[ Avaa Bypassed ]




Upload:

Command:

hmhc3928@18.191.200.151: ~ $
���}�(�malware malicious list�}�(�return_type��MaliciousListAgentResponse��help�� Show the list of malicious files��type��dict��cli�}��users�]��root�as�schema�}�(�since�}�(�type��integer��coerce��int��default�K�help��+Show files found after this unix timestamp.�u�to�}�(�type��integer��coerce��int��default_setter��now��help��,Show files found before this unix timestamp.�u�limit�}�(�type��integer��coerce��int��default�K2�help��	Page size�u�offset�}�(�type��integer��coerce��int��default�K�help��Page offset�u�search�}�(�type��string��nullable���help��(Search by file path and owner username.
�u�
by_scan_id�}�(�type��string��nullable���help��bSearch by scan id.
Can be obtained via `malware on-demand list` or `malware on-demand list-user`.
�u�user�}�(�type��string��nullable���help��GAdmins can filter results by user.
Users can only see their own files.
�u�	by_status�}�(�type��list��schema�}��type��string�s�nullable���help�XFilter by status.
Possible values: `found`, `cleanup_pending`, `cleanup_started`, `cleanup_done`, `cleanup_removed`, `cleanup_requires_myimunify_protection`, `cleanup_restore_pending`, `cleanup_restore_started`, `restore_from_backup_started`, `restored_from_backup`.
�u�ids�}�(�type��list��schema�}�(�type��integer��coerce��int�u�nullable���help��vList specific files by ID.
IDs be obtained via `malware malicious list`.
Conflicts with other filters and `order_by`.
�u�order_by�}�(�type��list��schema�}�(�type��order_by��coerce��order_by�u�nullable���help���List of fields to order by, each followed by a `+` (ascending) or `-` (descending).
E.g. `["status+","scanid.started-"]` would order by `status` ascending and `scanid.started` descending.
�uuu�"malware malicious remove-from-list�}�(�type��dict��cli�}��users�]��root�as�schema�}�(�ids�}�(�type��list��schema�}�(�type��integer��coerce��int�u�required���
positional���help��JList of file IDs to remove.
IDs be obtained via `malware malicious list`.
�u�items�}�(�rename��ids��help��
DEPRECATED�u�user�}�(�type��string��nullable���help��
(internal)�uu�help��JRemove entries from the list of malicious files without removing the files�u� malware malicious move-to-ignore�}�(�help��Move files to ignore list��type��dict��return_type��NumberAgentResponse��cli�}��users�]��root�as�schema�}�(�ids�}�(�type��list��schema�}�(�type��integer��coerce��int�u�required���
positional���help��HList of file IDs to move.
IDs be obtained via `malware malicious list`.
�u�items�}�(�rename��ids��help��
DEPRECATED�u�user�}�(�type��string��nullable���help��
(internal)�uuu�malware malicious cleanup�}�(�help��Cleanup malicious files��type��dict��return_type��NullAgentResponse��cli�}��users�]��root�as�schema�}�(�ids�}�(�type��list��schema�}�(�type��integer��coerce��int�u�required���
positional���help��KList of file IDs to cleanup.
IDs be obtained via `malware malicious list`.
�u�items�}�(�rename��ids��help��
DEPRECATED�u�user�}�(�type��string��nullable���help��
(internal)�u�
standard_only�}�(�type��boolean��help��
(internal)�uuu�"malware malicious restore-original�}�(�help��CRestore the original copy that was created before a cleanup attempt��type��dict��return_type��SucceededFailedAgentResponse��cli�}��users�]��root�as�schema�}�(�ids�}�(�type��list��schema�}�(�type��integer��coerce��int�u�required���
positional���help��KList of file IDs to restore.
IDs be obtained via `malware malicious list`.
�u�items�}�(�rename��ids��help��
DEPRECATED�u�user�}�(�type��string��nullable���help��
(internal)�uuu�malware malicious cleanup-all�}�(�help��Cleanup all malicious files��type��dict��return_type��NullAgentResponse��cli�}��users�]��root�as�schema�}�(�user�}�(�type��string��nullable���help��
(internal)�u�
standard_only�}�(�type��boolean��help��
(internal)�uuu�malware cleanup status�}�(�help��"Show the status of running cleanup��type��dict��cli�}��users�]��root�asu�malware user cleanup�}�(�help��$Cleanup all files of a specific user��type��dict��return_type��NullAgentResponse��cli�}��users�]��root�as�schema�}�(�user�}�(�type��list��schema�}��type��string�s�required���
positional���help��NAdmins can cleanup files of any user.
Users can only cleanup their own files.
�u�
standard_only�}�(�type��boolean��help��
(internal)�uuu�malware user restore-original�}�(�help��LRestore the original (infected) copy of all cleaned files of a specific user��type��dict��return_type��SucceededFailedAgentResponse��cli�}��users�]��root�as�schema�}��user�}�(�type��list��schema�}��type��string�s�required���
positional���help��NAdmins can restore files of any user.
Users can only restore their own files.
�usuu.

Filemanager

Name Type Size Permission Actions
history.pickle File 1.05 KB 0644
history.yaml File 1.17 KB 0644
ignore.pickle File 2.41 KB 0644
ignore.yaml File 2.74 KB 0644
malicious.pickle File 4.74 KB 0644
malicious.yaml File 5.92 KB 0644
malware-rebuild-patterns.pickle File 270 B 0644
malware-rebuild-patterns.yaml File 261 B 0644
malware-rescan-files.pickle File 183 B 0644
malware-rescan-files.yaml File 181 B 0644
malware-send-files.pickle File 236 B 0644
malware-send-files.yaml File 244 B 0644
on-demand-queue.pickle File 2.2 KB 0644
on-demand-queue.yaml File 2.57 KB 0644
on-demand-user.pickle File 1.49 KB 0644
on-demand-user.yaml File 1.59 KB 0644
on-demand.pickle File 3.14 KB 0644
on-demand.yaml File 3.56 KB 0644
read.pickle File 482 B 0644
read.yaml File 526 B 0644
submit.pickle File 802 B 0644
submit.yaml File 915 B 0644
suspicious.pickle File 694 B 0644
suspicious.yaml File 828 B 0644
user.pickle File 1.7 KB 0644
user.yaml File 1.93 KB 0644