Web Shell Detector v1.66
(PHP Version: 5.6.40)

Please wait
Starting file scanner, please be patient file scanning can take some time.
Number of known shells in database is: 603
Files found:00000000000112335555555555555555585816616616616616618518519519919919919919919919919920224825625626526526526526526626626726826832832832832832832832832832833034334334334334334335635635635635835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835835935935935935935935935935935935935935935935935935935935935935935935935936036036036036036036036036036036036036036036036036036094510431046104610461046104610461046104610461046104610461047104710481049104911001100110011001100110011001100110011001100110311031103118911891189118911891200120412041204120412041204120412041207125312611261127112711271127112711272127212731274127413281328132813281328132813281328132813301342134213421342134413441344134413441344134413441344134413441344134413441344134413441344134413441344134413441344134413441344134413441344134413441344134413441344134413441344134413441344134413441344134413441344134413441344134413441344134413441344134413441344134413441344134413441344134413441344134413441344134413441344134413451345134513451345134513451345134513451345134513451345134513451345134513451345134513451345134513451345134513451345134513451345134513451345134513451345134513451345134518361839258725872595259525952595259826442644264426442644265327142714271427142714271427142714271427162729274227422742274227422742274227422742274227422742274227422742274227422742274227422742274227422742274227422742274227422742274227422742274227422742274227422742274227422742274227422742274227422742274227422742274227422742274227422742274227422742274227422742274227422742274227422742274227422742274227422742274227422742274227432743274327432743274327432743274327432743274327432743274327432743274327432743274327432743274327432743274327442744274427442744274427442744274427442744274427442744274427442744274627462746274627472747274727472747274727482749274927512751275128642916291629162916291629162916291629192919291929192919292029202920292029202920292129222922292229222922292229222922292229222922292229222922292229232923292429252925297729772977297729772977297729772980298030893089308930893108310831183122312231223122312231223122312231253171317931793188318831883188318831893189319031913191325132513251325132513251325132513251325332663266326632663266326632793279327932793281328132813281328132813281328132813281328132813281328132813281328132813281328132813281328132813281328132813281328132813281328132813281328132813281328132813281328132813281328132813281328132813281328132813281328132813281328132813281328132813281328132813281328132813281328132813281328132813281328132813281328232823282328232823282328232823282328232823282328232823282328232823282328232823282328232823282328332833283328332833283328332833283328332833283328332833283328332833283398839913991399139913991399139913991399239923993399439944046404640464046404640464046404640494049415841624162416241624162416241624162416542114219421942294229422942294229423042304231423242324292429242924292429242924292429242924294430743074307430743074307432043204320432043224322432243224322432243224322432243224322432243224322432243224322432243224322432243224322432243224322432243224322432243224322432243224322432243224322432243224322432243224322432243224322432243224322432243224322432243224322432243224322432243224322432243224322432243224322432243224322432243224322432243224323432343234323432343234323432343234323432343234323432343234323432343234323432343234323432343234324432443244324432443244324432443244324432443244324432443244324432443244988498850575060506050605060506050605063508250825092509650965096509650965096509650965099514551535153516451645164516451645165516551665167516752315231523152315231523152315231523152335246524652465246524652465259525952595259526152615261526152615261526152615261526152615261526152615261526152615261526152615261526152615261526152615261526152615261526152615261526152615261526152615261526152615261526152615261526152615261526152615261526152615261526152615261526152615261526152615261526152615261526152615261526152615261526152615261526152625262526252625262526252625262526252625262526252625262526252625262526252625262526252625262526252635263526352635263526352635263526352635263526352635263526352635263526360136013602360236023602360236023602460246025602660266078607860786078607860786078607860816081616761676190699469986998700670067006700670097055705570557055705570657128712871287128712871287128712871287130714571587158715871587158715871587158715871587158715871587158715871587158715871587158715871587158715871587158715871587158715871587158715871587158715871587158715871587158715871587158715871587158715871587158715871587158715871587158715871587158715871587158715871587158715871587158715871587158715871587158715871587158715871587159715971597159715971597159715971597159715971597159715971597159715971597159715971597159715971597159715971597160716071607160716071607160716071607160716071607160716071607160716071627162716271627163716371637163716371637164716571657165727473267326732673267326732673267326732973297329732973307330733073307330733073317332733273327332809380938103810381078107811581158115811581188164816481648164816481748234823482348234823482348234823482348236824982628262826282628262826282628262826282628262826282628262826282628262826282628262826282628262826282628262826282628262826282628262826282628262826282628262826282628262826282628262826282628262826282628262826282628262826282628262826282628262826282628262826282628262826282628262826282628262826282628262826282628262826282628263826382638263826382638263826382638263826382638263826382638263826382638263826382638263826382638263826382638264826482648264826482648264826482648264826482648264826482648264826482668266826682668267826782678267826782678268826982698269826982708383843584358435843584358435843584358438843884398439843984398439843984408441844184418441844184418441844184418441844184418441844184418441844184418441844284428443844484448496849684968496849684968496849684968496849684998499849984998501850185018501850185018501850185018501850185018501850185018501850185018501850185018501850185018501850185018501850185018501850185018501850185018501850185018501850185018501850185018501850185018501850185018501850185018501850185018501850185018501850185018501850185018501850185018501850185018501850185018501850185028502850285028502850285028502850285028502850285028502850285028502850285028502850285028502850285028502850285028502850285028502850285028502850285028502850285028502850285998599859985998603860386038603860386038603860386068652866086608669866986698669866986708670867186728672873187318731873187318731873187318731873387458745874587458745874587588758875887588760876087608760876087608760876087608760876087608760876087608760876087608760876087608760876087608760876087608760876087608760876087608760876087608760876087608760876087608760876087608760876087608760876087608760876087608760876087608760876087608760876087608760876087608760876087608760876087608760876087608760876187618761876187618761876187618761876187618761876187618761876187618761876187618761876187618761876287628762876287628762876287628762876287628762876287628762876287628762934693499349934993499349934993499349934993499349934993509350935193529352940494049404940494049404940494049407940795149514951495149518951895189518951895189518951895219567957595759584958495849584958495859585958695879587964796479647964796479647964796479647964996619661966196619661966196749674967496749676967696769676967696769676967696769676967696769676967696769676967696769676967696769676967696769676967696769676967696769676967696769676967696769676967696769676967696769676967696769676967696769676967696769676967696769676967696769676967696769676967696769676967696769676967696769676967696769676967696769676967796779677967796779677967796779677967796779677967796779677967796779677967796779677967796779677967896789678967896789678967896789678967896789678967896789678967896789678103051030510308103081030810308110661106611074110741107411074110771112311123111231112311123111331119511195111951119511195111951119511195111951119711210112231122311223112231122311223112231122311223112231122311223112231122311223112231122311223112231122311223112231122311223112231122311223112231122311223112231122311223112231122311223112231122311223112231122311223112231122311223112231122311223112231122311223112231122311223112231122311223112231122311223112231122311223112231122311223112231122311223112231122311223112231122311223112231122311223112231122411224112241122411224112241122411224112241122411224112241122411224112241122411224112241122411224112241122411224112241122411224112241122511225112251122511225112251122511225112251122511225112251122511225112251122511225112271122711227112271122811228112281122811228112281122911230112301123211232112341134611398113981139811398113981139811398113981140111401114021140211402114021140211402114031140411404114041140411404114041140411404114041216012160121681216812168121681217112217122171221712217122171222612288122881228812288122881228812288122881228812290123031231612316123161231612316123161231612316123161231612316123161231612316123161231612316123161231612316123161231612316123161231612316123161231612316123161231612316123161231612316123161231612316123161231612316123161231612316123161231612316123161231612316123161231612316123161231612316123161231612316123161231612316123161231612316123161231612316123161231612316123161231612316123161231612316123161231612317123171231712317123171231712317123171231712317123171231712317123171231712317123171231712317123171231712317123171231712317123171231712318123181231812318123181231812318123181231812318123181231812318123181231812318123181232012320123201232012321123211232112321123211232112322123231232312324123241232412436124881248812488124881248812488124881248812491124911249212492124921249212492124921249312494124941249412494124941249712608126601266012660126601266012660126601266012663126631266312663126641266412664126641266412664126651266612666126671342713427134311343113439134391343913439134421348813488134881348813488134981356113561135611356113561135611356113561135611356313576135891358913589135891358913589135891358913589135891358913589135891358913589135891358913589135891358913589135891358913589135891358913589135891358913589135891358913589135891358913589135891358913589135891358913589135891358913589135891358913589135891358913589135891358913589135891358913589135891358913589135891358913589135891358913589135891358913589135891358913589135891358913589135891358913589135891359013590135901359013590135901359013590135901359013590135901359013590135901359013590135901359013590135901359013590135901359013590135901359113591135911359113591135911359113591135911359113591135911359113591135911359113591135931359313593135931359413594135941359413594135941359513596135961359613596135971359713597135971359713597135971359713597135971359713597135971359713597135981359813599136001360013652136521365213652136521365213652136521365213652136521365513655136551365513657136571365713657136571365713657136571365713657136571365713657136571365713657136571365713657136571365713657136571365713657136571365713657136571365713657136571365713657136571365713657136571365713657136571365713657136571365713657136571365713657136571365713657136571365713657136571365713657136571365713657136571365713657136571365713657136571365713657136571365713657136571365713657136571365813658136581365813658136581365813658136581365813658136581365813658136581365813658136581365813658136581365813658136581365813658136581365813658136581365813658136581365813658136581365813658136581365813658136581375713757137571375713761137611376113761137611376113761137611376413810138181381813827138271382713827138271382813828138291383013830138891388913889138891388913889138891388913889138911390313903139031390313903139031391613916139161391613918139181391813918139181391813918139181391813918139181391813918139181391813918139181391813918139181391813918139181391813918139181391813918139181391813918139181391813918139181391813918139181391813918139181391813918139181391813918139181391813918139181391813918139181391813918139181391813918139181391813918139181391813918139181391813918139181391813918139181391813918139181391813918139191391913919139191391913919139191391913919139191391913919139191391913919139191391913919139191391913919139191391913919139191391913919139191391913919139191391913919139191391913919139191391913919139191391913919144961449914499144991449914499144991449914499144991449914499144991449914499144991449914499144991449914499144991449914499144991449914499144991449914499144991449914499144991449914499144991449914499144991449914499144991449914499144991449914499144991449914499144991449914499144991449914499144991449914499144991449914499144991449914499144991449914540145401454014542145441458414584145841458614587146281462814628146301463414678146781467814680146811472414725147251472714727147721477214772147741477414819148191481914821148211486614866148661486814868148681486814868148681486814868148681486814868148681486814868148691486914870148711487114923149231492314923149231492314923149231492614926150351503915039150391503915039150391503915039150421508815096150961510615106151061510615106151071510715108151091510915169151691516915169151691516915169151691516915171151841518415184151841518415184151971519715197151971519915199151991519915199151991519915199151991519915199151991519915199151991519915199151991519915199151991519915199151991519915199151991519915199151991519915199151991519915199151991519915199151991519915199151991519915199151991519915199151991519915199151991519915199151991519915199151991519915199151991519915199151991519915199151991519915199151991519915199151991519915199151991519915200152001520015200152001520015200152001520015200152001520015200152001520015200152001520015200152001520015200152001520015201152011520115201152011520115201152011520115201152011520115201152011520115201152011520115890158901593515938159381593815938166811668116689166891668916689166921673816738167381673816738167481680816808168081680816808168081680816808168081681016823168361683616836168361683616836168361683616836168361683616836168361683616836168361683616836168361683616836168361683616836168361683616836168361683616836168361683616836168361683616836168361683616836168361683616836168361683616836168361683616836168361683616836168361683616836168361683616836168361683616836168361683616836168361683616836168361683616836168361683616836168361683616836168361683616836168361683716837168371683716837168371683716837168371683716837168371683716837168371683716837168371683716837168371683716837168371683716837168371683816838168381683816838168381683816838168381683816838168381683816838168381683816838168401684016840168401684116841168411684116841168411684216843168431684316843168441695317005170051700517005170051700517005170051700817008170091700917009170091700917009170101701117011170111701117011170111701117011170111701117011170111701117011170111701117011170121701217013170141701417066170661706617066170661706617066170661706617066170661706917069170691706917071170711707117071170711707117071170711707117071170711707117071170711707117071170711707117071170711707117071170711707117071170711707117071170711707117071170711707117071170711707117071170711707117071170711707117071170711707117071170711707117071170711707117071170711707117071170711707117071170711707117071170711707117071170711707117071170711707117071170711707117071170711707117071170721707217072170721707217072170721707217072170721707217072170721707217072170721707217072170721707217072170721707217072170721707217072170721707217072170721707217072170721707217072170721707217072170721707217072171661716617166171661716617183171831719317197171971719717197171971719717197171971720017246172541725417263172631726317263172631726417264172651726617266173231732317323173231732317323173231732317323173251733717337173371733717337173371735017350173501735017352173521735217352173521735217352173521735217352173521735217352173521735217352173521735217352173521735217352173521735217352173521735217352173521735217352173521735217352173521735217352173521735217352173521735217352173521735217352173521735217352173521735217352173521735217352173521735217352173521735217352173521735217352173521735217352173521735217352173521735217352173521735217352173531735317353173531735317353173531735317353173531735317353173531735317353173531735317353173531735317353173531735317353173531735317353173531735317353173531735317353173531735317353173531735317353173531735317353179131791617919179191869418694187041870418708187081871618716187161871618719187651876518765187651876518775188381883818838188381883818838188381883818838188401885318866188661886618866188661886618866188661886618866188661886618866188661886618866188661886618866188661886618866188661886618866188661886618866188661886618866188661886618866188661886618866188661886618866188661886618866188661886618866188661886618866188661886618866188661886618866188661886618866188661886618866188661886618866188661886618866188661886618866188661886618866188661886618866188661886618866188671886718867188671886718867188671886718867188671886718867188671886718867188671886718867188671886718867188671886718867188671886718867188681886818868188681886818868188681886818868188681886818868188681886818868188681886818870188701887018870188711887118871188711887118871188721887318873188731887318876189841903619036190361903619036190361903619036190391903919040190401904019040190401904019041190421904219042190421904219844198481984819856198561985619856198591990519905199051990519905199151997819978199781997819978199781997819978199781998019995200082000820008200082000820008200082000820008200082000820008200082000820008200082000820008200082000820008200082000820008200082000820008200082000820008200082000820008200082000820008200082000820008200082000820008200082000820008200082000820008200082000820008200082000820008200082000820008200082000820008200082000820008200082000820008200082000820008200082000820008200082000820008200082000820008200082000920009200092000920009200092000920009200092000920009200092000920009200092000920009200092000920009200092000920009200092000920009200092001020010200102001020010200102001020010200102001020010200102001020010200102001020010200122001220012200122001320013200132001320013200132001420015200152001720126201782017820178201782017820178201782017820181201812018120181201822018220182201822018220182201832018420184201842018420184201842018420184201842018420184201842018420184201842018520185201862018720187202392023920239202392023920239202392023920242202422034920349203492034920353203532035320353203532035320353203532035620402204102041020419204192041920419204192042020420204212042220422204822048220482204822048220482204822048220482204842049720497204972049720497204972051020510205102051020512205122051220512205122051220512205122051220512205122051220512205122051220512205122051220512205122051220512205122051220512205122051220512205122051220512205122051220512205122051220512205122051220512205122051220512205122051220512205122051220512205122051220512205122051220512205122051220512205122051220512205122051220512205122051220512205122051220512205122051220512205122051220512205132051320513205132051320513205132051320513205132051320513205132051320513205132051320513205132051320513205132051320513205142051420514205142051420514205142051420514205142051420514205142051420514205142051420514211972120021200212002120021200212002120021200212002120021200212002120121201212022120321203212552125521255212552125521255212552125521258212582136621366213662136621370213702137021370213702137021370213702137321419214272142721436214362143621436214362143721437214382143921439214992149921499214992149921499214992149921499215012151321513215132151321513215132152621526215262152621528215282152821528215282152821528215282152821528215282152821528215282152821528215282152821528215282152821528215282152821528215282152821528215282152821528215282152821528215282152821528215282152821528215282152821528215282152821528215282152821528215282152821528215282152821528215282152821528215282152821528215282152821528215282152821528215282152821528215282152821528215282152821528215292152921529215292152921529215292152921529215292152921529215292152921529215292152921529215292152921529215292152921529215302153021530215302153021530215302153021530215302153021530215302153021530215302153021530222212222422224222242222422224222242222422224222242222422224222242222522225222262222722227222792227922279222792227922279222792227922282222822238922389223892238922393223932239322393223932239322393223932239622442224502245022459224592245922459224592246022460224612246222462225222252222522225222252222522225222252222522225242253722537225372253722537225372255022550225502255022552225522255222552225522255222552225522255222552225522255222552225522255222552225522255222552225522255222552225522255222552225522255222552225522255222552225522255222552225522255222552225522255222552225522255222552225522255222552225522255222552225522255222552225522255222552225522255222552225522255222552225522255222552225522255222552225522255222552225522255222552225522255222552225532255322553225532255322553225532255322553225532255322553225532255322553225532255322553225532255322553225532255322553225542255422554225542255422554225542255422554225542255422554225542255422554225542255422554232142321723217232172321723217232172321723217232172321723217232172321823218232192322023220232722327223272232722327223272232722327223275232752338323383233832338323383234022340223412234162341623416234162341623416234162341623419234652347323473234822348223482234822348223483234832348423485234852354523545235452354523545235452354523545235452354723560235602356023560235602356023573235732357323573235752357523575235752357523575235752357523575235752357523575235752357523575235752357523575235752357523575235752357523575235752357523575235752357523575235752357523575235752357523575235752357523575235752357523575235752357523575235752357523575235752357523575235752357523575235752357523575235752357523575235752357523575235752357523575235752357523575235752357523575235752357523575235752357623576235762357623576235762357623576235762357623576235762357623576235762357623576235762357623576235762357623576235762357723577235772357723577235772357723577235772357723577235772357723577235772357723577235772426024263243752442724427244272442724427244272442724427244302443024431244312443124431244312443124432244332443324433244332443325232252512525125261252612526525265252732527325273252732527625322253222532225322253222533225395253952539525395253952539525395253952539525397254122542525425254252542525425254252542525425254252542525425254252542525425254252542525425254252542525425254252542525425254252542525425254252542525425254252542525425254252542525425254252542525425254252542525425254252542525425254252542525425254252542525425254252542525425254252542525425254252542525425254252542525425254252542525425254252542525425254252542525425254252542525425254252542525425254252542525426254262542625426254262542625426254262542625426254262542625426254262542625426254262542625426254262542625426254262542625426254262542625427254272542725427254272542725427254272542725427254272542725427254272542725427254272542925429254292542925430254302543025430254302543025431254322543225432254322543225432254322543225432254322543225432254322543225432254322543225432254322543325433254342543525435254872548725487254872548725487254872548725490254902559725597255972559725597256162561625626256302563025630256302563025630256302563025633256792568725687256962569625696256962569625697256972569825699256992575925759257592575925759257592575925759257592576125774257742577425774257742577425787257872578725787257892578925789257892578925789257892578925789257892578925789257892578925789257892578925789257892578925789257892578925789257892578925789257892578925789257892578925789257892578925789257892578925789257892578925789257892578925789257892578925789257892578925789257892578925789257892578925789257892578925789257892578925789257892578925789257892578925789257892578925789257892578925789257892579025790257902579025790257902579025790257902579025790257902579025790257902579025790257902579025790257902579025790257902579125791257912579125791257912579125791257912579125791257912579125791257912579125791257912637726475264782647826478264782647826478264782647826478264782647826478264792647926480264812648126533265332653326533265332653326533265332653626536266442664426644266442664826648266482664826648266482664826648266512669726705267052671426714267142671426714267152671526716267172671726777267772677726777267772677726777267772677726779267922679226792267922679226792268052680526805268052680726807268072680726807268072680726807268072680726807268072680726807268072680726807268072680726807268072680726807268072680726807268072680726807268072680726807268072680726807268072680726807268072680726807268072680726807268072680726807268072680726807268072680726807268072680726807268072680726807268072680726807268072680726807268072680726807268072680726807268072680726807268072680726808268082680826808268082680826808268082680826808268082680826808268082680826808268082680826808268082680826808268082680826809268092680926809268092680926809268092680926809268092680926809268092680926809268092680927499275022750227502275022750227502275022750227502275022750227502275032750327504275052750527556275562755627556275562755627556275562755627556275562755927559275592755927561275612756127561275612756127561275612756127561275612756127561275612756127561275612756127561275612756127561275612756127561275612756127561275612756127561275612756127561275612756127561275612756127561275612756127561275612756127561275612756127561275612756127561275612756127561275612756127561275612756127561275612756127561275612756127561275612756127561275612756127561275612756127561275622756227562275622756227562275622756227562275622756227562275622756227562275622756227562275622756227562275622756227562275622756227562275622756227562275622756227562275622756227562275622756227562275622756227562276502765027660276642766427664276642766427664276642766427667277132772127721277302773027730277302773027731277312773227733277332778927789277892778927789277892778927789277892779127803278032780327803278032780327816278162781627816278182781827818278182781827818278182781827818278182781827818278182781827818278182781827818278182781827818278182781827818278182781827818278182781827818278182781827818278182781827818278182781827818278182781827818278182781827818278182781827818278182781827818278182781827818278182781827818278182781827818278182781827818278182781827818278182781827818278182781827818278182781827818278182781927819278192781927819278192781927819278192781927819278192781927819278192781927819278192781927819278192781927819278192781927819278192781927819278192781927819278192781927819278192781927819278192781927819278192836728367283672837028370283702837028370283702837028370283702837028370283702837128371283722837328373284242842428424284242842428424284242842428424284242842428427284272842728427284292842928429284292842928429284292842928429284292842928429284292842928429284292842928429284292842928429284292842928429284292842928429284292842928429284292842928429284292842928429284292842928429284292842928429284292842928429284292842928429284292842928429284292842928429284292842928429284292842928429284292842928429284292842928429284292842928429284292842928429284292842928429284292843028430284302843028430284302843028430284302843028430284302843028430284302843028430284302843028430284302843028430284302843028430284302843028430284302843028430284302843028430284302843028430284302843028430284302851928519285192851928519285292853328533285332853328533285332853328533285362858228590285902859928599285992859928599286002860028601286022860228658286582865828658286582865828658286582865828660286722867228672286722867228672286852868528685286852868728687286872868728687286872868728687286872868728687286872868728687286872868728687286872868728687286872868728687286872868728687286872868728687286872868728687286872868728687286872868728687286872868728687286872868728687286872868728687286872868728687286872868728687286872868728687286872868728687286872868728687286872868728687286872868728687286872868728687286872868728687286872868728688286882868828688286882868828688286882868828688286882868828688286882868828688286882868828688286882868828688286882868828688286882868828688286882868828688286882868828688286882868828688286882868828688286882868829234292372923729237292372923729237292372923729237292382923829239292402924029292292922929229292292922929229292292922929529295294042940429404294042940829408294082940829408294082940829408294112945729465294652947529475294752947529475294762947629477294782947829538295382953829538295382953829538295382953829540295532955329553295532955329553295662956629566295662956829568295682956829568295682956829568295682956829568295682956829568295682956829568295682956829568295682956829568295682956829568295682956829568295682956829568295682956829568295682956829568295682956829568295682956829568295682956829568295682956829568295682956829568295682956829568295682956829568295682956829568295682956829568295682956829568295682956829568295682956829568295682956829569295692956929569295692956929569295692956929569295692956929569295692956929569295692956929569295692956929569295692956929570295702957029570295702957029570295702957029570295702957029570295702957029570295702957030299303023030230302303023030230302303023030230302303023030230302303023030230303303033030430305303053035730357303573035730357303573035730357303603036030468304683046830468304723047230472304723047230472304723047230475305213052930529305383053830538305383053830539305393054030541305413060130601306013060130601306013060130601306013060330615306153061530615306153061530628306283062830628306303063030630306303063030630306303063030630306303063030630306303063030630306303063030630306303063030630306303063030630306303063030630306303063030630306303063030630306303063030630306303063030630306303063030630306303063030630306303063030630306303063030630306303063030630306303063030630306303063030630306303063030630306303063030630306303063030630306303063030630306303063030630306303063130631306313063130631306313063130631306313063130631306313063130631306313063130631306313063130631306313063130631306313063230632306323063230632306323063230632306323063230632306323063230632306323063230632306323132331326313263132631326313263132631326313263132631326313263132631326313263132731327313283132931329313813138131381313813138131381313813138131384313843148131481314813148131485314853148531485314853148531485314853148831534315423154231551315513155131551315513155231552315533155431554316133161331613316133161331613316133161331613316153162731627316273162731627316273164031640316403164031642316423164231642316423164231642316423164231642316423164231642316423164231642316423164231642316423164231642316423164231642316423164231642316423164231642316423164231642316423164231642316423164231642316423164231642316423164231642316423164231642316423164231642316423164231642316423164231642316423164231642316423164231642316423164231642316423164231642316423164231642316423164231642316433164331643316433164331643316433164331643316433164331643316433164331643316433164331643316433164331643316433164331643316443164431644316443164431644316443164431644316443164431644316443164431644316443164431644322283223132231322313223132231322313223132231322313223132231322313223232232322333223432234322863228632286322863228632286322863228632289322893239032390323903239032390324003240432404324043240432404324043240432404324073245332461324613247032470324703247032470324713247132472324733247332532325323253232532325323253232532325323253232534325463254632546325463254632546325593255932559325593256132561325613256132561325613256132561325613256132561325613256132561325613256132561325613256132561325613256132561325613256132561325613256132561325613256132561325613256132561325613256132561325613256132561325613256132561325613256132561325613256132561325613256132561325613256132561325613256132561325613256132561325613256132561325613256132561325613256132561325613256132561325613256132562325623256232562325623256232562325623256232562325623256232562325623256232562325623256232562325623256232562325623256232563325633256332563325633256332563325633256332563325633256332563325633256332563325633256333178331813318133181331813318133181331813318133181331813318133181331823318233183331843318433236332363323633236332363323633236332363323933239333473334733347333473335133351333513335133351333513335133351333543340033408334083341733417334173341733417334183341833419334203342033480334803348033480334803348033480334803348033482334943349433494334943349433494335073350733507335073350933509335093350933509335093350933509335093350933509335093350933509335093350933509335093350933509335093350933509335093350933509335093350933509335093350933509335093350933509335093350933509335093350933509335093350933509335093350933509335093350933509335093350933509335093350933509335093350933509335093350933509335093350933509335093350933509335093350933509335093350933509335093350933510335103351033510335103351033510335103351033510335103351033510335103351033510335103351033510335103351033510335103351033511335113351133511335113351133511335113351133511335113351133511335113351133511335113351134202342023420534205342053420534205342053420534205342053420534205342053420634206342073420834208342603426034260342603426034260342603426034263342633437034370343703437034374343743437434374343743437434374343743437734423344313443134440344403444034440344403444134441344423444334443345033450334503345033450334503345033450334503345053451834518345183451834518345183453134531345313453134533345333453334533345333453334533345333453334533345333453334533345333453334533345333453334533345333453334533345333453334533345333453334533345333453334533345333453334533345333453334533345333453334533345333453334533345333453334533345333453334533345333453334533345333453334533345333453334533345333453334533345333453334533345333453334533345333453334533345333453334533345333453334533345343453434534345343453434534345343453434534345343453434534345343453434534345343453434534345343453434534345343453434534345353453534535345353453534535345353453534535345353453534535345353453534535345353453534535351953519835198351983519835198351983519835198351983519835198351983519935199352003520135201352533525335253352533525335253352533525335256352563536035360353603536035360353793537935389353933539335393353933539335393353933539335396354423545035450354593545935459354593545935460354603546135462354623552235522355223552235522355223552235522355223552435536355363553635536355363553635549355493554935549355513555135551355513555135551355513555135551355513555135551355513555135551355513555135551355513555135551355513555135551355513555135551355513555135551355513555135551355513555135551355513555135551355513555135551355513555135551355513555135551355513555135551355513555135551355513555135551355513555135551355513555135551355513555135551355513555135551355513555135551355513555135551355513555235552355523555235552355523555235552355523555235552355523555235552355523555235552355523555235552355523555235552355523555335553355533555335553355533555335553355533555335553355533555335553355533555335553355533617936182361823618236182361823618236182361823618236182361823618236183361833618436185361853623636236362363623636236362363623636236362363623636236362393623936239362393624136241362413624136241362413624136241362413624136241362413624136241362413624136241362413624136241362413624136241362413624136241362413624136241362413624136241362413624136241362413624136241362413624136241362413624136241362413624136241362413624136241362413624136241362413624136241362413624136241362413624136241362413624136241362413624136241362413624136241362413624136241362413624136242362423624236242362423624236242362423624236242362423624236242362423624236242362423624236242362423624236242362423624236242362423624236242362423624236242362423624236242362423624236242362423624236242362423624236330363303633036330363303634036344363443634436344363443634436344363443634736393364013640136410364103641036410364103641136411364123641336413364693646936469364693646936469364693646936469364713648336483364833648336483364833649636496364963649636498364983649836498364983649836498364983649836498364983649836498364983649836498364983649836498364983649836498364983649836498364983649836498364983649836498364983649836498364983649836498364983649836498364983649836498364983649836498364983649836498364983649836498364983649836498364983649836498364983649836498364983649836498364983649836498364983649836498364983649836498364983649836498364993649936499364993649936499364993649936499364993649936499364993649936499364993649936499364993649936499364993649936499364993649936499364993649936499364993649936499364993649936499364993649936499364993649936499370463704937831378313783537835378433784337843378433784637892378923789237892378923790237965379653796537965379653796537965379653796537967379813799437994379943799437994379943799437994379943799437994379943799437994379943799437994379943799437994379943799437994379943799437994379943799437994379943799437994379943799437994379943799437994379943799437994379943799437994379943799437994379943799437994379943799437994379943799437994379943799437994379943799437994379943799437994379943799437994379943799437994379943799437994379943799437994379943799437995379953799537995379953799537995379953799537995379953799537995379953799537995379953799537995379953799537995379953799537995379953799537996379963799637996379963799637996379963799637996379963799637996379963799637996379963799837998379983799837999379993799937999379993799938000380013800138002381113816338163381633816338163381633816338163381663816638166381663816738167381673816738167381673816838169381693816938169381693816938169381693816938169381693816938169381693816938169381693817038170381713817238172382243822438224382243822438224382243822438224382243822438227382273822738227382293822938229382293822938229382293822938229382293822938229382293822938229382293822938229382293822938229382293822938229382293822938229382293822938229382293822938229382293822938229382293822938229382293822938229382293822938229382293822938229382293822938229382293822938229382293822938229382293822938229382293822938229382293822938229382293822938229382293822938229382293822938229382293822938230382303823038230382303823038230382303823038230382303823038230382303823038230382303823038230382303823038230382303823038230382303823038230382303823038230382303823038230382303823038230382303823038230382303823038330383303833038330383343833438334383343833438334383343833438337383833839138391384003840038400384003840038401384013840238403384033846038460384603846038460384603846038460384603846238474384743847438474384743847438487384873848738487384893848938489384893848938489384893848938489384893848938489384893848938489384893848938489384893848938489384893848938489384893848938489384893848938489384893848938489384893848938489384893848938489384893848938489384893848938489384893848938489384893848938489384893848938489384893848938489384893848938489384893848938489384893848938489384893848938489384893848938489384893848938489384893849038490384903849038490384903849038490384903849038490384903849038490384903849038490384903849038490384903849038490384903849038490384903849038490384903849038490384903849038490384903849038490384903849038490384903906439067390673906739067391793923139231392313923139231392313923139231392343923439235392353923539235392353923539236392373923739237392373923739972399723998039980399803998039983400294002940029400294002940039400994009940099400994009940099400994009940099401014011440127401274012740127401274012740127401274012740127401274012740127401274012740127401274012740127401274012740127401274012740127401274012740127401274012740127401274012740127401274012740127401274012740127401274012740127401274012740127401274012740127401274012740127401274012740127401274012740127401274012740127401274012740127401274012740127401274012740127401274012740127401274012740127401274012740127401284012840128401284012840128401284012840128401284012840128401284012840128401284012840128401284012840128401284012840128401284012840128401294012940129401294012940129401294012940129401294012940129401294012940129401294012940131401314013140131401324013240132401324013240132401334013440134401344013440138401384013840138401384013840138401384013840138401384013840138401394013940140401414014140193401934019340193401934019340193401934019640196403034030340303403034030340322403224033240336403364033640336403364033640336403364033940385403934039340402404024040240402404024040340403404044040540405404654046540465404654046540465404654046540465404674048040480404804048040480404804049340493404934049340495404954049540495404954049540495404954049540495404954049540495404954049540495404954049540495404954049540495404954049540495404954049540495404954049540495404954049540495404954049540495404954049540495404954049540495404954049540495404954049540495404954049540495404954049540495404954049540495404954049540495404954049540495404954049540495404954049540495404954049540495404954049540495404964049640496404964049640496404964049640496404964049640496404964049640496404964049640496404964049640496404964049640496404974049740497404974049740497404974049740497404974049740497404974049740497404974049740497411634116641166411664116641166411664116641166411664116641166411664116741167411684116941169412214122141221412214122141221412214122141224412244132641326413264132641330413304133041330413304133041330413304133341379413874138741396413964139641396413964139741397413984139941399414584145841458414584145841458414584145841458414604147241472414724147241472414724148541485414854148541487414874148741487414874148741487414874148741487414874148741487414874148741487414874148741487414874148741487414874148741487414874148741487414874148741487414874148741487414874148741487414874148741487414874148741487414874148741487414874148741487414874148741487414874148741487414874148741487414874148741487414874148741487414874148741487414874148741487414874148741487414874148741487414884148841488414884148841488414884148841488414884148841488414884148841488414884148841488414884148841488414884148841488414894148941489414894148941489414894148941489414894148941489414894148941489414894148941489421124211542122421224212242122421224212242122421224212242122421224212242122421224212342123421244212542125421774217742177421774217742177421774217742180421804228242282422824228242282423014230142311423114231542315423154231542315423154231542315423184236442372423724238142381423814238142381423824238242383423844238442443424434244342443424434244342443424434244342445424574245742457424574245742457424704247042470424704247242472424724247242472424724247242472424724247242472424724247242472424724247242472424724247242472424724247242472424724247242472424724247242472424724247242472424724247242472424724247242472424724247242472424724247242472424724247242472424724247242472424724247242472424724247242472424724247242472424724247242472424724247242472424724247242472424724247242472424724247242472424724247242473424734247342473424734247342473424734247342473424734247342473424734247342473424734247342473424734247342473424734247342474424744247442474424744247442474424744247442474424744247442474424744247442474424744247443091430944309443094430944309443094430944309443094430944309443094430954309543096430974309743149431494314943149431494314943149431494315243152432604326043260432604326443264432644326443264432644326443264432674331343321433214333043330433304333043330433314333143332433334333343393433934339343393433934339343393433934339343395434074340743407434074340743407434204342043420434204342243422434224342243422434224342243422434224342243422434224342243422434224342243422434224342243422434224342243422434224342243422434224342243422434224342243422434224342243422434224342243422434224342243422434224342243422434224342243422434224342243422434224342243422434224342243422434224342243422434224342243422434224342243422434224342243422434224342243422434224342243422434224342243423434234342343423434234342343423434234342343423434234342343423434234342343423434234342343423434234342343423434234342343424434244342443424434244342443424434244342443424434244342443424434244342443424434244342444115441184411844118441184411844118448764487644886448864489044890448984489844898448984490144947449474494744947449474495745017450174501745017450174501745017450174501745019450324504545045450454504545045450454504545045450454504545045450454504545045450454504545045450454504545045450454504545045450454504545045450454504545045450454504545045450454504545045450454504545045450454504545045450454504545045450454504545045450454504545045450454504545045450454504545045450454504545045450454504545045450454504545045450454504545045450454504545045450454504545045450454504545045450454504545046450464504645046450464504645046450464504645046450464504645046450464504645046450464504645046450464504645046450464504645046450464504645047450474504745047450474504745047450474504745047450474504745047450474504745047450474504945049450494504945050450504505045050450504505045051450524505245052450524505345166452184521845218452184521845218452184521845221452214522245222452224522245222452224522345224452244522445224452244522745227453394539145391453914539145391453914539145391453944539445395453954539545395453954539545396453974539745397453974539746193461934620346203462074620746215462154621546215462184626446264462644626446264462744633746337463374633746337463374633746337463374633946353463664636646366463664636646366463664636646366463664636646366463664636646366463664636646366463664636646366463664636646366463664636646366463664636646366463664636646366463664636646366463664636646366463664636646366463664636646366463664636646366463664636646366463664636646366463664636646366463664636646366463664636646366463664636646366463664636646366463664636646366463664636646366463664636646366463664636746367463674636746367463674636746367463674636746367463674636746367463674636746367463674636746367463674636746367463674636746367463674636846368463684636846368463684636846368463684636846368463684636846368463684636846368463704637046370463704637146371463714637146371463714637246373463734637546375463754637546375463754637546378463784637846378463784637846378463784637846378463784637846379463794638046381463814643346433464334643346433464334643346433464364643646544465444654446544465444656346563465734657746577465774657746577465774657746577465804662646634466344664346643466434664346643466444664446645466464664646706467064670646706467064670646706467064670646708467214672146721467214672146721467344673446734467344673646736467364673646736467364673646736467364673646736467364673646736467364673646736467364673646736467364673646736467364673646736467364673646736467364673646736467364673646736467364673646736467364673646736467364673646736467364673646736467364673646736467364673646736467364673646736467364673646736467364673646736467364673646736467364673646736467364673646736467364673646736467364673646737467374673746737467374673746737467374673746737467374673746737467374673746737467374673746737467374673746737467374673746738467384673846738467384673846738467384673846738467384673846738467384673846738467384673847428474314743147431474314743147431474314743147431474314743147431474314743247432474334743447434474854748547485474854748547485474854748547485474854748547488474884748847488474904749047490474904749047490474904749047490474904749047490474904749047490474904749047490474904749047490474904749047490474904749047490474904749047490474904749047490474904749047490474904749047490474904749047490474904749047490474904749047490474904749047490474904749047490474904749047490474904749047490474904749047490474904749047490474904749047490474904749047490474904749047490474904749147491474914749147491474914749147491474914749147491474914749147491474914749147491474914749147491474914749147491474914749147491474914749147491474914749147491474914749147491474914749147491474914749147491474914758147581475814758147581475914759147601476054760547605476054760547605476054760547608476544766247662476714767147671476714767147672476724767347674476744773047730477304773047730477304773047730477304773247744477444774447744477444774447757477574775747757477594775947759477594775947759477594775947759477594775947759477594775947759477594775947759477594775947759477594775947759477594775947759477594775947759477594775947759477594775947759477594775947759477594775947759477594775947759477594775947759477594775947759477594775947759477594775947759477594775947759477594775947759477594775947759477594775947759477594775947759477594775947759477594776047760477604776047760477604776047760477604776047760477604776047760477604776047760477604776047760477604776047760477604776047760477604776047760477604776047760477604776047760477604776047760477604776047760477604830048303484194847148471484714847148471484714847148471484744847448475484754847548475484754847548476484774847748477484774847749235492354924549245492494924949257492574925749257492604930649306493064930649306493164937649376493764937649376493764937649376493764937849391494044940449404494044940449404494044940449404494044940449404494044940449404494044940449404494044940449404494044940449404494044940449404494044940449404494044940449404494044940449404494044940449404494044940449404494044940449404494044940449404494044940449404494044940449404494044940449404494044940449404494044940449404494044940449404494044940449404494044940449404494044940449404494044940449404494044940549405494054940549405494054940549405494054940549405494054940549405494054940549405494054940549405494054940549405494054940549405494054940649406494064940649406494064940649406494064940649406494064940649406494064940649406494084940849408494084940949409494094940949409494094941049411494114941149411494124941249412494125017250172501825018250186501865019450194501945019450197502435024350243502435024350253503135031350313503135031350313503135031350313503155032850341503415034150341503415034150341503415034150341503415034150341503415034150341503415034150341503415034150341503415034150341503415034150341503415034150341503415034150341503415034150341503415034150341503415034150341503415034150341503415034150341503415034150341503415034150341503415034150341503415034150341503415034150341503415034150341503415034150341503415034150341503415034150341503415034150341503425034250342503425034250342503425034250342503425034250342503425034250342503425034250342503425034250342503425034250342503425034250342503435034350343503435034350343503435034350343503435034350343503435034350343503435034350345503455034550345503465034650346503465034650346503475034850348503485034850350504625051450514505145051450514505145051450514505175051750518505185051850518505185051850519505205052050520505205052150521505215052150521505215052150521505215052150521505215052150521505215052250522505235052450524505765057650576505765057650576505765057650579505795068650686506865068650690506905069050690506905069050690506905069350739507475074750756507565075650756507565075750757507585075950759508195081950819508195081950819508195081950819508215083450834508345083450834508345084750847508475084750849508495084950849508495084950849508495084950849508495084950849508495084950849508495084950849508495084950849508495084950849508495084950849508495084950849508495084950849508495084950849508495084950849508495084950849508495084950849508495084950849508495084950849508495084950849508495084950849508495084950849508495084950849508495084950849508495084950849508495084950849508495084950849508505085050850508505085050850508505085050850508505085050850508505085050850508505085050850508505085050850508505085050850508515085150851508515085150851508515085150851508515085150851508515085150851508515085150851514895149251492514925149251492514925149251492514925149251492514925149351493514945149551495515475154751547515475154751547515475154751550515505165951659516595165951663516635166351663516635166351663516635166651712517205172051730517305173051730517305173151731517325173351733517935179351793517935179351793517935179351793517955180851808518085180851808518085182151821518215182151823518235182351823518235182351823518235182351823518235182351823518235182351823518235182351823518235182351823518235182351823518235182351823518235182351823518235182351823518235182351823518235182351823518235182351823518235182351823518235182351823518235182351823518235182351823518235182351823518235182351823518235182351823518235182351823518235182351823518235182351823518235182351823518245182451824518245182451824518245182451824518245182451824518245182451824518245182451824518245182451824518245182451824518255182551825518255182551825518255182551825518255182551825518255182551825518255182551825525575256052672527245272452724527245272452724527245272452727527275272852728527285272852728527285272952730527305273052730527305350553505535155351553519535195352753527535275352753530535765357653576535765357653586535865358653586535865358653586535865358653588536035361653616536165361653616536165361653616536165361653616536165361653616536165361653616536165361653616536165361653616536165361653616536165361653616536165361653616536165361653616536165361653616536165361653616536165361653616536165361653616536165361653616536165361653616536165361653616536165361653616536165361653616536165361653616536165361653616536165361653616536165361653616536165361653616536165361653617536175361753617536175361753617536175361753617536175361753617536175361753617536175361753617536175361753617536175361753617536175361753618536185361853618536185361853618536185361853618536185361853618536185361853618536185362053620536205362053621536215362153621536215362153622536235362353692537125371253712537345373453734537345373453734537345373753737537375374153741537415374153741537415374153741537445379053798537985380753807538075380753807538085380853809538105381053870538705387053870538705387053870538705387053872538855388553885538855388553885538985389853898538985390053900539005390053900539005390053900539005390053900539005390053900539005390053900539005390053900539005390053900539005390053900539005390053900539005390053900539005390053900539005390053900539005390053900539005390053900539005390053900539005390053900539005390053900539005390053900539005390053900539005390053900539005390053900539005390053900539005390053900539005390053900539005390053901539015390153901539015390153901539015390153901539015390153901539015390153901539015390153901539015390153901539015390153902539025390253902539025390253902539025390253902539025390253902539025390253902539025390254584545845458454584545845458454584545845458454585545855458654587545875463954639546395463954639546395463954639546425464254749548585491054910549105491054910549105491054910549135491354914549145491454914549145491454915549165491654916549165491655718557225572255730557305573055730557335577955779557795577955779557895585255852558525585255852558525585255852558525585455869558825588255882558825588255882558825588255882558825588255882558825588255882558825588255882558825588255882558825588255882558825588255882558825588255882558825588255882558825588255882558825588255882558825588255882558825588255882558825588255882558825588255882558825588255882558825588255882558825588255882558825588255882558825588255882558825588255882558825588255882558825588255882558825588255882558825588355883558835588355883558835588355883558835588355883558835588355883558835588355883558835588355883558835588355883558835588355883558835588455884558845588455884558845588455884558845588455884558845588455884558845588455884558865588655886558865588755887558875588755887558875588855889558895589055890558905589055890558905589055890558905589055890558905589055890558905589155891558925589355893559455594555945559455594555945559455594555948559485604856048560485604856052560525605256052560525605256052560525605556101561095610956118561185611856118561185611956119561205612156121561805618056180561805618056180561805618056180561825619456194561945619456194561945620756207562075620756209562095620956209562095620956209562095620956209562095620956209562095620956209562095620956209562095620956209562095620956209562095620956209562095620956209562095620956209562095620956209562095620956209562095620956209562095620956209562095620956209562095620956209562095620956209562095620956209562095620956209562095620956209562095620956209562095620956209562095620956209562095620956209562105621056210562105621056210562105621056210562105621056210562105621056210562105621056210562105621056210562105621056210562115621156211562115621156211562115621156211562115621156211562115621156211562115621156211568135681656816568195681956819568195681956819568195682056820568215682256822568335683356833568335683356833568335683356833568355684256842568425684256842568425685356853568535685356853568675686956870568715687356875568755687556877568775687756877568795687956879568795687956879568795687956879568795687956879568795687956879568795687956879568795687956879568795687956879568795687956879568795687956879568795687956879568795687956879568795687956879568795687956879568795687956879568795687956879568795687956879568795687956879568795687956879568795687956879568795687956879568795687956879568795687956879568795687956879568795687956879568795688056880568805688056880568805688056880568805688056880568805688056880568805688056880568805688056880568805688056880568805688056880568805688056880568805688056880568805688056880568805688056880568805688056880568805688056881568895695556955569595695956959569595695956959569595696056960569615696256962569745697456974569745697456974569745697456974569765698456984569845698456984569845699556995569955699556995570095701157012570135701557017570175701757019570195701957019570215702157021570215702157021570215702157021570215702157021570215702157021570215702157021570215702157021570215702157021570215702157021570215702157021570215702157021570215702157021570215702157021570215702157021570215702157021570215702157021570215702157021570215702157021570215702157021570215702157021570215702157021570215702157021570215702157021570215702157021570215702157021570215702257022570225702257022570225702257022570225702257022570225702257022570225702257022570225702257022570225702257022570225702257022570225702257022570225702257022570225702257022570225702257022570225702257022570225702257023570315710257102571025710257102571025710257102571025710257102571025710357103571045710557105571575715757157571575715757157571575715757160571605726757267572675726757271572715727157271572715727157271572715727457320573285732857337573375733757337573375733857338573395734057340574005740057400574005740057400574005740057400574025741557415574155741557415574155742857428574285742857430574305743057430574305743057430574305743057430574305743057430574305743057430574305743057430574305743057430574305743057430574305743057430574305743057430574305743057430574305743057430574305743057430574305743057430574305743057430574305743057430574305743057430574305743057430574305743057430574305743057430574305743057430574305743057430574305743057430574305743057430574305743057430574315743157431574315743157431574315743157431574315743157431574315743157431574315743157431574315743157431574315743157431574325743257432574325743257432574325743257432574325743257432574325743257432574325743257432581175812058120581205812058120581205812058120581205812058120581215812158122581235812358175581755817558175581755817558175581755817858178582875829158291582915829158291582915829158291582945834058348583485835858358583585835858358583595835958360583615836158421584215842158421584215842158421584215842158423584365843658436584365843658436584495844958449584495845158451584515845158451584515845158451584515845158451584515845158451584515845158451584515845158451584515845158451584515845158451584515845158451584515845158451584515845158451584515845158451584515845158451584515845158451584515845158451584515845158451584515845158451584515845158451584515845158451584515845158451584515845158451584515845158451584515845158451584515845158451584515845158452584525845258452584525845258452584525845258452584525845258452584525845258452584525845258452584525845258452584525845258453584535845358453584535845358453584535845358453584535845358453584535845358453584535845359138591385918459187591875918759187591875918759187591875918759187591875918759188591885918959190591905924259242592425924259242592425924259242592455924559352593525935259352593565935659356593565935659356593565935659359594055941359413594225942259422594225942259423594235942459425594255948559485594855948559485594855948559485594855948759500595005950059500595005950059513595135951359513595155951559515595155951559515595155951559515595155951559515595155951559515595155951559515595155951559515595155951559515595155951559515595155951559515595155951559515595155951559515595155951559515595155951559515595155951559515595155951559515595155951559515595155951559515595155951559515595155951559515595155951559515595155951559515595155951559515595155951559515595155951559515595155951659516595165951659516595165951659516595165951659516595165951659516595165951659516595165951659516595165951659516595165951759517595175951759517595175951759517595175951759517595175951759517595175951759517595176019860201602046020461004610106101061018610186101861018610216106761067610676106761067610776114061140611406114061140611406114061140611406114261157611706117061170611706117061170611706117061170611706117061170611706117061170611706117061170611706117061170611706117061170611706117061170611706117061170611706117061170611706117061170611706117061170611706117061170611706117061170611706117061170611706117061170611706117061170611706117061170611706117061170611706117061170611706117061170611706117061170611706117061170611706117061170611706117061170611706117161171611716117161171611716117161171611716117161171611716117161171611716117161171611716117161171611716117161171611716117161171611716117161171611726117261172611726117261172611726117261172611726117261172611726117261172611736117461174611746117561175611756117561175611756117661177611776117861178611786128761339613396133961339613396133961339613396134261342613436134361343613436134361343613446134561345613456134561345613456134561345613456134561346613476134761347613476134761347613476134761347613486134861348613486134861348613486134861348613486134861348613486134861348613486134861348613486134861348613486134861348613486134861348613486134861348613486134861348613486134861348613486134861348613486134861348613486134861348613486134861348613486134861348613486134861348613486134861348613486134861348613486134861348613486134861348613486134861348613486134861348613496134961349613496134961349613496134961349613496134961349613496134961349613496134961349613496134961349613496134961349613496134961349613496134961349613496134961349613496134961349613496134961349613496135061350613506135061350613506135061350613506135161352613526135261352613526135261352613526135261353613536135361353613536135361353613536135361353613536135361353613536135361353613536135361353613536135361353613536135361353613536135361353613536135361353613536135361353613536135361353613536135361353613536135361353613536135361353613536135361353613536135361353613536135361353613536135361353613536135361353613536135361353613536135361353613536135361353613536135361354613546135461354613546135461354613546135461354613546135461354613546135461354613546135461354613546135461354613546135461354613546135461354613546135461354613546135461354613546135461354613546135461354613556135561355613556135561355613556135561355613556135561355613556135561355613556135561355613556135561355613556135561355613556135561355613556135561355613556135561355613556135561355613556135561355613556135661356613576135861358614106141061410614106141061410614106141061413614136152061520615206152061520615396153961549615536155361553615536155361553615536155361556616026161061610616196161961619616196161961620616206162161622616226168261682616826168261682616826168261682616826168461697616976169761697616976169761710617106171061710617126171261712617126171261712617126171261712617126171261712617126171261712617126171261712617126171261712617126171261712617126171261712617126171261712617126171261712617126171261712617126171261712617126171261712617126171261712617126171261712617126171261712617126171261712617126171261712617126171261712617126171261712617126171261712617126171261712617126171261712617126171261712617126171361713617136171361713617136171361713617136171361713617136171361713617136171361713617136171361713617136171361713617136171461714617146171461714617146171461714617146171461714617146171461714617146171461714617146236862371623716237162371630366303663036630366303663036630376303863038631796317963189631896319363193632016320163201632016320463250632506325063250632506326063323633236332363323633236332363323633236332363325633396335263352633526335263352633526335263352633526335263352633526335263352633526335263352633526335263352633526335263352633526335263352633526335263352633526335263352633526335263352633526335263352633526335263352633526335263352633526335263352633526335263352633526335263352633526335263352633526335263352633526335263352633526335263352633526335263352633526335263352633526335263352633526335263352633526335263353633536335363353633536335363353633536335363353633536335363353633536335363353633536335363353633536335363353633536335363353633536335363354633546335463354633546335463354633546335463354633546335463354633546335463354633546335663356633566335663356633566335663465635176351763517635176351763517635176351763520635206352163521635216352163521635216352263523635236352363523635236432764331643316433964339643396433964342643886438864388643886438864398644616446164461644616446164461644616446164461644636447864491644916449164491644916449164491644916449164491644916449164491644916449164491644916449164491644916449164491644916449164491644916449164491644916449164491644916449164491644916449164491644916449164491644916449164491644916449164491644916449164491644916449164491644916449164491644916449164491644916449164491644916449164491644916449164491644916449164491644916449164491644916449164491644916449164491644926449264492644926449264492644926449264492644926449264492644926449264492644926449264492644926449264492644926449264492644926449264492644936449364493644936449364493644936449364493644936449364493644936449364493644936449364495644956449564495644966449664496644966449664496644976449864498644986460764659646596465964659646596465964659646596466264662646626466264663646636466364663646636466364664646656466564665646656466764667646676466764667646676466764667646686466864668646686466864668646686466864668646686466864668646686466864670646706467164671646726467264672646726467264672646726467264672646726467264672646726467264673646736467464675646756472764727647276472764727647276472764727647306473064837648376483764837648416484164841648416484164841648416484164844648906489864898649076490764907649076490764908649086490964910649106497064970649706497064970649706497064970649706497264985649856498564985649856498564998649986499864998650006500065000650006500065000650006500065000650006500065000650006500065000650006500065000650006500065000650006500065000650006500065000650006500065000650006500065000650006500065000650006500065000650006500065000650006500065000650006500065000650006500065000650006500065000650006500065000650006500065000650006500065000650006500065000650006500065000650006500065000650006500065000650006500165001650016500165001650016500165001650016500165001650016500165001650016500165001650016500165001650016500165001650016500265002650026500265002650026500265002650026500265002650026500265002650026500265002650026553065682656856568565685656856568565685656856568565685656856568565685656866568665687656886568865740657406574065740657406574065740657406574065740657406574365743657436574365745657456574565745657456574565745657456574565745657456574565745657456574565745657456574565745657456574565745657456574565745657456574565745657456574565745657456574565745657456574565745657456574565745657456574565745657456574565745657456574565745657456574565745657456574565745657456574565745657456574565745657456574565745657456574565745657456574565745657456574565745657456574565745657456574665746657466574665746657466574665746657466574665746657466574665746657466574665746657466574665746657466574665746657466574665746657466574665746657466574665746657466574665746657466574665746657466574665746657466584565845658456584565845658556585965859658596585965859658596585965859658626590865916659166592565925659256592565925659266592665927659286592865987659876598765987659876598765987659876598765989660016600166001660016600166001660146601466014660146601666016660166601666016660166601666016660166601666016660166601666016660166601666016660166601666016660166601666016660166601666016660166601666016660166601666016660166601666016660166601666016660166601666016660166601666016660166601666016660166601666016660166601666016660166601666016660166601666016660166601666016660166601666016660166601666016660166601666016660166601666016660166601666017660176601766017660176601766017660176601766017660176601766017660176601766017660176601766017660176601766017660176601766017660176601766017660176601766017660176601766017660176601766017660176601766017660176601766593665966659666596665966659666596665966659666596665966659666596665966659666596665966659666596665966659666596665966659666600666006660066600666036664966657666576666366663666636666366663666636666366664666646666566666666666671966719667196671966719667196671966719667196672166730667306673066730667326673266732667326673266732667326673266732667326673266732667326673266732667326673266732667326673266732667326673266732667326673266732667326673266732667326673266732667326673266732667326673266732667326673266732667326673266732667326673266732667326673266732667326673266732667326673266732667326673266732667326673266732667326673266732667326673266732667326673266732667326673266732667326673366733667336673366733667336673366733667336673366733667336673366733667336673366733667336673366733667336673366733667336673366733667336673366733667336673366733667336673366733667336673366733667336673366733667336673367032670356703567035670356703567035670356703567035670356703567035670366703667037670386703867089670896708967089670896708967089670896709367093670936709367095670956709567095670956709567095670956709567095670956709567095670956709567095670956709567095670956709567095670956709567095670956709567095670956709567095670956709567095670956709567095670956709567095670956709567095670956709567095670956709567095670956709567095670956709567095670956709567095670956709567095670956709567095670956709567095670956709567095670956709567095670956709567095670966709667096670966709667096670966709667096670966709667096670966709667096670966709667096670966709667096670966709667096670966709667096670966709667096670966709667096670966709667096670966709667096670966709667096671746717467174671746717467184671886718867188671886719167237672456724567253672536725367253672536725467254672556725667256673096730967309673096730967309673096730967309673116732567325673256732567327673276732767327673276732767327673276732767327673276732767327673276732767327673276732767327673276732767327673276732767327673276732767327673276732767327673276732767327673276732767327673276732767327673276732767327673276732767327673276732767327673276732767327673276732767327673276732767327673276732767327673276732767327673276732767327673276732767327673276732767327673276732767327673286732867328673286732867328673286732867328673286732867328673286732867328673286732867328673286732867328673286732867328673286732867328673286732867328673286732867328673286732867328673286732867328673286732867328677786778167781677816778167781677816778167781677816778167781677816778267782677836778467784678356783567835678356783567835678356783567839678396783967839678416784167841678416784167841678416784167841678416784167841678416784167841678416784167841678416784167841678416784167841678416784167841678416784167841678416784167841678416784167841678416784167841678416784167841678416784167841678416784167841678416784167841678416784167841678416784167841678416784167841678416784167841678416784167841678416784167841678416784167841678416784167841678416784267842678426784267842678426784267842678426784267842678426784267842678426784267842678426784267842678426784267842678426784267842678426784267842678426784267842678426784267842678426784267842678426784267842678426792067920679206792067920679306793467934679346793467937679836799167991679996799967999679996799968000680006800168002680026805568055680556805568055680556805568055680556805768071680716807168071680736807368073680736807368073680736807368073680736807368073680736807368073680736807368073680736807368073680736807368073680736807368073680736807368073680736807368073680736807368073680736807368073680736807368073680736807368073680736807368073680736807368073680736807368073680736807368073680736807368073680736807368073680736807368073680736807368073680736807368073680736807368073680736807468074680746807468074680746807468074680746807468074680746807468074680746807468074680746807468074680746807468074680746807468074680746807468074680746807468074680746807468074680746807468074680746807468074680746853168534685346853568535685356853568535685356853568535685356853568536685366853768538685386858968589685896858968589685896858968592685926859268592685946859468594685946859468594685946859468594685946859468594685946859468594685946859468594685946859468594685946859468594685946859468594685946859468594685946859468594685946859468594685946859468594685946859468594685946859468594685946859468594685946859468594685946859468594685946859468594685946859468594685946859468594685946859468594685946859468594685946859468594685946859468594685946859568595685956859568595685956859568595685956859568595685956859568595685956859568595685956859568595685956859568595685956859568595685956859568595685956859568595685956859568595685956859568595685956859568595685956868168681686816868168681686916869568695686956869568698687446875268752687626876268762687626876268763687636876468765687656881968819688196881968819688196881968819688196882168833688336883368833688356883568835688356883568835688356883568835688356883568835688356883568835688356883568835688356883568835688356883568835688356883568835688356883568835688356883568835688356883568835688356883568835688356883568835688356883568835688356883568835688356883568835688356883568835688356883568835688356883568835688356883568835688356883568835688356883568835688356883568835688356883568835688356883668836688366883668836688366883668836688366883668836688366883668836688366883668836688366883668836688366883668836688366883668836688366883668836688366883668836688366883668836688366883668836688366883668836688366932069323693236932369323693266932669326693306933069330693306933069330693306933069333693796938769387693966939669396693966939669397693976939869399693996945969459694596945969459694596945969459694596946169474694746947469474694746947469487694876948769487694896948969489694896948969489694896948969489694896948969489694896948969489694896948969489694896948969489694896948969489694896948969489694896948969489694896948969489694896948969489694896948969489694896948969489694896948969489694896948969489694896948969489694896948969489694896948969489694896948969489694896948969489694896948969489694896948969489694896948969489694896948969489694896949069490694906949069490694906949069490694906949069490694906949069490694906949069490694906949069490694906949069490694906949169491694916949169491694916949169491694916949169491694916949169491694916949169491694917017370173701737017370173701737017370173701737017470174701757017670176702287022870228702287022870228702287022870231702317033870446704997049970499704997049970499704997049970502705027050370503705037050370503705037050470505705057050570505705057130671311713117131971319713197131971322713687136871368713687136871378714417144171441714417144171441714417144171441714437145871471714717147171471714717147171471714717147171471714717147171471714717147171471714717147171471714717147171471714717147171471714717147171471714717147171471714717147171471714717147171471714717147171471714717147171471714717147171471714717147171471714717147171471714717147171471714717147171471714717147171471714717147171471714717147171471714717147171471714717147171471714717147171471714717147171471714727147271472714727147271472714727147271472714727147271472714727147271472714727147271472714727147271472714727147271472714727147271472714737147371473714737147371473714737147371473714737147371473714737147371473714737147371475714757147571475714767147671476714767147671476714777147871478714787147871478714787147871478714787147871478714787147871478714787147871478714797147971480714817148171533715337153371533715337153371533715337153671536716377163771637716377164171641716417164171641716417164171641716447169071698716987170771707717077170771707717087170871709717107171071769717697176971769717697176971769717697176971771717837178371783717837178371783717967179671796717967179871798717987179871798717987179871798717987179871798717987179871798717987179871798717987179871798717987179871798717987179871798717987179871798717987179871798717987179871798717987179871798717987179871798717987179871798717987179871798717987179871798717987179871798717987179871798717987179871798717987179871798717987179871798717987179871798717987179871798717987179871798717987179871799717997179971799717997179971799717997179971799717997179971799717997179971799717997179971799717997179971799717997179971800718007180071800718007180071800718007180071800718007180071800718007180071800718007180072414724177241772418724187241872418724187241872418724187241872418724197241972420724217242172473724737247372473724737247372473724737247672476725807258072580725807258472584725847258472584725847258472584725877263372641726417265072650726507265072650726517265172652726537265372713727137271372713727137271372713727137271372715727277272772727727277272772727727407274072740727407274272742727427274272742727427274272742727427274272742727427274272742727427274272742727427274272742727427274272742727427274272742727427274272742727427274272742727427274272742727427274272742727427274272742727427274272742727427274272742727427274272742727427274272742727427274272742727427274272742727427274272742727427274272742727427274272742727427274272742727427274272742727427274272743727437274372743727437274372743727437274372743727437274372743727437274372743727437274372743727437274372743727437274372744727447274472744727447274472744727447274472744727447274472744727447274472744727447274473368733717337173371733717337173371733717337173371733717337173371733727337273373733747337473425734257342573425734257342573425734257342573425734257342873428734287342873430734307343073430734307343073430734307343073430734307343073430734307343073430734307343073430734307343073430734307343073430734307343073430734307343073430734307343073430734307343073430734307343073430734307343073430734307343073430734307343073430734307343073430734307343073430734307343073430734307343073430734307343073430734307343073430734307343073430734307343073430734307343073430734317343173431734317343173431734317343173431734317343173431734317343173431734317343173431734317343173431734317343173431734317343173431734317343173431734317343173431734317343173431734317343173431734317343173431735217352173521735217352173531735357353573535735357353573535735357353573538735847359273592736017360173601736017360173602736027360373604736047366073660736607366073660736607366073660736607366273674736747367473674736747367473687736877368773687736897368973689736897368973689736897368973689736897368973689736897368973689736897368973689736897368973689736897368973689736897368973689736897368973689736897368973689736897368973689736897368973689736897368973689736897368973689736897368973689736897368973689736897368973689736897368973689736897368973689736897368973689736897368973689736897368973689736897368973689736897368973689736897369073690736907369073690736907369073690736907369073690736907369073690736907369073690736907369073690736907369073690736907369073690736907369073690736907369073690736907369073690736907369073690736907369073690736907423074233742337423374233742337423374233742337423374233742337423374234742347423574236742367428874288742887428874288742887428874288742917429174399743997439974399744037440374403744037440374403744037440374406744527446074460744697446974469744697446974470744707447174472744727453274532745327453274532745327453274532745327453474546745467454674546745467454674559745597455974559745617456174561745617456174561745617456174561745617456174561745617456174561745617456174561745617456174561745617456174561745617456174561745617456174561745617456174561745617456174561745617456174561745617456174561745617456174561745617456174561745617456174561745617456174561745617456174561745617456174561745617456174561745617456174561745617456174561745617456174561745617456174561745617456274562745627456274562745627456274562745627456274562745627456274562745627456274562745627456274562745627456274562745627456374563745637456374563745637456374563745637456374563745637456374563745637456374563745637525475257752577525775257752577525775257752577525775257752577525775257752577525875258752597526075260753117531175311753117531175311753117531175314753147531475314753167531675316753167531675316753167531675316753167531675316753167531675316753167531675316753167531675316753167531675316753167531675316753167531675316753167531675316753167531675316753167531675316753167531675316753167531675316753167531675316753167531675316753167531675316753167531675316753167531675316753167531675316753167531675316753167531675316753167531675316753167531675316753167531775317753177531775317753177531775317753177531775317753177531775317753177531775317753177531775317753177531775317753177531775317753177531775317753177531775317753177531775317753177531775317753177531775317753177538075380753807538075384753847538475384753847538475384753847538475384753847538475384753847538475384753847538475384753847538475384753847538475384753847538475384753847538475384753877543375441754417544875448754487544875448754497544975450754517545175507755077550775507755077550775507755077550775509755207552075520755207552275522755227552275522755227552275522755227552275522755227552275522755227552275522755227552275522755227552275522755227552275522755227552275522755227552275522755227552275522755227552275522755227552275522755227552275522755227552275522755227552275522755227552275522755227552275522755227552275522755227552275522755227552275522755227552275522755227552275522755227552275522755227552275523755237552375523755237552375523755237552375523755237552375523755237552375523755237552375523755237552375523755237552375523755237552375523755237552375523755237552375523755237552375523755237552375523755237552375523759397594275942759427594275942759427594275942759427594275942759427594375943759447594575945759977599775997759977599775997759977599776000760007610976109761097610976113761137611376113761137611376113761137611676162761707617076180761807618076180761807618176181761827618376183762437624376243762437624376243762437624376243762457625876258762587625876258762587627176271762717627176273762737627376273762737627376273762737627376273762737627376273762737627376273762737627376273762737627376273762737627376273762737627376273762737627376273762737627376273762737627376273762737627376273762737627376273762737627376273762737627376273762737627376273762737627376273762737627376273762737627376273762737627376273762737627376273762737627376273762737627376273762737627376273762747627476274762747627476274762747627476274762747627476274762747627476274762747627476274762747627476274762747627476274762757627576275762757627576275762757627576275762757627576275762757627576275762757627576275770057700877084770847708477084770887708877088770887708877090770907709077090770907709077090770907709077090770907709077090770907709077090770907709477094770947720677258772587725877258772587725877258772587726177261772627726277262772627726277262772637726477264772647726477264780627806278072780727807678076780847808478084780847808778133781337813378133781337814378206782067820678206782067820678206782067820678208782227823578235782357823578235782357823578235782357823578235782357823578235782357823578235782357823578235782357823578235782357823578235782357823578235782357823578235782357823578235782357823578235782357823578235782357823578235782357823578235782357823578235782357823578235782357823578235782357823578235782357823578235782357823578235782357823578235782357823578235782357823578235782357823578235782357823578236782367823678236782367823678236782367823678236782367823678236782367823678236782367823678236782367823678236782367823678236782367823678237782377823778237782377823778237782377823778237782377823778237782377823778237782377823978239782397823978240782407824078240782407824078241782427824278242782427824278242782427824278242782427824278242782427824278242782427824278242782427824378243782447824578245782977829778297782977829778297782977829778300783007840878408784087840878408784277842778437784417844178441784417844178441784417844178444784907849878498785077850778507785077850778508785087850978510785107857078570785707857078570785707857078570785707857278585785857858578585785857858578598785987859878598786007860078600786007860078600786007860078600786007860078600786007860078600786007860078600786007860078600786007860078600786007860078600786007860078600786007860078600786007860078600786007860078600786007860078600786007860078600786007860078600786007860078600786007860078600786007860078600786007860078600786007860078600786007860078600786007860078600786007860078600786007860078600786007860178601786017860178601786017860178601786017860178601786017860178601786017860178601786017860178601786017860178601786017860278602786027860278602786027860278602786027860278602786027860278602786027860278602786027928779290792907929079290792907929079291792917929279293792937935079350793507935079350793507935079350793537935379353793537935579355793557935579355793557935579355793557935579355793557935579355793557935579355793557935579355793557935579355793557935579355793557935579355793557935579355793557935579355793557935579355793557935579355793557935579355793557935579355793557935579355793557935579355793557935579355793557935579355793557935579355793557935579355793557935579355793557935579355793557935579355793557935579356793567935679356793567935679356793567935679356793567935679356793567935679356793567935679356793567935679356793567935679356793567935679356793567935679356793567935679356793567935679356793567935679356793567935679356793567940279405794107941079410794107941379459794677946779476794767947679476794767947779477794787947979479795347953479534795347953479534795347953479534795457954579545795457954579545795587955879558795587956079560795607956079560795607956079560795607956079560795607956079560795607956079560795607956079560795607956079560795607956079560795607956079560795607956079560795607956079560795607956079560795607956079560795607956079560795607956079560795607956079560795607956079560795607956079560795607956079560795607956079560795607956079560795607956079560795607956079560795607956079560795607956079561795617956179561795617956179561795617956179561795617956179561795617956179561795617956179561795617956179561795617956179561795617956179561795617956179561795617956179561795617956179561795617956179561795617956179561795627985979897798977990379903799037990379913799137991379913799137991379913799137991379913799137991379913799137991379913799137991379913799137991379913799137991379913799137991379913799137991379913799137991379913799137991379913799137991379913799137991379913799137991379913799137991379913799137991879918800308008280082800828008280082800828008280082800858008580086800868008680086800868008680087800888008880088800888008880874808748088480884808888088880896808968089680896808998094580945809458094580945809558101881018810188101881018810188101881018810188102081033810468104681046810468104681046810468104681046810468104681046810468104681046810468104681046810468104681046810468104681046810468104681046810468104681046810468104681046810468104681046810468104681046810468104681046810468104681046810468104681046810468104681046810468104681046810468104681046810468104681046810468104681046810468104681046810468104681046810468104681046810468104681046810468104681046810468104781047810478104781047810478104781047810478104781047810478104781047810478104781047810478104781047810478104781047810478104781047810478104881048810488104881048810488104881048810488104881048810488104881048810488104881048810508105081050810508105181051810518105181051810518105281053810538105381053810538105381053810538105381053810538105381053810538105381053810538105381053810538105381053810538105381061810618106181061810618106181061810618106181061810618106181061810618106281062810638106481064811168111681116811168111681116811168111681119811198122781227812278122781231812318123181231812318123181231812318123481280812888128881297812978129781297812978129881298812998130081300813608136081360813608136081360813608136081360813628137581375813758137581375813758138881388813888138881390813908139081390813908139081390813908139081390813908139081390813908139081390813908139081390813908139081390813908139081390813908139081390813908139081390813908139081390813908139081390813908139081390813908139081390813908139081390813908139081390813908139081390813908139081390813908139081390813908139081390813908139081390813908139081390813908139081390813908139081390813908139081390813918139181391813918139181391813918139181391813918139181391813918139181391813918139181391813918139181391813918139181391813928139281392813928139281392813928139281392813928139281392813928139281392813928139281392820828208582089820898208982089820938209382093821008210082100821008210082101821018210282103821038215782157821578215782157821578215782157821578215982168821688216882168821708217082170821708217082170821708217082170821708217082170821708217082170821708217082170821708217082170821708217082170821708217082170821708217082170821708217082170821708217082170821708217082170821708217082170821708217082170821708217082170821708217082170821708217082170821708217082170821708217082170821708217082170821708217082170821708217082170821708217082170821708217082170821708217182171821718217182171821718217182171821718217182171821718217182171821718217182171821718217182171821718217182171821718217182171821718217182171821718217182171821718217182171821718217182171821718217182171821718217182493824938249382493832548325483264832648326883268832768327683276832768327983325833258332583325833258333583395833958339583395833958339583395833958339583397834108342383423834238342383423834238342383423834238342383423834238342383423834238342383423834238342383423834238342383423834238342383423834238342383423834238342383423834238342383423834238342383423834238342383423834238342383423834238342383423834238342383423834238342383423834238342383423834238342383423834238342383423834238342383423834238342383423834238342383423834238342383423834238342383423834238342383424834248342483424834248342483424834248342483424834248342483424834248342483424834248342483424834248342483424834248342483424834248342483425834258342583425834258342583425834258342583425834258342583425834258342583425834258342783427834278342783428834288342883428834288342883429834308343083430834308343183544835968359683596835968359683596835968359683599835998360083600836008360083600836008360183602836028360283602836028360283602836028360283602836028360283602836028360283602836028360383603836048360583605836578365783657836578365783657836578365783657836578365783660836608366083660836628366283662836628366283662836628366283662836628366283662836628366283662836628366283662836628366283662836628366283662836628366283662836628366283662836628366283662836628366283662836628366283662836628366283662836628366283662836628366283662836628366283662836628366283662836628366283662836628366283662836628366283662836628366283662836628366283662836628366283662836628366283662836628366383663836638366383663836638366383663836638366383663836638366383663836638366383663836638366383663836638366383663836638366383663836638366383663836638366383663836638366383663836638366383663836638366383663836638375783757837578375783757837578377483774837848378883788837888378883788837888378883788837918383783845838458385483854838548385483854838558385583856838578385783914839148391483914839148391483914839148391483916839288392883928839288392883928839418394183941839418394383943839438394383943839438394383943839438394383943839438394383943839438394383943839438394383943839438394383943839438394383943839438394383943839438394383943839438394383943839438394383943839438394383943839438394383943839438394383943839438394383943839438394383943839438394383943839438394383943839438394383943839438394383943839438394383943839438394383943839438394383943839438394383944839448394483944839448394483944839448394483944839448394483944839448394483944839448394483944839448394483944839448394483944839448394483944839448394483944839448394483944839448394483944839448394483944839448394484503845068450684506845068450684506845068450684506845068450684506845068450784507845088450984509845608456084560845608456084560845608456084560845608456084563845638456384563845658456584565845658456584565845658456584565845658456584565845658456584565845658456584565845658456584565845658456584565845658456584565845658456584565845658456584565845658456584565845658456584565845658456584565845658456584565845658456584565845658456584565845658456584565845658456584565845658456584565845658456584565845658456584565845658456584565845658456584565845658456584565845658456684566845668456684566845668456684566845668456684566845668456684566845668456684566845668456684566845668456684566845668456684566845668456684566845668456684566845668456684566845668456684566845668456684566845668465584655846558465584655846658466984669846698466984669846698466984669846728471884726847268473584735847358473584735847368473684737847388473884794847948479484794847948479484794847948479484796848088480884808848088480884808848218482184821848218482384823848238482384823848238482384823848238482384823848238482384823848238482384823848238482384823848238482384823848238482384823848238482384823848238482384823848238482384823848238482384823848238482384823848238482384823848238482384823848238482384823848238482384823848238482384823848238482384823848238482384823848238482384823848238482384823848238482384823848238482384823848238482384824848248482484824848248482484824848248482484824848248482484824848248482484824848248482484824848248482484824848248482484824848248482484824848248482484824848248482484824848248482484824848248482484824848248482485370853738537385373853738537385373853738537385373853738537385373853748537485375853768537685427854278542785427854278542785427854278542785427854278543085430854308543085432854328543285432854328543285432854328543285432854328543285432854328543285432854328543285432854328543285432854328543285432854328543285432854328543285432854328543285432854328543285432854328543285432854328543285432854328543285432854328543285432854328543285432854328543285432854328543285432854328543285432854328543285432854328543285432854328543285432854328543285432854328543285432854328543385433854338543385433854338543385433854338543385433854338543385433854338543385433854338543385433854338543385433854338543385433854338543385433854338543385433854338543385433854338543385433854338543385433854338552285522855228552285522855228553285536855368553685536855368553685536855368553985585855938559385602856028560285602856028560385603856048560585605856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856648566485664856658566585665856658566585665856658566585665856658566585665856658566585665856658566585665856658566585665856658566585665856678567985679856798567985679856798569285692856928569285694856948569485694856948569485694856948569485694856948569485694856948569485694856948569485694856948569485694856948569485694856948569485694856948569485694856948569485694856948569485694856948569485694856948569485694856948569485694856948569485694856948569485694856948569485694856948569485694856948569485694856948569485694856948569485694856948569485694856948569485694856948569485694856958569585695856958569585695856958569585695856958569585695856958569585695856958569585695856958569585695856958569585695856968569685696856968569685696856968569685696856968569685696856968569685696856968569685696863028630586305863058630586305863058630586305863058630586305863058630686306863078630886308863608636086360863608636086360863608636086363863638647186471864718647186475864758647586475864758647586475864758647886524865328653286541865418654186541865418654286542865438654486544866048660486604866048660486604866048660486604866068661986619866198661986619866198663286632866328663286634866348663486634866348663486634866348663486634866348663486634866348663486634866348663486634866348663486634866348663486634866348663486634866348663486634866348663486634866348663486634866348663486634866348663486634866348663486634866348663486634866348663486634866348663486634866348663486634866348663486634866348663486634866348663486634866348663486634866348663486634866348663486634866358663586635866358663586635866358663586635866358663586635866358663586635866358663586635866358663586635866358663586635866368663686636866368663686636866368663686636866368663686636866368663686636866368663686636873328733587335873358733587335873358733587335873358733587335873358733987339873398733987342873888739687396874028740287402874028740287402874028740387403874048740587405874598745987459874598745987459874598745987459874618747087470874708747087472874728747287472874728747287472874728747287472874728747287472874728747287472874728747287472874728747287472874728747287472874728747287472874728747287472874728747287472874728747287472874728747287472874728747287472874728747287472874728747287472874728747287472874728747287472874728747287472874728747287472874728747287472874728747287472874728747287472874728747287472874728747287472874738747387473874738747387473874738747387473874738747387473874738747387473874738747387473874738747387473874738747387473874738747387473874738747387473874738747387473874738747387473874738747387473874738747387473874738777687779885438854388553885538855788557885658856588565885658856888614886148861488614886148862488684886848868488684886848868488684886848868488686886998871288712887128871288712887128871288712887128871288712887128871288712887128871288712887128871288712887128871288712887128871288712887128871288712887128871288712887128871288712887128871288712887128871288712887128871288712887128871288712887128871288712887128871288712887128871288712887128871288712887128871288712887128871288712887128871288712887128871288712887128871288712887128871288712887128871288713887138871388713887138871388713887138871388713887138871388713887138871388713887138871388713887138871388713887138871388713887138871388714887148871488714887148871488714887148871488714887148871488714887148871488714887148871688716887168871688717887178871788717887178871788718887198871988719887198872188721888348888688886888868888688886888868888688886888898888988890888908889088890888908889088891888928889288892888928889288895888958889588895888958889588895888958889588895888958889588895888958889688896888978889888898889508895088950889508895088950889508895088950889508895088953889538895388953889558895588955889558895588955889558895588955889558895588955889558895588955889558895588955889558895588955889558895588955889558895588955889558895588955889558895588955889558895588955889558895588955889558895588955889558895588955889558895588955889558895588955889558895588955889558895588955889558895588955889558895588955889558895588955889558895588955889558895588955889558895588955889558895588956889568895688956889568895688956889568895688956889568895688956889568895688956889568895688956889568895688956889568895688956889568895688956889568895688956889568895688956889568895688956889568895688956889568895689055890558905589055890558906589069890698906989069890698906989069890698907289118891268912689135891358913589135891358913689136891378913889138891978919789197891978919789197891978919789197891998921189211892118921189211892118922489224892248922489226892268922689226892268922689226892268922689226892268922689226892268922689226892268922689226892268922689226892268922689226892268922689226892268922689226892268922689226892268922689226892268922689226892268922689226892268922689226892268922689226892268922689226892268922689226892268922689226892268922689226892268922689226892268922689226892268922689226892268922689226892268922689226892278922789227892278922789227892278922789227892278922789227892278922789227892278922789227892278922789227892278922789227892288922889228892288922889228892288922889228892288922889228892288922889228892288922889228898058980889808898088980889808898088980889808898088980889808898088980989809898108981189811898638986389863898638986389863898638986389863898638986389866898668986689866898688986889868898688986889868898688986889868898688986889868898688986889868898688986889868898688986889868898688986889868898688986889868898688986889868898688986889868898688986889868898688986889868898688986889868898688986889868898688986889868898688986889868898688986889868898688986889868898688986889868898688986889868898688986889868898688986889868898688986889868898688986889868898688986889869898698986989869898698986989869898698986989869898698986989869898698986989869898698986989869898698986989869898698986989869898698986989869898698986989869898698986989869898698986989869898698986989869898698986989968899688996889968899688997889982899828998289982899828998289982899828998590031900399003990048900489004890048900489004990049900509005190051901109011090110901109011090110901109011090110901129012490124901249012490124901249013790137901379013790139901399013990139901399013990139901399013990139901399013990139901399013990139901399013990139901399013990139901399013990139901399013990139901399013990139901399013990139901399013990139901399013990139901399013990139901399013990139901399013990139901399013990139901399013990139901399013990139901399013990139901399013990139901399013990139901399013990139901399013990139901399013990139901409014090140901409014090140901409014090140901409014090140901409014090140901409014090140901409014090140901409014090140901409014090140901409014090140901409014090140901409014090140901409014090140901409014090140907159071891229912409124491250912799129891306913069131291312913129131291315913639136391379913929139291392913929139291392913939139491394914589146391463914639146391463914639146391464914699148291496914969149691496914969149691508915089150991510915109151091510915109151091510915109151091510915109151091510915109151091510915109151091510915109151091510915109151091510915109151091510915109151091510915109151091510915109151091510915109151091510915109151091510915109151091510915109151091510915109151091510915109151091510915109151091510915109151091510915109151091510915109151091510915109151091510915109151091510915109151091510915119151191511915119151191511915119151191511915119151191511915119151191511915119151191511915119151191511915119151191511915129151291512915129151291512915129151291512915129151291512915129151291512915129151291512916719167691676916769167691676916769175591761917619176191761917619176191762917639176391815918159181591815918159181591815918159181891822918429184291842918459195792009920099200992009920099200992009920099201292012920139201392013920139201392013920149201592015920159201592015928139281392823928239282792827928359283592835928359283892884928849288492884928849289492894928949289492894928949289492894928949289692910929239292392923929239292392923929239292392923929239292392923929239292392923929239292392923929239292392923929239292392923929239292392923929239292392923929239292392923929239292392923929239292392923929239292392923929239292392923929239292392923929239292392923929239292392923929239292392923929239292392923929239292392923929239292392923929239292392923929239292392923929239292392923929239292392923929239292492924929249292492924929249292492924929249292492924929249292492924929249292492924929249292492924929249292492924929249292492924929249292592925929259292592925929259292592925929259292592925929259292592925929259292592925929279292792927929279292892928929289292892928929289292992930929309299392993929939299392993929939299392993929939299392993929939299392993929939299392993929939299392994929949299592996929969304893048930489304893048930489304893048930519305193159931639316393163931639316393163931639316393166932129322093220932299322993229932299322993230932309323193232932329329293292932929329293292932929329293292932929329493306933069330693306933069330693319933199331993319933219332193321933219332193321933219332193321933219332193321933219332193321933219332193321933219332193321933219332193321933219332193321933219332193321933219332193321933219332193321933219332193321933219332193321933219332193321933219332193321933219332193321933219332193321933219332193321933219332193321933219332193321933219332193321933219332193321933219332193321933219332193321933219332293322933229332293322933229332293322933229332293322933229332293322933229332293322933229332293322933229332293322933229332393323933239332393323933239332393323933239332393323933239332393323933239332393323933239401294012940129401594018940189476894768947789477894782947829479094790947909479094793948399483994839948399483994849949099490994909949099490994909949099490994909949119492494937949379493794937949379493794937949379493794937949379493794937949379493794937949379493794937949379493794937949379493794937949379493794937949379493794937949379493794937949379493794937949379493794937949379493794937949379493794937949379493794937949379493794937949379493794937949379493794937949379493794937949379493794937949379493794937949379493794937949379493794937949379493794937949379493794937949389493894938949389493894938949389493894938949389493894938949389493894938949389493894938949389493894938949389493894938949389493894938949399493994939949399493994939949399493994939949399493994939949399493994939949399493994941949419494194941949429494294942949429494294942949439494494944949449494494958950719512395123951239512395123951239512395123951269512695127951279512795127951279512795128951299512995129951299512995922959269592695934959349593495934959379598395983959839598395983959939605696056960569605696056960569605696056960569605896073960869608696086960869608696086960869608696086960869608696086960869608696086960869608696086960869608696086960869608696086960869608696086960869608696086960869608696086960869608696086960869608696086960869608696086960869608696086960869608696086960869608696086960869608696086960869608696086960869608696086960869608696086960869608696086960869608696086960869608696086960869608696086960869608696086960869608796087960879608796087960879608796087960879608796087960879608796087960879608796087960879608796087960879608796087960879608796087960879608896088960889608896088960889608896088960889608896088960889608896088960889608896088960909609096090960909609196091960919609196091960919609296093960939609396202962549625496254962549625496254962549625496257962579625796257962589625896258962589625896258962599626096260962609626096264962649700497004970129701297012970129701597061970619706197061970619707197131971319713197131971319713197131971319713197133971469715997159971599715997159971599715997159971599715997159971599715997159971599715997159971599715997159971599715997159971599715997159971599715997159971599715997159971599715997159971599715997159971599715997159971599715997159971599715997159971599715997159971599715997159971599715997159971599715997159971599715997159971599715997159971599715997159971599715997159971599715997159971599715997159971599715997160971609716097160971609716097160971609716097160971609716097160971609716097160971609716097160971609716097160971609716097160971609716097161971619716197161971619716197161971619716197161971619716197161971619716197161971619716397163971639716397164971649716497164971649716497165971669716697166971669716797276973289732897328973289732897328973289732897331973319733297332973329733297332973329733397334973349733497334973349733497334973349733498116981169812698126981309813098138981389813898138981419818798187981879818798187981979826098260982609826098260982609826098260982609826298275982889828898288982889828898288982889828898288982889828898288982889828898288982889828898288982889828898288982889828898288982889828898288982889828898288982889828898288982889828898288982889828898288982889828898288982889828898288982889828898288982889828898288982889828898288982889828898288982889828898288982889828898288982889828898288982889828898288982889828898288982889828898288982889828898288982889828998289982899828998289982899828998289982899828998289982899828998289982899828998289982899828998289982899828998289982899828998289982899829098290982909829098290982909829098290982909829098290982909829098290982909829098290982929829298292982929829398293982939829398293982939829498295982959829598295982969840498456984569845698456984569845698456984569845998459984609846098460984609846098460984619846298462984629846298462984629856098561985619856198561985619856198561985619856198561985619856198561985619856198561985619856198561985619856198561985619856198561985619856198565985659856598565985659856598565985659856598565985659856598565985659856598565985659856598565985659856598565985659856598565985659856598565985659856598565985659856598565985659856598565985659856598565985659856598565985659856598565985659856598565985669856698566985669856698566985669856698566985669856698566985669856698566985669856698566985669856698566985669856698566985669856698566985669856698566985669856698566985669856698566985669856698566985669856698566985669856698566985669856698566985669856698566985669856698566985669856698566985669856698566985669856698566985669856698566985669856698566985679856798567985679856798567985679856798567985679856798567985679856798567985679856798567985679856798567985679856798567985679856798567985679856798567985679856798567985679856798567985679856798567985679856798567985679856798567985679856798567985679856798567985679856798567985679856798567985679856798567985679856798567985679856798567985679856798567985679856798567985679856798571985719857199374993749938499384993889938899396993969939699396993999944599445994459944599445994559951899518995189951899518995189951899518995189952099534995479954799547995479954799547995479954799547995479954799547995479954799547995479954799547995479954799547995479954799547995479954799547995479954799547995479954799547995479954799547995479954799547995479954799547995479954799547995479954799547995479954799547995479954799547995479954799547995479954799547995479954799547995479954799547995479954799547995479954799547995479954799547995479954799547995479954899548995489954899548995489954899548995489954899548995489954899548995489954899548995489954899548995489954899548995489954899548995489954999549995499954999549995499954999549995499954999549995499954999549995499954999549995519955199551995519955299552995529955299552995529955399554995549955499554995549966399715997159971599715997159971599715997159971899718997189971899719997199971999719997199971999720997219972199721997219983299884998849988499884998849988499884998849988799887998879988799888998889988899888998889988899889998909989099890100644100644100652100652100652100652100655100701100701100701100701100701100711100774100774100774100774100774100774100774100774100774100776100789100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100802100803100803100803100803100803100803100803100803100803100803100803100803100803100803100803100803100803100803100803100803100803100803100803100803100803100803100803100804100804100804100804100804100804100804100804100804100804100804100804100804100804100804100804100804100806100806100806100806100807100807100807100807100807100807100808100809100809100809100809100809100809100809100809100809100809100809100809100809100809100809100809100809100809100809100810100810100811100812100812100864100864100864100864100864100864100864100864100867100867100975100979100979100979100979100979100979100979100979100982101028101036101036101045101045101045101045101045101046101046101047101048101048101108101108101108101108101108101108101108101108101108101110101122101122101122101122101122101122101135101135101135101135101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101137101138101138101138101138101138101138101138101138101138101138101138101138101138101138101138101138101138101138101138101138101138101138101138101138101139101139101139101139101139101139101139101139101139101139101139101139101139101139101139101139101139101139101828101828101828101831102579102579102587102587102587102587102590102636102636102636102636102636102646102707102707102707102707102707102707102707102707102707102709102722102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102735102736102736102736102736102736102736102736102736102736102736102736102736102736102736102736102736102736102736102736102736102736102736102736102736102736102736102736102737102737102737102737102737102737102737102737102737102737102737102737102737102737102737102737102737102739102739102739102739102740102740102740102740102740102740102741102742102742102742102742102750102863102915102915102915102915102915102915102915102915102918102918102919102919102919102919102919102919102920102921102921102921102921102921102921102921102921103037103089103089103089103089103089103089103089103089103092103092103093103093103093103093103093103093103094103095103095103095103095103095103838103838103846103846103846103846103849103895103895103895103895103895103904103965103965103965103965103965103965103965103965103965103967103980103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103993103994103994103994103994103994103994103994103994103994103994103994103994103994103994103994103994103994103994103994103994103994103994103994103994103994103994103994103995103995103995103995103995103995103995103995103995103995103995103995103995103995103995103995103995103997103997103997103997103998103998103998103998103998103998103999104000104000104000104000104011104011104011104011104127104179104179104179104179104179104179104179104179104182104182104183104183104183104183104183104183104184104185104185104185104185104185104952104952104962104962104966104966104974104974104974104974104977105023105023105023105023105023105033105094105094105094105094105094105094105094105094105094105096105109105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105122105123105123105123105123105123105123105123105123105123105123105123105123105123105123105123105123105123105123105123105123105123105123105123105123105123105123105123105124105124105124105124105124105124105124105124105124105124105124105124105124105124105124105124105124105126105126105126105126105127105127105127105127105127105127105128105129105129105129105129105130105130105130105130105242105294105294105294105294105294105294105294105294105297105297105298105298105298105298105298105298105299105300105300105300105300105300106075106075106083106083106083106083106086106132106132106132106132106132106142106205106205106205106205106205106205106205106205106205106207106221106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106234106235106235106235106235106235106235106235106235106235106235106235106235106235106235106235106235106235106235106235106235106235106235106235106235106235106235106235106236106236106236106236106236106236106236106236106236106236106236106236106236106236106236106236106236106238106238106238106238106239106239106239106239106239106239106240106241106241106241106241106251106251106251106251106251106251106366106418106418106418106418106418106418106418106418106421106421106422106422106422106422106422106422106423106424106424106424106424106424107179107179107187107187107187107187107190107236107236107236107236107236107246107308107308107308107308107308107308107308107308107308107310107323107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107336107337107337107337107337107337107337107337107337107337107337107337107337107337107337107337107337107337107337107337107337107337107337107337107337107337107337107337107338107338107338107338107338107338107338107338107338107338107338107338107338107338107338107338107338107340107340107340107340107341107341107341107341107341107341107342107343107343107343107343107345107345107345107345107345107348107348107460107512107512107512107512107512107512107512107512107515107515107516107516107516107516107516107516107517107518107518107518108271108271108279108279108279108279108282108328108328108328108328108328108337108399108399108399108399108399108399108399108399108399108401108414108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108427108428108428108428108428108428108428108428108428108428108428108428108428108428108428108428108428108428108428108428108428108428108428108428108428108428108428108428108429108429108429108429108429108429108429108429108429108429108429108429108429108429108429108429108429108431108431108431108431108432108432108432108432108432108432108433108434108434108438108438108438108438108438108438109214109214109224109224109228109228109236109236109236109236109239109285109285109285109285109285109295109357109357109357109357109357109357109357109357109357109359109372109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109385109386109386109386109386109386109386109386109386109386109386109386109386109386109386109386109386109386109386109386109386109386109386109386109386109386109386109386109387109387109387109387109387109387109387109387109387109387109387109387109387109387109387109387109387109389109389109389109389109390109390109390109390109390109390109391109392109392109392109392109393109505109557109557109557109557109557109557109557109557109560109560109561109561109561109561109561109561109562109563109563109563109563109563109563109563109563110341110341110351110351110355110355110363110363110363110363110366110412110412110412110412110412110422110485110485110485110485110485110485110485110485110485110487110500110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110513110514110514110514110514110514110514110514110514110514110514110514110514110514110514110514110514110514110514110514110514110514110514110514110514110514110514110514110515110515110515110515110515110515110515110515110515110515110515110515110515110515110515110515110515110517110517110517110517110518110518110518110518110518110518110519110520110520110524110524110524110632110684110684110684110684110684110684110684110684110687110687110687110687110688110688110688110688110688110688110689110690110690110690110693110693110693110693110693110693111459111459111467111467111467111467111470111516111516111516111516111516111526111588111588111588111588111588111588111588111588111588111590111603111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111616111617111617111617111617111617111617111617111617111617111617111617111617111617111617111617111617111617111617111617111617111617111617111617111617111617111617111617111618111618111618111618111618111618111618111618111618111618111618111618111618111618111618111618111618111620111620111620111620111621111621111621111621111621111621111622111623111623111623111623111623111731111783111783111783111783111783111783111783111783111786111786111787111787111787111787111787111787111788111789111789111789111789111789111789111789111789111790111790111790111790111790111902111954111954111954111954111954111954111954111954111957111957111957111957111958111958111958111958111958111958111959111960111960111960112728112728112738112738112742112742112750112750112750112750112753112799112799112799112799112799112810112873112873112873112873112873112873112873112873112873112875112888112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112901112902112902112902112902112902112902112902112902112902112902112902112902112902112902112902112902112902112902112902112902112902112902112902112902112902112902112902112903112903112903112903112903112903112903112903112903112903112903112903112903112903112903112903112903112905112905112905112905112906112906112906112906112906112906112907112908112908112908112908112908112908112908112908112908112908112908113684113684113694113694113698113698113706113706113706113706113709113755113755113755113755113755113765113827113827113827113827113827113827113827113827113827113829113842113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113855113856113856113856113856113856113856113856113856113856113856113856113856113856113856113856113856113856113856113856113856113856113856113856113856113856113856113856113857113857113857113857113857113857113857113857113857113857113857113857113857113857113857113857113857113859113859113859113859113860113860113860113860113860113860113861113862113862113863113863113863113863113863113975114027114027114027114027114027114027114027114027114030114030114031114031114031114031114031114031114032114033114033114033114033114040114041114041114041114158114210114210114210114210114210114210114210114210114213114213114214114214114214114214114214114214114215114216114216114216114216114216114972114972114980114980114980114980114983115029115029115029115029115029115038115100115100115100115100115100115100115100115100115100115102115115115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115128115129115129115129115129115129115129115129115129115129115129115129115129115129115129115129115129115129115129115129115129115129115129115129115129115129115129115129115130115130115130115130115130115130115130115130115130115130115130115130115130115130115130115130115130115132115132115132115132115133115133115133115133115133115133115134115135115135115135115135115136115136115136115136115248115300115300115300115300115300115300115300115300115303115303115303115303115304115304115304115304115304115304115305115306115306115306116096116096116106116106116110116110116118116118116118116118116121116167116167116167116167116167116177116240116240116240116240116240116240116240116240116240116242116256116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116269116270116270116270116270116270116270116270116270116270116270116270116270116270116270116270116270116270116270116270116270116270116270116270116270116270116270116270116271116271116271116271116271116271116271116271116271116271116271116271116271116271116271116271116271116273116273116273116273116274116274116274116274116274116274116275116276116276116276116276116276116276116276116276116277116277116277116277116277116277116277116277116277116277116277116278116278116279116280116280116331116331116331116331116331116331116331116331116331116331116331116334116334116334116334116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116336116337116337116337116337116337116337116337116337116337116337116337116337116337116337116337116337116337116337116337116337116337116337116337116337116337116337116337116337116337116337116337116337116337116337116337116337116337116337116337116337116337116337116427116427116427116437116437116437116441116441116441116441116441116441116441116441116444116490116498116498116507116507116507116507116507116508116508116509116510116510116566116566116566116566116566116566116566116566116566116568116580116580116580116580116580116580116593116593116593116593116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116595116596116596116596116596116596116596116596116596116596116596116596116596116596116596116596116596116596116596116596116596116596116596116596116596116596116596116596116596116596116596116596116596116596116596116596116596116596116596116596116596116596116596117107117141117144117256117308117308117308117308117308117308117308117308117311117311117311117311117312117312117312117312117312117312117313117314117314117314117858117972117972117972117972117972117972117972118097118116118116118126118126118130118130118138118138118138118138118141118187118187118187118187118187118197118260118262118276118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118289118290118290118290118290118290118290118290118290118290118290118290118290118290118290118290118290118290118290118290118290118290118290118290118290118290118290118290118291118291118291118291118291118291118291118291118291118291118291118291118291118291118291118291118291118293118293118293118293118294118294118294118294118294118294118295118296118296118296118296118304118304118304118304118304118304118304118304118304118304118304118304118304118304118304118304118416118468118468118468118468118468118468118468118468118471118471118472118472118472118472118472118472118473118474118474118474118474118474119277119296119296119306119306119310119310119318119318119318119318119321119367119367119367119367119367119377119440119440119440119440119440119440119440119440119440119442119457119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119470119471119471119471119471119471119471119471119471119471119471119471119471119471119471119471119471119471119471119471119471119471119471119471119471119471119471119471119472119472119472119472119472119472119472119472119472119472119472119472119472119472119472119472119472119474119474119474119474119474119474119475119475119475119475119475119475119476119477119477119477119477119477119477119477119477119477119477119477119477119477119477119477119478119478119478119478119478119478119478119478119478119479119479119480119481119481119533119533119533119533119533119533119533119533119536119536119644119644119644119644119663119663119673119677119677119677119677119677119677119677119677119680119726119734119734119743119743119743119743119743119744119744119745119746119746119806119806119806119806119806119806119806119806119806119808119821119821119821119821119821119821119834119834119834119834119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119836119837119837119837119837119837119837119837119837119837119837119837119837119837119837119837119837119837119837119837119837119837119837119837119837119838119838119838119838119838119838119838119838119838119838119838119838119838119838119838119838119838119838120519120522120522
File scan done, we have: 120522 files to analize
Suspicious behavior found in: nagad-helper.php-
Full path:
db555/m/nagad-helper.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:46 12/12/2025
Last modified:
01:42:03 05/09/2024
MD5 hash:
2bb70c44d68202e0a0cd8ae1388f0b1b
Filesize:
6.74 KB
suspicious functions used:
curl_exec (line:61);base64_decode (line:97); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tagreeexpayment.php-
Full path:
db555/m/tagreeexpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:46 12/12/2025
Last modified:
01:42:04 05/09/2024
MD5 hash:
c95e3ee881752db67b4f3597bc58430a
Filesize:
2.46 KB
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
db555/m/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:47 12/12/2025
Last modified:
01:42:04 05/09/2024
MD5 hash:
7d8e71ceda3ffb74623e0c4a814715af
Filesize:
1.53 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: support-action.php-
Full path:
db555/m/support-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:47 12/12/2025
Last modified:
01:42:04 05/09/2024
MD5 hash:
2fc6fd844db911a5502a7a6ae383990f
Filesize:
10.31 KB
suspicious functions used:
curl_exec (line:99); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
db555/m/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:47 12/12/2025
Last modified:
01:42:03 05/09/2024
MD5 hash:
849185f307be30eafb1bbef93616d8c3
Filesize:
1.71 KB
suspicious functions used:
curl_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreateagree.php-
Full path:
db555/m/tcreateagree.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:47 12/12/2025
Last modified:
01:42:04 05/09/2024
MD5 hash:
27a10adf4190edc7eceee8cf74a6b72b
Filesize:
999 B
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
db555/m/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:47 12/12/2025
Last modified:
01:42:03 05/09/2024
MD5 hash:
9a3f22521ad987e86f84c4f5f688d5b7
Filesize:
713 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index.php-
Full path:
db555/m/index.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:47 12/12/2025
Last modified:
01:42:03 05/09/2024
MD5 hash:
9a5dc16d9d603e4fe488b2349f6197a3
Filesize:
12.47 KB
suspicious functions used:
base64_decode (line:10);curl_exec (line:183); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery.php-
Full path:
db555/m/PaymentOnlineQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:47 12/12/2025
Last modified:
01:42:03 05/09/2024
MD5 hash:
c7aca21e5a61ded371d4b853710cf4b4
Filesize:
21.14 KB
suspicious functions used:
curl_exec (line:287);curl_exec (line:512); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery2.php-
Full path:
db555/m/PaymentOnlineQuery2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:47 12/12/2025
Last modified:
01:42:03 05/09/2024
MD5 hash:
37be1b3f51cac8d936abe043bc79ed4b
Filesize:
19.08 KB
suspicious functions used:
curl_exec (line:41);curl_exec (line:254); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreatepayment.php-
Full path:
db555/m/tcreatepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:48 12/12/2025
Last modified:
01:42:04 05/09/2024
MD5 hash:
e49de9a33f5164bc2c6b88e4770faaff
Filesize:
1.07 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec.php-
Full path:
db555/m/login_exec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:48 12/12/2025
Last modified:
01:42:03 05/09/2024
MD5 hash:
1f800365ef270564df77d30c1bfd7ed3
Filesize:
5.4 KB
suspicious functions used:
curl_exec (line:66); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec1.php-
Full path:
db555/m/login_exec1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:48 12/12/2025
Last modified:
01:42:03 05/09/2024
MD5 hash:
46b08782f51ba75b23e27183e06370fe
Filesize:
4.28 KB
suspicious functions used:
curl_exec (line:61); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ttoken.php-
Full path:
db555/m/ttoken.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:48 12/12/2025
Last modified:
01:42:04 05/09/2024
MD5 hash:
5f2c51c1db5b0defadfb67ce25c0098f
Filesize:
1.54 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-merchant-callback.php-
Full path:
db555/m/nagad-merchant-callback.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:48 12/12/2025
Last modified:
01:42:03 05/09/2024
MD5 hash:
1ca42269a7e5563f13a266d9c0ce5049
Filesize:
11.75 KB
suspicious functions used:
curl_exec (line:20); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: texecutepayment.php-
Full path:
db555/m/texecutepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:48 12/12/2025
Last modified:
01:42:04 05/09/2024
MD5 hash:
efbb63dfcfdacb52dec74bffc389bbb3
Filesize:
2.67 KB
suspicious functions used:
curl_exec (line:24); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-snmp-data.php-
Full path:
db555/m/netowrk-snmp-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:48 12/12/2025
Last modified:
01:42:03 05/09/2024
MD5 hash:
b56429056656f0de16982e31853f3304
Filesize:
20.26 KB
suspicious functions used:
shell_exec (line:93);shell_exec (line:102);shell_exec (line:112);shell_exec (line:131);shell_exec (line:141);shell_exec (line:157);shell_exec (line:177);shell_exec (line:187);shell_exec (line:192);shell_exec (line:200);shell_exec (line:220);shell_exec (line:236);`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:249);shell_exec (line:255);shell_exec (line:377); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: billpaycheck.php-
Full path:
db555/web/bkash/billpaycheck.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:48 12/12/2025
Last modified:
01:42:14 05/09/2024
MD5 hash:
38c46efc36b25628fa18bd92ae135af9
Filesize:
796 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
db555/web/bkash/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:48 12/12/2025
Last modified:
01:42:14 05/09/2024
MD5 hash:
6175301f744b22b7db70ba598a991f8b
Filesize:
1.64 KB
suspicious functions used:
curl_exec (line:36); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
db555/web/bkash/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:48 12/12/2025
Last modified:
01:42:14 05/09/2024
MD5 hash:
19be365d26141eaecead7ef0ada0e75c
Filesize:
1.3 KB
suspicious functions used:
curl_exec (line:31); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: grant.php-
Full path:
db555/web/bkash/grant.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:48 12/12/2025
Last modified:
01:42:14 05/09/2024
MD5 hash:
da5499d260dc78ea4fcd71227cc6c484
Filesize:
2.01 KB
suspicious functions used:
curl_exec (line:41);curl_exec (line:63); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: query.php-
Full path:
db555/web/bkash/query.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:48 12/12/2025
Last modified:
01:42:14 05/09/2024
MD5 hash:
f3ed9045f3a073e2cdc8561d500bda89
Filesize:
1.65 KB
suspicious functions used:
curl_exec (line:33); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tagreeexpayment.php-
Full path:
db555/web/bkash/tagreeexpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:48 12/12/2025
Last modified:
01:42:15 05/09/2024
MD5 hash:
a1ba7d36003f72e593615aa32e44acb9
Filesize:
1.58 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreateagree.php-
Full path:
db555/web/bkash/tcreateagree.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:48 12/12/2025
Last modified:
01:42:15 05/09/2024
MD5 hash:
8ae6bdc9f3d4b0cdcf651701a0d9ebab
Filesize:
1.2 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreatepayment.php-
Full path:
db555/web/bkash/tcreatepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:48 12/12/2025
Last modified:
01:42:15 05/09/2024
MD5 hash:
3c978def6cffa0a8db5e86ce127caae6
Filesize:
1.35 KB
suspicious functions used:
curl_exec (line:29); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: texecutepayment.php-
Full path:
db555/web/bkash/texecutepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:48 12/12/2025
Last modified:
01:42:15 05/09/2024
MD5 hash:
d8f24df64623da3cfc2baf48f184a3d1
Filesize:
1.21 KB
suspicious functions used:
curl_exec (line:25); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
db555/web/bkash/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:48 12/12/2025
Last modified:
01:42:15 05/09/2024
MD5 hash:
f50b33eeb31927b2c081195618d48b8d
Filesize:
1.88 KB
suspicious functions used:
curl_exec (line:48); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tokent.php-
Full path:
db555/web/bkash/tokent.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:48 12/12/2025
Last modified:
01:42:15 05/09/2024
MD5 hash:
890a9e9fb1be75f31a6daad8811c1ff9
Filesize:
1.9 KB
suspicious functions used:
curl_exec (line:48); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: trxID.php-
Full path:
db555/web/bkash/trxID.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:48 12/12/2025
Last modified:
01:42:15 05/09/2024
MD5 hash:
9bcb8e70728fd25807c4db8916166d74
Filesize:
1.44 KB
suspicious functions used:
curl_exec (line:31); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
db555/web/bkasht/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:48 12/12/2025
Last modified:
01:42:15 05/09/2024
MD5 hash:
a4ba6e7683f558dc3602dacd7ddeded2
Filesize:
1.36 KB
suspicious functions used:
curl_exec (line:29); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
db555/web/bkasht/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:48 12/12/2025
Last modified:
01:42:15 05/09/2024
MD5 hash:
aad462fbca9f9a36649a197d67403098
Filesize:
1.27 KB
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: grant.php-
Full path:
db555/web/bkasht/grant.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:48 12/12/2025
Last modified:
01:42:15 05/09/2024
MD5 hash:
da5499d260dc78ea4fcd71227cc6c484
Filesize:
2.01 KB
suspicious functions used:
curl_exec (line:41);curl_exec (line:63); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: query.php-
Full path:
db555/web/bkasht/query.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:48 12/12/2025
Last modified:
01:42:15 05/09/2024
MD5 hash:
f3ed9045f3a073e2cdc8561d500bda89
Filesize:
1.65 KB
suspicious functions used:
curl_exec (line:33); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
db555/web/bkasht/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:48 12/12/2025
Last modified:
01:42:15 05/09/2024
MD5 hash:
f50b33eeb31927b2c081195618d48b8d
Filesize:
1.88 KB
suspicious functions used:
curl_exec (line:48); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: trxID.php-
Full path:
db555/web/bkasht/trxID.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:48 12/12/2025
Last modified:
01:42:15 05/09/2024
MD5 hash:
9bcb8e70728fd25807c4db8916166d74
Filesize:
1.44 KB
suspicious functions used:
curl_exec (line:31); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: class.phpmailer.php-
Full path:
db555/web/email/class.phpmailer.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:48 12/12/2025
Last modified:
01:42:15 05/09/2024
MD5 hash:
68468d69b47fffecc89df57e27c5a781
Filesize:
143.32 KB
suspicious functions used:
`$DKIM_private` (line:428);popen (line:1387);popen (line:1408);base64_decode (line:3410);`$mail->set('SMTPSecure', 'tls');` (line:3688);`$mail->SMTPSecure = 'tls';` (line:3690); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: class.smtp.php-
Full path:
db555/web/email/class.smtp.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:48 12/12/2025
Last modified:
01:42:16 05/09/2024
MD5 hash:
aa8478329268e5438a4469c268337a10
Filesize:
41.44 KB
suspicious functions used:
base64_decode (line:513);base64_decode (line:533); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: JSON.php-
Full path:
db555/web/inc/JSON.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:49 12/12/2025
Last modified:
01:42:21 05/09/2024
MD5 hash:
f5a34509e06231308becbe320ade9ff6
Filesize:
33.22 KB
suspicious functions used:
eval (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: jqgrid.php-
Full path:
db555/web/inc/jqgrid.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:49 12/12/2025
Last modified:
01:42:21 05/09/2024
MD5 hash:
71027a29e71e0626d8b57cbb631e6d98
Filesize:
23.92 KB
suspicious functions used:
eval (line:397); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: smsapicore.php-
Full path:
db555/web/include/smsapicore.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:49 12/12/2025
Last modified:
02:03:47 05/09/2024
MD5 hash:
1f580215986ab61cb0d47e79a1a2b457
Filesize:
1.16 KB
suspicious functions used:
curl_exec (line:36); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: telegramapicore.php-
Full path:
db555/web/include/telegramapicore.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:49 12/12/2025
Last modified:
01:42:22 05/09/2024
MD5 hash:
535fa7aac83b0e1ba56be7837348b6d9
Filesize:
2.9 KB
suspicious functions used:
curl_exec (line:63); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Changes.txt-
Full path:
db555/web/js/jqgrid/js/Changes.txt
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:49 12/12/2025
Last modified:
01:42:28 05/09/2024
MD5 hash:
c0a4adbc3f1c6d592cb4fa8433fee9ea
Filesize:
44.32 KB
suspicious functions used:
system (line:87); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ui.php-
Full path:
db555/web/js/tinymce/themes/advanced/skins/highcontrast/ui.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:49 12/12/2025
Last modified:
01:42:32 05/09/2024
MD5 hash:
3edaf67be8573b86686f46bbba4f058c
Filesize:
4.53 KB
suspicious functions used:
curl_exec (line:20);`bill_amount` = '0.00' WHERE bill_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY ` (line:53);`bill_amount` = '0.00', days = '0.00' WHERE entry_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY ` (line:54);`payment` WHERE `pay_date` < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND pay_amount != '0.00' ORDER BY ` (line:55);curl_exec (line:146);curl_exec (line:168); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: AutoActiveClientsCount1.php-
Full path:
db555/web/AutoActiveClientsCount1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:50 12/12/2025
Last modified:
01:42:08 05/09/2024
MD5 hash:
fb443f2f93781a8fffce803317592c41
Filesize:
6.12 KB
suspicious functions used:
system (line:56); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: AutoActiveClientsCount11.php-
Full path:
db555/web/AutoActiveClientsCount11.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:50 12/12/2025
Last modified:
01:42:08 05/09/2024
MD5 hash:
a0090e4a11dd59b955a6edd549b6ef2f
Filesize:
5.85 KB
suspicious functions used:
system (line:54); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ClientsOnMap.php-
Full path:
db555/web/ClientsOnMap.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:50 12/12/2025
Last modified:
06:02:59 10/11/2025
MD5 hash:
d43635c1bb2f7953c0a9d51d744957a5
Filesize:
12.25 KB
suspicious functions used:
`${totalonline}` (line:97);`${totaloffline}` (line:98);`${results.rxPower}` (line:233);`${results.distance}` (line:234);`${results.supplyVoltage}` (line:235);`${results.temperature}` (line:236);`${results.txPower}` (line:237); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients.php-
Full path:
db555/web/Clients.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:51 12/12/2025
Last modified:
01:42:09 05/09/2024
MD5 hash:
42540e032b92be9d4484a9f9f78dd610
Filesize:
175.25 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:832); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients2.php-
Full path:
db555/web/Clients2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:52 12/12/2025
Last modified:
01:42:09 05/09/2024
MD5 hash:
4d7acc879510998b2909318d8638d804
Filesize:
168.05 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:816); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients3.php-
Full path:
db555/web/Clients3.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:52 12/12/2025
Last modified:
01:42:09 05/09/2024
MD5 hash:
7b4a7d07d9658aa7c159cd59ebae283a
Filesize:
175.3 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:832); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: InstrumentsStoreOutDetails.php-
Full path:
db555/web/InstrumentsStoreOutDetails.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:53 12/12/2025
Last modified:
01:42:10 05/09/2024
MD5 hash:
ab68ab13bcfd51da15e72a3d4e9817e8
Filesize:
9.37 KB
suspicious functions used:
`update_date`, '%D-%b, %y') AS offdate, TIME_FORMAT(`update_time`, '%T') AS offtime FROM `con_sts_log` WHERE `c_id` = '{$row['c_id']}' AND con_sts = 'Inactive' ORDER BY ` (line:120); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkLoad.php-
Full path:
db555/web/NetworkLoad.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:54 12/12/2025
Last modified:
01:42:12 05/09/2024
MD5 hash:
e1632e66ee1b7394d3fb82751b924abe
Filesize:
2.83 KB
suspicious functions used:
system (line:81); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Network.php-
Full path:
db555/web/Network.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:54 12/12/2025
Last modified:
14:50:55 25/09/2024
MD5 hash:
450c41be5bee69bf5f756f28873f0cf7
Filesize:
55.23 KB
suspicious functions used:
system (line:358);shell_exec (line:654); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Network1.php-
Full path:
db555/web/Network1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:54 12/12/2025
Last modified:
01:42:12 05/09/2024
MD5 hash:
95f9922e23cb36ebd65d603a48d22c4b
Filesize:
44.04 KB
suspicious functions used:
system (line:295);shell_exec (line:590); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMSAddSave.php-
Full path:
db555/web/SMSAddSave.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:54 12/12/2025
Last modified:
02:04:19 05/09/2024
MD5 hash:
d7944d313bfd78b30995671c17fea533
Filesize:
1.76 KB
suspicious functions used:
curl_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMS1.php-
Full path:
db555/web/SMS1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:54 12/12/2025
Last modified:
01:42:13 05/09/2024
MD5 hash:
40d55bbcfe09846560034ad6b6748670
Filesize:
32.19 KB
suspicious functions used:
curl_exec (line:59); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkLoad1.php-
Full path:
db555/web/NetworkLoad1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:54 12/12/2025
Last modified:
01:42:12 05/09/2024
MD5 hash:
176bd6931be34d7ef351d22897accc65
Filesize:
759 B
suspicious functions used:
system (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltAddQuery.php-
Full path:
db555/web/NetworkOltAddQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:54 12/12/2025
Last modified:
01:42:12 05/09/2024
MD5 hash:
b14dd824d3ac47473bc0311a79d451fb
Filesize:
6.33 KB
suspicious functions used:
shell_exec (line:21); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltOnuStatus.php-
Full path:
db555/web/NetworkOltOnuStatus.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:54 12/12/2025
Last modified:
01:42:12 05/09/2024
MD5 hash:
af4bfcb571c821970ba15de0a72c118d
Filesize:
45.04 KB
suspicious functions used:
shell_exec (line:41);shell_exec (line:337);shell_exec (line:452);shell_exec (line:565); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltOnuStatus2.php-
Full path:
db555/web/NetworkOltOnuStatus2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:54 12/12/2025
Last modified:
01:42:12 05/09/2024
MD5 hash:
f112b225c20188bc03c92e63dac90efa
Filesize:
15.88 KB
suspicious functions used:
shell_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery.php-
Full path:
db555/web/PaymentOnlineQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:54 12/12/2025
Last modified:
01:42:12 05/09/2024
MD5 hash:
e71855333c2ea0c43f2a87109898c283
Filesize:
28.5 KB
suspicious functions used:
curl_exec (line:456);curl_exec (line:688); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMS.php-
Full path:
db555/web/SMS.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:54 12/12/2025
Last modified:
02:10:36 05/09/2024
MD5 hash:
990048cb34dc753e8878c1ac208df9e2
Filesize:
35.71 KB
suspicious functions used:
curl_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery2.php-
Full path:
db555/web/PaymentOnlineQuery2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:54 12/12/2025
Last modified:
01:42:12 05/09/2024
MD5 hash:
700d8182abbbc0b80fe31beb1e717699
Filesize:
19.39 KB
suspicious functions used:
curl_exec (line:42);curl_exec (line:252); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentWebhook.php-
Full path:
db555/web/PaymentWebhook.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:55 12/12/2025
Last modified:
01:42:12 05/09/2024
MD5 hash:
a2f322c94787630ab1e0c8ca35fc5ba1
Filesize:
18.6 KB
suspicious functions used:
base64_decode (line:30);curl_exec (line:41);curl_exec (line:422); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeMap.php-
Full path:
db555/web/NetworkTreeMap.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:55 12/12/2025
Last modified:
01:42:12 05/09/2024
MD5 hash:
a40d6787a72f97303b8bfcad318b0f4f
Filesize:
22.12 KB
suspicious functions used:
`${results.rxPower}` (line:230);`${results.distance}` (line:231);`${results.supplyVoltage}` (line:232);`${results.temperature}` (line:233);`${results.txPower}` (line:234); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeMap1.php-
Full path:
db555/web/NetworkTreeMap1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:55 12/12/2025
Last modified:
01:42:12 05/09/2024
MD5 hash:
3483a4b939ab44a513c3614c31444179
Filesize:
10.57 KB
suspicious functions used:
`${totalonline}` (line:97);`${totaloffline}` (line:98); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SignUp1.php-
Full path:
db555/web/SignUp1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:56 12/12/2025
Last modified:
01:42:13 05/09/2024
MD5 hash:
3f7943dd155c8e0a383b7d02730f8c11
Filesize:
24.59 KB
suspicious functions used:
curl_exec (line:33);curl_exec (line:59); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_gen_bill.php-
Full path:
db555/web/cron_auto_gen_bill.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:57 12/12/2025
Last modified:
01:42:09 05/09/2024
MD5 hash:
f1056618cc4402968e50d1232d2c51c8
Filesize:
4.73 KB
suspicious functions used:
curl_exec (line:140);curl_exec (line:149); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: client-online-mbb.php-
Full path:
db555/web/client-online-mbb.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:57 12/12/2025
Last modified:
01:42:09 05/09/2024
MD5 hash:
69c51efb5b9017a07a7158b4a63f3826
Filesize:
14.32 KB
suspicious functions used:
curl_exec (line:90); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: clients-nots-action.php-
Full path:
db555/web/clients-nots-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:57 12/12/2025
Last modified:
01:42:09 05/09/2024
MD5 hash:
dff1bb495509427d098cb4588da553b9
Filesize:
5.89 KB
suspicious functions used:
curl_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: company_info.php-
Full path:
db555/web/company_info.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:57 12/12/2025
Last modified:
01:42:09 05/09/2024
MD5 hash:
e612d58aa2e38f5b49ba37c1bf620ece
Filesize:
8.38 KB
suspicious functions used:
curl_exec (line:130); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
db555/web/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:57 12/12/2025
Last modified:
01:42:09 05/09/2024
MD5 hash:
ba9747d0421fd091b998389469e72a0b
Filesize:
1.7 KB
suspicious functions used:
curl_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_all.php-
Full path:
db555/web/cron_all.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:57 12/12/2025
Last modified:
01:42:09 05/09/2024
MD5 hash:
b19a08fef36584598cca299b7ecc5e6d
Filesize:
2.07 KB
suspicious functions used:
curl_exec (line:23);curl_exec (line:38);curl_exec (line:53); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ip-ping-checker.php-
Full path:
db555/web/ip-ping-checker.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:57 12/12/2025
Last modified:
01:42:10 05/09/2024
MD5 hash:
0d28f3053b73b3fe2885cf519ee17c12
Filesize:
2.64 KB
suspicious functions used:
curl_exec (line:81); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive.php-
Full path:
db555/web/cron_auto_inactive.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:57 12/12/2025
Last modified:
01:42:10 05/09/2024
MD5 hash:
7e0dc4dd9dae2bf0220516641b53c027
Filesize:
5.43 KB
suspicious functions used:
curl_exec (line:142); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive2.php-
Full path:
db555/web/cron_auto_inactive2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:57 12/12/2025
Last modified:
01:42:10 05/09/2024
MD5 hash:
440bc24f05b01eb395df63fff2f60de9
Filesize:
5.46 KB
suspicious functions used:
curl_exec (line:142); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index.php-
Full path:
db555/web/index.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:57 12/12/2025
Last modified:
01:42:10 05/09/2024
MD5 hash:
f161ab23adf4527023a0ad582d478f89
Filesize:
12.45 KB
suspicious functions used:
base64_decode (line:10);curl_exec (line:183); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive_termination.php-
Full path:
db555/web/cron_auto_inactive_termination.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:57 12/12/2025
Last modified:
12:17:54 23/09/2024
MD5 hash:
9f9c8ca9110c2304128646824bfb17db
Filesize:
12.16 KB
suspicious functions used:
curl_exec (line:241);curl_exec (line:253); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive_termination1.php-
Full path:
db555/web/cron_auto_inactive_termination1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:57 12/12/2025
Last modified:
01:42:10 05/09/2024
MD5 hash:
be76b964c93a2cb4fa7e632750ff3bc4
Filesize:
6.64 KB
suspicious functions used:
curl_exec (line:156);curl_exec (line:168); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_termination_remainder1.php-
Full path:
db555/web/cron_auto_termination_remainder1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:57 12/12/2025
Last modified:
01:42:10 05/09/2024
MD5 hash:
7765f9f820dbd402f1064fab9958ffaa
Filesize:
3.26 KB
suspicious functions used:
curl_exec (line:83); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_client_bandwidth_count.php-
Full path:
db555/web/cron_client_bandwidth_count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:57 12/12/2025
Last modified:
01:42:10 05/09/2024
MD5 hash:
8be5ba5d539d73a8f197195f7748e1cc
Filesize:
4.7 KB
suspicious functions used:
curl_exec (line:125); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test7.php-
Full path:
db555/web/test7.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:57 12/12/2025
Last modified:
01:42:14 05/09/2024
MD5 hash:
374d68487e54a5d4368699a202ae5a92
Filesize:
890 B
suspicious functions used:
shell_exec (line:4);shell_exec (line:10); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: texecutepayment.php-
Full path:
db555/web/texecutepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:57 12/12/2025
Last modified:
01:42:14 05/09/2024
MD5 hash:
623635fdf5c871391d3a5fe99ee8c543
Filesize:
2.91 KB
suspicious functions used:
curl_exec (line:24); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_network.php-
Full path:
db555/web/cron_network.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:57 12/12/2025
Last modified:
01:42:10 05/09/2024
MD5 hash:
1a75ea6c2e0cc5b9263541dda62ab458
Filesize:
4.61 KB
suspicious functions used:
curl_exec (line:45);curl_exec (line:67); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_olt.php-
Full path:
db555/web/cron_olt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:57 12/12/2025
Last modified:
06:32:45 09/09/2024
MD5 hash:
d83092bb263aaa93da2bb8cddab2a0d1
Filesize:
3.7 KB
suspicious functions used:
shell_exec (line:44); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_olt_user.php-
Full path:
db555/web/cron_olt_user.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:57 12/12/2025
Last modified:
06:32:45 09/09/2024
MD5 hash:
67aa237639e3d1e6064e76079bb3cccc
Filesize:
1.97 KB
suspicious functions used:
curl_exec (line:19);curl_exec (line:46); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tis-news.php-
Full path:
db555/web/tis-news.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:57 12/12/2025
Last modified:
01:42:14 05/09/2024
MD5 hash:
ed23ca98b77c5321b4485e85eb2ea64d
Filesize:
3.67 KB
suspicious functions used:
curl_exec (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test6.php-
Full path:
db555/web/test6.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:57 12/12/2025
Last modified:
01:42:14 05/09/2024
MD5 hash:
0edc703b008a5e3cae5d241fc2cf717b
Filesize:
4.76 KB
suspicious functions used:
shell_exec (line:46);shell_exec (line:70);shell_exec (line:92); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec.php-
Full path:
db555/web/login_exec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:57 12/12/2025
Last modified:
01:42:11 05/09/2024
MD5 hash:
9038a77a32a5db2c9affae1496473f3e
Filesize:
5.27 KB
suspicious functions used:
curl_exec (line:62); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
db555/web/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:57 12/12/2025
Last modified:
01:42:14 05/09/2024
MD5 hash:
7d8e71ceda3ffb74623e0c4a814715af
Filesize:
1.53 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: loginexec.php-
Full path:
db555/web/loginexec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:57 12/12/2025
Last modified:
01:42:11 05/09/2024
MD5 hash:
edb8017e7d0f8e037facbcacc94a383d
Filesize:
5.91 KB
suspicious functions used:
curl_exec (line:67); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: emp_salary_advence_find.php-
Full path:
db555/web/emp_salary_advence_find.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:57 12/12/2025
Last modified:
01:42:10 05/09/2024
MD5 hash:
74a7e2ffda0f7584611d7cbce6136c24
Filesize:
2.25 KB
suspicious functions used:
`expanse` WHERE `type` = '2' AND `status` = '2' AND ex_by = '$e_id' AND MONTH(`, `) = MONTH('$lastmonth') AND YEAR(`, `) = YEAR('$lastmonth') GROUP BY ` (line:8);`e_id` = '$e_id' AND ` (line:12); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tt.php-
Full path:
db555/web/tt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:57 12/12/2025
Last modified:
01:42:14 05/09/2024
MD5 hash:
9c4ed141cb79fdc7e807b35923c91a20
Filesize:
1.56 KB
suspicious functions used:
curl_exec (line:30); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ttoken.php-
Full path:
db555/web/ttoken.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:57 12/12/2025
Last modified:
01:42:14 05/09/2024
MD5 hash:
5f2c51c1db5b0defadfb67ce25c0098f
Filesize:
1.54 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
db555/web/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:57 12/12/2025
Last modified:
01:42:10 05/09/2024
MD5 hash:
c46a50905333286f45dfeacf010851ab
Filesize:
716 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook_cid.php-
Full path:
db555/web/webhook_cid.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:57 12/12/2025
Last modified:
01:42:14 05/09/2024
MD5 hash:
007f8fa5636da9e44a38526298f7e155
Filesize:
21.08 KB
suspicious functions used:
base64_decode (line:28);curl_exec (line:39);curl_exec (line:429); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook_off.php-
Full path:
db555/web/webhook_off.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:57 12/12/2025
Last modified:
01:42:14 05/09/2024
MD5 hash:
787511edcbdc9d6c9b26eba2dee70a84
Filesize:
21.21 KB
suspicious functions used:
base64_decode (line:27);curl_exec (line:38);curl_exec (line:454); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook_test.php-
Full path:
db555/web/webhook_test.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:57 12/12/2025
Last modified:
01:42:14 05/09/2024
MD5 hash:
74a7dcc262d7fe7f2bdc9e0595d03837
Filesize:
4.69 KB
suspicious functions used:
base64_decode (line:22);curl_exec (line:33);curl_exec (line:86);curl_exec (line:107); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: getclientuptime.php-
Full path:
db555/web/getclientuptime.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:58 12/12/2025
Last modified:
01:42:10 05/09/2024
MD5 hash:
bbc14cdd451c72b94d78c7d2d1af0b52
Filesize:
718 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: imagevwr.php-
Full path:
db555/web/imagevwr.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:58 12/12/2025
Last modified:
01:42:10 05/09/2024
MD5 hash:
47a223a13cc642d01dcfaaca542d396d
Filesize:
915 B
suspicious functions used:
curl_exec (line:15); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data1.php-
Full path:
db555/web/network-snmp-onu-status-data1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:58 12/12/2025
Last modified:
01:42:11 05/09/2024
MD5 hash:
dfc6e23448be165d8c7879ecdac3f737
Filesize:
14.88 KB
suspicious functions used:
shell_exec (line:119);shell_exec (line:135);shell_exec (line:151);shell_exec (line:157);shell_exec (line:346); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: sms_deliverey_report.php-
Full path:
db555/web/sms_deliverey_report.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:58 12/12/2025
Last modified:
01:42:13 05/09/2024
MD5 hash:
03623943da7e9334e137b38c8577fc84
Filesize:
4.25 KB
suspicious functions used:
curl_exec (line:28);curl_exec (line:53);curl_exec (line:90); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test3.php-
Full path:
db555/web/test3.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:58 12/12/2025
Last modified:
01:42:14 05/09/2024
MD5 hash:
47feeaa9a827160ac4e6faff04aa57cd
Filesize:
3.95 KB
suspicious functions used:
shell_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tagreeexpayment.php-
Full path:
db555/web/tagreeexpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:58 12/12/2025
Last modified:
01:42:14 05/09/2024
MD5 hash:
029b4fba649a75c7c81d2f8931be8d63
Filesize:
2.86 KB
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreateagree.php-
Full path:
db555/web/tcreateagree.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:58 12/12/2025
Last modified:
01:42:14 05/09/2024
MD5 hash:
27a10adf4190edc7eceee8cf74a6b72b
Filesize:
999 B
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: support-action.php-
Full path:
db555/web/support-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:58 12/12/2025
Last modified:
01:42:13 05/09/2024
MD5 hash:
c678659a705dae2c6d52289b0084a693
Filesize:
14.72 KB
suspicious functions used:
curl_exec (line:221); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-helper.php-
Full path:
db555/web/nagad-helper.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:58 12/12/2025
Last modified:
01:42:11 05/09/2024
MD5 hash:
2bb70c44d68202e0a0cd8ae1388f0b1b
Filesize:
6.74 KB
suspicious functions used:
curl_exec (line:61);base64_decode (line:97); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-merchant-callback.php-
Full path:
db555/web/nagad-merchant-callback.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:58 12/12/2025
Last modified:
01:42:11 05/09/2024
MD5 hash:
9e7ba60bacff8c3a7792176f76b698ea
Filesize:
16.91 KB
suspicious functions used:
curl_exec (line:20); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-snmp-data.php-
Full path:
db555/web/netowrk-snmp-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:58 12/12/2025
Last modified:
01:42:11 05/09/2024
MD5 hash:
e09a072d71693f9e7767738221e9b755
Filesize:
20.33 KB
suspicious functions used:
shell_exec (line:93);shell_exec (line:102);shell_exec (line:112);shell_exec (line:131);shell_exec (line:141);shell_exec (line:157);shell_exec (line:177);shell_exec (line:187);shell_exec (line:192);shell_exec (line:200);shell_exec (line:220);shell_exec (line:236);`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:249);shell_exec (line:255);shell_exec (line:377); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-snmp-data2.php-
Full path:
db555/web/netowrk-snmp-data2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:58 12/12/2025
Last modified:
01:42:11 05/09/2024
MD5 hash:
8eea607c303f1b0b5aad5898f6b95492
Filesize:
20.14 KB
suspicious functions used:
shell_exec (line:96);shell_exec (line:105);shell_exec (line:115);shell_exec (line:134);shell_exec (line:144);shell_exec (line:160);shell_exec (line:180);shell_exec (line:190);shell_exec (line:195);shell_exec (line:203);shell_exec (line:223);shell_exec (line:239);`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:252);shell_exec (line:258);shell_exec (line:380); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-snmp-data3.php-
Full path:
db555/web/netowrk-snmp-data3.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:58 12/12/2025
Last modified:
01:42:11 05/09/2024
MD5 hash:
5d5944402bfa06ab7e62a63de5340f18
Filesize:
16.15 KB
suspicious functions used:
shell_exec (line:74);shell_exec (line:83);shell_exec (line:93);shell_exec (line:112);shell_exec (line:122);shell_exec (line:138);shell_exec (line:158);shell_exec (line:168);shell_exec (line:173);shell_exec (line:181);shell_exec (line:201);shell_exec (line:310); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-old-onu-rx.php-
Full path:
db555/web/network-old-onu-rx.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:58 12/12/2025
Last modified:
01:42:11 05/09/2024
MD5 hash:
eeb2f02cc4a73abd6864b41ef53d5c9e
Filesize:
6.97 KB
suspicious functions used:
shell_exec (line:76); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data.php-
Full path:
db555/web/network-snmp-onu-status-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:58 12/12/2025
Last modified:
01:42:11 05/09/2024
MD5 hash:
4edf64f1b023178a6a92e9323d8c1f13
Filesize:
15.77 KB
suspicious functions used:
shell_exec (line:33);`olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:37);shell_exec (line:146); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-count-cdata.php-
Full path:
db555/web/network-olt-client-onu-mac-count-cdata.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:58 12/12/2025
Last modified:
01:42:11 05/09/2024
MD5 hash:
c378dbabf36066c335cfb8838a6e167d
Filesize:
4.58 KB
suspicious functions used:
shell_exec (line:25);shell_exec (line:35);shell_exec (line:56);shell_exec (line:103);shell_exec (line:115);shell_exec (line:126);shell_exec (line:140); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-count.php-
Full path:
db555/web/network-olt-client-onu-mac-count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:58 12/12/2025
Last modified:
01:42:11 05/09/2024
MD5 hash:
5bb99b279804116640875e00caf9e713
Filesize:
12.52 KB
suspicious functions used:
shell_exec (line:25);shell_exec (line:35);shell_exec (line:58);shell_exec (line:74);shell_exec (line:91);shell_exec (line:101);shell_exec (line:117);shell_exec (line:158);shell_exec (line:201);shell_exec (line:277);shell_exec (line:343);shell_exec (line:405);shell_exec (line:424);shell_exec (line:443); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: testttttt.php-
Full path:
db555/web/testttttt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:58 12/12/2025
Last modified:
01:42:14 05/09/2024
MD5 hash:
b1988a4be29e191ad935fb409a4174ee
Filesize:
2 KB
suspicious functions used:
curl_exec (line:47); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-countt.php-
Full path:
db555/web/network-olt-client-onu-mac-countt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:58 12/12/2025
Last modified:
01:42:11 05/09/2024
MD5 hash:
d29b4e72c375f528b769bd3894f9f0e7
Filesize:
8.95 KB
suspicious functions used:
shell_exec (line:26);shell_exec (line:36);shell_exec (line:59);shell_exec (line:75);shell_exec (line:92);shell_exec (line:102);shell_exec (line:117);shell_exec (line:155);shell_exec (line:206);shell_exec (line:262);shell_exec (line:275);shell_exec (line:288); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: sms-balance-check.php-
Full path:
db555/web/sms-balance-check.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:58 12/12/2025
Last modified:
01:42:13 05/09/2024
MD5 hash:
74ac3e963a0dc5bb7d4c980e594aa39b
Filesize:
854 B
suspicious functions used:
curl_exec (line:15); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-oid-check.php-
Full path:
db555/web/network-olt-oid-check.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:58 12/12/2025
Last modified:
01:42:11 05/09/2024
MD5 hash:
5b7dc0ce1103fbfc895873c250b63141
Filesize:
1.88 KB
suspicious functions used:
shell_exec (line:33); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-count.php-
Full path:
db555/web/network-olt-onu-count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:58 12/12/2025
Last modified:
01:42:11 05/09/2024
MD5 hash:
bc2815c42348f750b1c1f532b9eca3c4
Filesize:
5.35 KB
suspicious functions used:
`olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:11);shell_exec (line:66); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-list-data.php-
Full path:
db555/web/network-olt-onu-list-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:58 12/12/2025
Last modified:
01:42:11 05/09/2024
MD5 hash:
54cc9417c766c31317311c3722ce7d4b
Filesize:
9.48 KB
suspicious functions used:
shell_exec (line:24);shell_exec (line:38);shell_exec (line:64);shell_exec (line:85);shell_exec (line:104);shell_exec (line:125);shell_exec (line:143);shell_exec (line:153);shell_exec (line:165);shell_exec (line:185); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-clients-search.php-
Full path:
db555/web/network-olt-pon-clients-search.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:58 12/12/2025
Last modified:
01:42:11 05/09/2024
MD5 hash:
79d26fc66abdab6f173330588aa8b238
Filesize:
10.93 KB
suspicious functions used:
shell_exec (line:42);shell_exec (line:51);shell_exec (line:104);shell_exec (line:168); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search-bdcom.php-
Full path:
db555/web/network-olt-pon-onu-search-bdcom.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:58 12/12/2025
Last modified:
01:42:11 05/09/2024
MD5 hash:
77296ecad089f4851e4f753825c3f304
Filesize:
15.93 KB
suspicious functions used:
shell_exec (line:54);shell_exec (line:63);shell_exec (line:170); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test5.php-
Full path:
db555/web/test5.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:58 12/12/2025
Last modified:
01:42:14 05/09/2024
MD5 hash:
814ac3ddd93a194f067dc492a2530c65
Filesize:
2.34 KB
suspicious functions used:
curl_exec (line:48); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search-bdcom1.php-
Full path:
db555/web/network-olt-pon-onu-search-bdcom1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:58 12/12/2025
Last modified:
01:42:11 05/09/2024
MD5 hash:
dd18677b1dcbf7f0bce2ac6912d98da0
Filesize:
9.6 KB
suspicious functions used:
shell_exec (line:42);shell_exec (line:51);shell_exec (line:129); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search.php-
Full path:
db555/web/network-olt-pon-onu-search.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:58 12/12/2025
Last modified:
01:42:11 05/09/2024
MD5 hash:
2852e806dcf69c0a3e2a021b86300289
Filesize:
8.75 KB
suspicious functions used:
shell_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreatepayment.php-
Full path:
db555/web/tcreatepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:58 12/12/2025
Last modified:
01:42:14 05/09/2024
MD5 hash:
e49de9a33f5164bc2c6b88e4770faaff
Filesize:
1.07 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data-bdcom.php-
Full path:
db555/web/network-snmp-onu-status-data-bdcom.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:58 12/12/2025
Last modified:
01:42:11 05/09/2024
MD5 hash:
7c1ee9f63b6087b87639e91c89b41fde
Filesize:
20.22 KB
suspicious functions used:
shell_exec (line:47);shell_exec (line:72);shell_exec (line:84);shell_exec (line:102);shell_exec (line:115);shell_exec (line:127);shell_exec (line:133);shell_exec (line:158);shell_exec (line:171);shell_exec (line:183);shell_exec (line:189); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
4star/m/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:59 12/12/2025
Last modified:
18:46:08 14/04/2022
MD5 hash:
05132f436e56ff2164ecc165347219ae
Filesize:
1.71 KB
suspicious functions used:
curl_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
4star/m/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:39:59 12/12/2025
Last modified:
18:46:08 14/04/2022
MD5 hash:
9a3f22521ad987e86f84c4f5f688d5b7
Filesize:
713 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index.php-
Full path:
4star/m/index.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
17:58:00 12/12/2025
Last modified:
23:29:55 03/10/2023
MD5 hash:
41558736b037228ea93df03cae70eb87
Filesize:
4.31 KB
suspicious functions used:
curl_exec (line:70); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec.php-
Full path:
4star/m/login_exec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:00 12/12/2025
Last modified:
06:36:13 01/03/2024
MD5 hash:
546079435939a5715c5a59b858074401
Filesize:
3.39 KB
suspicious functions used:
curl_exec (line:45); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
4star/m/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:00 12/12/2025
Last modified:
18:46:12 14/04/2022
MD5 hash:
7d8e71ceda3ffb74623e0c4a814715af
Filesize:
1.53 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery.php-
Full path:
4star/m/PaymentOnlineQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:00 12/12/2025
Last modified:
18:46:11 14/04/2022
MD5 hash:
d432c6fc438ad1d1a3a6bb3bcc97e99a
Filesize:
13.91 KB
suspicious functions used:
curl_exec (line:240);curl_exec (line:335); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery2.php-
Full path:
4star/m/PaymentOnlineQuery2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:00 12/12/2025
Last modified:
18:46:12 14/04/2022
MD5 hash:
f35074cd0952073b9cd9a89625aa490d
Filesize:
15.21 KB
suspicious functions used:
curl_exec (line:40);curl_exec (line:252); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
4star/web/bkash/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:00 12/12/2025
Last modified:
18:49:33 14/04/2022
MD5 hash:
6175301f744b22b7db70ba598a991f8b
Filesize:
1.64 KB
suspicious functions used:
curl_exec (line:36); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
4star/web/bkash/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:00 12/12/2025
Last modified:
18:49:34 14/04/2022
MD5 hash:
19be365d26141eaecead7ef0ada0e75c
Filesize:
1.3 KB
suspicious functions used:
curl_exec (line:31); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: grant.php-
Full path:
4star/web/bkash/grant.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:00 12/12/2025
Last modified:
18:49:44 14/04/2022
MD5 hash:
da5499d260dc78ea4fcd71227cc6c484
Filesize:
2.01 KB
suspicious functions used:
curl_exec (line:41);curl_exec (line:63); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: query.php-
Full path:
4star/web/bkash/query.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:00 12/12/2025
Last modified:
18:49:44 14/04/2022
MD5 hash:
f3ed9045f3a073e2cdc8561d500bda89
Filesize:
1.65 KB
suspicious functions used:
curl_exec (line:33); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
4star/web/bkash/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:00 12/12/2025
Last modified:
18:49:44 14/04/2022
MD5 hash:
f50b33eeb31927b2c081195618d48b8d
Filesize:
1.88 KB
suspicious functions used:
curl_exec (line:48); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: trxID.php-
Full path:
4star/web/bkash/trxID.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:00 12/12/2025
Last modified:
18:49:44 14/04/2022
MD5 hash:
9bcb8e70728fd25807c4db8916166d74
Filesize:
1.44 KB
suspicious functions used:
curl_exec (line:31); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: class.phpmailer.php-
Full path:
4star/web/email/class.phpmailer.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:00 12/12/2025
Last modified:
16:54:22 27/06/2022
MD5 hash:
68468d69b47fffecc89df57e27c5a781
Filesize:
143.32 KB
suspicious functions used:
`$DKIM_private` (line:428);popen (line:1387);popen (line:1408);base64_decode (line:3410);`$mail->set('SMTPSecure', 'tls');` (line:3688);`$mail->SMTPSecure = 'tls';` (line:3690); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: class.smtp.php-
Full path:
4star/web/email/class.smtp.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:00 12/12/2025
Last modified:
16:54:22 27/06/2022
MD5 hash:
aa8478329268e5438a4469c268337a10
Filesize:
41.44 KB
suspicious functions used:
base64_decode (line:513);base64_decode (line:533); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: JSON.php-
Full path:
4star/web/inc/JSON.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:01 12/12/2025
Last modified:
18:50:26 14/04/2022
MD5 hash:
f5a34509e06231308becbe320ade9ff6
Filesize:
33.22 KB
suspicious functions used:
eval (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: jqgrid.php-
Full path:
4star/web/inc/jqgrid.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:01 12/12/2025
Last modified:
18:50:26 14/04/2022
MD5 hash:
71027a29e71e0626d8b57cbb631e6d98
Filesize:
23.92 KB
suspicious functions used:
eval (line:397); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: smsapicore.php-
Full path:
4star/web/include/smsapicore.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
13:18:52 12/12/2025
Last modified:
06:09:51 01/03/2024
MD5 hash:
8efc5fda3cc52645fff6522f882c7159
Filesize:
867 B
suspicious functions used:
curl_exec (line:13); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: telegramapicore.php-
Full path:
4star/web/include/telegramapicore.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:01 12/12/2025
Last modified:
18:50:26 14/04/2022
MD5 hash:
e14a2b69c8631bbd2f6bde8a3a2f2e86
Filesize:
2.29 KB
suspicious functions used:
curl_exec (line:51); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Changes.txt-
Full path:
4star/web/js/jqgrid/js/Changes.txt
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:01 12/12/2025
Last modified:
18:51:02 14/04/2022
MD5 hash:
c0a4adbc3f1c6d592cb4fa8433fee9ea
Filesize:
44.32 KB
suspicious functions used:
system (line:87); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: AutoActiveClientsCount1.php-
Full path:
4star/web/AutoActiveClientsCount1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:02 12/12/2025
Last modified:
07:56:20 03/11/2022
MD5 hash:
6f5377b6fff4cd80c856c4128799cb44
Filesize:
3.21 KB
suspicious functions used:
system (line:31); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Network.php-
Full path:
4star/web/Network.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:04 12/12/2025
Last modified:
18:49:08 14/04/2022
MD5 hash:
4a7af2139668235381fa59caa8f2c9d3
Filesize:
21.9 KB
suspicious functions used:
system (line:146);system (line:263); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkLoad.php-
Full path:
4star/web/NetworkLoad.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:04 12/12/2025
Last modified:
18:49:09 14/04/2022
MD5 hash:
e1632e66ee1b7394d3fb82751b924abe
Filesize:
2.83 KB
suspicious functions used:
system (line:81); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery.php-
Full path:
4star/web/PaymentOnlineQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:06 12/12/2025
Last modified:
18:49:10 14/04/2022
MD5 hash:
369d4a034371de125c5a10fffce87bab
Filesize:
13.91 KB
suspicious functions used:
curl_exec (line:240);curl_exec (line:335); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery2.php-
Full path:
4star/web/PaymentOnlineQuery2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:06 12/12/2025
Last modified:
18:49:10 14/04/2022
MD5 hash:
332b9632d145339d837fbef04cb19e7f
Filesize:
18.97 KB
suspicious functions used:
curl_exec (line:42);curl_exec (line:251); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentWebhook.php-
Full path:
4star/web/PaymentWebhook.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:06 12/12/2025
Last modified:
08:32:03 01/03/2024
MD5 hash:
a2f322c94787630ab1e0c8ca35fc5ba1
Filesize:
18.6 KB
suspicious functions used:
base64_decode (line:30);curl_exec (line:41);curl_exec (line:422); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMS.php-
Full path:
4star/web/SMS.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:06 12/12/2025
Last modified:
04:05:02 13/10/2023
MD5 hash:
e364be17fd02968644b55a3d6926f413
Filesize:
23.63 KB
suspicious functions used:
curl_exec (line:53); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMSAddSave.php-
Full path:
4star/web/SMSAddSave.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:06 12/12/2025
Last modified:
18:49:22 14/04/2022
MD5 hash:
5e8b43b3bc2febe3a611a5bd9aa8fc28
Filesize:
1.71 KB
suspicious functions used:
curl_exec (line:34); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index.php-
Full path:
4star/web/index.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
13:09:38 12/12/2025
Last modified:
23:30:16 03/10/2023
MD5 hash:
c91f45ea1f8d1d0008a37b0bf0526573
Filesize:
6.68 KB
suspicious functions used:
curl_exec (line:130); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
4star/web/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:07 12/12/2025
Last modified:
18:49:06 14/04/2022
MD5 hash:
c46a50905333286f45dfeacf010851ab
Filesize:
716 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: company_info.php-
Full path:
4star/web/company_info.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
07:56:40 12/12/2025
Last modified:
13:01:02 09/04/2024
MD5 hash:
e0fc10181a5e19eed1173cfa55387eb2
Filesize:
5.93 KB
suspicious functions used:
curl_exec (line:87); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
4star/web/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:07 12/12/2025
Last modified:
18:49:05 14/04/2022
MD5 hash:
c8a7ce9b69ebed3509cee2952c04cb0c
Filesize:
1.7 KB
suspicious functions used:
curl_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: sms_deliverey_report.php-
Full path:
4star/web/sms_deliverey_report.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:07 12/12/2025
Last modified:
18:49:23 14/04/2022
MD5 hash:
15eda78f2292f68b63aae44e6207e0d8
Filesize:
2.96 KB
suspicious functions used:
`api_id` != '' AND `delivery_report` != 'DELIVRD' AND `delivery_report` = '' or `delivery_report` = 'SENT' or `delivery_report` = 'PENDING' AND c_cell REGEXP '^-?[0-9]+$' ORDER BY ` (line:8);curl_exec (line:18);curl_exec (line:41); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: testttttt.php-
Full path:
4star/web/testttttt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:07 12/12/2025
Last modified:
10:27:23 04/10/2023
MD5 hash:
b1988a4be29e191ad935fb409a4174ee
Filesize:
2 KB
suspicious functions used:
curl_exec (line:47); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: emp_salary_advence_find.php-
Full path:
4star/web/emp_salary_advence_find.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:07 12/12/2025
Last modified:
18:49:06 14/04/2022
MD5 hash:
8cb12a79d5e1d31d92670d721dabb5aa
Filesize:
2.25 KB
suspicious functions used:
`expanse` WHERE `type` = '2' AND `status` = '2' AND ex_by = '$e_id' AND MONTH(`, `) = MONTH('$lastmonth') AND YEAR(`, `) = YEAR('$lastmonth') GROUP BY ` (line:8);`e_id` = '$e_id' AND ` (line:12); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tis-news.php-
Full path:
4star/web/tis-news.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
13:59:46 12/12/2025
Last modified:
07:54:35 09/04/2024
MD5 hash:
ed23ca98b77c5321b4485e85eb2ea64d
Filesize:
3.67 KB
suspicious functions used:
curl_exec (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
4star/web/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:08 12/12/2025
Last modified:
18:49:23 14/04/2022
MD5 hash:
7d8e71ceda3ffb74623e0c4a814715af
Filesize:
1.53 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ip-ping-checker.php-
Full path:
4star/web/ip-ping-checker.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:08 12/12/2025
Last modified:
18:49:07 14/04/2022
MD5 hash:
0d28f3053b73b3fe2885cf519ee17c12
Filesize:
2.64 KB
suspicious functions used:
curl_exec (line:81); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec.php-
Full path:
4star/web/login_exec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
13:09:40 12/12/2025
Last modified:
06:36:13 01/03/2024
MD5 hash:
d27302cfb6badc5c566765028e20bd11
Filesize:
3.59 KB
suspicious functions used:
curl_exec (line:50); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec1.php-
Full path:
4star/web/login_exec1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:08 12/12/2025
Last modified:
18:49:08 14/04/2022
MD5 hash:
4f75b914e1b47a355be8cbc73e4e1407
Filesize:
3.91 KB
suspicious functions used:
curl_exec (line:53); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook.php-
Full path:
4star/web/webhook.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:08 12/12/2025
Last modified:
09:21:20 01/03/2024
MD5 hash:
e1b6f4077699b0e0f301241fc82ec7d0
Filesize:
19.67 KB
suspicious functions used:
base64_decode (line:27);curl_exec (line:38);curl_exec (line:419); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: AppSettings.php-
Full path:
sw333/web/AppSettings.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:08 12/12/2025
Last modified:
12:53:57 28/01/2025
MD5 hash:
d339ffc4e426d90aa8b23aae64ae2db2
Filesize:
110.67 KB
suspicious functions used:
`input[name="${inputName}"]:checked` (line:1832); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: AutoActiveClientsCount1.php-
Full path:
sw333/web/AutoActiveClientsCount1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:08 12/12/2025
Last modified:
12:53:57 28/01/2025
MD5 hash:
3b3b6186ff2d9c5abd1772e5aa02ee33
Filesize:
6.4 KB
suspicious functions used:
system (line:58); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: AutoActiveClientsCount11.php-
Full path:
sw333/web/AutoActiveClientsCount11.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:08 12/12/2025
Last modified:
12:53:57 28/01/2025
MD5 hash:
a0090e4a11dd59b955a6edd549b6ef2f
Filesize:
5.85 KB
suspicious functions used:
system (line:54); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: client-online-mbb.php-
Full path:
sw333/web/client-online-mbb.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:09 12/12/2025
Last modified:
12:54:03 28/01/2025
MD5 hash:
e16c33ab6ddd7649ea56a7d5355365b6
Filesize:
16.46 KB
suspicious functions used:
curl_exec (line:90);curl_exec (line:289); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: clients-nots-action.php-
Full path:
sw333/web/clients-nots-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:10 12/12/2025
Last modified:
12:54:06 28/01/2025
MD5 hash:
dff1bb495509427d098cb4588da553b9
Filesize:
5.89 KB
suspicious functions used:
curl_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients.php-
Full path:
sw333/web/Clients.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:10 12/12/2025
Last modified:
12:54:07 28/01/2025
MD5 hash:
68cc89194b10a580ee126b39fa2e2177
Filesize:
212.43 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:844); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients1.php-
Full path:
sw333/web/Clients1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:10 12/12/2025
Last modified:
12:54:08 28/01/2025
MD5 hash:
a8db87dcc6beb97539ff152b767dadae
Filesize:
219.37 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:835); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients2.php-
Full path:
sw333/web/Clients2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:11 12/12/2025
Last modified:
12:54:10 28/01/2025
MD5 hash:
982d6411552113b0715fd17c26f50292
Filesize:
205.13 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:832); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients3.php-
Full path:
sw333/web/Clients3.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:11 12/12/2025
Last modified:
12:54:10 28/01/2025
MD5 hash:
50ddc869b383ab76e009c7a2c17c99a3
Filesize:
175.31 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:832); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ClientsOnMap.php-
Full path:
sw333/web/ClientsOnMap.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:12 12/12/2025
Last modified:
06:03:15 10/11/2025
MD5 hash:
519edcd6a9ccec3397e6f5280db00605
Filesize:
12.2 KB
suspicious functions used:
`${totalonline}` (line:97);`${totaloffline}` (line:98);`${results.rxPower}` (line:233);`${results.distance}` (line:234);`${results.supplyVoltage}` (line:235);`${results.temperature}` (line:236);`${results.txPower}` (line:237); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ClientView.php-
Full path:
sw333/web/ClientView.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:12 12/12/2025
Last modified:
12:54:14 28/01/2025
MD5 hash:
245cc61e9ef09a1e6967ca94efea65cd
Filesize:
114.17 KB
suspicious functions used:
`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:226); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ClientView1.php-
Full path:
sw333/web/ClientView1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:12 12/12/2025
Last modified:
12:54:14 28/01/2025
MD5 hash:
7920a8e299df5241badf06b872ed5a99
Filesize:
112.56 KB
suspicious functions used:
`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:226); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: company_info.php-
Full path:
sw333/web/company_info.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:12 12/12/2025
Last modified:
12:54:15 28/01/2025
MD5 hash:
b8be64deb20b7f397351f207e87625c2
Filesize:
8.54 KB
suspicious functions used:
curl_exec (line:133); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
sw333/web/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:12 12/12/2025
Last modified:
12:54:15 28/01/2025
MD5 hash:
ba9747d0421fd091b998389469e72a0b
Filesize:
1.7 KB
suspicious functions used:
curl_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_all.php-
Full path:
sw333/web/cron_all.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:12 12/12/2025
Last modified:
12:54:15 28/01/2025
MD5 hash:
967f1d654ae891609da26b9e0fdbd1ae
Filesize:
2.44 KB
suspicious functions used:
curl_exec (line:23);curl_exec (line:38);curl_exec (line:53); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_gen_bill.php-
Full path:
sw333/web/cron_auto_gen_bill.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:12 12/12/2025
Last modified:
12:54:15 28/01/2025
MD5 hash:
f1056618cc4402968e50d1232d2c51c8
Filesize:
4.73 KB
suspicious functions used:
curl_exec (line:140);curl_exec (line:149); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive.php-
Full path:
sw333/web/cron_auto_inactive.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:12 12/12/2025
Last modified:
12:54:15 28/01/2025
MD5 hash:
7e0dc4dd9dae2bf0220516641b53c027
Filesize:
5.43 KB
suspicious functions used:
curl_exec (line:142); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive2.php-
Full path:
sw333/web/cron_auto_inactive2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:12 12/12/2025
Last modified:
12:54:15 28/01/2025
MD5 hash:
440bc24f05b01eb395df63fff2f60de9
Filesize:
5.46 KB
suspicious functions used:
curl_exec (line:142); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive_termination.php-
Full path:
sw333/web/cron_auto_inactive_termination.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:12 12/12/2025
Last modified:
12:54:15 28/01/2025
MD5 hash:
7b2e58632b1d31d868962ce070895f4b
Filesize:
12.6 KB
suspicious functions used:
curl_exec (line:241);curl_exec (line:253);curl_exec (line:299); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive_termination1.php-
Full path:
sw333/web/cron_auto_inactive_termination1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:12 12/12/2025
Last modified:
12:54:15 28/01/2025
MD5 hash:
be76b964c93a2cb4fa7e632750ff3bc4
Filesize:
6.64 KB
suspicious functions used:
curl_exec (line:156);curl_exec (line:168); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_termination_remainder1.php-
Full path:
sw333/web/cron_auto_termination_remainder1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:12 12/12/2025
Last modified:
12:54:15 28/01/2025
MD5 hash:
7765f9f820dbd402f1064fab9958ffaa
Filesize:
3.26 KB
suspicious functions used:
curl_exec (line:83); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_client_bandwidth_count.php-
Full path:
sw333/web/cron_client_bandwidth_count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:12 12/12/2025
Last modified:
12:54:15 28/01/2025
MD5 hash:
1c71a3dd097275429ae845a85ced0438
Filesize:
5.33 KB
suspicious functions used:
curl_exec (line:124);curl_exec (line:134); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_network.php-
Full path:
sw333/web/cron_network.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:12 12/12/2025
Last modified:
12:54:15 28/01/2025
MD5 hash:
db096f353e80027593ca3f9781a21ac8
Filesize:
4.93 KB
suspicious functions used:
curl_exec (line:45);curl_exec (line:67);curl_exec (line:127); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_olt.php-
Full path:
sw333/web/cron_olt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:12 12/12/2025
Last modified:
12:54:15 28/01/2025
MD5 hash:
6975951fdbf566164ba5fa5cfcd32ec7
Filesize:
4.27 KB
suspicious functions used:
shell_exec (line:48);curl_exec (line:127); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_olt_clients_catch.php-
Full path:
sw333/web/cron_olt_clients_catch.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:12 12/12/2025
Last modified:
12:54:15 28/01/2025
MD5 hash:
3b13c163ba3445b3d661c63adde1d985
Filesize:
1.12 KB
suspicious functions used:
curl_exec (line:23); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_olt_user.php-
Full path:
sw333/web/cron_olt_user.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:12 12/12/2025
Last modified:
12:54:15 28/01/2025
MD5 hash:
67aa237639e3d1e6064e76079bb3cccc
Filesize:
1.97 KB
suspicious functions used:
curl_exec (line:19);curl_exec (line:46); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: emp_salary_advence_find.php-
Full path:
sw333/web/emp_salary_advence_find.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:13 12/12/2025
Last modified:
12:54:16 28/01/2025
MD5 hash:
74a7e2ffda0f7584611d7cbce6136c24
Filesize:
2.25 KB
suspicious functions used:
`expanse` WHERE `type` = '2' AND `status` = '2' AND ex_by = '$e_id' AND MONTH(`, `) = MONTH('$lastmonth') AND YEAR(`, `) = YEAR('$lastmonth') GROUP BY ` (line:8);`e_id` = '$e_id' AND ` (line:12); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
sw333/web/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:13 12/12/2025
Last modified:
12:54:17 28/01/2025
MD5 hash:
c46a50905333286f45dfeacf010851ab
Filesize:
716 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: getclientuptime.php-
Full path:
sw333/web/getclientuptime.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:13 12/12/2025
Last modified:
12:54:19 28/01/2025
MD5 hash:
bbc14cdd451c72b94d78c7d2d1af0b52
Filesize:
718 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: imagevwr.php-
Full path:
sw333/web/imagevwr.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:13 12/12/2025
Last modified:
12:54:19 28/01/2025
MD5 hash:
47a223a13cc642d01dcfaaca542d396d
Filesize:
915 B
suspicious functions used:
curl_exec (line:15); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index.php-
Full path:
sw333/web/index.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:13 12/12/2025
Last modified:
12:54:19 28/01/2025
MD5 hash:
0ca43ea5b09b97215f87453c4f260b78
Filesize:
16.67 KB
suspicious functions used:
curl_exec (line:298); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: InstrumentsStoreOutDetails.php-
Full path:
sw333/web/InstrumentsStoreOutDetails.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:13 12/12/2025
Last modified:
12:54:19 28/01/2025
MD5 hash:
a60c19f766bfff1ccdccbeba6b39eb87
Filesize:
9.37 KB
suspicious functions used:
`update_date`, '%D-%b, %y') AS offdate, TIME_FORMAT(`update_time`, '%T') AS offtime FROM `con_sts_log` WHERE `c_id` = '{$row['c_id']}' AND con_sts = 'Inactive' ORDER BY ` (line:120); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ip-ping-checker.php-
Full path:
sw333/web/ip-ping-checker.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:13 12/12/2025
Last modified:
12:54:20 28/01/2025
MD5 hash:
0d28f3053b73b3fe2885cf519ee17c12
Filesize:
2.64 KB
suspicious functions used:
curl_exec (line:81); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: LoginByPass.php-
Full path:
sw333/web/LoginByPass.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:13 12/12/2025
Last modified:
12:54:21 28/01/2025
MD5 hash:
a8f1789daadb34b0814aaecddfebe7c1
Filesize:
4.26 KB
suspicious functions used:
curl_exec (line:41); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: loginexec.php-
Full path:
sw333/web/loginexec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:13 12/12/2025
Last modified:
12:54:21 28/01/2025
MD5 hash:
edb8017e7d0f8e037facbcacc94a383d
Filesize:
5.91 KB
suspicious functions used:
curl_exec (line:67); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec.php-
Full path:
sw333/web/login_exec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:13 12/12/2025
Last modified:
14:50:30 12/03/2025
MD5 hash:
5b0a9ced4ebebc6a776826b848efc33d
Filesize:
12.1 KB
suspicious functions used:
curl_exec (line:24);curl_exec (line:74);curl_exec (line:199);curl_exec (line:239); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: macreseller-news.php-
Full path:
sw333/web/macreseller-news.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:13 12/12/2025
Last modified:
12:54:22 28/01/2025
MD5 hash:
ed23ca98b77c5321b4485e85eb2ea64d
Filesize:
3.67 KB
suspicious functions used:
curl_exec (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: MacResellerAdd.php-
Full path:
sw333/web/MacResellerAdd.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:14 12/12/2025
Last modified:
12:54:23 28/01/2025
MD5 hash:
5ac506fcafb554fb6326382737dce0df
Filesize:
29.89 KB
suspicious functions used:
`input[name="${inputName}"]:checked` (line:792); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: MacResellerEdit.php-
Full path:
sw333/web/MacResellerEdit.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:14 12/12/2025
Last modified:
12:54:24 28/01/2025
MD5 hash:
60b4a4eac6e169f1bce50574c472cd2a
Filesize:
37.16 KB
suspicious functions used:
`input[name="${inputName}"]:checked` (line:634); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-helper.php-
Full path:
sw333/web/nagad-helper.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:14 12/12/2025
Last modified:
12:54:27 28/01/2025
MD5 hash:
2bb70c44d68202e0a0cd8ae1388f0b1b
Filesize:
6.74 KB
suspicious functions used:
curl_exec (line:61);base64_decode (line:97); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-merchant-callback.php-
Full path:
sw333/web/nagad-merchant-callback.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:14 12/12/2025
Last modified:
12:54:27 28/01/2025
MD5 hash:
abc8d9e7aad4d9c622dcd97e701448bc
Filesize:
16.5 KB
suspicious functions used:
curl_exec (line:20); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-olt-all-mac-array.php-
Full path:
sw333/web/netowrk-olt-all-mac-array.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:14 12/12/2025
Last modified:
12:54:27 28/01/2025
MD5 hash:
b0168ce99145e2afe64357247d750dd6
Filesize:
4.62 KB
suspicious functions used:
shell_exec (line:33);shell_exec (line:47);shell_exec (line:61);shell_exec (line:76);shell_exec (line:93); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-snmp-data.php-
Full path:
sw333/web/netowrk-snmp-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:14 12/12/2025
Last modified:
12:54:27 28/01/2025
MD5 hash:
9badf5c53b260315a061e1bb6cd2378f
Filesize:
24.8 KB
suspicious functions used:
shell_exec (line:104);shell_exec (line:113);shell_exec (line:123);shell_exec (line:142);shell_exec (line:154);shell_exec (line:165);shell_exec (line:181);shell_exec (line:191);shell_exec (line:207);shell_exec (line:227);shell_exec (line:236);shell_exec (line:244);shell_exec (line:251);shell_exec (line:256);`pon_name` FROM `olt_pon` WHERE `olt_pon_id` = '$pon_id' AND ` (line:263);shell_exec (line:280);shell_exec (line:290);`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:303);shell_exec (line:309);shell_exec (line:444); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-old-onu-rx-map.php-
Full path:
sw333/web/network-old-onu-rx-map.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:14 12/12/2025
Last modified:
12:54:27 28/01/2025
MD5 hash:
b4962c160c5ad68ccd8eed9c48d82a0f
Filesize:
6.94 KB
suspicious functions used:
shell_exec (line:76); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-old-onu-rx.php-
Full path:
sw333/web/network-old-onu-rx.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:14 12/12/2025
Last modified:
12:54:27 28/01/2025
MD5 hash:
b4962c160c5ad68ccd8eed9c48d82a0f
Filesize:
6.94 KB
suspicious functions used:
shell_exec (line:76); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-count-cdata.php-
Full path:
sw333/web/network-olt-client-onu-mac-count-cdata.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:14 12/12/2025
Last modified:
12:54:27 28/01/2025
MD5 hash:
c378dbabf36066c335cfb8838a6e167d
Filesize:
4.58 KB
suspicious functions used:
shell_exec (line:25);shell_exec (line:35);shell_exec (line:56);shell_exec (line:103);shell_exec (line:115);shell_exec (line:126);shell_exec (line:140); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-count.php-
Full path:
sw333/web/network-olt-client-onu-mac-count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:14 12/12/2025
Last modified:
12:54:27 28/01/2025
MD5 hash:
20be243dd1bdf6e7af8e7e33c01a34c9
Filesize:
15.76 KB
suspicious functions used:
shell_exec (line:26);shell_exec (line:36);shell_exec (line:68);shell_exec (line:84);shell_exec (line:101);shell_exec (line:119);shell_exec (line:135);shell_exec (line:176);shell_exec (line:236);shell_exec (line:312);shell_exec (line:379);shell_exec (line:484);shell_exec (line:503);shell_exec (line:522); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-countt.php-
Full path:
sw333/web/network-olt-client-onu-mac-countt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:14 12/12/2025
Last modified:
12:54:27 28/01/2025
MD5 hash:
d29b4e72c375f528b769bd3894f9f0e7
Filesize:
8.95 KB
suspicious functions used:
shell_exec (line:26);shell_exec (line:36);shell_exec (line:59);shell_exec (line:75);shell_exec (line:92);shell_exec (line:102);shell_exec (line:117);shell_exec (line:155);shell_exec (line:206);shell_exec (line:262);shell_exec (line:275);shell_exec (line:288); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-con-sts.php-
Full path:
sw333/web/network-olt-con-sts.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:14 12/12/2025
Last modified:
12:54:27 28/01/2025
MD5 hash:
a26b0a1c1567c34c9aa5e2e0254ff8a6
Filesize:
4 KB
suspicious functions used:
`olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:10);shell_exec (line:38);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, `last_synced`, `last_update`, `msg`, `full_msg`, ROUND((SELECT AVG(value) FROM olt_onu_history WHERE alarm_id = '$alarmId' AND value != ''), 2) AS average_value FROM `, ` WHERE `alarm_id` = '$alarmId' AND ` (line:82); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-load.php-
Full path:
sw333/web/network-olt-load.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:14 12/12/2025
Last modified:
12:54:27 28/01/2025
MD5 hash:
f49d5153285c639ed91d4e806685ee56
Filesize:
1.33 KB
suspicious functions used:
shell_exec (line:22);shell_exec (line:25); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-oid-check.php-
Full path:
sw333/web/network-olt-oid-check.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:14 12/12/2025
Last modified:
12:54:27 28/01/2025
MD5 hash:
5b7dc0ce1103fbfc895873c250b63141
Filesize:
1.88 KB
suspicious functions used:
shell_exec (line:33); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-alarm-add.php-
Full path:
sw333/web/network-olt-onu-alarm-add.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:14 12/12/2025
Last modified:
12:54:27 28/01/2025
MD5 hash:
be6ba82c658419e1454f778e20e2d4c3
Filesize:
7.86 KB
suspicious functions used:
shell_exec (line:103); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-count.php-
Full path:
sw333/web/network-olt-onu-count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:14 12/12/2025
Last modified:
12:54:27 28/01/2025
MD5 hash:
7adff5f1e805e721e1a1285e40861a92
Filesize:
6.84 KB
suspicious functions used:
`olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:12);shell_exec (line:81); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-list-data.php-
Full path:
sw333/web/network-olt-onu-list-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:14 12/12/2025
Last modified:
12:54:27 28/01/2025
MD5 hash:
54cc9417c766c31317311c3722ce7d4b
Filesize:
9.48 KB
suspicious functions used:
shell_exec (line:24);shell_exec (line:38);shell_exec (line:64);shell_exec (line:85);shell_exec (line:104);shell_exec (line:125);shell_exec (line:143);shell_exec (line:153);shell_exec (line:165);shell_exec (line:185); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-power.php-
Full path:
sw333/web/network-olt-onu-power.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:14 12/12/2025
Last modified:
12:54:27 28/01/2025
MD5 hash:
2e064543b67b532bdf4e5b12d49c5052
Filesize:
7.54 KB
suspicious functions used:
shell_exec (line:97); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-clients-search.php-
Full path:
sw333/web/network-olt-pon-clients-search.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:14 12/12/2025
Last modified:
12:54:27 28/01/2025
MD5 hash:
79d26fc66abdab6f173330588aa8b238
Filesize:
10.93 KB
suspicious functions used:
shell_exec (line:42);shell_exec (line:51);shell_exec (line:104);shell_exec (line:168); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search-bdcom.php-
Full path:
sw333/web/network-olt-pon-onu-search-bdcom.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:15 12/12/2025
Last modified:
12:54:27 28/01/2025
MD5 hash:
c786fa8b69268c738b6ff976631798cd
Filesize:
27.74 KB
suspicious functions used:
shell_exec (line:60);shell_exec (line:69);shell_exec (line:383); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search-bdcom1.php-
Full path:
sw333/web/network-olt-pon-onu-search-bdcom1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:15 12/12/2025
Last modified:
12:54:27 28/01/2025
MD5 hash:
dd18677b1dcbf7f0bce2ac6912d98da0
Filesize:
9.6 KB
suspicious functions used:
shell_exec (line:42);shell_exec (line:51);shell_exec (line:129); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search.php-
Full path:
sw333/web/network-olt-pon-onu-search.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:15 12/12/2025
Last modified:
12:54:27 28/01/2025
MD5 hash:
dc183ecf77d0e1f56f672338fd09cfa5
Filesize:
21.62 KB
suspicious functions used:
shell_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data-bdcom.php-
Full path:
sw333/web/network-snmp-onu-status-data-bdcom.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:15 12/12/2025
Last modified:
12:54:28 28/01/2025
MD5 hash:
065f5e2b05932ee66d473135998580ac
Filesize:
23.53 KB
suspicious functions used:
shell_exec (line:48);shell_exec (line:73);shell_exec (line:85);shell_exec (line:103);shell_exec (line:116);shell_exec (line:128);shell_exec (line:134);shell_exec (line:159);shell_exec (line:172);shell_exec (line:184);shell_exec (line:190);shell_exec (line:217);shell_exec (line:233);shell_exec (line:239);shell_exec (line:244);shell_exec (line:248);`pon_name` FROM `olt_pon` WHERE `olt_pon_id` = '$ponn_id' AND ` (line:255);shell_exec (line:263); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data.php-
Full path:
sw333/web/network-snmp-onu-status-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:15 12/12/2025
Last modified:
12:54:28 28/01/2025
MD5 hash:
0adfee384bf349b50f11036947fd2a74
Filesize:
30.37 KB
suspicious functions used:
shell_exec (line:38);`olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:42);shell_exec (line:81);shell_exec (line:95);shell_exec (line:109);shell_exec (line:122);shell_exec (line:208);shell_exec (line:429);shell_exec (line:441);shell_exec (line:448); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data1.php-
Full path:
sw333/web/network-snmp-onu-status-data1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:15 12/12/2025
Last modified:
12:54:28 28/01/2025
MD5 hash:
920bd1a592c36f7a1194b737642f8340
Filesize:
15.96 KB
suspicious functions used:
shell_exec (line:33);`olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:37);shell_exec (line:149); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data_vsol2.php-
Full path:
sw333/web/network-snmp-onu-status-data_vsol2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:15 12/12/2025
Last modified:
12:54:28 28/01/2025
MD5 hash:
f22d022ddc284f4d8e1de3660da91db8
Filesize:
15.61 KB
suspicious functions used:
shell_exec (line:34);shell_exec (line:113);shell_exec (line:126);shell_exec (line:132); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-tree-vartual-nodes.php-
Full path:
sw333/web/network-tree-vartual-nodes.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:15 12/12/2025
Last modified:
12:54:29 28/01/2025
MD5 hash:
3530b8bc3113544014b1746ecd67e834
Filesize:
10.64 KB
suspicious functions used:
shell_exec (line:76);shell_exec (line:111);shell_exec (line:145);shell_exec (line:181);shell_exec (line:188); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Network.php-
Full path:
sw333/web/Network.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:15 12/12/2025
Last modified:
12:54:29 28/01/2025
MD5 hash:
fda05c071d32b31263955c049e2b4b43
Filesize:
62.6 KB
suspicious functions used:
system (line:371);shell_exec (line:657); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Network1.php-
Full path:
sw333/web/Network1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:15 12/12/2025
Last modified:
12:54:29 28/01/2025
MD5 hash:
c72cb4810d5c70edd9da26884beba751
Filesize:
66.22 KB
suspicious functions used:
system (line:375);shell_exec (line:661); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkLoad.php-
Full path:
sw333/web/NetworkLoad.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:15 12/12/2025
Last modified:
12:54:31 28/01/2025
MD5 hash:
e1632e66ee1b7394d3fb82751b924abe
Filesize:
2.83 KB
suspicious functions used:
system (line:81); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkLoad1.php-
Full path:
sw333/web/NetworkLoad1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:15 12/12/2025
Last modified:
12:54:31 28/01/2025
MD5 hash:
176bd6931be34d7ef351d22897accc65
Filesize:
759 B
suspicious functions used:
system (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltAddQuery.php-
Full path:
sw333/web/NetworkOltAddQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:15 12/12/2025
Last modified:
12:54:31 28/01/2025
MD5 hash:
29cb8b80d9a49410b20adef42764fb16
Filesize:
7.34 KB
suspicious functions used:
shell_exec (line:21); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltOnuStatus.php-
Full path:
sw333/web/NetworkOltOnuStatus.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:15 12/12/2025
Last modified:
12:54:31 28/01/2025
MD5 hash:
77fca1ce958c811693c7b16bc5a5f9df
Filesize:
65 KB
suspicious functions used:
shell_exec (line:42);shell_exec (line:102);shell_exec (line:673);shell_exec (line:786);shell_exec (line:896); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltOnuStatus2.php-
Full path:
sw333/web/NetworkOltOnuStatus2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:15 12/12/2025
Last modified:
12:54:31 28/01/2025
MD5 hash:
c9a14797fa4353d05bbd9427b6079250
Filesize:
15.88 KB
suspicious functions used:
shell_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltSense.php-
Full path:
sw333/web/NetworkOltSense.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:15 12/12/2025
Last modified:
12:54:31 28/01/2025
MD5 hash:
2be664ae5006367f629ca437a6d507f8
Filesize:
18.26 KB
suspicious functions used:
`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, `last_synced`, `last_update`, `msg`, `full_msg`, ROUND((SELECT AVG(value) FROM olt_onu_history WHERE alarm_id = '$alarmId' AND value != ''), 2) AS average_value FROM `, ` WHERE `alarm_id` = '$alarmId' AND ` (line:123); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltSenseDetails.php-
Full path:
sw333/web/NetworkOltSenseDetails.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:15 12/12/2025
Last modified:
12:54:31 28/01/2025
MD5 hash:
440096c601fc10b819a1f0f8330928b0
Filesize:
14.17 KB
suspicious functions used:
`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:33);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:42);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:51);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:60); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltSync.php-
Full path:
sw333/web/NetworkOltSync.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:15 12/12/2025
Last modified:
12:54:31 28/01/2025
MD5 hash:
06633d4b65a14d677358170dd0a84424
Filesize:
1.87 KB
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree-olt-onu-list-data.php-
Full path:
sw333/web/networktree-olt-onu-list-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:16 12/12/2025
Last modified:
12:54:32 28/01/2025
MD5 hash:
af4221fefa9c9051846a063ac4135560
Filesize:
8.72 KB
suspicious functions used:
shell_exec (line:24);shell_exec (line:36);shell_exec (line:59);shell_exec (line:78);shell_exec (line:97);shell_exec (line:116);shell_exec (line:134);shell_exec (line:143);shell_exec (line:155);shell_exec (line:175); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeAddSave.php-
Full path:
sw333/web/NetworkTreeAddSave.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:16 12/12/2025
Last modified:
12:54:33 28/01/2025
MD5 hash:
93fdf1213fdb5d525641e2b625f1a91b
Filesize:
7.61 KB
suspicious functions used:
`network_tree` WHERE `olt_id` = '$olt_id' AND ` (line:107); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeEdit1.php-
Full path:
sw333/web/NetworkTreeEdit1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:16 12/12/2025
Last modified:
12:54:34 28/01/2025
MD5 hash:
3396a6bdf9b5804bb208f38f37cc29a2
Filesize:
35.81 KB
suspicious functions used:
`olt_onu` WHERE olt_id = '$olt_id' AND ` (line:207); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeEditSave.php-
Full path:
sw333/web/NetworkTreeEditSave.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:16 12/12/2025
Last modified:
14:05:54 28/01/2025
MD5 hash:
be82a23409ab88be3f57da95f8805d6c
Filesize:
12.83 KB
suspicious functions used:
`network_tree` WHERE `olt_id` = '$olt_id' AND ` (line:182); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeList.php-
Full path:
sw333/web/NetworkTreeList.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:16 12/12/2025
Last modified:
12:54:34 28/01/2025
MD5 hash:
acd468021993faf8575531952ae107f8
Filesize:
21.98 KB
suspicious functions used:
`pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '{$row['olt_id']}' AND ` (line:287); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeMap.php-
Full path:
sw333/web/NetworkTreeMap.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:16 12/12/2025
Last modified:
12:54:34 28/01/2025
MD5 hash:
584d02944bd9de5a190ec6dc320fc49e
Filesize:
24.24 KB
suspicious functions used:
`${results.rxPower}` (line:263);`${results.distance}` (line:264);`${results.supplyVoltage}` (line:265);`${results.temperature}` (line:266);`${results.txPower}` (line:267);`${results.rxPower}` (line:283);`${results.distance}` (line:284);`${results.supplyVoltage}` (line:285);`${results.temperature}` (line:286);`${results.txPower}` (line:287); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeMap1.php-
Full path:
sw333/web/NetworkTreeMap1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:16 12/12/2025
Last modified:
12:54:35 28/01/2025
MD5 hash:
31a3ae9bc0bdb18726ed860ec6e8ec97
Filesize:
36.43 KB
suspicious functions used:
`networktree_marker_data.php?tree_id=${markerId}` (line:231);`${results.rxPower}` (line:311);`${results.distance}` (line:312);`${results.supplyVoltage}` (line:313);`${results.temperature}` (line:314);`${results.txPower}` (line:315); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_onu_list_add.php-
Full path:
sw333/web/networktree_device_onu_list_add.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:16 12/12/2025
Last modified:
12:54:35 28/01/2025
MD5 hash:
444ccf3c3e852a5a25cc4ccd3a5cf9ca
Filesize:
14.66 KB
suspicious functions used:
`network_tree` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND device_type = '5' AND ` (line:9);shell_exec (line:33);`network_tree` WHERE `onu_mac` = '$mac_address' AND ` (line:131);shell_exec (line:179);shell_exec (line:187);shell_exec (line:235);`network_tree` WHERE `onu_mac` = '$onuMac' AND ` (line:301); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_pon_check.php-
Full path:
sw333/web/networktree_device_pon_check.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:16 12/12/2025
Last modified:
12:54:35 28/01/2025
MD5 hash:
708a93aadcae96ecf0aaca52041fcf38
Filesize:
1.53 KB
suspicious functions used:
`pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '$olt_id' AND ` (line:8); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_pon_list_add.php-
Full path:
sw333/web/networktree_device_pon_list_add.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:16 12/12/2025
Last modified:
12:54:35 28/01/2025
MD5 hash:
2ec03912801e4749c2e9cd361417ca5f
Filesize:
1.36 KB
suspicious functions used:
`olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:6);`olt_pon` WHERE `olt_id` = '$olt_id' AND ` (line:10);`network_tree` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND ` (line:17); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_pon_port_onu_list.php-
Full path:
sw333/web/networktree_device_pon_port_onu_list.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:16 12/12/2025
Last modified:
12:54:35 28/01/2025
MD5 hash:
9c63b3ac69996628f5eb2959a9eb4e15
Filesize:
8.65 KB
suspicious functions used:
`olt_pon` WHERE olt_id = '$olt_id' AND ` (line:25);shell_exec (line:32);shell_exec (line:45);`network_tree` WHERE onu_index_id = '$port_onu_index_id' AND ` (line:49);shell_exec (line:81);shell_exec (line:103);shell_exec (line:122);shell_exec (line:143);shell_exec (line:161);shell_exec (line:170);shell_exec (line:184); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_pon_port_sense_list.php-
Full path:
sw333/web/networktree_device_pon_port_sense_list.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:16 12/12/2025
Last modified:
12:54:35 28/01/2025
MD5 hash:
ee69cd5cc122f8aa37d8d8e5c74def6b
Filesize:
3.65 KB
suspicious functions used:
`network_tree` WHERE `onu_mac` = '$onu_mac' AND ` (line:26);`network_tree` WHERE `c_id` = '{$dfhbdxf}' AND ` (line:71); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_type.php-
Full path:
sw333/web/networktree_device_type.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:16 12/12/2025
Last modified:
12:54:35 28/01/2025
MD5 hash:
f1520732e5a3ef38564238a3278a1f63
Filesize:
11.43 KB
suspicious functions used:
`tree_id`) AS countolt FROM `network_tree` WHERE `olt_id` = '$olt_id_sure' AND ` (line:64); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery.php-
Full path:
sw333/web/PaymentOnlineQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:17 12/12/2025
Last modified:
12:54:41 28/01/2025
MD5 hash:
201e1cf95b2d033897cab4bc2fd59e07
Filesize:
28.5 KB
suspicious functions used:
curl_exec (line:457);curl_exec (line:689); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery2.php-
Full path:
sw333/web/PaymentOnlineQuery2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:17 12/12/2025
Last modified:
12:54:41 28/01/2025
MD5 hash:
ccd315d11a60901b7b9029ff44f8351b
Filesize:
19.4 KB
suspicious functions used:
curl_exec (line:42);curl_exec (line:252); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentWebhook.php-
Full path:
sw333/web/PaymentWebhook.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:17 12/12/2025
Last modified:
12:54:41 28/01/2025
MD5 hash:
a2f322c94787630ab1e0c8ca35fc5ba1
Filesize:
18.6 KB
suspicious functions used:
base64_decode (line:30);curl_exec (line:41);curl_exec (line:422); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SignUp1.php-
Full path:
sw333/web/SignUp1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:18 12/12/2025
Last modified:
12:54:47 28/01/2025
MD5 hash:
3f7943dd155c8e0a383b7d02730f8c11
Filesize:
24.59 KB
suspicious functions used:
curl_exec (line:33);curl_exec (line:59); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: sms-balance-check.php-
Full path:
sw333/web/sms-balance-check.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:18 12/12/2025
Last modified:
12:54:48 28/01/2025
MD5 hash:
74ac3e963a0dc5bb7d4c980e594aa39b
Filesize:
854 B
suspicious functions used:
curl_exec (line:15); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMS.php-
Full path:
sw333/web/SMS.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:18 12/12/2025
Last modified:
12:54:48 28/01/2025
MD5 hash:
317f1e2c91c81e6c57f02184d4e2dc6e
Filesize:
36.84 KB
suspicious functions used:
curl_exec (line:56); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMS1.php-
Full path:
sw333/web/SMS1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:18 12/12/2025
Last modified:
12:54:48 28/01/2025
MD5 hash:
e4671dadf9ad575671fd3609a60030da
Filesize:
32.19 KB
suspicious functions used:
curl_exec (line:59); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMSAddSave.php-
Full path:
sw333/web/SMSAddSave.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:18 12/12/2025
Last modified:
12:54:48 28/01/2025
MD5 hash:
1a6eaf13aa0ca959fe2dca885b7ffd8e
Filesize:
1.73 KB
suspicious functions used:
curl_exec (line:34); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: sms_deliverey_report.php-
Full path:
sw333/web/sms_deliverey_report.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:19 12/12/2025
Last modified:
12:54:50 28/01/2025
MD5 hash:
03623943da7e9334e137b38c8577fc84
Filesize:
4.25 KB
suspicious functions used:
curl_exec (line:28);curl_exec (line:53);curl_exec (line:90); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: support-action.php-
Full path:
sw333/web/support-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:19 12/12/2025
Last modified:
12:54:50 28/01/2025
MD5 hash:
58556808f93f52486b2ad06998142aa9
Filesize:
14.56 KB
suspicious functions used:
curl_exec (line:220); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tagreeexpayment.php-
Full path:
sw333/web/tagreeexpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:19 12/12/2025
Last modified:
12:54:51 28/01/2025
MD5 hash:
029b4fba649a75c7c81d2f8931be8d63
Filesize:
2.86 KB
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreateagree.php-
Full path:
sw333/web/tcreateagree.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:19 12/12/2025
Last modified:
12:54:51 28/01/2025
MD5 hash:
27a10adf4190edc7eceee8cf74a6b72b
Filesize:
999 B
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreatepayment.php-
Full path:
sw333/web/tcreatepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:19 12/12/2025
Last modified:
12:54:51 28/01/2025
MD5 hash:
e49de9a33f5164bc2c6b88e4770faaff
Filesize:
1.07 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test2.php-
Full path:
sw333/web/test2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:19 12/12/2025
Last modified:
12:54:51 28/01/2025
MD5 hash:
ab80d92ede21b7da59bfefb325484297
Filesize:
13.76 KB
suspicious functions used:
shell_exec (line:59);shell_exec (line:70);shell_exec (line:76);shell_exec (line:88);shell_exec (line:101);shell_exec (line:141);curl_exec (line:187);curl_exec (line:212);curl_exec (line:354); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test6.php-
Full path:
sw333/web/test6.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:19 12/12/2025
Last modified:
12:54:52 28/01/2025
MD5 hash:
f22d022ddc284f4d8e1de3660da91db8
Filesize:
15.61 KB
suspicious functions used:
shell_exec (line:34);shell_exec (line:113);shell_exec (line:126);shell_exec (line:132); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test7.php-
Full path:
sw333/web/test7.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:19 12/12/2025
Last modified:
12:54:52 28/01/2025
MD5 hash:
b11ccf951ce63a21ea0a7328316a0e5c
Filesize:
1.57 KB
suspicious functions used:
curl_exec (line:14); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: testttttt.php-
Full path:
sw333/web/testttttt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:19 12/12/2025
Last modified:
12:54:52 28/01/2025
MD5 hash:
b1988a4be29e191ad935fb409a4174ee
Filesize:
2 KB
suspicious functions used:
curl_exec (line:47); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: texecutepayment.php-
Full path:
sw333/web/texecutepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:19 12/12/2025
Last modified:
12:54:52 28/01/2025
MD5 hash:
623635fdf5c871391d3a5fe99ee8c543
Filesize:
2.91 KB
suspicious functions used:
curl_exec (line:24); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tis-news.php-
Full path:
sw333/web/tis-news.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:19 12/12/2025
Last modified:
12:54:52 28/01/2025
MD5 hash:
ed23ca98b77c5321b4485e85eb2ea64d
Filesize:
3.67 KB
suspicious functions used:
curl_exec (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
sw333/web/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:19 12/12/2025
Last modified:
12:54:52 28/01/2025
MD5 hash:
7d8e71ceda3ffb74623e0c4a814715af
Filesize:
1.53 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tt.php-
Full path:
sw333/web/tt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:19 12/12/2025
Last modified:
12:54:53 28/01/2025
MD5 hash:
9c4ed141cb79fdc7e807b35923c91a20
Filesize:
1.56 KB
suspicious functions used:
curl_exec (line:30); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ttoken.php-
Full path:
sw333/web/ttoken.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:19 12/12/2025
Last modified:
12:54:53 28/01/2025
MD5 hash:
5f2c51c1db5b0defadfb67ce25c0098f
Filesize:
1.54 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook.php-
Full path:
sw333/web/webhook.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:20 12/12/2025
Last modified:
12:54:55 28/01/2025
MD5 hash:
26e2059a39281031d28874b51b52d60c
Filesize:
21.23 KB
suspicious functions used:
base64_decode (line:27);curl_exec (line:38);curl_exec (line:454); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook_cid.php-
Full path:
sw333/web/webhook_cid.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:20 12/12/2025
Last modified:
12:54:55 28/01/2025
MD5 hash:
18c8353c99f0ca2645c68685e40c568b
Filesize:
21.1 KB
suspicious functions used:
base64_decode (line:28);curl_exec (line:39);curl_exec (line:429); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook_test.php-
Full path:
sw333/web/webhook_test.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:20 12/12/2025
Last modified:
12:54:55 28/01/2025
MD5 hash:
74a7dcc262d7fe7f2bdc9e0595d03837
Filesize:
4.69 KB
suspicious functions used:
base64_decode (line:22);curl_exec (line:33);curl_exec (line:86);curl_exec (line:107); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: class.phpmailer.php-
Full path:
sw333/web/email/class.phpmailer.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:20 12/12/2025
Last modified:
12:55:00 28/01/2025
MD5 hash:
68468d69b47fffecc89df57e27c5a781
Filesize:
143.32 KB
suspicious functions used:
`$DKIM_private` (line:428);popen (line:1387);popen (line:1408);base64_decode (line:3410);`$mail->set('SMTPSecure', 'tls');` (line:3688);`$mail->SMTPSecure = 'tls';` (line:3690); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: class.smtp.php-
Full path:
sw333/web/email/class.smtp.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:20 12/12/2025
Last modified:
12:55:00 28/01/2025
MD5 hash:
aa8478329268e5438a4469c268337a10
Filesize:
41.44 KB
suspicious functions used:
base64_decode (line:513);base64_decode (line:533); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: jqgrid.php-
Full path:
sw333/web/inc/jqgrid.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:21 12/12/2025
Last modified:
12:55:11 28/01/2025
MD5 hash:
71027a29e71e0626d8b57cbb631e6d98
Filesize:
23.92 KB
suspicious functions used:
eval (line:397); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: JSON.php-
Full path:
sw333/web/inc/JSON.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:21 12/12/2025
Last modified:
12:55:11 28/01/2025
MD5 hash:
f5a34509e06231308becbe320ade9ff6
Filesize:
33.22 KB
suspicious functions used:
eval (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: smsapicore.php-
Full path:
sw333/web/include/smsapicore.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:22 12/12/2025
Last modified:
12:55:12 28/01/2025
MD5 hash:
6b6257f892846565ef8dee38400afa15
Filesize:
1.24 KB
suspicious functions used:
curl_exec (line:36); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: telegramapicore.php-
Full path:
sw333/web/include/telegramapicore.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:22 12/12/2025
Last modified:
12:55:12 28/01/2025
MD5 hash:
511f56e6dfcf4e9e7a11259e023ca3ae
Filesize:
3.15 KB
suspicious functions used:
curl_exec (line:68); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ui.php-
Full path:
sw333/web/js/tinymce/themes/advanced/skins/highcontrast/ui.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:22 12/12/2025
Last modified:
12:55:35 28/01/2025
MD5 hash:
3edaf67be8573b86686f46bbba4f058c
Filesize:
4.53 KB
suspicious functions used:
curl_exec (line:20);`bill_amount` = '0.00' WHERE bill_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY ` (line:53);`bill_amount` = '0.00', days = '0.00' WHERE entry_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY ` (line:54);`payment` WHERE `pay_date` < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND pay_amount != '0.00' ORDER BY ` (line:55);curl_exec (line:146);curl_exec (line:168); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Changes.txt-
Full path:
sw333/web/js/jqgrid/js/Changes.txt
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:22 12/12/2025
Last modified:
12:55:25 28/01/2025
MD5 hash:
c0a4adbc3f1c6d592cb4fa8433fee9ea
Filesize:
44.32 KB
suspicious functions used:
system (line:87); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
sw333/m/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:22 12/12/2025
Last modified:
12:53:38 28/01/2025
MD5 hash:
849185f307be30eafb1bbef93616d8c3
Filesize:
1.71 KB
suspicious functions used:
curl_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
sw333/m/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:22 12/12/2025
Last modified:
12:53:38 28/01/2025
MD5 hash:
9a3f22521ad987e86f84c4f5f688d5b7
Filesize:
713 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index.php-
Full path:
sw333/m/index.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:22 12/12/2025
Last modified:
13:23:14 28/01/2025
MD5 hash:
fb31139cde48e593eb1008692e0d5de7
Filesize:
16.95 KB
suspicious functions used:
curl_exec (line:298); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index1.php-
Full path:
sw333/m/index1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:22 12/12/2025
Last modified:
12:53:39 28/01/2025
MD5 hash:
dbd325386cd905b7a18b217dda2030f3
Filesize:
13.92 KB
suspicious functions used:
base64_decode (line:8);curl_exec (line:224); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index2.php-
Full path:
sw333/m/index2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:22 12/12/2025
Last modified:
12:53:39 28/01/2025
MD5 hash:
41558736b037228ea93df03cae70eb87
Filesize:
4.31 KB
suspicious functions used:
curl_exec (line:70); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: LoginByPass.php-
Full path:
sw333/m/LoginByPass.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:22 12/12/2025
Last modified:
12:53:39 28/01/2025
MD5 hash:
4deda2bef49c7e4552e5379c86858ddf
Filesize:
4.27 KB
suspicious functions used:
curl_exec (line:41); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec.php-
Full path:
sw333/m/login_exec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:22 12/12/2025
Last modified:
12:53:39 28/01/2025
MD5 hash:
760b107af2f5d6194f97c20ba3ffb86b
Filesize:
11.63 KB
suspicious functions used:
curl_exec (line:24);curl_exec (line:80);curl_exec (line:227); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec1.php-
Full path:
sw333/m/login_exec1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:22 12/12/2025
Last modified:
12:53:39 28/01/2025
MD5 hash:
b7a23f98b3d03b1ecc08218cf01b4aee
Filesize:
6.36 KB
suspicious functions used:
curl_exec (line:115); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec2.php-
Full path:
sw333/m/login_exec2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:22 12/12/2025
Last modified:
12:53:39 28/01/2025
MD5 hash:
46b08782f51ba75b23e27183e06370fe
Filesize:
4.28 KB
suspicious functions used:
curl_exec (line:61); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-helper.php-
Full path:
sw333/m/nagad-helper.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:23 12/12/2025
Last modified:
12:53:40 28/01/2025
MD5 hash:
2bb70c44d68202e0a0cd8ae1388f0b1b
Filesize:
6.74 KB
suspicious functions used:
curl_exec (line:61);base64_decode (line:97); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-merchant-callback.php-
Full path:
sw333/m/nagad-merchant-callback.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:23 12/12/2025
Last modified:
12:53:40 28/01/2025
MD5 hash:
0e6086c5260150c11249029f212ee481
Filesize:
11.36 KB
suspicious functions used:
curl_exec (line:20); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-snmp-data.php-
Full path:
sw333/m/netowrk-snmp-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:23 12/12/2025
Last modified:
12:53:40 28/01/2025
MD5 hash:
45b774abc8d67efb3e4e87c93b1f618b
Filesize:
24.05 KB
suspicious functions used:
shell_exec (line:96);shell_exec (line:105);shell_exec (line:115);shell_exec (line:134);shell_exec (line:146);shell_exec (line:157);shell_exec (line:173);shell_exec (line:183);shell_exec (line:199);shell_exec (line:219);shell_exec (line:229);shell_exec (line:234);shell_exec (line:242);shell_exec (line:262);shell_exec (line:278);`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:291);shell_exec (line:297);shell_exec (line:432); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery.php-
Full path:
sw333/m/PaymentOnlineQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:23 12/12/2025
Last modified:
12:53:41 28/01/2025
MD5 hash:
05d772ea15775c0640ac9d1ff7c7144c
Filesize:
21.13 KB
suspicious functions used:
curl_exec (line:287);curl_exec (line:512); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery2.php-
Full path:
sw333/m/PaymentOnlineQuery2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:23 12/12/2025
Last modified:
12:53:41 28/01/2025
MD5 hash:
3660992067d5591fc79ce89d6dbb9274
Filesize:
19.08 KB
suspicious functions used:
curl_exec (line:41);curl_exec (line:254); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: support-action.php-
Full path:
sw333/m/support-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:23 12/12/2025
Last modified:
12:53:42 28/01/2025
MD5 hash:
2fc6fd844db911a5502a7a6ae383990f
Filesize:
10.31 KB
suspicious functions used:
curl_exec (line:99); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tagreeexpayment.php-
Full path:
sw333/m/tagreeexpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:23 12/12/2025
Last modified:
12:53:43 28/01/2025
MD5 hash:
c95e3ee881752db67b4f3597bc58430a
Filesize:
2.46 KB
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreateagree.php-
Full path:
sw333/m/tcreateagree.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:23 12/12/2025
Last modified:
12:53:43 28/01/2025
MD5 hash:
27a10adf4190edc7eceee8cf74a6b72b
Filesize:
999 B
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreatepayment.php-
Full path:
sw333/m/tcreatepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:23 12/12/2025
Last modified:
12:53:43 28/01/2025
MD5 hash:
e49de9a33f5164bc2c6b88e4770faaff
Filesize:
1.07 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: texecutepayment.php-
Full path:
sw333/m/texecutepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:23 12/12/2025
Last modified:
12:53:43 28/01/2025
MD5 hash:
efbb63dfcfdacb52dec74bffc389bbb3
Filesize:
2.67 KB
suspicious functions used:
curl_exec (line:24); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
sw333/m/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:23 12/12/2025
Last modified:
12:53:43 28/01/2025
MD5 hash:
7d8e71ceda3ffb74623e0c4a814715af
Filesize:
1.53 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ttoken.php-
Full path:
sw333/m/ttoken.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:23 12/12/2025
Last modified:
12:53:43 28/01/2025
MD5 hash:
5f2c51c1db5b0defadfb67ce25c0098f
Filesize:
1.54 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-helper.php-
Full path:
7star/m/nagad-helper.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:24 12/12/2025
Last modified:
01:04:39 07/10/2024
MD5 hash:
2bb70c44d68202e0a0cd8ae1388f0b1b
Filesize:
6.74 KB
suspicious functions used:
curl_exec (line:61);base64_decode (line:97); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery2.php-
Full path:
7star/m/PaymentOnlineQuery2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:24 12/12/2025
Last modified:
01:04:40 07/10/2024
MD5 hash:
3660992067d5591fc79ce89d6dbb9274
Filesize:
19.08 KB
suspicious functions used:
curl_exec (line:41);curl_exec (line:254); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
7star/m/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:24 12/12/2025
Last modified:
01:04:41 07/10/2024
MD5 hash:
7d8e71ceda3ffb74623e0c4a814715af
Filesize:
1.53 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tagreeexpayment.php-
Full path:
7star/m/tagreeexpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:24 12/12/2025
Last modified:
01:04:41 07/10/2024
MD5 hash:
c95e3ee881752db67b4f3597bc58430a
Filesize:
2.46 KB
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ttoken.php-
Full path:
7star/m/ttoken.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:25 12/12/2025
Last modified:
01:04:41 07/10/2024
MD5 hash:
5f2c51c1db5b0defadfb67ce25c0098f
Filesize:
1.54 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
7star/m/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:25 12/12/2025
Last modified:
01:04:37 07/10/2024
MD5 hash:
849185f307be30eafb1bbef93616d8c3
Filesize:
1.71 KB
suspicious functions used:
curl_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: support-action.php-
Full path:
7star/m/support-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:25 12/12/2025
Last modified:
01:04:41 07/10/2024
MD5 hash:
2fc6fd844db911a5502a7a6ae383990f
Filesize:
10.31 KB
suspicious functions used:
curl_exec (line:99); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
7star/m/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:25 12/12/2025
Last modified:
01:04:37 07/10/2024
MD5 hash:
9a3f22521ad987e86f84c4f5f688d5b7
Filesize:
713 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index.php-
Full path:
7star/m/index.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
00:13:16 12/12/2025
Last modified:
01:04:37 07/10/2024
MD5 hash:
9a5dc16d9d603e4fe488b2349f6197a3
Filesize:
12.47 KB
suspicious functions used:
base64_decode (line:10);curl_exec (line:183); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery.php-
Full path:
7star/m/PaymentOnlineQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:25 12/12/2025
Last modified:
01:04:39 07/10/2024
MD5 hash:
f6ec1bb356cff5bce71ccc18bbc81b87
Filesize:
21.15 KB
suspicious functions used:
curl_exec (line:287);curl_exec (line:512); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreateagree.php-
Full path:
7star/m/tcreateagree.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:25 12/12/2025
Last modified:
01:04:41 07/10/2024
MD5 hash:
27a10adf4190edc7eceee8cf74a6b72b
Filesize:
999 B
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec.php-
Full path:
7star/m/login_exec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:25 12/12/2025
Last modified:
01:04:37 07/10/2024
MD5 hash:
1f800365ef270564df77d30c1bfd7ed3
Filesize:
5.4 KB
suspicious functions used:
curl_exec (line:66); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec1.php-
Full path:
7star/m/login_exec1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:25 12/12/2025
Last modified:
01:04:38 07/10/2024
MD5 hash:
46b08782f51ba75b23e27183e06370fe
Filesize:
4.28 KB
suspicious functions used:
curl_exec (line:61); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-merchant-callback.php-
Full path:
7star/m/nagad-merchant-callback.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:26 12/12/2025
Last modified:
01:04:39 07/10/2024
MD5 hash:
e48843f21f89612ef44c10150c547139
Filesize:
11.76 KB
suspicious functions used:
curl_exec (line:20); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreatepayment.php-
Full path:
7star/m/tcreatepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:26 12/12/2025
Last modified:
01:04:41 07/10/2024
MD5 hash:
e49de9a33f5164bc2c6b88e4770faaff
Filesize:
1.07 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-snmp-data.php-
Full path:
7star/m/netowrk-snmp-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:26 12/12/2025
Last modified:
01:04:39 07/10/2024
MD5 hash:
b56429056656f0de16982e31853f3304
Filesize:
20.26 KB
suspicious functions used:
shell_exec (line:93);shell_exec (line:102);shell_exec (line:112);shell_exec (line:131);shell_exec (line:141);shell_exec (line:157);shell_exec (line:177);shell_exec (line:187);shell_exec (line:192);shell_exec (line:200);shell_exec (line:220);shell_exec (line:236);`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:249);shell_exec (line:255);shell_exec (line:377); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: texecutepayment.php-
Full path:
7star/m/texecutepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:26 12/12/2025
Last modified:
01:04:41 07/10/2024
MD5 hash:
efbb63dfcfdacb52dec74bffc389bbb3
Filesize:
2.67 KB
suspicious functions used:
curl_exec (line:24); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: billpaycheck.php-
Full path:
7star/web/bkash/billpaycheck.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:26 12/12/2025
Last modified:
01:06:05 07/10/2024
MD5 hash:
38c46efc36b25628fa18bd92ae135af9
Filesize:
796 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
7star/web/bkash/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:26 12/12/2025
Last modified:
01:06:06 07/10/2024
MD5 hash:
6175301f744b22b7db70ba598a991f8b
Filesize:
1.64 KB
suspicious functions used:
curl_exec (line:36); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
7star/web/bkash/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:26 12/12/2025
Last modified:
01:06:06 07/10/2024
MD5 hash:
19be365d26141eaecead7ef0ada0e75c
Filesize:
1.3 KB
suspicious functions used:
curl_exec (line:31); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: grant.php-
Full path:
7star/web/bkash/grant.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:26 12/12/2025
Last modified:
01:06:07 07/10/2024
MD5 hash:
da5499d260dc78ea4fcd71227cc6c484
Filesize:
2.01 KB
suspicious functions used:
curl_exec (line:41);curl_exec (line:63); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: query.php-
Full path:
7star/web/bkash/query.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:26 12/12/2025
Last modified:
01:06:06 07/10/2024
MD5 hash:
f3ed9045f3a073e2cdc8561d500bda89
Filesize:
1.65 KB
suspicious functions used:
curl_exec (line:33); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tagreeexpayment.php-
Full path:
7star/web/bkash/tagreeexpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:26 12/12/2025
Last modified:
01:06:06 07/10/2024
MD5 hash:
a1ba7d36003f72e593615aa32e44acb9
Filesize:
1.58 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreateagree.php-
Full path:
7star/web/bkash/tcreateagree.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:26 12/12/2025
Last modified:
01:06:06 07/10/2024
MD5 hash:
8ae6bdc9f3d4b0cdcf651701a0d9ebab
Filesize:
1.2 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreatepayment.php-
Full path:
7star/web/bkash/tcreatepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:26 12/12/2025
Last modified:
01:06:06 07/10/2024
MD5 hash:
3c978def6cffa0a8db5e86ce127caae6
Filesize:
1.35 KB
suspicious functions used:
curl_exec (line:29); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: texecutepayment.php-
Full path:
7star/web/bkash/texecutepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:26 12/12/2025
Last modified:
01:06:06 07/10/2024
MD5 hash:
d8f24df64623da3cfc2baf48f184a3d1
Filesize:
1.21 KB
suspicious functions used:
curl_exec (line:25); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
7star/web/bkash/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:26 12/12/2025
Last modified:
01:06:06 07/10/2024
MD5 hash:
f50b33eeb31927b2c081195618d48b8d
Filesize:
1.88 KB
suspicious functions used:
curl_exec (line:48); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tokent.php-
Full path:
7star/web/bkash/tokent.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:26 12/12/2025
Last modified:
01:06:06 07/10/2024
MD5 hash:
890a9e9fb1be75f31a6daad8811c1ff9
Filesize:
1.9 KB
suspicious functions used:
curl_exec (line:48); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: trxID.php-
Full path:
7star/web/bkash/trxID.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:26 12/12/2025
Last modified:
01:06:06 07/10/2024
MD5 hash:
9bcb8e70728fd25807c4db8916166d74
Filesize:
1.44 KB
suspicious functions used:
curl_exec (line:31); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
7star/web/bkasht/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:26 12/12/2025
Last modified:
01:06:07 07/10/2024
MD5 hash:
a4ba6e7683f558dc3602dacd7ddeded2
Filesize:
1.36 KB
suspicious functions used:
curl_exec (line:29); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
7star/web/bkasht/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:26 12/12/2025
Last modified:
01:06:07 07/10/2024
MD5 hash:
aad462fbca9f9a36649a197d67403098
Filesize:
1.27 KB
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: grant.php-
Full path:
7star/web/bkasht/grant.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:26 12/12/2025
Last modified:
01:06:07 07/10/2024
MD5 hash:
da5499d260dc78ea4fcd71227cc6c484
Filesize:
2.01 KB
suspicious functions used:
curl_exec (line:41);curl_exec (line:63); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: query.php-
Full path:
7star/web/bkasht/query.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:26 12/12/2025
Last modified:
01:06:07 07/10/2024
MD5 hash:
f3ed9045f3a073e2cdc8561d500bda89
Filesize:
1.65 KB
suspicious functions used:
curl_exec (line:33); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
7star/web/bkasht/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:26 12/12/2025
Last modified:
01:06:07 07/10/2024
MD5 hash:
f50b33eeb31927b2c081195618d48b8d
Filesize:
1.88 KB
suspicious functions used:
curl_exec (line:48); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: trxID.php-
Full path:
7star/web/bkasht/trxID.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:26 12/12/2025
Last modified:
01:06:07 07/10/2024
MD5 hash:
9bcb8e70728fd25807c4db8916166d74
Filesize:
1.44 KB
suspicious functions used:
curl_exec (line:31); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: class.phpmailer.php-
Full path:
7star/web/email/class.phpmailer.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:26 12/12/2025
Last modified:
01:06:09 07/10/2024
MD5 hash:
68468d69b47fffecc89df57e27c5a781
Filesize:
143.32 KB
suspicious functions used:
`$DKIM_private` (line:428);popen (line:1387);popen (line:1408);base64_decode (line:3410);`$mail->set('SMTPSecure', 'tls');` (line:3688);`$mail->SMTPSecure = 'tls';` (line:3690); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: class.smtp.php-
Full path:
7star/web/email/class.smtp.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:26 12/12/2025
Last modified:
01:06:09 07/10/2024
MD5 hash:
aa8478329268e5438a4469c268337a10
Filesize:
41.44 KB
suspicious functions used:
base64_decode (line:513);base64_decode (line:533); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: JSON.php-
Full path:
7star/web/inc/JSON.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:27 12/12/2025
Last modified:
01:06:18 07/10/2024
MD5 hash:
f5a34509e06231308becbe320ade9ff6
Filesize:
33.22 KB
suspicious functions used:
eval (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: jqgrid.php-
Full path:
7star/web/inc/jqgrid.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:27 12/12/2025
Last modified:
01:06:18 07/10/2024
MD5 hash:
71027a29e71e0626d8b57cbb631e6d98
Filesize:
23.92 KB
suspicious functions used:
eval (line:397); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: smsapicore.php-
Full path:
7star/web/include/smsapicore.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:27 12/12/2025
Last modified:
01:06:19 07/10/2024
MD5 hash:
6b6257f892846565ef8dee38400afa15
Filesize:
1.24 KB
suspicious functions used:
curl_exec (line:36); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: telegramapicore.php-
Full path:
7star/web/include/telegramapicore.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:27 12/12/2025
Last modified:
01:06:19 07/10/2024
MD5 hash:
535fa7aac83b0e1ba56be7837348b6d9
Filesize:
2.9 KB
suspicious functions used:
curl_exec (line:63); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Changes.txt-
Full path:
7star/web/js/jqgrid/js/Changes.txt
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:27 12/12/2025
Last modified:
01:06:41 07/10/2024
MD5 hash:
c0a4adbc3f1c6d592cb4fa8433fee9ea
Filesize:
44.32 KB
suspicious functions used:
system (line:87); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ui.php-
Full path:
7star/web/js/tinymce/themes/advanced/skins/highcontrast/ui.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:27 12/12/2025
Last modified:
01:06:56 07/10/2024
MD5 hash:
3edaf67be8573b86686f46bbba4f058c
Filesize:
4.53 KB
suspicious functions used:
curl_exec (line:20);`bill_amount` = '0.00' WHERE bill_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY ` (line:53);`bill_amount` = '0.00', days = '0.00' WHERE entry_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY ` (line:54);`payment` WHERE `pay_date` < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND pay_amount != '0.00' ORDER BY ` (line:55);curl_exec (line:146);curl_exec (line:168); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: AutoActiveClientsCount1.php-
Full path:
7star/web/AutoActiveClientsCount1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:28 12/12/2025
Last modified:
01:04:58 07/10/2024
MD5 hash:
fb443f2f93781a8fffce803317592c41
Filesize:
6.12 KB
suspicious functions used:
system (line:56); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: AutoActiveClientsCount11.php-
Full path:
7star/web/AutoActiveClientsCount11.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:28 12/12/2025
Last modified:
01:04:58 07/10/2024
MD5 hash:
a0090e4a11dd59b955a6edd549b6ef2f
Filesize:
5.85 KB
suspicious functions used:
system (line:54); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ClientsOnMap.php-
Full path:
7star/web/ClientsOnMap.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:28 12/12/2025
Last modified:
06:02:54 10/11/2025
MD5 hash:
519edcd6a9ccec3397e6f5280db00605
Filesize:
12.2 KB
suspicious functions used:
`${totalonline}` (line:97);`${totaloffline}` (line:98);`${results.rxPower}` (line:233);`${results.distance}` (line:234);`${results.supplyVoltage}` (line:235);`${results.temperature}` (line:236);`${results.txPower}` (line:237); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients.php-
Full path:
7star/web/Clients.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:30 12/12/2025
Last modified:
01:05:09 07/10/2024
MD5 hash:
cce70a16182131b7ddfd249d0a96e4b2
Filesize:
179.48 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:832); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients2.php-
Full path:
7star/web/Clients2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:30 12/12/2025
Last modified:
01:05:09 07/10/2024
MD5 hash:
18ecbde013099985817801da6dffb913
Filesize:
205.13 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:832); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients3.php-
Full path:
7star/web/Clients3.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:31 12/12/2025
Last modified:
01:05:10 07/10/2024
MD5 hash:
50ddc869b383ab76e009c7a2c17c99a3
Filesize:
175.31 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:832); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: InstrumentsStoreOutDetails.php-
Full path:
7star/web/InstrumentsStoreOutDetails.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:32 12/12/2025
Last modified:
01:05:19 07/10/2024
MD5 hash:
a60c19f766bfff1ccdccbeba6b39eb87
Filesize:
9.37 KB
suspicious functions used:
`update_date`, '%D-%b, %y') AS offdate, TIME_FORMAT(`update_time`, '%T') AS offtime FROM `con_sts_log` WHERE `c_id` = '{$row['c_id']}' AND con_sts = 'Inactive' ORDER BY ` (line:120); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkLoad.php-
Full path:
7star/web/NetworkLoad.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:32 12/12/2025
Last modified:
01:05:32 07/10/2024
MD5 hash:
e1632e66ee1b7394d3fb82751b924abe
Filesize:
2.83 KB
suspicious functions used:
system (line:81); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Network.php-
Full path:
7star/web/Network.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:32 12/12/2025
Last modified:
01:05:30 07/10/2024
MD5 hash:
95538a99be346cda228bc6d316a2c035
Filesize:
56.21 KB
suspicious functions used:
system (line:357);shell_exec (line:619); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Network1.php-
Full path:
7star/web/Network1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:32 12/12/2025
Last modified:
01:05:31 07/10/2024
MD5 hash:
0154c16125cee7431f537bf69c4ef811
Filesize:
44.04 KB
suspicious functions used:
system (line:295);shell_exec (line:590); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMS.php-
Full path:
7star/web/SMS.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:33 12/12/2025
Last modified:
01:05:51 07/10/2024
MD5 hash:
037ab9f404720089c7ea201af4c9ae5e
Filesize:
36.27 KB
suspicious functions used:
curl_exec (line:56); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMS1.php-
Full path:
7star/web/SMS1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:33 12/12/2025
Last modified:
01:05:52 07/10/2024
MD5 hash:
e4671dadf9ad575671fd3609a60030da
Filesize:
32.19 KB
suspicious functions used:
curl_exec (line:59); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkLoad1.php-
Full path:
7star/web/NetworkLoad1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:33 12/12/2025
Last modified:
01:05:32 07/10/2024
MD5 hash:
176bd6931be34d7ef351d22897accc65
Filesize:
759 B
suspicious functions used:
system (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltAddQuery.php-
Full path:
7star/web/NetworkOltAddQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:33 12/12/2025
Last modified:
01:05:32 07/10/2024
MD5 hash:
6a2bcd7cf57fcd926ee3551ec5d8ab3f
Filesize:
6.3 KB
suspicious functions used:
shell_exec (line:21); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltOnuStatus.php-
Full path:
7star/web/NetworkOltOnuStatus.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:33 12/12/2025
Last modified:
01:05:32 07/10/2024
MD5 hash:
a559ddf02b126f7a42e5192438c72844
Filesize:
55.83 KB
suspicious functions used:
shell_exec (line:42);shell_exec (line:100);shell_exec (line:520);shell_exec (line:635);shell_exec (line:748); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltOnuStatus2.php-
Full path:
7star/web/NetworkOltOnuStatus2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:33 12/12/2025
Last modified:
01:05:33 07/10/2024
MD5 hash:
c9a14797fa4353d05bbd9427b6079250
Filesize:
15.88 KB
suspicious functions used:
shell_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery.php-
Full path:
7star/web/PaymentOnlineQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:34 12/12/2025
Last modified:
01:05:42 07/10/2024
MD5 hash:
acba20210255ae397259ccbd9db4d639
Filesize:
28.5 KB
suspicious functions used:
curl_exec (line:456);curl_exec (line:688); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery2.php-
Full path:
7star/web/PaymentOnlineQuery2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:34 12/12/2025
Last modified:
01:05:43 07/10/2024
MD5 hash:
ccd315d11a60901b7b9029ff44f8351b
Filesize:
19.4 KB
suspicious functions used:
curl_exec (line:42);curl_exec (line:252); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentWebhook.php-
Full path:
7star/web/PaymentWebhook.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:34 12/12/2025
Last modified:
01:05:43 07/10/2024
MD5 hash:
a2f322c94787630ab1e0c8ca35fc5ba1
Filesize:
18.6 KB
suspicious functions used:
base64_decode (line:30);curl_exec (line:41);curl_exec (line:422); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeMap.php-
Full path:
7star/web/NetworkTreeMap.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:34 12/12/2025
Last modified:
01:05:35 07/10/2024
MD5 hash:
ad98830dbb79a94d0d9588b9c0e3f027
Filesize:
22.15 KB
suspicious functions used:
`${results.rxPower}` (line:230);`${results.distance}` (line:231);`${results.supplyVoltage}` (line:232);`${results.temperature}` (line:233);`${results.txPower}` (line:234); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeMap1.php-
Full path:
7star/web/NetworkTreeMap1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:34 12/12/2025
Last modified:
01:05:35 07/10/2024
MD5 hash:
7283b6f0717758b1824973b76acf4c04
Filesize:
10.58 KB
suspicious functions used:
`${totalonline}` (line:97);`${totaloffline}` (line:98); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SignUp1.php-
Full path:
7star/web/SignUp1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:35 12/12/2025
Last modified:
01:05:51 07/10/2024
MD5 hash:
3f7943dd155c8e0a383b7d02730f8c11
Filesize:
24.59 KB
suspicious functions used:
curl_exec (line:33);curl_exec (line:59); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMSAddSave.php-
Full path:
7star/web/SMSAddSave.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:35 12/12/2025
Last modified:
01:05:52 07/10/2024
MD5 hash:
1a6eaf13aa0ca959fe2dca885b7ffd8e
Filesize:
1.73 KB
suspicious functions used:
curl_exec (line:34); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-countt.php-
Full path:
7star/web/network-olt-client-onu-mac-countt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:36 12/12/2025
Last modified:
01:05:29 07/10/2024
MD5 hash:
d29b4e72c375f528b769bd3894f9f0e7
Filesize:
8.95 KB
suspicious functions used:
shell_exec (line:26);shell_exec (line:36);shell_exec (line:59);shell_exec (line:75);shell_exec (line:92);shell_exec (line:102);shell_exec (line:117);shell_exec (line:155);shell_exec (line:206);shell_exec (line:262);shell_exec (line:275);shell_exec (line:288); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: client-online-mbb.php-
Full path:
7star/web/client-online-mbb.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:36 12/12/2025
Last modified:
01:05:04 07/10/2024
MD5 hash:
69c51efb5b9017a07a7158b4a63f3826
Filesize:
14.32 KB
suspicious functions used:
curl_exec (line:90); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: clients-nots-action.php-
Full path:
7star/web/clients-nots-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:36 12/12/2025
Last modified:
01:05:07 07/10/2024
MD5 hash:
dff1bb495509427d098cb4588da553b9
Filesize:
5.89 KB
suspicious functions used:
curl_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: getclientuptime.php-
Full path:
7star/web/getclientuptime.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:36 12/12/2025
Last modified:
01:05:19 07/10/2024
MD5 hash:
bbc14cdd451c72b94d78c7d2d1af0b52
Filesize:
718 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: company_info.php-
Full path:
7star/web/company_info.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
06:27:06 12/12/2025
Last modified:
01:05:15 07/10/2024
MD5 hash:
e612d58aa2e38f5b49ba37c1bf620ece
Filesize:
8.38 KB
suspicious functions used:
curl_exec (line:130); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
7star/web/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:36 12/12/2025
Last modified:
01:05:15 07/10/2024
MD5 hash:
ba9747d0421fd091b998389469e72a0b
Filesize:
1.7 KB
suspicious functions used:
curl_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_all.php-
Full path:
7star/web/cron_all.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:36 12/12/2025
Last modified:
01:05:15 07/10/2024
MD5 hash:
967f1d654ae891609da26b9e0fdbd1ae
Filesize:
2.44 KB
suspicious functions used:
curl_exec (line:23);curl_exec (line:38);curl_exec (line:53); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_gen_bill.php-
Full path:
7star/web/cron_auto_gen_bill.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:36 12/12/2025
Last modified:
01:05:15 07/10/2024
MD5 hash:
f1056618cc4402968e50d1232d2c51c8
Filesize:
4.73 KB
suspicious functions used:
curl_exec (line:140);curl_exec (line:149); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: imagevwr.php-
Full path:
7star/web/imagevwr.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:36 12/12/2025
Last modified:
01:05:19 07/10/2024
MD5 hash:
47a223a13cc642d01dcfaaca542d396d
Filesize:
915 B
suspicious functions used:
curl_exec (line:15); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive.php-
Full path:
7star/web/cron_auto_inactive.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:36 12/12/2025
Last modified:
01:05:15 07/10/2024
MD5 hash:
7e0dc4dd9dae2bf0220516641b53c027
Filesize:
5.43 KB
suspicious functions used:
curl_exec (line:142); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive2.php-
Full path:
7star/web/cron_auto_inactive2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:36 12/12/2025
Last modified:
01:05:15 07/10/2024
MD5 hash:
440bc24f05b01eb395df63fff2f60de9
Filesize:
5.46 KB
suspicious functions used:
curl_exec (line:142); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: emp_salary_advence_find.php-
Full path:
7star/web/emp_salary_advence_find.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:36 12/12/2025
Last modified:
01:05:17 07/10/2024
MD5 hash:
74a7e2ffda0f7584611d7cbce6136c24
Filesize:
2.25 KB
suspicious functions used:
`expanse` WHERE `type` = '2' AND `status` = '2' AND ex_by = '$e_id' AND MONTH(`, `) = MONTH('$lastmonth') AND YEAR(`, `) = YEAR('$lastmonth') GROUP BY ` (line:8);`e_id` = '$e_id' AND ` (line:12); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive_termination.php-
Full path:
7star/web/cron_auto_inactive_termination.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:36 12/12/2025
Last modified:
01:05:15 07/10/2024
MD5 hash:
9f9c8ca9110c2304128646824bfb17db
Filesize:
12.16 KB
suspicious functions used:
curl_exec (line:241);curl_exec (line:253); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive_termination1.php-
Full path:
7star/web/cron_auto_inactive_termination1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:36 12/12/2025
Last modified:
01:05:15 07/10/2024
MD5 hash:
be76b964c93a2cb4fa7e632750ff3bc4
Filesize:
6.64 KB
suspicious functions used:
curl_exec (line:156);curl_exec (line:168); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_termination_remainder1.php-
Full path:
7star/web/cron_auto_termination_remainder1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:36 12/12/2025
Last modified:
01:05:15 07/10/2024
MD5 hash:
7765f9f820dbd402f1064fab9958ffaa
Filesize:
3.26 KB
suspicious functions used:
curl_exec (line:83); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
7star/web/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:36 12/12/2025
Last modified:
01:05:17 07/10/2024
MD5 hash:
c46a50905333286f45dfeacf010851ab
Filesize:
716 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_client_bandwidth_count.php-
Full path:
7star/web/cron_client_bandwidth_count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:36 12/12/2025
Last modified:
01:05:15 07/10/2024
MD5 hash:
8be5ba5d539d73a8f197195f7748e1cc
Filesize:
4.7 KB
suspicious functions used:
curl_exec (line:125); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_network.php-
Full path:
7star/web/cron_network.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:36 12/12/2025
Last modified:
01:05:15 07/10/2024
MD5 hash:
1a75ea6c2e0cc5b9263541dda62ab458
Filesize:
4.61 KB
suspicious functions used:
curl_exec (line:45);curl_exec (line:67); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_olt.php-
Full path:
7star/web/cron_olt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:36 12/12/2025
Last modified:
01:05:15 07/10/2024
MD5 hash:
d83092bb263aaa93da2bb8cddab2a0d1
Filesize:
3.7 KB
suspicious functions used:
shell_exec (line:44); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_olt_user.php-
Full path:
7star/web/cron_olt_user.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:36 12/12/2025
Last modified:
01:05:15 07/10/2024
MD5 hash:
67aa237639e3d1e6064e76079bb3cccc
Filesize:
1.97 KB
suspicious functions used:
curl_exec (line:19);curl_exec (line:46); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index.php-
Full path:
7star/web/index.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
06:27:06 12/12/2025
Last modified:
01:05:19 07/10/2024
MD5 hash:
f161ab23adf4527023a0ad582d478f89
Filesize:
12.45 KB
suspicious functions used:
base64_decode (line:10);curl_exec (line:183); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-count.php-
Full path:
7star/web/network-olt-client-onu-mac-count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:36 12/12/2025
Last modified:
01:05:29 07/10/2024
MD5 hash:
230b73ec563f5d0ae6c1f1c2750b9165
Filesize:
13.57 KB
suspicious functions used:
shell_exec (line:25);shell_exec (line:35);shell_exec (line:58);shell_exec (line:74);shell_exec (line:91);shell_exec (line:101);shell_exec (line:117);shell_exec (line:158);shell_exec (line:218);shell_exec (line:294);shell_exec (line:361);shell_exec (line:423);shell_exec (line:442);shell_exec (line:461); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-con-sts.php-
Full path:
7star/web/network-olt-con-sts.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:36 12/12/2025
Last modified:
01:05:29 07/10/2024
MD5 hash:
90f26ad5760637c0e00541724949a8ca
Filesize:
2.55 KB
suspicious functions used:
`olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:13);shell_exec (line:41); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ip-ping-checker.php-
Full path:
7star/web/ip-ping-checker.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:37 12/12/2025
Last modified:
01:05:21 07/10/2024
MD5 hash:
0d28f3053b73b3fe2885cf519ee17c12
Filesize:
2.64 KB
suspicious functions used:
curl_exec (line:81); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec.php-
Full path:
7star/web/login_exec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:37 12/12/2025
Last modified:
01:05:22 07/10/2024
MD5 hash:
9038a77a32a5db2c9affae1496473f3e
Filesize:
5.27 KB
suspicious functions used:
curl_exec (line:62); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: loginexec.php-
Full path:
7star/web/loginexec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:37 12/12/2025
Last modified:
01:05:22 07/10/2024
MD5 hash:
edb8017e7d0f8e037facbcacc94a383d
Filesize:
5.91 KB
suspicious functions used:
curl_exec (line:67); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-helper.php-
Full path:
7star/web/nagad-helper.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:37 12/12/2025
Last modified:
01:05:29 07/10/2024
MD5 hash:
2bb70c44d68202e0a0cd8ae1388f0b1b
Filesize:
6.74 KB
suspicious functions used:
curl_exec (line:61);base64_decode (line:97); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-merchant-callback.php-
Full path:
7star/web/nagad-merchant-callback.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:37 12/12/2025
Last modified:
01:05:29 07/10/2024
MD5 hash:
6e2beb96e88da50419677884ab75ddcf
Filesize:
16.92 KB
suspicious functions used:
curl_exec (line:20); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-load.php-
Full path:
7star/web/network-olt-load.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:37 12/12/2025
Last modified:
01:05:29 07/10/2024
MD5 hash:
f49d5153285c639ed91d4e806685ee56
Filesize:
1.33 KB
suspicious functions used:
shell_exec (line:22);shell_exec (line:25); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-snmp-data.php-
Full path:
7star/web/netowrk-snmp-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:37 12/12/2025
Last modified:
01:05:29 07/10/2024
MD5 hash:
5c2a24846ceedde7d40cf9ec2b8a5ac8
Filesize:
23.84 KB
suspicious functions used:
shell_exec (line:96);shell_exec (line:105);shell_exec (line:115);shell_exec (line:134);shell_exec (line:146);shell_exec (line:157);shell_exec (line:175);shell_exec (line:185);shell_exec (line:201);shell_exec (line:221);shell_exec (line:231);shell_exec (line:236);shell_exec (line:244);shell_exec (line:264);shell_exec (line:280);`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:293);shell_exec (line:299);shell_exec (line:434); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-oid-check.php-
Full path:
7star/web/network-olt-oid-check.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:37 12/12/2025
Last modified:
01:05:29 07/10/2024
MD5 hash:
5b7dc0ce1103fbfc895873c250b63141
Filesize:
1.88 KB
suspicious functions used:
shell_exec (line:33); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-old-onu-rx.php-
Full path:
7star/web/network-old-onu-rx.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:37 12/12/2025
Last modified:
01:05:29 07/10/2024
MD5 hash:
b4962c160c5ad68ccd8eed9c48d82a0f
Filesize:
6.94 KB
suspicious functions used:
shell_exec (line:76); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-count.php-
Full path:
7star/web/network-olt-onu-count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:37 12/12/2025
Last modified:
01:05:29 07/10/2024
MD5 hash:
f3abe7a3ec7f2cb1e82ba52e81149273
Filesize:
5.18 KB
suspicious functions used:
`olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:11);shell_exec (line:65); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-count-cdata.php-
Full path:
7star/web/network-olt-client-onu-mac-count-cdata.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:37 12/12/2025
Last modified:
01:05:29 07/10/2024
MD5 hash:
c378dbabf36066c335cfb8838a6e167d
Filesize:
4.58 KB
suspicious functions used:
shell_exec (line:25);shell_exec (line:35);shell_exec (line:56);shell_exec (line:103);shell_exec (line:115);shell_exec (line:126);shell_exec (line:140); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-list-data.php-
Full path:
7star/web/network-olt-onu-list-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:37 12/12/2025
Last modified:
01:05:29 07/10/2024
MD5 hash:
54cc9417c766c31317311c3722ce7d4b
Filesize:
9.48 KB
suspicious functions used:
shell_exec (line:24);shell_exec (line:38);shell_exec (line:64);shell_exec (line:85);shell_exec (line:104);shell_exec (line:125);shell_exec (line:143);shell_exec (line:153);shell_exec (line:165);shell_exec (line:185); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-clients-search.php-
Full path:
7star/web/network-olt-pon-clients-search.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:37 12/12/2025
Last modified:
01:05:29 07/10/2024
MD5 hash:
79d26fc66abdab6f173330588aa8b238
Filesize:
10.93 KB
suspicious functions used:
shell_exec (line:42);shell_exec (line:51);shell_exec (line:104);shell_exec (line:168); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search-bdcom.php-
Full path:
7star/web/network-olt-pon-onu-search-bdcom.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:37 12/12/2025
Last modified:
01:05:29 07/10/2024
MD5 hash:
87fa62ee6cd31d59445e54202126aae8
Filesize:
16.92 KB
suspicious functions used:
shell_exec (line:54);shell_exec (line:63);shell_exec (line:170); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search-bdcom1.php-
Full path:
7star/web/network-olt-pon-onu-search-bdcom1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:37 12/12/2025
Last modified:
01:05:30 07/10/2024
MD5 hash:
dd18677b1dcbf7f0bce2ac6912d98da0
Filesize:
9.6 KB
suspicious functions used:
shell_exec (line:42);shell_exec (line:51);shell_exec (line:129); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search.php-
Full path:
7star/web/network-olt-pon-onu-search.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:37 12/12/2025
Last modified:
01:05:30 07/10/2024
MD5 hash:
2852e806dcf69c0a3e2a021b86300289
Filesize:
8.75 KB
suspicious functions used:
shell_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook.php-
Full path:
7star/web/webhook.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:37 12/12/2025
Last modified:
01:06:03 07/10/2024
MD5 hash:
26e2059a39281031d28874b51b52d60c
Filesize:
21.23 KB
suspicious functions used:
base64_decode (line:27);curl_exec (line:38);curl_exec (line:454); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data-bdcom.php-
Full path:
7star/web/network-snmp-onu-status-data-bdcom.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:37 12/12/2025
Last modified:
01:05:30 07/10/2024
MD5 hash:
a6ba20417ea6d39db89d0ce19a5244e5
Filesize:
20.8 KB
suspicious functions used:
shell_exec (line:48);shell_exec (line:73);shell_exec (line:85);shell_exec (line:103);shell_exec (line:116);shell_exec (line:128);shell_exec (line:134);shell_exec (line:159);shell_exec (line:172);shell_exec (line:184);shell_exec (line:190); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tagreeexpayment.php-
Full path:
7star/web/tagreeexpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:37 12/12/2025
Last modified:
01:05:58 07/10/2024
MD5 hash:
029b4fba649a75c7c81d2f8931be8d63
Filesize:
2.86 KB
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data.php-
Full path:
7star/web/network-snmp-onu-status-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:37 12/12/2025
Last modified:
01:05:30 07/10/2024
MD5 hash:
0adfee384bf349b50f11036947fd2a74
Filesize:
30.37 KB
suspicious functions used:
shell_exec (line:38);`olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:42);shell_exec (line:81);shell_exec (line:95);shell_exec (line:109);shell_exec (line:122);shell_exec (line:208);shell_exec (line:429);shell_exec (line:441);shell_exec (line:448); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreateagree.php-
Full path:
7star/web/tcreateagree.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:37 12/12/2025
Last modified:
01:05:58 07/10/2024
MD5 hash:
27a10adf4190edc7eceee8cf74a6b72b
Filesize:
999 B
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data1.php-
Full path:
7star/web/network-snmp-onu-status-data1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:37 12/12/2025
Last modified:
01:05:30 07/10/2024
MD5 hash:
920bd1a592c36f7a1194b737642f8340
Filesize:
15.96 KB
suspicious functions used:
shell_exec (line:33);`olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:37);shell_exec (line:149); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook_cid.php-
Full path:
7star/web/webhook_cid.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:37 12/12/2025
Last modified:
01:06:03 07/10/2024
MD5 hash:
18c8353c99f0ca2645c68685e40c568b
Filesize:
21.1 KB
suspicious functions used:
base64_decode (line:28);curl_exec (line:39);curl_exec (line:429); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data_vsol2.php-
Full path:
7star/web/network-snmp-onu-status-data_vsol2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:37 12/12/2025
Last modified:
01:05:30 07/10/2024
MD5 hash:
f22d022ddc284f4d8e1de3660da91db8
Filesize:
15.61 KB
suspicious functions used:
shell_exec (line:34);shell_exec (line:113);shell_exec (line:126);shell_exec (line:132); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test6.php-
Full path:
7star/web/test6.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:37 12/12/2025
Last modified:
01:05:58 07/10/2024
MD5 hash:
f22d022ddc284f4d8e1de3660da91db8
Filesize:
15.61 KB
suspicious functions used:
shell_exec (line:34);shell_exec (line:113);shell_exec (line:126);shell_exec (line:132); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook_test.php-
Full path:
7star/web/webhook_test.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:37 12/12/2025
Last modified:
01:06:03 07/10/2024
MD5 hash:
74a7dcc262d7fe7f2bdc9e0595d03837
Filesize:
4.69 KB
suspicious functions used:
base64_decode (line:22);curl_exec (line:33);curl_exec (line:86);curl_exec (line:107); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: testttttt.php-
Full path:
7star/web/testttttt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:37 12/12/2025
Last modified:
01:05:59 07/10/2024
MD5 hash:
b1988a4be29e191ad935fb409a4174ee
Filesize:
2 KB
suspicious functions used:
curl_exec (line:47); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: texecutepayment.php-
Full path:
7star/web/texecutepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:37 12/12/2025
Last modified:
01:05:59 07/10/2024
MD5 hash:
623635fdf5c871391d3a5fe99ee8c543
Filesize:
2.91 KB
suspicious functions used:
curl_exec (line:24); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreatepayment.php-
Full path:
7star/web/tcreatepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:37 12/12/2025
Last modified:
01:05:58 07/10/2024
MD5 hash:
e49de9a33f5164bc2c6b88e4770faaff
Filesize:
1.07 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tis-news.php-
Full path:
7star/web/tis-news.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:37 12/12/2025
Last modified:
01:05:59 07/10/2024
MD5 hash:
ed23ca98b77c5321b4485e85eb2ea64d
Filesize:
3.67 KB
suspicious functions used:
curl_exec (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree-olt-onu-list-data.php-
Full path:
7star/web/networktree-olt-onu-list-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:37 12/12/2025
Last modified:
01:05:33 07/10/2024
MD5 hash:
af4221fefa9c9051846a063ac4135560
Filesize:
8.72 KB
suspicious functions used:
shell_exec (line:24);shell_exec (line:36);shell_exec (line:59);shell_exec (line:78);shell_exec (line:97);shell_exec (line:116);shell_exec (line:134);shell_exec (line:143);shell_exec (line:155);shell_exec (line:175); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test2.php-
Full path:
7star/web/test2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:37 12/12/2025
Last modified:
01:05:58 07/10/2024
MD5 hash:
6f91faae4c90c36b5fba91f12da5c7c7
Filesize:
7.18 KB
suspicious functions used:
shell_exec (line:51);shell_exec (line:62);shell_exec (line:68);shell_exec (line:80);shell_exec (line:93);shell_exec (line:133);curl_exec (line:175); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test3.php-
Full path:
7star/web/test3.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:37 12/12/2025
Last modified:
01:05:58 07/10/2024
MD5 hash:
47feeaa9a827160ac4e6faff04aa57cd
Filesize:
3.95 KB
suspicious functions used:
shell_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_pon_check.php-
Full path:
7star/web/networktree_device_pon_check.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:37 12/12/2025
Last modified:
01:05:35 07/10/2024
MD5 hash:
5f3a44ead0f078d43e65b05632303e32
Filesize:
576 B
suspicious functions used:
`pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '$olt_id' AND ` (line:5); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
7star/web/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:37 12/12/2025
Last modified:
01:05:59 07/10/2024
MD5 hash:
7d8e71ceda3ffb74623e0c4a814715af
Filesize:
1.53 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tt.php-
Full path:
7star/web/tt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:37 12/12/2025
Last modified:
01:06:00 07/10/2024
MD5 hash:
9c4ed141cb79fdc7e807b35923c91a20
Filesize:
1.56 KB
suspicious functions used:
curl_exec (line:30); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ttoken.php-
Full path:
7star/web/ttoken.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:37 12/12/2025
Last modified:
01:06:00 07/10/2024
MD5 hash:
5f2c51c1db5b0defadfb67ce25c0098f
Filesize:
1.54 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: sms-balance-check.php-
Full path:
7star/web/sms-balance-check.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:38 12/12/2025
Last modified:
01:05:51 07/10/2024
MD5 hash:
74ac3e963a0dc5bb7d4c980e594aa39b
Filesize:
854 B
suspicious functions used:
curl_exec (line:15); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: sms_deliverey_report.php-
Full path:
7star/web/sms_deliverey_report.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:38 12/12/2025
Last modified:
01:05:55 07/10/2024
MD5 hash:
03623943da7e9334e137b38c8577fc84
Filesize:
4.25 KB
suspicious functions used:
curl_exec (line:28);curl_exec (line:53);curl_exec (line:90); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: support-action.php-
Full path:
7star/web/support-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:38 12/12/2025
Last modified:
01:05:56 07/10/2024
MD5 hash:
c678659a705dae2c6d52289b0084a693
Filesize:
14.72 KB
suspicious functions used:
curl_exec (line:221); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-helper.php-
Full path:
7stars/m/nagad-helper.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:38 12/12/2025
Last modified:
13:46:28 03/11/2024
MD5 hash:
2bb70c44d68202e0a0cd8ae1388f0b1b
Filesize:
6.74 KB
suspicious functions used:
curl_exec (line:61);base64_decode (line:97); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery2.php-
Full path:
7stars/m/PaymentOnlineQuery2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:38 12/12/2025
Last modified:
13:46:28 03/11/2024
MD5 hash:
3660992067d5591fc79ce89d6dbb9274
Filesize:
19.08 KB
suspicious functions used:
curl_exec (line:41);curl_exec (line:254); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
7stars/m/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:38 12/12/2025
Last modified:
13:46:30 03/11/2024
MD5 hash:
7d8e71ceda3ffb74623e0c4a814715af
Filesize:
1.53 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tagreeexpayment.php-
Full path:
7stars/m/tagreeexpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:38 12/12/2025
Last modified:
13:46:30 03/11/2024
MD5 hash:
c95e3ee881752db67b4f3597bc58430a
Filesize:
2.46 KB
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ttoken.php-
Full path:
7stars/m/ttoken.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:39 12/12/2025
Last modified:
13:46:30 03/11/2024
MD5 hash:
5f2c51c1db5b0defadfb67ce25c0098f
Filesize:
1.54 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
7stars/m/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:39 12/12/2025
Last modified:
13:46:26 03/11/2024
MD5 hash:
849185f307be30eafb1bbef93616d8c3
Filesize:
1.71 KB
suspicious functions used:
curl_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: support-action.php-
Full path:
7stars/m/support-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:39 12/12/2025
Last modified:
13:46:30 03/11/2024
MD5 hash:
2fc6fd844db911a5502a7a6ae383990f
Filesize:
10.31 KB
suspicious functions used:
curl_exec (line:99); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
7stars/m/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:39 12/12/2025
Last modified:
13:46:26 03/11/2024
MD5 hash:
9a3f22521ad987e86f84c4f5f688d5b7
Filesize:
713 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index.php-
Full path:
7stars/m/index.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
00:50:44 12/12/2025
Last modified:
13:46:27 03/11/2024
MD5 hash:
f5d7e6787d44240324bf05e7bff53365
Filesize:
12.49 KB
suspicious functions used:
base64_decode (line:10);curl_exec (line:183); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery.php-
Full path:
7stars/m/PaymentOnlineQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:39 12/12/2025
Last modified:
13:46:28 03/11/2024
MD5 hash:
05d772ea15775c0640ac9d1ff7c7144c
Filesize:
21.13 KB
suspicious functions used:
curl_exec (line:287);curl_exec (line:512); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreateagree.php-
Full path:
7stars/m/tcreateagree.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:40 12/12/2025
Last modified:
13:46:30 03/11/2024
MD5 hash:
27a10adf4190edc7eceee8cf74a6b72b
Filesize:
999 B
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec.php-
Full path:
7stars/m/login_exec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:40 12/12/2025
Last modified:
13:46:27 03/11/2024
MD5 hash:
1f800365ef270564df77d30c1bfd7ed3
Filesize:
5.4 KB
suspicious functions used:
curl_exec (line:66); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec1.php-
Full path:
7stars/m/login_exec1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:40 12/12/2025
Last modified:
13:46:27 03/11/2024
MD5 hash:
46b08782f51ba75b23e27183e06370fe
Filesize:
4.28 KB
suspicious functions used:
curl_exec (line:61); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-merchant-callback.php-
Full path:
7stars/m/nagad-merchant-callback.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:40 12/12/2025
Last modified:
13:46:28 03/11/2024
MD5 hash:
0e6086c5260150c11249029f212ee481
Filesize:
11.36 KB
suspicious functions used:
curl_exec (line:20); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreatepayment.php-
Full path:
7stars/m/tcreatepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:40 12/12/2025
Last modified:
13:46:30 03/11/2024
MD5 hash:
e49de9a33f5164bc2c6b88e4770faaff
Filesize:
1.07 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-snmp-data.php-
Full path:
7stars/m/netowrk-snmp-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:40 12/12/2025
Last modified:
13:46:28 03/11/2024
MD5 hash:
45b774abc8d67efb3e4e87c93b1f618b
Filesize:
24.05 KB
suspicious functions used:
shell_exec (line:96);shell_exec (line:105);shell_exec (line:115);shell_exec (line:134);shell_exec (line:146);shell_exec (line:157);shell_exec (line:173);shell_exec (line:183);shell_exec (line:199);shell_exec (line:219);shell_exec (line:229);shell_exec (line:234);shell_exec (line:242);shell_exec (line:262);shell_exec (line:278);`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:291);shell_exec (line:297);shell_exec (line:432); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: texecutepayment.php-
Full path:
7stars/m/texecutepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:40 12/12/2025
Last modified:
13:46:30 03/11/2024
MD5 hash:
efbb63dfcfdacb52dec74bffc389bbb3
Filesize:
2.67 KB
suspicious functions used:
curl_exec (line:24); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: class.phpmailer.php-
Full path:
7stars/web/email/class.phpmailer.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:40 12/12/2025
Last modified:
13:47:32 03/11/2024
MD5 hash:
68468d69b47fffecc89df57e27c5a781
Filesize:
143.32 KB
suspicious functions used:
`$DKIM_private` (line:428);popen (line:1387);popen (line:1408);base64_decode (line:3410);`$mail->set('SMTPSecure', 'tls');` (line:3688);`$mail->SMTPSecure = 'tls';` (line:3690); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: class.smtp.php-
Full path:
7stars/web/email/class.smtp.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:40 12/12/2025
Last modified:
13:47:32 03/11/2024
MD5 hash:
aa8478329268e5438a4469c268337a10
Filesize:
41.44 KB
suspicious functions used:
base64_decode (line:513);base64_decode (line:533); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: JSON.php-
Full path:
7stars/web/inc/JSON.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:41 12/12/2025
Last modified:
13:47:40 03/11/2024
MD5 hash:
f5a34509e06231308becbe320ade9ff6
Filesize:
33.22 KB
suspicious functions used:
eval (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: jqgrid.php-
Full path:
7stars/web/inc/jqgrid.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:41 12/12/2025
Last modified:
13:47:40 03/11/2024
MD5 hash:
71027a29e71e0626d8b57cbb631e6d98
Filesize:
23.92 KB
suspicious functions used:
eval (line:397); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: smsapicore.php-
Full path:
7stars/web/include/smsapicore.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:41 12/12/2025
Last modified:
09:47:24 09/12/2024
MD5 hash:
7103bdf60713408b6f2952f288f27f2e
Filesize:
2.45 KB
suspicious functions used:
curl_exec (line:37); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: telegramapicore.php-
Full path:
7stars/web/include/telegramapicore.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
05:57:18 12/12/2025
Last modified:
13:47:41 03/11/2024
MD5 hash:
e1f2020f2a58e7b600312301697f9aca
Filesize:
3 KB
suspicious functions used:
curl_exec (line:65); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Changes.txt-
Full path:
7stars/web/js/jqgrid/js/Changes.txt
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:41 12/12/2025
Last modified:
13:47:53 03/11/2024
MD5 hash:
c0a4adbc3f1c6d592cb4fa8433fee9ea
Filesize:
44.32 KB
suspicious functions used:
system (line:87); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ui.php-
Full path:
7stars/web/js/tinymce/themes/advanced/skins/highcontrast/ui.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:42 12/12/2025
Last modified:
13:48:01 03/11/2024
MD5 hash:
3edaf67be8573b86686f46bbba4f058c
Filesize:
4.53 KB
suspicious functions used:
curl_exec (line:20);`bill_amount` = '0.00' WHERE bill_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY ` (line:53);`bill_amount` = '0.00', days = '0.00' WHERE entry_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY ` (line:54);`payment` WHERE `pay_date` < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND pay_amount != '0.00' ORDER BY ` (line:55);curl_exec (line:146);curl_exec (line:168); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: AutoActiveClientsCount1.php-
Full path:
7stars/web/AutoActiveClientsCount1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
04:22:21 12/12/2025
Last modified:
13:46:43 03/11/2024
MD5 hash:
3b3b6186ff2d9c5abd1772e5aa02ee33
Filesize:
6.4 KB
suspicious functions used:
system (line:58); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: AutoActiveClientsCount11.php-
Full path:
7stars/web/AutoActiveClientsCount11.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:42 12/12/2025
Last modified:
13:46:43 03/11/2024
MD5 hash:
a0090e4a11dd59b955a6edd549b6ef2f
Filesize:
5.85 KB
suspicious functions used:
system (line:54); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ClientsOnMap.php-
Full path:
7stars/web/ClientsOnMap.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:43 12/12/2025
Last modified:
06:02:54 10/11/2025
MD5 hash:
519edcd6a9ccec3397e6f5280db00605
Filesize:
12.2 KB
suspicious functions used:
`${totalonline}` (line:97);`${totaloffline}` (line:98);`${results.rxPower}` (line:233);`${results.distance}` (line:234);`${results.supplyVoltage}` (line:235);`${results.temperature}` (line:236);`${results.txPower}` (line:237); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ClientView.php-
Full path:
7stars/web/ClientView.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:03:31 12/12/2025
Last modified:
13:46:56 03/11/2024
MD5 hash:
632106476588c1b6e090f78a90bc9534
Filesize:
110.58 KB
suspicious functions used:
`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:212); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients.php-
Full path:
7stars/web/Clients.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
09:16:34 12/12/2025
Last modified:
13:46:52 03/11/2024
MD5 hash:
edcecc2febd77bbf170a76efae960c89
Filesize:
212.41 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:844); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients1.php-
Full path:
7stars/web/Clients1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:44 12/12/2025
Last modified:
13:46:52 03/11/2024
MD5 hash:
a8db87dcc6beb97539ff152b767dadae
Filesize:
219.37 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:835); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients2.php-
Full path:
7stars/web/Clients2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:44 12/12/2025
Last modified:
13:46:54 03/11/2024
MD5 hash:
982d6411552113b0715fd17c26f50292
Filesize:
205.13 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:832); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients3.php-
Full path:
7stars/web/Clients3.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:45 12/12/2025
Last modified:
13:46:54 03/11/2024
MD5 hash:
50ddc869b383ab76e009c7a2c17c99a3
Filesize:
175.31 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:832); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: InstrumentsStoreOutDetails.php-
Full path:
7stars/web/InstrumentsStoreOutDetails.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:46 12/12/2025
Last modified:
13:47:01 03/11/2024
MD5 hash:
a60c19f766bfff1ccdccbeba6b39eb87
Filesize:
9.37 KB
suspicious functions used:
`update_date`, '%D-%b, %y') AS offdate, TIME_FORMAT(`update_time`, '%T') AS offtime FROM `con_sts_log` WHERE `c_id` = '{$row['c_id']}' AND con_sts = 'Inactive' ORDER BY ` (line:120); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Network.php-
Full path:
7stars/web/Network.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:47 12/12/2025
Last modified:
13:47:08 03/11/2024
MD5 hash:
a555bcd4afdc786ded6485ee9315887c
Filesize:
57.36 KB
suspicious functions used:
system (line:359);shell_exec (line:631); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Network1.php-
Full path:
7stars/web/Network1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:47 12/12/2025
Last modified:
13:47:08 03/11/2024
MD5 hash:
0154c16125cee7431f537bf69c4ef811
Filesize:
44.04 KB
suspicious functions used:
system (line:295);shell_exec (line:590); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeMap1.php-
Full path:
7stars/web/NetworkTreeMap1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:47 12/12/2025
Last modified:
13:47:12 03/11/2024
MD5 hash:
7283b6f0717758b1824973b76acf4c04
Filesize:
10.58 KB
suspicious functions used:
`${totalonline}` (line:97);`${totaloffline}` (line:98); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMS.php-
Full path:
7stars/web/SMS.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:47 12/12/2025
Last modified:
09:48:56 09/12/2024
MD5 hash:
c64696ecc1b0715751af3c8e9989ea80
Filesize:
36.6 KB
suspicious functions used:
curl_exec (line:56); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkLoad.php-
Full path:
7stars/web/NetworkLoad.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:47 12/12/2025
Last modified:
13:47:09 03/11/2024
MD5 hash:
e1632e66ee1b7394d3fb82751b924abe
Filesize:
2.83 KB
suspicious functions used:
system (line:81); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkLoad1.php-
Full path:
7stars/web/NetworkLoad1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:47 12/12/2025
Last modified:
13:47:09 03/11/2024
MD5 hash:
176bd6931be34d7ef351d22897accc65
Filesize:
759 B
suspicious functions used:
system (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltAddQuery.php-
Full path:
7stars/web/NetworkOltAddQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:47 12/12/2025
Last modified:
13:47:09 03/11/2024
MD5 hash:
c3c063a74b6c009f043ac820abd4f3f1
Filesize:
6.44 KB
suspicious functions used:
shell_exec (line:21); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltOnuStatus.php-
Full path:
7stars/web/NetworkOltOnuStatus.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:48 12/12/2025
Last modified:
13:47:10 03/11/2024
MD5 hash:
58b27721b794e6e5bd5f810aba2e7907
Filesize:
65.24 KB
suspicious functions used:
shell_exec (line:42);shell_exec (line:102);shell_exec (line:677);shell_exec (line:793);shell_exec (line:906); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltOnuStatus2.php-
Full path:
7stars/web/NetworkOltOnuStatus2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:48 12/12/2025
Last modified:
13:47:10 03/11/2024
MD5 hash:
c9a14797fa4353d05bbd9427b6079250
Filesize:
15.88 KB
suspicious functions used:
shell_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltSense.php-
Full path:
7stars/web/NetworkOltSense.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:48 12/12/2025
Last modified:
13:47:10 03/11/2024
MD5 hash:
2be664ae5006367f629ca437a6d507f8
Filesize:
18.26 KB
suspicious functions used:
`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, `last_synced`, `last_update`, `msg`, `full_msg`, ROUND((SELECT AVG(value) FROM olt_onu_history WHERE alarm_id = '$alarmId' AND value != ''), 2) AS average_value FROM `, ` WHERE `alarm_id` = '$alarmId' AND ` (line:123); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltSenseDetails.php-
Full path:
7stars/web/NetworkOltSenseDetails.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:48 12/12/2025
Last modified:
13:47:10 03/11/2024
MD5 hash:
440096c601fc10b819a1f0f8330928b0
Filesize:
14.17 KB
suspicious functions used:
`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:33);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:42);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:51);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:60); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltSync.php-
Full path:
7stars/web/NetworkOltSync.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:48 12/12/2025
Last modified:
13:47:10 03/11/2024
MD5 hash:
06633d4b65a14d677358170dd0a84424
Filesize:
1.87 KB
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMS1.php-
Full path:
7stars/web/SMS1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:48 12/12/2025
Last modified:
13:47:23 03/11/2024
MD5 hash:
e4671dadf9ad575671fd3609a60030da
Filesize:
32.19 KB
suspicious functions used:
curl_exec (line:59); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery.php-
Full path:
7stars/web/PaymentOnlineQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:48 12/12/2025
Last modified:
13:47:18 03/11/2024
MD5 hash:
201e1cf95b2d033897cab4bc2fd59e07
Filesize:
28.5 KB
suspicious functions used:
curl_exec (line:457);curl_exec (line:689); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery2.php-
Full path:
7stars/web/PaymentOnlineQuery2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:48 12/12/2025
Last modified:
13:47:18 03/11/2024
MD5 hash:
ccd315d11a60901b7b9029ff44f8351b
Filesize:
19.4 KB
suspicious functions used:
curl_exec (line:42);curl_exec (line:252); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeAddSave.php-
Full path:
7stars/web/NetworkTreeAddSave.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:49 12/12/2025
Last modified:
00:14:12 21/11/2024
MD5 hash:
a9dbc374394f257ef79f2d4f60f9771d
Filesize:
5.12 KB
suspicious functions used:
`network_tree` WHERE `olt_id` = '$olt_id' AND ` (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentWebhook.php-
Full path:
7stars/web/PaymentWebhook.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:49 12/12/2025
Last modified:
13:47:18 03/11/2024
MD5 hash:
a2f322c94787630ab1e0c8ca35fc5ba1
Filesize:
18.6 KB
suspicious functions used:
base64_decode (line:30);curl_exec (line:41);curl_exec (line:422); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeEdit1.php-
Full path:
7stars/web/NetworkTreeEdit1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:49 12/12/2025
Last modified:
13:47:12 03/11/2024
MD5 hash:
3396a6bdf9b5804bb208f38f37cc29a2
Filesize:
35.81 KB
suspicious functions used:
`olt_onu` WHERE olt_id = '$olt_id' AND ` (line:207); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeEditSave.php-
Full path:
7stars/web/NetworkTreeEditSave.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:49 12/12/2025
Last modified:
00:14:12 21/11/2024
MD5 hash:
6c0f94f3ddde2ee6a93db1fa98971907
Filesize:
12.41 KB
suspicious functions used:
`network_tree` WHERE `olt_id` = '$olt_id' AND ` (line:182); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeList.php-
Full path:
7stars/web/NetworkTreeList.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:49 12/12/2025
Last modified:
13:47:12 03/11/2024
MD5 hash:
7f697086943f78c922cabafa0f1f8cda
Filesize:
19.22 KB
suspicious functions used:
`pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '{$row['olt_id']}' AND ` (line:231); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeMap.php-
Full path:
7stars/web/NetworkTreeMap.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:49 12/12/2025
Last modified:
13:47:12 03/11/2024
MD5 hash:
584d02944bd9de5a190ec6dc320fc49e
Filesize:
24.24 KB
suspicious functions used:
`${results.rxPower}` (line:263);`${results.distance}` (line:264);`${results.supplyVoltage}` (line:265);`${results.temperature}` (line:266);`${results.txPower}` (line:267);`${results.rxPower}` (line:283);`${results.distance}` (line:284);`${results.supplyVoltage}` (line:285);`${results.temperature}` (line:286);`${results.txPower}` (line:287); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMSAddSave.php-
Full path:
7stars/web/SMSAddSave.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:50 12/12/2025
Last modified:
09:26:27 09/12/2024
MD5 hash:
18c49664e9a08d513b51e680f6201cb3
Filesize:
3.1 KB
suspicious functions used:
curl_exec (line:36); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SignUp1.php-
Full path:
7stars/web/SignUp1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:50 12/12/2025
Last modified:
13:47:22 03/11/2024
MD5 hash:
3f7943dd155c8e0a383b7d02730f8c11
Filesize:
24.59 KB
suspicious functions used:
curl_exec (line:33);curl_exec (line:59); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-countt.php-
Full path:
7stars/web/network-olt-client-onu-mac-countt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:51 12/12/2025
Last modified:
13:47:06 03/11/2024
MD5 hash:
d29b4e72c375f528b769bd3894f9f0e7
Filesize:
8.95 KB
suspicious functions used:
shell_exec (line:26);shell_exec (line:36);shell_exec (line:59);shell_exec (line:75);shell_exec (line:92);shell_exec (line:102);shell_exec (line:117);shell_exec (line:155);shell_exec (line:206);shell_exec (line:262);shell_exec (line:275);shell_exec (line:288); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: emp_salary_advence_find.php-
Full path:
7stars/web/emp_salary_advence_find.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:51 12/12/2025
Last modified:
13:46:58 03/11/2024
MD5 hash:
74a7e2ffda0f7584611d7cbce6136c24
Filesize:
2.25 KB
suspicious functions used:
`expanse` WHERE `type` = '2' AND `status` = '2' AND ex_by = '$e_id' AND MONTH(`, `) = MONTH('$lastmonth') AND YEAR(`, `) = YEAR('$lastmonth') GROUP BY ` (line:8);`e_id` = '$e_id' AND ` (line:12); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: imagevwr.php-
Full path:
7stars/web/imagevwr.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:03:32 12/12/2025
Last modified:
13:47:00 03/11/2024
MD5 hash:
47a223a13cc642d01dcfaaca542d396d
Filesize:
915 B
suspicious functions used:
curl_exec (line:15); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
7stars/web/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:51 12/12/2025
Last modified:
13:46:58 03/11/2024
MD5 hash:
c46a50905333286f45dfeacf010851ab
Filesize:
716 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: client-online-mbb.php-
Full path:
7stars/web/client-online-mbb.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:54:46 12/12/2025
Last modified:
13:46:48 03/11/2024
MD5 hash:
69c51efb5b9017a07a7158b4a63f3826
Filesize:
14.32 KB
suspicious functions used:
curl_exec (line:90); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_network.php-
Full path:
7stars/web/cron_network.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:42 12/12/2025
Last modified:
13:46:57 03/11/2024
MD5 hash:
db096f353e80027593ca3f9781a21ac8
Filesize:
4.93 KB
suspicious functions used:
curl_exec (line:45);curl_exec (line:67);curl_exec (line:127); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_olt.php-
Full path:
7stars/web/cron_olt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:51 12/12/2025
Last modified:
13:46:57 03/11/2024
MD5 hash:
6975951fdbf566164ba5fa5cfcd32ec7
Filesize:
4.27 KB
suspicious functions used:
shell_exec (line:48);curl_exec (line:127); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: clients-nots-action.php-
Full path:
7stars/web/clients-nots-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:51 12/12/2025
Last modified:
13:46:50 03/11/2024
MD5 hash:
dff1bb495509427d098cb4588da553b9
Filesize:
5.89 KB
suspicious functions used:
curl_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: company_info.php-
Full path:
7stars/web/company_info.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:25:06 12/12/2025
Last modified:
13:46:57 03/11/2024
MD5 hash:
e612d58aa2e38f5b49ba37c1bf620ece
Filesize:
8.38 KB
suspicious functions used:
curl_exec (line:130); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
7stars/web/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:51 12/12/2025
Last modified:
13:46:57 03/11/2024
MD5 hash:
ba9747d0421fd091b998389469e72a0b
Filesize:
1.7 KB
suspicious functions used:
curl_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_all.php-
Full path:
7stars/web/cron_all.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:51 12/12/2025
Last modified:
13:46:57 03/11/2024
MD5 hash:
967f1d654ae891609da26b9e0fdbd1ae
Filesize:
2.44 KB
suspicious functions used:
curl_exec (line:23);curl_exec (line:38);curl_exec (line:53); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_gen_bill.php-
Full path:
7stars/web/cron_auto_gen_bill.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:51 12/12/2025
Last modified:
13:46:57 03/11/2024
MD5 hash:
f1056618cc4402968e50d1232d2c51c8
Filesize:
4.73 KB
suspicious functions used:
curl_exec (line:140);curl_exec (line:149); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_olt_clients_catch.php-
Full path:
7stars/web/cron_olt_clients_catch.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:51 12/12/2025
Last modified:
13:46:57 03/11/2024
MD5 hash:
3b13c163ba3445b3d661c63adde1d985
Filesize:
1.12 KB
suspicious functions used:
curl_exec (line:23); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive.php-
Full path:
7stars/web/cron_auto_inactive.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
17:55:01 12/12/2025
Last modified:
03:28:47 10/12/2024
MD5 hash:
7e0dc4dd9dae2bf0220516641b53c027
Filesize:
5.43 KB
suspicious functions used:
curl_exec (line:142); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive2.php-
Full path:
7stars/web/cron_auto_inactive2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:51 12/12/2025
Last modified:
13:46:57 03/11/2024
MD5 hash:
440bc24f05b01eb395df63fff2f60de9
Filesize:
5.46 KB
suspicious functions used:
curl_exec (line:142); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_olt_user.php-
Full path:
7stars/web/cron_olt_user.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:51 12/12/2025
Last modified:
13:46:57 03/11/2024
MD5 hash:
67aa237639e3d1e6064e76079bb3cccc
Filesize:
1.97 KB
suspicious functions used:
curl_exec (line:19);curl_exec (line:46); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive_termination.php-
Full path:
7stars/web/cron_auto_inactive_termination.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
01:55:06 12/12/2025
Last modified:
13:46:57 03/11/2024
MD5 hash:
9f9c8ca9110c2304128646824bfb17db
Filesize:
12.16 KB
suspicious functions used:
curl_exec (line:241);curl_exec (line:253); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive_termination1.php-
Full path:
7stars/web/cron_auto_inactive_termination1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:51 12/12/2025
Last modified:
13:46:57 03/11/2024
MD5 hash:
be76b964c93a2cb4fa7e632750ff3bc4
Filesize:
6.64 KB
suspicious functions used:
curl_exec (line:156);curl_exec (line:168); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: getclientuptime.php-
Full path:
7stars/web/getclientuptime.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:51 12/12/2025
Last modified:
13:47:00 03/11/2024
MD5 hash:
bbc14cdd451c72b94d78c7d2d1af0b52
Filesize:
718 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_termination_remainder1.php-
Full path:
7stars/web/cron_auto_termination_remainder1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
03:05:29 12/12/2025
Last modified:
13:46:57 03/11/2024
MD5 hash:
7765f9f820dbd402f1064fab9958ffaa
Filesize:
3.26 KB
suspicious functions used:
curl_exec (line:83); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_client_bandwidth_count.php-
Full path:
7stars/web/cron_client_bandwidth_count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
17:53:16 12/12/2025
Last modified:
13:46:57 03/11/2024
MD5 hash:
1c71a3dd097275429ae845a85ced0438
Filesize:
5.33 KB
suspicious functions used:
curl_exec (line:124);curl_exec (line:134); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index.php-
Full path:
7stars/web/index.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
09:16:27 12/12/2025
Last modified:
13:47:00 03/11/2024
MD5 hash:
f161ab23adf4527023a0ad582d478f89
Filesize:
12.45 KB
suspicious functions used:
base64_decode (line:10);curl_exec (line:183); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-con-sts.php-
Full path:
7stars/web/network-olt-con-sts.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:51 12/12/2025
Last modified:
13:47:06 03/11/2024
MD5 hash:
a26b0a1c1567c34c9aa5e2e0254ff8a6
Filesize:
4 KB
suspicious functions used:
`olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:10);shell_exec (line:38);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, `last_synced`, `last_update`, `msg`, `full_msg`, ROUND((SELECT AVG(value) FROM olt_onu_history WHERE alarm_id = '$alarmId' AND value != ''), 2) AS average_value FROM `, ` WHERE `alarm_id` = '$alarmId' AND ` (line:82); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-oid-check.php-
Full path:
7stars/web/network-olt-oid-check.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:51 12/12/2025
Last modified:
13:47:07 03/11/2024
MD5 hash:
5b7dc0ce1103fbfc895873c250b63141
Filesize:
1.88 KB
suspicious functions used:
shell_exec (line:33); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ip-ping-checker.php-
Full path:
7stars/web/ip-ping-checker.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:51 12/12/2025
Last modified:
13:47:01 03/11/2024
MD5 hash:
0d28f3053b73b3fe2885cf519ee17c12
Filesize:
2.64 KB
suspicious functions used:
curl_exec (line:81); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-load.php-
Full path:
7stars/web/network-olt-load.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:51 12/12/2025
Last modified:
13:47:07 03/11/2024
MD5 hash:
f49d5153285c639ed91d4e806685ee56
Filesize:
1.33 KB
suspicious functions used:
shell_exec (line:22);shell_exec (line:25); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec.php-
Full path:
7stars/web/login_exec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:31:56 12/12/2025
Last modified:
13:47:02 03/11/2024
MD5 hash:
9038a77a32a5db2c9affae1496473f3e
Filesize:
5.27 KB
suspicious functions used:
curl_exec (line:62); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: loginexec.php-
Full path:
7stars/web/loginexec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:52 12/12/2025
Last modified:
13:47:02 03/11/2024
MD5 hash:
edb8017e7d0f8e037facbcacc94a383d
Filesize:
5.91 KB
suspicious functions used:
curl_exec (line:67); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-helper.php-
Full path:
7stars/web/nagad-helper.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:52 12/12/2025
Last modified:
13:47:06 03/11/2024
MD5 hash:
2bb70c44d68202e0a0cd8ae1388f0b1b
Filesize:
6.74 KB
suspicious functions used:
curl_exec (line:61);base64_decode (line:97); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-merchant-callback.php-
Full path:
7stars/web/nagad-merchant-callback.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:52 12/12/2025
Last modified:
13:47:06 03/11/2024
MD5 hash:
abc8d9e7aad4d9c622dcd97e701448bc
Filesize:
16.5 KB
suspicious functions used:
curl_exec (line:20); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-olt-all-mac-array.php-
Full path:
7stars/web/netowrk-olt-all-mac-array.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:52 12/12/2025
Last modified:
13:47:06 03/11/2024
MD5 hash:
b0168ce99145e2afe64357247d750dd6
Filesize:
4.62 KB
suspicious functions used:
shell_exec (line:33);shell_exec (line:47);shell_exec (line:61);shell_exec (line:76);shell_exec (line:93); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-snmp-data.php-
Full path:
7stars/web/netowrk-snmp-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:52 12/12/2025
Last modified:
13:47:06 03/11/2024
MD5 hash:
9badf5c53b260315a061e1bb6cd2378f
Filesize:
24.8 KB
suspicious functions used:
shell_exec (line:104);shell_exec (line:113);shell_exec (line:123);shell_exec (line:142);shell_exec (line:154);shell_exec (line:165);shell_exec (line:181);shell_exec (line:191);shell_exec (line:207);shell_exec (line:227);shell_exec (line:236);shell_exec (line:244);shell_exec (line:251);shell_exec (line:256);`pon_name` FROM `olt_pon` WHERE `olt_pon_id` = '$pon_id' AND ` (line:263);shell_exec (line:280);shell_exec (line:290);`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:303);shell_exec (line:309);shell_exec (line:444); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-old-onu-rx-map.php-
Full path:
7stars/web/network-old-onu-rx-map.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:52 12/12/2025
Last modified:
13:47:06 03/11/2024
MD5 hash:
b4962c160c5ad68ccd8eed9c48d82a0f
Filesize:
6.94 KB
suspicious functions used:
shell_exec (line:76); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-old-onu-rx.php-
Full path:
7stars/web/network-old-onu-rx.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:52 12/12/2025
Last modified:
13:47:06 03/11/2024
MD5 hash:
b4962c160c5ad68ccd8eed9c48d82a0f
Filesize:
6.94 KB
suspicious functions used:
shell_exec (line:76); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-count-cdata.php-
Full path:
7stars/web/network-olt-client-onu-mac-count-cdata.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:52 12/12/2025
Last modified:
13:47:06 03/11/2024
MD5 hash:
c378dbabf36066c335cfb8838a6e167d
Filesize:
4.58 KB
suspicious functions used:
shell_exec (line:25);shell_exec (line:35);shell_exec (line:56);shell_exec (line:103);shell_exec (line:115);shell_exec (line:126);shell_exec (line:140); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-count.php-
Full path:
7stars/web/network-olt-client-onu-mac-count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:52 12/12/2025
Last modified:
13:47:06 03/11/2024
MD5 hash:
300ca68aa5a7a32160838b9f2627d2aa
Filesize:
14.56 KB
suspicious functions used:
shell_exec (line:26);shell_exec (line:36);shell_exec (line:68);shell_exec (line:84);shell_exec (line:101);shell_exec (line:119);shell_exec (line:135);shell_exec (line:176);shell_exec (line:236);shell_exec (line:312);shell_exec (line:379);shell_exec (line:441);shell_exec (line:460);shell_exec (line:479); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook11.php-
Full path:
7stars/web/webhook11.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:52 12/12/2025
Last modified:
13:47:28 03/11/2024
MD5 hash:
26e2059a39281031d28874b51b52d60c
Filesize:
21.23 KB
suspicious functions used:
base64_decode (line:27);curl_exec (line:38);curl_exec (line:454); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-alarm-add.php-
Full path:
7stars/web/network-olt-onu-alarm-add.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:52 12/12/2025
Last modified:
13:47:07 03/11/2024
MD5 hash:
be6ba82c658419e1454f778e20e2d4c3
Filesize:
7.86 KB
suspicious functions used:
shell_exec (line:103); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-count.php-
Full path:
7stars/web/network-olt-onu-count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:52 12/12/2025
Last modified:
13:47:07 03/11/2024
MD5 hash:
67dd698e92e750fe16906b88b074cb88
Filesize:
5.18 KB
suspicious functions used:
`olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:11);shell_exec (line:65); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-list-data.php-
Full path:
7stars/web/network-olt-onu-list-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:52 12/12/2025
Last modified:
13:47:07 03/11/2024
MD5 hash:
54cc9417c766c31317311c3722ce7d4b
Filesize:
9.48 KB
suspicious functions used:
shell_exec (line:24);shell_exec (line:38);shell_exec (line:64);shell_exec (line:85);shell_exec (line:104);shell_exec (line:125);shell_exec (line:143);shell_exec (line:153);shell_exec (line:165);shell_exec (line:185); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tagreeexpayment.php-
Full path:
7stars/web/tagreeexpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
03:55:06 12/12/2025
Last modified:
13:47:26 03/11/2024
MD5 hash:
029b4fba649a75c7c81d2f8931be8d63
Filesize:
2.86 KB
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-power.php-
Full path:
7stars/web/network-olt-onu-power.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:52 12/12/2025
Last modified:
13:47:07 03/11/2024
MD5 hash:
2e064543b67b532bdf4e5b12d49c5052
Filesize:
7.54 KB
suspicious functions used:
shell_exec (line:97); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-clients-search.php-
Full path:
7stars/web/network-olt-pon-clients-search.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:52 12/12/2025
Last modified:
13:47:07 03/11/2024
MD5 hash:
79d26fc66abdab6f173330588aa8b238
Filesize:
10.93 KB
suspicious functions used:
shell_exec (line:42);shell_exec (line:51);shell_exec (line:104);shell_exec (line:168); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search-bdcom.php-
Full path:
7stars/web/network-olt-pon-onu-search-bdcom.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:52 12/12/2025
Last modified:
13:47:07 03/11/2024
MD5 hash:
c786fa8b69268c738b6ff976631798cd
Filesize:
27.74 KB
suspicious functions used:
shell_exec (line:60);shell_exec (line:69);shell_exec (line:383); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search-bdcom1.php-
Full path:
7stars/web/network-olt-pon-onu-search-bdcom1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:53 12/12/2025
Last modified:
13:47:07 03/11/2024
MD5 hash:
dd18677b1dcbf7f0bce2ac6912d98da0
Filesize:
9.6 KB
suspicious functions used:
shell_exec (line:42);shell_exec (line:51);shell_exec (line:129); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search.php-
Full path:
7stars/web/network-olt-pon-onu-search.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:53 12/12/2025
Last modified:
13:47:07 03/11/2024
MD5 hash:
dc183ecf77d0e1f56f672338fd09cfa5
Filesize:
21.62 KB
suspicious functions used:
shell_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreateagree.php-
Full path:
7stars/web/tcreateagree.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
03:54:41 12/12/2025
Last modified:
13:47:26 03/11/2024
MD5 hash:
27a10adf4190edc7eceee8cf74a6b72b
Filesize:
999 B
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tis-news.php-
Full path:
7stars/web/tis-news.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
14:40:05 12/12/2025
Last modified:
13:47:26 03/11/2024
MD5 hash:
ed23ca98b77c5321b4485e85eb2ea64d
Filesize:
3.67 KB
suspicious functions used:
curl_exec (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tt.php-
Full path:
7stars/web/tt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:53 12/12/2025
Last modified:
13:47:26 03/11/2024
MD5 hash:
9c4ed141cb79fdc7e807b35923c91a20
Filesize:
1.56 KB
suspicious functions used:
curl_exec (line:30); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data-bdcom.php-
Full path:
7stars/web/network-snmp-onu-status-data-bdcom.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:53 12/12/2025
Last modified:
13:47:07 03/11/2024
MD5 hash:
065f5e2b05932ee66d473135998580ac
Filesize:
23.53 KB
suspicious functions used:
shell_exec (line:48);shell_exec (line:73);shell_exec (line:85);shell_exec (line:103);shell_exec (line:116);shell_exec (line:128);shell_exec (line:134);shell_exec (line:159);shell_exec (line:172);shell_exec (line:184);shell_exec (line:190);shell_exec (line:217);shell_exec (line:233);shell_exec (line:239);shell_exec (line:244);shell_exec (line:248);`pon_name` FROM `olt_pon` WHERE `olt_pon_id` = '$ponn_id' AND ` (line:255);shell_exec (line:263); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data.php-
Full path:
7stars/web/network-snmp-onu-status-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:53 12/12/2025
Last modified:
13:47:07 03/11/2024
MD5 hash:
0adfee384bf349b50f11036947fd2a74
Filesize:
30.37 KB
suspicious functions used:
shell_exec (line:38);`olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:42);shell_exec (line:81);shell_exec (line:95);shell_exec (line:109);shell_exec (line:122);shell_exec (line:208);shell_exec (line:429);shell_exec (line:441);shell_exec (line:448); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data1.php-
Full path:
7stars/web/network-snmp-onu-status-data1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:53 12/12/2025
Last modified:
13:47:07 03/11/2024
MD5 hash:
920bd1a592c36f7a1194b737642f8340
Filesize:
15.96 KB
suspicious functions used:
shell_exec (line:33);`olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:37);shell_exec (line:149); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ttoken.php-
Full path:
7stars/web/ttoken.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:53 12/12/2025
Last modified:
13:47:26 03/11/2024
MD5 hash:
5f2c51c1db5b0defadfb67ce25c0098f
Filesize:
1.54 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data_vsol2.php-
Full path:
7stars/web/network-snmp-onu-status-data_vsol2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:53 12/12/2025
Last modified:
13:47:07 03/11/2024
MD5 hash:
f22d022ddc284f4d8e1de3660da91db8
Filesize:
15.61 KB
suspicious functions used:
shell_exec (line:34);shell_exec (line:113);shell_exec (line:126);shell_exec (line:132); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreatepayment.php-
Full path:
7stars/web/tcreatepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:53 12/12/2025
Last modified:
13:47:26 03/11/2024
MD5 hash:
e49de9a33f5164bc2c6b88e4770faaff
Filesize:
1.07 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
7stars/web/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:53 12/12/2025
Last modified:
13:47:26 03/11/2024
MD5 hash:
7d8e71ceda3ffb74623e0c4a814715af
Filesize:
1.53 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test2.php-
Full path:
7stars/web/test2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:53 12/12/2025
Last modified:
13:47:26 03/11/2024
MD5 hash:
ab80d92ede21b7da59bfefb325484297
Filesize:
13.76 KB
suspicious functions used:
shell_exec (line:59);shell_exec (line:70);shell_exec (line:76);shell_exec (line:88);shell_exec (line:101);shell_exec (line:141);curl_exec (line:187);curl_exec (line:212);curl_exec (line:354); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-tree-vartual-nodes.php-
Full path:
7stars/web/network-tree-vartual-nodes.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:53 12/12/2025
Last modified:
13:47:08 03/11/2024
MD5 hash:
3530b8bc3113544014b1746ecd67e834
Filesize:
10.64 KB
suspicious functions used:
shell_exec (line:76);shell_exec (line:111);shell_exec (line:145);shell_exec (line:181);shell_exec (line:188); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: sms-balance-check.php-
Full path:
7stars/web/sms-balance-check.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
14:40:05 12/12/2025
Last modified:
09:45:29 09/12/2024
MD5 hash:
177ddaf2af53d1a9ee52f66df641dae1
Filesize:
748 B
suspicious functions used:
curl_exec (line:15); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree-olt-onu-list-data.php-
Full path:
7stars/web/networktree-olt-onu-list-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:53 12/12/2025
Last modified:
13:47:10 03/11/2024
MD5 hash:
af4221fefa9c9051846a063ac4135560
Filesize:
8.72 KB
suspicious functions used:
shell_exec (line:24);shell_exec (line:36);shell_exec (line:59);shell_exec (line:78);shell_exec (line:97);shell_exec (line:116);shell_exec (line:134);shell_exec (line:143);shell_exec (line:155);shell_exec (line:175); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: sms_deliverey_report.php-
Full path:
7stars/web/sms_deliverey_report.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:53 12/12/2025
Last modified:
13:47:24 03/11/2024
MD5 hash:
03623943da7e9334e137b38c8577fc84
Filesize:
4.25 KB
suspicious functions used:
curl_exec (line:28);curl_exec (line:53);curl_exec (line:90); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_onu_list_add.php-
Full path:
7stars/web/networktree_device_onu_list_add.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:53 12/12/2025
Last modified:
13:47:13 03/11/2024
MD5 hash:
444ccf3c3e852a5a25cc4ccd3a5cf9ca
Filesize:
14.66 KB
suspicious functions used:
`network_tree` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND device_type = '5' AND ` (line:9);shell_exec (line:33);`network_tree` WHERE `onu_mac` = '$mac_address' AND ` (line:131);shell_exec (line:179);shell_exec (line:187);shell_exec (line:235);`network_tree` WHERE `onu_mac` = '$onuMac' AND ` (line:301); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_pon_check.php-
Full path:
7stars/web/networktree_device_pon_check.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:53 12/12/2025
Last modified:
13:47:13 03/11/2024
MD5 hash:
708a93aadcae96ecf0aaca52041fcf38
Filesize:
1.53 KB
suspicious functions used:
`pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '$olt_id' AND ` (line:8); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: support-action.php-
Full path:
7stars/web/support-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:53 12/12/2025
Last modified:
13:47:25 03/11/2024
MD5 hash:
58556808f93f52486b2ad06998142aa9
Filesize:
14.56 KB
suspicious functions used:
curl_exec (line:220); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_pon_list_add.php-
Full path:
7stars/web/networktree_device_pon_list_add.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:53 12/12/2025
Last modified:
13:47:13 03/11/2024
MD5 hash:
2ec03912801e4749c2e9cd361417ca5f
Filesize:
1.36 KB
suspicious functions used:
`olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:6);`olt_pon` WHERE `olt_id` = '$olt_id' AND ` (line:10);`network_tree` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND ` (line:17); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_pon_port_onu_list.php-
Full path:
7stars/web/networktree_device_pon_port_onu_list.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:53 12/12/2025
Last modified:
13:47:13 03/11/2024
MD5 hash:
9c63b3ac69996628f5eb2959a9eb4e15
Filesize:
8.65 KB
suspicious functions used:
`olt_pon` WHERE olt_id = '$olt_id' AND ` (line:25);shell_exec (line:32);shell_exec (line:45);`network_tree` WHERE onu_index_id = '$port_onu_index_id' AND ` (line:49);shell_exec (line:81);shell_exec (line:103);shell_exec (line:122);shell_exec (line:143);shell_exec (line:161);shell_exec (line:170);shell_exec (line:184); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_pon_port_sense_list.php-
Full path:
7stars/web/networktree_device_pon_port_sense_list.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:53 12/12/2025
Last modified:
13:47:13 03/11/2024
MD5 hash:
ee69cd5cc122f8aa37d8d8e5c74def6b
Filesize:
3.65 KB
suspicious functions used:
`network_tree` WHERE `onu_mac` = '$onu_mac' AND ` (line:26);`network_tree` WHERE `c_id` = '{$dfhbdxf}' AND ` (line:71); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_type.php-
Full path:
7stars/web/networktree_device_type.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:53 12/12/2025
Last modified:
00:14:12 21/11/2024
MD5 hash:
f1520732e5a3ef38564238a3278a1f63
Filesize:
11.43 KB
suspicious functions used:
`tree_id`) AS countolt FROM `network_tree` WHERE `olt_id` = '$olt_id_sure' AND ` (line:64); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test6.php-
Full path:
7stars/web/test6.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:53 12/12/2025
Last modified:
13:47:26 03/11/2024
MD5 hash:
f22d022ddc284f4d8e1de3660da91db8
Filesize:
15.61 KB
suspicious functions used:
shell_exec (line:34);shell_exec (line:113);shell_exec (line:126);shell_exec (line:132); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test7.php-
Full path:
7stars/web/test7.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:53 12/12/2025
Last modified:
13:47:26 03/11/2024
MD5 hash:
b11ccf951ce63a21ea0a7328316a0e5c
Filesize:
1.57 KB
suspicious functions used:
curl_exec (line:14); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: testttttt.php-
Full path:
7stars/web/testttttt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:53 12/12/2025
Last modified:
13:47:26 03/11/2024
MD5 hash:
b1988a4be29e191ad935fb409a4174ee
Filesize:
2 KB
suspicious functions used:
curl_exec (line:47); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: texecutepayment.php-
Full path:
7stars/web/texecutepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:53 12/12/2025
Last modified:
13:47:26 03/11/2024
MD5 hash:
623635fdf5c871391d3a5fe99ee8c543
Filesize:
2.91 KB
suspicious functions used:
curl_exec (line:24); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook2.php-
Full path:
7stars/web/webhook2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:53 12/12/2025
Last modified:
13:47:28 03/11/2024
MD5 hash:
74a7dcc262d7fe7f2bdc9e0595d03837
Filesize:
4.69 KB
suspicious functions used:
base64_decode (line:22);curl_exec (line:33);curl_exec (line:86);curl_exec (line:107); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook.php-
Full path:
7stars/web/webhook.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:16:06 12/12/2025
Last modified:
13:47:28 03/11/2024
MD5 hash:
18c8353c99f0ca2645c68685e40c568b
Filesize:
21.1 KB
suspicious functions used:
base64_decode (line:28);curl_exec (line:39);curl_exec (line:429); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: billpaycheck.php-
Full path:
abi/web2/bkash/billpaycheck.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:53 12/12/2025
Last modified:
19:44:41 20/11/2024
MD5 hash:
38c46efc36b25628fa18bd92ae135af9
Filesize:
796 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
abi/web2/bkash/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:53 12/12/2025
Last modified:
19:44:41 20/11/2024
MD5 hash:
6175301f744b22b7db70ba598a991f8b
Filesize:
1.64 KB
suspicious functions used:
curl_exec (line:36); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
abi/web2/bkash/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:53 12/12/2025
Last modified:
19:44:41 20/11/2024
MD5 hash:
19be365d26141eaecead7ef0ada0e75c
Filesize:
1.3 KB
suspicious functions used:
curl_exec (line:31); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: grant.php-
Full path:
abi/web2/bkash/grant.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:53 12/12/2025
Last modified:
19:44:41 20/11/2024
MD5 hash:
da5499d260dc78ea4fcd71227cc6c484
Filesize:
2.01 KB
suspicious functions used:
curl_exec (line:41);curl_exec (line:63); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: query.php-
Full path:
abi/web2/bkash/query.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:53 12/12/2025
Last modified:
19:44:41 20/11/2024
MD5 hash:
f3ed9045f3a073e2cdc8561d500bda89
Filesize:
1.65 KB
suspicious functions used:
curl_exec (line:33); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tagreeexpayment.php-
Full path:
abi/web2/bkash/tagreeexpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:53 12/12/2025
Last modified:
19:44:41 20/11/2024
MD5 hash:
a1ba7d36003f72e593615aa32e44acb9
Filesize:
1.58 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreateagree.php-
Full path:
abi/web2/bkash/tcreateagree.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:53 12/12/2025
Last modified:
19:44:41 20/11/2024
MD5 hash:
8ae6bdc9f3d4b0cdcf651701a0d9ebab
Filesize:
1.2 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreatepayment.php-
Full path:
abi/web2/bkash/tcreatepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:53 12/12/2025
Last modified:
19:44:41 20/11/2024
MD5 hash:
3c978def6cffa0a8db5e86ce127caae6
Filesize:
1.35 KB
suspicious functions used:
curl_exec (line:29); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: texecutepayment.php-
Full path:
abi/web2/bkash/texecutepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:53 12/12/2025
Last modified:
19:44:41 20/11/2024
MD5 hash:
d8f24df64623da3cfc2baf48f184a3d1
Filesize:
1.21 KB
suspicious functions used:
curl_exec (line:25); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
abi/web2/bkash/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:53 12/12/2025
Last modified:
19:44:41 20/11/2024
MD5 hash:
f50b33eeb31927b2c081195618d48b8d
Filesize:
1.88 KB
suspicious functions used:
curl_exec (line:48); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tokent.php-
Full path:
abi/web2/bkash/tokent.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:53 12/12/2025
Last modified:
19:44:41 20/11/2024
MD5 hash:
890a9e9fb1be75f31a6daad8811c1ff9
Filesize:
1.9 KB
suspicious functions used:
curl_exec (line:48); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: trxID.php-
Full path:
abi/web2/bkash/trxID.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:53 12/12/2025
Last modified:
19:44:41 20/11/2024
MD5 hash:
9bcb8e70728fd25807c4db8916166d74
Filesize:
1.44 KB
suspicious functions used:
curl_exec (line:31); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
abi/web2/bkasht/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:53 12/12/2025
Last modified:
19:44:42 20/11/2024
MD5 hash:
a4ba6e7683f558dc3602dacd7ddeded2
Filesize:
1.36 KB
suspicious functions used:
curl_exec (line:29); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
abi/web2/bkasht/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:53 12/12/2025
Last modified:
19:44:42 20/11/2024
MD5 hash:
aad462fbca9f9a36649a197d67403098
Filesize:
1.27 KB
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: grant.php-
Full path:
abi/web2/bkasht/grant.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:53 12/12/2025
Last modified:
19:44:42 20/11/2024
MD5 hash:
da5499d260dc78ea4fcd71227cc6c484
Filesize:
2.01 KB
suspicious functions used:
curl_exec (line:41);curl_exec (line:63); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: query.php-
Full path:
abi/web2/bkasht/query.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:53 12/12/2025
Last modified:
19:44:42 20/11/2024
MD5 hash:
f3ed9045f3a073e2cdc8561d500bda89
Filesize:
1.65 KB
suspicious functions used:
curl_exec (line:33); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
abi/web2/bkasht/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:53 12/12/2025
Last modified:
19:44:42 20/11/2024
MD5 hash:
f50b33eeb31927b2c081195618d48b8d
Filesize:
1.88 KB
suspicious functions used:
curl_exec (line:48); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: trxID.php-
Full path:
abi/web2/bkasht/trxID.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:53 12/12/2025
Last modified:
19:44:42 20/11/2024
MD5 hash:
9bcb8e70728fd25807c4db8916166d74
Filesize:
1.44 KB
suspicious functions used:
curl_exec (line:31); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: class.phpmailer.php-
Full path:
abi/web2/email/class.phpmailer.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:54 12/12/2025
Last modified:
19:44:42 20/11/2024
MD5 hash:
68468d69b47fffecc89df57e27c5a781
Filesize:
143.32 KB
suspicious functions used:
`$DKIM_private` (line:428);popen (line:1387);popen (line:1408);base64_decode (line:3410);`$mail->set('SMTPSecure', 'tls');` (line:3688);`$mail->SMTPSecure = 'tls';` (line:3690); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: class.smtp.php-
Full path:
abi/web2/email/class.smtp.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:54 12/12/2025
Last modified:
19:44:43 20/11/2024
MD5 hash:
aa8478329268e5438a4469c268337a10
Filesize:
41.44 KB
suspicious functions used:
base64_decode (line:513);base64_decode (line:533); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: JSON.php-
Full path:
abi/web2/inc/JSON.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:55 12/12/2025
Last modified:
19:44:49 20/11/2024
MD5 hash:
f5a34509e06231308becbe320ade9ff6
Filesize:
33.22 KB
suspicious functions used:
eval (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: jqgrid.php-
Full path:
abi/web2/inc/jqgrid.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:55 12/12/2025
Last modified:
19:44:49 20/11/2024
MD5 hash:
71027a29e71e0626d8b57cbb631e6d98
Filesize:
23.92 KB
suspicious functions used:
eval (line:397); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: smsapicore.php-
Full path:
abi/web2/include/smsapicore.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:55 12/12/2025
Last modified:
01:51:14 05/02/2025
MD5 hash:
0494713963b7e9ead12abe06de2811a5
Filesize:
1.26 KB
suspicious functions used:
curl_exec (line:37); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: telegramapicore.php-
Full path:
abi/web2/include/telegramapicore.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:55 12/12/2025
Last modified:
22:11:00 21/01/2025
MD5 hash:
511f56e6dfcf4e9e7a11259e023ca3ae
Filesize:
3.15 KB
suspicious functions used:
curl_exec (line:68); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Changes.txt-
Full path:
abi/web2/js/jqgrid/js/Changes.txt
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:55 12/12/2025
Last modified:
19:44:55 20/11/2024
MD5 hash:
c0a4adbc3f1c6d592cb4fa8433fee9ea
Filesize:
44.32 KB
suspicious functions used:
system (line:87); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ui.php-
Full path:
abi/web2/js/tinymce/themes/advanced/skins/highcontrast/ui.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:55 12/12/2025
Last modified:
19:45:01 20/11/2024
MD5 hash:
3edaf67be8573b86686f46bbba4f058c
Filesize:
4.53 KB
suspicious functions used:
curl_exec (line:20);`bill_amount` = '0.00' WHERE bill_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY ` (line:53);`bill_amount` = '0.00', days = '0.00' WHERE entry_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY ` (line:54);`payment` WHERE `pay_date` < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND pay_amount != '0.00' ORDER BY ` (line:55);curl_exec (line:146);curl_exec (line:168); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients3.php-
Full path:
abi/web2/Clients3.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:55 12/12/2025
Last modified:
19:44:34 20/11/2024
MD5 hash:
50ddc869b383ab76e009c7a2c17c99a3
Filesize:
175.31 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:832); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: AutoActiveClientsCount1.php-
Full path:
abi/web2/AutoActiveClientsCount1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:56 12/12/2025
Last modified:
03:22:57 24/03/2025
MD5 hash:
96ae95689b28aef52bd4eaab4bfea7cc
Filesize:
5.38 KB
suspicious functions used:
system (line:54); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: AutoActiveClientsCount11.php-
Full path:
abi/web2/AutoActiveClientsCount11.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:56 12/12/2025
Last modified:
19:44:33 20/11/2024
MD5 hash:
a0090e4a11dd59b955a6edd549b6ef2f
Filesize:
5.85 KB
suspicious functions used:
system (line:54); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ClientsOnMap.php-
Full path:
abi/web2/ClientsOnMap.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:56 12/12/2025
Last modified:
06:02:55 10/11/2025
MD5 hash:
e853e4393e2183f104b30d6284d8a51c
Filesize:
19.47 KB
suspicious functions used:
`${totalonline}` (line:173);`${totaloffline}` (line:174);`${results.rxPower}` (line:307);`${results.distance}` (line:308);`${results.supplyVoltage}` (line:309);`${results.temperature}` (line:310);`${results.txPower}` (line:311); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ClientView.php-
Full path:
abi/web2/ClientView.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:56 12/12/2025
Last modified:
03:12:52 07/06/2025
MD5 hash:
756221c89eb1163a8735f450f7a9d263
Filesize:
112.89 KB
suspicious functions used:
`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:227); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients.php-
Full path:
abi/web2/Clients.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:57 12/12/2025
Last modified:
22:49:29 08/09/2025
MD5 hash:
813f3342191ae66a98437696e5a413cf
Filesize:
197.66 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:761); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: EmployeeAdd.php-
Full path:
abi/web2/EmployeeAdd.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:57 12/12/2025
Last modified:
04:15:31 15/02/2025
MD5 hash:
c12c85fa282eb15060ed68bad252f8e8
Filesize:
19.13 KB
suspicious functions used:
`Element with ID ${id} not found.` (line:36);`Non-numeric input detected in ${id}.` (line:38);`Element with ID ${id} not found.` (line:44);`Non-numeric input detected in ${id}.` (line:46); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients1.php-
Full path:
abi/web2/Clients1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:57 12/12/2025
Last modified:
07:08:14 03/05/2025
MD5 hash:
ccec9015b85db7f5fd719dce1ddfd76d
Filesize:
197.59 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:759); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients2.php-
Full path:
abi/web2/Clients2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:58 12/12/2025
Last modified:
19:44:34 20/11/2024
MD5 hash:
982d6411552113b0715fd17c26f50292
Filesize:
205.13 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:832); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: EmployeeEdit.php-
Full path:
abi/web2/EmployeeEdit.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:58 12/12/2025
Last modified:
04:15:31 15/02/2025
MD5 hash:
55b4626339d566473f477e1a001dc8b4
Filesize:
17.73 KB
suspicious functions used:
`Element with ID ${id} not found.` (line:44);`Non-numeric input detected in ${id}.` (line:46);`Element with ID ${id} not found.` (line:52);`Non-numeric input detected in ${id}.` (line:54); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: MacResellerAdd.php-
Full path:
abi/web2/MacResellerAdd.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:58 12/12/2025
Last modified:
22:02:20 23/04/2025
MD5 hash:
5fdbde3df3e96e845cc118cb3ae916a5
Filesize:
30.33 KB
suspicious functions used:
`input[name="${inputName}"]:checked` (line:799); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: MacResellerEdit.php-
Full path:
abi/web2/MacResellerEdit.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:59 12/12/2025
Last modified:
22:01:56 23/04/2025
MD5 hash:
92ce35276f3eae45e866de3439baaa11
Filesize:
37.76 KB
suspicious functions used:
`input[name="${inputName}"]:checked` (line:640); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: InstrumentsStoreOutDetails.php-
Full path:
abi/web2/InstrumentsStoreOutDetails.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:59 12/12/2025
Last modified:
19:44:35 20/11/2024
MD5 hash:
a60c19f766bfff1ccdccbeba6b39eb87
Filesize:
9.37 KB
suspicious functions used:
`update_date`, '%D-%b, %y') AS offdate, TIME_FORMAT(`update_time`, '%T') AS offtime FROM `con_sts_log` WHERE `c_id` = '{$row['c_id']}' AND con_sts = 'Inactive' ORDER BY ` (line:120); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkLoad.php-
Full path:
abi/web2/NetworkLoad.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:59 12/12/2025
Last modified:
19:44:37 20/11/2024
MD5 hash:
e1632e66ee1b7394d3fb82751b924abe
Filesize:
2.83 KB
suspicious functions used:
system (line:81); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Network.php-
Full path:
abi/web2/Network.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:59 12/12/2025
Last modified:
01:12:51 05/05/2025
MD5 hash:
85105512c59282e667cfe15bc67d73bb
Filesize:
69.44 KB
suspicious functions used:
system (line:371);shell_exec (line:654);`network_tree` WHERE `device_type` = '1' AND `olt_id` = '{$rowo['olt_id']}' AND sts = '0' AND ` (line:874); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkLoad1.php-
Full path:
abi/web2/NetworkLoad1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:59 12/12/2025
Last modified:
19:44:37 20/11/2024
MD5 hash:
176bd6931be34d7ef351d22897accc65
Filesize:
759 B
suspicious functions used:
system (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Network1.php-
Full path:
abi/web2/Network1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:59 12/12/2025
Last modified:
11:57:44 15/04/2025
MD5 hash:
154ba9f6e6603be92ddd48557fb118ce
Filesize:
65.34 KB
suspicious functions used:
system (line:369);shell_exec (line:652);`network_tree` WHERE `device_type` = '1' AND `olt_id` = '{$rowo['olt_id']}' AND sts = '0' AND ` (line:843); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-count-rcl.php-
Full path:
abi/web2/network-olt-client-onu-mac-count-rcl.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:40:59 12/12/2025
Last modified:
23:51:27 24/03/2025
MD5 hash:
9372dfb2a63d9f4a28440f91d4866778
Filesize:
3.49 KB
suspicious functions used:
shell_exec (line:26);shell_exec (line:73);shell_exec (line:85);shell_exec (line:96);shell_exec (line:110); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMSAddSave.php-
Full path:
abi/web2/SMSAddSave.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:00 12/12/2025
Last modified:
01:43:36 05/02/2025
MD5 hash:
0d2d0548df5f32e69264c4f2f1b1f76e
Filesize:
2.12 KB
suspicious functions used:
curl_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMS.php-
Full path:
abi/web2/SMS.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:00 12/12/2025
Last modified:
01:38:29 29/04/2025
MD5 hash:
0ec0c15fe62659d41bfc76ba172f4a42
Filesize:
37.87 KB
suspicious functions used:
curl_exec (line:56); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltAddQuery.php-
Full path:
abi/web2/NetworkOltAddQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:00 12/12/2025
Last modified:
21:08:55 29/03/2025
MD5 hash:
f2e8bbce7005fe948eab86e12f9e789f
Filesize:
7.96 KB
suspicious functions used:
shell_exec (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltOnuStatus.php-
Full path:
abi/web2/NetworkOltOnuStatus.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:00 12/12/2025
Last modified:
10:14:59 29/04/2025
MD5 hash:
3389803b8d03cb46bbad2d648ffd0bd4
Filesize:
70.95 KB
suspicious functions used:
shell_exec (line:42);shell_exec (line:102);shell_exec (line:673);shell_exec (line:793);shell_exec (line:903);shell_exec (line:1013); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltOnuStatus2.php-
Full path:
abi/web2/NetworkOltOnuStatus2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:00 12/12/2025
Last modified:
19:44:37 20/11/2024
MD5 hash:
c9a14797fa4353d05bbd9427b6079250
Filesize:
15.88 KB
suspicious functions used:
shell_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltSense.php-
Full path:
abi/web2/NetworkOltSense.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:00 12/12/2025
Last modified:
19:44:37 20/11/2024
MD5 hash:
2be664ae5006367f629ca437a6d507f8
Filesize:
18.26 KB
suspicious functions used:
`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, `last_synced`, `last_update`, `msg`, `full_msg`, ROUND((SELECT AVG(value) FROM olt_onu_history WHERE alarm_id = '$alarmId' AND value != ''), 2) AS average_value FROM `, ` WHERE `alarm_id` = '$alarmId' AND ` (line:123); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltSenseDetails.php-
Full path:
abi/web2/NetworkOltSenseDetails.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:00 12/12/2025
Last modified:
19:44:37 20/11/2024
MD5 hash:
440096c601fc10b819a1f0f8330928b0
Filesize:
14.17 KB
suspicious functions used:
`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:33);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:42);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:51);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:60); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltSync.php-
Full path:
abi/web2/NetworkOltSync.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:00 12/12/2025
Last modified:
19:44:37 20/11/2024
MD5 hash:
06633d4b65a14d677358170dd0a84424
Filesize:
1.87 KB
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeAddSave.php-
Full path:
abi/web2/NetworkTreeAddSave.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:01 12/12/2025
Last modified:
22:30:01 08/01/2025
MD5 hash:
93fdf1213fdb5d525641e2b625f1a91b
Filesize:
7.61 KB
suspicious functions used:
`network_tree` WHERE `olt_id` = '$olt_id' AND ` (line:107); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery.php-
Full path:
abi/web2/PaymentOnlineQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:01 12/12/2025
Last modified:
23:21:15 14/02/2025
MD5 hash:
6a845f0e20c434c12eb30f42726f268d
Filesize:
28.37 KB
suspicious functions used:
curl_exec (line:457);curl_exec (line:669); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery2.php-
Full path:
abi/web2/PaymentOnlineQuery2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:01 12/12/2025
Last modified:
19:44:38 20/11/2024
MD5 hash:
ccd315d11a60901b7b9029ff44f8351b
Filesize:
19.4 KB
suspicious functions used:
curl_exec (line:42);curl_exec (line:252); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeEdit1.php-
Full path:
abi/web2/NetworkTreeEdit1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:01 12/12/2025
Last modified:
19:44:38 20/11/2024
MD5 hash:
3396a6bdf9b5804bb208f38f37cc29a2
Filesize:
35.81 KB
suspicious functions used:
`olt_onu` WHERE olt_id = '$olt_id' AND ` (line:207); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeEditSave.php-
Full path:
abi/web2/NetworkTreeEditSave.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:01 12/12/2025
Last modified:
22:20:43 30/03/2025
MD5 hash:
75ca95ac9b0cf5e9709091d3a6ae5b6a
Filesize:
13.55 KB
suspicious functions used:
`olt_pon` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND ` (line:84);`network_tree` WHERE `olt_id` = '$olt_id' AND ` (line:196); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeList.php-
Full path:
abi/web2/NetworkTreeList.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:01 12/12/2025
Last modified:
23:32:36 18/04/2025
MD5 hash:
2e75d2b5d8285321171467ca5c0afbe4
Filesize:
32 KB
suspicious functions used:
`pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '{$rowsedfg['olt_id']}' AND ` (line:455); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeMap.php-
Full path:
abi/web2/NetworkTreeMap.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:01 12/12/2025
Last modified:
17:23:41 23/03/2025
MD5 hash:
9a2606558b5ebf04b77c89eeeb6df1c6
Filesize:
49.36 KB
suspicious functions used:
`${totalonline}` (line:121);`${totaloffline}` (line:122);`Failed to load data: ${error.message}` (line:788);`HTTP error! Status: ${response.status}` (line:803); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeMap1.php-
Full path:
abi/web2/NetworkTreeMap1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:01 12/12/2025
Last modified:
15:36:05 19/03/2025
MD5 hash:
468cfbce8d08d577fb1fe05b51eb722f
Filesize:
48.69 KB
suspicious functions used:
`${totalonline}` (line:122);`${totaloffline}` (line:123);`Failed to load data: ${error.message}` (line:776);`HTTP error! Status: ${response.status}` (line:790); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentWebhook.php-
Full path:
abi/web2/PaymentWebhook.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:02 12/12/2025
Last modified:
19:44:39 20/11/2024
MD5 hash:
a2f322c94787630ab1e0c8ca35fc5ba1
Filesize:
18.6 KB
suspicious functions used:
base64_decode (line:30);curl_exec (line:41);curl_exec (line:422); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMS1.php-
Full path:
abi/web2/SMS1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:02 12/12/2025
Last modified:
19:44:39 20/11/2024
MD5 hash:
e4671dadf9ad575671fd3609a60030da
Filesize:
32.19 KB
suspicious functions used:
curl_exec (line:59); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SignUp1.php-
Full path:
abi/web2/SignUp1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:03 12/12/2025
Last modified:
10:59:04 24/04/2025
MD5 hash:
22cdaf528a51aa44652f81cc911a85fa
Filesize:
26.63 KB
suspicious functions used:
curl_exec (line:53);curl_exec (line:75); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: UserAccess.php-
Full path:
abi/web2/UserAccess.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:03 12/12/2025
Last modified:
02:15:48 01/06/2025
MD5 hash:
a3c12b17bcb2c8035cfa045807797ae6
Filesize:
10.45 KB
suspicious functions used:
`.modulecheckboxx[data-group="${group}"]` (line:159); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: UserLoginReport.php-
Full path:
abi/web2/UserLoginReport.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:03 12/12/2025
Last modified:
15:51:00 19/04/2025
MD5 hash:
43d95cc2a57279f23f52d11581c9427f
Filesize:
7.76 KB
suspicious functions used:
curl_exec (line:120); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-countt.php-
Full path:
abi/web2/network-olt-client-onu-mac-countt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:04 12/12/2025
Last modified:
23:51:57 24/03/2025
MD5 hash:
6c684ef0e37eeb3400821b34d0d05fec
Filesize:
8.94 KB
suspicious functions used:
shell_exec (line:26);shell_exec (line:36);shell_exec (line:59);shell_exec (line:75);shell_exec (line:92);shell_exec (line:102);shell_exec (line:117);shell_exec (line:155);shell_exec (line:206);shell_exec (line:262);shell_exec (line:275);shell_exec (line:288); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: emp_salary_advence_find.php-
Full path:
abi/web2/emp_salary_advence_find.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:04 12/12/2025
Last modified:
19:44:35 20/11/2024
MD5 hash:
74a7e2ffda0f7584611d7cbce6136c24
Filesize:
2.25 KB
suspicious functions used:
`expanse` WHERE `type` = '2' AND `status` = '2' AND ex_by = '$e_id' AND MONTH(`, `) = MONTH('$lastmonth') AND YEAR(`, `) = YEAR('$lastmonth') GROUP BY ` (line:8);`e_id` = '$e_id' AND ` (line:12); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: imagevwr.php-
Full path:
abi/web2/imagevwr.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:04 12/12/2025
Last modified:
19:44:35 20/11/2024
MD5 hash:
47a223a13cc642d01dcfaaca542d396d
Filesize:
915 B
suspicious functions used:
curl_exec (line:15); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
abi/web2/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:04 12/12/2025
Last modified:
19:44:35 20/11/2024
MD5 hash:
c46a50905333286f45dfeacf010851ab
Filesize:
716 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: client-online-mbb.php-
Full path:
abi/web2/client-online-mbb.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:04 12/12/2025
Last modified:
12:19:30 15/04/2025
MD5 hash:
a1cef934dce8da065b0116b7915754af
Filesize:
16.36 KB
suspicious functions used:
curl_exec (line:88);curl_exec (line:288); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_network.php-
Full path:
abi/web2/cron_network.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:04 12/12/2025
Last modified:
00:45:09 25/03/2025
MD5 hash:
36fe709ddc5062ba1fecfe1417fdff91
Filesize:
4 KB
suspicious functions used:
curl_exec (line:42);curl_exec (line:64); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_olt.php-
Full path:
abi/web2/cron_olt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:04 12/12/2025
Last modified:
11:18:19 03/05/2025
MD5 hash:
f0248614baaea216d0f29e0ca584410b
Filesize:
4.46 KB
suspicious functions used:
shell_exec (line:51);curl_exec (line:106); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: clients-nots-action.php-
Full path:
abi/web2/clients-nots-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:04 12/12/2025
Last modified:
19:44:34 20/11/2024
MD5 hash:
dff1bb495509427d098cb4588da553b9
Filesize:
5.89 KB
suspicious functions used:
curl_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: company_info.php-
Full path:
abi/web2/company_info.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:04 12/12/2025
Last modified:
20:00:12 10/06/2025
MD5 hash:
848ec6ca3eaee7396ae9e4e9db5970fe
Filesize:
8.34 KB
suspicious functions used:
curl_exec (line:131); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
abi/web2/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:04 12/12/2025
Last modified:
19:44:34 20/11/2024
MD5 hash:
ba9747d0421fd091b998389469e72a0b
Filesize:
1.7 KB
suspicious functions used:
curl_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_all.php-
Full path:
abi/web2/cron_all.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:04 12/12/2025
Last modified:
19:44:34 20/11/2024
MD5 hash:
967f1d654ae891609da26b9e0fdbd1ae
Filesize:
2.44 KB
suspicious functions used:
curl_exec (line:23);curl_exec (line:38);curl_exec (line:53); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_gen_bill.php-
Full path:
abi/web2/cron_auto_gen_bill.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:04 12/12/2025
Last modified:
19:44:34 20/11/2024
MD5 hash:
f1056618cc4402968e50d1232d2c51c8
Filesize:
4.73 KB
suspicious functions used:
curl_exec (line:140);curl_exec (line:149); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_olt_clients_catch.php-
Full path:
abi/web2/cron_olt_clients_catch.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:04 12/12/2025
Last modified:
10:50:06 03/05/2025
MD5 hash:
f3775b14a4f3709bd1e20ac451a3bea1
Filesize:
2.05 KB
suspicious functions used:
curl_exec (line:55); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive.php-
Full path:
abi/web2/cron_auto_inactive.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:04 12/12/2025
Last modified:
03:27:53 10/12/2024
MD5 hash:
7e0dc4dd9dae2bf0220516641b53c027
Filesize:
5.43 KB
suspicious functions used:
curl_exec (line:142); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive2.php-
Full path:
abi/web2/cron_auto_inactive2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:04 12/12/2025
Last modified:
19:44:34 20/11/2024
MD5 hash:
440bc24f05b01eb395df63fff2f60de9
Filesize:
5.46 KB
suspicious functions used:
curl_exec (line:142); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_olt_user.php-
Full path:
abi/web2/cron_olt_user.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:04 12/12/2025
Last modified:
19:44:34 20/11/2024
MD5 hash:
67aa237639e3d1e6064e76079bb3cccc
Filesize:
1.97 KB
suspicious functions used:
curl_exec (line:19);curl_exec (line:46); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive_termination.php-
Full path:
abi/web2/cron_auto_inactive_termination.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:04 12/12/2025
Last modified:
16:19:53 19/06/2025
MD5 hash:
00219337ca3acfa1c8ed5b25b0d195e9
Filesize:
12.89 KB
suspicious functions used:
curl_exec (line:232);curl_exec (line:244);curl_exec (line:284); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: getclientuptime.php-
Full path:
abi/web2/getclientuptime.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:04 12/12/2025
Last modified:
19:44:35 20/11/2024
MD5 hash:
bbc14cdd451c72b94d78c7d2d1af0b52
Filesize:
718 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_termination_remainder1.php-
Full path:
abi/web2/cron_auto_termination_remainder1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:04 12/12/2025
Last modified:
19:44:34 20/11/2024
MD5 hash:
7765f9f820dbd402f1064fab9958ffaa
Filesize:
3.26 KB
suspicious functions used:
curl_exec (line:83); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_client_bandwidth_count.php-
Full path:
abi/web2/cron_client_bandwidth_count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:04 12/12/2025
Last modified:
23:57:39 27/06/2025
MD5 hash:
86a11e3249fc7373c635fd7dea912c09
Filesize:
5.71 KB
suspicious functions used:
curl_exec (line:157); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-con-sts.php-
Full path:
abi/web2/network-olt-con-sts.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:04 12/12/2025
Last modified:
23:47:11 24/03/2025
MD5 hash:
400a889537016067b55f97ac6d0a16a3
Filesize:
4.02 KB
suspicious functions used:
`olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:10);shell_exec (line:38);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, `last_synced`, `last_update`, `msg`, `full_msg`, ROUND((SELECT AVG(value) FROM olt_onu_history WHERE alarm_id = '$alarmId' AND value != ''), 2) AS average_value FROM `, ` WHERE `alarm_id` = '$alarmId' AND ` (line:82); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-oid-check.php-
Full path:
abi/web2/network-olt-oid-check.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:04 12/12/2025
Last modified:
19:44:37 20/11/2024
MD5 hash:
5b7dc0ce1103fbfc895873c250b63141
Filesize:
1.88 KB
suspicious functions used:
shell_exec (line:33); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ip-ping-checker.php-
Full path:
abi/web2/ip-ping-checker.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:04 12/12/2025
Last modified:
19:44:36 20/11/2024
MD5 hash:
0d28f3053b73b3fe2885cf519ee17c12
Filesize:
2.64 KB
suspicious functions used:
curl_exec (line:81); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-load.php-
Full path:
abi/web2/network-olt-load.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:04 12/12/2025
Last modified:
19:44:37 20/11/2024
MD5 hash:
f49d5153285c639ed91d4e806685ee56
Filesize:
1.33 KB
suspicious functions used:
shell_exec (line:22);shell_exec (line:25); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-helper.php-
Full path:
abi/web2/nagad-helper.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:04 12/12/2025
Last modified:
23:20:14 14/02/2025
MD5 hash:
114b90b978b842cd318391876ba454ab
Filesize:
2.84 KB
suspicious functions used:
curl_exec (line:46);base64_decode (line:77); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-merchant-callback.php-
Full path:
abi/web2/nagad-merchant-callback.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:04 12/12/2025
Last modified:
05:35:21 30/03/2025
MD5 hash:
a782d367c638b8f47cb46738f54fa753
Filesize:
16.47 KB
suspicious functions used:
curl_exec (line:20); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-olt-all-mac-array.php-
Full path:
abi/web2/netowrk-olt-all-mac-array.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:04 12/12/2025
Last modified:
19:44:37 20/11/2024
MD5 hash:
b0168ce99145e2afe64357247d750dd6
Filesize:
4.62 KB
suspicious functions used:
shell_exec (line:33);shell_exec (line:47);shell_exec (line:61);shell_exec (line:76);shell_exec (line:93); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-snmp-data.php-
Full path:
abi/web2/netowrk-snmp-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:04 12/12/2025
Last modified:
10:14:59 29/04/2025
MD5 hash:
cebb238044a122cb2dc9038afac8ca43
Filesize:
24.93 KB
suspicious functions used:
shell_exec (line:104);shell_exec (line:113);shell_exec (line:123);shell_exec (line:142);shell_exec (line:154);shell_exec (line:165);shell_exec (line:181);shell_exec (line:191);shell_exec (line:207);shell_exec (line:227);shell_exec (line:236);shell_exec (line:244);shell_exec (line:251);shell_exec (line:256);`pon_name` FROM `olt_pon` WHERE `olt_pon_id` = '$pon_id' AND ` (line:263);shell_exec (line:280);shell_exec (line:290);`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:303);shell_exec (line:309);shell_exec (line:441); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-old-onu-rx-map.php-
Full path:
abi/web2/network-old-onu-rx-map.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:05 12/12/2025
Last modified:
23:50:40 24/03/2025
MD5 hash:
bfa54cd4fcf2629316f30310fcc90b78
Filesize:
6.93 KB
suspicious functions used:
shell_exec (line:77); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-old-onu-rx.php-
Full path:
abi/web2/network-old-onu-rx.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:05 12/12/2025
Last modified:
23:50:30 24/03/2025
MD5 hash:
a2555fb0203a78b0e1f41ae2d96f6f82
Filesize:
7.35 KB
suspicious functions used:
shell_exec (line:86); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook_test.php-
Full path:
abi/web2/webhook_test.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:05 12/12/2025
Last modified:
19:44:41 20/11/2024
MD5 hash:
74a7dcc262d7fe7f2bdc9e0595d03837
Filesize:
4.69 KB
suspicious functions used:
base64_decode (line:22);curl_exec (line:33);curl_exec (line:86);curl_exec (line:107); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-count-cdata.php-
Full path:
abi/web2/network-olt-client-onu-mac-count-cdata.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:05 12/12/2025
Last modified:
19:44:37 20/11/2024
MD5 hash:
c378dbabf36066c335cfb8838a6e167d
Filesize:
4.58 KB
suspicious functions used:
shell_exec (line:25);shell_exec (line:35);shell_exec (line:56);shell_exec (line:103);shell_exec (line:115);shell_exec (line:126);shell_exec (line:140); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-count.php-
Full path:
abi/web2/network-olt-client-onu-mac-count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:05 12/12/2025
Last modified:
10:14:59 29/04/2025
MD5 hash:
80af84e49b42497813db916584cfa0f2
Filesize:
15.29 KB
suspicious functions used:
shell_exec (line:26);shell_exec (line:36);shell_exec (line:68);shell_exec (line:84);shell_exec (line:101);shell_exec (line:119);shell_exec (line:135);shell_exec (line:176);shell_exec (line:236);shell_exec (line:312);shell_exec (line:379);shell_exec (line:469);shell_exec (line:488);shell_exec (line:507); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec.php-
Full path:
abi/web2/login_exec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:05 12/12/2025
Last modified:
20:20:44 23/04/2025
MD5 hash:
fe0ff14fc554949b87917caaf5d443f8
Filesize:
12.26 KB
suspicious functions used:
curl_exec (line:24);curl_exec (line:80);curl_exec (line:199);curl_exec (line:237); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: LoginByPass.php-
Full path:
abi/web2/LoginByPass.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:05 12/12/2025
Last modified:
09:07:20 19/04/2025
MD5 hash:
1c6616dae30e9849d8f4fb0fe712a748
Filesize:
4.59 KB
suspicious functions used:
curl_exec (line:44);curl_exec (line:69); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: macreseller-news.php-
Full path:
abi/web2/macreseller-news.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:05 12/12/2025
Last modified:
19:55:57 10/01/2025
MD5 hash:
ed23ca98b77c5321b4485e85eb2ea64d
Filesize:
3.67 KB
suspicious functions used:
curl_exec (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook.php-
Full path:
abi/web2/webhook.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:05 12/12/2025
Last modified:
03:49:00 08/02/2025
MD5 hash:
69a88ae1be0ab3ab1c7c971c72c0b025
Filesize:
21.93 KB
suspicious functions used:
base64_decode (line:28);curl_exec (line:39);curl_exec (line:465); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-alarm-add.php-
Full path:
abi/web2/network-olt-onu-alarm-add.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:05 12/12/2025
Last modified:
19:44:37 20/11/2024
MD5 hash:
be6ba82c658419e1454f778e20e2d4c3
Filesize:
7.86 KB
suspicious functions used:
shell_exec (line:103); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-count.php-
Full path:
abi/web2/network-olt-onu-count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:05 12/12/2025
Last modified:
23:53:15 24/03/2025
MD5 hash:
cbfe569e079da8f569d07af1dec94de5
Filesize:
7.22 KB
suspicious functions used:
`olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:14);shell_exec (line:83); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-list-data.php-
Full path:
abi/web2/network-olt-onu-list-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:05 12/12/2025
Last modified:
19:44:37 20/11/2024
MD5 hash:
54cc9417c766c31317311c3722ce7d4b
Filesize:
9.48 KB
suspicious functions used:
shell_exec (line:24);shell_exec (line:38);shell_exec (line:64);shell_exec (line:85);shell_exec (line:104);shell_exec (line:125);shell_exec (line:143);shell_exec (line:153);shell_exec (line:165);shell_exec (line:185); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tagreeexpayment.php-
Full path:
abi/web2/tagreeexpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:05 12/12/2025
Last modified:
19:44:40 20/11/2024
MD5 hash:
029b4fba649a75c7c81d2f8931be8d63
Filesize:
2.86 KB
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-power.php-
Full path:
abi/web2/network-olt-onu-power.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:05 12/12/2025
Last modified:
19:44:37 20/11/2024
MD5 hash:
2e064543b67b532bdf4e5b12d49c5052
Filesize:
7.54 KB
suspicious functions used:
shell_exec (line:97); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-clients-search.php-
Full path:
abi/web2/network-olt-pon-clients-search.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:05 12/12/2025
Last modified:
19:44:37 20/11/2024
MD5 hash:
79d26fc66abdab6f173330588aa8b238
Filesize:
10.93 KB
suspicious functions used:
shell_exec (line:42);shell_exec (line:51);shell_exec (line:104);shell_exec (line:168); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search-bdcom.php-
Full path:
abi/web2/network-olt-pon-onu-search-bdcom.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:05 12/12/2025
Last modified:
19:44:37 20/11/2024
MD5 hash:
c786fa8b69268c738b6ff976631798cd
Filesize:
27.74 KB
suspicious functions used:
shell_exec (line:60);shell_exec (line:69);shell_exec (line:383); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search-bdcom1.php-
Full path:
abi/web2/network-olt-pon-onu-search-bdcom1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:05 12/12/2025
Last modified:
19:44:37 20/11/2024
MD5 hash:
dd18677b1dcbf7f0bce2ac6912d98da0
Filesize:
9.6 KB
suspicious functions used:
shell_exec (line:42);shell_exec (line:51);shell_exec (line:129); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search.php-
Full path:
abi/web2/network-olt-pon-onu-search.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:05 12/12/2025
Last modified:
19:44:37 20/11/2024
MD5 hash:
dc183ecf77d0e1f56f672338fd09cfa5
Filesize:
21.62 KB
suspicious functions used:
shell_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreateagree.php-
Full path:
abi/web2/tcreateagree.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:06 12/12/2025
Last modified:
19:44:40 20/11/2024
MD5 hash:
27a10adf4190edc7eceee8cf74a6b72b
Filesize:
999 B
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tis-news.php-
Full path:
abi/web2/tis-news.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:06 12/12/2025
Last modified:
19:44:40 20/11/2024
MD5 hash:
ed23ca98b77c5321b4485e85eb2ea64d
Filesize:
3.67 KB
suspicious functions used:
curl_exec (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tt.php-
Full path:
abi/web2/tt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:06 12/12/2025
Last modified:
19:44:40 20/11/2024
MD5 hash:
9c4ed141cb79fdc7e807b35923c91a20
Filesize:
1.56 KB
suspicious functions used:
curl_exec (line:30); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data-bdcom.php-
Full path:
abi/web2/network-snmp-onu-status-data-bdcom.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:06 12/12/2025
Last modified:
10:05:49 15/04/2025
MD5 hash:
8e6c4057a9586f2e4cc65277a19854a3
Filesize:
23.58 KB
suspicious functions used:
shell_exec (line:49);shell_exec (line:74);shell_exec (line:86);shell_exec (line:104);shell_exec (line:117);shell_exec (line:129);shell_exec (line:135);shell_exec (line:160);shell_exec (line:173);shell_exec (line:185);shell_exec (line:191);shell_exec (line:218);shell_exec (line:231);shell_exec (line:237); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data1.php-
Full path:
abi/web2/network-snmp-onu-status-data1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:06 12/12/2025
Last modified:
23:46:38 24/03/2025
MD5 hash:
21b4726e351c4b0fcb7d6f0959c0d888
Filesize:
15.98 KB
suspicious functions used:
shell_exec (line:34);`olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:38);shell_exec (line:150); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ttoken.php-
Full path:
abi/web2/ttoken.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:06 12/12/2025
Last modified:
19:44:40 20/11/2024
MD5 hash:
5f2c51c1db5b0defadfb67ce25c0098f
Filesize:
1.54 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data_vsol2.php-
Full path:
abi/web2/network-snmp-onu-status-data_vsol2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:06 12/12/2025
Last modified:
19:44:37 20/11/2024
MD5 hash:
f22d022ddc284f4d8e1de3660da91db8
Filesize:
15.61 KB
suspicious functions used:
shell_exec (line:34);shell_exec (line:113);shell_exec (line:126);shell_exec (line:132); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreatepayment.php-
Full path:
abi/web2/tcreatepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:06 12/12/2025
Last modified:
19:44:40 20/11/2024
MD5 hash:
e49de9a33f5164bc2c6b88e4770faaff
Filesize:
1.07 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
abi/web2/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:06 12/12/2025
Last modified:
19:44:40 20/11/2024
MD5 hash:
7d8e71ceda3ffb74623e0c4a814715af
Filesize:
1.53 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test2.php-
Full path:
abi/web2/test2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:06 12/12/2025
Last modified:
01:31:16 13/07/2025
MD5 hash:
c6958a9bbfdcdbd216e5112c797c48db
Filesize:
16.55 KB
suspicious functions used:
curl_exec (line:67);shell_exec (line:129);shell_exec (line:140);shell_exec (line:146);shell_exec (line:158);shell_exec (line:171);shell_exec (line:211);curl_exec (line:257);curl_exec (line:282);curl_exec (line:424); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index.php-
Full path:
abi/web2/index.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:06 12/12/2025
Last modified:
20:18:02 23/04/2025
MD5 hash:
2e1798df24b219a66401b4936b812f43
Filesize:
16.11 KB
suspicious functions used:
curl_exec (line:282); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-tree-vartual-nodes.php-
Full path:
abi/web2/network-tree-vartual-nodes.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:06 12/12/2025
Last modified:
03:57:25 08/03/2025
MD5 hash:
ef5de6634f62a12fd5139c800708aa30
Filesize:
10.49 KB
suspicious functions used:
shell_exec (line:76);shell_exec (line:111);shell_exec (line:145);shell_exec (line:181);shell_exec (line:188); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: sms-balance-check.php-
Full path:
abi/web2/sms-balance-check.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:06 12/12/2025
Last modified:
22:55:26 18/04/2025
MD5 hash:
76d6e591039b8f16382220fec77cd3d7
Filesize:
984 B
suspicious functions used:
curl_exec (line:15); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree-olt-onu-list-data.php-
Full path:
abi/web2/networktree-olt-onu-list-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:06 12/12/2025
Last modified:
19:44:37 20/11/2024
MD5 hash:
af4221fefa9c9051846a063ac4135560
Filesize:
8.72 KB
suspicious functions used:
shell_exec (line:24);shell_exec (line:36);shell_exec (line:59);shell_exec (line:78);shell_exec (line:97);shell_exec (line:116);shell_exec (line:134);shell_exec (line:143);shell_exec (line:155);shell_exec (line:175); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: sms_deliverey_report.php-
Full path:
abi/web2/sms_deliverey_report.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:06 12/12/2025
Last modified:
19:44:40 20/11/2024
MD5 hash:
03623943da7e9334e137b38c8577fc84
Filesize:
4.25 KB
suspicious functions used:
curl_exec (line:28);curl_exec (line:53);curl_exec (line:90); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_onu_list_add.php-
Full path:
abi/web2/networktree_device_onu_list_add.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:06 12/12/2025
Last modified:
22:39:32 30/03/2025
MD5 hash:
23aa4b30ff4514610497db10c8490003
Filesize:
16.07 KB
suspicious functions used:
shell_exec (line:31);`network_tree` WHERE `onu_mac` = '$mac_address' AND ` (line:129);`olt_pon` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND ` (line:163);shell_exec (line:198);shell_exec (line:221);shell_exec (line:238);`network_tree` WHERE `onu_mac` = '$onuMac' AND ` (line:276);shell_exec (line:302);shell_exec (line:308);shell_exec (line:319);`network_tree` WHERE `onu_mac` = '$onuMac' AND ` (line:355);`olt_pon` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND ` (line:391); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_pon_check.php-
Full path:
abi/web2/networktree_device_pon_check.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:06 12/12/2025
Last modified:
23:18:50 18/03/2025
MD5 hash:
b7f8731e7d12665b418927d722340da4
Filesize:
1.58 KB
suspicious functions used:
`pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '$olt_id' AND ` (line:8); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: support-action.php-
Full path:
abi/web2/support-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:06 12/12/2025
Last modified:
13:25:42 13/03/2025
MD5 hash:
b8c8c56826a0a8e027a23e6a365c70a0
Filesize:
14.54 KB
suspicious functions used:
curl_exec (line:220); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_pon_list_add.php-
Full path:
abi/web2/networktree_device_pon_list_add.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:06 12/12/2025
Last modified:
23:18:04 18/03/2025
MD5 hash:
2cf70db6a91f4c5d1821b4b5fa178ebb
Filesize:
1.38 KB
suspicious functions used:
`olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:6);`olt_pon` WHERE `olt_id` = '$olt_id' AND ` (line:10);`network_tree` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND ` (line:17); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_pon_port_onu_list.php-
Full path:
abi/web2/networktree_device_pon_port_onu_list.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:06 12/12/2025
Last modified:
22:39:32 30/03/2025
MD5 hash:
6578424616a5eefb751d5e3e155adba6
Filesize:
8.63 KB
suspicious functions used:
`olt_pon` WHERE olt_id = '$olt_id' AND ` (line:25);shell_exec (line:32);shell_exec (line:45);`network_tree` WHERE onu_index_id = '$port_onu_index_id' AND ` (line:49);shell_exec (line:81);shell_exec (line:104);shell_exec (line:123);shell_exec (line:144);shell_exec (line:162);shell_exec (line:171);shell_exec (line:185); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_pon_port_sense_list.php-
Full path:
abi/web2/networktree_device_pon_port_sense_list.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:06 12/12/2025
Last modified:
22:20:42 30/03/2025
MD5 hash:
4d80475d2f31f38e21239a5a1a19285f
Filesize:
3.7 KB
suspicious functions used:
`network_tree` WHERE `onu_mac` = '$onu_mac' AND ` (line:26);`network_tree` WHERE `c_id` = '{$dfhbdxf}' AND ` (line:72); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_type.php-
Full path:
abi/web2/networktree_device_type.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:06 12/12/2025
Last modified:
23:08:11 20/11/2024
MD5 hash:
f1520732e5a3ef38564238a3278a1f63
Filesize:
11.43 KB
suspicious functions used:
`tree_id`) AS countolt FROM `network_tree` WHERE `olt_id` = '$olt_id_sure' AND ` (line:64); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test6.php-
Full path:
abi/web2/test6.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:06 12/12/2025
Last modified:
19:44:40 20/11/2024
MD5 hash:
f22d022ddc284f4d8e1de3660da91db8
Filesize:
15.61 KB
suspicious functions used:
shell_exec (line:34);shell_exec (line:113);shell_exec (line:126);shell_exec (line:132); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test7.php-
Full path:
abi/web2/test7.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:06 12/12/2025
Last modified:
19:44:40 20/11/2024
MD5 hash:
b11ccf951ce63a21ea0a7328316a0e5c
Filesize:
1.57 KB
suspicious functions used:
curl_exec (line:14); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: testttttt.php-
Full path:
abi/web2/testttttt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:06 12/12/2025
Last modified:
19:44:40 20/11/2024
MD5 hash:
b1988a4be29e191ad935fb409a4174ee
Filesize:
2 KB
suspicious functions used:
curl_exec (line:47); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: texecutepayment.php-
Full path:
abi/web2/texecutepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:06 12/12/2025
Last modified:
19:44:40 20/11/2024
MD5 hash:
623635fdf5c871391d3a5fe99ee8c543
Filesize:
2.91 KB
suspicious functions used:
curl_exec (line:24); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook_cid.php-
Full path:
abi/web2/webhook_cid.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:06 12/12/2025
Last modified:
03:53:20 08/02/2025
MD5 hash:
1a2672fc0dd81a9c831e3fa60ec860e1
Filesize:
21.52 KB
suspicious functions used:
base64_decode (line:29);curl_exec (line:40);curl_exec (line:439); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: time.php-
Full path:
abi/web2/time.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:06 12/12/2025
Last modified:
05:27:42 20/03/2025
MD5 hash:
f72a880b38cb26f3d208bfe99eec1633
Filesize:
5.25 KB
suspicious functions used:
`${formatDistance(totalDistance)}` (line:121);`${Math.round(distance)} m`, `${(distance / 1000).toFixed(2)} km` (line:150); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search-rcl.php-
Full path:
abi/web2/network-olt-pon-onu-search-rcl.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:06 12/12/2025
Last modified:
05:34:01 01/02/2025
MD5 hash:
565ff38d572bba4bc20721ab17484554
Filesize:
27.33 KB
suspicious functions used:
shell_exec (line:46);shell_exec (line:55);shell_exec (line:369); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-snmp-data-auto.php-
Full path:
abi/web2/netowrk-snmp-data-auto.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:06 12/12/2025
Last modified:
23:50:52 24/03/2025
MD5 hash:
b30b86386b4d79a756cefdd86f070bd5
Filesize:
7.27 KB
suspicious functions used:
shell_exec (line:68);shell_exec (line:118); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: olt_all_onu_mac.php-
Full path:
abi/web2/olt_all_onu_mac.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:06 12/12/2025
Last modified:
00:41:19 02/02/2025
MD5 hash:
bde00602b98fba3ce9f7669b0d6f0fa3
Filesize:
4.56 KB
suspicious functions used:
shell_exec (line:22);shell_exec (line:38);shell_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test9.php-
Full path:
abi/web2/test9.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:06 12/12/2025
Last modified:
13:09:09 30/03/2025
MD5 hash:
87b5d5bf52fb36a8ccea006021ec8820
Filesize:
7.17 KB
suspicious functions used:
shell_exec (line:44);shell_exec (line:69);shell_exec (line:81);shell_exec (line:104);shell_exec (line:126);shell_exec (line:140);shell_exec (line:153);shell_exec (line:165);shell_exec (line:171); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test8.php-
Full path:
abi/web2/test8.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:06 12/12/2025
Last modified:
12:14:11 15/02/2025
MD5 hash:
0da20f06359cae632ac4b808ab2eee77
Filesize:
3.65 KB
suspicious functions used:
shell_exec (line:48); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: AppSettings.php-
Full path:
abi/web2/AppSettings.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:06 12/12/2025
Last modified:
04:23:39 03/05/2025
MD5 hash:
512b3e52141311ec6f69c2d46859b4ec
Filesize:
124.27 KB
suspicious functions used:
`input[name="${inputName}"]:checked` (line:2076); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ClientsOnMap1.php-
Full path:
abi/web2/ClientsOnMap1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:06 12/12/2025
Last modified:
08:52:14 08/03/2025
MD5 hash:
ba0202f8bef3c634e895471057086953
Filesize:
13.14 KB
suspicious functions used:
`${totalonline}` (line:109);`${totaloffline}` (line:110);`${results.rxPower}` (line:243);`${results.distance}` (line:244);`${results.supplyVoltage}` (line:245);`${results.temperature}` (line:246);`${results.txPower}` (line:247); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeMap2.php-
Full path:
abi/web2/NetworkTreeMap2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:07 12/12/2025
Last modified:
12:23:05 18/03/2025
MD5 hash:
6487967886178db61db1c1d6c4479af3
Filesize:
49.47 KB
suspicious functions used:
`${totalonline}` (line:122);`${totaloffline}` (line:123);`Failed to load data: ${error.message}` (line:769);`HTTP error! Status: ${response.status}` (line:783); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data-bdcom-online.php-
Full path:
abi/web2/network-snmp-onu-status-data-bdcom-online.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:07 12/12/2025
Last modified:
09:02:46 03/05/2025
MD5 hash:
a63b8935b2897e257872145705a654a9
Filesize:
21.78 KB
suspicious functions used:
shell_exec (line:48);shell_exec (line:73);shell_exec (line:85);shell_exec (line:103);shell_exec (line:116);shell_exec (line:128);shell_exec (line:134);shell_exec (line:159);shell_exec (line:172);shell_exec (line:184);shell_exec (line:190);shell_exec (line:217);shell_exec (line:230);shell_exec (line:236); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data-online.php-
Full path:
abi/web2/network-snmp-onu-status-data-online.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:07 12/12/2025
Last modified:
09:02:46 03/05/2025
MD5 hash:
0d8187961d76276c1aaaa369cdabf36b
Filesize:
27.73 KB
suspicious functions used:
shell_exec (line:35);`olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:41);shell_exec (line:80);shell_exec (line:94);shell_exec (line:108);shell_exec (line:121);shell_exec (line:196);shell_exec (line:429);shell_exec (line:441);shell_exec (line:448); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data.php-
Full path:
abi/web2/network-snmp-onu-status-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:07 12/12/2025
Last modified:
10:17:30 15/04/2025
MD5 hash:
30cb65623c66c45bd502104b935d2c48
Filesize:
30.69 KB
suspicious functions used:
shell_exec (line:36);`olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:42);shell_exec (line:81);shell_exec (line:95);shell_exec (line:109);shell_exec (line:122);shell_exec (line:208);shell_exec (line:436);shell_exec (line:448);shell_exec (line:455); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test11.php-
Full path:
abi/web2/test11.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:07 12/12/2025
Last modified:
05:06:13 07/06/2025
MD5 hash:
3b08c2f634e0f79dbb7a9c7d6e6c276d
Filesize:
1.49 KB
suspicious functions used:
curl_exec (line:52); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery2.php-
Full path:
abi/m2/PaymentOnlineQuery2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:08 12/12/2025
Last modified:
19:44:27 20/11/2024
MD5 hash:
3660992067d5591fc79ce89d6dbb9274
Filesize:
19.08 KB
suspicious functions used:
curl_exec (line:41);curl_exec (line:254); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
abi/m2/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:08 12/12/2025
Last modified:
19:44:27 20/11/2024
MD5 hash:
7d8e71ceda3ffb74623e0c4a814715af
Filesize:
1.53 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tagreeexpayment.php-
Full path:
abi/m2/tagreeexpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:08 12/12/2025
Last modified:
19:44:27 20/11/2024
MD5 hash:
c95e3ee881752db67b4f3597bc58430a
Filesize:
2.46 KB
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ttoken.php-
Full path:
abi/m2/ttoken.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:08 12/12/2025
Last modified:
19:44:27 20/11/2024
MD5 hash:
5f2c51c1db5b0defadfb67ce25c0098f
Filesize:
1.54 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
abi/m2/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:08 12/12/2025
Last modified:
19:44:26 20/11/2024
MD5 hash:
849185f307be30eafb1bbef93616d8c3
Filesize:
1.71 KB
suspicious functions used:
curl_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: support-action.php-
Full path:
abi/m2/support-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:08 12/12/2025
Last modified:
13:26:59 13/03/2025
MD5 hash:
adb69d6d3e277ad4c464c4fd0c41b4ca
Filesize:
10.29 KB
suspicious functions used:
curl_exec (line:99); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
abi/m2/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:08 12/12/2025
Last modified:
19:44:26 20/11/2024
MD5 hash:
9a3f22521ad987e86f84c4f5f688d5b7
Filesize:
713 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec.php-
Full path:
abi/m2/login_exec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:08 12/12/2025
Last modified:
20:20:46 23/04/2025
MD5 hash:
c8b31379830b912ec08a7917166a4aeb
Filesize:
12.26 KB
suspicious functions used:
curl_exec (line:25);curl_exec (line:81);curl_exec (line:200);curl_exec (line:238); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery.php-
Full path:
abi/m2/PaymentOnlineQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:08 12/12/2025
Last modified:
21:34:55 14/02/2025
MD5 hash:
6483645d440dd2f976cc1b29cb4021d5
Filesize:
20.95 KB
suspicious functions used:
curl_exec (line:287);curl_exec (line:492); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreateagree.php-
Full path:
abi/m2/tcreateagree.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:09 12/12/2025
Last modified:
19:44:27 20/11/2024
MD5 hash:
27a10adf4190edc7eceee8cf74a6b72b
Filesize:
999 B
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-merchant-callback.php-
Full path:
abi/m2/nagad-merchant-callback.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:09 12/12/2025
Last modified:
05:34:54 30/03/2025
MD5 hash:
3fcf93d3aec6449a76e27b14f01ada02
Filesize:
11.32 KB
suspicious functions used:
curl_exec (line:20); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreatepayment.php-
Full path:
abi/m2/tcreatepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:09 12/12/2025
Last modified:
19:44:27 20/11/2024
MD5 hash:
e49de9a33f5164bc2c6b88e4770faaff
Filesize:
1.07 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-snmp-data.php-
Full path:
abi/m2/netowrk-snmp-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:09 12/12/2025
Last modified:
10:15:44 29/04/2025
MD5 hash:
a0f9ff194951c18f7390ef750529f434
Filesize:
24.14 KB
suspicious functions used:
shell_exec (line:96);shell_exec (line:105);shell_exec (line:115);shell_exec (line:134);shell_exec (line:146);shell_exec (line:157);shell_exec (line:173);shell_exec (line:183);shell_exec (line:199);shell_exec (line:219);shell_exec (line:229);shell_exec (line:234);shell_exec (line:242);shell_exec (line:262);shell_exec (line:278);`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:291);shell_exec (line:297);shell_exec (line:430); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: texecutepayment.php-
Full path:
abi/m2/texecutepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:09 12/12/2025
Last modified:
19:44:27 20/11/2024
MD5 hash:
efbb63dfcfdacb52dec74bffc389bbb3
Filesize:
2.67 KB
suspicious functions used:
curl_exec (line:24); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index.php-
Full path:
abi/m2/index.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:09 12/12/2025
Last modified:
20:18:03 23/04/2025
MD5 hash:
5a9206eb2ef2835083705f01e81f5b41
Filesize:
16.41 KB
suspicious functions used:
curl_exec (line:282); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: LoginByPass.php-
Full path:
abi/m2/LoginByPass.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:09 12/12/2025
Last modified:
09:07:53 19/04/2025
MD5 hash:
ce55a8f81ccab7d07744fd3914d6ee35
Filesize:
4.65 KB
suspicious functions used:
curl_exec (line:44);curl_exec (line:69); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: AppSettings.php-
Full path:
abi/web/AppSettings.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:09 12/12/2025
Last modified:
23:21:45 10/12/2025
MD5 hash:
ea581b6261397133be9a4dd80bd6f3f0
Filesize:
124.15 KB
suspicious functions used:
`input[name="${inputName}"]:checked` (line:2074); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: AutoActiveClientsCount1.php-
Full path:
abi/web/AutoActiveClientsCount1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
04:49:58 12/12/2025
Last modified:
23:21:45 10/12/2025
MD5 hash:
96ae95689b28aef52bd4eaab4bfea7cc
Filesize:
5.38 KB
suspicious functions used:
system (line:54); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: AutoActiveClientsCount11.php-
Full path:
abi/web/AutoActiveClientsCount11.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:09 12/12/2025
Last modified:
23:21:45 10/12/2025
MD5 hash:
a0090e4a11dd59b955a6edd549b6ef2f
Filesize:
5.85 KB
suspicious functions used:
system (line:54); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: client-online-mbb.php-
Full path:
abi/web/client-online-mbb.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:53:48 12/12/2025
Last modified:
23:21:46 10/12/2025
MD5 hash:
a1cef934dce8da065b0116b7915754af
Filesize:
16.36 KB
suspicious functions used:
curl_exec (line:88);curl_exec (line:288); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: clients-nots-action.php-
Full path:
abi/web/clients-nots-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:10 12/12/2025
Last modified:
23:21:46 10/12/2025
MD5 hash:
2bca93a54b0b7e0d68b3246ee340ed86
Filesize:
6.11 KB
suspicious functions used:
curl_exec (line:45); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients.php-
Full path:
abi/web/Clients.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
03:05:34 12/12/2025
Last modified:
23:21:46 10/12/2025
MD5 hash:
7357585e2015b123461f9b80f46e0165
Filesize:
197.72 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:761); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients1.php-
Full path:
abi/web/Clients1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:11 12/12/2025
Last modified:
23:21:46 10/12/2025
MD5 hash:
ccec9015b85db7f5fd719dce1ddfd76d
Filesize:
197.59 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:759); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients2.php-
Full path:
abi/web/Clients2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:11 12/12/2025
Last modified:
23:21:46 10/12/2025
MD5 hash:
982d6411552113b0715fd17c26f50292
Filesize:
205.13 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:832); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients3.php-
Full path:
abi/web/Clients3.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:12 12/12/2025
Last modified:
23:21:46 10/12/2025
MD5 hash:
50ddc869b383ab76e009c7a2c17c99a3
Filesize:
175.31 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:832); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ClientsOnMap.php-
Full path:
abi/web/ClientsOnMap.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:12 12/12/2025
Last modified:
23:21:46 10/12/2025
MD5 hash:
7b8f5e0ae3a6480ccb98e508068088e1
Filesize:
19.51 KB
suspicious functions used:
`${totalonline}` (line:173);`${totaloffline}` (line:174);`${results.rxPower}` (line:307);`${results.distance}` (line:308);`${results.supplyVoltage}` (line:309);`${results.temperature}` (line:310);`${results.txPower}` (line:311); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ClientsOnMap1.php-
Full path:
abi/web/ClientsOnMap1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:13 12/12/2025
Last modified:
23:21:46 10/12/2025
MD5 hash:
ba0202f8bef3c634e895471057086953
Filesize:
13.14 KB
suspicious functions used:
`${totalonline}` (line:109);`${totaloffline}` (line:110);`${results.rxPower}` (line:243);`${results.distance}` (line:244);`${results.supplyVoltage}` (line:245);`${results.temperature}` (line:246);`${results.txPower}` (line:247); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ClientView.php-
Full path:
abi/web/ClientView.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
03:42:31 12/12/2025
Last modified:
23:21:47 10/12/2025
MD5 hash:
a5f03ace761a5f2f6462591923f8de8e
Filesize:
112.97 KB
suspicious functions used:
`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:227); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: company_info.php-
Full path:
abi/web/company_info.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:40:49 12/12/2025
Last modified:
23:21:47 10/12/2025
MD5 hash:
c3091548aa54603ba84d42a8560b5032
Filesize:
11.8 KB
suspicious functions used:
curl_exec (line:149); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: company_info11.php-
Full path:
abi/web/company_info11.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:13 12/12/2025
Last modified:
23:21:47 10/12/2025
MD5 hash:
fdc5bd8e767b7ddc1245c6d7d0946cb1
Filesize:
10.14 KB
suspicious functions used:
curl_exec (line:143); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
abi/web/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:13 12/12/2025
Last modified:
23:21:47 10/12/2025
MD5 hash:
ba9747d0421fd091b998389469e72a0b
Filesize:
1.7 KB
suspicious functions used:
curl_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_all.php-
Full path:
abi/web/cron_all.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:13 12/12/2025
Last modified:
23:21:47 10/12/2025
MD5 hash:
967f1d654ae891609da26b9e0fdbd1ae
Filesize:
2.44 KB
suspicious functions used:
curl_exec (line:23);curl_exec (line:38);curl_exec (line:53); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_apk_notifications.php-
Full path:
abi/web/cron_apk_notifications.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:39:02 12/12/2025
Last modified:
23:21:47 10/12/2025
MD5 hash:
6c611340a09653ebfc11204610ec9f24
Filesize:
7.21 KB
suspicious functions used:
curl_exec (line:114); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_gen_bill.php-
Full path:
abi/web/cron_auto_gen_bill.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:13 12/12/2025
Last modified:
23:21:47 10/12/2025
MD5 hash:
f1056618cc4402968e50d1232d2c51c8
Filesize:
4.73 KB
suspicious functions used:
curl_exec (line:140);curl_exec (line:149); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive.php-
Full path:
abi/web/cron_auto_inactive.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
17:50:01 12/12/2025
Last modified:
23:21:47 10/12/2025
MD5 hash:
da6db021fa0a2873f39f7e57d90f2192
Filesize:
6.79 KB
suspicious functions used:
curl_exec (line:186); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive2.php-
Full path:
abi/web/cron_auto_inactive2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:13 12/12/2025
Last modified:
23:21:47 10/12/2025
MD5 hash:
440bc24f05b01eb395df63fff2f60de9
Filesize:
5.46 KB
suspicious functions used:
curl_exec (line:142); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive_termination.php-
Full path:
abi/web/cron_auto_inactive_termination.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:40:49 12/12/2025
Last modified:
23:21:47 10/12/2025
MD5 hash:
9b3af0263bfcd9e990c70aaf583d2224
Filesize:
15 KB
suspicious functions used:
curl_exec (line:278);curl_exec (line:290);curl_exec (line:359); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_termination_remainder1.php-
Full path:
abi/web/cron_auto_termination_remainder1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:13 12/12/2025
Last modified:
23:21:47 10/12/2025
MD5 hash:
7765f9f820dbd402f1064fab9958ffaa
Filesize:
3.26 KB
suspicious functions used:
curl_exec (line:83); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_client_bandwidth_count.php-
Full path:
abi/web/cron_client_bandwidth_count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:43:05 12/12/2025
Last modified:
23:21:47 10/12/2025
MD5 hash:
2dc99fea4918a5bd4989aec22970dfdb
Filesize:
5.43 KB
suspicious functions used:
curl_exec (line:151); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_network.php-
Full path:
abi/web/cron_network.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:43:35 12/12/2025
Last modified:
23:21:47 10/12/2025
MD5 hash:
5cd028583972ec9c714405b2924ce3b3
Filesize:
4.44 KB
suspicious functions used:
curl_exec (line:42);curl_exec (line:64); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_olt.php-
Full path:
abi/web/cron_olt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:45:59 12/12/2025
Last modified:
23:21:47 10/12/2025
MD5 hash:
f0248614baaea216d0f29e0ca584410b
Filesize:
4.46 KB
suspicious functions used:
shell_exec (line:51);curl_exec (line:106); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_olt_clients_catch.php-
Full path:
abi/web/cron_olt_clients_catch.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:13 12/12/2025
Last modified:
23:21:47 10/12/2025
MD5 hash:
f3775b14a4f3709bd1e20ac451a3bea1
Filesize:
2.05 KB
suspicious functions used:
curl_exec (line:55); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_olt_user.php-
Full path:
abi/web/cron_olt_user.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:13 12/12/2025
Last modified:
23:21:47 10/12/2025
MD5 hash:
67aa237639e3d1e6064e76079bb3cccc
Filesize:
1.97 KB
suspicious functions used:
curl_exec (line:19);curl_exec (line:46); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_onu_alarm.php-
Full path:
abi/web/cron_onu_alarm.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:13 12/12/2025
Last modified:
23:21:47 10/12/2025
MD5 hash:
b6e893a39389d57724e9cde8f0c5a955
Filesize:
14.37 KB
suspicious functions used:
shell_exec (line:59);shell_exec (line:70);shell_exec (line:76);shell_exec (line:88);shell_exec (line:101);shell_exec (line:141);curl_exec (line:187);curl_exec (line:212);curl_exec (line:354); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: EmployeeAdd.php-
Full path:
abi/web/EmployeeAdd.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:13 12/12/2025
Last modified:
23:21:47 10/12/2025
MD5 hash:
c12c85fa282eb15060ed68bad252f8e8
Filesize:
19.13 KB
suspicious functions used:
`Element with ID ${id} not found.` (line:36);`Non-numeric input detected in ${id}.` (line:38);`Element with ID ${id} not found.` (line:44);`Non-numeric input detected in ${id}.` (line:46); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: EmployeeEdit.php-
Full path:
abi/web/EmployeeEdit.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:13 12/12/2025
Last modified:
23:21:47 10/12/2025
MD5 hash:
55b4626339d566473f477e1a001dc8b4
Filesize:
17.73 KB
suspicious functions used:
`Element with ID ${id} not found.` (line:44);`Non-numeric input detected in ${id}.` (line:46);`Element with ID ${id} not found.` (line:52);`Non-numeric input detected in ${id}.` (line:54); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: emp_salary_advence_find.php-
Full path:
abi/web/emp_salary_advence_find.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:13 12/12/2025
Last modified:
23:21:47 10/12/2025
MD5 hash:
74a7e2ffda0f7584611d7cbce6136c24
Filesize:
2.25 KB
suspicious functions used:
`expanse` WHERE `type` = '2' AND `status` = '2' AND ex_by = '$e_id' AND MONTH(`, `) = MONTH('$lastmonth') AND YEAR(`, `) = YEAR('$lastmonth') GROUP BY ` (line:8);`e_id` = '$e_id' AND ` (line:12); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
abi/web/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:13 12/12/2025
Last modified:
23:21:47 10/12/2025
MD5 hash:
c46a50905333286f45dfeacf010851ab
Filesize:
716 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: getclientuptime.php-
Full path:
abi/web/getclientuptime.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:14 12/12/2025
Last modified:
23:21:48 10/12/2025
MD5 hash:
bbc14cdd451c72b94d78c7d2d1af0b52
Filesize:
718 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: imagevwr.php-
Full path:
abi/web/imagevwr.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:14 12/12/2025
Last modified:
23:21:48 10/12/2025
MD5 hash:
47a223a13cc642d01dcfaaca542d396d
Filesize:
915 B
suspicious functions used:
curl_exec (line:15); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index.php-
Full path:
abi/web/index.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:44:09 12/12/2025
Last modified:
23:21:48 10/12/2025
MD5 hash:
767998dfb3a5d0bb3de564a0625d3bc8
Filesize:
16.17 KB
suspicious functions used:
curl_exec (line:282); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: InstrumentsStoreOutDetails.php-
Full path:
abi/web/InstrumentsStoreOutDetails.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:14 12/12/2025
Last modified:
23:21:48 10/12/2025
MD5 hash:
a60c19f766bfff1ccdccbeba6b39eb87
Filesize:
9.37 KB
suspicious functions used:
`update_date`, '%D-%b, %y') AS offdate, TIME_FORMAT(`update_time`, '%T') AS offtime FROM `con_sts_log` WHERE `c_id` = '{$row['c_id']}' AND con_sts = 'Inactive' ORDER BY ` (line:120); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ip-ping-checker.php-
Full path:
abi/web/ip-ping-checker.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:14 12/12/2025
Last modified:
23:21:49 10/12/2025
MD5 hash:
0d28f3053b73b3fe2885cf519ee17c12
Filesize:
2.64 KB
suspicious functions used:
curl_exec (line:81); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: LoginByPass.php-
Full path:
abi/web/LoginByPass.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
04:50:28 12/12/2025
Last modified:
23:21:49 10/12/2025
MD5 hash:
1c6616dae30e9849d8f4fb0fe712a748
Filesize:
4.59 KB
suspicious functions used:
curl_exec (line:44);curl_exec (line:69); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec.php-
Full path:
abi/web/login_exec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
03:05:35 12/12/2025
Last modified:
23:21:49 10/12/2025
MD5 hash:
64dcc4818e71fd5832206ad5c06b1c67
Filesize:
12.3 KB
suspicious functions used:
curl_exec (line:24);curl_exec (line:80);curl_exec (line:199);curl_exec (line:237); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: macreseller-news.php-
Full path:
abi/web/macreseller-news.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:14 12/12/2025
Last modified:
23:21:49 10/12/2025
MD5 hash:
ed23ca98b77c5321b4485e85eb2ea64d
Filesize:
3.67 KB
suspicious functions used:
curl_exec (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: MacResellerAdd.php-
Full path:
abi/web/MacResellerAdd.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:14 12/12/2025
Last modified:
23:21:49 10/12/2025
MD5 hash:
5fdbde3df3e96e845cc118cb3ae916a5
Filesize:
30.33 KB
suspicious functions used:
`input[name="${inputName}"]:checked` (line:799); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: MacResellerEdit.php-
Full path:
abi/web/MacResellerEdit.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:14 12/12/2025
Last modified:
23:21:50 10/12/2025
MD5 hash:
92ce35276f3eae45e866de3439baaa11
Filesize:
37.76 KB
suspicious functions used:
`input[name="${inputName}"]:checked` (line:640); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-helper.php-
Full path:
abi/web/nagad-helper.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:15 12/12/2025
Last modified:
23:21:50 10/12/2025
MD5 hash:
0591a733279907504b515192f3a96bb6
Filesize:
6.74 KB
suspicious functions used:
curl_exec (line:61);base64_decode (line:97); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-merchant-callback.php-
Full path:
abi/web/nagad-merchant-callback.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:15 12/12/2025
Last modified:
23:21:50 10/12/2025
MD5 hash:
886d89b1c785c3100ba5f198ff3befeb
Filesize:
16.79 KB
suspicious functions used:
curl_exec (line:20); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-olt-all-mac-array.php-
Full path:
abi/web/netowrk-olt-all-mac-array.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:15 12/12/2025
Last modified:
23:21:50 10/12/2025
MD5 hash:
b0168ce99145e2afe64357247d750dd6
Filesize:
4.62 KB
suspicious functions used:
shell_exec (line:33);shell_exec (line:47);shell_exec (line:61);shell_exec (line:76);shell_exec (line:93); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-snmp-data-auto.php-
Full path:
abi/web/netowrk-snmp-data-auto.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:15 12/12/2025
Last modified:
23:21:50 10/12/2025
MD5 hash:
c1854a95d6a1ac78b28410a0757cd435
Filesize:
12.02 KB
suspicious functions used:
shell_exec (line:93);shell_exec (line:248); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-snmp-data.php-
Full path:
abi/web/netowrk-snmp-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
04:08:14 12/12/2025
Last modified:
23:21:50 10/12/2025
MD5 hash:
d5c56a194b588691a62f6444ee046900
Filesize:
25.51 KB
suspicious functions used:
shell_exec (line:104);shell_exec (line:113);shell_exec (line:123);shell_exec (line:142);shell_exec (line:154);shell_exec (line:165);shell_exec (line:181);shell_exec (line:191);shell_exec (line:207);shell_exec (line:227);shell_exec (line:236);shell_exec (line:244);shell_exec (line:251);shell_exec (line:256);`pon_name` FROM `olt_pon` WHERE `olt_pon_id` = '$pon_id' AND ` (line:263);shell_exec (line:280);shell_exec (line:290);`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:303);shell_exec (line:309);shell_exec (line:452); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-old-onu-rx-map.php-
Full path:
abi/web/network-old-onu-rx-map.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:15 12/12/2025
Last modified:
23:21:50 10/12/2025
MD5 hash:
3dbb34a2a64625d04dc5fadeb7aff7c7
Filesize:
8.86 KB
suspicious functions used:
shell_exec (line:88); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-old-onu-rx.php-
Full path:
abi/web/network-old-onu-rx.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
16:59:02 12/12/2025
Last modified:
23:21:50 10/12/2025
MD5 hash:
997a761c4ade8702893cc4b74f7d09ac
Filesize:
9.28 KB
suspicious functions used:
shell_exec (line:97); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-count-cdata.php-
Full path:
abi/web/network-olt-client-onu-mac-count-cdata.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:15 12/12/2025
Last modified:
23:21:50 10/12/2025
MD5 hash:
6c5143b192a488221c658fe110e87f15
Filesize:
7.91 KB
suspicious functions used:
shell_exec (line:28);shell_exec (line:57);shell_exec (line:70);shell_exec (line:96);shell_exec (line:117);shell_exec (line:123);shell_exec (line:132);shell_exec (line:174);shell_exec (line:186);shell_exec (line:197);shell_exec (line:211); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-count-cdata2.php-
Full path:
abi/web/network-olt-client-onu-mac-count-cdata2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:15 12/12/2025
Last modified:
23:21:50 10/12/2025
MD5 hash:
7cd9883ecb096828973d08682e8d0fe6
Filesize:
4.07 KB
suspicious functions used:
shell_exec (line:26);shell_exec (line:85);shell_exec (line:97);shell_exec (line:108);shell_exec (line:122); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-count-huawei.php-
Full path:
abi/web/network-olt-client-onu-mac-count-huawei.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:15 12/12/2025
Last modified:
23:21:50 10/12/2025
MD5 hash:
563c435683983dce5caac25e19683954
Filesize:
22.12 KB
suspicious functions used:
shell_exec (line:60);shell_exec (line:65); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-count-rcl.php-
Full path:
abi/web/network-olt-client-onu-mac-count-rcl.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:15 12/12/2025
Last modified:
23:21:50 10/12/2025
MD5 hash:
9372dfb2a63d9f4a28440f91d4866778
Filesize:
3.49 KB
suspicious functions used:
shell_exec (line:26);shell_exec (line:73);shell_exec (line:85);shell_exec (line:96);shell_exec (line:110); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-count.php-
Full path:
abi/web/network-olt-client-onu-mac-count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:15 12/12/2025
Last modified:
23:21:50 10/12/2025
MD5 hash:
678f73812a2d80cc03fc4cb771d82c3b
Filesize:
15.52 KB
suspicious functions used:
shell_exec (line:26);shell_exec (line:36);shell_exec (line:68);shell_exec (line:84);shell_exec (line:101);shell_exec (line:119);shell_exec (line:135);shell_exec (line:176);shell_exec (line:238);shell_exec (line:314);shell_exec (line:381);shell_exec (line:471);shell_exec (line:490);shell_exec (line:509); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-countt.php-
Full path:
abi/web/network-olt-client-onu-mac-countt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:15 12/12/2025
Last modified:
23:21:50 10/12/2025
MD5 hash:
6c684ef0e37eeb3400821b34d0d05fec
Filesize:
8.94 KB
suspicious functions used:
shell_exec (line:26);shell_exec (line:36);shell_exec (line:59);shell_exec (line:75);shell_exec (line:92);shell_exec (line:102);shell_exec (line:117);shell_exec (line:155);shell_exec (line:206);shell_exec (line:262);shell_exec (line:275);shell_exec (line:288); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-con-sts.php-
Full path:
abi/web/network-olt-con-sts.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:15 12/12/2025
Last modified:
23:21:51 10/12/2025
MD5 hash:
400a889537016067b55f97ac6d0a16a3
Filesize:
4.02 KB
suspicious functions used:
`olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:10);shell_exec (line:38);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, `last_synced`, `last_update`, `msg`, `full_msg`, ROUND((SELECT AVG(value) FROM olt_onu_history WHERE alarm_id = '$alarmId' AND value != ''), 2) AS average_value FROM `, ` WHERE `alarm_id` = '$alarmId' AND ` (line:82); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-huawei-bulk.php-
Full path:
abi/web/network-olt-huawei-bulk.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:15 12/12/2025
Last modified:
23:21:51 10/12/2025
MD5 hash:
b6dc2bcc7e7a7a4b914a01a10b628472
Filesize:
4.45 KB
suspicious functions used:
`ip_address`, `community`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:26);shell_exec (line:42);shell_exec (line:65);shell_exec (line:76);shell_exec (line:88);shell_exec (line:99); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-load.php-
Full path:
abi/web/network-olt-load.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:15 12/12/2025
Last modified:
23:21:51 10/12/2025
MD5 hash:
f49d5153285c639ed91d4e806685ee56
Filesize:
1.33 KB
suspicious functions used:
shell_exec (line:22);shell_exec (line:25); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-oid-check.php-
Full path:
abi/web/network-olt-oid-check.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:15 12/12/2025
Last modified:
23:21:51 10/12/2025
MD5 hash:
5b7dc0ce1103fbfc895873c250b63141
Filesize:
1.88 KB
suspicious functions used:
shell_exec (line:33); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-alarm-add.php-
Full path:
abi/web/network-olt-onu-alarm-add.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:15 12/12/2025
Last modified:
23:21:51 10/12/2025
MD5 hash:
be6ba82c658419e1454f778e20e2d4c3
Filesize:
7.86 KB
suspicious functions used:
shell_exec (line:103); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-count.php-
Full path:
abi/web/network-olt-onu-count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:15 12/12/2025
Last modified:
23:21:51 10/12/2025
MD5 hash:
dc4f00a8eaa7feb0b6fe62ab4ec1717a
Filesize:
11.83 KB
suspicious functions used:
`olt_id` = '$olt_id' AND ` (line:20);shell_exec (line:85); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-list-data.php-
Full path:
abi/web/network-olt-onu-list-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:15 12/12/2025
Last modified:
23:21:51 10/12/2025
MD5 hash:
82158b6b9589f1ce3be73c1a585ef4e4
Filesize:
8.97 KB
suspicious functions used:
shell_exec (line:24);shell_exec (line:38);shell_exec (line:64);shell_exec (line:85);shell_exec (line:104);shell_exec (line:125);shell_exec (line:155); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-clients-search.php-
Full path:
abi/web/network-olt-pon-clients-search.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:15 12/12/2025
Last modified:
23:21:51 10/12/2025
MD5 hash:
79d26fc66abdab6f173330588aa8b238
Filesize:
10.93 KB
suspicious functions used:
shell_exec (line:42);shell_exec (line:51);shell_exec (line:104);shell_exec (line:168); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search-bdcom.php-
Full path:
abi/web/network-olt-pon-onu-search-bdcom.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:15 12/12/2025
Last modified:
23:21:51 10/12/2025
MD5 hash:
3aa5d68e88dfe371dad0f4540977ac23
Filesize:
32.49 KB
suspicious functions used:
shell_exec (line:61);shell_exec (line:70);shell_exec (line:384);shell_exec (line:587); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search-bdcom1.php-
Full path:
abi/web/network-olt-pon-onu-search-bdcom1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:15 12/12/2025
Last modified:
23:21:51 10/12/2025
MD5 hash:
dd18677b1dcbf7f0bce2ac6912d98da0
Filesize:
9.6 KB
suspicious functions used:
shell_exec (line:42);shell_exec (line:51);shell_exec (line:129); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search-hwi.php-
Full path:
abi/web/network-olt-pon-onu-search-hwi.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:15 12/12/2025
Last modified:
23:21:51 10/12/2025
MD5 hash:
f649db9e4ef3fdfa499d6fb4afd8d50f
Filesize:
23.06 KB
suspicious functions used:
shell_exec (line:46); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search-rcl.php-
Full path:
abi/web/network-olt-pon-onu-search-rcl.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:15 12/12/2025
Last modified:
23:21:51 10/12/2025
MD5 hash:
565ff38d572bba4bc20721ab17484554
Filesize:
27.33 KB
suspicious functions used:
shell_exec (line:46);shell_exec (line:55);shell_exec (line:369); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search.php-
Full path:
abi/web/network-olt-pon-onu-search.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:15 12/12/2025
Last modified:
23:21:51 10/12/2025
MD5 hash:
dc183ecf77d0e1f56f672338fd09cfa5
Filesize:
21.62 KB
suspicious functions used:
shell_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-power.php-
Full path:
abi/web/network-olt-onu-power.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:15 12/12/2025
Last modified:
23:21:51 10/12/2025
MD5 hash:
2e064543b67b532bdf4e5b12d49c5052
Filesize:
7.54 KB
suspicious functions used:
shell_exec (line:97); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data-bdcom-online.php-
Full path:
abi/web/network-snmp-onu-status-data-bdcom-online.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:15 12/12/2025
Last modified:
23:21:51 10/12/2025
MD5 hash:
1cf2743830dd3355f66bcfd80bc372ae
Filesize:
26.1 KB
suspicious functions used:
shell_exec (line:48);shell_exec (line:73);shell_exec (line:85);shell_exec (line:103);shell_exec (line:116);shell_exec (line:128);shell_exec (line:134);shell_exec (line:159);shell_exec (line:172);shell_exec (line:184);shell_exec (line:190);shell_exec (line:226);shell_exec (line:241); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data-bdcom.php-
Full path:
abi/web/network-snmp-onu-status-data-bdcom.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:15 12/12/2025
Last modified:
23:21:51 10/12/2025
MD5 hash:
5e9be916b6c74cabc588838e6c9df590
Filesize:
27.33 KB
suspicious functions used:
shell_exec (line:49);shell_exec (line:74);shell_exec (line:86);shell_exec (line:104);shell_exec (line:117);shell_exec (line:129);shell_exec (line:135);shell_exec (line:160);shell_exec (line:173);shell_exec (line:185);shell_exec (line:191);shell_exec (line:226);shell_exec (line:239); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data-online.php-
Full path:
abi/web/network-snmp-onu-status-data-online.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:15 12/12/2025
Last modified:
23:21:51 10/12/2025
MD5 hash:
0d8187961d76276c1aaaa369cdabf36b
Filesize:
27.73 KB
suspicious functions used:
shell_exec (line:35);`olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:41);shell_exec (line:80);shell_exec (line:94);shell_exec (line:108);shell_exec (line:121);shell_exec (line:196);shell_exec (line:429);shell_exec (line:441);shell_exec (line:448); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data.php-
Full path:
abi/web/network-snmp-onu-status-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:15 12/12/2025
Last modified:
23:21:51 10/12/2025
MD5 hash:
30cb65623c66c45bd502104b935d2c48
Filesize:
30.69 KB
suspicious functions used:
shell_exec (line:36);`olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:42);shell_exec (line:81);shell_exec (line:95);shell_exec (line:109);shell_exec (line:122);shell_exec (line:208);shell_exec (line:436);shell_exec (line:448);shell_exec (line:455); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data1.php-
Full path:
abi/web/network-snmp-onu-status-data1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:15 12/12/2025
Last modified:
23:21:51 10/12/2025
MD5 hash:
21b4726e351c4b0fcb7d6f0959c0d888
Filesize:
15.98 KB
suspicious functions used:
shell_exec (line:34);`olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:38);shell_exec (line:150); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data_vsol2.php-
Full path:
abi/web/network-snmp-onu-status-data_vsol2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:15 12/12/2025
Last modified:
23:21:51 10/12/2025
MD5 hash:
f22d022ddc284f4d8e1de3660da91db8
Filesize:
15.61 KB
suspicious functions used:
shell_exec (line:34);shell_exec (line:113);shell_exec (line:126);shell_exec (line:132); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-tree-vartual-nodes.php-
Full path:
abi/web/network-tree-vartual-nodes.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:15 12/12/2025
Last modified:
23:21:51 10/12/2025
MD5 hash:
ef5de6634f62a12fd5139c800708aa30
Filesize:
10.49 KB
suspicious functions used:
shell_exec (line:76);shell_exec (line:111);shell_exec (line:145);shell_exec (line:181);shell_exec (line:188); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Network.php-
Full path:
abi/web/Network.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:16 12/12/2025
Last modified:
23:21:51 10/12/2025
MD5 hash:
2eed7e3ac1a2dc7a30092353d076186f
Filesize:
69.75 KB
suspicious functions used:
system (line:371);shell_exec (line:654);`network_tree` WHERE `device_type` = '1' AND `olt_id` = '{$rowo['olt_id']}' AND sts = '0' AND ` (line:882); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Network1.php-
Full path:
abi/web/Network1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:16 12/12/2025
Last modified:
23:21:51 10/12/2025
MD5 hash:
154ba9f6e6603be92ddd48557fb118ce
Filesize:
65.34 KB
suspicious functions used:
system (line:369);shell_exec (line:652);`network_tree` WHERE `device_type` = '1' AND `olt_id` = '{$rowo['olt_id']}' AND sts = '0' AND ` (line:843); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkLoad.php-
Full path:
abi/web/NetworkLoad.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:16 12/12/2025
Last modified:
23:21:51 10/12/2025
MD5 hash:
e1632e66ee1b7394d3fb82751b924abe
Filesize:
2.83 KB
suspicious functions used:
system (line:81); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkLoad1.php-
Full path:
abi/web/NetworkLoad1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:16 12/12/2025
Last modified:
23:21:52 10/12/2025
MD5 hash:
176bd6931be34d7ef351d22897accc65
Filesize:
759 B
suspicious functions used:
system (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltAddQuery.php-
Full path:
abi/web/NetworkOltAddQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:16 12/12/2025
Last modified:
23:21:52 10/12/2025
MD5 hash:
f947f34b95c8c6f9b374dece2d460dcf
Filesize:
11.64 KB
suspicious functions used:
shell_exec (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltOnuStatus.php-
Full path:
abi/web/NetworkOltOnuStatus.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
15:54:43 12/12/2025
Last modified:
23:21:52 10/12/2025
MD5 hash:
77803b593c28f193f35d2009fa66f268
Filesize:
82.39 KB
suspicious functions used:
shell_exec (line:42);shell_exec (line:102);shell_exec (line:674);shell_exec (line:795);shell_exec (line:920);shell_exec (line:1033);shell_exec (line:1143);shell_exec (line:1253); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltOnuStatus2.php-
Full path:
abi/web/NetworkOltOnuStatus2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:16 12/12/2025
Last modified:
23:21:52 10/12/2025
MD5 hash:
c9a14797fa4353d05bbd9427b6079250
Filesize:
15.88 KB
suspicious functions used:
shell_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltSense.php-
Full path:
abi/web/NetworkOltSense.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:16 12/12/2025
Last modified:
23:21:52 10/12/2025
MD5 hash:
2be664ae5006367f629ca437a6d507f8
Filesize:
18.26 KB
suspicious functions used:
`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, `last_synced`, `last_update`, `msg`, `full_msg`, ROUND((SELECT AVG(value) FROM olt_onu_history WHERE alarm_id = '$alarmId' AND value != ''), 2) AS average_value FROM `, ` WHERE `alarm_id` = '$alarmId' AND ` (line:123); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltSenseDetails.php-
Full path:
abi/web/NetworkOltSenseDetails.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:16 12/12/2025
Last modified:
23:21:52 10/12/2025
MD5 hash:
440096c601fc10b819a1f0f8330928b0
Filesize:
14.17 KB
suspicious functions used:
`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:33);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:42);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:51);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:60); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltSync.php-
Full path:
abi/web/NetworkOltSync.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:16 12/12/2025
Last modified:
23:21:52 10/12/2025
MD5 hash:
06633d4b65a14d677358170dd0a84424
Filesize:
1.87 KB
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree-olt-onu-list-data.php-
Full path:
abi/web/networktree-olt-onu-list-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:16 12/12/2025
Last modified:
23:21:52 10/12/2025
MD5 hash:
af4221fefa9c9051846a063ac4135560
Filesize:
8.72 KB
suspicious functions used:
shell_exec (line:24);shell_exec (line:36);shell_exec (line:59);shell_exec (line:78);shell_exec (line:97);shell_exec (line:116);shell_exec (line:134);shell_exec (line:143);shell_exec (line:155);shell_exec (line:175); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeAddSave.php-
Full path:
abi/web/NetworkTreeAddSave.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:16 12/12/2025
Last modified:
23:21:52 10/12/2025
MD5 hash:
93fdf1213fdb5d525641e2b625f1a91b
Filesize:
7.61 KB
suspicious functions used:
`network_tree` WHERE `olt_id` = '$olt_id' AND ` (line:107); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeEdit1.php-
Full path:
abi/web/NetworkTreeEdit1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:17 12/12/2025
Last modified:
23:21:52 10/12/2025
MD5 hash:
3396a6bdf9b5804bb208f38f37cc29a2
Filesize:
35.81 KB
suspicious functions used:
`olt_onu` WHERE olt_id = '$olt_id' AND ` (line:207); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeEditSave.php-
Full path:
abi/web/NetworkTreeEditSave.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:17 12/12/2025
Last modified:
23:21:52 10/12/2025
MD5 hash:
75ca95ac9b0cf5e9709091d3a6ae5b6a
Filesize:
13.55 KB
suspicious functions used:
`olt_pon` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND ` (line:84);`network_tree` WHERE `olt_id` = '$olt_id' AND ` (line:196); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeList.php-
Full path:
abi/web/NetworkTreeList.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:17 12/12/2025
Last modified:
23:21:52 10/12/2025
MD5 hash:
17e728e8656912d8cc50af8be8d75085
Filesize:
32.22 KB
suspicious functions used:
`pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '{$rowsedfg['olt_id']}' AND ` (line:460); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeMap.php-
Full path:
abi/web/NetworkTreeMap.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:17 12/12/2025
Last modified:
23:21:52 10/12/2025
MD5 hash:
ac3639d5b3976ee434d4b5968090f07b
Filesize:
49.4 KB
suspicious functions used:
`${totalonline}` (line:121);`${totaloffline}` (line:122);`Failed to load data: ${error.message}` (line:788);`HTTP error! Status: ${response.status}` (line:803); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_onu_list_add.php-
Full path:
abi/web/networktree_device_onu_list_add.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:17 12/12/2025
Last modified:
23:21:52 10/12/2025
MD5 hash:
23aa4b30ff4514610497db10c8490003
Filesize:
16.07 KB
suspicious functions used:
shell_exec (line:31);`network_tree` WHERE `onu_mac` = '$mac_address' AND ` (line:129);`olt_pon` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND ` (line:163);shell_exec (line:198);shell_exec (line:221);shell_exec (line:238);`network_tree` WHERE `onu_mac` = '$onuMac' AND ` (line:276);shell_exec (line:302);shell_exec (line:308);shell_exec (line:319);`network_tree` WHERE `onu_mac` = '$onuMac' AND ` (line:355);`olt_pon` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND ` (line:391); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_pon_check.php-
Full path:
abi/web/networktree_device_pon_check.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:17 12/12/2025
Last modified:
23:21:52 10/12/2025
MD5 hash:
b7f8731e7d12665b418927d722340da4
Filesize:
1.58 KB
suspicious functions used:
`pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '$olt_id' AND ` (line:8); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_pon_list_add.php-
Full path:
abi/web/networktree_device_pon_list_add.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:17 12/12/2025
Last modified:
23:21:52 10/12/2025
MD5 hash:
2cf70db6a91f4c5d1821b4b5fa178ebb
Filesize:
1.38 KB
suspicious functions used:
`olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:6);`olt_pon` WHERE `olt_id` = '$olt_id' AND ` (line:10);`network_tree` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND ` (line:17); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_pon_port_onu_list.php-
Full path:
abi/web/networktree_device_pon_port_onu_list.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:17 12/12/2025
Last modified:
23:21:52 10/12/2025
MD5 hash:
6578424616a5eefb751d5e3e155adba6
Filesize:
8.63 KB
suspicious functions used:
`olt_pon` WHERE olt_id = '$olt_id' AND ` (line:25);shell_exec (line:32);shell_exec (line:45);`network_tree` WHERE onu_index_id = '$port_onu_index_id' AND ` (line:49);shell_exec (line:81);shell_exec (line:104);shell_exec (line:123);shell_exec (line:144);shell_exec (line:162);shell_exec (line:171);shell_exec (line:185); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_pon_port_sense_list.php-
Full path:
abi/web/networktree_device_pon_port_sense_list.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:17 12/12/2025
Last modified:
23:21:52 10/12/2025
MD5 hash:
4d80475d2f31f38e21239a5a1a19285f
Filesize:
3.7 KB
suspicious functions used:
`network_tree` WHERE `onu_mac` = '$onu_mac' AND ` (line:26);`network_tree` WHERE `c_id` = '{$dfhbdxf}' AND ` (line:72); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_type.php-
Full path:
abi/web/networktree_device_type.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:17 12/12/2025
Last modified:
23:21:52 10/12/2025
MD5 hash:
f1520732e5a3ef38564238a3278a1f63
Filesize:
11.43 KB
suspicious functions used:
`tree_id`) AS countolt FROM `network_tree` WHERE `olt_id` = '$olt_id_sure' AND ` (line:64); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: olt_all_onu_mac.php-
Full path:
abi/web/olt_all_onu_mac.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:17 12/12/2025
Last modified:
23:21:52 10/12/2025
MD5 hash:
3c9e4213da81cfacdc5b31170cc2dd46
Filesize:
13.31 KB
suspicious functions used:
shell_exec (line:22);shell_exec (line:38);shell_exec (line:57);shell_exec (line:90);shell_exec (line:116);shell_exec (line:134);shell_exec (line:169);shell_exec (line:204);shell_exec (line:208);shell_exec (line:247); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery.php-
Full path:
abi/web/PaymentOnlineQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
10:02:06 12/12/2025
Last modified:
07:54:02 11/12/2025
MD5 hash:
864457d667cda4a43b414af6422514bb
Filesize:
28.7 KB
suspicious functions used:
curl_exec (line:461);curl_exec (line:673); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery2.php-
Full path:
abi/web/PaymentOnlineQuery2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:18 12/12/2025
Last modified:
23:21:53 10/12/2025
MD5 hash:
ccd315d11a60901b7b9029ff44f8351b
Filesize:
19.4 KB
suspicious functions used:
curl_exec (line:42);curl_exec (line:252); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery_apk.php-
Full path:
abi/web/PaymentOnlineQuery_apk.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:18 12/12/2025
Last modified:
08:45:11 11/12/2025
MD5 hash:
cff01ceb48bf2e18c2200a733d01d647
Filesize:
29.37 KB
suspicious functions used:
curl_exec (line:490);curl_exec (line:709); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentWebhook.php-
Full path:
abi/web/PaymentWebhook.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:18 12/12/2025
Last modified:
23:21:53 10/12/2025
MD5 hash:
a2f322c94787630ab1e0c8ca35fc5ba1
Filesize:
18.6 KB
suspicious functions used:
base64_decode (line:30);curl_exec (line:41);curl_exec (line:422); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SignUp1.php-
Full path:
abi/web/SignUp1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:19 12/12/2025
Last modified:
23:21:54 10/12/2025
MD5 hash:
22cdaf528a51aa44652f81cc911a85fa
Filesize:
26.63 KB
suspicious functions used:
curl_exec (line:53);curl_exec (line:75); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: sms-balance-check.php-
Full path:
abi/web/sms-balance-check.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
04:49:59 12/12/2025
Last modified:
23:21:54 10/12/2025
MD5 hash:
76d6e591039b8f16382220fec77cd3d7
Filesize:
984 B
suspicious functions used:
curl_exec (line:15); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMS.php-
Full path:
abi/web/SMS.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:19 12/12/2025
Last modified:
23:21:54 10/12/2025
MD5 hash:
40c71ca257cc7a64f7c4bed68a0b9503
Filesize:
39.83 KB
suspicious functions used:
curl_exec (line:56); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMS1.php-
Full path:
abi/web/SMS1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:19 12/12/2025
Last modified:
23:21:54 10/12/2025
MD5 hash:
e4671dadf9ad575671fd3609a60030da
Filesize:
32.19 KB
suspicious functions used:
curl_exec (line:59); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMSAddSave.php-
Full path:
abi/web/SMSAddSave.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:19 12/12/2025
Last modified:
23:21:54 10/12/2025
MD5 hash:
0d2d0548df5f32e69264c4f2f1b1f76e
Filesize:
2.12 KB
suspicious functions used:
curl_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: sms_ai.php-
Full path:
abi/web/sms_ai.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:20 12/12/2025
Last modified:
23:21:55 10/12/2025
MD5 hash:
58cf266bd7bbe7522b198788620be84c
Filesize:
2.62 KB
suspicious functions used:
system (line:25);curl_exec (line:51); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: sms_deliverey_report.php-
Full path:
abi/web/sms_deliverey_report.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:20 12/12/2025
Last modified:
23:21:55 10/12/2025
MD5 hash:
03623943da7e9334e137b38c8577fc84
Filesize:
4.25 KB
suspicious functions used:
curl_exec (line:28);curl_exec (line:53);curl_exec (line:90); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: support-action.php-
Full path:
abi/web/support-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:20 12/12/2025
Last modified:
23:21:55 10/12/2025
MD5 hash:
aaeb0483c3be7cf165aadbeafe89ca94
Filesize:
14.56 KB
suspicious functions used:
curl_exec (line:221); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: support-action_apk.php-
Full path:
abi/web/support-action_apk.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:20 12/12/2025
Last modified:
23:21:55 10/12/2025
MD5 hash:
eea97e70e134f019edfa0a723a9d012f
Filesize:
14.74 KB
suspicious functions used:
curl_exec (line:229); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tagreeexpayment.php-
Full path:
abi/web/tagreeexpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
10:21:45 12/12/2025
Last modified:
23:21:55 10/12/2025
MD5 hash:
2cf8a160dbd1595bcca2faf135b53c0f
Filesize:
3 KB
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreateagree.php-
Full path:
abi/web/tcreateagree.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
10:21:01 12/12/2025
Last modified:
23:21:55 10/12/2025
MD5 hash:
27a10adf4190edc7eceee8cf74a6b72b
Filesize:
999 B
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreatepayment.php-
Full path:
abi/web/tcreatepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
04:47:55 12/12/2025
Last modified:
23:21:55 10/12/2025
MD5 hash:
e49de9a33f5164bc2c6b88e4770faaff
Filesize:
1.07 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test10.php-
Full path:
abi/web/test10.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:20 12/12/2025
Last modified:
23:21:55 10/12/2025
MD5 hash:
25a7502a2c7ba51f67744931f91a4376
Filesize:
1.18 KB
suspicious functions used:
shell_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test11.php-
Full path:
abi/web/test11.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:20 12/12/2025
Last modified:
23:21:55 10/12/2025
MD5 hash:
7074fb7f6526fbd42b1ce38d6c5d2ef7
Filesize:
1.57 KB
suspicious functions used:
curl_exec (line:52); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test12.php-
Full path:
abi/web/test12.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:20 12/12/2025
Last modified:
23:21:55 10/12/2025
MD5 hash:
4227a76da13a2468238d0715025fabdb
Filesize:
23 KB
suspicious functions used:
shell_exec (line:108);shell_exec (line:130);shell_exec (line:141);shell_exec (line:299);shell_exec (line:316);shell_exec (line:321);shell_exec (line:356);shell_exec (line:371);shell_exec (line:375); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test13.php-
Full path:
abi/web/test13.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:20 12/12/2025
Last modified:
23:21:55 10/12/2025
MD5 hash:
7db809589028c30524187fd234eba91f
Filesize:
275 B
suspicious functions used:
shell_exec (line:8); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test2.php-
Full path:
abi/web/test2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:20 12/12/2025
Last modified:
23:21:55 10/12/2025
MD5 hash:
d370084cb1aec2a8e57ea3d7f4e9272e
Filesize:
14.37 KB
suspicious functions used:
shell_exec (line:59);shell_exec (line:70);shell_exec (line:76);shell_exec (line:88);shell_exec (line:101);shell_exec (line:141);curl_exec (line:187);curl_exec (line:212);curl_exec (line:354); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test6.php-
Full path:
abi/web/test6.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:20 12/12/2025
Last modified:
23:21:55 10/12/2025
MD5 hash:
08bb56be5ac9f35560ec8eccd435cc1b
Filesize:
4.68 KB
suspicious functions used:
curl_exec (line:73); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test7.php-
Full path:
abi/web/test7.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:20 12/12/2025
Last modified:
23:21:55 10/12/2025
MD5 hash:
b11ccf951ce63a21ea0a7328316a0e5c
Filesize:
1.57 KB
suspicious functions used:
curl_exec (line:14); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test8.php-
Full path:
abi/web/test8.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:20 12/12/2025
Last modified:
23:21:55 10/12/2025
MD5 hash:
0da20f06359cae632ac4b808ab2eee77
Filesize:
3.65 KB
suspicious functions used:
shell_exec (line:48); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test9.php-
Full path:
abi/web/test9.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:20 12/12/2025
Last modified:
23:21:55 10/12/2025
MD5 hash:
87b5d5bf52fb36a8ccea006021ec8820
Filesize:
7.17 KB
suspicious functions used:
shell_exec (line:44);shell_exec (line:69);shell_exec (line:81);shell_exec (line:104);shell_exec (line:126);shell_exec (line:140);shell_exec (line:153);shell_exec (line:165);shell_exec (line:171); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: testttttt.php-
Full path:
abi/web/testttttt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:20 12/12/2025
Last modified:
23:21:55 10/12/2025
MD5 hash:
b1988a4be29e191ad935fb409a4174ee
Filesize:
2 KB
suspicious functions used:
curl_exec (line:47); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: texecutepayment.php-
Full path:
abi/web/texecutepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
10:02:05 12/12/2025
Last modified:
08:41:35 11/12/2025
MD5 hash:
6e522d36ca2a898a60f206f434dee247
Filesize:
3.26 KB
suspicious functions used:
curl_exec (line:24); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: time.php-
Full path:
abi/web/time.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:20 12/12/2025
Last modified:
23:21:55 10/12/2025
MD5 hash:
f72a880b38cb26f3d208bfe99eec1633
Filesize:
5.25 KB
suspicious functions used:
`${formatDistance(totalDistance)}` (line:121);`${Math.round(distance)} m`, `${(distance / 1000).toFixed(2)} km` (line:150); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tis-news.php-
Full path:
abi/web/tis-news.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
04:49:58 12/12/2025
Last modified:
23:21:55 10/12/2025
MD5 hash:
ed23ca98b77c5321b4485e85eb2ea64d
Filesize:
3.67 KB
suspicious functions used:
curl_exec (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
abi/web/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:20 12/12/2025
Last modified:
23:21:55 10/12/2025
MD5 hash:
7d8e71ceda3ffb74623e0c4a814715af
Filesize:
1.53 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tt.php-
Full path:
abi/web/tt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:20 12/12/2025
Last modified:
23:21:55 10/12/2025
MD5 hash:
8733d239c14b3fa7c4abf94fb7354381
Filesize:
1.36 KB
suspicious functions used:
shell_exec (line:7); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ttoken.php-
Full path:
abi/web/ttoken.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
04:47:45 12/12/2025
Last modified:
23:21:55 10/12/2025
MD5 hash:
f60bc87ff074225a12dfc37f8fca853b
Filesize:
1.56 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: update_user_data_apk.php-
Full path:
abi/web/update_user_data_apk.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
08:15:33 12/12/2025
Last modified:
23:21:55 10/12/2025
MD5 hash:
e24e8007a8e4cf89643f5c78b653a129
Filesize:
6.1 KB
suspicious functions used:
base64_decode (line:46);base64_decode (line:60);base64_decode (line:72); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: UserAccess.php-
Full path:
abi/web/UserAccess.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:20 12/12/2025
Last modified:
23:21:55 10/12/2025
MD5 hash:
a3c12b17bcb2c8035cfa045807797ae6
Filesize:
10.45 KB
suspicious functions used:
`.modulecheckboxx[data-group="${group}"]` (line:159); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: UserLoginReport.php-
Full path:
abi/web/UserLoginReport.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:21 12/12/2025
Last modified:
23:21:56 10/12/2025
MD5 hash:
43d95cc2a57279f23f52d11581c9427f
Filesize:
7.76 KB
suspicious functions used:
curl_exec (line:120); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: UsersOnLiveMap.php-
Full path:
abi/web/UsersOnLiveMap.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:21 12/12/2025
Last modified:
23:21:56 10/12/2025
MD5 hash:
3eb9d4d760112ee6bf2598407e75ea33
Filesize:
8.73 KB
suspicious functions used:
`${sec} sec` (line:75);`${Math.floor(sec/60)} min ${sec%60} sec` (line:76);`Name: ${user.userfullname}
ID: ${user.e_id}
Start Time: ${startTime}` (line:150);`Name: ${user.userfullname}
ID: ${user.e_id}
End Time: ${endTime}` (line:172); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook.php-
Full path:
abi/web/webhook.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:33:15 12/12/2025
Last modified:
23:21:56 10/12/2025
MD5 hash:
74d27be6074265b500c082281a5b5f90
Filesize:
22.04 KB
suspicious functions used:
base64_decode (line:30);curl_exec (line:41);curl_exec (line:467); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook_cid.php-
Full path:
abi/web/webhook_cid.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:21 12/12/2025
Last modified:
23:21:56 10/12/2025
MD5 hash:
1a2672fc0dd81a9c831e3fa60ec860e1
Filesize:
21.52 KB
suspicious functions used:
base64_decode (line:29);curl_exec (line:40);curl_exec (line:439); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook_test.php-
Full path:
abi/web/webhook_test.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:21 12/12/2025
Last modified:
23:21:56 10/12/2025
MD5 hash:
74a7dcc262d7fe7f2bdc9e0595d03837
Filesize:
4.69 KB
suspicious functions used:
base64_decode (line:22);curl_exec (line:33);curl_exec (line:86);curl_exec (line:107); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: class.phpmailer.php-
Full path:
abi/web/email/class.phpmailer.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:21 12/12/2025
Last modified:
23:21:57 10/12/2025
MD5 hash:
68468d69b47fffecc89df57e27c5a781
Filesize:
143.32 KB
suspicious functions used:
`$DKIM_private` (line:428);popen (line:1387);popen (line:1408);base64_decode (line:3410);`$mail->set('SMTPSecure', 'tls');` (line:3688);`$mail->SMTPSecure = 'tls';` (line:3690); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: class.smtp.php-
Full path:
abi/web/email/class.smtp.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:21 12/12/2025
Last modified:
23:21:57 10/12/2025
MD5 hash:
aa8478329268e5438a4469c268337a10
Filesize:
41.44 KB
suspicious functions used:
base64_decode (line:513);base64_decode (line:533); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: jqgrid.php-
Full path:
abi/web/inc/jqgrid.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:22 12/12/2025
Last modified:
23:22:18 10/12/2025
MD5 hash:
71027a29e71e0626d8b57cbb631e6d98
Filesize:
23.92 KB
suspicious functions used:
eval (line:397); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: JSON.php-
Full path:
abi/web/inc/JSON.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:22 12/12/2025
Last modified:
23:22:18 10/12/2025
MD5 hash:
f5a34509e06231308becbe320ade9ff6
Filesize:
33.22 KB
suspicious functions used:
eval (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NotificationHelper.php-
Full path:
abi/web/include/NotificationHelper.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
04:24:00 12/12/2025
Last modified:
23:22:19 10/12/2025
MD5 hash:
c970c468aa49f2b9a4393b9abb47b0c3
Filesize:
8.56 KB
suspicious functions used:
curl_exec (line:133); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NotificationSingleHelper.php-
Full path:
abi/web/include/NotificationSingleHelper.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:23 12/12/2025
Last modified:
23:22:19 10/12/2025
MD5 hash:
ae5a5993da8e787e0b769448fb919db9
Filesize:
8.56 KB
suspicious functions used:
curl_exec (line:129); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: smsapicore.php-
Full path:
abi/web/include/smsapicore.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
04:48:11 12/12/2025
Last modified:
23:22:19 10/12/2025
MD5 hash:
0494713963b7e9ead12abe06de2811a5
Filesize:
1.26 KB
suspicious functions used:
curl_exec (line:37); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: telegramapicore.php-
Full path:
abi/web/include/telegramapicore.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
03:55:07 12/12/2025
Last modified:
23:22:19 10/12/2025
MD5 hash:
511f56e6dfcf4e9e7a11259e023ca3ae
Filesize:
3.15 KB
suspicious functions used:
curl_exec (line:68); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ui.php-
Full path:
abi/web/js/tinymce/themes/advanced/skins/highcontrast/ui.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
17:23:45 12/12/2025
Last modified:
23:22:37 10/12/2025
MD5 hash:
3edaf67be8573b86686f46bbba4f058c
Filesize:
4.53 KB
suspicious functions used:
curl_exec (line:20);`bill_amount` = '0.00' WHERE bill_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY ` (line:53);`bill_amount` = '0.00', days = '0.00' WHERE entry_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY ` (line:54);`payment` WHERE `pay_date` < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND pay_amount != '0.00' ORDER BY ` (line:55);curl_exec (line:146);curl_exec (line:168); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Changes.txt-
Full path:
abi/web/js/jqgrid/js/Changes.txt
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:23 12/12/2025
Last modified:
23:22:29 10/12/2025
MD5 hash:
c0a4adbc3f1c6d592cb4fa8433fee9ea
Filesize:
44.32 KB
suspicious functions used:
system (line:87); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
abi/m/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:23 12/12/2025
Last modified:
23:21:36 10/12/2025
MD5 hash:
849185f307be30eafb1bbef93616d8c3
Filesize:
1.71 KB
suspicious functions used:
curl_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
abi/m/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:23 12/12/2025
Last modified:
23:21:36 10/12/2025
MD5 hash:
9a3f22521ad987e86f84c4f5f688d5b7
Filesize:
713 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index.php-
Full path:
abi/m/index.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
03:22:38 12/12/2025
Last modified:
23:21:36 10/12/2025
MD5 hash:
bf40aac4eeeba3896473bc8e38387d44
Filesize:
16.47 KB
suspicious functions used:
curl_exec (line:282); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: LoginByPass.php-
Full path:
abi/m/LoginByPass.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:23 12/12/2025
Last modified:
23:21:36 10/12/2025
MD5 hash:
ce55a8f81ccab7d07744fd3914d6ee35
Filesize:
4.65 KB
suspicious functions used:
curl_exec (line:44);curl_exec (line:69); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec.php-
Full path:
abi/m/login_exec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
03:22:38 12/12/2025
Last modified:
23:21:36 10/12/2025
MD5 hash:
535239423beafff9771c5e5e9f24a68b
Filesize:
12.3 KB
suspicious functions used:
curl_exec (line:25);curl_exec (line:81);curl_exec (line:200);curl_exec (line:238); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-merchant-callback.php-
Full path:
abi/m/nagad-merchant-callback.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:23 12/12/2025
Last modified:
23:21:36 10/12/2025
MD5 hash:
3fcf93d3aec6449a76e27b14f01ada02
Filesize:
11.32 KB
suspicious functions used:
curl_exec (line:20); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-snmp-data.php-
Full path:
abi/m/netowrk-snmp-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
11:54:08 12/12/2025
Last modified:
23:21:36 10/12/2025
MD5 hash:
a0f9ff194951c18f7390ef750529f434
Filesize:
24.14 KB
suspicious functions used:
shell_exec (line:96);shell_exec (line:105);shell_exec (line:115);shell_exec (line:134);shell_exec (line:146);shell_exec (line:157);shell_exec (line:173);shell_exec (line:183);shell_exec (line:199);shell_exec (line:219);shell_exec (line:229);shell_exec (line:234);shell_exec (line:242);shell_exec (line:262);shell_exec (line:278);`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:291);shell_exec (line:297);shell_exec (line:430); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery.php-
Full path:
abi/m/PaymentOnlineQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
11:22:46 12/12/2025
Last modified:
23:21:37 10/12/2025
MD5 hash:
6483645d440dd2f976cc1b29cb4021d5
Filesize:
20.95 KB
suspicious functions used:
curl_exec (line:287);curl_exec (line:492); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery2.php-
Full path:
abi/m/PaymentOnlineQuery2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:24 12/12/2025
Last modified:
23:21:37 10/12/2025
MD5 hash:
3660992067d5591fc79ce89d6dbb9274
Filesize:
19.08 KB
suspicious functions used:
curl_exec (line:41);curl_exec (line:254); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: support-action.php-
Full path:
abi/m/support-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:24 12/12/2025
Last modified:
23:21:37 10/12/2025
MD5 hash:
adb69d6d3e277ad4c464c4fd0c41b4ca
Filesize:
10.29 KB
suspicious functions used:
curl_exec (line:99); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tagreeexpayment.php-
Full path:
abi/m/tagreeexpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:24 12/12/2025
Last modified:
23:21:37 10/12/2025
MD5 hash:
c95e3ee881752db67b4f3597bc58430a
Filesize:
2.46 KB
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreateagree.php-
Full path:
abi/m/tcreateagree.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:24 12/12/2025
Last modified:
23:21:37 10/12/2025
MD5 hash:
27a10adf4190edc7eceee8cf74a6b72b
Filesize:
999 B
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreatepayment.php-
Full path:
abi/m/tcreatepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
11:22:34 12/12/2025
Last modified:
23:21:37 10/12/2025
MD5 hash:
e49de9a33f5164bc2c6b88e4770faaff
Filesize:
1.07 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: texecutepayment.php-
Full path:
abi/m/texecutepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
11:22:45 12/12/2025
Last modified:
23:21:37 10/12/2025
MD5 hash:
efbb63dfcfdacb52dec74bffc389bbb3
Filesize:
2.67 KB
suspicious functions used:
curl_exec (line:24); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
abi/m/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:24 12/12/2025
Last modified:
23:21:37 10/12/2025
MD5 hash:
7d8e71ceda3ffb74623e0c4a814715af
Filesize:
1.53 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ttoken.php-
Full path:
abi/m/ttoken.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
11:22:21 12/12/2025
Last modified:
23:21:37 10/12/2025
MD5 hash:
5f2c51c1db5b0defadfb67ce25c0098f
Filesize:
1.54 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: AutoActiveClientsCount1.php-
Full path:
his/web/AutoActiveClientsCount1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
13:31:05 12/12/2025
Last modified:
00:45:26 28/12/2024
MD5 hash:
3b3b6186ff2d9c5abd1772e5aa02ee33
Filesize:
6.4 KB
suspicious functions used:
system (line:58); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: AutoActiveClientsCount11.php-
Full path:
his/web/AutoActiveClientsCount11.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:25 12/12/2025
Last modified:
00:45:26 28/12/2024
MD5 hash:
a0090e4a11dd59b955a6edd549b6ef2f
Filesize:
5.85 KB
suspicious functions used:
system (line:54); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: client-online-mbb.php-
Full path:
his/web/client-online-mbb.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:26 12/12/2025
Last modified:
00:45:32 28/12/2024
MD5 hash:
e16c33ab6ddd7649ea56a7d5355365b6
Filesize:
16.46 KB
suspicious functions used:
curl_exec (line:90);curl_exec (line:289); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: clients-nots-action.php-
Full path:
his/web/clients-nots-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:26 12/12/2025
Last modified:
00:45:35 28/12/2024
MD5 hash:
dff1bb495509427d098cb4588da553b9
Filesize:
5.89 KB
suspicious functions used:
curl_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients.php-
Full path:
his/web/Clients.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
17:04:15 12/12/2025
Last modified:
00:45:36 28/12/2024
MD5 hash:
d59f33ca457016deee5f906de3f2ca83
Filesize:
212.42 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:844); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients1.php-
Full path:
his/web/Clients1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:27 12/12/2025
Last modified:
00:45:38 28/12/2024
MD5 hash:
a8db87dcc6beb97539ff152b767dadae
Filesize:
219.37 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:835); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients2.php-
Full path:
his/web/Clients2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:27 12/12/2025
Last modified:
00:45:38 28/12/2024
MD5 hash:
982d6411552113b0715fd17c26f50292
Filesize:
205.13 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:832); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients3.php-
Full path:
his/web/Clients3.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:27 12/12/2025
Last modified:
00:45:39 28/12/2024
MD5 hash:
50ddc869b383ab76e009c7a2c17c99a3
Filesize:
175.31 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:832); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ClientsOnMap.php-
Full path:
his/web/ClientsOnMap.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:28 12/12/2025
Last modified:
06:03:03 10/11/2025
MD5 hash:
519edcd6a9ccec3397e6f5280db00605
Filesize:
12.2 KB
suspicious functions used:
`${totalonline}` (line:97);`${totaloffline}` (line:98);`${results.rxPower}` (line:233);`${results.distance}` (line:234);`${results.supplyVoltage}` (line:235);`${results.temperature}` (line:236);`${results.txPower}` (line:237); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ClientView.php-
Full path:
his/web/ClientView.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:28 12/12/2025
Last modified:
02:54:54 10/06/2025
MD5 hash:
e4d718675d4ae1c83d19f5b2dd21be36
Filesize:
112.26 KB
suspicious functions used:
`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:226); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: company_info.php-
Full path:
his/web/company_info.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
16:20:38 12/12/2025
Last modified:
00:45:43 28/12/2024
MD5 hash:
27dc5fc579e655fb4687d27ea9f151bf
Filesize:
8.49 KB
suspicious functions used:
curl_exec (line:132); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
his/web/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:28 12/12/2025
Last modified:
00:45:43 28/12/2024
MD5 hash:
ba9747d0421fd091b998389469e72a0b
Filesize:
1.7 KB
suspicious functions used:
curl_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_all.php-
Full path:
his/web/cron_all.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:28 12/12/2025
Last modified:
00:45:43 28/12/2024
MD5 hash:
967f1d654ae891609da26b9e0fdbd1ae
Filesize:
2.44 KB
suspicious functions used:
curl_exec (line:23);curl_exec (line:38);curl_exec (line:53); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_gen_bill.php-
Full path:
his/web/cron_auto_gen_bill.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:28 12/12/2025
Last modified:
00:45:43 28/12/2024
MD5 hash:
f1056618cc4402968e50d1232d2c51c8
Filesize:
4.73 KB
suspicious functions used:
curl_exec (line:140);curl_exec (line:149); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive.php-
Full path:
his/web/cron_auto_inactive.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:28 12/12/2025
Last modified:
00:45:43 28/12/2024
MD5 hash:
7e0dc4dd9dae2bf0220516641b53c027
Filesize:
5.43 KB
suspicious functions used:
curl_exec (line:142); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive2.php-
Full path:
his/web/cron_auto_inactive2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:28 12/12/2025
Last modified:
00:45:43 28/12/2024
MD5 hash:
440bc24f05b01eb395df63fff2f60de9
Filesize:
5.46 KB
suspicious functions used:
curl_exec (line:142); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive_termination.php-
Full path:
his/web/cron_auto_inactive_termination.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
20:55:06 11/12/2025
Last modified:
00:45:43 28/12/2024
MD5 hash:
9f9c8ca9110c2304128646824bfb17db
Filesize:
12.16 KB
suspicious functions used:
curl_exec (line:241);curl_exec (line:253); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive_termination1.php-
Full path:
his/web/cron_auto_inactive_termination1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:28 12/12/2025
Last modified:
00:45:43 28/12/2024
MD5 hash:
be76b964c93a2cb4fa7e632750ff3bc4
Filesize:
6.64 KB
suspicious functions used:
curl_exec (line:156);curl_exec (line:168); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_termination_remainder1.php-
Full path:
his/web/cron_auto_termination_remainder1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
03:05:23 12/12/2025
Last modified:
00:45:43 28/12/2024
MD5 hash:
7765f9f820dbd402f1064fab9958ffaa
Filesize:
3.26 KB
suspicious functions used:
curl_exec (line:83); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_client_bandwidth_count.php-
Full path:
his/web/cron_client_bandwidth_count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:23:14 12/12/2025
Last modified:
00:45:43 28/12/2024
MD5 hash:
1c71a3dd097275429ae845a85ced0438
Filesize:
5.33 KB
suspicious functions used:
curl_exec (line:124);curl_exec (line:134); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_network.php-
Full path:
his/web/cron_network.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
00:00:37 12/12/2025
Last modified:
00:45:43 28/12/2024
MD5 hash:
db096f353e80027593ca3f9781a21ac8
Filesize:
4.93 KB
suspicious functions used:
curl_exec (line:45);curl_exec (line:67);curl_exec (line:127); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_olt.php-
Full path:
his/web/cron_olt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
21:15:14 11/12/2025
Last modified:
00:45:43 28/12/2024
MD5 hash:
6975951fdbf566164ba5fa5cfcd32ec7
Filesize:
4.27 KB
suspicious functions used:
shell_exec (line:48);curl_exec (line:127); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_olt_clients_catch.php-
Full path:
his/web/cron_olt_clients_catch.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:28 12/12/2025
Last modified:
00:45:43 28/12/2024
MD5 hash:
3b13c163ba3445b3d661c63adde1d985
Filesize:
1.12 KB
suspicious functions used:
curl_exec (line:23); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_olt_user.php-
Full path:
his/web/cron_olt_user.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:28 12/12/2025
Last modified:
00:45:44 28/12/2024
MD5 hash:
67aa237639e3d1e6064e76079bb3cccc
Filesize:
1.97 KB
suspicious functions used:
curl_exec (line:19);curl_exec (line:46); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: emp_salary_advence_find.php-
Full path:
his/web/emp_salary_advence_find.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:29 12/12/2025
Last modified:
00:45:45 28/12/2024
MD5 hash:
74a7e2ffda0f7584611d7cbce6136c24
Filesize:
2.25 KB
suspicious functions used:
`expanse` WHERE `type` = '2' AND `status` = '2' AND ex_by = '$e_id' AND MONTH(`, `) = MONTH('$lastmonth') AND YEAR(`, `) = YEAR('$lastmonth') GROUP BY ` (line:8);`e_id` = '$e_id' AND ` (line:12); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
his/web/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:29 12/12/2025
Last modified:
00:45:45 28/12/2024
MD5 hash:
c46a50905333286f45dfeacf010851ab
Filesize:
716 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: getclientuptime.php-
Full path:
his/web/getclientuptime.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:29 12/12/2025
Last modified:
00:45:47 28/12/2024
MD5 hash:
bbc14cdd451c72b94d78c7d2d1af0b52
Filesize:
718 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: imagevwr.php-
Full path:
his/web/imagevwr.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:29 12/12/2025
Last modified:
00:45:47 28/12/2024
MD5 hash:
47a223a13cc642d01dcfaaca542d396d
Filesize:
915 B
suspicious functions used:
curl_exec (line:15); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index.php-
Full path:
his/web/index.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
18:47:44 12/12/2025
Last modified:
18:50:35 11/08/2025
MD5 hash:
3a6751fa085868f414ad6355760df168
Filesize:
16.68 KB
suspicious functions used:
curl_exec (line:298); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index1.php-
Full path:
his/web/index1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:29 12/12/2025
Last modified:
00:45:47 28/12/2024
MD5 hash:
275982caaa4c6189f7295519da320d68
Filesize:
16.83 KB
suspicious functions used:
curl_exec (line:298); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index3.php-
Full path:
his/web/index3.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:29 12/12/2025
Last modified:
00:45:48 28/12/2024
MD5 hash:
f161ab23adf4527023a0ad582d478f89
Filesize:
12.45 KB
suspicious functions used:
base64_decode (line:10);curl_exec (line:183); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: InstrumentsStoreOutDetails.php-
Full path:
his/web/InstrumentsStoreOutDetails.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:29 12/12/2025
Last modified:
00:45:48 28/12/2024
MD5 hash:
a60c19f766bfff1ccdccbeba6b39eb87
Filesize:
9.37 KB
suspicious functions used:
`update_date`, '%D-%b, %y') AS offdate, TIME_FORMAT(`update_time`, '%T') AS offtime FROM `con_sts_log` WHERE `c_id` = '{$row['c_id']}' AND con_sts = 'Inactive' ORDER BY ` (line:120); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ip-ping-checker.php-
Full path:
his/web/ip-ping-checker.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:29 12/12/2025
Last modified:
00:45:48 28/12/2024
MD5 hash:
0d28f3053b73b3fe2885cf519ee17c12
Filesize:
2.64 KB
suspicious functions used:
curl_exec (line:81); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: LoginByPass.php-
Full path:
his/web/LoginByPass.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
13:37:17 12/12/2025
Last modified:
00:45:49 28/12/2024
MD5 hash:
a8f1789daadb34b0814aaecddfebe7c1
Filesize:
4.26 KB
suspicious functions used:
curl_exec (line:41); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: loginexec.php-
Full path:
his/web/loginexec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:29 12/12/2025
Last modified:
00:45:49 28/12/2024
MD5 hash:
edb8017e7d0f8e037facbcacc94a383d
Filesize:
5.91 KB
suspicious functions used:
curl_exec (line:67); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec.php-
Full path:
his/web/login_exec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
08:19:29 12/12/2025
Last modified:
00:45:49 28/12/2024
MD5 hash:
c323195dc62dec584fec86b3dbc7a90e
Filesize:
11.63 KB
suspicious functions used:
curl_exec (line:23);curl_exec (line:79);curl_exec (line:226); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec1.php-
Full path:
his/web/login_exec1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:29 12/12/2025
Last modified:
00:45:49 28/12/2024
MD5 hash:
02ba9b912a83fab5a78993048bf63f09
Filesize:
6.39 KB
suspicious functions used:
curl_exec (line:116); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec3.php-
Full path:
his/web/login_exec3.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:29 12/12/2025
Last modified:
00:45:49 28/12/2024
MD5 hash:
9038a77a32a5db2c9affae1496473f3e
Filesize:
5.27 KB
suspicious functions used:
curl_exec (line:62); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-helper.php-
Full path:
his/web/nagad-helper.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:30 12/12/2025
Last modified:
00:45:55 28/12/2024
MD5 hash:
2bb70c44d68202e0a0cd8ae1388f0b1b
Filesize:
6.74 KB
suspicious functions used:
curl_exec (line:61);base64_decode (line:97); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-merchant-callback.php-
Full path:
his/web/nagad-merchant-callback.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:30 12/12/2025
Last modified:
00:45:55 28/12/2024
MD5 hash:
abc8d9e7aad4d9c622dcd97e701448bc
Filesize:
16.5 KB
suspicious functions used:
curl_exec (line:20); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-olt-all-mac-array.php-
Full path:
his/web/netowrk-olt-all-mac-array.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:30 12/12/2025
Last modified:
00:45:55 28/12/2024
MD5 hash:
b0168ce99145e2afe64357247d750dd6
Filesize:
4.62 KB
suspicious functions used:
shell_exec (line:33);shell_exec (line:47);shell_exec (line:61);shell_exec (line:76);shell_exec (line:93); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-snmp-data.php-
Full path:
his/web/netowrk-snmp-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:30 12/12/2025
Last modified:
00:45:55 28/12/2024
MD5 hash:
9badf5c53b260315a061e1bb6cd2378f
Filesize:
24.8 KB
suspicious functions used:
shell_exec (line:104);shell_exec (line:113);shell_exec (line:123);shell_exec (line:142);shell_exec (line:154);shell_exec (line:165);shell_exec (line:181);shell_exec (line:191);shell_exec (line:207);shell_exec (line:227);shell_exec (line:236);shell_exec (line:244);shell_exec (line:251);shell_exec (line:256);`pon_name` FROM `olt_pon` WHERE `olt_pon_id` = '$pon_id' AND ` (line:263);shell_exec (line:280);shell_exec (line:290);`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:303);shell_exec (line:309);shell_exec (line:444); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-old-onu-rx-map.php-
Full path:
his/web/network-old-onu-rx-map.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:30 12/12/2025
Last modified:
00:45:55 28/12/2024
MD5 hash:
b4962c160c5ad68ccd8eed9c48d82a0f
Filesize:
6.94 KB
suspicious functions used:
shell_exec (line:76); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-old-onu-rx.php-
Full path:
his/web/network-old-onu-rx.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:30 12/12/2025
Last modified:
00:45:55 28/12/2024
MD5 hash:
b4962c160c5ad68ccd8eed9c48d82a0f
Filesize:
6.94 KB
suspicious functions used:
shell_exec (line:76); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-count-cdata.php-
Full path:
his/web/network-olt-client-onu-mac-count-cdata.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:30 12/12/2025
Last modified:
00:45:55 28/12/2024
MD5 hash:
c378dbabf36066c335cfb8838a6e167d
Filesize:
4.58 KB
suspicious functions used:
shell_exec (line:25);shell_exec (line:35);shell_exec (line:56);shell_exec (line:103);shell_exec (line:115);shell_exec (line:126);shell_exec (line:140); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-count.php-
Full path:
his/web/network-olt-client-onu-mac-count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:30 12/12/2025
Last modified:
00:45:55 28/12/2024
MD5 hash:
300ca68aa5a7a32160838b9f2627d2aa
Filesize:
14.56 KB
suspicious functions used:
shell_exec (line:26);shell_exec (line:36);shell_exec (line:68);shell_exec (line:84);shell_exec (line:101);shell_exec (line:119);shell_exec (line:135);shell_exec (line:176);shell_exec (line:236);shell_exec (line:312);shell_exec (line:379);shell_exec (line:441);shell_exec (line:460);shell_exec (line:479); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-countt.php-
Full path:
his/web/network-olt-client-onu-mac-countt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:30 12/12/2025
Last modified:
00:45:55 28/12/2024
MD5 hash:
d29b4e72c375f528b769bd3894f9f0e7
Filesize:
8.95 KB
suspicious functions used:
shell_exec (line:26);shell_exec (line:36);shell_exec (line:59);shell_exec (line:75);shell_exec (line:92);shell_exec (line:102);shell_exec (line:117);shell_exec (line:155);shell_exec (line:206);shell_exec (line:262);shell_exec (line:275);shell_exec (line:288); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-con-sts.php-
Full path:
his/web/network-olt-con-sts.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:30 12/12/2025
Last modified:
00:45:56 28/12/2024
MD5 hash:
a26b0a1c1567c34c9aa5e2e0254ff8a6
Filesize:
4 KB
suspicious functions used:
`olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:10);shell_exec (line:38);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, `last_synced`, `last_update`, `msg`, `full_msg`, ROUND((SELECT AVG(value) FROM olt_onu_history WHERE alarm_id = '$alarmId' AND value != ''), 2) AS average_value FROM `, ` WHERE `alarm_id` = '$alarmId' AND ` (line:82); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-load.php-
Full path:
his/web/network-olt-load.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:30 12/12/2025
Last modified:
00:45:56 28/12/2024
MD5 hash:
f49d5153285c639ed91d4e806685ee56
Filesize:
1.33 KB
suspicious functions used:
shell_exec (line:22);shell_exec (line:25); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-oid-check.php-
Full path:
his/web/network-olt-oid-check.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:30 12/12/2025
Last modified:
00:45:56 28/12/2024
MD5 hash:
5b7dc0ce1103fbfc895873c250b63141
Filesize:
1.88 KB
suspicious functions used:
shell_exec (line:33); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-alarm-add.php-
Full path:
his/web/network-olt-onu-alarm-add.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:30 12/12/2025
Last modified:
00:45:56 28/12/2024
MD5 hash:
be6ba82c658419e1454f778e20e2d4c3
Filesize:
7.86 KB
suspicious functions used:
shell_exec (line:103); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-count.php-
Full path:
his/web/network-olt-onu-count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:30 12/12/2025
Last modified:
00:45:56 28/12/2024
MD5 hash:
eed277fdd838fc119df53ba5ebda8a77
Filesize:
5.44 KB
suspicious functions used:
`olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:11);shell_exec (line:69); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-list-data.php-
Full path:
his/web/network-olt-onu-list-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:30 12/12/2025
Last modified:
00:45:56 28/12/2024
MD5 hash:
54cc9417c766c31317311c3722ce7d4b
Filesize:
9.48 KB
suspicious functions used:
shell_exec (line:24);shell_exec (line:38);shell_exec (line:64);shell_exec (line:85);shell_exec (line:104);shell_exec (line:125);shell_exec (line:143);shell_exec (line:153);shell_exec (line:165);shell_exec (line:185); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-power.php-
Full path:
his/web/network-olt-onu-power.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:30 12/12/2025
Last modified:
00:45:56 28/12/2024
MD5 hash:
2e064543b67b532bdf4e5b12d49c5052
Filesize:
7.54 KB
suspicious functions used:
shell_exec (line:97); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-clients-search.php-
Full path:
his/web/network-olt-pon-clients-search.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:30 12/12/2025
Last modified:
00:45:56 28/12/2024
MD5 hash:
79d26fc66abdab6f173330588aa8b238
Filesize:
10.93 KB
suspicious functions used:
shell_exec (line:42);shell_exec (line:51);shell_exec (line:104);shell_exec (line:168); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search-bdcom.php-
Full path:
his/web/network-olt-pon-onu-search-bdcom.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:30 12/12/2025
Last modified:
00:45:56 28/12/2024
MD5 hash:
c786fa8b69268c738b6ff976631798cd
Filesize:
27.74 KB
suspicious functions used:
shell_exec (line:60);shell_exec (line:69);shell_exec (line:383); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search-bdcom1.php-
Full path:
his/web/network-olt-pon-onu-search-bdcom1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:30 12/12/2025
Last modified:
00:45:56 28/12/2024
MD5 hash:
dd18677b1dcbf7f0bce2ac6912d98da0
Filesize:
9.6 KB
suspicious functions used:
shell_exec (line:42);shell_exec (line:51);shell_exec (line:129); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search.php-
Full path:
his/web/network-olt-pon-onu-search.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:30 12/12/2025
Last modified:
00:45:56 28/12/2024
MD5 hash:
dc183ecf77d0e1f56f672338fd09cfa5
Filesize:
21.62 KB
suspicious functions used:
shell_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data-bdcom.php-
Full path:
his/web/network-snmp-onu-status-data-bdcom.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:30 12/12/2025
Last modified:
00:45:57 28/12/2024
MD5 hash:
065f5e2b05932ee66d473135998580ac
Filesize:
23.53 KB
suspicious functions used:
shell_exec (line:48);shell_exec (line:73);shell_exec (line:85);shell_exec (line:103);shell_exec (line:116);shell_exec (line:128);shell_exec (line:134);shell_exec (line:159);shell_exec (line:172);shell_exec (line:184);shell_exec (line:190);shell_exec (line:217);shell_exec (line:233);shell_exec (line:239);shell_exec (line:244);shell_exec (line:248);`pon_name` FROM `olt_pon` WHERE `olt_pon_id` = '$ponn_id' AND ` (line:255);shell_exec (line:263); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data.php-
Full path:
his/web/network-snmp-onu-status-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:30 12/12/2025
Last modified:
00:45:57 28/12/2024
MD5 hash:
0adfee384bf349b50f11036947fd2a74
Filesize:
30.37 KB
suspicious functions used:
shell_exec (line:38);`olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:42);shell_exec (line:81);shell_exec (line:95);shell_exec (line:109);shell_exec (line:122);shell_exec (line:208);shell_exec (line:429);shell_exec (line:441);shell_exec (line:448); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data1.php-
Full path:
his/web/network-snmp-onu-status-data1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:30 12/12/2025
Last modified:
00:45:57 28/12/2024
MD5 hash:
920bd1a592c36f7a1194b737642f8340
Filesize:
15.96 KB
suspicious functions used:
shell_exec (line:33);`olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:37);shell_exec (line:149); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data_vsol2.php-
Full path:
his/web/network-snmp-onu-status-data_vsol2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:30 12/12/2025
Last modified:
00:45:57 28/12/2024
MD5 hash:
f22d022ddc284f4d8e1de3660da91db8
Filesize:
15.61 KB
suspicious functions used:
shell_exec (line:34);shell_exec (line:113);shell_exec (line:126);shell_exec (line:132); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-tree-vartual-nodes.php-
Full path:
his/web/network-tree-vartual-nodes.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:30 12/12/2025
Last modified:
00:45:57 28/12/2024
MD5 hash:
3530b8bc3113544014b1746ecd67e834
Filesize:
10.64 KB
suspicious functions used:
shell_exec (line:76);shell_exec (line:111);shell_exec (line:145);shell_exec (line:181);shell_exec (line:188); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Network.php-
Full path:
his/web/Network.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:31 12/12/2025
Last modified:
00:45:58 28/12/2024
MD5 hash:
d607c8f09f94a0c02106c793664556a9
Filesize:
62 KB
suspicious functions used:
system (line:371);shell_exec (line:657); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Network1.php-
Full path:
his/web/Network1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:31 12/12/2025
Last modified:
00:45:58 28/12/2024
MD5 hash:
1439ff5047e988cac3d6c62c99ed49a1
Filesize:
63.32 KB
suspicious functions used:
system (line:374);shell_exec (line:660); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkLoad.php-
Full path:
his/web/NetworkLoad.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:31 12/12/2025
Last modified:
00:45:59 28/12/2024
MD5 hash:
e1632e66ee1b7394d3fb82751b924abe
Filesize:
2.83 KB
suspicious functions used:
system (line:81); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkLoad1.php-
Full path:
his/web/NetworkLoad1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:31 12/12/2025
Last modified:
00:45:59 28/12/2024
MD5 hash:
176bd6931be34d7ef351d22897accc65
Filesize:
759 B
suspicious functions used:
system (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltAddQuery.php-
Full path:
his/web/NetworkOltAddQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:31 12/12/2025
Last modified:
00:45:59 28/12/2024
MD5 hash:
ffcc97d9effb18c5391103911b7d9464
Filesize:
6.6 KB
suspicious functions used:
shell_exec (line:21); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltOnuStatus.php-
Full path:
his/web/NetworkOltOnuStatus.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:31 12/12/2025
Last modified:
00:45:59 28/12/2024
MD5 hash:
7604d17efbb57bd0b4c3566aa2d27c36
Filesize:
65.16 KB
suspicious functions used:
shell_exec (line:42);shell_exec (line:102);shell_exec (line:677);shell_exec (line:793);shell_exec (line:906); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltOnuStatus2.php-
Full path:
his/web/NetworkOltOnuStatus2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:31 12/12/2025
Last modified:
00:46:00 28/12/2024
MD5 hash:
c9a14797fa4353d05bbd9427b6079250
Filesize:
15.88 KB
suspicious functions used:
shell_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltSense.php-
Full path:
his/web/NetworkOltSense.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:31 12/12/2025
Last modified:
00:46:00 28/12/2024
MD5 hash:
2be664ae5006367f629ca437a6d507f8
Filesize:
18.26 KB
suspicious functions used:
`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, `last_synced`, `last_update`, `msg`, `full_msg`, ROUND((SELECT AVG(value) FROM olt_onu_history WHERE alarm_id = '$alarmId' AND value != ''), 2) AS average_value FROM `, ` WHERE `alarm_id` = '$alarmId' AND ` (line:123); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltSenseDetails.php-
Full path:
his/web/NetworkOltSenseDetails.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:31 12/12/2025
Last modified:
00:46:00 28/12/2024
MD5 hash:
440096c601fc10b819a1f0f8330928b0
Filesize:
14.17 KB
suspicious functions used:
`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:33);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:42);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:51);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:60); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltSync.php-
Full path:
his/web/NetworkOltSync.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:31 12/12/2025
Last modified:
00:46:00 28/12/2024
MD5 hash:
06633d4b65a14d677358170dd0a84424
Filesize:
1.87 KB
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree-olt-onu-list-data.php-
Full path:
his/web/networktree-olt-onu-list-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:31 12/12/2025
Last modified:
00:46:00 28/12/2024
MD5 hash:
af4221fefa9c9051846a063ac4135560
Filesize:
8.72 KB
suspicious functions used:
shell_exec (line:24);shell_exec (line:36);shell_exec (line:59);shell_exec (line:78);shell_exec (line:97);shell_exec (line:116);shell_exec (line:134);shell_exec (line:143);shell_exec (line:155);shell_exec (line:175); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeAddSave.php-
Full path:
his/web/NetworkTreeAddSave.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:31 12/12/2025
Last modified:
00:46:01 28/12/2024
MD5 hash:
a9dbc374394f257ef79f2d4f60f9771d
Filesize:
5.12 KB
suspicious functions used:
`network_tree` WHERE `olt_id` = '$olt_id' AND ` (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeEdit1.php-
Full path:
his/web/NetworkTreeEdit1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:31 12/12/2025
Last modified:
00:46:02 28/12/2024
MD5 hash:
3396a6bdf9b5804bb208f38f37cc29a2
Filesize:
35.81 KB
suspicious functions used:
`olt_onu` WHERE olt_id = '$olt_id' AND ` (line:207); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeEditSave.php-
Full path:
his/web/NetworkTreeEditSave.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:31 12/12/2025
Last modified:
00:46:02 28/12/2024
MD5 hash:
6c0f94f3ddde2ee6a93db1fa98971907
Filesize:
12.41 KB
suspicious functions used:
`network_tree` WHERE `olt_id` = '$olt_id' AND ` (line:182); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeList.php-
Full path:
his/web/NetworkTreeList.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:31 12/12/2025
Last modified:
00:46:03 28/12/2024
MD5 hash:
acd468021993faf8575531952ae107f8
Filesize:
21.98 KB
suspicious functions used:
`pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '{$row['olt_id']}' AND ` (line:287); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeMap.php-
Full path:
his/web/NetworkTreeMap.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:32 12/12/2025
Last modified:
00:46:03 28/12/2024
MD5 hash:
584d02944bd9de5a190ec6dc320fc49e
Filesize:
24.24 KB
suspicious functions used:
`${results.rxPower}` (line:263);`${results.distance}` (line:264);`${results.supplyVoltage}` (line:265);`${results.temperature}` (line:266);`${results.txPower}` (line:267);`${results.rxPower}` (line:283);`${results.distance}` (line:284);`${results.supplyVoltage}` (line:285);`${results.temperature}` (line:286);`${results.txPower}` (line:287); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeMap1.php-
Full path:
his/web/NetworkTreeMap1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:32 12/12/2025
Last modified:
00:46:03 28/12/2024
MD5 hash:
31a3ae9bc0bdb18726ed860ec6e8ec97
Filesize:
36.43 KB
suspicious functions used:
`networktree_marker_data.php?tree_id=${markerId}` (line:231);`${results.rxPower}` (line:311);`${results.distance}` (line:312);`${results.supplyVoltage}` (line:313);`${results.temperature}` (line:314);`${results.txPower}` (line:315); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_onu_list_add.php-
Full path:
his/web/networktree_device_onu_list_add.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:32 12/12/2025
Last modified:
00:46:03 28/12/2024
MD5 hash:
444ccf3c3e852a5a25cc4ccd3a5cf9ca
Filesize:
14.66 KB
suspicious functions used:
`network_tree` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND device_type = '5' AND ` (line:9);shell_exec (line:33);`network_tree` WHERE `onu_mac` = '$mac_address' AND ` (line:131);shell_exec (line:179);shell_exec (line:187);shell_exec (line:235);`network_tree` WHERE `onu_mac` = '$onuMac' AND ` (line:301); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_pon_check.php-
Full path:
his/web/networktree_device_pon_check.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:32 12/12/2025
Last modified:
00:46:03 28/12/2024
MD5 hash:
708a93aadcae96ecf0aaca52041fcf38
Filesize:
1.53 KB
suspicious functions used:
`pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '$olt_id' AND ` (line:8); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_pon_list_add.php-
Full path:
his/web/networktree_device_pon_list_add.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:32 12/12/2025
Last modified:
00:46:03 28/12/2024
MD5 hash:
2ec03912801e4749c2e9cd361417ca5f
Filesize:
1.36 KB
suspicious functions used:
`olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:6);`olt_pon` WHERE `olt_id` = '$olt_id' AND ` (line:10);`network_tree` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND ` (line:17); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_pon_port_onu_list.php-
Full path:
his/web/networktree_device_pon_port_onu_list.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:32 12/12/2025
Last modified:
00:46:03 28/12/2024
MD5 hash:
9c63b3ac69996628f5eb2959a9eb4e15
Filesize:
8.65 KB
suspicious functions used:
`olt_pon` WHERE olt_id = '$olt_id' AND ` (line:25);shell_exec (line:32);shell_exec (line:45);`network_tree` WHERE onu_index_id = '$port_onu_index_id' AND ` (line:49);shell_exec (line:81);shell_exec (line:103);shell_exec (line:122);shell_exec (line:143);shell_exec (line:161);shell_exec (line:170);shell_exec (line:184); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_pon_port_sense_list.php-
Full path:
his/web/networktree_device_pon_port_sense_list.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:32 12/12/2025
Last modified:
00:46:03 28/12/2024
MD5 hash:
ee69cd5cc122f8aa37d8d8e5c74def6b
Filesize:
3.65 KB
suspicious functions used:
`network_tree` WHERE `onu_mac` = '$onu_mac' AND ` (line:26);`network_tree` WHERE `c_id` = '{$dfhbdxf}' AND ` (line:71); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_type.php-
Full path:
his/web/networktree_device_type.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:32 12/12/2025
Last modified:
00:46:03 28/12/2024
MD5 hash:
f1520732e5a3ef38564238a3278a1f63
Filesize:
11.43 KB
suspicious functions used:
`tree_id`) AS countolt FROM `network_tree` WHERE `olt_id` = '$olt_id_sure' AND ` (line:64); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery.php-
Full path:
his/web/PaymentOnlineQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:33 12/12/2025
Last modified:
00:46:08 28/12/2024
MD5 hash:
201e1cf95b2d033897cab4bc2fd59e07
Filesize:
28.5 KB
suspicious functions used:
curl_exec (line:457);curl_exec (line:689); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery2.php-
Full path:
his/web/PaymentOnlineQuery2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:33 12/12/2025
Last modified:
00:46:08 28/12/2024
MD5 hash:
ccd315d11a60901b7b9029ff44f8351b
Filesize:
19.4 KB
suspicious functions used:
curl_exec (line:42);curl_exec (line:252); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentWebhook.php-
Full path:
his/web/PaymentWebhook.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:33 12/12/2025
Last modified:
00:46:09 28/12/2024
MD5 hash:
a2f322c94787630ab1e0c8ca35fc5ba1
Filesize:
18.6 KB
suspicious functions used:
base64_decode (line:30);curl_exec (line:41);curl_exec (line:422); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SignUp1.php-
Full path:
his/web/SignUp1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:33 12/12/2025
Last modified:
00:46:14 28/12/2024
MD5 hash:
3f7943dd155c8e0a383b7d02730f8c11
Filesize:
24.59 KB
suspicious functions used:
curl_exec (line:33);curl_exec (line:59); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: sms-balance-check.php-
Full path:
his/web/sms-balance-check.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
13:31:05 12/12/2025
Last modified:
00:46:15 28/12/2024
MD5 hash:
74ac3e963a0dc5bb7d4c980e594aa39b
Filesize:
854 B
suspicious functions used:
curl_exec (line:15); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMS.php-
Full path:
his/web/SMS.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:33 12/12/2025
Last modified:
00:46:15 28/12/2024
MD5 hash:
6f4721f653e09f5f33f32c1ba56f9762
Filesize:
37.05 KB
suspicious functions used:
curl_exec (line:56); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMS1.php-
Full path:
his/web/SMS1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:33 12/12/2025
Last modified:
00:46:15 28/12/2024
MD5 hash:
e4671dadf9ad575671fd3609a60030da
Filesize:
32.19 KB
suspicious functions used:
curl_exec (line:59); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMSAddSave.php-
Full path:
his/web/SMSAddSave.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:34 12/12/2025
Last modified:
00:46:15 28/12/2024
MD5 hash:
1a6eaf13aa0ca959fe2dca885b7ffd8e
Filesize:
1.73 KB
suspicious functions used:
curl_exec (line:34); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: sms_deliverey_report.php-
Full path:
his/web/sms_deliverey_report.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:34 12/12/2025
Last modified:
00:46:17 28/12/2024
MD5 hash:
03623943da7e9334e137b38c8577fc84
Filesize:
4.25 KB
suspicious functions used:
curl_exec (line:28);curl_exec (line:53);curl_exec (line:90); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: support-action.php-
Full path:
his/web/support-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:34 12/12/2025
Last modified:
00:46:17 28/12/2024
MD5 hash:
58556808f93f52486b2ad06998142aa9
Filesize:
14.56 KB
suspicious functions used:
curl_exec (line:220); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tagreeexpayment.php-
Full path:
his/web/tagreeexpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:34 12/12/2025
Last modified:
00:46:18 28/12/2024
MD5 hash:
029b4fba649a75c7c81d2f8931be8d63
Filesize:
2.86 KB
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreateagree.php-
Full path:
his/web/tcreateagree.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:34 12/12/2025
Last modified:
00:46:18 28/12/2024
MD5 hash:
27a10adf4190edc7eceee8cf74a6b72b
Filesize:
999 B
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreatepayment.php-
Full path:
his/web/tcreatepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:34 12/12/2025
Last modified:
00:46:18 28/12/2024
MD5 hash:
e49de9a33f5164bc2c6b88e4770faaff
Filesize:
1.07 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test2.php-
Full path:
his/web/test2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:34 12/12/2025
Last modified:
00:46:18 28/12/2024
MD5 hash:
ab80d92ede21b7da59bfefb325484297
Filesize:
13.76 KB
suspicious functions used:
shell_exec (line:59);shell_exec (line:70);shell_exec (line:76);shell_exec (line:88);shell_exec (line:101);shell_exec (line:141);curl_exec (line:187);curl_exec (line:212);curl_exec (line:354); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test6.php-
Full path:
his/web/test6.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:34 12/12/2025
Last modified:
00:46:19 28/12/2024
MD5 hash:
f22d022ddc284f4d8e1de3660da91db8
Filesize:
15.61 KB
suspicious functions used:
shell_exec (line:34);shell_exec (line:113);shell_exec (line:126);shell_exec (line:132); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test7.php-
Full path:
his/web/test7.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:34 12/12/2025
Last modified:
00:46:19 28/12/2024
MD5 hash:
b11ccf951ce63a21ea0a7328316a0e5c
Filesize:
1.57 KB
suspicious functions used:
curl_exec (line:14); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: testttttt.php-
Full path:
his/web/testttttt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:34 12/12/2025
Last modified:
00:46:19 28/12/2024
MD5 hash:
b1988a4be29e191ad935fb409a4174ee
Filesize:
2 KB
suspicious functions used:
curl_exec (line:47); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: texecutepayment.php-
Full path:
his/web/texecutepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:34 12/12/2025
Last modified:
00:46:19 28/12/2024
MD5 hash:
623635fdf5c871391d3a5fe99ee8c543
Filesize:
2.91 KB
suspicious functions used:
curl_exec (line:24); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tis-news.php-
Full path:
his/web/tis-news.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
13:31:05 12/12/2025
Last modified:
00:46:19 28/12/2024
MD5 hash:
ed23ca98b77c5321b4485e85eb2ea64d
Filesize:
3.67 KB
suspicious functions used:
curl_exec (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
his/web/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:34 12/12/2025
Last modified:
00:46:19 28/12/2024
MD5 hash:
7d8e71ceda3ffb74623e0c4a814715af
Filesize:
1.53 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tt.php-
Full path:
his/web/tt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:34 12/12/2025
Last modified:
00:46:19 28/12/2024
MD5 hash:
9c4ed141cb79fdc7e807b35923c91a20
Filesize:
1.56 KB
suspicious functions used:
curl_exec (line:30); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ttoken.php-
Full path:
his/web/ttoken.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:34 12/12/2025
Last modified:
00:46:20 28/12/2024
MD5 hash:
5f2c51c1db5b0defadfb67ce25c0098f
Filesize:
1.54 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook.php-
Full path:
his/web/webhook.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:35 12/12/2025
Last modified:
00:46:22 28/12/2024
MD5 hash:
26e2059a39281031d28874b51b52d60c
Filesize:
21.23 KB
suspicious functions used:
base64_decode (line:27);curl_exec (line:38);curl_exec (line:454); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook_cid.php-
Full path:
his/web/webhook_cid.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:35 12/12/2025
Last modified:
00:46:22 28/12/2024
MD5 hash:
18c8353c99f0ca2645c68685e40c568b
Filesize:
21.1 KB
suspicious functions used:
base64_decode (line:28);curl_exec (line:39);curl_exec (line:429); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook_test.php-
Full path:
his/web/webhook_test.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:35 12/12/2025
Last modified:
00:46:22 28/12/2024
MD5 hash:
74a7dcc262d7fe7f2bdc9e0595d03837
Filesize:
4.69 KB
suspicious functions used:
base64_decode (line:22);curl_exec (line:33);curl_exec (line:86);curl_exec (line:107); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: billpaycheck.php-
Full path:
his/web/bkash/billpaycheck.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:35 12/12/2025
Last modified:
00:46:25 28/12/2024
MD5 hash:
38c46efc36b25628fa18bd92ae135af9
Filesize:
796 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
his/web/bkash/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:35 12/12/2025
Last modified:
00:46:25 28/12/2024
MD5 hash:
6175301f744b22b7db70ba598a991f8b
Filesize:
1.64 KB
suspicious functions used:
curl_exec (line:36); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
his/web/bkash/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:35 12/12/2025
Last modified:
00:46:25 28/12/2024
MD5 hash:
19be365d26141eaecead7ef0ada0e75c
Filesize:
1.3 KB
suspicious functions used:
curl_exec (line:31); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: grant.php-
Full path:
his/web/bkash/grant.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:35 12/12/2025
Last modified:
00:46:26 28/12/2024
MD5 hash:
da5499d260dc78ea4fcd71227cc6c484
Filesize:
2.01 KB
suspicious functions used:
curl_exec (line:41);curl_exec (line:63); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: query.php-
Full path:
his/web/bkash/query.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:35 12/12/2025
Last modified:
00:46:26 28/12/2024
MD5 hash:
f3ed9045f3a073e2cdc8561d500bda89
Filesize:
1.65 KB
suspicious functions used:
curl_exec (line:33); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tagreeexpayment.php-
Full path:
his/web/bkash/tagreeexpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:35 12/12/2025
Last modified:
00:46:26 28/12/2024
MD5 hash:
a1ba7d36003f72e593615aa32e44acb9
Filesize:
1.58 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreateagree.php-
Full path:
his/web/bkash/tcreateagree.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:35 12/12/2025
Last modified:
00:46:26 28/12/2024
MD5 hash:
8ae6bdc9f3d4b0cdcf651701a0d9ebab
Filesize:
1.2 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreatepayment.php-
Full path:
his/web/bkash/tcreatepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:35 12/12/2025
Last modified:
00:46:26 28/12/2024
MD5 hash:
3c978def6cffa0a8db5e86ce127caae6
Filesize:
1.35 KB
suspicious functions used:
curl_exec (line:29); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: texecutepayment.php-
Full path:
his/web/bkash/texecutepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:35 12/12/2025
Last modified:
00:46:26 28/12/2024
MD5 hash:
d8f24df64623da3cfc2baf48f184a3d1
Filesize:
1.21 KB
suspicious functions used:
curl_exec (line:25); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
his/web/bkash/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:35 12/12/2025
Last modified:
00:46:26 28/12/2024
MD5 hash:
f50b33eeb31927b2c081195618d48b8d
Filesize:
1.88 KB
suspicious functions used:
curl_exec (line:48); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tokent.php-
Full path:
his/web/bkash/tokent.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:35 12/12/2025
Last modified:
00:46:26 28/12/2024
MD5 hash:
890a9e9fb1be75f31a6daad8811c1ff9
Filesize:
1.9 KB
suspicious functions used:
curl_exec (line:48); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: trxID.php-
Full path:
his/web/bkash/trxID.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:35 12/12/2025
Last modified:
00:46:26 28/12/2024
MD5 hash:
9bcb8e70728fd25807c4db8916166d74
Filesize:
1.44 KB
suspicious functions used:
curl_exec (line:31); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
his/web/bkasht/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:35 12/12/2025
Last modified:
00:46:26 28/12/2024
MD5 hash:
a4ba6e7683f558dc3602dacd7ddeded2
Filesize:
1.36 KB
suspicious functions used:
curl_exec (line:29); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
his/web/bkasht/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:35 12/12/2025
Last modified:
00:46:26 28/12/2024
MD5 hash:
aad462fbca9f9a36649a197d67403098
Filesize:
1.27 KB
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: grant.php-
Full path:
his/web/bkasht/grant.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:35 12/12/2025
Last modified:
00:46:26 28/12/2024
MD5 hash:
da5499d260dc78ea4fcd71227cc6c484
Filesize:
2.01 KB
suspicious functions used:
curl_exec (line:41);curl_exec (line:63); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: query.php-
Full path:
his/web/bkasht/query.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:35 12/12/2025
Last modified:
00:46:26 28/12/2024
MD5 hash:
f3ed9045f3a073e2cdc8561d500bda89
Filesize:
1.65 KB
suspicious functions used:
curl_exec (line:33); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
his/web/bkasht/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:35 12/12/2025
Last modified:
00:46:26 28/12/2024
MD5 hash:
f50b33eeb31927b2c081195618d48b8d
Filesize:
1.88 KB
suspicious functions used:
curl_exec (line:48); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: trxID.php-
Full path:
his/web/bkasht/trxID.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:35 12/12/2025
Last modified:
00:46:26 28/12/2024
MD5 hash:
9bcb8e70728fd25807c4db8916166d74
Filesize:
1.44 KB
suspicious functions used:
curl_exec (line:31); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: class.phpmailer.php-
Full path:
his/web/email/class.phpmailer.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:35 12/12/2025
Last modified:
00:46:27 28/12/2024
MD5 hash:
68468d69b47fffecc89df57e27c5a781
Filesize:
143.32 KB
suspicious functions used:
`$DKIM_private` (line:428);popen (line:1387);popen (line:1408);base64_decode (line:3410);`$mail->set('SMTPSecure', 'tls');` (line:3688);`$mail->SMTPSecure = 'tls';` (line:3690); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: class.smtp.php-
Full path:
his/web/email/class.smtp.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:36 12/12/2025
Last modified:
00:46:28 28/12/2024
MD5 hash:
aa8478329268e5438a4469c268337a10
Filesize:
41.44 KB
suspicious functions used:
base64_decode (line:513);base64_decode (line:533); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: jqgrid.php-
Full path:
his/web/inc/jqgrid.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:37 12/12/2025
Last modified:
00:46:33 28/12/2024
MD5 hash:
71027a29e71e0626d8b57cbb631e6d98
Filesize:
23.92 KB
suspicious functions used:
eval (line:397); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: JSON.php-
Full path:
his/web/inc/JSON.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:37 12/12/2025
Last modified:
00:46:33 28/12/2024
MD5 hash:
f5a34509e06231308becbe320ade9ff6
Filesize:
33.22 KB
suspicious functions used:
eval (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: smsapicore.php-
Full path:
his/web/include/smsapicore.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:37 12/12/2025
Last modified:
00:46:33 28/12/2024
MD5 hash:
6b6257f892846565ef8dee38400afa15
Filesize:
1.24 KB
suspicious functions used:
curl_exec (line:36); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: telegramapicore.php-
Full path:
his/web/include/telegramapicore.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:37 12/12/2025
Last modified:
00:46:33 28/12/2024
MD5 hash:
e1f2020f2a58e7b600312301697f9aca
Filesize:
3 KB
suspicious functions used:
curl_exec (line:65); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ui.php-
Full path:
his/web/js/tinymce/themes/advanced/skins/highcontrast/ui.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:37 12/12/2025
Last modified:
00:46:56 28/12/2024
MD5 hash:
3edaf67be8573b86686f46bbba4f058c
Filesize:
4.53 KB
suspicious functions used:
curl_exec (line:20);`bill_amount` = '0.00' WHERE bill_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY ` (line:53);`bill_amount` = '0.00', days = '0.00' WHERE entry_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY ` (line:54);`payment` WHERE `pay_date` < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND pay_amount != '0.00' ORDER BY ` (line:55);curl_exec (line:146);curl_exec (line:168); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Changes.txt-
Full path:
his/web/js/jqgrid/js/Changes.txt
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:37 12/12/2025
Last modified:
00:46:46 28/12/2024
MD5 hash:
c0a4adbc3f1c6d592cb4fa8433fee9ea
Filesize:
44.32 KB
suspicious functions used:
system (line:87); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
his/m/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:37 12/12/2025
Last modified:
00:45:08 28/12/2024
MD5 hash:
849185f307be30eafb1bbef93616d8c3
Filesize:
1.71 KB
suspicious functions used:
curl_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
his/m/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:37 12/12/2025
Last modified:
00:45:08 28/12/2024
MD5 hash:
9a3f22521ad987e86f84c4f5f688d5b7
Filesize:
713 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index.php-
Full path:
his/m/index.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
01:00:02 12/12/2025
Last modified:
00:45:09 28/12/2024
MD5 hash:
95475438b8637bb8fa3fbb409a4fcbcc
Filesize:
16.96 KB
suspicious functions used:
curl_exec (line:298); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index1.php-
Full path:
his/m/index1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:38 12/12/2025
Last modified:
00:45:09 28/12/2024
MD5 hash:
dbd325386cd905b7a18b217dda2030f3
Filesize:
13.92 KB
suspicious functions used:
base64_decode (line:8);curl_exec (line:224); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index2.php-
Full path:
his/m/index2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:38 12/12/2025
Last modified:
00:45:09 28/12/2024
MD5 hash:
41558736b037228ea93df03cae70eb87
Filesize:
4.31 KB
suspicious functions used:
curl_exec (line:70); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: LoginByPass.php-
Full path:
his/m/LoginByPass.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:38 12/12/2025
Last modified:
00:45:09 28/12/2024
MD5 hash:
4deda2bef49c7e4552e5379c86858ddf
Filesize:
4.27 KB
suspicious functions used:
curl_exec (line:41); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec.php-
Full path:
his/m/login_exec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:38 12/12/2025
Last modified:
00:45:09 28/12/2024
MD5 hash:
760b107af2f5d6194f97c20ba3ffb86b
Filesize:
11.63 KB
suspicious functions used:
curl_exec (line:24);curl_exec (line:80);curl_exec (line:227); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec1.php-
Full path:
his/m/login_exec1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:38 12/12/2025
Last modified:
00:45:09 28/12/2024
MD5 hash:
b7a23f98b3d03b1ecc08218cf01b4aee
Filesize:
6.36 KB
suspicious functions used:
curl_exec (line:115); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec2.php-
Full path:
his/m/login_exec2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:38 12/12/2025
Last modified:
00:45:09 28/12/2024
MD5 hash:
46b08782f51ba75b23e27183e06370fe
Filesize:
4.28 KB
suspicious functions used:
curl_exec (line:61); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-helper.php-
Full path:
his/m/nagad-helper.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:38 12/12/2025
Last modified:
00:45:10 28/12/2024
MD5 hash:
2bb70c44d68202e0a0cd8ae1388f0b1b
Filesize:
6.74 KB
suspicious functions used:
curl_exec (line:61);base64_decode (line:97); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-merchant-callback.php-
Full path:
his/m/nagad-merchant-callback.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:38 12/12/2025
Last modified:
00:45:10 28/12/2024
MD5 hash:
0e6086c5260150c11249029f212ee481
Filesize:
11.36 KB
suspicious functions used:
curl_exec (line:20); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-snmp-data.php-
Full path:
his/m/netowrk-snmp-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:38 12/12/2025
Last modified:
00:45:10 28/12/2024
MD5 hash:
45b774abc8d67efb3e4e87c93b1f618b
Filesize:
24.05 KB
suspicious functions used:
shell_exec (line:96);shell_exec (line:105);shell_exec (line:115);shell_exec (line:134);shell_exec (line:146);shell_exec (line:157);shell_exec (line:173);shell_exec (line:183);shell_exec (line:199);shell_exec (line:219);shell_exec (line:229);shell_exec (line:234);shell_exec (line:242);shell_exec (line:262);shell_exec (line:278);`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:291);shell_exec (line:297);shell_exec (line:432); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery.php-
Full path:
his/m/PaymentOnlineQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:38 12/12/2025
Last modified:
00:45:11 28/12/2024
MD5 hash:
05d772ea15775c0640ac9d1ff7c7144c
Filesize:
21.13 KB
suspicious functions used:
curl_exec (line:287);curl_exec (line:512); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery2.php-
Full path:
his/m/PaymentOnlineQuery2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:38 12/12/2025
Last modified:
00:45:11 28/12/2024
MD5 hash:
3660992067d5591fc79ce89d6dbb9274
Filesize:
19.08 KB
suspicious functions used:
curl_exec (line:41);curl_exec (line:254); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: support-action.php-
Full path:
his/m/support-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:38 12/12/2025
Last modified:
00:45:12 28/12/2024
MD5 hash:
2fc6fd844db911a5502a7a6ae383990f
Filesize:
10.31 KB
suspicious functions used:
curl_exec (line:99); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tagreeexpayment.php-
Full path:
his/m/tagreeexpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:38 12/12/2025
Last modified:
00:45:13 28/12/2024
MD5 hash:
c95e3ee881752db67b4f3597bc58430a
Filesize:
2.46 KB
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreateagree.php-
Full path:
his/m/tcreateagree.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:38 12/12/2025
Last modified:
00:45:13 28/12/2024
MD5 hash:
27a10adf4190edc7eceee8cf74a6b72b
Filesize:
999 B
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreatepayment.php-
Full path:
his/m/tcreatepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:38 12/12/2025
Last modified:
00:45:13 28/12/2024
MD5 hash:
e49de9a33f5164bc2c6b88e4770faaff
Filesize:
1.07 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: texecutepayment.php-
Full path:
his/m/texecutepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:38 12/12/2025
Last modified:
00:45:13 28/12/2024
MD5 hash:
efbb63dfcfdacb52dec74bffc389bbb3
Filesize:
2.67 KB
suspicious functions used:
curl_exec (line:24); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
his/m/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:38 12/12/2025
Last modified:
00:45:13 28/12/2024
MD5 hash:
7d8e71ceda3ffb74623e0c4a814715af
Filesize:
1.53 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ttoken.php-
Full path:
his/m/ttoken.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:38 12/12/2025
Last modified:
00:45:13 28/12/2024
MD5 hash:
5f2c51c1db5b0defadfb67ce25c0098f
Filesize:
1.54 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Changes.txt-
Full path:
acn/m/js/jqgrid/js/Changes.txt
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:39 12/12/2025
Last modified:
01:14:42 26/09/2023
MD5 hash:
c0a4adbc3f1c6d592cb4fa8433fee9ea
Filesize:
44.32 KB
suspicious functions used:
system (line:87); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery.php-
Full path:
acn/m/PaymentOnlineQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:39 12/12/2025
Last modified:
01:13:53 26/09/2023
MD5 hash:
5e63b1f647ca3509509beda8102d5c40
Filesize:
16.65 KB
suspicious functions used:
curl_exec (line:287);curl_exec (line:382); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
acn/m/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:40 12/12/2025
Last modified:
01:13:51 26/09/2023
MD5 hash:
05132f436e56ff2164ecc165347219ae
Filesize:
1.71 KB
suspicious functions used:
curl_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
acn/m/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:40 12/12/2025
Last modified:
01:13:51 26/09/2023
MD5 hash:
9a3f22521ad987e86f84c4f5f688d5b7
Filesize:
713 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index.php-
Full path:
acn/m/index.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
09:54:54 12/12/2025
Last modified:
23:30:24 03/10/2023
MD5 hash:
488549d8551f66f872c47e45201ee5b7
Filesize:
11.85 KB
suspicious functions used:
base64_decode (line:10);curl_exec (line:206); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec.php-
Full path:
acn/m/login_exec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:40 12/12/2025
Last modified:
06:36:16 01/03/2024
MD5 hash:
1f800365ef270564df77d30c1bfd7ed3
Filesize:
5.4 KB
suspicious functions used:
curl_exec (line:66); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec1.php-
Full path:
acn/m/login_exec1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:40 12/12/2025
Last modified:
01:13:52 26/09/2023
MD5 hash:
4ab4155763d3c6a8ea772996a5765a94
Filesize:
4.28 KB
suspicious functions used:
curl_exec (line:61); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery2.php-
Full path:
acn/m/PaymentOnlineQuery2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:40 12/12/2025
Last modified:
01:13:53 26/09/2023
MD5 hash:
48588dfbb812b9e8102af40dc401032c
Filesize:
19.04 KB
suspicious functions used:
curl_exec (line:41);curl_exec (line:254); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tagreeexpayment.php-
Full path:
acn/m/tagreeexpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:40 12/12/2025
Last modified:
01:13:53 26/09/2023
MD5 hash:
c95e3ee881752db67b4f3597bc58430a
Filesize:
2.46 KB
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreateagree.php-
Full path:
acn/m/tcreateagree.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:40 12/12/2025
Last modified:
01:13:53 26/09/2023
MD5 hash:
27a10adf4190edc7eceee8cf74a6b72b
Filesize:
999 B
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreatepayment.php-
Full path:
acn/m/tcreatepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:40 12/12/2025
Last modified:
01:13:53 26/09/2023
MD5 hash:
e49de9a33f5164bc2c6b88e4770faaff
Filesize:
1.07 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: texecutepayment.php-
Full path:
acn/m/texecutepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:40 12/12/2025
Last modified:
01:13:53 26/09/2023
MD5 hash:
efbb63dfcfdacb52dec74bffc389bbb3
Filesize:
2.67 KB
suspicious functions used:
curl_exec (line:24); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
acn/m/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:40 12/12/2025
Last modified:
01:13:53 26/09/2023
MD5 hash:
7d8e71ceda3ffb74623e0c4a814715af
Filesize:
1.53 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ttoken.php-
Full path:
acn/m/ttoken.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:40 12/12/2025
Last modified:
01:13:53 26/09/2023
MD5 hash:
5f2c51c1db5b0defadfb67ce25c0098f
Filesize:
1.54 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: class.phpmailer.php-
Full path:
acn/web/email/class.phpmailer.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:41 12/12/2025
Last modified:
01:15:40 26/09/2023
MD5 hash:
68468d69b47fffecc89df57e27c5a781
Filesize:
143.32 KB
suspicious functions used:
`$DKIM_private` (line:428);popen (line:1387);popen (line:1408);base64_decode (line:3410);`$mail->set('SMTPSecure', 'tls');` (line:3688);`$mail->SMTPSecure = 'tls';` (line:3690); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: class.smtp.php-
Full path:
acn/web/email/class.smtp.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:41 12/12/2025
Last modified:
01:15:40 26/09/2023
MD5 hash:
aa8478329268e5438a4469c268337a10
Filesize:
41.44 KB
suspicious functions used:
base64_decode (line:513);base64_decode (line:533); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: JSON.php-
Full path:
acn/web/inc/JSON.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:42 12/12/2025
Last modified:
01:15:43 26/09/2023
MD5 hash:
f5a34509e06231308becbe320ade9ff6
Filesize:
33.22 KB
suspicious functions used:
eval (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: jqgrid.php-
Full path:
acn/web/inc/jqgrid.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:42 12/12/2025
Last modified:
01:15:43 26/09/2023
MD5 hash:
71027a29e71e0626d8b57cbb631e6d98
Filesize:
23.92 KB
suspicious functions used:
eval (line:397); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: smsapicore.php-
Full path:
acn/web/include/smsapicore.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:42 12/12/2025
Last modified:
06:09:55 01/03/2024
MD5 hash:
0afbabc581e2e88f2883e249f83847a4
Filesize:
891 B
suspicious functions used:
curl_exec (line:13); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: telegramapicore.php-
Full path:
acn/web/include/telegramapicore.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:42 12/12/2025
Last modified:
01:15:43 26/09/2023
MD5 hash:
c669b81806a80fae7f84959c253cc737
Filesize:
2.44 KB
suspicious functions used:
curl_exec (line:54); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Changes.txt-
Full path:
acn/web/js/jqgrid/js/Changes.txt
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:42 12/12/2025
Last modified:
01:15:51 26/09/2023
MD5 hash:
c0a4adbc3f1c6d592cb4fa8433fee9ea
Filesize:
44.32 KB
suspicious functions used:
system (line:87); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ui.php-
Full path:
acn/web/js/tinymce/themes/advanced/skins/highcontrast/ui.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:42 12/12/2025
Last modified:
01:15:57 26/09/2023
MD5 hash:
4c0401a6d1abd64eeb2781b0ac727ceb
Filesize:
3.94 KB
suspicious functions used:
curl_exec (line:20);curl_exec (line:37);curl_exec (line:132);curl_exec (line:149); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: AutoActiveClientsCount1.php-
Full path:
acn/web/AutoActiveClientsCount1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:43 12/12/2025
Last modified:
01:15:15 26/09/2023
MD5 hash:
a0090e4a11dd59b955a6edd549b6ef2f
Filesize:
5.85 KB
suspicious functions used:
system (line:54); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkLoad.php-
Full path:
acn/web/NetworkLoad.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:45 12/12/2025
Last modified:
01:15:28 26/09/2023
MD5 hash:
e1632e66ee1b7394d3fb82751b924abe
Filesize:
2.83 KB
suspicious functions used:
system (line:81); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: InstrumentsStoreOutDetails.php-
Full path:
acn/web/InstrumentsStoreOutDetails.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:45 12/12/2025
Last modified:
01:15:24 26/09/2023
MD5 hash:
ab68ab13bcfd51da15e72a3d4e9817e8
Filesize:
9.37 KB
suspicious functions used:
`update_date`, '%D-%b, %y') AS offdate, TIME_FORMAT(`update_time`, '%T') AS offtime FROM `con_sts_log` WHERE `c_id` = '{$row['c_id']}' AND con_sts = 'Inactive' ORDER BY ` (line:120); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Network.php-
Full path:
acn/web/Network.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:45 12/12/2025
Last modified:
01:15:27 26/09/2023
MD5 hash:
81fbd1a4bf9ecbb944ccd98ae719849b
Filesize:
22.92 KB
suspicious functions used:
system (line:209); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Network1.php-
Full path:
acn/web/Network1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:45 12/12/2025
Last modified:
01:15:27 26/09/2023
MD5 hash:
81fbd1a4bf9ecbb944ccd98ae719849b
Filesize:
22.92 KB
suspicious functions used:
system (line:209); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery.php-
Full path:
acn/web/PaymentOnlineQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:46 12/12/2025
Last modified:
01:15:31 26/09/2023
MD5 hash:
eb93c751e05e717a544d27f8dd6ef768
Filesize:
23.99 KB
suspicious functions used:
curl_exec (line:456);curl_exec (line:560); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery2.php-
Full path:
acn/web/PaymentOnlineQuery2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:46 12/12/2025
Last modified:
01:15:31 26/09/2023
MD5 hash:
138b87d49f0613b02cb61abace637606
Filesize:
19.39 KB
suspicious functions used:
curl_exec (line:43);curl_exec (line:253); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMS.php-
Full path:
acn/web/SMS.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:46 12/12/2025
Last modified:
04:05:02 13/10/2023
MD5 hash:
a8c609c9c9cec5324a708b373cec838c
Filesize:
30.62 KB
suspicious functions used:
curl_exec (line:53); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentWebhook.php-
Full path:
acn/web/PaymentWebhook.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:47 12/12/2025
Last modified:
08:32:04 01/03/2024
MD5 hash:
a2f322c94787630ab1e0c8ca35fc5ba1
Filesize:
18.6 KB
suspicious functions used:
base64_decode (line:30);curl_exec (line:41);curl_exec (line:422); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMS1.php-
Full path:
acn/web/SMS1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:47 12/12/2025
Last modified:
01:15:35 26/09/2023
MD5 hash:
00310c03f319d7c6845d0aef92328b13
Filesize:
32.19 KB
suspicious functions used:
curl_exec (line:59); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMSAddSave.php-
Full path:
acn/web/SMSAddSave.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:47 12/12/2025
Last modified:
01:15:35 26/09/2023
MD5 hash:
5e8b43b3bc2febe3a611a5bd9aa8fc28
Filesize:
1.71 KB
suspicious functions used:
curl_exec (line:34); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: emp_salary_advence_find.php-
Full path:
acn/web/emp_salary_advence_find.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:48 12/12/2025
Last modified:
01:15:22 26/09/2023
MD5 hash:
8cb12a79d5e1d31d92670d721dabb5aa
Filesize:
2.25 KB
suspicious functions used:
`expanse` WHERE `type` = '2' AND `status` = '2' AND ex_by = '$e_id' AND MONTH(`, `) = MONTH('$lastmonth') AND YEAR(`, `) = YEAR('$lastmonth') GROUP BY ` (line:8);`e_id` = '$e_id' AND ` (line:12); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: company_info.php-
Full path:
acn/web/company_info.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
21:03:32 11/12/2025
Last modified:
13:01:05 09/04/2024
MD5 hash:
c52ef7f55b7a46af9aa2b7c7b71a3834
Filesize:
7.74 KB
suspicious functions used:
curl_exec (line:123); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
acn/web/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:48 12/12/2025
Last modified:
01:15:21 26/09/2023
MD5 hash:
c8a7ce9b69ebed3509cee2952c04cb0c
Filesize:
1.7 KB
suspicious functions used:
curl_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_all.php-
Full path:
acn/web/cron_all.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:48 12/12/2025
Last modified:
08:04:16 01/03/2024
MD5 hash:
b19a08fef36584598cca299b7ecc5e6d
Filesize:
2.07 KB
suspicious functions used:
curl_exec (line:23);curl_exec (line:38);curl_exec (line:53); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_gen_bill.php-
Full path:
acn/web/cron_auto_gen_bill.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:48 12/12/2025
Last modified:
08:04:50 01/03/2024
MD5 hash:
eadec12eb6484d0069e5d0d320725a75
Filesize:
4.73 KB
suspicious functions used:
curl_exec (line:140);curl_exec (line:149); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive.php-
Full path:
acn/web/cron_auto_inactive.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:48 12/12/2025
Last modified:
08:05:48 01/03/2024
MD5 hash:
288e83bc1578b0992ae1ab75eb328bc2
Filesize:
5.75 KB
suspicious functions used:
curl_exec (line:151); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive2.php-
Full path:
acn/web/cron_auto_inactive2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:48 12/12/2025
Last modified:
01:15:21 26/09/2023
MD5 hash:
a6a713d414c4e0632f4fe69f68b77d53
Filesize:
6.28 KB
suspicious functions used:
curl_exec (line:158); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
acn/web/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:48 12/12/2025
Last modified:
01:15:22 26/09/2023
MD5 hash:
c46a50905333286f45dfeacf010851ab
Filesize:
716 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive_termination.php-
Full path:
acn/web/cron_auto_inactive_termination.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
18:05:01 12/12/2025
Last modified:
12:17:50 23/09/2024
MD5 hash:
64c9ff719cd52caa5d5589cf7fd5e460
Filesize:
6.81 KB
suspicious functions used:
curl_exec (line:124);curl_exec (line:142); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_termination_remainder1.php-
Full path:
acn/web/cron_auto_termination_remainder1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:48 12/12/2025
Last modified:
08:31:04 01/03/2024
MD5 hash:
7765f9f820dbd402f1064fab9958ffaa
Filesize:
3.26 KB
suspicious functions used:
curl_exec (line:83); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_client_bandwidth_count.php-
Full path:
acn/web/cron_client_bandwidth_count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
14:34:57 12/12/2025
Last modified:
01:15:21 26/09/2023
MD5 hash:
6b8058e3d36ab2407a01cf3091a88016
Filesize:
3.81 KB
suspicious functions used:
curl_exec (line:102); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_network.php-
Full path:
acn/web/cron_network.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
23:03:36 11/12/2025
Last modified:
01:15:21 26/09/2023
MD5 hash:
d7ae8ca3db81dce0960bb9840cb5aeee
Filesize:
4.14 KB
suspicious functions used:
curl_exec (line:41);curl_exec (line:59); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index.php-
Full path:
acn/web/index.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
05:36:38 12/12/2025
Last modified:
23:30:29 03/10/2023
MD5 hash:
618ca042b62304de35ff0b2a4abc061b
Filesize:
11.98 KB
suspicious functions used:
base64_decode (line:10);curl_exec (line:211); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: sms_deliverey_report.php-
Full path:
acn/web/sms_deliverey_report.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:49 12/12/2025
Last modified:
01:15:36 26/09/2023
MD5 hash:
b0c2b4c2bebe35fbe233cb298a952910
Filesize:
3.45 KB
suspicious functions used:
curl_exec (line:18);curl_exec (line:44); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ttoken.php-
Full path:
acn/web/ttoken.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:49 12/12/2025
Last modified:
01:15:37 26/09/2023
MD5 hash:
5f2c51c1db5b0defadfb67ce25c0098f
Filesize:
1.54 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ip-ping-checker.php-
Full path:
acn/web/ip-ping-checker.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:49 12/12/2025
Last modified:
01:15:24 26/09/2023
MD5 hash:
0d28f3053b73b3fe2885cf519ee17c12
Filesize:
2.64 KB
suspicious functions used:
curl_exec (line:81); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook.php-
Full path:
acn/web/webhook.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:49 12/12/2025
Last modified:
09:21:20 01/03/2024
MD5 hash:
6ea5abfa2b22d299ea68b666eaa57701
Filesize:
20.98 KB
suspicious functions used:
base64_decode (line:28);curl_exec (line:39);curl_exec (line:427); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook_test.php-
Full path:
acn/web/webhook_test.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:49 12/12/2025
Last modified:
01:15:38 26/09/2023
MD5 hash:
74a7dcc262d7fe7f2bdc9e0595d03837
Filesize:
4.69 KB
suspicious functions used:
base64_decode (line:22);curl_exec (line:33);curl_exec (line:86);curl_exec (line:107); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec.php-
Full path:
acn/web/login_exec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:21:02 12/12/2025
Last modified:
06:36:16 01/03/2024
MD5 hash:
8e5caeac6dd5efb18009f8718af713ce
Filesize:
5.39 KB
suspicious functions used:
curl_exec (line:66); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec1.php-
Full path:
acn/web/login_exec1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:49 12/12/2025
Last modified:
01:15:25 26/09/2023
MD5 hash:
4f75b914e1b47a355be8cbc73e4e1407
Filesize:
3.91 KB
suspicious functions used:
curl_exec (line:53); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tagreeexpayment.php-
Full path:
acn/web/tagreeexpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:49 12/12/2025
Last modified:
01:15:36 26/09/2023
MD5 hash:
029b4fba649a75c7c81d2f8931be8d63
Filesize:
2.86 KB
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreateagree.php-
Full path:
acn/web/tcreateagree.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:49 12/12/2025
Last modified:
01:15:36 26/09/2023
MD5 hash:
27a10adf4190edc7eceee8cf74a6b72b
Filesize:
999 B
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreatepayment.php-
Full path:
acn/web/tcreatepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:49 12/12/2025
Last modified:
01:15:36 26/09/2023
MD5 hash:
e49de9a33f5164bc2c6b88e4770faaff
Filesize:
1.07 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test3.php-
Full path:
acn/web/test3.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:49 12/12/2025
Last modified:
01:15:36 26/09/2023
MD5 hash:
73a48fe113b432b1786e7a15406cc14d
Filesize:
1.26 KB
suspicious functions used:
`Counter: ${seconds}s` (line:29); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: testttttt.php-
Full path:
acn/web/testttttt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:49 12/12/2025
Last modified:
10:27:24 04/10/2023
MD5 hash:
b1988a4be29e191ad935fb409a4174ee
Filesize:
2 KB
suspicious functions used:
curl_exec (line:47); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: texecutepayment.php-
Full path:
acn/web/texecutepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:49 12/12/2025
Last modified:
01:15:36 26/09/2023
MD5 hash:
623635fdf5c871391d3a5fe99ee8c543
Filesize:
2.91 KB
suspicious functions used:
curl_exec (line:24); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tis-news.php-
Full path:
acn/web/tis-news.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:49 12/12/2025
Last modified:
07:55:10 09/04/2024
MD5 hash:
ed23ca98b77c5321b4485e85eb2ea64d
Filesize:
3.67 KB
suspicious functions used:
curl_exec (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
acn/web/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:49 12/12/2025
Last modified:
01:15:37 26/09/2023
MD5 hash:
7d8e71ceda3ffb74623e0c4a814715af
Filesize:
1.53 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tagreeexpayment.php-
Full path:
airmax/m/tagreeexpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:50 12/12/2025
Last modified:
02:50:39 07/04/2024
MD5 hash:
c95e3ee881752db67b4f3597bc58430a
Filesize:
2.46 KB
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery.php-
Full path:
airmax/m/PaymentOnlineQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:50 12/12/2025
Last modified:
02:50:39 07/04/2024
MD5 hash:
c7aca21e5a61ded371d4b853710cf4b4
Filesize:
21.14 KB
suspicious functions used:
curl_exec (line:287);curl_exec (line:512); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: support-action.php-
Full path:
airmax/m/support-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:50 12/12/2025
Last modified:
02:50:39 07/04/2024
MD5 hash:
2fc6fd844db911a5502a7a6ae383990f
Filesize:
10.31 KB
suspicious functions used:
curl_exec (line:99); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
airmax/m/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:50 12/12/2025
Last modified:
02:50:38 07/04/2024
MD5 hash:
849185f307be30eafb1bbef93616d8c3
Filesize:
1.71 KB
suspicious functions used:
curl_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
airmax/m/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:50 12/12/2025
Last modified:
02:50:38 07/04/2024
MD5 hash:
9a3f22521ad987e86f84c4f5f688d5b7
Filesize:
713 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreateagree.php-
Full path:
airmax/m/tcreateagree.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:50 12/12/2025
Last modified:
02:50:39 07/04/2024
MD5 hash:
27a10adf4190edc7eceee8cf74a6b72b
Filesize:
999 B
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index.php-
Full path:
airmax/m/index.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
05:15:09 12/12/2025
Last modified:
02:50:38 07/04/2024
MD5 hash:
decb17fe39b65c67448bf9b3896a5d22
Filesize:
12.14 KB
suspicious functions used:
base64_decode (line:10);curl_exec (line:183); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
airmax/m/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:50 12/12/2025
Last modified:
02:50:39 07/04/2024
MD5 hash:
7d8e71ceda3ffb74623e0c4a814715af
Filesize:
1.53 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery2.php-
Full path:
airmax/m/PaymentOnlineQuery2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:50 12/12/2025
Last modified:
02:50:39 07/04/2024
MD5 hash:
37be1b3f51cac8d936abe043bc79ed4b
Filesize:
19.08 KB
suspicious functions used:
curl_exec (line:41);curl_exec (line:254); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreatepayment.php-
Full path:
airmax/m/tcreatepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:51 12/12/2025
Last modified:
02:50:39 07/04/2024
MD5 hash:
e49de9a33f5164bc2c6b88e4770faaff
Filesize:
1.07 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec.php-
Full path:
airmax/m/login_exec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
05:15:12 12/12/2025
Last modified:
02:50:38 07/04/2024
MD5 hash:
1f800365ef270564df77d30c1bfd7ed3
Filesize:
5.4 KB
suspicious functions used:
curl_exec (line:66); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec1.php-
Full path:
airmax/m/login_exec1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:51 12/12/2025
Last modified:
02:50:38 07/04/2024
MD5 hash:
46b08782f51ba75b23e27183e06370fe
Filesize:
4.28 KB
suspicious functions used:
curl_exec (line:61); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-merchant-callback.php-
Full path:
airmax/m/nagad-merchant-callback.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:51 12/12/2025
Last modified:
02:50:39 07/04/2024
MD5 hash:
1ca42269a7e5563f13a266d9c0ce5049
Filesize:
11.75 KB
suspicious functions used:
curl_exec (line:20); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ttoken.php-
Full path:
airmax/m/ttoken.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:51 12/12/2025
Last modified:
02:50:39 07/04/2024
MD5 hash:
5f2c51c1db5b0defadfb67ce25c0098f
Filesize:
1.54 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-helper.php-
Full path:
airmax/m/nagad-helper.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:51 12/12/2025
Last modified:
02:50:39 07/04/2024
MD5 hash:
2bb70c44d68202e0a0cd8ae1388f0b1b
Filesize:
6.74 KB
suspicious functions used:
curl_exec (line:61);base64_decode (line:97); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: texecutepayment.php-
Full path:
airmax/m/texecutepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:51 12/12/2025
Last modified:
02:50:39 07/04/2024
MD5 hash:
efbb63dfcfdacb52dec74bffc389bbb3
Filesize:
2.67 KB
suspicious functions used:
curl_exec (line:24); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: class.phpmailer.php-
Full path:
airmax/web/email/class.phpmailer.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:51 12/12/2025
Last modified:
02:50:53 07/04/2024
MD5 hash:
68468d69b47fffecc89df57e27c5a781
Filesize:
143.32 KB
suspicious functions used:
`$DKIM_private` (line:428);popen (line:1387);popen (line:1408);base64_decode (line:3410);`$mail->set('SMTPSecure', 'tls');` (line:3688);`$mail->SMTPSecure = 'tls';` (line:3690); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: class.smtp.php-
Full path:
airmax/web/email/class.smtp.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:51 12/12/2025
Last modified:
02:50:53 07/04/2024
MD5 hash:
aa8478329268e5438a4469c268337a10
Filesize:
41.44 KB
suspicious functions used:
base64_decode (line:513);base64_decode (line:533); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: JSON.php-
Full path:
airmax/web/inc/JSON.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:52 12/12/2025
Last modified:
02:50:55 07/04/2024
MD5 hash:
f5a34509e06231308becbe320ade9ff6
Filesize:
33.22 KB
suspicious functions used:
eval (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: jqgrid.php-
Full path:
airmax/web/inc/jqgrid.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:52 12/12/2025
Last modified:
02:50:55 07/04/2024
MD5 hash:
71027a29e71e0626d8b57cbb631e6d98
Filesize:
23.92 KB
suspicious functions used:
eval (line:397); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: smsapicore.php-
Full path:
airmax/web/include/smsapicore.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
09:07:46 12/12/2025
Last modified:
02:50:56 07/04/2024
MD5 hash:
f430c15cd3145be5a4641142f5fe2d65
Filesize:
918 B
suspicious functions used:
curl_exec (line:13); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: telegramapicore.php-
Full path:
airmax/web/include/telegramapicore.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:52 12/12/2025
Last modified:
02:50:56 07/04/2024
MD5 hash:
535fa7aac83b0e1ba56be7837348b6d9
Filesize:
2.9 KB
suspicious functions used:
curl_exec (line:63); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Changes.txt-
Full path:
airmax/web/js/jqgrid/js/Changes.txt
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:52 12/12/2025
Last modified:
02:51:04 07/04/2024
MD5 hash:
c0a4adbc3f1c6d592cb4fa8433fee9ea
Filesize:
44.32 KB
suspicious functions used:
system (line:87); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ui.php-
Full path:
airmax/web/js/tinymce/themes/advanced/skins/highcontrast/ui.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:52 12/12/2025
Last modified:
02:51:10 07/04/2024
MD5 hash:
3edaf67be8573b86686f46bbba4f058c
Filesize:
4.53 KB
suspicious functions used:
curl_exec (line:20);`bill_amount` = '0.00' WHERE bill_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY ` (line:53);`bill_amount` = '0.00', days = '0.00' WHERE entry_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY ` (line:54);`payment` WHERE `pay_date` < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND pay_amount != '0.00' ORDER BY ` (line:55);curl_exec (line:146);curl_exec (line:168); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: AutoActiveClientsCount1.php-
Full path:
airmax/web/AutoActiveClientsCount1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
13:41:23 12/12/2025
Last modified:
02:50:45 07/04/2024
MD5 hash:
fb443f2f93781a8fffce803317592c41
Filesize:
6.12 KB
suspicious functions used:
system (line:56); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: AutoActiveClientsCount11.php-
Full path:
airmax/web/AutoActiveClientsCount11.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:53 12/12/2025
Last modified:
02:50:45 07/04/2024
MD5 hash:
a0090e4a11dd59b955a6edd549b6ef2f
Filesize:
5.85 KB
suspicious functions used:
system (line:54); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: InstrumentsStoreOutDetails.php-
Full path:
airmax/web/InstrumentsStoreOutDetails.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:55 12/12/2025
Last modified:
02:50:47 07/04/2024
MD5 hash:
ab68ab13bcfd51da15e72a3d4e9817e8
Filesize:
9.37 KB
suspicious functions used:
`update_date`, '%D-%b, %y') AS offdate, TIME_FORMAT(`update_time`, '%T') AS offtime FROM `con_sts_log` WHERE `c_id` = '{$row['c_id']}' AND con_sts = 'Inactive' ORDER BY ` (line:120); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Network.php-
Full path:
airmax/web/Network.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
14:33:11 12/12/2025
Last modified:
02:50:49 07/04/2024
MD5 hash:
eef190061625bfa2d7ba43697eaeca82
Filesize:
26.67 KB
suspicious functions used:
system (line:216); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Network1.php-
Full path:
airmax/web/Network1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:56 12/12/2025
Last modified:
02:50:49 07/04/2024
MD5 hash:
81fbd1a4bf9ecbb944ccd98ae719849b
Filesize:
22.92 KB
suspicious functions used:
system (line:209); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkLoad.php-
Full path:
airmax/web/NetworkLoad.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
14:33:12 12/12/2025
Last modified:
02:50:49 07/04/2024
MD5 hash:
e1632e66ee1b7394d3fb82751b924abe
Filesize:
2.83 KB
suspicious functions used:
system (line:81); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMS.php-
Full path:
airmax/web/SMS.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:56 12/12/2025
Last modified:
02:50:50 07/04/2024
MD5 hash:
3fa15a1ba3c18afe9e6176dc8f526985
Filesize:
35.86 KB
suspicious functions used:
curl_exec (line:56); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMSAddSave.php-
Full path:
airmax/web/SMSAddSave.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:56 12/12/2025
Last modified:
02:50:50 07/04/2024
MD5 hash:
1a6eaf13aa0ca959fe2dca885b7ffd8e
Filesize:
1.73 KB
suspicious functions used:
curl_exec (line:34); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkLoad1.php-
Full path:
airmax/web/NetworkLoad1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:56 12/12/2025
Last modified:
02:50:49 07/04/2024
MD5 hash:
176bd6931be34d7ef351d22897accc65
Filesize:
759 B
suspicious functions used:
system (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMS1.php-
Full path:
airmax/web/SMS1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:56 12/12/2025
Last modified:
02:50:50 07/04/2024
MD5 hash:
40d55bbcfe09846560034ad6b6748670
Filesize:
32.19 KB
suspicious functions used:
curl_exec (line:59); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery.php-
Full path:
airmax/web/PaymentOnlineQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:57 12/12/2025
Last modified:
02:50:49 07/04/2024
MD5 hash:
e71855333c2ea0c43f2a87109898c283
Filesize:
28.5 KB
suspicious functions used:
curl_exec (line:456);curl_exec (line:688); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery2.php-
Full path:
airmax/web/PaymentOnlineQuery2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:57 12/12/2025
Last modified:
02:50:49 07/04/2024
MD5 hash:
700d8182abbbc0b80fe31beb1e717699
Filesize:
19.39 KB
suspicious functions used:
curl_exec (line:42);curl_exec (line:252); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentWebhook.php-
Full path:
airmax/web/PaymentWebhook.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:57 12/12/2025
Last modified:
02:50:49 07/04/2024
MD5 hash:
a2f322c94787630ab1e0c8ca35fc5ba1
Filesize:
18.6 KB
suspicious functions used:
base64_decode (line:30);curl_exec (line:41);curl_exec (line:422); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SignUp1.php-
Full path:
airmax/web/SignUp1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:59 12/12/2025
Last modified:
02:50:50 07/04/2024
MD5 hash:
3f7943dd155c8e0a383b7d02730f8c11
Filesize:
24.59 KB
suspicious functions used:
curl_exec (line:33);curl_exec (line:59); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: sms-balance-check.php-
Full path:
airmax/web/sms-balance-check.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
15:22:11 12/12/2025
Last modified:
02:50:50 07/04/2024
MD5 hash:
74ac3e963a0dc5bb7d4c980e594aa39b
Filesize:
854 B
suspicious functions used:
curl_exec (line:15); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive_termination.php-
Full path:
airmax/web/cron_auto_inactive_termination.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
01:55:16 12/12/2025
Last modified:
12:17:50 23/09/2024
MD5 hash:
9f9c8ca9110c2304128646824bfb17db
Filesize:
12.16 KB
suspicious functions used:
curl_exec (line:241);curl_exec (line:253); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: sms_deliverey_report.php-
Full path:
airmax/web/sms_deliverey_report.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
03:06:27 12/12/2025
Last modified:
02:50:51 07/04/2024
MD5 hash:
03623943da7e9334e137b38c8577fc84
Filesize:
4.25 KB
suspicious functions used:
curl_exec (line:28);curl_exec (line:53);curl_exec (line:90); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive_termination1.php-
Full path:
airmax/web/cron_auto_inactive_termination1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:59 12/12/2025
Last modified:
02:50:47 07/04/2024
MD5 hash:
be76b964c93a2cb4fa7e632750ff3bc4
Filesize:
6.64 KB
suspicious functions used:
curl_exec (line:156);curl_exec (line:168); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_termination_remainder1.php-
Full path:
airmax/web/cron_auto_termination_remainder1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
03:06:26 12/12/2025
Last modified:
02:50:47 07/04/2024
MD5 hash:
7765f9f820dbd402f1064fab9958ffaa
Filesize:
3.26 KB
suspicious functions used:
curl_exec (line:83); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_client_bandwidth_count.php-
Full path:
airmax/web/cron_client_bandwidth_count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
22:13:45 11/12/2025
Last modified:
02:50:47 07/04/2024
MD5 hash:
de3b1389261cf5411b7e7ca5c44f96b2
Filesize:
4.08 KB
suspicious functions used:
curl_exec (line:117); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_network.php-
Full path:
airmax/web/cron_network.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
14:03:21 12/12/2025
Last modified:
02:50:47 07/04/2024
MD5 hash:
1a75ea6c2e0cc5b9263541dda62ab458
Filesize:
4.61 KB
suspicious functions used:
curl_exec (line:45);curl_exec (line:67); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: client-online-mbb.php-
Full path:
airmax/web/client-online-mbb.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:59 12/12/2025
Last modified:
02:50:46 07/04/2024
MD5 hash:
69c51efb5b9017a07a7158b4a63f3826
Filesize:
14.32 KB
suspicious functions used:
curl_exec (line:90); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive.php-
Full path:
airmax/web/cron_auto_inactive.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
06:00:02 12/12/2025
Last modified:
02:50:47 07/04/2024
MD5 hash:
7e0dc4dd9dae2bf0220516641b53c027
Filesize:
5.43 KB
suspicious functions used:
curl_exec (line:142); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive2.php-
Full path:
airmax/web/cron_auto_inactive2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:59 12/12/2025
Last modified:
02:50:47 07/04/2024
MD5 hash:
440bc24f05b01eb395df63fff2f60de9
Filesize:
5.46 KB
suspicious functions used:
curl_exec (line:142); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: company_info.php-
Full path:
airmax/web/company_info.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
22:23:05 11/12/2025
Last modified:
13:01:05 09/04/2024
MD5 hash:
b4101deea24a74c779fd0c3d495014b2
Filesize:
8 KB
suspicious functions used:
curl_exec (line:126); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
airmax/web/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:59 12/12/2025
Last modified:
02:50:47 07/04/2024
MD5 hash:
ba9747d0421fd091b998389469e72a0b
Filesize:
1.7 KB
suspicious functions used:
curl_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_all.php-
Full path:
airmax/web/cron_all.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:59 12/12/2025
Last modified:
02:50:47 07/04/2024
MD5 hash:
b19a08fef36584598cca299b7ecc5e6d
Filesize:
2.07 KB
suspicious functions used:
curl_exec (line:23);curl_exec (line:38);curl_exec (line:53); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_gen_bill.php-
Full path:
airmax/web/cron_auto_gen_bill.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:59 12/12/2025
Last modified:
02:50:47 07/04/2024
MD5 hash:
f1056618cc4402968e50d1232d2c51c8
Filesize:
4.73 KB
suspicious functions used:
curl_exec (line:140);curl_exec (line:149); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec.php-
Full path:
airmax/web/login_exec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
13:41:22 12/12/2025
Last modified:
02:50:48 07/04/2024
MD5 hash:
9038a77a32a5db2c9affae1496473f3e
Filesize:
5.27 KB
suspicious functions used:
curl_exec (line:62); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec1.php-
Full path:
airmax/web/login_exec1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:59 12/12/2025
Last modified:
02:50:48 07/04/2024
MD5 hash:
58e0da1ccc2585f2f6f687360dc9e503
Filesize:
3.91 KB
suspicious functions used:
curl_exec (line:53); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: loginexec.php-
Full path:
airmax/web/loginexec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:59 12/12/2025
Last modified:
02:50:48 07/04/2024
MD5 hash:
edb8017e7d0f8e037facbcacc94a383d
Filesize:
5.91 KB
suspicious functions used:
curl_exec (line:67); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: emp_salary_advence_find.php-
Full path:
airmax/web/emp_salary_advence_find.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:59 12/12/2025
Last modified:
02:50:47 07/04/2024
MD5 hash:
74a7e2ffda0f7584611d7cbce6136c24
Filesize:
2.25 KB
suspicious functions used:
`expanse` WHERE `type` = '2' AND `status` = '2' AND ex_by = '$e_id' AND MONTH(`, `) = MONTH('$lastmonth') AND YEAR(`, `) = YEAR('$lastmonth') GROUP BY ` (line:8);`e_id` = '$e_id' AND ` (line:12); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
airmax/web/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:59 12/12/2025
Last modified:
02:50:47 07/04/2024
MD5 hash:
c46a50905333286f45dfeacf010851ab
Filesize:
716 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-helper.php-
Full path:
airmax/web/nagad-helper.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:59 12/12/2025
Last modified:
02:50:48 07/04/2024
MD5 hash:
2bb70c44d68202e0a0cd8ae1388f0b1b
Filesize:
6.74 KB
suspicious functions used:
curl_exec (line:61);base64_decode (line:97); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-merchant-callback.php-
Full path:
airmax/web/nagad-merchant-callback.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:59 12/12/2025
Last modified:
02:50:48 07/04/2024
MD5 hash:
9e7ba60bacff8c3a7792176f76b698ea
Filesize:
16.91 KB
suspicious functions used:
curl_exec (line:20); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: support-action.php-
Full path:
airmax/web/support-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:59 12/12/2025
Last modified:
02:50:51 07/04/2024
MD5 hash:
f88ecf97f2a5d073332e9e7cea59ccb4
Filesize:
10.09 KB
suspicious functions used:
curl_exec (line:95); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index.php-
Full path:
airmax/web/index.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
17:23:03 12/12/2025
Last modified:
02:50:47 07/04/2024
MD5 hash:
e3825a19a349b906bdf657d3e0e0752d
Filesize:
11 KB
suspicious functions used:
base64_decode (line:10);curl_exec (line:178); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ip-ping-checker.php-
Full path:
airmax/web/ip-ping-checker.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:41:59 12/12/2025
Last modified:
02:50:48 07/04/2024
MD5 hash:
0d28f3053b73b3fe2885cf519ee17c12
Filesize:
2.64 KB
suspicious functions used:
curl_exec (line:81); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tagreeexpayment.php-
Full path:
airmax/web/tagreeexpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:00 12/12/2025
Last modified:
02:50:51 07/04/2024
MD5 hash:
029b4fba649a75c7c81d2f8931be8d63
Filesize:
2.86 KB
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreateagree.php-
Full path:
airmax/web/tcreateagree.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:00 12/12/2025
Last modified:
02:50:51 07/04/2024
MD5 hash:
27a10adf4190edc7eceee8cf74a6b72b
Filesize:
999 B
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreatepayment.php-
Full path:
airmax/web/tcreatepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:00 12/12/2025
Last modified:
02:50:51 07/04/2024
MD5 hash:
e49de9a33f5164bc2c6b88e4770faaff
Filesize:
1.07 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test2.php-
Full path:
airmax/web/test2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:00 12/12/2025
Last modified:
02:50:51 07/04/2024
MD5 hash:
b9ef5733c4f9b84398b99fb11c41719e
Filesize:
6.17 KB
suspicious functions used:
`` (line:96); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test3.php-
Full path:
airmax/web/test3.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:00 12/12/2025
Last modified:
02:50:51 07/04/2024
MD5 hash:
dc4ac1bf476364535cb25439b264003b
Filesize:
1.71 KB
suspicious functions used:
system (line:20);system (line:21);system (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test6.php-
Full path:
airmax/web/test6.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:00 12/12/2025
Last modified:
02:50:51 07/04/2024
MD5 hash:
b81f996d42a831491ce9a6f64735e159
Filesize:
906 B
suspicious functions used:
curl_exec (line:8); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: testttttt.php-
Full path:
airmax/web/testttttt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:00 12/12/2025
Last modified:
02:50:51 07/04/2024
MD5 hash:
b1988a4be29e191ad935fb409a4174ee
Filesize:
2 KB
suspicious functions used:
curl_exec (line:47); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: texecutepayment.php-
Full path:
airmax/web/texecutepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:00 12/12/2025
Last modified:
02:50:51 07/04/2024
MD5 hash:
623635fdf5c871391d3a5fe99ee8c543
Filesize:
2.91 KB
suspicious functions used:
curl_exec (line:24); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: time1.php-
Full path:
airmax/web/time1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:00 12/12/2025
Last modified:
02:50:51 07/04/2024
MD5 hash:
d01faecde155f90d6483809f888a7562
Filesize:
551 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tis-news.php-
Full path:
airmax/web/tis-news.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
15:22:16 12/12/2025
Last modified:
07:55:15 09/04/2024
MD5 hash:
ed23ca98b77c5321b4485e85eb2ea64d
Filesize:
3.67 KB
suspicious functions used:
curl_exec (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
airmax/web/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:00 12/12/2025
Last modified:
02:50:51 07/04/2024
MD5 hash:
7d8e71ceda3ffb74623e0c4a814715af
Filesize:
1.53 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tt.php-
Full path:
airmax/web/tt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:00 12/12/2025
Last modified:
02:50:51 07/04/2024
MD5 hash:
9c4ed141cb79fdc7e807b35923c91a20
Filesize:
1.56 KB
suspicious functions used:
curl_exec (line:30); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ttoken.php-
Full path:
airmax/web/ttoken.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:00 12/12/2025
Last modified:
02:50:51 07/04/2024
MD5 hash:
5f2c51c1db5b0defadfb67ce25c0098f
Filesize:
1.54 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook.php-
Full path:
airmax/web/webhook.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
03:57:46 12/12/2025
Last modified:
02:16:53 01/11/2024
MD5 hash:
26e2059a39281031d28874b51b52d60c
Filesize:
21.23 KB
suspicious functions used:
base64_decode (line:27);curl_exec (line:38);curl_exec (line:454); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook111.php-
Full path:
airmax/web/webhook111.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:00 12/12/2025
Last modified:
02:50:52 07/04/2024
MD5 hash:
22bcd30caceb03ee300f42e7587119fa
Filesize:
20.98 KB
suspicious functions used:
base64_decode (line:28);curl_exec (line:39);curl_exec (line:427); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook_cid.php-
Full path:
airmax/web/webhook_cid.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:00 12/12/2025
Last modified:
02:50:52 07/04/2024
MD5 hash:
007f8fa5636da9e44a38526298f7e155
Filesize:
21.08 KB
suspicious functions used:
base64_decode (line:28);curl_exec (line:39);curl_exec (line:429); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook_comid.php-
Full path:
airmax/web/webhook_comid.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:00 12/12/2025
Last modified:
02:50:52 07/04/2024
MD5 hash:
787511edcbdc9d6c9b26eba2dee70a84
Filesize:
21.21 KB
suspicious functions used:
base64_decode (line:27);curl_exec (line:38);curl_exec (line:454); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: AppSettings.php-
Full path:
ajwah/web/AppSettings.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:00 12/12/2025
Last modified:
09:52:04 06/03/2025
MD5 hash:
7ed349c4b0217e5395c4cc9295f66f4a
Filesize:
123.71 KB
suspicious functions used:
`input[name="${inputName}"]:checked` (line:2066); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: AutoActiveClientsCount1.php-
Full path:
ajwah/web/AutoActiveClientsCount1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
13:07:34 12/12/2025
Last modified:
09:52:04 06/03/2025
MD5 hash:
3b3b6186ff2d9c5abd1772e5aa02ee33
Filesize:
6.4 KB
suspicious functions used:
system (line:58); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: AutoActiveClientsCount11.php-
Full path:
ajwah/web/AutoActiveClientsCount11.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:01 12/12/2025
Last modified:
09:52:04 06/03/2025
MD5 hash:
a0090e4a11dd59b955a6edd549b6ef2f
Filesize:
5.85 KB
suspicious functions used:
system (line:54); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: client-online-mbb.php-
Full path:
ajwah/web/client-online-mbb.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:02 12/12/2025
Last modified:
09:52:11 06/03/2025
MD5 hash:
e16c33ab6ddd7649ea56a7d5355365b6
Filesize:
16.46 KB
suspicious functions used:
curl_exec (line:90);curl_exec (line:289); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: clients-nots-action.php-
Full path:
ajwah/web/clients-nots-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
13:18:28 12/12/2025
Last modified:
09:52:15 06/03/2025
MD5 hash:
dff1bb495509427d098cb4588da553b9
Filesize:
5.89 KB
suspicious functions used:
curl_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients.php-
Full path:
ajwah/web/Clients.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
11:40:52 12/12/2025
Last modified:
10:26:47 06/03/2025
MD5 hash:
95c2c28384fd7b6a33afc844c109e785
Filesize:
209.92 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:878); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients1.php-
Full path:
ajwah/web/Clients1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:02 12/12/2025
Last modified:
09:52:18 06/03/2025
MD5 hash:
228d02141d96f75107f8cad1047b18de
Filesize:
208.78 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:844); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients2.php-
Full path:
ajwah/web/Clients2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:03 12/12/2025
Last modified:
09:52:19 06/03/2025
MD5 hash:
982d6411552113b0715fd17c26f50292
Filesize:
205.13 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:832); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients3.php-
Full path:
ajwah/web/Clients3.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:03 12/12/2025
Last modified:
09:52:20 06/03/2025
MD5 hash:
50ddc869b383ab76e009c7a2c17c99a3
Filesize:
175.31 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:832); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ClientsOnMap.php-
Full path:
ajwah/web/ClientsOnMap.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:04 12/12/2025
Last modified:
06:02:55 10/11/2025
MD5 hash:
64ef22e5741bcb6332ba80d27017ca49
Filesize:
11.5 KB
suspicious functions used:
`${totalonline}` (line:98);`${totaloffline}` (line:99);`${results.rxPower}` (line:232);`${results.distance}` (line:233);`${results.supplyVoltage}` (line:234);`${results.temperature}` (line:235);`${results.txPower}` (line:236); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ClientView.php-
Full path:
ajwah/web/ClientView.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
16:53:23 12/12/2025
Last modified:
09:52:25 06/03/2025
MD5 hash:
ecd7171b944880ac4539623626dbf9d2
Filesize:
111.69 KB
suspicious functions used:
`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:227); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ClientView1.php-
Full path:
ajwah/web/ClientView1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:04 12/12/2025
Last modified:
09:52:25 06/03/2025
MD5 hash:
ecd7171b944880ac4539623626dbf9d2
Filesize:
111.69 KB
suspicious functions used:
`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:227); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: company_info.php-
Full path:
ajwah/web/company_info.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:50:51 11/12/2025
Last modified:
09:52:26 06/03/2025
MD5 hash:
2983755d925ee3aa49accefa47451c7d
Filesize:
8.62 KB
suspicious functions used:
curl_exec (line:134); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
ajwah/web/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:04 12/12/2025
Last modified:
09:52:26 06/03/2025
MD5 hash:
ba9747d0421fd091b998389469e72a0b
Filesize:
1.7 KB
suspicious functions used:
curl_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_all.php-
Full path:
ajwah/web/cron_all.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:04 12/12/2025
Last modified:
09:52:26 06/03/2025
MD5 hash:
967f1d654ae891609da26b9e0fdbd1ae
Filesize:
2.44 KB
suspicious functions used:
curl_exec (line:23);curl_exec (line:38);curl_exec (line:53); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_gen_bill.php-
Full path:
ajwah/web/cron_auto_gen_bill.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:04 12/12/2025
Last modified:
09:52:26 06/03/2025
MD5 hash:
f1056618cc4402968e50d1232d2c51c8
Filesize:
4.73 KB
suspicious functions used:
curl_exec (line:140);curl_exec (line:149); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive.php-
Full path:
ajwah/web/cron_auto_inactive.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:04 12/12/2025
Last modified:
09:52:26 06/03/2025
MD5 hash:
7e0dc4dd9dae2bf0220516641b53c027
Filesize:
5.43 KB
suspicious functions used:
curl_exec (line:142); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive2.php-
Full path:
ajwah/web/cron_auto_inactive2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:04 12/12/2025
Last modified:
09:52:26 06/03/2025
MD5 hash:
440bc24f05b01eb395df63fff2f60de9
Filesize:
5.46 KB
suspicious functions used:
curl_exec (line:142); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive_termination.php-
Full path:
ajwah/web/cron_auto_inactive_termination.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
01:00:25 12/12/2025
Last modified:
09:52:26 06/03/2025
MD5 hash:
49f9f022b288eb3a85139ac8c1afb13c
Filesize:
12.23 KB
suspicious functions used:
curl_exec (line:219);curl_exec (line:231);curl_exec (line:273); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_termination_remainder1.php-
Full path:
ajwah/web/cron_auto_termination_remainder1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
03:06:48 12/12/2025
Last modified:
09:52:26 06/03/2025
MD5 hash:
7765f9f820dbd402f1064fab9958ffaa
Filesize:
3.26 KB
suspicious functions used:
curl_exec (line:83); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_client_bandwidth_count.php-
Full path:
ajwah/web/cron_client_bandwidth_count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
00:23:51 12/12/2025
Last modified:
09:52:26 06/03/2025
MD5 hash:
1c71a3dd097275429ae845a85ced0438
Filesize:
5.33 KB
suspicious functions used:
curl_exec (line:124);curl_exec (line:134); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_network.php-
Full path:
ajwah/web/cron_network.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
10:03:50 12/12/2025
Last modified:
09:52:26 06/03/2025
MD5 hash:
db096f353e80027593ca3f9781a21ac8
Filesize:
4.93 KB
suspicious functions used:
curl_exec (line:45);curl_exec (line:67);curl_exec (line:127); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_olt.php-
Full path:
ajwah/web/cron_olt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:16:02 12/12/2025
Last modified:
09:52:26 06/03/2025
MD5 hash:
5edf51db84e11e807af66733348efbf5
Filesize:
4.19 KB
suspicious functions used:
shell_exec (line:48);curl_exec (line:126); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_olt_clients_catch.php-
Full path:
ajwah/web/cron_olt_clients_catch.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:05 12/12/2025
Last modified:
09:52:26 06/03/2025
MD5 hash:
3b13c163ba3445b3d661c63adde1d985
Filesize:
1.12 KB
suspicious functions used:
curl_exec (line:23); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_olt_user.php-
Full path:
ajwah/web/cron_olt_user.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:05 12/12/2025
Last modified:
09:52:26 06/03/2025
MD5 hash:
67aa237639e3d1e6064e76079bb3cccc
Filesize:
1.97 KB
suspicious functions used:
curl_exec (line:19);curl_exec (line:46); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: EmployeeAdd.php-
Full path:
ajwah/web/EmployeeAdd.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:05 12/12/2025
Last modified:
09:52:27 06/03/2025
MD5 hash:
c12c85fa282eb15060ed68bad252f8e8
Filesize:
19.13 KB
suspicious functions used:
`Element with ID ${id} not found.` (line:36);`Non-numeric input detected in ${id}.` (line:38);`Element with ID ${id} not found.` (line:44);`Non-numeric input detected in ${id}.` (line:46); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: EmployeeEdit.php-
Full path:
ajwah/web/EmployeeEdit.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:05 12/12/2025
Last modified:
09:52:27 06/03/2025
MD5 hash:
55b4626339d566473f477e1a001dc8b4
Filesize:
17.73 KB
suspicious functions used:
`Element with ID ${id} not found.` (line:44);`Non-numeric input detected in ${id}.` (line:46);`Element with ID ${id} not found.` (line:52);`Non-numeric input detected in ${id}.` (line:54); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: emp_salary_advence_find.php-
Full path:
ajwah/web/emp_salary_advence_find.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:05 12/12/2025
Last modified:
09:52:27 06/03/2025
MD5 hash:
74a7e2ffda0f7584611d7cbce6136c24
Filesize:
2.25 KB
suspicious functions used:
`expanse` WHERE `type` = '2' AND `status` = '2' AND ex_by = '$e_id' AND MONTH(`, `) = MONTH('$lastmonth') AND YEAR(`, `) = YEAR('$lastmonth') GROUP BY ` (line:8);`e_id` = '$e_id' AND ` (line:12); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
ajwah/web/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:05 12/12/2025
Last modified:
09:52:27 06/03/2025
MD5 hash:
c46a50905333286f45dfeacf010851ab
Filesize:
716 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: getclientuptime.php-
Full path:
ajwah/web/getclientuptime.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:05 12/12/2025
Last modified:
09:52:30 06/03/2025
MD5 hash:
bbc14cdd451c72b94d78c7d2d1af0b52
Filesize:
718 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: imagevwr.php-
Full path:
ajwah/web/imagevwr.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
08:04:45 12/12/2025
Last modified:
09:52:30 06/03/2025
MD5 hash:
47a223a13cc642d01dcfaaca542d396d
Filesize:
915 B
suspicious functions used:
curl_exec (line:15); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index.php-
Full path:
ajwah/web/index.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:27:00 12/12/2025
Last modified:
09:52:30 06/03/2025
MD5 hash:
3d1fa8a053cd084d6bcbc24765a91739
Filesize:
16.67 KB
suspicious functions used:
curl_exec (line:298); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: InstrumentsStoreOutDetails.php-
Full path:
ajwah/web/InstrumentsStoreOutDetails.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:05 12/12/2025
Last modified:
09:52:30 06/03/2025
MD5 hash:
a60c19f766bfff1ccdccbeba6b39eb87
Filesize:
9.37 KB
suspicious functions used:
`update_date`, '%D-%b, %y') AS offdate, TIME_FORMAT(`update_time`, '%T') AS offtime FROM `con_sts_log` WHERE `c_id` = '{$row['c_id']}' AND con_sts = 'Inactive' ORDER BY ` (line:120); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ip-ping-checker.php-
Full path:
ajwah/web/ip-ping-checker.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:05 12/12/2025
Last modified:
09:52:31 06/03/2025
MD5 hash:
0d28f3053b73b3fe2885cf519ee17c12
Filesize:
2.64 KB
suspicious functions used:
curl_exec (line:81); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: LoginByPass.php-
Full path:
ajwah/web/LoginByPass.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:05 12/12/2025
Last modified:
09:52:32 06/03/2025
MD5 hash:
a8f1789daadb34b0814aaecddfebe7c1
Filesize:
4.26 KB
suspicious functions used:
curl_exec (line:41); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: loginexec.php-
Full path:
ajwah/web/loginexec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:05 12/12/2025
Last modified:
09:52:32 06/03/2025
MD5 hash:
edb8017e7d0f8e037facbcacc94a383d
Filesize:
5.91 KB
suspicious functions used:
curl_exec (line:67); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec.php-
Full path:
ajwah/web/login_exec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
05:52:46 12/12/2025
Last modified:
14:50:38 12/03/2025
MD5 hash:
52c9e33276b889bbe1bd665c754a5860
Filesize:
12.1 KB
suspicious functions used:
curl_exec (line:24);curl_exec (line:74);curl_exec (line:199);curl_exec (line:239); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: macreseller-news.php-
Full path:
ajwah/web/macreseller-news.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:05 12/12/2025
Last modified:
09:52:33 06/03/2025
MD5 hash:
ed23ca98b77c5321b4485e85eb2ea64d
Filesize:
3.67 KB
suspicious functions used:
curl_exec (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: MacResellerAdd.php-
Full path:
ajwah/web/MacResellerAdd.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:06 12/12/2025
Last modified:
09:52:35 06/03/2025
MD5 hash:
5ac506fcafb554fb6326382737dce0df
Filesize:
29.89 KB
suspicious functions used:
`input[name="${inputName}"]:checked` (line:792); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: MacResellerEdit.php-
Full path:
ajwah/web/MacResellerEdit.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:06 12/12/2025
Last modified:
09:52:36 06/03/2025
MD5 hash:
60b4a4eac6e169f1bce50574c472cd2a
Filesize:
37.16 KB
suspicious functions used:
`input[name="${inputName}"]:checked` (line:634); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-helper.php-
Full path:
ajwah/web/nagad-helper.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:06 12/12/2025
Last modified:
09:52:38 06/03/2025
MD5 hash:
114b90b978b842cd318391876ba454ab
Filesize:
2.84 KB
suspicious functions used:
curl_exec (line:46);base64_decode (line:77); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-merchant-callback.php-
Full path:
ajwah/web/nagad-merchant-callback.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:06 12/12/2025
Last modified:
09:52:38 06/03/2025
MD5 hash:
b0ec1f203cb16bb39dc0dc5c587982ce
Filesize:
16.47 KB
suspicious functions used:
curl_exec (line:20); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-olt-all-mac-array.php-
Full path:
ajwah/web/netowrk-olt-all-mac-array.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:06 12/12/2025
Last modified:
09:52:38 06/03/2025
MD5 hash:
b0168ce99145e2afe64357247d750dd6
Filesize:
4.62 KB
suspicious functions used:
shell_exec (line:33);shell_exec (line:47);shell_exec (line:61);shell_exec (line:76);shell_exec (line:93); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-snmp-data-auto.php-
Full path:
ajwah/web/netowrk-snmp-data-auto.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:06 12/12/2025
Last modified:
09:52:38 06/03/2025
MD5 hash:
81e2685cc9d5a33d54a0764a0488b848
Filesize:
7.24 KB
suspicious functions used:
shell_exec (line:67);shell_exec (line:117); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-snmp-data.php-
Full path:
ajwah/web/netowrk-snmp-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:06 12/12/2025
Last modified:
09:52:38 06/03/2025
MD5 hash:
4d7f14139fba095fdbc348dce9136690
Filesize:
24.67 KB
suspicious functions used:
shell_exec (line:103);shell_exec (line:112);shell_exec (line:122);shell_exec (line:141);shell_exec (line:153);shell_exec (line:164);shell_exec (line:180);shell_exec (line:190);shell_exec (line:206);shell_exec (line:226);shell_exec (line:235);shell_exec (line:243);shell_exec (line:250);shell_exec (line:255);`pon_name` FROM `olt_pon` WHERE `olt_pon_id` = '$pon_id' AND ` (line:262);shell_exec (line:279);shell_exec (line:289);`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:302);shell_exec (line:308);shell_exec (line:440); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-old-onu-rx-map.php-
Full path:
ajwah/web/network-old-onu-rx-map.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:06 12/12/2025
Last modified:
09:52:38 06/03/2025
MD5 hash:
b4962c160c5ad68ccd8eed9c48d82a0f
Filesize:
6.94 KB
suspicious functions used:
shell_exec (line:76); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-old-onu-rx.php-
Full path:
ajwah/web/network-old-onu-rx.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:06 12/12/2025
Last modified:
09:52:38 06/03/2025
MD5 hash:
59ed3318f07d2280f47e67f3c2f2c935
Filesize:
7.35 KB
suspicious functions used:
shell_exec (line:85); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-count-cdata.php-
Full path:
ajwah/web/network-olt-client-onu-mac-count-cdata.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:06 12/12/2025
Last modified:
09:52:38 06/03/2025
MD5 hash:
c378dbabf36066c335cfb8838a6e167d
Filesize:
4.58 KB
suspicious functions used:
shell_exec (line:25);shell_exec (line:35);shell_exec (line:56);shell_exec (line:103);shell_exec (line:115);shell_exec (line:126);shell_exec (line:140); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-count-rcl.php-
Full path:
ajwah/web/network-olt-client-onu-mac-count-rcl.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:06 12/12/2025
Last modified:
09:52:38 06/03/2025
MD5 hash:
155290201f4342ad1f835e1411ef3e31
Filesize:
4.55 KB
suspicious functions used:
shell_exec (line:25);shell_exec (line:35);shell_exec (line:56);shell_exec (line:103);shell_exec (line:115);shell_exec (line:126);shell_exec (line:140); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-count.php-
Full path:
ajwah/web/network-olt-client-onu-mac-count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:06 12/12/2025
Last modified:
09:52:39 06/03/2025
MD5 hash:
22f7c5b1545279d2a65caf57b3cb5c5a
Filesize:
15.3 KB
suspicious functions used:
shell_exec (line:26);shell_exec (line:36);shell_exec (line:68);shell_exec (line:84);shell_exec (line:101);shell_exec (line:119);shell_exec (line:135);shell_exec (line:176);shell_exec (line:236);shell_exec (line:312);shell_exec (line:379);shell_exec (line:469);shell_exec (line:488);shell_exec (line:507); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-countt.php-
Full path:
ajwah/web/network-olt-client-onu-mac-countt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:06 12/12/2025
Last modified:
09:52:39 06/03/2025
MD5 hash:
d29b4e72c375f528b769bd3894f9f0e7
Filesize:
8.95 KB
suspicious functions used:
shell_exec (line:26);shell_exec (line:36);shell_exec (line:59);shell_exec (line:75);shell_exec (line:92);shell_exec (line:102);shell_exec (line:117);shell_exec (line:155);shell_exec (line:206);shell_exec (line:262);shell_exec (line:275);shell_exec (line:288); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-con-sts.php-
Full path:
ajwah/web/network-olt-con-sts.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:06 12/12/2025
Last modified:
09:52:39 06/03/2025
MD5 hash:
a26b0a1c1567c34c9aa5e2e0254ff8a6
Filesize:
4 KB
suspicious functions used:
`olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:10);shell_exec (line:38);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, `last_synced`, `last_update`, `msg`, `full_msg`, ROUND((SELECT AVG(value) FROM olt_onu_history WHERE alarm_id = '$alarmId' AND value != ''), 2) AS average_value FROM `, ` WHERE `alarm_id` = '$alarmId' AND ` (line:82); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-load.php-
Full path:
ajwah/web/network-olt-load.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:06 12/12/2025
Last modified:
09:52:39 06/03/2025
MD5 hash:
f49d5153285c639ed91d4e806685ee56
Filesize:
1.33 KB
suspicious functions used:
shell_exec (line:22);shell_exec (line:25); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-oid-check.php-
Full path:
ajwah/web/network-olt-oid-check.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:06 12/12/2025
Last modified:
09:52:39 06/03/2025
MD5 hash:
5b7dc0ce1103fbfc895873c250b63141
Filesize:
1.88 KB
suspicious functions used:
shell_exec (line:33); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-alarm-add.php-
Full path:
ajwah/web/network-olt-onu-alarm-add.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:06 12/12/2025
Last modified:
09:52:39 06/03/2025
MD5 hash:
be6ba82c658419e1454f778e20e2d4c3
Filesize:
7.86 KB
suspicious functions used:
shell_exec (line:103); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-count.php-
Full path:
ajwah/web/network-olt-onu-count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:06 12/12/2025
Last modified:
09:52:39 06/03/2025
MD5 hash:
6dc4bf46ac59065c0e0e7e3510aaf4d2
Filesize:
7.05 KB
suspicious functions used:
`olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:12);shell_exec (line:81); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-list-data.php-
Full path:
ajwah/web/network-olt-onu-list-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:06 12/12/2025
Last modified:
09:52:39 06/03/2025
MD5 hash:
54cc9417c766c31317311c3722ce7d4b
Filesize:
9.48 KB
suspicious functions used:
shell_exec (line:24);shell_exec (line:38);shell_exec (line:64);shell_exec (line:85);shell_exec (line:104);shell_exec (line:125);shell_exec (line:143);shell_exec (line:153);shell_exec (line:165);shell_exec (line:185); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-power.php-
Full path:
ajwah/web/network-olt-onu-power.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:06 12/12/2025
Last modified:
09:52:39 06/03/2025
MD5 hash:
2e064543b67b532bdf4e5b12d49c5052
Filesize:
7.54 KB
suspicious functions used:
shell_exec (line:97); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-clients-search.php-
Full path:
ajwah/web/network-olt-pon-clients-search.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:06 12/12/2025
Last modified:
09:52:39 06/03/2025
MD5 hash:
79d26fc66abdab6f173330588aa8b238
Filesize:
10.93 KB
suspicious functions used:
shell_exec (line:42);shell_exec (line:51);shell_exec (line:104);shell_exec (line:168); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search-bdcom.php-
Full path:
ajwah/web/network-olt-pon-onu-search-bdcom.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:06 12/12/2025
Last modified:
09:52:39 06/03/2025
MD5 hash:
c786fa8b69268c738b6ff976631798cd
Filesize:
27.74 KB
suspicious functions used:
shell_exec (line:60);shell_exec (line:69);shell_exec (line:383); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search-bdcom1.php-
Full path:
ajwah/web/network-olt-pon-onu-search-bdcom1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:06 12/12/2025
Last modified:
09:52:39 06/03/2025
MD5 hash:
dd18677b1dcbf7f0bce2ac6912d98da0
Filesize:
9.6 KB
suspicious functions used:
shell_exec (line:42);shell_exec (line:51);shell_exec (line:129); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search-rcl.php-
Full path:
ajwah/web/network-olt-pon-onu-search-rcl.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:06 12/12/2025
Last modified:
09:52:39 06/03/2025
MD5 hash:
565ff38d572bba4bc20721ab17484554
Filesize:
27.33 KB
suspicious functions used:
shell_exec (line:46);shell_exec (line:55);shell_exec (line:369); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search.php-
Full path:
ajwah/web/network-olt-pon-onu-search.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:06 12/12/2025
Last modified:
09:52:40 06/03/2025
MD5 hash:
dc183ecf77d0e1f56f672338fd09cfa5
Filesize:
21.62 KB
suspicious functions used:
shell_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data-bdcom.php-
Full path:
ajwah/web/network-snmp-onu-status-data-bdcom.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:06 12/12/2025
Last modified:
02:00:25 07/03/2025
MD5 hash:
97bdd52a7c2adee8fba0a4f7165605d0
Filesize:
23.35 KB
suspicious functions used:
shell_exec (line:48);shell_exec (line:73);shell_exec (line:85);shell_exec (line:103);shell_exec (line:116);shell_exec (line:128);shell_exec (line:134);shell_exec (line:159);shell_exec (line:172);shell_exec (line:184);shell_exec (line:190);shell_exec (line:217);shell_exec (line:230);shell_exec (line:236); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data.php-
Full path:
ajwah/web/network-snmp-onu-status-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:07 12/12/2025
Last modified:
09:52:40 06/03/2025
MD5 hash:
0adfee384bf349b50f11036947fd2a74
Filesize:
30.37 KB
suspicious functions used:
shell_exec (line:38);`olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:42);shell_exec (line:81);shell_exec (line:95);shell_exec (line:109);shell_exec (line:122);shell_exec (line:208);shell_exec (line:429);shell_exec (line:441);shell_exec (line:448); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data1.php-
Full path:
ajwah/web/network-snmp-onu-status-data1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:07 12/12/2025
Last modified:
09:52:40 06/03/2025
MD5 hash:
920bd1a592c36f7a1194b737642f8340
Filesize:
15.96 KB
suspicious functions used:
shell_exec (line:33);`olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:37);shell_exec (line:149); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data_vsol2.php-
Full path:
ajwah/web/network-snmp-onu-status-data_vsol2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:07 12/12/2025
Last modified:
09:52:40 06/03/2025
MD5 hash:
f22d022ddc284f4d8e1de3660da91db8
Filesize:
15.61 KB
suspicious functions used:
shell_exec (line:34);shell_exec (line:113);shell_exec (line:126);shell_exec (line:132); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-tree-vartual-nodes.php-
Full path:
ajwah/web/network-tree-vartual-nodes.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:07 12/12/2025
Last modified:
09:52:41 06/03/2025
MD5 hash:
3530b8bc3113544014b1746ecd67e834
Filesize:
10.64 KB
suspicious functions used:
shell_exec (line:76);shell_exec (line:111);shell_exec (line:145);shell_exec (line:181);shell_exec (line:188); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Network.php-
Full path:
ajwah/web/Network.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
08:42:37 12/12/2025
Last modified:
01:21:17 07/03/2025
MD5 hash:
2691f8988dee1a9fc89f0738b9f0b62f
Filesize:
64.28 KB
suspicious functions used:
system (line:370);shell_exec (line:653); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Network1.php-
Full path:
ajwah/web/Network1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:07 12/12/2025
Last modified:
09:52:41 06/03/2025
MD5 hash:
c72cb4810d5c70edd9da26884beba751
Filesize:
66.22 KB
suspicious functions used:
system (line:375);shell_exec (line:661); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkLoad.php-
Full path:
ajwah/web/NetworkLoad.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:07 12/12/2025
Last modified:
09:52:43 06/03/2025
MD5 hash:
e1632e66ee1b7394d3fb82751b924abe
Filesize:
2.83 KB
suspicious functions used:
system (line:81); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkLoad1.php-
Full path:
ajwah/web/NetworkLoad1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:07 12/12/2025
Last modified:
09:52:43 06/03/2025
MD5 hash:
176bd6931be34d7ef351d22897accc65
Filesize:
759 B
suspicious functions used:
system (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltOnuStatus.php-
Full path:
ajwah/web/NetworkOltOnuStatus.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:07 12/12/2025
Last modified:
09:52:44 06/03/2025
MD5 hash:
31f74ac18fe0f3b0bec3b0d00b2556d5
Filesize:
70.53 KB
suspicious functions used:
shell_exec (line:42);shell_exec (line:102);shell_exec (line:673);shell_exec (line:786);shell_exec (line:896);shell_exec (line:1006); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltOnuStatus2.php-
Full path:
ajwah/web/NetworkOltOnuStatus2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:07 12/12/2025
Last modified:
09:52:44 06/03/2025
MD5 hash:
c9a14797fa4353d05bbd9427b6079250
Filesize:
15.88 KB
suspicious functions used:
shell_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltSense.php-
Full path:
ajwah/web/NetworkOltSense.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:07 12/12/2025
Last modified:
09:52:44 06/03/2025
MD5 hash:
2be664ae5006367f629ca437a6d507f8
Filesize:
18.26 KB
suspicious functions used:
`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, `last_synced`, `last_update`, `msg`, `full_msg`, ROUND((SELECT AVG(value) FROM olt_onu_history WHERE alarm_id = '$alarmId' AND value != ''), 2) AS average_value FROM `, ` WHERE `alarm_id` = '$alarmId' AND ` (line:123); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltSenseDetails.php-
Full path:
ajwah/web/NetworkOltSenseDetails.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:07 12/12/2025
Last modified:
09:52:44 06/03/2025
MD5 hash:
440096c601fc10b819a1f0f8330928b0
Filesize:
14.17 KB
suspicious functions used:
`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:33);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:42);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:51);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:60); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltSync.php-
Full path:
ajwah/web/NetworkOltSync.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:07 12/12/2025
Last modified:
09:52:44 06/03/2025
MD5 hash:
06633d4b65a14d677358170dd0a84424
Filesize:
1.87 KB
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree-olt-onu-list-data.php-
Full path:
ajwah/web/networktree-olt-onu-list-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:07 12/12/2025
Last modified:
09:52:45 06/03/2025
MD5 hash:
af4221fefa9c9051846a063ac4135560
Filesize:
8.72 KB
suspicious functions used:
shell_exec (line:24);shell_exec (line:36);shell_exec (line:59);shell_exec (line:78);shell_exec (line:97);shell_exec (line:116);shell_exec (line:134);shell_exec (line:143);shell_exec (line:155);shell_exec (line:175); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeAddSave.php-
Full path:
ajwah/web/NetworkTreeAddSave.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:07 12/12/2025
Last modified:
09:52:46 06/03/2025
MD5 hash:
93fdf1213fdb5d525641e2b625f1a91b
Filesize:
7.61 KB
suspicious functions used:
`network_tree` WHERE `olt_id` = '$olt_id' AND ` (line:107); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeEdit1.php-
Full path:
ajwah/web/NetworkTreeEdit1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:08 12/12/2025
Last modified:
09:52:48 06/03/2025
MD5 hash:
3396a6bdf9b5804bb208f38f37cc29a2
Filesize:
35.81 KB
suspicious functions used:
`olt_onu` WHERE olt_id = '$olt_id' AND ` (line:207); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeEditSave.php-
Full path:
ajwah/web/NetworkTreeEditSave.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:08 12/12/2025
Last modified:
09:52:48 06/03/2025
MD5 hash:
be82a23409ab88be3f57da95f8805d6c
Filesize:
12.83 KB
suspicious functions used:
`network_tree` WHERE `olt_id` = '$olt_id' AND ` (line:182); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeList.php-
Full path:
ajwah/web/NetworkTreeList.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:08 12/12/2025
Last modified:
09:52:48 06/03/2025
MD5 hash:
acd468021993faf8575531952ae107f8
Filesize:
21.98 KB
suspicious functions used:
`pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '{$row['olt_id']}' AND ` (line:287); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeMap.php-
Full path:
ajwah/web/NetworkTreeMap.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:08 12/12/2025
Last modified:
09:52:48 06/03/2025
MD5 hash:
893f2e3360b70dfbf4b65b4289eb1c58
Filesize:
24.46 KB
suspicious functions used:
`${results.rxPower}` (line:268);`${results.distance}` (line:269);`${results.supplyVoltage}` (line:270);`${results.temperature}` (line:271);`${results.txPower}` (line:272);`${results.rxPower}` (line:288);`${results.distance}` (line:289);`${results.supplyVoltage}` (line:290);`${results.temperature}` (line:291);`${results.txPower}` (line:292); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeMap1.php-
Full path:
ajwah/web/NetworkTreeMap1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:08 12/12/2025
Last modified:
09:52:48 06/03/2025
MD5 hash:
31a3ae9bc0bdb18726ed860ec6e8ec97
Filesize:
36.43 KB
suspicious functions used:
`networktree_marker_data.php?tree_id=${markerId}` (line:231);`${results.rxPower}` (line:311);`${results.distance}` (line:312);`${results.supplyVoltage}` (line:313);`${results.temperature}` (line:314);`${results.txPower}` (line:315); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_onu_list_add.php-
Full path:
ajwah/web/networktree_device_onu_list_add.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:08 12/12/2025
Last modified:
09:52:49 06/03/2025
MD5 hash:
ae5e1bd4b4619e068908177102626079
Filesize:
14.63 KB
suspicious functions used:
`network_tree` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND device_type = '5' AND ` (line:9);shell_exec (line:33);`network_tree` WHERE `onu_mac` = '$mac_address' AND ` (line:131);shell_exec (line:178);shell_exec (line:186);shell_exec (line:230);`network_tree` WHERE `onu_mac` = '$onuMac' AND ` (line:296); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_pon_check.php-
Full path:
ajwah/web/networktree_device_pon_check.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:08 12/12/2025
Last modified:
09:52:49 06/03/2025
MD5 hash:
708a93aadcae96ecf0aaca52041fcf38
Filesize:
1.53 KB
suspicious functions used:
`pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '$olt_id' AND ` (line:8); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_pon_list_add.php-
Full path:
ajwah/web/networktree_device_pon_list_add.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:08 12/12/2025
Last modified:
09:52:49 06/03/2025
MD5 hash:
2ec03912801e4749c2e9cd361417ca5f
Filesize:
1.36 KB
suspicious functions used:
`olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:6);`olt_pon` WHERE `olt_id` = '$olt_id' AND ` (line:10);`network_tree` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND ` (line:17); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_pon_port_onu_list.php-
Full path:
ajwah/web/networktree_device_pon_port_onu_list.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:08 12/12/2025
Last modified:
09:52:49 06/03/2025
MD5 hash:
9c63b3ac69996628f5eb2959a9eb4e15
Filesize:
8.65 KB
suspicious functions used:
`olt_pon` WHERE olt_id = '$olt_id' AND ` (line:25);shell_exec (line:32);shell_exec (line:45);`network_tree` WHERE onu_index_id = '$port_onu_index_id' AND ` (line:49);shell_exec (line:81);shell_exec (line:103);shell_exec (line:122);shell_exec (line:143);shell_exec (line:161);shell_exec (line:170);shell_exec (line:184); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_pon_port_sense_list.php-
Full path:
ajwah/web/networktree_device_pon_port_sense_list.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:08 12/12/2025
Last modified:
09:52:49 06/03/2025
MD5 hash:
ee69cd5cc122f8aa37d8d8e5c74def6b
Filesize:
3.65 KB
suspicious functions used:
`network_tree` WHERE `onu_mac` = '$onu_mac' AND ` (line:26);`network_tree` WHERE `c_id` = '{$dfhbdxf}' AND ` (line:71); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_type.php-
Full path:
ajwah/web/networktree_device_type.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:08 12/12/2025
Last modified:
09:52:49 06/03/2025
MD5 hash:
f1520732e5a3ef38564238a3278a1f63
Filesize:
11.43 KB
suspicious functions used:
`tree_id`) AS countolt FROM `network_tree` WHERE `olt_id` = '$olt_id_sure' AND ` (line:64); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: olt_all_onu_mac.php-
Full path:
ajwah/web/olt_all_onu_mac.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:08 12/12/2025
Last modified:
09:52:49 06/03/2025
MD5 hash:
bde00602b98fba3ce9f7669b0d6f0fa3
Filesize:
4.56 KB
suspicious functions used:
shell_exec (line:22);shell_exec (line:38);shell_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery.php-
Full path:
ajwah/web/PaymentOnlineQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:09 12/12/2025
Last modified:
09:52:56 06/03/2025
MD5 hash:
6a845f0e20c434c12eb30f42726f268d
Filesize:
28.37 KB
suspicious functions used:
curl_exec (line:457);curl_exec (line:669); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery2.php-
Full path:
ajwah/web/PaymentOnlineQuery2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:09 12/12/2025
Last modified:
09:52:56 06/03/2025
MD5 hash:
ccd315d11a60901b7b9029ff44f8351b
Filesize:
19.4 KB
suspicious functions used:
curl_exec (line:42);curl_exec (line:252); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentWebhook.php-
Full path:
ajwah/web/PaymentWebhook.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:09 12/12/2025
Last modified:
09:52:56 06/03/2025
MD5 hash:
a2f322c94787630ab1e0c8ca35fc5ba1
Filesize:
18.6 KB
suspicious functions used:
base64_decode (line:30);curl_exec (line:41);curl_exec (line:422); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SignUp1.php-
Full path:
ajwah/web/SignUp1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:10 12/12/2025
Last modified:
09:53:03 06/03/2025
MD5 hash:
3f7943dd155c8e0a383b7d02730f8c11
Filesize:
24.59 KB
suspicious functions used:
curl_exec (line:33);curl_exec (line:59); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: sms-balance-check.php-
Full path:
ajwah/web/sms-balance-check.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
13:07:34 12/12/2025
Last modified:
09:53:03 06/03/2025
MD5 hash:
c75f0373da76faa763dd32ea8b7ed085
Filesize:
825 B
suspicious functions used:
curl_exec (line:15); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMS.php-
Full path:
ajwah/web/SMS.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:10 12/12/2025
Last modified:
09:53:03 06/03/2025
MD5 hash:
25b5422d1cc92b4d2253417e72d9a658
Filesize:
37.37 KB
suspicious functions used:
curl_exec (line:56); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMS1.php-
Full path:
ajwah/web/SMS1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:10 12/12/2025
Last modified:
09:53:03 06/03/2025
MD5 hash:
e4671dadf9ad575671fd3609a60030da
Filesize:
32.19 KB
suspicious functions used:
curl_exec (line:59); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMSAddSave.php-
Full path:
ajwah/web/SMSAddSave.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:10 12/12/2025
Last modified:
09:53:04 06/03/2025
MD5 hash:
0d2d0548df5f32e69264c4f2f1b1f76e
Filesize:
2.12 KB
suspicious functions used:
curl_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: sms_deliverey_report.php-
Full path:
ajwah/web/sms_deliverey_report.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
03:06:48 12/12/2025
Last modified:
09:53:07 06/03/2025
MD5 hash:
03623943da7e9334e137b38c8577fc84
Filesize:
4.25 KB
suspicious functions used:
curl_exec (line:28);curl_exec (line:53);curl_exec (line:90); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: support-action.php-
Full path:
ajwah/web/support-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
04:57:39 12/12/2025
Last modified:
09:53:07 06/03/2025
MD5 hash:
58556808f93f52486b2ad06998142aa9
Filesize:
14.56 KB
suspicious functions used:
curl_exec (line:220); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tagreeexpayment.php-
Full path:
ajwah/web/tagreeexpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:11 12/12/2025
Last modified:
09:53:09 06/03/2025
MD5 hash:
029b4fba649a75c7c81d2f8931be8d63
Filesize:
2.86 KB
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreateagree.php-
Full path:
ajwah/web/tcreateagree.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:11 12/12/2025
Last modified:
09:53:09 06/03/2025
MD5 hash:
27a10adf4190edc7eceee8cf74a6b72b
Filesize:
999 B
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreatepayment.php-
Full path:
ajwah/web/tcreatepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:11 12/12/2025
Last modified:
09:53:09 06/03/2025
MD5 hash:
e49de9a33f5164bc2c6b88e4770faaff
Filesize:
1.07 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test2.php-
Full path:
ajwah/web/test2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:11 12/12/2025
Last modified:
09:53:09 06/03/2025
MD5 hash:
ab80d92ede21b7da59bfefb325484297
Filesize:
13.76 KB
suspicious functions used:
shell_exec (line:59);shell_exec (line:70);shell_exec (line:76);shell_exec (line:88);shell_exec (line:101);shell_exec (line:141);curl_exec (line:187);curl_exec (line:212);curl_exec (line:354); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test6.php-
Full path:
ajwah/web/test6.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:11 12/12/2025
Last modified:
09:53:09 06/03/2025
MD5 hash:
f22d022ddc284f4d8e1de3660da91db8
Filesize:
15.61 KB
suspicious functions used:
shell_exec (line:34);shell_exec (line:113);shell_exec (line:126);shell_exec (line:132); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test7.php-
Full path:
ajwah/web/test7.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:11 12/12/2025
Last modified:
09:53:09 06/03/2025
MD5 hash:
b11ccf951ce63a21ea0a7328316a0e5c
Filesize:
1.57 KB
suspicious functions used:
curl_exec (line:14); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test8.php-
Full path:
ajwah/web/test8.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:11 12/12/2025
Last modified:
09:53:09 06/03/2025
MD5 hash:
0da20f06359cae632ac4b808ab2eee77
Filesize:
3.65 KB
suspicious functions used:
shell_exec (line:48); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: testttttt.php-
Full path:
ajwah/web/testttttt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:11 12/12/2025
Last modified:
09:53:09 06/03/2025
MD5 hash:
b1988a4be29e191ad935fb409a4174ee
Filesize:
2 KB
suspicious functions used:
curl_exec (line:47); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: texecutepayment.php-
Full path:
ajwah/web/texecutepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:11 12/12/2025
Last modified:
09:53:09 06/03/2025
MD5 hash:
623635fdf5c871391d3a5fe99ee8c543
Filesize:
2.91 KB
suspicious functions used:
curl_exec (line:24); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tis-news.php-
Full path:
ajwah/web/tis-news.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
13:07:34 12/12/2025
Last modified:
09:53:09 06/03/2025
MD5 hash:
ed23ca98b77c5321b4485e85eb2ea64d
Filesize:
3.67 KB
suspicious functions used:
curl_exec (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
ajwah/web/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:11 12/12/2025
Last modified:
09:53:09 06/03/2025
MD5 hash:
7d8e71ceda3ffb74623e0c4a814715af
Filesize:
1.53 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tt.php-
Full path:
ajwah/web/tt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:11 12/12/2025
Last modified:
09:53:10 06/03/2025
MD5 hash:
9c4ed141cb79fdc7e807b35923c91a20
Filesize:
1.56 KB
suspicious functions used:
curl_exec (line:30); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ttoken.php-
Full path:
ajwah/web/ttoken.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:11 12/12/2025
Last modified:
09:53:10 06/03/2025
MD5 hash:
5f2c51c1db5b0defadfb67ce25c0098f
Filesize:
1.54 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: UserAccess.php-
Full path:
ajwah/web/UserAccess.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:11 12/12/2025
Last modified:
09:53:11 06/03/2025
MD5 hash:
69db4d4c504e7d0d4bed32eb8053b12f
Filesize:
10.4 KB
suspicious functions used:
`.modulecheckboxx[data-group="${group}"]` (line:158); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook.php-
Full path:
ajwah/web/webhook.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:11 12/12/2025
Last modified:
09:53:13 06/03/2025
MD5 hash:
69a88ae1be0ab3ab1c7c971c72c0b025
Filesize:
21.93 KB
suspicious functions used:
base64_decode (line:28);curl_exec (line:39);curl_exec (line:465); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook_cid.php-
Full path:
ajwah/web/webhook_cid.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:11 12/12/2025
Last modified:
09:53:13 06/03/2025
MD5 hash:
1a2672fc0dd81a9c831e3fa60ec860e1
Filesize:
21.52 KB
suspicious functions used:
base64_decode (line:29);curl_exec (line:40);curl_exec (line:439); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook_test.php-
Full path:
ajwah/web/webhook_test.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:11 12/12/2025
Last modified:
09:53:16 06/03/2025
MD5 hash:
74a7dcc262d7fe7f2bdc9e0595d03837
Filesize:
4.69 KB
suspicious functions used:
base64_decode (line:22);curl_exec (line:33);curl_exec (line:86);curl_exec (line:107); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: class.phpmailer.php-
Full path:
ajwah/web/email/class.phpmailer.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:12 12/12/2025
Last modified:
09:53:20 06/03/2025
MD5 hash:
68468d69b47fffecc89df57e27c5a781
Filesize:
143.32 KB
suspicious functions used:
`$DKIM_private` (line:428);popen (line:1387);popen (line:1408);base64_decode (line:3410);`$mail->set('SMTPSecure', 'tls');` (line:3688);`$mail->SMTPSecure = 'tls';` (line:3690); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: class.smtp.php-
Full path:
ajwah/web/email/class.smtp.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:12 12/12/2025
Last modified:
09:53:21 06/03/2025
MD5 hash:
aa8478329268e5438a4469c268337a10
Filesize:
41.44 KB
suspicious functions used:
base64_decode (line:513);base64_decode (line:533); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: jqgrid.php-
Full path:
ajwah/web/inc/jqgrid.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:13 12/12/2025
Last modified:
09:54:51 06/03/2025
MD5 hash:
71027a29e71e0626d8b57cbb631e6d98
Filesize:
23.92 KB
suspicious functions used:
eval (line:397); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: JSON.php-
Full path:
ajwah/web/inc/JSON.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:13 12/12/2025
Last modified:
09:54:51 06/03/2025
MD5 hash:
f5a34509e06231308becbe320ade9ff6
Filesize:
33.22 KB
suspicious functions used:
eval (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: smsapicore.php-
Full path:
ajwah/web/include/smsapicore.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
04:35:26 12/12/2025
Last modified:
09:54:52 06/03/2025
MD5 hash:
0494713963b7e9ead12abe06de2811a5
Filesize:
1.26 KB
suspicious functions used:
curl_exec (line:37); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: telegramapicore.php-
Full path:
ajwah/web/include/telegramapicore.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
16:44:54 12/12/2025
Last modified:
09:54:52 06/03/2025
MD5 hash:
511f56e6dfcf4e9e7a11259e023ca3ae
Filesize:
3.15 KB
suspicious functions used:
curl_exec (line:68); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ui.php-
Full path:
ajwah/web/js/tinymce/themes/advanced/skins/highcontrast/ui.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
16:58:37 12/12/2025
Last modified:
09:55:17 06/03/2025
MD5 hash:
3edaf67be8573b86686f46bbba4f058c
Filesize:
4.53 KB
suspicious functions used:
curl_exec (line:20);`bill_amount` = '0.00' WHERE bill_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY ` (line:53);`bill_amount` = '0.00', days = '0.00' WHERE entry_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY ` (line:54);`payment` WHERE `pay_date` < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND pay_amount != '0.00' ORDER BY ` (line:55);curl_exec (line:146);curl_exec (line:168); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Changes.txt-
Full path:
ajwah/web/js/jqgrid/js/Changes.txt
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:13 12/12/2025
Last modified:
09:55:07 06/03/2025
MD5 hash:
c0a4adbc3f1c6d592cb4fa8433fee9ea
Filesize:
44.32 KB
suspicious functions used:
system (line:87); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data-cdata.php-
Full path:
ajwah/web/network-snmp-onu-status-data-cdata.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:13 12/12/2025
Last modified:
16:56:03 06/03/2025
MD5 hash:
dbf50804352ccb95714869628862226e
Filesize:
16.27 KB
suspicious functions used:
shell_exec (line:42);shell_exec (line:58);shell_exec (line:64);shell_exec (line:69);shell_exec (line:73);`pon_name` FROM `olt_pon` WHERE `olt_pon_id` = '$ponn_id' AND ` (line:80);shell_exec (line:88); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltAddQuery2.php-
Full path:
ajwah/web/NetworkOltAddQuery2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:13 12/12/2025
Last modified:
18:01:07 09/10/2025
MD5 hash:
f2e8bbce7005fe948eab86e12f9e789f
Filesize:
7.96 KB
suspicious functions used:
shell_exec (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltAddQuery.php-
Full path:
ajwah/web/NetworkOltAddQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:13 12/12/2025
Last modified:
18:05:20 09/10/2025
MD5 hash:
319387a24eed76c775eb484388027f1e
Filesize:
7.98 KB
suspicious functions used:
shell_exec (line:21); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
ajwah/m/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:14 12/12/2025
Last modified:
09:51:44 06/03/2025
MD5 hash:
849185f307be30eafb1bbef93616d8c3
Filesize:
1.71 KB
suspicious functions used:
curl_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
ajwah/m/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:14 12/12/2025
Last modified:
09:51:44 06/03/2025
MD5 hash:
9a3f22521ad987e86f84c4f5f688d5b7
Filesize:
713 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index.php-
Full path:
ajwah/m/index.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
14:54:06 12/12/2025
Last modified:
09:51:45 06/03/2025
MD5 hash:
55a13ede9e1d70f42857e9a7baa75741
Filesize:
16.95 KB
suspicious functions used:
curl_exec (line:298); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index1.php-
Full path:
ajwah/m/index1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:14 12/12/2025
Last modified:
09:51:45 06/03/2025
MD5 hash:
dbd325386cd905b7a18b217dda2030f3
Filesize:
13.92 KB
suspicious functions used:
base64_decode (line:8);curl_exec (line:224); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index2.php-
Full path:
ajwah/m/index2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:14 12/12/2025
Last modified:
09:51:45 06/03/2025
MD5 hash:
41558736b037228ea93df03cae70eb87
Filesize:
4.31 KB
suspicious functions used:
curl_exec (line:70); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: LoginByPass.php-
Full path:
ajwah/m/LoginByPass.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:14 12/12/2025
Last modified:
09:51:45 06/03/2025
MD5 hash:
4deda2bef49c7e4552e5379c86858ddf
Filesize:
4.27 KB
suspicious functions used:
curl_exec (line:41); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec.php-
Full path:
ajwah/m/login_exec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
15:07:33 12/12/2025
Last modified:
09:51:45 06/03/2025
MD5 hash:
760b107af2f5d6194f97c20ba3ffb86b
Filesize:
11.63 KB
suspicious functions used:
curl_exec (line:24);curl_exec (line:80);curl_exec (line:227); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec1.php-
Full path:
ajwah/m/login_exec1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:14 12/12/2025
Last modified:
09:51:45 06/03/2025
MD5 hash:
b7a23f98b3d03b1ecc08218cf01b4aee
Filesize:
6.36 KB
suspicious functions used:
curl_exec (line:115); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec2.php-
Full path:
ajwah/m/login_exec2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:14 12/12/2025
Last modified:
09:51:45 06/03/2025
MD5 hash:
46b08782f51ba75b23e27183e06370fe
Filesize:
4.28 KB
suspicious functions used:
curl_exec (line:61); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-merchant-callback.php-
Full path:
ajwah/m/nagad-merchant-callback.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:14 12/12/2025
Last modified:
09:51:46 06/03/2025
MD5 hash:
89c5042f878e9b301a177823cf822c7e
Filesize:
11.32 KB
suspicious functions used:
curl_exec (line:20); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-snmp-data.php-
Full path:
ajwah/m/netowrk-snmp-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:14 12/12/2025
Last modified:
09:51:46 06/03/2025
MD5 hash:
75622375b3ee37723d953e8a83735ef7
Filesize:
23.92 KB
suspicious functions used:
shell_exec (line:96);shell_exec (line:105);shell_exec (line:115);shell_exec (line:134);shell_exec (line:146);shell_exec (line:157);shell_exec (line:173);shell_exec (line:183);shell_exec (line:199);shell_exec (line:219);shell_exec (line:229);shell_exec (line:234);shell_exec (line:242);shell_exec (line:262);shell_exec (line:278);`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:291);shell_exec (line:297);shell_exec (line:430); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery.php-
Full path:
ajwah/m/PaymentOnlineQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:14 12/12/2025
Last modified:
09:51:47 06/03/2025
MD5 hash:
6483645d440dd2f976cc1b29cb4021d5
Filesize:
20.95 KB
suspicious functions used:
curl_exec (line:287);curl_exec (line:492); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery2.php-
Full path:
ajwah/m/PaymentOnlineQuery2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:14 12/12/2025
Last modified:
09:51:47 06/03/2025
MD5 hash:
3660992067d5591fc79ce89d6dbb9274
Filesize:
19.08 KB
suspicious functions used:
curl_exec (line:41);curl_exec (line:254); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: support-action.php-
Full path:
ajwah/m/support-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:15 12/12/2025
Last modified:
09:51:48 06/03/2025
MD5 hash:
2fc6fd844db911a5502a7a6ae383990f
Filesize:
10.31 KB
suspicious functions used:
curl_exec (line:99); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tagreeexpayment.php-
Full path:
ajwah/m/tagreeexpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:15 12/12/2025
Last modified:
09:51:49 06/03/2025
MD5 hash:
c95e3ee881752db67b4f3597bc58430a
Filesize:
2.46 KB
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreateagree.php-
Full path:
ajwah/m/tcreateagree.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:15 12/12/2025
Last modified:
09:51:49 06/03/2025
MD5 hash:
27a10adf4190edc7eceee8cf74a6b72b
Filesize:
999 B
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreatepayment.php-
Full path:
ajwah/m/tcreatepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:15 12/12/2025
Last modified:
09:51:49 06/03/2025
MD5 hash:
e49de9a33f5164bc2c6b88e4770faaff
Filesize:
1.07 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: texecutepayment.php-
Full path:
ajwah/m/texecutepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:15 12/12/2025
Last modified:
09:51:49 06/03/2025
MD5 hash:
efbb63dfcfdacb52dec74bffc389bbb3
Filesize:
2.67 KB
suspicious functions used:
curl_exec (line:24); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
ajwah/m/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:15 12/12/2025
Last modified:
09:51:49 06/03/2025
MD5 hash:
7d8e71ceda3ffb74623e0c4a814715af
Filesize:
1.53 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ttoken.php-
Full path:
ajwah/m/ttoken.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:15 12/12/2025
Last modified:
09:51:49 06/03/2025
MD5 hash:
5f2c51c1db5b0defadfb67ce25c0098f
Filesize:
1.54 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: AppSettings.php-
Full path:
akbhanga/web/AppSettings.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:15 12/12/2025
Last modified:
05:13:42 06/03/2025
MD5 hash:
7ed349c4b0217e5395c4cc9295f66f4a
Filesize:
123.71 KB
suspicious functions used:
`input[name="${inputName}"]:checked` (line:2066); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: AutoActiveClientsCount1.php-
Full path:
akbhanga/web/AutoActiveClientsCount1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
14:35:32 12/12/2025
Last modified:
05:13:42 06/03/2025
MD5 hash:
3b3b6186ff2d9c5abd1772e5aa02ee33
Filesize:
6.4 KB
suspicious functions used:
system (line:58); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: AutoActiveClientsCount11.php-
Full path:
akbhanga/web/AutoActiveClientsCount11.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:16 12/12/2025
Last modified:
05:13:42 06/03/2025
MD5 hash:
a0090e4a11dd59b955a6edd549b6ef2f
Filesize:
5.85 KB
suspicious functions used:
system (line:54); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: client-online-mbb.php-
Full path:
akbhanga/web/client-online-mbb.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:17 12/12/2025
Last modified:
05:13:43 06/03/2025
MD5 hash:
e16c33ab6ddd7649ea56a7d5355365b6
Filesize:
16.46 KB
suspicious functions used:
curl_exec (line:90);curl_exec (line:289); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: clients-nots-action.php-
Full path:
akbhanga/web/clients-nots-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:17 12/12/2025
Last modified:
05:13:43 06/03/2025
MD5 hash:
dff1bb495509427d098cb4588da553b9
Filesize:
5.89 KB
suspicious functions used:
curl_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients.php-
Full path:
akbhanga/web/Clients.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
06:06:47 12/12/2025
Last modified:
10:28:27 06/03/2025
MD5 hash:
95c2c28384fd7b6a33afc844c109e785
Filesize:
209.92 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:878); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients1.php-
Full path:
akbhanga/web/Clients1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:18 12/12/2025
Last modified:
05:13:43 06/03/2025
MD5 hash:
228d02141d96f75107f8cad1047b18de
Filesize:
208.78 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:844); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients2.php-
Full path:
akbhanga/web/Clients2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:18 12/12/2025
Last modified:
05:13:43 06/03/2025
MD5 hash:
982d6411552113b0715fd17c26f50292
Filesize:
205.13 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:832); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients3.php-
Full path:
akbhanga/web/Clients3.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:18 12/12/2025
Last modified:
05:13:43 06/03/2025
MD5 hash:
50ddc869b383ab76e009c7a2c17c99a3
Filesize:
175.31 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:832); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ClientsOnMap.php-
Full path:
akbhanga/web/ClientsOnMap.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:19 12/12/2025
Last modified:
06:02:55 10/11/2025
MD5 hash:
64ef22e5741bcb6332ba80d27017ca49
Filesize:
11.5 KB
suspicious functions used:
`${totalonline}` (line:98);`${totaloffline}` (line:99);`${results.rxPower}` (line:232);`${results.distance}` (line:233);`${results.supplyVoltage}` (line:234);`${results.temperature}` (line:235);`${results.txPower}` (line:236); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ClientView.php-
Full path:
akbhanga/web/ClientView.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
04:47:59 12/12/2025
Last modified:
05:13:44 06/03/2025
MD5 hash:
ecd7171b944880ac4539623626dbf9d2
Filesize:
111.69 KB
suspicious functions used:
`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:227); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ClientView1.php-
Full path:
akbhanga/web/ClientView1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:19 12/12/2025
Last modified:
05:13:44 06/03/2025
MD5 hash:
ecd7171b944880ac4539623626dbf9d2
Filesize:
111.69 KB
suspicious functions used:
`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:227); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: company_info.php-
Full path:
akbhanga/web/company_info.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
15:22:38 12/12/2025
Last modified:
05:13:44 06/03/2025
MD5 hash:
2983755d925ee3aa49accefa47451c7d
Filesize:
8.62 KB
suspicious functions used:
curl_exec (line:134); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
akbhanga/web/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
05:24:24 12/12/2025
Last modified:
05:13:44 06/03/2025
MD5 hash:
ba9747d0421fd091b998389469e72a0b
Filesize:
1.7 KB
suspicious functions used:
curl_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_all.php-
Full path:
akbhanga/web/cron_all.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:20 12/12/2025
Last modified:
05:13:44 06/03/2025
MD5 hash:
967f1d654ae891609da26b9e0fdbd1ae
Filesize:
2.44 KB
suspicious functions used:
curl_exec (line:23);curl_exec (line:38);curl_exec (line:53); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_gen_bill.php-
Full path:
akbhanga/web/cron_auto_gen_bill.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:20 12/12/2025
Last modified:
05:13:44 06/03/2025
MD5 hash:
f1056618cc4402968e50d1232d2c51c8
Filesize:
4.73 KB
suspicious functions used:
curl_exec (line:140);curl_exec (line:149); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive.php-
Full path:
akbhanga/web/cron_auto_inactive.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
17:00:02 12/12/2025
Last modified:
05:13:44 06/03/2025
MD5 hash:
7e0dc4dd9dae2bf0220516641b53c027
Filesize:
5.43 KB
suspicious functions used:
curl_exec (line:142); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive2.php-
Full path:
akbhanga/web/cron_auto_inactive2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:20 12/12/2025
Last modified:
05:13:44 06/03/2025
MD5 hash:
440bc24f05b01eb395df63fff2f60de9
Filesize:
5.46 KB
suspicious functions used:
curl_exec (line:142); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive_termination.php-
Full path:
akbhanga/web/cron_auto_inactive_termination.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
00:45:15 12/12/2025
Last modified:
05:13:44 06/03/2025
MD5 hash:
49f9f022b288eb3a85139ac8c1afb13c
Filesize:
12.23 KB
suspicious functions used:
curl_exec (line:219);curl_exec (line:231);curl_exec (line:273); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_termination_remainder1.php-
Full path:
akbhanga/web/cron_auto_termination_remainder1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
03:06:13 12/12/2025
Last modified:
05:13:44 06/03/2025
MD5 hash:
7765f9f820dbd402f1064fab9958ffaa
Filesize:
3.26 KB
suspicious functions used:
curl_exec (line:83); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_client_bandwidth_count.php-
Full path:
akbhanga/web/cron_client_bandwidth_count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:13:33 12/12/2025
Last modified:
05:13:44 06/03/2025
MD5 hash:
1c71a3dd097275429ae845a85ced0438
Filesize:
5.33 KB
suspicious functions used:
curl_exec (line:124);curl_exec (line:134); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_network.php-
Full path:
akbhanga/web/cron_network.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
01:42:41 12/12/2025
Last modified:
05:13:44 06/03/2025
MD5 hash:
db096f353e80027593ca3f9781a21ac8
Filesize:
4.93 KB
suspicious functions used:
curl_exec (line:45);curl_exec (line:67);curl_exec (line:127); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_olt.php-
Full path:
akbhanga/web/cron_olt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
13:30:37 12/12/2025
Last modified:
05:13:44 06/03/2025
MD5 hash:
5edf51db84e11e807af66733348efbf5
Filesize:
4.19 KB
suspicious functions used:
shell_exec (line:48);curl_exec (line:126); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_olt_clients_catch.php-
Full path:
akbhanga/web/cron_olt_clients_catch.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:20 12/12/2025
Last modified:
05:13:44 06/03/2025
MD5 hash:
3b13c163ba3445b3d661c63adde1d985
Filesize:
1.12 KB
suspicious functions used:
curl_exec (line:23); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_olt_user.php-
Full path:
akbhanga/web/cron_olt_user.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:20 12/12/2025
Last modified:
05:13:44 06/03/2025
MD5 hash:
67aa237639e3d1e6064e76079bb3cccc
Filesize:
1.97 KB
suspicious functions used:
curl_exec (line:19);curl_exec (line:46); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: EmployeeAdd.php-
Full path:
akbhanga/web/EmployeeAdd.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:20 12/12/2025
Last modified:
05:13:45 06/03/2025
MD5 hash:
c12c85fa282eb15060ed68bad252f8e8
Filesize:
19.13 KB
suspicious functions used:
`Element with ID ${id} not found.` (line:36);`Non-numeric input detected in ${id}.` (line:38);`Element with ID ${id} not found.` (line:44);`Non-numeric input detected in ${id}.` (line:46); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: EmployeeEdit.php-
Full path:
akbhanga/web/EmployeeEdit.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:20 12/12/2025
Last modified:
05:13:45 06/03/2025
MD5 hash:
55b4626339d566473f477e1a001dc8b4
Filesize:
17.73 KB
suspicious functions used:
`Element with ID ${id} not found.` (line:44);`Non-numeric input detected in ${id}.` (line:46);`Element with ID ${id} not found.` (line:52);`Non-numeric input detected in ${id}.` (line:54); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: emp_salary_advence_find.php-
Full path:
akbhanga/web/emp_salary_advence_find.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:20 12/12/2025
Last modified:
05:13:45 06/03/2025
MD5 hash:
74a7e2ffda0f7584611d7cbce6136c24
Filesize:
2.25 KB
suspicious functions used:
`expanse` WHERE `type` = '2' AND `status` = '2' AND ex_by = '$e_id' AND MONTH(`, `) = MONTH('$lastmonth') AND YEAR(`, `) = YEAR('$lastmonth') GROUP BY ` (line:8);`e_id` = '$e_id' AND ` (line:12); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
akbhanga/web/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
15:00:19 12/12/2025
Last modified:
05:13:45 06/03/2025
MD5 hash:
c46a50905333286f45dfeacf010851ab
Filesize:
716 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: getclientuptime.php-
Full path:
akbhanga/web/getclientuptime.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:20 12/12/2025
Last modified:
05:13:46 06/03/2025
MD5 hash:
bbc14cdd451c72b94d78c7d2d1af0b52
Filesize:
718 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: imagevwr.php-
Full path:
akbhanga/web/imagevwr.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
11:26:13 12/12/2025
Last modified:
05:13:46 06/03/2025
MD5 hash:
47a223a13cc642d01dcfaaca542d396d
Filesize:
915 B
suspicious functions used:
curl_exec (line:15); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index.php-
Full path:
akbhanga/web/index.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:20 12/12/2025
Last modified:
05:13:46 06/03/2025
MD5 hash:
3d1fa8a053cd084d6bcbc24765a91739
Filesize:
16.67 KB
suspicious functions used:
curl_exec (line:298); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: InstrumentsStoreOutDetails.php-
Full path:
akbhanga/web/InstrumentsStoreOutDetails.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:20 12/12/2025
Last modified:
05:13:46 06/03/2025
MD5 hash:
a60c19f766bfff1ccdccbeba6b39eb87
Filesize:
9.37 KB
suspicious functions used:
`update_date`, '%D-%b, %y') AS offdate, TIME_FORMAT(`update_time`, '%T') AS offtime FROM `con_sts_log` WHERE `c_id` = '{$row['c_id']}' AND con_sts = 'Inactive' ORDER BY ` (line:120); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ip-ping-checker.php-
Full path:
akbhanga/web/ip-ping-checker.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:20 12/12/2025
Last modified:
05:13:46 06/03/2025
MD5 hash:
0d28f3053b73b3fe2885cf519ee17c12
Filesize:
2.64 KB
suspicious functions used:
curl_exec (line:81); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: LoginByPass.php-
Full path:
akbhanga/web/LoginByPass.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:20 12/12/2025
Last modified:
05:13:47 06/03/2025
MD5 hash:
a8f1789daadb34b0814aaecddfebe7c1
Filesize:
4.26 KB
suspicious functions used:
curl_exec (line:41); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: loginexec.php-
Full path:
akbhanga/web/loginexec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:20 12/12/2025
Last modified:
05:13:47 06/03/2025
MD5 hash:
edb8017e7d0f8e037facbcacc94a383d
Filesize:
5.91 KB
suspicious functions used:
curl_exec (line:67); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec.php-
Full path:
akbhanga/web/login_exec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
06:55:19 12/12/2025
Last modified:
14:50:37 12/03/2025
MD5 hash:
52c9e33276b889bbe1bd665c754a5860
Filesize:
12.1 KB
suspicious functions used:
curl_exec (line:24);curl_exec (line:74);curl_exec (line:199);curl_exec (line:239); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: macreseller-news.php-
Full path:
akbhanga/web/macreseller-news.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:20 12/12/2025
Last modified:
05:13:47 06/03/2025
MD5 hash:
ed23ca98b77c5321b4485e85eb2ea64d
Filesize:
3.67 KB
suspicious functions used:
curl_exec (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: MacResellerAdd.php-
Full path:
akbhanga/web/MacResellerAdd.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:21 12/12/2025
Last modified:
05:13:47 06/03/2025
MD5 hash:
5ac506fcafb554fb6326382737dce0df
Filesize:
29.89 KB
suspicious functions used:
`input[name="${inputName}"]:checked` (line:792); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: MacResellerEdit.php-
Full path:
akbhanga/web/MacResellerEdit.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:21 12/12/2025
Last modified:
05:13:48 06/03/2025
MD5 hash:
60b4a4eac6e169f1bce50574c472cd2a
Filesize:
37.16 KB
suspicious functions used:
`input[name="${inputName}"]:checked` (line:634); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-helper.php-
Full path:
akbhanga/web/nagad-helper.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:21 12/12/2025
Last modified:
05:13:48 06/03/2025
MD5 hash:
114b90b978b842cd318391876ba454ab
Filesize:
2.84 KB
suspicious functions used:
curl_exec (line:46);base64_decode (line:77); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-merchant-callback.php-
Full path:
akbhanga/web/nagad-merchant-callback.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:21 12/12/2025
Last modified:
05:13:48 06/03/2025
MD5 hash:
b0ec1f203cb16bb39dc0dc5c587982ce
Filesize:
16.47 KB
suspicious functions used:
curl_exec (line:20); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-olt-all-mac-array.php-
Full path:
akbhanga/web/netowrk-olt-all-mac-array.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:21 12/12/2025
Last modified:
05:13:48 06/03/2025
MD5 hash:
b0168ce99145e2afe64357247d750dd6
Filesize:
4.62 KB
suspicious functions used:
shell_exec (line:33);shell_exec (line:47);shell_exec (line:61);shell_exec (line:76);shell_exec (line:93); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-snmp-data-auto.php-
Full path:
akbhanga/web/netowrk-snmp-data-auto.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:21 12/12/2025
Last modified:
05:13:48 06/03/2025
MD5 hash:
81e2685cc9d5a33d54a0764a0488b848
Filesize:
7.24 KB
suspicious functions used:
shell_exec (line:67);shell_exec (line:117); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-snmp-data.php-
Full path:
akbhanga/web/netowrk-snmp-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
15:24:15 12/12/2025
Last modified:
05:13:48 06/03/2025
MD5 hash:
4d7f14139fba095fdbc348dce9136690
Filesize:
24.67 KB
suspicious functions used:
shell_exec (line:103);shell_exec (line:112);shell_exec (line:122);shell_exec (line:141);shell_exec (line:153);shell_exec (line:164);shell_exec (line:180);shell_exec (line:190);shell_exec (line:206);shell_exec (line:226);shell_exec (line:235);shell_exec (line:243);shell_exec (line:250);shell_exec (line:255);`pon_name` FROM `olt_pon` WHERE `olt_pon_id` = '$pon_id' AND ` (line:262);shell_exec (line:279);shell_exec (line:289);`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:302);shell_exec (line:308);shell_exec (line:440); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-old-onu-rx-map.php-
Full path:
akbhanga/web/network-old-onu-rx-map.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:21 12/12/2025
Last modified:
05:13:48 06/03/2025
MD5 hash:
b4962c160c5ad68ccd8eed9c48d82a0f
Filesize:
6.94 KB
suspicious functions used:
shell_exec (line:76); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-old-onu-rx.php-
Full path:
akbhanga/web/network-old-onu-rx.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:21 12/12/2025
Last modified:
05:13:48 06/03/2025
MD5 hash:
59ed3318f07d2280f47e67f3c2f2c935
Filesize:
7.35 KB
suspicious functions used:
shell_exec (line:85); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-count-cdata.php-
Full path:
akbhanga/web/network-olt-client-onu-mac-count-cdata.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:21 12/12/2025
Last modified:
05:13:48 06/03/2025
MD5 hash:
c378dbabf36066c335cfb8838a6e167d
Filesize:
4.58 KB
suspicious functions used:
shell_exec (line:25);shell_exec (line:35);shell_exec (line:56);shell_exec (line:103);shell_exec (line:115);shell_exec (line:126);shell_exec (line:140); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-count-rcl.php-
Full path:
akbhanga/web/network-olt-client-onu-mac-count-rcl.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:21 12/12/2025
Last modified:
05:13:48 06/03/2025
MD5 hash:
155290201f4342ad1f835e1411ef3e31
Filesize:
4.55 KB
suspicious functions used:
shell_exec (line:25);shell_exec (line:35);shell_exec (line:56);shell_exec (line:103);shell_exec (line:115);shell_exec (line:126);shell_exec (line:140); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-count.php-
Full path:
akbhanga/web/network-olt-client-onu-mac-count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:21 12/12/2025
Last modified:
05:13:49 06/03/2025
MD5 hash:
22f7c5b1545279d2a65caf57b3cb5c5a
Filesize:
15.3 KB
suspicious functions used:
shell_exec (line:26);shell_exec (line:36);shell_exec (line:68);shell_exec (line:84);shell_exec (line:101);shell_exec (line:119);shell_exec (line:135);shell_exec (line:176);shell_exec (line:236);shell_exec (line:312);shell_exec (line:379);shell_exec (line:469);shell_exec (line:488);shell_exec (line:507); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-countt.php-
Full path:
akbhanga/web/network-olt-client-onu-mac-countt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:21 12/12/2025
Last modified:
05:13:49 06/03/2025
MD5 hash:
d29b4e72c375f528b769bd3894f9f0e7
Filesize:
8.95 KB
suspicious functions used:
shell_exec (line:26);shell_exec (line:36);shell_exec (line:59);shell_exec (line:75);shell_exec (line:92);shell_exec (line:102);shell_exec (line:117);shell_exec (line:155);shell_exec (line:206);shell_exec (line:262);shell_exec (line:275);shell_exec (line:288); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-con-sts.php-
Full path:
akbhanga/web/network-olt-con-sts.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:21 12/12/2025
Last modified:
05:13:49 06/03/2025
MD5 hash:
a26b0a1c1567c34c9aa5e2e0254ff8a6
Filesize:
4 KB
suspicious functions used:
`olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:10);shell_exec (line:38);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, `last_synced`, `last_update`, `msg`, `full_msg`, ROUND((SELECT AVG(value) FROM olt_onu_history WHERE alarm_id = '$alarmId' AND value != ''), 2) AS average_value FROM `, ` WHERE `alarm_id` = '$alarmId' AND ` (line:82); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-load.php-
Full path:
akbhanga/web/network-olt-load.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:21 12/12/2025
Last modified:
05:13:49 06/03/2025
MD5 hash:
f49d5153285c639ed91d4e806685ee56
Filesize:
1.33 KB
suspicious functions used:
shell_exec (line:22);shell_exec (line:25); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-oid-check.php-
Full path:
akbhanga/web/network-olt-oid-check.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:21 12/12/2025
Last modified:
05:13:49 06/03/2025
MD5 hash:
5b7dc0ce1103fbfc895873c250b63141
Filesize:
1.88 KB
suspicious functions used:
shell_exec (line:33); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-alarm-add.php-
Full path:
akbhanga/web/network-olt-onu-alarm-add.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:21 12/12/2025
Last modified:
05:13:49 06/03/2025
MD5 hash:
be6ba82c658419e1454f778e20e2d4c3
Filesize:
7.86 KB
suspicious functions used:
shell_exec (line:103); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-count.php-
Full path:
akbhanga/web/network-olt-onu-count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:21 12/12/2025
Last modified:
05:13:49 06/03/2025
MD5 hash:
6dc4bf46ac59065c0e0e7e3510aaf4d2
Filesize:
7.05 KB
suspicious functions used:
`olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:12);shell_exec (line:81); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-list-data.php-
Full path:
akbhanga/web/network-olt-onu-list-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:21 12/12/2025
Last modified:
05:13:49 06/03/2025
MD5 hash:
54cc9417c766c31317311c3722ce7d4b
Filesize:
9.48 KB
suspicious functions used:
shell_exec (line:24);shell_exec (line:38);shell_exec (line:64);shell_exec (line:85);shell_exec (line:104);shell_exec (line:125);shell_exec (line:143);shell_exec (line:153);shell_exec (line:165);shell_exec (line:185); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-power.php-
Full path:
akbhanga/web/network-olt-onu-power.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:21 12/12/2025
Last modified:
05:13:49 06/03/2025
MD5 hash:
2e064543b67b532bdf4e5b12d49c5052
Filesize:
7.54 KB
suspicious functions used:
shell_exec (line:97); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-clients-search.php-
Full path:
akbhanga/web/network-olt-pon-clients-search.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:21 12/12/2025
Last modified:
05:13:49 06/03/2025
MD5 hash:
79d26fc66abdab6f173330588aa8b238
Filesize:
10.93 KB
suspicious functions used:
shell_exec (line:42);shell_exec (line:51);shell_exec (line:104);shell_exec (line:168); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search-bdcom.php-
Full path:
akbhanga/web/network-olt-pon-onu-search-bdcom.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:21 12/12/2025
Last modified:
05:13:49 06/03/2025
MD5 hash:
c786fa8b69268c738b6ff976631798cd
Filesize:
27.74 KB
suspicious functions used:
shell_exec (line:60);shell_exec (line:69);shell_exec (line:383); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search-bdcom1.php-
Full path:
akbhanga/web/network-olt-pon-onu-search-bdcom1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:22 12/12/2025
Last modified:
05:13:49 06/03/2025
MD5 hash:
dd18677b1dcbf7f0bce2ac6912d98da0
Filesize:
9.6 KB
suspicious functions used:
shell_exec (line:42);shell_exec (line:51);shell_exec (line:129); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search-rcl.php-
Full path:
akbhanga/web/network-olt-pon-onu-search-rcl.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:22 12/12/2025
Last modified:
05:13:49 06/03/2025
MD5 hash:
565ff38d572bba4bc20721ab17484554
Filesize:
27.33 KB
suspicious functions used:
shell_exec (line:46);shell_exec (line:55);shell_exec (line:369); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search.php-
Full path:
akbhanga/web/network-olt-pon-onu-search.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:22 12/12/2025
Last modified:
05:13:49 06/03/2025
MD5 hash:
dc183ecf77d0e1f56f672338fd09cfa5
Filesize:
21.62 KB
suspicious functions used:
shell_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data-bdcom.php-
Full path:
akbhanga/web/network-snmp-onu-status-data-bdcom.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:22 12/12/2025
Last modified:
02:20:46 07/03/2025
MD5 hash:
97bdd52a7c2adee8fba0a4f7165605d0
Filesize:
23.35 KB
suspicious functions used:
shell_exec (line:48);shell_exec (line:73);shell_exec (line:85);shell_exec (line:103);shell_exec (line:116);shell_exec (line:128);shell_exec (line:134);shell_exec (line:159);shell_exec (line:172);shell_exec (line:184);shell_exec (line:190);shell_exec (line:217);shell_exec (line:230);shell_exec (line:236); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data.php-
Full path:
akbhanga/web/network-snmp-onu-status-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:22 12/12/2025
Last modified:
05:13:49 06/03/2025
MD5 hash:
0adfee384bf349b50f11036947fd2a74
Filesize:
30.37 KB
suspicious functions used:
shell_exec (line:38);`olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:42);shell_exec (line:81);shell_exec (line:95);shell_exec (line:109);shell_exec (line:122);shell_exec (line:208);shell_exec (line:429);shell_exec (line:441);shell_exec (line:448); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data1.php-
Full path:
akbhanga/web/network-snmp-onu-status-data1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:22 12/12/2025
Last modified:
05:13:49 06/03/2025
MD5 hash:
920bd1a592c36f7a1194b737642f8340
Filesize:
15.96 KB
suspicious functions used:
shell_exec (line:33);`olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:37);shell_exec (line:149); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data_vsol2.php-
Full path:
akbhanga/web/network-snmp-onu-status-data_vsol2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:22 12/12/2025
Last modified:
05:13:49 06/03/2025
MD5 hash:
f22d022ddc284f4d8e1de3660da91db8
Filesize:
15.61 KB
suspicious functions used:
shell_exec (line:34);shell_exec (line:113);shell_exec (line:126);shell_exec (line:132); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-tree-vartual-nodes.php-
Full path:
akbhanga/web/network-tree-vartual-nodes.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:22 12/12/2025
Last modified:
05:13:49 06/03/2025
MD5 hash:
3530b8bc3113544014b1746ecd67e834
Filesize:
10.64 KB
suspicious functions used:
shell_exec (line:76);shell_exec (line:111);shell_exec (line:145);shell_exec (line:181);shell_exec (line:188); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Network.php-
Full path:
akbhanga/web/Network.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:22 12/12/2025
Last modified:
02:20:47 07/03/2025
MD5 hash:
2691f8988dee1a9fc89f0738b9f0b62f
Filesize:
64.28 KB
suspicious functions used:
system (line:370);shell_exec (line:653); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Network1.php-
Full path:
akbhanga/web/Network1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:22 12/12/2025
Last modified:
05:13:49 06/03/2025
MD5 hash:
c72cb4810d5c70edd9da26884beba751
Filesize:
66.22 KB
suspicious functions used:
system (line:375);shell_exec (line:661); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkLoad.php-
Full path:
akbhanga/web/NetworkLoad.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:22 12/12/2025
Last modified:
05:13:49 06/03/2025
MD5 hash:
e1632e66ee1b7394d3fb82751b924abe
Filesize:
2.83 KB
suspicious functions used:
system (line:81); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkLoad1.php-
Full path:
akbhanga/web/NetworkLoad1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:22 12/12/2025
Last modified:
05:13:49 06/03/2025
MD5 hash:
176bd6931be34d7ef351d22897accc65
Filesize:
759 B
suspicious functions used:
system (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltAddQuery.php-
Full path:
akbhanga/web/NetworkOltAddQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:22 12/12/2025
Last modified:
09:27:55 07/03/2025
MD5 hash:
364ecc96699a76cea445a021ed3b2b33
Filesize:
7.36 KB
suspicious functions used:
shell_exec (line:21); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltOnuStatus.php-
Full path:
akbhanga/web/NetworkOltOnuStatus.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:22 12/12/2025
Last modified:
05:13:50 06/03/2025
MD5 hash:
31f74ac18fe0f3b0bec3b0d00b2556d5
Filesize:
70.53 KB
suspicious functions used:
shell_exec (line:42);shell_exec (line:102);shell_exec (line:673);shell_exec (line:786);shell_exec (line:896);shell_exec (line:1006); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltOnuStatus2.php-
Full path:
akbhanga/web/NetworkOltOnuStatus2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:22 12/12/2025
Last modified:
05:13:50 06/03/2025
MD5 hash:
c9a14797fa4353d05bbd9427b6079250
Filesize:
15.88 KB
suspicious functions used:
shell_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltSense.php-
Full path:
akbhanga/web/NetworkOltSense.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:22 12/12/2025
Last modified:
05:13:50 06/03/2025
MD5 hash:
2be664ae5006367f629ca437a6d507f8
Filesize:
18.26 KB
suspicious functions used:
`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, `last_synced`, `last_update`, `msg`, `full_msg`, ROUND((SELECT AVG(value) FROM olt_onu_history WHERE alarm_id = '$alarmId' AND value != ''), 2) AS average_value FROM `, ` WHERE `alarm_id` = '$alarmId' AND ` (line:123); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltSenseDetails.php-
Full path:
akbhanga/web/NetworkOltSenseDetails.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:22 12/12/2025
Last modified:
05:13:50 06/03/2025
MD5 hash:
440096c601fc10b819a1f0f8330928b0
Filesize:
14.17 KB
suspicious functions used:
`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:33);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:42);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:51);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:60); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltSync.php-
Full path:
akbhanga/web/NetworkOltSync.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:22 12/12/2025
Last modified:
05:13:50 06/03/2025
MD5 hash:
06633d4b65a14d677358170dd0a84424
Filesize:
1.87 KB
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree-olt-onu-list-data.php-
Full path:
akbhanga/web/networktree-olt-onu-list-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:23 12/12/2025
Last modified:
05:13:50 06/03/2025
MD5 hash:
af4221fefa9c9051846a063ac4135560
Filesize:
8.72 KB
suspicious functions used:
shell_exec (line:24);shell_exec (line:36);shell_exec (line:59);shell_exec (line:78);shell_exec (line:97);shell_exec (line:116);shell_exec (line:134);shell_exec (line:143);shell_exec (line:155);shell_exec (line:175); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeAddSave.php-
Full path:
akbhanga/web/NetworkTreeAddSave.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:23 12/12/2025
Last modified:
05:13:50 06/03/2025
MD5 hash:
93fdf1213fdb5d525641e2b625f1a91b
Filesize:
7.61 KB
suspicious functions used:
`network_tree` WHERE `olt_id` = '$olt_id' AND ` (line:107); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeEdit1.php-
Full path:
akbhanga/web/NetworkTreeEdit1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:23 12/12/2025
Last modified:
05:13:50 06/03/2025
MD5 hash:
3396a6bdf9b5804bb208f38f37cc29a2
Filesize:
35.81 KB
suspicious functions used:
`olt_onu` WHERE olt_id = '$olt_id' AND ` (line:207); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeEditSave.php-
Full path:
akbhanga/web/NetworkTreeEditSave.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:23 12/12/2025
Last modified:
05:13:50 06/03/2025
MD5 hash:
be82a23409ab88be3f57da95f8805d6c
Filesize:
12.83 KB
suspicious functions used:
`network_tree` WHERE `olt_id` = '$olt_id' AND ` (line:182); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeList.php-
Full path:
akbhanga/web/NetworkTreeList.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:23 12/12/2025
Last modified:
05:13:50 06/03/2025
MD5 hash:
acd468021993faf8575531952ae107f8
Filesize:
21.98 KB
suspicious functions used:
`pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '{$row['olt_id']}' AND ` (line:287); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeMap.php-
Full path:
akbhanga/web/NetworkTreeMap.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:23 12/12/2025
Last modified:
05:13:50 06/03/2025
MD5 hash:
893f2e3360b70dfbf4b65b4289eb1c58
Filesize:
24.46 KB
suspicious functions used:
`${results.rxPower}` (line:268);`${results.distance}` (line:269);`${results.supplyVoltage}` (line:270);`${results.temperature}` (line:271);`${results.txPower}` (line:272);`${results.rxPower}` (line:288);`${results.distance}` (line:289);`${results.supplyVoltage}` (line:290);`${results.temperature}` (line:291);`${results.txPower}` (line:292); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeMap1.php-
Full path:
akbhanga/web/NetworkTreeMap1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:23 12/12/2025
Last modified:
05:13:50 06/03/2025
MD5 hash:
31a3ae9bc0bdb18726ed860ec6e8ec97
Filesize:
36.43 KB
suspicious functions used:
`networktree_marker_data.php?tree_id=${markerId}` (line:231);`${results.rxPower}` (line:311);`${results.distance}` (line:312);`${results.supplyVoltage}` (line:313);`${results.temperature}` (line:314);`${results.txPower}` (line:315); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_onu_list_add.php-
Full path:
akbhanga/web/networktree_device_onu_list_add.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:23 12/12/2025
Last modified:
05:13:50 06/03/2025
MD5 hash:
ae5e1bd4b4619e068908177102626079
Filesize:
14.63 KB
suspicious functions used:
`network_tree` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND device_type = '5' AND ` (line:9);shell_exec (line:33);`network_tree` WHERE `onu_mac` = '$mac_address' AND ` (line:131);shell_exec (line:178);shell_exec (line:186);shell_exec (line:230);`network_tree` WHERE `onu_mac` = '$onuMac' AND ` (line:296); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_pon_check.php-
Full path:
akbhanga/web/networktree_device_pon_check.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:23 12/12/2025
Last modified:
05:13:50 06/03/2025
MD5 hash:
708a93aadcae96ecf0aaca52041fcf38
Filesize:
1.53 KB
suspicious functions used:
`pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '$olt_id' AND ` (line:8); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_pon_list_add.php-
Full path:
akbhanga/web/networktree_device_pon_list_add.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:23 12/12/2025
Last modified:
05:13:50 06/03/2025
MD5 hash:
2ec03912801e4749c2e9cd361417ca5f
Filesize:
1.36 KB
suspicious functions used:
`olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:6);`olt_pon` WHERE `olt_id` = '$olt_id' AND ` (line:10);`network_tree` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND ` (line:17); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_pon_port_onu_list.php-
Full path:
akbhanga/web/networktree_device_pon_port_onu_list.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:23 12/12/2025
Last modified:
05:13:50 06/03/2025
MD5 hash:
9c63b3ac69996628f5eb2959a9eb4e15
Filesize:
8.65 KB
suspicious functions used:
`olt_pon` WHERE olt_id = '$olt_id' AND ` (line:25);shell_exec (line:32);shell_exec (line:45);`network_tree` WHERE onu_index_id = '$port_onu_index_id' AND ` (line:49);shell_exec (line:81);shell_exec (line:103);shell_exec (line:122);shell_exec (line:143);shell_exec (line:161);shell_exec (line:170);shell_exec (line:184); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_pon_port_sense_list.php-
Full path:
akbhanga/web/networktree_device_pon_port_sense_list.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:23 12/12/2025
Last modified:
05:13:50 06/03/2025
MD5 hash:
ee69cd5cc122f8aa37d8d8e5c74def6b
Filesize:
3.65 KB
suspicious functions used:
`network_tree` WHERE `onu_mac` = '$onu_mac' AND ` (line:26);`network_tree` WHERE `c_id` = '{$dfhbdxf}' AND ` (line:71); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_type.php-
Full path:
akbhanga/web/networktree_device_type.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:23 12/12/2025
Last modified:
05:13:50 06/03/2025
MD5 hash:
f1520732e5a3ef38564238a3278a1f63
Filesize:
11.43 KB
suspicious functions used:
`tree_id`) AS countolt FROM `network_tree` WHERE `olt_id` = '$olt_id_sure' AND ` (line:64); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: olt_all_onu_mac.php-
Full path:
akbhanga/web/olt_all_onu_mac.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:23 12/12/2025
Last modified:
05:13:51 06/03/2025
MD5 hash:
bde00602b98fba3ce9f7669b0d6f0fa3
Filesize:
4.56 KB
suspicious functions used:
shell_exec (line:22);shell_exec (line:38);shell_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery.php-
Full path:
akbhanga/web/PaymentOnlineQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
15:00:20 12/12/2025
Last modified:
05:13:52 06/03/2025
MD5 hash:
6a845f0e20c434c12eb30f42726f268d
Filesize:
28.37 KB
suspicious functions used:
curl_exec (line:457);curl_exec (line:669); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery2.php-
Full path:
akbhanga/web/PaymentOnlineQuery2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:24 12/12/2025
Last modified:
05:13:52 06/03/2025
MD5 hash:
ccd315d11a60901b7b9029ff44f8351b
Filesize:
19.4 KB
suspicious functions used:
curl_exec (line:42);curl_exec (line:252); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentWebhook.php-
Full path:
akbhanga/web/PaymentWebhook.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:24 12/12/2025
Last modified:
05:13:52 06/03/2025
MD5 hash:
a2f322c94787630ab1e0c8ca35fc5ba1
Filesize:
18.6 KB
suspicious functions used:
base64_decode (line:30);curl_exec (line:41);curl_exec (line:422); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SignUp1.php-
Full path:
akbhanga/web/SignUp1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:25 12/12/2025
Last modified:
05:13:54 06/03/2025
MD5 hash:
3f7943dd155c8e0a383b7d02730f8c11
Filesize:
24.59 KB
suspicious functions used:
curl_exec (line:33);curl_exec (line:59); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: sms-balance-check.php-
Full path:
akbhanga/web/sms-balance-check.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
11:42:59 12/12/2025
Last modified:
05:13:54 06/03/2025
MD5 hash:
c75f0373da76faa763dd32ea8b7ed085
Filesize:
825 B
suspicious functions used:
curl_exec (line:15); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMS.php-
Full path:
akbhanga/web/SMS.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:25 12/12/2025
Last modified:
05:13:54 06/03/2025
MD5 hash:
25b5422d1cc92b4d2253417e72d9a658
Filesize:
37.37 KB
suspicious functions used:
curl_exec (line:56); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMS1.php-
Full path:
akbhanga/web/SMS1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:25 12/12/2025
Last modified:
05:13:54 06/03/2025
MD5 hash:
e4671dadf9ad575671fd3609a60030da
Filesize:
32.19 KB
suspicious functions used:
curl_exec (line:59); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMSAddSave.php-
Full path:
akbhanga/web/SMSAddSave.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:25 12/12/2025
Last modified:
05:13:54 06/03/2025
MD5 hash:
0d2d0548df5f32e69264c4f2f1b1f76e
Filesize:
2.12 KB
suspicious functions used:
curl_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: sms_deliverey_report.php-
Full path:
akbhanga/web/sms_deliverey_report.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
03:06:13 12/12/2025
Last modified:
05:13:55 06/03/2025
MD5 hash:
03623943da7e9334e137b38c8577fc84
Filesize:
4.25 KB
suspicious functions used:
curl_exec (line:28);curl_exec (line:53);curl_exec (line:90); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: support-action.php-
Full path:
akbhanga/web/support-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:25 12/12/2025
Last modified:
05:13:55 06/03/2025
MD5 hash:
58556808f93f52486b2ad06998142aa9
Filesize:
14.56 KB
suspicious functions used:
curl_exec (line:220); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tagreeexpayment.php-
Full path:
akbhanga/web/tagreeexpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:26 12/12/2025
Last modified:
05:13:55 06/03/2025
MD5 hash:
029b4fba649a75c7c81d2f8931be8d63
Filesize:
2.86 KB
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreateagree.php-
Full path:
akbhanga/web/tcreateagree.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:26 12/12/2025
Last modified:
05:13:55 06/03/2025
MD5 hash:
27a10adf4190edc7eceee8cf74a6b72b
Filesize:
999 B
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreatepayment.php-
Full path:
akbhanga/web/tcreatepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:26 12/12/2025
Last modified:
05:13:55 06/03/2025
MD5 hash:
e49de9a33f5164bc2c6b88e4770faaff
Filesize:
1.07 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test2.php-
Full path:
akbhanga/web/test2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:26 12/12/2025
Last modified:
05:13:55 06/03/2025
MD5 hash:
ab80d92ede21b7da59bfefb325484297
Filesize:
13.76 KB
suspicious functions used:
shell_exec (line:59);shell_exec (line:70);shell_exec (line:76);shell_exec (line:88);shell_exec (line:101);shell_exec (line:141);curl_exec (line:187);curl_exec (line:212);curl_exec (line:354); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test6.php-
Full path:
akbhanga/web/test6.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:26 12/12/2025
Last modified:
05:13:55 06/03/2025
MD5 hash:
f22d022ddc284f4d8e1de3660da91db8
Filesize:
15.61 KB
suspicious functions used:
shell_exec (line:34);shell_exec (line:113);shell_exec (line:126);shell_exec (line:132); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test7.php-
Full path:
akbhanga/web/test7.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:26 12/12/2025
Last modified:
05:13:55 06/03/2025
MD5 hash:
b11ccf951ce63a21ea0a7328316a0e5c
Filesize:
1.57 KB
suspicious functions used:
curl_exec (line:14); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test8.php-
Full path:
akbhanga/web/test8.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:26 12/12/2025
Last modified:
05:13:55 06/03/2025
MD5 hash:
0da20f06359cae632ac4b808ab2eee77
Filesize:
3.65 KB
suspicious functions used:
shell_exec (line:48); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: testttttt.php-
Full path:
akbhanga/web/testttttt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:26 12/12/2025
Last modified:
05:13:56 06/03/2025
MD5 hash:
b1988a4be29e191ad935fb409a4174ee
Filesize:
2 KB
suspicious functions used:
curl_exec (line:47); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: texecutepayment.php-
Full path:
akbhanga/web/texecutepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:26 12/12/2025
Last modified:
05:13:56 06/03/2025
MD5 hash:
623635fdf5c871391d3a5fe99ee8c543
Filesize:
2.91 KB
suspicious functions used:
curl_exec (line:24); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tis-news.php-
Full path:
akbhanga/web/tis-news.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
05:04:00 12/12/2025
Last modified:
05:13:56 06/03/2025
MD5 hash:
ed23ca98b77c5321b4485e85eb2ea64d
Filesize:
3.67 KB
suspicious functions used:
curl_exec (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
akbhanga/web/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
05:24:22 12/12/2025
Last modified:
05:13:56 06/03/2025
MD5 hash:
7d8e71ceda3ffb74623e0c4a814715af
Filesize:
1.53 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tt.php-
Full path:
akbhanga/web/tt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:26 12/12/2025
Last modified:
05:13:56 06/03/2025
MD5 hash:
9c4ed141cb79fdc7e807b35923c91a20
Filesize:
1.56 KB
suspicious functions used:
curl_exec (line:30); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ttoken.php-
Full path:
akbhanga/web/ttoken.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:26 12/12/2025
Last modified:
05:13:56 06/03/2025
MD5 hash:
5f2c51c1db5b0defadfb67ce25c0098f
Filesize:
1.54 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: UserAccess.php-
Full path:
akbhanga/web/UserAccess.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:26 12/12/2025
Last modified:
05:13:56 06/03/2025
MD5 hash:
69db4d4c504e7d0d4bed32eb8053b12f
Filesize:
10.4 KB
suspicious functions used:
`.modulecheckboxx[data-group="${group}"]` (line:158); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook.php-
Full path:
akbhanga/web/webhook.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:26 12/12/2025
Last modified:
05:13:57 06/03/2025
MD5 hash:
69a88ae1be0ab3ab1c7c971c72c0b025
Filesize:
21.93 KB
suspicious functions used:
base64_decode (line:28);curl_exec (line:39);curl_exec (line:465); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook_cid.php-
Full path:
akbhanga/web/webhook_cid.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:26 12/12/2025
Last modified:
05:13:57 06/03/2025
MD5 hash:
1a2672fc0dd81a9c831e3fa60ec860e1
Filesize:
21.52 KB
suspicious functions used:
base64_decode (line:29);curl_exec (line:40);curl_exec (line:439); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook_test.php-
Full path:
akbhanga/web/webhook_test.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:26 12/12/2025
Last modified:
05:13:57 06/03/2025
MD5 hash:
74a7dcc262d7fe7f2bdc9e0595d03837
Filesize:
4.69 KB
suspicious functions used:
base64_decode (line:22);curl_exec (line:33);curl_exec (line:86);curl_exec (line:107); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: class.phpmailer.php-
Full path:
akbhanga/web/email/class.phpmailer.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:27 12/12/2025
Last modified:
05:13:59 06/03/2025
MD5 hash:
68468d69b47fffecc89df57e27c5a781
Filesize:
143.32 KB
suspicious functions used:
`$DKIM_private` (line:428);popen (line:1387);popen (line:1408);base64_decode (line:3410);`$mail->set('SMTPSecure', 'tls');` (line:3688);`$mail->SMTPSecure = 'tls';` (line:3690); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: class.smtp.php-
Full path:
akbhanga/web/email/class.smtp.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:27 12/12/2025
Last modified:
05:13:59 06/03/2025
MD5 hash:
aa8478329268e5438a4469c268337a10
Filesize:
41.44 KB
suspicious functions used:
base64_decode (line:513);base64_decode (line:533); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: jqgrid.php-
Full path:
akbhanga/web/inc/jqgrid.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:28 12/12/2025
Last modified:
05:15:29 06/03/2025
MD5 hash:
71027a29e71e0626d8b57cbb631e6d98
Filesize:
23.92 KB
suspicious functions used:
eval (line:397); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: JSON.php-
Full path:
akbhanga/web/inc/JSON.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:28 12/12/2025
Last modified:
05:15:29 06/03/2025
MD5 hash:
f5a34509e06231308becbe320ade9ff6
Filesize:
33.22 KB
suspicious functions used:
eval (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: smsapicore.php-
Full path:
akbhanga/web/include/smsapicore.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
17:00:03 12/12/2025
Last modified:
05:15:29 06/03/2025
MD5 hash:
0494713963b7e9ead12abe06de2811a5
Filesize:
1.26 KB
suspicious functions used:
curl_exec (line:37); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: telegramapicore.php-
Full path:
akbhanga/web/include/telegramapicore.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
03:29:20 12/12/2025
Last modified:
05:15:30 06/03/2025
MD5 hash:
511f56e6dfcf4e9e7a11259e023ca3ae
Filesize:
3.15 KB
suspicious functions used:
curl_exec (line:68); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ui.php-
Full path:
akbhanga/web/js/tinymce/themes/advanced/skins/highcontrast/ui.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:28 12/12/2025
Last modified:
05:15:49 06/03/2025
MD5 hash:
3edaf67be8573b86686f46bbba4f058c
Filesize:
4.53 KB
suspicious functions used:
curl_exec (line:20);`bill_amount` = '0.00' WHERE bill_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY ` (line:53);`bill_amount` = '0.00', days = '0.00' WHERE entry_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY ` (line:54);`payment` WHERE `pay_date` < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND pay_amount != '0.00' ORDER BY ` (line:55);curl_exec (line:146);curl_exec (line:168); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Changes.txt-
Full path:
akbhanga/web/js/jqgrid/js/Changes.txt
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:28 12/12/2025
Last modified:
05:15:41 06/03/2025
MD5 hash:
c0a4adbc3f1c6d592cb4fa8433fee9ea
Filesize:
44.32 KB
suspicious functions used:
system (line:87); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
akbhanga/m/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
20:23:45 11/12/2025
Last modified:
05:13:31 06/03/2025
MD5 hash:
849185f307be30eafb1bbef93616d8c3
Filesize:
1.71 KB
suspicious functions used:
curl_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
akbhanga/m/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
20:24:30 11/12/2025
Last modified:
05:13:31 06/03/2025
MD5 hash:
9a3f22521ad987e86f84c4f5f688d5b7
Filesize:
713 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index.php-
Full path:
akbhanga/m/index.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
16:01:55 12/12/2025
Last modified:
05:13:31 06/03/2025
MD5 hash:
55a13ede9e1d70f42857e9a7baa75741
Filesize:
16.95 KB
suspicious functions used:
curl_exec (line:298); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index1.php-
Full path:
akbhanga/m/index1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:29 12/12/2025
Last modified:
05:13:32 06/03/2025
MD5 hash:
dbd325386cd905b7a18b217dda2030f3
Filesize:
13.92 KB
suspicious functions used:
base64_decode (line:8);curl_exec (line:224); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index2.php-
Full path:
akbhanga/m/index2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:29 12/12/2025
Last modified:
05:13:32 06/03/2025
MD5 hash:
41558736b037228ea93df03cae70eb87
Filesize:
4.31 KB
suspicious functions used:
curl_exec (line:70); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: LoginByPass.php-
Full path:
akbhanga/m/LoginByPass.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:29 12/12/2025
Last modified:
05:13:32 06/03/2025
MD5 hash:
4deda2bef49c7e4552e5379c86858ddf
Filesize:
4.27 KB
suspicious functions used:
curl_exec (line:41); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec.php-
Full path:
akbhanga/m/login_exec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
09:23:25 12/12/2025
Last modified:
14:50:37 12/03/2025
MD5 hash:
7eff267b8f329713c83c3cddd380b782
Filesize:
12.1 KB
suspicious functions used:
curl_exec (line:24);curl_exec (line:74);curl_exec (line:199);curl_exec (line:239); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec1.php-
Full path:
akbhanga/m/login_exec1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:29 12/12/2025
Last modified:
05:13:32 06/03/2025
MD5 hash:
b7a23f98b3d03b1ecc08218cf01b4aee
Filesize:
6.36 KB
suspicious functions used:
curl_exec (line:115); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec2.php-
Full path:
akbhanga/m/login_exec2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:29 12/12/2025
Last modified:
05:13:32 06/03/2025
MD5 hash:
46b08782f51ba75b23e27183e06370fe
Filesize:
4.28 KB
suspicious functions used:
curl_exec (line:61); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-merchant-callback.php-
Full path:
akbhanga/m/nagad-merchant-callback.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:29 12/12/2025
Last modified:
05:13:32 06/03/2025
MD5 hash:
89c5042f878e9b301a177823cf822c7e
Filesize:
11.32 KB
suspicious functions used:
curl_exec (line:20); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-snmp-data.php-
Full path:
akbhanga/m/netowrk-snmp-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:29 12/12/2025
Last modified:
05:13:32 06/03/2025
MD5 hash:
75622375b3ee37723d953e8a83735ef7
Filesize:
23.92 KB
suspicious functions used:
shell_exec (line:96);shell_exec (line:105);shell_exec (line:115);shell_exec (line:134);shell_exec (line:146);shell_exec (line:157);shell_exec (line:173);shell_exec (line:183);shell_exec (line:199);shell_exec (line:219);shell_exec (line:229);shell_exec (line:234);shell_exec (line:242);shell_exec (line:262);shell_exec (line:278);`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:291);shell_exec (line:297);shell_exec (line:430); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery.php-
Full path:
akbhanga/m/PaymentOnlineQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
20:24:31 11/12/2025
Last modified:
05:13:32 06/03/2025
MD5 hash:
6483645d440dd2f976cc1b29cb4021d5
Filesize:
20.95 KB
suspicious functions used:
curl_exec (line:287);curl_exec (line:492); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery2.php-
Full path:
akbhanga/m/PaymentOnlineQuery2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:29 12/12/2025
Last modified:
05:13:32 06/03/2025
MD5 hash:
3660992067d5591fc79ce89d6dbb9274
Filesize:
19.08 KB
suspicious functions used:
curl_exec (line:41);curl_exec (line:254); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: support-action.php-
Full path:
akbhanga/m/support-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:30 12/12/2025
Last modified:
05:13:32 06/03/2025
MD5 hash:
2fc6fd844db911a5502a7a6ae383990f
Filesize:
10.31 KB
suspicious functions used:
curl_exec (line:99); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tagreeexpayment.php-
Full path:
akbhanga/m/tagreeexpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:30 12/12/2025
Last modified:
05:13:32 06/03/2025
MD5 hash:
c95e3ee881752db67b4f3597bc58430a
Filesize:
2.46 KB
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreateagree.php-
Full path:
akbhanga/m/tcreateagree.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:30 12/12/2025
Last modified:
05:13:32 06/03/2025
MD5 hash:
27a10adf4190edc7eceee8cf74a6b72b
Filesize:
999 B
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreatepayment.php-
Full path:
akbhanga/m/tcreatepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:30 12/12/2025
Last modified:
05:13:32 06/03/2025
MD5 hash:
e49de9a33f5164bc2c6b88e4770faaff
Filesize:
1.07 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: texecutepayment.php-
Full path:
akbhanga/m/texecutepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:30 12/12/2025
Last modified:
05:13:32 06/03/2025
MD5 hash:
efbb63dfcfdacb52dec74bffc389bbb3
Filesize:
2.67 KB
suspicious functions used:
curl_exec (line:24); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
akbhanga/m/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
20:23:44 11/12/2025
Last modified:
05:13:32 06/03/2025
MD5 hash:
7d8e71ceda3ffb74623e0c4a814715af
Filesize:
1.53 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ttoken.php-
Full path:
akbhanga/m/ttoken.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:30 12/12/2025
Last modified:
05:13:33 06/03/2025
MD5 hash:
5f2c51c1db5b0defadfb67ce25c0098f
Filesize:
1.54 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
arc/m/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:31 12/12/2025
Last modified:
17:45:50 03/06/2025
MD5 hash:
849185f307be30eafb1bbef93616d8c3
Filesize:
1.71 KB
suspicious functions used:
curl_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
arc/m/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:31 12/12/2025
Last modified:
17:45:50 03/06/2025
MD5 hash:
9a3f22521ad987e86f84c4f5f688d5b7
Filesize:
713 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index.php-
Full path:
arc/m/index.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
14:36:16 12/12/2025
Last modified:
17:45:50 03/06/2025
MD5 hash:
5a9206eb2ef2835083705f01e81f5b41
Filesize:
16.41 KB
suspicious functions used:
curl_exec (line:282); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: LoginByPass.php-
Full path:
arc/m/LoginByPass.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:31 12/12/2025
Last modified:
17:45:50 03/06/2025
MD5 hash:
ce55a8f81ccab7d07744fd3914d6ee35
Filesize:
4.65 KB
suspicious functions used:
curl_exec (line:44);curl_exec (line:69); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec.php-
Full path:
arc/m/login_exec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
14:36:16 12/12/2025
Last modified:
17:45:50 03/06/2025
MD5 hash:
c8b31379830b912ec08a7917166a4aeb
Filesize:
12.26 KB
suspicious functions used:
curl_exec (line:25);curl_exec (line:81);curl_exec (line:200);curl_exec (line:238); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-merchant-callback.php-
Full path:
arc/m/nagad-merchant-callback.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:31 12/12/2025
Last modified:
17:45:51 03/06/2025
MD5 hash:
3fcf93d3aec6449a76e27b14f01ada02
Filesize:
11.32 KB
suspicious functions used:
curl_exec (line:20); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-snmp-data.php-
Full path:
arc/m/netowrk-snmp-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:31 12/12/2025
Last modified:
17:45:51 03/06/2025
MD5 hash:
a0f9ff194951c18f7390ef750529f434
Filesize:
24.14 KB
suspicious functions used:
shell_exec (line:96);shell_exec (line:105);shell_exec (line:115);shell_exec (line:134);shell_exec (line:146);shell_exec (line:157);shell_exec (line:173);shell_exec (line:183);shell_exec (line:199);shell_exec (line:219);shell_exec (line:229);shell_exec (line:234);shell_exec (line:242);shell_exec (line:262);shell_exec (line:278);`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:291);shell_exec (line:297);shell_exec (line:430); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery.php-
Full path:
arc/m/PaymentOnlineQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:31 12/12/2025
Last modified:
17:45:53 03/06/2025
MD5 hash:
6483645d440dd2f976cc1b29cb4021d5
Filesize:
20.95 KB
suspicious functions used:
curl_exec (line:287);curl_exec (line:492); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery2.php-
Full path:
arc/m/PaymentOnlineQuery2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:31 12/12/2025
Last modified:
17:45:53 03/06/2025
MD5 hash:
3660992067d5591fc79ce89d6dbb9274
Filesize:
19.08 KB
suspicious functions used:
curl_exec (line:41);curl_exec (line:254); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: support-action.php-
Full path:
arc/m/support-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:32 12/12/2025
Last modified:
17:45:54 03/06/2025
MD5 hash:
adb69d6d3e277ad4c464c4fd0c41b4ca
Filesize:
10.29 KB
suspicious functions used:
curl_exec (line:99); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tagreeexpayment.php-
Full path:
arc/m/tagreeexpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:32 12/12/2025
Last modified:
17:45:55 03/06/2025
MD5 hash:
c95e3ee881752db67b4f3597bc58430a
Filesize:
2.46 KB
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreateagree.php-
Full path:
arc/m/tcreateagree.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:32 12/12/2025
Last modified:
17:45:55 03/06/2025
MD5 hash:
27a10adf4190edc7eceee8cf74a6b72b
Filesize:
999 B
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreatepayment.php-
Full path:
arc/m/tcreatepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:32 12/12/2025
Last modified:
17:45:55 03/06/2025
MD5 hash:
e49de9a33f5164bc2c6b88e4770faaff
Filesize:
1.07 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: texecutepayment.php-
Full path:
arc/m/texecutepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:32 12/12/2025
Last modified:
17:45:55 03/06/2025
MD5 hash:
efbb63dfcfdacb52dec74bffc389bbb3
Filesize:
2.67 KB
suspicious functions used:
curl_exec (line:24); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
arc/m/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:32 12/12/2025
Last modified:
17:45:55 03/06/2025
MD5 hash:
7d8e71ceda3ffb74623e0c4a814715af
Filesize:
1.53 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ttoken.php-
Full path:
arc/m/ttoken.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:32 12/12/2025
Last modified:
17:45:55 03/06/2025
MD5 hash:
5f2c51c1db5b0defadfb67ce25c0098f
Filesize:
1.54 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: AppSettings.php-
Full path:
arc/web/AppSettings.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:32 12/12/2025
Last modified:
17:46:08 03/06/2025
MD5 hash:
512b3e52141311ec6f69c2d46859b4ec
Filesize:
124.27 KB
suspicious functions used:
`input[name="${inputName}"]:checked` (line:2076); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: AutoActiveClientsCount1.php-
Full path:
arc/web/AutoActiveClientsCount1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
17:04:54 12/12/2025
Last modified:
17:46:09 03/06/2025
MD5 hash:
96ae95689b28aef52bd4eaab4bfea7cc
Filesize:
5.38 KB
suspicious functions used:
system (line:54); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: AutoActiveClientsCount11.php-
Full path:
arc/web/AutoActiveClientsCount11.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:33 12/12/2025
Last modified:
17:46:09 03/06/2025
MD5 hash:
a0090e4a11dd59b955a6edd549b6ef2f
Filesize:
5.85 KB
suspicious functions used:
system (line:54); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: client-online-mbb.php-
Full path:
arc/web/client-online-mbb.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:33 12/12/2025
Last modified:
17:46:13 03/06/2025
MD5 hash:
a1cef934dce8da065b0116b7915754af
Filesize:
16.36 KB
suspicious functions used:
curl_exec (line:88);curl_exec (line:288); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: clients-nots-action.php-
Full path:
arc/web/clients-nots-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:34 12/12/2025
Last modified:
17:46:18 03/06/2025
MD5 hash:
dff1bb495509427d098cb4588da553b9
Filesize:
5.89 KB
suspicious functions used:
curl_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients.php-
Full path:
arc/web/Clients.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:37:39 12/12/2025
Last modified:
17:46:20 03/06/2025
MD5 hash:
813f3342191ae66a98437696e5a413cf
Filesize:
197.66 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:761); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients1.php-
Full path:
arc/web/Clients1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:34 12/12/2025
Last modified:
17:46:21 03/06/2025
MD5 hash:
ccec9015b85db7f5fd719dce1ddfd76d
Filesize:
197.59 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:759); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients2.php-
Full path:
arc/web/Clients2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:34 12/12/2025
Last modified:
17:46:22 03/06/2025
MD5 hash:
982d6411552113b0715fd17c26f50292
Filesize:
205.13 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:832); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients3.php-
Full path:
arc/web/Clients3.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:35 12/12/2025
Last modified:
17:46:24 03/06/2025
MD5 hash:
50ddc869b383ab76e009c7a2c17c99a3
Filesize:
175.31 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:832); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ClientsOnMap.php-
Full path:
arc/web/ClientsOnMap.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:35 12/12/2025
Last modified:
06:02:56 10/11/2025
MD5 hash:
e853e4393e2183f104b30d6284d8a51c
Filesize:
19.47 KB
suspicious functions used:
`${totalonline}` (line:173);`${totaloffline}` (line:174);`${results.rxPower}` (line:307);`${results.distance}` (line:308);`${results.supplyVoltage}` (line:309);`${results.temperature}` (line:310);`${results.txPower}` (line:311); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ClientsOnMap1.php-
Full path:
arc/web/ClientsOnMap1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:35 12/12/2025
Last modified:
17:46:30 03/06/2025
MD5 hash:
ba0202f8bef3c634e895471057086953
Filesize:
13.14 KB
suspicious functions used:
`${totalonline}` (line:109);`${totaloffline}` (line:110);`${results.rxPower}` (line:243);`${results.distance}` (line:244);`${results.supplyVoltage}` (line:245);`${results.temperature}` (line:246);`${results.txPower}` (line:247); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ClientView.php-
Full path:
arc/web/ClientView.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
11:40:25 12/12/2025
Last modified:
03:18:04 07/06/2025
MD5 hash:
756221c89eb1163a8735f450f7a9d263
Filesize:
112.89 KB
suspicious functions used:
`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:227); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: company_info.php-
Full path:
arc/web/company_info.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
00:50:04 12/12/2025
Last modified:
17:46:33 03/06/2025
MD5 hash:
406848ab0f21b6c2121abb5f5dcd2730
Filesize:
8.31 KB
suspicious functions used:
curl_exec (line:131); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
arc/web/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:36 12/12/2025
Last modified:
17:46:33 03/06/2025
MD5 hash:
ba9747d0421fd091b998389469e72a0b
Filesize:
1.7 KB
suspicious functions used:
curl_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_all.php-
Full path:
arc/web/cron_all.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:36 12/12/2025
Last modified:
17:46:33 03/06/2025
MD5 hash:
967f1d654ae891609da26b9e0fdbd1ae
Filesize:
2.44 KB
suspicious functions used:
curl_exec (line:23);curl_exec (line:38);curl_exec (line:53); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_gen_bill.php-
Full path:
arc/web/cron_auto_gen_bill.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:36 12/12/2025
Last modified:
17:46:33 03/06/2025
MD5 hash:
f1056618cc4402968e50d1232d2c51c8
Filesize:
4.73 KB
suspicious functions used:
curl_exec (line:140);curl_exec (line:149); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive.php-
Full path:
arc/web/cron_auto_inactive.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
03:55:08 12/12/2025
Last modified:
17:46:33 03/06/2025
MD5 hash:
7e0dc4dd9dae2bf0220516641b53c027
Filesize:
5.43 KB
suspicious functions used:
curl_exec (line:142); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive2.php-
Full path:
arc/web/cron_auto_inactive2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:36 12/12/2025
Last modified:
17:46:33 03/06/2025
MD5 hash:
440bc24f05b01eb395df63fff2f60de9
Filesize:
5.46 KB
suspicious functions used:
curl_exec (line:142); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive_termination.php-
Full path:
arc/web/cron_auto_inactive_termination.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
01:10:04 12/12/2025
Last modified:
17:46:33 03/06/2025
MD5 hash:
c858e742c90ee398f98f5bca2ed8e7e1
Filesize:
13.03 KB
suspicious functions used:
curl_exec (line:232);curl_exec (line:244);curl_exec (line:286); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_termination_remainder1.php-
Full path:
arc/web/cron_auto_termination_remainder1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
03:05:08 12/12/2025
Last modified:
17:46:33 03/06/2025
MD5 hash:
7765f9f820dbd402f1064fab9958ffaa
Filesize:
3.26 KB
suspicious functions used:
curl_exec (line:83); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_client_bandwidth_count.php-
Full path:
arc/web/cron_client_bandwidth_count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:23:08 12/12/2025
Last modified:
17:46:33 03/06/2025
MD5 hash:
a1b43b5493187af5b23c7217aeec0cef
Filesize:
6.45 KB
suspicious functions used:
curl_exec (line:159); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_network.php-
Full path:
arc/web/cron_network.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
13:40:19 12/12/2025
Last modified:
17:46:33 03/06/2025
MD5 hash:
36fe709ddc5062ba1fecfe1417fdff91
Filesize:
4 KB
suspicious functions used:
curl_exec (line:42);curl_exec (line:64); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_olt.php-
Full path:
arc/web/cron_olt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:15:16 12/12/2025
Last modified:
17:46:33 03/06/2025
MD5 hash:
f0248614baaea216d0f29e0ca584410b
Filesize:
4.46 KB
suspicious functions used:
shell_exec (line:51);curl_exec (line:106); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_olt_clients_catch.php-
Full path:
arc/web/cron_olt_clients_catch.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
04:21:18 12/12/2025
Last modified:
17:46:33 03/06/2025
MD5 hash:
f3775b14a4f3709bd1e20ac451a3bea1
Filesize:
2.05 KB
suspicious functions used:
curl_exec (line:55); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_olt_user.php-
Full path:
arc/web/cron_olt_user.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:36 12/12/2025
Last modified:
17:46:33 03/06/2025
MD5 hash:
67aa237639e3d1e6064e76079bb3cccc
Filesize:
1.97 KB
suspicious functions used:
curl_exec (line:19);curl_exec (line:46); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: EmployeeAdd.php-
Full path:
arc/web/EmployeeAdd.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:36 12/12/2025
Last modified:
17:46:34 03/06/2025
MD5 hash:
c12c85fa282eb15060ed68bad252f8e8
Filesize:
19.13 KB
suspicious functions used:
`Element with ID ${id} not found.` (line:36);`Non-numeric input detected in ${id}.` (line:38);`Element with ID ${id} not found.` (line:44);`Non-numeric input detected in ${id}.` (line:46); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: EmployeeEdit.php-
Full path:
arc/web/EmployeeEdit.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:36 12/12/2025
Last modified:
17:46:34 03/06/2025
MD5 hash:
55b4626339d566473f477e1a001dc8b4
Filesize:
17.73 KB
suspicious functions used:
`Element with ID ${id} not found.` (line:44);`Non-numeric input detected in ${id}.` (line:46);`Element with ID ${id} not found.` (line:52);`Non-numeric input detected in ${id}.` (line:54); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: emp_salary_advence_find.php-
Full path:
arc/web/emp_salary_advence_find.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:36 12/12/2025
Last modified:
17:46:34 03/06/2025
MD5 hash:
74a7e2ffda0f7584611d7cbce6136c24
Filesize:
2.25 KB
suspicious functions used:
`expanse` WHERE `type` = '2' AND `status` = '2' AND ex_by = '$e_id' AND MONTH(`, `) = MONTH('$lastmonth') AND YEAR(`, `) = YEAR('$lastmonth') GROUP BY ` (line:8);`e_id` = '$e_id' AND ` (line:12); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
arc/web/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:36 12/12/2025
Last modified:
17:46:34 03/06/2025
MD5 hash:
c46a50905333286f45dfeacf010851ab
Filesize:
716 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: getclientuptime.php-
Full path:
arc/web/getclientuptime.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:36 12/12/2025
Last modified:
17:46:37 03/06/2025
MD5 hash:
bbc14cdd451c72b94d78c7d2d1af0b52
Filesize:
718 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: imagevwr.php-
Full path:
arc/web/imagevwr.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
11:40:26 12/12/2025
Last modified:
17:46:37 03/06/2025
MD5 hash:
47a223a13cc642d01dcfaaca542d396d
Filesize:
915 B
suspicious functions used:
curl_exec (line:15); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index.php-
Full path:
arc/web/index.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
17:04:41 12/12/2025
Last modified:
17:46:37 03/06/2025
MD5 hash:
2e1798df24b219a66401b4936b812f43
Filesize:
16.11 KB
suspicious functions used:
curl_exec (line:282); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: InstrumentsStoreOutDetails.php-
Full path:
arc/web/InstrumentsStoreOutDetails.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:37 12/12/2025
Last modified:
17:46:38 03/06/2025
MD5 hash:
a60c19f766bfff1ccdccbeba6b39eb87
Filesize:
9.37 KB
suspicious functions used:
`update_date`, '%D-%b, %y') AS offdate, TIME_FORMAT(`update_time`, '%T') AS offtime FROM `con_sts_log` WHERE `c_id` = '{$row['c_id']}' AND con_sts = 'Inactive' ORDER BY ` (line:120); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ip-ping-checker.php-
Full path:
arc/web/ip-ping-checker.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:37 12/12/2025
Last modified:
17:46:38 03/06/2025
MD5 hash:
0d28f3053b73b3fe2885cf519ee17c12
Filesize:
2.64 KB
suspicious functions used:
curl_exec (line:81); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: LoginByPass.php-
Full path:
arc/web/LoginByPass.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:37 12/12/2025
Last modified:
17:46:39 03/06/2025
MD5 hash:
1c6616dae30e9849d8f4fb0fe712a748
Filesize:
4.59 KB
suspicious functions used:
curl_exec (line:44);curl_exec (line:69); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec.php-
Full path:
arc/web/login_exec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
06:00:28 12/12/2025
Last modified:
17:46:39 03/06/2025
MD5 hash:
fe0ff14fc554949b87917caaf5d443f8
Filesize:
12.26 KB
suspicious functions used:
curl_exec (line:24);curl_exec (line:80);curl_exec (line:199);curl_exec (line:237); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: macreseller-news.php-
Full path:
arc/web/macreseller-news.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:37 12/12/2025
Last modified:
17:46:41 03/06/2025
MD5 hash:
ed23ca98b77c5321b4485e85eb2ea64d
Filesize:
3.67 KB
suspicious functions used:
curl_exec (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: MacResellerAdd.php-
Full path:
arc/web/MacResellerAdd.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:37 12/12/2025
Last modified:
17:46:42 03/06/2025
MD5 hash:
5fdbde3df3e96e845cc118cb3ae916a5
Filesize:
30.33 KB
suspicious functions used:
`input[name="${inputName}"]:checked` (line:799); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: MacResellerEdit.php-
Full path:
arc/web/MacResellerEdit.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:37 12/12/2025
Last modified:
17:46:45 03/06/2025
MD5 hash:
92ce35276f3eae45e866de3439baaa11
Filesize:
37.76 KB
suspicious functions used:
`input[name="${inputName}"]:checked` (line:640); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-helper.php-
Full path:
arc/web/nagad-helper.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:38 12/12/2025
Last modified:
17:46:48 03/06/2025
MD5 hash:
114b90b978b842cd318391876ba454ab
Filesize:
2.84 KB
suspicious functions used:
curl_exec (line:46);base64_decode (line:77); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-merchant-callback.php-
Full path:
arc/web/nagad-merchant-callback.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:38 12/12/2025
Last modified:
17:46:48 03/06/2025
MD5 hash:
a782d367c638b8f47cb46738f54fa753
Filesize:
16.47 KB
suspicious functions used:
curl_exec (line:20); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-olt-all-mac-array.php-
Full path:
arc/web/netowrk-olt-all-mac-array.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:38 12/12/2025
Last modified:
17:46:48 03/06/2025
MD5 hash:
b0168ce99145e2afe64357247d750dd6
Filesize:
4.62 KB
suspicious functions used:
shell_exec (line:33);shell_exec (line:47);shell_exec (line:61);shell_exec (line:76);shell_exec (line:93); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-snmp-data-auto.php-
Full path:
arc/web/netowrk-snmp-data-auto.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:38 12/12/2025
Last modified:
17:46:48 03/06/2025
MD5 hash:
b30b86386b4d79a756cefdd86f070bd5
Filesize:
7.27 KB
suspicious functions used:
shell_exec (line:68);shell_exec (line:118); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-snmp-data.php-
Full path:
arc/web/netowrk-snmp-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
14:16:56 12/12/2025
Last modified:
17:46:48 03/06/2025
MD5 hash:
cebb238044a122cb2dc9038afac8ca43
Filesize:
24.93 KB
suspicious functions used:
shell_exec (line:104);shell_exec (line:113);shell_exec (line:123);shell_exec (line:142);shell_exec (line:154);shell_exec (line:165);shell_exec (line:181);shell_exec (line:191);shell_exec (line:207);shell_exec (line:227);shell_exec (line:236);shell_exec (line:244);shell_exec (line:251);shell_exec (line:256);`pon_name` FROM `olt_pon` WHERE `olt_pon_id` = '$pon_id' AND ` (line:263);shell_exec (line:280);shell_exec (line:290);`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:303);shell_exec (line:309);shell_exec (line:441); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-old-onu-rx-map.php-
Full path:
arc/web/network-old-onu-rx-map.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:38 12/12/2025
Last modified:
17:46:48 03/06/2025
MD5 hash:
bfa54cd4fcf2629316f30310fcc90b78
Filesize:
6.93 KB
suspicious functions used:
shell_exec (line:77); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-old-onu-rx.php-
Full path:
arc/web/network-old-onu-rx.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:38 12/12/2025
Last modified:
17:46:48 03/06/2025
MD5 hash:
a2555fb0203a78b0e1f41ae2d96f6f82
Filesize:
7.35 KB
suspicious functions used:
shell_exec (line:86); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-count-cdata.php-
Full path:
arc/web/network-olt-client-onu-mac-count-cdata.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:38 12/12/2025
Last modified:
17:46:48 03/06/2025
MD5 hash:
c378dbabf36066c335cfb8838a6e167d
Filesize:
4.58 KB
suspicious functions used:
shell_exec (line:25);shell_exec (line:35);shell_exec (line:56);shell_exec (line:103);shell_exec (line:115);shell_exec (line:126);shell_exec (line:140); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-count-rcl.php-
Full path:
arc/web/network-olt-client-onu-mac-count-rcl.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:38 12/12/2025
Last modified:
17:46:48 03/06/2025
MD5 hash:
9372dfb2a63d9f4a28440f91d4866778
Filesize:
3.49 KB
suspicious functions used:
shell_exec (line:26);shell_exec (line:73);shell_exec (line:85);shell_exec (line:96);shell_exec (line:110); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-count.php-
Full path:
arc/web/network-olt-client-onu-mac-count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:38 12/12/2025
Last modified:
17:46:48 03/06/2025
MD5 hash:
80af84e49b42497813db916584cfa0f2
Filesize:
15.29 KB
suspicious functions used:
shell_exec (line:26);shell_exec (line:36);shell_exec (line:68);shell_exec (line:84);shell_exec (line:101);shell_exec (line:119);shell_exec (line:135);shell_exec (line:176);shell_exec (line:236);shell_exec (line:312);shell_exec (line:379);shell_exec (line:469);shell_exec (line:488);shell_exec (line:507); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-countt.php-
Full path:
arc/web/network-olt-client-onu-mac-countt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:38 12/12/2025
Last modified:
17:46:48 03/06/2025
MD5 hash:
6c684ef0e37eeb3400821b34d0d05fec
Filesize:
8.94 KB
suspicious functions used:
shell_exec (line:26);shell_exec (line:36);shell_exec (line:59);shell_exec (line:75);shell_exec (line:92);shell_exec (line:102);shell_exec (line:117);shell_exec (line:155);shell_exec (line:206);shell_exec (line:262);shell_exec (line:275);shell_exec (line:288); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-con-sts.php-
Full path:
arc/web/network-olt-con-sts.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:38 12/12/2025
Last modified:
17:46:48 03/06/2025
MD5 hash:
400a889537016067b55f97ac6d0a16a3
Filesize:
4.02 KB
suspicious functions used:
`olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:10);shell_exec (line:38);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, `last_synced`, `last_update`, `msg`, `full_msg`, ROUND((SELECT AVG(value) FROM olt_onu_history WHERE alarm_id = '$alarmId' AND value != ''), 2) AS average_value FROM `, ` WHERE `alarm_id` = '$alarmId' AND ` (line:82); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-load.php-
Full path:
arc/web/network-olt-load.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:38 12/12/2025
Last modified:
17:46:48 03/06/2025
MD5 hash:
f49d5153285c639ed91d4e806685ee56
Filesize:
1.33 KB
suspicious functions used:
shell_exec (line:22);shell_exec (line:25); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-oid-check.php-
Full path:
arc/web/network-olt-oid-check.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:38 12/12/2025
Last modified:
17:46:48 03/06/2025
MD5 hash:
5b7dc0ce1103fbfc895873c250b63141
Filesize:
1.88 KB
suspicious functions used:
shell_exec (line:33); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-alarm-add.php-
Full path:
arc/web/network-olt-onu-alarm-add.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:38 12/12/2025
Last modified:
17:46:48 03/06/2025
MD5 hash:
be6ba82c658419e1454f778e20e2d4c3
Filesize:
7.86 KB
suspicious functions used:
shell_exec (line:103); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-count.php-
Full path:
arc/web/network-olt-onu-count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:38 12/12/2025
Last modified:
17:46:48 03/06/2025
MD5 hash:
cbfe569e079da8f569d07af1dec94de5
Filesize:
7.22 KB
suspicious functions used:
`olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:14);shell_exec (line:83); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-list-data.php-
Full path:
arc/web/network-olt-onu-list-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:38 12/12/2025
Last modified:
17:46:48 03/06/2025
MD5 hash:
54cc9417c766c31317311c3722ce7d4b
Filesize:
9.48 KB
suspicious functions used:
shell_exec (line:24);shell_exec (line:38);shell_exec (line:64);shell_exec (line:85);shell_exec (line:104);shell_exec (line:125);shell_exec (line:143);shell_exec (line:153);shell_exec (line:165);shell_exec (line:185); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-power.php-
Full path:
arc/web/network-olt-onu-power.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:38 12/12/2025
Last modified:
17:46:48 03/06/2025
MD5 hash:
2e064543b67b532bdf4e5b12d49c5052
Filesize:
7.54 KB
suspicious functions used:
shell_exec (line:97); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-clients-search.php-
Full path:
arc/web/network-olt-pon-clients-search.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:38 12/12/2025
Last modified:
17:46:48 03/06/2025
MD5 hash:
79d26fc66abdab6f173330588aa8b238
Filesize:
10.93 KB
suspicious functions used:
shell_exec (line:42);shell_exec (line:51);shell_exec (line:104);shell_exec (line:168); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search-bdcom.php-
Full path:
arc/web/network-olt-pon-onu-search-bdcom.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:38 12/12/2025
Last modified:
17:46:48 03/06/2025
MD5 hash:
c786fa8b69268c738b6ff976631798cd
Filesize:
27.74 KB
suspicious functions used:
shell_exec (line:60);shell_exec (line:69);shell_exec (line:383); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search-bdcom1.php-
Full path:
arc/web/network-olt-pon-onu-search-bdcom1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:38 12/12/2025
Last modified:
17:46:48 03/06/2025
MD5 hash:
dd18677b1dcbf7f0bce2ac6912d98da0
Filesize:
9.6 KB
suspicious functions used:
shell_exec (line:42);shell_exec (line:51);shell_exec (line:129); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search-rcl.php-
Full path:
arc/web/network-olt-pon-onu-search-rcl.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:38 12/12/2025
Last modified:
17:46:49 03/06/2025
MD5 hash:
565ff38d572bba4bc20721ab17484554
Filesize:
27.33 KB
suspicious functions used:
shell_exec (line:46);shell_exec (line:55);shell_exec (line:369); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search.php-
Full path:
arc/web/network-olt-pon-onu-search.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:38 12/12/2025
Last modified:
17:46:49 03/06/2025
MD5 hash:
dc183ecf77d0e1f56f672338fd09cfa5
Filesize:
21.62 KB
suspicious functions used:
shell_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data-bdcom-online.php-
Full path:
arc/web/network-snmp-onu-status-data-bdcom-online.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
09:22:51 12/12/2025
Last modified:
17:46:49 03/06/2025
MD5 hash:
a63b8935b2897e257872145705a654a9
Filesize:
21.78 KB
suspicious functions used:
shell_exec (line:48);shell_exec (line:73);shell_exec (line:85);shell_exec (line:103);shell_exec (line:116);shell_exec (line:128);shell_exec (line:134);shell_exec (line:159);shell_exec (line:172);shell_exec (line:184);shell_exec (line:190);shell_exec (line:217);shell_exec (line:230);shell_exec (line:236); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data-bdcom.php-
Full path:
arc/web/network-snmp-onu-status-data-bdcom.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:38 12/12/2025
Last modified:
17:46:49 03/06/2025
MD5 hash:
8e6c4057a9586f2e4cc65277a19854a3
Filesize:
23.58 KB
suspicious functions used:
shell_exec (line:49);shell_exec (line:74);shell_exec (line:86);shell_exec (line:104);shell_exec (line:117);shell_exec (line:129);shell_exec (line:135);shell_exec (line:160);shell_exec (line:173);shell_exec (line:185);shell_exec (line:191);shell_exec (line:218);shell_exec (line:231);shell_exec (line:237); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data-online.php-
Full path:
arc/web/network-snmp-onu-status-data-online.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
13:22:53 12/12/2025
Last modified:
17:46:50 03/06/2025
MD5 hash:
0d8187961d76276c1aaaa369cdabf36b
Filesize:
27.73 KB
suspicious functions used:
shell_exec (line:35);`olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:41);shell_exec (line:80);shell_exec (line:94);shell_exec (line:108);shell_exec (line:121);shell_exec (line:196);shell_exec (line:429);shell_exec (line:441);shell_exec (line:448); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data.php-
Full path:
arc/web/network-snmp-onu-status-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:38 12/12/2025
Last modified:
17:46:50 03/06/2025
MD5 hash:
30cb65623c66c45bd502104b935d2c48
Filesize:
30.69 KB
suspicious functions used:
shell_exec (line:36);`olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:42);shell_exec (line:81);shell_exec (line:95);shell_exec (line:109);shell_exec (line:122);shell_exec (line:208);shell_exec (line:436);shell_exec (line:448);shell_exec (line:455); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data1.php-
Full path:
arc/web/network-snmp-onu-status-data1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:38 12/12/2025
Last modified:
17:46:50 03/06/2025
MD5 hash:
21b4726e351c4b0fcb7d6f0959c0d888
Filesize:
15.98 KB
suspicious functions used:
shell_exec (line:34);`olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:38);shell_exec (line:150); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data_vsol2.php-
Full path:
arc/web/network-snmp-onu-status-data_vsol2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:38 12/12/2025
Last modified:
17:46:50 03/06/2025
MD5 hash:
f22d022ddc284f4d8e1de3660da91db8
Filesize:
15.61 KB
suspicious functions used:
shell_exec (line:34);shell_exec (line:113);shell_exec (line:126);shell_exec (line:132); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-tree-vartual-nodes.php-
Full path:
arc/web/network-tree-vartual-nodes.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:38 12/12/2025
Last modified:
17:46:51 03/06/2025
MD5 hash:
ef5de6634f62a12fd5139c800708aa30
Filesize:
10.49 KB
suspicious functions used:
shell_exec (line:76);shell_exec (line:111);shell_exec (line:145);shell_exec (line:181);shell_exec (line:188); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Network.php-
Full path:
arc/web/Network.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:38 12/12/2025
Last modified:
17:46:51 03/06/2025
MD5 hash:
85105512c59282e667cfe15bc67d73bb
Filesize:
69.44 KB
suspicious functions used:
system (line:371);shell_exec (line:654);`network_tree` WHERE `device_type` = '1' AND `olt_id` = '{$rowo['olt_id']}' AND sts = '0' AND ` (line:874); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Network1.php-
Full path:
arc/web/Network1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:38 12/12/2025
Last modified:
17:46:51 03/06/2025
MD5 hash:
154ba9f6e6603be92ddd48557fb118ce
Filesize:
65.34 KB
suspicious functions used:
system (line:369);shell_exec (line:652);`network_tree` WHERE `device_type` = '1' AND `olt_id` = '{$rowo['olt_id']}' AND sts = '0' AND ` (line:843); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkLoad.php-
Full path:
arc/web/NetworkLoad.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:39 12/12/2025
Last modified:
17:46:53 03/06/2025
MD5 hash:
e1632e66ee1b7394d3fb82751b924abe
Filesize:
2.83 KB
suspicious functions used:
system (line:81); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkLoad1.php-
Full path:
arc/web/NetworkLoad1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:39 12/12/2025
Last modified:
17:46:53 03/06/2025
MD5 hash:
176bd6931be34d7ef351d22897accc65
Filesize:
759 B
suspicious functions used:
system (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltAddQuery.php-
Full path:
arc/web/NetworkOltAddQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:39 12/12/2025
Last modified:
17:46:53 03/06/2025
MD5 hash:
f2e8bbce7005fe948eab86e12f9e789f
Filesize:
7.96 KB
suspicious functions used:
shell_exec (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltOnuStatus.php-
Full path:
arc/web/NetworkOltOnuStatus.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:39 12/12/2025
Last modified:
17:46:53 03/06/2025
MD5 hash:
3389803b8d03cb46bbad2d648ffd0bd4
Filesize:
70.95 KB
suspicious functions used:
shell_exec (line:42);shell_exec (line:102);shell_exec (line:673);shell_exec (line:793);shell_exec (line:903);shell_exec (line:1013); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltOnuStatus2.php-
Full path:
arc/web/NetworkOltOnuStatus2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:39 12/12/2025
Last modified:
17:46:54 03/06/2025
MD5 hash:
c9a14797fa4353d05bbd9427b6079250
Filesize:
15.88 KB
suspicious functions used:
shell_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltSense.php-
Full path:
arc/web/NetworkOltSense.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:39 12/12/2025
Last modified:
17:46:54 03/06/2025
MD5 hash:
2be664ae5006367f629ca437a6d507f8
Filesize:
18.26 KB
suspicious functions used:
`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, `last_synced`, `last_update`, `msg`, `full_msg`, ROUND((SELECT AVG(value) FROM olt_onu_history WHERE alarm_id = '$alarmId' AND value != ''), 2) AS average_value FROM `, ` WHERE `alarm_id` = '$alarmId' AND ` (line:123); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltSenseDetails.php-
Full path:
arc/web/NetworkOltSenseDetails.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:39 12/12/2025
Last modified:
17:46:54 03/06/2025
MD5 hash:
440096c601fc10b819a1f0f8330928b0
Filesize:
14.17 KB
suspicious functions used:
`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:33);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:42);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:51);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:60); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltSync.php-
Full path:
arc/web/NetworkOltSync.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:39 12/12/2025
Last modified:
17:46:54 03/06/2025
MD5 hash:
06633d4b65a14d677358170dd0a84424
Filesize:
1.87 KB
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree-olt-onu-list-data.php-
Full path:
arc/web/networktree-olt-onu-list-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:39 12/12/2025
Last modified:
17:46:55 03/06/2025
MD5 hash:
af4221fefa9c9051846a063ac4135560
Filesize:
8.72 KB
suspicious functions used:
shell_exec (line:24);shell_exec (line:36);shell_exec (line:59);shell_exec (line:78);shell_exec (line:97);shell_exec (line:116);shell_exec (line:134);shell_exec (line:143);shell_exec (line:155);shell_exec (line:175); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeAddSave.php-
Full path:
arc/web/NetworkTreeAddSave.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:39 12/12/2025
Last modified:
17:46:57 03/06/2025
MD5 hash:
93fdf1213fdb5d525641e2b625f1a91b
Filesize:
7.61 KB
suspicious functions used:
`network_tree` WHERE `olt_id` = '$olt_id' AND ` (line:107); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeEdit1.php-
Full path:
arc/web/NetworkTreeEdit1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:39 12/12/2025
Last modified:
17:47:00 03/06/2025
MD5 hash:
3396a6bdf9b5804bb208f38f37cc29a2
Filesize:
35.81 KB
suspicious functions used:
`olt_onu` WHERE olt_id = '$olt_id' AND ` (line:207); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeEditSave.php-
Full path:
arc/web/NetworkTreeEditSave.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:39 12/12/2025
Last modified:
17:47:00 03/06/2025
MD5 hash:
75ca95ac9b0cf5e9709091d3a6ae5b6a
Filesize:
13.55 KB
suspicious functions used:
`olt_pon` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND ` (line:84);`network_tree` WHERE `olt_id` = '$olt_id' AND ` (line:196); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeList.php-
Full path:
arc/web/NetworkTreeList.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:39 12/12/2025
Last modified:
17:47:01 03/06/2025
MD5 hash:
2e75d2b5d8285321171467ca5c0afbe4
Filesize:
32 KB
suspicious functions used:
`pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '{$rowsedfg['olt_id']}' AND ` (line:455); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeMap.php-
Full path:
arc/web/NetworkTreeMap.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:39 12/12/2025
Last modified:
17:47:01 03/06/2025
MD5 hash:
9a2606558b5ebf04b77c89eeeb6df1c6
Filesize:
49.36 KB
suspicious functions used:
`${totalonline}` (line:121);`${totaloffline}` (line:122);`Failed to load data: ${error.message}` (line:788);`HTTP error! Status: ${response.status}` (line:803); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeMap1.php-
Full path:
arc/web/NetworkTreeMap1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:39 12/12/2025
Last modified:
17:47:03 03/06/2025
MD5 hash:
468cfbce8d08d577fb1fe05b51eb722f
Filesize:
48.69 KB
suspicious functions used:
`${totalonline}` (line:122);`${totaloffline}` (line:123);`Failed to load data: ${error.message}` (line:776);`HTTP error! Status: ${response.status}` (line:790); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeMap2.php-
Full path:
arc/web/NetworkTreeMap2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:39 12/12/2025
Last modified:
17:47:03 03/06/2025
MD5 hash:
6487967886178db61db1c1d6c4479af3
Filesize:
49.47 KB
suspicious functions used:
`${totalonline}` (line:122);`${totaloffline}` (line:123);`Failed to load data: ${error.message}` (line:769);`HTTP error! Status: ${response.status}` (line:783); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_onu_list_add.php-
Full path:
arc/web/networktree_device_onu_list_add.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:40 12/12/2025
Last modified:
17:47:03 03/06/2025
MD5 hash:
23aa4b30ff4514610497db10c8490003
Filesize:
16.07 KB
suspicious functions used:
shell_exec (line:31);`network_tree` WHERE `onu_mac` = '$mac_address' AND ` (line:129);`olt_pon` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND ` (line:163);shell_exec (line:198);shell_exec (line:221);shell_exec (line:238);`network_tree` WHERE `onu_mac` = '$onuMac' AND ` (line:276);shell_exec (line:302);shell_exec (line:308);shell_exec (line:319);`network_tree` WHERE `onu_mac` = '$onuMac' AND ` (line:355);`olt_pon` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND ` (line:391); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_pon_check.php-
Full path:
arc/web/networktree_device_pon_check.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:40 12/12/2025
Last modified:
17:47:03 03/06/2025
MD5 hash:
b7f8731e7d12665b418927d722340da4
Filesize:
1.58 KB
suspicious functions used:
`pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '$olt_id' AND ` (line:8); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_pon_list_add.php-
Full path:
arc/web/networktree_device_pon_list_add.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:40 12/12/2025
Last modified:
17:47:04 03/06/2025
MD5 hash:
2cf70db6a91f4c5d1821b4b5fa178ebb
Filesize:
1.38 KB
suspicious functions used:
`olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:6);`olt_pon` WHERE `olt_id` = '$olt_id' AND ` (line:10);`network_tree` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND ` (line:17); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_pon_port_onu_list.php-
Full path:
arc/web/networktree_device_pon_port_onu_list.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:40 12/12/2025
Last modified:
17:47:04 03/06/2025
MD5 hash:
6578424616a5eefb751d5e3e155adba6
Filesize:
8.63 KB
suspicious functions used:
`olt_pon` WHERE olt_id = '$olt_id' AND ` (line:25);shell_exec (line:32);shell_exec (line:45);`network_tree` WHERE onu_index_id = '$port_onu_index_id' AND ` (line:49);shell_exec (line:81);shell_exec (line:104);shell_exec (line:123);shell_exec (line:144);shell_exec (line:162);shell_exec (line:171);shell_exec (line:185); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_pon_port_sense_list.php-
Full path:
arc/web/networktree_device_pon_port_sense_list.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:40 12/12/2025
Last modified:
17:47:04 03/06/2025
MD5 hash:
4d80475d2f31f38e21239a5a1a19285f
Filesize:
3.7 KB
suspicious functions used:
`network_tree` WHERE `onu_mac` = '$onu_mac' AND ` (line:26);`network_tree` WHERE `c_id` = '{$dfhbdxf}' AND ` (line:72); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_type.php-
Full path:
arc/web/networktree_device_type.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:40 12/12/2025
Last modified:
17:47:04 03/06/2025
MD5 hash:
f1520732e5a3ef38564238a3278a1f63
Filesize:
11.43 KB
suspicious functions used:
`tree_id`) AS countolt FROM `network_tree` WHERE `olt_id` = '$olt_id_sure' AND ` (line:64); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: olt_all_onu_mac.php-
Full path:
arc/web/olt_all_onu_mac.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:40 12/12/2025
Last modified:
17:47:04 03/06/2025
MD5 hash:
bde00602b98fba3ce9f7669b0d6f0fa3
Filesize:
4.56 KB
suspicious functions used:
shell_exec (line:22);shell_exec (line:38);shell_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery.php-
Full path:
arc/web/PaymentOnlineQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
04:44:40 12/12/2025
Last modified:
17:47:12 03/06/2025
MD5 hash:
6a845f0e20c434c12eb30f42726f268d
Filesize:
28.37 KB
suspicious functions used:
curl_exec (line:457);curl_exec (line:669); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery2.php-
Full path:
arc/web/PaymentOnlineQuery2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:41 12/12/2025
Last modified:
17:47:12 03/06/2025
MD5 hash:
ccd315d11a60901b7b9029ff44f8351b
Filesize:
19.4 KB
suspicious functions used:
curl_exec (line:42);curl_exec (line:252); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentWebhook.php-
Full path:
arc/web/PaymentWebhook.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:41 12/12/2025
Last modified:
17:47:12 03/06/2025
MD5 hash:
a2f322c94787630ab1e0c8ca35fc5ba1
Filesize:
18.6 KB
suspicious functions used:
base64_decode (line:30);curl_exec (line:41);curl_exec (line:422); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SignUp1.php-
Full path:
arc/web/SignUp1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:41 12/12/2025
Last modified:
17:47:21 03/06/2025
MD5 hash:
22cdaf528a51aa44652f81cc911a85fa
Filesize:
26.63 KB
suspicious functions used:
curl_exec (line:53);curl_exec (line:75); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: sms-balance-check.php-
Full path:
arc/web/sms-balance-check.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
17:04:54 12/12/2025
Last modified:
17:47:21 03/06/2025
MD5 hash:
76d6e591039b8f16382220fec77cd3d7
Filesize:
984 B
suspicious functions used:
curl_exec (line:15); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMS.php-
Full path:
arc/web/SMS.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:42 12/12/2025
Last modified:
20:13:49 13/10/2025
MD5 hash:
a4b9558edc4422488558d72c3203040c
Filesize:
38.13 KB
suspicious functions used:
curl_exec (line:56); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMS1.php-
Full path:
arc/web/SMS1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:42 12/12/2025
Last modified:
17:47:22 03/06/2025
MD5 hash:
e4671dadf9ad575671fd3609a60030da
Filesize:
32.19 KB
suspicious functions used:
curl_exec (line:59); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMSAddSave.php-
Full path:
arc/web/SMSAddSave.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:42 12/12/2025
Last modified:
17:47:22 03/06/2025
MD5 hash:
0d2d0548df5f32e69264c4f2f1b1f76e
Filesize:
2.12 KB
suspicious functions used:
curl_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: sms_deliverey_report.php-
Full path:
arc/web/sms_deliverey_report.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
03:05:09 12/12/2025
Last modified:
17:47:25 03/06/2025
MD5 hash:
03623943da7e9334e137b38c8577fc84
Filesize:
4.25 KB
suspicious functions used:
curl_exec (line:28);curl_exec (line:53);curl_exec (line:90); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: support-action.php-
Full path:
arc/web/support-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:42 12/12/2025
Last modified:
17:47:25 03/06/2025
MD5 hash:
b8c8c56826a0a8e027a23e6a365c70a0
Filesize:
14.54 KB
suspicious functions used:
curl_exec (line:220); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tagreeexpayment.php-
Full path:
arc/web/tagreeexpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
04:44:23 12/12/2025
Last modified:
17:47:28 03/06/2025
MD5 hash:
029b4fba649a75c7c81d2f8931be8d63
Filesize:
2.86 KB
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreateagree.php-
Full path:
arc/web/tcreateagree.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
04:43:27 12/12/2025
Last modified:
17:47:28 03/06/2025
MD5 hash:
27a10adf4190edc7eceee8cf74a6b72b
Filesize:
999 B
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreatepayment.php-
Full path:
arc/web/tcreatepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:42 12/12/2025
Last modified:
17:47:28 03/06/2025
MD5 hash:
e49de9a33f5164bc2c6b88e4770faaff
Filesize:
1.07 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test2.php-
Full path:
arc/web/test2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:42 12/12/2025
Last modified:
17:47:28 03/06/2025
MD5 hash:
ab80d92ede21b7da59bfefb325484297
Filesize:
13.76 KB
suspicious functions used:
shell_exec (line:59);shell_exec (line:70);shell_exec (line:76);shell_exec (line:88);shell_exec (line:101);shell_exec (line:141);curl_exec (line:187);curl_exec (line:212);curl_exec (line:354); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test6.php-
Full path:
arc/web/test6.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:42 12/12/2025
Last modified:
17:47:28 03/06/2025
MD5 hash:
f22d022ddc284f4d8e1de3660da91db8
Filesize:
15.61 KB
suspicious functions used:
shell_exec (line:34);shell_exec (line:113);shell_exec (line:126);shell_exec (line:132); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test7.php-
Full path:
arc/web/test7.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:42 12/12/2025
Last modified:
17:47:28 03/06/2025
MD5 hash:
b11ccf951ce63a21ea0a7328316a0e5c
Filesize:
1.57 KB
suspicious functions used:
curl_exec (line:14); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test8.php-
Full path:
arc/web/test8.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:42 12/12/2025
Last modified:
17:47:28 03/06/2025
MD5 hash:
0da20f06359cae632ac4b808ab2eee77
Filesize:
3.65 KB
suspicious functions used:
shell_exec (line:48); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test9.php-
Full path:
arc/web/test9.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:42 12/12/2025
Last modified:
17:47:28 03/06/2025
MD5 hash:
87b5d5bf52fb36a8ccea006021ec8820
Filesize:
7.17 KB
suspicious functions used:
shell_exec (line:44);shell_exec (line:69);shell_exec (line:81);shell_exec (line:104);shell_exec (line:126);shell_exec (line:140);shell_exec (line:153);shell_exec (line:165);shell_exec (line:171); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: testttttt.php-
Full path:
arc/web/testttttt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:42 12/12/2025
Last modified:
17:47:28 03/06/2025
MD5 hash:
b1988a4be29e191ad935fb409a4174ee
Filesize:
2 KB
suspicious functions used:
curl_exec (line:47); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: texecutepayment.php-
Full path:
arc/web/texecutepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
04:44:39 12/12/2025
Last modified:
17:47:28 03/06/2025
MD5 hash:
623635fdf5c871391d3a5fe99ee8c543
Filesize:
2.91 KB
suspicious functions used:
curl_exec (line:24); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: time.php-
Full path:
arc/web/time.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:42 12/12/2025
Last modified:
17:47:29 03/06/2025
MD5 hash:
f72a880b38cb26f3d208bfe99eec1633
Filesize:
5.25 KB
suspicious functions used:
`${formatDistance(totalDistance)}` (line:121);`${Math.round(distance)} m`, `${(distance / 1000).toFixed(2)} km` (line:150); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tis-news.php-
Full path:
arc/web/tis-news.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
17:04:54 12/12/2025
Last modified:
17:47:29 03/06/2025
MD5 hash:
ed23ca98b77c5321b4485e85eb2ea64d
Filesize:
3.67 KB
suspicious functions used:
curl_exec (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
arc/web/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:42 12/12/2025
Last modified:
17:47:29 03/06/2025
MD5 hash:
7d8e71ceda3ffb74623e0c4a814715af
Filesize:
1.53 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tt.php-
Full path:
arc/web/tt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:42 12/12/2025
Last modified:
17:47:30 03/06/2025
MD5 hash:
9c4ed141cb79fdc7e807b35923c91a20
Filesize:
1.56 KB
suspicious functions used:
curl_exec (line:30); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ttoken.php-
Full path:
arc/web/ttoken.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
18:18:01 12/12/2025
Last modified:
17:47:30 03/06/2025
MD5 hash:
5f2c51c1db5b0defadfb67ce25c0098f
Filesize:
1.54 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: UserAccess.php-
Full path:
arc/web/UserAccess.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:42 12/12/2025
Last modified:
17:47:31 03/06/2025
MD5 hash:
a3c12b17bcb2c8035cfa045807797ae6
Filesize:
10.45 KB
suspicious functions used:
`.modulecheckboxx[data-group="${group}"]` (line:159); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: UserLoginReport.php-
Full path:
arc/web/UserLoginReport.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:43 12/12/2025
Last modified:
17:47:32 03/06/2025
MD5 hash:
43d95cc2a57279f23f52d11581c9427f
Filesize:
7.76 KB
suspicious functions used:
curl_exec (line:120); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook.php-
Full path:
arc/web/webhook.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:43 12/12/2025
Last modified:
17:47:32 03/06/2025
MD5 hash:
69a88ae1be0ab3ab1c7c971c72c0b025
Filesize:
21.93 KB
suspicious functions used:
base64_decode (line:28);curl_exec (line:39);curl_exec (line:465); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook_cid.php-
Full path:
arc/web/webhook_cid.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:43 12/12/2025
Last modified:
17:47:32 03/06/2025
MD5 hash:
1a2672fc0dd81a9c831e3fa60ec860e1
Filesize:
21.52 KB
suspicious functions used:
base64_decode (line:29);curl_exec (line:40);curl_exec (line:439); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook_test.php-
Full path:
arc/web/webhook_test.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:43 12/12/2025
Last modified:
17:47:32 03/06/2025
MD5 hash:
74a7dcc262d7fe7f2bdc9e0595d03837
Filesize:
4.69 KB
suspicious functions used:
base64_decode (line:22);curl_exec (line:33);curl_exec (line:86);curl_exec (line:107); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
arc/web/bkasht/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:43 12/12/2025
Last modified:
17:47:37 03/06/2025
MD5 hash:
a4ba6e7683f558dc3602dacd7ddeded2
Filesize:
1.36 KB
suspicious functions used:
curl_exec (line:29); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
arc/web/bkasht/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:43 12/12/2025
Last modified:
17:47:37 03/06/2025
MD5 hash:
aad462fbca9f9a36649a197d67403098
Filesize:
1.27 KB
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: grant.php-
Full path:
arc/web/bkasht/grant.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:43 12/12/2025
Last modified:
17:47:37 03/06/2025
MD5 hash:
da5499d260dc78ea4fcd71227cc6c484
Filesize:
2.01 KB
suspicious functions used:
curl_exec (line:41);curl_exec (line:63); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: query.php-
Full path:
arc/web/bkasht/query.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:43 12/12/2025
Last modified:
17:47:37 03/06/2025
MD5 hash:
f3ed9045f3a073e2cdc8561d500bda89
Filesize:
1.65 KB
suspicious functions used:
curl_exec (line:33); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
arc/web/bkasht/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:43 12/12/2025
Last modified:
17:47:37 03/06/2025
MD5 hash:
f50b33eeb31927b2c081195618d48b8d
Filesize:
1.88 KB
suspicious functions used:
curl_exec (line:48); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: trxID.php-
Full path:
arc/web/bkasht/trxID.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:43 12/12/2025
Last modified:
17:47:37 03/06/2025
MD5 hash:
9bcb8e70728fd25807c4db8916166d74
Filesize:
1.44 KB
suspicious functions used:
curl_exec (line:31); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: class.phpmailer.php-
Full path:
arc/web/email/class.phpmailer.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:43 12/12/2025
Last modified:
17:47:38 03/06/2025
MD5 hash:
68468d69b47fffecc89df57e27c5a781
Filesize:
143.32 KB
suspicious functions used:
`$DKIM_private` (line:428);popen (line:1387);popen (line:1408);base64_decode (line:3410);`$mail->set('SMTPSecure', 'tls');` (line:3688);`$mail->SMTPSecure = 'tls';` (line:3690); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: class.smtp.php-
Full path:
arc/web/email/class.smtp.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:44 12/12/2025
Last modified:
17:47:38 03/06/2025
MD5 hash:
aa8478329268e5438a4469c268337a10
Filesize:
41.44 KB
suspicious functions used:
base64_decode (line:513);base64_decode (line:533); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: jqgrid.php-
Full path:
arc/web/inc/jqgrid.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:44 12/12/2025
Last modified:
17:47:44 03/06/2025
MD5 hash:
71027a29e71e0626d8b57cbb631e6d98
Filesize:
23.92 KB
suspicious functions used:
eval (line:397); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: JSON.php-
Full path:
arc/web/inc/JSON.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:44 12/12/2025
Last modified:
17:47:44 03/06/2025
MD5 hash:
f5a34509e06231308becbe320ade9ff6
Filesize:
33.22 KB
suspicious functions used:
eval (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: smsapicore.php-
Full path:
arc/web/include/smsapicore.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
04:44:40 12/12/2025
Last modified:
20:13:47 13/10/2025
MD5 hash:
12443208d9b75ed7fe63016e5ce6fe97
Filesize:
1.66 KB
suspicious functions used:
curl_exec (line:36);curl_exec (line:48); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: telegramapicore.php-
Full path:
arc/web/include/telegramapicore.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:45 12/12/2025
Last modified:
17:47:45 03/06/2025
MD5 hash:
511f56e6dfcf4e9e7a11259e023ca3ae
Filesize:
3.15 KB
suspicious functions used:
curl_exec (line:68); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ui.php-
Full path:
arc/web/js/tinymce/themes/advanced/skins/highcontrast/ui.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
15:35:31 12/12/2025
Last modified:
17:48:05 03/06/2025
MD5 hash:
3edaf67be8573b86686f46bbba4f058c
Filesize:
4.53 KB
suspicious functions used:
curl_exec (line:20);`bill_amount` = '0.00' WHERE bill_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY ` (line:53);`bill_amount` = '0.00', days = '0.00' WHERE entry_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY ` (line:54);`payment` WHERE `pay_date` < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND pay_amount != '0.00' ORDER BY ` (line:55);curl_exec (line:146);curl_exec (line:168); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Changes.txt-
Full path:
arc/web/js/jqgrid/js/Changes.txt
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:45 12/12/2025
Last modified:
17:47:57 03/06/2025
MD5 hash:
c0a4adbc3f1c6d592cb4fa8433fee9ea
Filesize:
44.32 KB
suspicious functions used:
system (line:87); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Changes.txt-
Full path:
an/m/js/jqgrid/js/Changes.txt
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:45 12/12/2025
Last modified:
02:12:58 27/08/2023
MD5 hash:
c0a4adbc3f1c6d592cb4fa8433fee9ea
Filesize:
44.32 KB
suspicious functions used:
system (line:87); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
an/m/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:45 12/12/2025
Last modified:
02:12:02 27/08/2023
MD5 hash:
7d8e71ceda3ffb74623e0c4a814715af
Filesize:
1.53 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery.php-
Full path:
an/m/PaymentOnlineQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
11:46:57 12/12/2025
Last modified:
02:12:01 27/08/2023
MD5 hash:
5e63b1f647ca3509509beda8102d5c40
Filesize:
16.65 KB
suspicious functions used:
curl_exec (line:287);curl_exec (line:382); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ttoken.php-
Full path:
an/m/ttoken.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
04:54:11 12/12/2025
Last modified:
02:12:02 27/08/2023
MD5 hash:
5f2c51c1db5b0defadfb67ce25c0098f
Filesize:
1.54 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
an/m/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:46 12/12/2025
Last modified:
02:12:00 27/08/2023
MD5 hash:
05132f436e56ff2164ecc165347219ae
Filesize:
1.71 KB
suspicious functions used:
curl_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
an/m/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:46 12/12/2025
Last modified:
02:12:00 27/08/2023
MD5 hash:
9a3f22521ad987e86f84c4f5f688d5b7
Filesize:
713 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index.php-
Full path:
an/m/index.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:32:49 12/12/2025
Last modified:
23:30:25 03/10/2023
MD5 hash:
488549d8551f66f872c47e45201ee5b7
Filesize:
11.85 KB
suspicious functions used:
base64_decode (line:10);curl_exec (line:206); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec.php-
Full path:
an/m/login_exec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:46 12/12/2025
Last modified:
06:36:19 01/03/2024
MD5 hash:
1f800365ef270564df77d30c1bfd7ed3
Filesize:
5.4 KB
suspicious functions used:
curl_exec (line:66); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec1.php-
Full path:
an/m/login_exec1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:46 12/12/2025
Last modified:
02:12:00 27/08/2023
MD5 hash:
4ab4155763d3c6a8ea772996a5765a94
Filesize:
4.28 KB
suspicious functions used:
curl_exec (line:61); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery2.php-
Full path:
an/m/PaymentOnlineQuery2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:46 12/12/2025
Last modified:
02:12:01 27/08/2023
MD5 hash:
48588dfbb812b9e8102af40dc401032c
Filesize:
19.04 KB
suspicious functions used:
curl_exec (line:41);curl_exec (line:254); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tagreeexpayment.php-
Full path:
an/m/tagreeexpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
13:20:34 12/12/2025
Last modified:
02:12:02 27/08/2023
MD5 hash:
c95e3ee881752db67b4f3597bc58430a
Filesize:
2.46 KB
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreateagree.php-
Full path:
an/m/tcreateagree.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
13:20:14 12/12/2025
Last modified:
02:12:02 27/08/2023
MD5 hash:
27a10adf4190edc7eceee8cf74a6b72b
Filesize:
999 B
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreatepayment.php-
Full path:
an/m/tcreatepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
04:54:59 12/12/2025
Last modified:
02:12:02 27/08/2023
MD5 hash:
e49de9a33f5164bc2c6b88e4770faaff
Filesize:
1.07 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: texecutepayment.php-
Full path:
an/m/texecutepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
04:55:09 12/12/2025
Last modified:
02:12:02 27/08/2023
MD5 hash:
efbb63dfcfdacb52dec74bffc389bbb3
Filesize:
2.67 KB
suspicious functions used:
curl_exec (line:24); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: class.phpmailer.php-
Full path:
an/web/email/class.phpmailer.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:47 12/12/2025
Last modified:
02:13:36 27/08/2023
MD5 hash:
68468d69b47fffecc89df57e27c5a781
Filesize:
143.32 KB
suspicious functions used:
`$DKIM_private` (line:428);popen (line:1387);popen (line:1408);base64_decode (line:3410);`$mail->set('SMTPSecure', 'tls');` (line:3688);`$mail->SMTPSecure = 'tls';` (line:3690); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: class.smtp.php-
Full path:
an/web/email/class.smtp.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:47 12/12/2025
Last modified:
02:13:36 27/08/2023
MD5 hash:
aa8478329268e5438a4469c268337a10
Filesize:
41.44 KB
suspicious functions used:
base64_decode (line:513);base64_decode (line:533); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: JSON.php-
Full path:
an/web/inc/JSON.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:48 12/12/2025
Last modified:
02:13:40 27/08/2023
MD5 hash:
f5a34509e06231308becbe320ade9ff6
Filesize:
33.22 KB
suspicious functions used:
eval (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: jqgrid.php-
Full path:
an/web/inc/jqgrid.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:48 12/12/2025
Last modified:
02:14:00 27/08/2023
MD5 hash:
71027a29e71e0626d8b57cbb631e6d98
Filesize:
23.92 KB
suspicious functions used:
eval (line:397); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: smsapicore.php-
Full path:
an/web/include/smsapicore.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:02:13 12/12/2025
Last modified:
06:09:56 01/03/2024
MD5 hash:
0afbabc581e2e88f2883e249f83847a4
Filesize:
891 B
suspicious functions used:
curl_exec (line:13); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: telegramapicore.php-
Full path:
an/web/include/telegramapicore.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
16:28:28 12/12/2025
Last modified:
02:13:40 27/08/2023
MD5 hash:
c669b81806a80fae7f84959c253cc737
Filesize:
2.44 KB
suspicious functions used:
curl_exec (line:54); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Changes.txt-
Full path:
an/web/js/jqgrid/js/Changes.txt
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:48 12/12/2025
Last modified:
02:13:55 27/08/2023
MD5 hash:
c0a4adbc3f1c6d592cb4fa8433fee9ea
Filesize:
44.32 KB
suspicious functions used:
system (line:87); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: AutoActiveClientsCount1.php-
Full path:
an/web/AutoActiveClientsCount1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
13:24:24 12/12/2025
Last modified:
00:47:49 01/11/2023
MD5 hash:
f0219eb658570bd65b6ba7a76957f471
Filesize:
4.36 KB
suspicious functions used:
system (line:52); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Network.php-
Full path:
an/web/Network.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:51 12/12/2025
Last modified:
02:13:23 27/08/2023
MD5 hash:
53a3aa3ebd6ffd1176e0bde0e6e254f0
Filesize:
22.76 KB
suspicious functions used:
system (line:208); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: InstrumentsStoreOutDetails.php-
Full path:
an/web/InstrumentsStoreOutDetails.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:51 12/12/2025
Last modified:
02:13:20 27/08/2023
MD5 hash:
ab68ab13bcfd51da15e72a3d4e9817e8
Filesize:
9.37 KB
suspicious functions used:
`update_date`, '%D-%b, %y') AS offdate, TIME_FORMAT(`update_time`, '%T') AS offtime FROM `con_sts_log` WHERE `c_id` = '{$row['c_id']}' AND con_sts = 'Inactive' ORDER BY ` (line:120); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkLoad.php-
Full path:
an/web/NetworkLoad.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:51 12/12/2025
Last modified:
02:13:24 27/08/2023
MD5 hash:
e1632e66ee1b7394d3fb82751b924abe
Filesize:
2.83 KB
suspicious functions used:
system (line:81); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentWebhook.php-
Full path:
an/web/PaymentWebhook.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:51 12/12/2025
Last modified:
08:32:04 01/03/2024
MD5 hash:
a2f322c94787630ab1e0c8ca35fc5ba1
Filesize:
18.6 KB
suspicious functions used:
base64_decode (line:30);curl_exec (line:41);curl_exec (line:422); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMS.php-
Full path:
an/web/SMS.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:51 12/12/2025
Last modified:
04:05:02 13/10/2023
MD5 hash:
bf70b20b52d2d20d1512a07ea29510d0
Filesize:
29 KB
suspicious functions used:
curl_exec (line:53); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery.php-
Full path:
an/web/PaymentOnlineQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
15:28:35 12/12/2025
Last modified:
02:13:26 27/08/2023
MD5 hash:
eb93c751e05e717a544d27f8dd6ef768
Filesize:
23.99 KB
suspicious functions used:
curl_exec (line:456);curl_exec (line:560); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery2.php-
Full path:
an/web/PaymentOnlineQuery2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:53 12/12/2025
Last modified:
02:13:26 27/08/2023
MD5 hash:
138b87d49f0613b02cb61abace637606
Filesize:
19.39 KB
suspicious functions used:
curl_exec (line:43);curl_exec (line:253); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMSAddSave.php-
Full path:
an/web/SMSAddSave.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:53 12/12/2025
Last modified:
02:13:30 27/08/2023
MD5 hash:
5e8b43b3bc2febe3a611a5bd9aa8fc28
Filesize:
1.71 KB
suspicious functions used:
curl_exec (line:34); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: emp_salary_advence_find.php-
Full path:
an/web/emp_salary_advence_find.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:54 12/12/2025
Last modified:
02:13:19 27/08/2023
MD5 hash:
8cb12a79d5e1d31d92670d721dabb5aa
Filesize:
2.25 KB
suspicious functions used:
`expanse` WHERE `type` = '2' AND `status` = '2' AND ex_by = '$e_id' AND MONTH(`, `) = MONTH('$lastmonth') AND YEAR(`, `) = YEAR('$lastmonth') GROUP BY ` (line:8);`e_id` = '$e_id' AND ` (line:12); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: company_info.php-
Full path:
an/web/company_info.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:38:50 12/12/2025
Last modified:
13:01:07 09/04/2024
MD5 hash:
6760a9ee088b4b5dfaad69ff7c1100e0
Filesize:
7.51 KB
suspicious functions used:
curl_exec (line:119); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
an/web/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:54 12/12/2025
Last modified:
02:13:18 27/08/2023
MD5 hash:
c8a7ce9b69ebed3509cee2952c04cb0c
Filesize:
1.7 KB
suspicious functions used:
curl_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_all.php-
Full path:
an/web/cron_all.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:54 12/12/2025
Last modified:
08:04:17 01/03/2024
MD5 hash:
b19a08fef36584598cca299b7ecc5e6d
Filesize:
2.07 KB
suspicious functions used:
curl_exec (line:23);curl_exec (line:38);curl_exec (line:53); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: imagevwr.php-
Full path:
an/web/imagevwr.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
06:37:44 12/12/2025
Last modified:
07:19:17 25/05/2024
MD5 hash:
47a223a13cc642d01dcfaaca542d396d
Filesize:
915 B
suspicious functions used:
curl_exec (line:15); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_gen_bill.php-
Full path:
an/web/cron_auto_gen_bill.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:54 12/12/2025
Last modified:
08:04:51 01/03/2024
MD5 hash:
eadec12eb6484d0069e5d0d320725a75
Filesize:
4.73 KB
suspicious functions used:
curl_exec (line:140);curl_exec (line:149); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive.php-
Full path:
an/web/cron_auto_inactive.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
04:15:02 12/12/2025
Last modified:
08:05:50 01/03/2024
MD5 hash:
288e83bc1578b0992ae1ab75eb328bc2
Filesize:
5.75 KB
suspicious functions used:
curl_exec (line:151); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive2.php-
Full path:
an/web/cron_auto_inactive2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:54 12/12/2025
Last modified:
02:13:19 27/08/2023
MD5 hash:
a6a713d414c4e0632f4fe69f68b77d53
Filesize:
6.28 KB
suspicious functions used:
curl_exec (line:158); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
an/web/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:54 12/12/2025
Last modified:
02:13:19 27/08/2023
MD5 hash:
c46a50905333286f45dfeacf010851ab
Filesize:
716 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive_termination.php-
Full path:
an/web/cron_auto_inactive_termination.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
18:12:01 12/12/2025
Last modified:
12:17:52 23/09/2024
MD5 hash:
ee38a77a78391fe4323d470248cff87d
Filesize:
6.81 KB
suspicious functions used:
curl_exec (line:124);curl_exec (line:142); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_termination_remainder1.php-
Full path:
an/web/cron_auto_termination_remainder1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:54 12/12/2025
Last modified:
08:31:04 01/03/2024
MD5 hash:
9fd6a3aa4bc5fc43cf8b40b9c4ff19b6
Filesize:
3.23 KB
suspicious functions used:
curl_exec (line:83); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_client_bandwidth_count.php-
Full path:
an/web/cron_client_bandwidth_count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
09:33:55 12/12/2025
Last modified:
22:13:58 01/04/2024
MD5 hash:
de3b1389261cf5411b7e7ca5c44f96b2
Filesize:
4.08 KB
suspicious functions used:
curl_exec (line:117); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_network.php-
Full path:
an/web/cron_network.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:54 12/12/2025
Last modified:
02:13:19 27/08/2023
MD5 hash:
d7ae8ca3db81dce0960bb9840cb5aeee
Filesize:
4.14 KB
suspicious functions used:
curl_exec (line:41);curl_exec (line:59); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index.php-
Full path:
an/web/index.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
13:35:40 12/12/2025
Last modified:
23:30:34 03/10/2023
MD5 hash:
b59de72043fddaa4207dc0d685fa5e87
Filesize:
12.01 KB
suspicious functions used:
base64_decode (line:10);curl_exec (line:211); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ttoken.php-
Full path:
an/web/ttoken.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
06:40:50 12/12/2025
Last modified:
02:13:32 27/08/2023
MD5 hash:
5f2c51c1db5b0defadfb67ce25c0098f
Filesize:
1.54 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook.php-
Full path:
an/web/webhook.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:54 12/12/2025
Last modified:
09:21:21 01/03/2024
MD5 hash:
6ea5abfa2b22d299ea68b666eaa57701
Filesize:
20.98 KB
suspicious functions used:
base64_decode (line:28);curl_exec (line:39);curl_exec (line:427); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook_test.php-
Full path:
an/web/webhook_test.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:54 12/12/2025
Last modified:
02:13:34 27/08/2023
MD5 hash:
74a7dcc262d7fe7f2bdc9e0595d03837
Filesize:
4.69 KB
suspicious functions used:
base64_decode (line:22);curl_exec (line:33);curl_exec (line:86);curl_exec (line:107); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ip-ping-checker.php-
Full path:
an/web/ip-ping-checker.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:54 12/12/2025
Last modified:
02:13:21 27/08/2023
MD5 hash:
0d28f3053b73b3fe2885cf519ee17c12
Filesize:
2.64 KB
suspicious functions used:
curl_exec (line:81); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec.php-
Full path:
an/web/login_exec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
08:09:47 12/12/2025
Last modified:
06:36:20 01/03/2024
MD5 hash:
8e5caeac6dd5efb18009f8718af713ce
Filesize:
5.39 KB
suspicious functions used:
curl_exec (line:66); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec1.php-
Full path:
an/web/login_exec1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:54 12/12/2025
Last modified:
02:13:21 27/08/2023
MD5 hash:
4f75b914e1b47a355be8cbc73e4e1407
Filesize:
3.91 KB
suspicious functions used:
curl_exec (line:53); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tagreeexpayment.php-
Full path:
an/web/tagreeexpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:54 12/12/2025
Last modified:
02:13:31 27/08/2023
MD5 hash:
029b4fba649a75c7c81d2f8931be8d63
Filesize:
2.86 KB
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreateagree.php-
Full path:
an/web/tcreateagree.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
14:51:12 12/12/2025
Last modified:
02:13:31 27/08/2023
MD5 hash:
27a10adf4190edc7eceee8cf74a6b72b
Filesize:
999 B
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreatepayment.php-
Full path:
an/web/tcreatepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
15:28:07 12/12/2025
Last modified:
02:13:31 27/08/2023
MD5 hash:
e49de9a33f5164bc2c6b88e4770faaff
Filesize:
1.07 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test3.php-
Full path:
an/web/test3.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:54 12/12/2025
Last modified:
02:13:32 27/08/2023
MD5 hash:
73a48fe113b432b1786e7a15406cc14d
Filesize:
1.26 KB
suspicious functions used:
`Counter: ${seconds}s` (line:29); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: testttttt.php-
Full path:
an/web/testttttt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:54 12/12/2025
Last modified:
10:27:25 04/10/2023
MD5 hash:
b1988a4be29e191ad935fb409a4174ee
Filesize:
2 KB
suspicious functions used:
curl_exec (line:47); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: texecutepayment.php-
Full path:
an/web/texecutepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
15:28:34 12/12/2025
Last modified:
02:13:32 27/08/2023
MD5 hash:
623635fdf5c871391d3a5fe99ee8c543
Filesize:
2.91 KB
suspicious functions used:
curl_exec (line:24); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tis-news.php-
Full path:
an/web/tis-news.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
13:24:24 12/12/2025
Last modified:
07:55:40 09/04/2024
MD5 hash:
ed23ca98b77c5321b4485e85eb2ea64d
Filesize:
3.67 KB
suspicious functions used:
curl_exec (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
an/web/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:54 12/12/2025
Last modified:
02:13:32 27/08/2023
MD5 hash:
7d8e71ceda3ffb74623e0c4a814715af
Filesize:
1.53 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: sms_deliverey_report.php-
Full path:
an/web/sms_deliverey_report.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:55 12/12/2025
Last modified:
02:13:31 27/08/2023
MD5 hash:
15eda78f2292f68b63aae44e6207e0d8
Filesize:
2.96 KB
suspicious functions used:
`api_id` != '' AND `delivery_report` != 'DELIVRD' AND `delivery_report` = '' or `delivery_report` = 'SENT' or `delivery_report` = 'PENDING' AND c_cell REGEXP '^-?[0-9]+$' ORDER BY ` (line:8);curl_exec (line:18);curl_exec (line:41); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: config.php-
Full path:
apk/app1_06/config.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:55 12/12/2025
Last modified:
06:28:50 07/10/2025
MD5 hash:
4648bcc36e30f684d330237f516d96bf
Filesize:
12.72 KB
suspicious functions used:
curl_exec (line:181); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: firebase.php-
Full path:
apk/app1_06/firebase.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:55 12/12/2025
Last modified:
06:28:50 07/10/2025
MD5 hash:
a77679c3acb80aa4799ebb6ae4cecdc5
Filesize:
1.63 KB
suspicious functions used:
curl_exec (line:54); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: get-access-token.php-
Full path:
apk/app1_06/get-access-token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:55 12/12/2025
Last modified:
06:28:50 07/10/2025
MD5 hash:
8520980eec76b36dfd9ea9ae516abea4
Filesize:
1.91 KB
suspicious functions used:
curl_exec (line:21); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: get_client_profile_data.php-
Full path:
apk/app1_06/get_client_profile_data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:55 12/12/2025
Last modified:
06:28:50 07/10/2025
MD5 hash:
7e94655fb0d810611c2f7acfd34d9ebe
Filesize:
15.48 KB
suspicious functions used:
curl_exec (line:258); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: get_menu.php-
Full path:
apk/app1_06/get_menu.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:55 12/12/2025
Last modified:
06:28:51 07/10/2025
MD5 hash:
de3f414f87b762ba8f452c23f4eeff96
Filesize:
597 B
suspicious functions used:
`module_name` FROM module AS m WHERE m.{$user_type} in (1,2) AND m.sts = '0' AND m.id != '1' AND m.apk_sts = '1' ORDER BY ` (line:5); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: loginexec.php-
Full path:
apk/app1_06/loginexec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:55 12/12/2025
Last modified:
06:28:51 07/10/2025
MD5 hash:
4def8d42f99517138a3e62ed7383b7e5
Filesize:
22.62 KB
suspicious functions used:
curl_exec (line:32);curl_exec (line:93);`module_name` FROM module AS m WHERE m.{$user['user_type']} in (1,2) AND m.sts = '0' AND m.id != '1' AND m.apk_sts = '1' ORDER BY ` (line:177);curl_exec (line:259);`module_name` FROM module AS m WHERE m.{$user['user_type']} in (1,2) AND m.sts = '0' AND m.id != '1' AND m.apk_sts = '1' ORDER BY ` (line:365); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: MkOnlineClientsCount.php-
Full path:
apk/app1_06/MkOnlineClientsCount.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:55 12/12/2025
Last modified:
06:28:51 07/10/2025
MD5 hash:
50c406e2a7c257e527b5e576953891d7
Filesize:
3.33 KB
suspicious functions used:
system (line:59); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-snmp-data.php-
Full path:
apk/app1_06/netowrk-snmp-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:55 12/12/2025
Last modified:
06:28:51 07/10/2025
MD5 hash:
a40cef6f73a1b0d366b2279f311d0a3d
Filesize:
15.48 KB
suspicious functions used:
shell_exec (line:202); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test.php-
Full path:
apk/app1_06/test.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:55 12/12/2025
Last modified:
06:28:51 07/10/2025
MD5 hash:
032c899b8d1dd401bc8860bab767dc76
Filesize:
1.64 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: update_user_data.php-
Full path:
apk/app1_06/update_user_data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:55 12/12/2025
Last modified:
06:28:51 07/10/2025
MD5 hash:
aa7f59cfb94fb99ad83237f968ee7735
Filesize:
2.92 KB
suspicious functions used:
base64_decode (line:46); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: telegramapicore.php-
Full path:
apk/app1_06/include/telegramapicore.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:55 12/12/2025
Last modified:
06:28:52 07/10/2025
MD5 hash:
8aad7289dbd57ea5be261edec2bbfec7
Filesize:
3.16 KB
suspicious functions used:
curl_exec (line:68); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: config.php-
Full path:
apk/app1_08/config.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
14:02:25 12/12/2025
Last modified:
02:15:39 29/10/2025
MD5 hash:
7091feb7ad9116cf23972130ad202fd3
Filesize:
12.25 KB
suspicious functions used:
curl_exec (line:152); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: firebase.php-
Full path:
apk/app1_08/firebase.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:27:12 12/12/2025
Last modified:
06:47:53 14/10/2025
MD5 hash:
a77679c3acb80aa4799ebb6ae4cecdc5
Filesize:
1.63 KB
suspicious functions used:
curl_exec (line:54); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: get-access-token.php-
Full path:
apk/app1_08/get-access-token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:27:12 12/12/2025
Last modified:
06:47:53 14/10/2025
MD5 hash:
8520980eec76b36dfd9ea9ae516abea4
Filesize:
1.91 KB
suspicious functions used:
curl_exec (line:21); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: get_client_profile_data.php-
Full path:
apk/app1_08/get_client_profile_data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
04:12:11 12/12/2025
Last modified:
06:47:54 14/10/2025
MD5 hash:
7e94655fb0d810611c2f7acfd34d9ebe
Filesize:
15.48 KB
suspicious functions used:
curl_exec (line:258); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: get_menu.php-
Full path:
apk/app1_08/get_menu.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
16:06:10 12/12/2025
Last modified:
06:47:54 14/10/2025
MD5 hash:
de3f414f87b762ba8f452c23f4eeff96
Filesize:
597 B
suspicious functions used:
`module_name` FROM module AS m WHERE m.{$user_type} in (1,2) AND m.sts = '0' AND m.id != '1' AND m.apk_sts = '1' ORDER BY ` (line:5); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: loginexec.php-
Full path:
apk/app1_08/loginexec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
16:06:09 12/12/2025
Last modified:
06:47:54 14/10/2025
MD5 hash:
4def8d42f99517138a3e62ed7383b7e5
Filesize:
22.62 KB
suspicious functions used:
curl_exec (line:32);curl_exec (line:93);`module_name` FROM module AS m WHERE m.{$user['user_type']} in (1,2) AND m.sts = '0' AND m.id != '1' AND m.apk_sts = '1' ORDER BY ` (line:177);curl_exec (line:259);`module_name` FROM module AS m WHERE m.{$user['user_type']} in (1,2) AND m.sts = '0' AND m.id != '1' AND m.apk_sts = '1' ORDER BY ` (line:365); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: MkOnlineClientsCount.php-
Full path:
apk/app1_08/MkOnlineClientsCount.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
06:51:21 12/12/2025
Last modified:
06:47:54 14/10/2025
MD5 hash:
50c406e2a7c257e527b5e576953891d7
Filesize:
3.33 KB
suspicious functions used:
system (line:59); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-snmp-data.php-
Full path:
apk/app1_08/netowrk-snmp-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:55 12/12/2025
Last modified:
06:47:55 14/10/2025
MD5 hash:
a40cef6f73a1b0d366b2279f311d0a3d
Filesize:
15.48 KB
suspicious functions used:
shell_exec (line:202); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test.php-
Full path:
apk/app1_08/test.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:56 12/12/2025
Last modified:
06:47:55 14/10/2025
MD5 hash:
032c899b8d1dd401bc8860bab767dc76
Filesize:
1.64 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: update_user_data.php-
Full path:
apk/app1_08/update_user_data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:56 12/12/2025
Last modified:
06:47:55 14/10/2025
MD5 hash:
aa7f59cfb94fb99ad83237f968ee7735
Filesize:
2.92 KB
suspicious functions used:
base64_decode (line:46); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: telegramapicore.php-
Full path:
apk/app1_08/include/telegramapicore.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:56 12/12/2025
Last modified:
06:47:55 14/10/2025
MD5 hash:
8aad7289dbd57ea5be261edec2bbfec7
Filesize:
3.16 KB
suspicious functions used:
curl_exec (line:68); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: config.php-
Full path:
apk/app1_10/config.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:56 12/12/2025
Last modified:
03:59:05 08/11/2025
MD5 hash:
fa5f130e082d0fc8c43315aa57fd5441
Filesize:
11.92 KB
suspicious functions used:
curl_exec (line:154); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: firebase.php-
Full path:
apk/app1_10/firebase.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:56 12/12/2025
Last modified:
16:37:45 29/10/2025
MD5 hash:
a77679c3acb80aa4799ebb6ae4cecdc5
Filesize:
1.63 KB
suspicious functions used:
curl_exec (line:54); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: get-access-token.php-
Full path:
apk/app1_10/get-access-token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:56 12/12/2025
Last modified:
16:37:45 29/10/2025
MD5 hash:
8520980eec76b36dfd9ea9ae516abea4
Filesize:
1.91 KB
suspicious functions used:
curl_exec (line:21); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: get_clients_list.php-
Full path:
apk/app1_10/get_clients_list.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:56 12/12/2025
Last modified:
17:05:45 06/11/2025
MD5 hash:
faf49b1fb74551546c59e2d40d86c771
Filesize:
20.97 KB
suspicious functions used:
curl_exec (line:55); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: get_client_profile_data.php-
Full path:
apk/app1_10/get_client_profile_data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:56 12/12/2025
Last modified:
16:37:45 29/10/2025
MD5 hash:
7e94655fb0d810611c2f7acfd34d9ebe
Filesize:
15.48 KB
suspicious functions used:
curl_exec (line:258); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: get_menu.php-
Full path:
apk/app1_10/get_menu.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:56 12/12/2025
Last modified:
06:12:01 02/11/2025
MD5 hash:
6e99f796fa7b9b73fefa5c03c9ada45e
Filesize:
871 B
suspicious functions used:
`module_name` FROM module AS m WHERE m.{$user_type} in (1,2) AND m.sts = '0' AND m.id != '1' AND m.apk_sts = '1' ORDER BY ` (line:5);curl_exec (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: loginexec.php-
Full path:
apk/app1_10/loginexec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:56 12/12/2025
Last modified:
02:26:19 08/11/2025
MD5 hash:
f4c00dde2c5487271532545a4882e600
Filesize:
22.77 KB
suspicious functions used:
curl_exec (line:32);curl_exec (line:93);`module_name` FROM module AS m WHERE m.{$user['user_type']} in (1,2) AND m.sts = '0' AND m.id != '1' AND m.apk_sts = '1' ORDER BY ` (line:177);curl_exec (line:259);`module_name` FROM module AS m WHERE m.{$user['user_type']} in (1,2) AND m.sts = '0' AND m.id != '1' AND m.apk_sts = '1' ORDER BY ` (line:365); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-snmp-data.php-
Full path:
apk/app1_10/netowrk-snmp-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:56 12/12/2025
Last modified:
16:37:47 29/10/2025
MD5 hash:
a40cef6f73a1b0d366b2279f311d0a3d
Filesize:
15.48 KB
suspicious functions used:
shell_exec (line:202); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test.php-
Full path:
apk/app1_10/test.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:56 12/12/2025
Last modified:
16:37:47 29/10/2025
MD5 hash:
032c899b8d1dd401bc8860bab767dc76
Filesize:
1.64 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: update_user_data.php-
Full path:
apk/app1_10/update_user_data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:56 12/12/2025
Last modified:
16:37:47 29/10/2025
MD5 hash:
aa7f59cfb94fb99ad83237f968ee7735
Filesize:
2.92 KB
suspicious functions used:
base64_decode (line:46); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: telegramapicore.php-
Full path:
apk/app1_10/include/telegramapicore.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:56 12/12/2025
Last modified:
16:37:47 29/10/2025
MD5 hash:
8aad7289dbd57ea5be261edec2bbfec7
Filesize:
3.16 KB
suspicious functions used:
curl_exec (line:68); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: get_network_online_clients_count.php-
Full path:
apk/app1_10/get_network_online_clients_count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:56 12/12/2025
Last modified:
15:05:06 09/11/2025
MD5 hash:
e174ef56827ea4768d16e99cdb8ae2fe
Filesize:
3.14 KB
suspicious functions used:
system (line:61); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: config.php-
Full path:
apk/app1_0_01/config.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
08:13:20 12/12/2025
Last modified:
02:30:58 10/11/2025
MD5 hash:
fa5f130e082d0fc8c43315aa57fd5441
Filesize:
11.92 KB
suspicious functions used:
curl_exec (line:154); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: firebase.php-
Full path:
apk/app1_0_01/firebase.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:56 12/12/2025
Last modified:
02:30:58 10/11/2025
MD5 hash:
a77679c3acb80aa4799ebb6ae4cecdc5
Filesize:
1.63 KB
suspicious functions used:
curl_exec (line:54); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: get-access-token.php-
Full path:
apk/app1_0_01/get-access-token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:56 12/12/2025
Last modified:
02:30:58 10/11/2025
MD5 hash:
8520980eec76b36dfd9ea9ae516abea4
Filesize:
1.91 KB
suspicious functions used:
curl_exec (line:21); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: get_client_profile_data.php-
Full path:
apk/app1_0_01/get_client_profile_data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
08:02:15 12/12/2025
Last modified:
02:30:58 10/11/2025
MD5 hash:
7e94655fb0d810611c2f7acfd34d9ebe
Filesize:
15.48 KB
suspicious functions used:
curl_exec (line:258); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: get_clients_list.php-
Full path:
apk/app1_0_01/get_clients_list.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
10:20:06 12/12/2025
Last modified:
02:30:58 10/11/2025
MD5 hash:
faf49b1fb74551546c59e2d40d86c771
Filesize:
20.97 KB
suspicious functions used:
curl_exec (line:55); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: get_menu.php-
Full path:
apk/app1_0_01/get_menu.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
18:10:24 12/12/2025
Last modified:
02:30:59 10/11/2025
MD5 hash:
6e99f796fa7b9b73fefa5c03c9ada45e
Filesize:
871 B
suspicious functions used:
`module_name` FROM module AS m WHERE m.{$user_type} in (1,2) AND m.sts = '0' AND m.id != '1' AND m.apk_sts = '1' ORDER BY ` (line:5);curl_exec (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: get_network_online_clients_count.php-
Full path:
apk/app1_0_01/get_network_online_clients_count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:56 12/12/2025
Last modified:
02:30:59 10/11/2025
MD5 hash:
e174ef56827ea4768d16e99cdb8ae2fe
Filesize:
3.14 KB
suspicious functions used:
system (line:61); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: loginexec.php-
Full path:
apk/app1_0_01/loginexec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:56 12/12/2025
Last modified:
02:31:00 10/11/2025
MD5 hash:
f4c00dde2c5487271532545a4882e600
Filesize:
22.77 KB
suspicious functions used:
curl_exec (line:32);curl_exec (line:93);`module_name` FROM module AS m WHERE m.{$user['user_type']} in (1,2) AND m.sts = '0' AND m.id != '1' AND m.apk_sts = '1' ORDER BY ` (line:177);curl_exec (line:259);`module_name` FROM module AS m WHERE m.{$user['user_type']} in (1,2) AND m.sts = '0' AND m.id != '1' AND m.apk_sts = '1' ORDER BY ` (line:365); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-snmp-data.php-
Full path:
apk/app1_0_01/netowrk-snmp-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:56 12/12/2025
Last modified:
13:32:31 16/11/2025
MD5 hash:
da5fcbf831017e1fcf9898fbc2d91d26
Filesize:
15.91 KB
suspicious functions used:
shell_exec (line:188); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test.php-
Full path:
apk/app1_0_01/test.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:56 12/12/2025
Last modified:
02:31:00 10/11/2025
MD5 hash:
032c899b8d1dd401bc8860bab767dc76
Filesize:
1.64 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: update_user_data.php-
Full path:
apk/app1_0_01/update_user_data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:56 12/12/2025
Last modified:
02:31:00 10/11/2025
MD5 hash:
aa7f59cfb94fb99ad83237f968ee7735
Filesize:
2.92 KB
suspicious functions used:
base64_decode (line:46); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: telegramapicore.php-
Full path:
apk/app1_0_01/include/telegramapicore.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:56 12/12/2025
Last modified:
02:31:00 10/11/2025
MD5 hash:
8aad7289dbd57ea5be261edec2bbfec7
Filesize:
3.16 KB
suspicious functions used:
curl_exec (line:68); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-snmp-data-auto.php-
Full path:
apk/app1_0_01/netowrk-snmp-data-auto.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:56 12/12/2025
Last modified:
03:52:18 16/11/2025
MD5 hash:
639f404b71aaf7ac7af43852d4aa09ed
Filesize:
9.05 KB
suspicious functions used:
shell_exec (line:74);shell_exec (line:158); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: config.php-
Full path:
apk/app1_09/config.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:56 12/12/2025
Last modified:
12:00:29 24/11/2025
MD5 hash:
fa5f130e082d0fc8c43315aa57fd5441
Filesize:
11.92 KB
suspicious functions used:
curl_exec (line:154); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: firebase.php-
Full path:
apk/app1_09/firebase.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:57 12/12/2025
Last modified:
12:00:29 24/11/2025
MD5 hash:
a77679c3acb80aa4799ebb6ae4cecdc5
Filesize:
1.63 KB
suspicious functions used:
curl_exec (line:54); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: get-access-token.php-
Full path:
apk/app1_09/get-access-token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:57 12/12/2025
Last modified:
12:00:29 24/11/2025
MD5 hash:
8520980eec76b36dfd9ea9ae516abea4
Filesize:
1.91 KB
suspicious functions used:
curl_exec (line:21); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: get_clients_list.php-
Full path:
apk/app1_09/get_clients_list.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:57 12/12/2025
Last modified:
12:00:29 24/11/2025
MD5 hash:
faf49b1fb74551546c59e2d40d86c771
Filesize:
20.97 KB
suspicious functions used:
curl_exec (line:55); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: get_client_profile_data.php-
Full path:
apk/app1_09/get_client_profile_data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:57 12/12/2025
Last modified:
12:00:29 24/11/2025
MD5 hash:
7e94655fb0d810611c2f7acfd34d9ebe
Filesize:
15.48 KB
suspicious functions used:
curl_exec (line:258); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: get_menu.php-
Full path:
apk/app1_09/get_menu.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:57 12/12/2025
Last modified:
12:00:29 24/11/2025
MD5 hash:
6e99f796fa7b9b73fefa5c03c9ada45e
Filesize:
871 B
suspicious functions used:
`module_name` FROM module AS m WHERE m.{$user_type} in (1,2) AND m.sts = '0' AND m.id != '1' AND m.apk_sts = '1' ORDER BY ` (line:5);curl_exec (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: get_network_online_clients_count.php-
Full path:
apk/app1_09/get_network_online_clients_count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:57 12/12/2025
Last modified:
12:00:29 24/11/2025
MD5 hash:
e174ef56827ea4768d16e99cdb8ae2fe
Filesize:
3.14 KB
suspicious functions used:
system (line:61); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: loginexec.php-
Full path:
apk/app1_09/loginexec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:57 12/12/2025
Last modified:
12:00:30 24/11/2025
MD5 hash:
f4c00dde2c5487271532545a4882e600
Filesize:
22.77 KB
suspicious functions used:
curl_exec (line:32);curl_exec (line:93);`module_name` FROM module AS m WHERE m.{$user['user_type']} in (1,2) AND m.sts = '0' AND m.id != '1' AND m.apk_sts = '1' ORDER BY ` (line:177);curl_exec (line:259);`module_name` FROM module AS m WHERE m.{$user['user_type']} in (1,2) AND m.sts = '0' AND m.id != '1' AND m.apk_sts = '1' ORDER BY ` (line:365); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-snmp-data.php-
Full path:
apk/app1_09/netowrk-snmp-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:57 12/12/2025
Last modified:
12:00:30 24/11/2025
MD5 hash:
a40cef6f73a1b0d366b2279f311d0a3d
Filesize:
15.48 KB
suspicious functions used:
shell_exec (line:202); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test.php-
Full path:
apk/app1_09/test.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:57 12/12/2025
Last modified:
12:00:30 24/11/2025
MD5 hash:
032c899b8d1dd401bc8860bab767dc76
Filesize:
1.64 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: update_user_data.php-
Full path:
apk/app1_09/update_user_data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:57 12/12/2025
Last modified:
12:00:30 24/11/2025
MD5 hash:
aa7f59cfb94fb99ad83237f968ee7735
Filesize:
2.92 KB
suspicious functions used:
base64_decode (line:46); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: telegramapicore.php-
Full path:
apk/app1_09/include/telegramapicore.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:57 12/12/2025
Last modified:
12:00:30 24/11/2025
MD5 hash:
8aad7289dbd57ea5be261edec2bbfec7
Filesize:
3.16 KB
suspicious functions used:
curl_exec (line:68); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: config.php-
Full path:
apk/app1_0_03/config.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
15:05:27 12/12/2025
Last modified:
09:45:25 28/11/2025
MD5 hash:
fa5f130e082d0fc8c43315aa57fd5441
Filesize:
11.92 KB
suspicious functions used:
curl_exec (line:154); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: get_clients_list.php-
Full path:
apk/app1_0_03/get_clients_list.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
20:37:08 11/12/2025
Last modified:
09:45:25 28/11/2025
MD5 hash:
faf49b1fb74551546c59e2d40d86c771
Filesize:
20.97 KB
suspicious functions used:
curl_exec (line:55); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: firebase.php-
Full path:
apk/app1_0_03/firebase.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:57 12/12/2025
Last modified:
09:45:25 28/11/2025
MD5 hash:
a77679c3acb80aa4799ebb6ae4cecdc5
Filesize:
1.63 KB
suspicious functions used:
curl_exec (line:54); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: get-access-token.php-
Full path:
apk/app1_0_03/get-access-token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:57 12/12/2025
Last modified:
09:45:25 28/11/2025
MD5 hash:
8520980eec76b36dfd9ea9ae516abea4
Filesize:
1.91 KB
suspicious functions used:
curl_exec (line:21); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: get_client_profile_data.php-
Full path:
apk/app1_0_03/get_client_profile_data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:57 12/12/2025
Last modified:
09:45:25 28/11/2025
MD5 hash:
7e94655fb0d810611c2f7acfd34d9ebe
Filesize:
15.48 KB
suspicious functions used:
curl_exec (line:258); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: get_menu.php-
Full path:
apk/app1_0_03/get_menu.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
11:00:44 12/12/2025
Last modified:
09:45:25 28/11/2025
MD5 hash:
6e99f796fa7b9b73fefa5c03c9ada45e
Filesize:
871 B
suspicious functions used:
`module_name` FROM module AS m WHERE m.{$user_type} in (1,2) AND m.sts = '0' AND m.id != '1' AND m.apk_sts = '1' ORDER BY ` (line:5);curl_exec (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: get_network_online_clients_count.php-
Full path:
apk/app1_0_03/get_network_online_clients_count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:57 12/12/2025
Last modified:
09:45:25 28/11/2025
MD5 hash:
e174ef56827ea4768d16e99cdb8ae2fe
Filesize:
3.14 KB
suspicious functions used:
system (line:61); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: loginexec.php-
Full path:
apk/app1_0_03/loginexec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
15:05:27 12/12/2025
Last modified:
09:45:26 28/11/2025
MD5 hash:
f4c00dde2c5487271532545a4882e600
Filesize:
22.77 KB
suspicious functions used:
curl_exec (line:32);curl_exec (line:93);`module_name` FROM module AS m WHERE m.{$user['user_type']} in (1,2) AND m.sts = '0' AND m.id != '1' AND m.apk_sts = '1' ORDER BY ` (line:177);curl_exec (line:259);`module_name` FROM module AS m WHERE m.{$user['user_type']} in (1,2) AND m.sts = '0' AND m.id != '1' AND m.apk_sts = '1' ORDER BY ` (line:365); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-snmp-data-auto.php-
Full path:
apk/app1_0_03/netowrk-snmp-data-auto.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:57 12/12/2025
Last modified:
09:45:26 28/11/2025
MD5 hash:
639f404b71aaf7ac7af43852d4aa09ed
Filesize:
9.05 KB
suspicious functions used:
shell_exec (line:74);shell_exec (line:158); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-snmp-data.php-
Full path:
apk/app1_0_03/netowrk-snmp-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:57 12/12/2025
Last modified:
09:45:26 28/11/2025
MD5 hash:
da5fcbf831017e1fcf9898fbc2d91d26
Filesize:
15.91 KB
suspicious functions used:
shell_exec (line:188); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test.php-
Full path:
apk/app1_0_03/test.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:57 12/12/2025
Last modified:
09:45:26 28/11/2025
MD5 hash:
032c899b8d1dd401bc8860bab767dc76
Filesize:
1.64 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: update_user_data.php-
Full path:
apk/app1_0_03/update_user_data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:57 12/12/2025
Last modified:
09:45:26 28/11/2025
MD5 hash:
aa7f59cfb94fb99ad83237f968ee7735
Filesize:
2.92 KB
suspicious functions used:
base64_decode (line:46); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: telegramapicore.php-
Full path:
apk/app1_0_03/include/telegramapicore.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:57 12/12/2025
Last modified:
09:45:27 28/11/2025
MD5 hash:
8aad7289dbd57ea5be261edec2bbfec7
Filesize:
3.16 KB
suspicious functions used:
curl_exec (line:68); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: config.php-
Full path:
apk/app1_0_04/config.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
06:49:59 12/12/2025
Last modified:
06:33:37 11/12/2025
MD5 hash:
b7b2552fd96c7da6f0b6856d328eeebc
Filesize:
11.91 KB
suspicious functions used:
curl_exec (line:154); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: firebase.php-
Full path:
apk/app1_0_04/firebase.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:57 12/12/2025
Last modified:
14:28:28 07/12/2025
MD5 hash:
a77679c3acb80aa4799ebb6ae4cecdc5
Filesize:
1.63 KB
suspicious functions used:
curl_exec (line:54); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: get-access-token.php-
Full path:
apk/app1_0_04/get-access-token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:57 12/12/2025
Last modified:
14:28:28 07/12/2025
MD5 hash:
8520980eec76b36dfd9ea9ae516abea4
Filesize:
1.91 KB
suspicious functions used:
curl_exec (line:21); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: get_clients_list.php-
Full path:
apk/app1_0_04/get_clients_list.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
06:49:59 12/12/2025
Last modified:
14:28:28 07/12/2025
MD5 hash:
faf49b1fb74551546c59e2d40d86c771
Filesize:
20.97 KB
suspicious functions used:
curl_exec (line:55); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: get_client_profile_data.php-
Full path:
apk/app1_0_04/get_client_profile_data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:49:21 12/12/2025
Last modified:
14:28:28 07/12/2025
MD5 hash:
7e94655fb0d810611c2f7acfd34d9ebe
Filesize:
15.48 KB
suspicious functions used:
curl_exec (line:258); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: get_menu.php-
Full path:
apk/app1_0_04/get_menu.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
02:45:31 12/12/2025
Last modified:
14:28:28 07/12/2025
MD5 hash:
6e99f796fa7b9b73fefa5c03c9ada45e
Filesize:
871 B
suspicious functions used:
`module_name` FROM module AS m WHERE m.{$user_type} in (1,2) AND m.sts = '0' AND m.id != '1' AND m.apk_sts = '1' ORDER BY ` (line:5);curl_exec (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: get_network_online_clients_count.php-
Full path:
apk/app1_0_04/get_network_online_clients_count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:58 12/12/2025
Last modified:
14:28:28 07/12/2025
MD5 hash:
e174ef56827ea4768d16e99cdb8ae2fe
Filesize:
3.14 KB
suspicious functions used:
system (line:61); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: loginexec.php-
Full path:
apk/app1_0_04/loginexec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
05:37:38 12/12/2025
Last modified:
14:28:29 07/12/2025
MD5 hash:
f4c00dde2c5487271532545a4882e600
Filesize:
22.77 KB
suspicious functions used:
curl_exec (line:32);curl_exec (line:93);`module_name` FROM module AS m WHERE m.{$user['user_type']} in (1,2) AND m.sts = '0' AND m.id != '1' AND m.apk_sts = '1' ORDER BY ` (line:177);curl_exec (line:259);`module_name` FROM module AS m WHERE m.{$user['user_type']} in (1,2) AND m.sts = '0' AND m.id != '1' AND m.apk_sts = '1' ORDER BY ` (line:365); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-snmp-data-auto.php-
Full path:
apk/app1_0_04/netowrk-snmp-data-auto.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:58 12/12/2025
Last modified:
14:28:29 07/12/2025
MD5 hash:
639f404b71aaf7ac7af43852d4aa09ed
Filesize:
9.05 KB
suspicious functions used:
shell_exec (line:74);shell_exec (line:158); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-snmp-data.php-
Full path:
apk/app1_0_04/netowrk-snmp-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:58 12/12/2025
Last modified:
14:28:29 07/12/2025
MD5 hash:
da5fcbf831017e1fcf9898fbc2d91d26
Filesize:
15.91 KB
suspicious functions used:
shell_exec (line:188); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test.php-
Full path:
apk/app1_0_04/test.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:58 12/12/2025
Last modified:
14:28:29 07/12/2025
MD5 hash:
032c899b8d1dd401bc8860bab767dc76
Filesize:
1.64 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: update_user_data.php-
Full path:
apk/app1_0_04/update_user_data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:58 12/12/2025
Last modified:
14:28:29 07/12/2025
MD5 hash:
aa7f59cfb94fb99ad83237f968ee7735
Filesize:
2.92 KB
suspicious functions used:
base64_decode (line:46); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: telegramapicore.php-
Full path:
apk/app1_0_04/include/telegramapicore.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:58 12/12/2025
Last modified:
14:28:29 07/12/2025
MD5 hash:
8aad7289dbd57ea5be261edec2bbfec7
Filesize:
3.16 KB
suspicious functions used:
curl_exec (line:68); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: config.php-
Full path:
apk/app1_0_05/config.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
13:31:48 12/12/2025
Last modified:
12:23:48 11/12/2025
MD5 hash:
b7b2552fd96c7da6f0b6856d328eeebc
Filesize:
11.91 KB
suspicious functions used:
curl_exec (line:154); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: firebase.php-
Full path:
apk/app1_0_05/firebase.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:58 12/12/2025
Last modified:
12:23:48 11/12/2025
MD5 hash:
a77679c3acb80aa4799ebb6ae4cecdc5
Filesize:
1.63 KB
suspicious functions used:
curl_exec (line:54); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: get-access-token.php-
Full path:
apk/app1_0_05/get-access-token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:58 12/12/2025
Last modified:
12:23:48 11/12/2025
MD5 hash:
8520980eec76b36dfd9ea9ae516abea4
Filesize:
1.91 KB
suspicious functions used:
curl_exec (line:21); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: get_clients_list.php-
Full path:
apk/app1_0_05/get_clients_list.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:58 12/12/2025
Last modified:
12:23:48 11/12/2025
MD5 hash:
faf49b1fb74551546c59e2d40d86c771
Filesize:
20.97 KB
suspicious functions used:
curl_exec (line:55); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: get_client_profile_data.php-
Full path:
apk/app1_0_05/get_client_profile_data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
15:33:39 12/12/2025
Last modified:
12:23:49 11/12/2025
MD5 hash:
7e94655fb0d810611c2f7acfd34d9ebe
Filesize:
15.48 KB
suspicious functions used:
curl_exec (line:258); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: get_menu.php-
Full path:
apk/app1_0_05/get_menu.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
13:31:48 12/12/2025
Last modified:
12:23:49 11/12/2025
MD5 hash:
6e99f796fa7b9b73fefa5c03c9ada45e
Filesize:
871 B
suspicious functions used:
`module_name` FROM module AS m WHERE m.{$user_type} in (1,2) AND m.sts = '0' AND m.id != '1' AND m.apk_sts = '1' ORDER BY ` (line:5);curl_exec (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: get_network_online_clients_count.php-
Full path:
apk/app1_0_05/get_network_online_clients_count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:58 12/12/2025
Last modified:
12:23:49 11/12/2025
MD5 hash:
e174ef56827ea4768d16e99cdb8ae2fe
Filesize:
3.14 KB
suspicious functions used:
system (line:61); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: loginexec.php-
Full path:
apk/app1_0_05/loginexec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
15:33:38 12/12/2025
Last modified:
12:23:50 11/12/2025
MD5 hash:
f4c00dde2c5487271532545a4882e600
Filesize:
22.77 KB
suspicious functions used:
curl_exec (line:32);curl_exec (line:93);`module_name` FROM module AS m WHERE m.{$user['user_type']} in (1,2) AND m.sts = '0' AND m.id != '1' AND m.apk_sts = '1' ORDER BY ` (line:177);curl_exec (line:259);`module_name` FROM module AS m WHERE m.{$user['user_type']} in (1,2) AND m.sts = '0' AND m.id != '1' AND m.apk_sts = '1' ORDER BY ` (line:365); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-snmp-data-auto.php-
Full path:
apk/app1_0_05/netowrk-snmp-data-auto.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:58 12/12/2025
Last modified:
12:23:50 11/12/2025
MD5 hash:
639f404b71aaf7ac7af43852d4aa09ed
Filesize:
9.05 KB
suspicious functions used:
shell_exec (line:74);shell_exec (line:158); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-snmp-data.php-
Full path:
apk/app1_0_05/netowrk-snmp-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
23:31:28 11/12/2025
Last modified:
12:23:50 11/12/2025
MD5 hash:
da5fcbf831017e1fcf9898fbc2d91d26
Filesize:
15.91 KB
suspicious functions used:
shell_exec (line:188); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test.php-
Full path:
apk/app1_0_05/test.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:58 12/12/2025
Last modified:
12:23:50 11/12/2025
MD5 hash:
032c899b8d1dd401bc8860bab767dc76
Filesize:
1.64 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: update_user_data.php-
Full path:
apk/app1_0_05/update_user_data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:58 12/12/2025
Last modified:
12:23:50 11/12/2025
MD5 hash:
aa7f59cfb94fb99ad83237f968ee7735
Filesize:
2.92 KB
suspicious functions used:
base64_decode (line:46); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: telegramapicore.php-
Full path:
apk/app1_0_05/include/telegramapicore.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:58 12/12/2025
Last modified:
12:23:50 11/12/2025
MD5 hash:
8aad7289dbd57ea5be261edec2bbfec7
Filesize:
3.16 KB
suspicious functions used:
curl_exec (line:68); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-helper.php-
Full path:
asb/m/nagad-helper.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:59 12/12/2025
Last modified:
02:35:28 20/11/2024
MD5 hash:
2bb70c44d68202e0a0cd8ae1388f0b1b
Filesize:
6.74 KB
suspicious functions used:
curl_exec (line:61);base64_decode (line:97); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery2.php-
Full path:
asb/m/PaymentOnlineQuery2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:59 12/12/2025
Last modified:
02:35:29 20/11/2024
MD5 hash:
3660992067d5591fc79ce89d6dbb9274
Filesize:
19.08 KB
suspicious functions used:
curl_exec (line:41);curl_exec (line:254); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
asb/m/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:59 12/12/2025
Last modified:
02:35:30 20/11/2024
MD5 hash:
7d8e71ceda3ffb74623e0c4a814715af
Filesize:
1.53 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tagreeexpayment.php-
Full path:
asb/m/tagreeexpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:59 12/12/2025
Last modified:
02:35:30 20/11/2024
MD5 hash:
c95e3ee881752db67b4f3597bc58430a
Filesize:
2.46 KB
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ttoken.php-
Full path:
asb/m/ttoken.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:42:59 12/12/2025
Last modified:
02:35:30 20/11/2024
MD5 hash:
5f2c51c1db5b0defadfb67ce25c0098f
Filesize:
1.54 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
asb/m/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:00 12/12/2025
Last modified:
02:35:27 20/11/2024
MD5 hash:
849185f307be30eafb1bbef93616d8c3
Filesize:
1.71 KB
suspicious functions used:
curl_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: support-action.php-
Full path:
asb/m/support-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:00 12/12/2025
Last modified:
02:35:30 20/11/2024
MD5 hash:
2fc6fd844db911a5502a7a6ae383990f
Filesize:
10.31 KB
suspicious functions used:
curl_exec (line:99); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
asb/m/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:00 12/12/2025
Last modified:
02:35:27 20/11/2024
MD5 hash:
9a3f22521ad987e86f84c4f5f688d5b7
Filesize:
713 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index.php-
Full path:
asb/m/index.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
20:30:35 11/12/2025
Last modified:
02:35:27 20/11/2024
MD5 hash:
f5d7e6787d44240324bf05e7bff53365
Filesize:
12.49 KB
suspicious functions used:
base64_decode (line:10);curl_exec (line:183); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery.php-
Full path:
asb/m/PaymentOnlineQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:00 12/12/2025
Last modified:
02:35:29 20/11/2024
MD5 hash:
05d772ea15775c0640ac9d1ff7c7144c
Filesize:
21.13 KB
suspicious functions used:
curl_exec (line:287);curl_exec (line:512); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreateagree.php-
Full path:
asb/m/tcreateagree.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:00 12/12/2025
Last modified:
02:35:30 20/11/2024
MD5 hash:
27a10adf4190edc7eceee8cf74a6b72b
Filesize:
999 B
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec.php-
Full path:
asb/m/login_exec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:00 12/12/2025
Last modified:
02:35:27 20/11/2024
MD5 hash:
1f800365ef270564df77d30c1bfd7ed3
Filesize:
5.4 KB
suspicious functions used:
curl_exec (line:66); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec1.php-
Full path:
asb/m/login_exec1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:00 12/12/2025
Last modified:
02:35:28 20/11/2024
MD5 hash:
46b08782f51ba75b23e27183e06370fe
Filesize:
4.28 KB
suspicious functions used:
curl_exec (line:61); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-merchant-callback.php-
Full path:
asb/m/nagad-merchant-callback.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:00 12/12/2025
Last modified:
02:35:28 20/11/2024
MD5 hash:
0e6086c5260150c11249029f212ee481
Filesize:
11.36 KB
suspicious functions used:
curl_exec (line:20); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreatepayment.php-
Full path:
asb/m/tcreatepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:00 12/12/2025
Last modified:
02:35:30 20/11/2024
MD5 hash:
e49de9a33f5164bc2c6b88e4770faaff
Filesize:
1.07 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-snmp-data.php-
Full path:
asb/m/netowrk-snmp-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:00 12/12/2025
Last modified:
02:35:28 20/11/2024
MD5 hash:
45b774abc8d67efb3e4e87c93b1f618b
Filesize:
24.05 KB
suspicious functions used:
shell_exec (line:96);shell_exec (line:105);shell_exec (line:115);shell_exec (line:134);shell_exec (line:146);shell_exec (line:157);shell_exec (line:173);shell_exec (line:183);shell_exec (line:199);shell_exec (line:219);shell_exec (line:229);shell_exec (line:234);shell_exec (line:242);shell_exec (line:262);shell_exec (line:278);`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:291);shell_exec (line:297);shell_exec (line:432); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: texecutepayment.php-
Full path:
asb/m/texecutepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:00 12/12/2025
Last modified:
02:35:30 20/11/2024
MD5 hash:
efbb63dfcfdacb52dec74bffc389bbb3
Filesize:
2.67 KB
suspicious functions used:
curl_exec (line:24); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: class.phpmailer.php-
Full path:
asb/web/email/class.phpmailer.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:00 12/12/2025
Last modified:
02:36:27 20/11/2024
MD5 hash:
68468d69b47fffecc89df57e27c5a781
Filesize:
143.32 KB
suspicious functions used:
`$DKIM_private` (line:428);popen (line:1387);popen (line:1408);base64_decode (line:3410);`$mail->set('SMTPSecure', 'tls');` (line:3688);`$mail->SMTPSecure = 'tls';` (line:3690); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: class.smtp.php-
Full path:
asb/web/email/class.smtp.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:00 12/12/2025
Last modified:
02:36:27 20/11/2024
MD5 hash:
aa8478329268e5438a4469c268337a10
Filesize:
41.44 KB
suspicious functions used:
base64_decode (line:513);base64_decode (line:533); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: JSON.php-
Full path:
asb/web/inc/JSON.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:01 12/12/2025
Last modified:
02:36:32 20/11/2024
MD5 hash:
f5a34509e06231308becbe320ade9ff6
Filesize:
33.22 KB
suspicious functions used:
eval (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: jqgrid.php-
Full path:
asb/web/inc/jqgrid.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:01 12/12/2025
Last modified:
02:36:32 20/11/2024
MD5 hash:
71027a29e71e0626d8b57cbb631e6d98
Filesize:
23.92 KB
suspicious functions used:
eval (line:397); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: smsapicore.php-
Full path:
asb/web/include/smsapicore.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
17:40:03 12/12/2025
Last modified:
07:22:48 04/12/2024
MD5 hash:
9dfa7b1599728b5ccb0d4927f23bb8e5
Filesize:
1.4 KB
suspicious functions used:
curl_exec (line:36); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: telegramapicore.php-
Full path:
asb/web/include/telegramapicore.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:05:14 12/12/2025
Last modified:
02:36:33 20/11/2024
MD5 hash:
e1f2020f2a58e7b600312301697f9aca
Filesize:
3 KB
suspicious functions used:
curl_exec (line:65); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Changes.txt-
Full path:
asb/web/js/jqgrid/js/Changes.txt
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:01 12/12/2025
Last modified:
02:36:43 20/11/2024
MD5 hash:
c0a4adbc3f1c6d592cb4fa8433fee9ea
Filesize:
44.32 KB
suspicious functions used:
system (line:87); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ui.php-
Full path:
asb/web/js/tinymce/themes/advanced/skins/highcontrast/ui.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
11:55:35 12/12/2025
Last modified:
02:36:49 20/11/2024
MD5 hash:
3edaf67be8573b86686f46bbba4f058c
Filesize:
4.53 KB
suspicious functions used:
curl_exec (line:20);`bill_amount` = '0.00' WHERE bill_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY ` (line:53);`bill_amount` = '0.00', days = '0.00' WHERE entry_date < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND bill_amount != '0.00' ORDER BY ` (line:54);`payment` WHERE `pay_date` < DATE_SUB(NOW(), INTERVAL '$curret_s' DAY) AND pay_amount != '0.00' ORDER BY ` (line:55);curl_exec (line:146);curl_exec (line:168); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: AutoActiveClientsCount1.php-
Full path:
asb/web/AutoActiveClientsCount1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
10:41:02 12/12/2025
Last modified:
02:35:40 20/11/2024
MD5 hash:
3b3b6186ff2d9c5abd1772e5aa02ee33
Filesize:
6.4 KB
suspicious functions used:
system (line:58); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: AutoActiveClientsCount11.php-
Full path:
asb/web/AutoActiveClientsCount11.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:03 12/12/2025
Last modified:
02:35:40 20/11/2024
MD5 hash:
a0090e4a11dd59b955a6edd549b6ef2f
Filesize:
5.85 KB
suspicious functions used:
system (line:54); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ClientsOnMap.php-
Full path:
asb/web/ClientsOnMap.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:03 12/12/2025
Last modified:
06:02:56 10/11/2025
MD5 hash:
519edcd6a9ccec3397e6f5280db00605
Filesize:
12.2 KB
suspicious functions used:
`${totalonline}` (line:97);`${totaloffline}` (line:98);`${results.rxPower}` (line:233);`${results.distance}` (line:234);`${results.supplyVoltage}` (line:235);`${results.temperature}` (line:236);`${results.txPower}` (line:237); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ClientView.php-
Full path:
asb/web/ClientView.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
17:46:25 12/12/2025
Last modified:
02:35:53 20/11/2024
MD5 hash:
c8fbfaee3749cd70d15e7fa381d841f4
Filesize:
111.18 KB
suspicious functions used:
`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:226); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients.php-
Full path:
asb/web/Clients.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
11:55:13 12/12/2025
Last modified:
02:35:48 20/11/2024
MD5 hash:
d59f33ca457016deee5f906de3f2ca83
Filesize:
212.42 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:844); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients1.php-
Full path:
asb/web/Clients1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:04 12/12/2025
Last modified:
02:35:49 20/11/2024
MD5 hash:
a8db87dcc6beb97539ff152b767dadae
Filesize:
219.37 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:835); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients2.php-
Full path:
asb/web/Clients2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:05 12/12/2025
Last modified:
02:35:50 20/11/2024
MD5 hash:
982d6411552113b0715fd17c26f50292
Filesize:
205.13 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:832); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients3.php-
Full path:
asb/web/Clients3.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:05 12/12/2025
Last modified:
02:35:50 20/11/2024
MD5 hash:
50ddc869b383ab76e009c7a2c17c99a3
Filesize:
175.31 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:832); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: InstrumentsStoreOutDetails.php-
Full path:
asb/web/InstrumentsStoreOutDetails.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:06 12/12/2025
Last modified:
02:35:57 20/11/2024
MD5 hash:
a60c19f766bfff1ccdccbeba6b39eb87
Filesize:
9.37 KB
suspicious functions used:
`update_date`, '%D-%b, %y') AS offdate, TIME_FORMAT(`update_time`, '%T') AS offtime FROM `con_sts_log` WHERE `c_id` = '{$row['c_id']}' AND con_sts = 'Inactive' ORDER BY ` (line:120); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Network.php-
Full path:
asb/web/Network.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:07 12/12/2025
Last modified:
02:36:04 20/11/2024
MD5 hash:
a555bcd4afdc786ded6485ee9315887c
Filesize:
57.36 KB
suspicious functions used:
system (line:359);shell_exec (line:631); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Network1.php-
Full path:
asb/web/Network1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:07 12/12/2025
Last modified:
02:36:04 20/11/2024
MD5 hash:
0154c16125cee7431f537bf69c4ef811
Filesize:
44.04 KB
suspicious functions used:
system (line:295);shell_exec (line:590); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeMap.php-
Full path:
asb/web/NetworkTreeMap.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:07 12/12/2025
Last modified:
02:36:09 20/11/2024
MD5 hash:
584d02944bd9de5a190ec6dc320fc49e
Filesize:
24.24 KB
suspicious functions used:
`${results.rxPower}` (line:263);`${results.distance}` (line:264);`${results.supplyVoltage}` (line:265);`${results.temperature}` (line:266);`${results.txPower}` (line:267);`${results.rxPower}` (line:283);`${results.distance}` (line:284);`${results.supplyVoltage}` (line:285);`${results.temperature}` (line:286);`${results.txPower}` (line:287); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMSAddSave.php-
Full path:
asb/web/SMSAddSave.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:07 12/12/2025
Last modified:
04:39:44 20/11/2024
MD5 hash:
3fe8fcd49062f9f5abd4a24a6b488ebf
Filesize:
2.08 KB
suspicious functions used:
curl_exec (line:36); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMS1.php-
Full path:
asb/web/SMS1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:07 12/12/2025
Last modified:
02:36:18 20/11/2024
MD5 hash:
e4671dadf9ad575671fd3609a60030da
Filesize:
32.19 KB
suspicious functions used:
curl_exec (line:59); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkLoad.php-
Full path:
asb/web/NetworkLoad.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:08 12/12/2025
Last modified:
02:36:06 20/11/2024
MD5 hash:
e1632e66ee1b7394d3fb82751b924abe
Filesize:
2.83 KB
suspicious functions used:
system (line:81); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkLoad1.php-
Full path:
asb/web/NetworkLoad1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:08 12/12/2025
Last modified:
02:36:06 20/11/2024
MD5 hash:
176bd6931be34d7ef351d22897accc65
Filesize:
759 B
suspicious functions used:
system (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltAddQuery.php-
Full path:
asb/web/NetworkOltAddQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:08 12/12/2025
Last modified:
10:23:43 20/11/2024
MD5 hash:
7d6641eaba35e48b4ee90b9a804ac93e
Filesize:
6.46 KB
suspicious functions used:
shell_exec (line:21); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltOnuStatus.php-
Full path:
asb/web/NetworkOltOnuStatus.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:08 12/12/2025
Last modified:
02:36:06 20/11/2024
MD5 hash:
7604d17efbb57bd0b4c3566aa2d27c36
Filesize:
65.16 KB
suspicious functions used:
shell_exec (line:42);shell_exec (line:102);shell_exec (line:677);shell_exec (line:793);shell_exec (line:906); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltOnuStatus2.php-
Full path:
asb/web/NetworkOltOnuStatus2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:08 12/12/2025
Last modified:
02:36:06 20/11/2024
MD5 hash:
c9a14797fa4353d05bbd9427b6079250
Filesize:
15.88 KB
suspicious functions used:
shell_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltSense.php-
Full path:
asb/web/NetworkOltSense.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:08 12/12/2025
Last modified:
02:36:06 20/11/2024
MD5 hash:
2be664ae5006367f629ca437a6d507f8
Filesize:
18.26 KB
suspicious functions used:
`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, `last_synced`, `last_update`, `msg`, `full_msg`, ROUND((SELECT AVG(value) FROM olt_onu_history WHERE alarm_id = '$alarmId' AND value != ''), 2) AS average_value FROM `, ` WHERE `alarm_id` = '$alarmId' AND ` (line:123); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltSenseDetails.php-
Full path:
asb/web/NetworkOltSenseDetails.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:08 12/12/2025
Last modified:
02:36:06 20/11/2024
MD5 hash:
440096c601fc10b819a1f0f8330928b0
Filesize:
14.17 KB
suspicious functions used:
`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:33);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:42);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:51);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:60); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltSync.php-
Full path:
asb/web/NetworkOltSync.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:08 12/12/2025
Last modified:
02:36:06 20/11/2024
MD5 hash:
06633d4b65a14d677358170dd0a84424
Filesize:
1.87 KB
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMS.php-
Full path:
asb/web/SMS.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:08 12/12/2025
Last modified:
04:30:03 20/11/2024
MD5 hash:
d69daa8149373e2d034612f9a4006250
Filesize:
35.69 KB
suspicious functions used:
curl_exec (line:56); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery.php-
Full path:
asb/web/PaymentOnlineQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
09:41:53 12/12/2025
Last modified:
02:36:13 20/11/2024
MD5 hash:
201e1cf95b2d033897cab4bc2fd59e07
Filesize:
28.5 KB
suspicious functions used:
curl_exec (line:457);curl_exec (line:689); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeAddSave.php-
Full path:
asb/web/NetworkTreeAddSave.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:09 12/12/2025
Last modified:
23:20:50 20/11/2024
MD5 hash:
a9dbc374394f257ef79f2d4f60f9771d
Filesize:
5.12 KB
suspicious functions used:
`network_tree` WHERE `olt_id` = '$olt_id' AND ` (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery2.php-
Full path:
asb/web/PaymentOnlineQuery2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:09 12/12/2025
Last modified:
02:36:13 20/11/2024
MD5 hash:
ccd315d11a60901b7b9029ff44f8351b
Filesize:
19.4 KB
suspicious functions used:
curl_exec (line:42);curl_exec (line:252); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentWebhook.php-
Full path:
asb/web/PaymentWebhook.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:09 12/12/2025
Last modified:
02:36:13 20/11/2024
MD5 hash:
a2f322c94787630ab1e0c8ca35fc5ba1
Filesize:
18.6 KB
suspicious functions used:
base64_decode (line:30);curl_exec (line:41);curl_exec (line:422); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeEdit1.php-
Full path:
asb/web/NetworkTreeEdit1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:09 12/12/2025
Last modified:
02:36:09 20/11/2024
MD5 hash:
3396a6bdf9b5804bb208f38f37cc29a2
Filesize:
35.81 KB
suspicious functions used:
`olt_onu` WHERE olt_id = '$olt_id' AND ` (line:207); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeEditSave.php-
Full path:
asb/web/NetworkTreeEditSave.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:09 12/12/2025
Last modified:
23:20:50 20/11/2024
MD5 hash:
6c0f94f3ddde2ee6a93db1fa98971907
Filesize:
12.41 KB
suspicious functions used:
`network_tree` WHERE `olt_id` = '$olt_id' AND ` (line:182); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeList.php-
Full path:
asb/web/NetworkTreeList.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:09 12/12/2025
Last modified:
02:36:09 20/11/2024
MD5 hash:
acd468021993faf8575531952ae107f8
Filesize:
21.98 KB
suspicious functions used:
`pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '{$row['olt_id']}' AND ` (line:287); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeMap1.php-
Full path:
asb/web/NetworkTreeMap1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:09 12/12/2025
Last modified:
02:36:09 20/11/2024
MD5 hash:
31a3ae9bc0bdb18726ed860ec6e8ec97
Filesize:
36.43 KB
suspicious functions used:
`networktree_marker_data.php?tree_id=${markerId}` (line:231);`${results.rxPower}` (line:311);`${results.distance}` (line:312);`${results.supplyVoltage}` (line:313);`${results.temperature}` (line:314);`${results.txPower}` (line:315); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SignUp1.php-
Full path:
asb/web/SignUp1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:10 12/12/2025
Last modified:
02:36:18 20/11/2024
MD5 hash:
3f7943dd155c8e0a383b7d02730f8c11
Filesize:
24.59 KB
suspicious functions used:
curl_exec (line:33);curl_exec (line:59); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_client_bandwidth_count.php-
Full path:
asb/web/cron_client_bandwidth_count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
10:03:56 12/12/2025
Last modified:
02:35:54 20/11/2024
MD5 hash:
1c71a3dd097275429ae845a85ced0438
Filesize:
5.33 KB
suspicious functions used:
curl_exec (line:124);curl_exec (line:134); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_olt.php-
Full path:
asb/web/cron_olt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
21:15:48 11/12/2025
Last modified:
02:35:54 20/11/2024
MD5 hash:
6975951fdbf566164ba5fa5cfcd32ec7
Filesize:
4.27 KB
suspicious functions used:
shell_exec (line:48);curl_exec (line:127); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: client-online-mbb.php-
Full path:
asb/web/client-online-mbb.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:11 12/12/2025
Last modified:
02:35:45 20/11/2024
MD5 hash:
69c51efb5b9017a07a7158b4a63f3826
Filesize:
14.32 KB
suspicious functions used:
curl_exec (line:90); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_network.php-
Full path:
asb/web/cron_network.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
23:03:07 11/12/2025
Last modified:
02:35:54 20/11/2024
MD5 hash:
db096f353e80027593ca3f9781a21ac8
Filesize:
4.93 KB
suspicious functions used:
curl_exec (line:45);curl_exec (line:67);curl_exec (line:127); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_olt_clients_catch.php-
Full path:
asb/web/cron_olt_clients_catch.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:11 12/12/2025
Last modified:
02:35:54 20/11/2024
MD5 hash:
3b13c163ba3445b3d661c63adde1d985
Filesize:
1.12 KB
suspicious functions used:
curl_exec (line:23); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: clients-nots-action.php-
Full path:
asb/web/clients-nots-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:11 12/12/2025
Last modified:
02:35:47 20/11/2024
MD5 hash:
dff1bb495509427d098cb4588da553b9
Filesize:
5.89 KB
suspicious functions used:
curl_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: company_info.php-
Full path:
asb/web/company_info.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
21:00:18 11/12/2025
Last modified:
02:35:53 20/11/2024
MD5 hash:
e612d58aa2e38f5b49ba37c1bf620ece
Filesize:
8.38 KB
suspicious functions used:
curl_exec (line:130); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
asb/web/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:11 12/12/2025
Last modified:
02:35:53 20/11/2024
MD5 hash:
ba9747d0421fd091b998389469e72a0b
Filesize:
1.7 KB
suspicious functions used:
curl_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_all.php-
Full path:
asb/web/cron_all.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:11 12/12/2025
Last modified:
02:35:53 20/11/2024
MD5 hash:
967f1d654ae891609da26b9e0fdbd1ae
Filesize:
2.44 KB
suspicious functions used:
curl_exec (line:23);curl_exec (line:38);curl_exec (line:53); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_gen_bill.php-
Full path:
asb/web/cron_auto_gen_bill.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:11 12/12/2025
Last modified:
02:35:53 20/11/2024
MD5 hash:
f1056618cc4402968e50d1232d2c51c8
Filesize:
4.73 KB
suspicious functions used:
curl_exec (line:140);curl_exec (line:149); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_olt_user.php-
Full path:
asb/web/cron_olt_user.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:11 12/12/2025
Last modified:
02:35:54 20/11/2024
MD5 hash:
67aa237639e3d1e6064e76079bb3cccc
Filesize:
1.97 KB
suspicious functions used:
curl_exec (line:19);curl_exec (line:46); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive.php-
Full path:
asb/web/cron_auto_inactive.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
17:40:02 12/12/2025
Last modified:
07:27:13 04/12/2024
MD5 hash:
cf3a14040de8d8b0fcfa84b39625357c
Filesize:
6.6 KB
suspicious functions used:
`id`) AS payment_count FROM `payment` WHERE `c_id` = '$c_idd' AND month(`, `) = month('$update_date') AND year(` (line:50);system (line:149);curl_exec (line:172); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive1.php-
Full path:
asb/web/cron_auto_inactive1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:11 12/12/2025
Last modified:
02:35:54 20/11/2024
MD5 hash:
9ecc7a4271348740944ba32deb869e96
Filesize:
5.71 KB
suspicious functions used:
`id`) AS payment_count FROM `payment` WHERE `c_id` = '$c_idd' AND month(`, `) = month('$update_date') AND year(` (line:49);curl_exec (line:144); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive_termination.php-
Full path:
asb/web/cron_auto_inactive_termination.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
00:05:16 12/12/2025
Last modified:
02:35:54 20/11/2024
MD5 hash:
9f9c8ca9110c2304128646824bfb17db
Filesize:
12.16 KB
suspicious functions used:
curl_exec (line:241);curl_exec (line:253); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive_termination1.php-
Full path:
asb/web/cron_auto_inactive_termination1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:11 12/12/2025
Last modified:
02:35:54 20/11/2024
MD5 hash:
be76b964c93a2cb4fa7e632750ff3bc4
Filesize:
6.64 KB
suspicious functions used:
curl_exec (line:156);curl_exec (line:168); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-olt-all-mac-array.php-
Full path:
asb/web/netowrk-olt-all-mac-array.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:11 12/12/2025
Last modified:
02:36:03 20/11/2024
MD5 hash:
b0168ce99145e2afe64357247d750dd6
Filesize:
4.62 KB
suspicious functions used:
shell_exec (line:33);shell_exec (line:47);shell_exec (line:61);shell_exec (line:76);shell_exec (line:93); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_termination_remainder1.php-
Full path:
asb/web/cron_auto_termination_remainder1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
03:06:30 12/12/2025
Last modified:
02:35:54 20/11/2024
MD5 hash:
7765f9f820dbd402f1064fab9958ffaa
Filesize:
3.26 KB
suspicious functions used:
curl_exec (line:83); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: testttttt.php-
Full path:
asb/web/testttttt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:11 12/12/2025
Last modified:
02:36:21 20/11/2024
MD5 hash:
b1988a4be29e191ad935fb409a4174ee
Filesize:
2 KB
suspicious functions used:
curl_exec (line:47); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: emp_salary_advence_find.php-
Full path:
asb/web/emp_salary_advence_find.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:11 12/12/2025
Last modified:
02:35:55 20/11/2024
MD5 hash:
74a7e2ffda0f7584611d7cbce6136c24
Filesize:
2.25 KB
suspicious functions used:
`expanse` WHERE `type` = '2' AND `status` = '2' AND ex_by = '$e_id' AND MONTH(`, `) = MONTH('$lastmonth') AND YEAR(`, `) = YEAR('$lastmonth') GROUP BY ` (line:8);`e_id` = '$e_id' AND ` (line:12); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
asb/web/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:11 12/12/2025
Last modified:
02:35:55 20/11/2024
MD5 hash:
c46a50905333286f45dfeacf010851ab
Filesize:
716 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-helper.php-
Full path:
asb/web/nagad-helper.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:11 12/12/2025
Last modified:
02:36:02 20/11/2024
MD5 hash:
2bb70c44d68202e0a0cd8ae1388f0b1b
Filesize:
6.74 KB
suspicious functions used:
curl_exec (line:61);base64_decode (line:97); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-merchant-callback.php-
Full path:
asb/web/nagad-merchant-callback.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:11 12/12/2025
Last modified:
02:36:03 20/11/2024
MD5 hash:
abc8d9e7aad4d9c622dcd97e701448bc
Filesize:
16.5 KB
suspicious functions used:
curl_exec (line:20); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: getclientuptime.php-
Full path:
asb/web/getclientuptime.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:11 12/12/2025
Last modified:
02:35:56 20/11/2024
MD5 hash:
bbc14cdd451c72b94d78c7d2d1af0b52
Filesize:
718 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-snmp-data.php-
Full path:
asb/web/netowrk-snmp-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
18:57:26 12/12/2025
Last modified:
02:36:03 20/11/2024
MD5 hash:
9badf5c53b260315a061e1bb6cd2378f
Filesize:
24.8 KB
suspicious functions used:
shell_exec (line:104);shell_exec (line:113);shell_exec (line:123);shell_exec (line:142);shell_exec (line:154);shell_exec (line:165);shell_exec (line:181);shell_exec (line:191);shell_exec (line:207);shell_exec (line:227);shell_exec (line:236);shell_exec (line:244);shell_exec (line:251);shell_exec (line:256);`pon_name` FROM `olt_pon` WHERE `olt_pon_id` = '$pon_id' AND ` (line:263);shell_exec (line:280);shell_exec (line:290);`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:303);shell_exec (line:309);shell_exec (line:444); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-old-onu-rx-map.php-
Full path:
asb/web/network-old-onu-rx-map.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:11 12/12/2025
Last modified:
02:36:03 20/11/2024
MD5 hash:
b4962c160c5ad68ccd8eed9c48d82a0f
Filesize:
6.94 KB
suspicious functions used:
shell_exec (line:76); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-old-onu-rx.php-
Full path:
asb/web/network-old-onu-rx.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:11 12/12/2025
Last modified:
02:36:03 20/11/2024
MD5 hash:
b4962c160c5ad68ccd8eed9c48d82a0f
Filesize:
6.94 KB
suspicious functions used:
shell_exec (line:76); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: imagevwr.php-
Full path:
asb/web/imagevwr.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
18:57:26 12/12/2025
Last modified:
02:35:57 20/11/2024
MD5 hash:
47a223a13cc642d01dcfaaca542d396d
Filesize:
915 B
suspicious functions used:
curl_exec (line:15); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: texecutepayment.php-
Full path:
asb/web/texecutepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
09:41:53 12/12/2025
Last modified:
02:36:21 20/11/2024
MD5 hash:
623635fdf5c871391d3a5fe99ee8c543
Filesize:
2.91 KB
suspicious functions used:
curl_exec (line:24); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index.php-
Full path:
asb/web/index.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
05:16:38 12/12/2025
Last modified:
02:35:57 20/11/2024
MD5 hash:
f161ab23adf4527023a0ad582d478f89
Filesize:
12.45 KB
suspicious functions used:
base64_decode (line:10);curl_exec (line:183); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ip-ping-checker.php-
Full path:
asb/web/ip-ping-checker.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:11 12/12/2025
Last modified:
02:35:58 20/11/2024
MD5 hash:
0d28f3053b73b3fe2885cf519ee17c12
Filesize:
2.64 KB
suspicious functions used:
curl_exec (line:81); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook_test.php-
Full path:
asb/web/webhook_test.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:11 12/12/2025
Last modified:
02:36:23 20/11/2024
MD5 hash:
74a7dcc262d7fe7f2bdc9e0595d03837
Filesize:
4.69 KB
suspicious functions used:
base64_decode (line:22);curl_exec (line:33);curl_exec (line:86);curl_exec (line:107); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec.php-
Full path:
asb/web/login_exec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
12:08:41 12/12/2025
Last modified:
02:35:58 20/11/2024
MD5 hash:
9038a77a32a5db2c9affae1496473f3e
Filesize:
5.27 KB
suspicious functions used:
curl_exec (line:62); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: loginexec.php-
Full path:
asb/web/loginexec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:12 12/12/2025
Last modified:
02:35:58 20/11/2024
MD5 hash:
edb8017e7d0f8e037facbcacc94a383d
Filesize:
5.91 KB
suspicious functions used:
curl_exec (line:67); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-count-cdata.php-
Full path:
asb/web/network-olt-client-onu-mac-count-cdata.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:12 12/12/2025
Last modified:
02:36:03 20/11/2024
MD5 hash:
c378dbabf36066c335cfb8838a6e167d
Filesize:
4.58 KB
suspicious functions used:
shell_exec (line:25);shell_exec (line:35);shell_exec (line:56);shell_exec (line:103);shell_exec (line:115);shell_exec (line:126);shell_exec (line:140); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test6.php-
Full path:
asb/web/test6.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:12 12/12/2025
Last modified:
02:36:21 20/11/2024
MD5 hash:
f22d022ddc284f4d8e1de3660da91db8
Filesize:
15.61 KB
suspicious functions used:
shell_exec (line:34);shell_exec (line:113);shell_exec (line:126);shell_exec (line:132); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-count.php-
Full path:
asb/web/network-olt-client-onu-mac-count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:12 12/12/2025
Last modified:
02:36:03 20/11/2024
MD5 hash:
300ca68aa5a7a32160838b9f2627d2aa
Filesize:
14.56 KB
suspicious functions used:
shell_exec (line:26);shell_exec (line:36);shell_exec (line:68);shell_exec (line:84);shell_exec (line:101);shell_exec (line:119);shell_exec (line:135);shell_exec (line:176);shell_exec (line:236);shell_exec (line:312);shell_exec (line:379);shell_exec (line:441);shell_exec (line:460);shell_exec (line:479); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tis-news.php-
Full path:
asb/web/tis-news.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:48:50 11/12/2025
Last modified:
02:36:21 20/11/2024
MD5 hash:
ed23ca98b77c5321b4485e85eb2ea64d
Filesize:
3.67 KB
suspicious functions used:
curl_exec (line:22); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-countt.php-
Full path:
asb/web/network-olt-client-onu-mac-countt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:12 12/12/2025
Last modified:
02:36:03 20/11/2024
MD5 hash:
d29b4e72c375f528b769bd3894f9f0e7
Filesize:
8.95 KB
suspicious functions used:
shell_exec (line:26);shell_exec (line:36);shell_exec (line:59);shell_exec (line:75);shell_exec (line:92);shell_exec (line:102);shell_exec (line:117);shell_exec (line:155);shell_exec (line:206);shell_exec (line:262);shell_exec (line:275);shell_exec (line:288); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: token.php-
Full path:
asb/web/token.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:12 12/12/2025
Last modified:
02:36:21 20/11/2024
MD5 hash:
7d8e71ceda3ffb74623e0c4a814715af
Filesize:
1.53 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-con-sts.php-
Full path:
asb/web/network-olt-con-sts.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:12 12/12/2025
Last modified:
02:36:03 20/11/2024
MD5 hash:
a26b0a1c1567c34c9aa5e2e0254ff8a6
Filesize:
4 KB
suspicious functions used:
`olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:10);shell_exec (line:38);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, `last_synced`, `last_update`, `msg`, `full_msg`, ROUND((SELECT AVG(value) FROM olt_onu_history WHERE alarm_id = '$alarmId' AND value != ''), 2) AS average_value FROM `, ` WHERE `alarm_id` = '$alarmId' AND ` (line:82); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test2.php-
Full path:
asb/web/test2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:12 12/12/2025
Last modified:
02:36:21 20/11/2024
MD5 hash:
ab80d92ede21b7da59bfefb325484297
Filesize:
13.76 KB
suspicious functions used:
shell_exec (line:59);shell_exec (line:70);shell_exec (line:76);shell_exec (line:88);shell_exec (line:101);shell_exec (line:141);curl_exec (line:187);curl_exec (line:212);curl_exec (line:354); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-load.php-
Full path:
asb/web/network-olt-load.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:12 12/12/2025
Last modified:
02:36:03 20/11/2024
MD5 hash:
f49d5153285c639ed91d4e806685ee56
Filesize:
1.33 KB
suspicious functions used:
shell_exec (line:22);shell_exec (line:25); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tt.php-
Full path:
asb/web/tt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:12 12/12/2025
Last modified:
02:36:21 20/11/2024
MD5 hash:
9c4ed141cb79fdc7e807b35923c91a20
Filesize:
1.56 KB
suspicious functions used:
curl_exec (line:30); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-oid-check.php-
Full path:
asb/web/network-olt-oid-check.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:12 12/12/2025
Last modified:
02:36:03 20/11/2024
MD5 hash:
5b7dc0ce1103fbfc895873c250b63141
Filesize:
1.88 KB
suspicious functions used:
shell_exec (line:33); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-alarm-add.php-
Full path:
asb/web/network-olt-onu-alarm-add.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:12 12/12/2025
Last modified:
02:36:03 20/11/2024
MD5 hash:
be6ba82c658419e1454f778e20e2d4c3
Filesize:
7.86 KB
suspicious functions used:
shell_exec (line:103); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: support-action.php-
Full path:
asb/web/support-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:12 12/12/2025
Last modified:
02:36:20 20/11/2024
MD5 hash:
58556808f93f52486b2ad06998142aa9
Filesize:
14.56 KB
suspicious functions used:
curl_exec (line:220); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-count.php-
Full path:
asb/web/network-olt-onu-count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:12 12/12/2025
Last modified:
02:36:03 20/11/2024
MD5 hash:
67dd698e92e750fe16906b88b074cb88
Filesize:
5.18 KB
suspicious functions used:
`olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:11);shell_exec (line:65); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ttoken.php-
Full path:
asb/web/ttoken.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
09:41:36 12/12/2025
Last modified:
02:36:21 20/11/2024
MD5 hash:
5f2c51c1db5b0defadfb67ce25c0098f
Filesize:
1.54 KB
suspicious functions used:
curl_exec (line:42); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-list-data.php-
Full path:
asb/web/network-olt-onu-list-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:12 12/12/2025
Last modified:
02:36:03 20/11/2024
MD5 hash:
54cc9417c766c31317311c3722ce7d4b
Filesize:
9.48 KB
suspicious functions used:
shell_exec (line:24);shell_exec (line:38);shell_exec (line:64);shell_exec (line:85);shell_exec (line:104);shell_exec (line:125);shell_exec (line:143);shell_exec (line:153);shell_exec (line:165);shell_exec (line:185); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-power.php-
Full path:
asb/web/network-olt-onu-power.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:12 12/12/2025
Last modified:
02:36:03 20/11/2024
MD5 hash:
2e064543b67b532bdf4e5b12d49c5052
Filesize:
7.54 KB
suspicious functions used:
shell_exec (line:97); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-clients-search.php-
Full path:
asb/web/network-olt-pon-clients-search.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:12 12/12/2025
Last modified:
02:36:03 20/11/2024
MD5 hash:
79d26fc66abdab6f173330588aa8b238
Filesize:
10.93 KB
suspicious functions used:
shell_exec (line:42);shell_exec (line:51);shell_exec (line:104);shell_exec (line:168); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook.php-
Full path:
asb/web/webhook.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:12 12/12/2025
Last modified:
02:36:23 20/11/2024
MD5 hash:
26e2059a39281031d28874b51b52d60c
Filesize:
21.23 KB
suspicious functions used:
base64_decode (line:27);curl_exec (line:38);curl_exec (line:454); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search-bdcom.php-
Full path:
asb/web/network-olt-pon-onu-search-bdcom.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:12 12/12/2025
Last modified:
02:36:03 20/11/2024
MD5 hash:
c786fa8b69268c738b6ff976631798cd
Filesize:
27.74 KB
suspicious functions used:
shell_exec (line:60);shell_exec (line:69);shell_exec (line:383); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_type.php-
Full path:
asb/web/networktree_device_type.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:12 12/12/2025
Last modified:
23:20:50 20/11/2024
MD5 hash:
f1520732e5a3ef38564238a3278a1f63
Filesize:
11.43 KB
suspicious functions used:
`tree_id`) AS countolt FROM `network_tree` WHERE `olt_id` = '$olt_id_sure' AND ` (line:64); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: webhook2.php-
Full path:
asb/web/webhook2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:12 12/12/2025
Last modified:
02:36:23 20/11/2024
MD5 hash:
18c8353c99f0ca2645c68685e40c568b
Filesize:
21.1 KB
suspicious functions used:
base64_decode (line:28);curl_exec (line:39);curl_exec (line:429); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search-bdcom1.php-
Full path:
asb/web/network-olt-pon-onu-search-bdcom1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:12 12/12/2025
Last modified:
02:36:03 20/11/2024
MD5 hash:
dd18677b1dcbf7f0bce2ac6912d98da0
Filesize:
9.6 KB
suspicious functions used:
shell_exec (line:42);shell_exec (line:51);shell_exec (line:129); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search.php-
Full path:
asb/web/network-olt-pon-onu-search.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:12 12/12/2025
Last modified:
02:36:04 20/11/2024
MD5 hash:
dc183ecf77d0e1f56f672338fd09cfa5
Filesize:
21.62 KB
suspicious functions used:
shell_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data-bdcom.php-
Full path:
asb/web/network-snmp-onu-status-data-bdcom.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:13 12/12/2025
Last modified:
02:36:04 20/11/2024
MD5 hash:
065f5e2b05932ee66d473135998580ac
Filesize:
23.53 KB
suspicious functions used:
shell_exec (line:48);shell_exec (line:73);shell_exec (line:85);shell_exec (line:103);shell_exec (line:116);shell_exec (line:128);shell_exec (line:134);shell_exec (line:159);shell_exec (line:172);shell_exec (line:184);shell_exec (line:190);shell_exec (line:217);shell_exec (line:233);shell_exec (line:239);shell_exec (line:244);shell_exec (line:248);`pon_name` FROM `olt_pon` WHERE `olt_pon_id` = '$ponn_id' AND ` (line:255);shell_exec (line:263); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data.php-
Full path:
asb/web/network-snmp-onu-status-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:13 12/12/2025
Last modified:
02:36:04 20/11/2024
MD5 hash:
0adfee384bf349b50f11036947fd2a74
Filesize:
30.37 KB
suspicious functions used:
shell_exec (line:38);`olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:42);shell_exec (line:81);shell_exec (line:95);shell_exec (line:109);shell_exec (line:122);shell_exec (line:208);shell_exec (line:429);shell_exec (line:441);shell_exec (line:448); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data1.php-
Full path:
asb/web/network-snmp-onu-status-data1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:13 12/12/2025
Last modified:
02:36:04 20/11/2024
MD5 hash:
920bd1a592c36f7a1194b737642f8340
Filesize:
15.96 KB
suspicious functions used:
shell_exec (line:33);`olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:37);shell_exec (line:149); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data_vsol2.php-
Full path:
asb/web/network-snmp-onu-status-data_vsol2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:13 12/12/2025
Last modified:
02:36:04 20/11/2024
MD5 hash:
f22d022ddc284f4d8e1de3660da91db8
Filesize:
15.61 KB
suspicious functions used:
shell_exec (line:34);shell_exec (line:113);shell_exec (line:126);shell_exec (line:132); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tagreeexpayment.php-
Full path:
asb/web/tagreeexpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:13 12/12/2025
Last modified:
02:36:20 20/11/2024
MD5 hash:
029b4fba649a75c7c81d2f8931be8d63
Filesize:
2.86 KB
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreateagree.php-
Full path:
asb/web/tcreateagree.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:13 12/12/2025
Last modified:
02:36:20 20/11/2024
MD5 hash:
27a10adf4190edc7eceee8cf74a6b72b
Filesize:
999 B
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreatepayment.php-
Full path:
asb/web/tcreatepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
09:41:41 12/12/2025
Last modified:
02:36:20 20/11/2024
MD5 hash:
e49de9a33f5164bc2c6b88e4770faaff
Filesize:
1.07 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-tree-vartual-nodes.php-
Full path:
asb/web/network-tree-vartual-nodes.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:13 12/12/2025
Last modified:
02:36:04 20/11/2024
MD5 hash:
3530b8bc3113544014b1746ecd67e834
Filesize:
10.64 KB
suspicious functions used:
shell_exec (line:76);shell_exec (line:111);shell_exec (line:145);shell_exec (line:181);shell_exec (line:188); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test7.php-
Full path:
asb/web/test7.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:13 12/12/2025
Last modified:
02:36:21 20/11/2024
MD5 hash:
b11ccf951ce63a21ea0a7328316a0e5c
Filesize:
1.57 KB
suspicious functions used:
curl_exec (line:14); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree-olt-onu-list-data.php-
Full path:
asb/web/networktree-olt-onu-list-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:13 12/12/2025
Last modified:
02:36:07 20/11/2024
MD5 hash:
af4221fefa9c9051846a063ac4135560
Filesize:
8.72 KB
suspicious functions used:
shell_exec (line:24);shell_exec (line:36);shell_exec (line:59);shell_exec (line:78);shell_exec (line:97);shell_exec (line:116);shell_exec (line:134);shell_exec (line:143);shell_exec (line:155);shell_exec (line:175); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_onu_list_add.php-
Full path:
asb/web/networktree_device_onu_list_add.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:13 12/12/2025
Last modified:
02:36:09 20/11/2024
MD5 hash:
444ccf3c3e852a5a25cc4ccd3a5cf9ca
Filesize:
14.66 KB
suspicious functions used:
`network_tree` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND device_type = '5' AND ` (line:9);shell_exec (line:33);`network_tree` WHERE `onu_mac` = '$mac_address' AND ` (line:131);shell_exec (line:179);shell_exec (line:187);shell_exec (line:235);`network_tree` WHERE `onu_mac` = '$onuMac' AND ` (line:301); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: sms-balance-check.php-
Full path:
asb/web/sms-balance-check.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:13 12/12/2025
Last modified:
02:36:18 20/11/2024
MD5 hash:
74ac3e963a0dc5bb7d4c980e594aa39b
Filesize:
854 B
suspicious functions used:
curl_exec (line:15); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_pon_check.php-
Full path:
asb/web/networktree_device_pon_check.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:13 12/12/2025
Last modified:
02:36:09 20/11/2024
MD5 hash:
708a93aadcae96ecf0aaca52041fcf38
Filesize:
1.53 KB
suspicious functions used:
`pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '$olt_id' AND ` (line:8); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: sms_deliverey_report.php-
Full path:
asb/web/sms_deliverey_report.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:13 12/12/2025
Last modified:
02:36:19 20/11/2024
MD5 hash:
03623943da7e9334e137b38c8577fc84
Filesize:
4.25 KB
suspicious functions used:
curl_exec (line:28);curl_exec (line:53);curl_exec (line:90); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_pon_list_add.php-
Full path:
asb/web/networktree_device_pon_list_add.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:13 12/12/2025
Last modified:
02:36:09 20/11/2024
MD5 hash:
2ec03912801e4749c2e9cd361417ca5f
Filesize:
1.36 KB
suspicious functions used:
`olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:6);`olt_pon` WHERE `olt_id` = '$olt_id' AND ` (line:10);`network_tree` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND ` (line:17); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_pon_port_onu_list.php-
Full path:
asb/web/networktree_device_pon_port_onu_list.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:13 12/12/2025
Last modified:
02:36:09 20/11/2024
MD5 hash:
9c63b3ac69996628f5eb2959a9eb4e15
Filesize:
8.65 KB
suspicious functions used:
`olt_pon` WHERE olt_id = '$olt_id' AND ` (line:25);shell_exec (line:32);shell_exec (line:45);`network_tree` WHERE onu_index_id = '$port_onu_index_id' AND ` (line:49);shell_exec (line:81);shell_exec (line:103);shell_exec (line:122);shell_exec (line:143);shell_exec (line:161);shell_exec (line:170);shell_exec (line:184); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_pon_port_sense_list.php-
Full path:
asb/web/networktree_device_pon_port_sense_list.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:13 12/12/2025
Last modified:
02:36:09 20/11/2024
MD5 hash:
ee69cd5cc122f8aa37d8d8e5c74def6b
Filesize:
3.65 KB
suspicious functions used:
`network_tree` WHERE `onu_mac` = '$onu_mac' AND ` (line:26);`network_tree` WHERE `c_id` = '{$dfhbdxf}' AND ` (line:71); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: AutoActiveClientsCount1.php-
Full path:
at/web/AutoActiveClientsCount1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
10:28:35 12/12/2025
Last modified:
01:15:38 10/12/2024
MD5 hash:
3b3b6186ff2d9c5abd1772e5aa02ee33
Filesize:
6.4 KB
suspicious functions used:
system (line:58); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: AutoActiveClientsCount11.php-
Full path:
at/web/AutoActiveClientsCount11.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:13 12/12/2025
Last modified:
01:15:38 10/12/2024
MD5 hash:
a0090e4a11dd59b955a6edd549b6ef2f
Filesize:
5.85 KB
suspicious functions used:
system (line:54); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: client-online-mbb.php-
Full path:
at/web/client-online-mbb.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:14 12/12/2025
Last modified:
01:15:43 10/12/2024
MD5 hash:
e16c33ab6ddd7649ea56a7d5355365b6
Filesize:
16.46 KB
suspicious functions used:
curl_exec (line:90);curl_exec (line:289); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: clients-nots-action.php-
Full path:
at/web/clients-nots-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:15 12/12/2025
Last modified:
01:15:47 10/12/2024
MD5 hash:
dff1bb495509427d098cb4588da553b9
Filesize:
5.89 KB
suspicious functions used:
curl_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients.php-
Full path:
at/web/Clients.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
04:00:03 12/12/2025
Last modified:
01:15:48 10/12/2024
MD5 hash:
d59f33ca457016deee5f906de3f2ca83
Filesize:
212.42 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:844); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients1.php-
Full path:
at/web/Clients1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:15 12/12/2025
Last modified:
01:15:49 10/12/2024
MD5 hash:
a8db87dcc6beb97539ff152b767dadae
Filesize:
219.37 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:835); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients2.php-
Full path:
at/web/Clients2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:15 12/12/2025
Last modified:
01:15:51 10/12/2024
MD5 hash:
982d6411552113b0715fd17c26f50292
Filesize:
205.13 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:832); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Clients3.php-
Full path:
at/web/Clients3.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:16 12/12/2025
Last modified:
01:15:51 10/12/2024
MD5 hash:
50ddc869b383ab76e009c7a2c17c99a3
Filesize:
175.31 KB
suspicious functions used:
`box_id`, `b_name` FROM `box` WHERE `z_id` = '$macz_id' AND ` (line:832); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ClientsOnMap.php-
Full path:
at/web/ClientsOnMap.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:16 12/12/2025
Last modified:
06:02:56 10/11/2025
MD5 hash:
519edcd6a9ccec3397e6f5280db00605
Filesize:
12.2 KB
suspicious functions used:
`${totalonline}` (line:97);`${totaloffline}` (line:98);`${results.rxPower}` (line:233);`${results.distance}` (line:234);`${results.supplyVoltage}` (line:235);`${results.temperature}` (line:236);`${results.txPower}` (line:237); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ClientView.php-
Full path:
at/web/ClientView.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
10:33:48 12/12/2025
Last modified:
01:15:55 10/12/2024
MD5 hash:
fd3851e3989fa9ae1655ed1acb19eac9
Filesize:
112.28 KB
suspicious functions used:
`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:226); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: company_info.php-
Full path:
at/web/company_info.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:55:38 11/12/2025
Last modified:
01:15:56 10/12/2024
MD5 hash:
e612d58aa2e38f5b49ba37c1bf620ece
Filesize:
8.38 KB
suspicious functions used:
curl_exec (line:130); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: createpayment.php-
Full path:
at/web/createpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:17 12/12/2025
Last modified:
01:15:56 10/12/2024
MD5 hash:
ba9747d0421fd091b998389469e72a0b
Filesize:
1.7 KB
suspicious functions used:
curl_exec (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_all.php-
Full path:
at/web/cron_all.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:17 12/12/2025
Last modified:
01:15:56 10/12/2024
MD5 hash:
967f1d654ae891609da26b9e0fdbd1ae
Filesize:
2.44 KB
suspicious functions used:
curl_exec (line:23);curl_exec (line:38);curl_exec (line:53); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_gen_bill.php-
Full path:
at/web/cron_auto_gen_bill.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:17 12/12/2025
Last modified:
01:15:56 10/12/2024
MD5 hash:
f1056618cc4402968e50d1232d2c51c8
Filesize:
4.73 KB
suspicious functions used:
curl_exec (line:140);curl_exec (line:149); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive.php-
Full path:
at/web/cron_auto_inactive.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:17 12/12/2025
Last modified:
03:22:11 10/12/2024
MD5 hash:
7e0dc4dd9dae2bf0220516641b53c027
Filesize:
5.43 KB
suspicious functions used:
curl_exec (line:142); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive2.php-
Full path:
at/web/cron_auto_inactive2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:17 12/12/2025
Last modified:
01:15:56 10/12/2024
MD5 hash:
440bc24f05b01eb395df63fff2f60de9
Filesize:
5.46 KB
suspicious functions used:
curl_exec (line:142); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive_termination.php-
Full path:
at/web/cron_auto_inactive_termination.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
01:45:38 12/12/2025
Last modified:
01:15:56 10/12/2024
MD5 hash:
9f9c8ca9110c2304128646824bfb17db
Filesize:
12.16 KB
suspicious functions used:
curl_exec (line:241);curl_exec (line:253); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_inactive_termination1.php-
Full path:
at/web/cron_auto_inactive_termination1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:17 12/12/2025
Last modified:
01:15:56 10/12/2024
MD5 hash:
be76b964c93a2cb4fa7e632750ff3bc4
Filesize:
6.64 KB
suspicious functions used:
curl_exec (line:156);curl_exec (line:168); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_auto_termination_remainder1.php-
Full path:
at/web/cron_auto_termination_remainder1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
03:07:24 12/12/2025
Last modified:
01:15:56 10/12/2024
MD5 hash:
7765f9f820dbd402f1064fab9958ffaa
Filesize:
3.26 KB
suspicious functions used:
curl_exec (line:83); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_client_bandwidth_count.php-
Full path:
at/web/cron_client_bandwidth_count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
00:14:01 12/12/2025
Last modified:
01:15:56 10/12/2024
MD5 hash:
1c71a3dd097275429ae845a85ced0438
Filesize:
5.33 KB
suspicious functions used:
curl_exec (line:124);curl_exec (line:134); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_network.php-
Full path:
at/web/cron_network.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
07:44:30 12/12/2025
Last modified:
01:15:56 10/12/2024
MD5 hash:
db096f353e80027593ca3f9781a21ac8
Filesize:
4.93 KB
suspicious functions used:
curl_exec (line:45);curl_exec (line:67);curl_exec (line:127); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_olt.php-
Full path:
at/web/cron_olt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:17 12/12/2025
Last modified:
01:15:56 10/12/2024
MD5 hash:
6975951fdbf566164ba5fa5cfcd32ec7
Filesize:
4.27 KB
suspicious functions used:
shell_exec (line:48);curl_exec (line:127); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_olt_clients_catch.php-
Full path:
at/web/cron_olt_clients_catch.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:17 12/12/2025
Last modified:
01:15:56 10/12/2024
MD5 hash:
3b13c163ba3445b3d661c63adde1d985
Filesize:
1.12 KB
suspicious functions used:
curl_exec (line:23); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: cron_olt_user.php-
Full path:
at/web/cron_olt_user.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:17 12/12/2025
Last modified:
01:15:56 10/12/2024
MD5 hash:
67aa237639e3d1e6064e76079bb3cccc
Filesize:
1.97 KB
suspicious functions used:
curl_exec (line:19);curl_exec (line:46); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: emp_salary_advence_find.php-
Full path:
at/web/emp_salary_advence_find.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:17 12/12/2025
Last modified:
01:15:57 10/12/2024
MD5 hash:
74a7e2ffda0f7584611d7cbce6136c24
Filesize:
2.25 KB
suspicious functions used:
`expanse` WHERE `type` = '2' AND `status` = '2' AND ex_by = '$e_id' AND MONTH(`, `) = MONTH('$lastmonth') AND YEAR(`, `) = YEAR('$lastmonth') GROUP BY ` (line:8);`e_id` = '$e_id' AND ` (line:12); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: executepayment.php-
Full path:
at/web/executepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:17 12/12/2025
Last modified:
01:15:57 10/12/2024
MD5 hash:
c46a50905333286f45dfeacf010851ab
Filesize:
716 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: getclientuptime.php-
Full path:
at/web/getclientuptime.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:17 12/12/2025
Last modified:
01:16:00 10/12/2024
MD5 hash:
bbc14cdd451c72b94d78c7d2d1af0b52
Filesize:
718 B
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: imagevwr.php-
Full path:
at/web/imagevwr.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:17 12/12/2025
Last modified:
01:16:00 10/12/2024
MD5 hash:
47a223a13cc642d01dcfaaca542d396d
Filesize:
915 B
suspicious functions used:
curl_exec (line:15); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index.php-
Full path:
at/web/index.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
03:58:01 12/12/2025
Last modified:
06:28:59 11/12/2024
MD5 hash:
f161ab23adf4527023a0ad582d478f89
Filesize:
12.45 KB
suspicious functions used:
base64_decode (line:10);curl_exec (line:183); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: index2.php-
Full path:
at/web/index2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:17 12/12/2025
Last modified:
01:16:00 10/12/2024
MD5 hash:
8a294c29885d611c0ef21d4b361af210
Filesize:
13.82 KB
suspicious functions used:
base64_decode (line:8);curl_exec (line:218); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: InstrumentsStoreOutDetails.php-
Full path:
at/web/InstrumentsStoreOutDetails.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:17 12/12/2025
Last modified:
01:16:00 10/12/2024
MD5 hash:
a60c19f766bfff1ccdccbeba6b39eb87
Filesize:
9.37 KB
suspicious functions used:
`update_date`, '%D-%b, %y') AS offdate, TIME_FORMAT(`update_time`, '%T') AS offtime FROM `con_sts_log` WHERE `c_id` = '{$row['c_id']}' AND con_sts = 'Inactive' ORDER BY ` (line:120); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: ip-ping-checker.php-
Full path:
at/web/ip-ping-checker.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:18 12/12/2025
Last modified:
01:16:01 10/12/2024
MD5 hash:
0d28f3053b73b3fe2885cf519ee17c12
Filesize:
2.64 KB
suspicious functions used:
curl_exec (line:81); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: loginexec.php-
Full path:
at/web/loginexec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:18 12/12/2025
Last modified:
01:16:02 10/12/2024
MD5 hash:
edb8017e7d0f8e037facbcacc94a383d
Filesize:
5.91 KB
suspicious functions used:
curl_exec (line:67); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec.php-
Full path:
at/web/login_exec.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
10:28:33 12/12/2025
Last modified:
12:11:59 10/12/2024
MD5 hash:
9038a77a32a5db2c9affae1496473f3e
Filesize:
5.27 KB
suspicious functions used:
curl_exec (line:62); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: login_exec2.php-
Full path:
at/web/login_exec2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:18 12/12/2025
Last modified:
01:16:02 10/12/2024
MD5 hash:
9038a77a32a5db2c9affae1496473f3e
Filesize:
5.27 KB
suspicious functions used:
curl_exec (line:62); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-helper.php-
Full path:
at/web/nagad-helper.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:19 12/12/2025
Last modified:
01:16:07 10/12/2024
MD5 hash:
2bb70c44d68202e0a0cd8ae1388f0b1b
Filesize:
6.74 KB
suspicious functions used:
curl_exec (line:61);base64_decode (line:97); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: nagad-merchant-callback.php-
Full path:
at/web/nagad-merchant-callback.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:19 12/12/2025
Last modified:
01:16:07 10/12/2024
MD5 hash:
abc8d9e7aad4d9c622dcd97e701448bc
Filesize:
16.5 KB
suspicious functions used:
curl_exec (line:20); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-olt-all-mac-array.php-
Full path:
at/web/netowrk-olt-all-mac-array.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:19 12/12/2025
Last modified:
01:16:07 10/12/2024
MD5 hash:
b0168ce99145e2afe64357247d750dd6
Filesize:
4.62 KB
suspicious functions used:
shell_exec (line:33);shell_exec (line:47);shell_exec (line:61);shell_exec (line:76);shell_exec (line:93); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: netowrk-snmp-data.php-
Full path:
at/web/netowrk-snmp-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:19 12/12/2025
Last modified:
01:16:07 10/12/2024
MD5 hash:
9badf5c53b260315a061e1bb6cd2378f
Filesize:
24.8 KB
suspicious functions used:
shell_exec (line:104);shell_exec (line:113);shell_exec (line:123);shell_exec (line:142);shell_exec (line:154);shell_exec (line:165);shell_exec (line:181);shell_exec (line:191);shell_exec (line:207);shell_exec (line:227);shell_exec (line:236);shell_exec (line:244);shell_exec (line:251);shell_exec (line:256);`pon_name` FROM `olt_pon` WHERE `olt_pon_id` = '$pon_id' AND ` (line:263);shell_exec (line:280);shell_exec (line:290);`olt_pon_id` FROM `olt_pon` WHERE `pon_name` = '$ponname' AND ` (line:303);shell_exec (line:309);shell_exec (line:444); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-old-onu-rx-map.php-
Full path:
at/web/network-old-onu-rx-map.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:19 12/12/2025
Last modified:
01:16:07 10/12/2024
MD5 hash:
b4962c160c5ad68ccd8eed9c48d82a0f
Filesize:
6.94 KB
suspicious functions used:
shell_exec (line:76); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-old-onu-rx.php-
Full path:
at/web/network-old-onu-rx.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:19 12/12/2025
Last modified:
01:16:07 10/12/2024
MD5 hash:
b4962c160c5ad68ccd8eed9c48d82a0f
Filesize:
6.94 KB
suspicious functions used:
shell_exec (line:76); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-count-cdata.php-
Full path:
at/web/network-olt-client-onu-mac-count-cdata.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:19 12/12/2025
Last modified:
01:16:07 10/12/2024
MD5 hash:
c378dbabf36066c335cfb8838a6e167d
Filesize:
4.58 KB
suspicious functions used:
shell_exec (line:25);shell_exec (line:35);shell_exec (line:56);shell_exec (line:103);shell_exec (line:115);shell_exec (line:126);shell_exec (line:140); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-count.php-
Full path:
at/web/network-olt-client-onu-mac-count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:19 12/12/2025
Last modified:
01:16:07 10/12/2024
MD5 hash:
300ca68aa5a7a32160838b9f2627d2aa
Filesize:
14.56 KB
suspicious functions used:
shell_exec (line:26);shell_exec (line:36);shell_exec (line:68);shell_exec (line:84);shell_exec (line:101);shell_exec (line:119);shell_exec (line:135);shell_exec (line:176);shell_exec (line:236);shell_exec (line:312);shell_exec (line:379);shell_exec (line:441);shell_exec (line:460);shell_exec (line:479); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-client-onu-mac-countt.php-
Full path:
at/web/network-olt-client-onu-mac-countt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:19 12/12/2025
Last modified:
01:16:07 10/12/2024
MD5 hash:
d29b4e72c375f528b769bd3894f9f0e7
Filesize:
8.95 KB
suspicious functions used:
shell_exec (line:26);shell_exec (line:36);shell_exec (line:59);shell_exec (line:75);shell_exec (line:92);shell_exec (line:102);shell_exec (line:117);shell_exec (line:155);shell_exec (line:206);shell_exec (line:262);shell_exec (line:275);shell_exec (line:288); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-con-sts.php-
Full path:
at/web/network-olt-con-sts.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:19 12/12/2025
Last modified:
01:16:08 10/12/2024
MD5 hash:
a26b0a1c1567c34c9aa5e2e0254ff8a6
Filesize:
4 KB
suspicious functions used:
`olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:10);shell_exec (line:38);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, `last_synced`, `last_update`, `msg`, `full_msg`, ROUND((SELECT AVG(value) FROM olt_onu_history WHERE alarm_id = '$alarmId' AND value != ''), 2) AS average_value FROM `, ` WHERE `alarm_id` = '$alarmId' AND ` (line:82); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-load.php-
Full path:
at/web/network-olt-load.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:19 12/12/2025
Last modified:
01:16:08 10/12/2024
MD5 hash:
f49d5153285c639ed91d4e806685ee56
Filesize:
1.33 KB
suspicious functions used:
shell_exec (line:22);shell_exec (line:25); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-oid-check.php-
Full path:
at/web/network-olt-oid-check.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:19 12/12/2025
Last modified:
01:16:08 10/12/2024
MD5 hash:
5b7dc0ce1103fbfc895873c250b63141
Filesize:
1.88 KB
suspicious functions used:
shell_exec (line:33); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-alarm-add.php-
Full path:
at/web/network-olt-onu-alarm-add.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:19 12/12/2025
Last modified:
01:16:08 10/12/2024
MD5 hash:
be6ba82c658419e1454f778e20e2d4c3
Filesize:
7.86 KB
suspicious functions used:
shell_exec (line:103); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-count.php-
Full path:
at/web/network-olt-onu-count.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:19 12/12/2025
Last modified:
01:16:08 10/12/2024
MD5 hash:
eed277fdd838fc119df53ba5ebda8a77
Filesize:
5.44 KB
suspicious functions used:
`olt_id`, `olt_name`, `ip_address`, `olt_type`, `olt_pon`, `community`, `location`, `port` FROM `olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:11);shell_exec (line:69); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-list-data.php-
Full path:
at/web/network-olt-onu-list-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:19 12/12/2025
Last modified:
01:16:08 10/12/2024
MD5 hash:
54cc9417c766c31317311c3722ce7d4b
Filesize:
9.48 KB
suspicious functions used:
shell_exec (line:24);shell_exec (line:38);shell_exec (line:64);shell_exec (line:85);shell_exec (line:104);shell_exec (line:125);shell_exec (line:143);shell_exec (line:153);shell_exec (line:165);shell_exec (line:185); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-onu-power.php-
Full path:
at/web/network-olt-onu-power.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:19 12/12/2025
Last modified:
01:16:08 10/12/2024
MD5 hash:
2e064543b67b532bdf4e5b12d49c5052
Filesize:
7.54 KB
suspicious functions used:
shell_exec (line:97); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-clients-search.php-
Full path:
at/web/network-olt-pon-clients-search.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:19 12/12/2025
Last modified:
01:16:08 10/12/2024
MD5 hash:
79d26fc66abdab6f173330588aa8b238
Filesize:
10.93 KB
suspicious functions used:
shell_exec (line:42);shell_exec (line:51);shell_exec (line:104);shell_exec (line:168); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search-bdcom.php-
Full path:
at/web/network-olt-pon-onu-search-bdcom.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:19 12/12/2025
Last modified:
01:16:08 10/12/2024
MD5 hash:
c786fa8b69268c738b6ff976631798cd
Filesize:
27.74 KB
suspicious functions used:
shell_exec (line:60);shell_exec (line:69);shell_exec (line:383); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search-bdcom1.php-
Full path:
at/web/network-olt-pon-onu-search-bdcom1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:19 12/12/2025
Last modified:
01:16:08 10/12/2024
MD5 hash:
dd18677b1dcbf7f0bce2ac6912d98da0
Filesize:
9.6 KB
suspicious functions used:
shell_exec (line:42);shell_exec (line:51);shell_exec (line:129); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-olt-pon-onu-search.php-
Full path:
at/web/network-olt-pon-onu-search.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:19 12/12/2025
Last modified:
01:16:08 10/12/2024
MD5 hash:
dc183ecf77d0e1f56f672338fd09cfa5
Filesize:
21.62 KB
suspicious functions used:
shell_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data-bdcom.php-
Full path:
at/web/network-snmp-onu-status-data-bdcom.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:19 12/12/2025
Last modified:
01:16:09 10/12/2024
MD5 hash:
065f5e2b05932ee66d473135998580ac
Filesize:
23.53 KB
suspicious functions used:
shell_exec (line:48);shell_exec (line:73);shell_exec (line:85);shell_exec (line:103);shell_exec (line:116);shell_exec (line:128);shell_exec (line:134);shell_exec (line:159);shell_exec (line:172);shell_exec (line:184);shell_exec (line:190);shell_exec (line:217);shell_exec (line:233);shell_exec (line:239);shell_exec (line:244);shell_exec (line:248);`pon_name` FROM `olt_pon` WHERE `olt_pon_id` = '$ponn_id' AND ` (line:255);shell_exec (line:263); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data.php-
Full path:
at/web/network-snmp-onu-status-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:19 12/12/2025
Last modified:
01:16:09 10/12/2024
MD5 hash:
0adfee384bf349b50f11036947fd2a74
Filesize:
30.37 KB
suspicious functions used:
shell_exec (line:38);`olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:42);shell_exec (line:81);shell_exec (line:95);shell_exec (line:109);shell_exec (line:122);shell_exec (line:208);shell_exec (line:429);shell_exec (line:441);shell_exec (line:448); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data1.php-
Full path:
at/web/network-snmp-onu-status-data1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:19 12/12/2025
Last modified:
01:16:09 10/12/2024
MD5 hash:
920bd1a592c36f7a1194b737642f8340
Filesize:
15.96 KB
suspicious functions used:
shell_exec (line:33);`olt_pon_id`, `pon_name` FROM `olt_pon` WHERE olt_id = '$olt_id' AND ` (line:37);shell_exec (line:149); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-snmp-onu-status-data_vsol2.php-
Full path:
at/web/network-snmp-onu-status-data_vsol2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:19 12/12/2025
Last modified:
01:16:09 10/12/2024
MD5 hash:
f22d022ddc284f4d8e1de3660da91db8
Filesize:
15.61 KB
suspicious functions used:
shell_exec (line:34);shell_exec (line:113);shell_exec (line:126);shell_exec (line:132); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: network-tree-vartual-nodes.php-
Full path:
at/web/network-tree-vartual-nodes.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:19 12/12/2025
Last modified:
01:16:09 10/12/2024
MD5 hash:
3530b8bc3113544014b1746ecd67e834
Filesize:
10.64 KB
suspicious functions used:
shell_exec (line:76);shell_exec (line:111);shell_exec (line:145);shell_exec (line:181);shell_exec (line:188); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Network.php-
Full path:
at/web/Network.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:19 12/12/2025
Last modified:
13:54:53 10/12/2024
MD5 hash:
5cad04b92cb3a82af73389d4c0c23c05
Filesize:
57.88 KB
suspicious functions used:
system (line:359);shell_exec (line:631); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: Network1.php-
Full path:
at/web/Network1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:19 12/12/2025
Last modified:
01:16:10 10/12/2024
MD5 hash:
0154c16125cee7431f537bf69c4ef811
Filesize:
44.04 KB
suspicious functions used:
system (line:295);shell_exec (line:590); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkLoad.php-
Full path:
at/web/NetworkLoad.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:20 12/12/2025
Last modified:
01:16:11 10/12/2024
MD5 hash:
e1632e66ee1b7394d3fb82751b924abe
Filesize:
2.83 KB
suspicious functions used:
system (line:81); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkLoad1.php-
Full path:
at/web/NetworkLoad1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:20 12/12/2025
Last modified:
01:16:11 10/12/2024
MD5 hash:
176bd6931be34d7ef351d22897accc65
Filesize:
759 B
suspicious functions used:
system (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltAddQuery.php-
Full path:
at/web/NetworkOltAddQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:20 12/12/2025
Last modified:
13:42:23 10/12/2024
MD5 hash:
695cd7eaea6d8343ca41b11f5a852e90
Filesize:
6.6 KB
suspicious functions used:
shell_exec (line:21); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltOnuStatus.php-
Full path:
at/web/NetworkOltOnuStatus.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:20 12/12/2025
Last modified:
01:16:11 10/12/2024
MD5 hash:
7604d17efbb57bd0b4c3566aa2d27c36
Filesize:
65.16 KB
suspicious functions used:
shell_exec (line:42);shell_exec (line:102);shell_exec (line:677);shell_exec (line:793);shell_exec (line:906); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltOnuStatus2.php-
Full path:
at/web/NetworkOltOnuStatus2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:20 12/12/2025
Last modified:
01:16:11 10/12/2024
MD5 hash:
c9a14797fa4353d05bbd9427b6079250
Filesize:
15.88 KB
suspicious functions used:
shell_exec (line:35); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltSense.php-
Full path:
at/web/NetworkOltSense.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:20 12/12/2025
Last modified:
01:16:12 10/12/2024
MD5 hash:
2be664ae5006367f629ca437a6d507f8
Filesize:
18.26 KB
suspicious functions used:
`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, `last_synced`, `last_update`, `msg`, `full_msg`, ROUND((SELECT AVG(value) FROM olt_onu_history WHERE alarm_id = '$alarmId' AND value != ''), 2) AS average_value FROM `, ` WHERE `alarm_id` = '$alarmId' AND ` (line:123); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltSenseDetails.php-
Full path:
at/web/NetworkOltSenseDetails.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:20 12/12/2025
Last modified:
01:16:12 10/12/2024
MD5 hash:
440096c601fc10b819a1f0f8330928b0
Filesize:
14.17 KB
suspicious functions used:
`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:33);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:42);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:51);`id`, `alarm_id`, `now_value`, `value`, `sts`, `online_sts`, `sync_type`, `alarm_sts`, DATE_FORMAT(last_synced, '%D %M %Y at %h:%i%p') AS last_synced, `last_update`, `msg`, `full_msg` FROM `olt_onu_history` WHERE `alarm_id` = '$s_id' AND ` (line:60); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkOltSync.php-
Full path:
at/web/NetworkOltSync.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:20 12/12/2025
Last modified:
01:16:12 10/12/2024
MD5 hash:
06633d4b65a14d677358170dd0a84424
Filesize:
1.87 KB
suspicious functions used:
curl_exec (line:18); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree-olt-onu-list-data.php-
Full path:
at/web/networktree-olt-onu-list-data.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:20 12/12/2025
Last modified:
01:16:12 10/12/2024
MD5 hash:
af4221fefa9c9051846a063ac4135560
Filesize:
8.72 KB
suspicious functions used:
shell_exec (line:24);shell_exec (line:36);shell_exec (line:59);shell_exec (line:78);shell_exec (line:97);shell_exec (line:116);shell_exec (line:134);shell_exec (line:143);shell_exec (line:155);shell_exec (line:175); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeAddSave.php-
Full path:
at/web/NetworkTreeAddSave.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:20 12/12/2025
Last modified:
01:16:13 10/12/2024
MD5 hash:
a9dbc374394f257ef79f2d4f60f9771d
Filesize:
5.12 KB
suspicious functions used:
`network_tree` WHERE `olt_id` = '$olt_id' AND ` (line:57); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeEdit1.php-
Full path:
at/web/NetworkTreeEdit1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:20 12/12/2025
Last modified:
01:16:14 10/12/2024
MD5 hash:
3396a6bdf9b5804bb208f38f37cc29a2
Filesize:
35.81 KB
suspicious functions used:
`olt_onu` WHERE olt_id = '$olt_id' AND ` (line:207); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeEditSave.php-
Full path:
at/web/NetworkTreeEditSave.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:20 12/12/2025
Last modified:
01:16:14 10/12/2024
MD5 hash:
6c0f94f3ddde2ee6a93db1fa98971907
Filesize:
12.41 KB
suspicious functions used:
`network_tree` WHERE `olt_id` = '$olt_id' AND ` (line:182); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeList.php-
Full path:
at/web/NetworkTreeList.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:20 12/12/2025
Last modified:
01:16:15 10/12/2024
MD5 hash:
acd468021993faf8575531952ae107f8
Filesize:
21.98 KB
suspicious functions used:
`pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '{$row['olt_id']}' AND ` (line:287); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeMap.php-
Full path:
at/web/NetworkTreeMap.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:20 12/12/2025
Last modified:
01:16:15 10/12/2024
MD5 hash:
584d02944bd9de5a190ec6dc320fc49e
Filesize:
24.24 KB
suspicious functions used:
`${results.rxPower}` (line:263);`${results.distance}` (line:264);`${results.supplyVoltage}` (line:265);`${results.temperature}` (line:266);`${results.txPower}` (line:267);`${results.rxPower}` (line:283);`${results.distance}` (line:284);`${results.supplyVoltage}` (line:285);`${results.temperature}` (line:286);`${results.txPower}` (line:287); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: NetworkTreeMap1.php-
Full path:
at/web/NetworkTreeMap1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:20 12/12/2025
Last modified:
01:16:15 10/12/2024
MD5 hash:
31a3ae9bc0bdb18726ed860ec6e8ec97
Filesize:
36.43 KB
suspicious functions used:
`networktree_marker_data.php?tree_id=${markerId}` (line:231);`${results.rxPower}` (line:311);`${results.distance}` (line:312);`${results.supplyVoltage}` (line:313);`${results.temperature}` (line:314);`${results.txPower}` (line:315); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_onu_list_add.php-
Full path:
at/web/networktree_device_onu_list_add.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:20 12/12/2025
Last modified:
01:16:15 10/12/2024
MD5 hash:
444ccf3c3e852a5a25cc4ccd3a5cf9ca
Filesize:
14.66 KB
suspicious functions used:
`network_tree` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND device_type = '5' AND ` (line:9);shell_exec (line:33);`network_tree` WHERE `onu_mac` = '$mac_address' AND ` (line:131);shell_exec (line:179);shell_exec (line:187);shell_exec (line:235);`network_tree` WHERE `onu_mac` = '$onuMac' AND ` (line:301); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_pon_check.php-
Full path:
at/web/networktree_device_pon_check.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:20 12/12/2025
Last modified:
01:16:15 10/12/2024
MD5 hash:
708a93aadcae96ecf0aaca52041fcf38
Filesize:
1.53 KB
suspicious functions used:
`pon_id`) AS total_pon_port FROM `olt_pon` WHERE `olt_id` = '$olt_id' AND ` (line:8); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_pon_list_add.php-
Full path:
at/web/networktree_device_pon_list_add.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:20 12/12/2025
Last modified:
01:16:15 10/12/2024
MD5 hash:
2ec03912801e4749c2e9cd361417ca5f
Filesize:
1.36 KB
suspicious functions used:
`olt_con` WHERE `olt_id` = '$olt_id' AND ` (line:6);`olt_pon` WHERE `olt_id` = '$olt_id' AND ` (line:10);`network_tree` WHERE `olt_id` = '$olt_id' AND pon_name = '$pon_name' AND ` (line:17); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_pon_port_onu_list.php-
Full path:
at/web/networktree_device_pon_port_onu_list.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:20 12/12/2025
Last modified:
01:16:15 10/12/2024
MD5 hash:
9c63b3ac69996628f5eb2959a9eb4e15
Filesize:
8.65 KB
suspicious functions used:
`olt_pon` WHERE olt_id = '$olt_id' AND ` (line:25);shell_exec (line:32);shell_exec (line:45);`network_tree` WHERE onu_index_id = '$port_onu_index_id' AND ` (line:49);shell_exec (line:81);shell_exec (line:103);shell_exec (line:122);shell_exec (line:143);shell_exec (line:161);shell_exec (line:170);shell_exec (line:184); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_pon_port_sense_list.php-
Full path:
at/web/networktree_device_pon_port_sense_list.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:20 12/12/2025
Last modified:
01:16:15 10/12/2024
MD5 hash:
ee69cd5cc122f8aa37d8d8e5c74def6b
Filesize:
3.65 KB
suspicious functions used:
`network_tree` WHERE `onu_mac` = '$onu_mac' AND ` (line:26);`network_tree` WHERE `c_id` = '{$dfhbdxf}' AND ` (line:71); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: networktree_device_type.php-
Full path:
at/web/networktree_device_type.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:20 12/12/2025
Last modified:
01:16:15 10/12/2024
MD5 hash:
f1520732e5a3ef38564238a3278a1f63
Filesize:
11.43 KB
suspicious functions used:
`tree_id`) AS countolt FROM `network_tree` WHERE `olt_id` = '$olt_id_sure' AND ` (line:64); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery.php-
Full path:
at/web/PaymentOnlineQuery.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
04:58:01 12/12/2025
Last modified:
01:16:21 10/12/2024
MD5 hash:
201e1cf95b2d033897cab4bc2fd59e07
Filesize:
28.5 KB
suspicious functions used:
curl_exec (line:457);curl_exec (line:689); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentOnlineQuery2.php-
Full path:
at/web/PaymentOnlineQuery2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:21 12/12/2025
Last modified:
01:16:21 10/12/2024
MD5 hash:
ccd315d11a60901b7b9029ff44f8351b
Filesize:
19.4 KB
suspicious functions used:
curl_exec (line:42);curl_exec (line:252); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: PaymentWebhook.php-
Full path:
at/web/PaymentWebhook.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:21 12/12/2025
Last modified:
01:16:21 10/12/2024
MD5 hash:
a2f322c94787630ab1e0c8ca35fc5ba1
Filesize:
18.6 KB
suspicious functions used:
base64_decode (line:30);curl_exec (line:41);curl_exec (line:422); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SignUp1.php-
Full path:
at/web/SignUp1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:22 12/12/2025
Last modified:
01:16:27 10/12/2024
MD5 hash:
3f7943dd155c8e0a383b7d02730f8c11
Filesize:
24.59 KB
suspicious functions used:
curl_exec (line:33);curl_exec (line:59); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: sms-balance-check.php-
Full path:
at/web/sms-balance-check.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
15:53:19 12/12/2025
Last modified:
01:16:27 10/12/2024
MD5 hash:
74ac3e963a0dc5bb7d4c980e594aa39b
Filesize:
854 B
suspicious functions used:
curl_exec (line:15); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMS.php-
Full path:
at/web/SMS.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:22 12/12/2025
Last modified:
01:16:27 10/12/2024
MD5 hash:
256a239cc69fc8bfa9305d2d4af31d14
Filesize:
36.41 KB
suspicious functions used:
curl_exec (line:56); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMS1.php-
Full path:
at/web/SMS1.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:22 12/12/2025
Last modified:
01:16:28 10/12/2024
MD5 hash:
e4671dadf9ad575671fd3609a60030da
Filesize:
32.19 KB
suspicious functions used:
curl_exec (line:59); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: SMSAddSave.php-
Full path:
at/web/SMSAddSave.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:22 12/12/2025
Last modified:
01:16:28 10/12/2024
MD5 hash:
1a6eaf13aa0ca959fe2dca885b7ffd8e
Filesize:
1.73 KB
suspicious functions used:
curl_exec (line:34); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: sms_deliverey_report.php-
Full path:
at/web/sms_deliverey_report.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
03:07:24 12/12/2025
Last modified:
01:16:29 10/12/2024
MD5 hash:
03623943da7e9334e137b38c8577fc84
Filesize:
4.25 KB
suspicious functions used:
curl_exec (line:28);curl_exec (line:53);curl_exec (line:90); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: support-action.php-
Full path:
at/web/support-action.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:23 12/12/2025
Last modified:
01:16:29 10/12/2024
MD5 hash:
58556808f93f52486b2ad06998142aa9
Filesize:
14.56 KB
suspicious functions used:
curl_exec (line:220); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tagreeexpayment.php-
Full path:
at/web/tagreeexpayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
15:19:27 12/12/2025
Last modified:
01:16:31 10/12/2024
MD5 hash:
029b4fba649a75c7c81d2f8931be8d63
Filesize:
2.86 KB
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreateagree.php-
Full path:
at/web/tcreateagree.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
15:18:35 12/12/2025
Last modified:
01:16:31 10/12/2024
MD5 hash:
27a10adf4190edc7eceee8cf74a6b72b
Filesize:
999 B
suspicious functions used:
curl_exec (line:26); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: tcreatepayment.php-
Full path:
at/web/tcreatepayment.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:23 12/12/2025
Last modified:
01:16:31 10/12/2024
MD5 hash:
e49de9a33f5164bc2c6b88e4770faaff
Filesize:
1.07 KB
suspicious functions used:
curl_exec (line:27); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test2.php-
Full path:
at/web/test2.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:23 12/12/2025
Last modified:
01:16:31 10/12/2024
MD5 hash:
ab80d92ede21b7da59bfefb325484297
Filesize:
13.76 KB
suspicious functions used:
shell_exec (line:59);shell_exec (line:70);shell_exec (line:76);shell_exec (line:88);shell_exec (line:101);shell_exec (line:141);curl_exec (line:187);curl_exec (line:212);curl_exec (line:354); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test6.php-
Full path:
at/web/test6.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:23 12/12/2025
Last modified:
01:16:31 10/12/2024
MD5 hash:
f22d022ddc284f4d8e1de3660da91db8
Filesize:
15.61 KB
suspicious functions used:
shell_exec (line:34);shell_exec (line:113);shell_exec (line:126);shell_exec (line:132); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: test7.php-
Full path:
at/web/test7.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:23 12/12/2025
Last modified:
01:16:31 10/12/2024
MD5 hash:
b11ccf951ce63a21ea0a7328316a0e5c
Filesize:
1.57 KB
suspicious functions used:
curl_exec (line:14); 
Fingerprint:
Negative (if wrong submit file for analize)
Suspicious behavior found in: testttttt.php-
Full path:
at/web/testttttt.php
Owner:
asthatecnet
Permission:
0644
Last accessed:
19:43:23 12/12/2025
Last modified:
01:16:31 10/12/2024
MD5 hash:
b1988a4be29e191ad935fb409a4174ee
Filesize:
2 KB
suspicious functions used:
curl_exec (line:47); 
Fingerprint:
Negative (if wrong submit file for analize)