 12/12/2025
- Last modified:
- 09:52:38 06/03/2025
- MD5 hash:
- 114b90b978b842cd318391876ba454ab
- Filesize:
- 2.84 KB
- suspicious functions used:
- curl_exec (line:46);base64_decode (line:77);
$resultData = curl_exec($url);openssl_private_decrypt(base64_decode($cryptText), $plain_text, $private_key); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: nagad-merchant-callback.php-
- Full path:
- ajwah/web/nagad-merchant-callback.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:06 12/12/2025
- Last modified:
- 09:52:38 06/03/2025
- MD5 hash:
- b0ec1f203cb16bb39dc0dc5c587982ce
- Filesize:
- 16.47 KB
- suspicious functions used:
- curl_exec (line:20);
$file_contents = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: netowrk-olt-all-mac-array.php-
- Full path:
- ajwah/web/netowrk-olt-all-mac-array.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:06 12/12/2025
- Last modified:
- 09:52:38 06/03/2025
- MD5 hash:
- b0168ce99145e2afe64357247d750dd6
- Filesize:
- 4.62 KB
- suspicious functions used:
- shell_exec (line:33);shell_exec (line:47);
$output = shell_exec($command . " 2>&1");shell_exec (line:61);$output = shell_exec($command . " 2>&1");shell_exec (line:76);$output_oid_bdcom = shell_exec($command_oid_bdcom . " 2>&1");shell_exec (line:93);$output_oid_cdata = shell_exec($command_oid_cdata . " 2>&1");$output_oid_gcom = shell_exec($command_oid_gcom . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: netowrk-snmp-data-auto.php-
- Full path:
- ajwah/web/netowrk-snmp-data-auto.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:06 12/12/2025
- Last modified:
- 09:52:38 06/03/2025
- MD5 hash:
- 81e2685cc9d5a33d54a0764a0488b848
- Filesize:
- 7.24 KB
- suspicious functions used:
- shell_exec (line:67);shell_exec (line:117);
$output = shell_exec($command);$vlanoutput = shell_exec($vlancommand); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: netowrk-snmp-data.php-
- Full path:
- ajwah/web/netowrk-snmp-data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:06 12/12/2025
- Last modified:
- 09:52:38 06/03/2025
- MD5 hash:
- 4d7f14139fba095fdbc348dce9136690
- Filesize:
- 24.67 KB
- suspicious functions used:
- shell_exec (line:103);shell_exec (line:112);
$output = shell_exec($command . " 2>&1");shell_exec (line:122);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:141);$output_port = shell_exec($commandd . " 2>&1");shell_exec (line:153);$output = shell_exec($command . " 2>&1");shell_exec (line:164);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:180);$output_port = shell_exec($commandd);shell_exec (line:190);$output_oid_bdcom = shell_exec($command_oid_bdcom . " 2>&1");shell_exec (line:206);$outputs = shell_exec($commanda);shell_exec (line:226);$output_port = shell_exec($commandd_bdcom);shell_exec (line:235);$output_oid_cdata = shell_exec($command_oid_cdata . " 2>&1");shell_exec (line:243);$outputs = shell_exec($commanda);shell_exec (line:250);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:255);$output_pon = shell_exec($command_ponn . " 2>&1");`pon_name` FROM `olt_pon` WHERE `olt_pon_id` = '$pon_id' AND ` (line:262);$outsddd = shell_exec($commddandd);shell_exec (line:279);$qrydd = mysqli_query($con, "SELECT `pon_name` FROM `olt_pon` WHERE `olt_pon_id` = '$pon_id' AND `olt_id` = '$olt_id' AND sts = '0'");shell_exec (line:289);$outsdd = shell_exec($commddand);`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:302);$output_oid_gcom = shell_exec($command_oid_gcom . " 2>&1");shell_exec (line:308);$querydd = mysqli_query($con, "SELECT `olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND `olt_id` = '$olt_id' AND sts = '0'");shell_exec (line:440);$output_vlan = shell_exec($command_vlan . " 2>&1");$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-old-onu-rx-map.php-
- Full path:
- ajwah/web/network-old-onu-rx-map.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:06 12/12/2025
- Last modified:
- 09:52:38 06/03/2025
- MD5 hash:
- b4962c160c5ad68ccd8eed9c48d82a0f
- Filesize:
- 6.94 KB
- suspicious functions used:
- shell_exec (line:76);
$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-old-onu-rx.php-
- Full path:
- ajwah/web/network-old-onu-rx.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:06 12/12/2025
- Last modified:
- 09:52:38 06/03/2025
- MD5 hash:
- 59ed3318f07d2280f47e67f3c2f2c935
- Filesize:
- 7.35 KB
- suspicious functions used:
- shell_exec (line:85);
$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-client-onu-mac-count-cdata.php-
- Full path:
- ajwah/web/network-olt-client-onu-mac-count-cdata.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:06 12/12/2025
- Last modified:
- 09:52:38 06/03/2025
- MD5 hash:
- c378dbabf36066c335cfb8838a6e167d
- Filesize:
- 4.58 KB
- suspicious functions used:
- shell_exec (line:25);shell_exec (line:35);
$od_vddlan = shell_exec($codmn . " 2>&1");shell_exec (line:56);$od_vddlan = shell_exec($codmn . " 2>&1");shell_exec (line:103);$output_vdlan = shell_exec($command_dvlan . " 2>&1");shell_exec (line:115);$od_vdlan = shell_exec($coddvlan . " 2>&1");shell_exec (line:126);$output_port = shell_exec($commandd_bdcom);shell_exec (line:140);$od_vddlan = shell_exec($codmn . " 2>&1");$od_vdddlan = shell_exec($codmdn . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-client-onu-mac-count-rcl.php-
- Full path:
- ajwah/web/network-olt-client-onu-mac-count-rcl.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:06 12/12/2025
- Last modified:
- 09:52:38 06/03/2025
- MD5 hash:
- 155290201f4342ad1f835e1411ef3e31
- Filesize:
- 4.55 KB
- suspicious functions used:
- shell_exec (line:25);shell_exec (line:35);
$od_vddlan = shell_exec($codmn . " 2>&1");shell_exec (line:56);$od_vddlan = shell_exec($codmn . " 2>&1");shell_exec (line:103);$output_vdlan = shell_exec($command_dvlan . " 2>&1");shell_exec (line:115);$od_vdlan = shell_exec($coddvlan . " 2>&1");shell_exec (line:126);$output_port = shell_exec($commandd_bdcom);shell_exec (line:140);$od_vddlan = shell_exec($codmn . " 2>&1");$od_vdddlan = shell_exec($codmdn . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-client-onu-mac-count.php-
- Full path:
- ajwah/web/network-olt-client-onu-mac-count.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:06 12/12/2025
- Last modified:
- 09:52:39 06/03/2025
- MD5 hash:
- 22f7c5b1545279d2a65caf57b3cb5c5a
- Filesize:
- 15.3 KB
- suspicious functions used:
- shell_exec (line:26);shell_exec (line:36);
$od_vddlan = shell_exec($codmn . " 2>&1");shell_exec (line:68);$od_vddlan = shell_exec($codmn . " 2>&1");shell_exec (line:84);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:101);$outpudt_vlan = shell_exec($commadnd_vlan . " 2>&1");shell_exec (line:119);$output_port = shell_exec($commandd_bdcom);shell_exec (line:135);$output_vdlan = shell_exec($command_vdlan . " 2>&1");shell_exec (line:176);$outpdut_vdlan = shell_exec($commadnd_dvlan . " 2>&1");shell_exec (line:236);$output_vdlan = shell_exec($command_dvlan . " 2>&1");shell_exec (line:312);$outpdut_vdlan = shell_exec($commadnd_dvlan . " 2>&1");shell_exec (line:379);$output_vdlan = shell_exec($command_dvlan . " 2>&1");shell_exec (line:469);$od_vddddlan = shell_exec($codmddn . " 2>&1");shell_exec (line:488);$od_vdlan = shell_exec($coddvlan . " 2>&1");shell_exec (line:507);$od_vddlan = shell_exec($codmn . " 2>&1");$od_vdddlan = shell_exec($codmdn . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-client-onu-mac-countt.php-
- Full path:
- ajwah/web/network-olt-client-onu-mac-countt.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:06 12/12/2025
- Last modified:
- 09:52:39 06/03/2025
- MD5 hash:
- d29b4e72c375f528b769bd3894f9f0e7
- Filesize:
- 8.95 KB
- suspicious functions used:
- shell_exec (line:26);shell_exec (line:36);
$od_vddlan = shell_exec($codmn . " 2>&1");shell_exec (line:59);$od_vddlan = shell_exec($codmn . " 2>&1");shell_exec (line:75);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:92);$outpudt_vlan = shell_exec($commadnd_vlan . " 2>&1");shell_exec (line:102);$output_port = shell_exec($commandd_bdcom);shell_exec (line:117);$output_vdlan = shell_exec($command_vdlan . " 2>&1");shell_exec (line:155);$outpdut_vdlan = shell_exec($commadnd_dvlan . " 2>&1");shell_exec (line:206);$output_vdlan = shell_exec($command_dvlan . " 2>&1");shell_exec (line:262);$od_vddddlan = shell_exec($codmddn . " 2>&1");shell_exec (line:275);$od_vdlan = shell_exec($coddvlan . " 2>&1");shell_exec (line:288);$od_vddlan = shell_exec($codmn . " 2>&1");$od_vdddlan = shell_exec($codmdn . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-con-sts.php-
- Full path:
- ajwah/web/network-olt-con-sts.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:06 12/12/2025
- Last modified:
- 09:52:39 06/03/2025
- MD5 hash:
- a26b0a1c1567c34c9aa5e2e0254ff8a6
- Filesize:
- 4 KB
- suspicious functions used:
- `olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:10);shell_exec (line:38);
$query = mysqli_query($con, "SELECT `olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND `sts` = '0'");`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, `last_synced`, `last_update`, `msg`, `full_msg`, ROUND((SELECT AVG(value) FROM olt_onu_history WHERE alarm_id = '$alarmId' AND value != ''), 2) AS average_value FROM `, ` WHERE `alarm_id` = '$alarmId' AND ` (line:82);$output = shell_exec($command);$query = mysqli_query($con, "SELECT `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, `last_synced`, `last_update`, `msg`, `full_msg`, ROUND((SELECT AVG(value) FROM olt_onu_history WHERE alarm_id = '$alarmId' AND value != ''), 2) AS average_value FROM `olt_onu_history` WHERE `alarm_id` = '$alarmId' AND `value` != ''"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-load.php-
- Full path:
- ajwah/web/network-olt-load.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:06 12/12/2025
- Last modified:
- 09:52:39 06/03/2025
- MD5 hash:
- f49d5153285c639ed91d4e806685ee56
- Filesize:
- 1.33 KB
- suspicious functions used:
- shell_exec (line:22);shell_exec (line:25);
$output = shell_exec($command . " 2>&1");$output1 = shell_exec($command1 . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-oid-check.php-
- Full path:
- ajwah/web/network-olt-oid-check.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:06 12/12/2025
- Last modified:
- 09:52:39 06/03/2025
- MD5 hash:
- 5b7dc0ce1103fbfc895873c250b63141
- Filesize:
- 1.88 KB
- suspicious functions used:
- shell_exec (line:33);
return shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-onu-alarm-add.php-
- Full path:
- ajwah/web/network-olt-onu-alarm-add.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:06 12/12/2025
- Last modified:
- 09:52:39 06/03/2025
- MD5 hash:
- be6ba82c658419e1454f778e20e2d4c3
- Filesize:
- 7.86 KB
- suspicious functions used:
- shell_exec (line:103);
$output = shell_exec($command . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-onu-count.php-
- Full path:
- ajwah/web/network-olt-onu-count.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:06 12/12/2025
- Last modified:
- 09:52:39 06/03/2025
- MD5 hash:
- 6dc4bf46ac59065c0e0e7e3510aaf4d2
- Filesize:
- 7.05 KB
- suspicious functions used:
- `olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:12);shell_exec (line:81);
$query = mysqli_query($con, "SELECT `olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND `online_sts` = '1' AND `sts` = '0'");$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-onu-list-data.php-
- Full path:
- ajwah/web/network-olt-onu-list-data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:06 12/12/2025
- Last modified:
- 09:52:39 06/03/2025
- MD5 hash:
- 54cc9417c766c31317311c3722ce7d4b
- Filesize:
- 9.48 KB
- suspicious functions used:
- shell_exec (line:24);shell_exec (line:38);
$outputs = shell_exec($commanda);shell_exec (line:64);$output = shell_exec($command);shell_exec (line:85);$outputs = shell_exec($commanda);shell_exec (line:104);$output = shell_exec($command);shell_exec (line:125);$outputs = shell_exec($commanda);shell_exec (line:143);$output = shell_exec($command);shell_exec (line:153);$od_vdlan = shell_exec($commanda . " 2>&1");shell_exec (line:165);$od_vdland = shell_exec($coddvland . " 2>&1");shell_exec (line:185);$outputs = shell_exec($coddvladnd . " 2>&1");$output_vdlan = shell_exec($command_vdlan); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-onu-power.php-
- Full path:
- ajwah/web/network-olt-onu-power.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:06 12/12/2025
- Last modified:
- 09:52:39 06/03/2025
- MD5 hash:
- 2e064543b67b532bdf4e5b12d49c5052
- Filesize:
- 7.54 KB
- suspicious functions used:
- shell_exec (line:97);
$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-pon-clients-search.php-
- Full path:
- ajwah/web/network-olt-pon-clients-search.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:06 12/12/2025
- Last modified:
- 09:52:39 06/03/2025
- MD5 hash:
- 79d26fc66abdab6f173330588aa8b238
- Filesize:
- 10.93 KB
- suspicious functions used:
- shell_exec (line:42);shell_exec (line:51);
$output = shell_exec($command . " 2>&1");shell_exec (line:104);$outputS = shell_exec($command . " 2>&1");shell_exec (line:168);$snmpOutput = shell_exec($command);$snmpOutput = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-pon-onu-search-bdcom.php-
- Full path:
- ajwah/web/network-olt-pon-onu-search-bdcom.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:06 12/12/2025
- Last modified:
- 09:52:39 06/03/2025
- MD5 hash:
- c786fa8b69268c738b6ff976631798cd
- Filesize:
- 27.74 KB
- suspicious functions used:
- shell_exec (line:60);shell_exec (line:69);
$output = shell_exec($command . " 2>&1");shell_exec (line:383);$outputS = shell_exec($commandS . " 2>&1");$snmpOutput = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-pon-onu-search-bdcom1.php-
- Full path:
- ajwah/web/network-olt-pon-onu-search-bdcom1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:06 12/12/2025
- Last modified:
- 09:52:39 06/03/2025
- MD5 hash:
- dd18677b1dcbf7f0bce2ac6912d98da0
- Filesize:
- 9.6 KB
- suspicious functions used:
- shell_exec (line:42);shell_exec (line:51);
$output = shell_exec($command . " 2>&1");shell_exec (line:129);$outputS = shell_exec($command . " 2>&1");$snmpOutput = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-pon-onu-search-rcl.php-
- Full path:
- ajwah/web/network-olt-pon-onu-search-rcl.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:06 12/12/2025
- Last modified:
- 09:52:39 06/03/2025
- MD5 hash:
- 565ff38d572bba4bc20721ab17484554
- Filesize:
- 27.33 KB
- suspicious functions used:
- shell_exec (line:46);shell_exec (line:55);
$output = shell_exec($command . " 2>&1");shell_exec (line:369);$outputS = shell_exec($commandS . " 2>&1");$snmpOutput = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-pon-onu-search.php-
- Full path:
- ajwah/web/network-olt-pon-onu-search.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:06 12/12/2025
- Last modified:
- 09:52:40 06/03/2025
- MD5 hash:
- dc183ecf77d0e1f56f672338fd09cfa5
- Filesize:
- 21.62 KB
- suspicious functions used:
- shell_exec (line:35);
$output = shell_exec($command . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-snmp-onu-status-data-bdcom.php-
- Full path:
- ajwah/web/network-snmp-onu-status-data-bdcom.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:06 12/12/2025
- Last modified:
- 02:00:25 07/03/2025
- MD5 hash:
- 97bdd52a7c2adee8fba0a4f7165605d0
- Filesize:
- 23.35 KB
- suspicious functions used:
- shell_exec (line:48);shell_exec (line:73);
$oudddputsd = shell_exec($commddanda . " 2>&1");shell_exec (line:85);$oudddputsd = shell_exec($commddanda . " 2>&1");shell_exec (line:103);$oudddputsd = shell_exec($commddanda . " 2>&1");shell_exec (line:116);$output = shell_exec($command . " 2>&1");shell_exec (line:128);$outputs = shell_exec($commanda);shell_exec (line:134);$outpdut = shell_exec($commandd . " 2>&1");shell_exec (line:159);$oddutpdut = shell_exec($cmandd . " 2>&1");shell_exec (line:172);$output = shell_exec($command . " 2>&1");shell_exec (line:184);$outputs = shell_exec($commanda);shell_exec (line:190);$outpdut = shell_exec($commandd . " 2>&1");shell_exec (line:217);$oddutpdut = shell_exec($cmandd . " 2>&1");shell_exec (line:230);$output_oid_cdata = shell_exec($command_oid_cdata . " 2>&1");shell_exec (line:236);$outputs = shell_exec($commanda);$oddutpdut = shell_exec($cmandd . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-snmp-onu-status-data.php-
- Full path:
- ajwah/web/network-snmp-onu-status-data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:07 12/12/2025
- Last modified:
- 09:52:40 06/03/2025
- MD5 hash:
- 0adfee384bf349b50f11036947fd2a74
- Filesize:
- 30.37 KB
- suspicious functions used:
- shell_exec (line:38);`olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:42);
$outputs = shell_exec($snmpCommand);shell_exec (line:81);$re11=mysql_query("SELECT `olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND `olt_pon_id` = '$check_pon_name'");shell_exec (line:95);$outputs = shell_exec($snmpCommand);shell_exec (line:109);$outpdduts = shell_exec($sand);shell_exec (line:122);$outputs = shell_exec($snmpCommand);shell_exec (line:208);$outpdduts = shell_exec($sand);shell_exec (line:429);$outputsmac = shell_exec($snmpCommandmac);shell_exec (line:441);$outputsmac = shell_exec($snmpCommandmac);shell_exec (line:448);$outputsmac = shell_exec($snmpCommandmac);$output_vlan = shell_exec($command_vlan . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-snmp-onu-status-data1.php-
- Full path:
- ajwah/web/network-snmp-onu-status-data1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:07 12/12/2025
- Last modified:
- 09:52:40 06/03/2025
- MD5 hash:
- 920bd1a592c36f7a1194b737642f8340
- Filesize:
- 15.96 KB
- suspicious functions used:
- shell_exec (line:33);`olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:37);
$outputs = shell_exec($snmpCommand);shell_exec (line:149);$re11=mysql_query("SELECT `olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND `olt_pon_id` = '$check_pon_name'");$outputsmac = shell_exec($snmpCommandmac); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-snmp-onu-status-data_vsol2.php-
- Full path:
- ajwah/web/network-snmp-onu-status-data_vsol2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:07 12/12/2025
- Last modified:
- 09:52:40 06/03/2025
- MD5 hash:
- f22d022ddc284f4d8e1de3660da91db8
- Filesize:
- 15.61 KB
- suspicious functions used:
- shell_exec (line:34);shell_exec (line:113);
$outputs = shell_exec($snmpCommand);shell_exec (line:126);$outpdduts = shell_exec($sand);shell_exec (line:132);$outputsmac = shell_exec($snmpCommandmac);$output_vlan = shell_exec($command_vlan . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-tree-vartual-nodes.php-
- Full path:
- ajwah/web/network-tree-vartual-nodes.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:07 12/12/2025
- Last modified:
- 09:52:41 06/03/2025
- MD5 hash:
- 3530b8bc3113544014b1746ecd67e834
- Filesize:
- 10.64 KB
- suspicious functions used:
- shell_exec (line:76);shell_exec (line:111);
$outputs = shell_exec($commanda);shell_exec (line:145);$outputs = shell_exec($commanda);shell_exec (line:181);$outputs = shell_exec($commanda);shell_exec (line:188);$od_vdlan = shell_exec($commanda . " 2>&1");$od_vdland = shell_exec($coddvland . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Network.php-
- Full path:
- ajwah/web/Network.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 08:42:37 12/12/2025
- Last modified:
- 01:21:17 07/03/2025
- MD5 hash:
- 2691f8988dee1a9fc89f0738b9f0b62f
- Filesize:
- 64.28 KB
- suspicious functions used:
- system (line:370);shell_exec (line:653);
$ARRAY = $API->comm("/system/resource/print");$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Network1.php-
- Full path:
- ajwah/web/Network1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:07 12/12/2025
- Last modified:
- 09:52:41 06/03/2025
- MD5 hash:
- c72cb4810d5c70edd9da26884beba751
- Filesize:
- 66.22 KB
- suspicious functions used:
- system (line:375);shell_exec (line:661);
$ARRAY = $API->comm("/system/resource/print");$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkLoad.php-
- Full path:
- ajwah/web/NetworkLoad.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:07 12/12/2025
- Last modified:
- 09:52:43 06/03/2025
- MD5 hash:
- e1632e66ee1b7394d3fb82751b924abe
- Filesize:
- 2.83 KB
- suspicious functions used:
- system (line:81);
$ARRAY = $API->comm("/system/resource/print"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkLoad1.php-
- Full path:
- ajwah/web/NetworkLoad1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:07 12/12/2025
- Last modified:
- 09:52:43 06/03/2025
- MD5 hash:
- 176bd6931be34d7ef351d22897accc65
- Filesize:
- 759 B
- suspicious functions used:
- system (line:18);
$ARRAY = $API->comm("/system/resource/print"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkOltOnuStatus.php-
- Full path:
- ajwah/web/NetworkOltOnuStatus.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:07 12/12/2025
- Last modified:
- 09:52:44 06/03/2025
- MD5 hash:
- 31f74ac18fe0f3b0bec3b0d00b2556d5
- Filesize:
- 70.53 KB
- suspicious functions used:
- shell_exec (line:42);shell_exec (line:102);
$output = shell_exec($command . " 2>&1");shell_exec (line:673);$output = shell_exec($command . " 2>&1");shell_exec (line:786);$oddutpdut = shell_exec($cmandd . " 2>&1");shell_exec (line:896);$oddutpdut = shell_exec($cmandd . " 2>&1");shell_exec (line:1006);$oddutpdut = shell_exec($cmandd . " 2>&1");$oddutpdut = shell_exec($cmandd . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkOltOnuStatus2.php-
- Full path:
- ajwah/web/NetworkOltOnuStatus2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:07 12/12/2025
- Last modified:
- 09:52:44 06/03/2025
- MD5 hash:
- c9a14797fa4353d05bbd9427b6079250
- Filesize:
- 15.88 KB
- suspicious functions used:
- shell_exec (line:35);
$output = shell_exec($command . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkOltSense.php-
- Full path:
- ajwah/web/NetworkOltSense.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:07 12/12/2025
- Last modified:
- 09:52:44 06/03/2025
- MD5 hash:
- 2be664ae5006367f629ca437a6d507f8
- Filesize:
- 18.26 KB
- suspicious functions used:
- `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, `last_synced`, `last_update`, `msg`, `full_msg`, ROUND((SELECT AVG(value) FROM olt_onu_history WHERE alarm_id = '$alarmId' AND value != ''), 2) AS average_value FROM `, ` WHERE `alarm_id` = '$alarmId' AND ` (line:123);
$querddy = mysql_query("SELECT `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, `last_synced`, `last_update`, `msg`, `full_msg`, ROUND((SELECT AVG(value) FROM olt_onu_history WHERE alarm_id = '$alarmId' AND value != ''), 2) AS average_value FROM `olt_onu_history` WHERE `alarm_id` = '$alarmId' AND `value` != ''"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkOltSenseDetails.php-
- Full path:
- ajwah/web/NetworkOltSenseDetails.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:07 12/12/2025
- Last modified:
- 09:52:44 06/03/2025
- MD5 hash:
- 440096c601fc10b819a1f0f8330928b0
- Filesize:
- 14.17 KB
- suspicious functions used:
- `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:33);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:42);
$sql = mysql_query("SELECT `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND `value` != '' ORDER BY id DESC");`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:51);$sql = mysql_query("SELECT `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND `value` != '' ORDER BY id DESC");`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:60);$sql = mysql_query("SELECT `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND `value` != '' ORDER BY id DESC");$sql = mysql_query("SELECT `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND `value` != '' ORDER BY id DESC"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkOltSync.php-
- Full path:
- ajwah/web/NetworkOltSync.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:07 12/12/2025
- Last modified:
- 09:52:44 06/03/2025
- MD5 hash:
- 06633d4b65a14d677358170dd0a84424
- Filesize:
- 1.87 KB
- suspicious functions used:
- curl_exec (line:18);
$result1dd = curl_exec($ch111); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: networktree-olt-onu-list-data.php-
- Full path:
- ajwah/web/networktree-olt-onu-list-data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:07 12/12/2025
- Last modified:
- 09:52:45 06/03/2025
- MD5 hash:
- af4221fefa9c9051846a063ac4135560
- Filesize:
- 8.72 KB
- suspicious functions used:
- shell_exec (line:24);shell_exec (line:36);
$outputs = shell_exec($commanda);shell_exec (line:59);$output = shell_exec($command);shell_exec (line:78);$outputs = shell_exec($commanda);shell_exec (line:97);$output = shell_exec($command);shell_exec (line:116);$outputs = shell_exec($commanda);shell_exec (line:134);$output = shell_exec($command);shell_exec (line:143);$od_vdlan = shell_exec($commanda . " 2>&1");shell_exec (line:155);$od_vdland = shell_exec($coddvland . " 2>&1");shell_exec (line:175);$outputs = shell_exec($coddvladnd . " 2>&1");$output_vdlan = shell_exec($command_vdlan); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkTreeAddSave.php-
- Full path:
- ajwah/web/NetworkTreeAddSave.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:07 12/12/2025
- Last modified:
- 09:52:46 06/03/2025
- MD5 hash:
- 93fdf1213fdb5d525641e2b625f1a91b
- Filesize:
- 7.61 KB
- suspicious functions used:
- `network_tree` WHERE `olt_id` = '$olt_id' AND ` (line:107);
$resu11 = $con->query("SELECT tree_id AS pon_parent_id FROM `network_tree` WHERE `olt_id` = '$olt_id' AND `device_type` = '1' AND sts = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkTreeEdit1.php-
- Full path:
- ajwah/web/NetworkTreeEdit1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:08 12/12/2025
- Last modified:
- 09:52:48 06/03/2025
- MD5 hash:
- 3396a6bdf9b5804bb208f38f37cc29a2
- Filesize:
- 35.81 KB
- suspicious functions used:
- `olt_onu` WHERE olt_id = '$olt_id' AND ` (line:207);
<?php $resultoff11d=mysql_query("SELECT id AS alarm_id, alarm_name FROM `olt_onu` WHERE olt_id = '$olt_id' AND `onu_name` LIKE '$pon_name1' ORDER BY id DESC"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkTreeEditSave.php-
- Full path:
- ajwah/web/NetworkTreeEditSave.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:08 12/12/2025
- Last modified:
- 09:52:48 06/03/2025
- MD5 hash:
- be82a23409ab88be3f57da95f8805d6c
- Filesize:
- 12.83 KB
- suspicious functions used:
- `network_tree` WHERE `olt_id` = '$olt_id' AND ` (line:182);
$resu11 = $con->query("SELECT tree_id AS pon_parent_id FROM `network_tree` WHERE `olt_id` = '$olt_id' AND `device_type` = '1' AND sts = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkTreeList.php-
- Full path:
- ajwah/web/NetworkTreeList.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:08 12/12/2025
- Last modified:
- 09:52:48 06/03/2025
- MD5 hash:
- acd468021993faf8575531952ae107f8
- Filesize:
- 21.98 KB
- suspicious functions used:
- `pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '{$row['olt_id']}' AND ` (line:287);
$result11=mysql_query("SELECT count(`pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '{$row['olt_id']}' AND `sts` = '0';"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkTreeMap.php-
- Full path:
- ajwah/web/NetworkTreeMap.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:08 12/12/2025
- Last modified:
- 09:52:48 06/03/2025
- MD5 hash:
- 893f2e3360b70dfbf4b65b4289eb1c58
- Filesize:
- 24.46 KB
- suspicious functions used:
- `${results.rxPower}` (line:268);`${results.distance}` (line:269);
var rxPower = `${results.rxPower}`;`${results.supplyVoltage}` (line:270);var distance = `${results.distance}`;`${results.temperature}` (line:271);var supplyVoltage = `${results.supplyVoltage}`;`${results.txPower}` (line:272);var temperature = `${results.temperature}`;`${results.rxPower}` (line:288);var txPower = `${results.txPower}`;`${results.distance}` (line:289);var rxPower = `${results.rxPower}`;`${results.supplyVoltage}` (line:290);var distance = `${results.distance}`;`${results.temperature}` (line:291);var supplyVoltage = `${results.supplyVoltage}`;`${results.txPower}` (line:292);var temperature = `${results.temperature}`;var txPower = `${results.txPower}`; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkTreeMap1.php-
- Full path:
- ajwah/web/NetworkTreeMap1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:08 12/12/2025
- Last modified:
- 09:52:48 06/03/2025
- MD5 hash:
- 31a3ae9bc0bdb18726ed860ec6e8ec97
- Filesize:
- 36.43 KB
- suspicious functions used:
- `networktree_marker_data.php?tree_id=${markerId}` (line:231);`${results.rxPower}` (line:311);
fetch(`networktree_marker_data.php?tree_id=${markerId}`)`${results.distance}` (line:312);var rxPower = `${results.rxPower}`;`${results.supplyVoltage}` (line:313);var distance = `${results.distance}`;`${results.temperature}` (line:314);var supplyVoltage = `${results.supplyVoltage}`;`${results.txPower}` (line:315);var temperature = `${results.temperature}`;var txPower = `${results.txPower}`; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: networktree_device_onu_list_add.php-
- Full path:
- ajwah/web/networktree_device_onu_list_add.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:08 12/12/2025
- Last modified:
- 09:52:49 06/03/2025
- MD5 hash:
- ae5e1bd4b4619e068908177102626079
- Filesize:
- 14.63 KB
- suspicious functions used:
- `network_tree` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND device_type = '5' AND ` (line:9);shell_exec (line:33);
$resu11=mysql_query("SELECT pon_index_id FROM `network_tree` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND device_type = '5' AND `sts` = '0'");`network_tree` WHERE `onu_mac` = '$mac_address' AND ` (line:131);$output = shell_exec($command . " 2>&1");shell_exec (line:178);$reu11=mysql_query("SELECT count(tree_id) AS onucount FROM `network_tree` WHERE `onu_mac` = '$mac_address' AND `sts` = '0'");shell_exec (line:186);$output = shell_exec($command . " 2>&1");shell_exec (line:230);$outputS = shell_exec($commandS . " 2>&1");`network_tree` WHERE `onu_mac` = '$onuMac' AND ` (line:296);$snmpOutput = shell_exec($command);$reu11=mysql_query("SELECT count(tree_id) AS onucount FROM `network_tree` WHERE `onu_mac` = '$onuMac' AND `sts` = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: networktree_device_pon_check.php-
- Full path:
- ajwah/web/networktree_device_pon_check.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:08 12/12/2025
- Last modified:
- 09:52:49 06/03/2025
- MD5 hash:
- 708a93aadcae96ecf0aaca52041fcf38
- Filesize:
- 1.53 KB
- suspicious functions used:
- `pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '$olt_id' AND ` (line:8);
$result11=mysql_query("SELECT count(`pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '$olt_id' AND `sts` = '0';"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: networktree_device_pon_list_add.php-
- Full path:
- ajwah/web/networktree_device_pon_list_add.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:08 12/12/2025
- Last modified:
- 09:52:49 06/03/2025
- MD5 hash:
- 2ec03912801e4749c2e9cd361417ca5f
- Filesize:
- 1.36 KB
- suspicious functions used:
- `olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:6);`olt_pon` WHERE `olt_id` = '$olt_id' AND ` (line:10);
$resu11=mysql_query("SELECT olt_name FROM `olt_con` WHERE `olt_id` = '$olt_id' AND `sts` = '0'");`network_tree` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND ` (line:17);$result11=mysql_query("SELECT pon_id, olt_pon_id, pon_name FROM `olt_pon` WHERE `olt_id` = '$olt_id' AND `sts` = '0'");$rehu11=mysql_query("SELECT count(tree_id) AS poncount FROM `network_tree` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND `sts` = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: networktree_device_pon_port_onu_list.php-
- Full path:
- ajwah/web/networktree_device_pon_port_onu_list.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:08 12/12/2025
- Last modified:
- 09:52:49 06/03/2025
- MD5 hash:
- 9c63b3ac69996628f5eb2959a9eb4e15
- Filesize:
- 8.65 KB
- suspicious functions used:
- `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:25);shell_exec (line:32);
$rff11=mysqli_query($con, "SELECT olt_pon_id AS pon_port FROM `olt_pon` WHERE olt_id = '$olt_id' AND `pon_name` LIKE '$pon_portt'");shell_exec (line:45);$outputs = shell_exec($commanda);`network_tree` WHERE onu_index_id = '$port_onu_index_id' AND ` (line:49);$output = shell_exec($command);shell_exec (line:81);$rff11d=mysqli_query($con, "SELECT onu_name, onu_index, onu_index_id, onu_mac FROM `network_tree` WHERE onu_index_id = '$port_onu_index_id' AND `olt_id` = '$olt_id'");shell_exec (line:103);$outputs = shell_exec($commanda);shell_exec (line:122);$output = shell_exec($command);shell_exec (line:143);$outputs = shell_exec($commanda);shell_exec (line:161);$output = shell_exec($command);shell_exec (line:170);$od_vdlan = shell_exec($commanda . " 2>&1");shell_exec (line:184);$od_vdland = shell_exec($coddvland . " 2>&1");$outputs = shell_exec($coddvladnd . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: networktree_device_pon_port_sense_list.php-
- Full path:
- ajwah/web/networktree_device_pon_port_sense_list.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:08 12/12/2025
- Last modified:
- 09:52:49 06/03/2025
- MD5 hash:
- ee69cd5cc122f8aa37d8d8e5c74def6b
- Filesize:
- 3.65 KB
- suspicious functions used:
- `network_tree` WHERE `onu_mac` = '$onu_mac' AND ` (line:26);`network_tree` WHERE `c_id` = '{$dfhbdxf}' AND ` (line:71);
$reu1d1=mysqli_query($con, "SELECT tree_id AS router_parant_id FROM `network_tree` WHERE `onu_mac` = '$onu_mac' AND `sts` = '0'");$reu11=mysqli_query($con, "SELECT count(c_id) AS client_count FROM `network_tree` WHERE `c_id` = '{$dfhbdxf}' AND `sts` = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: networktree_device_type.php-
- Full path:
- ajwah/web/networktree_device_type.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:08 12/12/2025
- Last modified:
- 09:52:49 06/03/2025
- MD5 hash:
- f1520732e5a3ef38564238a3278a1f63
- Filesize:
- 11.43 KB
- suspicious functions used:
- `tree_id`) AS countolt FROM `network_tree` WHERE `olt_id` = '$olt_id_sure' AND ` (line:64);
$resu11=mysql_query("SELECT COUNT(`tree_id`) AS countolt FROM `network_tree` WHERE `olt_id` = '$olt_id_sure' AND `device_type` = '1' AND sts = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: olt_all_onu_mac.php-
- Full path:
- ajwah/web/olt_all_onu_mac.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:08 12/12/2025
- Last modified:
- 09:52:49 06/03/2025
- MD5 hash:
- bde00602b98fba3ce9f7669b0d6f0fa3
- Filesize:
- 4.56 KB
- suspicious functions used:
- shell_exec (line:22);shell_exec (line:38);
$oddutpdut = shell_exec($cmandd . " 2>&1");shell_exec (line:57);$output_port = shell_exec($commandd_bdcom);$output = shell_exec($command . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentOnlineQuery.php-
- Full path:
- ajwah/web/PaymentOnlineQuery.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:09 12/12/2025
- Last modified:
- 09:52:56 06/03/2025
- MD5 hash:
- 6a845f0e20c434c12eb30f42726f268d
- Filesize:
- 28.37 KB
- suspicious functions used:
- curl_exec (line:457);curl_exec (line:669);
$resultdata=curl_exec($url);$content = curl_exec($handle ); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentOnlineQuery2.php-
- Full path:
- ajwah/web/PaymentOnlineQuery2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:09 12/12/2025
- Last modified:
- 09:52:56 06/03/2025
- MD5 hash:
- ccd315d11a60901b7b9029ff44f8351b
- Filesize:
- 19.4 KB
- suspicious functions used:
- curl_exec (line:42);curl_exec (line:252);
$resultdatax=curl_exec($url);$result = curl_exec($handle); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentWebhook.php-
- Full path:
- ajwah/web/PaymentWebhook.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:09 12/12/2025
- Last modified:
- 09:52:56 06/03/2025
- MD5 hash:
- a2f322c94787630ab1e0c8ca35fc5ba1
- Filesize:
- 18.6 KB
- suspicious functions used:
- base64_decode (line:30);curl_exec (line:41);
$signatureDecoded = base64_decode($signature);curl_exec (line:422);curl_exec($url);$data = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: SignUp1.php-
- Full path:
- ajwah/web/SignUp1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:10 12/12/2025
- Last modified:
- 09:53:03 06/03/2025
- MD5 hash:
- 3f7943dd155c8e0a383b7d02730f8c11
- Filesize:
- 24.59 KB
- suspicious functions used:
- curl_exec (line:33);curl_exec (line:59);
$jsona = curl_exec($ch10);$resdfwedf = curl_exec($ch1s); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: sms-balance-check.php-
- Full path:
- ajwah/web/sms-balance-check.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 13:07:34 12/12/2025
- Last modified:
- 09:53:03 06/03/2025
- MD5 hash:
- c75f0373da76faa763dd32ea8b7ed085
- Filesize:
- 825 B
- suspicious functions used:
- curl_exec (line:15);
$balance = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: SMS.php-
- Full path:
- ajwah/web/SMS.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:10 12/12/2025
- Last modified:
- 09:53:03 06/03/2025
- MD5 hash:
- 25b5422d1cc92b4d2253417e72d9a658
- Filesize:
- 37.37 KB
- suspicious functions used:
- curl_exec (line:56);
$balance = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: SMS1.php-
- Full path:
- ajwah/web/SMS1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:10 12/12/2025
- Last modified:
- 09:53:03 06/03/2025
- MD5 hash:
- e4671dadf9ad575671fd3609a60030da
- Filesize:
- 32.19 KB
- suspicious functions used:
- curl_exec (line:59);
$balance = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: SMSAddSave.php-
- Full path:
- ajwah/web/SMSAddSave.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:10 12/12/2025
- Last modified:
- 09:53:04 06/03/2025
- MD5 hash:
- 0d2d0548df5f32e69264c4f2f1b1f76e
- Filesize:
- 2.12 KB
- suspicious functions used:
- curl_exec (line:35);
$result = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: sms_deliverey_report.php-
- Full path:
- ajwah/web/sms_deliverey_report.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 03:06:48 12/12/2025
- Last modified:
- 09:53:07 06/03/2025
- MD5 hash:
- 03623943da7e9334e137b38c8577fc84
- Filesize:
- 4.25 KB
- suspicious functions used:
- curl_exec (line:28);curl_exec (line:53);
$result11 = curl_exec($ch1);curl_exec (line:90);$resultdd = curl_exec($ch);$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: support-action.php-
- Full path:
- ajwah/web/support-action.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 04:57:39 12/12/2025
- Last modified:
- 09:53:07 06/03/2025
- MD5 hash:
- 58556808f93f52486b2ad06998142aa9
- Filesize:
- 14.56 KB
- suspicious functions used:
- curl_exec (line:220);
$jsona = curl_exec($ch10); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tagreeexpayment.php-
- Full path:
- ajwah/web/tagreeexpayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:11 12/12/2025
- Last modified:
- 09:53:09 06/03/2025
- MD5 hash:
- 029b4fba649a75c7c81d2f8931be8d63
- Filesize:
- 2.86 KB
- suspicious functions used:
- curl_exec (line:26);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tcreateagree.php-
- Full path:
- ajwah/web/tcreateagree.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:11 12/12/2025
- Last modified:
- 09:53:09 06/03/2025
- MD5 hash:
- 27a10adf4190edc7eceee8cf74a6b72b
- Filesize:
- 999 B
- suspicious functions used:
- curl_exec (line:26);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tcreatepayment.php-
- Full path:
- ajwah/web/tcreatepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:11 12/12/2025
- Last modified:
- 09:53:09 06/03/2025
- MD5 hash:
- e49de9a33f5164bc2c6b88e4770faaff
- Filesize:
- 1.07 KB
- suspicious functions used:
- curl_exec (line:27);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: test2.php-
- Full path:
- ajwah/web/test2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:11 12/12/2025
- Last modified:
- 09:53:09 06/03/2025
- MD5 hash:
- ab80d92ede21b7da59bfefb325484297
- Filesize:
- 13.76 KB
- suspicious functions used:
- shell_exec (line:59);shell_exec (line:70);
$output = shell_exec($command);shell_exec (line:76);$output1 = shell_exec($command1);shell_exec (line:88);$output2 = shell_exec($command2);shell_exec (line:101);$output_vdlan = shell_exec($command_dvlan . " 2>&1");shell_exec (line:141);$output_vdlan = shell_exec($command_dvlan . " 2>&1");curl_exec (line:187);$output_vdlanf = shell_exec($command_dvlan . " 2>&1");curl_exec (line:212);$result11 = curl_exec($ch3);curl_exec (line:354);$response = curl_exec($ch);$result11 = curl_exec($ch3); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: test6.php-
- Full path:
- ajwah/web/test6.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:11 12/12/2025
- Last modified:
- 09:53:09 06/03/2025
- MD5 hash:
- f22d022ddc284f4d8e1de3660da91db8
- Filesize:
- 15.61 KB
- suspicious functions used:
- shell_exec (line:34);shell_exec (line:113);
$outputs = shell_exec($snmpCommand);shell_exec (line:126);$outpdduts = shell_exec($sand);shell_exec (line:132);$outputsmac = shell_exec($snmpCommandmac);$output_vlan = shell_exec($command_vlan . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: test7.php-
- Full path:
- ajwah/web/test7.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:11 12/12/2025
- Last modified:
- 09:53:09 06/03/2025
- MD5 hash:
- b11ccf951ce63a21ea0a7328316a0e5c
- Filesize:
- 1.57 KB
- suspicious functions used:
- curl_exec (line:14);
$result1dd = curl_exec($ch111); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: test8.php-
- Full path:
- ajwah/web/test8.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:11 12/12/2025
- Last modified:
- 09:53:09 06/03/2025
- MD5 hash:
- 0da20f06359cae632ac4b808ab2eee77
- Filesize:
- 3.65 KB
- suspicious functions used:
- shell_exec (line:48);
$output = shell_exec($snmpCommand); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: testttttt.php-
- Full path:
- ajwah/web/testttttt.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:11 12/12/2025
- Last modified:
- 09:53:09 06/03/2025
- MD5 hash:
- b1988a4be29e191ad935fb409a4174ee
- Filesize:
- 2 KB
- suspicious functions used:
- curl_exec (line:47);
$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: texecutepayment.php-
- Full path:
- ajwah/web/texecutepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:11 12/12/2025
- Last modified:
- 09:53:09 06/03/2025
- MD5 hash:
- 623635fdf5c871391d3a5fe99ee8c543
- Filesize:
- 2.91 KB
- suspicious functions used:
- curl_exec (line:24);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tis-news.php-
- Full path:
- ajwah/web/tis-news.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 13:07:34 12/12/2025
- Last modified:
- 09:53:09 06/03/2025
- MD5 hash:
- ed23ca98b77c5321b4485e85eb2ea64d
- Filesize:
- 3.67 KB
- suspicious functions used:
- curl_exec (line:22);
$alldata1 = curl_exec($chhhh1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: token.php-
- Full path:
- ajwah/web/token.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:11 12/12/2025
- Last modified:
- 09:53:09 06/03/2025
- MD5 hash:
- 7d8e71ceda3ffb74623e0c4a814715af
- Filesize:
- 1.53 KB
- suspicious functions used:
- curl_exec (line:42);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tt.php-
- Full path:
- ajwah/web/tt.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:11 12/12/2025
- Last modified:
- 09:53:10 06/03/2025
- MD5 hash:
- 9c4ed141cb79fdc7e807b35923c91a20
- Filesize:
- 1.56 KB
- suspicious functions used:
- curl_exec (line:30);
$response = curl_exec($curl); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ttoken.php-
- Full path:
- ajwah/web/ttoken.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:11 12/12/2025
- Last modified:
- 09:53:10 06/03/2025
- MD5 hash:
- 5f2c51c1db5b0defadfb67ce25c0098f
- Filesize:
- 1.54 KB
- suspicious functions used:
- curl_exec (line:42);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: UserAccess.php-
- Full path:
- ajwah/web/UserAccess.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:11 12/12/2025
- Last modified:
- 09:53:11 06/03/2025
- MD5 hash:
- 69db4d4c504e7d0d4bed32eb8053b12f
- Filesize:
- 10.4 KB
- suspicious functions used:
- `.modulecheckboxx[data-group="${group}"]` (line:158);
document.querySelectorAll(`.modulecheckboxx[data-group="${group}"]`).forEach(box => { - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: webhook.php-
- Full path:
- ajwah/web/webhook.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:11 12/12/2025
- Last modified:
- 09:53:13 06/03/2025
- MD5 hash:
- 69a88ae1be0ab3ab1c7c971c72c0b025
- Filesize:
- 21.93 KB
- suspicious functions used:
- base64_decode (line:28);curl_exec (line:39);
$signatureDecoded = base64_decode($signature);curl_exec (line:465);curl_exec($url);$data = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: webhook_cid.php-
- Full path:
- ajwah/web/webhook_cid.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:11 12/12/2025
- Last modified:
- 09:53:13 06/03/2025
- MD5 hash:
- 1a2672fc0dd81a9c831e3fa60ec860e1
- Filesize:
- 21.52 KB
- suspicious functions used:
- base64_decode (line:29);curl_exec (line:40);
$signatureDecoded = base64_decode($signature);curl_exec (line:439);curl_exec($url);$data = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: webhook_test.php-
- Full path:
- ajwah/web/webhook_test.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:11 12/12/2025
- Last modified:
- 09:53:16 06/03/2025
- MD5 hash:
- 74a7dcc262d7fe7f2bdc9e0595d03837
- Filesize:
- 4.69 KB
- suspicious functions used:
- base64_decode (line:22);curl_exec (line:33);
$signatureDecoded = base64_decode($signature);curl_exec (line:86);curl_exec($url);curl_exec (line:107);$result = curl_exec($ch);$data = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: class.phpmailer.php-
- Full path:
- ajwah/web/email/class.phpmailer.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:12 12/12/2025
- Last modified:
- 09:53:20 06/03/2025
- MD5 hash:
- 68468d69b47fffecc89df57e27c5a781
- Filesize:
- 143.32 KB
- suspicious functions used:
- `$DKIM_private` (line:428);popen (line:1387);
* If set, takes precedence over `$DKIM_private`.popen (line:1408);if (!@$mail = popen($sendmail, 'w')) {base64_decode (line:3410);if (!@$mail = popen($sendmail, 'w')) {`$mail->set('SMTPSecure', 'tls');` (line:3688);$data = base64_decode($data);`$mail->SMTPSecure = 'tls';` (line:3690);* `$mail->set('SMTPSecure', 'tls');`* `$mail->SMTPSecure = 'tls';` - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: class.smtp.php-
- Full path:
- ajwah/web/email/class.smtp.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:12 12/12/2025
- Last modified:
- 09:53:21 06/03/2025
- MD5 hash:
- aa8478329268e5438a4469c268337a10
- Filesize:
- 41.44 KB
- suspicious functions used:
- base64_decode (line:513);base64_decode (line:533);
$challenge = base64_decode($challenge);$challenge = base64_decode(substr($this->last_reply, 4)); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: jqgrid.php-
- Full path:
- ajwah/web/inc/jqgrid.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:13 12/12/2025
- Last modified:
- 09:54:51 06/03/2025
- MD5 hash:
- 71027a29e71e0626d8b57cbb631e6d98
- Filesize:
- 23.92 KB
- suspicious functions used:
- eval (line:397);
if (!empty($V4a8a08f0["condition"])) eval("\$V4b43b0ae = ".$V4a8a08f0["condition"].";"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: JSON.php-
- Full path:
- ajwah/web/inc/JSON.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:13 12/12/2025
- Last modified:
- 09:54:51 06/03/2025
- MD5 hash:
- f5a34509e06231308becbe320ade9ff6
- Filesize:
- 33.22 KB
- suspicious functions used:
- eval (line:22);
* Javascript, and can be directly eval()'ed with no further parsing - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: smsapicore.php-
- Full path:
- ajwah/web/include/smsapicore.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 04:35:26 12/12/2025
- Last modified:
- 09:54:52 06/03/2025
- MD5 hash:
- 0494713963b7e9ead12abe06de2811a5
- Filesize:
- 1.26 KB
- suspicious functions used:
- curl_exec (line:37);
$resultdgfb = curl_exec($chg); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: telegramapicore.php-
- Full path:
- ajwah/web/include/telegramapicore.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 16:44:54 12/12/2025
- Last modified:
- 09:54:52 06/03/2025
- MD5 hash:
- 511f56e6dfcf4e9e7a11259e023ca3ae
- Filesize:
- 3.15 KB
- suspicious functions used:
- curl_exec (line:68);
$result11 = curl_exec($ch3); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ui.php-
- Full path:
- ajwah/web/js/tinymce/themes/advanced/skins/highcontrast/ui.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 16:58:37 12/12/2025
- Last modified:
- 09:55:17 06/03/2025
- MD5 hash:
- 3edaf67be8573b86686f46bbba4f058c
- Filesize:
- 4.53 KB
- suspicious functions used:
- curl_exec (line:20);`bill_amount` = '0.00' WHERE bill_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY ` (line:53);
$alldataa = curl_exec($chxchhh);`bill_amount` = '0.00', days = '0.00' WHERE entry_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY ` (line:54);$queryss = mysql_query("UPDATE billing SET `bill_amount` = '0.00' WHERE bill_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY `id` DESC LIMIT 5");`payment` WHERE `pay_date` < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND pay_amount != '0.00' ORDER BY ` (line:55);$sqlqmss = mysql_query("UPDATE billing_mac SET `bill_amount` = '0.00', days = '0.00' WHERE entry_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY `id` DESC LIMIT 5");curl_exec (line:146);$sqlqmsp = mysql_query("DELETE FROM `payment` WHERE `pay_date` < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND pay_amount != '0.00' ORDER BY `id` ASC LIMIT 5");curl_exec (line:168);$responsed = curl_exec($curld);$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Changes.txt-
- Full path:
- ajwah/web/js/jqgrid/js/Changes.txt
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:13 12/12/2025
- Last modified:
- 09:55:07 06/03/2025
- MD5 hash:
- c0a4adbc3f1c6d592cb4fa8433fee9ea
- Filesize:
- 44.32 KB
- suspicious functions used:
- system (line:87);
* Add a ant based build system which allow us to minify the JS code - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-snmp-onu-status-data-cdata.php-
- Full path:
- ajwah/web/network-snmp-onu-status-data-cdata.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:13 12/12/2025
- Last modified:
- 16:56:03 06/03/2025
- MD5 hash:
- dbf50804352ccb95714869628862226e
- Filesize:
- 16.27 KB
- suspicious functions used:
- shell_exec (line:42);shell_exec (line:58);
$output_oid_cdata = shell_exec($command_oid_cdata . " 2>&1");shell_exec (line:64);$outputs = shell_exec($commanda);shell_exec (line:69);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:73);$output_pon = shell_exec($command_ponn . " 2>&1");`pon_name` FROM `olt_pon` WHERE `olt_pon_id` = '$ponn_id' AND ` (line:80);$outsddd = shell_exec($commddandd);shell_exec (line:88);$qrydd = mysqli_query($con, "SELECT `pon_name` FROM `olt_pon` WHERE `olt_pon_id` = '$ponn_id' AND `olt_id` = '$olt_id' AND sts = '0'");$oddutpdut = shell_exec($cmandd . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkOltAddQuery2.php-
- Full path:
- ajwah/web/NetworkOltAddQuery2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:13 12/12/2025
- Last modified:
- 18:01:07 09/10/2025
- MD5 hash:
- f2e8bbce7005fe948eab86e12f9e789f
- Filesize:
- 7.96 KB
- suspicious functions used:
- shell_exec (line:22);
$output = shell_exec($command . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkOltAddQuery.php-
- Full path:
- ajwah/web/NetworkOltAddQuery.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:13 12/12/2025
- Last modified:
- 18:05:20 09/10/2025
- MD5 hash:
- 319387a24eed76c775eb484388027f1e
- Filesize:
- 7.98 KB
- suspicious functions used:
- shell_exec (line:21);
$output = shell_exec($command . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: createpayment.php-
- Full path:
- ajwah/m/createpayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:14 12/12/2025
- Last modified:
- 09:51:44 06/03/2025
- MD5 hash:
- 849185f307be30eafb1bbef93616d8c3
- Filesize:
- 1.71 KB
- suspicious functions used:
- curl_exec (line:57);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: executepayment.php-
- Full path:
- ajwah/m/executepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:14 12/12/2025
- Last modified:
- 09:51:44 06/03/2025
- MD5 hash:
- 9a3f22521ad987e86f84c4f5f688d5b7
- Filesize:
- 713 B
- suspicious functions used:
- curl_exec (line:18);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: index.php-
- Full path:
- ajwah/m/index.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 14:54:06 12/12/2025
- Last modified:
- 09:51:45 06/03/2025
- MD5 hash:
- 55a13ede9e1d70f42857e9a7baa75741
- Filesize:
- 16.95 KB
- suspicious functions used:
- curl_exec (line:298);
$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: index1.php-
- Full path:
- ajwah/m/index1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:14 12/12/2025
- Last modified:
- 09:51:45 06/03/2025
- MD5 hash:
- dbd325386cd905b7a18b217dda2030f3
- Filesize:
- 13.92 KB
- suspicious functions used:
- base64_decode (line:8);curl_exec (line:224);
list($encrypted_data, $iv, $key) = explode('::', base64_decode($ciphertext));$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: index2.php-
- Full path:
- ajwah/m/index2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:14 12/12/2025
- Last modified:
- 09:51:45 06/03/2025
- MD5 hash:
- 41558736b037228ea93df03cae70eb87
- Filesize:
- 4.31 KB
- suspicious functions used:
- curl_exec (line:70);
$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: LoginByPass.php-
- Full path:
- ajwah/m/LoginByPass.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:14 12/12/2025
- Last modified:
- 09:51:45 06/03/2025
- MD5 hash:
- 4deda2bef49c7e4552e5379c86858ddf
- Filesize:
- 4.27 KB
- suspicious functions used:
- curl_exec (line:41);
$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: login_exec.php-
- Full path:
- ajwah/m/login_exec.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 15:07:33 12/12/2025
- Last modified:
- 09:51:45 06/03/2025
- MD5 hash:
- 760b107af2f5d6194f97c20ba3ffb86b
- Filesize:
- 11.63 KB
- suspicious functions used:
- curl_exec (line:24);curl_exec (line:80);
$jsona = curl_exec($ch10);curl_exec (line:227);$result110 = curl_exec($ch11);$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: login_exec1.php-
- Full path:
- ajwah/m/login_exec1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:14 12/12/2025
- Last modified:
- 09:51:45 06/03/2025
- MD5 hash:
- b7a23f98b3d03b1ecc08218cf01b4aee
- Filesize:
- 6.36 KB
- suspicious functions used:
- curl_exec (line:115);
$result110 = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: login_exec2.php-
- Full path:
- ajwah/m/login_exec2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:14 12/12/2025
- Last modified:
- 09:51:45 06/03/2025
- MD5 hash:
- 46b08782f51ba75b23e27183e06370fe
- Filesize:
- 4.28 KB
- suspicious functions used:
- curl_exec (line:61);
$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: nagad-merchant-callback.php-
- Full path:
- ajwah/m/nagad-merchant-callback.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:14 12/12/2025
- Last modified:
- 09:51:46 06/03/2025
- MD5 hash:
- 89c5042f878e9b301a177823cf822c7e
- Filesize:
- 11.32 KB
- suspicious functions used:
- curl_exec (line:20);
$file_contents = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: netowrk-snmp-data.php-
- Full path:
- ajwah/m/netowrk-snmp-data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:14 12/12/2025
- Last modified:
- 09:51:46 06/03/2025
- MD5 hash:
- 75622375b3ee37723d953e8a83735ef7
- Filesize:
- 23.92 KB
- suspicious functions used:
- shell_exec (line:96);shell_exec (line:105);
$output = shell_exec($command . " 2>&1");shell_exec (line:115);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:134);$output_port = shell_exec($commandd . " 2>&1");shell_exec (line:146);$output = shell_exec($command . " 2>&1");shell_exec (line:157);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:173);$output_port = shell_exec($commandd);shell_exec (line:183);$output_oid_bdcom = shell_exec($command_oid_bdcom . " 2>&1");shell_exec (line:199);$outputs = shell_exec($commanda);shell_exec (line:219);$output_port = shell_exec($commandd_bdcom);shell_exec (line:229);$output_oid_cdata = shell_exec($command_oid_cdata . " 2>&1");shell_exec (line:234);$outputs = shell_exec($commanda);shell_exec (line:242);$outs = shell_exec($canda);shell_exec (line:262);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:278);$outpdut_port = shell_exec($commandd_cdata);`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:291);$output_oid_gcom = shell_exec($command_oid_gcom . " 2>&1");shell_exec (line:297);$querydd = mysqli_query($con, "SELECT `olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND `olt_id` = '$olt_id' AND sts = '0'");shell_exec (line:430);$output_vlan = shell_exec($command_vlan . " 2>&1");$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentOnlineQuery.php-
- Full path:
- ajwah/m/PaymentOnlineQuery.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:14 12/12/2025
- Last modified:
- 09:51:47 06/03/2025
- MD5 hash:
- 6483645d440dd2f976cc1b29cb4021d5
- Filesize:
- 20.95 KB
- suspicious functions used:
- curl_exec (line:287);curl_exec (line:492);
$resultdata=curl_exec($url);$content = curl_exec($handle ); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentOnlineQuery2.php-
- Full path:
- ajwah/m/PaymentOnlineQuery2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:14 12/12/2025
- Last modified:
- 09:51:47 06/03/2025
- MD5 hash:
- 3660992067d5591fc79ce89d6dbb9274
- Filesize:
- 19.08 KB
- suspicious functions used:
- curl_exec (line:41);curl_exec (line:254);
$resultdatax=curl_exec($url);$result = curl_exec($handle); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: support-action.php-
- Full path:
- ajwah/m/support-action.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:15 12/12/2025
- Last modified:
- 09:51:48 06/03/2025
- MD5 hash:
- 2fc6fd844db911a5502a7a6ae383990f
- Filesize:
- 10.31 KB
- suspicious functions used:
- curl_exec (line:99);
$jsona = curl_exec($ch10); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tagreeexpayment.php-
- Full path:
- ajwah/m/tagreeexpayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:15 12/12/2025
- Last modified:
- 09:51:49 06/03/2025
- MD5 hash:
- c95e3ee881752db67b4f3597bc58430a
- Filesize:
- 2.46 KB
- suspicious functions used:
- curl_exec (line:26);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tcreateagree.php-
- Full path:
- ajwah/m/tcreateagree.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:15 12/12/2025
- Last modified:
- 09:51:49 06/03/2025
- MD5 hash:
- 27a10adf4190edc7eceee8cf74a6b72b
- Filesize:
- 999 B
- suspicious functions used:
- curl_exec (line:26);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tcreatepayment.php-
- Full path:
- ajwah/m/tcreatepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:15 12/12/2025
- Last modified:
- 09:51:49 06/03/2025
- MD5 hash:
- e49de9a33f5164bc2c6b88e4770faaff
- Filesize:
- 1.07 KB
- suspicious functions used:
- curl_exec (line:27);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: texecutepayment.php-
- Full path:
- ajwah/m/texecutepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:15 12/12/2025
- Last modified:
- 09:51:49 06/03/2025
- MD5 hash:
- efbb63dfcfdacb52dec74bffc389bbb3
- Filesize:
- 2.67 KB
- suspicious functions used:
- curl_exec (line:24);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: token.php-
- Full path:
- ajwah/m/token.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:15 12/12/2025
- Last modified:
- 09:51:49 06/03/2025
- MD5 hash:
- 7d8e71ceda3ffb74623e0c4a814715af
- Filesize:
- 1.53 KB
- suspicious functions used:
- curl_exec (line:42);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ttoken.php-
- Full path:
- ajwah/m/ttoken.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:15 12/12/2025
- Last modified:
- 09:51:49 06/03/2025
- MD5 hash:
- 5f2c51c1db5b0defadfb67ce25c0098f
- Filesize:
- 1.54 KB
- suspicious functions used:
- curl_exec (line:42);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: AppSettings.php-
- Full path:
- akbhanga/web/AppSettings.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:15 12/12/2025
- Last modified:
- 05:13:42 06/03/2025
- MD5 hash:
- 7ed349c4b0217e5395c4cc9295f66f4a
- Filesize:
- 123.71 KB
- suspicious functions used:
- `input[name="${inputName}"]:checked` (line:2066);
var value = document.querySelector(`input[name="${inputName}"]:checked`).value; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: AutoActiveClientsCount1.php-
- Full path:
- akbhanga/web/AutoActiveClientsCount1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 14:35:32 12/12/2025
- Last modified:
- 05:13:42 06/03/2025
- MD5 hash:
- 3b3b6186ff2d9c5abd1772e5aa02ee33
- Filesize:
- 6.4 KB
- suspicious functions used:
- system (line:58);
$ARRAY = $API->comm("/system/resource/print"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: AutoActiveClientsCount11.php-
- Full path:
- akbhanga/web/AutoActiveClientsCount11.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:16 12/12/2025
- Last modified:
- 05:13:42 06/03/2025
- MD5 hash:
- a0090e4a11dd59b955a6edd549b6ef2f
- Filesize:
- 5.85 KB
- suspicious functions used:
- system (line:54);
$ARRAY = $API->comm("/system/resource/print"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: client-online-mbb.php-
- Full path:
- akbhanga/web/client-online-mbb.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:17 12/12/2025
- Last modified:
- 05:13:43 06/03/2025
- MD5 hash:
- e16c33ab6ddd7649ea56a7d5355365b6
- Filesize:
- 16.46 KB
- suspicious functions used:
- curl_exec (line:90);curl_exec (line:289);
$resp = curl_exec($curlss);$resp = curl_exec($curlss); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: clients-nots-action.php-
- Full path:
- akbhanga/web/clients-nots-action.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:17 12/12/2025
- Last modified:
- 05:13:43 06/03/2025
- MD5 hash:
- dff1bb495509427d098cb4588da553b9
- Filesize:
- 5.89 KB
- suspicious functions used:
- curl_exec (line:35);
$jsona = curl_exec($ch10); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Clients.php-
- Full path:
- akbhanga/web/Clients.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 06:06:47 12/12/2025
- Last modified:
- 10:28:27 06/03/2025
- MD5 hash:
- 95c2c28384fd7b6a33afc844c109e785
- Filesize:
- 209.92 KB
- suspicious functions used:
- `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:878);
$result1rd=mysql_query("SELECT `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND `sts` = '0' order by b_name ASC"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Clients1.php-
- Full path:
- akbhanga/web/Clients1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:18 12/12/2025
- Last modified:
- 05:13:43 06/03/2025
- MD5 hash:
- 228d02141d96f75107f8cad1047b18de
- Filesize:
- 208.78 KB
- suspicious functions used:
- `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:844);
$result1rd=mysql_query("SELECT `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND `sts` = '0' order by b_name ASC"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Clients2.php-
- Full path:
- akbhanga/web/Clients2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:18 12/12/2025
- Last modified:
- 05:13:43 06/03/2025
- MD5 hash:
- 982d6411552113b0715fd17c26f50292
- Filesize:
- 205.13 KB
- suspicious functions used:
- `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:832);
$result1rd=mysql_query("SELECT `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND `sts` = '0' order by b_name ASC"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Clients3.php-
- Full path:
- akbhanga/web/Clients3.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:18 12/12/2025
- Last modified:
- 05:13:43 06/03/2025
- MD5 hash:
- 50ddc869b383ab76e009c7a2c17c99a3
- Filesize:
- 175.31 KB
- suspicious functions used:
- `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:832);
$result1rd=mysql_query("SELECT `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND `sts` = '0' order by b_name ASC"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ClientsOnMap.php-
- Full path:
- akbhanga/web/ClientsOnMap.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:19 12/12/2025
- Last modified:
- 06:02:55 10/11/2025
- MD5 hash:
- 64ef22e5741bcb6332ba80d27017ca49
- Filesize:
- 11.5 KB
- suspicious functions used:
- `${totalonline}` (line:98);`${totaloffline}` (line:99);
document.getElementById('totalonline').textContent = `${totalonline}`;`${results.rxPower}` (line:232);document.getElementById('totaloffline').textContent = `${totaloffline}`;`${results.distance}` (line:233);var rxPower = `${results.rxPower}`;`${results.supplyVoltage}` (line:234);var distance = `${results.distance}`;`${results.temperature}` (line:235);var supplyVoltage = `${results.supplyVoltage}`;`${results.txPower}` (line:236);var temperature = `${results.temperature}`;var txPower = `${results.txPower}`; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ClientView.php-
- Full path:
- akbhanga/web/ClientView.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 04:47:59 12/12/2025
- Last modified:
- 05:13:44 06/03/2025
- MD5 hash:
- ecd7171b944880ac4539623626dbf9d2
- Filesize:
- 111.69 KB
- suspicious functions used:
- `olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:227);
$querydd = mysql_query("SELECT `olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND `olt_id` = '$c_olt_id' AND sts = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ClientView1.php-
- Full path:
- akbhanga/web/ClientView1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:19 12/12/2025
- Last modified:
- 05:13:44 06/03/2025
- MD5 hash:
- ecd7171b944880ac4539623626dbf9d2
- Filesize:
- 111.69 KB
- suspicious functions used:
- `olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:227);
$querydd = mysql_query("SELECT `olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND `olt_id` = '$c_olt_id' AND sts = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: company_info.php-
- Full path:
- akbhanga/web/company_info.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 15:22:38 12/12/2025
- Last modified:
- 05:13:44 06/03/2025
- MD5 hash:
- 2983755d925ee3aa49accefa47451c7d
- Filesize:
- 8.62 KB
- suspicious functions used:
- curl_exec (line:134);
$alldata = curl_exec($chhhh); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: createpayment.php-
- Full path:
- akbhanga/web/createpayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 05:24:24 12/12/2025
- Last modified:
- 05:13:44 06/03/2025
- MD5 hash:
- ba9747d0421fd091b998389469e72a0b
- Filesize:
- 1.7 KB
- suspicious functions used:
- curl_exec (line:57);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_all.php-
- Full path:
- akbhanga/web/cron_all.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:20 12/12/2025
- Last modified:
- 05:13:44 06/03/2025
- MD5 hash:
- 967f1d654ae891609da26b9e0fdbd1ae
- Filesize:
- 2.44 KB
- suspicious functions used:
- curl_exec (line:23);curl_exec (line:38);
$result1 = curl_exec($ch1);curl_exec (line:53);$result1d = curl_exec($ch11);$result1d2 = curl_exec($ch112); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_gen_bill.php-
- Full path:
- akbhanga/web/cron_auto_gen_bill.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:20 12/12/2025
- Last modified:
- 05:13:44 06/03/2025
- MD5 hash:
- f1056618cc4402968e50d1232d2c51c8
- Filesize:
- 4.73 KB
- suspicious functions used:
- curl_exec (line:140);curl_exec (line:149);
$respd = curl_exec($curl);$resp = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_inactive.php-
- Full path:
- akbhanga/web/cron_auto_inactive.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 17:00:02 12/12/2025
- Last modified:
- 05:13:44 06/03/2025
- MD5 hash:
- 7e0dc4dd9dae2bf0220516641b53c027
- Filesize:
- 5.43 KB
- suspicious functions used:
- curl_exec (line:142);
$respw = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_inactive2.php-
- Full path:
- akbhanga/web/cron_auto_inactive2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:20 12/12/2025
- Last modified:
- 05:13:44 06/03/2025
- MD5 hash:
- 440bc24f05b01eb395df63fff2f60de9
- Filesize:
- 5.46 KB
- suspicious functions used:
- curl_exec (line:142);
$respw = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_inactive_termination.php-
- Full path:
- akbhanga/web/cron_auto_inactive_termination.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 00:45:15 12/12/2025
- Last modified:
- 05:13:44 06/03/2025
- MD5 hash:
- 49f9f022b288eb3a85139ac8c1afb13c
- Filesize:
- 12.23 KB
- suspicious functions used:
- curl_exec (line:219);curl_exec (line:231);
$resp = curl_exec($curlss);curl_exec (line:273);$respw = curl_exec($curls);$resp = curl_exec($curlss); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_termination_remainder1.php-
- Full path:
- akbhanga/web/cron_auto_termination_remainder1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 03:06:13 12/12/2025
- Last modified:
- 05:13:44 06/03/2025
- MD5 hash:
- 7765f9f820dbd402f1064fab9958ffaa
- Filesize:
- 3.26 KB
- suspicious functions used:
- curl_exec (line:83);
$respw = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_client_bandwidth_count.php-
- Full path:
- akbhanga/web/cron_client_bandwidth_count.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:13:33 12/12/2025
- Last modified:
- 05:13:44 06/03/2025
- MD5 hash:
- 1c71a3dd097275429ae845a85ced0438
- Filesize:
- 5.33 KB
- suspicious functions used:
- curl_exec (line:124);curl_exec (line:134);
$result = curl_exec($ch);$result1dd = curl_exec($ch111); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_network.php-
- Full path:
- akbhanga/web/cron_network.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 01:42:41 12/12/2025
- Last modified:
- 05:13:44 06/03/2025
- MD5 hash:
- db096f353e80027593ca3f9781a21ac8
- Filesize:
- 4.93 KB
- suspicious functions used:
- curl_exec (line:45);curl_exec (line:67);
$result1d = curl_exec($ch11);curl_exec (line:127);$result1dd = curl_exec($ch111);$result1dd = curl_exec($ch111); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_olt.php-
- Full path:
- akbhanga/web/cron_olt.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 13:30:37 12/12/2025
- Last modified:
- 05:13:44 06/03/2025
- MD5 hash:
- 5edf51db84e11e807af66733348efbf5
- Filesize:
- 4.19 KB
- suspicious functions used:
- shell_exec (line:48);curl_exec (line:126);
$output = shell_exec($command);$result1dd = curl_exec($ch111); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_olt_clients_catch.php-
- Full path:
- akbhanga/web/cron_olt_clients_catch.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:20 12/12/2025
- Last modified:
- 05:13:44 06/03/2025
- MD5 hash:
- 3b13c163ba3445b3d661c63adde1d985
- Filesize:
- 1.12 KB
- suspicious functions used:
- curl_exec (line:23);
$result1d = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_olt_user.php-
- Full path:
- akbhanga/web/cron_olt_user.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:20 12/12/2025
- Last modified:
- 05:13:44 06/03/2025
- MD5 hash:
- 67aa237639e3d1e6064e76079bb3cccc
- Filesize:
- 1.97 KB
- suspicious functions used:
- curl_exec (line:19);curl_exec (line:46);
$resultd1d = curl_exec($ch110);$result1d = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: EmployeeAdd.php-
- Full path:
- akbhanga/web/EmployeeAdd.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:20 12/12/2025
- Last modified:
- 05:13:45 06/03/2025
- MD5 hash:
- c12c85fa282eb15060ed68bad252f8e8
- Filesize:
- 19.13 KB
- suspicious functions used:
- `Element with ID ${id} not found.` (line:36);`Non-numeric input detected in ${id}.` (line:38);
if (!element) throw `Element with ID ${id} not found.`;`Element with ID ${id} not found.` (line:44);if (isNaN(value)) throw `Non-numeric input detected in ${id}.`;`Non-numeric input detected in ${id}.` (line:46);if (!element) throw `Element with ID ${id} not found.`;if (isNaN(value)) throw `Non-numeric input detected in ${id}.`; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: EmployeeEdit.php-
- Full path:
- akbhanga/web/EmployeeEdit.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:20 12/12/2025
- Last modified:
- 05:13:45 06/03/2025
- MD5 hash:
- 55b4626339d566473f477e1a001dc8b4
- Filesize:
- 17.73 KB
- suspicious functions used:
- `Element with ID ${id} not found.` (line:44);`Non-numeric input detected in ${id}.` (line:46);
if (!element) throw `Element with ID ${id} not found.`;`Element with ID ${id} not found.` (line:52);if (isNaN(value)) throw `Non-numeric input detected in ${id}.`;`Non-numeric input detected in ${id}.` (line:54);if (!element) throw `Element with ID ${id} not found.`;if (isNaN(value)) throw `Non-numeric input detected in ${id}.`; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: emp_salary_advence_find.php-
- Full path:
- akbhanga/web/emp_salary_advence_find.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:20 12/12/2025
- Last modified:
- 05:13:45 06/03/2025
- MD5 hash:
- 74a7e2ffda0f7584611d7cbce6136c24
- Filesize:
- 2.25 KB
- suspicious functions used:
- `expanse` WHERE `type` = '2' AND `status` = '2' AND ex_by = '$e_id' AND MONTH(`, `) = MONTH('$lastmonth') AND YEAR(`, `) = YEAR('$lastmonth') GROUP BY ` (line:8);`e_id` = '$e_id' AND ` (line:12);
$vendorrr = mysql_query("SELECT SUM(amount) AS salary_advance FROM `expanse` WHERE `type` = '2' AND `status` = '2' AND ex_by = '$e_id' AND MONTH(`check_date`) = MONTH('$lastmonth') AND YEAR(`check_date`) = YEAR('$lastmonth') GROUP BY `ex_by`");$empppp = mysql_query("SELECT gross_total AS gross_total FROM emp_info WHERE `e_id` = '$e_id' AND `status` = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: executepayment.php-
- Full path:
- akbhanga/web/executepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 15:00:19 12/12/2025
- Last modified:
- 05:13:45 06/03/2025
- MD5 hash:
- c46a50905333286f45dfeacf010851ab
- Filesize:
- 716 B
- suspicious functions used:
- curl_exec (line:18);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: getclientuptime.php-
- Full path:
- akbhanga/web/getclientuptime.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:20 12/12/2025
- Last modified:
- 05:13:46 06/03/2025
- MD5 hash:
- bbc14cdd451c72b94d78c7d2d1af0b52
- Filesize:
- 718 B
- suspicious functions used:
- curl_exec (line:18);
$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: imagevwr.php-
- Full path:
- akbhanga/web/imagevwr.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 11:26:13 12/12/2025
- Last modified:
- 05:13:46 06/03/2025
- MD5 hash:
- 47a223a13cc642d01dcfaaca542d396d
- Filesize:
- 915 B
- suspicious functions used:
- curl_exec (line:15);
$image_data = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: index.php-
- Full path:
- akbhanga/web/index.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:20 12/12/2025
- Last modified:
- 05:13:46 06/03/2025
- MD5 hash:
- 3d1fa8a053cd084d6bcbc24765a91739
- Filesize:
- 16.67 KB
- suspicious functions used:
- curl_exec (line:298);
$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: InstrumentsStoreOutDetails.php-
- Full path:
- akbhanga/web/InstrumentsStoreOutDetails.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:20 12/12/2025
- Last modified:
- 05:13:46 06/03/2025
- MD5 hash:
- a60c19f766bfff1ccdccbeba6b39eb87
- Filesize:
- 9.37 KB
- suspicious functions used:
- `update_date`, '%D-%b, %y') AS offdate, TIME_FORMAT(`update_time`, '%T') AS offtime FROM `con_sts_log` WHERE `c_id` = '{$row['c_id']}' AND con_sts = 'Inactive' ORDER BY ` (line:120);
$resultwwdd=mysql_query("SELECT DATE_FORMAT(`update_date`, '%D-%b, %y') AS offdate, TIME_FORMAT(`update_time`, '%T') AS offtime FROM `con_sts_log` WHERE `c_id` = '{$row['c_id']}' AND con_sts = 'Inactive' ORDER BY `update_date_time` DESC LIMIT 1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ip-ping-checker.php-
- Full path:
- akbhanga/web/ip-ping-checker.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:20 12/12/2025
- Last modified:
- 05:13:46 06/03/2025
- MD5 hash:
- 0d28f3053b73b3fe2885cf519ee17c12
- Filesize:
- 2.64 KB
- suspicious functions used:
- curl_exec (line:81);
$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: LoginByPass.php-
- Full path:
- akbhanga/web/LoginByPass.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:20 12/12/2025
- Last modified:
- 05:13:47 06/03/2025
- MD5 hash:
- a8f1789daadb34b0814aaecddfebe7c1
- Filesize:
- 4.26 KB
- suspicious functions used:
- curl_exec (line:41);
$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: loginexec.php-
- Full path:
- akbhanga/web/loginexec.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:20 12/12/2025
- Last modified:
- 05:13:47 06/03/2025
- MD5 hash:
- edb8017e7d0f8e037facbcacc94a383d
- Filesize:
- 5.91 KB
- suspicious functions used:
- curl_exec (line:67);
$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: login_exec.php-
- Full path:
- akbhanga/web/login_exec.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 06:55:19 12/12/2025
- Last modified:
- 14:50:37 12/03/2025
- MD5 hash:
- 52c9e33276b889bbe1bd665c754a5860
- Filesize:
- 12.1 KB
- suspicious functions used:
- curl_exec (line:24);curl_exec (line:74);
$jsona = curl_exec($ch10);curl_exec (line:199);$result110 = curl_exec($ch11);curl_exec (line:239);$jsona = curl_exec($ch10);$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: macreseller-news.php-
- Full path:
- akbhanga/web/macreseller-news.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:20 12/12/2025
- Last modified:
- 05:13:47 06/03/2025
- MD5 hash:
- ed23ca98b77c5321b4485e85eb2ea64d
- Filesize:
- 3.67 KB
- suspicious functions used:
- curl_exec (line:22);
$alldata1 = curl_exec($chhhh1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: MacResellerAdd.php-
- Full path:
- akbhanga/web/MacResellerAdd.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:21 12/12/2025
- Last modified:
- 05:13:47 06/03/2025
- MD5 hash:
- 5ac506fcafb554fb6326382737dce0df
- Filesize:
- 29.89 KB
- suspicious functions used:
- `input[name="${inputName}"]:checked` (line:792);
var value = document.querySelector(`input[name="${inputName}"]:checked`).value; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: MacResellerEdit.php-
- Full path:
- akbhanga/web/MacResellerEdit.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:21 12/12/2025
- Last modified:
- 05:13:48 06/03/2025
- MD5 hash:
- 60b4a4eac6e169f1bce50574c472cd2a
- Filesize:
- 37.16 KB
- suspicious functions used:
- `input[name="${inputName}"]:checked` (line:634);
var value = document.querySelector(`input[name="${inputName}"]:checked`).value; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: nagad-helper.php-
- Full path:
- akbhanga/web/nagad-helper.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:21 12/12/2025
- Last modified:
- 05:13:48 06/03/2025
- MD5 hash:
- 114b90b978b842cd318391876ba454ab
- Filesize:
- 2.84 KB
- suspicious functions used:
- curl_exec (line:46);base64_decode (line:77);
$resultData = curl_exec($url);openssl_private_decrypt(base64_decode($cryptText), $plain_text, $private_key); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: nagad-merchant-callback.php-
- Full path:
- akbhanga/web/nagad-merchant-callback.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:21 12/12/2025
- Last modified:
- 05:13:48 06/03/2025
- MD5 hash:
- b0ec1f203cb16bb39dc0dc5c587982ce
- Filesize:
- 16.47 KB
- suspicious functions used:
- curl_exec (line:20);
$file_contents = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: netowrk-olt-all-mac-array.php-
- Full path:
- akbhanga/web/netowrk-olt-all-mac-array.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:21 12/12/2025
- Last modified:
- 05:13:48 06/03/2025
- MD5 hash:
- b0168ce99145e2afe64357247d750dd6
- Filesize:
- 4.62 KB
- suspicious functions used:
- shell_exec (line:33);shell_exec (line:47);
$output = shell_exec($command . " 2>&1");shell_exec (line:61);$output = shell_exec($command . " 2>&1");shell_exec (line:76);$output_oid_bdcom = shell_exec($command_oid_bdcom . " 2>&1");shell_exec (line:93);$output_oid_cdata = shell_exec($command_oid_cdata . " 2>&1");$output_oid_gcom = shell_exec($command_oid_gcom . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: netowrk-snmp-data-auto.php-
- Full path:
- akbhanga/web/netowrk-snmp-data-auto.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:21 12/12/2025
- Last modified:
- 05:13:48 06/03/2025
- MD5 hash:
- 81e2685cc9d5a33d54a0764a0488b848
- Filesize:
- 7.24 KB
- suspicious functions used:
- shell_exec (line:67);shell_exec (line:117);
$output = shell_exec($command);$vlanoutput = shell_exec($vlancommand); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: netowrk-snmp-data.php-
- Full path:
- akbhanga/web/netowrk-snmp-data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 15:24:15 12/12/2025
- Last modified:
- 05:13:48 06/03/2025
- MD5 hash:
- 4d7f14139fba095fdbc348dce9136690
- Filesize:
- 24.67 KB
- suspicious functions used:
- shell_exec (line:103);shell_exec (line:112);
$output = shell_exec($command . " 2>&1");shell_exec (line:122);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:141);$output_port = shell_exec($commandd . " 2>&1");shell_exec (line:153);$output = shell_exec($command . " 2>&1");shell_exec (line:164);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:180);$output_port = shell_exec($commandd);shell_exec (line:190);$output_oid_bdcom = shell_exec($command_oid_bdcom . " 2>&1");shell_exec (line:206);$outputs = shell_exec($commanda);shell_exec (line:226);$output_port = shell_exec($commandd_bdcom);shell_exec (line:235);$output_oid_cdata = shell_exec($command_oid_cdata . " 2>&1");shell_exec (line:243);$outputs = shell_exec($commanda);shell_exec (line:250);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:255);$output_pon = shell_exec($command_ponn . " 2>&1");`pon_name` FROM `olt_pon` WHERE `olt_pon_id` = '$pon_id' AND ` (line:262);$outsddd = shell_exec($commddandd);shell_exec (line:279);$qrydd = mysqli_query($con, "SELECT `pon_name` FROM `olt_pon` WHERE `olt_pon_id` = '$pon_id' AND `olt_id` = '$olt_id' AND sts = '0'");shell_exec (line:289);$outsdd = shell_exec($commddand);`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:302);$output_oid_gcom = shell_exec($command_oid_gcom . " 2>&1");shell_exec (line:308);$querydd = mysqli_query($con, "SELECT `olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND `olt_id` = '$olt_id' AND sts = '0'");shell_exec (line:440);$output_vlan = shell_exec($command_vlan . " 2>&1");$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-old-onu-rx-map.php-
- Full path:
- akbhanga/web/network-old-onu-rx-map.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:21 12/12/2025
- Last modified:
- 05:13:48 06/03/2025
- MD5 hash:
- b4962c160c5ad68ccd8eed9c48d82a0f
- Filesize:
- 6.94 KB
- suspicious functions used:
- shell_exec (line:76);
$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-old-onu-rx.php-
- Full path:
- akbhanga/web/network-old-onu-rx.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:21 12/12/2025
- Last modified:
- 05:13:48 06/03/2025
- MD5 hash:
- 59ed3318f07d2280f47e67f3c2f2c935
- Filesize:
- 7.35 KB
- suspicious functions used:
- shell_exec (line:85);
$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-client-onu-mac-count-cdata.php-
- Full path:
- akbhanga/web/network-olt-client-onu-mac-count-cdata.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:21 12/12/2025
- Last modified:
- 05:13:48 06/03/2025
- MD5 hash:
- c378dbabf36066c335cfb8838a6e167d
- Filesize:
- 4.58 KB
- suspicious functions used:
- shell_exec (line:25);shell_exec (line:35);
$od_vddlan = shell_exec($codmn . " 2>&1");shell_exec (line:56);$od_vddlan = shell_exec($codmn . " 2>&1");shell_exec (line:103);$output_vdlan = shell_exec($command_dvlan . " 2>&1");shell_exec (line:115);$od_vdlan = shell_exec($coddvlan . " 2>&1");shell_exec (line:126);$output_port = shell_exec($commandd_bdcom);shell_exec (line:140);$od_vddlan = shell_exec($codmn . " 2>&1");$od_vdddlan = shell_exec($codmdn . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-client-onu-mac-count-rcl.php-
- Full path:
- akbhanga/web/network-olt-client-onu-mac-count-rcl.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:21 12/12/2025
- Last modified:
- 05:13:48 06/03/2025
- MD5 hash:
- 155290201f4342ad1f835e1411ef3e31
- Filesize:
- 4.55 KB
- suspicious functions used:
- shell_exec (line:25);shell_exec (line:35);
$od_vddlan = shell_exec($codmn . " 2>&1");shell_exec (line:56);$od_vddlan = shell_exec($codmn . " 2>&1");shell_exec (line:103);$output_vdlan = shell_exec($command_dvlan . " 2>&1");shell_exec (line:115);$od_vdlan = shell_exec($coddvlan . " 2>&1");shell_exec (line:126);$output_port = shell_exec($commandd_bdcom);shell_exec (line:140);$od_vddlan = shell_exec($codmn . " 2>&1");$od_vdddlan = shell_exec($codmdn . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-client-onu-mac-count.php-
- Full path:
- akbhanga/web/network-olt-client-onu-mac-count.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:21 12/12/2025
- Last modified:
- 05:13:49 06/03/2025
- MD5 hash:
- 22f7c5b1545279d2a65caf57b3cb5c5a
- Filesize:
- 15.3 KB
- suspicious functions used:
- shell_exec (line:26);shell_exec (line:36);
$od_vddlan = shell_exec($codmn . " 2>&1");shell_exec (line:68);$od_vddlan = shell_exec($codmn . " 2>&1");shell_exec (line:84);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:101);$outpudt_vlan = shell_exec($commadnd_vlan . " 2>&1");shell_exec (line:119);$output_port = shell_exec($commandd_bdcom);shell_exec (line:135);$output_vdlan = shell_exec($command_vdlan . " 2>&1");shell_exec (line:176);$outpdut_vdlan = shell_exec($commadnd_dvlan . " 2>&1");shell_exec (line:236);$output_vdlan = shell_exec($command_dvlan . " 2>&1");shell_exec (line:312);$outpdut_vdlan = shell_exec($commadnd_dvlan . " 2>&1");shell_exec (line:379);$output_vdlan = shell_exec($command_dvlan . " 2>&1");shell_exec (line:469);$od_vddddlan = shell_exec($codmddn . " 2>&1");shell_exec (line:488);$od_vdlan = shell_exec($coddvlan . " 2>&1");shell_exec (line:507);$od_vddlan = shell_exec($codmn . " 2>&1");$od_vdddlan = shell_exec($codmdn . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-client-onu-mac-countt.php-
- Full path:
- akbhanga/web/network-olt-client-onu-mac-countt.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:21 12/12/2025
- Last modified:
- 05:13:49 06/03/2025
- MD5 hash:
- d29b4e72c375f528b769bd3894f9f0e7
- Filesize:
- 8.95 KB
- suspicious functions used:
- shell_exec (line:26);shell_exec (line:36);
$od_vddlan = shell_exec($codmn . " 2>&1");shell_exec (line:59);$od_vddlan = shell_exec($codmn . " 2>&1");shell_exec (line:75);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:92);$outpudt_vlan = shell_exec($commadnd_vlan . " 2>&1");shell_exec (line:102);$output_port = shell_exec($commandd_bdcom);shell_exec (line:117);$output_vdlan = shell_exec($command_vdlan . " 2>&1");shell_exec (line:155);$outpdut_vdlan = shell_exec($commadnd_dvlan . " 2>&1");shell_exec (line:206);$output_vdlan = shell_exec($command_dvlan . " 2>&1");shell_exec (line:262);$od_vddddlan = shell_exec($codmddn . " 2>&1");shell_exec (line:275);$od_vdlan = shell_exec($coddvlan . " 2>&1");shell_exec (line:288);$od_vddlan = shell_exec($codmn . " 2>&1");$od_vdddlan = shell_exec($codmdn . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-con-sts.php-
- Full path:
- akbhanga/web/network-olt-con-sts.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:21 12/12/2025
- Last modified:
- 05:13:49 06/03/2025
- MD5 hash:
- a26b0a1c1567c34c9aa5e2e0254ff8a6
- Filesize:
- 4 KB
- suspicious functions used:
- `olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:10);shell_exec (line:38);
$query = mysqli_query($con, "SELECT `olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND `sts` = '0'");`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, `last_synced`, `last_update`, `msg`, `full_msg`, ROUND((SELECT AVG(value) FROM olt_onu_history WHERE alarm_id = '$alarmId' AND value != ''), 2) AS average_value FROM `, ` WHERE `alarm_id` = '$alarmId' AND ` (line:82);$output = shell_exec($command);$query = mysqli_query($con, "SELECT `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, `last_synced`, `last_update`, `msg`, `full_msg`, ROUND((SELECT AVG(value) FROM olt_onu_history WHERE alarm_id = '$alarmId' AND value != ''), 2) AS average_value FROM `olt_onu_history` WHERE `alarm_id` = '$alarmId' AND `value` != ''"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-load.php-
- Full path:
- akbhanga/web/network-olt-load.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:21 12/12/2025
- Last modified:
- 05:13:49 06/03/2025
- MD5 hash:
- f49d5153285c639ed91d4e806685ee56
- Filesize:
- 1.33 KB
- suspicious functions used:
- shell_exec (line:22);shell_exec (line:25);
$output = shell_exec($command . " 2>&1");$output1 = shell_exec($command1 . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-oid-check.php-
- Full path:
- akbhanga/web/network-olt-oid-check.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:21 12/12/2025
- Last modified:
- 05:13:49 06/03/2025
- MD5 hash:
- 5b7dc0ce1103fbfc895873c250b63141
- Filesize:
- 1.88 KB
- suspicious functions used:
- shell_exec (line:33);
return shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-onu-alarm-add.php-
- Full path:
- akbhanga/web/network-olt-onu-alarm-add.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:21 12/12/2025
- Last modified:
- 05:13:49 06/03/2025
- MD5 hash:
- be6ba82c658419e1454f778e20e2d4c3
- Filesize:
- 7.86 KB
- suspicious functions used:
- shell_exec (line:103);
$output = shell_exec($command . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-onu-count.php-
- Full path:
- akbhanga/web/network-olt-onu-count.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:21 12/12/2025
- Last modified:
- 05:13:49 06/03/2025
- MD5 hash:
- 6dc4bf46ac59065c0e0e7e3510aaf4d2
- Filesize:
- 7.05 KB
- suspicious functions used:
- `olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:12);shell_exec (line:81);
$query = mysqli_query($con, "SELECT `olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND `online_sts` = '1' AND `sts` = '0'");$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-onu-list-data.php-
- Full path:
- akbhanga/web/network-olt-onu-list-data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:21 12/12/2025
- Last modified:
- 05:13:49 06/03/2025
- MD5 hash:
- 54cc9417c766c31317311c3722ce7d4b
- Filesize:
- 9.48 KB
- suspicious functions used:
- shell_exec (line:24);shell_exec (line:38);
$outputs = shell_exec($commanda);shell_exec (line:64);$output = shell_exec($command);shell_exec (line:85);$outputs = shell_exec($commanda);shell_exec (line:104);$output = shell_exec($command);shell_exec (line:125);$outputs = shell_exec($commanda);shell_exec (line:143);$output = shell_exec($command);shell_exec (line:153);$od_vdlan = shell_exec($commanda . " 2>&1");shell_exec (line:165);$od_vdland = shell_exec($coddvland . " 2>&1");shell_exec (line:185);$outputs = shell_exec($coddvladnd . " 2>&1");$output_vdlan = shell_exec($command_vdlan); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-onu-power.php-
- Full path:
- akbhanga/web/network-olt-onu-power.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:21 12/12/2025
- Last modified:
- 05:13:49 06/03/2025
- MD5 hash:
- 2e064543b67b532bdf4e5b12d49c5052
- Filesize:
- 7.54 KB
- suspicious functions used:
- shell_exec (line:97);
$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-pon-clients-search.php-
- Full path:
- akbhanga/web/network-olt-pon-clients-search.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:21 12/12/2025
- Last modified:
- 05:13:49 06/03/2025
- MD5 hash:
- 79d26fc66abdab6f173330588aa8b238
- Filesize:
- 10.93 KB
- suspicious functions used:
- shell_exec (line:42);shell_exec (line:51);
$output = shell_exec($command . " 2>&1");shell_exec (line:104);$outputS = shell_exec($command . " 2>&1");shell_exec (line:168);$snmpOutput = shell_exec($command);$snmpOutput = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-pon-onu-search-bdcom.php-
- Full path:
- akbhanga/web/network-olt-pon-onu-search-bdcom.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:21 12/12/2025
- Last modified:
- 05:13:49 06/03/2025
- MD5 hash:
- c786fa8b69268c738b6ff976631798cd
- Filesize:
- 27.74 KB
- suspicious functions used:
- shell_exec (line:60);shell_exec (line:69);
$output = shell_exec($command . " 2>&1");shell_exec (line:383);$outputS = shell_exec($commandS . " 2>&1");$snmpOutput = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-pon-onu-search-bdcom1.php-
- Full path:
- akbhanga/web/network-olt-pon-onu-search-bdcom1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:22 12/12/2025
- Last modified:
- 05:13:49 06/03/2025
- MD5 hash:
- dd18677b1dcbf7f0bce2ac6912d98da0
- Filesize:
- 9.6 KB
- suspicious functions used:
- shell_exec (line:42);shell_exec (line:51);
$output = shell_exec($command . " 2>&1");shell_exec (line:129);$outputS = shell_exec($command . " 2>&1");$snmpOutput = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-pon-onu-search-rcl.php-
- Full path:
- akbhanga/web/network-olt-pon-onu-search-rcl.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:22 12/12/2025
- Last modified:
- 05:13:49 06/03/2025
- MD5 hash:
- 565ff38d572bba4bc20721ab17484554
- Filesize:
- 27.33 KB
- suspicious functions used:
- shell_exec (line:46);shell_exec (line:55);
$output = shell_exec($command . " 2>&1");shell_exec (line:369);$outputS = shell_exec($commandS . " 2>&1");$snmpOutput = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-pon-onu-search.php-
- Full path:
- akbhanga/web/network-olt-pon-onu-search.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:22 12/12/2025
- Last modified:
- 05:13:49 06/03/2025
- MD5 hash:
- dc183ecf77d0e1f56f672338fd09cfa5
- Filesize:
- 21.62 KB
- suspicious functions used:
- shell_exec (line:35);
$output = shell_exec($command . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-snmp-onu-status-data-bdcom.php-
- Full path:
- akbhanga/web/network-snmp-onu-status-data-bdcom.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:22 12/12/2025
- Last modified:
- 02:20:46 07/03/2025
- MD5 hash:
- 97bdd52a7c2adee8fba0a4f7165605d0
- Filesize:
- 23.35 KB
- suspicious functions used:
- shell_exec (line:48);shell_exec (line:73);
$oudddputsd = shell_exec($commddanda . " 2>&1");shell_exec (line:85);$oudddputsd = shell_exec($commddanda . " 2>&1");shell_exec (line:103);$oudddputsd = shell_exec($commddanda . " 2>&1");shell_exec (line:116);$output = shell_exec($command . " 2>&1");shell_exec (line:128);$outputs = shell_exec($commanda);shell_exec (line:134);$outpdut = shell_exec($commandd . " 2>&1");shell_exec (line:159);$oddutpdut = shell_exec($cmandd . " 2>&1");shell_exec (line:172);$output = shell_exec($command . " 2>&1");shell_exec (line:184);$outputs = shell_exec($commanda);shell_exec (line:190);$outpdut = shell_exec($commandd . " 2>&1");shell_exec (line:217);$oddutpdut = shell_exec($cmandd . " 2>&1");shell_exec (line:230);$output_oid_cdata = shell_exec($command_oid_cdata . " 2>&1");shell_exec (line:236);$outputs = shell_exec($commanda);$oddutpdut = shell_exec($cmandd . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-snmp-onu-status-data.php-
- Full path:
- akbhanga/web/network-snmp-onu-status-data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:22 12/12/2025
- Last modified:
- 05:13:49 06/03/2025
- MD5 hash:
- 0adfee384bf349b50f11036947fd2a74
- Filesize:
- 30.37 KB
- suspicious functions used:
- shell_exec (line:38);`olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:42);
$outputs = shell_exec($snmpCommand);shell_exec (line:81);$re11=mysql_query("SELECT `olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND `olt_pon_id` = '$check_pon_name'");shell_exec (line:95);$outputs = shell_exec($snmpCommand);shell_exec (line:109);$outpdduts = shell_exec($sand);shell_exec (line:122);$outputs = shell_exec($snmpCommand);shell_exec (line:208);$outpdduts = shell_exec($sand);shell_exec (line:429);$outputsmac = shell_exec($snmpCommandmac);shell_exec (line:441);$outputsmac = shell_exec($snmpCommandmac);shell_exec (line:448);$outputsmac = shell_exec($snmpCommandmac);$output_vlan = shell_exec($command_vlan . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-snmp-onu-status-data1.php-
- Full path:
- akbhanga/web/network-snmp-onu-status-data1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:22 12/12/2025
- Last modified:
- 05:13:49 06/03/2025
- MD5 hash:
- 920bd1a592c36f7a1194b737642f8340
- Filesize:
- 15.96 KB
- suspicious functions used:
- shell_exec (line:33);`olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:37);
$outputs = shell_exec($snmpCommand);shell_exec (line:149);$re11=mysql_query("SELECT `olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND `olt_pon_id` = '$check_pon_name'");$outputsmac = shell_exec($snmpCommandmac); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-snmp-onu-status-data_vsol2.php-
- Full path:
- akbhanga/web/network-snmp-onu-status-data_vsol2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:22 12/12/2025
- Last modified:
- 05:13:49 06/03/2025
- MD5 hash:
- f22d022ddc284f4d8e1de3660da91db8
- Filesize:
- 15.61 KB
- suspicious functions used:
- shell_exec (line:34);shell_exec (line:113);
$outputs = shell_exec($snmpCommand);shell_exec (line:126);$outpdduts = shell_exec($sand);shell_exec (line:132);$outputsmac = shell_exec($snmpCommandmac);$output_vlan = shell_exec($command_vlan . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-tree-vartual-nodes.php-
- Full path:
- akbhanga/web/network-tree-vartual-nodes.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:22 12/12/2025
- Last modified:
- 05:13:49 06/03/2025
- MD5 hash:
- 3530b8bc3113544014b1746ecd67e834
- Filesize:
- 10.64 KB
- suspicious functions used:
- shell_exec (line:76);shell_exec (line:111);
$outputs = shell_exec($commanda);shell_exec (line:145);$outputs = shell_exec($commanda);shell_exec (line:181);$outputs = shell_exec($commanda);shell_exec (line:188);$od_vdlan = shell_exec($commanda . " 2>&1");$od_vdland = shell_exec($coddvland . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Network.php-
- Full path:
- akbhanga/web/Network.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:22 12/12/2025
- Last modified:
- 02:20:47 07/03/2025
- MD5 hash:
- 2691f8988dee1a9fc89f0738b9f0b62f
- Filesize:
- 64.28 KB
- suspicious functions used:
- system (line:370);shell_exec (line:653);
$ARRAY = $API->comm("/system/resource/print");$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Network1.php-
- Full path:
- akbhanga/web/Network1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:22 12/12/2025
- Last modified:
- 05:13:49 06/03/2025
- MD5 hash:
- c72cb4810d5c70edd9da26884beba751
- Filesize:
- 66.22 KB
- suspicious functions used:
- system (line:375);shell_exec (line:661);
$ARRAY = $API->comm("/system/resource/print");$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkLoad.php-
- Full path:
- akbhanga/web/NetworkLoad.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:22 12/12/2025
- Last modified:
- 05:13:49 06/03/2025
- MD5 hash:
- e1632e66ee1b7394d3fb82751b924abe
- Filesize:
- 2.83 KB
- suspicious functions used:
- system (line:81);
$ARRAY = $API->comm("/system/resource/print"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkLoad1.php-
- Full path:
- akbhanga/web/NetworkLoad1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:22 12/12/2025
- Last modified:
- 05:13:49 06/03/2025
- MD5 hash:
- 176bd6931be34d7ef351d22897accc65
- Filesize:
- 759 B
- suspicious functions used:
- system (line:18);
$ARRAY = $API->comm("/system/resource/print"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkOltAddQuery.php-
- Full path:
- akbhanga/web/NetworkOltAddQuery.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:22 12/12/2025
- Last modified:
- 09:27:55 07/03/2025
- MD5 hash:
- 364ecc96699a76cea445a021ed3b2b33
- Filesize:
- 7.36 KB
- suspicious functions used:
- shell_exec (line:21);
$output = shell_exec($command . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkOltOnuStatus.php-
- Full path:
- akbhanga/web/NetworkOltOnuStatus.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:22 12/12/2025
- Last modified:
- 05:13:50 06/03/2025
- MD5 hash:
- 31f74ac18fe0f3b0bec3b0d00b2556d5
- Filesize:
- 70.53 KB
- suspicious functions used:
- shell_exec (line:42);shell_exec (line:102);
$output = shell_exec($command . " 2>&1");shell_exec (line:673);$output = shell_exec($command . " 2>&1");shell_exec (line:786);$oddutpdut = shell_exec($cmandd . " 2>&1");shell_exec (line:896);$oddutpdut = shell_exec($cmandd . " 2>&1");shell_exec (line:1006);$oddutpdut = shell_exec($cmandd . " 2>&1");$oddutpdut = shell_exec($cmandd . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkOltOnuStatus2.php-
- Full path:
- akbhanga/web/NetworkOltOnuStatus2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:22 12/12/2025
- Last modified:
- 05:13:50 06/03/2025
- MD5 hash:
- c9a14797fa4353d05bbd9427b6079250
- Filesize:
- 15.88 KB
- suspicious functions used:
- shell_exec (line:35);
$output = shell_exec($command . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkOltSense.php-
- Full path:
- akbhanga/web/NetworkOltSense.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:22 12/12/2025
- Last modified:
- 05:13:50 06/03/2025
- MD5 hash:
- 2be664ae5006367f629ca437a6d507f8
- Filesize:
- 18.26 KB
- suspicious functions used:
- `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, `last_synced`, `last_update`, `msg`, `full_msg`, ROUND((SELECT AVG(value) FROM olt_onu_history WHERE alarm_id = '$alarmId' AND value != ''), 2) AS average_value FROM `, ` WHERE `alarm_id` = '$alarmId' AND ` (line:123);
$querddy = mysql_query("SELECT `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, `last_synced`, `last_update`, `msg`, `full_msg`, ROUND((SELECT AVG(value) FROM olt_onu_history WHERE alarm_id = '$alarmId' AND value != ''), 2) AS average_value FROM `olt_onu_history` WHERE `alarm_id` = '$alarmId' AND `value` != ''"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkOltSenseDetails.php-
- Full path:
- akbhanga/web/NetworkOltSenseDetails.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:22 12/12/2025
- Last modified:
- 05:13:50 06/03/2025
- MD5 hash:
- 440096c601fc10b819a1f0f8330928b0
- Filesize:
- 14.17 KB
- suspicious functions used:
- `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:33);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:42);
$sql = mysql_query("SELECT `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND `value` != '' ORDER BY id DESC");`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:51);$sql = mysql_query("SELECT `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND `value` != '' ORDER BY id DESC");`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:60);$sql = mysql_query("SELECT `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND `value` != '' ORDER BY id DESC");$sql = mysql_query("SELECT `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND `value` != '' ORDER BY id DESC"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkOltSync.php-
- Full path:
- akbhanga/web/NetworkOltSync.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:22 12/12/2025
- Last modified:
- 05:13:50 06/03/2025
- MD5 hash:
- 06633d4b65a14d677358170dd0a84424
- Filesize:
- 1.87 KB
- suspicious functions used:
- curl_exec (line:18);
$result1dd = curl_exec($ch111); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: networktree-olt-onu-list-data.php-
- Full path:
- akbhanga/web/networktree-olt-onu-list-data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:23 12/12/2025
- Last modified:
- 05:13:50 06/03/2025
- MD5 hash:
- af4221fefa9c9051846a063ac4135560
- Filesize:
- 8.72 KB
- suspicious functions used:
- shell_exec (line:24);shell_exec (line:36);
$outputs = shell_exec($commanda);shell_exec (line:59);$output = shell_exec($command);shell_exec (line:78);$outputs = shell_exec($commanda);shell_exec (line:97);$output = shell_exec($command);shell_exec (line:116);$outputs = shell_exec($commanda);shell_exec (line:134);$output = shell_exec($command);shell_exec (line:143);$od_vdlan = shell_exec($commanda . " 2>&1");shell_exec (line:155);$od_vdland = shell_exec($coddvland . " 2>&1");shell_exec (line:175);$outputs = shell_exec($coddvladnd . " 2>&1");$output_vdlan = shell_exec($command_vdlan); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkTreeAddSave.php-
- Full path:
- akbhanga/web/NetworkTreeAddSave.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:23 12/12/2025
- Last modified:
- 05:13:50 06/03/2025
- MD5 hash:
- 93fdf1213fdb5d525641e2b625f1a91b
- Filesize:
- 7.61 KB
- suspicious functions used:
- `network_tree` WHERE `olt_id` = '$olt_id' AND ` (line:107);
$resu11 = $con->query("SELECT tree_id AS pon_parent_id FROM `network_tree` WHERE `olt_id` = '$olt_id' AND `device_type` = '1' AND sts = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkTreeEdit1.php-
- Full path:
- akbhanga/web/NetworkTreeEdit1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:23 12/12/2025
- Last modified:
- 05:13:50 06/03/2025
- MD5 hash:
- 3396a6bdf9b5804bb208f38f37cc29a2
- Filesize:
- 35.81 KB
- suspicious functions used:
- `olt_onu` WHERE olt_id = '$olt_id' AND ` (line:207);
<?php $resultoff11d=mysql_query("SELECT id AS alarm_id, alarm_name FROM `olt_onu` WHERE olt_id = '$olt_id' AND `onu_name` LIKE '$pon_name1' ORDER BY id DESC"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkTreeEditSave.php-
- Full path:
- akbhanga/web/NetworkTreeEditSave.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:23 12/12/2025
- Last modified:
- 05:13:50 06/03/2025
- MD5 hash:
- be82a23409ab88be3f57da95f8805d6c
- Filesize:
- 12.83 KB
- suspicious functions used:
- `network_tree` WHERE `olt_id` = '$olt_id' AND ` (line:182);
$resu11 = $con->query("SELECT tree_id AS pon_parent_id FROM `network_tree` WHERE `olt_id` = '$olt_id' AND `device_type` = '1' AND sts = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkTreeList.php-
- Full path:
- akbhanga/web/NetworkTreeList.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:23 12/12/2025
- Last modified:
- 05:13:50 06/03/2025
- MD5 hash:
- acd468021993faf8575531952ae107f8
- Filesize:
- 21.98 KB
- suspicious functions used:
- `pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '{$row['olt_id']}' AND ` (line:287);
$result11=mysql_query("SELECT count(`pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '{$row['olt_id']}' AND `sts` = '0';"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkTreeMap.php-
- Full path:
- akbhanga/web/NetworkTreeMap.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:23 12/12/2025
- Last modified:
- 05:13:50 06/03/2025
- MD5 hash:
- 893f2e3360b70dfbf4b65b4289eb1c58
- Filesize:
- 24.46 KB
- suspicious functions used:
- `${results.rxPower}` (line:268);`${results.distance}` (line:269);
var rxPower = `${results.rxPower}`;`${results.supplyVoltage}` (line:270);var distance = `${results.distance}`;`${results.temperature}` (line:271);var supplyVoltage = `${results.supplyVoltage}`;`${results.txPower}` (line:272);var temperature = `${results.temperature}`;`${results.rxPower}` (line:288);var txPower = `${results.txPower}`;`${results.distance}` (line:289);var rxPower = `${results.rxPower}`;`${results.supplyVoltage}` (line:290);var distance = `${results.distance}`;`${results.temperature}` (line:291);var supplyVoltage = `${results.supplyVoltage}`;`${results.txPower}` (line:292);var temperature = `${results.temperature}`;var txPower = `${results.txPower}`; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkTreeMap1.php-
- Full path:
- akbhanga/web/NetworkTreeMap1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:23 12/12/2025
- Last modified:
- 05:13:50 06/03/2025
- MD5 hash:
- 31a3ae9bc0bdb18726ed860ec6e8ec97
- Filesize:
- 36.43 KB
- suspicious functions used:
- `networktree_marker_data.php?tree_id=${markerId}` (line:231);`${results.rxPower}` (line:311);
fetch(`networktree_marker_data.php?tree_id=${markerId}`)`${results.distance}` (line:312);var rxPower = `${results.rxPower}`;`${results.supplyVoltage}` (line:313);var distance = `${results.distance}`;`${results.temperature}` (line:314);var supplyVoltage = `${results.supplyVoltage}`;`${results.txPower}` (line:315);var temperature = `${results.temperature}`;var txPower = `${results.txPower}`; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: networktree_device_onu_list_add.php-
- Full path:
- akbhanga/web/networktree_device_onu_list_add.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:23 12/12/2025
- Last modified:
- 05:13:50 06/03/2025
- MD5 hash:
- ae5e1bd4b4619e068908177102626079
- Filesize:
- 14.63 KB
- suspicious functions used:
- `network_tree` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND device_type = '5' AND ` (line:9);shell_exec (line:33);
$resu11=mysql_query("SELECT pon_index_id FROM `network_tree` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND device_type = '5' AND `sts` = '0'");`network_tree` WHERE `onu_mac` = '$mac_address' AND ` (line:131);$output = shell_exec($command . " 2>&1");shell_exec (line:178);$reu11=mysql_query("SELECT count(tree_id) AS onucount FROM `network_tree` WHERE `onu_mac` = '$mac_address' AND `sts` = '0'");shell_exec (line:186);$output = shell_exec($command . " 2>&1");shell_exec (line:230);$outputS = shell_exec($commandS . " 2>&1");`network_tree` WHERE `onu_mac` = '$onuMac' AND ` (line:296);$snmpOutput = shell_exec($command);$reu11=mysql_query("SELECT count(tree_id) AS onucount FROM `network_tree` WHERE `onu_mac` = '$onuMac' AND `sts` = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: networktree_device_pon_check.php-
- Full path:
- akbhanga/web/networktree_device_pon_check.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:23 12/12/2025
- Last modified:
- 05:13:50 06/03/2025
- MD5 hash:
- 708a93aadcae96ecf0aaca52041fcf38
- Filesize:
- 1.53 KB
- suspicious functions used:
- `pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '$olt_id' AND ` (line:8);
$result11=mysql_query("SELECT count(`pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '$olt_id' AND `sts` = '0';"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: networktree_device_pon_list_add.php-
- Full path:
- akbhanga/web/networktree_device_pon_list_add.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:23 12/12/2025
- Last modified:
- 05:13:50 06/03/2025
- MD5 hash:
- 2ec03912801e4749c2e9cd361417ca5f
- Filesize:
- 1.36 KB
- suspicious functions used:
- `olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:6);`olt_pon` WHERE `olt_id` = '$olt_id' AND ` (line:10);
$resu11=mysql_query("SELECT olt_name FROM `olt_con` WHERE `olt_id` = '$olt_id' AND `sts` = '0'");`network_tree` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND ` (line:17);$result11=mysql_query("SELECT pon_id, olt_pon_id, pon_name FROM `olt_pon` WHERE `olt_id` = '$olt_id' AND `sts` = '0'");$rehu11=mysql_query("SELECT count(tree_id) AS poncount FROM `network_tree` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND `sts` = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: networktree_device_pon_port_onu_list.php-
- Full path:
- akbhanga/web/networktree_device_pon_port_onu_list.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:23 12/12/2025
- Last modified:
- 05:13:50 06/03/2025
- MD5 hash:
- 9c63b3ac69996628f5eb2959a9eb4e15
- Filesize:
- 8.65 KB
- suspicious functions used:
- `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:25);shell_exec (line:32);
$rff11=mysqli_query($con, "SELECT olt_pon_id AS pon_port FROM `olt_pon` WHERE olt_id = '$olt_id' AND `pon_name` LIKE '$pon_portt'");shell_exec (line:45);$outputs = shell_exec($commanda);`network_tree` WHERE onu_index_id = '$port_onu_index_id' AND ` (line:49);$output = shell_exec($command);shell_exec (line:81);$rff11d=mysqli_query($con, "SELECT onu_name, onu_index, onu_index_id, onu_mac FROM `network_tree` WHERE onu_index_id = '$port_onu_index_id' AND `olt_id` = '$olt_id'");shell_exec (line:103);$outputs = shell_exec($commanda);shell_exec (line:122);$output = shell_exec($command);shell_exec (line:143);$outputs = shell_exec($commanda);shell_exec (line:161);$output = shell_exec($command);shell_exec (line:170);$od_vdlan = shell_exec($commanda . " 2>&1");shell_exec (line:184);$od_vdland = shell_exec($coddvland . " 2>&1");$outputs = shell_exec($coddvladnd . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: networktree_device_pon_port_sense_list.php-
- Full path:
- akbhanga/web/networktree_device_pon_port_sense_list.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:23 12/12/2025
- Last modified:
- 05:13:50 06/03/2025
- MD5 hash:
- ee69cd5cc122f8aa37d8d8e5c74def6b
- Filesize:
- 3.65 KB
- suspicious functions used:
- `network_tree` WHERE `onu_mac` = '$onu_mac' AND ` (line:26);`network_tree` WHERE `c_id` = '{$dfhbdxf}' AND ` (line:71);
$reu1d1=mysqli_query($con, "SELECT tree_id AS router_parant_id FROM `network_tree` WHERE `onu_mac` = '$onu_mac' AND `sts` = '0'");$reu11=mysqli_query($con, "SELECT count(c_id) AS client_count FROM `network_tree` WHERE `c_id` = '{$dfhbdxf}' AND `sts` = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: networktree_device_type.php-
- Full path:
- akbhanga/web/networktree_device_type.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:23 12/12/2025
- Last modified:
- 05:13:50 06/03/2025
- MD5 hash:
- f1520732e5a3ef38564238a3278a1f63
- Filesize:
- 11.43 KB
- suspicious functions used:
- `tree_id`) AS countolt FROM `network_tree` WHERE `olt_id` = '$olt_id_sure' AND ` (line:64);
$resu11=mysql_query("SELECT COUNT(`tree_id`) AS countolt FROM `network_tree` WHERE `olt_id` = '$olt_id_sure' AND `device_type` = '1' AND sts = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: olt_all_onu_mac.php-
- Full path:
- akbhanga/web/olt_all_onu_mac.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:23 12/12/2025
- Last modified:
- 05:13:51 06/03/2025
- MD5 hash:
- bde00602b98fba3ce9f7669b0d6f0fa3
- Filesize:
- 4.56 KB
- suspicious functions used:
- shell_exec (line:22);shell_exec (line:38);
$oddutpdut = shell_exec($cmandd . " 2>&1");shell_exec (line:57);$output_port = shell_exec($commandd_bdcom);$output = shell_exec($command . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentOnlineQuery.php-
- Full path:
- akbhanga/web/PaymentOnlineQuery.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 15:00:20 12/12/2025
- Last modified:
- 05:13:52 06/03/2025
- MD5 hash:
- 6a845f0e20c434c12eb30f42726f268d
- Filesize:
- 28.37 KB
- suspicious functions used:
- curl_exec (line:457);curl_exec (line:669);
$resultdata=curl_exec($url);$content = curl_exec($handle ); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentOnlineQuery2.php-
- Full path:
- akbhanga/web/PaymentOnlineQuery2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:24 12/12/2025
- Last modified:
- 05:13:52 06/03/2025
- MD5 hash:
- ccd315d11a60901b7b9029ff44f8351b
- Filesize:
- 19.4 KB
- suspicious functions used:
- curl_exec (line:42);curl_exec (line:252);
$resultdatax=curl_exec($url);$result = curl_exec($handle); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentWebhook.php-
- Full path:
- akbhanga/web/PaymentWebhook.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:24 12/12/2025
- Last modified:
- 05:13:52 06/03/2025
- MD5 hash:
- a2f322c94787630ab1e0c8ca35fc5ba1
- Filesize:
- 18.6 KB
- suspicious functions used:
- base64_decode (line:30);curl_exec (line:41);
$signatureDecoded = base64_decode($signature);curl_exec (line:422);curl_exec($url);$data = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: SignUp1.php-
- Full path:
- akbhanga/web/SignUp1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:25 12/12/2025
- Last modified:
- 05:13:54 06/03/2025
- MD5 hash:
- 3f7943dd155c8e0a383b7d02730f8c11
- Filesize:
- 24.59 KB
- suspicious functions used:
- curl_exec (line:33);curl_exec (line:59);
$jsona = curl_exec($ch10);$resdfwedf = curl_exec($ch1s); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: sms-balance-check.php-
- Full path:
- akbhanga/web/sms-balance-check.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 11:42:59 12/12/2025
- Last modified:
- 05:13:54 06/03/2025
- MD5 hash:
- c75f0373da76faa763dd32ea8b7ed085
- Filesize:
- 825 B
- suspicious functions used:
- curl_exec (line:15);
$balance = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: SMS.php-
- Full path:
- akbhanga/web/SMS.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:25 12/12/2025
- Last modified:
- 05:13:54 06/03/2025
- MD5 hash:
- 25b5422d1cc92b4d2253417e72d9a658
- Filesize:
- 37.37 KB
- suspicious functions used:
- curl_exec (line:56);
$balance = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: SMS1.php-
- Full path:
- akbhanga/web/SMS1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:25 12/12/2025
- Last modified:
- 05:13:54 06/03/2025
- MD5 hash:
- e4671dadf9ad575671fd3609a60030da
- Filesize:
- 32.19 KB
- suspicious functions used:
- curl_exec (line:59);
$balance = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: SMSAddSave.php-
- Full path:
- akbhanga/web/SMSAddSave.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:25 12/12/2025
- Last modified:
- 05:13:54 06/03/2025
- MD5 hash:
- 0d2d0548df5f32e69264c4f2f1b1f76e
- Filesize:
- 2.12 KB
- suspicious functions used:
- curl_exec (line:35);
$result = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: sms_deliverey_report.php-
- Full path:
- akbhanga/web/sms_deliverey_report.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 03:06:13 12/12/2025
- Last modified:
- 05:13:55 06/03/2025
- MD5 hash:
- 03623943da7e9334e137b38c8577fc84
- Filesize:
- 4.25 KB
- suspicious functions used:
- curl_exec (line:28);curl_exec (line:53);
$result11 = curl_exec($ch1);curl_exec (line:90);$resultdd = curl_exec($ch);$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: support-action.php-
- Full path:
- akbhanga/web/support-action.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:25 12/12/2025
- Last modified:
- 05:13:55 06/03/2025
- MD5 hash:
- 58556808f93f52486b2ad06998142aa9
- Filesize:
- 14.56 KB
- suspicious functions used:
- curl_exec (line:220);
$jsona = curl_exec($ch10); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tagreeexpayment.php-
- Full path:
- akbhanga/web/tagreeexpayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:26 12/12/2025
- Last modified:
- 05:13:55 06/03/2025
- MD5 hash:
- 029b4fba649a75c7c81d2f8931be8d63
- Filesize:
- 2.86 KB
- suspicious functions used:
- curl_exec (line:26);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tcreateagree.php-
- Full path:
- akbhanga/web/tcreateagree.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:26 12/12/2025
- Last modified:
- 05:13:55 06/03/2025
- MD5 hash:
- 27a10adf4190edc7eceee8cf74a6b72b
- Filesize:
- 999 B
- suspicious functions used:
- curl_exec (line:26);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tcreatepayment.php-
- Full path:
- akbhanga/web/tcreatepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:26 12/12/2025
- Last modified:
- 05:13:55 06/03/2025
- MD5 hash:
- e49de9a33f5164bc2c6b88e4770faaff
- Filesize:
- 1.07 KB
- suspicious functions used:
- curl_exec (line:27);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: test2.php-
- Full path:
- akbhanga/web/test2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:26 12/12/2025
- Last modified:
- 05:13:55 06/03/2025
- MD5 hash:
- ab80d92ede21b7da59bfefb325484297
- Filesize:
- 13.76 KB
- suspicious functions used:
- shell_exec (line:59);shell_exec (line:70);
$output = shell_exec($command);shell_exec (line:76);$output1 = shell_exec($command1);shell_exec (line:88);$output2 = shell_exec($command2);shell_exec (line:101);$output_vdlan = shell_exec($command_dvlan . " 2>&1");shell_exec (line:141);$output_vdlan = shell_exec($command_dvlan . " 2>&1");curl_exec (line:187);$output_vdlanf = shell_exec($command_dvlan . " 2>&1");curl_exec (line:212);$result11 = curl_exec($ch3);curl_exec (line:354);$response = curl_exec($ch);$result11 = curl_exec($ch3); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: test6.php-
- Full path:
- akbhanga/web/test6.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:26 12/12/2025
- Last modified:
- 05:13:55 06/03/2025
- MD5 hash:
- f22d022ddc284f4d8e1de3660da91db8
- Filesize:
- 15.61 KB
- suspicious functions used:
- shell_exec (line:34);shell_exec (line:113);
$outputs = shell_exec($snmpCommand);shell_exec (line:126);$outpdduts = shell_exec($sand);shell_exec (line:132);$outputsmac = shell_exec($snmpCommandmac);$output_vlan = shell_exec($command_vlan . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: test7.php-
- Full path:
- akbhanga/web/test7.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:26 12/12/2025
- Last modified:
- 05:13:55 06/03/2025
- MD5 hash:
- b11ccf951ce63a21ea0a7328316a0e5c
- Filesize:
- 1.57 KB
- suspicious functions used:
- curl_exec (line:14);
$result1dd = curl_exec($ch111); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: test8.php-
- Full path:
- akbhanga/web/test8.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:26 12/12/2025
- Last modified:
- 05:13:55 06/03/2025
- MD5 hash:
- 0da20f06359cae632ac4b808ab2eee77
- Filesize:
- 3.65 KB
- suspicious functions used:
- shell_exec (line:48);
$output = shell_exec($snmpCommand); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: testttttt.php-
- Full path:
- akbhanga/web/testttttt.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:26 12/12/2025
- Last modified:
- 05:13:56 06/03/2025
- MD5 hash:
- b1988a4be29e191ad935fb409a4174ee
- Filesize:
- 2 KB
- suspicious functions used:
- curl_exec (line:47);
$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: texecutepayment.php-
- Full path:
- akbhanga/web/texecutepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:26 12/12/2025
- Last modified:
- 05:13:56 06/03/2025
- MD5 hash:
- 623635fdf5c871391d3a5fe99ee8c543
- Filesize:
- 2.91 KB
- suspicious functions used:
- curl_exec (line:24);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tis-news.php-
- Full path:
- akbhanga/web/tis-news.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 05:04:00 12/12/2025
- Last modified:
- 05:13:56 06/03/2025
- MD5 hash:
- ed23ca98b77c5321b4485e85eb2ea64d
- Filesize:
- 3.67 KB
- suspicious functions used:
- curl_exec (line:22);
$alldata1 = curl_exec($chhhh1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: token.php-
- Full path:
- akbhanga/web/token.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 05:24:22 12/12/2025
- Last modified:
- 05:13:56 06/03/2025
- MD5 hash:
- 7d8e71ceda3ffb74623e0c4a814715af
- Filesize:
- 1.53 KB
- suspicious functions used:
- curl_exec (line:42);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tt.php-
- Full path:
- akbhanga/web/tt.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:26 12/12/2025
- Last modified:
- 05:13:56 06/03/2025
- MD5 hash:
- 9c4ed141cb79fdc7e807b35923c91a20
- Filesize:
- 1.56 KB
- suspicious functions used:
- curl_exec (line:30);
$response = curl_exec($curl); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ttoken.php-
- Full path:
- akbhanga/web/ttoken.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:26 12/12/2025
- Last modified:
- 05:13:56 06/03/2025
- MD5 hash:
- 5f2c51c1db5b0defadfb67ce25c0098f
- Filesize:
- 1.54 KB
- suspicious functions used:
- curl_exec (line:42);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: UserAccess.php-
- Full path:
- akbhanga/web/UserAccess.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:26 12/12/2025
- Last modified:
- 05:13:56 06/03/2025
- MD5 hash:
- 69db4d4c504e7d0d4bed32eb8053b12f
- Filesize:
- 10.4 KB
- suspicious functions used:
- `.modulecheckboxx[data-group="${group}"]` (line:158);
document.querySelectorAll(`.modulecheckboxx[data-group="${group}"]`).forEach(box => { - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: webhook.php-
- Full path:
- akbhanga/web/webhook.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:26 12/12/2025
- Last modified:
- 05:13:57 06/03/2025
- MD5 hash:
- 69a88ae1be0ab3ab1c7c971c72c0b025
- Filesize:
- 21.93 KB
- suspicious functions used:
- base64_decode (line:28);curl_exec (line:39);
$signatureDecoded = base64_decode($signature);curl_exec (line:465);curl_exec($url);$data = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: webhook_cid.php-
- Full path:
- akbhanga/web/webhook_cid.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:26 12/12/2025
- Last modified:
- 05:13:57 06/03/2025
- MD5 hash:
- 1a2672fc0dd81a9c831e3fa60ec860e1
- Filesize:
- 21.52 KB
- suspicious functions used:
- base64_decode (line:29);curl_exec (line:40);
$signatureDecoded = base64_decode($signature);curl_exec (line:439);curl_exec($url);$data = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: webhook_test.php-
- Full path:
- akbhanga/web/webhook_test.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:26 12/12/2025
- Last modified:
- 05:13:57 06/03/2025
- MD5 hash:
- 74a7dcc262d7fe7f2bdc9e0595d03837
- Filesize:
- 4.69 KB
- suspicious functions used:
- base64_decode (line:22);curl_exec (line:33);
$signatureDecoded = base64_decode($signature);curl_exec (line:86);curl_exec($url);curl_exec (line:107);$result = curl_exec($ch);$data = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: class.phpmailer.php-
- Full path:
- akbhanga/web/email/class.phpmailer.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:27 12/12/2025
- Last modified:
- 05:13:59 06/03/2025
- MD5 hash:
- 68468d69b47fffecc89df57e27c5a781
- Filesize:
- 143.32 KB
- suspicious functions used:
- `$DKIM_private` (line:428);popen (line:1387);
* If set, takes precedence over `$DKIM_private`.popen (line:1408);if (!@$mail = popen($sendmail, 'w')) {base64_decode (line:3410);if (!@$mail = popen($sendmail, 'w')) {`$mail->set('SMTPSecure', 'tls');` (line:3688);$data = base64_decode($data);`$mail->SMTPSecure = 'tls';` (line:3690);* `$mail->set('SMTPSecure', 'tls');`* `$mail->SMTPSecure = 'tls';` - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: class.smtp.php-
- Full path:
- akbhanga/web/email/class.smtp.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:27 12/12/2025
- Last modified:
- 05:13:59 06/03/2025
- MD5 hash:
- aa8478329268e5438a4469c268337a10
- Filesize:
- 41.44 KB
- suspicious functions used:
- base64_decode (line:513);base64_decode (line:533);
$challenge = base64_decode($challenge);$challenge = base64_decode(substr($this->last_reply, 4)); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: jqgrid.php-
- Full path:
- akbhanga/web/inc/jqgrid.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:28 12/12/2025
- Last modified:
- 05:15:29 06/03/2025
- MD5 hash:
- 71027a29e71e0626d8b57cbb631e6d98
- Filesize:
- 23.92 KB
- suspicious functions used:
- eval (line:397);
if (!empty($V4a8a08f0["condition"])) eval("\$V4b43b0ae = ".$V4a8a08f0["condition"].";"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: JSON.php-
- Full path:
- akbhanga/web/inc/JSON.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:28 12/12/2025
- Last modified:
- 05:15:29 06/03/2025
- MD5 hash:
- f5a34509e06231308becbe320ade9ff6
- Filesize:
- 33.22 KB
- suspicious functions used:
- eval (line:22);
* Javascript, and can be directly eval()'ed with no further parsing - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: smsapicore.php-
- Full path:
- akbhanga/web/include/smsapicore.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 17:00:03 12/12/2025
- Last modified:
- 05:15:29 06/03/2025
- MD5 hash:
- 0494713963b7e9ead12abe06de2811a5
- Filesize:
- 1.26 KB
- suspicious functions used:
- curl_exec (line:37);
$resultdgfb = curl_exec($chg); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: telegramapicore.php-
- Full path:
- akbhanga/web/include/telegramapicore.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 03:29:20 12/12/2025
- Last modified:
- 05:15:30 06/03/2025
- MD5 hash:
- 511f56e6dfcf4e9e7a11259e023ca3ae
- Filesize:
- 3.15 KB
- suspicious functions used:
- curl_exec (line:68);
$result11 = curl_exec($ch3); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ui.php-
- Full path:
- akbhanga/web/js/tinymce/themes/advanced/skins/highcontrast/ui.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:28 12/12/2025
- Last modified:
- 05:15:49 06/03/2025
- MD5 hash:
- 3edaf67be8573b86686f46bbba4f058c
- Filesize:
- 4.53 KB
- suspicious functions used:
- curl_exec (line:20);`bill_amount` = '0.00' WHERE bill_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY ` (line:53);
$alldataa = curl_exec($chxchhh);`bill_amount` = '0.00', days = '0.00' WHERE entry_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY ` (line:54);$queryss = mysql_query("UPDATE billing SET `bill_amount` = '0.00' WHERE bill_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY `id` DESC LIMIT 5");`payment` WHERE `pay_date` < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND pay_amount != '0.00' ORDER BY ` (line:55);$sqlqmss = mysql_query("UPDATE billing_mac SET `bill_amount` = '0.00', days = '0.00' WHERE entry_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY `id` DESC LIMIT 5");curl_exec (line:146);$sqlqmsp = mysql_query("DELETE FROM `payment` WHERE `pay_date` < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND pay_amount != '0.00' ORDER BY `id` ASC LIMIT 5");curl_exec (line:168);$responsed = curl_exec($curld);$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Changes.txt-
- Full path:
- akbhanga/web/js/jqgrid/js/Changes.txt
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:28 12/12/2025
- Last modified:
- 05:15:41 06/03/2025
- MD5 hash:
- c0a4adbc3f1c6d592cb4fa8433fee9ea
- Filesize:
- 44.32 KB
- suspicious functions used:
- system (line:87);
* Add a ant based build system which allow us to minify the JS code - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: createpayment.php-
- Full path:
- akbhanga/m/createpayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 20:23:45 11/12/2025
- Last modified:
- 05:13:31 06/03/2025
- MD5 hash:
- 849185f307be30eafb1bbef93616d8c3
- Filesize:
- 1.71 KB
- suspicious functions used:
- curl_exec (line:57);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: executepayment.php-
- Full path:
- akbhanga/m/executepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 20:24:30 11/12/2025
- Last modified:
- 05:13:31 06/03/2025
- MD5 hash:
- 9a3f22521ad987e86f84c4f5f688d5b7
- Filesize:
- 713 B
- suspicious functions used:
- curl_exec (line:18);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: index.php-
- Full path:
- akbhanga/m/index.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 16:01:55 12/12/2025
- Last modified:
- 05:13:31 06/03/2025
- MD5 hash:
- 55a13ede9e1d70f42857e9a7baa75741
- Filesize:
- 16.95 KB
- suspicious functions used:
- curl_exec (line:298);
$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: index1.php-
- Full path:
- akbhanga/m/index1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:29 12/12/2025
- Last modified:
- 05:13:32 06/03/2025
- MD5 hash:
- dbd325386cd905b7a18b217dda2030f3
- Filesize:
- 13.92 KB
- suspicious functions used:
- base64_decode (line:8);curl_exec (line:224);
list($encrypted_data, $iv, $key) = explode('::', base64_decode($ciphertext));$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: index2.php-
- Full path:
- akbhanga/m/index2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:29 12/12/2025
- Last modified:
- 05:13:32 06/03/2025
- MD5 hash:
- 41558736b037228ea93df03cae70eb87
- Filesize:
- 4.31 KB
- suspicious functions used:
- curl_exec (line:70);
$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: LoginByPass.php-
- Full path:
- akbhanga/m/LoginByPass.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:29 12/12/2025
- Last modified:
- 05:13:32 06/03/2025
- MD5 hash:
- 4deda2bef49c7e4552e5379c86858ddf
- Filesize:
- 4.27 KB
- suspicious functions used:
- curl_exec (line:41);
$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: login_exec.php-
- Full path:
- akbhanga/m/login_exec.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 09:23:25 12/12/2025
- Last modified:
- 14:50:37 12/03/2025
- MD5 hash:
- 7eff267b8f329713c83c3cddd380b782
- Filesize:
- 12.1 KB
- suspicious functions used:
- curl_exec (line:24);curl_exec (line:74);
$jsona = curl_exec($ch10);curl_exec (line:199);$result110 = curl_exec($ch11);curl_exec (line:239);$jsona = curl_exec($ch10);$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: login_exec1.php-
- Full path:
- akbhanga/m/login_exec1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:29 12/12/2025
- Last modified:
- 05:13:32 06/03/2025
- MD5 hash:
- b7a23f98b3d03b1ecc08218cf01b4aee
- Filesize:
- 6.36 KB
- suspicious functions used:
- curl_exec (line:115);
$result110 = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: login_exec2.php-
- Full path:
- akbhanga/m/login_exec2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:29 12/12/2025
- Last modified:
- 05:13:32 06/03/2025
- MD5 hash:
- 46b08782f51ba75b23e27183e06370fe
- Filesize:
- 4.28 KB
- suspicious functions used:
- curl_exec (line:61);
$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: nagad-merchant-callback.php-
- Full path:
- akbhanga/m/nagad-merchant-callback.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:29 12/12/2025
- Last modified:
- 05:13:32 06/03/2025
- MD5 hash:
- 89c5042f878e9b301a177823cf822c7e
- Filesize:
- 11.32 KB
- suspicious functions used:
- curl_exec (line:20);
$file_contents = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: netowrk-snmp-data.php-
- Full path:
- akbhanga/m/netowrk-snmp-data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:29 12/12/2025
- Last modified:
- 05:13:32 06/03/2025
- MD5 hash:
- 75622375b3ee37723d953e8a83735ef7
- Filesize:
- 23.92 KB
- suspicious functions used:
- shell_exec (line:96);shell_exec (line:105);
$output = shell_exec($command . " 2>&1");shell_exec (line:115);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:134);$output_port = shell_exec($commandd . " 2>&1");shell_exec (line:146);$output = shell_exec($command . " 2>&1");shell_exec (line:157);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:173);$output_port = shell_exec($commandd);shell_exec (line:183);$output_oid_bdcom = shell_exec($command_oid_bdcom . " 2>&1");shell_exec (line:199);$outputs = shell_exec($commanda);shell_exec (line:219);$output_port = shell_exec($commandd_bdcom);shell_exec (line:229);$output_oid_cdata = shell_exec($command_oid_cdata . " 2>&1");shell_exec (line:234);$outputs = shell_exec($commanda);shell_exec (line:242);$outs = shell_exec($canda);shell_exec (line:262);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:278);$outpdut_port = shell_exec($commandd_cdata);`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:291);$output_oid_gcom = shell_exec($command_oid_gcom . " 2>&1");shell_exec (line:297);$querydd = mysqli_query($con, "SELECT `olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND `olt_id` = '$olt_id' AND sts = '0'");shell_exec (line:430);$output_vlan = shell_exec($command_vlan . " 2>&1");$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentOnlineQuery.php-
- Full path:
- akbhanga/m/PaymentOnlineQuery.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 20:24:31 11/12/2025
- Last modified:
- 05:13:32 06/03/2025
- MD5 hash:
- 6483645d440dd2f976cc1b29cb4021d5
- Filesize:
- 20.95 KB
- suspicious functions used:
- curl_exec (line:287);curl_exec (line:492);
$resultdata=curl_exec($url);$content = curl_exec($handle ); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentOnlineQuery2.php-
- Full path:
- akbhanga/m/PaymentOnlineQuery2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:29 12/12/2025
- Last modified:
- 05:13:32 06/03/2025
- MD5 hash:
- 3660992067d5591fc79ce89d6dbb9274
- Filesize:
- 19.08 KB
- suspicious functions used:
- curl_exec (line:41);curl_exec (line:254);
$resultdatax=curl_exec($url);$result = curl_exec($handle); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: support-action.php-
- Full path:
- akbhanga/m/support-action.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:30 12/12/2025
- Last modified:
- 05:13:32 06/03/2025
- MD5 hash:
- 2fc6fd844db911a5502a7a6ae383990f
- Filesize:
- 10.31 KB
- suspicious functions used:
- curl_exec (line:99);
$jsona = curl_exec($ch10); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tagreeexpayment.php-
- Full path:
- akbhanga/m/tagreeexpayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:30 12/12/2025
- Last modified:
- 05:13:32 06/03/2025
- MD5 hash:
- c95e3ee881752db67b4f3597bc58430a
- Filesize:
- 2.46 KB
- suspicious functions used:
- curl_exec (line:26);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tcreateagree.php-
- Full path:
- akbhanga/m/tcreateagree.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:30 12/12/2025
- Last modified:
- 05:13:32 06/03/2025
- MD5 hash:
- 27a10adf4190edc7eceee8cf74a6b72b
- Filesize:
- 999 B
- suspicious functions used:
- curl_exec (line:26);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tcreatepayment.php-
- Full path:
- akbhanga/m/tcreatepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:30 12/12/2025
- Last modified:
- 05:13:32 06/03/2025
- MD5 hash:
- e49de9a33f5164bc2c6b88e4770faaff
- Filesize:
- 1.07 KB
- suspicious functions used:
- curl_exec (line:27);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: texecutepayment.php-
- Full path:
- akbhanga/m/texecutepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:30 12/12/2025
- Last modified:
- 05:13:32 06/03/2025
- MD5 hash:
- efbb63dfcfdacb52dec74bffc389bbb3
- Filesize:
- 2.67 KB
- suspicious functions used:
- curl_exec (line:24);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: token.php-
- Full path:
- akbhanga/m/token.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 20:23:44 11/12/2025
- Last modified:
- 05:13:32 06/03/2025
- MD5 hash:
- 7d8e71ceda3ffb74623e0c4a814715af
- Filesize:
- 1.53 KB
- suspicious functions used:
- curl_exec (line:42);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ttoken.php-
- Full path:
- akbhanga/m/ttoken.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:30 12/12/2025
- Last modified:
- 05:13:33 06/03/2025
- MD5 hash:
- 5f2c51c1db5b0defadfb67ce25c0098f
- Filesize:
- 1.54 KB
- suspicious functions used:
- curl_exec (line:42);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: createpayment.php-
- Full path:
- arc/m/createpayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:31 12/12/2025
- Last modified:
- 17:45:50 03/06/2025
- MD5 hash:
- 849185f307be30eafb1bbef93616d8c3
- Filesize:
- 1.71 KB
- suspicious functions used:
- curl_exec (line:57);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: executepayment.php-
- Full path:
- arc/m/executepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:31 12/12/2025
- Last modified:
- 17:45:50 03/06/2025
- MD5 hash:
- 9a3f22521ad987e86f84c4f5f688d5b7
- Filesize:
- 713 B
- suspicious functions used:
- curl_exec (line:18);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: index.php-
- Full path:
- arc/m/index.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 14:36:16 12/12/2025
- Last modified:
- 17:45:50 03/06/2025
- MD5 hash:
- 5a9206eb2ef2835083705f01e81f5b41
- Filesize:
- 16.41 KB
- suspicious functions used:
- curl_exec (line:282);
$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: LoginByPass.php-
- Full path:
- arc/m/LoginByPass.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:31 12/12/2025
- Last modified:
- 17:45:50 03/06/2025
- MD5 hash:
- ce55a8f81ccab7d07744fd3914d6ee35
- Filesize:
- 4.65 KB
- suspicious functions used:
- curl_exec (line:44);curl_exec (line:69);
$jsona = curl_exec($ch10);$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: login_exec.php-
- Full path:
- arc/m/login_exec.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 14:36:16 12/12/2025
- Last modified:
- 17:45:50 03/06/2025
- MD5 hash:
- c8b31379830b912ec08a7917166a4aeb
- Filesize:
- 12.26 KB
- suspicious functions used:
- curl_exec (line:25);curl_exec (line:81);
$jsona = curl_exec($ch10);curl_exec (line:200);$result110 = curl_exec($ch11);curl_exec (line:238);$jsona = curl_exec($ch10);$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: nagad-merchant-callback.php-
- Full path:
- arc/m/nagad-merchant-callback.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:31 12/12/2025
- Last modified:
- 17:45:51 03/06/2025
- MD5 hash:
- 3fcf93d3aec6449a76e27b14f01ada02
- Filesize:
- 11.32 KB
- suspicious functions used:
- curl_exec (line:20);
$file_contents = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: netowrk-snmp-data.php-
- Full path:
- arc/m/netowrk-snmp-data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:31 12/12/2025
- Last modified:
- 17:45:51 03/06/2025
- MD5 hash:
- a0f9ff194951c18f7390ef750529f434
- Filesize:
- 24.14 KB
- suspicious functions used:
- shell_exec (line:96);shell_exec (line:105);
$output = shell_exec($command . " 2>&1");shell_exec (line:115);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:134);$output_port = shell_exec($commandd . " 2>&1");shell_exec (line:146);$output = shell_exec($command . " 2>&1");shell_exec (line:157);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:173);$output_port = shell_exec($commandd);shell_exec (line:183);$output_oid_bdcom = shell_exec($command_oid_bdcom . " 2>&1");shell_exec (line:199);$outputs = shell_exec($commanda);shell_exec (line:219);$output_port = shell_exec($commandd_bdcom);shell_exec (line:229);$output_oid_cdata = shell_exec($command_oid_cdata . " 2>&1");shell_exec (line:234);$outputs = shell_exec($commanda);shell_exec (line:242);$outs = shell_exec($canda);shell_exec (line:262);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:278);$outpdut_port = shell_exec($commandd_cdata);`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:291);$output_oid_gcom = shell_exec($command_oid_gcom . " 2>&1");shell_exec (line:297);$querydd = mysqli_query($con, "SELECT `olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND `olt_id` = '$olt_id' AND sts = '0'");shell_exec (line:430);$output_vlan = shell_exec($command_vlan . " 2>&1");$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentOnlineQuery.php-
- Full path:
- arc/m/PaymentOnlineQuery.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:31 12/12/2025
- Last modified:
- 17:45:53 03/06/2025
- MD5 hash:
- 6483645d440dd2f976cc1b29cb4021d5
- Filesize:
- 20.95 KB
- suspicious functions used:
- curl_exec (line:287);curl_exec (line:492);
$resultdata=curl_exec($url);$content = curl_exec($handle ); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentOnlineQuery2.php-
- Full path:
- arc/m/PaymentOnlineQuery2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:31 12/12/2025
- Last modified:
- 17:45:53 03/06/2025
- MD5 hash:
- 3660992067d5591fc79ce89d6dbb9274
- Filesize:
- 19.08 KB
- suspicious functions used:
- curl_exec (line:41);curl_exec (line:254);
$resultdatax=curl_exec($url);$result = curl_exec($handle); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: support-action.php-
- Full path:
- arc/m/support-action.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:32 12/12/2025
- Last modified:
- 17:45:54 03/06/2025
- MD5 hash:
- adb69d6d3e277ad4c464c4fd0c41b4ca
- Filesize:
- 10.29 KB
- suspicious functions used:
- curl_exec (line:99);
$jsona = curl_exec($ch10); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tagreeexpayment.php-
- Full path:
- arc/m/tagreeexpayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:32 12/12/2025
- Last modified:
- 17:45:55 03/06/2025
- MD5 hash:
- c95e3ee881752db67b4f3597bc58430a
- Filesize:
- 2.46 KB
- suspicious functions used:
- curl_exec (line:26);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tcreateagree.php-
- Full path:
- arc/m/tcreateagree.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:32 12/12/2025
- Last modified:
- 17:45:55 03/06/2025
- MD5 hash:
- 27a10adf4190edc7eceee8cf74a6b72b
- Filesize:
- 999 B
- suspicious functions used:
- curl_exec (line:26);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tcreatepayment.php-
- Full path:
- arc/m/tcreatepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:32 12/12/2025
- Last modified:
- 17:45:55 03/06/2025
- MD5 hash:
- e49de9a33f5164bc2c6b88e4770faaff
- Filesize:
- 1.07 KB
- suspicious functions used:
- curl_exec (line:27);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: texecutepayment.php-
- Full path:
- arc/m/texecutepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:32 12/12/2025
- Last modified:
- 17:45:55 03/06/2025
- MD5 hash:
- efbb63dfcfdacb52dec74bffc389bbb3
- Filesize:
- 2.67 KB
- suspicious functions used:
- curl_exec (line:24);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: token.php-
- Full path:
- arc/m/token.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:32 12/12/2025
- Last modified:
- 17:45:55 03/06/2025
- MD5 hash:
- 7d8e71ceda3ffb74623e0c4a814715af
- Filesize:
- 1.53 KB
- suspicious functions used:
- curl_exec (line:42);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ttoken.php-
- Full path:
- arc/m/ttoken.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:32 12/12/2025
- Last modified:
- 17:45:55 03/06/2025
- MD5 hash:
- 5f2c51c1db5b0defadfb67ce25c0098f
- Filesize:
- 1.54 KB
- suspicious functions used:
- curl_exec (line:42);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: AppSettings.php-
- Full path:
- arc/web/AppSettings.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:32 12/12/2025
- Last modified:
- 17:46:08 03/06/2025
- MD5 hash:
- 512b3e52141311ec6f69c2d46859b4ec
- Filesize:
- 124.27 KB
- suspicious functions used:
- `input[name="${inputName}"]:checked` (line:2076);
var value = document.querySelector(`input[name="${inputName}"]:checked`).value; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: AutoActiveClientsCount1.php-
- Full path:
- arc/web/AutoActiveClientsCount1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 17:04:54 12/12/2025
- Last modified:
- 17:46:09 03/06/2025
- MD5 hash:
- 96ae95689b28aef52bd4eaab4bfea7cc
- Filesize:
- 5.38 KB
- suspicious functions used:
- system (line:54);
$ARRAY = $API->comm("/system/resource/print"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: AutoActiveClientsCount11.php-
- Full path:
- arc/web/AutoActiveClientsCount11.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:33 12/12/2025
- Last modified:
- 17:46:09 03/06/2025
- MD5 hash:
- a0090e4a11dd59b955a6edd549b6ef2f
- Filesize:
- 5.85 KB
- suspicious functions used:
- system (line:54);
$ARRAY = $API->comm("/system/resource/print"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: client-online-mbb.php-
- Full path:
- arc/web/client-online-mbb.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:33 12/12/2025
- Last modified:
- 17:46:13 03/06/2025
- MD5 hash:
- a1cef934dce8da065b0116b7915754af
- Filesize:
- 16.36 KB
- suspicious functions used:
- curl_exec (line:88);curl_exec (line:288);
$resp = curl_exec($curlss);$resp = curl_exec($curlss); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: clients-nots-action.php-
- Full path:
- arc/web/clients-nots-action.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:34 12/12/2025
- Last modified:
- 17:46:18 03/06/2025
- MD5 hash:
- dff1bb495509427d098cb4588da553b9
- Filesize:
- 5.89 KB
- suspicious functions used:
- curl_exec (line:35);
$jsona = curl_exec($ch10); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Clients.php-
- Full path:
- arc/web/Clients.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 12:37:39 12/12/2025
- Last modified:
- 17:46:20 03/06/2025
- MD5 hash:
- 813f3342191ae66a98437696e5a413cf
- Filesize:
- 197.66 KB
- suspicious functions used:
- `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:761);
$result1rd=mysql_query("SELECT `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND `sts` = '0' order by b_name ASC"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Clients1.php-
- Full path:
- arc/web/Clients1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:34 12/12/2025
- Last modified:
- 17:46:21 03/06/2025
- MD5 hash:
- ccec9015b85db7f5fd719dce1ddfd76d
- Filesize:
- 197.59 KB
- suspicious functions used:
- `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:759);
$result1rd=mysql_query("SELECT `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND `sts` = '0' order by b_name ASC"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Clients2.php-
- Full path:
- arc/web/Clients2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:34 12/12/2025
- Last modified:
- 17:46:22 03/06/2025
- MD5 hash:
- 982d6411552113b0715fd17c26f50292
- Filesize:
- 205.13 KB
- suspicious functions used:
- `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:832);
$result1rd=mysql_query("SELECT `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND `sts` = '0' order by b_name ASC"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Clients3.php-
- Full path:
- arc/web/Clients3.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:35 12/12/2025
- Last modified:
- 17:46:24 03/06/2025
- MD5 hash:
- 50ddc869b383ab76e009c7a2c17c99a3
- Filesize:
- 175.31 KB
- suspicious functions used:
- `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:832);
$result1rd=mysql_query("SELECT `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND `sts` = '0' order by b_name ASC"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ClientsOnMap.php-
- Full path:
- arc/web/ClientsOnMap.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:35 12/12/2025
- Last modified:
- 06:02:56 10/11/2025
- MD5 hash:
- e853e4393e2183f104b30d6284d8a51c
- Filesize:
- 19.47 KB
- suspicious functions used:
- `${totalonline}` (line:173);`${totaloffline}` (line:174);
document.getElementById('totalonline').textContent = `${totalonline}`;`${results.rxPower}` (line:307);document.getElementById('totaloffline').textContent = `${totaloffline}`;`${results.distance}` (line:308);var rxPower = `${results.rxPower}`;`${results.supplyVoltage}` (line:309);var distance = `${results.distance}`;`${results.temperature}` (line:310);var supplyVoltage = `${results.supplyVoltage}`;`${results.txPower}` (line:311);var temperature = `${results.temperature}`;var txPower = `${results.txPower}`; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ClientsOnMap1.php-
- Full path:
- arc/web/ClientsOnMap1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:35 12/12/2025
- Last modified:
- 17:46:30 03/06/2025
- MD5 hash:
- ba0202f8bef3c634e895471057086953
- Filesize:
- 13.14 KB
- suspicious functions used:
- `${totalonline}` (line:109);`${totaloffline}` (line:110);
document.getElementById('totalonline').textContent = `${totalonline}`;`${results.rxPower}` (line:243);document.getElementById('totaloffline').textContent = `${totaloffline}`;`${results.distance}` (line:244);var rxPower = `${results.rxPower}`;`${results.supplyVoltage}` (line:245);var distance = `${results.distance}`;`${results.temperature}` (line:246);var supplyVoltage = `${results.supplyVoltage}`;`${results.txPower}` (line:247);var temperature = `${results.temperature}`;var txPower = `${results.txPower}`; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ClientView.php-
- Full path:
- arc/web/ClientView.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 11:40:25 12/12/2025
- Last modified:
- 03:18:04 07/06/2025
- MD5 hash:
- 756221c89eb1163a8735f450f7a9d263
- Filesize:
- 112.89 KB
- suspicious functions used:
- `olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:227);
$querydd = mysql_query("SELECT `olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND `olt_id` = '$c_olt_id' AND sts = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: company_info.php-
- Full path:
- arc/web/company_info.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 00:50:04 12/12/2025
- Last modified:
- 17:46:33 03/06/2025
- MD5 hash:
- 406848ab0f21b6c2121abb5f5dcd2730
- Filesize:
- 8.31 KB
- suspicious functions used:
- curl_exec (line:131);
$alldata = curl_exec($chhhh); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: createpayment.php-
- Full path:
- arc/web/createpayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:36 12/12/2025
- Last modified:
- 17:46:33 03/06/2025
- MD5 hash:
- ba9747d0421fd091b998389469e72a0b
- Filesize:
- 1.7 KB
- suspicious functions used:
- curl_exec (line:57);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_all.php-
- Full path:
- arc/web/cron_all.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:36 12/12/2025
- Last modified:
- 17:46:33 03/06/2025
- MD5 hash:
- 967f1d654ae891609da26b9e0fdbd1ae
- Filesize:
- 2.44 KB
- suspicious functions used:
- curl_exec (line:23);curl_exec (line:38);
$result1 = curl_exec($ch1);curl_exec (line:53);$result1d = curl_exec($ch11);$result1d2 = curl_exec($ch112); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_gen_bill.php-
- Full path:
- arc/web/cron_auto_gen_bill.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:36 12/12/2025
- Last modified:
- 17:46:33 03/06/2025
- MD5 hash:
- f1056618cc4402968e50d1232d2c51c8
- Filesize:
- 4.73 KB
- suspicious functions used:
- curl_exec (line:140);curl_exec (line:149);
$respd = curl_exec($curl);$resp = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_inactive.php-
- Full path:
- arc/web/cron_auto_inactive.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 03:55:08 12/12/2025
- Last modified:
- 17:46:33 03/06/2025
- MD5 hash:
- 7e0dc4dd9dae2bf0220516641b53c027
- Filesize:
- 5.43 KB
- suspicious functions used:
- curl_exec (line:142);
$respw = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_inactive2.php-
- Full path:
- arc/web/cron_auto_inactive2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:36 12/12/2025
- Last modified:
- 17:46:33 03/06/2025
- MD5 hash:
- 440bc24f05b01eb395df63fff2f60de9
- Filesize:
- 5.46 KB
- suspicious functions used:
- curl_exec (line:142);
$respw = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_inactive_termination.php-
- Full path:
- arc/web/cron_auto_inactive_termination.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 01:10:04 12/12/2025
- Last modified:
- 17:46:33 03/06/2025
- MD5 hash:
- c858e742c90ee398f98f5bca2ed8e7e1
- Filesize:
- 13.03 KB
- suspicious functions used:
- curl_exec (line:232);curl_exec (line:244);
$resp = curl_exec($curlss);curl_exec (line:286);$respw = curl_exec($curls);$resp = curl_exec($curlss); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_termination_remainder1.php-
- Full path:
- arc/web/cron_auto_termination_remainder1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 03:05:08 12/12/2025
- Last modified:
- 17:46:33 03/06/2025
- MD5 hash:
- 7765f9f820dbd402f1064fab9958ffaa
- Filesize:
- 3.26 KB
- suspicious functions used:
- curl_exec (line:83);
$respw = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_client_bandwidth_count.php-
- Full path:
- arc/web/cron_client_bandwidth_count.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 02:23:08 12/12/2025
- Last modified:
- 17:46:33 03/06/2025
- MD5 hash:
- a1b43b5493187af5b23c7217aeec0cef
- Filesize:
- 6.45 KB
- suspicious functions used:
- curl_exec (line:159);
$result = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_network.php-
- Full path:
- arc/web/cron_network.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 13:40:19 12/12/2025
- Last modified:
- 17:46:33 03/06/2025
- MD5 hash:
- 36fe709ddc5062ba1fecfe1417fdff91
- Filesize:
- 4 KB
- suspicious functions used:
- curl_exec (line:42);curl_exec (line:64);
$result1d = curl_exec($ch11);$result1dd = curl_exec($ch111); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_olt.php-
- Full path:
- arc/web/cron_olt.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 12:15:16 12/12/2025
- Last modified:
- 17:46:33 03/06/2025
- MD5 hash:
- f0248614baaea216d0f29e0ca584410b
- Filesize:
- 4.46 KB
- suspicious functions used:
- shell_exec (line:51);curl_exec (line:106);
$output = shell_exec($command);$result1d = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_olt_clients_catch.php-
- Full path:
- arc/web/cron_olt_clients_catch.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 04:21:18 12/12/2025
- Last modified:
- 17:46:33 03/06/2025
- MD5 hash:
- f3775b14a4f3709bd1e20ac451a3bea1
- Filesize:
- 2.05 KB
- suspicious functions used:
- curl_exec (line:55);
$result1d = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_olt_user.php-
- Full path:
- arc/web/cron_olt_user.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:36 12/12/2025
- Last modified:
- 17:46:33 03/06/2025
- MD5 hash:
- 67aa237639e3d1e6064e76079bb3cccc
- Filesize:
- 1.97 KB
- suspicious functions used:
- curl_exec (line:19);curl_exec (line:46);
$resultd1d = curl_exec($ch110);$result1d = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: EmployeeAdd.php-
- Full path:
- arc/web/EmployeeAdd.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:36 12/12/2025
- Last modified:
- 17:46:34 03/06/2025
- MD5 hash:
- c12c85fa282eb15060ed68bad252f8e8
- Filesize:
- 19.13 KB
- suspicious functions used:
- `Element with ID ${id} not found.` (line:36);`Non-numeric input detected in ${id}.` (line:38);
if (!element) throw `Element with ID ${id} not found.`;`Element with ID ${id} not found.` (line:44);if (isNaN(value)) throw `Non-numeric input detected in ${id}.`;`Non-numeric input detected in ${id}.` (line:46);if (!element) throw `Element with ID ${id} not found.`;if (isNaN(value)) throw `Non-numeric input detected in ${id}.`; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: EmployeeEdit.php-
- Full path:
- arc/web/EmployeeEdit.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:36 12/12/2025
- Last modified:
- 17:46:34 03/06/2025
- MD5 hash:
- 55b4626339d566473f477e1a001dc8b4
- Filesize:
- 17.73 KB
- suspicious functions used:
- `Element with ID ${id} not found.` (line:44);`Non-numeric input detected in ${id}.` (line:46);
if (!element) throw `Element with ID ${id} not found.`;`Element with ID ${id} not found.` (line:52);if (isNaN(value)) throw `Non-numeric input detected in ${id}.`;`Non-numeric input detected in ${id}.` (line:54);if (!element) throw `Element with ID ${id} not found.`;if (isNaN(value)) throw `Non-numeric input detected in ${id}.`; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: emp_salary_advence_find.php-
- Full path:
- arc/web/emp_salary_advence_find.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:36 12/12/2025
- Last modified:
- 17:46:34 03/06/2025
- MD5 hash:
- 74a7e2ffda0f7584611d7cbce6136c24
- Filesize:
- 2.25 KB
- suspicious functions used:
- `expanse` WHERE `type` = '2' AND `status` = '2' AND ex_by = '$e_id' AND MONTH(`, `) = MONTH('$lastmonth') AND YEAR(`, `) = YEAR('$lastmonth') GROUP BY ` (line:8);`e_id` = '$e_id' AND ` (line:12);
$vendorrr = mysql_query("SELECT SUM(amount) AS salary_advance FROM `expanse` WHERE `type` = '2' AND `status` = '2' AND ex_by = '$e_id' AND MONTH(`check_date`) = MONTH('$lastmonth') AND YEAR(`check_date`) = YEAR('$lastmonth') GROUP BY `ex_by`");$empppp = mysql_query("SELECT gross_total AS gross_total FROM emp_info WHERE `e_id` = '$e_id' AND `status` = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: executepayment.php-
- Full path:
- arc/web/executepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:36 12/12/2025
- Last modified:
- 17:46:34 03/06/2025
- MD5 hash:
- c46a50905333286f45dfeacf010851ab
- Filesize:
- 716 B
- suspicious functions used:
- curl_exec (line:18);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: getclientuptime.php-
- Full path:
- arc/web/getclientuptime.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:36 12/12/2025
- Last modified:
- 17:46:37 03/06/2025
- MD5 hash:
- bbc14cdd451c72b94d78c7d2d1af0b52
- Filesize:
- 718 B
- suspicious functions used:
- curl_exec (line:18);
$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: imagevwr.php-
- Full path:
- arc/web/imagevwr.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 11:40:26 12/12/2025
- Last modified:
- 17:46:37 03/06/2025
- MD5 hash:
- 47a223a13cc642d01dcfaaca542d396d
- Filesize:
- 915 B
- suspicious functions used:
- curl_exec (line:15);
$image_data = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: index.php-
- Full path:
- arc/web/index.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 17:04:41 12/12/2025
- Last modified:
- 17:46:37 03/06/2025
- MD5 hash:
- 2e1798df24b219a66401b4936b812f43
- Filesize:
- 16.11 KB
- suspicious functions used:
- curl_exec (line:282);
$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: InstrumentsStoreOutDetails.php-
- Full path:
- arc/web/InstrumentsStoreOutDetails.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:37 12/12/2025
- Last modified:
- 17:46:38 03/06/2025
- MD5 hash:
- a60c19f766bfff1ccdccbeba6b39eb87
- Filesize:
- 9.37 KB
- suspicious functions used:
- `update_date`, '%D-%b, %y') AS offdate, TIME_FORMAT(`update_time`, '%T') AS offtime FROM `con_sts_log` WHERE `c_id` = '{$row['c_id']}' AND con_sts = 'Inactive' ORDER BY ` (line:120);
$resultwwdd=mysql_query("SELECT DATE_FORMAT(`update_date`, '%D-%b, %y') AS offdate, TIME_FORMAT(`update_time`, '%T') AS offtime FROM `con_sts_log` WHERE `c_id` = '{$row['c_id']}' AND con_sts = 'Inactive' ORDER BY `update_date_time` DESC LIMIT 1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ip-ping-checker.php-
- Full path:
- arc/web/ip-ping-checker.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:37 12/12/2025
- Last modified:
- 17:46:38 03/06/2025
- MD5 hash:
- 0d28f3053b73b3fe2885cf519ee17c12
- Filesize:
- 2.64 KB
- suspicious functions used:
- curl_exec (line:81);
$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: LoginByPass.php-
- Full path:
- arc/web/LoginByPass.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:37 12/12/2025
- Last modified:
- 17:46:39 03/06/2025
- MD5 hash:
- 1c6616dae30e9849d8f4fb0fe712a748
- Filesize:
- 4.59 KB
- suspicious functions used:
- curl_exec (line:44);curl_exec (line:69);
$jsona = curl_exec($ch10);$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: login_exec.php-
- Full path:
- arc/web/login_exec.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 06:00:28 12/12/2025
- Last modified:
- 17:46:39 03/06/2025
- MD5 hash:
- fe0ff14fc554949b87917caaf5d443f8
- Filesize:
- 12.26 KB
- suspicious functions used:
- curl_exec (line:24);curl_exec (line:80);
$jsona = curl_exec($ch10);curl_exec (line:199);$result110 = curl_exec($ch11);curl_exec (line:237);$jsona = curl_exec($ch10);$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: macreseller-news.php-
- Full path:
- arc/web/macreseller-news.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:37 12/12/2025
- Last modified:
- 17:46:41 03/06/2025
- MD5 hash:
- ed23ca98b77c5321b4485e85eb2ea64d
- Filesize:
- 3.67 KB
- suspicious functions used:
- curl_exec (line:22);
$alldata1 = curl_exec($chhhh1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: MacResellerAdd.php-
- Full path:
- arc/web/MacResellerAdd.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:37 12/12/2025
- Last modified:
- 17:46:42 03/06/2025
- MD5 hash:
- 5fdbde3df3e96e845cc118cb3ae916a5
- Filesize:
- 30.33 KB
- suspicious functions used:
- `input[name="${inputName}"]:checked` (line:799);
var value = document.querySelector(`input[name="${inputName}"]:checked`).value; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: MacResellerEdit.php-
- Full path:
- arc/web/MacResellerEdit.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:37 12/12/2025
- Last modified:
- 17:46:45 03/06/2025
- MD5 hash:
- 92ce35276f3eae45e866de3439baaa11
- Filesize:
- 37.76 KB
- suspicious functions used:
- `input[name="${inputName}"]:checked` (line:640);
var value = document.querySelector(`input[name="${inputName}"]:checked`).value; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: nagad-helper.php-
- Full path:
- arc/web/nagad-helper.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:38 12/12/2025
- Last modified:
- 17:46:48 03/06/2025
- MD5 hash:
- 114b90b978b842cd318391876ba454ab
- Filesize:
- 2.84 KB
- suspicious functions used:
- curl_exec (line:46);base64_decode (line:77);
$resultData = curl_exec($url);openssl_private_decrypt(base64_decode($cryptText), $plain_text, $private_key); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: nagad-merchant-callback.php-
- Full path:
- arc/web/nagad-merchant-callback.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:38 12/12/2025
- Last modified:
- 17:46:48 03/06/2025
- MD5 hash:
- a782d367c638b8f47cb46738f54fa753
- Filesize:
- 16.47 KB
- suspicious functions used:
- curl_exec (line:20);
$file_contents = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: netowrk-olt-all-mac-array.php-
- Full path:
- arc/web/netowrk-olt-all-mac-array.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:38 12/12/2025
- Last modified:
- 17:46:48 03/06/2025
- MD5 hash:
- b0168ce99145e2afe64357247d750dd6
- Filesize:
- 4.62 KB
- suspicious functions used:
- shell_exec (line:33);shell_exec (line:47);
$output = shell_exec($command . " 2>&1");shell_exec (line:61);$output = shell_exec($command . " 2>&1");shell_exec (line:76);$output_oid_bdcom = shell_exec($command_oid_bdcom . " 2>&1");shell_exec (line:93);$output_oid_cdata = shell_exec($command_oid_cdata . " 2>&1");$output_oid_gcom = shell_exec($command_oid_gcom . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: netowrk-snmp-data-auto.php-
- Full path:
- arc/web/netowrk-snmp-data-auto.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:38 12/12/2025
- Last modified:
- 17:46:48 03/06/2025
- MD5 hash:
- b30b86386b4d79a756cefdd86f070bd5
- Filesize:
- 7.27 KB
- suspicious functions used:
- shell_exec (line:68);shell_exec (line:118);
$output = shell_exec($command);$vlanoutput = shell_exec($vlancommand); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: netowrk-snmp-data.php-
- Full path:
- arc/web/netowrk-snmp-data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 14:16:56 12/12/2025
- Last modified:
- 17:46:48 03/06/2025
- MD5 hash:
- cebb238044a122cb2dc9038afac8ca43
- Filesize:
- 24.93 KB
- suspicious functions used:
- shell_exec (line:104);shell_exec (line:113);
$output = shell_exec($command . " 2>&1");shell_exec (line:123);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:142);$output_port = shell_exec($commandd . " 2>&1");shell_exec (line:154);$output = shell_exec($command . " 2>&1");shell_exec (line:165);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:181);$output_port = shell_exec($commandd);shell_exec (line:191);$output_oid_bdcom = shell_exec($command_oid_bdcom . " 2>&1");shell_exec (line:207);$outputs = shell_exec($commanda);shell_exec (line:227);$output_port = shell_exec($commandd_bdcom);shell_exec (line:236);$output_oid_cdata = shell_exec($command_oid_cdata . " 2>&1");shell_exec (line:244);$outputs = shell_exec($commanda);shell_exec (line:251);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:256);$output_pon = shell_exec($command_ponn . " 2>&1");`pon_name` FROM `olt_pon` WHERE `olt_pon_id` = '$pon_id' AND ` (line:263);$outsddd = shell_exec($commddandd);shell_exec (line:280);$qrydd = mysqli_query($con, "SELECT `pon_name` FROM `olt_pon` WHERE `olt_pon_id` = '$pon_id' AND `olt_id` = '$olt_id' AND sts = '0'");shell_exec (line:290);$outsdd = shell_exec($commddand);`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:303);$output_oid_gcom = shell_exec($command_oid_gcom . " 2>&1");shell_exec (line:309);$querydd = mysqli_query($con, "SELECT `olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND `olt_id` = '$olt_id' AND sts = '0'");shell_exec (line:441);$output_vlan = shell_exec($command_vlan . " 2>&1");$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-old-onu-rx-map.php-
- Full path:
- arc/web/network-old-onu-rx-map.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:38 12/12/2025
- Last modified:
- 17:46:48 03/06/2025
- MD5 hash:
- bfa54cd4fcf2629316f30310fcc90b78
- Filesize:
- 6.93 KB
- suspicious functions used:
- shell_exec (line:77);
$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-old-onu-rx.php-
- Full path:
- arc/web/network-old-onu-rx.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:38 12/12/2025
- Last modified:
- 17:46:48 03/06/2025
- MD5 hash:
- a2555fb0203a78b0e1f41ae2d96f6f82
- Filesize:
- 7.35 KB
- suspicious functions used:
- shell_exec (line:86);
$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-client-onu-mac-count-cdata.php-
- Full path:
- arc/web/network-olt-client-onu-mac-count-cdata.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:38 12/12/2025
- Last modified:
- 17:46:48 03/06/2025
- MD5 hash:
- c378dbabf36066c335cfb8838a6e167d
- Filesize:
- 4.58 KB
- suspicious functions used:
- shell_exec (line:25);shell_exec (line:35);
$od_vddlan = shell_exec($codmn . " 2>&1");shell_exec (line:56);$od_vddlan = shell_exec($codmn . " 2>&1");shell_exec (line:103);$output_vdlan = shell_exec($command_dvlan . " 2>&1");shell_exec (line:115);$od_vdlan = shell_exec($coddvlan . " 2>&1");shell_exec (line:126);$output_port = shell_exec($commandd_bdcom);shell_exec (line:140);$od_vddlan = shell_exec($codmn . " 2>&1");$od_vdddlan = shell_exec($codmdn . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-client-onu-mac-count-rcl.php-
- Full path:
- arc/web/network-olt-client-onu-mac-count-rcl.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:38 12/12/2025
- Last modified:
- 17:46:48 03/06/2025
- MD5 hash:
- 9372dfb2a63d9f4a28440f91d4866778
- Filesize:
- 3.49 KB
- suspicious functions used:
- shell_exec (line:26);shell_exec (line:73);
$output_vdlan = shell_exec($command_dvlan . " 2>&1");shell_exec (line:85);$od_vdlan = shell_exec($coddvlan . " 2>&1");shell_exec (line:96);$output_port = shell_exec($commandd_bdcom);shell_exec (line:110);$od_vddlan = shell_exec($codmn . " 2>&1");$od_vdddlan = shell_exec($codmdn . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-client-onu-mac-count.php-
- Full path:
- arc/web/network-olt-client-onu-mac-count.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:38 12/12/2025
- Last modified:
- 17:46:48 03/06/2025
- MD5 hash:
- 80af84e49b42497813db916584cfa0f2
- Filesize:
- 15.29 KB
- suspicious functions used:
- shell_exec (line:26);shell_exec (line:36);
$od_vddlan = shell_exec($codmn . " 2>&1");shell_exec (line:68);$od_vddlan = shell_exec($codmn . " 2>&1");shell_exec (line:84);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:101);$outpudt_vlan = shell_exec($commadnd_vlan . " 2>&1");shell_exec (line:119);$output_port = shell_exec($commandd_bdcom);shell_exec (line:135);$output_vdlan = shell_exec($command_vdlan . " 2>&1");shell_exec (line:176);$outpdut_vdlan = shell_exec($commadnd_dvlan . " 2>&1");shell_exec (line:236);$output_vdlan = shell_exec($command_dvlan . " 2>&1");shell_exec (line:312);$outpdut_vdlan = shell_exec($commadnd_dvlan . " 2>&1");shell_exec (line:379);$output_vdlan = shell_exec($command_dvlan . " 2>&1");shell_exec (line:469);$od_vddddlan = shell_exec($codmddn . " 2>&1");shell_exec (line:488);$od_vdlan = shell_exec($coddvlan . " 2>&1");shell_exec (line:507);$od_vddlan = shell_exec($codmn . " 2>&1");$od_vdddlan = shell_exec($codmdn . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-client-onu-mac-countt.php-
- Full path:
- arc/web/network-olt-client-onu-mac-countt.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:38 12/12/2025
- Last modified:
- 17:46:48 03/06/2025
- MD5 hash:
- 6c684ef0e37eeb3400821b34d0d05fec
- Filesize:
- 8.94 KB
- suspicious functions used:
- shell_exec (line:26);shell_exec (line:36);
$od_vddlan = shell_exec($codmn . " 2>&1");shell_exec (line:59);$od_vddlan = shell_exec($codmn . " 2>&1");shell_exec (line:75);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:92);$outpudt_vlan = shell_exec($commadnd_vlan . " 2>&1");shell_exec (line:102);$output_port = shell_exec($commandd_bdcom);shell_exec (line:117);$output_vdlan = shell_exec($command_vdlan . " 2>&1");shell_exec (line:155);$outpdut_vdlan = shell_exec($commadnd_dvlan . " 2>&1");shell_exec (line:206);$output_vdlan = shell_exec($command_dvlan . " 2>&1");shell_exec (line:262);$od_vddddlan = shell_exec($codmddn . " 2>&1");shell_exec (line:275);$od_vdlan = shell_exec($coddvlan . " 2>&1");shell_exec (line:288);$od_vddlan = shell_exec($codmn . " 2>&1");$od_vdddlan = shell_exec($codmdn . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-con-sts.php-
- Full path:
- arc/web/network-olt-con-sts.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:38 12/12/2025
- Last modified:
- 17:46:48 03/06/2025
- MD5 hash:
- 400a889537016067b55f97ac6d0a16a3
- Filesize:
- 4.02 KB
- suspicious functions used:
- `olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:10);shell_exec (line:38);
$query = mysqli_query($con, "SELECT `olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND `sts` = '0'");`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, `last_synced`, `last_update`, `msg`, `full_msg`, ROUND((SELECT AVG(value) FROM olt_onu_history WHERE alarm_id = '$alarmId' AND value != ''), 2) AS average_value FROM `, ` WHERE `alarm_id` = '$alarmId' AND ` (line:82);$output = shell_exec($command);$query = mysqli_query($con, "SELECT `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, `last_synced`, `last_update`, `msg`, `full_msg`, ROUND((SELECT AVG(value) FROM olt_onu_history WHERE alarm_id = '$alarmId' AND value != ''), 2) AS average_value FROM `olt_onu_history` WHERE `alarm_id` = '$alarmId' AND `value` != ''"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-load.php-
- Full path:
- arc/web/network-olt-load.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:38 12/12/2025
- Last modified:
- 17:46:48 03/06/2025
- MD5 hash:
- f49d5153285c639ed91d4e806685ee56
- Filesize:
- 1.33 KB
- suspicious functions used:
- shell_exec (line:22);shell_exec (line:25);
$output = shell_exec($command . " 2>&1");$output1 = shell_exec($command1 . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-oid-check.php-
- Full path:
- arc/web/network-olt-oid-check.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:38 12/12/2025
- Last modified:
- 17:46:48 03/06/2025
- MD5 hash:
- 5b7dc0ce1103fbfc895873c250b63141
- Filesize:
- 1.88 KB
- suspicious functions used:
- shell_exec (line:33);
return shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-onu-alarm-add.php-
- Full path:
- arc/web/network-olt-onu-alarm-add.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:38 12/12/2025
- Last modified:
- 17:46:48 03/06/2025
- MD5 hash:
- be6ba82c658419e1454f778e20e2d4c3
- Filesize:
- 7.86 KB
- suspicious functions used:
- shell_exec (line:103);
$output = shell_exec($command . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-onu-count.php-
- Full path:
- arc/web/network-olt-onu-count.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:38 12/12/2025
- Last modified:
- 17:46:48 03/06/2025
- MD5 hash:
- cbfe569e079da8f569d07af1dec94de5
- Filesize:
- 7.22 KB
- suspicious functions used:
- `olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:14);shell_exec (line:83);
$query = mysqli_query($con, "SELECT `olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND `online_sts` = '1' AND `sts` = '0'");$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-onu-list-data.php-
- Full path:
- arc/web/network-olt-onu-list-data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:38 12/12/2025
- Last modified:
- 17:46:48 03/06/2025
- MD5 hash:
- 54cc9417c766c31317311c3722ce7d4b
- Filesize:
- 9.48 KB
- suspicious functions used:
- shell_exec (line:24);shell_exec (line:38);
$outputs = shell_exec($commanda);shell_exec (line:64);$output = shell_exec($command);shell_exec (line:85);$outputs = shell_exec($commanda);shell_exec (line:104);$output = shell_exec($command);shell_exec (line:125);$outputs = shell_exec($commanda);shell_exec (line:143);$output = shell_exec($command);shell_exec (line:153);$od_vdlan = shell_exec($commanda . " 2>&1");shell_exec (line:165);$od_vdland = shell_exec($coddvland . " 2>&1");shell_exec (line:185);$outputs = shell_exec($coddvladnd . " 2>&1");$output_vdlan = shell_exec($command_vdlan); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-onu-power.php-
- Full path:
- arc/web/network-olt-onu-power.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:38 12/12/2025
- Last modified:
- 17:46:48 03/06/2025
- MD5 hash:
- 2e064543b67b532bdf4e5b12d49c5052
- Filesize:
- 7.54 KB
- suspicious functions used:
- shell_exec (line:97);
$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-pon-clients-search.php-
- Full path:
- arc/web/network-olt-pon-clients-search.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:38 12/12/2025
- Last modified:
- 17:46:48 03/06/2025
- MD5 hash:
- 79d26fc66abdab6f173330588aa8b238
- Filesize:
- 10.93 KB
- suspicious functions used:
- shell_exec (line:42);shell_exec (line:51);
$output = shell_exec($command . " 2>&1");shell_exec (line:104);$outputS = shell_exec($command . " 2>&1");shell_exec (line:168);$snmpOutput = shell_exec($command);$snmpOutput = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-pon-onu-search-bdcom.php-
- Full path:
- arc/web/network-olt-pon-onu-search-bdcom.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:38 12/12/2025
- Last modified:
- 17:46:48 03/06/2025
- MD5 hash:
- c786fa8b69268c738b6ff976631798cd
- Filesize:
- 27.74 KB
- suspicious functions used:
- shell_exec (line:60);shell_exec (line:69);
$output = shell_exec($command . " 2>&1");shell_exec (line:383);$outputS = shell_exec($commandS . " 2>&1");$snmpOutput = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-pon-onu-search-bdcom1.php-
- Full path:
- arc/web/network-olt-pon-onu-search-bdcom1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:38 12/12/2025
- Last modified:
- 17:46:48 03/06/2025
- MD5 hash:
- dd18677b1dcbf7f0bce2ac6912d98da0
- Filesize:
- 9.6 KB
- suspicious functions used:
- shell_exec (line:42);shell_exec (line:51);
$output = shell_exec($command . " 2>&1");shell_exec (line:129);$outputS = shell_exec($command . " 2>&1");$snmpOutput = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-pon-onu-search-rcl.php-
- Full path:
- arc/web/network-olt-pon-onu-search-rcl.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:38 12/12/2025
- Last modified:
- 17:46:49 03/06/2025
- MD5 hash:
- 565ff38d572bba4bc20721ab17484554
- Filesize:
- 27.33 KB
- suspicious functions used:
- shell_exec (line:46);shell_exec (line:55);
$output = shell_exec($command . " 2>&1");shell_exec (line:369);$outputS = shell_exec($commandS . " 2>&1");$snmpOutput = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-pon-onu-search.php-
- Full path:
- arc/web/network-olt-pon-onu-search.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:38 12/12/2025
- Last modified:
- 17:46:49 03/06/2025
- MD5 hash:
- dc183ecf77d0e1f56f672338fd09cfa5
- Filesize:
- 21.62 KB
- suspicious functions used:
- shell_exec (line:35);
$output = shell_exec($command . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-snmp-onu-status-data-bdcom-online.php-
- Full path:
- arc/web/network-snmp-onu-status-data-bdcom-online.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 09:22:51 12/12/2025
- Last modified:
- 17:46:49 03/06/2025
- MD5 hash:
- a63b8935b2897e257872145705a654a9
- Filesize:
- 21.78 KB
- suspicious functions used:
- shell_exec (line:48);shell_exec (line:73);
$oudddputsd = shell_exec($commddanda . " 2>&1");shell_exec (line:85);$oudddputsd = shell_exec($commddanda . " 2>&1");shell_exec (line:103);$oudddputsd = shell_exec($commddanda . " 2>&1");shell_exec (line:116);$output = shell_exec($command . " 2>&1");shell_exec (line:128);$outputs = shell_exec($commanda);shell_exec (line:134);$outpdut = shell_exec($commandd . " 2>&1");shell_exec (line:159);$oddutpdut = shell_exec($cmandd . " 2>&1");shell_exec (line:172);$output = shell_exec($command . " 2>&1");shell_exec (line:184);$outputs = shell_exec($commanda);shell_exec (line:190);$outpdut = shell_exec($commandd . " 2>&1");shell_exec (line:217);$oddutpdut = shell_exec($cmandd . " 2>&1");shell_exec (line:230);$output_oid_cdata = shell_exec($command_oid_cdata . " 2>&1");shell_exec (line:236);$outputs = shell_exec($commanda);$oddutpdut = shell_exec($cmandd . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-snmp-onu-status-data-bdcom.php-
- Full path:
- arc/web/network-snmp-onu-status-data-bdcom.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:38 12/12/2025
- Last modified:
- 17:46:49 03/06/2025
- MD5 hash:
- 8e6c4057a9586f2e4cc65277a19854a3
- Filesize:
- 23.58 KB
- suspicious functions used:
- shell_exec (line:49);shell_exec (line:74);
$oudddputsd = shell_exec($commddanda . " 2>&1");shell_exec (line:86);$oudddputsd = shell_exec($commddanda . " 2>&1");shell_exec (line:104);$oudddputsd = shell_exec($commddanda . " 2>&1");shell_exec (line:117);$output = shell_exec($command . " 2>&1");shell_exec (line:129);$outputs = shell_exec($commanda);shell_exec (line:135);$outpdut = shell_exec($commandd . " 2>&1");shell_exec (line:160);$oddutpdut = shell_exec($cmandd . " 2>&1");shell_exec (line:173);$output = shell_exec($command . " 2>&1");shell_exec (line:185);$outputs = shell_exec($commanda);shell_exec (line:191);$outpdut = shell_exec($commandd . " 2>&1");shell_exec (line:218);$oddutpdut = shell_exec($cmandd . " 2>&1");shell_exec (line:231);$output_oid_cdata = shell_exec($command_oid_cdata . " 2>&1");shell_exec (line:237);$outputs = shell_exec($commanda);$oddutpdut = shell_exec($cmandd . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-snmp-onu-status-data-online.php-
- Full path:
- arc/web/network-snmp-onu-status-data-online.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 13:22:53 12/12/2025
- Last modified:
- 17:46:50 03/06/2025
- MD5 hash:
- 0d8187961d76276c1aaaa369cdabf36b
- Filesize:
- 27.73 KB
- suspicious functions used:
- shell_exec (line:35);`olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:41);
$outputs11 = shell_exec($snmpCommandss);shell_exec (line:80);$re11=mysql_query("SELECT `olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND `olt_pon_id` = '$check_pon_name'");shell_exec (line:94);$outputs = shell_exec($snmpCommand);shell_exec (line:108);$outpdduts = shell_exec($sand);shell_exec (line:121);$outputs = shell_exec($snmpCommand);shell_exec (line:196);$outpdduts = shell_exec($sand);shell_exec (line:429);$outputsmac = shell_exec($snmpCommandmac);shell_exec (line:441);$outputsmac = shell_exec($snmpCommandmac);shell_exec (line:448);$outputsmac = shell_exec($snmpCommandmac);$output_vlan = shell_exec($command_vlan . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-snmp-onu-status-data.php-
- Full path:
- arc/web/network-snmp-onu-status-data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:38 12/12/2025
- Last modified:
- 17:46:50 03/06/2025
- MD5 hash:
- 30cb65623c66c45bd502104b935d2c48
- Filesize:
- 30.69 KB
- suspicious functions used:
- shell_exec (line:36);`olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:42);
$outputs11 = shell_exec($snmpCommandss);shell_exec (line:81);$re11=mysql_query("SELECT `olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND `olt_pon_id` = '$check_pon_name'");shell_exec (line:95);$outputs = shell_exec($snmpCommand);shell_exec (line:109);$outpdduts = shell_exec($sand);shell_exec (line:122);$outputs = shell_exec($snmpCommand);shell_exec (line:208);$outpdduts = shell_exec($sand);shell_exec (line:436);$outputsmac = shell_exec($snmpCommandmac);shell_exec (line:448);$outputsmac = shell_exec($snmpCommandmac);shell_exec (line:455);$outputsmac = shell_exec($snmpCommandmac);$output_vlan = shell_exec($command_vlan . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-snmp-onu-status-data1.php-
- Full path:
- arc/web/network-snmp-onu-status-data1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:38 12/12/2025
- Last modified:
- 17:46:50 03/06/2025
- MD5 hash:
- 21b4726e351c4b0fcb7d6f0959c0d888
- Filesize:
- 15.98 KB
- suspicious functions used:
- shell_exec (line:34);`olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:38);
$outputs = shell_exec($snmpCommand);shell_exec (line:150);$re11=mysql_query("SELECT `olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND `olt_pon_id` = '$check_pon_name'");$outputsmac = shell_exec($snmpCommandmac); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-snmp-onu-status-data_vsol2.php-
- Full path:
- arc/web/network-snmp-onu-status-data_vsol2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:38 12/12/2025
- Last modified:
- 17:46:50 03/06/2025
- MD5 hash:
- f22d022ddc284f4d8e1de3660da91db8
- Filesize:
- 15.61 KB
- suspicious functions used:
- shell_exec (line:34);shell_exec (line:113);
$outputs = shell_exec($snmpCommand);shell_exec (line:126);$outpdduts = shell_exec($sand);shell_exec (line:132);$outputsmac = shell_exec($snmpCommandmac);$output_vlan = shell_exec($command_vlan . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-tree-vartual-nodes.php-
- Full path:
- arc/web/network-tree-vartual-nodes.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:38 12/12/2025
- Last modified:
- 17:46:51 03/06/2025
- MD5 hash:
- ef5de6634f62a12fd5139c800708aa30
- Filesize:
- 10.49 KB
- suspicious functions used:
- shell_exec (line:76);shell_exec (line:111);
$outputs = shell_exec($commanda);shell_exec (line:145);$outputs = shell_exec($commanda);shell_exec (line:181);$outputs = shell_exec($commanda);shell_exec (line:188);$od_vdlan = shell_exec($commanda . " 2>&1");$od_vdland = shell_exec($coddvland . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Network.php-
- Full path:
- arc/web/Network.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:38 12/12/2025
- Last modified:
- 17:46:51 03/06/2025
- MD5 hash:
- 85105512c59282e667cfe15bc67d73bb
- Filesize:
- 69.44 KB
- suspicious functions used:
- system (line:371);shell_exec (line:654);
$ARRAY = $API->comm("/system/resource/print");`network_tree` WHERE `device_type` = '1' AND `olt_id` = '{$rowo['olt_id']}' AND sts = '0' AND ` (line:874);$output = shell_exec($command);$querytree = "SELECT tree_id FROM `network_tree` WHERE `device_type` = '1' AND `olt_id` = '{$rowo['olt_id']}' AND sts = '0' AND `latitude` != '' AND `longitude` != ''"; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Network1.php-
- Full path:
- arc/web/Network1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:38 12/12/2025
- Last modified:
- 17:46:51 03/06/2025
- MD5 hash:
- 154ba9f6e6603be92ddd48557fb118ce
- Filesize:
- 65.34 KB
- suspicious functions used:
- system (line:369);shell_exec (line:652);
$ARRAY = $API->comm("/system/resource/print");`network_tree` WHERE `device_type` = '1' AND `olt_id` = '{$rowo['olt_id']}' AND sts = '0' AND ` (line:843);$output = shell_exec($command);$querytree = "SELECT tree_id FROM `network_tree` WHERE `device_type` = '1' AND `olt_id` = '{$rowo['olt_id']}' AND sts = '0' AND `latitude` != '' AND `longitude` != ''"; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkLoad.php-
- Full path:
- arc/web/NetworkLoad.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:39 12/12/2025
- Last modified:
- 17:46:53 03/06/2025
- MD5 hash:
- e1632e66ee1b7394d3fb82751b924abe
- Filesize:
- 2.83 KB
- suspicious functions used:
- system (line:81);
$ARRAY = $API->comm("/system/resource/print"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkLoad1.php-
- Full path:
- arc/web/NetworkLoad1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:39 12/12/2025
- Last modified:
- 17:46:53 03/06/2025
- MD5 hash:
- 176bd6931be34d7ef351d22897accc65
- Filesize:
- 759 B
- suspicious functions used:
- system (line:18);
$ARRAY = $API->comm("/system/resource/print"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkOltAddQuery.php-
- Full path:
- arc/web/NetworkOltAddQuery.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:39 12/12/2025
- Last modified:
- 17:46:53 03/06/2025
- MD5 hash:
- f2e8bbce7005fe948eab86e12f9e789f
- Filesize:
- 7.96 KB
- suspicious functions used:
- shell_exec (line:22);
$output = shell_exec($command . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkOltOnuStatus.php-
- Full path:
- arc/web/NetworkOltOnuStatus.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:39 12/12/2025
- Last modified:
- 17:46:53 03/06/2025
- MD5 hash:
- 3389803b8d03cb46bbad2d648ffd0bd4
- Filesize:
- 70.95 KB
- suspicious functions used:
- shell_exec (line:42);shell_exec (line:102);
$output = shell_exec($command . " 2>&1");shell_exec (line:673);$output = shell_exec($command . " 2>&1");shell_exec (line:793);$oddutpdut = shell_exec($cmandd . " 2>&1");shell_exec (line:903);$oddutpdut = shell_exec($cmandd . " 2>&1");shell_exec (line:1013);$oddutpdut = shell_exec($cmandd . " 2>&1");$oddutpdut = shell_exec($cmandd . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkOltOnuStatus2.php-
- Full path:
- arc/web/NetworkOltOnuStatus2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:39 12/12/2025
- Last modified:
- 17:46:54 03/06/2025
- MD5 hash:
- c9a14797fa4353d05bbd9427b6079250
- Filesize:
- 15.88 KB
- suspicious functions used:
- shell_exec (line:35);
$output = shell_exec($command . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkOltSense.php-
- Full path:
- arc/web/NetworkOltSense.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:39 12/12/2025
- Last modified:
- 17:46:54 03/06/2025
- MD5 hash:
- 2be664ae5006367f629ca437a6d507f8
- Filesize:
- 18.26 KB
- suspicious functions used:
- `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, `last_synced`, `last_update`, `msg`, `full_msg`, ROUND((SELECT AVG(value) FROM olt_onu_history WHERE alarm_id = '$alarmId' AND value != ''), 2) AS average_value FROM `, ` WHERE `alarm_id` = '$alarmId' AND ` (line:123);
$querddy = mysql_query("SELECT `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, `last_synced`, `last_update`, `msg`, `full_msg`, ROUND((SELECT AVG(value) FROM olt_onu_history WHERE alarm_id = '$alarmId' AND value != ''), 2) AS average_value FROM `olt_onu_history` WHERE `alarm_id` = '$alarmId' AND `value` != ''"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkOltSenseDetails.php-
- Full path:
- arc/web/NetworkOltSenseDetails.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:39 12/12/2025
- Last modified:
- 17:46:54 03/06/2025
- MD5 hash:
- 440096c601fc10b819a1f0f8330928b0
- Filesize:
- 14.17 KB
- suspicious functions used:
- `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:33);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:42);
$sql = mysql_query("SELECT `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND `value` != '' ORDER BY id DESC");`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:51);$sql = mysql_query("SELECT `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND `value` != '' ORDER BY id DESC");`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:60);$sql = mysql_query("SELECT `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND `value` != '' ORDER BY id DESC");$sql = mysql_query("SELECT `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND `value` != '' ORDER BY id DESC"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkOltSync.php-
- Full path:
- arc/web/NetworkOltSync.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:39 12/12/2025
- Last modified:
- 17:46:54 03/06/2025
- MD5 hash:
- 06633d4b65a14d677358170dd0a84424
- Filesize:
- 1.87 KB
- suspicious functions used:
- curl_exec (line:18);
$result1dd = curl_exec($ch111); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: networktree-olt-onu-list-data.php-
- Full path:
- arc/web/networktree-olt-onu-list-data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:39 12/12/2025
- Last modified:
- 17:46:55 03/06/2025
- MD5 hash:
- af4221fefa9c9051846a063ac4135560
- Filesize:
- 8.72 KB
- suspicious functions used:
- shell_exec (line:24);shell_exec (line:36);
$outputs = shell_exec($commanda);shell_exec (line:59);$output = shell_exec($command);shell_exec (line:78);$outputs = shell_exec($commanda);shell_exec (line:97);$output = shell_exec($command);shell_exec (line:116);$outputs = shell_exec($commanda);shell_exec (line:134);$output = shell_exec($command);shell_exec (line:143);$od_vdlan = shell_exec($commanda . " 2>&1");shell_exec (line:155);$od_vdland = shell_exec($coddvland . " 2>&1");shell_exec (line:175);$outputs = shell_exec($coddvladnd . " 2>&1");$output_vdlan = shell_exec($command_vdlan); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkTreeAddSave.php-
- Full path:
- arc/web/NetworkTreeAddSave.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:39 12/12/2025
- Last modified:
- 17:46:57 03/06/2025
- MD5 hash:
- 93fdf1213fdb5d525641e2b625f1a91b
- Filesize:
- 7.61 KB
- suspicious functions used:
- `network_tree` WHERE `olt_id` = '$olt_id' AND ` (line:107);
$resu11 = $con->query("SELECT tree_id AS pon_parent_id FROM `network_tree` WHERE `olt_id` = '$olt_id' AND `device_type` = '1' AND sts = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkTreeEdit1.php-
- Full path:
- arc/web/NetworkTreeEdit1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:39 12/12/2025
- Last modified:
- 17:47:00 03/06/2025
- MD5 hash:
- 3396a6bdf9b5804bb208f38f37cc29a2
- Filesize:
- 35.81 KB
- suspicious functions used:
- `olt_onu` WHERE olt_id = '$olt_id' AND ` (line:207);
<?php $resultoff11d=mysql_query("SELECT id AS alarm_id, alarm_name FROM `olt_onu` WHERE olt_id = '$olt_id' AND `onu_name` LIKE '$pon_name1' ORDER BY id DESC"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkTreeEditSave.php-
- Full path:
- arc/web/NetworkTreeEditSave.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:39 12/12/2025
- Last modified:
- 17:47:00 03/06/2025
- MD5 hash:
- 75ca95ac9b0cf5e9709091d3a6ae5b6a
- Filesize:
- 13.55 KB
- suspicious functions used:
- `olt_pon` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND ` (line:84);`network_tree` WHERE `olt_id` = '$olt_id' AND ` (line:196);
$resu11=mysqli_query($con, "SELECT olt_pon_id AS pon_index_id FROM `olt_pon` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND `sts` = '0'");$resu11 = $con->query("SELECT tree_id AS pon_parent_id FROM `network_tree` WHERE `olt_id` = '$olt_id' AND `device_type` = '1' AND sts = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkTreeList.php-
- Full path:
- arc/web/NetworkTreeList.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:39 12/12/2025
- Last modified:
- 17:47:01 03/06/2025
- MD5 hash:
- 2e75d2b5d8285321171467ca5c0afbe4
- Filesize:
- 32 KB
- suspicious functions used:
- `pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '{$rowsedfg['olt_id']}' AND ` (line:455);
$result11=mysql_query("SELECT count(`pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '{$rowsedfg['olt_id']}' AND `sts` = '0';"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkTreeMap.php-
- Full path:
- arc/web/NetworkTreeMap.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:39 12/12/2025
- Last modified:
- 17:47:01 03/06/2025
- MD5 hash:
- 9a2606558b5ebf04b77c89eeeb6df1c6
- Filesize:
- 49.36 KB
- suspicious functions used:
- `${totalonline}` (line:121);`${totaloffline}` (line:122);
document.getElementById('totalonline').textContent = `${totalonline}`;`Failed to load data: ${error.message}` (line:788);document.getElementById('totaloffline').textContent = `${totaloffline}`;`HTTP error! Status: ${response.status}` (line:803);updateElement('resultt1-' + treeid, `<span>Failed to load data: ${error.message}</span>`);throw new Error(`HTTP error! Status: ${response.status}`); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkTreeMap1.php-
- Full path:
- arc/web/NetworkTreeMap1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:39 12/12/2025
- Last modified:
- 17:47:03 03/06/2025
- MD5 hash:
- 468cfbce8d08d577fb1fe05b51eb722f
- Filesize:
- 48.69 KB
- suspicious functions used:
- `${totalonline}` (line:122);`${totaloffline}` (line:123);
document.getElementById('totalonline').textContent = `${totalonline}`;`Failed to load data: ${error.message}` (line:776);document.getElementById('totaloffline').textContent = `${totaloffline}`;`HTTP error! Status: ${response.status}` (line:790);updateElement('resultt1-' + treeid, `<span>Failed to load data: ${error.message}</span>`);throw new Error(`HTTP error! Status: ${response.status}`); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkTreeMap2.php-
- Full path:
- arc/web/NetworkTreeMap2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:39 12/12/2025
- Last modified:
- 17:47:03 03/06/2025
- MD5 hash:
- 6487967886178db61db1c1d6c4479af3
- Filesize:
- 49.47 KB
- suspicious functions used:
- `${totalonline}` (line:122);`${totaloffline}` (line:123);
document.getElementById('totalonline').textContent = `${totalonline}`;`Failed to load data: ${error.message}` (line:769);document.getElementById('totaloffline').textContent = `${totaloffline}`;`HTTP error! Status: ${response.status}` (line:783);updateElement('resultt1-' + treeid, `<span>Failed to load data: ${error.message}</span>`);throw new Error(`HTTP error! Status: ${response.status}`); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: networktree_device_onu_list_add.php-
- Full path:
- arc/web/networktree_device_onu_list_add.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:40 12/12/2025
- Last modified:
- 17:47:03 03/06/2025
- MD5 hash:
- 23aa4b30ff4514610497db10c8490003
- Filesize:
- 16.07 KB
- suspicious functions used:
- shell_exec (line:31);`network_tree` WHERE `onu_mac` = '$mac_address' AND ` (line:129);
$output = shell_exec($command . " 2>&1");`olt_pon` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND ` (line:163);$reu11=mysql_query("SELECT count(tree_id) AS onucount FROM `network_tree` WHERE `onu_mac` = '$mac_address' AND `sts` = '0'");shell_exec (line:198);$resu11=mysql_query("SELECT olt_pon_id AS pon_index_id FROM `olt_pon` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND `sts` = '0'");shell_exec (line:221);$outputS = shell_exec($commandS . " 2>&1");shell_exec (line:238);$output = shell_exec($command . " 2>&1");`network_tree` WHERE `onu_mac` = '$onuMac' AND ` (line:276);$snmpOutput = shell_exec($commandtghj);shell_exec (line:302);$reu11=mysql_query("SELECT count(tree_id) AS onucount FROM `network_tree` WHERE `onu_mac` = '$onuMac' AND `sts` = '0'");shell_exec (line:308);$snmpOutputdd = shell_exec($cmandd);shell_exec (line:319);$output_port = shell_exec($commandd_bdcom);`network_tree` WHERE `onu_mac` = '$onuMac' AND ` (line:355);$output_vdlan = shell_exec($command_dvlan . " 2>&1");`olt_pon` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND ` (line:391);$reu11=mysql_query("SELECT count(tree_id) AS onucount FROM `network_tree` WHERE `onu_mac` = '$onuMac' AND `sts` = '0'");$resu11=mysql_query("SELECT olt_pon_id AS pon_index_id FROM `olt_pon` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND `sts` = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: networktree_device_pon_check.php-
- Full path:
- arc/web/networktree_device_pon_check.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:40 12/12/2025
- Last modified:
- 17:47:03 03/06/2025
- MD5 hash:
- b7f8731e7d12665b418927d722340da4
- Filesize:
- 1.58 KB
- suspicious functions used:
- `pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '$olt_id' AND ` (line:8);
$result11=mysql_query("SELECT count(`pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '$olt_id' AND `sts` = '0';"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: networktree_device_pon_list_add.php-
- Full path:
- arc/web/networktree_device_pon_list_add.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:40 12/12/2025
- Last modified:
- 17:47:04 03/06/2025
- MD5 hash:
- 2cf70db6a91f4c5d1821b4b5fa178ebb
- Filesize:
- 1.38 KB
- suspicious functions used:
- `olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:6);`olt_pon` WHERE `olt_id` = '$olt_id' AND ` (line:10);
$resu11=mysql_query("SELECT olt_name FROM `olt_con` WHERE `olt_id` = '$olt_id' AND `sts` = '0'");`network_tree` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND ` (line:17);$result11=mysql_query("SELECT pon_id, olt_pon_id, pon_name FROM `olt_pon` WHERE `olt_id` = '$olt_id' AND `sts` = '0'");$rehu11=mysql_query("SELECT count(tree_id) AS poncount FROM `network_tree` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND `sts` = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: networktree_device_pon_port_onu_list.php-
- Full path:
- arc/web/networktree_device_pon_port_onu_list.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:40 12/12/2025
- Last modified:
- 17:47:04 03/06/2025
- MD5 hash:
- 6578424616a5eefb751d5e3e155adba6
- Filesize:
- 8.63 KB
- suspicious functions used:
- `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:25);shell_exec (line:32);
$rff11=mysqli_query($con, "SELECT olt_pon_id AS pon_port FROM `olt_pon` WHERE olt_id = '$olt_id' AND `pon_name` LIKE '$pon_portt'");shell_exec (line:45);$outputs = shell_exec($commanda);`network_tree` WHERE onu_index_id = '$port_onu_index_id' AND ` (line:49);$output = shell_exec($command);shell_exec (line:81);$rff11d=mysqli_query($con, "SELECT onu_name, onu_index, onu_index_id, onu_mac FROM `network_tree` WHERE onu_index_id = '$port_onu_index_id' AND `olt_id` = '$olt_id'");shell_exec (line:104);$outputs = shell_exec($commanda);shell_exec (line:123);$output = shell_exec($command);shell_exec (line:144);$outputs = shell_exec($commanda);shell_exec (line:162);$output = shell_exec($command);shell_exec (line:171);$od_vdlan = shell_exec($commanda . " 2>&1");shell_exec (line:185);$od_vdland = shell_exec($coddvland . " 2>&1");$outputs = shell_exec($coddvladnd . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: networktree_device_pon_port_sense_list.php-
- Full path:
- arc/web/networktree_device_pon_port_sense_list.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:40 12/12/2025
- Last modified:
- 17:47:04 03/06/2025
- MD5 hash:
- 4d80475d2f31f38e21239a5a1a19285f
- Filesize:
- 3.7 KB
- suspicious functions used:
- `network_tree` WHERE `onu_mac` = '$onu_mac' AND ` (line:26);`network_tree` WHERE `c_id` = '{$dfhbdxf}' AND ` (line:72);
$reu1d1=mysqli_query($con, "SELECT tree_id AS router_parant_id FROM `network_tree` WHERE `onu_mac` = '$onu_mac' AND `sts` = '0'");$reu11=mysqli_query($con, "SELECT count(c_id) AS client_count FROM `network_tree` WHERE `c_id` = '{$dfhbdxf}' AND `sts` = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: networktree_device_type.php-
- Full path:
- arc/web/networktree_device_type.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:40 12/12/2025
- Last modified:
- 17:47:04 03/06/2025
- MD5 hash:
- f1520732e5a3ef38564238a3278a1f63
- Filesize:
- 11.43 KB
- suspicious functions used:
- `tree_id`) AS countolt FROM `network_tree` WHERE `olt_id` = '$olt_id_sure' AND ` (line:64);
$resu11=mysql_query("SELECT COUNT(`tree_id`) AS countolt FROM `network_tree` WHERE `olt_id` = '$olt_id_sure' AND `device_type` = '1' AND sts = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: olt_all_onu_mac.php-
- Full path:
- arc/web/olt_all_onu_mac.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:40 12/12/2025
- Last modified:
- 17:47:04 03/06/2025
- MD5 hash:
- bde00602b98fba3ce9f7669b0d6f0fa3
- Filesize:
- 4.56 KB
- suspicious functions used:
- shell_exec (line:22);shell_exec (line:38);
$oddutpdut = shell_exec($cmandd . " 2>&1");shell_exec (line:57);$output_port = shell_exec($commandd_bdcom);$output = shell_exec($command . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentOnlineQuery.php-
- Full path:
- arc/web/PaymentOnlineQuery.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 04:44:40 12/12/2025
- Last modified:
- 17:47:12 03/06/2025
- MD5 hash:
- 6a845f0e20c434c12eb30f42726f268d
- Filesize:
- 28.37 KB
- suspicious functions used:
- curl_exec (line:457);curl_exec (line:669);
$resultdata=curl_exec($url);$content = curl_exec($handle ); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentOnlineQuery2.php-
- Full path:
- arc/web/PaymentOnlineQuery2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:41 12/12/2025
- Last modified:
- 17:47:12 03/06/2025
- MD5 hash:
- ccd315d11a60901b7b9029ff44f8351b
- Filesize:
- 19.4 KB
- suspicious functions used:
- curl_exec (line:42);curl_exec (line:252);
$resultdatax=curl_exec($url);$result = curl_exec($handle); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentWebhook.php-
- Full path:
- arc/web/PaymentWebhook.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:41 12/12/2025
- Last modified:
- 17:47:12 03/06/2025
- MD5 hash:
- a2f322c94787630ab1e0c8ca35fc5ba1
- Filesize:
- 18.6 KB
- suspicious functions used:
- base64_decode (line:30);curl_exec (line:41);
$signatureDecoded = base64_decode($signature);curl_exec (line:422);curl_exec($url);$data = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: SignUp1.php-
- Full path:
- arc/web/SignUp1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:41 12/12/2025
- Last modified:
- 17:47:21 03/06/2025
- MD5 hash:
- 22cdaf528a51aa44652f81cc911a85fa
- Filesize:
- 26.63 KB
- suspicious functions used:
- curl_exec (line:53);curl_exec (line:75);
$jsona = curl_exec($ch10);$resdfwedf = curl_exec($ch1s); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: sms-balance-check.php-
- Full path:
- arc/web/sms-balance-check.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 17:04:54 12/12/2025
- Last modified:
- 17:47:21 03/06/2025
- MD5 hash:
- 76d6e591039b8f16382220fec77cd3d7
- Filesize:
- 984 B
- suspicious functions used:
- curl_exec (line:15);
$balance = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: SMS.php-
- Full path:
- arc/web/SMS.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:42 12/12/2025
- Last modified:
- 20:13:49 13/10/2025
- MD5 hash:
- a4b9558edc4422488558d72c3203040c
- Filesize:
- 38.13 KB
- suspicious functions used:
- curl_exec (line:56);
$balance = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: SMS1.php-
- Full path:
- arc/web/SMS1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:42 12/12/2025
- Last modified:
- 17:47:22 03/06/2025
- MD5 hash:
- e4671dadf9ad575671fd3609a60030da
- Filesize:
- 32.19 KB
- suspicious functions used:
- curl_exec (line:59);
$balance = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: SMSAddSave.php-
- Full path:
- arc/web/SMSAddSave.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:42 12/12/2025
- Last modified:
- 17:47:22 03/06/2025
- MD5 hash:
- 0d2d0548df5f32e69264c4f2f1b1f76e
- Filesize:
- 2.12 KB
- suspicious functions used:
- curl_exec (line:35);
$result = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: sms_deliverey_report.php-
- Full path:
- arc/web/sms_deliverey_report.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 03:05:09 12/12/2025
- Last modified:
- 17:47:25 03/06/2025
- MD5 hash:
- 03623943da7e9334e137b38c8577fc84
- Filesize:
- 4.25 KB
- suspicious functions used:
- curl_exec (line:28);curl_exec (line:53);
$result11 = curl_exec($ch1);curl_exec (line:90);$resultdd = curl_exec($ch);$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: support-action.php-
- Full path:
- arc/web/support-action.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:42 12/12/2025
- Last modified:
- 17:47:25 03/06/2025
- MD5 hash:
- b8c8c56826a0a8e027a23e6a365c70a0
- Filesize:
- 14.54 KB
- suspicious functions used:
- curl_exec (line:220);
$jsona = curl_exec($ch10); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tagreeexpayment.php-
- Full path:
- arc/web/tagreeexpayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 04:44:23 12/12/2025
- Last modified:
- 17:47:28 03/06/2025
- MD5 hash:
- 029b4fba649a75c7c81d2f8931be8d63
- Filesize:
- 2.86 KB
- suspicious functions used:
- curl_exec (line:26);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tcreateagree.php-
- Full path:
- arc/web/tcreateagree.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 04:43:27 12/12/2025
- Last modified:
- 17:47:28 03/06/2025
- MD5 hash:
- 27a10adf4190edc7eceee8cf74a6b72b
- Filesize:
- 999 B
- suspicious functions used:
- curl_exec (line:26);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tcreatepayment.php-
- Full path:
- arc/web/tcreatepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:42 12/12/2025
- Last modified:
- 17:47:28 03/06/2025
- MD5 hash:
- e49de9a33f5164bc2c6b88e4770faaff
- Filesize:
- 1.07 KB
- suspicious functions used:
- curl_exec (line:27);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: test2.php-
- Full path:
- arc/web/test2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:42 12/12/2025
- Last modified:
- 17:47:28 03/06/2025
- MD5 hash:
- ab80d92ede21b7da59bfefb325484297
- Filesize:
- 13.76 KB
- suspicious functions used:
- shell_exec (line:59);shell_exec (line:70);
$output = shell_exec($command);shell_exec (line:76);$output1 = shell_exec($command1);shell_exec (line:88);$output2 = shell_exec($command2);shell_exec (line:101);$output_vdlan = shell_exec($command_dvlan . " 2>&1");shell_exec (line:141);$output_vdlan = shell_exec($command_dvlan . " 2>&1");curl_exec (line:187);$output_vdlanf = shell_exec($command_dvlan . " 2>&1");curl_exec (line:212);$result11 = curl_exec($ch3);curl_exec (line:354);$response = curl_exec($ch);$result11 = curl_exec($ch3); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: test6.php-
- Full path:
- arc/web/test6.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:42 12/12/2025
- Last modified:
- 17:47:28 03/06/2025
- MD5 hash:
- f22d022ddc284f4d8e1de3660da91db8
- Filesize:
- 15.61 KB
- suspicious functions used:
- shell_exec (line:34);shell_exec (line:113);
$outputs = shell_exec($snmpCommand);shell_exec (line:126);$outpdduts = shell_exec($sand);shell_exec (line:132);$outputsmac = shell_exec($snmpCommandmac);$output_vlan = shell_exec($command_vlan . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: test7.php-
- Full path:
- arc/web/test7.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:42 12/12/2025
- Last modified:
- 17:47:28 03/06/2025
- MD5 hash:
- b11ccf951ce63a21ea0a7328316a0e5c
- Filesize:
- 1.57 KB
- suspicious functions used:
- curl_exec (line:14);
$result1dd = curl_exec($ch111); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: test8.php-
- Full path:
- arc/web/test8.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:42 12/12/2025
- Last modified:
- 17:47:28 03/06/2025
- MD5 hash:
- 0da20f06359cae632ac4b808ab2eee77
- Filesize:
- 3.65 KB
- suspicious functions used:
- shell_exec (line:48);
$output = shell_exec($snmpCommand); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: test9.php-
- Full path:
- arc/web/test9.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:42 12/12/2025
- Last modified:
- 17:47:28 03/06/2025
- MD5 hash:
- 87b5d5bf52fb36a8ccea006021ec8820
- Filesize:
- 7.17 KB
- suspicious functions used:
- shell_exec (line:44);shell_exec (line:69);
$oudddputsd = shell_exec($commddanda . " 2>&1");shell_exec (line:81);$oudddputsd = shell_exec($commddanda . " 2>&1");shell_exec (line:104);$oudddputsd = shell_exec($commddanda . " 2>&1");shell_exec (line:126);$outputS = shell_exec($commandS . " 2>&1");shell_exec (line:140);$output = shell_exec($command);shell_exec (line:153);$output = shell_exec($command . " 2>&1");shell_exec (line:165);$outputs = shell_exec($commanda);shell_exec (line:171);$outpdut = shell_exec($commandd . " 2>&1");$oddutpdut = shell_exec($cmandd . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: testttttt.php-
- Full path:
- arc/web/testttttt.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:42 12/12/2025
- Last modified:
- 17:47:28 03/06/2025
- MD5 hash:
- b1988a4be29e191ad935fb409a4174ee
- Filesize:
- 2 KB
- suspicious functions used:
- curl_exec (line:47);
$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: texecutepayment.php-
- Full path:
- arc/web/texecutepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 04:44:39 12/12/2025
- Last modified:
- 17:47:28 03/06/2025
- MD5 hash:
- 623635fdf5c871391d3a5fe99ee8c543
- Filesize:
- 2.91 KB
- suspicious functions used:
- curl_exec (line:24);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: time.php-
- Full path:
- arc/web/time.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:42 12/12/2025
- Last modified:
- 17:47:29 03/06/2025
- MD5 hash:
- f72a880b38cb26f3d208bfe99eec1633
- Filesize:
- 5.25 KB
- suspicious functions used:
- `${formatDistance(totalDistance)}` (line:121);`${Math.round(distance)} m`, `${(distance / 1000).toFixed(2)} km` (line:150);
text: `${formatDistance(totalDistance)}`,return distance < 1000 ? `${Math.round(distance)} m` : `${(distance / 1000).toFixed(2)} km`; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tis-news.php-
- Full path:
- arc/web/tis-news.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 17:04:54 12/12/2025
- Last modified:
- 17:47:29 03/06/2025
- MD5 hash:
- ed23ca98b77c5321b4485e85eb2ea64d
- Filesize:
- 3.67 KB
- suspicious functions used:
- curl_exec (line:22);
$alldata1 = curl_exec($chhhh1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: token.php-
- Full path:
- arc/web/token.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:42 12/12/2025
- Last modified:
- 17:47:29 03/06/2025
- MD5 hash:
- 7d8e71ceda3ffb74623e0c4a814715af
- Filesize:
- 1.53 KB
- suspicious functions used:
- curl_exec (line:42);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tt.php-
- Full path:
- arc/web/tt.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:42 12/12/2025
- Last modified:
- 17:47:30 03/06/2025
- MD5 hash:
- 9c4ed141cb79fdc7e807b35923c91a20
- Filesize:
- 1.56 KB
- suspicious functions used:
- curl_exec (line:30);
$response = curl_exec($curl); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ttoken.php-
- Full path:
- arc/web/ttoken.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 18:18:01 12/12/2025
- Last modified:
- 17:47:30 03/06/2025
- MD5 hash:
- 5f2c51c1db5b0defadfb67ce25c0098f
- Filesize:
- 1.54 KB
- suspicious functions used:
- curl_exec (line:42);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: UserAccess.php-
- Full path:
- arc/web/UserAccess.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:42 12/12/2025
- Last modified:
- 17:47:31 03/06/2025
- MD5 hash:
- a3c12b17bcb2c8035cfa045807797ae6
- Filesize:
- 10.45 KB
- suspicious functions used:
- `.modulecheckboxx[data-group="${group}"]` (line:159);
document.querySelectorAll(`.modulecheckboxx[data-group="${group}"]`).forEach(box => { - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: UserLoginReport.php-
- Full path:
- arc/web/UserLoginReport.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:43 12/12/2025
- Last modified:
- 17:47:32 03/06/2025
- MD5 hash:
- 43d95cc2a57279f23f52d11581c9427f
- Filesize:
- 7.76 KB
- suspicious functions used:
- curl_exec (line:120);
$foundornot = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: webhook.php-
- Full path:
- arc/web/webhook.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:43 12/12/2025
- Last modified:
- 17:47:32 03/06/2025
- MD5 hash:
- 69a88ae1be0ab3ab1c7c971c72c0b025
- Filesize:
- 21.93 KB
- suspicious functions used:
- base64_decode (line:28);curl_exec (line:39);
$signatureDecoded = base64_decode($signature);curl_exec (line:465);curl_exec($url);$data = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: webhook_cid.php-
- Full path:
- arc/web/webhook_cid.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:43 12/12/2025
- Last modified:
- 17:47:32 03/06/2025
- MD5 hash:
- 1a2672fc0dd81a9c831e3fa60ec860e1
- Filesize:
- 21.52 KB
- suspicious functions used:
- base64_decode (line:29);curl_exec (line:40);
$signatureDecoded = base64_decode($signature);curl_exec (line:439);curl_exec($url);$data = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: webhook_test.php-
- Full path:
- arc/web/webhook_test.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:43 12/12/2025
- Last modified:
- 17:47:32 03/06/2025
- MD5 hash:
- 74a7dcc262d7fe7f2bdc9e0595d03837
- Filesize:
- 4.69 KB
- suspicious functions used:
- base64_decode (line:22);curl_exec (line:33);
$signatureDecoded = base64_decode($signature);curl_exec (line:86);curl_exec($url);curl_exec (line:107);$result = curl_exec($ch);$data = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: createpayment.php-
- Full path:
- arc/web/bkasht/createpayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:43 12/12/2025
- Last modified:
- 17:47:37 03/06/2025
- MD5 hash:
- a4ba6e7683f558dc3602dacd7ddeded2
- Filesize:
- 1.36 KB
- suspicious functions used:
- curl_exec (line:29);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: executepayment.php-
- Full path:
- arc/web/bkasht/executepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:43 12/12/2025
- Last modified:
- 17:47:37 03/06/2025
- MD5 hash:
- aad462fbca9f9a36649a197d67403098
- Filesize:
- 1.27 KB
- suspicious functions used:
- curl_exec (line:26);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: grant.php-
- Full path:
- arc/web/bkasht/grant.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:43 12/12/2025
- Last modified:
- 17:47:37 03/06/2025
- MD5 hash:
- da5499d260dc78ea4fcd71227cc6c484
- Filesize:
- 2.01 KB
- suspicious functions used:
- curl_exec (line:41);curl_exec (line:63);
$resultdata=curl_exec($url);$response = curl_exec($curl); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: query.php-
- Full path:
- arc/web/bkasht/query.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:43 12/12/2025
- Last modified:
- 17:47:37 03/06/2025
- MD5 hash:
- f3ed9045f3a073e2cdc8561d500bda89
- Filesize:
- 1.65 KB
- suspicious functions used:
- curl_exec (line:33);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: token.php-
- Full path:
- arc/web/bkasht/token.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:43 12/12/2025
- Last modified:
- 17:47:37 03/06/2025
- MD5 hash:
- f50b33eeb31927b2c081195618d48b8d
- Filesize:
- 1.88 KB
- suspicious functions used:
- curl_exec (line:48);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: trxID.php-
- Full path:
- arc/web/bkasht/trxID.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:43 12/12/2025
- Last modified:
- 17:47:37 03/06/2025
- MD5 hash:
- 9bcb8e70728fd25807c4db8916166d74
- Filesize:
- 1.44 KB
- suspicious functions used:
- curl_exec (line:31);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: class.phpmailer.php-
- Full path:
- arc/web/email/class.phpmailer.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:43 12/12/2025
- Last modified:
- 17:47:38 03/06/2025
- MD5 hash:
- 68468d69b47fffecc89df57e27c5a781
- Filesize:
- 143.32 KB
- suspicious functions used:
- `$DKIM_private` (line:428);popen (line:1387);
* If set, takes precedence over `$DKIM_private`.popen (line:1408);if (!@$mail = popen($sendmail, 'w')) {base64_decode (line:3410);if (!@$mail = popen($sendmail, 'w')) {`$mail->set('SMTPSecure', 'tls');` (line:3688);$data = base64_decode($data);`$mail->SMTPSecure = 'tls';` (line:3690);* `$mail->set('SMTPSecure', 'tls');`* `$mail->SMTPSecure = 'tls';` - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: class.smtp.php-
- Full path:
- arc/web/email/class.smtp.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:44 12/12/2025
- Last modified:
- 17:47:38 03/06/2025
- MD5 hash:
- aa8478329268e5438a4469c268337a10
- Filesize:
- 41.44 KB
- suspicious functions used:
- base64_decode (line:513);base64_decode (line:533);
$challenge = base64_decode($challenge);$challenge = base64_decode(substr($this->last_reply, 4)); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: jqgrid.php-
- Full path:
- arc/web/inc/jqgrid.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:44 12/12/2025
- Last modified:
- 17:47:44 03/06/2025
- MD5 hash:
- 71027a29e71e0626d8b57cbb631e6d98
- Filesize:
- 23.92 KB
- suspicious functions used:
- eval (line:397);
if (!empty($V4a8a08f0["condition"])) eval("\$V4b43b0ae = ".$V4a8a08f0["condition"].";"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: JSON.php-
- Full path:
- arc/web/inc/JSON.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:44 12/12/2025
- Last modified:
- 17:47:44 03/06/2025
- MD5 hash:
- f5a34509e06231308becbe320ade9ff6
- Filesize:
- 33.22 KB
- suspicious functions used:
- eval (line:22);
* Javascript, and can be directly eval()'ed with no further parsing - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: smsapicore.php-
- Full path:
- arc/web/include/smsapicore.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 04:44:40 12/12/2025
- Last modified:
- 20:13:47 13/10/2025
- MD5 hash:
- 12443208d9b75ed7fe63016e5ce6fe97
- Filesize:
- 1.66 KB
- suspicious functions used:
- curl_exec (line:36);curl_exec (line:48);
$resultdgfddb = curl_exec($chgg);$resultdgfb = curl_exec($chg); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: telegramapicore.php-
- Full path:
- arc/web/include/telegramapicore.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:45 12/12/2025
- Last modified:
- 17:47:45 03/06/2025
- MD5 hash:
- 511f56e6dfcf4e9e7a11259e023ca3ae
- Filesize:
- 3.15 KB
- suspicious functions used:
- curl_exec (line:68);
$result11 = curl_exec($ch3); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ui.php-
- Full path:
- arc/web/js/tinymce/themes/advanced/skins/highcontrast/ui.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 15:35:31 12/12/2025
- Last modified:
- 17:48:05 03/06/2025
- MD5 hash:
- 3edaf67be8573b86686f46bbba4f058c
- Filesize:
- 4.53 KB
- suspicious functions used:
- curl_exec (line:20);`bill_amount` = '0.00' WHERE bill_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY ` (line:53);
$alldataa = curl_exec($chxchhh);`bill_amount` = '0.00', days = '0.00' WHERE entry_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY ` (line:54);$queryss = mysql_query("UPDATE billing SET `bill_amount` = '0.00' WHERE bill_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY `id` DESC LIMIT 5");`payment` WHERE `pay_date` < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND pay_amount != '0.00' ORDER BY ` (line:55);$sqlqmss = mysql_query("UPDATE billing_mac SET `bill_amount` = '0.00', days = '0.00' WHERE entry_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY `id` DESC LIMIT 5");curl_exec (line:146);$sqlqmsp = mysql_query("DELETE FROM `payment` WHERE `pay_date` < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND pay_amount != '0.00' ORDER BY `id` ASC LIMIT 5");curl_exec (line:168);$responsed = curl_exec($curld);$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Changes.txt-
- Full path:
- arc/web/js/jqgrid/js/Changes.txt
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:45 12/12/2025
- Last modified:
- 17:47:57 03/06/2025
- MD5 hash:
- c0a4adbc3f1c6d592cb4fa8433fee9ea
- Filesize:
- 44.32 KB
- suspicious functions used:
- system (line:87);
* Add a ant based build system which allow us to minify the JS code - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Changes.txt-
- Full path:
- an/m/js/jqgrid/js/Changes.txt
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:45 12/12/2025
- Last modified:
- 02:12:58 27/08/2023
- MD5 hash:
- c0a4adbc3f1c6d592cb4fa8433fee9ea
- Filesize:
- 44.32 KB
- suspicious functions used:
- system (line:87);
* Add a ant based build system which allow us to minify the JS code - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: token.php-
- Full path:
- an/m/token.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:45 12/12/2025
- Last modified:
- 02:12:02 27/08/2023
- MD5 hash:
- 7d8e71ceda3ffb74623e0c4a814715af
- Filesize:
- 1.53 KB
- suspicious functions used:
- curl_exec (line:42);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentOnlineQuery.php-
- Full path:
- an/m/PaymentOnlineQuery.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 11:46:57 12/12/2025
- Last modified:
- 02:12:01 27/08/2023
- MD5 hash:
- 5e63b1f647ca3509509beda8102d5c40
- Filesize:
- 16.65 KB
- suspicious functions used:
- curl_exec (line:287);curl_exec (line:382);
$resultdata=curl_exec($url);$content = curl_exec($handle ); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ttoken.php-
- Full path:
- an/m/ttoken.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 04:54:11 12/12/2025
- Last modified:
- 02:12:02 27/08/2023
- MD5 hash:
- 5f2c51c1db5b0defadfb67ce25c0098f
- Filesize:
- 1.54 KB
- suspicious functions used:
- curl_exec (line:42);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: createpayment.php-
- Full path:
- an/m/createpayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:46 12/12/2025
- Last modified:
- 02:12:00 27/08/2023
- MD5 hash:
- 05132f436e56ff2164ecc165347219ae
- Filesize:
- 1.71 KB
- suspicious functions used:
- curl_exec (line:57);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: executepayment.php-
- Full path:
- an/m/executepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:46 12/12/2025
- Last modified:
- 02:12:00 27/08/2023
- MD5 hash:
- 9a3f22521ad987e86f84c4f5f688d5b7
- Filesize:
- 713 B
- suspicious functions used:
- curl_exec (line:18);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: index.php-
- Full path:
- an/m/index.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 02:32:49 12/12/2025
- Last modified:
- 23:30:25 03/10/2023
- MD5 hash:
- 488549d8551f66f872c47e45201ee5b7
- Filesize:
- 11.85 KB
- suspicious functions used:
- base64_decode (line:10);curl_exec (line:206);
list($encrypted_data,$iv,$key) = explode('::',base64_decode($ciphertext));$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: login_exec.php-
- Full path:
- an/m/login_exec.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:46 12/12/2025
- Last modified:
- 06:36:19 01/03/2024
- MD5 hash:
- 1f800365ef270564df77d30c1bfd7ed3
- Filesize:
- 5.4 KB
- suspicious functions used:
- curl_exec (line:66);
$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: login_exec1.php-
- Full path:
- an/m/login_exec1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:46 12/12/2025
- Last modified:
- 02:12:00 27/08/2023
- MD5 hash:
- 4ab4155763d3c6a8ea772996a5765a94
- Filesize:
- 4.28 KB
- suspicious functions used:
- curl_exec (line:61);
$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentOnlineQuery2.php-
- Full path:
- an/m/PaymentOnlineQuery2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:46 12/12/2025
- Last modified:
- 02:12:01 27/08/2023
- MD5 hash:
- 48588dfbb812b9e8102af40dc401032c
- Filesize:
- 19.04 KB
- suspicious functions used:
- curl_exec (line:41);curl_exec (line:254);
$resultdatax=curl_exec($url);$result = curl_exec($handle); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tagreeexpayment.php-
- Full path:
- an/m/tagreeexpayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 13:20:34 12/12/2025
- Last modified:
- 02:12:02 27/08/2023
- MD5 hash:
- c95e3ee881752db67b4f3597bc58430a
- Filesize:
- 2.46 KB
- suspicious functions used:
- curl_exec (line:26);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tcreateagree.php-
- Full path:
- an/m/tcreateagree.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 13:20:14 12/12/2025
- Last modified:
- 02:12:02 27/08/2023
- MD5 hash:
- 27a10adf4190edc7eceee8cf74a6b72b
- Filesize:
- 999 B
- suspicious functions used:
- curl_exec (line:26);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tcreatepayment.php-
- Full path:
- an/m/tcreatepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 04:54:59 12/12/2025
- Last modified:
- 02:12:02 27/08/2023
- MD5 hash:
- e49de9a33f5164bc2c6b88e4770faaff
- Filesize:
- 1.07 KB
- suspicious functions used:
- curl_exec (line:27);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: texecutepayment.php-
- Full path:
- an/m/texecutepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 04:55:09 12/12/2025
- Last modified:
- 02:12:02 27/08/2023
- MD5 hash:
- efbb63dfcfdacb52dec74bffc389bbb3
- Filesize:
- 2.67 KB
- suspicious functions used:
- curl_exec (line:24);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: class.phpmailer.php-
- Full path:
- an/web/email/class.phpmailer.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:47 12/12/2025
- Last modified:
- 02:13:36 27/08/2023
- MD5 hash:
- 68468d69b47fffecc89df57e27c5a781
- Filesize:
- 143.32 KB
- suspicious functions used:
- `$DKIM_private` (line:428);popen (line:1387);
* If set, takes precedence over `$DKIM_private`.popen (line:1408);if (!@$mail = popen($sendmail, 'w')) {base64_decode (line:3410);if (!@$mail = popen($sendmail, 'w')) {`$mail->set('SMTPSecure', 'tls');` (line:3688);$data = base64_decode($data);`$mail->SMTPSecure = 'tls';` (line:3690);* `$mail->set('SMTPSecure', 'tls');`* `$mail->SMTPSecure = 'tls';` - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: class.smtp.php-
- Full path:
- an/web/email/class.smtp.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:47 12/12/2025
- Last modified:
- 02:13:36 27/08/2023
- MD5 hash:
- aa8478329268e5438a4469c268337a10
- Filesize:
- 41.44 KB
- suspicious functions used:
- base64_decode (line:513);base64_decode (line:533);
$challenge = base64_decode($challenge);$challenge = base64_decode(substr($this->last_reply, 4)); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: JSON.php-
- Full path:
- an/web/inc/JSON.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:48 12/12/2025
- Last modified:
- 02:13:40 27/08/2023
- MD5 hash:
- f5a34509e06231308becbe320ade9ff6
- Filesize:
- 33.22 KB
- suspicious functions used:
- eval (line:22);
* Javascript, and can be directly eval()'ed with no further parsing - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: jqgrid.php-
- Full path:
- an/web/inc/jqgrid.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:48 12/12/2025
- Last modified:
- 02:14:00 27/08/2023
- MD5 hash:
- 71027a29e71e0626d8b57cbb631e6d98
- Filesize:
- 23.92 KB
- suspicious functions used:
- eval (line:397);
if (!empty($V4a8a08f0["condition"])) eval("\$V4b43b0ae = ".$V4a8a08f0["condition"].";"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: smsapicore.php-
- Full path:
- an/web/include/smsapicore.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 12:02:13 12/12/2025
- Last modified:
- 06:09:56 01/03/2024
- MD5 hash:
- 0afbabc581e2e88f2883e249f83847a4
- Filesize:
- 891 B
- suspicious functions used:
- curl_exec (line:13);
$resultdgfb = curl_exec($chg); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: telegramapicore.php-
- Full path:
- an/web/include/telegramapicore.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 16:28:28 12/12/2025
- Last modified:
- 02:13:40 27/08/2023
- MD5 hash:
- c669b81806a80fae7f84959c253cc737
- Filesize:
- 2.44 KB
- suspicious functions used:
- curl_exec (line:54);
$result11 = curl_exec($ch3); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Changes.txt-
- Full path:
- an/web/js/jqgrid/js/Changes.txt
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:48 12/12/2025
- Last modified:
- 02:13:55 27/08/2023
- MD5 hash:
- c0a4adbc3f1c6d592cb4fa8433fee9ea
- Filesize:
- 44.32 KB
- suspicious functions used:
- system (line:87);
* Add a ant based build system which allow us to minify the JS code - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: AutoActiveClientsCount1.php-
- Full path:
- an/web/AutoActiveClientsCount1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 13:24:24 12/12/2025
- Last modified:
- 00:47:49 01/11/2023
- MD5 hash:
- f0219eb658570bd65b6ba7a76957f471
- Filesize:
- 4.36 KB
- suspicious functions used:
- system (line:52);
$ARRAY = $API->comm("/system/resource/print"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Network.php-
- Full path:
- an/web/Network.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:51 12/12/2025
- Last modified:
- 02:13:23 27/08/2023
- MD5 hash:
- 53a3aa3ebd6ffd1176e0bde0e6e254f0
- Filesize:
- 22.76 KB
- suspicious functions used:
- system (line:208);
$ARRAY = $API->comm("/system/resource/print"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: InstrumentsStoreOutDetails.php-
- Full path:
- an/web/InstrumentsStoreOutDetails.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:51 12/12/2025
- Last modified:
- 02:13:20 27/08/2023
- MD5 hash:
- ab68ab13bcfd51da15e72a3d4e9817e8
- Filesize:
- 9.37 KB
- suspicious functions used:
- `update_date`, '%D-%b, %y') AS offdate, TIME_FORMAT(`update_time`, '%T') AS offtime FROM `con_sts_log` WHERE `c_id` = '{$row['c_id']}' AND con_sts = 'Inactive' ORDER BY ` (line:120);
$resultwwdd=mysql_query("SELECT DATE_FORMAT(`update_date`, '%D-%b, %y') AS offdate, TIME_FORMAT(`update_time`, '%T') AS offtime FROM `con_sts_log` WHERE `c_id` = '{$row['c_id']}' AND con_sts = 'Inactive' ORDER BY `update_date_time` DESC LIMIT 1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkLoad.php-
- Full path:
- an/web/NetworkLoad.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:51 12/12/2025
- Last modified:
- 02:13:24 27/08/2023
- MD5 hash:
- e1632e66ee1b7394d3fb82751b924abe
- Filesize:
- 2.83 KB
- suspicious functions used:
- system (line:81);
$ARRAY = $API->comm("/system/resource/print"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentWebhook.php-
- Full path:
- an/web/PaymentWebhook.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:51 12/12/2025
- Last modified:
- 08:32:04 01/03/2024
- MD5 hash:
- a2f322c94787630ab1e0c8ca35fc5ba1
- Filesize:
- 18.6 KB
- suspicious functions used:
- base64_decode (line:30);curl_exec (line:41);
$signatureDecoded = base64_decode($signature);curl_exec (line:422);curl_exec($url);$data = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: SMS.php-
- Full path:
- an/web/SMS.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:51 12/12/2025
- Last modified:
- 04:05:02 13/10/2023
- MD5 hash:
- bf70b20b52d2d20d1512a07ea29510d0
- Filesize:
- 29 KB
- suspicious functions used:
- curl_exec (line:53);
$balance = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentOnlineQuery.php-
- Full path:
- an/web/PaymentOnlineQuery.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 15:28:35 12/12/2025
- Last modified:
- 02:13:26 27/08/2023
- MD5 hash:
- eb93c751e05e717a544d27f8dd6ef768
- Filesize:
- 23.99 KB
- suspicious functions used:
- curl_exec (line:456);curl_exec (line:560);
$resultdata=curl_exec($url);$content = curl_exec($handle ); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentOnlineQuery2.php-
- Full path:
- an/web/PaymentOnlineQuery2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:53 12/12/2025
- Last modified:
- 02:13:26 27/08/2023
- MD5 hash:
- 138b87d49f0613b02cb61abace637606
- Filesize:
- 19.39 KB
- suspicious functions used:
- curl_exec (line:43);curl_exec (line:253);
$resultdatax=curl_exec($url);$result = curl_exec($handle); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: SMSAddSave.php-
- Full path:
- an/web/SMSAddSave.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:53 12/12/2025
- Last modified:
- 02:13:30 27/08/2023
- MD5 hash:
- 5e8b43b3bc2febe3a611a5bd9aa8fc28
- Filesize:
- 1.71 KB
- suspicious functions used:
- curl_exec (line:34);
$result = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: emp_salary_advence_find.php-
- Full path:
- an/web/emp_salary_advence_find.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:54 12/12/2025
- Last modified:
- 02:13:19 27/08/2023
- MD5 hash:
- 8cb12a79d5e1d31d92670d721dabb5aa
- Filesize:
- 2.25 KB
- suspicious functions used:
- `expanse` WHERE `type` = '2' AND `status` = '2' AND ex_by = '$e_id' AND MONTH(`, `) = MONTH('$lastmonth') AND YEAR(`, `) = YEAR('$lastmonth') GROUP BY ` (line:8);`e_id` = '$e_id' AND ` (line:12);
$vendorrr = mysql_query("SELECT SUM(amount) AS salary_advance FROM `expanse` WHERE `type` = '2' AND `status` = '2' AND ex_by = '$e_id' AND MONTH(`check_date`) = MONTH('$lastmonth') AND YEAR(`check_date`) = YEAR('$lastmonth') GROUP BY `ex_by`");$empppp = mysql_query("SELECT gross_total AS gross_total FROM emp_info WHERE `e_id` = '$e_id' AND `status` = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: company_info.php-
- Full path:
- an/web/company_info.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 12:38:50 12/12/2025
- Last modified:
- 13:01:07 09/04/2024
- MD5 hash:
- 6760a9ee088b4b5dfaad69ff7c1100e0
- Filesize:
- 7.51 KB
- suspicious functions used:
- curl_exec (line:119);
$alldata = curl_exec($chhhh); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: createpayment.php-
- Full path:
- an/web/createpayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:54 12/12/2025
- Last modified:
- 02:13:18 27/08/2023
- MD5 hash:
- c8a7ce9b69ebed3509cee2952c04cb0c
- Filesize:
- 1.7 KB
- suspicious functions used:
- curl_exec (line:57);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_all.php-
- Full path:
- an/web/cron_all.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:54 12/12/2025
- Last modified:
- 08:04:17 01/03/2024
- MD5 hash:
- b19a08fef36584598cca299b7ecc5e6d
- Filesize:
- 2.07 KB
- suspicious functions used:
- curl_exec (line:23);curl_exec (line:38);
$result1 = curl_exec($ch1);curl_exec (line:53);$result1d = curl_exec($ch11);$result1d2 = curl_exec($ch112); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: imagevwr.php-
- Full path:
- an/web/imagevwr.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 06:37:44 12/12/2025
- Last modified:
- 07:19:17 25/05/2024
- MD5 hash:
- 47a223a13cc642d01dcfaaca542d396d
- Filesize:
- 915 B
- suspicious functions used:
- curl_exec (line:15);
$image_data = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_gen_bill.php-
- Full path:
- an/web/cron_auto_gen_bill.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:54 12/12/2025
- Last modified:
- 08:04:51 01/03/2024
- MD5 hash:
- eadec12eb6484d0069e5d0d320725a75
- Filesize:
- 4.73 KB
- suspicious functions used:
- curl_exec (line:140);curl_exec (line:149);
$respd = curl_exec($curl);$resp = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_inactive.php-
- Full path:
- an/web/cron_auto_inactive.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 04:15:02 12/12/2025
- Last modified:
- 08:05:50 01/03/2024
- MD5 hash:
- 288e83bc1578b0992ae1ab75eb328bc2
- Filesize:
- 5.75 KB
- suspicious functions used:
- curl_exec (line:151);
$respw = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_inactive2.php-
- Full path:
- an/web/cron_auto_inactive2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:54 12/12/2025
- Last modified:
- 02:13:19 27/08/2023
- MD5 hash:
- a6a713d414c4e0632f4fe69f68b77d53
- Filesize:
- 6.28 KB
- suspicious functions used:
- curl_exec (line:158);
$respw = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: executepayment.php-
- Full path:
- an/web/executepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:54 12/12/2025
- Last modified:
- 02:13:19 27/08/2023
- MD5 hash:
- c46a50905333286f45dfeacf010851ab
- Filesize:
- 716 B
- suspicious functions used:
- curl_exec (line:18);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_inactive_termination.php-
- Full path:
- an/web/cron_auto_inactive_termination.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 18:12:01 12/12/2025
- Last modified:
- 12:17:52 23/09/2024
- MD5 hash:
- ee38a77a78391fe4323d470248cff87d
- Filesize:
- 6.81 KB
- suspicious functions used:
- curl_exec (line:124);curl_exec (line:142);
$resp = curl_exec($curlss);$respw = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_termination_remainder1.php-
- Full path:
- an/web/cron_auto_termination_remainder1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:54 12/12/2025
- Last modified:
- 08:31:04 01/03/2024
- MD5 hash:
- 9fd6a3aa4bc5fc43cf8b40b9c4ff19b6
- Filesize:
- 3.23 KB
- suspicious functions used:
- curl_exec (line:83);
$respw = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_client_bandwidth_count.php-
- Full path:
- an/web/cron_client_bandwidth_count.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 09:33:55 12/12/2025
- Last modified:
- 22:13:58 01/04/2024
- MD5 hash:
- de3b1389261cf5411b7e7ca5c44f96b2
- Filesize:
- 4.08 KB
- suspicious functions used:
- curl_exec (line:117);
$result = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_network.php-
- Full path:
- an/web/cron_network.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:54 12/12/2025
- Last modified:
- 02:13:19 27/08/2023
- MD5 hash:
- d7ae8ca3db81dce0960bb9840cb5aeee
- Filesize:
- 4.14 KB
- suspicious functions used:
- curl_exec (line:41);curl_exec (line:59);
$result1d = curl_exec($ch11);$result1dd = curl_exec($ch111); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: index.php-
- Full path:
- an/web/index.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 13:35:40 12/12/2025
- Last modified:
- 23:30:34 03/10/2023
- MD5 hash:
- b59de72043fddaa4207dc0d685fa5e87
- Filesize:
- 12.01 KB
- suspicious functions used:
- base64_decode (line:10);curl_exec (line:211);
list($encrypted_data,$iv,$key) = explode('::',base64_decode($ciphertext));$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ttoken.php-
- Full path:
- an/web/ttoken.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 06:40:50 12/12/2025
- Last modified:
- 02:13:32 27/08/2023
- MD5 hash:
- 5f2c51c1db5b0defadfb67ce25c0098f
- Filesize:
- 1.54 KB
- suspicious functions used:
- curl_exec (line:42);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: webhook.php-
- Full path:
- an/web/webhook.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:54 12/12/2025
- Last modified:
- 09:21:21 01/03/2024
- MD5 hash:
- 6ea5abfa2b22d299ea68b666eaa57701
- Filesize:
- 20.98 KB
- suspicious functions used:
- base64_decode (line:28);curl_exec (line:39);
$signatureDecoded = base64_decode($signature);curl_exec (line:427);curl_exec($url);$data = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: webhook_test.php-
- Full path:
- an/web/webhook_test.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:54 12/12/2025
- Last modified:
- 02:13:34 27/08/2023
- MD5 hash:
- 74a7dcc262d7fe7f2bdc9e0595d03837
- Filesize:
- 4.69 KB
- suspicious functions used:
- base64_decode (line:22);curl_exec (line:33);
$signatureDecoded = base64_decode($signature);curl_exec (line:86);curl_exec($url);curl_exec (line:107);$result = curl_exec($ch);$data = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ip-ping-checker.php-
- Full path:
- an/web/ip-ping-checker.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:54 12/12/2025
- Last modified:
- 02:13:21 27/08/2023
- MD5 hash:
- 0d28f3053b73b3fe2885cf519ee17c12
- Filesize:
- 2.64 KB
- suspicious functions used:
- curl_exec (line:81);
$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: login_exec.php-
- Full path:
- an/web/login_exec.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 08:09:47 12/12/2025
- Last modified:
- 06:36:20 01/03/2024
- MD5 hash:
- 8e5caeac6dd5efb18009f8718af713ce
- Filesize:
- 5.39 KB
- suspicious functions used:
- curl_exec (line:66);
$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: login_exec1.php-
- Full path:
- an/web/login_exec1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:54 12/12/2025
- Last modified:
- 02:13:21 27/08/2023
- MD5 hash:
- 4f75b914e1b47a355be8cbc73e4e1407
- Filesize:
- 3.91 KB
- suspicious functions used:
- curl_exec (line:53);
$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tagreeexpayment.php-
- Full path:
- an/web/tagreeexpayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:54 12/12/2025
- Last modified:
- 02:13:31 27/08/2023
- MD5 hash:
- 029b4fba649a75c7c81d2f8931be8d63
- Filesize:
- 2.86 KB
- suspicious functions used:
- curl_exec (line:26);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tcreateagree.php-
- Full path:
- an/web/tcreateagree.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 14:51:12 12/12/2025
- Last modified:
- 02:13:31 27/08/2023
- MD5 hash:
- 27a10adf4190edc7eceee8cf74a6b72b
- Filesize:
- 999 B
- suspicious functions used:
- curl_exec (line:26);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tcreatepayment.php-
- Full path:
- an/web/tcreatepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 15:28:07 12/12/2025
- Last modified:
- 02:13:31 27/08/2023
- MD5 hash:
- e49de9a33f5164bc2c6b88e4770faaff
- Filesize:
- 1.07 KB
- suspicious functions used:
- curl_exec (line:27);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: test3.php-
- Full path:
- an/web/test3.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:54 12/12/2025
- Last modified:
- 02:13:32 27/08/2023
- MD5 hash:
- 73a48fe113b432b1786e7a15406cc14d
- Filesize:
- 1.26 KB
- suspicious functions used:
- `Counter: ${seconds}s` (line:29);
counterDiv.textContent = `Counter: ${seconds}s`; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: testttttt.php-
- Full path:
- an/web/testttttt.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:54 12/12/2025
- Last modified:
- 10:27:25 04/10/2023
- MD5 hash:
- b1988a4be29e191ad935fb409a4174ee
- Filesize:
- 2 KB
- suspicious functions used:
- curl_exec (line:47);
$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: texecutepayment.php-
- Full path:
- an/web/texecutepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 15:28:34 12/12/2025
- Last modified:
- 02:13:32 27/08/2023
- MD5 hash:
- 623635fdf5c871391d3a5fe99ee8c543
- Filesize:
- 2.91 KB
- suspicious functions used:
- curl_exec (line:24);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tis-news.php-
- Full path:
- an/web/tis-news.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 13:24:24 12/12/2025
- Last modified:
- 07:55:40 09/04/2024
- MD5 hash:
- ed23ca98b77c5321b4485e85eb2ea64d
- Filesize:
- 3.67 KB
- suspicious functions used:
- curl_exec (line:22);
$alldata1 = curl_exec($chhhh1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: token.php-
- Full path:
- an/web/token.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:54 12/12/2025
- Last modified:
- 02:13:32 27/08/2023
- MD5 hash:
- 7d8e71ceda3ffb74623e0c4a814715af
- Filesize:
- 1.53 KB
- suspicious functions used:
- curl_exec (line:42);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: sms_deliverey_report.php-
- Full path:
- an/web/sms_deliverey_report.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:55 12/12/2025
- Last modified:
- 02:13:31 27/08/2023
- MD5 hash:
- 15eda78f2292f68b63aae44e6207e0d8
- Filesize:
- 2.96 KB
- suspicious functions used:
- `api_id` != '' AND `delivery_report` != 'DELIVRD' AND `delivery_report` = '' or `delivery_report` = 'SENT' or `delivery_report` = 'PENDING' AND c_cell REGEXP '^-?[0-9]+$' ORDER BY ` (line:8);curl_exec (line:18);
$sql = mysql_query("SELECT api_id AS messageid FROM sms_send WHERE send_date BETWEEN DATE( DATE_SUB( NOW() , INTERVAL 3 DAY ) ) AND DATE ( NOW() ) AND `api_id` != '' AND `delivery_report` != 'DELIVRD' AND `delivery_report` = '' or `delivery_report` = 'SENT' or `delivery_report` = 'PENDING' AND c_cell REGEXP '^-?[0-9]+$' ORDER BY `id` DESC");curl_exec (line:41);$result = curl_exec($ch);$result = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: config.php-
- Full path:
- apk/app1_06/config.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:55 12/12/2025
- Last modified:
- 06:28:50 07/10/2025
- MD5 hash:
- 4648bcc36e30f684d330237f516d96bf
- Filesize:
- 12.72 KB
- suspicious functions used:
- curl_exec (line:181);
$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: firebase.php-
- Full path:
- apk/app1_06/firebase.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:55 12/12/2025
- Last modified:
- 06:28:50 07/10/2025
- MD5 hash:
- a77679c3acb80aa4799ebb6ae4cecdc5
- Filesize:
- 1.63 KB
- suspicious functions used:
- curl_exec (line:54);
$response = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: get-access-token.php-
- Full path:
- apk/app1_06/get-access-token.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:55 12/12/2025
- Last modified:
- 06:28:50 07/10/2025
- MD5 hash:
- 8520980eec76b36dfd9ea9ae516abea4
- Filesize:
- 1.91 KB
- suspicious functions used:
- curl_exec (line:21);
$response = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: get_client_profile_data.php-
- Full path:
- apk/app1_06/get_client_profile_data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:55 12/12/2025
- Last modified:
- 06:28:50 07/10/2025
- MD5 hash:
- 7e94655fb0d810611c2f7acfd34d9ebe
- Filesize:
- 15.48 KB
- suspicious functions used:
- curl_exec (line:258);
$resp = curl_exec($curlss); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: get_menu.php-
- Full path:
- apk/app1_06/get_menu.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:55 12/12/2025
- Last modified:
- 06:28:51 07/10/2025
- MD5 hash:
- de3f414f87b762ba8f452c23f4eeff96
- Filesize:
- 597 B
- suspicious functions used:
- `module_name` FROM module AS m WHERE m.{$user_type} in (1,2) AND m.sts = '0' AND m.id != '1' AND m.apk_sts = '1' ORDER BY ` (line:5);
$resulfttree = mysqli_query($con, "SELECT m.id, m.position, m.apk_name, m.apk_icon, m.`module_name` FROM module AS m WHERE m.{$user_type} in (1,2) AND m.sts = '0' AND m.id != '1' AND m.apk_sts = '1' ORDER BY `m`.`position` ASC"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: loginexec.php-
- Full path:
- apk/app1_06/loginexec.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:55 12/12/2025
- Last modified:
- 06:28:51 07/10/2025
- MD5 hash:
- 4def8d42f99517138a3e62ed7383b7e5
- Filesize:
- 22.62 KB
- suspicious functions used:
- curl_exec (line:32);curl_exec (line:93);
$jsona = curl_exec($ch10);`module_name` FROM module AS m WHERE m.{$user['user_type']} in (1,2) AND m.sts = '0' AND m.id != '1' AND m.apk_sts = '1' ORDER BY ` (line:177);$result110 = curl_exec($ch11);curl_exec (line:259);$resulfttree = mysqli_query($con, "SELECT m.id, m.position, m.apk_name, m.apk_icon, m.`module_name` FROM module AS m WHERE m.{$user['user_type']} in (1,2) AND m.sts = '0' AND m.id != '1' AND m.apk_sts = '1' ORDER BY `m`.`position` ASC");`module_name` FROM module AS m WHERE m.{$user['user_type']} in (1,2) AND m.sts = '0' AND m.id != '1' AND m.apk_sts = '1' ORDER BY ` (line:365);$result110 = curl_exec($ch11);$resulfttree = mysqli_query($con, "SELECT m.id, m.position, m.apk_name, m.apk_icon, m.`module_name` FROM module AS m WHERE m.{$user['user_type']} in (1,2) AND m.sts = '0' AND m.id != '1' AND m.apk_sts = '1' ORDER BY `m`.`position` ASC"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: MkOnlineClientsCount.php-
- Full path:
- apk/app1_06/MkOnlineClientsCount.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:55 12/12/2025
- Last modified:
- 06:28:51 07/10/2025
- MD5 hash:
- 50c406e2a7c257e527b5e576953891d7
- Filesize:
- 3.33 KB
- suspicious functions used:
- system (line:59);
$resource = $API->comm("/system/resource/print")[0]; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: netowrk-snmp-data.php-
- Full path:
- apk/app1_06/netowrk-snmp-data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:55 12/12/2025
- Last modified:
- 06:28:51 07/10/2025
- MD5 hash:
- a40cef6f73a1b0d366b2279f311d0a3d
- Filesize:
- 15.48 KB
- suspicious functions used:
- shell_exec (line:202);
$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: test.php-
- Full path:
- apk/app1_06/test.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:55 12/12/2025
- Last modified:
- 06:28:51 07/10/2025
- MD5 hash:
- 032c899b8d1dd401bc8860bab767dc76
- Filesize:
- 1.64 KB
- suspicious functions used:
- curl_exec (line:42);
$alldata = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: update_user_data.php-
- Full path:
- apk/app1_06/update_user_data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:55 12/12/2025
- Last modified:
- 06:28:51 07/10/2025
- MD5 hash:
- aa7f59cfb94fb99ad83237f968ee7735
- Filesize:
- 2.92 KB
- suspicious functions used:
- base64_decode (line:46);
if (file_put_contents($filePath, base64_decode($image))) { - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: telegramapicore.php-
- Full path:
- apk/app1_06/include/telegramapicore.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:55 12/12/2025
- Last modified:
- 06:28:52 07/10/2025
- MD5 hash:
- 8aad7289dbd57ea5be261edec2bbfec7
- Filesize:
- 3.16 KB
- suspicious functions used:
- curl_exec (line:68);
$result11 = curl_exec($ch3); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: config.php-
- Full path:
- apk/app1_08/config.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 14:02:25 12/12/2025
- Last modified:
- 02:15:39 29/10/2025
- MD5 hash:
- 7091feb7ad9116cf23972130ad202fd3
- Filesize:
- 12.25 KB
- suspicious functions used:
- curl_exec (line:152);
$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: firebase.php-
- Full path:
- apk/app1_08/firebase.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 12:27:12 12/12/2025
- Last modified:
- 06:47:53 14/10/2025
- MD5 hash:
- a77679c3acb80aa4799ebb6ae4cecdc5
- Filesize:
- 1.63 KB
- suspicious functions used:
- curl_exec (line:54);
$response = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: get-access-token.php-
- Full path:
- apk/app1_08/get-access-token.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 12:27:12 12/12/2025
- Last modified:
- 06:47:53 14/10/2025
- MD5 hash:
- 8520980eec76b36dfd9ea9ae516abea4
- Filesize:
- 1.91 KB
- suspicious functions used:
- curl_exec (line:21);
$response = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: get_client_profile_data.php-
- Full path:
- apk/app1_08/get_client_profile_data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 04:12:11 12/12/2025
- Last modified:
- 06:47:54 14/10/2025
- MD5 hash:
- 7e94655fb0d810611c2f7acfd34d9ebe
- Filesize:
- 15.48 KB
- suspicious functions used:
- curl_exec (line:258);
$resp = curl_exec($curlss); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: get_menu.php-
- Full path:
- apk/app1_08/get_menu.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 16:06:10 12/12/2025
- Last modified:
- 06:47:54 14/10/2025
- MD5 hash:
- de3f414f87b762ba8f452c23f4eeff96
- Filesize:
- 597 B
- suspicious functions used:
- `module_name` FROM module AS m WHERE m.{$user_type} in (1,2) AND m.sts = '0' AND m.id != '1' AND m.apk_sts = '1' ORDER BY ` (line:5);
$resulfttree = mysqli_query($con, "SELECT m.id, m.position, m.apk_name, m.apk_icon, m.`module_name` FROM module AS m WHERE m.{$user_type} in (1,2) AND m.sts = '0' AND m.id != '1' AND m.apk_sts = '1' ORDER BY `m`.`position` ASC"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: loginexec.php-
- Full path:
- apk/app1_08/loginexec.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 16:06:09 12/12/2025
- Last modified:
- 06:47:54 14/10/2025
- MD5 hash:
- 4def8d42f99517138a3e62ed7383b7e5
- Filesize:
- 22.62 KB
- suspicious functions used:
- curl_exec (line:32);curl_exec (line:93);
$jsona = curl_exec($ch10);`module_name` FROM module AS m WHERE m.{$user['user_type']} in (1,2) AND m.sts = '0' AND m.id != '1' AND m.apk_sts = '1' ORDER BY ` (line:177);$result110 = curl_exec($ch11);curl_exec (line:259);$resulfttree = mysqli_query($con, "SELECT m.id, m.position, m.apk_name, m.apk_icon, m.`module_name` FROM module AS m WHERE m.{$user['user_type']} in (1,2) AND m.sts = '0' AND m.id != '1' AND m.apk_sts = '1' ORDER BY `m`.`position` ASC");`module_name` FROM module AS m WHERE m.{$user['user_type']} in (1,2) AND m.sts = '0' AND m.id != '1' AND m.apk_sts = '1' ORDER BY ` (line:365);$result110 = curl_exec($ch11);$resulfttree = mysqli_query($con, "SELECT m.id, m.position, m.apk_name, m.apk_icon, m.`module_name` FROM module AS m WHERE m.{$user['user_type']} in (1,2) AND m.sts = '0' AND m.id != '1' AND m.apk_sts = '1' ORDER BY `m`.`position` ASC"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: MkOnlineClientsCount.php-
- Full path:
- apk/app1_08/MkOnlineClientsCount.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 06:51:21 12/12/2025
- Last modified:
- 06:47:54 14/10/2025
- MD5 hash:
- 50c406e2a7c257e527b5e576953891d7
- Filesize:
- 3.33 KB
- suspicious functions used:
- system (line:59);
$resource = $API->comm("/system/resource/print")[0]; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: netowrk-snmp-data.php-
- Full path:
- apk/app1_08/netowrk-snmp-data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:55 12/12/2025
- Last modified:
- 06:47:55 14/10/2025
- MD5 hash:
- a40cef6f73a1b0d366b2279f311d0a3d
- Filesize:
- 15.48 KB
- suspicious functions used:
- shell_exec (line:202);
$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: test.php-
- Full path:
- apk/app1_08/test.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:56 12/12/2025
- Last modified:
- 06:47:55 14/10/2025
- MD5 hash:
- 032c899b8d1dd401bc8860bab767dc76
- Filesize:
- 1.64 KB
- suspicious functions used:
- curl_exec (line:42);
$alldata = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: update_user_data.php-
- Full path:
- apk/app1_08/update_user_data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:56 12/12/2025
- Last modified:
- 06:47:55 14/10/2025
- MD5 hash:
- aa7f59cfb94fb99ad83237f968ee7735
- Filesize:
- 2.92 KB
- suspicious functions used:
- base64_decode (line:46);
if (file_put_contents($filePath, base64_decode($image))) { - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: telegramapicore.php-
- Full path:
- apk/app1_08/include/telegramapicore.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:56 12/12/2025
- Last modified:
- 06:47:55 14/10/2025
- MD5 hash:
- 8aad7289dbd57ea5be261edec2bbfec7
- Filesize:
- 3.16 KB
- suspicious functions used:
- curl_exec (line:68);
$result11 = curl_exec($ch3); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: config.php-
- Full path:
- apk/app1_10/config.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:56 12/12/2025
- Last modified:
- 03:59:05 08/11/2025
- MD5 hash:
- fa5f130e082d0fc8c43315aa57fd5441
- Filesize:
- 11.92 KB
- suspicious functions used:
- curl_exec (line:154);
$result11asdfg = curl_exec($ch15); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: firebase.php-
- Full path:
- apk/app1_10/firebase.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:56 12/12/2025
- Last modified:
- 16:37:45 29/10/2025
- MD5 hash:
- a77679c3acb80aa4799ebb6ae4cecdc5
- Filesize:
- 1.63 KB
- suspicious functions used:
- curl_exec (line:54);
$response = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: get-access-token.php-
- Full path:
- apk/app1_10/get-access-token.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:56 12/12/2025
- Last modified:
- 16:37:45 29/10/2025
- MD5 hash:
- 8520980eec76b36dfd9ea9ae516abea4
- Filesize:
- 1.91 KB
- suspicious functions used:
- curl_exec (line:21);
$response = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: get_clients_list.php-
- Full path:
- apk/app1_10/get_clients_list.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:56 12/12/2025
- Last modified:
- 17:05:45 06/11/2025
- MD5 hash:
- faf49b1fb74551546c59e2d40d86c771
- Filesize:
- 20.97 KB
- suspicious functions used:
- curl_exec (line:55);
curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: get_client_profile_data.php-
- Full path:
- apk/app1_10/get_client_profile_data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:56 12/12/2025
- Last modified:
- 16:37:45 29/10/2025
- MD5 hash:
- 7e94655fb0d810611c2f7acfd34d9ebe
- Filesize:
- 15.48 KB
- suspicious functions used:
- curl_exec (line:258);
$resp = curl_exec($curlss); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: get_menu.php-
- Full path:
- apk/app1_10/get_menu.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:56 12/12/2025
- Last modified:
- 06:12:01 02/11/2025
- MD5 hash:
- 6e99f796fa7b9b73fefa5c03c9ada45e
- Filesize:
- 871 B
- suspicious functions used:
- `module_name` FROM module AS m WHERE m.{$user_type} in (1,2) AND m.sts = '0' AND m.id != '1' AND m.apk_sts = '1' ORDER BY ` (line:5);curl_exec (line:22);
$resulfttree = mysqli_query($con, "SELECT m.id, m.position, m.apk_name, m.apk_icon, m.`module_name` FROM module AS m WHERE m.{$user_type} in (1,2) AND m.sts = '0' AND m.id != '1' AND m.apk_sts = '1' ORDER BY `m`.`position` ASC");$alldata = curl_exec($chhhh); */ - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: loginexec.php-
- Full path:
- apk/app1_10/loginexec.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:56 12/12/2025
- Last modified:
- 02:26:19 08/11/2025
- MD5 hash:
- f4c00dde2c5487271532545a4882e600
- Filesize:
- 22.77 KB
- suspicious functions used:
- curl_exec (line:32);curl_exec (line:93);
$jsona = curl_exec($ch10);`module_name` FROM module AS m WHERE m.{$user['user_type']} in (1,2) AND m.sts = '0' AND m.id != '1' AND m.apk_sts = '1' ORDER BY ` (line:177);$result110 = curl_exec($ch11);curl_exec (line:259);$resulfttree = mysqli_query($con, "SELECT m.id, m.position, m.apk_name, m.apk_icon, m.`module_name` FROM module AS m WHERE m.{$user['user_type']} in (1,2) AND m.sts = '0' AND m.id != '1' AND m.apk_sts = '1' ORDER BY `m`.`position` ASC");`module_name` FROM module AS m WHERE m.{$user['user_type']} in (1,2) AND m.sts = '0' AND m.id != '1' AND m.apk_sts = '1' ORDER BY ` (line:365);$result110 = curl_exec($ch11);$resulfttree = mysqli_query($con, "SELECT m.id, m.position, m.apk_name, m.apk_icon, m.`module_name` FROM module AS m WHERE m.{$user['user_type']} in (1,2) AND m.sts = '0' AND m.id != '1' AND m.apk_sts = '1' ORDER BY `m`.`position` ASC"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: netowrk-snmp-data.php-
- Full path:
- apk/app1_10/netowrk-snmp-data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:56 12/12/2025
- Last modified:
- 16:37:47 29/10/2025
- MD5 hash:
- a40cef6f73a1b0d366b2279f311d0a3d
- Filesize:
- 15.48 KB
- suspicious functions used:
- shell_exec (line:202);
$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: test.php-
- Full path:
- apk/app1_10/test.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:56 12/12/2025
- Last modified:
- 16:37:47 29/10/2025
- MD5 hash:
- 032c899b8d1dd401bc8860bab767dc76
- Filesize:
- 1.64 KB
- suspicious functions used:
- curl_exec (line:42);
$alldata = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: update_user_data.php-
- Full path:
- apk/app1_10/update_user_data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:56 12/12/2025
- Last modified:
- 16:37:47 29/10/2025
- MD5 hash:
- aa7f59cfb94fb99ad83237f968ee7735
- Filesize:
- 2.92 KB
- suspicious functions used:
- base64_decode (line:46);
if (file_put_contents($filePath, base64_decode($image))) { - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: telegramapicore.php-
- Full path:
- apk/app1_10/include/telegramapicore.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:56 12/12/2025
- Last modified:
- 16:37:47 29/10/2025
- MD5 hash:
- 8aad7289dbd57ea5be261edec2bbfec7
- Filesize:
- 3.16 KB
- suspicious functions used:
- curl_exec (line:68);
$result11 = curl_exec($ch3); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: get_network_online_clients_count.php-
- Full path:
- apk/app1_10/get_network_online_clients_count.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:56 12/12/2025
- Last modified:
- 15:05:06 09/11/2025
- MD5 hash:
- e174ef56827ea4768d16e99cdb8ae2fe
- Filesize:
- 3.14 KB
- suspicious functions used:
- system (line:61);
$resource = $API->comm("/system/resource/print")[0]; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: config.php-
- Full path:
- apk/app1_0_01/config.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 08:13:20 12/12/2025
- Last modified:
- 02:30:58 10/11/2025
- MD5 hash:
- fa5f130e082d0fc8c43315aa57fd5441
- Filesize:
- 11.92 KB
- suspicious functions used:
- curl_exec (line:154);
$result11asdfg = curl_exec($ch15); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: firebase.php-
- Full path:
- apk/app1_0_01/firebase.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:56 12/12/2025
- Last modified:
- 02:30:58 10/11/2025
- MD5 hash:
- a77679c3acb80aa4799ebb6ae4cecdc5
- Filesize:
- 1.63 KB
- suspicious functions used:
- curl_exec (line:54);
$response = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: get-access-token.php-
- Full path:
- apk/app1_0_01/get-access-token.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:56 12/12/2025
- Last modified:
- 02:30:58 10/11/2025
- MD5 hash:
- 8520980eec76b36dfd9ea9ae516abea4
- Filesize:
- 1.91 KB
- suspicious functions used:
- curl_exec (line:21);
$response = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: get_client_profile_data.php-
- Full path:
- apk/app1_0_01/get_client_profile_data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 08:02:15 12/12/2025
- Last modified:
- 02:30:58 10/11/2025
- MD5 hash:
- 7e94655fb0d810611c2f7acfd34d9ebe
- Filesize:
- 15.48 KB
- suspicious functions used:
- curl_exec (line:258);
$resp = curl_exec($curlss); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: get_clients_list.php-
- Full path:
- apk/app1_0_01/get_clients_list.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 10:20:06 12/12/2025
- Last modified:
- 02:30:58 10/11/2025
- MD5 hash:
- faf49b1fb74551546c59e2d40d86c771
- Filesize:
- 20.97 KB
- suspicious functions used:
- curl_exec (line:55);
curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: get_menu.php-
- Full path:
- apk/app1_0_01/get_menu.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 18:10:24 12/12/2025
- Last modified:
- 02:30:59 10/11/2025
- MD5 hash:
- 6e99f796fa7b9b73fefa5c03c9ada45e
- Filesize:
- 871 B
- suspicious functions used:
- `module_name` FROM module AS m WHERE m.{$user_type} in (1,2) AND m.sts = '0' AND m.id != '1' AND m.apk_sts = '1' ORDER BY ` (line:5);curl_exec (line:22);
$resulfttree = mysqli_query($con, "SELECT m.id, m.position, m.apk_name, m.apk_icon, m.`module_name` FROM module AS m WHERE m.{$user_type} in (1,2) AND m.sts = '0' AND m.id != '1' AND m.apk_sts = '1' ORDER BY `m`.`position` ASC");$alldata = curl_exec($chhhh); */ - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: get_network_online_clients_count.php-
- Full path:
- apk/app1_0_01/get_network_online_clients_count.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:56 12/12/2025
- Last modified:
- 02:30:59 10/11/2025
- MD5 hash:
- e174ef56827ea4768d16e99cdb8ae2fe
- Filesize:
- 3.14 KB
- suspicious functions used:
- system (line:61);
$resource = $API->comm("/system/resource/print")[0]; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: loginexec.php-
- Full path:
- apk/app1_0_01/loginexec.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:56 12/12/2025
- Last modified:
- 02:31:00 10/11/2025
- MD5 hash:
- f4c00dde2c5487271532545a4882e600
- Filesize:
- 22.77 KB
- suspicious functions used:
- curl_exec (line:32);curl_exec (line:93);
$jsona = curl_exec($ch10);`module_name` FROM module AS m WHERE m.{$user['user_type']} in (1,2) AND m.sts = '0' AND m.id != '1' AND m.apk_sts = '1' ORDER BY ` (line:177);$result110 = curl_exec($ch11);curl_exec (line:259);$resulfttree = mysqli_query($con, "SELECT m.id, m.position, m.apk_name, m.apk_icon, m.`module_name` FROM module AS m WHERE m.{$user['user_type']} in (1,2) AND m.sts = '0' AND m.id != '1' AND m.apk_sts = '1' ORDER BY `m`.`position` ASC");`module_name` FROM module AS m WHERE m.{$user['user_type']} in (1,2) AND m.sts = '0' AND m.id != '1' AND m.apk_sts = '1' ORDER BY ` (line:365);$result110 = curl_exec($ch11);$resulfttree = mysqli_query($con, "SELECT m.id, m.position, m.apk_name, m.apk_icon, m.`module_name` FROM module AS m WHERE m.{$user['user_type']} in (1,2) AND m.sts = '0' AND m.id != '1' AND m.apk_sts = '1' ORDER BY `m`.`position` ASC"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: netowrk-snmp-data.php-
- Full path:
- apk/app1_0_01/netowrk-snmp-data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:56 12/12/2025
- Last modified:
- 13:32:31 16/11/2025
- MD5 hash:
- da5fcbf831017e1fcf9898fbc2d91d26
- Filesize:
- 15.91 KB
- suspicious functions used:
- shell_exec (line:188);
$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: test.php-
- Full path:
- apk/app1_0_01/test.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:56 12/12/2025
- Last modified:
- 02:31:00 10/11/2025
- MD5 hash:
- 032c899b8d1dd401bc8860bab767dc76
- Filesize:
- 1.64 KB
- suspicious functions used:
- curl_exec (line:42);
$alldata = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: update_user_data.php-
- Full path:
- apk/app1_0_01/update_user_data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:56 12/12/2025
- Last modified:
- 02:31:00 10/11/2025
- MD5 hash:
- aa7f59cfb94fb99ad83237f968ee7735
- Filesize:
- 2.92 KB
- suspicious functions used:
- base64_decode (line:46);
if (file_put_contents($filePath, base64_decode($image))) { - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: telegramapicore.php-
- Full path:
- apk/app1_0_01/include/telegramapicore.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:56 12/12/2025
- Last modified:
- 02:31:00 10/11/2025
- MD5 hash:
- 8aad7289dbd57ea5be261edec2bbfec7
- Filesize:
- 3.16 KB
- suspicious functions used:
- curl_exec (line:68);
$result11 = curl_exec($ch3); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: netowrk-snmp-data-auto.php-
- Full path:
- apk/app1_0_01/netowrk-snmp-data-auto.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:56 12/12/2025
- Last modified:
- 03:52:18 16/11/2025
- MD5 hash:
- 639f404b71aaf7ac7af43852d4aa09ed
- Filesize:
- 9.05 KB
- suspicious functions used:
- shell_exec (line:74);shell_exec (line:158);
$output = shell_exec($command);$vlanoutput = shell_exec($vlancommand); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: config.php-
- Full path:
- apk/app1_09/config.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:56 12/12/2025
- Last modified:
- 12:00:29 24/11/2025
- MD5 hash:
- fa5f130e082d0fc8c43315aa57fd5441
- Filesize:
- 11.92 KB
- suspicious functions used:
- curl_exec (line:154);
$result11asdfg = curl_exec($ch15); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: firebase.php-
- Full path:
- apk/app1_09/firebase.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:57 12/12/2025
- Last modified:
- 12:00:29 24/11/2025
- MD5 hash:
- a77679c3acb80aa4799ebb6ae4cecdc5
- Filesize:
- 1.63 KB
- suspicious functions used:
- curl_exec (line:54);
$response = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: get-access-token.php-
- Full path:
- apk/app1_09/get-access-token.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:57 12/12/2025
- Last modified:
- 12:00:29 24/11/2025
- MD5 hash:
- 8520980eec76b36dfd9ea9ae516abea4
- Filesize:
- 1.91 KB
- suspicious functions used:
- curl_exec (line:21);
$response = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: get_clients_list.php-
- Full path:
- apk/app1_09/get_clients_list.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:57 12/12/2025
- Last modified:
- 12:00:29 24/11/2025
- MD5 hash:
- faf49b1fb74551546c59e2d40d86c771
- Filesize:
- 20.97 KB
- suspicious functions used:
- curl_exec (line:55);
curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: get_client_profile_data.php-
- Full path:
- apk/app1_09/get_client_profile_data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:57 12/12/2025
- Last modified:
- 12:00:29 24/11/2025
- MD5 hash:
- 7e94655fb0d810611c2f7acfd34d9ebe
- Filesize:
- 15.48 KB
- suspicious functions used:
- curl_exec (line:258);
$resp = curl_exec($curlss); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: get_menu.php-
- Full path:
- apk/app1_09/get_menu.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:57 12/12/2025
- Last modified:
- 12:00:29 24/11/2025
- MD5 hash:
- 6e99f796fa7b9b73fefa5c03c9ada45e
- Filesize:
- 871 B
- suspicious functions used:
- `module_name` FROM module AS m WHERE m.{$user_type} in (1,2) AND m.sts = '0' AND m.id != '1' AND m.apk_sts = '1' ORDER BY ` (line:5);curl_exec (line:22);
$resulfttree = mysqli_query($con, "SELECT m.id, m.position, m.apk_name, m.apk_icon, m.`module_name` FROM module AS m WHERE m.{$user_type} in (1,2) AND m.sts = '0' AND m.id != '1' AND m.apk_sts = '1' ORDER BY `m`.`position` ASC");$alldata = curl_exec($chhhh); */ - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: get_network_online_clients_count.php-
- Full path:
- apk/app1_09/get_network_online_clients_count.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:57 12/12/2025
- Last modified:
- 12:00:29 24/11/2025
- MD5 hash:
- e174ef56827ea4768d16e99cdb8ae2fe
- Filesize:
- 3.14 KB
- suspicious functions used:
- system (line:61);
$resource = $API->comm("/system/resource/print")[0]; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: loginexec.php-
- Full path:
- apk/app1_09/loginexec.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:57 12/12/2025
- Last modified:
- 12:00:30 24/11/2025
- MD5 hash:
- f4c00dde2c5487271532545a4882e600
- Filesize:
- 22.77 KB
- suspicious functions used:
- curl_exec (line:32);curl_exec (line:93);
$jsona = curl_exec($ch10);`module_name` FROM module AS m WHERE m.{$user['user_type']} in (1,2) AND m.sts = '0' AND m.id != '1' AND m.apk_sts = '1' ORDER BY ` (line:177);$result110 = curl_exec($ch11);curl_exec (line:259);$resulfttree = mysqli_query($con, "SELECT m.id, m.position, m.apk_name, m.apk_icon, m.`module_name` FROM module AS m WHERE m.{$user['user_type']} in (1,2) AND m.sts = '0' AND m.id != '1' AND m.apk_sts = '1' ORDER BY `m`.`position` ASC");`module_name` FROM module AS m WHERE m.{$user['user_type']} in (1,2) AND m.sts = '0' AND m.id != '1' AND m.apk_sts = '1' ORDER BY ` (line:365);$result110 = curl_exec($ch11);$resulfttree = mysqli_query($con, "SELECT m.id, m.position, m.apk_name, m.apk_icon, m.`module_name` FROM module AS m WHERE m.{$user['user_type']} in (1,2) AND m.sts = '0' AND m.id != '1' AND m.apk_sts = '1' ORDER BY `m`.`position` ASC"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: netowrk-snmp-data.php-
- Full path:
- apk/app1_09/netowrk-snmp-data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:57 12/12/2025
- Last modified:
- 12:00:30 24/11/2025
- MD5 hash:
- a40cef6f73a1b0d366b2279f311d0a3d
- Filesize:
- 15.48 KB
- suspicious functions used:
- shell_exec (line:202);
$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: test.php-
- Full path:
- apk/app1_09/test.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:57 12/12/2025
- Last modified:
- 12:00:30 24/11/2025
- MD5 hash:
- 032c899b8d1dd401bc8860bab767dc76
- Filesize:
- 1.64 KB
- suspicious functions used:
- curl_exec (line:42);
$alldata = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: update_user_data.php-
- Full path:
- apk/app1_09/update_user_data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:57 12/12/2025
- Last modified:
- 12:00:30 24/11/2025
- MD5 hash:
- aa7f59cfb94fb99ad83237f968ee7735
- Filesize:
- 2.92 KB
- suspicious functions used:
- base64_decode (line:46);
if (file_put_contents($filePath, base64_decode($image))) { - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: telegramapicore.php-
- Full path:
- apk/app1_09/include/telegramapicore.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:57 12/12/2025
- Last modified:
- 12:00:30 24/11/2025
- MD5 hash:
- 8aad7289dbd57ea5be261edec2bbfec7
- Filesize:
- 3.16 KB
- suspicious functions used:
- curl_exec (line:68);
$result11 = curl_exec($ch3); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: config.php-
- Full path:
- apk/app1_0_03/config.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 15:05:27 12/12/2025
- Last modified:
- 09:45:25 28/11/2025
- MD5 hash:
- fa5f130e082d0fc8c43315aa57fd5441
- Filesize:
- 11.92 KB
- suspicious functions used:
- curl_exec (line:154);
$result11asdfg = curl_exec($ch15); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: get_clients_list.php-
- Full path:
- apk/app1_0_03/get_clients_list.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 20:37:08 11/12/2025
- Last modified:
- 09:45:25 28/11/2025
- MD5 hash:
- faf49b1fb74551546c59e2d40d86c771
- Filesize:
- 20.97 KB
- suspicious functions used:
- curl_exec (line:55);
curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: firebase.php-
- Full path:
- apk/app1_0_03/firebase.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:57 12/12/2025
- Last modified:
- 09:45:25 28/11/2025
- MD5 hash:
- a77679c3acb80aa4799ebb6ae4cecdc5
- Filesize:
- 1.63 KB
- suspicious functions used:
- curl_exec (line:54);
$response = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: get-access-token.php-
- Full path:
- apk/app1_0_03/get-access-token.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:57 12/12/2025
- Last modified:
- 09:45:25 28/11/2025
- MD5 hash:
- 8520980eec76b36dfd9ea9ae516abea4
- Filesize:
- 1.91 KB
- suspicious functions used:
- curl_exec (line:21);
$response = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: get_client_profile_data.php-
- Full path:
- apk/app1_0_03/get_client_profile_data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:57 12/12/2025
- Last modified:
- 09:45:25 28/11/2025
- MD5 hash:
- 7e94655fb0d810611c2f7acfd34d9ebe
- Filesize:
- 15.48 KB
- suspicious functions used:
- curl_exec (line:258);
$resp = curl_exec($curlss); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: get_menu.php-
- Full path:
- apk/app1_0_03/get_menu.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 11:00:44 12/12/2025
- Last modified:
- 09:45:25 28/11/2025
- MD5 hash:
- 6e99f796fa7b9b73fefa5c03c9ada45e
- Filesize:
- 871 B
- suspicious functions used:
- `module_name` FROM module AS m WHERE m.{$user_type} in (1,2) AND m.sts = '0' AND m.id != '1' AND m.apk_sts = '1' ORDER BY ` (line:5);curl_exec (line:22);
$resulfttree = mysqli_query($con, "SELECT m.id, m.position, m.apk_name, m.apk_icon, m.`module_name` FROM module AS m WHERE m.{$user_type} in (1,2) AND m.sts = '0' AND m.id != '1' AND m.apk_sts = '1' ORDER BY `m`.`position` ASC");$alldata = curl_exec($chhhh); */ - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: get_network_online_clients_count.php-
- Full path:
- apk/app1_0_03/get_network_online_clients_count.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:57 12/12/2025
- Last modified:
- 09:45:25 28/11/2025
- MD5 hash:
- e174ef56827ea4768d16e99cdb8ae2fe
- Filesize:
- 3.14 KB
- suspicious functions used:
- system (line:61);
$resource = $API->comm("/system/resource/print")[0]; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: loginexec.php-
- Full path:
- apk/app1_0_03/loginexec.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 15:05:27 12/12/2025
- Last modified:
- 09:45:26 28/11/2025
- MD5 hash:
- f4c00dde2c5487271532545a4882e600
- Filesize:
- 22.77 KB
- suspicious functions used:
- curl_exec (line:32);curl_exec (line:93);
$jsona = curl_exec($ch10);`module_name` FROM module AS m WHERE m.{$user['user_type']} in (1,2) AND m.sts = '0' AND m.id != '1' AND m.apk_sts = '1' ORDER BY ` (line:177);$result110 = curl_exec($ch11);curl_exec (line:259);$resulfttree = mysqli_query($con, "SELECT m.id, m.position, m.apk_name, m.apk_icon, m.`module_name` FROM module AS m WHERE m.{$user['user_type']} in (1,2) AND m.sts = '0' AND m.id != '1' AND m.apk_sts = '1' ORDER BY `m`.`position` ASC");`module_name` FROM module AS m WHERE m.{$user['user_type']} in (1,2) AND m.sts = '0' AND m.id != '1' AND m.apk_sts = '1' ORDER BY ` (line:365);$result110 = curl_exec($ch11);$resulfttree = mysqli_query($con, "SELECT m.id, m.position, m.apk_name, m.apk_icon, m.`module_name` FROM module AS m WHERE m.{$user['user_type']} in (1,2) AND m.sts = '0' AND m.id != '1' AND m.apk_sts = '1' ORDER BY `m`.`position` ASC"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: netowrk-snmp-data-auto.php-
- Full path:
- apk/app1_0_03/netowrk-snmp-data-auto.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:57 12/12/2025
- Last modified:
- 09:45:26 28/11/2025
- MD5 hash:
- 639f404b71aaf7ac7af43852d4aa09ed
- Filesize:
- 9.05 KB
- suspicious functions used:
- shell_exec (line:74);shell_exec (line:158);
$output = shell_exec($command);$vlanoutput = shell_exec($vlancommand); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: netowrk-snmp-data.php-
- Full path:
- apk/app1_0_03/netowrk-snmp-data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:57 12/12/2025
- Last modified:
- 09:45:26 28/11/2025
- MD5 hash:
- da5fcbf831017e1fcf9898fbc2d91d26
- Filesize:
- 15.91 KB
- suspicious functions used:
- shell_exec (line:188);
$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: test.php-
- Full path:
- apk/app1_0_03/test.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:57 12/12/2025
- Last modified:
- 09:45:26 28/11/2025
- MD5 hash:
- 032c899b8d1dd401bc8860bab767dc76
- Filesize:
- 1.64 KB
- suspicious functions used:
- curl_exec (line:42);
$alldata = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: update_user_data.php-
- Full path:
- apk/app1_0_03/update_user_data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:57 12/12/2025
- Last modified:
- 09:45:26 28/11/2025
- MD5 hash:
- aa7f59cfb94fb99ad83237f968ee7735
- Filesize:
- 2.92 KB
- suspicious functions used:
- base64_decode (line:46);
if (file_put_contents($filePath, base64_decode($image))) { - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: telegramapicore.php-
- Full path:
- apk/app1_0_03/include/telegramapicore.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:57 12/12/2025
- Last modified:
- 09:45:27 28/11/2025
- MD5 hash:
- 8aad7289dbd57ea5be261edec2bbfec7
- Filesize:
- 3.16 KB
- suspicious functions used:
- curl_exec (line:68);
$result11 = curl_exec($ch3); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: config.php-
- Full path:
- apk/app1_0_04/config.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 06:49:59 12/12/2025
- Last modified:
- 06:33:37 11/12/2025
- MD5 hash:
- b7b2552fd96c7da6f0b6856d328eeebc
- Filesize:
- 11.91 KB
- suspicious functions used:
- curl_exec (line:154);
$result11asdfg = curl_exec($ch15); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: firebase.php-
- Full path:
- apk/app1_0_04/firebase.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:57 12/12/2025
- Last modified:
- 14:28:28 07/12/2025
- MD5 hash:
- a77679c3acb80aa4799ebb6ae4cecdc5
- Filesize:
- 1.63 KB
- suspicious functions used:
- curl_exec (line:54);
$response = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: get-access-token.php-
- Full path:
- apk/app1_0_04/get-access-token.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:57 12/12/2025
- Last modified:
- 14:28:28 07/12/2025
- MD5 hash:
- 8520980eec76b36dfd9ea9ae516abea4
- Filesize:
- 1.91 KB
- suspicious functions used:
- curl_exec (line:21);
$response = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: get_clients_list.php-
- Full path:
- apk/app1_0_04/get_clients_list.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 06:49:59 12/12/2025
- Last modified:
- 14:28:28 07/12/2025
- MD5 hash:
- faf49b1fb74551546c59e2d40d86c771
- Filesize:
- 20.97 KB
- suspicious functions used:
- curl_exec (line:55);
curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: get_client_profile_data.php-
- Full path:
- apk/app1_0_04/get_client_profile_data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 02:49:21 12/12/2025
- Last modified:
- 14:28:28 07/12/2025
- MD5 hash:
- 7e94655fb0d810611c2f7acfd34d9ebe
- Filesize:
- 15.48 KB
- suspicious functions used:
- curl_exec (line:258);
$resp = curl_exec($curlss); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: get_menu.php-
- Full path:
- apk/app1_0_04/get_menu.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 02:45:31 12/12/2025
- Last modified:
- 14:28:28 07/12/2025
- MD5 hash:
- 6e99f796fa7b9b73fefa5c03c9ada45e
- Filesize:
- 871 B
- suspicious functions used:
- `module_name` FROM module AS m WHERE m.{$user_type} in (1,2) AND m.sts = '0' AND m.id != '1' AND m.apk_sts = '1' ORDER BY ` (line:5);curl_exec (line:22);
$resulfttree = mysqli_query($con, "SELECT m.id, m.position, m.apk_name, m.apk_icon, m.`module_name` FROM module AS m WHERE m.{$user_type} in (1,2) AND m.sts = '0' AND m.id != '1' AND m.apk_sts = '1' ORDER BY `m`.`position` ASC");$alldata = curl_exec($chhhh); */ - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: get_network_online_clients_count.php-
- Full path:
- apk/app1_0_04/get_network_online_clients_count.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:58 12/12/2025
- Last modified:
- 14:28:28 07/12/2025
- MD5 hash:
- e174ef56827ea4768d16e99cdb8ae2fe
- Filesize:
- 3.14 KB
- suspicious functions used:
- system (line:61);
$resource = $API->comm("/system/resource/print")[0]; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: loginexec.php-
- Full path:
- apk/app1_0_04/loginexec.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 05:37:38 12/12/2025
- Last modified:
- 14:28:29 07/12/2025
- MD5 hash:
- f4c00dde2c5487271532545a4882e600
- Filesize:
- 22.77 KB
- suspicious functions used:
- curl_exec (line:32);curl_exec (line:93);
$jsona = curl_exec($ch10);`module_name` FROM module AS m WHERE m.{$user['user_type']} in (1,2) AND m.sts = '0' AND m.id != '1' AND m.apk_sts = '1' ORDER BY ` (line:177);$result110 = curl_exec($ch11);curl_exec (line:259);$resulfttree = mysqli_query($con, "SELECT m.id, m.position, m.apk_name, m.apk_icon, m.`module_name` FROM module AS m WHERE m.{$user['user_type']} in (1,2) AND m.sts = '0' AND m.id != '1' AND m.apk_sts = '1' ORDER BY `m`.`position` ASC");`module_name` FROM module AS m WHERE m.{$user['user_type']} in (1,2) AND m.sts = '0' AND m.id != '1' AND m.apk_sts = '1' ORDER BY ` (line:365);$result110 = curl_exec($ch11);$resulfttree = mysqli_query($con, "SELECT m.id, m.position, m.apk_name, m.apk_icon, m.`module_name` FROM module AS m WHERE m.{$user['user_type']} in (1,2) AND m.sts = '0' AND m.id != '1' AND m.apk_sts = '1' ORDER BY `m`.`position` ASC"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: netowrk-snmp-data-auto.php-
- Full path:
- apk/app1_0_04/netowrk-snmp-data-auto.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:58 12/12/2025
- Last modified:
- 14:28:29 07/12/2025
- MD5 hash:
- 639f404b71aaf7ac7af43852d4aa09ed
- Filesize:
- 9.05 KB
- suspicious functions used:
- shell_exec (line:74);shell_exec (line:158);
$output = shell_exec($command);$vlanoutput = shell_exec($vlancommand); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: netowrk-snmp-data.php-
- Full path:
- apk/app1_0_04/netowrk-snmp-data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:58 12/12/2025
- Last modified:
- 14:28:29 07/12/2025
- MD5 hash:
- da5fcbf831017e1fcf9898fbc2d91d26
- Filesize:
- 15.91 KB
- suspicious functions used:
- shell_exec (line:188);
$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: test.php-
- Full path:
- apk/app1_0_04/test.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:58 12/12/2025
- Last modified:
- 14:28:29 07/12/2025
- MD5 hash:
- 032c899b8d1dd401bc8860bab767dc76
- Filesize:
- 1.64 KB
- suspicious functions used:
- curl_exec (line:42);
$alldata = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: update_user_data.php-
- Full path:
- apk/app1_0_04/update_user_data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:58 12/12/2025
- Last modified:
- 14:28:29 07/12/2025
- MD5 hash:
- aa7f59cfb94fb99ad83237f968ee7735
- Filesize:
- 2.92 KB
- suspicious functions used:
- base64_decode (line:46);
if (file_put_contents($filePath, base64_decode($image))) { - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: telegramapicore.php-
- Full path:
- apk/app1_0_04/include/telegramapicore.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:58 12/12/2025
- Last modified:
- 14:28:29 07/12/2025
- MD5 hash:
- 8aad7289dbd57ea5be261edec2bbfec7
- Filesize:
- 3.16 KB
- suspicious functions used:
- curl_exec (line:68);
$result11 = curl_exec($ch3); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: config.php-
- Full path:
- apk/app1_0_05/config.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 13:31:48 12/12/2025
- Last modified:
- 12:23:48 11/12/2025
- MD5 hash:
- b7b2552fd96c7da6f0b6856d328eeebc
- Filesize:
- 11.91 KB
- suspicious functions used:
- curl_exec (line:154);
$result11asdfg = curl_exec($ch15); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: firebase.php-
- Full path:
- apk/app1_0_05/firebase.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:58 12/12/2025
- Last modified:
- 12:23:48 11/12/2025
- MD5 hash:
- a77679c3acb80aa4799ebb6ae4cecdc5
- Filesize:
- 1.63 KB
- suspicious functions used:
- curl_exec (line:54);
$response = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: get-access-token.php-
- Full path:
- apk/app1_0_05/get-access-token.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:58 12/12/2025
- Last modified:
- 12:23:48 11/12/2025
- MD5 hash:
- 8520980eec76b36dfd9ea9ae516abea4
- Filesize:
- 1.91 KB
- suspicious functions used:
- curl_exec (line:21);
$response = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: get_clients_list.php-
- Full path:
- apk/app1_0_05/get_clients_list.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:58 12/12/2025
- Last modified:
- 12:23:48 11/12/2025
- MD5 hash:
- faf49b1fb74551546c59e2d40d86c771
- Filesize:
- 20.97 KB
- suspicious functions used:
- curl_exec (line:55);
curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: get_client_profile_data.php-
- Full path:
- apk/app1_0_05/get_client_profile_data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 15:33:39 12/12/2025
- Last modified:
- 12:23:49 11/12/2025
- MD5 hash:
- 7e94655fb0d810611c2f7acfd34d9ebe
- Filesize:
- 15.48 KB
- suspicious functions used:
- curl_exec (line:258);
$resp = curl_exec($curlss); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: get_menu.php-
- Full path:
- apk/app1_0_05/get_menu.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 13:31:48 12/12/2025
- Last modified:
- 12:23:49 11/12/2025
- MD5 hash:
- 6e99f796fa7b9b73fefa5c03c9ada45e
- Filesize:
- 871 B
- suspicious functions used:
- `module_name` FROM module AS m WHERE m.{$user_type} in (1,2) AND m.sts = '0' AND m.id != '1' AND m.apk_sts = '1' ORDER BY ` (line:5);curl_exec (line:22);
$resulfttree = mysqli_query($con, "SELECT m.id, m.position, m.apk_name, m.apk_icon, m.`module_name` FROM module AS m WHERE m.{$user_type} in (1,2) AND m.sts = '0' AND m.id != '1' AND m.apk_sts = '1' ORDER BY `m`.`position` ASC");$alldata = curl_exec($chhhh); */ - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: get_network_online_clients_count.php-
- Full path:
- apk/app1_0_05/get_network_online_clients_count.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:58 12/12/2025
- Last modified:
- 12:23:49 11/12/2025
- MD5 hash:
- e174ef56827ea4768d16e99cdb8ae2fe
- Filesize:
- 3.14 KB
- suspicious functions used:
- system (line:61);
$resource = $API->comm("/system/resource/print")[0]; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: loginexec.php-
- Full path:
- apk/app1_0_05/loginexec.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 15:33:38 12/12/2025
- Last modified:
- 12:23:50 11/12/2025
- MD5 hash:
- f4c00dde2c5487271532545a4882e600
- Filesize:
- 22.77 KB
- suspicious functions used:
- curl_exec (line:32);curl_exec (line:93);
$jsona = curl_exec($ch10);`module_name` FROM module AS m WHERE m.{$user['user_type']} in (1,2) AND m.sts = '0' AND m.id != '1' AND m.apk_sts = '1' ORDER BY ` (line:177);$result110 = curl_exec($ch11);curl_exec (line:259);$resulfttree = mysqli_query($con, "SELECT m.id, m.position, m.apk_name, m.apk_icon, m.`module_name` FROM module AS m WHERE m.{$user['user_type']} in (1,2) AND m.sts = '0' AND m.id != '1' AND m.apk_sts = '1' ORDER BY `m`.`position` ASC");`module_name` FROM module AS m WHERE m.{$user['user_type']} in (1,2) AND m.sts = '0' AND m.id != '1' AND m.apk_sts = '1' ORDER BY ` (line:365);$result110 = curl_exec($ch11);$resulfttree = mysqli_query($con, "SELECT m.id, m.position, m.apk_name, m.apk_icon, m.`module_name` FROM module AS m WHERE m.{$user['user_type']} in (1,2) AND m.sts = '0' AND m.id != '1' AND m.apk_sts = '1' ORDER BY `m`.`position` ASC"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: netowrk-snmp-data-auto.php-
- Full path:
- apk/app1_0_05/netowrk-snmp-data-auto.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:58 12/12/2025
- Last modified:
- 12:23:50 11/12/2025
- MD5 hash:
- 639f404b71aaf7ac7af43852d4aa09ed
- Filesize:
- 9.05 KB
- suspicious functions used:
- shell_exec (line:74);shell_exec (line:158);
$output = shell_exec($command);$vlanoutput = shell_exec($vlancommand); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: netowrk-snmp-data.php-
- Full path:
- apk/app1_0_05/netowrk-snmp-data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 23:31:28 11/12/2025
- Last modified:
- 12:23:50 11/12/2025
- MD5 hash:
- da5fcbf831017e1fcf9898fbc2d91d26
- Filesize:
- 15.91 KB
- suspicious functions used:
- shell_exec (line:188);
$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: test.php-
- Full path:
- apk/app1_0_05/test.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:58 12/12/2025
- Last modified:
- 12:23:50 11/12/2025
- MD5 hash:
- 032c899b8d1dd401bc8860bab767dc76
- Filesize:
- 1.64 KB
- suspicious functions used:
- curl_exec (line:42);
$alldata = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: update_user_data.php-
- Full path:
- apk/app1_0_05/update_user_data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:58 12/12/2025
- Last modified:
- 12:23:50 11/12/2025
- MD5 hash:
- aa7f59cfb94fb99ad83237f968ee7735
- Filesize:
- 2.92 KB
- suspicious functions used:
- base64_decode (line:46);
if (file_put_contents($filePath, base64_decode($image))) { - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: telegramapicore.php-
- Full path:
- apk/app1_0_05/include/telegramapicore.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:58 12/12/2025
- Last modified:
- 12:23:50 11/12/2025
- MD5 hash:
- 8aad7289dbd57ea5be261edec2bbfec7
- Filesize:
- 3.16 KB
- suspicious functions used:
- curl_exec (line:68);
$result11 = curl_exec($ch3); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: nagad-helper.php-
- Full path:
- asb/m/nagad-helper.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:59 12/12/2025
- Last modified:
- 02:35:28 20/11/2024
- MD5 hash:
- 2bb70c44d68202e0a0cd8ae1388f0b1b
- Filesize:
- 6.74 KB
- suspicious functions used:
- curl_exec (line:61);base64_decode (line:97);
$resultData = curl_exec($url);openssl_private_decrypt(base64_decode($cryptText), $plain_text, $private_key); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentOnlineQuery2.php-
- Full path:
- asb/m/PaymentOnlineQuery2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:59 12/12/2025
- Last modified:
- 02:35:29 20/11/2024
- MD5 hash:
- 3660992067d5591fc79ce89d6dbb9274
- Filesize:
- 19.08 KB
- suspicious functions used:
- curl_exec (line:41);curl_exec (line:254);
$resultdatax=curl_exec($url);$result = curl_exec($handle); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: token.php-
- Full path:
- asb/m/token.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:59 12/12/2025
- Last modified:
- 02:35:30 20/11/2024
- MD5 hash:
- 7d8e71ceda3ffb74623e0c4a814715af
- Filesize:
- 1.53 KB
- suspicious functions used:
- curl_exec (line:42);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tagreeexpayment.php-
- Full path:
- asb/m/tagreeexpayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:59 12/12/2025
- Last modified:
- 02:35:30 20/11/2024
- MD5 hash:
- c95e3ee881752db67b4f3597bc58430a
- Filesize:
- 2.46 KB
- suspicious functions used:
- curl_exec (line:26);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ttoken.php-
- Full path:
- asb/m/ttoken.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:42:59 12/12/2025
- Last modified:
- 02:35:30 20/11/2024
- MD5 hash:
- 5f2c51c1db5b0defadfb67ce25c0098f
- Filesize:
- 1.54 KB
- suspicious functions used:
- curl_exec (line:42);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: createpayment.php-
- Full path:
- asb/m/createpayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:00 12/12/2025
- Last modified:
- 02:35:27 20/11/2024
- MD5 hash:
- 849185f307be30eafb1bbef93616d8c3
- Filesize:
- 1.71 KB
- suspicious functions used:
- curl_exec (line:57);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: support-action.php-
- Full path:
- asb/m/support-action.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:00 12/12/2025
- Last modified:
- 02:35:30 20/11/2024
- MD5 hash:
- 2fc6fd844db911a5502a7a6ae383990f
- Filesize:
- 10.31 KB
- suspicious functions used:
- curl_exec (line:99);
$jsona = curl_exec($ch10); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: executepayment.php-
- Full path:
- asb/m/executepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:00 12/12/2025
- Last modified:
- 02:35:27 20/11/2024
- MD5 hash:
- 9a3f22521ad987e86f84c4f5f688d5b7
- Filesize:
- 713 B
- suspicious functions used:
- curl_exec (line:18);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: index.php-
- Full path:
- asb/m/index.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 20:30:35 11/12/2025
- Last modified:
- 02:35:27 20/11/2024
- MD5 hash:
- f5d7e6787d44240324bf05e7bff53365
- Filesize:
- 12.49 KB
- suspicious functions used:
- base64_decode (line:10);curl_exec (line:183);
list($encrypted_data,$iv,$key) = explode('::',base64_decode($ciphertext));$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentOnlineQuery.php-
- Full path:
- asb/m/PaymentOnlineQuery.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:00 12/12/2025
- Last modified:
- 02:35:29 20/11/2024
- MD5 hash:
- 05d772ea15775c0640ac9d1ff7c7144c
- Filesize:
- 21.13 KB
- suspicious functions used:
- curl_exec (line:287);curl_exec (line:512);
$resultdata=curl_exec($url);$content = curl_exec($handle ); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tcreateagree.php-
- Full path:
- asb/m/tcreateagree.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:00 12/12/2025
- Last modified:
- 02:35:30 20/11/2024
- MD5 hash:
- 27a10adf4190edc7eceee8cf74a6b72b
- Filesize:
- 999 B
- suspicious functions used:
- curl_exec (line:26);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: login_exec.php-
- Full path:
- asb/m/login_exec.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:00 12/12/2025
- Last modified:
- 02:35:27 20/11/2024
- MD5 hash:
- 1f800365ef270564df77d30c1bfd7ed3
- Filesize:
- 5.4 KB
- suspicious functions used:
- curl_exec (line:66);
$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: login_exec1.php-
- Full path:
- asb/m/login_exec1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:00 12/12/2025
- Last modified:
- 02:35:28 20/11/2024
- MD5 hash:
- 46b08782f51ba75b23e27183e06370fe
- Filesize:
- 4.28 KB
- suspicious functions used:
- curl_exec (line:61);
$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: nagad-merchant-callback.php-
- Full path:
- asb/m/nagad-merchant-callback.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:00 12/12/2025
- Last modified:
- 02:35:28 20/11/2024
- MD5 hash:
- 0e6086c5260150c11249029f212ee481
- Filesize:
- 11.36 KB
- suspicious functions used:
- curl_exec (line:20);
$file_contents = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tcreatepayment.php-
- Full path:
- asb/m/tcreatepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:00 12/12/2025
- Last modified:
- 02:35:30 20/11/2024
- MD5 hash:
- e49de9a33f5164bc2c6b88e4770faaff
- Filesize:
- 1.07 KB
- suspicious functions used:
- curl_exec (line:27);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: netowrk-snmp-data.php-
- Full path:
- asb/m/netowrk-snmp-data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:00 12/12/2025
- Last modified:
- 02:35:28 20/11/2024
- MD5 hash:
- 45b774abc8d67efb3e4e87c93b1f618b
- Filesize:
- 24.05 KB
- suspicious functions used:
- shell_exec (line:96);shell_exec (line:105);
$output = shell_exec($command . " 2>&1");shell_exec (line:115);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:134);$output_port = shell_exec($commandd . " 2>&1");shell_exec (line:146);$output = shell_exec($command . " 2>&1");shell_exec (line:157);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:173);$output_port = shell_exec($commandd);shell_exec (line:183);$output_oid_bdcom = shell_exec($command_oid_bdcom . " 2>&1");shell_exec (line:199);$outputs = shell_exec($commanda);shell_exec (line:219);$output_port = shell_exec($commandd_bdcom);shell_exec (line:229);$output_oid_cdata = shell_exec($command_oid_cdata . " 2>&1");shell_exec (line:234);$outputs = shell_exec($commanda);shell_exec (line:242);$outs = shell_exec($canda);shell_exec (line:262);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:278);$outpdut_port = shell_exec($commandd_cdata);`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:291);$output_oid_gcom = shell_exec($command_oid_gcom . " 2>&1");shell_exec (line:297);$querydd = mysqli_query($con, "SELECT `olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND `olt_id` = '$olt_id' AND sts = '0'");shell_exec (line:432);$output_vlan = shell_exec($command_vlan . " 2>&1");$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: texecutepayment.php-
- Full path:
- asb/m/texecutepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:00 12/12/2025
- Last modified:
- 02:35:30 20/11/2024
- MD5 hash:
- efbb63dfcfdacb52dec74bffc389bbb3
- Filesize:
- 2.67 KB
- suspicious functions used:
- curl_exec (line:24);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: class.phpmailer.php-
- Full path:
- asb/web/email/class.phpmailer.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:00 12/12/2025
- Last modified:
- 02:36:27 20/11/2024
- MD5 hash:
- 68468d69b47fffecc89df57e27c5a781
- Filesize:
- 143.32 KB
- suspicious functions used:
- `$DKIM_private` (line:428);popen (line:1387);
* If set, takes precedence over `$DKIM_private`.popen (line:1408);if (!@$mail = popen($sendmail, 'w')) {base64_decode (line:3410);if (!@$mail = popen($sendmail, 'w')) {`$mail->set('SMTPSecure', 'tls');` (line:3688);$data = base64_decode($data);`$mail->SMTPSecure = 'tls';` (line:3690);* `$mail->set('SMTPSecure', 'tls');`* `$mail->SMTPSecure = 'tls';` - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: class.smtp.php-
- Full path:
- asb/web/email/class.smtp.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:00 12/12/2025
- Last modified:
- 02:36:27 20/11/2024
- MD5 hash:
- aa8478329268e5438a4469c268337a10
- Filesize:
- 41.44 KB
- suspicious functions used:
- base64_decode (line:513);base64_decode (line:533);
$challenge = base64_decode($challenge);$challenge = base64_decode(substr($this->last_reply, 4)); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: JSON.php-
- Full path:
- asb/web/inc/JSON.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:01 12/12/2025
- Last modified:
- 02:36:32 20/11/2024
- MD5 hash:
- f5a34509e06231308becbe320ade9ff6
- Filesize:
- 33.22 KB
- suspicious functions used:
- eval (line:22);
* Javascript, and can be directly eval()'ed with no further parsing - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: jqgrid.php-
- Full path:
- asb/web/inc/jqgrid.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:01 12/12/2025
- Last modified:
- 02:36:32 20/11/2024
- MD5 hash:
- 71027a29e71e0626d8b57cbb631e6d98
- Filesize:
- 23.92 KB
- suspicious functions used:
- eval (line:397);
if (!empty($V4a8a08f0["condition"])) eval("\$V4b43b0ae = ".$V4a8a08f0["condition"].";"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: smsapicore.php-
- Full path:
- asb/web/include/smsapicore.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 17:40:03 12/12/2025
- Last modified:
- 07:22:48 04/12/2024
- MD5 hash:
- 9dfa7b1599728b5ccb0d4927f23bb8e5
- Filesize:
- 1.4 KB
- suspicious functions used:
- curl_exec (line:36);
$resultdgfb = curl_exec($chg); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: telegramapicore.php-
- Full path:
- asb/web/include/telegramapicore.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 12:05:14 12/12/2025
- Last modified:
- 02:36:33 20/11/2024
- MD5 hash:
- e1f2020f2a58e7b600312301697f9aca
- Filesize:
- 3 KB
- suspicious functions used:
- curl_exec (line:65);
$result11 = curl_exec($ch3); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Changes.txt-
- Full path:
- asb/web/js/jqgrid/js/Changes.txt
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:01 12/12/2025
- Last modified:
- 02:36:43 20/11/2024
- MD5 hash:
- c0a4adbc3f1c6d592cb4fa8433fee9ea
- Filesize:
- 44.32 KB
- suspicious functions used:
- system (line:87);
* Add a ant based build system which allow us to minify the JS code - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ui.php-
- Full path:
- asb/web/js/tinymce/themes/advanced/skins/highcontrast/ui.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 11:55:35 12/12/2025
- Last modified:
- 02:36:49 20/11/2024
- MD5 hash:
- 3edaf67be8573b86686f46bbba4f058c
- Filesize:
- 4.53 KB
- suspicious functions used:
- curl_exec (line:20);`bill_amount` = '0.00' WHERE bill_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY ` (line:53);
$alldataa = curl_exec($chxchhh);`bill_amount` = '0.00', days = '0.00' WHERE entry_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY ` (line:54);$queryss = mysql_query("UPDATE billing SET `bill_amount` = '0.00' WHERE bill_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY `id` DESC LIMIT 5");`payment` WHERE `pay_date` < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND pay_amount != '0.00' ORDER BY ` (line:55);$sqlqmss = mysql_query("UPDATE billing_mac SET `bill_amount` = '0.00', days = '0.00' WHERE entry_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY `id` DESC LIMIT 5");curl_exec (line:146);$sqlqmsp = mysql_query("DELETE FROM `payment` WHERE `pay_date` < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND pay_amount != '0.00' ORDER BY `id` ASC LIMIT 5");curl_exec (line:168);$responsed = curl_exec($curld);$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: AutoActiveClientsCount1.php-
- Full path:
- asb/web/AutoActiveClientsCount1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 10:41:02 12/12/2025
- Last modified:
- 02:35:40 20/11/2024
- MD5 hash:
- 3b3b6186ff2d9c5abd1772e5aa02ee33
- Filesize:
- 6.4 KB
- suspicious functions used:
- system (line:58);
$ARRAY = $API->comm("/system/resource/print"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: AutoActiveClientsCount11.php-
- Full path:
- asb/web/AutoActiveClientsCount11.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:03 12/12/2025
- Last modified:
- 02:35:40 20/11/2024
- MD5 hash:
- a0090e4a11dd59b955a6edd549b6ef2f
- Filesize:
- 5.85 KB
- suspicious functions used:
- system (line:54);
$ARRAY = $API->comm("/system/resource/print"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ClientsOnMap.php-
- Full path:
- asb/web/ClientsOnMap.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:03 12/12/2025
- Last modified:
- 06:02:56 10/11/2025
- MD5 hash:
- 519edcd6a9ccec3397e6f5280db00605
- Filesize:
- 12.2 KB
- suspicious functions used:
- `${totalonline}` (line:97);`${totaloffline}` (line:98);
document.getElementById('totalonline').textContent = `${totalonline}`;`${results.rxPower}` (line:233);document.getElementById('totaloffline').textContent = `${totaloffline}`;`${results.distance}` (line:234);var rxPower = `${results.rxPower}`;`${results.supplyVoltage}` (line:235);var distance = `${results.distance}`;`${results.temperature}` (line:236);var supplyVoltage = `${results.supplyVoltage}`;`${results.txPower}` (line:237);var temperature = `${results.temperature}`;var txPower = `${results.txPower}`; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ClientView.php-
- Full path:
- asb/web/ClientView.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 17:46:25 12/12/2025
- Last modified:
- 02:35:53 20/11/2024
- MD5 hash:
- c8fbfaee3749cd70d15e7fa381d841f4
- Filesize:
- 111.18 KB
- suspicious functions used:
- `olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:226);
$querydd = mysql_query("SELECT `olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND `olt_id` = '$c_olt_id' AND sts = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Clients.php-
- Full path:
- asb/web/Clients.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 11:55:13 12/12/2025
- Last modified:
- 02:35:48 20/11/2024
- MD5 hash:
- d59f33ca457016deee5f906de3f2ca83
- Filesize:
- 212.42 KB
- suspicious functions used:
- `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:844);
$result1rd=mysql_query("SELECT `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND `sts` = '0' order by b_name ASC"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Clients1.php-
- Full path:
- asb/web/Clients1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:04 12/12/2025
- Last modified:
- 02:35:49 20/11/2024
- MD5 hash:
- a8db87dcc6beb97539ff152b767dadae
- Filesize:
- 219.37 KB
- suspicious functions used:
- `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:835);
$result1rd=mysql_query("SELECT `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND `sts` = '0' order by b_name ASC"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Clients2.php-
- Full path:
- asb/web/Clients2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:05 12/12/2025
- Last modified:
- 02:35:50 20/11/2024
- MD5 hash:
- 982d6411552113b0715fd17c26f50292
- Filesize:
- 205.13 KB
- suspicious functions used:
- `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:832);
$result1rd=mysql_query("SELECT `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND `sts` = '0' order by b_name ASC"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Clients3.php-
- Full path:
- asb/web/Clients3.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:05 12/12/2025
- Last modified:
- 02:35:50 20/11/2024
- MD5 hash:
- 50ddc869b383ab76e009c7a2c17c99a3
- Filesize:
- 175.31 KB
- suspicious functions used:
- `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:832);
$result1rd=mysql_query("SELECT `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND `sts` = '0' order by b_name ASC"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: InstrumentsStoreOutDetails.php-
- Full path:
- asb/web/InstrumentsStoreOutDetails.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:06 12/12/2025
- Last modified:
- 02:35:57 20/11/2024
- MD5 hash:
- a60c19f766bfff1ccdccbeba6b39eb87
- Filesize:
- 9.37 KB
- suspicious functions used:
- `update_date`, '%D-%b, %y') AS offdate, TIME_FORMAT(`update_time`, '%T') AS offtime FROM `con_sts_log` WHERE `c_id` = '{$row['c_id']}' AND con_sts = 'Inactive' ORDER BY ` (line:120);
$resultwwdd=mysql_query("SELECT DATE_FORMAT(`update_date`, '%D-%b, %y') AS offdate, TIME_FORMAT(`update_time`, '%T') AS offtime FROM `con_sts_log` WHERE `c_id` = '{$row['c_id']}' AND con_sts = 'Inactive' ORDER BY `update_date_time` DESC LIMIT 1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Network.php-
- Full path:
- asb/web/Network.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:07 12/12/2025
- Last modified:
- 02:36:04 20/11/2024
- MD5 hash:
- a555bcd4afdc786ded6485ee9315887c
- Filesize:
- 57.36 KB
- suspicious functions used:
- system (line:359);shell_exec (line:631);
$ARRAY = $API->comm("/system/resource/print");$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Network1.php-
- Full path:
- asb/web/Network1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:07 12/12/2025
- Last modified:
- 02:36:04 20/11/2024
- MD5 hash:
- 0154c16125cee7431f537bf69c4ef811
- Filesize:
- 44.04 KB
- suspicious functions used:
- system (line:295);shell_exec (line:590);
$ARRAY = $API->comm("/system/resource/print");$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkTreeMap.php-
- Full path:
- asb/web/NetworkTreeMap.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:07 12/12/2025
- Last modified:
- 02:36:09 20/11/2024
- MD5 hash:
- 584d02944bd9de5a190ec6dc320fc49e
- Filesize:
- 24.24 KB
- suspicious functions used:
- `${results.rxPower}` (line:263);`${results.distance}` (line:264);
var rxPower = `${results.rxPower}`;`${results.supplyVoltage}` (line:265);var distance = `${results.distance}`;`${results.temperature}` (line:266);var supplyVoltage = `${results.supplyVoltage}`;`${results.txPower}` (line:267);var temperature = `${results.temperature}`;`${results.rxPower}` (line:283);var txPower = `${results.txPower}`;`${results.distance}` (line:284);var rxPower = `${results.rxPower}`;`${results.supplyVoltage}` (line:285);var distance = `${results.distance}`;`${results.temperature}` (line:286);var supplyVoltage = `${results.supplyVoltage}`;`${results.txPower}` (line:287);var temperature = `${results.temperature}`;var txPower = `${results.txPower}`; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: SMSAddSave.php-
- Full path:
- asb/web/SMSAddSave.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:07 12/12/2025
- Last modified:
- 04:39:44 20/11/2024
- MD5 hash:
- 3fe8fcd49062f9f5abd4a24a6b488ebf
- Filesize:
- 2.08 KB
- suspicious functions used:
- curl_exec (line:36);
$result = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: SMS1.php-
- Full path:
- asb/web/SMS1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:07 12/12/2025
- Last modified:
- 02:36:18 20/11/2024
- MD5 hash:
- e4671dadf9ad575671fd3609a60030da
- Filesize:
- 32.19 KB
- suspicious functions used:
- curl_exec (line:59);
$balance = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkLoad.php-
- Full path:
- asb/web/NetworkLoad.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:08 12/12/2025
- Last modified:
- 02:36:06 20/11/2024
- MD5 hash:
- e1632e66ee1b7394d3fb82751b924abe
- Filesize:
- 2.83 KB
- suspicious functions used:
- system (line:81);
$ARRAY = $API->comm("/system/resource/print"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkLoad1.php-
- Full path:
- asb/web/NetworkLoad1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:08 12/12/2025
- Last modified:
- 02:36:06 20/11/2024
- MD5 hash:
- 176bd6931be34d7ef351d22897accc65
- Filesize:
- 759 B
- suspicious functions used:
- system (line:18);
$ARRAY = $API->comm("/system/resource/print"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkOltAddQuery.php-
- Full path:
- asb/web/NetworkOltAddQuery.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:08 12/12/2025
- Last modified:
- 10:23:43 20/11/2024
- MD5 hash:
- 7d6641eaba35e48b4ee90b9a804ac93e
- Filesize:
- 6.46 KB
- suspicious functions used:
- shell_exec (line:21);
$output = shell_exec($command . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkOltOnuStatus.php-
- Full path:
- asb/web/NetworkOltOnuStatus.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:08 12/12/2025
- Last modified:
- 02:36:06 20/11/2024
- MD5 hash:
- 7604d17efbb57bd0b4c3566aa2d27c36
- Filesize:
- 65.16 KB
- suspicious functions used:
- shell_exec (line:42);shell_exec (line:102);
$output = shell_exec($command . " 2>&1");shell_exec (line:677);$output = shell_exec($command . " 2>&1");shell_exec (line:793);$oddutpdut = shell_exec($cmandd . " 2>&1");shell_exec (line:906);$oddutpdut = shell_exec($cmandd . " 2>&1");$oddutpdut = shell_exec($cmandd . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkOltOnuStatus2.php-
- Full path:
- asb/web/NetworkOltOnuStatus2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:08 12/12/2025
- Last modified:
- 02:36:06 20/11/2024
- MD5 hash:
- c9a14797fa4353d05bbd9427b6079250
- Filesize:
- 15.88 KB
- suspicious functions used:
- shell_exec (line:35);
$output = shell_exec($command . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkOltSense.php-
- Full path:
- asb/web/NetworkOltSense.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:08 12/12/2025
- Last modified:
- 02:36:06 20/11/2024
- MD5 hash:
- 2be664ae5006367f629ca437a6d507f8
- Filesize:
- 18.26 KB
- suspicious functions used:
- `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, `last_synced`, `last_update`, `msg`, `full_msg`, ROUND((SELECT AVG(value) FROM olt_onu_history WHERE alarm_id = '$alarmId' AND value != ''), 2) AS average_value FROM `, ` WHERE `alarm_id` = '$alarmId' AND ` (line:123);
$querddy = mysql_query("SELECT `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, `last_synced`, `last_update`, `msg`, `full_msg`, ROUND((SELECT AVG(value) FROM olt_onu_history WHERE alarm_id = '$alarmId' AND value != ''), 2) AS average_value FROM `olt_onu_history` WHERE `alarm_id` = '$alarmId' AND `value` != ''"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkOltSenseDetails.php-
- Full path:
- asb/web/NetworkOltSenseDetails.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:08 12/12/2025
- Last modified:
- 02:36:06 20/11/2024
- MD5 hash:
- 440096c601fc10b819a1f0f8330928b0
- Filesize:
- 14.17 KB
- suspicious functions used:
- `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:33);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:42);
$sql = mysql_query("SELECT `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND `value` != '' ORDER BY id DESC");`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:51);$sql = mysql_query("SELECT `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND `value` != '' ORDER BY id DESC");`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:60);$sql = mysql_query("SELECT `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND `value` != '' ORDER BY id DESC");$sql = mysql_query("SELECT `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND `value` != '' ORDER BY id DESC"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkOltSync.php-
- Full path:
- asb/web/NetworkOltSync.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:08 12/12/2025
- Last modified:
- 02:36:06 20/11/2024
- MD5 hash:
- 06633d4b65a14d677358170dd0a84424
- Filesize:
- 1.87 KB
- suspicious functions used:
- curl_exec (line:18);
$result1dd = curl_exec($ch111); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: SMS.php-
- Full path:
- asb/web/SMS.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:08 12/12/2025
- Last modified:
- 04:30:03 20/11/2024
- MD5 hash:
- d69daa8149373e2d034612f9a4006250
- Filesize:
- 35.69 KB
- suspicious functions used:
- curl_exec (line:56);
$balance = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentOnlineQuery.php-
- Full path:
- asb/web/PaymentOnlineQuery.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 09:41:53 12/12/2025
- Last modified:
- 02:36:13 20/11/2024
- MD5 hash:
- 201e1cf95b2d033897cab4bc2fd59e07
- Filesize:
- 28.5 KB
- suspicious functions used:
- curl_exec (line:457);curl_exec (line:689);
$resultdata=curl_exec($url);$content = curl_exec($handle ); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkTreeAddSave.php-
- Full path:
- asb/web/NetworkTreeAddSave.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:09 12/12/2025
- Last modified:
- 23:20:50 20/11/2024
- MD5 hash:
- a9dbc374394f257ef79f2d4f60f9771d
- Filesize:
- 5.12 KB
- suspicious functions used:
- `network_tree` WHERE `olt_id` = '$olt_id' AND ` (line:57);
$resu11 = $con->query("SELECT tree_id AS pon_parent_id FROM `network_tree` WHERE `olt_id` = '$olt_id' AND `device_type` = '1' AND sts = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentOnlineQuery2.php-
- Full path:
- asb/web/PaymentOnlineQuery2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:09 12/12/2025
- Last modified:
- 02:36:13 20/11/2024
- MD5 hash:
- ccd315d11a60901b7b9029ff44f8351b
- Filesize:
- 19.4 KB
- suspicious functions used:
- curl_exec (line:42);curl_exec (line:252);
$resultdatax=curl_exec($url);$result = curl_exec($handle); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentWebhook.php-
- Full path:
- asb/web/PaymentWebhook.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:09 12/12/2025
- Last modified:
- 02:36:13 20/11/2024
- MD5 hash:
- a2f322c94787630ab1e0c8ca35fc5ba1
- Filesize:
- 18.6 KB
- suspicious functions used:
- base64_decode (line:30);curl_exec (line:41);
$signatureDecoded = base64_decode($signature);curl_exec (line:422);curl_exec($url);$data = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkTreeEdit1.php-
- Full path:
- asb/web/NetworkTreeEdit1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:09 12/12/2025
- Last modified:
- 02:36:09 20/11/2024
- MD5 hash:
- 3396a6bdf9b5804bb208f38f37cc29a2
- Filesize:
- 35.81 KB
- suspicious functions used:
- `olt_onu` WHERE olt_id = '$olt_id' AND ` (line:207);
<?php $resultoff11d=mysql_query("SELECT id AS alarm_id, alarm_name FROM `olt_onu` WHERE olt_id = '$olt_id' AND `onu_name` LIKE '$pon_name1' ORDER BY id DESC"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkTreeEditSave.php-
- Full path:
- asb/web/NetworkTreeEditSave.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:09 12/12/2025
- Last modified:
- 23:20:50 20/11/2024
- MD5 hash:
- 6c0f94f3ddde2ee6a93db1fa98971907
- Filesize:
- 12.41 KB
- suspicious functions used:
- `network_tree` WHERE `olt_id` = '$olt_id' AND ` (line:182);
$resu11 = $con->query("SELECT tree_id AS pon_parent_id FROM `network_tree` WHERE `olt_id` = '$olt_id' AND `device_type` = '1' AND sts = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkTreeList.php-
- Full path:
- asb/web/NetworkTreeList.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:09 12/12/2025
- Last modified:
- 02:36:09 20/11/2024
- MD5 hash:
- acd468021993faf8575531952ae107f8
- Filesize:
- 21.98 KB
- suspicious functions used:
- `pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '{$row['olt_id']}' AND ` (line:287);
$result11=mysql_query("SELECT count(`pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '{$row['olt_id']}' AND `sts` = '0';"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkTreeMap1.php-
- Full path:
- asb/web/NetworkTreeMap1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:09 12/12/2025
- Last modified:
- 02:36:09 20/11/2024
- MD5 hash:
- 31a3ae9bc0bdb18726ed860ec6e8ec97
- Filesize:
- 36.43 KB
- suspicious functions used:
- `networktree_marker_data.php?tree_id=${markerId}` (line:231);`${results.rxPower}` (line:311);
fetch(`networktree_marker_data.php?tree_id=${markerId}`)`${results.distance}` (line:312);var rxPower = `${results.rxPower}`;`${results.supplyVoltage}` (line:313);var distance = `${results.distance}`;`${results.temperature}` (line:314);var supplyVoltage = `${results.supplyVoltage}`;`${results.txPower}` (line:315);var temperature = `${results.temperature}`;var txPower = `${results.txPower}`; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: SignUp1.php-
- Full path:
- asb/web/SignUp1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:10 12/12/2025
- Last modified:
- 02:36:18 20/11/2024
- MD5 hash:
- 3f7943dd155c8e0a383b7d02730f8c11
- Filesize:
- 24.59 KB
- suspicious functions used:
- curl_exec (line:33);curl_exec (line:59);
$jsona = curl_exec($ch10);$resdfwedf = curl_exec($ch1s); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_client_bandwidth_count.php-
- Full path:
- asb/web/cron_client_bandwidth_count.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 10:03:56 12/12/2025
- Last modified:
- 02:35:54 20/11/2024
- MD5 hash:
- 1c71a3dd097275429ae845a85ced0438
- Filesize:
- 5.33 KB
- suspicious functions used:
- curl_exec (line:124);curl_exec (line:134);
$result = curl_exec($ch);$result1dd = curl_exec($ch111); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_olt.php-
- Full path:
- asb/web/cron_olt.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 21:15:48 11/12/2025
- Last modified:
- 02:35:54 20/11/2024
- MD5 hash:
- 6975951fdbf566164ba5fa5cfcd32ec7
- Filesize:
- 4.27 KB
- suspicious functions used:
- shell_exec (line:48);curl_exec (line:127);
$output = shell_exec($command);$result1dd = curl_exec($ch111); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: client-online-mbb.php-
- Full path:
- asb/web/client-online-mbb.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:11 12/12/2025
- Last modified:
- 02:35:45 20/11/2024
- MD5 hash:
- 69c51efb5b9017a07a7158b4a63f3826
- Filesize:
- 14.32 KB
- suspicious functions used:
- curl_exec (line:90);
$resp = curl_exec($curlss); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_network.php-
- Full path:
- asb/web/cron_network.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 23:03:07 11/12/2025
- Last modified:
- 02:35:54 20/11/2024
- MD5 hash:
- db096f353e80027593ca3f9781a21ac8
- Filesize:
- 4.93 KB
- suspicious functions used:
- curl_exec (line:45);curl_exec (line:67);
$result1d = curl_exec($ch11);curl_exec (line:127);$result1dd = curl_exec($ch111);$result1dd = curl_exec($ch111); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_olt_clients_catch.php-
- Full path:
- asb/web/cron_olt_clients_catch.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:11 12/12/2025
- Last modified:
- 02:35:54 20/11/2024
- MD5 hash:
- 3b13c163ba3445b3d661c63adde1d985
- Filesize:
- 1.12 KB
- suspicious functions used:
- curl_exec (line:23);
$result1d = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: clients-nots-action.php-
- Full path:
- asb/web/clients-nots-action.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:11 12/12/2025
- Last modified:
- 02:35:47 20/11/2024
- MD5 hash:
- dff1bb495509427d098cb4588da553b9
- Filesize:
- 5.89 KB
- suspicious functions used:
- curl_exec (line:35);
$jsona = curl_exec($ch10); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: company_info.php-
- Full path:
- asb/web/company_info.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 21:00:18 11/12/2025
- Last modified:
- 02:35:53 20/11/2024
- MD5 hash:
- e612d58aa2e38f5b49ba37c1bf620ece
- Filesize:
- 8.38 KB
- suspicious functions used:
- curl_exec (line:130);
$alldata = curl_exec($chhhh); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: createpayment.php-
- Full path:
- asb/web/createpayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:11 12/12/2025
- Last modified:
- 02:35:53 20/11/2024
- MD5 hash:
- ba9747d0421fd091b998389469e72a0b
- Filesize:
- 1.7 KB
- suspicious functions used:
- curl_exec (line:57);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_all.php-
- Full path:
- asb/web/cron_all.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:11 12/12/2025
- Last modified:
- 02:35:53 20/11/2024
- MD5 hash:
- 967f1d654ae891609da26b9e0fdbd1ae
- Filesize:
- 2.44 KB
- suspicious functions used:
- curl_exec (line:23);curl_exec (line:38);
$result1 = curl_exec($ch1);curl_exec (line:53);$result1d = curl_exec($ch11);$result1d2 = curl_exec($ch112); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_gen_bill.php-
- Full path:
- asb/web/cron_auto_gen_bill.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:11 12/12/2025
- Last modified:
- 02:35:53 20/11/2024
- MD5 hash:
- f1056618cc4402968e50d1232d2c51c8
- Filesize:
- 4.73 KB
- suspicious functions used:
- curl_exec (line:140);curl_exec (line:149);
$respd = curl_exec($curl);$resp = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_olt_user.php-
- Full path:
- asb/web/cron_olt_user.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:11 12/12/2025
- Last modified:
- 02:35:54 20/11/2024
- MD5 hash:
- 67aa237639e3d1e6064e76079bb3cccc
- Filesize:
- 1.97 KB
- suspicious functions used:
- curl_exec (line:19);curl_exec (line:46);
$resultd1d = curl_exec($ch110);$result1d = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_inactive.php-
- Full path:
- asb/web/cron_auto_inactive.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 17:40:02 12/12/2025
- Last modified:
- 07:27:13 04/12/2024
- MD5 hash:
- cf3a14040de8d8b0fcfa84b39625357c
- Filesize:
- 6.6 KB
- suspicious functions used:
- `id`) AS payment_count FROM `payment` WHERE `c_id` = '$c_idd' AND month(`, `) = month('$update_date') AND year(` (line:50);system (line:149);
$sqlsdfss = mysql_query("SELECT COUNT(`id`) AS payment_count FROM `payment` WHERE `c_id` = '$c_idd' AND month(`pay_date`) = month('$update_date') AND year(`pay_date`) = year('$update_date')");curl_exec (line:172);Today, the system automatically deactivated '.$totalautoinactive.' clients for missing their payment deadlines.$respw = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_inactive1.php-
- Full path:
- asb/web/cron_auto_inactive1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:11 12/12/2025
- Last modified:
- 02:35:54 20/11/2024
- MD5 hash:
- 9ecc7a4271348740944ba32deb869e96
- Filesize:
- 5.71 KB
- suspicious functions used:
- `id`) AS payment_count FROM `payment` WHERE `c_id` = '$c_idd' AND month(`, `) = month('$update_date') AND year(` (line:49);curl_exec (line:144);
$sqlsdfss = mysql_query("SELECT COUNT(`id`) AS payment_count FROM `payment` WHERE `c_id` = '$c_idd' AND month(`pay_date`) = month('$update_date') AND year(`pay_date`) = year('$update_date')");$respw = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_inactive_termination.php-
- Full path:
- asb/web/cron_auto_inactive_termination.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 00:05:16 12/12/2025
- Last modified:
- 02:35:54 20/11/2024
- MD5 hash:
- 9f9c8ca9110c2304128646824bfb17db
- Filesize:
- 12.16 KB
- suspicious functions used:
- curl_exec (line:241);curl_exec (line:253);
$resp = curl_exec($curlss);$respw = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_inactive_termination1.php-
- Full path:
- asb/web/cron_auto_inactive_termination1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:11 12/12/2025
- Last modified:
- 02:35:54 20/11/2024
- MD5 hash:
- be76b964c93a2cb4fa7e632750ff3bc4
- Filesize:
- 6.64 KB
- suspicious functions used:
- curl_exec (line:156);curl_exec (line:168);
$resp = curl_exec($curlss);$respw = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: netowrk-olt-all-mac-array.php-
- Full path:
- asb/web/netowrk-olt-all-mac-array.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:11 12/12/2025
- Last modified:
- 02:36:03 20/11/2024
- MD5 hash:
- b0168ce99145e2afe64357247d750dd6
- Filesize:
- 4.62 KB
- suspicious functions used:
- shell_exec (line:33);shell_exec (line:47);
$output = shell_exec($command . " 2>&1");shell_exec (line:61);$output = shell_exec($command . " 2>&1");shell_exec (line:76);$output_oid_bdcom = shell_exec($command_oid_bdcom . " 2>&1");shell_exec (line:93);$output_oid_cdata = shell_exec($command_oid_cdata . " 2>&1");$output_oid_gcom = shell_exec($command_oid_gcom . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_termination_remainder1.php-
- Full path:
- asb/web/cron_auto_termination_remainder1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 03:06:30 12/12/2025
- Last modified:
- 02:35:54 20/11/2024
- MD5 hash:
- 7765f9f820dbd402f1064fab9958ffaa
- Filesize:
- 3.26 KB
- suspicious functions used:
- curl_exec (line:83);
$respw = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: testttttt.php-
- Full path:
- asb/web/testttttt.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:11 12/12/2025
- Last modified:
- 02:36:21 20/11/2024
- MD5 hash:
- b1988a4be29e191ad935fb409a4174ee
- Filesize:
- 2 KB
- suspicious functions used:
- curl_exec (line:47);
$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: emp_salary_advence_find.php-
- Full path:
- asb/web/emp_salary_advence_find.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:11 12/12/2025
- Last modified:
- 02:35:55 20/11/2024
- MD5 hash:
- 74a7e2ffda0f7584611d7cbce6136c24
- Filesize:
- 2.25 KB
- suspicious functions used:
- `expanse` WHERE `type` = '2' AND `status` = '2' AND ex_by = '$e_id' AND MONTH(`, `) = MONTH('$lastmonth') AND YEAR(`, `) = YEAR('$lastmonth') GROUP BY ` (line:8);`e_id` = '$e_id' AND ` (line:12);
$vendorrr = mysql_query("SELECT SUM(amount) AS salary_advance FROM `expanse` WHERE `type` = '2' AND `status` = '2' AND ex_by = '$e_id' AND MONTH(`check_date`) = MONTH('$lastmonth') AND YEAR(`check_date`) = YEAR('$lastmonth') GROUP BY `ex_by`");$empppp = mysql_query("SELECT gross_total AS gross_total FROM emp_info WHERE `e_id` = '$e_id' AND `status` = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: executepayment.php-
- Full path:
- asb/web/executepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:11 12/12/2025
- Last modified:
- 02:35:55 20/11/2024
- MD5 hash:
- c46a50905333286f45dfeacf010851ab
- Filesize:
- 716 B
- suspicious functions used:
- curl_exec (line:18);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: nagad-helper.php-
- Full path:
- asb/web/nagad-helper.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:11 12/12/2025
- Last modified:
- 02:36:02 20/11/2024
- MD5 hash:
- 2bb70c44d68202e0a0cd8ae1388f0b1b
- Filesize:
- 6.74 KB
- suspicious functions used:
- curl_exec (line:61);base64_decode (line:97);
$resultData = curl_exec($url);openssl_private_decrypt(base64_decode($cryptText), $plain_text, $private_key); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: nagad-merchant-callback.php-
- Full path:
- asb/web/nagad-merchant-callback.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:11 12/12/2025
- Last modified:
- 02:36:03 20/11/2024
- MD5 hash:
- abc8d9e7aad4d9c622dcd97e701448bc
- Filesize:
- 16.5 KB
- suspicious functions used:
- curl_exec (line:20);
$file_contents = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: getclientuptime.php-
- Full path:
- asb/web/getclientuptime.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:11 12/12/2025
- Last modified:
- 02:35:56 20/11/2024
- MD5 hash:
- bbc14cdd451c72b94d78c7d2d1af0b52
- Filesize:
- 718 B
- suspicious functions used:
- curl_exec (line:18);
$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: netowrk-snmp-data.php-
- Full path:
- asb/web/netowrk-snmp-data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 18:57:26 12/12/2025
- Last modified:
- 02:36:03 20/11/2024
- MD5 hash:
- 9badf5c53b260315a061e1bb6cd2378f
- Filesize:
- 24.8 KB
- suspicious functions used:
- shell_exec (line:104);shell_exec (line:113);
$output = shell_exec($command . " 2>&1");shell_exec (line:123);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:142);$output_port = shell_exec($commandd . " 2>&1");shell_exec (line:154);$output = shell_exec($command . " 2>&1");shell_exec (line:165);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:181);$output_port = shell_exec($commandd);shell_exec (line:191);$output_oid_bdcom = shell_exec($command_oid_bdcom . " 2>&1");shell_exec (line:207);$outputs = shell_exec($commanda);shell_exec (line:227);$output_port = shell_exec($commandd_bdcom);shell_exec (line:236);$output_oid_cdata = shell_exec($command_oid_cdata . " 2>&1");shell_exec (line:244);$outputs = shell_exec($commanda);shell_exec (line:251);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:256);$output_pon = shell_exec($command_ponn . " 2>&1");`pon_name` FROM `olt_pon` WHERE `olt_pon_id` = '$pon_id' AND ` (line:263);$outsddd = shell_exec($commddandd);shell_exec (line:280);$qrydd = mysqli_query($con, "SELECT `pon_name` FROM `olt_pon` WHERE `olt_pon_id` = '$pon_id' AND `olt_id` = '$olt_id' AND sts = '0'");shell_exec (line:290);$outsdd = shell_exec($commddand);`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:303);$output_oid_gcom = shell_exec($command_oid_gcom . " 2>&1");shell_exec (line:309);$querydd = mysqli_query($con, "SELECT `olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND `olt_id` = '$olt_id' AND sts = '0'");shell_exec (line:444);$output_vlan = shell_exec($command_vlan . " 2>&1");$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-old-onu-rx-map.php-
- Full path:
- asb/web/network-old-onu-rx-map.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:11 12/12/2025
- Last modified:
- 02:36:03 20/11/2024
- MD5 hash:
- b4962c160c5ad68ccd8eed9c48d82a0f
- Filesize:
- 6.94 KB
- suspicious functions used:
- shell_exec (line:76);
$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-old-onu-rx.php-
- Full path:
- asb/web/network-old-onu-rx.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:11 12/12/2025
- Last modified:
- 02:36:03 20/11/2024
- MD5 hash:
- b4962c160c5ad68ccd8eed9c48d82a0f
- Filesize:
- 6.94 KB
- suspicious functions used:
- shell_exec (line:76);
$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: imagevwr.php-
- Full path:
- asb/web/imagevwr.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 18:57:26 12/12/2025
- Last modified:
- 02:35:57 20/11/2024
- MD5 hash:
- 47a223a13cc642d01dcfaaca542d396d
- Filesize:
- 915 B
- suspicious functions used:
- curl_exec (line:15);
$image_data = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: texecutepayment.php-
- Full path:
- asb/web/texecutepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 09:41:53 12/12/2025
- Last modified:
- 02:36:21 20/11/2024
- MD5 hash:
- 623635fdf5c871391d3a5fe99ee8c543
- Filesize:
- 2.91 KB
- suspicious functions used:
- curl_exec (line:24);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: index.php-
- Full path:
- asb/web/index.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 05:16:38 12/12/2025
- Last modified:
- 02:35:57 20/11/2024
- MD5 hash:
- f161ab23adf4527023a0ad582d478f89
- Filesize:
- 12.45 KB
- suspicious functions used:
- base64_decode (line:10);curl_exec (line:183);
list($encrypted_data,$iv,$key) = explode('::',base64_decode($ciphertext));$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ip-ping-checker.php-
- Full path:
- asb/web/ip-ping-checker.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:11 12/12/2025
- Last modified:
- 02:35:58 20/11/2024
- MD5 hash:
- 0d28f3053b73b3fe2885cf519ee17c12
- Filesize:
- 2.64 KB
- suspicious functions used:
- curl_exec (line:81);
$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: webhook_test.php-
- Full path:
- asb/web/webhook_test.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:11 12/12/2025
- Last modified:
- 02:36:23 20/11/2024
- MD5 hash:
- 74a7dcc262d7fe7f2bdc9e0595d03837
- Filesize:
- 4.69 KB
- suspicious functions used:
- base64_decode (line:22);curl_exec (line:33);
$signatureDecoded = base64_decode($signature);curl_exec (line:86);curl_exec($url);curl_exec (line:107);$result = curl_exec($ch);$data = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: login_exec.php-
- Full path:
- asb/web/login_exec.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 12:08:41 12/12/2025
- Last modified:
- 02:35:58 20/11/2024
- MD5 hash:
- 9038a77a32a5db2c9affae1496473f3e
- Filesize:
- 5.27 KB
- suspicious functions used:
- curl_exec (line:62);
$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: loginexec.php-
- Full path:
- asb/web/loginexec.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:12 12/12/2025
- Last modified:
- 02:35:58 20/11/2024
- MD5 hash:
- edb8017e7d0f8e037facbcacc94a383d
- Filesize:
- 5.91 KB
- suspicious functions used:
- curl_exec (line:67);
$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-client-onu-mac-count-cdata.php-
- Full path:
- asb/web/network-olt-client-onu-mac-count-cdata.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:12 12/12/2025
- Last modified:
- 02:36:03 20/11/2024
- MD5 hash:
- c378dbabf36066c335cfb8838a6e167d
- Filesize:
- 4.58 KB
- suspicious functions used:
- shell_exec (line:25);shell_exec (line:35);
$od_vddlan = shell_exec($codmn . " 2>&1");shell_exec (line:56);$od_vddlan = shell_exec($codmn . " 2>&1");shell_exec (line:103);$output_vdlan = shell_exec($command_dvlan . " 2>&1");shell_exec (line:115);$od_vdlan = shell_exec($coddvlan . " 2>&1");shell_exec (line:126);$output_port = shell_exec($commandd_bdcom);shell_exec (line:140);$od_vddlan = shell_exec($codmn . " 2>&1");$od_vdddlan = shell_exec($codmdn . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: test6.php-
- Full path:
- asb/web/test6.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:12 12/12/2025
- Last modified:
- 02:36:21 20/11/2024
- MD5 hash:
- f22d022ddc284f4d8e1de3660da91db8
- Filesize:
- 15.61 KB
- suspicious functions used:
- shell_exec (line:34);shell_exec (line:113);
$outputs = shell_exec($snmpCommand);shell_exec (line:126);$outpdduts = shell_exec($sand);shell_exec (line:132);$outputsmac = shell_exec($snmpCommandmac);$output_vlan = shell_exec($command_vlan . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-client-onu-mac-count.php-
- Full path:
- asb/web/network-olt-client-onu-mac-count.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:12 12/12/2025
- Last modified:
- 02:36:03 20/11/2024
- MD5 hash:
- 300ca68aa5a7a32160838b9f2627d2aa
- Filesize:
- 14.56 KB
- suspicious functions used:
- shell_exec (line:26);shell_exec (line:36);
$od_vddlan = shell_exec($codmn . " 2>&1");shell_exec (line:68);$od_vddlan = shell_exec($codmn . " 2>&1");shell_exec (line:84);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:101);$outpudt_vlan = shell_exec($commadnd_vlan . " 2>&1");shell_exec (line:119);$output_port = shell_exec($commandd_bdcom);shell_exec (line:135);$output_vdlan = shell_exec($command_vdlan . " 2>&1");shell_exec (line:176);$outpdut_vdlan = shell_exec($commadnd_dvlan . " 2>&1");shell_exec (line:236);$output_vdlan = shell_exec($command_dvlan . " 2>&1");shell_exec (line:312);$outpdut_vdlan = shell_exec($commadnd_dvlan . " 2>&1");shell_exec (line:379);$output_vdlan = shell_exec($command_dvlan . " 2>&1");shell_exec (line:441);$od_vddddlan = shell_exec($codmddn . " 2>&1");shell_exec (line:460);$od_vdlan = shell_exec($coddvlan . " 2>&1");shell_exec (line:479);$od_vddlan = shell_exec($codmn . " 2>&1");$od_vdddlan = shell_exec($codmdn . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tis-news.php-
- Full path:
- asb/web/tis-news.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:48:50 11/12/2025
- Last modified:
- 02:36:21 20/11/2024
- MD5 hash:
- ed23ca98b77c5321b4485e85eb2ea64d
- Filesize:
- 3.67 KB
- suspicious functions used:
- curl_exec (line:22);
$alldata1 = curl_exec($chhhh1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-client-onu-mac-countt.php-
- Full path:
- asb/web/network-olt-client-onu-mac-countt.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:12 12/12/2025
- Last modified:
- 02:36:03 20/11/2024
- MD5 hash:
- d29b4e72c375f528b769bd3894f9f0e7
- Filesize:
- 8.95 KB
- suspicious functions used:
- shell_exec (line:26);shell_exec (line:36);
$od_vddlan = shell_exec($codmn . " 2>&1");shell_exec (line:59);$od_vddlan = shell_exec($codmn . " 2>&1");shell_exec (line:75);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:92);$outpudt_vlan = shell_exec($commadnd_vlan . " 2>&1");shell_exec (line:102);$output_port = shell_exec($commandd_bdcom);shell_exec (line:117);$output_vdlan = shell_exec($command_vdlan . " 2>&1");shell_exec (line:155);$outpdut_vdlan = shell_exec($commadnd_dvlan . " 2>&1");shell_exec (line:206);$output_vdlan = shell_exec($command_dvlan . " 2>&1");shell_exec (line:262);$od_vddddlan = shell_exec($codmddn . " 2>&1");shell_exec (line:275);$od_vdlan = shell_exec($coddvlan . " 2>&1");shell_exec (line:288);$od_vddlan = shell_exec($codmn . " 2>&1");$od_vdddlan = shell_exec($codmdn . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: token.php-
- Full path:
- asb/web/token.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:12 12/12/2025
- Last modified:
- 02:36:21 20/11/2024
- MD5 hash:
- 7d8e71ceda3ffb74623e0c4a814715af
- Filesize:
- 1.53 KB
- suspicious functions used:
- curl_exec (line:42);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-con-sts.php-
- Full path:
- asb/web/network-olt-con-sts.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:12 12/12/2025
- Last modified:
- 02:36:03 20/11/2024
- MD5 hash:
- a26b0a1c1567c34c9aa5e2e0254ff8a6
- Filesize:
- 4 KB
- suspicious functions used:
- `olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:10);shell_exec (line:38);
$query = mysqli_query($con, "SELECT `olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND `sts` = '0'");`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, `last_synced`, `last_update`, `msg`, `full_msg`, ROUND((SELECT AVG(value) FROM olt_onu_history WHERE alarm_id = '$alarmId' AND value != ''), 2) AS average_value FROM `, ` WHERE `alarm_id` = '$alarmId' AND ` (line:82);$output = shell_exec($command);$query = mysqli_query($con, "SELECT `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, `last_synced`, `last_update`, `msg`, `full_msg`, ROUND((SELECT AVG(value) FROM olt_onu_history WHERE alarm_id = '$alarmId' AND value != ''), 2) AS average_value FROM `olt_onu_history` WHERE `alarm_id` = '$alarmId' AND `value` != ''"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: test2.php-
- Full path:
- asb/web/test2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:12 12/12/2025
- Last modified:
- 02:36:21 20/11/2024
- MD5 hash:
- ab80d92ede21b7da59bfefb325484297
- Filesize:
- 13.76 KB
- suspicious functions used:
- shell_exec (line:59);shell_exec (line:70);
$output = shell_exec($command);shell_exec (line:76);$output1 = shell_exec($command1);shell_exec (line:88);$output2 = shell_exec($command2);shell_exec (line:101);$output_vdlan = shell_exec($command_dvlan . " 2>&1");shell_exec (line:141);$output_vdlan = shell_exec($command_dvlan . " 2>&1");curl_exec (line:187);$output_vdlanf = shell_exec($command_dvlan . " 2>&1");curl_exec (line:212);$result11 = curl_exec($ch3);curl_exec (line:354);$response = curl_exec($ch);$result11 = curl_exec($ch3); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-load.php-
- Full path:
- asb/web/network-olt-load.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:12 12/12/2025
- Last modified:
- 02:36:03 20/11/2024
- MD5 hash:
- f49d5153285c639ed91d4e806685ee56
- Filesize:
- 1.33 KB
- suspicious functions used:
- shell_exec (line:22);shell_exec (line:25);
$output = shell_exec($command . " 2>&1");$output1 = shell_exec($command1 . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tt.php-
- Full path:
- asb/web/tt.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:12 12/12/2025
- Last modified:
- 02:36:21 20/11/2024
- MD5 hash:
- 9c4ed141cb79fdc7e807b35923c91a20
- Filesize:
- 1.56 KB
- suspicious functions used:
- curl_exec (line:30);
$response = curl_exec($curl); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-oid-check.php-
- Full path:
- asb/web/network-olt-oid-check.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:12 12/12/2025
- Last modified:
- 02:36:03 20/11/2024
- MD5 hash:
- 5b7dc0ce1103fbfc895873c250b63141
- Filesize:
- 1.88 KB
- suspicious functions used:
- shell_exec (line:33);
return shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-onu-alarm-add.php-
- Full path:
- asb/web/network-olt-onu-alarm-add.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:12 12/12/2025
- Last modified:
- 02:36:03 20/11/2024
- MD5 hash:
- be6ba82c658419e1454f778e20e2d4c3
- Filesize:
- 7.86 KB
- suspicious functions used:
- shell_exec (line:103);
$output = shell_exec($command . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: support-action.php-
- Full path:
- asb/web/support-action.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:12 12/12/2025
- Last modified:
- 02:36:20 20/11/2024
- MD5 hash:
- 58556808f93f52486b2ad06998142aa9
- Filesize:
- 14.56 KB
- suspicious functions used:
- curl_exec (line:220);
$jsona = curl_exec($ch10); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-onu-count.php-
- Full path:
- asb/web/network-olt-onu-count.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:12 12/12/2025
- Last modified:
- 02:36:03 20/11/2024
- MD5 hash:
- 67dd698e92e750fe16906b88b074cb88
- Filesize:
- 5.18 KB
- suspicious functions used:
- `olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:11);shell_exec (line:65);
$query = mysqli_query($con, "SELECT `olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND `online_sts` = '1' AND `sts` = '0'");$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ttoken.php-
- Full path:
- asb/web/ttoken.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 09:41:36 12/12/2025
- Last modified:
- 02:36:21 20/11/2024
- MD5 hash:
- 5f2c51c1db5b0defadfb67ce25c0098f
- Filesize:
- 1.54 KB
- suspicious functions used:
- curl_exec (line:42);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-onu-list-data.php-
- Full path:
- asb/web/network-olt-onu-list-data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:12 12/12/2025
- Last modified:
- 02:36:03 20/11/2024
- MD5 hash:
- 54cc9417c766c31317311c3722ce7d4b
- Filesize:
- 9.48 KB
- suspicious functions used:
- shell_exec (line:24);shell_exec (line:38);
$outputs = shell_exec($commanda);shell_exec (line:64);$output = shell_exec($command);shell_exec (line:85);$outputs = shell_exec($commanda);shell_exec (line:104);$output = shell_exec($command);shell_exec (line:125);$outputs = shell_exec($commanda);shell_exec (line:143);$output = shell_exec($command);shell_exec (line:153);$od_vdlan = shell_exec($commanda . " 2>&1");shell_exec (line:165);$od_vdland = shell_exec($coddvland . " 2>&1");shell_exec (line:185);$outputs = shell_exec($coddvladnd . " 2>&1");$output_vdlan = shell_exec($command_vdlan); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-onu-power.php-
- Full path:
- asb/web/network-olt-onu-power.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:12 12/12/2025
- Last modified:
- 02:36:03 20/11/2024
- MD5 hash:
- 2e064543b67b532bdf4e5b12d49c5052
- Filesize:
- 7.54 KB
- suspicious functions used:
- shell_exec (line:97);
$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-pon-clients-search.php-
- Full path:
- asb/web/network-olt-pon-clients-search.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:12 12/12/2025
- Last modified:
- 02:36:03 20/11/2024
- MD5 hash:
- 79d26fc66abdab6f173330588aa8b238
- Filesize:
- 10.93 KB
- suspicious functions used:
- shell_exec (line:42);shell_exec (line:51);
$output = shell_exec($command . " 2>&1");shell_exec (line:104);$outputS = shell_exec($command . " 2>&1");shell_exec (line:168);$snmpOutput = shell_exec($command);$snmpOutput = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: webhook.php-
- Full path:
- asb/web/webhook.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:12 12/12/2025
- Last modified:
- 02:36:23 20/11/2024
- MD5 hash:
- 26e2059a39281031d28874b51b52d60c
- Filesize:
- 21.23 KB
- suspicious functions used:
- base64_decode (line:27);curl_exec (line:38);
$signatureDecoded = base64_decode($signature);curl_exec (line:454);curl_exec($url);$data = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-pon-onu-search-bdcom.php-
- Full path:
- asb/web/network-olt-pon-onu-search-bdcom.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:12 12/12/2025
- Last modified:
- 02:36:03 20/11/2024
- MD5 hash:
- c786fa8b69268c738b6ff976631798cd
- Filesize:
- 27.74 KB
- suspicious functions used:
- shell_exec (line:60);shell_exec (line:69);
$output = shell_exec($command . " 2>&1");shell_exec (line:383);$outputS = shell_exec($commandS . " 2>&1");$snmpOutput = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: networktree_device_type.php-
- Full path:
- asb/web/networktree_device_type.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:12 12/12/2025
- Last modified:
- 23:20:50 20/11/2024
- MD5 hash:
- f1520732e5a3ef38564238a3278a1f63
- Filesize:
- 11.43 KB
- suspicious functions used:
- `tree_id`) AS countolt FROM `network_tree` WHERE `olt_id` = '$olt_id_sure' AND ` (line:64);
$resu11=mysql_query("SELECT COUNT(`tree_id`) AS countolt FROM `network_tree` WHERE `olt_id` = '$olt_id_sure' AND `device_type` = '1' AND sts = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: webhook2.php-
- Full path:
- asb/web/webhook2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:12 12/12/2025
- Last modified:
- 02:36:23 20/11/2024
- MD5 hash:
- 18c8353c99f0ca2645c68685e40c568b
- Filesize:
- 21.1 KB
- suspicious functions used:
- base64_decode (line:28);curl_exec (line:39);
$signatureDecoded = base64_decode($signature);curl_exec (line:429);curl_exec($url);$data = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-pon-onu-search-bdcom1.php-
- Full path:
- asb/web/network-olt-pon-onu-search-bdcom1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:12 12/12/2025
- Last modified:
- 02:36:03 20/11/2024
- MD5 hash:
- dd18677b1dcbf7f0bce2ac6912d98da0
- Filesize:
- 9.6 KB
- suspicious functions used:
- shell_exec (line:42);shell_exec (line:51);
$output = shell_exec($command . " 2>&1");shell_exec (line:129);$outputS = shell_exec($command . " 2>&1");$snmpOutput = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-pon-onu-search.php-
- Full path:
- asb/web/network-olt-pon-onu-search.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:12 12/12/2025
- Last modified:
- 02:36:04 20/11/2024
- MD5 hash:
- dc183ecf77d0e1f56f672338fd09cfa5
- Filesize:
- 21.62 KB
- suspicious functions used:
- shell_exec (line:35);
$output = shell_exec($command . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-snmp-onu-status-data-bdcom.php-
- Full path:
- asb/web/network-snmp-onu-status-data-bdcom.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:13 12/12/2025
- Last modified:
- 02:36:04 20/11/2024
- MD5 hash:
- 065f5e2b05932ee66d473135998580ac
- Filesize:
- 23.53 KB
- suspicious functions used:
- shell_exec (line:48);shell_exec (line:73);
$oudddputsd = shell_exec($commddanda . " 2>&1");shell_exec (line:85);$oudddputsd = shell_exec($commddanda . " 2>&1");shell_exec (line:103);$oudddputsd = shell_exec($commddanda . " 2>&1");shell_exec (line:116);$output = shell_exec($command . " 2>&1");shell_exec (line:128);$outputs = shell_exec($commanda);shell_exec (line:134);$outpdut = shell_exec($commandd . " 2>&1");shell_exec (line:159);$oddutpdut = shell_exec($cmandd . " 2>&1");shell_exec (line:172);$output = shell_exec($command . " 2>&1");shell_exec (line:184);$outputs = shell_exec($commanda);shell_exec (line:190);$outpdut = shell_exec($commandd . " 2>&1");shell_exec (line:217);$oddutpdut = shell_exec($cmandd . " 2>&1");shell_exec (line:233);$output_oid_cdata = shell_exec($command_oid_cdata . " 2>&1");shell_exec (line:239);$outputs = shell_exec($commanda);shell_exec (line:244);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:248);$output_pon = shell_exec($command_ponn . " 2>&1");`pon_name` FROM `olt_pon` WHERE `olt_pon_id` = '$ponn_id' AND ` (line:255);$outsddd = shell_exec($commddandd);shell_exec (line:263);$qrydd = mysqli_query($con, "SELECT `pon_name` FROM `olt_pon` WHERE `olt_pon_id` = '$ponn_id' AND `olt_id` = '$olt_id' AND sts = '0'");$oddutpdut = shell_exec($cmandd . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-snmp-onu-status-data.php-
- Full path:
- asb/web/network-snmp-onu-status-data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:13 12/12/2025
- Last modified:
- 02:36:04 20/11/2024
- MD5 hash:
- 0adfee384bf349b50f11036947fd2a74
- Filesize:
- 30.37 KB
- suspicious functions used:
- shell_exec (line:38);`olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:42);
$outputs = shell_exec($snmpCommand);shell_exec (line:81);$re11=mysql_query("SELECT `olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND `olt_pon_id` = '$check_pon_name'");shell_exec (line:95);$outputs = shell_exec($snmpCommand);shell_exec (line:109);$outpdduts = shell_exec($sand);shell_exec (line:122);$outputs = shell_exec($snmpCommand);shell_exec (line:208);$outpdduts = shell_exec($sand);shell_exec (line:429);$outputsmac = shell_exec($snmpCommandmac);shell_exec (line:441);$outputsmac = shell_exec($snmpCommandmac);shell_exec (line:448);$outputsmac = shell_exec($snmpCommandmac);$output_vlan = shell_exec($command_vlan . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-snmp-onu-status-data1.php-
- Full path:
- asb/web/network-snmp-onu-status-data1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:13 12/12/2025
- Last modified:
- 02:36:04 20/11/2024
- MD5 hash:
- 920bd1a592c36f7a1194b737642f8340
- Filesize:
- 15.96 KB
- suspicious functions used:
- shell_exec (line:33);`olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:37);
$outputs = shell_exec($snmpCommand);shell_exec (line:149);$re11=mysql_query("SELECT `olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND `olt_pon_id` = '$check_pon_name'");$outputsmac = shell_exec($snmpCommandmac); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-snmp-onu-status-data_vsol2.php-
- Full path:
- asb/web/network-snmp-onu-status-data_vsol2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:13 12/12/2025
- Last modified:
- 02:36:04 20/11/2024
- MD5 hash:
- f22d022ddc284f4d8e1de3660da91db8
- Filesize:
- 15.61 KB
- suspicious functions used:
- shell_exec (line:34);shell_exec (line:113);
$outputs = shell_exec($snmpCommand);shell_exec (line:126);$outpdduts = shell_exec($sand);shell_exec (line:132);$outputsmac = shell_exec($snmpCommandmac);$output_vlan = shell_exec($command_vlan . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tagreeexpayment.php-
- Full path:
- asb/web/tagreeexpayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:13 12/12/2025
- Last modified:
- 02:36:20 20/11/2024
- MD5 hash:
- 029b4fba649a75c7c81d2f8931be8d63
- Filesize:
- 2.86 KB
- suspicious functions used:
- curl_exec (line:26);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tcreateagree.php-
- Full path:
- asb/web/tcreateagree.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:13 12/12/2025
- Last modified:
- 02:36:20 20/11/2024
- MD5 hash:
- 27a10adf4190edc7eceee8cf74a6b72b
- Filesize:
- 999 B
- suspicious functions used:
- curl_exec (line:26);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tcreatepayment.php-
- Full path:
- asb/web/tcreatepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 09:41:41 12/12/2025
- Last modified:
- 02:36:20 20/11/2024
- MD5 hash:
- e49de9a33f5164bc2c6b88e4770faaff
- Filesize:
- 1.07 KB
- suspicious functions used:
- curl_exec (line:27);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-tree-vartual-nodes.php-
- Full path:
- asb/web/network-tree-vartual-nodes.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:13 12/12/2025
- Last modified:
- 02:36:04 20/11/2024
- MD5 hash:
- 3530b8bc3113544014b1746ecd67e834
- Filesize:
- 10.64 KB
- suspicious functions used:
- shell_exec (line:76);shell_exec (line:111);
$outputs = shell_exec($commanda);shell_exec (line:145);$outputs = shell_exec($commanda);shell_exec (line:181);$outputs = shell_exec($commanda);shell_exec (line:188);$od_vdlan = shell_exec($commanda . " 2>&1");$od_vdland = shell_exec($coddvland . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: test7.php-
- Full path:
- asb/web/test7.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:13 12/12/2025
- Last modified:
- 02:36:21 20/11/2024
- MD5 hash:
- b11ccf951ce63a21ea0a7328316a0e5c
- Filesize:
- 1.57 KB
- suspicious functions used:
- curl_exec (line:14);
$result1dd = curl_exec($ch111); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: networktree-olt-onu-list-data.php-
- Full path:
- asb/web/networktree-olt-onu-list-data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:13 12/12/2025
- Last modified:
- 02:36:07 20/11/2024
- MD5 hash:
- af4221fefa9c9051846a063ac4135560
- Filesize:
- 8.72 KB
- suspicious functions used:
- shell_exec (line:24);shell_exec (line:36);
$outputs = shell_exec($commanda);shell_exec (line:59);$output = shell_exec($command);shell_exec (line:78);$outputs = shell_exec($commanda);shell_exec (line:97);$output = shell_exec($command);shell_exec (line:116);$outputs = shell_exec($commanda);shell_exec (line:134);$output = shell_exec($command);shell_exec (line:143);$od_vdlan = shell_exec($commanda . " 2>&1");shell_exec (line:155);$od_vdland = shell_exec($coddvland . " 2>&1");shell_exec (line:175);$outputs = shell_exec($coddvladnd . " 2>&1");$output_vdlan = shell_exec($command_vdlan); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: networktree_device_onu_list_add.php-
- Full path:
- asb/web/networktree_device_onu_list_add.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:13 12/12/2025
- Last modified:
- 02:36:09 20/11/2024
- MD5 hash:
- 444ccf3c3e852a5a25cc4ccd3a5cf9ca
- Filesize:
- 14.66 KB
- suspicious functions used:
- `network_tree` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND device_type = '5' AND ` (line:9);shell_exec (line:33);
$resu11=mysql_query("SELECT pon_index_id FROM `network_tree` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND device_type = '5' AND `sts` = '0'");`network_tree` WHERE `onu_mac` = '$mac_address' AND ` (line:131);$output = shell_exec($command . " 2>&1");shell_exec (line:179);$reu11=mysql_query("SELECT count(tree_id) AS onucount FROM `network_tree` WHERE `onu_mac` = '$mac_address' AND `sts` = '0'");shell_exec (line:187);$output = shell_exec($command . " 2>&1");shell_exec (line:235);$outputS = shell_exec($commandS . " 2>&1");`network_tree` WHERE `onu_mac` = '$onuMac' AND ` (line:301);$snmpOutput = shell_exec($command);$reu11=mysql_query("SELECT count(tree_id) AS onucount FROM `network_tree` WHERE `onu_mac` = '$onuMac' AND `sts` = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: sms-balance-check.php-
- Full path:
- asb/web/sms-balance-check.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:13 12/12/2025
- Last modified:
- 02:36:18 20/11/2024
- MD5 hash:
- 74ac3e963a0dc5bb7d4c980e594aa39b
- Filesize:
- 854 B
- suspicious functions used:
- curl_exec (line:15);
$balance = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: networktree_device_pon_check.php-
- Full path:
- asb/web/networktree_device_pon_check.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:13 12/12/2025
- Last modified:
- 02:36:09 20/11/2024
- MD5 hash:
- 708a93aadcae96ecf0aaca52041fcf38
- Filesize:
- 1.53 KB
- suspicious functions used:
- `pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '$olt_id' AND ` (line:8);
$result11=mysql_query("SELECT count(`pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '$olt_id' AND `sts` = '0';"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: sms_deliverey_report.php-
- Full path:
- asb/web/sms_deliverey_report.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:13 12/12/2025
- Last modified:
- 02:36:19 20/11/2024
- MD5 hash:
- 03623943da7e9334e137b38c8577fc84
- Filesize:
- 4.25 KB
- suspicious functions used:
- curl_exec (line:28);curl_exec (line:53);
$result11 = curl_exec($ch1);curl_exec (line:90);$resultdd = curl_exec($ch);$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: networktree_device_pon_list_add.php-
- Full path:
- asb/web/networktree_device_pon_list_add.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:13 12/12/2025
- Last modified:
- 02:36:09 20/11/2024
- MD5 hash:
- 2ec03912801e4749c2e9cd361417ca5f
- Filesize:
- 1.36 KB
- suspicious functions used:
- `olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:6);`olt_pon` WHERE `olt_id` = '$olt_id' AND ` (line:10);
$resu11=mysql_query("SELECT olt_name FROM `olt_con` WHERE `olt_id` = '$olt_id' AND `sts` = '0'");`network_tree` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND ` (line:17);$result11=mysql_query("SELECT pon_id, olt_pon_id, pon_name FROM `olt_pon` WHERE `olt_id` = '$olt_id' AND `sts` = '0'");$rehu11=mysql_query("SELECT count(tree_id) AS poncount FROM `network_tree` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND `sts` = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: networktree_device_pon_port_onu_list.php-
- Full path:
- asb/web/networktree_device_pon_port_onu_list.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:13 12/12/2025
- Last modified:
- 02:36:09 20/11/2024
- MD5 hash:
- 9c63b3ac69996628f5eb2959a9eb4e15
- Filesize:
- 8.65 KB
- suspicious functions used:
- `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:25);shell_exec (line:32);
$rff11=mysqli_query($con, "SELECT olt_pon_id AS pon_port FROM `olt_pon` WHERE olt_id = '$olt_id' AND `pon_name` LIKE '$pon_portt'");shell_exec (line:45);$outputs = shell_exec($commanda);`network_tree` WHERE onu_index_id = '$port_onu_index_id' AND ` (line:49);$output = shell_exec($command);shell_exec (line:81);$rff11d=mysqli_query($con, "SELECT onu_name, onu_index, onu_index_id, onu_mac FROM `network_tree` WHERE onu_index_id = '$port_onu_index_id' AND `olt_id` = '$olt_id'");shell_exec (line:103);$outputs = shell_exec($commanda);shell_exec (line:122);$output = shell_exec($command);shell_exec (line:143);$outputs = shell_exec($commanda);shell_exec (line:161);$output = shell_exec($command);shell_exec (line:170);$od_vdlan = shell_exec($commanda . " 2>&1");shell_exec (line:184);$od_vdland = shell_exec($coddvland . " 2>&1");$outputs = shell_exec($coddvladnd . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: networktree_device_pon_port_sense_list.php-
- Full path:
- asb/web/networktree_device_pon_port_sense_list.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:13 12/12/2025
- Last modified:
- 02:36:09 20/11/2024
- MD5 hash:
- ee69cd5cc122f8aa37d8d8e5c74def6b
- Filesize:
- 3.65 KB
- suspicious functions used:
- `network_tree` WHERE `onu_mac` = '$onu_mac' AND ` (line:26);`network_tree` WHERE `c_id` = '{$dfhbdxf}' AND ` (line:71);
$reu1d1=mysqli_query($con, "SELECT tree_id AS router_parant_id FROM `network_tree` WHERE `onu_mac` = '$onu_mac' AND `sts` = '0'");$reu11=mysqli_query($con, "SELECT count(c_id) AS client_count FROM `network_tree` WHERE `c_id` = '{$dfhbdxf}' AND `sts` = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: AutoActiveClientsCount1.php-
- Full path:
- at/web/AutoActiveClientsCount1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 10:28:35 12/12/2025
- Last modified:
- 01:15:38 10/12/2024
- MD5 hash:
- 3b3b6186ff2d9c5abd1772e5aa02ee33
- Filesize:
- 6.4 KB
- suspicious functions used:
- system (line:58);
$ARRAY = $API->comm("/system/resource/print"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: AutoActiveClientsCount11.php-
- Full path:
- at/web/AutoActiveClientsCount11.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:13 12/12/2025
- Last modified:
- 01:15:38 10/12/2024
- MD5 hash:
- a0090e4a11dd59b955a6edd549b6ef2f
- Filesize:
- 5.85 KB
- suspicious functions used:
- system (line:54);
$ARRAY = $API->comm("/system/resource/print"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: client-online-mbb.php-
- Full path:
- at/web/client-online-mbb.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:14 12/12/2025
- Last modified:
- 01:15:43 10/12/2024
- MD5 hash:
- e16c33ab6ddd7649ea56a7d5355365b6
- Filesize:
- 16.46 KB
- suspicious functions used:
- curl_exec (line:90);curl_exec (line:289);
$resp = curl_exec($curlss);$resp = curl_exec($curlss); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: clients-nots-action.php-
- Full path:
- at/web/clients-nots-action.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:15 12/12/2025
- Last modified:
- 01:15:47 10/12/2024
- MD5 hash:
- dff1bb495509427d098cb4588da553b9
- Filesize:
- 5.89 KB
- suspicious functions used:
- curl_exec (line:35);
$jsona = curl_exec($ch10); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Clients.php-
- Full path:
- at/web/Clients.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 04:00:03 12/12/2025
- Last modified:
- 01:15:48 10/12/2024
- MD5 hash:
- d59f33ca457016deee5f906de3f2ca83
- Filesize:
- 212.42 KB
- suspicious functions used:
- `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:844);
$result1rd=mysql_query("SELECT `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND `sts` = '0' order by b_name ASC"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Clients1.php-
- Full path:
- at/web/Clients1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:15 12/12/2025
- Last modified:
- 01:15:49 10/12/2024
- MD5 hash:
- a8db87dcc6beb97539ff152b767dadae
- Filesize:
- 219.37 KB
- suspicious functions used:
- `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:835);
$result1rd=mysql_query("SELECT `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND `sts` = '0' order by b_name ASC"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Clients2.php-
- Full path:
- at/web/Clients2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:15 12/12/2025
- Last modified:
- 01:15:51 10/12/2024
- MD5 hash:
- 982d6411552113b0715fd17c26f50292
- Filesize:
- 205.13 KB
- suspicious functions used:
- `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:832);
$result1rd=mysql_query("SELECT `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND `sts` = '0' order by b_name ASC"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Clients3.php-
- Full path:
- at/web/Clients3.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:16 12/12/2025
- Last modified:
- 01:15:51 10/12/2024
- MD5 hash:
- 50ddc869b383ab76e009c7a2c17c99a3
- Filesize:
- 175.31 KB
- suspicious functions used:
- `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:832);
$result1rd=mysql_query("SELECT `box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND `sts` = '0' order by b_name ASC"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ClientsOnMap.php-
- Full path:
- at/web/ClientsOnMap.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:16 12/12/2025
- Last modified:
- 06:02:56 10/11/2025
- MD5 hash:
- 519edcd6a9ccec3397e6f5280db00605
- Filesize:
- 12.2 KB
- suspicious functions used:
- `${totalonline}` (line:97);`${totaloffline}` (line:98);
document.getElementById('totalonline').textContent = `${totalonline}`;`${results.rxPower}` (line:233);document.getElementById('totaloffline').textContent = `${totaloffline}`;`${results.distance}` (line:234);var rxPower = `${results.rxPower}`;`${results.supplyVoltage}` (line:235);var distance = `${results.distance}`;`${results.temperature}` (line:236);var supplyVoltage = `${results.supplyVoltage}`;`${results.txPower}` (line:237);var temperature = `${results.temperature}`;var txPower = `${results.txPower}`; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ClientView.php-
- Full path:
- at/web/ClientView.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 10:33:48 12/12/2025
- Last modified:
- 01:15:55 10/12/2024
- MD5 hash:
- fd3851e3989fa9ae1655ed1acb19eac9
- Filesize:
- 112.28 KB
- suspicious functions used:
- `olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:226);
$querydd = mysql_query("SELECT `olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND `olt_id` = '$c_olt_id' AND sts = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: company_info.php-
- Full path:
- at/web/company_info.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:55:38 11/12/2025
- Last modified:
- 01:15:56 10/12/2024
- MD5 hash:
- e612d58aa2e38f5b49ba37c1bf620ece
- Filesize:
- 8.38 KB
- suspicious functions used:
- curl_exec (line:130);
$alldata = curl_exec($chhhh); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: createpayment.php-
- Full path:
- at/web/createpayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:17 12/12/2025
- Last modified:
- 01:15:56 10/12/2024
- MD5 hash:
- ba9747d0421fd091b998389469e72a0b
- Filesize:
- 1.7 KB
- suspicious functions used:
- curl_exec (line:57);
$resultdata=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_all.php-
- Full path:
- at/web/cron_all.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:17 12/12/2025
- Last modified:
- 01:15:56 10/12/2024
- MD5 hash:
- 967f1d654ae891609da26b9e0fdbd1ae
- Filesize:
- 2.44 KB
- suspicious functions used:
- curl_exec (line:23);curl_exec (line:38);
$result1 = curl_exec($ch1);curl_exec (line:53);$result1d = curl_exec($ch11);$result1d2 = curl_exec($ch112); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_gen_bill.php-
- Full path:
- at/web/cron_auto_gen_bill.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:17 12/12/2025
- Last modified:
- 01:15:56 10/12/2024
- MD5 hash:
- f1056618cc4402968e50d1232d2c51c8
- Filesize:
- 4.73 KB
- suspicious functions used:
- curl_exec (line:140);curl_exec (line:149);
$respd = curl_exec($curl);$resp = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_inactive.php-
- Full path:
- at/web/cron_auto_inactive.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:17 12/12/2025
- Last modified:
- 03:22:11 10/12/2024
- MD5 hash:
- 7e0dc4dd9dae2bf0220516641b53c027
- Filesize:
- 5.43 KB
- suspicious functions used:
- curl_exec (line:142);
$respw = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_inactive2.php-
- Full path:
- at/web/cron_auto_inactive2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:17 12/12/2025
- Last modified:
- 01:15:56 10/12/2024
- MD5 hash:
- 440bc24f05b01eb395df63fff2f60de9
- Filesize:
- 5.46 KB
- suspicious functions used:
- curl_exec (line:142);
$respw = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_inactive_termination.php-
- Full path:
- at/web/cron_auto_inactive_termination.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 01:45:38 12/12/2025
- Last modified:
- 01:15:56 10/12/2024
- MD5 hash:
- 9f9c8ca9110c2304128646824bfb17db
- Filesize:
- 12.16 KB
- suspicious functions used:
- curl_exec (line:241);curl_exec (line:253);
$resp = curl_exec($curlss);$respw = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_inactive_termination1.php-
- Full path:
- at/web/cron_auto_inactive_termination1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:17 12/12/2025
- Last modified:
- 01:15:56 10/12/2024
- MD5 hash:
- be76b964c93a2cb4fa7e632750ff3bc4
- Filesize:
- 6.64 KB
- suspicious functions used:
- curl_exec (line:156);curl_exec (line:168);
$resp = curl_exec($curlss);$respw = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_auto_termination_remainder1.php-
- Full path:
- at/web/cron_auto_termination_remainder1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 03:07:24 12/12/2025
- Last modified:
- 01:15:56 10/12/2024
- MD5 hash:
- 7765f9f820dbd402f1064fab9958ffaa
- Filesize:
- 3.26 KB
- suspicious functions used:
- curl_exec (line:83);
$respw = curl_exec($curls); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_client_bandwidth_count.php-
- Full path:
- at/web/cron_client_bandwidth_count.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 00:14:01 12/12/2025
- Last modified:
- 01:15:56 10/12/2024
- MD5 hash:
- 1c71a3dd097275429ae845a85ced0438
- Filesize:
- 5.33 KB
- suspicious functions used:
- curl_exec (line:124);curl_exec (line:134);
$result = curl_exec($ch);$result1dd = curl_exec($ch111); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_network.php-
- Full path:
- at/web/cron_network.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 07:44:30 12/12/2025
- Last modified:
- 01:15:56 10/12/2024
- MD5 hash:
- db096f353e80027593ca3f9781a21ac8
- Filesize:
- 4.93 KB
- suspicious functions used:
- curl_exec (line:45);curl_exec (line:67);
$result1d = curl_exec($ch11);curl_exec (line:127);$result1dd = curl_exec($ch111);$result1dd = curl_exec($ch111); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_olt.php-
- Full path:
- at/web/cron_olt.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:17 12/12/2025
- Last modified:
- 01:15:56 10/12/2024
- MD5 hash:
- 6975951fdbf566164ba5fa5cfcd32ec7
- Filesize:
- 4.27 KB
- suspicious functions used:
- shell_exec (line:48);curl_exec (line:127);
$output = shell_exec($command);$result1dd = curl_exec($ch111); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_olt_clients_catch.php-
- Full path:
- at/web/cron_olt_clients_catch.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:17 12/12/2025
- Last modified:
- 01:15:56 10/12/2024
- MD5 hash:
- 3b13c163ba3445b3d661c63adde1d985
- Filesize:
- 1.12 KB
- suspicious functions used:
- curl_exec (line:23);
$result1d = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: cron_olt_user.php-
- Full path:
- at/web/cron_olt_user.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:17 12/12/2025
- Last modified:
- 01:15:56 10/12/2024
- MD5 hash:
- 67aa237639e3d1e6064e76079bb3cccc
- Filesize:
- 1.97 KB
- suspicious functions used:
- curl_exec (line:19);curl_exec (line:46);
$resultd1d = curl_exec($ch110);$result1d = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: emp_salary_advence_find.php-
- Full path:
- at/web/emp_salary_advence_find.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:17 12/12/2025
- Last modified:
- 01:15:57 10/12/2024
- MD5 hash:
- 74a7e2ffda0f7584611d7cbce6136c24
- Filesize:
- 2.25 KB
- suspicious functions used:
- `expanse` WHERE `type` = '2' AND `status` = '2' AND ex_by = '$e_id' AND MONTH(`, `) = MONTH('$lastmonth') AND YEAR(`, `) = YEAR('$lastmonth') GROUP BY ` (line:8);`e_id` = '$e_id' AND ` (line:12);
$vendorrr = mysql_query("SELECT SUM(amount) AS salary_advance FROM `expanse` WHERE `type` = '2' AND `status` = '2' AND ex_by = '$e_id' AND MONTH(`check_date`) = MONTH('$lastmonth') AND YEAR(`check_date`) = YEAR('$lastmonth') GROUP BY `ex_by`");$empppp = mysql_query("SELECT gross_total AS gross_total FROM emp_info WHERE `e_id` = '$e_id' AND `status` = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: executepayment.php-
- Full path:
- at/web/executepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:17 12/12/2025
- Last modified:
- 01:15:57 10/12/2024
- MD5 hash:
- c46a50905333286f45dfeacf010851ab
- Filesize:
- 716 B
- suspicious functions used:
- curl_exec (line:18);
$resultdatax=curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: getclientuptime.php-
- Full path:
- at/web/getclientuptime.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:17 12/12/2025
- Last modified:
- 01:16:00 10/12/2024
- MD5 hash:
- bbc14cdd451c72b94d78c7d2d1af0b52
- Filesize:
- 718 B
- suspicious functions used:
- curl_exec (line:18);
$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: imagevwr.php-
- Full path:
- at/web/imagevwr.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:17 12/12/2025
- Last modified:
- 01:16:00 10/12/2024
- MD5 hash:
- 47a223a13cc642d01dcfaaca542d396d
- Filesize:
- 915 B
- suspicious functions used:
- curl_exec (line:15);
$image_data = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: index.php-
- Full path:
- at/web/index.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 03:58:01 12/12/2025
- Last modified:
- 06:28:59 11/12/2024
- MD5 hash:
- f161ab23adf4527023a0ad582d478f89
- Filesize:
- 12.45 KB
- suspicious functions used:
- base64_decode (line:10);curl_exec (line:183);
list($encrypted_data,$iv,$key) = explode('::',base64_decode($ciphertext));$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: index2.php-
- Full path:
- at/web/index2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:17 12/12/2025
- Last modified:
- 01:16:00 10/12/2024
- MD5 hash:
- 8a294c29885d611c0ef21d4b361af210
- Filesize:
- 13.82 KB
- suspicious functions used:
- base64_decode (line:8);curl_exec (line:218);
list($encrypted_data, $iv, $key) = explode('::', base64_decode($ciphertext));$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: InstrumentsStoreOutDetails.php-
- Full path:
- at/web/InstrumentsStoreOutDetails.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:17 12/12/2025
- Last modified:
- 01:16:00 10/12/2024
- MD5 hash:
- a60c19f766bfff1ccdccbeba6b39eb87
- Filesize:
- 9.37 KB
- suspicious functions used:
- `update_date`, '%D-%b, %y') AS offdate, TIME_FORMAT(`update_time`, '%T') AS offtime FROM `con_sts_log` WHERE `c_id` = '{$row['c_id']}' AND con_sts = 'Inactive' ORDER BY ` (line:120);
$resultwwdd=mysql_query("SELECT DATE_FORMAT(`update_date`, '%D-%b, %y') AS offdate, TIME_FORMAT(`update_time`, '%T') AS offtime FROM `con_sts_log` WHERE `c_id` = '{$row['c_id']}' AND con_sts = 'Inactive' ORDER BY `update_date_time` DESC LIMIT 1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: ip-ping-checker.php-
- Full path:
- at/web/ip-ping-checker.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:18 12/12/2025
- Last modified:
- 01:16:01 10/12/2024
- MD5 hash:
- 0d28f3053b73b3fe2885cf519ee17c12
- Filesize:
- 2.64 KB
- suspicious functions used:
- curl_exec (line:81);
$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: loginexec.php-
- Full path:
- at/web/loginexec.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:18 12/12/2025
- Last modified:
- 01:16:02 10/12/2024
- MD5 hash:
- edb8017e7d0f8e037facbcacc94a383d
- Filesize:
- 5.91 KB
- suspicious functions used:
- curl_exec (line:67);
$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: login_exec.php-
- Full path:
- at/web/login_exec.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 10:28:33 12/12/2025
- Last modified:
- 12:11:59 10/12/2024
- MD5 hash:
- 9038a77a32a5db2c9affae1496473f3e
- Filesize:
- 5.27 KB
- suspicious functions used:
- curl_exec (line:62);
$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: login_exec2.php-
- Full path:
- at/web/login_exec2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:18 12/12/2025
- Last modified:
- 01:16:02 10/12/2024
- MD5 hash:
- 9038a77a32a5db2c9affae1496473f3e
- Filesize:
- 5.27 KB
- suspicious functions used:
- curl_exec (line:62);
$result110 = curl_exec($ch11); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: nagad-helper.php-
- Full path:
- at/web/nagad-helper.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:19 12/12/2025
- Last modified:
- 01:16:07 10/12/2024
- MD5 hash:
- 2bb70c44d68202e0a0cd8ae1388f0b1b
- Filesize:
- 6.74 KB
- suspicious functions used:
- curl_exec (line:61);base64_decode (line:97);
$resultData = curl_exec($url);openssl_private_decrypt(base64_decode($cryptText), $plain_text, $private_key); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: nagad-merchant-callback.php-
- Full path:
- at/web/nagad-merchant-callback.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:19 12/12/2025
- Last modified:
- 01:16:07 10/12/2024
- MD5 hash:
- abc8d9e7aad4d9c622dcd97e701448bc
- Filesize:
- 16.5 KB
- suspicious functions used:
- curl_exec (line:20);
$file_contents = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: netowrk-olt-all-mac-array.php-
- Full path:
- at/web/netowrk-olt-all-mac-array.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:19 12/12/2025
- Last modified:
- 01:16:07 10/12/2024
- MD5 hash:
- b0168ce99145e2afe64357247d750dd6
- Filesize:
- 4.62 KB
- suspicious functions used:
- shell_exec (line:33);shell_exec (line:47);
$output = shell_exec($command . " 2>&1");shell_exec (line:61);$output = shell_exec($command . " 2>&1");shell_exec (line:76);$output_oid_bdcom = shell_exec($command_oid_bdcom . " 2>&1");shell_exec (line:93);$output_oid_cdata = shell_exec($command_oid_cdata . " 2>&1");$output_oid_gcom = shell_exec($command_oid_gcom . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: netowrk-snmp-data.php-
- Full path:
- at/web/netowrk-snmp-data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:19 12/12/2025
- Last modified:
- 01:16:07 10/12/2024
- MD5 hash:
- 9badf5c53b260315a061e1bb6cd2378f
- Filesize:
- 24.8 KB
- suspicious functions used:
- shell_exec (line:104);shell_exec (line:113);
$output = shell_exec($command . " 2>&1");shell_exec (line:123);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:142);$output_port = shell_exec($commandd . " 2>&1");shell_exec (line:154);$output = shell_exec($command . " 2>&1");shell_exec (line:165);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:181);$output_port = shell_exec($commandd);shell_exec (line:191);$output_oid_bdcom = shell_exec($command_oid_bdcom . " 2>&1");shell_exec (line:207);$outputs = shell_exec($commanda);shell_exec (line:227);$output_port = shell_exec($commandd_bdcom);shell_exec (line:236);$output_oid_cdata = shell_exec($command_oid_cdata . " 2>&1");shell_exec (line:244);$outputs = shell_exec($commanda);shell_exec (line:251);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:256);$output_pon = shell_exec($command_ponn . " 2>&1");`pon_name` FROM `olt_pon` WHERE `olt_pon_id` = '$pon_id' AND ` (line:263);$outsddd = shell_exec($commddandd);shell_exec (line:280);$qrydd = mysqli_query($con, "SELECT `pon_name` FROM `olt_pon` WHERE `olt_pon_id` = '$pon_id' AND `olt_id` = '$olt_id' AND sts = '0'");shell_exec (line:290);$outsdd = shell_exec($commddand);`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:303);$output_oid_gcom = shell_exec($command_oid_gcom . " 2>&1");shell_exec (line:309);$querydd = mysqli_query($con, "SELECT `olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND `olt_id` = '$olt_id' AND sts = '0'");shell_exec (line:444);$output_vlan = shell_exec($command_vlan . " 2>&1");$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-old-onu-rx-map.php-
- Full path:
- at/web/network-old-onu-rx-map.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:19 12/12/2025
- Last modified:
- 01:16:07 10/12/2024
- MD5 hash:
- b4962c160c5ad68ccd8eed9c48d82a0f
- Filesize:
- 6.94 KB
- suspicious functions used:
- shell_exec (line:76);
$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-old-onu-rx.php-
- Full path:
- at/web/network-old-onu-rx.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:19 12/12/2025
- Last modified:
- 01:16:07 10/12/2024
- MD5 hash:
- b4962c160c5ad68ccd8eed9c48d82a0f
- Filesize:
- 6.94 KB
- suspicious functions used:
- shell_exec (line:76);
$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-client-onu-mac-count-cdata.php-
- Full path:
- at/web/network-olt-client-onu-mac-count-cdata.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:19 12/12/2025
- Last modified:
- 01:16:07 10/12/2024
- MD5 hash:
- c378dbabf36066c335cfb8838a6e167d
- Filesize:
- 4.58 KB
- suspicious functions used:
- shell_exec (line:25);shell_exec (line:35);
$od_vddlan = shell_exec($codmn . " 2>&1");shell_exec (line:56);$od_vddlan = shell_exec($codmn . " 2>&1");shell_exec (line:103);$output_vdlan = shell_exec($command_dvlan . " 2>&1");shell_exec (line:115);$od_vdlan = shell_exec($coddvlan . " 2>&1");shell_exec (line:126);$output_port = shell_exec($commandd_bdcom);shell_exec (line:140);$od_vddlan = shell_exec($codmn . " 2>&1");$od_vdddlan = shell_exec($codmdn . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-client-onu-mac-count.php-
- Full path:
- at/web/network-olt-client-onu-mac-count.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:19 12/12/2025
- Last modified:
- 01:16:07 10/12/2024
- MD5 hash:
- 300ca68aa5a7a32160838b9f2627d2aa
- Filesize:
- 14.56 KB
- suspicious functions used:
- shell_exec (line:26);shell_exec (line:36);
$od_vddlan = shell_exec($codmn . " 2>&1");shell_exec (line:68);$od_vddlan = shell_exec($codmn . " 2>&1");shell_exec (line:84);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:101);$outpudt_vlan = shell_exec($commadnd_vlan . " 2>&1");shell_exec (line:119);$output_port = shell_exec($commandd_bdcom);shell_exec (line:135);$output_vdlan = shell_exec($command_vdlan . " 2>&1");shell_exec (line:176);$outpdut_vdlan = shell_exec($commadnd_dvlan . " 2>&1");shell_exec (line:236);$output_vdlan = shell_exec($command_dvlan . " 2>&1");shell_exec (line:312);$outpdut_vdlan = shell_exec($commadnd_dvlan . " 2>&1");shell_exec (line:379);$output_vdlan = shell_exec($command_dvlan . " 2>&1");shell_exec (line:441);$od_vddddlan = shell_exec($codmddn . " 2>&1");shell_exec (line:460);$od_vdlan = shell_exec($coddvlan . " 2>&1");shell_exec (line:479);$od_vddlan = shell_exec($codmn . " 2>&1");$od_vdddlan = shell_exec($codmdn . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-client-onu-mac-countt.php-
- Full path:
- at/web/network-olt-client-onu-mac-countt.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:19 12/12/2025
- Last modified:
- 01:16:07 10/12/2024
- MD5 hash:
- d29b4e72c375f528b769bd3894f9f0e7
- Filesize:
- 8.95 KB
- suspicious functions used:
- shell_exec (line:26);shell_exec (line:36);
$od_vddlan = shell_exec($codmn . " 2>&1");shell_exec (line:59);$od_vddlan = shell_exec($codmn . " 2>&1");shell_exec (line:75);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:92);$outpudt_vlan = shell_exec($commadnd_vlan . " 2>&1");shell_exec (line:102);$output_port = shell_exec($commandd_bdcom);shell_exec (line:117);$output_vdlan = shell_exec($command_vdlan . " 2>&1");shell_exec (line:155);$outpdut_vdlan = shell_exec($commadnd_dvlan . " 2>&1");shell_exec (line:206);$output_vdlan = shell_exec($command_dvlan . " 2>&1");shell_exec (line:262);$od_vddddlan = shell_exec($codmddn . " 2>&1");shell_exec (line:275);$od_vdlan = shell_exec($coddvlan . " 2>&1");shell_exec (line:288);$od_vddlan = shell_exec($codmn . " 2>&1");$od_vdddlan = shell_exec($codmdn . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-con-sts.php-
- Full path:
- at/web/network-olt-con-sts.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:19 12/12/2025
- Last modified:
- 01:16:08 10/12/2024
- MD5 hash:
- a26b0a1c1567c34c9aa5e2e0254ff8a6
- Filesize:
- 4 KB
- suspicious functions used:
- `olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:10);shell_exec (line:38);
$query = mysqli_query($con, "SELECT `olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND `sts` = '0'");`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, `last_synced`, `last_update`, `msg`, `full_msg`, ROUND((SELECT AVG(value) FROM olt_onu_history WHERE alarm_id = '$alarmId' AND value != ''), 2) AS average_value FROM `, ` WHERE `alarm_id` = '$alarmId' AND ` (line:82);$output = shell_exec($command);$query = mysqli_query($con, "SELECT `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, `last_synced`, `last_update`, `msg`, `full_msg`, ROUND((SELECT AVG(value) FROM olt_onu_history WHERE alarm_id = '$alarmId' AND value != ''), 2) AS average_value FROM `olt_onu_history` WHERE `alarm_id` = '$alarmId' AND `value` != ''"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-load.php-
- Full path:
- at/web/network-olt-load.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:19 12/12/2025
- Last modified:
- 01:16:08 10/12/2024
- MD5 hash:
- f49d5153285c639ed91d4e806685ee56
- Filesize:
- 1.33 KB
- suspicious functions used:
- shell_exec (line:22);shell_exec (line:25);
$output = shell_exec($command . " 2>&1");$output1 = shell_exec($command1 . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-oid-check.php-
- Full path:
- at/web/network-olt-oid-check.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:19 12/12/2025
- Last modified:
- 01:16:08 10/12/2024
- MD5 hash:
- 5b7dc0ce1103fbfc895873c250b63141
- Filesize:
- 1.88 KB
- suspicious functions used:
- shell_exec (line:33);
return shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-onu-alarm-add.php-
- Full path:
- at/web/network-olt-onu-alarm-add.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:19 12/12/2025
- Last modified:
- 01:16:08 10/12/2024
- MD5 hash:
- be6ba82c658419e1454f778e20e2d4c3
- Filesize:
- 7.86 KB
- suspicious functions used:
- shell_exec (line:103);
$output = shell_exec($command . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-onu-count.php-
- Full path:
- at/web/network-olt-onu-count.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:19 12/12/2025
- Last modified:
- 01:16:08 10/12/2024
- MD5 hash:
- eed277fdd838fc119df53ba5ebda8a77
- Filesize:
- 5.44 KB
- suspicious functions used:
- `olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:11);shell_exec (line:69);
$query = mysqli_query($con, "SELECT `olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND `online_sts` = '1' AND `sts` = '0'");$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-onu-list-data.php-
- Full path:
- at/web/network-olt-onu-list-data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:19 12/12/2025
- Last modified:
- 01:16:08 10/12/2024
- MD5 hash:
- 54cc9417c766c31317311c3722ce7d4b
- Filesize:
- 9.48 KB
- suspicious functions used:
- shell_exec (line:24);shell_exec (line:38);
$outputs = shell_exec($commanda);shell_exec (line:64);$output = shell_exec($command);shell_exec (line:85);$outputs = shell_exec($commanda);shell_exec (line:104);$output = shell_exec($command);shell_exec (line:125);$outputs = shell_exec($commanda);shell_exec (line:143);$output = shell_exec($command);shell_exec (line:153);$od_vdlan = shell_exec($commanda . " 2>&1");shell_exec (line:165);$od_vdland = shell_exec($coddvland . " 2>&1");shell_exec (line:185);$outputs = shell_exec($coddvladnd . " 2>&1");$output_vdlan = shell_exec($command_vdlan); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-onu-power.php-
- Full path:
- at/web/network-olt-onu-power.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:19 12/12/2025
- Last modified:
- 01:16:08 10/12/2024
- MD5 hash:
- 2e064543b67b532bdf4e5b12d49c5052
- Filesize:
- 7.54 KB
- suspicious functions used:
- shell_exec (line:97);
$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-pon-clients-search.php-
- Full path:
- at/web/network-olt-pon-clients-search.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:19 12/12/2025
- Last modified:
- 01:16:08 10/12/2024
- MD5 hash:
- 79d26fc66abdab6f173330588aa8b238
- Filesize:
- 10.93 KB
- suspicious functions used:
- shell_exec (line:42);shell_exec (line:51);
$output = shell_exec($command . " 2>&1");shell_exec (line:104);$outputS = shell_exec($command . " 2>&1");shell_exec (line:168);$snmpOutput = shell_exec($command);$snmpOutput = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-pon-onu-search-bdcom.php-
- Full path:
- at/web/network-olt-pon-onu-search-bdcom.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:19 12/12/2025
- Last modified:
- 01:16:08 10/12/2024
- MD5 hash:
- c786fa8b69268c738b6ff976631798cd
- Filesize:
- 27.74 KB
- suspicious functions used:
- shell_exec (line:60);shell_exec (line:69);
$output = shell_exec($command . " 2>&1");shell_exec (line:383);$outputS = shell_exec($commandS . " 2>&1");$snmpOutput = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-pon-onu-search-bdcom1.php-
- Full path:
- at/web/network-olt-pon-onu-search-bdcom1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:19 12/12/2025
- Last modified:
- 01:16:08 10/12/2024
- MD5 hash:
- dd18677b1dcbf7f0bce2ac6912d98da0
- Filesize:
- 9.6 KB
- suspicious functions used:
- shell_exec (line:42);shell_exec (line:51);
$output = shell_exec($command . " 2>&1");shell_exec (line:129);$outputS = shell_exec($command . " 2>&1");$snmpOutput = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-olt-pon-onu-search.php-
- Full path:
- at/web/network-olt-pon-onu-search.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:19 12/12/2025
- Last modified:
- 01:16:08 10/12/2024
- MD5 hash:
- dc183ecf77d0e1f56f672338fd09cfa5
- Filesize:
- 21.62 KB
- suspicious functions used:
- shell_exec (line:35);
$output = shell_exec($command . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-snmp-onu-status-data-bdcom.php-
- Full path:
- at/web/network-snmp-onu-status-data-bdcom.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:19 12/12/2025
- Last modified:
- 01:16:09 10/12/2024
- MD5 hash:
- 065f5e2b05932ee66d473135998580ac
- Filesize:
- 23.53 KB
- suspicious functions used:
- shell_exec (line:48);shell_exec (line:73);
$oudddputsd = shell_exec($commddanda . " 2>&1");shell_exec (line:85);$oudddputsd = shell_exec($commddanda . " 2>&1");shell_exec (line:103);$oudddputsd = shell_exec($commddanda . " 2>&1");shell_exec (line:116);$output = shell_exec($command . " 2>&1");shell_exec (line:128);$outputs = shell_exec($commanda);shell_exec (line:134);$outpdut = shell_exec($commandd . " 2>&1");shell_exec (line:159);$oddutpdut = shell_exec($cmandd . " 2>&1");shell_exec (line:172);$output = shell_exec($command . " 2>&1");shell_exec (line:184);$outputs = shell_exec($commanda);shell_exec (line:190);$outpdut = shell_exec($commandd . " 2>&1");shell_exec (line:217);$oddutpdut = shell_exec($cmandd . " 2>&1");shell_exec (line:233);$output_oid_cdata = shell_exec($command_oid_cdata . " 2>&1");shell_exec (line:239);$outputs = shell_exec($commanda);shell_exec (line:244);$output_vlan = shell_exec($command_vlan . " 2>&1");shell_exec (line:248);$output_pon = shell_exec($command_ponn . " 2>&1");`pon_name` FROM `olt_pon` WHERE `olt_pon_id` = '$ponn_id' AND ` (line:255);$outsddd = shell_exec($commddandd);shell_exec (line:263);$qrydd = mysqli_query($con, "SELECT `pon_name` FROM `olt_pon` WHERE `olt_pon_id` = '$ponn_id' AND `olt_id` = '$olt_id' AND sts = '0'");$oddutpdut = shell_exec($cmandd . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-snmp-onu-status-data.php-
- Full path:
- at/web/network-snmp-onu-status-data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:19 12/12/2025
- Last modified:
- 01:16:09 10/12/2024
- MD5 hash:
- 0adfee384bf349b50f11036947fd2a74
- Filesize:
- 30.37 KB
- suspicious functions used:
- shell_exec (line:38);`olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:42);
$outputs = shell_exec($snmpCommand);shell_exec (line:81);$re11=mysql_query("SELECT `olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND `olt_pon_id` = '$check_pon_name'");shell_exec (line:95);$outputs = shell_exec($snmpCommand);shell_exec (line:109);$outpdduts = shell_exec($sand);shell_exec (line:122);$outputs = shell_exec($snmpCommand);shell_exec (line:208);$outpdduts = shell_exec($sand);shell_exec (line:429);$outputsmac = shell_exec($snmpCommandmac);shell_exec (line:441);$outputsmac = shell_exec($snmpCommandmac);shell_exec (line:448);$outputsmac = shell_exec($snmpCommandmac);$output_vlan = shell_exec($command_vlan . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-snmp-onu-status-data1.php-
- Full path:
- at/web/network-snmp-onu-status-data1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:19 12/12/2025
- Last modified:
- 01:16:09 10/12/2024
- MD5 hash:
- 920bd1a592c36f7a1194b737642f8340
- Filesize:
- 15.96 KB
- suspicious functions used:
- shell_exec (line:33);`olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:37);
$outputs = shell_exec($snmpCommand);shell_exec (line:149);$re11=mysql_query("SELECT `olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND `olt_pon_id` = '$check_pon_name'");$outputsmac = shell_exec($snmpCommandmac); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-snmp-onu-status-data_vsol2.php-
- Full path:
- at/web/network-snmp-onu-status-data_vsol2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:19 12/12/2025
- Last modified:
- 01:16:09 10/12/2024
- MD5 hash:
- f22d022ddc284f4d8e1de3660da91db8
- Filesize:
- 15.61 KB
- suspicious functions used:
- shell_exec (line:34);shell_exec (line:113);
$outputs = shell_exec($snmpCommand);shell_exec (line:126);$outpdduts = shell_exec($sand);shell_exec (line:132);$outputsmac = shell_exec($snmpCommandmac);$output_vlan = shell_exec($command_vlan . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: network-tree-vartual-nodes.php-
- Full path:
- at/web/network-tree-vartual-nodes.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:19 12/12/2025
- Last modified:
- 01:16:09 10/12/2024
- MD5 hash:
- 3530b8bc3113544014b1746ecd67e834
- Filesize:
- 10.64 KB
- suspicious functions used:
- shell_exec (line:76);shell_exec (line:111);
$outputs = shell_exec($commanda);shell_exec (line:145);$outputs = shell_exec($commanda);shell_exec (line:181);$outputs = shell_exec($commanda);shell_exec (line:188);$od_vdlan = shell_exec($commanda . " 2>&1");$od_vdland = shell_exec($coddvland . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Network.php-
- Full path:
- at/web/Network.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:19 12/12/2025
- Last modified:
- 13:54:53 10/12/2024
- MD5 hash:
- 5cad04b92cb3a82af73389d4c0c23c05
- Filesize:
- 57.88 KB
- suspicious functions used:
- system (line:359);shell_exec (line:631);
$ARRAY = $API->comm("/system/resource/print");$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: Network1.php-
- Full path:
- at/web/Network1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:19 12/12/2025
- Last modified:
- 01:16:10 10/12/2024
- MD5 hash:
- 0154c16125cee7431f537bf69c4ef811
- Filesize:
- 44.04 KB
- suspicious functions used:
- system (line:295);shell_exec (line:590);
$ARRAY = $API->comm("/system/resource/print");$output = shell_exec($command); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkLoad.php-
- Full path:
- at/web/NetworkLoad.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:20 12/12/2025
- Last modified:
- 01:16:11 10/12/2024
- MD5 hash:
- e1632e66ee1b7394d3fb82751b924abe
- Filesize:
- 2.83 KB
- suspicious functions used:
- system (line:81);
$ARRAY = $API->comm("/system/resource/print"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkLoad1.php-
- Full path:
- at/web/NetworkLoad1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:20 12/12/2025
- Last modified:
- 01:16:11 10/12/2024
- MD5 hash:
- 176bd6931be34d7ef351d22897accc65
- Filesize:
- 759 B
- suspicious functions used:
- system (line:18);
$ARRAY = $API->comm("/system/resource/print"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkOltAddQuery.php-
- Full path:
- at/web/NetworkOltAddQuery.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:20 12/12/2025
- Last modified:
- 13:42:23 10/12/2024
- MD5 hash:
- 695cd7eaea6d8343ca41b11f5a852e90
- Filesize:
- 6.6 KB
- suspicious functions used:
- shell_exec (line:21);
$output = shell_exec($command . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkOltOnuStatus.php-
- Full path:
- at/web/NetworkOltOnuStatus.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:20 12/12/2025
- Last modified:
- 01:16:11 10/12/2024
- MD5 hash:
- 7604d17efbb57bd0b4c3566aa2d27c36
- Filesize:
- 65.16 KB
- suspicious functions used:
- shell_exec (line:42);shell_exec (line:102);
$output = shell_exec($command . " 2>&1");shell_exec (line:677);$output = shell_exec($command . " 2>&1");shell_exec (line:793);$oddutpdut = shell_exec($cmandd . " 2>&1");shell_exec (line:906);$oddutpdut = shell_exec($cmandd . " 2>&1");$oddutpdut = shell_exec($cmandd . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkOltOnuStatus2.php-
- Full path:
- at/web/NetworkOltOnuStatus2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:20 12/12/2025
- Last modified:
- 01:16:11 10/12/2024
- MD5 hash:
- c9a14797fa4353d05bbd9427b6079250
- Filesize:
- 15.88 KB
- suspicious functions used:
- shell_exec (line:35);
$output = shell_exec($command . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkOltSense.php-
- Full path:
- at/web/NetworkOltSense.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:20 12/12/2025
- Last modified:
- 01:16:12 10/12/2024
- MD5 hash:
- 2be664ae5006367f629ca437a6d507f8
- Filesize:
- 18.26 KB
- suspicious functions used:
- `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, `last_synced`, `last_update`, `msg`, `full_msg`, ROUND((SELECT AVG(value) FROM olt_onu_history WHERE alarm_id = '$alarmId' AND value != ''), 2) AS average_value FROM `, ` WHERE `alarm_id` = '$alarmId' AND ` (line:123);
$querddy = mysql_query("SELECT `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, `last_synced`, `last_update`, `msg`, `full_msg`, ROUND((SELECT AVG(value) FROM olt_onu_history WHERE alarm_id = '$alarmId' AND value != ''), 2) AS average_value FROM `olt_onu_history` WHERE `alarm_id` = '$alarmId' AND `value` != ''"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkOltSenseDetails.php-
- Full path:
- at/web/NetworkOltSenseDetails.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:20 12/12/2025
- Last modified:
- 01:16:12 10/12/2024
- MD5 hash:
- 440096c601fc10b819a1f0f8330928b0
- Filesize:
- 14.17 KB
- suspicious functions used:
- `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:33);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:42);
$sql = mysql_query("SELECT `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND `value` != '' ORDER BY id DESC");`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:51);$sql = mysql_query("SELECT `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND `value` != '' ORDER BY id DESC");`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:60);$sql = mysql_query("SELECT `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND `value` != '' ORDER BY id DESC");$sql = mysql_query("SELECT `id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND `value` != '' ORDER BY id DESC"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkOltSync.php-
- Full path:
- at/web/NetworkOltSync.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:20 12/12/2025
- Last modified:
- 01:16:12 10/12/2024
- MD5 hash:
- 06633d4b65a14d677358170dd0a84424
- Filesize:
- 1.87 KB
- suspicious functions used:
- curl_exec (line:18);
$result1dd = curl_exec($ch111); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: networktree-olt-onu-list-data.php-
- Full path:
- at/web/networktree-olt-onu-list-data.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:20 12/12/2025
- Last modified:
- 01:16:12 10/12/2024
- MD5 hash:
- af4221fefa9c9051846a063ac4135560
- Filesize:
- 8.72 KB
- suspicious functions used:
- shell_exec (line:24);shell_exec (line:36);
$outputs = shell_exec($commanda);shell_exec (line:59);$output = shell_exec($command);shell_exec (line:78);$outputs = shell_exec($commanda);shell_exec (line:97);$output = shell_exec($command);shell_exec (line:116);$outputs = shell_exec($commanda);shell_exec (line:134);$output = shell_exec($command);shell_exec (line:143);$od_vdlan = shell_exec($commanda . " 2>&1");shell_exec (line:155);$od_vdland = shell_exec($coddvland . " 2>&1");shell_exec (line:175);$outputs = shell_exec($coddvladnd . " 2>&1");$output_vdlan = shell_exec($command_vdlan); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkTreeAddSave.php-
- Full path:
- at/web/NetworkTreeAddSave.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:20 12/12/2025
- Last modified:
- 01:16:13 10/12/2024
- MD5 hash:
- a9dbc374394f257ef79f2d4f60f9771d
- Filesize:
- 5.12 KB
- suspicious functions used:
- `network_tree` WHERE `olt_id` = '$olt_id' AND ` (line:57);
$resu11 = $con->query("SELECT tree_id AS pon_parent_id FROM `network_tree` WHERE `olt_id` = '$olt_id' AND `device_type` = '1' AND sts = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkTreeEdit1.php-
- Full path:
- at/web/NetworkTreeEdit1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:20 12/12/2025
- Last modified:
- 01:16:14 10/12/2024
- MD5 hash:
- 3396a6bdf9b5804bb208f38f37cc29a2
- Filesize:
- 35.81 KB
- suspicious functions used:
- `olt_onu` WHERE olt_id = '$olt_id' AND ` (line:207);
<?php $resultoff11d=mysql_query("SELECT id AS alarm_id, alarm_name FROM `olt_onu` WHERE olt_id = '$olt_id' AND `onu_name` LIKE '$pon_name1' ORDER BY id DESC"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkTreeEditSave.php-
- Full path:
- at/web/NetworkTreeEditSave.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:20 12/12/2025
- Last modified:
- 01:16:14 10/12/2024
- MD5 hash:
- 6c0f94f3ddde2ee6a93db1fa98971907
- Filesize:
- 12.41 KB
- suspicious functions used:
- `network_tree` WHERE `olt_id` = '$olt_id' AND ` (line:182);
$resu11 = $con->query("SELECT tree_id AS pon_parent_id FROM `network_tree` WHERE `olt_id` = '$olt_id' AND `device_type` = '1' AND sts = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkTreeList.php-
- Full path:
- at/web/NetworkTreeList.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:20 12/12/2025
- Last modified:
- 01:16:15 10/12/2024
- MD5 hash:
- acd468021993faf8575531952ae107f8
- Filesize:
- 21.98 KB
- suspicious functions used:
- `pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '{$row['olt_id']}' AND ` (line:287);
$result11=mysql_query("SELECT count(`pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '{$row['olt_id']}' AND `sts` = '0';"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkTreeMap.php-
- Full path:
- at/web/NetworkTreeMap.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:20 12/12/2025
- Last modified:
- 01:16:15 10/12/2024
- MD5 hash:
- 584d02944bd9de5a190ec6dc320fc49e
- Filesize:
- 24.24 KB
- suspicious functions used:
- `${results.rxPower}` (line:263);`${results.distance}` (line:264);
var rxPower = `${results.rxPower}`;`${results.supplyVoltage}` (line:265);var distance = `${results.distance}`;`${results.temperature}` (line:266);var supplyVoltage = `${results.supplyVoltage}`;`${results.txPower}` (line:267);var temperature = `${results.temperature}`;`${results.rxPower}` (line:283);var txPower = `${results.txPower}`;`${results.distance}` (line:284);var rxPower = `${results.rxPower}`;`${results.supplyVoltage}` (line:285);var distance = `${results.distance}`;`${results.temperature}` (line:286);var supplyVoltage = `${results.supplyVoltage}`;`${results.txPower}` (line:287);var temperature = `${results.temperature}`;var txPower = `${results.txPower}`; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: NetworkTreeMap1.php-
- Full path:
- at/web/NetworkTreeMap1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:20 12/12/2025
- Last modified:
- 01:16:15 10/12/2024
- MD5 hash:
- 31a3ae9bc0bdb18726ed860ec6e8ec97
- Filesize:
- 36.43 KB
- suspicious functions used:
- `networktree_marker_data.php?tree_id=${markerId}` (line:231);`${results.rxPower}` (line:311);
fetch(`networktree_marker_data.php?tree_id=${markerId}`)`${results.distance}` (line:312);var rxPower = `${results.rxPower}`;`${results.supplyVoltage}` (line:313);var distance = `${results.distance}`;`${results.temperature}` (line:314);var supplyVoltage = `${results.supplyVoltage}`;`${results.txPower}` (line:315);var temperature = `${results.temperature}`;var txPower = `${results.txPower}`; - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: networktree_device_onu_list_add.php-
- Full path:
- at/web/networktree_device_onu_list_add.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:20 12/12/2025
- Last modified:
- 01:16:15 10/12/2024
- MD5 hash:
- 444ccf3c3e852a5a25cc4ccd3a5cf9ca
- Filesize:
- 14.66 KB
- suspicious functions used:
- `network_tree` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND device_type = '5' AND ` (line:9);shell_exec (line:33);
$resu11=mysql_query("SELECT pon_index_id FROM `network_tree` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND device_type = '5' AND `sts` = '0'");`network_tree` WHERE `onu_mac` = '$mac_address' AND ` (line:131);$output = shell_exec($command . " 2>&1");shell_exec (line:179);$reu11=mysql_query("SELECT count(tree_id) AS onucount FROM `network_tree` WHERE `onu_mac` = '$mac_address' AND `sts` = '0'");shell_exec (line:187);$output = shell_exec($command . " 2>&1");shell_exec (line:235);$outputS = shell_exec($commandS . " 2>&1");`network_tree` WHERE `onu_mac` = '$onuMac' AND ` (line:301);$snmpOutput = shell_exec($command);$reu11=mysql_query("SELECT count(tree_id) AS onucount FROM `network_tree` WHERE `onu_mac` = '$onuMac' AND `sts` = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: networktree_device_pon_check.php-
- Full path:
- at/web/networktree_device_pon_check.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:20 12/12/2025
- Last modified:
- 01:16:15 10/12/2024
- MD5 hash:
- 708a93aadcae96ecf0aaca52041fcf38
- Filesize:
- 1.53 KB
- suspicious functions used:
- `pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '$olt_id' AND ` (line:8);
$result11=mysql_query("SELECT count(`pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '$olt_id' AND `sts` = '0';"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: networktree_device_pon_list_add.php-
- Full path:
- at/web/networktree_device_pon_list_add.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:20 12/12/2025
- Last modified:
- 01:16:15 10/12/2024
- MD5 hash:
- 2ec03912801e4749c2e9cd361417ca5f
- Filesize:
- 1.36 KB
- suspicious functions used:
- `olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:6);`olt_pon` WHERE `olt_id` = '$olt_id' AND ` (line:10);
$resu11=mysql_query("SELECT olt_name FROM `olt_con` WHERE `olt_id` = '$olt_id' AND `sts` = '0'");`network_tree` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND ` (line:17);$result11=mysql_query("SELECT pon_id, olt_pon_id, pon_name FROM `olt_pon` WHERE `olt_id` = '$olt_id' AND `sts` = '0'");$rehu11=mysql_query("SELECT count(tree_id) AS poncount FROM `network_tree` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND `sts` = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: networktree_device_pon_port_onu_list.php-
- Full path:
- at/web/networktree_device_pon_port_onu_list.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:20 12/12/2025
- Last modified:
- 01:16:15 10/12/2024
- MD5 hash:
- 9c63b3ac69996628f5eb2959a9eb4e15
- Filesize:
- 8.65 KB
- suspicious functions used:
- `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:25);shell_exec (line:32);
$rff11=mysqli_query($con, "SELECT olt_pon_id AS pon_port FROM `olt_pon` WHERE olt_id = '$olt_id' AND `pon_name` LIKE '$pon_portt'");shell_exec (line:45);$outputs = shell_exec($commanda);`network_tree` WHERE onu_index_id = '$port_onu_index_id' AND ` (line:49);$output = shell_exec($command);shell_exec (line:81);$rff11d=mysqli_query($con, "SELECT onu_name, onu_index, onu_index_id, onu_mac FROM `network_tree` WHERE onu_index_id = '$port_onu_index_id' AND `olt_id` = '$olt_id'");shell_exec (line:103);$outputs = shell_exec($commanda);shell_exec (line:122);$output = shell_exec($command);shell_exec (line:143);$outputs = shell_exec($commanda);shell_exec (line:161);$output = shell_exec($command);shell_exec (line:170);$od_vdlan = shell_exec($commanda . " 2>&1");shell_exec (line:184);$od_vdland = shell_exec($coddvland . " 2>&1");$outputs = shell_exec($coddvladnd . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: networktree_device_pon_port_sense_list.php-
- Full path:
- at/web/networktree_device_pon_port_sense_list.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:20 12/12/2025
- Last modified:
- 01:16:15 10/12/2024
- MD5 hash:
- ee69cd5cc122f8aa37d8d8e5c74def6b
- Filesize:
- 3.65 KB
- suspicious functions used:
- `network_tree` WHERE `onu_mac` = '$onu_mac' AND ` (line:26);`network_tree` WHERE `c_id` = '{$dfhbdxf}' AND ` (line:71);
$reu1d1=mysqli_query($con, "SELECT tree_id AS router_parant_id FROM `network_tree` WHERE `onu_mac` = '$onu_mac' AND `sts` = '0'");$reu11=mysqli_query($con, "SELECT count(c_id) AS client_count FROM `network_tree` WHERE `c_id` = '{$dfhbdxf}' AND `sts` = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: networktree_device_type.php-
- Full path:
- at/web/networktree_device_type.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:20 12/12/2025
- Last modified:
- 01:16:15 10/12/2024
- MD5 hash:
- f1520732e5a3ef38564238a3278a1f63
- Filesize:
- 11.43 KB
- suspicious functions used:
- `tree_id`) AS countolt FROM `network_tree` WHERE `olt_id` = '$olt_id_sure' AND ` (line:64);
$resu11=mysql_query("SELECT COUNT(`tree_id`) AS countolt FROM `network_tree` WHERE `olt_id` = '$olt_id_sure' AND `device_type` = '1' AND sts = '0'"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentOnlineQuery.php-
- Full path:
- at/web/PaymentOnlineQuery.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 04:58:01 12/12/2025
- Last modified:
- 01:16:21 10/12/2024
- MD5 hash:
- 201e1cf95b2d033897cab4bc2fd59e07
- Filesize:
- 28.5 KB
- suspicious functions used:
- curl_exec (line:457);curl_exec (line:689);
$resultdata=curl_exec($url);$content = curl_exec($handle ); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentOnlineQuery2.php-
- Full path:
- at/web/PaymentOnlineQuery2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:21 12/12/2025
- Last modified:
- 01:16:21 10/12/2024
- MD5 hash:
- ccd315d11a60901b7b9029ff44f8351b
- Filesize:
- 19.4 KB
- suspicious functions used:
- curl_exec (line:42);curl_exec (line:252);
$resultdatax=curl_exec($url);$result = curl_exec($handle); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: PaymentWebhook.php-
- Full path:
- at/web/PaymentWebhook.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:21 12/12/2025
- Last modified:
- 01:16:21 10/12/2024
- MD5 hash:
- a2f322c94787630ab1e0c8ca35fc5ba1
- Filesize:
- 18.6 KB
- suspicious functions used:
- base64_decode (line:30);curl_exec (line:41);
$signatureDecoded = base64_decode($signature);curl_exec (line:422);curl_exec($url);$data = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: SignUp1.php-
- Full path:
- at/web/SignUp1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:22 12/12/2025
- Last modified:
- 01:16:27 10/12/2024
- MD5 hash:
- 3f7943dd155c8e0a383b7d02730f8c11
- Filesize:
- 24.59 KB
- suspicious functions used:
- curl_exec (line:33);curl_exec (line:59);
$jsona = curl_exec($ch10);$resdfwedf = curl_exec($ch1s); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: sms-balance-check.php-
- Full path:
- at/web/sms-balance-check.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 15:53:19 12/12/2025
- Last modified:
- 01:16:27 10/12/2024
- MD5 hash:
- 74ac3e963a0dc5bb7d4c980e594aa39b
- Filesize:
- 854 B
- suspicious functions used:
- curl_exec (line:15);
$balance = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: SMS.php-
- Full path:
- at/web/SMS.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:22 12/12/2025
- Last modified:
- 01:16:27 10/12/2024
- MD5 hash:
- 256a239cc69fc8bfa9305d2d4af31d14
- Filesize:
- 36.41 KB
- suspicious functions used:
- curl_exec (line:56);
$balance = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: SMS1.php-
- Full path:
- at/web/SMS1.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:22 12/12/2025
- Last modified:
- 01:16:28 10/12/2024
- MD5 hash:
- e4671dadf9ad575671fd3609a60030da
- Filesize:
- 32.19 KB
- suspicious functions used:
- curl_exec (line:59);
$balance = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: SMSAddSave.php-
- Full path:
- at/web/SMSAddSave.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:22 12/12/2025
- Last modified:
- 01:16:28 10/12/2024
- MD5 hash:
- 1a6eaf13aa0ca959fe2dca885b7ffd8e
- Filesize:
- 1.73 KB
- suspicious functions used:
- curl_exec (line:34);
$result = curl_exec($ch); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: sms_deliverey_report.php-
- Full path:
- at/web/sms_deliverey_report.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 03:07:24 12/12/2025
- Last modified:
- 01:16:29 10/12/2024
- MD5 hash:
- 03623943da7e9334e137b38c8577fc84
- Filesize:
- 4.25 KB
- suspicious functions used:
- curl_exec (line:28);curl_exec (line:53);
$result11 = curl_exec($ch1);curl_exec (line:90);$resultdd = curl_exec($ch);$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: support-action.php-
- Full path:
- at/web/support-action.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:23 12/12/2025
- Last modified:
- 01:16:29 10/12/2024
- MD5 hash:
- 58556808f93f52486b2ad06998142aa9
- Filesize:
- 14.56 KB
- suspicious functions used:
- curl_exec (line:220);
$jsona = curl_exec($ch10); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tagreeexpayment.php-
- Full path:
- at/web/tagreeexpayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 15:19:27 12/12/2025
- Last modified:
- 01:16:31 10/12/2024
- MD5 hash:
- 029b4fba649a75c7c81d2f8931be8d63
- Filesize:
- 2.86 KB
- suspicious functions used:
- curl_exec (line:26);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tcreateagree.php-
- Full path:
- at/web/tcreateagree.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 15:18:35 12/12/2025
- Last modified:
- 01:16:31 10/12/2024
- MD5 hash:
- 27a10adf4190edc7eceee8cf74a6b72b
- Filesize:
- 999 B
- suspicious functions used:
- curl_exec (line:26);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: tcreatepayment.php-
- Full path:
- at/web/tcreatepayment.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:23 12/12/2025
- Last modified:
- 01:16:31 10/12/2024
- MD5 hash:
- e49de9a33f5164bc2c6b88e4770faaff
- Filesize:
- 1.07 KB
- suspicious functions used:
- curl_exec (line:27);
$resultdata = curl_exec($url); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: test2.php-
- Full path:
- at/web/test2.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:23 12/12/2025
- Last modified:
- 01:16:31 10/12/2024
- MD5 hash:
- ab80d92ede21b7da59bfefb325484297
- Filesize:
- 13.76 KB
- suspicious functions used:
- shell_exec (line:59);shell_exec (line:70);
$output = shell_exec($command);shell_exec (line:76);$output1 = shell_exec($command1);shell_exec (line:88);$output2 = shell_exec($command2);shell_exec (line:101);$output_vdlan = shell_exec($command_dvlan . " 2>&1");shell_exec (line:141);$output_vdlan = shell_exec($command_dvlan . " 2>&1");curl_exec (line:187);$output_vdlanf = shell_exec($command_dvlan . " 2>&1");curl_exec (line:212);$result11 = curl_exec($ch3);curl_exec (line:354);$response = curl_exec($ch);$result11 = curl_exec($ch3); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: test6.php-
- Full path:
- at/web/test6.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:23 12/12/2025
- Last modified:
- 01:16:31 10/12/2024
- MD5 hash:
- f22d022ddc284f4d8e1de3660da91db8
- Filesize:
- 15.61 KB
- suspicious functions used:
- shell_exec (line:34);shell_exec (line:113);
$outputs = shell_exec($snmpCommand);shell_exec (line:126);$outpdduts = shell_exec($sand);shell_exec (line:132);$outputsmac = shell_exec($snmpCommandmac);$output_vlan = shell_exec($command_vlan . " 2>&1"); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: test7.php-
- Full path:
- at/web/test7.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:23 12/12/2025
- Last modified:
- 01:16:31 10/12/2024
- MD5 hash:
- b11ccf951ce63a21ea0a7328316a0e5c
- Filesize:
- 1.57 KB
- suspicious functions used:
- curl_exec (line:14);
$result1dd = curl_exec($ch111); - Fingerprint:
- Negative (if wrong submit file for analize)">
- Suspicious behavior found in: testttttt.php-
- Full path:
- at/web/testttttt.php
- Owner:
- asthatecnet
- Permission:
- 0644
- Last accessed:
- 19:43:23 12/12/2025
- Last modified:
- 01:16:31 10/12/2024
- MD5 hash:
- b1988a4be29e191ad935fb409a4174ee
- Filesize:
- 2 KB
- suspicious functions used:
- curl_exec (line:47);
$result11 = curl_exec($ch1); - Fingerprint:
- Negative (if wrong submit file for analize)">